content
stringlengths 1
15.9M
|
---|
\section{Introduction} \label{int}
The notion of boundary actions were introduced by Furstenberg \cite{f1} \cite{f2}, as a tool to study rigidity properties of
semisimple Lie groups. Recently, the Furstenberg idea has reemerged in the study of rigidity properties of reduced group C*-algebras generated by the regular representation of discrete groups. A discrete group $\Gamma$ acts canonically on its Furstenberg boundary $\partial_F\Gamma$ and the
dynamical properties of this action is known to be related to problems of simplicity, uniqueness of trace, and nuclear
embeddings \cite{bkko}, \cite{kk}, \cite{l}. The link between boundary actions and reduced
group C*-algebra was confirmed after the basic observation of Kalantar and Kennedy \cite{kk} that the Furstenberg and Hamana boundaries coincide, namely $C(\partial_F\Gamma) = I_\Gamma(\mathbb C)$,
where the right hand side is the $\Gamma$-injective envelope of complex numbers in the sense of
Hamana \cite{h2}. The properties of $\partial_F\Gamma$ are related to certain problems of interest in operator algebras. It is related to the
Ozawa's notion of ``tight nuclear embedding'' \cite{o2} of an
exact C*-algebra in a nuclear C*-algebra, which in turn embeds in the injective envelop of the original exact C*-algebra. Ozawa
proved such a tight embedding for the reduced C*-algebra of the free group $\mathbb F_n$, and Kalantar and Kennedy extended his result to an arbitrary discrete exact group $\Gamma$, by showing that the reduced C*-algebra $C_\lambda^*(\Gamma)$ of $\Gamma$ tightly embeds in the (nuclear) C*-algebra
generated by $C_\lambda^*(\Gamma)$ and $C(\partial_F\Gamma)$ in $B(\ell^2(\Gamma))$.
The other problems are those of C*-simplicity and unique trace property for the reduced C*-algebra. Again it
is already known by a result of Powers \cite{po} that the free group $\mathbb F_2$ is
C*-simple and has the unique trace property. More general cases where handled using dynamical properties of the Furstenberg boundary: a
discrete group $\Gamma$ is C*-simple iff its action on the Furstenberg boundary $\partial_F\Gamma$
is topologically free \cite{kk} and has
the unique trace property iff this action is
faithful \cite{bkko}, and there are faithful, non free actions on the Furstenberg boundary \cite{l} (note that the first statement fails with ``topological freeness'' replaced by ``freeness'': indeed, given a non-C*-simple group $G$ with the unique trace property, for the canonical action of $G$ on its Furstenberg boundary, let $H$ be stabilizer of a point, which is known to be amenable. Then the C*-algebra generated by the
quasi-regular representation of $G/H$ is simple by a result of Kawabe, but
the Hamana-Furstenberg boundary of $G/H$ coincides with the Furstenberg boundary
of G, and in particular, the action of $G$ is not free.) This suggests that ``non triviality''
of the action on the Furstenberg boundary $\partial_F\Gamma$ (such as being faithful or free) somehow measures the ``distance'' of $\Gamma$ from being amenable (c.f. \cite[Introduction]{bek}).
In an attempt to formulate the relation between ``boundaries'' with rigidity properties of the C*-algebra generated by the range of arbitrary representations, Bearden and Kalantar associated a boundary $\mathcal B_\pi$ to a unitary representation $\pi$ of $\Gamma$. They related properties of $\mathcal B_\pi$ (and action of $\Gamma$ on that) to rigidity properties of the C*-algebra $C_\pi^*(\Gamma)$ generated by the range of $\pi$. Bearden and Kalantar defined $\mathcal B_\pi$ as a
``relative'' Hamana $\Gamma$-injective envelop of the inclusion $\mathbb C{\rm id}_{H-\pi}\subseteq B(H_\pi)$, naturally identified
with a $\Gamma$-invariant subspace of $B(H_\pi)$ and used the Choi-Effros product to make $\mathcal B_\pi$ into a C*-algebra. Back to the discussion of the previous paragraph, since amenability of $\Gamma$ characterizes by the existence of a translation invariant unital positive linear map: $\ell^\infty(\Gamma)\to \mathbb C$, given an arbitrary unitary representation $u$ of $\Gamma$, it is natural to seek for a ``minimal''
unital $\Gamma$-equivariant projection: $B(H_\pi)\to B(H_\pi)$, where now positivity is naturally replaced by complete positivity.
This is inline with the basic idea of Hamana in constructing the $\Gamma$-boundary \cite[Theorem 3.11]{h2} and
the idea of Bekka to define amenability of unitary representations \cite{b}. By such an analogy, Bearden and Kalantar defined $\mathcal B_\pi$ as the range of a minimal u.c.p. $\Gamma$-equivariant
projection.
In this paper, we show that the Furstenberg-Hamana boundary could be used to characterize simplicity and unique trace property of $C_\pi^*(\Gamma)$. The paper is organized as follows. In section \ref{pre} we recall the needed basic notions and concepts. Section \ref{bdry} reviews the construction of the Furstenberg-Hamana boundary $\mathcal B_\pi$ of a unitary representation $\pi$ of a discrete group $\Gamma$, used extensively in the rest of the paper. In section \ref{utp}, we study the uniqueness of trace on $C^*_\pi(\Gamma)$ and show that when $\pi$ is weakly contained in the left regular representation, this holds exactly when $\Gamma$ acts faithfully on $\mathcal B_\pi$. In this situation, if moreover $\mathcal B_\pi$ is C*-embeddable in the sense of \cite{kk}, we show in section \ref{sim} that $C^*_\pi(\Gamma)$ is simple only if $\Gamma$ acts topologically free on $\mathcal B_\pi$, and the converse also holds when $\Gamma$ is exact. This is shown to be related to the Connes-Sullivan property for $\pi$. Section \ref{ex} motivates the paper by providing concrete examples of the situations where certain assumptions in our results hold for some classes of representations, including those coming from boundary actions or groupoid representations. This section also anticipates section \ref{ncbdry}, in which the classical $\Gamma$-boundaries are replaced by $\Gamma$-C*-algebras and topological freeness of the $\Gamma$-action on these noncommutative boundaries is explored.
\section{Preliminaries} \label{pre}
Let $H$ be a complex Hilbert space. A closed self-adjoint subspace $V$ of $B(H)$ is an {\it operator system} if it contains the identity. A linear map $\phi: V\to W$ between operator systems completely positive (c.p.) if all of its amplifications $\phi^{(n)}: \mathcal M_n(V)\to\mathcal M_n(W)$ are positive in the canonical operator space structure on the matrix algebras in the domain and range, and completely
isometric (c.i.) if these are all isometric. The unital completely positive (u.c.p.), unital completely
isometric (u.c.i), and contractive completely positive (c.c.p.) maps are defined naturally. The c.c.p. maps are known to be completely contractive (c.c) as well. For a discrete group $\Gamma$, an operator system $V$ is a $\Gamma$-operator system if there is an action of $\Gamma$ on $V$, that is, a group homomorphism from $\Gamma$ to the group of all bijective u.c.i. maps on $V$.
A linear map $\phi: V\to W$ between operator systems is a $\Gamma$-map if it is
u.c.p. and $\Gamma$-equivariant. A $\Gamma$-embedding is a c.i. $\Gamma$-map. When $W\subseteq V$, a $\Gamma$-projection is an idempotent $\Gamma$-map.
Let $\mathcal C$ be a subcategory of the category of operator systems and u.c.p. maps. An object
$V$ in $\mathcal C$ is injective if for every c.i. morphism $\iota: U \to W$ and every morphism $\psi : U \to V$ there is a morphisms $\tilde\psi : W \to V$ with $\tilde\psi\circ\iota=\psi$. We are particularly interested in the subcategory of $\Gamma$-operator
systems and $\Gamma$-maps. Hamana has shown that if $V$ is injective operator system then the $\Gamma$-operator system $\ell^\infty(\Gamma, V)$ is $\Gamma$-injective \cite[Lemma 2.2]{h2}.
Let $V$ be a $\Gamma$-operator systems. A $\Gamma$-extension of $V$ is a pair $(W , \iota)$ consisting of
a $\Gamma$-operator system $W$ and a c.i. morphism $\iota : V \to W$.
A $\Gamma$-extension $(W , \iota)$ of $V$ is $\Gamma$-injective if $W$ is $\Gamma$-injective. It is $\Gamma$-essential if
for every morphism $\phi : W\to U$ such that $\phi\circ\iota$ is c.i. on $V$, $\phi$ is c.i. on $W$. It is $\Gamma$-rigid if for every morphism $\phi: W\to W$ such that
$\phi\circ\iota=\iota$ on $V$, $\phi$ is the identity map on $W$.
A $\Gamma$-extension of $V$ which is both $\Gamma$-injective and $\Gamma$-essential is called a $\Gamma$-injective envelope of $V$. Every $\Gamma$-injective envelope of $V$ is known to be $\Gamma$-rigid \cite[Lemma 2.4]{h}.
Every $\Gamma$-operator system $V$ has an injective $\Gamma$-injective
envelope, denoted by $I_\Gamma(V)$, which is unique up to c.i. $\Gamma$-isomorphism. A unital $\Gamma$-C*-algebra is $\Gamma$-injective as a C*-algebra if and only if it is $\Gamma$-injective as a $\Gamma$-operator system. Since $\ell^\infty(\Gamma, B(H))$ is $\Gamma$-injective, if $V \subseteq B(H)$ is a $\Gamma$-operator system, then we have a $\Gamma$-embedding of $I_\Gamma(V)$ into $\ell^\infty(\Gamma, B(H))$ and a
$\Gamma$-projection: $\ell^\infty(\Gamma, B(H))\to I_\Gamma(V)$, which makes $I_\Gamma(V)$ into a C*-algebra via the Choi–Effros product.
Let $A$ be a C*-algebra and $V\subseteq A$ be an operator subsystem. If there is a surjective idempotent u.c.p. map $\psi : A \to V$, then the
Choi-Effros product $a \cdot b = \psi(ab)$, turns $V$ into a C*-algebra, which is unique up to isomorphism (does
not depend on the map $\psi$) \cite{ce}.
\section{boundary of representations}\label{bdry}
Let $\pi: \Gamma\to U(H_\pi)$ be a unitary representation of $\Gamma$ and consider the set
$$ \mathfrak M=\lbrace \phi:B(H_\pi)\rightarrow B(H_\pi): \phi\ {\rm is\ a} \ \Gamma-{\rm map} \rbrace. $$
The set of $\mathfrak M $ with the partial order
$$ \phi\leq\psi \Longleftrightarrow \Vert \phi(x) \Vert \leq \Vert \psi(x) \Vert $$
contains a minimal element $\phi_0$, satisfying the following properties \cite{bek}:
$(i)$
$ \phi_{0} $ is an idempotent.
$(ii)$ ($\pi$-essentiality)
Every $\Gamma$-map $ \psi: {\rm Im}(\phi_{0}) \rightarrow B(H_\pi) $ is isometric.
$(iii)$
${\rm Im}(\phi_{0}) \subseteq B(H_\pi) $ is minimal among subspace of $ B(H_\pi) $ containing $\mathbb C1$ that are images of $\Gamma$-projections.
$(iv)$ ($\pi$-rigidity)
The identity map is the unique $\Gamma$-map on $ {\rm Im}(\phi_{0})$.
$(v)$ ($\pi$-injectivity)
If $ X \subseteq Y $ are $\Gamma$-invariant subspaces of $ B(H_\pi) $ and $ \psi: B(H_\pi) \rightarrow B(H_\pi) $ is a $\Gamma$-map such that $ \psi(X) \subseteq {\rm Im}(\phi_{0}) $ then there is a $\Gamma$-map $ \tilde{\psi}: B(H_\pi) \rightarrow B(H_\pi) $ such that $ \hat{\psi}(Y) \subseteq {\rm Im}(\phi_{0}) $ and $ \tilde{\psi}=\psi $ on $X$.
In particular, the image of a minimal element of $\mathfrak M $ is unique up
to isomorphism. Now ${\rm Im}( \phi) $ is a $\Gamma$-C*-algebra under the Choi-Effros product, here called the
Furstenberg-Hamana boundary (or simply boundary) of the representation $\pi$, and is denoted by
$\mathcal{B}_{\pi}$.
The notion of amenable unitary representation is introduced by Bekka \cite[Definition 1.1]{b}. A unitary representation $\pi: \Gamma\to B(H)$ is amenable if there is a unital positive $\Gamma$-projection
$\phi : B(H_\pi) \to \mathbb C$, where $\Gamma$ acts on $B(H_\pi)$ by $Ad_\pi$. This is to say that the inclusion $\mathbb C1\subseteq B(H_\pi)$ is $\Gamma$-injective. In this case, the Furstenberg-Hamana boundary is trivial, that is, $ \mathcal{B}_{\pi}\cong \mathbb C$.
Another aspect of ``triviality'' is the triviality of action. Every element of $\Gamma$ with finite conjugacy class acts trivially on $ \mathcal{B}_{\pi}$ \cite[Proposition 3.17]{bek}.
It is natural to expect $ \mathcal{B}_{\pi}$ to behave naturally under the restriction and induction of representations, as well as weak containment of representations. Recall that a representation $\pi$ is {\it weakly contained} in another representation $\sigma$, writing $\pi\preceq \sigma$, if the identity map on $C_c(\Gamma)$ extends canonically to a *-homomorphism: $C_\pi^*(\Gamma)\to C_\sigma^*(\Gamma)$.
There is a
$\Gamma$-map from $\mathcal{B}_{\sigma}$ to $\mathcal{B}_{\pi}$ if and only if there is a $\Gamma$-map from $B(H_\sigma)$ to $B(H_\pi)$. In particular,
if $\pi\preceq \sigma$, there is a $\Gamma$-map: $ \mathcal{B}_{\sigma}\to\mathcal{B}_{\pi}$.
The last observation shows that the boundary $\mathcal{B}_{\pi}$ is determined by the weak equivalence class of $\pi$; in other words, if two representations are weakly equivalent, then the corresponding boundaries are isomorphic as $\Gamma$-C*-algebras. The particular case of $\pi\preceq \lambda$ is of special interest, where $\lambda: \Gamma\to U(\ell^2(\Gamma))$ is the left regular representation. In this case, the Furstenberg-Hamana boundary is the same as the Furstenberg boundary, namely, $\mathcal{B}_{\lambda}\cong C(\partial_F\Gamma)$ \cite[Example 3.7]{bek}.
An action of $\Gamma$ on a compact space $X$ is {\it topologically amenable} if there is a net of continuous maps
$m_i : X \to$ Prob$(\Gamma)$ such that $\Vert gm_i(x) - m_i(gx)\Vert_1\to 0$, as $i\to\infty$, for every $g\in \Gamma$ \cite[Definition 2.1]{d}. Note that the group $\Gamma$ is exact if and only if it admits a topologically amenable action
on a compact space \cite{o}. Also for compact $\Gamma$-spaces $X$ and $Y$ if there is a continuous $\Gamma$-equivariant map:$ Y \to X$ and
$X$ is topologically amenable
then so is $Y$.
In general, there is a
$\Gamma$-inclusion $\mathcal{B}_{\pi}\hookrightarrow I(C^*_{\pi}(\Gamma))$. The boundary $\mathcal{B}_{\pi}$ is C*-embeddable if there is a *-homomorphic copy of
$\mathcal{B}_{\pi}$ in $B(H_\pi)$. In this case, $\tilde{\mathcal{B}}_{\pi}$ denotes the C*-algebra generated by $\mathcal{B}_{\pi}\cup \pi(\Gamma)$
in $B(H_\pi)$.
An action of $\Gamma$ on a unital C*-algebra $B$ is (strongly)
topologically amenable if the action of $\Gamma$ on the Gelfand spectrum of the
center $Z(B)$ of $B$ is topologically amenable (c.f., \cite{d}). A related notion is defined in \cite[Definition 3.4]{bew2}: an action of $\Gamma$ on a C*-algebra $B$ is strongly
amenable if there is a net of norm-continuous, compactly supported, positive type functions $\theta_i : \Gamma \to ZM(A)$ such that $\|\theta_i(e)\|\leq 1$
for all $i$ (where $e$ is the identity of $\Gamma$), and $\theta_i(g)\to 1$, strictly and uniformly for $g$ in compact
subsets of $\Gamma$. The two notions are equivalent when $B$ is commutative (and unital) \cite[Theorem 5.13]{bew2}. Note that in \cite{bew2} the authors also define the notion of amenable action \cite[Definition 3.4]{bew2}, which is in general weaker than strong amenability.
If $\mathcal{B}_{\pi}$ is C*-embeddable and the action of $\Gamma$ on $\mathcal{B}_{\pi}$ is topologically amenable, then $\Gamma$ is an exact group and $\pi\preceq\lambda$. Conversely, if
$\pi\preceq\lambda$, then the action of $\Gamma$ on $\mathcal{B}_{\pi}$ is topologically amenable.
We also have the following characterization of strong amenability of the $\Gamma$-action on $\mathcal{B}_{\pi}$ which extends \cite[Theorem
1.1]{kk}: the action of $\Gamma$ on $\mathcal{B}_{\pi}$ is strongly amenable iff $\Gamma$ is exact.
Following \cite{bek}, for a normal subgroup $\Lambda\unlhd \Gamma$, we say that $\Lambda$ is $\pi$-amenable if there is a $\Gamma$-map $\phi: B(H_\pi)\to \pi(\Lambda)^{'}$, where the commutant is taken inside $B(H_\pi)$ and is known to be $\Gamma$-invariant. The whole group $\Gamma$ is $\pi$-amenable iff $\pi$ is an amenable representation iff all normal subgroups of $\Gamma$ are $\pi$-amenable \cite[Proposition 4.2]{bek}. Also a normal
subgroup $\Lambda\unlhd \Gamma$ is $\lambda$-amenable iff it is amenable \cite[Proposition 4.3]{bek}.
A normal subgroup $\Lambda\unlhd \Gamma$ acts trivially on $\mathcal{B}_{\pi}$ iff it is $\pi$-amenable. In particular, the kernel of the action of $\Gamma$ on $\mathcal{B}_{\pi}$ is the unique maximal $\pi$-amenable
normal subgroup of $\Gamma$, which contains all $\pi$-amenable normal subgroups of $\Gamma$. This is called the $\pi$-amenable radical of
$\Gamma$, and is denoted by Rad$_{\pi}(\Gamma)$ \cite[Definition 4.6]{bek}.
Let $V$ be a $\Gamma$-operator system. Then the $\Gamma$-injective envelope $I_\Gamma(V)$ is characterized as a unique maximal
$\Gamma$-essential (or minimal $\Gamma$-injective) $\Gamma$-extension of $V$.
If $I(V)$ is the injective envelope of $V$ as an
operator system, since Aut$V\subseteq$ Aut$I(V)$, one may regard $I(V)$ as a $\Gamma$-extension of $V$. Indeed, $I(V)$
is a $\Gamma$-essential $\Gamma$-extension of $V$ and $V\subseteq I(V)\subseteq I_\Gamma(V)$ as $\Gamma$-spaces. Moreover, $I(V)$ is unique among the $\Gamma$-subspaces of $I_\Gamma(V)$ which are the injective envelope of $V$ \cite[Remark 2.6]{h2}.
Recall that a normal subgroup $\Lambda\unlhd \Gamma$ is called coamenable if there is a $\Gamma$-state on $\ell^\infty(\Gamma/\Lambda)$. Every coamenable
normal subgroup $\Lambda\unlhd \Gamma$ is $\pi$-coamenable. The converse is also true when $\pi\preceq\lambda$. In particular, a
normal subgroup $\Lambda\unlhd \Gamma$ is coamenable iff it is $\lambda$-coamenable.
If $\pi$ restricts to an irreducible representation on $\Lambda$, then $\Lambda$ is $\pi$-coamenable, since in this case, $\pi(\Lambda)^{'}$ is trivial. If $\pi$ is amenable, then each
normal subgroup $\Lambda\unlhd \Gamma$ is both $\pi$-amenable and $\pi$-coamenable. Conversely, if there is a normal subgroup $\Lambda\unlhd \Gamma$ which is both $\pi$-amenable and $\pi$-coamenable, $\pi$ is amenable.
In particular, if $\pi$ is a non amenable
unitary representation of $\Gamma$ whose restriction to a normal subgroup $\Lambda$ is reducible, then $\Lambda$ is not $\pi$-amenable \cite[Corollary 4.13]{bek}.
The Furstenberg boundary has the following extension property in topological dynamics: if $\Lambda$ is a normal subgroup of $\Gamma$, then any action of $\Lambda$ on $\partial_F\Gamma$ extends to an action of $\Lambda$ on $\partial_F\Gamma$. There are analogous extension properties of the Furstenberg-Hamana boundary $\mathcal{B}_{\pi}$.
An automorphism $\tau\in {\rm Aut}(\Gamma)$ is
called a $\pi$-automorphism if it extends to a C*-automorphism of $C^*_{\pi} (\Gamma)$. Following \cite{bek}, we
denote the set of all such $\Gamma$-automorphisms by ${\rm Aut}_{\pi}(\Gamma)$. The automorphism on $C^*_{\pi} (\Gamma)$ induced by a $\Gamma$-automorphism $\tau$ leaves the kernel of the
canonical *-epimorphism: $C^*_{\rm max}(\Gamma)\to C^*_{\pi} (\Gamma)$ invariant. In particular, ${\rm Aut}_{\lambda}(\Gamma)={\rm Aut}(\Gamma)$.
Any inner automorphism is a $\pi$-automorphism, thus, $\Gamma/Z(\Gamma)$ is identified with a normal subgroup of
${\rm Aut}_{\pi}(\Gamma)$. Since $Z(\Gamma)$ acts trivially on $\mathcal{B}_{\pi}$, it follows that the action of $\Gamma$ on $\mathcal{B}_{\pi}$ factors through $\Gamma/Z(\Gamma)$. Also,
The action of $\Gamma$ on $\mathcal{B}_{\pi}$ extends
to an action of ${\rm Aut}_{\pi}(\Gamma)$
on $\mathcal{B}_{\pi}$.
Recall that Rad$_{\pi}(\Gamma)$ is kernel of the action of $\Gamma$ on $\mathcal{B}_{\pi}$. Each $\tau\in{\rm Aut}_{\pi}(\Gamma)$ keeps Rad$_{\pi}(\Gamma)$ invariant. This induces a group homomorphism
$$\kappa: {\rm Aut}_{\pi}(\Gamma)\to {\rm Aut}_{\pi}\big(\Gamma/{\rm Rad}_{\pi}(\Gamma)\big),$$
whose kernel is nothing but the kernel of the above unique extended action. In particular, if the action of $\Gamma$ on $\mathcal{B}_{\pi}$ is faithful, then so is its unique extension to an action of ${\rm Aut}_{\pi}(\Gamma)$
on $\mathcal{B}_{\pi}$.
Let $\Lambda$ be a normal subgroup of $\Gamma$, and let $\pi_0$ be the restriction of $\pi$ on $\Lambda$. Then the action of $\Lambda$
on $\mathcal{B}_{\pi_0}$ extends to an action of $\Gamma$
on $\mathcal{B}_{\pi_0}$. When the $\Lambda$-action is faithful, the kernel of the $\Gamma$-action is the inverse image of the centralizer of $\pi(\Lambda)$ in $\pi(\Gamma)$.
\section{Uniqueness of Trace}\label{utp}
The groups with the unique trace property are studied in \cite{bkko}.
Every trace on the reduced C*-algebra $C_\lambda^*(\Gamma)$ of a discrete group $\Gamma$ is known to be supported on the amenable radical
Rad$(\Gamma)$ \cite[Theorem 4.1]{bkko}, which is the kernel of the action of $\Gamma$ on the Furstenberg boundary $\partial_F\Gamma$.
A trace on $C^*_\lambda(\Gamma)$ is nothing but a $\Gamma$-map $\tau: C^*_\lambda(\Gamma)\to\mathbb C$, where
$\mathbb C$ carries the trivial action of $\Gamma$. By $\Gamma$-injectivity, $\tau$ extends to a $\Gamma$-map $\tilde\tau: B\big(\ell^2(\Gamma)\big)\to I_\Gamma(\mathbb C)=C(\partial_F\Gamma)$. Since $\mathcal{B}_{\lambda}=C(\partial_F\Gamma)$, we may regard $\tilde\tau$ as a $\Gamma$-map $\tilde\tau: B\big(\ell^2(\Gamma)\big)\to \mathcal{B}_{\lambda}$. Now a trace $\tau$ on $C^*_\lambda(\Gamma)$ is supported on the normal subgroup Rad$_{\pi}(\Gamma)\unlhd \Gamma$ iff the extension
$\tilde\tau: B\big(\ell^2(\Gamma)\big)\to \mathcal{B}_{\lambda}$ vanishes outside the kernel of the action of $\Gamma$ on $\mathcal{B}_{\lambda}$.
A trace on $C^*_\pi(\Gamma)$ is called {\it extendable} in \cite{bek}, if it extends to a $\Gamma$-map: $B(H_\pi)\to \mathcal{B}_{\pi,u}$. In particular, if $\pi\preceq\lambda$ then any trace on $C^*_\pi(\Gamma)$ is extendable.
\begin{lemma} \label{rad2}
Let
$\psi: B(H_\pi) \to \mathcal{B}_{\pi}$ be a $\Gamma$-map and $g\notin${\rm Rad}$_{\pi}(\Gamma)$, then $\psi(\pi_g)$ is in the kernel of some state on $\mathcal{B}_{\pi}$.
\end{lemma}
\begin{proof}
Let $g\notin$Rad${}_{\pi}(\Gamma)$, and choose $x\in \mathcal{B}_{\pi}$ with $x\neq \pi_gx\pi_g^*$.
We may assume that $0\leq x\leq 1$. Choose a state $\omega$ on $\mathcal{B}_{\pi}$ with $\omega(x)=1$ and $\omega(\pi_gx\pi_g^*)=0$.
Since $\psi$ acts as identity on $\mathcal{B}_{\pi}$, $\omega\circ \psi(x)=1$ and $ \omega\circ\psi(\pi_gx\pi_g^*)=0$. For the state $\rho=\omega\circ \psi$, we have $ \rho(\pi_gx^2\pi_g^*)= \rho(1-x^2)=0$, and so by Cauchy-Schwartz inequality, $ \rho\big((1-x)\pi_g\big)= \rho\big(x\pi_g\big)=0$, thus
$$ \rho(\pi_g)=\rho\big((1-x)\pi_g\big)+ \rho\big(x\pi_g\big)=0,$$
that is, $\psi(\pi_g)$ is in the kernel of $\omega$.
\qed
\end{proof}
A trace on $C^*_\pi(\Gamma)$ is nothing but a $\Gamma$-map $\tau: C^*_\pi(\Gamma)\to\mathbb C$, where
$\mathbb C$ carries the trivial action of $\Gamma$ by Ad$_\pi$. We say that $\tau$ is supported on a normal subgroup $\Lambda\unlhd \Gamma$ if $\tau(\pi_g)=0$, for $g\notin \Lambda$.
\begin{proposition} \label{rad3}
All extendable traces on $C^*_\pi(\Gamma)$ are supported on {\rm Rad}$_{\pi}(\Gamma)$.
\end{proposition}
\begin{proof}
Let $\tau$ be an extendable trace on $C^*_\pi(\Gamma)$ and consider the $\Gamma$-extension $\tilde\tau: B(H_\pi) \to \mathcal{B}_{\pi}$. Then $\tilde\tau(\pi_g)=\tau(\pi_g)1$, for any $g\in \Gamma$. If $g\notin$Rad$_{\pi}(\Gamma)$, then by Lemma \ref{rad2}, $\tilde\tau(\pi_g)$ is in the kernel some state $\omega$ on $\mathcal{B}_{\pi}$. Hence, $\tau(\pi_g) = \omega(\tau(\pi_g)1)=\omega(\tilde\tau(\pi_g))=0$.\qed
\end{proof}
\begin{corollary} \label{rad4}
If $\Gamma$ acts faithfully on $\mathcal{B}_{\pi}$, then $C^*_\pi(\Gamma)$ has either has no extendable trace or has a unique one.
\end{corollary}
\begin{proof}
If we have Rad$_{\pi}(\Gamma)=\{e\}$, then for an extendable trace $\tau$, $\tau(\pi_g)=0$, for $g\neq e$. Since an extendable trace on $C^*_\pi(\Gamma)$ extend to a functional on $M( C^*_\pi(\Gamma))$, this means that any two traces agree on the copy of $C^*_\pi(\Gamma)$ inside $M(C^*_\pi(\Gamma))$. \qed
\end{proof}
\begin{lemma}\label{can}
The following are equivalent:
$(i)$ there is a canonical trace $\tau_0$ on $C^*_\pi(\Gamma)$ satisfying $\tau_0(\pi_t)=\delta_{t e}$, where the right hand side is the Kronecker delta,
$(ii)$ for each normal subgroup $\Lambda\unlhd \Gamma$, there is a conditional expectation $\mathbb E_\Lambda: C^*_\pi(\Gamma)\to C^*_\pi(\Lambda)$, which is a $\Gamma$-map satisfying $\mathbb E_\Lambda(\pi_t)=1_\Lambda(t)\pi_t$, where $1_\Lambda$ is the characteristic function of $\Lambda$ considered as a function on $\Gamma$.
\noindent Moreover, if $\lambda\preceq\pi$, $\pi$ satisfies these conditions. In this case, we also have:
$(iii)$ for each amenable subgroup $\Lambda\leq \Gamma$, there is a state on $C^*_\pi(\Gamma)$ extending the characteristic function $1_\Lambda$.
\end{lemma}
\begin{proof}
$(i)\Rightarrow (ii)$. Extend the trace on $C^*_\pi(\Gamma)$ to a normal trace $\tau$ on $M:=\pi(\Gamma)^{''}$. Then by standard results of von Neumann algebras (c.f, \cite[Proposition 11.21]{ps}), for the von Neumann subalgebra $N:=\pi(\Lambda)^{''}$, there is a conditional expectation: $M\to N$. Here we need the specific properties of this expectation, so we recall the proof from \cite{pi}. By definition $L^2(N,\tau|_N)$ can be naturally identified to a subspace of
$ L^2(M,\tau)$, namely the closure $\bar N$ of $N$ in $L^2(M,\tau)$. Let $P$ be the orthogonal
projection from $L^2(M,\tau)$ to $\bar N \subseteq L^2(N,\tau|_N)$. For $x \in L^2(M,\tau)$, $P(x)$ is the unique $\tilde x \in L^2(N,\tau|_N)$ with $\langle x,y\rangle = \langle \tilde x,y\rangle$ for each $y\in N$. By \cite[Remark 11.15]{pi}, $P$ is an $N$-module map, which is clearly acts as identity on $N$, in particular, it is a norm-one projection, and for $ a,b\in N$, the form $x\mapsto \langle a,P(x)b\rangle = \tau(a^*xb)$ is normal, and so is $P$. The complete positivity of $P$ is now automatic by \cite[Theorem 1.45]{pi}. Let $\mathbb E_\Lambda$ be the restriction of $P$ to $C^*_\pi(\Gamma)$. Since the image of norm-closed subspaces under conditional expectations are norm-closed and $P$ acts as identity on $C^*_\pi(\Lambda)$, $\mathbb E_\Lambda$ maps $ C^*_\pi(\Gamma)$ onto a norm closed subspace containing $C^*_\pi(\Lambda)$.
Next, given $t\in\Lambda$ and $s\in\Gamma\backslash\Lambda$,
$$\langle\pi_t,\pi_s\rangle=\tau(\pi^*_t\pi_s)=\tau_0(\pi_{t^{-1}s})=0,$$
since $t^{-1}s\neq e$. Therefore, $\pi_s$ is perpendicular to the linear span of $\pi(\Lambda)$ in $L^2(M,\tau)$, which is norm dense in $L^2(N,\tau|_N)$. In particular, $P\pi_s=0$, for $s\in\Gamma\backslash\Lambda$. On the other hand,
$$\mathbb E_\Lambda(\pi_t)=P\pi_tP\ \ (t\in\Gamma),$$
where $P$ is viewed as an orthogonal
projection from $L^2(M,\tau)$ onto $L^2(N,\tau|_N)$. Thus
$$\mathbb E_\Lambda(\sum_{t\in\Gamma}a_t\pi_t)=\sum_{t\in\Lambda}a_t\pi_t,$$
where the scalars $a_t$ are zero except for finitely many indices.
This implies that $\mathbb E_\Lambda$ maps $ C^*_\pi(\Gamma)$ onto $C^*_\pi(\Lambda)$.
$(ii)\Rightarrow (i)$.
Applying the assumption to the trivial subgroup, we get the canonical trace satisfying
$$\tau_0(\sum_{t\in\Gamma} a_t\pi_t):=a_e,$$
where the scalars $a_t$ are zero except for finitely many indices.
Next if $\lambda\preceq\pi$ then there is a $\Gamma$-map $\phi: C^*_\pi(\Gamma)\to C^*_\lambda(\Gamma)$. This map composed with the canonical trace $x\mapsto \langle x\delta_e,\delta_e\rangle$ on $C^*_\lambda(\Gamma)$ is a trace $\tau_0$ on $C^*_\pi(\Gamma)$ which satisfies condition $(i)$ above:
$$\tau_0(\pi_t)=\langle\phi(\pi_t)\delta_e,\delta_e\rangle=\langle\lambda_t\delta_e,\delta_e\rangle=\langle\delta_t,\delta_e\rangle=0,$$
when $t\neq e$.
Finally, for an amenable subgroup $\Lambda\leq \Gamma$, there is a state $\rho$ on $C^*_\lambda(\Gamma)$ extending the characteristic function $1_\Lambda$ (see the proof of \cite[Proposition 3.2]{ke}). Since the above $\Gamma$-map $\phi: C^*_\pi(\Gamma)\to C^*_\lambda(\Gamma)$ satisfies $\phi(\pi_s)=\lambda_s$, for $s\in\Gamma$, $\rho\circ\phi$ is the desired state on $C^*_\pi(\Gamma)$. \qed
\end{proof}
\vspace{.3cm}
In particular, the above equivalent conditions hold for the case of left regular representation.
\begin{theorem} \label{main}
If $\pi\preceq\lambda$ and there is a trace on $C^*_\pi(\Gamma)$, the following are equivalent:
$(i)$\ $\Gamma$ acts faithfully on $\mathcal{B}_{\pi}$,
$(ii)$\ $C^*_\pi(\Gamma)$ has unique trace property.
\end{theorem}
\begin{proof}
$(i)\Rightarrow (ii)$. Since $\pi\preceq\lambda$, all traces are extendable and this implication follow from Corollary \ref{rad4}.
$(ii)\Rightarrow (i)$. Let $\Lambda\unlhd \Gamma$ be a $\pi$-amenable normal subgroup and $\phi: B(H_\pi)\to \pi(\Lambda)^{'}$ be the corresponding $\Gamma$-map. Since $\Lambda$ acts trivially on $\pi(\Lambda)^{'}$, the composition of $\phi$ with any state $\tau$ on $\pi(\Lambda)^{'}$ gives a $\Lambda$-map $\tau\circ\phi: B(H_\pi)\to \mathbb C$, which means that the trivial representation is weakly contained in $\pi|_{\Lambda}$, in particular, the unit character on $\Lambda$ that sends each $\pi_t$ to 1, for $t\in\Lambda$ extends
to a non-canonical trace $\tau_1$ on $C^*_\pi(\Lambda)$, unless $\Lambda$ is the trivial subgroup. This composed with the conditional expectation $\mathbb E_\Lambda$ of Lemma \ref{can} gives a trace $\tau_1\circ \mathbb E_\Lambda$ on $C^*_\pi(\Gamma)$, which is different with the canonical trace $\tau_0$ of Lemma \ref{can}, which is a contradiction, forcing $\Lambda$ to be trivial. Therefore, Rad$_{\pi}(\Gamma)$ is trivial. \qed
\end{proof}
Note that in the particular case where $\mathcal{B}_{\pi}\cong C(\partial_F\Gamma)$, canonically as $\Gamma$-spaces, the assumption Rad$_{\pi,u}(\Gamma)=\{e\}$ follows from Rad$(\Gamma)=\{e\}$, since the latter means that $\Gamma$ acts faithfully on $\partial_F\Gamma$.
In order to study traces on $C^*_\pi(\Gamma)$, following \cite{ke}, we study $\Gamma$-boundaries inside the state space $\mathcal{S}(C^*_\pi(\Gamma))$. Recall that a $\Gamma$-space $X$ is a $\Gamma$-{\it boundary} if for each probability measure $\nu$ on $X$ and point $x\in X$, the Dirac measure $\delta_x$ is in the weak$^*$-closure of $\Gamma\nu$. A convex $\Gamma$-space $K$ is {\it affine} if the restriction of $\Gamma$-action to $K$ is implemented by convex maps, and is {\it minimal} if it is minimal among all affine $\Gamma$-spaces. By Zorn lemma, inside each affine $\Gamma$-space one has a unique minimal one. It is also a standard fact that for a minimal affine $\Gamma$-space $K$, the closure of the set ext$(K)$ is a $\Gamma$-boundary \cite[III.2.3]{gl2}.
Given a trace $\tau\in \mathcal{S}(C^*_\pi(\Gamma))$, since $\Gamma$ acts on $C^*_\pi(\Gamma)$ by $s\cdot a:=\pi_sa\pi_s^*$, the singleton $\{\tau\}$ is a $\Gamma$-boundary in $\mathcal{S}(C^*_\pi(\Gamma))$. Unlike the case of regular representation, $C^*_\pi(\Gamma)$ may fail to have a canonical trace (or indeed any trace at all), however, when $\lambda\preceq\pi$, by Lemma \ref{can}, we have a canonical trace $\tau_0$ on $C^*_\pi(\Gamma)$. In this case, we say that a $\Gamma$-boundary $X$ is {\it trivial} if $X=\{\tau_0\}.$ In particular, if the trace on $C^*_\pi(\Gamma)$ is not unique, then for any other trace $\tau$, the singleton $\{\tau\}$ is a non-trivial $\Gamma$-boundary, for the action via ad$_\pi$.
we say that a $\Gamma$-boundary $X\subseteq \mathcal S(C^*_\pi(\Gamma))$ is a $\pi$-boundary if there is a weak$^*$-continuous $\Gamma$-map: $\mathcal P(C^*_\pi(\Gamma))\to X$. Note that $\Gamma$-boundaries are automatically $\lambda$-boundary.
Though in the proof of the next result we use a result proved in Section \ref{sim} (whose proof is independent of the results of this section), we prefer to keep it here. Recall that a boundary map is a u.c.p. $\Gamma$-map into $\mathcal B_\pi$.
\begin{proposition} \label{1-1 cor}
If $\pi\preceq\lambda$, then there is a one-one correspondence between boundary maps: $C^*_\pi(\Gamma)\to \mathcal{B}_{\pi}$ and $\pi$-boundaries inside $\mathcal S(C^*_\pi(\Gamma))$.
\end{proposition}
\begin{proof}
Given a u.c.p. $\Gamma$-map $\phi: C^*_\pi(\Gamma)\to \mathcal{B}_{\pi}$, for the induced $\Gamma$-equivariant map $\phi: \mathcal S(\mathcal{B}_{\pi})\to \mathcal S(C^*_\pi(\Gamma))$, $K:=\phi^*(\mathcal P(\mathcal{B}_{\pi}))$ is a minimal affine $\Gamma$-space by \cite[III.2.4]{gl2}, and so $X:=$ext$(K)$ is a $\Gamma$-boundary, by the first statement of Proposition \ref{mp} and \cite[III.2.3]{gl2}. Since $\pi\preceq\lambda$, there is a $\Gamma$-map: $C^*_\lambda(\Gamma)\hookrightarrow C^*_\pi(\Gamma)$ whose adjoint map restricts to a $\Gamma$-map: $\mathcal P(C^*_\pi(\Gamma))\to\mathcal P(C^*_\lambda(\Gamma))=\partial_F\Gamma$. By universality, there is a surjective $\Gamma$-map: $\partial_F\Gamma\twoheadrightarrow X$. Combining these maps, we get a $\Gamma$-map: $\mathcal P(C^*_\pi(\Gamma))\to X$.
Conversely, if $X\subseteq \mathcal S(\mathcal{B}_{\pi})$ is a $\pi$-boundary with a weak$^*$-continuous $\Gamma$-map $\varphi: \mathcal P(C^*_\pi(\Gamma))\to X$, then we define a $\Gamma$-map $\phi: C^*_\pi(\Gamma)\to \mathcal{B}_{\pi}$ via, $$\langle\phi(a),\omega\rangle:=\langle a,\varphi(\omega)\rangle,\ \ (a\in C^*_\pi(\Gamma), \omega\in \mathcal P(\mathcal{B}_{\pi})),$$
as required. Note that $\phi(a)$ extends affinely and continuously to a map on the state space and then to a weak$^*$-continuous map on the dual space of $\mathcal{B}_{\pi}$, thereby defining an element of $\mathcal{B}_{\pi}$. \qed
\end{proof}
In the next corollary, we do not assume that $C^*_\pi(\Gamma)$ has a trace (though this is the case in many concrete examples).
\begin{corollary}\label{conv}
Assume that $\pi\preceq\lambda$. If there is a unique boundary map: $C^*_\pi(\Gamma)\to \mathcal{B}_{\pi}$, then for each $\omega\in\mathcal S(C^*_\pi(\Gamma))$, the closed convex hull of $\Gamma \omega$ contains all the traces on $C^*_\pi(\Gamma)$, namely, $\mathcal T(C^*_\pi(\Gamma))\subseteq \overline{\rm conv}(\Gamma \omega)$.
\end{corollary}
\begin{proof}
Given $\tau\in \mathcal T(C^*_\pi(\Gamma))$, then $\{\tau\}$ is a $\pi$-boundary and this is the only $\pi$-boundary by Proposition \ref{1-1 cor}. Given $\omega\in\mathcal S(C^*_\pi(\Gamma))$, $\overline{\rm conv}(\Gamma \omega)$ contains a minimal affine $\Gamma$-space $K$ and $\overline{{\rm ext}(K)}$ is a $\Gamma$-boundary. Now, as in the proof of Proposition \ref{1-1 cor}, the assumption $\pi\preceq\lambda$ implies that $\overline{{\rm ext}(K)}$ is also a $\pi$-boundary. In particular,
$$\{\tau\}=\overline{{\rm ext}(K)}\subseteq K\subseteq \overline{\rm conv}(\Gamma \omega),$$
i.e., $\tau\in \overline{\rm conv}(\Gamma \omega)$, as claimed.\qed
\end{proof}
The above result motivates the extension of the celebrated {\it Powers averaging property} for the left regular representation \cite{po} to any representation $\pi$.
\begin{definition}
We say that a representation $\pi\in$Rep$(\Gamma)$ has Powers averaging property if for each $a\in C^*_\pi(\Gamma)$ and $\varepsilon>0$, there is $n\geq 1$ and there are elements $s_1,\cdots, s_n\in\Gamma$ such that,
$$\Big\|\frac{1}{n}\sum_{1}^{n} \pi_{s_i}a\pi_{s_i}^*-\tau(a)1\Big\|<\varepsilon,$$
for any trace $\tau\in \mathcal T(C^*_\pi(\Gamma))$.
\end{definition}
Again we do not assume that $C^*_\pi(\Gamma)$ has a trace (if not, the above property is assumed to hold as a vacuous truth). When $\lambda$ has Powers averaging property, we say that $\Gamma$ has Powers averaging property \cite{po}.
\begin{theorem}\label{pap}
If $\pi$ has Powers averaging property then $C^*_\pi(\Gamma)$ has unique trace property. If moreover $C^*_\pi(\Gamma)$ has at least one faithful trace, then $C^*_\pi(\Gamma)$ is also simple (i.e., $\Gamma$ is $C^*_\pi$-simple). Conversely, if $\pi\preceq\lambda$, $C^*_\pi(\Gamma)$ has at least one trace, and there is a unique boundary map: $C^*_\pi(\Gamma)\to \mathcal{B}_{\pi}$, then $\pi$ has Powers averaging property.
\end{theorem}
\begin{proof}
If $\pi$ has Powers averaging property and there are two traces $\tau_1, \tau_2\in\mathcal T(C^*_\pi(\Gamma))$, then for $a\in C^*_\pi(\Gamma)$, $\varepsilon>0$ and $s_1, \cdots, s_n\in \Gamma$ as above,
$$|\tau_1(a)-\tau_2(a)|=\Big|\tau_2\big(\frac{1}{n}\sum_{1}^{n} \pi_{s_i}a\pi_{s_i}^*-\tau_1(a)1\big)\Big|\leq \Big\|\frac{1}{n}\sum_{1}^{n} \pi_{s_i}a\pi_{s_i}^*-\tau_1(a)1\Big\|<\varepsilon,$$
thus $\tau_1=\tau_2$.
If moreover $C^*_\pi(\Gamma)$ has a faithful trace $\tau$ and $I\unlhd C^*_\pi(\Gamma)$ is a non zero closed ideal, then for any non zero element $a_0\in I$, $\alpha:=\tau(a_0)\neq 0$, and for $a:\frac{1}{\alpha}a_0\in I$, given $\varepsilon>0$, the identity $1\in C^*_\pi(\Gamma)$ is within $\varepsilon$ of the element $\frac{1}{n}\sum_{1}^{n} \pi_{s_i}a\pi_{s_i}^*\in I$, for some choice of $s_i$'s in $\Gamma$, thus $1\in I$, as $I$ is closed, that is, $I=C^*_\pi(\Gamma)$.
For the converse, we adapt an argument of Kennedy in \cite[Theorem 3.8]{ke}: assume by the way of contradiction that $\pi$ does not have Powers averaging property, i.e., there is $a\in C^*_\pi(\Gamma)$ such that, for the weak$^*$-closed convex hull $L$ of the set $\{\pi_sa\pi_s^*: s\in\Gamma\}$, we have $\tau(a)1\notin L$, for a trace $\tau\in\mathcal T(C^*_\pi(\Gamma))$. By Hahn-Banach theorem, there is a non zero bounded functional $\varphi\in C^*_\pi(\Gamma)^{*}$ such that
$$\inf_{b\in L}\big|\varphi(b)-\tau(a)\varphi(1)\big|>0.$$
Put $K:=\overline{{\rm conv}}(\Gamma\varphi)$. This is a convex affine $\Gamma$-space in $C^*_\pi(\Gamma)^{*}$, and we may choose a minimal affine $\Gamma$-space $K_0$ inside $K$ containing $\varphi$. Look at the Jordan decomposition $\varphi=(\varphi_1-\varphi_2)+i(\varphi_3-\varphi_4)$, with $\varphi_i=\alpha_i\omega_i$, for positive scalars $\alpha_i$ and states $\omega_i$, for $i=1,\cdots, 4.$ As $\varphi$ is non zero, so is one of coefficients $\alpha_i$, say $\alpha_1\neq 0$. By Corollary \ref{conv}, $\alpha_1\tau\in \overline{{\rm conv}}(\Gamma\varphi_1)$. Choose a net $(\theta_j)_{j\in J}$ of finitely supported maps $\theta_j: \Gamma\to \mathbb R^{+}$ with $\sum_{s\in\Gamma} \theta_j(s)=1,$ for each $j\in J$, such that
$$\sum_{s\in\Gamma} \theta_j(s)(s\cdot\varphi_1)\to\alpha_1\tau,$$
in the weak$^*$-topology. Passing to a subnet, we may assume that
$$\sum_{s\in\Gamma} \theta_j(s)(s\cdot\varphi_i)\to\beta_i\tau_i,$$
in the weak$^*$-topology, for some positive scalars $\beta_i$ and states $\tau_i$, for $i=2,3,4$, i.e.,
$(\alpha_1\tau-\beta_2\tau_2)+i(\beta_3\tau_3-\beta_4\tau_4)\in K_0$. Since $\tau$ is $\Gamma$-invariant, we may repeat this argument one more time to get $(\alpha_1\tau-\beta_2\tau)+i(\beta^{'}_3\tau^{'}_3-\beta^{'}_4\tau^{'}_4)\in K_0$, for positive scalars $\beta^{'}_i$ and states $\tau^{'}_i$, for $i=3,4.$ Doing this two more times, $K_0$ shall contain a scalar multiple $\alpha\tau$ of $\tau$. But by minimality, this forces $K_0=\{\alpha\tau\}$, that means, $\varphi=\alpha\tau$ (and in particular, $\alpha\neq 0)$. back to the Hahn-Banach separation inequality, we get
$$\inf_{b\in L}\big|\alpha\tau(b)-\alpha\tau(a)\big|=\alpha\inf_{b\in L}\big|\tau(b)-\tau(a)\big|>0,$$
which is absurd, as $\tau(\pi_sa\pi_s^*)=\tau(a)$, for each $s\in \Gamma$, and so by linrearity and continuity, $\tau(b)=\tau(a)$, for each $b\in L$.\qed
\end{proof}
\begin{lemma} \label{fix}
If there is a $\Gamma$-map $\psi: \ell^\infty(\Gamma)\to \mathcal B_{\pi}$, then $\Gamma_\omega$ is amenable for each $\omega\in\mathcal P(\mathcal B_\pi)$. In this case, if moreover $\mathcal B_{\pi}$ is an AW$^*$-algebra, then there is a $\Gamma$-map $\phi: C^*_\pi(\Gamma)\to \mathcal B_{\pi}$ satisfying $\phi(\pi_s)=1_{{\rm Fix}(s)}$, where {\rm Fix}$(s)=\{\omega\in\mathcal{P}(\mathcal{B}_{\pi}): s\omega=\omega\}$.
\end{lemma}
\begin{proof}
Compose $\psi$ with the canonical embedding $\ell^\infty(\Gamma_\omega)\hookrightarrow \ell^\infty(\Gamma)$ to get a $\Gamma$-map $\phi: \ell^\infty(\Gamma_\omega)\to \mathcal B_{\pi}$. Let us observe that $\omega\circ \phi$ is $\Gamma_\omega$-left translation invariant:
$$\langle \omega\circ\phi, s\cdot f\rangle=\langle s^{-1}(\omega\circ\phi), f\rangle=\langle (s^{-1}\omega)\circ\phi, f\rangle=\langle \omega\circ\phi, f\rangle,$$
for $s\in \Gamma$, $f\in \ell^\infty(\Gamma_\omega)$.
For the second statement, given $\omega\in\mathcal P(\mathcal B_\pi)$, by Lamma \ref{can}$(iii)$, $1_{\Gamma_\omega}$ extends to a state $\rho_\omega\in\mathcal S(C^*_\pi(\Gamma))$ and $\omega\mapsto \rho_\omega$ is a $\Gamma$-map: $\mathcal P(\mathcal B_\pi)\to\mathcal S(C^*_\pi(\Gamma))$, whose range $X$ is a $\Gamma$-space. We claim that indeed $X$ is a $\Gamma$-boundary. Since $\mathcal P(\mathcal B_\pi)$ is extremely disconnected by assumption, Fix$(s)$ is clopen by the Frol\'{i}k theorem \cite{f}. In particular, if $\omega_i\to\omega$ in the weak$^*$-topology of $\mathcal P(\mathcal B_\pi)$, $\rho_{\omega_i}\to\rho_{\omega}$ in weak$^*$-topology of $\mathcal S(C^*_\pi(\Gamma))$; i.e., the above map is continuous, and $X$ is a $\Gamma$-boundary, as claimed.\qed
\end{proof}
\begin{corollary}
Assume that $\lambda\preceq\pi$ and $\mathcal B_{\pi}$ is an AW$^*$-algebra with identity element 1. If $C^*_\pi(\Gamma)$ has unique trace property with trace $\tau_0$ and $\tau_0$ composed with the canonical inclusion $\mathbb C\hookrightarrow \mathcal B_{\pi}; \ z\mapsto z1$ is the only $\Gamma$-map: $C^*_\pi(\Gamma)\to \mathcal B_{\pi}$, then the action of $\Gamma$ on $\mathcal B_{\pi}$ is free.
\end{corollary}
\begin{proof}
We may choose the trace $\tau_0$ as in Lemma \ref{can}. For the map $\phi$ as in Lemma \ref{fix}, by the uniqueness of $\Gamma$-maps, $\phi(\pi_s)=\tau_0(\pi_s)1. $ Thus, $$\tau_0(\pi_s)=\langle \tau_0(\pi_s)1,\omega\rangle=\langle \phi(\pi_s),\omega\rangle=\langle 1_{{\rm Fix}(s)},\omega\rangle, \ \ (\omega\in\mathcal P(\mathcal B_\pi)).$$
Since $\tau_0(\pi_s)=\delta_{se},$ we have Fix$(s)$ is equal to $\mathcal P(\mathcal B_\pi)$ for $s=e$, and empty otherwise, that is, the action $\Gamma\curvearrowright \mathcal P(\mathcal B_\pi)$ is free.\qed
\end{proof}
\section{Simplicity}\label{sim}
Let $\pi: \Gamma\to B(H_\pi)$ be a unitary representation and $\Lambda\unlhd \Gamma$ be a normal subgroup, then
$$H^\Lambda_\pi:=\{\xi\in H_\pi: \pi_t\xi=\xi\ \ (t\in\Lambda)\}$$
is a closed Hilbert subspace and by normality of $\Lambda$, $\pi_sH^\Lambda_\pi\subseteq H^\Lambda_\pi,$ for each $s\in \Gamma$. In particular, we have a sub-representation
$$\pi^\Lambda: \Gamma\to B(H^\Lambda_\pi); \ \ \pi^\Lambda(t)\xi:=\pi_t\xi \ \ (t\in\Gamma, \xi\in H^\Lambda_\pi)$$
which imitates the construction of the quasi-regular representation from left regular representation (c.f., \cite{bkko}), which is known to be weakly regular \cite{k}. Recall that a unitary representation is called weakly regular if it is weakly contained in the left regular representation \cite[page 64]{bkko}.
\begin{definition}
Given a unitary representation $\pi$, we say that $\Gamma$ is $C^*_\pi$-simple if $C^*_\pi(\Gamma)$ is simple.
\end{definition}
\begin{proposition} \label{rad5}
The following are equivalent:
$(i)$ $\Gamma$ is $C^*_\pi$-simple,
$(ii)$ every representation $\sigma$ weakly contained in $\pi$ is weakly equivalent to $\pi$.
\end{proposition}
\begin{proof}
$(i)\Rightarrow (ii)$. For unitary representation $\pi$, by the universality of $C^*_{\rm max}(\Gamma)$, there is a morphism of C*-algebras: $C^*_{\rm max}(\Gamma)\to C^*_\pi(\Gamma)$. Following \cite{dl}, we denote the kernel of this morphism by C*Ker$(\pi)$. If $C^*_\pi(\Gamma)$ is simple, C*Ker$(\pi)$ is maximal
among closed two-sided ideals of $C^*_{\rm max}(\Gamma)$. Now if $\sigma\preceq\pi$ then C*Ker$(\pi)\subseteq$C*Ker$(\sigma)$ \cite[Theorem 7]{dl}, and so by maximality, C*Ker$(\pi)=$C*Ker$(\sigma)$. Thus $\sigma$ is weakly equivalent to $\pi$ by applying again the quoted result above.
$(ii)\Rightarrow (i)$. The assumption means that C*Ker$(\pi)$ is maximal
among closed two-sided ideals of the form C*Ker$(\sigma)$. But closed two-sided ideals of $C^*_{\rm max}(\Gamma)$ are of the form C*Ker$(\sigma)$, for some unitary representation $\sigma$, thus C*Ker$(\pi)$ is a maximal
ideal of $C^*_{\rm max}(\Gamma)$, consequently $C^*_\pi(\Gamma)$ is simple.
\qed
\end{proof}
Recall that the boundary $\mathcal{B}_{\pi}$ is C*-embeddable if there is a *-homomorphic copy of
$\mathcal{B}_{\pi}$ in $B(H_\pi)$. In this case, $\tilde{\mathcal{B}}_{\pi}$ denotes the C*-algebra generated by $\mathcal{B}_{\pi}\cup \pi(\Gamma)$
in $B(H_\pi)$. This is a unital $C^*$-algebra whose unit is $\pi(e)=$id$_{H_\pi}$.
\begin{theorem}\label{emb}
If $\mathcal{B}_{\pi}$ is C*-embeddable, the simplicity of $C^*_\pi(\Gamma)$ is equivalent to simplicity of $\tilde{\mathcal{B}}_{\pi}$.
\end{theorem}
\begin{proof}
Suppose that $C^*_\pi(\Gamma)$ is simple. Given a closed ideal $I$ of $\tilde{\mathcal{B}}_{\pi}$, Let $J:=I\cap C^*_\pi(\Gamma)$, then $J=0$ or $C^*_\pi(\Gamma)$. If $J=C^*_\pi(\Gamma)$, then $I\supseteq C^*_\pi(\Gamma)$ contains $\pi(e)$, which is the identity element of $\tilde{\mathcal{B}}_{\pi}$, thus $I=\tilde{\mathcal{B}}_{\pi}$. On the other hand, if $J=0$, then $I\cap C^*_\pi(\Gamma)=0$, and
$$C^*_\pi(\Gamma)\subseteq \tilde{\mathcal{B}}_{\pi}\subseteq I(C^*_\pi(G)),$$
by \cite[Proposition 3.20]{bek}, thus $I=0$ by \cite[Lemma 1.2]{h1}.
Conversely, let $\tilde{\mathcal{B}}_{\pi}$ be simple. Let $J$ be a closed ideal of $C^*_\pi(\Gamma)$ and let
$q: C^*_\pi(\Gamma)\to C^*_\pi(\Gamma)/J$ be the corresponding quotient map. Then $q$ is $\Gamma$-equivariant with respect to the actions of $\Gamma$ on its domain and range by Ad$_\pi$ and Ad$_{q\circ\pi}$. By $\Gamma$-injectivity, $q$ extends to a $\Gamma$-equivariant map $\tilde q: \tilde{\mathcal{B}}_{\pi}\to I_\Gamma(C^*_\pi(\Gamma)/J)$ whose multiplicative domain contains $C^*_\pi(\Gamma)$. In particular, the $\Gamma$-action on $I_\Gamma(C^*_\pi(\Gamma)/J)$ is also implemented by
Ad$_{q\circ\pi}$. Similar to the situation in the proof of \cite[Theorem 6.2]{kk}, the problem is that $\tilde q$ is not a homomorphism.
Applying $\Gamma$-injectivity again, there is a $\Gamma$-equivariant projection
$$\phi: I_\Gamma(C^*_\pi(\Gamma)/J)\to \tilde q(\mathcal B_\pi),$$
which induces a Choi–Effros product on $\tilde q(B_\pi),$ making it C*-algebra isomorphic to $B_\pi$, with respect to the Choi-Effros product on $\mathcal B_\pi$ coming from $\Gamma$-equivariant projection: $B(H_\pi)\to \mathcal B_\pi$. Let $\rho: \tilde q(\mathcal B_\pi)\to \mathcal B_\pi$ be the composition of the restriction of $\phi$ to $\tilde q(\mathcal B_\pi)$ with the above mentioned isomorphism.
Next, the $\Gamma$-action on $ I_\Gamma(C^*_\pi(\Gamma)/J)$ canonically extends to a $\Gamma$-action
on $ I_\Gamma(C^*_\pi(\Gamma)/J)^{**}$ such that the inclusion
$\tilde q(\mathcal B_\pi)^{**}\subseteq I_\Gamma(C^*_\pi(\Gamma)/J)^{**}$
is $\Gamma$-equivariant and we have a normal $\Gamma$-equivariant surjective $*$-homomorphism
$$\rho^{**}: \tilde q(\mathcal B_\pi)^{**}\to \mathcal B_\pi^{**}.$$
Then $B_\pi^{**}\cong c(\rho^{**}) q(\mathcal B_\pi)^{**}$, where $c(\rho^{**})$ is the support projection of $\rho^{**}$. Since $c(\rho^{**})\in I_\Gamma(C^*_\pi(\Gamma)/J)^{**}$, we may consider the map $$\sigma: \tilde{\mathcal{B}}_{\pi}\to I_\Gamma(C^*_\pi(\Gamma)/J)^{**};\ \ x\mapsto \tilde q(x)c(\rho^{**}).$$
Since ker$(\rho^{**})$
is $\Gamma$-invariant, $c(\rho^{**})$ commutes with $C^*_\pi(\Gamma)/J$. Hence the restriction of $\sigma$ to $C^*_\pi(\Gamma)$ is a $*$-homomorphism. On the other hand, the restriction of $\sigma$ to $\mathcal B_\pi$ is a $*$-isomorphism
between $c(\rho^{**}) q(\mathcal B_\pi)$ and $\mathcal B_\pi$. Since $\tilde{\mathcal{B}}_{\pi}$ is the C*-algebra generated by $\mathcal{B}_{\pi}\cup \pi(\Gamma)$
in $B(H_\pi)$, it follows that $\sigma$ is a $*$-homomorphism.
Now by simplicity of $\tilde{\mathcal{B}}_{\pi}$, $\sigma$ is injective, hence $J=$ker$(q)=0$.\qed
\end{proof}
\begin{theorem}\label{tf}
If $\pi\preceq\lambda$ and $\tilde{\mathcal{B}}_{\pi}$ is simple, then the action of $\Gamma$ on ${\mathcal{B}}_{\pi}$ is topologically free. The converse also holds when $\Gamma$ is an exact group and $\mathcal{B}_{\pi}$ is C*-embeddable.
\end{theorem}
\begin{proof}
Let $\omega$ be a state of the C*-algebra ${\mathcal{B}}_{\pi}$ with Choi-Effros product. Let
$$\Gamma_\omega:=\{s\in\Gamma: s\omega=\omega\}$$
where $s\omega(x)=\omega(s^{-1}\cdot x)$, for $x\in {\mathcal{B}}_{\pi}$. Since $\Gamma$ acts by Ad$_\pi$ on ${\mathcal{B}}_{\pi}$ and the identity of the unital C*-algebra ${\mathcal{B}}_{\pi}$ is the identity operator on $H_\pi$, $s\omega$ is again a state. It follows from the properties of action that $\Gamma_\omega\leq\Gamma$ is a subgroup. Let $\Lambda:=\bigcap \Gamma_{s\omega}$, where $s$ runs over $\Gamma$. This is nonempty as it contains the identity of the group. Also, since $t\Gamma_\omega t^{-1}\subseteq \Gamma_{t\omega}$, $\Lambda$ is a normal subgroup of $\Gamma$. Let $\pi^\Lambda$ be the corresponding sub-representation of $\pi$ as described in the first paragraph of the current section and $p^\Lambda: H_\pi\to H_\pi^\Lambda$ be the corresponding orthogonal projection. Since $p^\Lambda$ commutes with the range of $\pi^\Lambda$, $(\iota, \pi^\Lambda, H_\pi^\Lambda)$ is a covariant pair, where $\iota$ is an embedding $\iota_0$ of $\mathcal{B}_{\pi}$ in $B(H_\pi)$ (which exists by assumption) composed with the canonical surjection
$$B(H_\pi)\twoheadrightarrow B(H_\pi^\Lambda); \ x\mapsto p^\Lambda xp^\Lambda.$$
By universal property of the full crossed product, the integrated representation $\pi^\Lambda\rtimes \iota$ extends to a $*$-epimomorphism: $\mathcal{B}_{\pi}\rtimes \Gamma\twoheadrightarrow
p^\Lambda \tilde{\mathcal{B}}_{\pi}p^\Lambda$. If $I\unlhd \mathcal{B}_{\pi}\rtimes \Gamma$ is a closed ideal with $I\cap \mathcal{B}_{\pi}=\{0\}$, then $J:=\pi^\Lambda\rtimes \iota(I)$ is a closed ideal of $p^\Lambda \tilde{\mathcal{B}}_{\pi}p^\Lambda$. The latter C*-algebra is simple as a corner of a simple C*-algebra, thus $J=0$ or $p^\Lambda \tilde{\mathcal{B}}_{\pi}p^\Lambda$. But $\pi^\Lambda\rtimes \iota$ acts as identity on ${\mathcal{B}}_{\pi}$ and so the second option for $J$ cannot hold, that is, $J=0$, i.e., $I\subseteq \ker(\pi^\Lambda\rtimes \iota)$.
On the other hand,
$$\pi^\Lambda\preceq{\rm ind}_\Lambda^\Gamma(\pi^\Lambda|_\Lambda)={\rm ind}_\Lambda^\Gamma(1_\Lambda)=\lambda,$$ hence, $\pi^\Lambda\rtimes \iota\preceq\tilde\lambda$ for the canonical surjection $\tilde\lambda: \mathcal{B}_{\pi}\rtimes\Gamma\twoheadrightarrow\mathcal{B}_{\pi}\rtimes_r\Gamma$. Therefore,
$$I\subseteq \ker(\pi^\Lambda\rtimes \iota)\subseteq \ker\tilde\lambda.$$
Summing up, we have shown that for each closed ideal $I\unlhd \mathcal{B}_{\pi}\rtimes \Gamma$ with $I\cap \mathcal{B}_{\pi}=\{0\}$,
we have $I\subseteq \ker\tilde\lambda.$ Now since $\pi\preceq\lambda$, $\mathcal{B}_{\pi}$ is abelian by \cite[Theorem 3.21]{bek}, and so it follows from \cite[Theorem 2]{as} that the action of $\Gamma$ on ${\mathcal{B}}_{\pi}$ is topologically free.
For the converse, assume moreover that $\Gamma$ is an exact group and $\mathcal{B}_{\pi}$ is C*-embeddable. Then $\mathcal{B}_{\pi}\rtimes\Gamma=\mathcal{B}_{\pi}\rtimes_r\Gamma$ by \cite[Theorem 5.3]{d}. Since $\mathcal{B}_{\pi}$ is C*-embeddable,
there is a $*$-epimomorphism: $\mathcal{B}_{\pi}\rtimes_r\Gamma \to \tilde{\mathcal{B}}_{\pi}$, mapping $C^*_\lambda(\Gamma)$ to $C^*_\pi(\Gamma)$ canonically. In particular, $\pi\preceq\lambda$, and so $\mathcal{B}_{\pi}$ is abelian. Now it follows from \cite[Corollary 1]{as} that $\mathcal{B}_{\pi}\rtimes_r\Gamma$ is simple, and so is $\tilde{\mathcal{B}}_{\pi}$. \qed
\end{proof}
\begin{remark} $(i)$ In the proof of the above theorem, we constructed a normal $\Lambda$. It is worth noting that if $\Gamma/\Lambda$ is amenable, then the condition $\pi\preceq\lambda$ is automatic, as by \cite[1.F.21]{bd},
$$\pi\preceq{\rm ind}_\Lambda^\Gamma(\pi^\Lambda|_\Lambda)={\rm ind}_\Lambda^\Gamma(1_\Lambda)=\lambda.$$
By the same argument, the condition is automatic if $\Lambda$ is coamenable (c.f., the proof of \cite[Theorem 3.28]{bek}).
Also in the first part of the proof, the condition $\pi\preceq\lambda$ could be replaced by the apparently weaker (c.f., \cite[Theorem 3.21]{bek}) condition that $\mathcal{B}_{\pi}$ is commutative.
$(ii)$ In the proof of the above lemma, we used the action of $\Gamma$ on the state space of $\mathcal{B}_{\pi}$. Since the action preserves positivity, it sends pure states to pure states. In particular, the same argument could be phrased based on pure state space or equivalently on spectrum of $\mathcal{B}_{\pi}$ (the latter being compatible with the approach of Archbold-Spielberg in defining freeness of such actions \cite{as}).
$(iii)$ If $s\in\Lambda$ and $x\in {\mathcal{B}}_{\pi}$, then by normality of $\Lambda$, $t\omega(s\cdot x)=t\omega(x)$, for each state of the form $t\omega$ on ${\mathcal{B}}_{\pi}$. It follows from Proposition \ref{mp} that $s\cdot x=x$, i.e., $\Lambda$ acts trivially on ${\mathcal{B}}_{\pi}$, therefore $\Lambda$ is $\pi$-amenable by \cite[Theorem 4.4]{bek}.
$(iv)$ Finally note that in the above proof, the restricted representation $\pi|_{\Gamma_\omega}$ is known to be an amenable representation of $\Gamma_\omega$ \cite[Lemma 3.14]{bek}.
\end{remark}
\begin{lemma}
If $\mathcal{B}_{\pi}$ is C*-embeddable, then the action of $\Gamma$ on ${\mathcal{B}}_{\pi}$ is topologically free if and only if it is free.
\end{lemma}
\begin{proof}
If $\mathcal{B}_{\pi}$ is C*-embeddable, then since by construction there is a surjective c.p. projection: $B(H_\pi)\to \mathcal{B}_{\pi}$, it follows that $\mathcal{B}_{\pi}$ is an injective C*-algebra, and so an $AW^*$-algebra \cite[IV.2.1.7]{bl}. In particular, its spectrum is extremely disconnected. Now the action of $\Gamma$ on ${\mathcal{B}}_{\pi}$ is topologically free if and only if the same holds for the action of $\Gamma$ on the spectrum of ${\mathcal{B}}_{\pi}$ \cite[Definition 1]{as} and we use the same convention for free actions. Now the result follows from \cite[Lemma 3.4]{bkko}. \qed
\end{proof}
We use \cite[Definition 6.1]{bkko} (see also, \cite[Definition 1.1]{bfs}).
\begin{definition}
A subgroup $\Lambda\leq\Gamma$ is called normalish if for every $n\geq 1$ and $t_1,\cdots,t_n\in\Gamma$, the intersection $t_1\Lambda t^{-1}_1\cap\cdots \cap t_n\Lambda t^{-1}_n$ is an infinite set.
\end{definition}
In the proof of Theorem \ref{tf}, we constructed subgroups $\Gamma_\omega$, for a (pure) state $\omega$ of the unital C*-algebra ${\mathcal{B}}_{\pi}$ (with Choi-Effros product). In the case of the left regular representation, among these are the stabilizer subgroups associated to the action of $\Gamma$ on the Furstenberg boundary $\partial_F\Gamma$, which are known to be amenable \cite[Lemma 2.7]{bkko}. Here we need to work with $\pi$-amenable subgroups, and the subgroups $\Gamma_\omega$ are not necessarily $\pi$-amenable. However, if the restricted representation $\pi|_{\Gamma_\omega}$ is amenable in the sense of Bekka \cite{b}, then $\Gamma_\omega$ is $\pi$-amenable by \cite[Proposition 4.2]{bek}.
\begin{definition} \label{pmf}
The action of $\Gamma$ on a (unital) C*-algebra $A$ is {\it proximal} if the corresponding action on the state space $\mathcal S(A)$ is proximal, i.e., given states $\omega_1,\omega_2\in\mathcal S(A)$, there is a net $(t_i)$ in $\Gamma$ with $\lim_i t_i\omega_1= \lim_i t_i\omega_2$. It is {\it minimal} if for each $\omega\in \mathcal P(A)$ in the pure state space, the orbit $\{s\omega: s\in\Gamma\}$ is dense in $\mathcal P(A)$. Finally, it is {\it topologically free} if the set $\{\omega\in\mathcal P(A): s\omega\neq \omega\}$ is weak$^*$-dense in $\mathcal P(A)$.
\end{definition}
\begin{remark} \label{tf2}
$(i)$ When $A=C_0(X)$ is commutative, $\mathcal S(A)=P(X)$ is the set of probability measures on $X$, and a given action of $\Gamma$ on $X$ is strongly proximal in the sense of Furstenberg \cite{f2} iff the induced action on $C_0(X)$ is proximal in the above sense and it is topologically transitive iff the induced action on $C_0(X)$ is minimal in the above sense.
$(ii)$ One might wonder if using state space $\mathcal S(A)$ or pure state space $\mathcal P(A)$ instead of spectrum $\hat A$ in the above definition (as well as in the proof of Theorem \ref{tf}) is a deviance from the approach of Archbold-Spielberg in defining (topological) freeness in terms of the action on the spectrum \cite[Definition 1]{as} (rather than the state space). However, when $A$ is unital, for $s\in \Gamma$ if ${\rm Fix}(s):=\{\sigma\in \hat A: s\sigma=\sigma\}$ and $\mathcal P^s(A):=\{\omega\in \mathcal P(A): s\omega=\omega\}$ are the corresponding fix-spaces, then the canonical map: $\mathcal P(A)\to \hat A$ maps $\mathcal P^s(A)$ onto ${\rm Fix}(s)$, since if $\omega\in \mathcal P(A)$ and $\sigma:=\pi_\omega\in \hat A$ is the corresponding GNS-representation with cyclic vector $\xi_\omega$, then
$$\langle \pi_{s\omega}(a)\xi_{s\omega}, \xi_{s\omega}\rangle=s\omega(a)=\omega(s^{-1}\cdot a)=\langle \pi_{\omega}(s^{-1}\cdot a)\xi_{\omega}, \xi_{\omega}\rangle=\langle s\pi_{\omega}(a)\xi_{\omega}, \xi_{\omega}\rangle,$$
for each $a\in A$, and so $\pi_{s\omega}=s\pi_{\omega}$ in $\hat A$ by \cite[2.4.1]{di}. Now since the above canonical map is continuous open \cite[3.4.11]{di}, ${\rm Fix}(s)$ has nonempty interior in $\hat A$ iff $\mathcal P^s(A)$ has nonempty interior in $\mathcal P(A)$. This means that the topological freeness in the above sense is equivalent to topological freeness in the sense of \cite[Definition 1]{as}, at least when $\hat A$ is Hausdorff (see, \cite[Remark$(i)$]{as}).
$(iii)$ Recall that an automorphism $\alpha$ of a C*-algebra A is called {\it properly outer} if for any
non-zero invariant ideal $I$ of $A$ and any inner automorphism $\beta$ of $I$, $\|\alpha|_J-\beta\|= 2$ \cite{e}. An action $\alpha$ of $\Gamma$ on $A$ is properly outer if $\alpha_t$ is properly outer, for each $t\neq e$. If $\Gamma\curvearrowright A$ is topologically
free then it is properly outer: Suppose on the contrary that $\alpha_s$ is not properly outer for some $s\neq e$. Let $I$ be a non zero ideal of $A$
invariant under $\alpha_s$, then $s\sigma=\sigma$, for each $\sigma\in \hat I$ \cite[Proposition 1]{as}. Regard $\mathcal P(I)$ as an open (non-empty) subset of $\mathcal P(A)$ \cite[2.11.8]{di}, and observe that $\mathcal P(I)\subseteq {\rm Fix}(s)$, by $(ii)$. In particular, $\mathcal P^s(A)$ has non-empty interior in $\mathcal P(A)$, thus $\Gamma\curvearrowright A$ is not topologically
free (note that in this argument we do not require $\hat A$ to be Hausdorff).
\end{remark}
\begin{proposition} \label{mp}
The action of $\Gamma$ on $\mathcal{B}_{\pi}$ is minimal. If there is a $\Gamma$-embedding: $\ell^\infty(\Gamma)\hookrightarrow B(H_\pi)$, then this action is also proximal.
\end{proposition}
\begin{proof}
Let $F$ be the closure in $\hat{ \mathcal{B}}_{\pi}$ of the set $\{\pi_{s\omega}: s\in \Gamma\}$ consisting of GNS-constructions of pure states in the orbit of $\omega$, and let $I:=\ker(F)$ be the corresponding closed ideal of $\mathcal{B}_{\pi}$. For the normal subgroup $\Lambda$ as in the proof of Theorem \ref{tf}, we have a sub-representation $\pi^\Lambda\leq \pi$, for which we get a $\Gamma$-map: $\mathcal{B}_{\pi}\to\mathcal{B}_{\pi^\Lambda}$ \cite[Proposition 3.18]{bek}, with kernel $I$. Since $H_{\pi^\Lambda}$ is a $\Gamma$-invariant closed subspace of $H_\pi$, there is a $\Gamma$-embedding: $\mathcal{B}_{\pi^\Lambda}\hookrightarrow B(H_\pi)$, i.e., the above $\Gamma$-map: $\mathcal{B}_{\pi}\to\mathcal{B}_{\pi^\Lambda}$ could be regarded as a $\Gamma$-map into $B(H_\pi)$, which is then isometric by $\pi$-essentiality \cite[Proposition 3.4]{bek}, and so $I=\ker(F)=0$, thus $F= \hat{ \mathcal{B}}_{\pi}$. It now follows that $\{s\omega: s\in\Gamma\}$ is dense in $\mathcal P(\mathcal{B}_{\pi})$.
Given $\varrho\in \mathcal S(\mathcal{B}_{\pi})$, let $K$ be the weak$^{*}$-closed convex hull of the set $\{s\varrho: s\in\Gamma\}$. We claim that $\mathcal P(\mathcal{B}_{\pi})\subseteq K$. Otherwise, choosing pure state $\omega\notin K$, by Hahn-Banach, one may choose $x\in \mathcal{B}_{\pi}$ and $\varepsilon>0$ with
$$\langle s\varrho, x\rangle\leq \langle \omega, x\rangle-\varepsilon\leq\|x\|-\varepsilon\ \ (s\in \Gamma).$$
Since $\ell^\infty(\Gamma)$ $\Gamma$-embeds in $B(H_\pi)$, the $\Gamma$ map: $$\mathcal{B}_{\pi}\to \ell^\infty(\Gamma);\ \ x\mapsto(s\mapsto\langle s\varrho, x\rangle)$$ could be regarded as a $\Gamma$-map into $B(H_\pi)$, and so is isometric by $\pi$-essentiality, contradicting the above inequalities, proving the claim. Now by Milman's theorem \cite{m}, $\omega$ is in the weak$^{*}$-closure of the set $\{s\varrho: s\in\Gamma\}$. Next, given states $\varrho_1,\varrho_2\in\mathcal S(\mathcal{B}_{\pi})$, there is a net $(t_i)$ in $\Gamma$ with $\lim_i t_i(\frac{1}{2}(\varrho_1+ \varrho_2))=\omega$. Since $\mathcal{B}_{\pi}$ is unital, passing to subnets, we may assume that the nets $t_i\varrho_k$ converge to states $\omega_k$, for $k=1,2$. Thus, $\omega=\frac{1}{2}(\omega_1+ \omega_2)$, and by extremality, $\omega=\omega_1=\omega_2$, that is, $\lim_i t_i\varrho_1=\lim_i t_i \varrho_2$. \qed
\end{proof}
In the next two results, $\Gamma_\omega$ is the stabilizer subgroup of a state $\omega\in\mathcal S(\mathcal{B}_{\pi})$ as in the proof of Theorem \ref{tf}.
\begin{lemma} \label{nish}
If $\Gamma$ has no non-trivial finite normal subgroup and the action of $\Gamma$ on $\mathcal{B}_{\pi}$ is not topologically free, then the subgroups $\Gamma_\omega$ are normalish for each pure state $\omega\in\mathcal P(\mathcal{B}_{\pi})$.
\end{lemma}
\begin{proof}
Since the action of $\Gamma$ on $\mathcal{B}_{\pi}$ is not topologically free, by Remark \ref{tf2}, there is $s\neq e$ such that ${\rm Fix}(s)$ has non-empty interior in $\mathcal P(\mathcal{B}_{\pi})$. By strong proximality any finite set states $\{\omega_1,...,\omega_n\}$ in $\mathcal S(\mathcal{B}_{\pi})$ can be mapped into the
interior of $Fix(s)$ by some $t_0\in \Gamma$, that is $(t_0^{-1}st_0)\omega_i=\omega_i$, for $1\leq i\leq n$. Now given $\omega\in\mathcal S(\mathcal{B}_{\pi})$ and a finite subset $\{t_1,...,t_n\}$ of $\Gamma$, the above observation applied to
$\omega_i := t_i\omega$ shows that the intersection $t_1\Gamma_\omega t^{-1}_1\cap\cdots \cap t_n\Gamma_\omega t^{-1}_n$ is non-trivial. Arguing as in the proof of \cite[Theorem 6.2]{bkko}, if this is finite for some
choice of $t_i$’s, but non-trivial for all choices of $t_i$’s, then
$\bigcap_{t\in G} t\Gamma_\omega t^{-1}$ is a non-trivial finite
normal subgroup of $\Gamma$, which cannot exist by assumption. Hence $\Gamma_\omega$ is normalish as claimed. \qed
\end{proof}
The next result, which follows immediately from Lemma \ref{nish}, extends \cite[Theorem 6.2]{bkko}.
\begin{corollary} \label{nish2}
Assume that $\Gamma_\omega$ is $\pi$-amenable for some pure state $\omega\in\mathcal P(\mathcal{B}_{\pi})$. If $\Gamma$ has no non-trivial finite normal subgroup and no
$\pi$-amenable normalish subgroup, then the action of $\Gamma$ on $\mathcal{B}_{\pi}$ is topologically free.
\end{corollary}
Let $\Gamma$ act on a unital C*-algebra $A$. We say that $A$ has only {\it countably many stabilizers} if the set $\{\Gamma_\omega: \omega\in \mathcal{P}(A)\}$ of stabilizer subgroups is at most countable. We adapt the proof of \cite[Theorem 6.12]{bkko} to get the following result.
\begin{corollary} \label{nish3}
Assume that $\mathcal{B}_{\pi}$ has only countably many stabilizers. If $\Gamma$ has no non-trivial finite normal subgroup and the action of $\Gamma$ on $\mathcal{B}_{\pi}$ is faithful then it is also topologically free.
\end{corollary}
\begin{proof}
If the action of $\Gamma$ on $\mathcal{B}_{\pi}$ is not topologically free, by Remark \ref{tf2}, there is $s\neq e$ such that ${\rm Fix}(s)$ has non-empty interior in $\mathcal P(\mathcal{B}_{\pi})$. Let us observe that there is $\omega_0\in {\rm Fix}(s)$ such that stabilizer $\Gamma_{\omega_0}$ fixes a non-empty open
subset of $\mathcal P(\mathcal{B}_{\pi})$ pointwise.
For $\Lambda\leq \Gamma$ and $F\subset\mathcal P(\mathcal{B}_{\pi})$ let $\ker(\Lambda):=\bigcap_{s\in \Lambda} {\rm Fix}(s)$ and ${\rm hull}(F):= \bigcup_{\omega\in F}\ker(\Gamma_\omega)$. Note that for each pure state $\omega$, ${\rm hull}(\{\omega\})$ is a closed subset of $\mathcal P(\mathcal{B}_{\pi})$ containing $\omega$. By assumption that $\Gamma$ contains only countably many stabilizers, there is a countable subset $F\subseteq {\rm Fix}(s)$ such that
${\rm hull}({\rm Fix}(s))={\rm hull}(F)$. On the other hand, ${\rm hull}({\rm Fix}(s))$ contains ${\rm Fix}(s)$ and thus has non-empty interior. In particular, by the Baire category theorem, there is $\omega_0\in F$ such that ${\rm hull}(\{\omega_0\})$ has non-empty
interior, say $U$. Then $\Gamma_{\omega_0}$ fixes $U$ pointwise, as claimed.
Next, by minimality, there are $s_1,\cdots,s_n\in\Gamma$ such
that $(s_1 \cdot U)\cup\cdots \cup (s_n\cdot U)= \mathcal P(\mathcal{B}_{\pi})$. Since the elements in $s_k\Gamma_{\omega_0}s_k^{-1}$ fix every point in $s_k\cdot U$, the elements in the intersection $\bigcap_{k=1}^{n}s_k\Gamma_{\omega_0}s_k^{-1}$ fix every point in $\mathcal P(\mathcal{B}_{\pi})$. Since $\Gamma_{\omega_0}$ is
normalish by Lemma \ref{nish}, the action could not be faithful. \qed
\end{proof}
We mimic \cite[Definition 8.1]{bkko} as follows.
\begin{definition}
We say that a unitary representation $\pi$ of $\Gamma$ has Connes-Sullivan property $(CS)$ if for every representation $\sigma$ weakly contained in $\pi$, there exists an SOT-neighborhood $U$
of the identity in $B(H_\sigma)$ such that $\sigma^{-1}(U) \subseteq {\rm Rad}_\pi(\Gamma)$.
\end{definition}
The group $\Gamma$ itself is said to have Connes-Sullivan property $(CS)$ whenever its left regular representation $\lambda$ has property $(CS)$ in the above sense (c.f., \cite[Definition 8.1]{bkko}).
It is known that if ${\rm Rad}_\pi(\Gamma)$ is trivial, then $\Gamma$ has no non-trivial $\pi$-amenable normal subgroup \cite[Corollary 4.5]{bek}. We show that in the presence of the Connes-Sullivan property $(CS)$, normal could be replaced by normalish when $\lambda\precsim\pi$.
\begin{lemma} \label{cs}
If $\pi$ has Connes-Sullivan property $(CS)$ and ${\rm Rad}_\pi(\Gamma)$ is trivial, then for each $\sigma\preceq\pi$, $\sigma(\Gamma)$ is discrete in the relative SOT-topology of $B(H_\sigma)$.
\end{lemma}
\begin{proof}
By $(CS)$ we may choose an SOT-neighborhood $U$
of the identity $I_\sigma$ in $B(H_\sigma)$ such that $\sigma^{-1}(U) \subseteq {\rm Rad}_\pi(G)=\{e\}$. Therefore, $\sigma^{-1}(U)=\{e\}$, thus $U\cap \sigma(\Gamma)=\sigma\sigma^{-1}(U)=\sigma\{e\}=\{I_\sigma\}$, that is, $\{I_\sigma\}$ is open inside $\sigma(\Gamma)$ in the relative SOT-topology, as claimed. \qed
\end{proof}
The next lemma is proved as part of the argument of the proof of \cite[Proposition 8.2]{bkko}.
\begin{lemma} \label{nish4}
If $\Lambda\leq \Gamma$ is normalish, $\lambda_{\Gamma/\Lambda}(\Gamma)$ is not discrete in the relative SOT-topology of $B(\ell^2(\Gamma/\Lambda))$.
\end{lemma}
The next result extends \cite[Proposition 8.2]{bkko}.
\begin{corollary} \label{nish5}
If $\lambda\preceq\pi$, $\pi$ has Connes-Sullivan property $(CS)$ and ${\rm Rad}_\pi(\Gamma)$ is trivial, then $\Gamma$ has no $\pi$-amenable normalish subgroup.
\end{corollary}
\begin{proof}
Let $\Lambda\leq \Gamma$. Since $\lambda\preceq\pi$, there is a $\Gamma$-inclusion $\pi(\Lambda)^{'}\hookrightarrow \lambda(\Lambda)^{'}$, and so $\pi$-amenability of $\Lambda$ implies its $\lambda$-amenability, which then implies amenability by \cite[Proposition 4.3]{bek} (there it is assumed that $\Lambda$ is a normal subgroup, but this is not used in the proof). Next, recall that when $\Lambda$ is amenable, $\lambda_{\Gamma/\Lambda}\preceq\lambda$. By assumption, $\lambda_{\Gamma/\Lambda}$ is equivalent to some sub-representation $\sigma$ of $\pi$, say via Ad$_{u}$, for some unitary $u$ between the corresponding Hilbert spaces. Then Ad$_{u}$ restricts to a homeomorphism between $\lambda_{\Gamma/\Lambda}(\Gamma)$ and $\sigma(\Gamma)$, and so $\lambda_{\Gamma/\Lambda}(\Gamma)$ is not discrete by Lemma \ref{cs}. Therefore, $\Lambda$ is not normalish by Lemma \ref{nish4}. \qed
\end{proof}
\begin{remark}
In the above corollary, if we drop the assumption $\lambda\preceq\pi$, we may still conclude that $\Gamma$ has no amenable normalish subgroup in $\mathcal W(\pi)$, where $\mathcal W(\pi):= \{\Lambda\leq \Gamma: \lambda_{\Gamma/\Lambda} \preceq\pi\}$. Since $\mathcal W(\lambda)$ consists of the set
of amenable subgroups of $\Gamma$, this is still more general than the earlier results on absence of amenable normalish subgroups. Note that, $\mathcal W(\lambda_{\Gamma/\Lambda})$ consists of subgroups
$H$ with $\lambda\leq \Sigma\leq \Gamma$ such that $\Lambda$ is coamenable in $\Sigma$ \cite[Proposition 2.3]{ks}. Also note that if $\mathcal W(\pi)$ admits a $\Gamma$-invariant probability, then
$C^*_\pi(\Gamma)$ admits a trace \cite[Remark 3.19]{ks}.
\end{remark}
The next result now follows from Lemma \ref{nish}.
\begin{corollary} \label{tf3}
If $\Gamma$ has no non-trivial finite normal subgroup, $\lambda\precsim\pi$, $\pi$ has Connes-Sullivan property $(CS)$ and ${\rm Rad}_\pi(\Gamma)$ is trivial, and $\Gamma_\omega$ is amenable for some pure state $\omega\in\mathcal P(\mathcal{B}_{\pi})$, then the action of $\Gamma$ on $\mathcal{B}_{\pi}$ is topologically free.
\end{corollary}
Next we turn into Power's averaging property. First we need a series of lemmas.
\begin{lemma} \label{char}
If $\Lambda\leq \Gamma$ is subgroup such that $\lambda_{\Gamma/\Lambda}\preceq\pi$, then the characteristic function $1_\Lambda$ extends to a state on $C^*_\pi(\Gamma)$. In particular, this holds when $\Lambda$ is amenable.
\end{lemma}
\begin{proof}
First note that there is a state
\end{proof}
\section{Concrete Examples} \label{ex}
Up to here we have worked with an abstract representation $\pi$. In this section we examine the results of previous sections for concrete instances of $\pi$.
\subsection{{\bf Representations coming from boundary actions}} The properties of representations associated to boundary actions are recently studied in \cite{ks}. An action of $\gamma$ on a compact Hausdorff space $X$ is strongly proximal if for every probability measure $\nu\in P(X)$ the weak$^*$-closure
of the orbit $\Gamma\nu$ contains some point measure $\delta_x$, $x\in X$. A {\it boundary action} is an action which is both minimal and strongly
proximal. A related notion is that of an {\it extreme boundary action}, which is characterized by the condition that given a closed subset
$C\neq X$ and open subset $U\neq \emptyset$, there is $t\in \Gamma$ such that $t\cdot C\subseteq U$. This condition is known to be stronger than being a boundary action
\cite[Theorem 2.3]{gl}.
For a $\Gamma$-space $X$ and $x\in X$, the stabilizer subgroup of $x$ is $$\Gamma_x := \{t\in\Gamma:
t\cdot x = x\}.$$ The open stabilizer at $x$ is the subgroup
$$\Gamma^0_x := \{t\in\Gamma: t \ {\rm fixes\ an\ open\ neighborhood\ of\ }x\}.$$ Then $\Gamma^0_x\unlhd\Gamma_x$, for $x\in X$. The open stabilizer
map Stab$^0$ from $X$ to the topological space Sub$(\Gamma)$ of subgroups of $\Gamma$, endowed with the Chabauty
topology (the restriction of the product topology on $\{0, 1\}^\Gamma$) is defined by $x\mapsto \Gamma^0_x$. We say that the action $\Gamma\curvearrowright X$
has {\it Hausdorff germs} if the open stabilizer
map Stab$^0$ is continuous on $X$ \cite[page 4]{ks} (c.f., \cite[Definition 2.9]{lb}). Similarly one could define the stabilizer
map Stab$:X\to$ Sub$(\Gamma)$; $x\mapsto \Gamma_x$. This map is continuous at points $x$ in which $\Gamma_x=\Gamma^0_x$ \cite[Lemma 2.2]{lb}.
An {\it action class} of $\Gamma$ is a collection $\mathfrak C$ of compact $\Gamma$-spaces. A representation $\pi\in$Rep$(\Gamma)$ is a $\mathfrak C$-representation, writing $\pi\in$Rep$_{\mathfrak{C}}(\Gamma)$, if there is a $\Gamma$-map: $C(X) \to B(H_\pi)$, for some $X\in\mathfrak{C}$. As a concrete example, if $X\in\mathfrak{C}$ and $\nu$ is a quasi-invariant $\sigma$-finite measure on $X$, then the Koopman representation $\kappa_\nu$ defined by $$\kappa_\nu(t)\xi(x):=
[\frac{dt\nu}{d\nu}]^{\frac{1}{2}}(x)\xi(t^{-1}\cdot x);\ \ t\in\Gamma, \xi\in L^2(X, \nu),$$ is a $\mathfrak{C}$-representation \cite[Example 3.3]{ks}. If
$\pi$ is in Rep$_{\mathfrak{C}}(\Gamma)$, then so is $\sigma$, for each $\sigma\preceq\pi$ \cite[Proposition 3.4]{ks}. For $\pi\in$Rep$_{\mathfrak{C}}(\Gamma)$,
$\mathfrak{C}^\pi$ is the collection of all $X\in \mathfrak{C}$ such that there is a $\Gamma$-map from $C(X)$
to $B(H_\pi)$.
A subgroup $\Lambda\leq \Gamma$ is a $\mathfrak C$-subgroup, writing $\Lambda\in$Sub$_{\mathfrak{C}}(\Gamma)$,
if $\lambda_{\Gamma/\Lambda}\in$Sub$_{\mathfrak{C}}(\Gamma)$. This holds iff $\Lambda$ fixes a probability on some $X\in \mathfrak{C}$ \cite[Proposition 3.10]{ks}. The subgroup class Sub$_{\mathfrak{C}}(\Gamma)$
is invariant under conjugation by an element $s\in G$, since representations $\lambda_{\Gamma/\Lambda}$ and $\lambda_{\Gamma/\Lambda^s}$ are clearly unitarily equivalent (cf., \cite[Remark 6.2]{bk}).
Alternatively one could say that a normal subgroup $\Lambda\unlhd \Gamma$, is called a $\mathfrak C$-subgroup, writing
if
$\pi^\Lambda\in$Sub$_{\mathfrak{C}}(\Gamma)$, where $\pi^\Lambda$ is the sub-representation of $\pi$ constructed in the beginning of Section \ref{s}. The next lemma shows that the two notions coincide for normal subgroups.
\begin{lemma} \label{eq}
Let $\mathfrak C$ be an action class. For a normal subgroup $\Lambda\unlhd \Gamma$, the following are equivalent:
$(i)$ $\lambda_{\Gamma/\Lambda}\in$Sub$_{\mathfrak{C}}(\Gamma)$,
$(ii)$ $\Lambda$ fixes a probability on some $X\in \mathfrak{C}$,
$(ii)$ $\pi^\Lambda\in$Sub$_{\mathfrak{C}}(\Gamma)$.
\end{lemma}
\begin{proof}
$(i)\Leftrightarrow (ii)$. This is proved in \cite[Proposition 3.10]{ks}.
$(iii)\Rightarrow (ii)$. Let $\psi: C(X)\to B(H_\pi^\Lambda)$ be a $\Gamma$-map for $X\in\mathfrak{C}$. Since $\Lambda$ acts trivially on $B(H_\pi^\Lambda)$, the composition of $\psi$ with any state on $B(H_\pi^\Lambda)$ would be a $\Lambda$-equivariant state on $C(X)$.
$(ii)\Rightarrow (iii)$. Let $\nu$ be a $\lambda$-invariant probability on $X\in \mathfrak{C}$, then we have the chain of $\Gamma$-maps
$$C(X)\to \ell^\infty(\Gamma/\Lambda)=\ell^\infty(\Gamma)^\Lambda\hookrightarrow\ell^\infty(\Gamma)\hookrightarrow B(\ell^2(\Gamma)),$$
where the first map is the Poisson map. Now since
$$\pi^\Lambda\preceq{\rm ind}_\Lambda^\Gamma(\pi^\Lambda|_\Lambda)={\rm ind}_\Lambda^\Gamma(1_\Lambda)=\lambda,$$
there is a $\Gamma$-map: $B(\ell^2(\Gamma))\to B(H_\pi^\Lambda)$, which is composed with the above chain of $\Gamma$-maps to give a $\Gamma$-map: $C(X)\to B(H_\pi^\Lambda)$. \qed
\end{proof}
In \cite{ks}, the authors specify three action classes, i.e., the action classes $\mathfrak{B}_0$ of all $\Gamma$-boundaries, and sub-classes $\mathfrak{B}_1$ and $\mathfrak{B}_2$ of respectively faithful and topologically free $\Gamma$-boundaries. The subgroup class Sub${}_{\mathfrak{B}_2}(\Gamma)$ coincides with the class of weakly parabolic subgroups in the sense of Bekka and Kalantar \cite[Definition 6.1]{bk}. The subgroup classes Sub${}_{\mathfrak{B}_1}(\Gamma)$ and Sub${}_{\mathfrak{B}_2}(\Gamma)$ are either empty or contain all amenable subgroups of $\Gamma$. Moreover, Sub${}_{\mathfrak{B}_1}(\Gamma)$ is non-empty iff $\Gamma$ has trivial amenable
radical, and Sub${}_{\mathfrak{B}_2}(\Gamma)$ is non-empty iff $\Gamma$ is C*-simple (see, \cite{kk}, \cite{bkko}). For subgroups $\Lambda_1\leq \Lambda_2$, with $\Lambda_1$ co-amenable
in (to) $\Lambda_2$ (relative to $\Gamma$; cf., \cite[7.C]{cm}), then $\Lambda_1\in$Sub${}_{\mathfrak{B}_k}(\Gamma)$ implies $\Lambda_2\in$Sub${}_{\mathfrak{B}_k}(\Gamma)$, for $k=1,2$ (because if $\Lambda_1$ fixes a probability on some $X\in \mathfrak{B}_k$, so does $\Lambda_2$). Finally, Sub${}_{\mathfrak{B}_1}(\Gamma)$ contains no non-trivial normal subgroup of $\Gamma$ \cite[Proposition 3.15]{ks} and Sub${}_{\mathfrak{B}_2}(\Gamma)$ contains no recurrent subgroup \cite[Corollary 6.8]{bk} (see also, \cite[Theorem 1.1]{ke}).
In Proposition \ref{rad3}, we observed that all extendable traces on $C^*_\pi(\Gamma)$ are supported on {\rm Rad}$_{\pi}(\Gamma)=\ker(\Gamma\curvearrowright \mathcal B_\pi)$. In general, all traces on $C^*_\pi(\Gamma)$ are supported on
$N_\pi:=\bigcap_{X\in \mathfrak{B}_0^\pi}\ker(\Gamma\curvearrowright X)$ \cite[Corollary 3.6]{ks}. It is natural to ask the relation between {\rm Rad}$_{\pi}(\Gamma)$ and $N_\pi$.
\begin{remark}
Since there is a {\rm Rad}$_{\pi}(\Gamma)$-invariant state on $B(H_\pi)$, there is such a state on $C(X)$, for $X\in \mathfrak{B}_0^\pi$. But {\rm Rad}$_{\pi}(\Gamma)\unlhd\Gamma$, and so by strong proximality, {\rm Rad}$_{\pi}(\Gamma)$ acts trivially on such $X$, that is, {\rm Rad}$_{\pi}(\Gamma)\subseteq N_\pi$ \cite[Remark 3.7]{ks}. Conversely, if $\mathcal B_\pi$ is commutative, the inverse Gelfand transform is a $\Gamma$-map: $C(\hat{\mathcal B}_\pi)\to \mathcal B_\pi$. Composing this with the incluson map: $\mathcal B_\pi\hookrightarrow B(H_\pi)$, we get a $\Gamma$-map: $C(\hat{\mathcal B}_\pi)\to B(H_\pi)$. But $\hat{\mathcal B}_\pi$ is a $\Gamma$-boundary by Proposition \ref{mp}, thus $\hat{\mathcal B}_\pi\in\mathfrak{B}_0^\pi$, therefore, in this case, {\rm Rad}$_{\pi}(\Gamma)=N_\pi$.
\end{remark}
The group $\Gamma$ acts (continuously) on Sub$(\Gamma)$
by conjugation. An {\it invariant random subgroup} (IRS) on $\Gamma$ is a $\Gamma$-invariant regular probability
measure on Sub$(\Gamma)$. It is known that $\Gamma$ has unique trace property iff $\Gamma$ has no non-trivial amenable IRS \cite[Corollary
1.5]{bdl}, \cite[Theorem 1.3]{bkko}). It is not however known if every IRS with support contained in Sub${}_{\mathfrak{B}_1}(\Gamma)$ is trivial. \cite[Question 3.16]{ks}. Recall that $\mathcal W(\pi) := \{\Lambda\leq\Gamma: \lambda_{\Gamma/\Lambda}\precsim\pi\}$. This is a
closed conjugation-invariant subset of Sub$(\Gamma)$ and a compact $\Gamma$-space. If $\mathcal W(\pi)$ admits a $\Gamma$-invariant probability, then
$C^*_\pi(\Gamma)$ admits a trace (cf., the proof of \cite[Theorem 3.17]{ks}). The converse is not true: for any unital C*-algebra
$A$ admitting a trace, a group $\Gamma$ of unitaries generating $A$ and
containing $-1_A$ gives a unitary representation which admits trace not come from an IRS \cite[Remark 3.19]{ks}. The set $\mathcal W(\lambda)$ consists of all amenable subgroups of $\Gamma$. In general, $\mathcal W(\lambda_{\Gamma/\Lambda})$ contains all subgroups
containing $\Lambda$ co-amenably \cite[Proposition 2.3]{ks}. It is known that any IRS supported on $\mathcal W(\pi)$ is supported on $N_\pi$. In particular, if $\Lambda\in$Sub${}_{\mathfrak{B}_1}(\Gamma)$, any IRS supported on $\mathcal W(\lambda_{\Gamma/\Lambda})$ is trivial.
In Corollary \ref{rad4}, we observed that if $\Gamma$ acts faithfully on $\mathcal{B}_{\pi}$, then $C^*_\pi(\Gamma)$ has either has no extendable trace or has a unique one. If we specify the action class of $\pi$, stronger results are possible \cite[Corollaries 3.8, 3.12]{ks}.
\begin{example}\label{ex1}
$(i)$ If $\pi\in$Rep$_{\mathfrak{B_1}}(\Gamma)$, then either $C^*_\pi(\Gamma)$ admits no trace, or
otherwise $\lambda\precsim\pi$ and the canonical trace is the unique trace
on $C^*_\pi(\Gamma)$.
$(ii)$ If $\pi\in$Rep$_{\mathfrak{B_2}}(\Gamma)$, then the canonical trace is the unique boundary map on $C^*_\pi(\Gamma)$, $\lambda\precsim\pi$, and $C^*_\pi(\Gamma)$ has a maximal proper ideal.
$(iii)$ Let $\Lambda\leq \Gamma$ be a subgroup for which $C^*_{\lambda_{\Gamma/\Lambda}}(\Gamma)$ is nuclear.
Then $C^*_{\lambda_{\Gamma/\Lambda}}(\Gamma)$ admits a trace iff $1_\Gamma\precsim\lambda_{\Gamma/\Lambda}.$ Indeed, if $X$ is a compact $\Gamma$-space and $\pi\in$Rep$_{\{X\}}(\Gamma)$ is such that $C^*_\pi(\Gamma)$ is
nuclear and admits a trace, then $X$ admits a $\Gamma$-invariant probability \cite[Proposition 3.11]{ks}. Now the above assertion follows from the special case $X=\beta({\Gamma/\Lambda})$.
$(iv)$ If $X$ is a $\Gamma$-boundary and $N:=\ker(\Gamma \curvearrowright X)$, then $C^*_\pi(\Gamma)$ admits a trace iff the induced action $\Gamma/N\curvearrowright X$ is topologically free, iff $\lambda_{\Gamma/N} \precsim\pi$. In this case, $1_N$ extends to the unique trace on
$C^*_\pi(\Gamma)$. Indeed, if $\tau$ is a trace on $C^*_\pi(\Gamma)$, then $x\mapsto \tau(a)1_{\partial_F \Gamma}$
is a boundary map on $C^*_\pi(\Gamma)$, which is then has to be unique. Thus $\Gamma/N\curvearrowright X$ has to be topologically free (see, \cite[Theorem 4.8]{ks}). Conversely, if $\Gamma/N$ acts topologically free on $X$, then
the restriction of boundary map on
$C^*_\pi(\Gamma)$ to $\pi(\Gamma)$ is $1_N\cdot 1_{\partial_F \Gamma}$. Composing this boundary map with a point mass at $z\in \partial_F \Gamma$,
we get a state on $C^*_\pi(\Gamma)$ whose restriction to to $\pi(\Gamma)$ is $1_N$. But $\delta_N\in \ell^2(\Gamma/N)$ is a
cyclic vector for $\lambda_{\Gamma/N}$, thus $\lambda_{\Gamma/N} \precsim\pi$.
\end{example}
As observed in part $(ii)$ of the above example, that uniqueness of the boundary maps is related to uniqueness of trace and C*-simplicity. Recall that for a $\Gamma$-C*-algebra $A$, a boundary map on $A$ is a $\Gamma$-map: $A \to C(\partial_F \Gamma)$.
To see the way these notions are related, suppose that $\Gamma$ is C*-simple and $x\in \partial_F \Gamma$. Then by $\Gamma$-injectivity, $\Gamma_x$ is
amenable, $C^*_{\lambda_{\Gamma/\Gamma_x}}(\Gamma)=C^*_{\lambda}(\Gamma)$, and the unique boundary map on $C^*_{\lambda_{\Gamma/\Gamma_x}}(\Gamma)$ coincides with the canonical trace on $C^*_{\lambda}(\Gamma)$. In particular, the fixed point set $(\partial_F \Gamma)^s$ has empty interior, for $s\neq e$, i.e., $\partial_F \Gamma$ is a topologically free $\Gamma$-boundary. Conversely, if $\Gamma$ admits a topologically free boundary, then by part $(i)$ of the above example, the canonical trace is the unique boundary map on $C^*_{\lambda}(\Gamma)$, which is also
faithful. Hence $C^*_{\lambda}(\Gamma)$ is simple by \cite[Proposition 3.1]{ks} (see, \cite[Corollary 4.5]{ks}, \cite[Theorem 6.2]{kk}). A similar argument shows that $\Gamma$ is C*-simple iff the canonical
trace is the unique boundary map on $C^*_{\lambda}(\Gamma)$ (see, \cite[Corollary 4.6]{ks}, \cite[Theorem 3.4]{ke}).
The above argument extends to arbitrary topologically free $\Gamma$-boundaries: If $\Gamma$ is C*-simple and $X$ is
a $\Gamma$-boundary with some amenable point stabilizer $\Gamma_x$, then
$X$ is topologically free.
Indeed, since $\lambda_{\Gamma/\Gamma_x}$ is unitarily equivalent to $\lambda$, the canonical trace
is the unique boundary map map on $C^*_{\lambda_{\Gamma/\Gamma_x}}(\Gamma)$, and so the fixed point set $X^s:=\{x\in X: s\cdot x=x\}$ has empty interior, for $s\neq e$ \cite[Corollary 4.7]{ks}, \cite[Proposition 1.9]{bkko}).
\subsection{{\bf Groupoid representations}}
Let $X$ be a compact $\Gamma$-space. A {\it groupoid representation} of $(\Gamma, X)$
is a nondegenerate covariant representation $(\pi, \rho)$ of $(\Gamma, C(X))$ such that $\pi_s\rho(f) = \rho(f)$, for $s\in \Gamma, f\in C(X)$, with ${\rm supp}(f)\subseteq X^s$ (or equivalently, with ${\rm supp}(f)$ contained in the interior of $X^s$).
An example of a groupoid representation is the covariant pair $(\kappa_\nu, \rho)$, where $\nu$ is a $\sigma$-finite quasi-invariant measure on $X$, $\kappa_\nu$ is
the Koopman representation of $\Gamma$ on $L^2(X, \nu)$, and $\rho$ is the multiplication representation of $C(X)$ in $L^2(X, \nu)$.
Another example is the covariant pair $(\lambda_{\Gamma/\Lambda}, P_x)$, where $x\in X$ satisfies $\Gamma_x^0\leq \Lambda\leq \Gamma_x$ and $P_x : C(X) \to B(\ell^2(\Gamma/\Lambda))$ is the Poisson map \cite[Proposition 4.3]{ks}.
When $X$ is a $\Gamma$-boundary with a groupoid representation $(\pi, \rho)$ of
$(\Gamma, X)$, there exists a $\Gamma$-map$: C^*_\pi(\Gamma)\to C(X)$ iff the action $\Gamma\curvearrowright X$
has Hausdorff germs \cite[Proposition 4.14]{ks}. Indeed, if the action $\Gamma\curvearrowright X$
has Hausdorff germs the interior $(X^s)^{o}$ is clopen, and the map $\pi(s)\mapsto 1_{(X^s)^{o}}$ maps $\pi(\Gamma)$ inside a copy of $C(X)$ in $C(\partial_F \Gamma)$, which extends to a $\Gamma$-map on $C^*_\pi(\Gamma)$.
If $(\pi, \rho)$ is a groupoid representation of $(\Gamma, X)$ with integrated representation $\rho\rtimes\pi$ of the maximal crossed product $C(X)\rtimes\Gamma$, then there is a unique boundary map on the C*-algebra $C(X)\rtimes_{\rho\rtimes\pi}\Gamma$ generated by the range of $\rho\rtimes\pi$, whose restriction to $C^*_\pi(\Gamma)$ is the
unique boundary map on $C^*_\pi(\Gamma)$. Indeed, by $\Gamma$-injectivity of $C(\partial_F \Gamma)$, there exists a boundary map: $C(X)\rtimes_{\rho\rtimes\pi}\Gamma\to C(\partial_F \Gamma)$. Since any boundary map on $C^*_\pi(\Gamma)$ extends to a boundary map
on $C(X)\rtimes_{\rho\rtimes\pi}\Gamma$, uniqueness of the above map implies uniqueness of its restriction on $C^*_\pi(\Gamma)$ (cf., \cite[Theorem 4.4]{ks}). When this boundary map on $C(X)\rtimes_{\rho\rtimes\pi}\Gamma$ is also faithful, then so is its restriction on $C^*_\pi(\Gamma)$. Now since every ideal of the latter is included in the left kernel of a boundary map \cite[Proposition 3.1]{ks}, $C^*_\pi(\Gamma)$ would be simple in this case. A similar argument based on left kernels shows that the unique boundary map on $C(X)\rtimes_{\rho\rtimes\pi}\Gamma$ is faithful exactly when $C(X)\rtimes_{\rho\rtimes\pi}\Gamma$ is simple.
\begin{example}\label{ex2}
$(i)$ If $X$ is a faithful $\Gamma$-boundary and $(\pi, \rho)$ is a groupoid representation
of $(\Gamma, X)$, then it follows from Example \ref{ex1}$(iv)$ that $C^*_\pi(\Gamma)$ admits a trace if and only if $X$ is topologically free. In this case, $\lambda\precsim\pi$ and the canonical trace is the unique trace
on $C^*_\pi(\Gamma)$ (cf., \cite[Corollary 4.9]{ks}).
$(ii)$ As a particular case of $(i)$, if $X$ is a $\Gamma$-boundary, $X$ is topologically free iff $\lambda\precsim \kappa_\nu$, for the Koopman representation $\kappa_\nu$ of some quasi-invariant measure $\nu$ on $X$ (see, \cite [Corollary 4.10]{ks}, \cite[Theorem 31]{r}).
$(iii)$ If $X$ is a faithful $\Gamma$-boundary, $N:=\ker(\Gamma \curvearrowright X)$, and $(\pi, \rho)$ is a groupoid representation
of $(\Gamma, X)$, then either $C^*_\pi(\Gamma)$
has no trace or it has a unique trace and a maximal (indeed maximum) closed ideal $I=I_{\rm max}$ such that $C^*_\pi(\Gamma)/I\simeq C^*_{\lambda_{\Gamma/N}}$ is simple. indeed, if $C^*_\pi(\Gamma)$ admits a trace, then the trace has to be unique by Example \ref{ex1}$(iv)$. By the same argument as in
Example \ref{ex1}$(iv)$, one could observe that if $\sigma\in$Rep$(\Gamma)$ and $\sigma\precsim\pi$, then $\lambda_{\Gamma/N}\precsim\sigma$. This shows the existence of the maximal closed ideal $I_{\rm max}$. Finally, since
$\Gamma/N$ acts topologically
free on $X$, boundary action, hence $C^*_{\lambda_{\Gamma/N}}$ is simple by the argument in the second paragraph after Example \ref{ex1} (cf., \cite[Theorem 6.2]{kk}).
$(iv)$ In general, existence of a unique boundary map does not imply simplicity \cite[Remark 4.12]{ks}: For $\Gamma:= PSL_n(\mathbb Z)$, $n\geq 3$, the projective space $\mathbb P(\mathbb R^n)=:X$ is a topologically free $\Gamma$-boundary
and there is $x\in X$ with $\Gamma_x$ non-amenable. Thus by part $(i)$, the unique boundary map on $C^*_{\lambda_{\Gamma/\Gamma_x}}$ is the canonical trace, but
$C^*_{\lambda_{\Gamma/\Gamma_x}}$ could not be simple, since otherwise then we would have that $\lambda_{\Gamma/\Gamma_x}$ would be unitarily equivalent to $\lambda$, which contradicts the non-amenability of $\Gamma_x$.
$(v)$ For a compact $\Gamma$-space $X$, following Le Boudec
and Matte Bon \cite{lb}, we denote the set of continuity points of the stabilizer map Stab$: X\to$ Sub$(\Gamma)$ by $X_0$. We have $X_0 = \{x \in X : \Gamma_x = \Gamma_x^0\}$ \cite[Lemma 2.2]{lb}. Similarly, the set of continuity points of the open stabilizer map Stab$^0: X\to$ Sub$(\Gamma)$ is denoted by $X_0^0$. Clearly, $X_0\subseteq X_0^0$.
When $X$ is a $\Gamma$-boundary with a groupoid representation $(\pi, \rho)$ of
$(\Gamma, X)$, for each $x\in X_0^0$, $\lambda_{\Gamma/\Gamma_x^0}\precsim\pi$. Indeed, the composition of a boundary map on $C^*_\pi(\Gamma)$ with point mass at a point $y\in \partial_F \Gamma$ is a state which restricts to $1_{\Gamma_x^0}$ on $\Gamma$. Now the claim follows as
$\delta_{\Gamma_x^0}\in \ell^2(\Gamma/\Gamma_x)$
is a cyclic vector for $C^*_{\lambda_{\Gamma/\Gamma_x^0}}(\Gamma)$. The same argument works for $\pi$ replaced by any $\sigma\precsim\pi$ \cite[Theorem 5.2]{ks}. In particular, $C^*_{\lambda_{\Gamma/\Gamma_x^0}}(\Gamma)$ is simple for $x\in X_0^0$. The simplicity of $C^*_{\lambda_{\Gamma/\Gamma_x}}(\Gamma)$ for $x\in\partial_F\Gamma$, observed by Kawabe \cite[Corollary 8.5]{ka}, is a special case of the above observation, since $\Gamma_x=\Gamma_x^0$ for $x\in\partial_F\Gamma$ \cite[Lemma 3.4]{bkko}.
$(v)$ For a compact $\Gamma$-space $X$ and $x\in X$, if $C^*_{\lambda_{\Gamma/\Gamma_x}}(\Gamma)$ is simple then $\lambda_{\Gamma/\Gamma_x}\precsim\lambda_{\Gamma/\Gamma_x^0}$ by \cite[Lemma 5.5]{ks}, that is, $\Gamma/\Gamma_x^0$ is coamenable in $\Gamma/\Gamma_x$. In particular, $\Gamma/\Gamma_x^0$ is amenable. The same argument done backwards shows that if $\Gamma/\Gamma_x^0$ is amenable then $C^*_{\lambda_{\Gamma/\Gamma_x}}(\Gamma)$ is simple.
$(vi)$ An argument similar to that used in part $(iv)$ shows that for a compact $\Gamma$-boundary $X$ with a groupoid representation $(\pi, \rho)$, $P_x\rtimes\lambda_{\Gamma/\Lambda} \precsim\rho\rtimes\pi$, when $x\in X_0^0$. In this case, $C(X)\rtimes_{P_x\rtimes\lambda_{\Gamma/\Lambda}}\Gamma$ is simple, where $P_x : C(X) \to B(\ell^2(\Gamma/\Lambda))$ is the Poisson map (cf., \cite[Corollary 5.11]{ks}).
$(vii)$ The Thompson’s group $V$ is the set of piecewise linear bijections on the interval [0, 1) which are right continuous, have finitely many points of non-differentiability, all
being dyadic rationals, and have a derivative which is a power of 2 at each point of
differentiability. The Thompson’s group $T$ consists of those elements of $V$ which have at
most one point of discontinuity, and Thompson’s group $F$ consists of those elements
of $V$ which are homeomorphisms of [0, 1), or equivalently, those elements of $T$ which vanish at 0. Haagerup and Olesen proved that if $T$ is C*-simple, then $F$ has to be non-amenable \cite{ho}. The converse is now known to be true \cite{lb}. Let $Y$ be the set obtained from reals $\mathbb R$ by replacing each $y\in \mathbb Z[1/2]$ by two elements $y_{-}, y_{+},$ endowed with the order topology. Then $K := Y \cap [0_{+}, 1_{-}]$
is a Cantor set and $V$ on $K$ by
$$g\cdot s := g(s),\ g\cdot y_{+}:= g(y)_{+}, \ g\cdot y_{-} := g_{-}(y_{-})_{-},$$
for $g\in V, s\in (0, 1) \backslash \mathbb Z[1/2]$, and $y\in \mathbb Z[1/2]$, where $g_{-}(y_{-})$ is the left limit of $g$ at $y_{-}$. Now for $\Gamma:=T$, $X=K$, and $x=0_{+}$, we have $\Gamma_x=F$, and $X$ is a faithful topologically non-free $\Gamma$-boundary, and so Example \ref{ex1}$(iv)$, $C^*_{\lambda_{T/F}}(T)$
does not admit traces. Also $\Gamma_x^0= \{g\in F: g'(0) = 1\}$ and $F/T^0_{0_{+}}\to \mathbb Z$ maps $g$ with $g'(0) = 2^a$ to $a$, and so is an isomorphism. Also, the interior of $g\cdot K$ is clopen by \cite[Proposition 6.1]{ks}. Therefore,
$C^*_{\lambda_{T/F}}(T)$ is simple by part $(v)$ (cf., \cite[Theorem 6.2]{ks}). Similarly, one can observe that for the $V$-invariant set $X := [0, 1) \cap \mathbb Z[1/2]$ and the corrsponding unitary representation $\pi$ of $V$ on $\ell^2(X)$, $C^*_\pi(\Gamma)$ is simple and admits no traces. Finally, identifying $\mathbb S^1$ with [0, 1), we get a boundary action of $T$ such that
the open stabilizer of 0 is the commutator subgroup $[F,F]=:F_2$ \cite[Theorem 4.1]{cfp}. Since $F_2$ is coamenable in $F$, $\lambda_{T/F}\precsim\lambda_{T/F_2}$, but one can show that these two representations are not unitarily equivalent \cite[Example 6.5]{ks}, therefore, $C^*_{\lambda_{T/F_2}}(T)$ is not simple.
\end{example}
More general results along the line of Example \ref{ex2}$(iv)$ could be obtained. Let $X$ be a compact $\Gamma$-space. Let $\partial(\Gamma, X)$ be the spectrum of the $\Gamma$-injective envelope $I_{\Gamma}(C(X))$, and $b_X : \partial(\Gamma, X)\to X$ be the
canonical continuous equivariant map induced by the embedding of $C(X)$ in its $\Gamma$-injective envelope. When $X$ is a singleton, $\partial(\Gamma, X)=\partial_F\Gamma$ is the
Furstenberg boundary of $\Gamma$ \cite[Theorem 3.11]{kk}. When the action $\Gamma \curvearrowright X$ is minimal, there is a unique equivariant conditional expectation: $C(X)\rtimes \Gamma\to C(X)$ restricting to the canonical trace on $C^*_r(\Gamma)$ iff the action $\Gamma \curvearrowright \partial(\Gamma, X)$ is faithful iff no stabilizer $\Gamma_x$ contain a non-trivial amenable normal subgroup iff some open stabilizer $\Gamma_x^0$ contains no non-trivial amenable normal subgroup \cite[Theorem 4.6]{ks2}.
\begin{example}\label{ex3}
$(i)$ If $X$ is a minimal compact $\Gamma$-space and $\Gamma x^0$ is amenable for
some $x\in X$, then the action $\Gamma \curvearrowright \partial(\Gamma, X)$ is faithful iff $\Gamma \curvearrowright X$ is faithful. Indeed, if $\Gamma \curvearrowright X$ is not faithful its kernel is a non-trivial amenable normal subgroup of $\Gamma$, thus the action $\Gamma \curvearrowright \partial(\Gamma, X)$ is not faithful by the above result. The converse implication is immediate.
$(ii)$ If $X$ is a minimal locally compact $\Gamma$-space, $x\in X$ and
$y\in b_X^{-1}(x)$, then $$ \Lambda:= \{s \in\Gamma: y \ {\rm is \ in \ the \ closure \ of \ } b_X^{-1}\big((X^s)^{o}\big)\}$$ is a subgroup with $\Gamma_x^0\leq\Lambda\leq\Gamma_x$ and every groupoid representation is weakly contained in
$(\lambda_{\Gamma/\Lambda}, P_x)$, and so . In particular, $C_0(X)\rtimes_{P_x\lambda_{\Gamma/\Lambda}}\Gamma$ is simple. In particular, $C_0(X)\rtimes_{P_x\rtimes\lambda_{\Gamma/\Gamma_x^0}}\Gamma$ is simple for $x\in X_0^0$ (cf., \cite[Proposition 5.1]{ks2}). This extends Example \ref{ex2}$(vi)$.
\end{example}
\section{Non commutative boundaries} \label{ncbdry}
In this section we extends the results of previous section for the $\Gamma$-boundary $X$ replaced by a (unital) $C^*$-algebra $A$ with a $\Gamma$-action.
A (unital) $C^*$-algebra $A$ is called a $\Gamma$-$C^*$-{\it algebra} if there is an action $\Gamma \curvearrowright A$ by $*$-automorphisms. We call a linear
map $\phi: A \to B$ between $\Gamma$-$C^*$-algebras is a $\Gamma$-{\it map} if it is unital completely positive
(u.c.p.), and $\Gamma$-equivariant.
A $\Gamma$-$C^*$-algebra $A$ is called $\Gamma$-{\it injective} if, given a completely isometric $\Gamma$-map
$\psi : B \to C$ and a $\Gamma$-map $\phi: B \to A$, there is a $\Gamma$-map $\rho: C \to A$ with $\rho\circ\psi=\phi$.
A linear map $\psi : A \to B$ between $C^*$-algebras is {\it faithful} if $\psi(a^*a) = 0$ implies $a = 0$, for $a\in A$.
Recall from the previous section that a $\Gamma$-$C^*$-algebra $A$ is {\it proximal} if the corresponding action on the state space $\mathcal S(A)$ is proximal, i.e., given states $\omega_1,\omega_2\in\mathcal S(A)$, there is a net $(t_i)$ in $\Gamma$ with $\lim_i t_i\omega_1= \lim_i t_i\omega_2$, and it is {\it minimal} if for each pure state $\omega\in \mathcal P(A)$, the orbit $\{s\omega: s\in\Gamma\}$ is dense in $\mathcal P(A)$.
When $\Gamma$ acts on a convex subset $K$ of a complex vector space by affine transformations, we say that $K$ is a {\it affine $\Gamma$-space}. When $K$ contains no proper affine $\Gamma$-subspace, it is called minimal. This notion of minimality is equivalent to the above notion defined by point masses \cite{gl2}. In particular, a $\Gamma$-$C^*$-algebra $A$ is minimal iff its pure state space $\mathcal P(A)$ has no proper affine $\Gamma$-subspace.
An affine $\Gamma$-space $K$ is said to be
{\it irreducible} if it contains no proper closed convex $\Gamma$-invariant set.
\begin{definition} \label{bd1}
A $\Gamma$-$C^*$-algebra $A$ is called a (non commutative) $\Gamma$-boundary if its minimal and proximal.
\end{definition}
Note that for a compact $\Gamma$-space $X$, proximality of $C(X)$ in the above sense means that $\Gamma$ acts proximal on the space $P(X)$ of probability measures on $X$, which is called strong proximality (for $X$) in the classical dynamics.
\begin{definition} \label{bd2}
Let $\pi\in{\rm Rep}(G)$. A $\Gamma$-$C^*$-algebra $A$ is called a $\pi$-boundary if it there is a $\Gamma$-embedding $\phi: A\to \mathcal{B}_{\pi}$.
\end{definition}
If $A$ is a $\pi$-boundary, each $\Gamma$-map $\phi: A\to \mathcal{B}_{\pi}$, induces a surjection $\phi_{*}: \mathcal S(\mathcal{B}_{\pi})\to \mathcal S(A)$ (since $\phi$ is u.c.p.). We say that $A$ is a {\it regular} $\pi$-boundary if $\phi_{*}$ maps pure states to pure states, for each each $\Gamma$-map $\phi$. A particular case where this holds for a map $\phi$ is when $A$ is a hereditary $C^*$-subalgebra of $\mathcal{B}_{\pi}$ (under Choi-Effros product) and $\phi: A\hookrightarrow \mathcal{B}_{\pi}$ is the inclusion map (in this case, since each state on $A$ has a {\it unique} extension to a state on $\mathcal{B}_{\pi}$ \cite[Theorem 3.3.9]{di}, the restriction map $\phi_{*}$ sends pure states to pure states). Also by $\pi$-rigidity, $\mathcal{B}_{\pi}$ itself is a regular $\pi$-boundary. A $\pi$-boundary $A$ is called {\it embeddable} if there is a $\Gamma$-equivariant
injective $*$-homomorphism: $A\to \mathcal{B}_\pi$ (compare to Remark \ref{homo}). In this case, $A$ could be regarded as a $C^*$-subalgebra of $\mathcal{B}_{\pi}$ (this does not imply that $A$ is regular, since this copy is not necessarily a hereditary $C^*$-subalgebra).
By Proposition \ref{mp}, the Furstenberg-Hamana boundary $\mathcal{B}_{\pi}$ is also $\Gamma$-boundary. The next lemma relates two notions of boundary.
\begin{lemma} \label{bd} For the left regular representation $\lambda$:
$(i)$ The class of regular $\lambda$-boundaries is the same as the class of $\Gamma$-boundaries.
$(ii)$ Commutative $\Gamma$-boundaries are exactly $C^*$-algebras of the form $C(X)$, with $X$ a $\Gamma$-boundary in the classical sense. These boundaries are automatically regular and embeddable.
\end{lemma}
\begin{proof}
$(i)$ We know that $\mathcal{B}_{\lambda}=C(\partial_F\Gamma)$, where $\partial_F\Gamma$ is the Furstenberg boundary of $\Gamma$ \cite[Example 3.7]{bek}. If $A$ is a regular $\lambda$-boundary with $\Gamma$-embedding $\phi: A\to C(\partial_F\Gamma)$, then the induced $\Gamma$-surjection $\phi_{*}: P(\partial_F\Gamma)\to \mathcal S(A)$ sends $\partial_F\Gamma$ to $\mathcal P(A)$, that is, $\mathcal P(A)$ is a factor of $\partial_F\Gamma$, and so is minimal and proximal. Thus $A$ is a $\Gamma$-boundary in the sense of Definition \ref{bd1}.
Conversely if $A$ is a $\Gamma$-boundary, then by universality of the Furstenberg boundary (cf., \cite[Proposition 2.4]{gl2}), there is a $\Gamma$-surjection $\theta: X:=\partial_F\Gamma\to Y:=\mathcal P(A)$. The induced map $\theta^*: C(Y)\to C(X); f\mapsto f\circ \theta$ is a $\Gamma$-map. On the hand, the Gelfand map $A\to C(Y); a\mapsto \hat a$ is linear, positive, and unital, and so u.c.p., since positive maps into commutative $C^*$-algebras are automatically c.p. (see for instance, \cite[Theorem 3.9]{p}). This map is also $\Gamma$-equivariant,
\begin{align*}\langle (s\cdot a)\hat{}, \omega\rangle &=\langle \omega,s\cdot a\rangle=\langle s^{-1}\omega,a\rangle
=\langle \hat a, s^{-1}\omega\rangle
=\langle s\cdot \hat a, \omega\rangle,
\end{align*}
and so a $\Gamma$-map. Composing these two maps, we get a $\Gamma$-map: $A\to C(X)=\mathcal{B}_{\lambda}$, which means that $A$ is a $\lambda$-boundary. Finally the induced map: $\mathcal S(\mathcal{B}_{\pi})\to \mathcal S(A)$ clearly sends $X=\partial_F\Gamma$ to $Y=\mathcal P(A)$, i.e., $A$ is also regular.
$(ii)$ The first assertion follows from $(i)$ and the fact that a compact $\Gamma$-space $X$ is strongly proximal iff the weak$^{*}$-compact $\Gamma$-space $P(X)$ of probability measures on $X$ is proximal. Since $\Gamma$-embeddings in this case are: $C(X)\hookrightarrow C(\partial_F\Gamma); f\mapsto f\circ \theta,$ for a $\Gamma$-surjection $\theta: \partial_F\Gamma\to X$, embeddability is automatic. Finally, reqularity follows from \cite[Proposition 4.2]{f2}.\qed
\end{proof}
\begin{lemma} \label{unique}
If $A$ is a regular $\pi$-boundary, then there is a unique $\Gamma$-map: $A\to \mathcal B_\pi$.
\end{lemma}
\begin{proof}
If $A$ is a regular $\Gamma$-boundary, given two $\Gamma$-maps $b_i: A\to \mathcal B_\pi$, $i=1,2$, by regularity, we get $\Gamma$-maps $b_{i*}: \mathcal P(\mathcal B_\pi)\to \mathcal P(A)$. By convexity of pure state space, $\gamma:=\frac{1}{2}(b_{1*}+b_{2*})$ is also a $\Gamma$-map into $\mathcal P(A)$. By the fact that pure states are extreme points in the state space for unital C*-algebras \cite[Proposition 2.5.5]{di}, we get $b_{1*}=b_{2*}$, that is, $\omega\circ b_{1}=\omega\circ b_{2}$, for each $\omega\in P(\mathcal B_\pi)$, thus $b_1=b_2$, as pure states separate the points in the unital C*-algebra $\mathcal B_\pi$. .\qed
\end{proof}
The next lemma extends \cite[Proposition 3.1]{ke} (compare also to Lemma \ref{1to1}).
\begin{lemma} \label{1-1}
There is a one-one correspondence between $\Gamma$-maps: $C^*_\pi(\Gamma)\to \mathcal{B}_{\pi}$ and $\pi$-boundaries $A$ which are isomorphic (as a $\Gamma$-$C^*$-algebra) to a quotient of $C^*_\pi(\Gamma)$. In this correspondence, regular $\pi$-boundaries correspond to regular $\Gamma$-maps.
\end{lemma}
\begin{proof}
For each $\Gamma$-map $\phi: C^*_\pi(\Gamma)\to \mathcal{B}_{\pi}$, we claim that $A:=\phi(C^*_\pi(\Gamma))$ is a $\pi$-boundary. We endow $A$ with the Choi-Effros product coming from the surjective u.c.p. map $\phi: C^*_\pi(\Gamma)\to A$. Then $A$ is a unital $\Gamma$-$C^*$-algebra and $\phi$ is a surjective $*$-homomorphism. Since $\phi$ is a $\Gamma$-map, the inclusion $\iota: A\hookrightarrow \mathcal{B}_{\pi}$ is a $\Gamma$-embedding. Also, $\iota$ is regular iff $\phi$ is so.
Conversely, if $A$ is a $\pi$-boundary with $\Gamma$-embedding $\phi: A\to \mathcal{B}_{\pi}$, and $q: C^*_\pi(\Gamma)\to A$ is a quotient map (and a $\Gamma$-map), then $\phi\circ q: C^*_\pi(\Gamma)\to \mathcal{B}_{\pi}$ is a $\Gamma$-map. If $\phi$ is regular, so is $\phi\circ q$, since the induced map $q_{*}: \mathcal S(A)\to \mathcal S(C^*_\pi(\Gamma))$ sends pure states to pure states. \qed
\end{proof}
If $\pi\in{\rm Rep}(\Gamma)$, then for each (unital) $C^*$-subalgebra $A$ of $B(H_\pi)$, $\Gamma$ acts on $A$ by Ad$_\pi$. From now on, whenever $A\subseteq B(H_\pi)$, we regard $A$ as a $\Gamma$-$C^*$-algebra under Ad$_\pi$-action.
\begin{remark} \label{homo}
$(i)$ In \cite[Proposition 3.1]{ke}, Kennedy showed that there is a one-one correspondence between classical $\Gamma$-boundaries in the state space
$\mathcal S(C^*_\lambda(\Gamma))$ taking a classical $\Gamma$-boundary $X\subseteq \mathcal S(C^*_\lambda(\Gamma))$
to the boundary map $b_\lambda : C^*_\lambda(\Gamma) \to C(\partial_F\Gamma)$, given by $b_\lambda(a)(x) :=\langle b_X(x), a\rangle$, for $a\in C^*_\lambda(\Gamma)$
and $x\in \partial_F\Gamma$, where $b_X: \partial_F\Gamma\to X$ is the canonical $\Gamma$-surjection.
In our (more general) setting, the classical $\Gamma$-boundary $X\subseteq \mathcal S(C^*_\lambda(\Gamma))$ is replaced by a regular $\pi$-boundaries $A$ which is a quotient of $C^*_\pi(\Gamma)$, which is sent under correspondence to the boundary map $b_\pi : C^*_\pi(\Gamma) \to \mathcal{B}_{\pi}$, given by $b_\pi=\phi\circ q$, where $\phi: A\to \mathcal{B}_{\pi}$ is a $\Gamma$-embedding and $q: C^*_\pi(\Gamma)\to A$ is a quotient map.
$(ii)$ By \cite[Remark 6.3]{kk}, if there is a $\Gamma$-map: $A\to \mathcal{B}_{\pi}$, then there is a $\Gamma$-equivariant
injective $*$-homomorphism: $A\to \mathcal{B}_{\pi}^{**}$.
$(iii)$ Since $\Gamma$ acts on $C^*_\pi(\Gamma)$ by Ad$_\pi$, any ideal $I\unlhd C^*_\pi(\Gamma)$ is automatically $\Gamma$-invariant, thus the quotient is a $\Gamma$-$C^*$-algebra. However, there is not necessarily a $\Gamma$-map from $C^*_\pi(\Gamma)/I$ to $B(H_\pi)$, thus only {\it some} quotients of $C^*_\pi(\Gamma)$ could be isomorphic to $\pi$-boundaries, as in Lemma \ref{1-1}. This pathology does not happen for $\lambda$, since $C(\partial_F G)=I_\Gamma(\mathbb C)$, and so any $\Gamma$-operator system has a $\Gamma$-map into $C(\partial_F G)$ by $\Gamma$-injectivity. For $\pi$ however, $\mathcal{B}_{\pi}$ is relative $\Gamma$-injective envelop of $\mathbb C$ inside $B(H_\pi)$, and so only $\Gamma$-operator systems inside $B(H_\pi)$ have a $\Gamma$-map into $\mathcal{B}_{\pi}$ (by $\pi$-injectivity).
\end{remark}
Given a unital $\Gamma$-$C^*$-algebra $A$, the state space $\mathcal S(A)$ is compact in the weak$^{*}$-topology. For $\omega\in \mathcal S(A)$, the stabilizer and open stabilizer subgroups of $\omega$ are $$\Gamma_\omega := \{t\in\Gamma:
t\omega = \omega\}, \ \ \Gamma^0_\omega := \{t\in\Gamma: t \ {\rm fixes\ an\ open\ neighborhood\ of\ }\omega\},$$ with $\Gamma^0_\omega\unlhd\Gamma_\omega$. The stabilizer and open stabilizer
maps are defined by
$${\rm Stab}:\mathcal S(A)\to {\rm Sub}(\Gamma);\ \omega\mapsto \Gamma^0_\omega, \ \ \ {\rm Stab}^0: \mathcal S(A)\to {\rm Sub}(\Gamma); \ \omega\mapsto \Gamma^0_\omega,$$ where ${\rm Sub}(\Gamma)$ is endowed with the Chabauty
topology (the restriction of the product topology on $\{0, 1\}^\Gamma$). We say that the action $\Gamma\curvearrowright A$
has {\it Hausdorff germs} if the open stabilizer
map Stab$^0$ is continuous on the pure state space $\mathcal P(A)$. The stabilizer map is continuous at a state $\omega$ if $\Gamma_\omega=\Gamma^0_\omega$ \cite[Lemma 2.2]{lb}.
Remark \ref{homo}$(iii)$ motivates the following terminology: an ideal $I\unlhd C^*_\pi(\Gamma)$ is called a {\it $\pi$-ideal} if there is a $\Gamma$-embedding of $C^*_\pi(\Gamma)/I$ in $B(H_\pi)$. By $\Gamma$-injectivity of $C(\partial_F G)$, every ideal $I\unlhd C^*_\lambda(\Gamma)$ is automatically a $\lambda$-ideal.
\begin{proposition} \label{sq}
Given a $\Gamma$-map $\phi: C^*_\pi(\Gamma)\to \mathcal{B}_{\pi}$, the left kernel $I_\phi :=
\{x\in C^*_\pi(\Gamma): \phi(x^*x) = 0\}$ is a closed $\pi$-ideal of $C^*_\pi(\Gamma)$. Conversely, for every proper closed $\pi$-ideal
$J\unlhd C^*_\pi(\Gamma)$, there is a $\Gamma$-map $\psi: C^*_\pi(\Gamma)\to \mathcal{B}_{\pi}$ such that $J\subseteq I_\psi$.
In particular, if there is a unique $\Gamma$-map $\phi: C^*_\pi(\Gamma)\to \mathcal{B}_{\pi}$, then $I_\phi$ contains all
proper closed $\pi$-ideals of $C^*_\pi(\Gamma)$ and $C^*_\pi(\Gamma)/I_\phi$ is the unique non-zero quotient of $C^*_\pi(\Gamma)$ with no $\pi$-ideal.
\end{proposition}
\begin{proof}
We adapt the proof of \cite[Proposition 3.1]{ks}. The left kernel $I_\phi$ is a left ideal by Schwarz inequality for u.c.p.
maps. It is also closed by the fact that c.p. maps are (c.b. and so) bounded. The equality
$$\phi((x\pi_{t})^*(x\pi_{t}))=\phi(\pi_{t^{-1}}x^*x\pi_{t}) = t^{-1}\cdot \phi(x^*x)$$
shows that $I_\phi$ is also a right ideal. Finally, the quotient $C^*_\pi(\Gamma)/I_\phi$ is $\Gamma$-isometric to ${\rm Im}(\phi)$, as $\Gamma$-operator systems, and ${\rm Im}(\phi)$ $\Gamma$-embeds in $B(H_\pi)$, thus $I_\phi$ is a $\pi$-ideal.
Given a proper closed $\pi$-ideal
$J\unlhd C^*_\pi(\Gamma)$, since $C^*_\pi(\Gamma)/J$ $\Gamma$-embeds in $B(H_\pi)$, by $\pi$-injectivity, there is a
$\Gamma$-map: $C^*_\pi(\Gamma)/J\to \mathcal{B}_{\pi}$ \cite[Proposition 3.4(5)]{kk}. Composing this with the canonical quotient
map $q: C^*_\pi(\Gamma)\to C^*_\pi(\Gamma)/J$, we get a $\Gamma$-map $\psi: C^*_\pi(\Gamma)\to \mathcal{B}_{\pi}$ such that $J={\rm ker}(q)\subseteq I_\psi$.
The rest of assertions now follow. \qed
\end{proof}
The restriction of working only with $\pi$-ideals is annoying. This suggests to relax the situation by considering $\Gamma$-maps $\phi: C^*_\pi(\Gamma)\to \mathcal{B}_{\sigma}$ with an appropriate representation $\sigma\in{\rm Rep}(\Gamma)$. Indeed, we may construct representation $\sigma$ in such a way that all ideals of $C^*_\pi(\Gamma)$ are $\sigma$-ideals: given a proper ideal $J\unlhd C^*_\pi(\Gamma)$, compose the canonical surjection: $C^*_{\rm max}(\Gamma)\twoheadrightarrow C^*_\pi(\Gamma)$ with the quotient map: $C^*_\pi(\Gamma)\to C^*_\pi(\Gamma)/J$ to get a representation of $C^*_{\rm max}(\Gamma)$. Let $\sigma_J$ be the associated representation of $\Gamma$, and put $\sigma:=\oplus \sigma_J$, summing over all proper ideals $J\unlhd C^*_\pi(\Gamma)$. Then $C^*_\pi(\Gamma)/J$ embeds in $B(H_\sigma)$, and by construction, this is a $\Gamma$-embedding. This leads to the following modification of the previous proposition with an almost verbatim proof.
\begin{proposition} \label{sq2}
Let $\sigma$ be a representation of $\Gamma$ such that all (proper) quotients of $C^*_\pi(\Gamma)$ $\Gamma$-embed in $B(H_\sigma)$. Given a $\Gamma$-map $\phi: C^*_\pi(\Gamma)\to \mathcal{B}_{\sigma}$, the left kernel $I_\phi :=
\{x\in C^*_\pi(\Gamma): \phi(x^*x) = 0\}$ is a closed ideal of $C^*_\pi(\Gamma)$. Conversely, for every proper closed ideal
$J\unlhd C^*_\pi(\Gamma)$, there is a $\Gamma$-map $\psi: C^*_\pi(\Gamma)\to \mathcal{B}_{\sigma}$ such that $J\subseteq I_\psi$.
In particular, if there is a unique $\Gamma$-map $\phi: C^*_\pi(\Gamma)\to \mathcal{B}_{\sigma}$, then $I_\phi$ contains all
proper closed ideals of $C^*_\pi(\Gamma)$ and $C^*_\pi(\Gamma)/I_\phi$ is the unique non-zero simple quotient of $C^*_\pi(\Gamma)$.
\end{proposition}
A (non commutative) {\it action class} of $\Gamma$ is a collection $\mathfrak C$ of unital $\Gamma$-$C^*$-algebras. A representation $\pi\in$Rep$(\Gamma)$ is a $\mathfrak C$-representation, writing $\pi\in$Rep$_{\mathfrak{C}}(\Gamma)$, if there is a $\Gamma$-map: $A \to B(H_\pi)$, for some $A\in\mathfrak{C}$. If
$\pi$ is in Rep$_{\mathfrak{C}}(\Gamma)$, then so is $\sigma$, for each $\sigma\preceq\pi$: there is a $\Gamma$-map: $A\to B(H_\pi)$, for some $A\in\mathfrak{C}$. Since $\sigma\preceq\pi$, there is a $\Gamma$-map: $C^*_\pi(\Gamma)\to C^*_\sigma(\Gamma)$, which then extends to a $\Gamma$-map: $B(H_\pi)\to B(H_\sigma)$. The composition gives a $\Gamma$-map: $A\to B(H_\sigma)$, showing that $\sigma\in$Rep$_{\mathfrak{C}}(\Gamma)$.
A subgroup $\Lambda\leq \Gamma$ is a $\mathfrak C$-subgroup, writing $\Lambda\in$Sub$_{\mathfrak{C}}(\Gamma)$,
if $\lambda_{\Gamma/\Lambda}\in$Sub$_{\mathfrak{C}}(\Gamma)$.
For a state $\omega\in S(A)$ of a unital $\Gamma$-$C^*$-algebra $A$ the corresponding {\it Poisson map} is the $\Gamma$-map $P_\omega: A\to \ell^\infty(\Gamma)$ defined by
$P_\omega(a)(s) =\langle \omega, s^{-1}\cdot a\rangle$,
for $s\in\Gamma$, $a\in A$.
If $\Lambda\leq \Gamma$ and $\omega$ is $\Lambda$-invariant, then we have a Poisson map $$P_\omega: A\to \ell^\infty(\Gamma/\Lambda); \ \ P_\omega(a)(s\Lambda) =\langle \omega, s^{-1}\cdot a\rangle \ (s\in\Gamma, a\in A),$$
which is well-defined, since if $s\Lambda=t\Lambda$, then $(t^{-1}s) \omega=\omega$, and so $\langle \omega, t^{-1}\cdot a\rangle=\langle \omega, s^{-1}\cdot a\rangle$, for each $a\in A$.
\begin{lemma} \label{state}
For $\Lambda\leq \Gamma$,
$\Lambda\in{\rm Sub}_{\mathfrak{C}}(\Gamma)$ iff there is a $\Lambda$-invariant state on some $A\in \mathfrak{C}$.
\end{lemma}
\begin{proof}
If $A\in \mathfrak{C}$ and $\psi: A\to B(\ell^2(\Gamma/\Lambda))$ is a $\Gamma$-map, then for a $\Lambda$-invariant state $\omega$ on $B(\ell^2(\Gamma/\Lambda))$, let $\omega_0$ be the
restriction of $\omega$ to the operator system $\psi(A)$, then $\omega_0\circ \psi\in \mathcal S(A)$ is a $\Lambda$-invariant state on $A$.
Conversely, if there is a $\Lambda$-invariant state $\omega$ on some $A\in \mathfrak{C}$, by the observation before this lemma, the Poisson map
$P_\omega: A\to \ell^\infty(\Gamma/\Lambda)$ is the desired $\Gamma$-map.\qed
\end{proof}
The subgroup class Sub$_{\mathfrak{C}}(\Gamma)$
is invariant under conjugation, since representations $\lambda_{\Gamma/\Lambda}$ and $\lambda_{\Gamma/\Lambda^s}$ are unitarily equivalent.
Let $\pi,\sigma\in{\rm Rep}(G)$ and let $A$ be a
unital $\Gamma$-$C^*$-algebra with $\Gamma$-map $\phi: A\to B(H_\pi)$ (i.e., $\pi\in$Rep$_{\{A\}}(\Gamma)$). Let $\psi: B(H_\pi)\to \mathcal{B}_{\sigma}$ be a $\Gamma$-map. In particular, the restriction of $\psi$ to $C^*_\pi(\Gamma)$ gives a boundary map $b_\pi^\sigma: C^*_\pi(\Gamma)\to \mathcal{B}_{\sigma}$. We assume further that
$$b_A=\psi\circ \phi: A\to \mathcal{B}_{\sigma}$$
is a $\Gamma$-embedding. When $\mathcal{B}_{\sigma}$ is $\Gamma$-embedded in $B(H_\pi)$, alternatively we could also start with a boundary map $b_\pi^\sigma: C^*_\pi(\Gamma)\to \mathcal{B}_{\sigma}$ and extend it by $\pi$-rigidity to a $\Gamma$-map $\psi: B(H_\pi)\to \mathcal{B}_{\sigma}$ and get $b_A$ as above (we still need the assumption that $b_A$ is an embedding, i.e., a contraction). This situation is quite typical in this section, and we frequently use the following key fact that is an adaptation of \cite[Theorem 3.5]{ks}. For a unital $C^*$-algebra $B$ and element $x\in B$ we use the following notation:
$${\rm supp}(x):=\overline{\{\omega\in \mathcal P(B): \langle \omega, x\rangle\neq 0\}},$$
where the closure is taken in weak$^*$-topology of $B^*$.
\begin{lemma} \label{key}
Let $\psi$, $\phi$, $b_\pi^\sigma$ and $b_A$ are $\Gamma$-maps as above. Let $\mathcal P(A)$ be the pure state space of $A$ and for $s\in\Gamma$, let
$$\mathcal P^s(A):=\{\omega\in \mathcal P(A): s\omega=\omega\}$$
be the fixed point set of $s$, and $\mathcal P^s_0(A)$ be the interior of $\mathcal P^s(A)$ in weak$^*$-topology of $A^*$. If the $\Gamma$-embedding $b_A=\psi\circ \phi: A\to \mathcal{B}_{\sigma}$ is regular, then
$${\rm supp}(b_\pi^\sigma(\pi_s))\subseteq \overline{b_{A*}^{-1}(\mathcal P^s_0(A))},$$
where $b_{A*}:\mathcal P(\mathcal{B}_{\sigma})\to \mathcal P(A)$ is the induced map on pure state spaces, and closure on the right hand side is taken in the weak$^*$-topology of $\mathcal{B}_{\sigma}^*$.
\end{lemma}
\begin{proof}
If $\psi: B(H_\pi)\to B(\ell^2(\Gamma/\Lambda))$ and $\phi: A\to B(H_\pi)$ are $\Gamma$-maps, and $b_A=\psi\circ \phi$. Let $b_\pi^\sigma$ be the restriction of $\psi$ to $C^*_\pi(\Gamma)$. Arguing by the way of contradiction, let there is $s\in\Gamma$ and $\omega\in \mathcal P(A)$ with
$\omega\notin \overline{b_{A*}^{-1}(\mathcal P^s_0(A))},$ such that $\langle\omega, b_\pi^\sigma(\pi_s)\rangle\neq 0.$ Choose a neighborhood $U$ of $\omega$ in $\mathcal P(A)$ with $U\cap b_{A*}^{-1}(\mathcal P^s_0(A))=\emptyset$ such that $\langle\varrho, b_\pi^\sigma(\pi_s)\rangle\neq 0,$ for each $\varrho\in U$. Choose $\omega_0\in U$ with $b_{A*}(\omega_0)\notin P^s(A)$.
By Proposition \ref{mp}, the translates of $U$ by elements of $\Gamma$ cover $\mathcal P(\mathcal{B}_{\sigma})$, and so by compactness, $\mathcal P(\mathcal{B}_{\sigma})\subseteq \bigcup_{t\in F} tU$, for some finite set $F\subseteq \Gamma$. By regularity, $b_{A*}(\mathcal{B}_{\sigma}) \subseteq \mathcal P(A)$, thus by the fact that $b_{A*}$ is a $\Gamma$-map, $\mathcal P(A)\subseteq \bigcup_{t\in F} tb_{A*}(U)$. In particular, $b_{A*}(U)$ has non-empty interior, by Baire category theorem. By Krein-Hahn-Banach theorem, there is $0\leq a\leq 1$ in $A$ with
$$ \langle b_{A*}(\omega_0), a\rangle=1, \ \ \langle b_{A*}(\omega_0), s\cdot a\rangle=0.$$
Thus,
$$\langle\omega_0, \psi\circ\phi(a)\rangle=\langle\omega_0, b_A(a)\rangle=\langle b_{A*}(\omega_0), a\rangle=1,$$
whereas,
$$\langle\omega_0, \psi(\pi_s\phi(a)\pi_s^*)\rangle=\langle\omega_0, \psi\circ\phi(s\cdot a)\rangle=\langle b_{A*}(\omega_0), s\cdot a\rangle=0.$$
Since $\phi$ is u.c.p., we have $0\leq \phi(a)\leq 1$, so arguing as in the proof of Lemma \ref{rad2} (cf., \cite[Lemma 2.2]{hk}), we get $0 \leq \pi_s^*\phi(a)\pi_s\leq 1$ and $\langle\omega_0, \psi(\pi_s\phi(a)^2\pi_s^*)\rangle=0.$
Similarly, from $\langle\omega_0, \psi(1-\phi(a))\rangle=0,$ it follows that $\langle\omega_0, \psi((1-\phi(a))^2)\rangle=0.$ By Cauchy-Schwartz inequality,
$$\big|\langle\omega_0, \psi((1-\phi(a))\pi_s)\rangle\big|\leq \langle\omega_0, \psi((1-\phi(a))^2)\rangle\langle\omega_0, \psi(1)\rangle=0.$$ Thus, for the state $\tau:=\omega_0\circ \psi$ on $B(H_\pi)$,
\begin{align*}
\big|\langle\omega_0, \psi(\phi(a)\pi_s)\rangle\big|&=\big|\tau(\phi(a)\pi_s)\big|=\big|\tau( \pi_s^*\pi_s\phi(a)\pi_s)\big|\\&=\big|\tau(\pi_s^*\phi(a)\pi_s\pi_s^*)\big|\leq \big|\tau(\pi_s^*\phi(a)^2\pi_s)\big|
=0,
\end{align*}
Hence, $$\langle\omega_0, b_\pi^\sigma(\pi_s)\rangle=\langle\omega_0, \psi(\pi_s)\rangle=\langle\omega_0, \psi(\phi(a)\pi_s)\rangle+\langle\omega_0, \psi((1-\phi(a))\pi_s)\rangle=0,$$
which contradicts the fact that $\omega_0\in U$ and $\langle\varrho, b_\pi^\sigma(\pi_s)\rangle\neq 0,$ for each $\varrho\in U$.\qed
\end{proof}
\begin{corollary} \label{supp}
Let $A$ be a $\pi$-boundary, then every trace on $C^*_\pi(\Gamma)$ is supported on $\ker(\Gamma\curvearrowright A)$.
\end{corollary}
\begin{proof}
Since there is a $\Gamma$ embedding of $\mathbb C$ into $\mathcal{B}_{\pi}$, a given trace $\tau$ on $C^*_\pi(\Gamma)$ may be regarded as a $\Gamma$-map into $\mathcal{B}_{\pi}$ (still denoted by $\tau$) and could be extended to a $\Gamma$-map $\psi: B(H_\pi)\to \mathcal{B}_{\pi}$. Let $s\notin\ker(\Gamma\curvearrowright A)$ and choose $a\in A$ with $s\cdot a\neq a$. Choose $\omega_0\in \mathcal P(A)$ with $\langle\omega_0,s\cdot a\rangle\neq \langle\omega_0, a\rangle$, then $\omega_0\notin \mathcal P^s(A)$. Since $b_{A*}: \mathcal P(\mathcal{B}_{\pi})\to \mathcal P(A)$ is onto and $\mathcal P^s(A)$ is weak$^*$-closed,
$$\overline{b_{A*}^{-1}(\mathcal P^s_0(A))}\subseteq b_{A*}^{-1}(\overline{\mathcal P^s_0(A)})\subseteq b_{A*}^{-1}({\mathcal P^s(A)})\subsetneq \mathcal P(\mathcal{B}_{\pi}).$$
By Lemma \ref{key}, applied to the case where $\sigma=\pi$, $b_\pi^\pi=\tau$, and $\phi$ is the $\Gamma$-embedding: $A\hookrightarrow \mathcal{B}_{\pi}\hookrightarrow B(H_\pi)$, by the last proper inclusion above, we get ${\rm supp}(\tau(\pi_s))\neq \mathcal P(\mathcal{B}_{\pi})$. Choose $\omega\notin{\rm supp}(\tau(\pi_s))$, then
$$\tau(\pi_s)=\langle\omega,\tau(\pi_s)1\rangle=0.\ \ \ \qed$$
\end{proof}
\begin{corollary} \label{inv}
If $C^*_\pi(\Gamma)$ is nuclear and has a trace, then each $\pi$-boundary has a $\Gamma$-invariant state.
\end{corollary}
\begin{proof}
Take a trace $\tau$ on $C^*_\pi(\Gamma)$, which is then amenable by \cite[Theorem 4.2.1]{br}. Extending $\tau$ to a hypertrace $\psi$ on $B(H_\pi)$ and composing $\psi$ with $\Gamma$-embedding: $A\hookrightarrow \mathcal{B}_{\pi}\hookrightarrow B(H_\pi)$, we get a $\Gamma$-invariant state on the $\pi$-boundary $A$.
\end{proof}
\begin{remark} \label{map}
$(i)$ Since there is a
${\rm Rad}_\pi(\Gamma)$-invariant state on $B(H_\pi)$, which restricts to a
${\rm Rad}_\pi(\Gamma)$-invariant state on any $\pi$-boundary $A$. By normality of
${\rm Rad}_\pi(\Gamma)$ and proximality of $\Gamma\curvearrowright A$, ${\rm Rad}_\pi(\Gamma)$ acts trivially on $A$. In particular, ${\rm Rad}_\pi(\Gamma)$ is contained in $N_\pi:=\bigcap_{A}\ker(\Gamma\curvearrowright A)$, where the intersection runs over all $\pi$-boundaries $A$.
$(ii)$ As the proof of Corollary \ref{inv} reveals, we do not need a $\Gamma$-embedding: $A\hookrightarrow \mathcal{B}_{\pi}$, but just a $\Gamma$-map: $A\to B(H_\pi)$. Also we only need to assume that $C^*_\pi(\Gamma)$ has an amenable trace. When $\pi=\lambda$, all traces on $C^*_\lambda(\Gamma)$ (if any) are automatically amenable, and indeed, if there is a trace, then $C^*_\lambda(\Gamma)$ is nuclear \cite[Proposition 4.1.1]{br}. When $\pi$ is the universal representation, the trivial representation can be regarded as a locally finite
dimensional trace on $C^*_{\rm max}(\Gamma)$.
There is another trace on $C^*_{\rm max}(\Gamma)$ coming from the left regular representation
and, in contrast to the reduced case, this trace is also amenable for a
large class of non-amenable discrete groups, e.g., for residually finite groups \cite[Proposition 4.1.4]{br}.
\end{remark}
\begin{example} \label{ex4}
$(i)$ Let $(\Gamma, A,\alpha)$ be a $C^*$-dynamical system with $A$ unital. A covariant representation of $(\Gamma, A,\alpha)$ is a triple $(\theta, \pi, H)$ where $\theta$ and $\pi$
are respectively a representation of $A$ and a unitary representation of $\Gamma$ in
the same Hilbert space $H$, satisfying the covariance rule
$$\pi_t\theta(a)\pi_t^* = \theta(\alpha_t(a)),$$
for $t\in \Gamma$ and $a\in A$. The covariance condition simply means that $\theta: A\to B(H)$ is a $\Gamma$-map w.r.t. $\alpha$-action on $A$ and Ad$_\pi$-action on $B(H)$. It now follows from Remark \ref{map}$(ii)$ that $A$ has a $\Gamma$-invariant state when $\C^*_\pi(\Gamma)$ has an amenable trace.
$(ii)$ A covariant representation $(\theta, \pi, H)$ gives rise to a *-homomorphism $\theta\rtimes \pi$ from $A[\Gamma]$
into $B(H)$, defined by
$$(\theta\rtimes \pi)(\sum a_tt) =\sum \theta(a_t)\pi_t.$$
Let $A\rtimes_{(\theta,\pi)}\Gamma$ be the $C^*$-algebra generated by the range of this integrated representation, then $A\rtimes_{(\theta,\pi)}\Gamma$ is $\Gamma$-$C^*$-subalgebra of $B(H)$ under Ad$_\pi$-action, and so it has a $\Gamma$-invariant state when $\C^*_\pi(\Gamma)$ has an amenable trace.
$(iii)$ When the boundary $\mathcal{B}_{\pi}$ is C*-embeddable, we let $\Gamma$ act on $\mathcal{B}_{\pi}$ by Ad$_\pi$, and so the embedding $\iota: \mathcal{B}_{\pi}\hookrightarrow B(H_\pi)$ would be a $\Gamma$-map. With the notations of Theorem \ref{emb}, let $\tilde{\mathcal{B}}_{\pi}$ denote the C*-algebra generated by $\mathcal{B}_{\pi}\cup \pi(\Gamma)$
in $B(H_\pi)$, then $\tilde{\mathcal{B}}_{\pi}=\mathcal{B}_{\pi}\rtimes_{(\iota,\pi)}\Gamma$. In particular, $\tilde{\mathcal{B}}_{\pi}$ has a $\Gamma$-invariant state when $\C^*_\pi(\Gamma)$ has an amenable trace.
\end{example}
Next we discuss uniqueness of boundary maps. In Example \ref{ex4}$(i)$, following \cite[Definition 4.1]{ks}, a nondegenerate covariant representation $(\theta, \pi, H)$ is called {\it germinal} if
$$\pi_s\theta(a)=\theta(a)\ \ {\rm whenever} \ {\rm supp}(a)\subseteq \mathcal P^s(A),$$
or equivalently, if this holds for any $a\in A$ with ${\rm supp}(a)\subseteq \mathcal P_0^s(A)$ (as the latter subset of $A$ is dense in the former).
\begin{example} \label{ger}
$(i)$ The covariant representation $(\kappa_\nu, M)$ is germinal, where $\nu$ is a $\sigma$-finite quasi-invariant measure on a compact $\Gamma$-space $X$, $\kappa_\nu$ is the Koopman representation of $\Gamma$ on $L^2(X, \nu)$ and $M: C(X) \to B(L^2(X, \nu))$
is the multiplication representation \cite[Proposition 4.3]{ks}.
$(ii)$ If $\Lambda\leq \Gamma$ and $\omega$ is a $\Lambda$-invariant state on a $\Gamma$-C*-algebra $A$, then The pair $(\lambda_{\Gamma/\Lambda}, P_\omega)$ is a covariant pair whenever $\Gamma^0_\omega\leq \Lambda\leq \Gamma_\omega$, where
$$P_\omega: A\to \ell^\infty(\Gamma/\Lambda); \ \ P_\omega(a)(t\Lambda) =\langle \omega, t^{-1}\cdot a\rangle \ (t\in\Gamma, a\in A),$$
is the Poisson map: given $s,t\in \Gamma$ and $a\in A$ with ${\rm supp}(a)\subseteq \mathcal P_0^s(A),$ we have
$$P_\omega(a)(t\Lambda) =\langle \omega, t^{-1}\cdot a\rangle=\langle t\omega, a\rangle=0,$$ if $t\omega\notin\mathcal P_0^s(A).$ In this case, we also have $st\omega\notin s\mathcal P_0^s(A)=\mathcal P_0^s(A),$ where the last equality follows from the fact that $\omega\mapsto s\omega$ is a homeomorphism. Thus, $$\lambda_{\Gamma/\Lambda}(s)P_\omega(a)(t\Lambda)=P_\omega(a)(st\Lambda)=\langle st\omega, a\rangle=0=P_\omega(a)(t\Lambda).$$
On the other hand, if $t\omega\in\mathcal P_0^s(A)$, $t^{-1}st$ fixes the weak$^*$-open neighborhood $t^{-1}\mathcal P_0^s(A)$ of $\omega$, that is, $t^{-1}st\in \Gamma_\omega^0\subseteq\Lambda$, and again we have, $$\lambda_{\Gamma/\Lambda}(s)P_\omega(a)(t\Lambda)=P_\omega(a)(st\Lambda)=P_\omega(a)(t\Lambda).$$
\end{example}
The next result is one of the main results of this section, which extends \cite[Theorem 4.4]{ks} for the case $\pi=\lambda$ and $A=C(X)$ (the extension being non trivial, as the proof in \cite{ks} uses extensively the fact that $\mathcal B_\lambda=C(\partial_F\Gamma)$ is commutative).
\begin{theorem}
Let $A$ be a regular embeddable $\pi$-boundary and $(\theta, \pi, H)$ be a germinal covariant representation, then there is a unique boundary map $\psi: A\rtimes_{\theta \rtimes\pi}\Gamma\to \mathcal B_\pi$, whose restriction to $C^*_\pi(\Gamma)$ is a
unique boundary map on $C^*_\pi(\Gamma)$.
\end{theorem}
\begin{proof}
Since $A$ is an embeddable $\pi$-boundary, we may chosse a $\Gamma$-embedding $b_A: A\hookrightarrow\mathcal B_\pi$ which is also a $*$-homomorphism w.r.t. the Choi-Effros product on $\mathcal B_\pi$. By $\pi$-injectivity, this extends to a $\Gamma$-map $\psi: B(H_\pi)\to \mathcal B_\pi$. By regularity of $A$ and Lemma \ref{unique}, $\psi\circ\theta=b_A$. In particular, $\theta(A)$ is contained in the multiplicative domain of
$\psi$, therefore by \cite[Proposition 1.5.7(2)]{bo},
$$\psi\big(\sum_{s} \theta(a_s)\pi_s\big)=\sum_{s}\psi(\theta(a_s))\psi(\pi_s)=\sum_{s}b_A(a_s)\psi(\pi_s),$$
for each finite sum over $\Gamma$, which shows that the restriction of $\psi$ on $A\rtimes_{\theta \rtimes\pi}\Gamma$ is unique if its restriction to $C^*_\pi(\Gamma)$ is so. Conversely, Since any boundary map on $C^*_\pi(\Gamma)$ extends to a boundary map on $A\rtimes_{\theta \rtimes\pi}\Gamma$. It remains to show that the restriction of $\psi$ to $C^*_\pi(\Gamma)$ is indeed unique.
The $\Gamma$-map $b_A: A\to \mathcal B_\pi$ induces a $\Gamma$-map $b_{A*}: \mathcal S(\mathcal B_\pi)\to \mathcal S(A)$, which sends pure states to pure states by regularity. Let $s\in \Gamma$ and $\omega\in b_{A*}^{-1}( \mathcal P_0^s(A))=:\Delta_s$. By Hahn-Banach theorem, we may choose $a\in A$ with $\|a\|=1$ such that $$\langle b_{A*}(\omega), a\rangle=1, \ \ {\rm supp}(a)\subseteq \mathcal P^s(A).$$
Put $b:=b_A(a)$, then $\|b\|=1$, as $b_A$ is an injective $*$-homomorphism (and so an isometry). Since $(\theta, \pi, H)$ is germinal by assumption, $\pi_s\theta(a)=\theta(a)$. Therefore,
$$\psi(\pi_s)b=\psi(\pi_s)b_A(a)=\psi(\pi_s)\psi(\theta(a))=\psi(\pi_s\theta(a))=\psi(\theta(a))=b_A(a)=b,$$
where the third equality follows from the fact that the range of $\theta$ is in the multiplicative domain of $\psi$. Evaluating $\omega$ on both sides, we get $$\langle\omega,\psi(\pi_s)b\rangle=\langle\omega, b\rangle=\langle\omega, b_A(a)\rangle =\langle b_{A*}(\omega), a\rangle=1.$$
Since $\psi$ is u.c.p. and so contractive, $\|\psi(\pi_s)\|\leq 1$. By Cauchy-Schwartz inequality,
$$1=\langle\omega,\psi(\pi_s)b\rangle\leq\langle\omega,\psi(\pi_s)^*\psi(\pi_s)\rangle^{\frac{1}{2}}\langle \omega, b^*b\rangle^{\frac{1}{2}}\leq\|\psi(\pi_s)\|^2\|b\|^2\leq 1.$$
Thus $\langle\omega,\psi(\pi_s)^*\psi(\pi_s)\rangle\langle \omega, b^*b\rangle=1$. The product of two positive real numbers, each at most one, is equal to one, and so both are one, that is, $\langle\omega,\psi(\pi_s)^*\psi(\pi_s)\rangle=\langle \omega, b^*b\rangle=1$. Since $\langle\omega,\psi(\pi_s)b\rangle=1$ is a real number, we have $\langle\omega,b^*\psi(\pi_s)^*\rangle=1$. Repeating the above argument, we also get $\langle\omega, bb^*\rangle=1$. Since $ \langle\omega, b\rangle=1$, these together mean that $b$ is in the multiplicative domain of $\omega$. Therefore, $1= \langle\omega,\psi(\pi_s)b\rangle=\langle\omega,\psi(\pi_s)\rangle\langle\omega,b\rangle=\langle\omega,\psi(\pi_s)\rangle$.
Summing up, $\langle\omega,\psi(\pi_s)\rangle=1$, for $\omega\in\Delta_s$, and so $\langle\omega,\psi(\pi_s)\rangle=1$, for $\omega\in\bar{\Delta_s}$, where $\bar{\Delta_s}$ is the closure of $\Delta_s$ in weak$^*$-topology. By Lemma \ref{key} (for
$\sigma=\pi$, $\phi=\theta$, $b_\pi^\pi=\psi|_{C^*_\pi(\Gamma)}$), we have ${\rm supp}(\psi(\pi_s))\subseteq \bar{\Delta_s}$, that is, $\langle\omega,\psi(\pi_s)\rangle=0$, for $\omega\notin\bar{\Delta_s}$. Since pure states of the unital C*-algebra $\mathcal B_\pi$ separate the points, this completes the proof. \qed
\end{proof}
We need the next lemma proved by Archbold and Spielberg \cite[Lemma 2]{as}. Recall that two representations of a C*-algebra $A$ are called {\it disjoint} if they have non trivial equivalent subrepresentations \cite[5.2.2]{di}.
\begin{lemma} \label{vanish}
Let $A$ be a $\Gamma$-C*-algebra with action $\alpha$, $\rho: A\to B(H)$ be a
non degenerate representation of $A$, and $\phi: A\rtimes\Gamma\to B(H)$ be a c.c.p. map extending $\theta$ on the maximal crossed product. If $\rho$ and $\rho\circ \alpha_t$ are disjoint representations, then $\phi(a\delta_t)=0$, for
each $a\in A$, where $a\delta_t$ is a singly supported function in $c_c(\Gamma, A)\subseteq A\rtimes\Gamma$.
\end{lemma}
\begin{proposition} \label{vanish2}
Let $(\theta, \pi, H)$ be a covariant representation of C*-dynamical system $(\Gamma, A,\alpha)$ and let $\theta\rtimes\pi: A\rtimes\Gamma\to B(H)$ be the corresponding integrated representation of the maximal (full) crossed product. Let $A\rtimes_{\theta \rtimes\pi}\Gamma$ be the C*-subalgebra of $B(H)$ generated by the range of $\theta\rtimes\pi$, and $q_\theta: A\rtimes\Gamma \to A\rtimes_{\theta \rtimes\pi}\Gamma$ be the corresponding quotient map.
$(i)$ If $\theta$ and $\theta\circ \alpha_t$ are disjoint representations, then $(\theta \rtimes\pi)(a\delta_t)=0$, for each $a\in A$.
$(ii)$ If $\theta$ is faithful and the action $\Gamma\curvearrowright A$ is topologically free, there is a conditional expectation $\mathbb E_\theta: A\rtimes_{\theta \rtimes\pi}\Gamma\to \theta(A)$ such that the following diagram commutes,
\begin{center}
\begin{tikzcd}
A\rtimes\Gamma \arrow{r}{\theta \rtimes\pi} \arrow{d}[swap]{\mathbb E} &A\rtimes_{\theta \rtimes\pi}\Gamma \arrow{d}{\mathbb E_\theta} \\
A \arrow[swap]{r}{\theta} & \theta(A)
\end{tikzcd}
\end{center}
where $\mathbb E: A\rtimes\Gamma\to A$ is the canonical conditional expectation on the maximal (full) crossed product.
$(iii)$ When $\theta$ is faithful and the action $\Gamma\curvearrowright A$ is topologically free, for each closed ideal $I\unlhd A\rtimes_{\theta \rtimes\pi}\Gamma$, if $I\cap \theta(A)=0$, then $I\subseteq \ker \mathbb E_{\theta}$.
\end{proposition}
\begin{proof}
$(i)$. This follows from Lemma \ref{vanish} for $\phi=\theta \rtimes\pi$.
$(ii)$ Let $\tilde H := \ell^2(G, H)$ and $(\tilde\sigma, \tilde\lambda, \tilde H)$ be
be the representation induced by $\theta$, defined by $$\tilde\theta(a)\xi(t) = \theta(\alpha_{t^{-1}}(a))\xi(t),\ \ \tilde\lambda_s\xi(t) =\xi(s^{-1}t),$$
for $a\in A$ and $\xi\in \tilde H$.
Since $\theta$ is faithful, $\Vert x\Vert_{\rm red} =\Vert(\tilde\theta \rtimes\tilde\lambda)(x)\Vert$, for
each $x\in c_c(\Gamma, A)$ \cite[Definition 7.7]{w}. For $s\in \Gamma$, consider the partial isometry $V: \tilde H\to H; \ \xi\mapsto \xi(e)$, then for $\eta\in H$, $\tilde\lambda_sV^*\eta=\tilde\lambda_s(\eta\delta_e)=\eta\delta_e$, thus for $x = \sum_s a_s\delta_s$,
$$ V\big((\tilde\theta \rtimes\tilde\lambda)(x)\big)V^*\eta=V\sum_s \tilde\theta(a_s)\tilde\lambda_sV^*\eta = \sum_s \delta_s(e)\theta(a_s)\eta = \theta(a_e)\eta=\theta(\mathbb E(x))\eta,$$ where
$$\mathbb E: A\rtimes\Gamma\to A; \ \ \sum_s a_s\delta_s\mapsto a_e,$$
is the canonical conditional expectation on the full crossed product. Since the action $\Gamma\curvearrowright A$ is topologically free, for each ideal $I\unlhd A\rtimes\Gamma$, if $A\cap I=0$, then $I\subseteq \ker(\tilde\theta \rtimes\tilde\lambda)$ \cite[Theorem 1]{as}. Since $\theta$ is faithful, $A\cap\ker(\theta \rtimes\pi)=0$, thus $\ker(\theta \rtimes\pi)\subseteq \ker(\tilde\theta \rtimes\tilde\lambda)$. In particular, there is a well-defined c.p. map $\mathbb E_\theta: A\rtimes_{\theta \rtimes\pi}\Gamma\to \theta(A)$ satisfying $\mathbb E_\theta\circ(\theta \rtimes\pi)=\theta\circ \mathbb E.$
Now, for $x\in c_c(\Gamma, A)$,
$$\|\mathbb E_\theta\big((\theta \rtimes\pi)(x)\big)\|=\|\theta\big(\mathbb E(x)\big)\|=\|V\big((\tilde\theta \rtimes\tilde\lambda)(x)\big)V^*\|\leq \|(\tilde\theta \rtimes\tilde\lambda)(x)\|\leq \|(\theta \rtimes\pi)(x)\|,$$
where the last equality follows from the fact that $\ker(\theta \rtimes\pi)\subseteq \ker(\tilde\theta \rtimes\tilde\lambda)$. This means that $\mathbb E_\theta$ is c.c.p. Moreover, it follows from $\mathbb E_\theta(\sum_s \theta(a_s)\pi_s)=\theta(a_e)$ that $\mathbb E_\theta^2=\mathbb E_\theta$, therefore, $\mathbb E_\theta$ is a conditional expectation by Tomiyama's theorem (cf., \cite[Theorem 1.5.10]{bo}).
$(iii)$ We adapt the proof of \cite[Theorem 1]{as}. Let $I$ be a closed ideal with $I\nsubseteq \ker \mathbb E_{\theta}$. Choose $a\in I$ with $\mathbb E_{\theta}(a)\neq 0$. Choose $b\in \sum_{s\in F} b_s\delta_s\in c_c(\Gamma, A)$ with $\|(\theta\rtimes \pi)(b)-a\|<\frac{1}{2}\|\mathbb E_{\theta}(a)\|.$ Let $X:=\bigcap_{s\in F\backslash\{e\}} \{\sigma\in \hat A: t\sigma\neq \sigma\}$, and for $\sigma\in X$, let $\tilde\sigma$ be $*$-homomorphism obtained as the composition of maps
$$\theta(A)+I\to \frac{\theta(A)+I}{I}\simeq \frac{\theta(A)}{\theta(A)\cap I}=\theta(A)\xrightarrow[]{\theta^{-1}} A \xrightarrow[]{\sigma} B(H_\sigma),$$
where $\theta(A)+I$ is closed (and so a C*-subalgebra) in $A\rtimes_{\theta \rtimes\pi}\Gamma$, as the sum of a C*-subalgebra and a closed ideal \cite[1.8.4]{di}. Extend $\tilde\sigma$ to a c.p. map $\phi: A\rtimes_{\theta \rtimes\pi}\Gamma\to B(H_\sigma)$, and observe that since $\sigma\circ\alpha_t\neq \sigma$, for $t\neq e$, Lemma \ref{vanish} applies to $\phi$ and for $x:=(\theta\rtimes\pi)(b)$, by part $(ii)$ we get,
\begin{align*}
\phi(x)=\phi\big((\theta\rtimes\pi)(b)\big)&=\sum_s\phi(\theta(b_s)\pi_s)=\phi(\theta(b_e))\\&=\phi(\theta\circ\mathbb E(b))=\phi\big(\mathbb E_\theta\circ(\theta\rtimes\pi)(b)\big)=\phi(\mathbb E_\theta(x)),
\end{align*}
and since $\phi=\sigma$ on $\theta(A)$ and
$\phi(a)=\tilde\sigma(a)=0$,
$$\|\sigma(\mathbb E_\theta(x))\|=\|\phi(\mathbb E_\theta(x))\|=\|\phi(x)\|=\|\phi(x-a)\|\leq\|x-a\|.$$ Since this holds for each $\sigma\in X$ and $X\subseteq \hat A$ is dense, we get $\|\mathbb E_\theta(x)\|\leq\|x-a\|,$ thus
$$\|\mathbb E_\theta(a)\|\leq \|\mathbb E_\theta(x-a)\|+\|\mathbb E_\theta(x)\|\leq\|x-a\|+\|x-a\|,$$
which contradicts the choice of $b$. \qed
\end{proof}
\begin{remark} \label{rem}
Let $\pi\in$Rep$(\Gamma)$, then it is desirable to show that $\Gamma$ is $C^*_\pi$-simple iff it has a topologically free $\pi$-boundary. However, at this stage we don't know if this is true. With the notation of the above result, if $\theta$ is fauthful and the action $\Gamma\curvearrowright A$ is topologically free, and moreover the restriction $\psi$ of $\mathbb E_\theta$ to $C^*_\pi(\Gamma)$, considered as a linear scalar valued map is faithful (that is, if $C^*_\pi(\Gamma)_{+}\cap \ker \mathbb E_{\theta}=0$) then it follows from \cite[Proposition 3.1]{ks} that $\Gamma$ is $C^*_\pi$-simple.
\end{remark}
|
\section{Introduction}
\label{sec:intro}
An important task in modern data analysis is identifying a subset of explanatory features from a larger pool that are associated with a response of interest. For instance, suppose a nutritionist is interested in identifying which nutrient intakes are associated with body mass index. This information, in turn, could be leveraged to develop diets that improve human health \cite{chen2013variable}. As another example, consider a geneticist who is interested in finding which genetic mutations of a virus have developed resistance to a specific antiviral drug. To quote \cite{HIV}: ``[This understanding] is essential for designing new antiviral drugs and for using genotypic drug resistance testing to select optimal therapy.''
In such applications, there are often a large number of explanatory features with complex dependencies and a limited number of observations, which make the selection problem a particularly difficult task~\cite{shah2020hardness}. To stress this point, consider the genetic example from above and notice that a feature selection procedure can make erroneous selections of two kinds: (i) false positives---it may select mutations that do not have any effect on drug resistance; and (ii) false negatives---it may fail to discover genetic mutations that in fact developed resistance to the antiviral drug. This paper presents a novel cost function and learning scheme whose goal is to increase the number of discoveries reported by statistical methods for feature selection, while maintaining the rate of false positives under control.
To formalize the problem, we denote by $Y \in \mathbb{R}$ the response variable and by $X = (X_1,\dots,X_d) \in \mathbb{R}^d$ the feature vector. For example, imagine that $Y$ is a measure of drug resistance, and $X_j \in \mathbb{R}$---the $j$th entry in the vector $X$---indicates the presence or absence of a genetic mutation in a specific location. Conditional independence testing \cite{Knockoffs,HRT,dCRT,zhang2012kernel} deals with the question of whether a specific feature $X_j$ is independent of the response variable $Y\in \mathbb{R}$ after accounting for the effect of all the other features $X_{-j} = (X_1,\dots,X_{j-1}, X_{j+1},\dots,X_d) \in \mathbb{R}^{d-1}$. That is, the null hypothesis we seek to test is
\begin{equation} \label{eq:null}
H_{0,j}: X_j \perp \!\!\! \perp Y \mid X_{-j}
\end{equation}
against the alternative $H_{1,j}: X_j \not\!\perp \!\!\! \perp Y \mid X_{-j}$. In plain words, $H_{0,j}$ inquires whether the knowledge of $X_j$ adds additional information about the response $Y$ beyond what is already contained in $X_{-j}$. Consequently, we say that the $j$th feature is null (i.e., unimportant) if $H_{0,j}$ is true, and non-null (i.e., important) if $H_{0,j}$ is false.
Imagine we are given $n$ data points $\{(X^i,Y^i)\}_{i=1}^n$, where $X^i \in \mathbb{R}^d$ and $Y^i\in \mathbb{R}$ are drawn i.i.d. from a joint distribution $P_{XY}$. Statistical tests for conditional independence leverage the observed data to formulate a decision rule on whether to reject $H_{0,j}$ and report that the feature $X_j$ is likely to be important, or accept $H_{0,j}$ in cases where there is not enough evidence to reject the null.
A \emph{valid} test for conditional independence should return the probability of making type-I error (i.e., rejecting $H_{0,j}$ when it is in fact true), known as a p-value. This p-value is then used to rigorously control the type-I error rate at any user-specified level $\alpha$, e.g., of 5\%. The power of the test (higher is better) is the true positive rate, being the probability of correctly reporting that the non-null $X_j$ is indeed important.
Thus far we formulated the problem of testing for a specific feature, however, in many scientific applications (e.g., genome wide association studies \cite{GenomCRT,benner2016finemap}) we are interested in selecting a subset of features that are associated with the response. In other words, we wish to test for all $H_{0,j},$ $j=1,\dots d$ \emph{simultaneously} while controlling some statistical notion of type-I error. To this end, imagine we have at hand $d$ p-values, one for each $H_{0,j}$, which we denote by $p_j$, $j=1, \dots ,d$.
Recall that each p-value allows us to control the type-I error for a specific hypothesis at a desired rate $\alpha$. However, when testing for all the hypotheses simultaneously we must account for the multiplicity of the tests, as otherwise the probability that some of the true null hypotheses are rejected by chance alone may be excessively high; see the survey in \cite{multiple_testing_correction} for details. Hence, we follow the seminal work reported in \cite{BH} and define our task as follows: identify \emph{the largest possible} subset $\hat{\mathcal{S}}\subseteq \{1,\dots,d\}$ of non-null features while ensuring that the false discovery rate (FDR), defined as
\begin{equation}
\textrm{FDR} = \mathbb{E}\left[ \frac{|\hat{\mathcal{S}} \cap \mathcal{H}_0 |} {\textrm{max}\{|\hat{\mathcal{S}}|,1\}}\right],
\end{equation}
falls below a nominal level of choice $q\in (0,1)$, e.g., $q=0.1$ or $q=0.2$. Above, $\mathcal{H}_0 \subseteq \{1,\dots,d\} \setminus \mathcal{H}_1 $ contains the indices of the null features for which $H_{0,j}$ is true, $\mathcal{H}_1$ is the set of non-null features, and $|\cdot|$ returns the set-size. In words, the FDR is the expected proportion of true nulls among the rejected hypotheses. In our genetic example, the ability to control the FDR allows us to form a list of discoveries such that the majority of the selected mutations are expected to be conditionally associated with drug resistance, on average. This information may be valuable when allocating costly resources, required to further study the implications of the reported discoveries \cite{hawinkel2019broken, manolio2009finding}. The power of the selection procedure (larger is better) is defined as $
\mathbb{E}\left[ {| \hat{\mathcal{S}} \cap \mathcal{H}_1 |} / {|\mathcal{H}_1|}\right]$, being the expected proportion of non-nulls that are correctly selected among all the true non-nulls.
Controlling the FDR can be achieved by plugging the list of p-values $p_j,$ $j=1,\dots, d$ into the Benjamini-Hochberg procedure (BH)~\cite{BH}, as described in Section~\ref{sec:setup}. Importantly, the power of this feature selection procedure is affected by the ability of the underlying conditional independence test to generate small p-values for the non-null features, indicating strong evidence against the corresponding null hypotheses. Our goal in this work is to increase the power of the above controlled feature selection pipeline by forming data-driven test statistics that powerfully separate non-nulls from nulls.
The model-X conditional randomization test \cite{Knockoffs} and its computationally efficient version---the holdout randomization test (HRT) \cite{HRT} that we study in this paper---are methods for conditional independence testing that gain a lot of attention in recent years. These tools are very attractive since they can leverage any powerful predictive model to rigorously test for $H_{0,j}$, under the assumption that the distribution of the explanatory features $P_X$ is known. As such, model-X tests are especially beneficial in situations where copious amount of \emph{unlabeled} data is available compared to labeled data, e.g., as happen in genome wide association studies \cite{GenomCRT,GWASFDR,geneticTwins}. At a high level, the HRT is carried out by sampling a dummy copy $\tilde{X}_j$ of the original feature $X_j$ such that $\tilde{X}_j$ is independent of $Y$ given $X_{-j}$ by construction. In our running example, one can think of $\tilde{X}_j$ as a fake genetic mutation (sampled by a computer program) that does not carry any new information about $Y$ if we already know all the other mutations.
The test proceeds by comparing, for each observation, the accuracy of a given predictive model applied to (i) the original feature vector $X$, and (ii) its modified version for which only $X_j$ is replaced by $\tilde{X}_j$. Here, a decrease in the overall accuracy can serve as an evidence that $X_j$ is associated with $Y$ after accounting for the effect of $X_{-j}$.
In practice, the HRT is deployed by \emph{treating the machine learning model as a black-box}, fitted to maximize predictive accuracy with the hope to attain good power. However, the ultimate objective here is to maximize the power of the test and not merely the model's accuracy, and, currently, there is no method to balance between the two. To stress this point further, there is a growing evidence that modern machine learning algorithms tend to excessively rely on spurious features---null features that are solely correlated with the non-null ones---to make accurate predictions \cite{spurious1,spurious2,arjovsky2019invariant,peters2015causal,khani2021removing}. Loosely speaking, in such cases, the model tends to up-weight the importance of null features at the cost of down weighting the importance of the non-nulls. The consequence of this undesired phenomenon is that the predictive model may only show a mild drop in accuracy when replacing an important feature with its dummy copy. This renders the test to lose power, as the test accounts for the effect of the spurious correlations by design.
\subsection*{Our contribution}
We propose, for the first time, novel learning schemes to fit models that are designed to \emph{explicitly} increase the power of the HRT. This is done by `looking ahead' (during training) to what will happen when the predictive model is integrated within the HRT procedure. This stands in striking contrast with the common practice, in which the model is merely trained to maximize accuracy to the extent possible.
Concretely, the core of our contribution is the formulation of a novel loss function that encourages the model's accuracy to drop when replacing the original feature $X_j$ with the dummy one $\tilde{X}_j$, seeking \emph{maximum risk discrepancy} (MRD).
We introduce in Section~\ref{sec:proposed} a general, theoretically motivated, stochastic optimization procedure that enables us to augment our MRD loss to existing cost functions used in the variable selection literature, e.g., sparsity promoting penalty for deep neural networks.
That section also includes a specialized learning scheme to fit sparse linear regression models (such as lasso) with our proposed loss. Extensive experiments on synthetic and real data sets are presented in Section~\ref{sec:experiments}, showing that the combination of the proposed MRD approach with existing regression algorithms \emph{consistently improves} the power of the underlying controlled feature selection procedure. {In particular, in cases where the signal is weak (i.e., in low power regimes), our method may even achieve more than 90\% relative improvement compared to existing methods.} Importantly, the MRD scheme preserves the validity guarantee of the p-values generated by HRT.
Furthermore, we demonstrate that our new proposal is fairly robust to situations where the distribution of $P_X$---required to sample the dummy features---is estimated from data. These situations are of course ubiquitous in real-world applications.
Lastly, a software package that implements our methods is available at \url{https://github.com/shaersh/MRD}.
\section{Background}
\subsection{Model-X randomization test}
\label{model_x}
The model-X randomization test provides a valid p-value for $H_{0,j}$ in finite samples without making modeling assumptions on the conditional distribution of $Y \mid X$. However, this approach assumes that the conditional distribution of $X_j \mid X_{-j}$ is known.
The original conditional randomization test (CRT), developed in \cite{Knockoffs}, requires fitting a regression model many times in order to be carried out precisely. The HRT, which is extensively used in this paper,
bypasses this computational issue at the expense of data splitting. Specifically, this test starts by dividing the data into disjoint training and testing sets. The training set is used to fit an arbitrary regression model $\hat{f}$, formulating a test statistic function $T(X_j, X_{-j},Y;\hat{f}) \in \mathbb{R}$, e.g., the model's prediction error.
Let $\{(X_i,Y_i)\}_{i\in\mathcal{I}}$ be the samples of the testing set. The HRT proceeds by repeating the following two steps for each $k=1,\dots,K$ (treating $\hat{f}$ as a fixed function):
\begin{itemize}
\item Sample a dummy feature $\tilde{X}^i_j \sim P_{X_j|X_{-j}}(X_j^i|X_{-j}^i)$, for all samples in the test set $i\in\mathcal{I}$.
\item Compute the test statistic using the dummy variables $$\tilde{t}_j^{(k)} \gets \frac{1}{|\mathcal{I}|} \sum_{i\in\mathcal{I}} T(\tilde{X}_{j}^i,X_{-j}^i,Y^i;\hat{f}).$$
\end{itemize}
Finally, a p-value $\hat{p}_j$ for $H_{0,j}$ is constructed by computing the empirical quantile {level} of the true test statistic $t^* \gets \frac{1}{|\mathcal{I}|} \sum_{i\in\mathcal{I}} T(X_j^i, X_{-j}^i,Y^i;\hat{f})$ among the dummy statistics $\tilde{t}_j^{(1)},\dots,\tilde{t}_j^{(K)}$:
\begin{equation} \label{eq:p-value}
\hat{p}_j=\frac{1+ \left| \{ k : t^* \geq \tilde{t}_j^{(k)} \}\right|}{{K+1}}.
\end{equation}
Importantly, the p-value $\hat{p}_j$ in \eqref{eq:p-value} is valid, i.e., $\mathbb{P}[\hat{p}_j \leq \alpha \mid H_{0,j} \ \text{is true}] \leq \alpha$. This is because (i) $\tilde{X}_j \perp \!\!\! \perp Y \mid X_{-j}$ by construction, and (ii) under the null, the random variables $t^*, \tilde{t}_j^{(1)}, \dots, \tilde{t}_j^{(K)}$ are exchangeable \cite{Knockoffs}.
The validity of the p-value holds true for any choice of predictive model $\hat{f}$, and for any choice of test statistic $T(\cdot)$ used to compare the distributions of $(Y, {X}_j, X_{-j})$ and $(Y, \tilde{X}_j, X_{-j})$. The authors of \cite{TheoCRT} proved that the likelihood ratio is the most powerful statistic, however, it requires the knowledge of the true conditional distribution of $Y \mid X$, which is unknown. In practice, a common choice for a test statistic---which we use in our proposal as well---is the empirical risk \cite{HRT,geneticTwins}:
\begin{equation}
T(X_j, X_{-j},Y;f)=(Y-\hat{f}(X_j, X_{-j}) )^2,
\label{HRT_tstat}
\end{equation}
where we use the notation $\hat{f}(X_j, X_{-j}) = \hat{f}(X)$ to stress that $\hat{f}$ is applied on the vector $X$ with its original $j$th feature $X_j$, whereas $\hat{f}(\tilde{X}_j, X_{-j})$ is applied to the same feature vector except that the original $X_j$ is replaced by its dummy copy $\tilde{X}_j$. To handle the controlled feature selection problem, the HRT p-values $p_j$, $j=1,\dots,d$ are most often plugged into the Benjamini-Hochberg procedure (BH)~\cite{BH} procedure, as discussed next.
\subsection{FDR control via the BH procedure} \label{sec:setup}
Armed with a list of $d$ p-values $p_j$, one for each $H_{0,j}$, we can apply the BH procedure~\cite{BH} to control the FDR. This method operates as follows. First, sort the given $d$ p-values in a non-decreasing order; we denote by $p_{(k)}$ and $H_{0,(k)}$ the $k$th smallest p-value and its corresponding null-hypothesis, respectively. Then, for a given FDR target level $q$, find the largest $k_0$ such that $p_{(k_0)} \leq \frac{k_0}{d}q$. Lastly, reject the null hypotheses $H_{0,(1)}, H_{0,(2)}, \dots, H_{0,(k_0)}$. Importantly, the procedure described above is guaranteed to control the FDR under the assumption that the p-values are independent. While the p-values we construct in this work do not necessarily satisfy the independence assumption, it is known that the BH procedure often controls the FDR empirically even when the p-values are dependent (except adversarial cases). This empirical observation is also endorsed in our experiments, standing in line with many other methods that plug the dependent p-values generated by CRT/HRT into the BH procedure \cite{HRT,Knockoffs}.
With that said, it is worth noting that there exists a variant of the BH that provably controls the FDR for any arbitrary dependency structure of $p_j,$ $j=1,\dots,d$, however, this comes at the cost of reduced power~\cite{BY}.
\section{The proposed method}
\label{sec:proposed}
In this section, we introduce our MRD approach to fit predictive models with the goal of explicitly improving the power of the test. We begin by describing the theoretical motivation behind our proposal. Then, we present a general learning scheme to fit an arbitrary predictive model (e.g., a neural network) using the MRD loss. Lastly, we design a specialized learning scheme for sparse linear regression problems.
\subsection{Main idea}
A central definition in our proposal is that of the risk discrepancy, expressed as
\begin{equation}\label{eq:population_RD}
\textrm{RD}_j = \mathbb{E}[T(Y,\tilde{X}_j,X_{-j}; \hat{f}) - T(Y,X_j,X_{-j}; \hat{f})],
\end{equation}
where $\hat{f}$ is a fixed (pre-trained) predictive model, and $T(\cdot)$ is the squared error~\eqref{HRT_tstat}.
In the context of the HRT (Section~\ref{model_x}), a test with good power would have large and positive empirical risk discrepancy for the non-null features ${j \in \mathcal{H}_1}$.
Therefore, during training, we wish to encourage the model $\hat{f}$ to maximize $\textrm{RD}_j$ \emph{only for that group of features}. While this is infeasible because we do not have apriori knowledge of which of the features are in $\mathcal{H}_1$, we do have access to the sampling distribution of the conditional null through the sampling of the dummy copies $\tilde{X}_j$. This property is formally presented in the following well-known result in the model-X literature \cite{Knockoffs}, which we will use later to formulate our loss.
\begin{prop}
Take $(X,Y) \sim P_{XY}$, and let $\tilde{X}_j$ be drawn independently from $P_{X_j \mid X_{-j}}$ without looking at $Y$. If $Y \perp \!\!\! \perp X_j \mid X_{-j}$, then $(Y,\tilde{X}_j,X_{-j}) \overset{d}{=} (Y,{X}_j,X_{-j})$.
\label{prop1}
\end{prop}
\noindent Above, the notation $\overset{d}{=}$ stands for equality in distribution. For completeness, the proof of the above statement is given in Supplementary Section~\ref{supp:proofs}.
A consequence of Proposition~\ref{prop1}, important to our purposes, is given in the next corollary; see also \cite{RFI}.
\begin{corollary}
Let $\hat{f}$ be a fixed predictive model, and $T(\cdot; \hat{f})$ be any test statistic.
Under the setting of Proposition~\ref{prop1}, if $(Y,\tilde{X}_j,X_{-j}) \overset{d}{=} (Y,{X}_j,X_{-j})$, then $\mathbb{E}[T(Y,\tilde{X}_j,X_{-j}; \hat{f}) - T(Y,X_j,X_{-j}; \hat{f})]=0$.
\label{corollary1}
\end{corollary}
\noindent This motivates our formulation of a training procedure that drives the model to a solution in which the empirical risk discrepancy (evaluated on the training data) is maximized for all features, knowing that this quantity is guaranteed to be small for the null features at test time. In fact, in Proposition~\ref{prop2}, which is presented formally in Section \ref{sec:linear_mrd}, we prove that for a linear model with uncorrelated features, the solution that minimizes the population version of our objective function would result in estimated regression coefficients that are guaranteed to be zero for the null features.
\subsection{A general learning scheme}
\label{sec:gen_scheme}
\begin{algorithm}[t]
\textbf{Input}: Training data $\{(X^i,Y^i)\}_{i=1}^m$; predictive model $f_\theta$ with parameters $\theta$; step size $\eta$; baseline objective hyperparameters; MRD hyperparameter $\lambda$; number of features to generate $1 \leq N \leq d$.
\begin{algorithmic}[1]
\FOR{$k = 1,\dots,K$}
\STATE $\textrm{Sample a random subset of features } \mathcal{P} \subseteq \{1 \cdots\ d\} \textrm{ of the size } N.$
\STATE $\textrm{Generate a dummy }\tilde{X}_j^i \textrm{ for each training point } X_i \textrm{ and for each } j \in \mathcal{P}$.
\STATE Update the model parameters $\theta$ using stochastic gradient descent:
$$
\theta^{k+1} \leftarrow \theta^k - \eta \nabla_\theta \bigg[ (1-\lambda) \mathcal{J}_{\mathrm{base}}(\textbf{Y},\textbf{X};f_\theta) +\frac{\lambda}{|\mathcal{P}|} \sum_{j \in \mathcal{P}} \mathcal{D} (z(f_\theta),\tilde{z}(f_\theta)) \bigg],
$$
where $z(f_\theta),\tilde{z}(f_\theta)$ stress that $z, \tilde{z}$ are functions of $\theta$.
\ENDFOR
\end{algorithmic}
\vspace{0.1cm}
\textbf{Output}: A fitted model $\hat{f}$.
\caption{Fitting an MRD model}
\label{alg:general_optimization}
\end{algorithm}
We now formalize the idea presented above. Given a training set of $m$ i.i.d samples $\{(X^i,Y^i)\}_{i=1}^m$, our procedure begins with a generation of a dummy copy $\tilde{X}^i_j$ for each sample and feature:
\begin{equation*}
\tilde{X}^i_j \sim P_{X_j \mid X_{-j}}(X^i_j \mid X^i_{-j}), \quad i=1,\dots,m, \ \ j = 1 \dots d.
\label{synthetic}
\end{equation*}
Denote the collection of training features by $\textbf{X} \in \mathbb{R}^{m \times d}$, where $X^i$ is the $i$th row in that matrix, and by $\textbf{Y} \in \mathbb{R}^{m}$ a vector that contains the response variables $Y^i$ as its entries. Let $\mathcal{J}_{\textrm{base}}(\textbf{Y},\textbf{X}; f)$ be the objective function of the base predictive model, expressed as
\begin{equation}
\mathcal{J}_{\textrm{base}}(\textbf{Y},\textbf{X}; f) = \frac{1}{m} \sum_{i=1}^m \ell(f(X^i),Y^i) + \alpha\mathcal{R}(f).
\label{baseline_objective}
\end{equation}
Above, the loss function $\ell$ measures the prediction error (MSE in our experiments), $\mathcal{R}$ is a regularization term, and the hyperparameter $\alpha$ trades off the importance of the two. With this notation in place, our proposal aims to minimize the following cost function:
\begin{equation}
\hat{f}(x) = \underset{f\in \mathcal{F}}{\textrm{argmin}} \ (1-\lambda) \mathcal{J}_{\textrm{base}}(\textbf{Y},\textbf{X}; f) + \frac{\lambda}{d} \sum_{j=1}^{d} {\mathcal{D}( z, \tilde{z}_j)},
\label{mrd_objective}
\end{equation}
where $z=\frac{1}{m} \sum_{i=1}^m {T(Y^i,X_j^i,X_{-j}^i;f)}$ and $\tilde{z}_j=\frac{1}{m} \sum_{i=1}^m {T(Y^i,\tilde{X}_j^i,X_{-j}^i;f)}$ are the empirical risks of the model evaluated on the original and synthetic triplets, respectively.
The function $\mathcal{D}(z, \tilde{z}_j)\in \mathbb{R}$ measures the difference between $z$ and $\tilde{z}_j$, such that $\mathcal{D}(z, \tilde{z}_j)$ gets smaller as $ \tilde{z}_j$ becomes larger than $z$. Therefore, \eqref{mrd_objective} seeks a model $\hat{f}$ that aligns with the base objective $\mathcal{J}_{\textrm{base}}$ while creating a better separation between $z$ and $\tilde{z}_j$. The parameter $\lambda \in [0,1]$ sets the relative weight between the two functionals; we present a simple, automatic approach for tuning this parameter in Supplementary Section~\ref{supp:models}.
In practice, we define $\mathcal{D}$ as follows: $\mathcal{D}(z,\tilde{z}_j)=\sigma(z-\tilde{z}_j),$ where $\sigma(\cdot)$ is the Sigmoid function, i.e., $\sigma(s)=1/(1+e^{-s})$.
Of course, other forms of this function, such as the ratio $z / \tilde{z}_j $, can be considered.
For ease of reference, Algorithm~\ref{alg:general_optimization} presents a general approach for minimizing~\eqref{mrd_objective}. In short, we use stochastic optimization and back-propagation, where each gradient step updates the model parameters by resampling $\tilde{X}_j$ for a subset of features from $\{1,\dots,d\}$. In Supplementary Section~\ref{supp:optim} we provide a weak form of convergence of this algorithm, where the analysis requires $\mathcal{D}(\cdot)$ to be bounded from below. A requirement that is satisfied by our choice to use the Sigmoid function.
Algorithm~\ref{alg:general_optimization} is used in our experiments, implemented with a neural network as the base predictive model.
\subsection{A scheme for sparse linear regression}
\label{sec:linear_mrd}
Next, we offer an optimization procedure tailored for the choice of sparse linear regression as the base objective, since it is widely used in the feature selection literature and often results in a powerful test~\cite{Knockoffs_original,HRT}.
To this end, consider the combination of the elastic net objective~\cite{eNet} with our MRD loss:
\begin{equation*}
\label{sparse_reg_objective_MRD}
\begin{array}{ll}
\hat{\beta} = \underset{\beta}{\textrm{argmin}} \ (1-\lambda)\bigg(\underbrace{\frac{1}{2m} || \textbf{X}\beta - \textbf{Y}||^2_2 + \alpha_1 ||\beta||_1 + \frac{\alpha_2}{2}||\beta||_2^2}_{\mathcal{J}_{\textrm{base}}(\textbf{Y},\textbf{X}; f)}\bigg) + \frac{\lambda}{d} \sum_{j=1}^{d} {\mathcal{D}( z(\beta), \tilde{z}_j(\beta))},
\end{array}
\end{equation*}
where $\beta \in \mathbb{R}^d$ is the regression coefficient vector,
and $\alpha_1,\alpha_2$ are the elastic net penalty parameters. Above, we use the notations $z(\beta)$ and $ \tilde{z}_j(\beta)$ to stress that $z$ and $ \tilde{z}_j$ are functions of $\beta$.
Using variable splitting, we can separate the sparsity promoting penalty from the remaining terms, and solve the resulting optimization problem using the alternating direction method of multipliers ADMM \cite{ADMM}; see Supplementary Section~\ref{supp:sparse} for more details. Following Supplementary Algorithm~\ref{alg:admm}, the advantage of the above splitting strategy is that the minimization with respect to $\beta$ has a closed-form solution, being a simple projection onto the elastic net ball~\cite{enet_proj,enet_proxi}. In practice, we run this iterative algorithm until the stopping criteria suggested by \cite[Section 3.3]{ADMM} is met.
We conclude this section by showing that under the assumptions of Proposition~\ref{prop2}, the estimated coefficients of the null features $\hat{\beta}_j, j \in \mathcal{H}_0$ obtained by minimizing the MRD objective will be equal to zero. The proof is provided in Supplementary Section~\ref{supp:proofs}.
\begin{prop}
Suppose that the population model is linear $Y=X^T\beta+\epsilon$, where $\mathbb{E}[X_jX_k]=0$ for $1 \leq k \neq j \leq d$, and $\mathbb{E}[\epsilon X_j] = 0 $ for all $1\leq j \leq d$. Denote by $\hat{\beta}$ a solution to the infinite-data version of the MRD:
\begin{align}
&\hat{\beta} = \underset{\beta}{\textup{argmin}} \ (1-\lambda)\mathbb{E}{[(X^T\beta - Y)^2]} +\frac{\lambda}{d} \sum_{j=1}^d {\sigma(\mathbb{E}[T(Y,\tilde{X}_j,X_{-j}; \beta) - T(Y,X_j,X_{-j}; \beta)])}.
\end{align}
Under the above assumptions, for any $0 \leq \lambda < 1$, and for all $j \in \mathcal{H}_0$ with $\beta_j=0$, the solution $\hat{\beta}$ satisfies that $\hat{\beta}_j = 0$ for all $j \in \mathcal{H}_0$.
\label{prop2}
\end{prop}
\section{Related work}
\label{sec:related}
\subsection{Handling unknown conditionals}
\label{sec:unknown_p}
Our proposed method inherits the model X assumption that the marginal distribution $P_X$---required to sample $\tilde{X}_j$---is known: this assumption is needed to guarantee that \eqref{eq:p-value} is a valid p-value \cite{Knockoffs}. However, in most real-world applications $P_X$ is unknown and thus must be estimated from the data. Here, dummy features of poor quality may break the validity of model-X randomization tests \cite{DeepKnockoffs, HRT, Contra}, including our proposal. To alleviate this concern, model X tests are equipped with various methodologies to estimate $P_X$, including a second-moment multivariate Gaussian estimator \cite{Knockoffs}, mixture density networks \cite{HRT}, generative adversarial networks \cite{GANCRT}, moment matching networks \cite{DeepKnockoffs}, and more \cite{sesia2019gene,sudarshan2020deep, gimenez2019knockoffs,Contra}.
Furthermore, model-X tests are also equipped with diagnostic tools to improve the confidence in the results obtained by this method when the conditionals are unknown. These tools include goodness-of-fit tests, designed to quantify the quality of the generated dummies, as well as controlled semi-synthetic experiments with simulated response variables that allow the user to compare the obtained empirical FDR with the desired level \cite[Section~5]{DeepKnockoffs}.
Importantly, empirical evidence show that the model-X tests are robust in the sense that the FDR is often controlled in practice, especially when the testing procedure is applied with well-approximated dummy features. This is also corroborated by our experiments on real and simulated data: we practically obtain FDR control even when using the simplest Gaussian approximation to the unknown~$P_X$, highlighting the robustness to model misspecification of the HRT in general, and our proposal, in particular.
\subsection{Relevant prior art}
Our proposal is connected to the two-stage ``learn-then-test'' approach, initiated by the influential work of~\cite{optimal_2sample} in the context of kernel-based tests. The original idea here is to optimize the kernel parameters in order to maximize the power of the underlying test, where ample evidence shows that this approach is extremely fruitful \cite{optimal_2sample,kernelized_discrepancy,kernel_to_fit}. These contributions are in line with our proposal, although the latter is different as it is tailored to work in combination with the HRT.
Recently, new deep learning methods for feature selection have been proposed to improve data analysis with non-linear interactions. In particular, \cite{CancelOut,LassoNet,stochastic_gates} offer sparsity-promoting layers that can be combined with arbitrary neural network architectures. These techniques can be combined with our MRD framework, as demonstrated in Section~\ref{sec:experiments}, where we utilize the CancelOut regularizer developed in~\cite{CancelOut}. A different but related line of work is that of instance-wise interpretability methods, aiming at identifying a subset of relevant features for a single data point \cite{l2x,invase}.
While this line of work is outside the scope of this paper, we believe these methods may benefit from our MRD approach when combined with the test proposed in \cite{burns2020interpreting}, which extends the HRT to the instance-wise feature selection setting.
\section{Experiments}
\label{sec:experiments}
In this section, we study the performance of the proposed MRD approach in a wide variety of settings. These include experiments with linear and nonlinear simulated data of varying signal strength and sample size, model misspecification experiments, and similar experiments with semi-synthetic and real data. The conclusion of this comprehensive study is that the MRD approach \emph{consistently} improves the power of HRT, more significantly in low power~regimes.
\subsection{Synthetic experiments}
\label{sec:syn_exp}
To evaluate the performance of our methods, we implement variable selection in a fully controlled synthetic setting in which the distribution of $X$ and $Y \mid X$ are known. This experimental setting allows us to study the validity and statistical efficiency of a wide variety of predictive models $\hat{f}$ integrated with the HRT.
Following \cite{Knockoffs,DeepKnockoffs,DeepPink}, we generate $X\in \mathbb{R}^d$ of dimension $d=100$ from a multivariate Gaussian distribution $\mathcal{N}(0,\Sigma)$ with $\Sigma_{i,j}=\rho^{|i-j|}$ and an auto-correlation parameter $\rho$. The response $Y \in \mathbb{R}$ is sampled from a sparse regression model of the form
\begin{equation} \label{eq:y-mid-x}
Y = g(X) + \epsilon,
\end{equation}
where $\epsilon \sim \mathcal{N}(0,1)$ is the noise component and $g$ is a link function. Throughout the synthetic experiments we consider the following conditional models of $ Y \mid X$:
\begin{itemize}
\item \textbf{M1: linear model}, with $g(X)= X^{\top}\beta$, where $\beta \in \mathbb{R}^d$ has $30\%$ randomly chosen non-zero entries of a random sign and a magnitude equal to $c$.
\item \textbf{M2: polynomial model}, we follow \cite{DeepPink} and set a nonlinear $g(X)= (X^{\top}\beta)^3/2$, where $\beta$ is chosen as described in \textbf{M1}.
\item \textbf{M3: sum of sines} is another nonlinear model we explore, with $g(X) = \sum_{j \in \mathcal{H}_1} {\sin{(X_j\beta_j)}}$. Here, $X_j$ and $\beta_j$ are the $j$th entries of $X$ and $\beta$, respectively; $\beta$ is defined as in \textbf{M1}.
\item \textbf{M4: interaction model}, a challenging nonlinear model with $g(X) = \sum_{j=1}^{15} { X_{2j}X_{2j-1} }$.
\end{itemize}
Note that for data models \textbf{M1}-\textbf{M3}, a variable $X_j$ is in the non-null set $j \in \mathcal{H}_1$ if and only if $\{j=1,\dots,d : \beta_j \neq 0\}$. In the same vein, \textbf{M4} has 30 non-null variables, those who appear in the function $g(x)$.
\noindent To apply the test, we first draw $m$ training examples from $P_{XY}$, which are used to fit a predictive model of choice. We then generate an additional independent set of $m$ test points, which are used to compute a p-value for each of the hypotheses $H_{0,j}, j=1,\dots,d$.
We use lasso, elastic net, and neural network as baseline models, where the latter is deployed only in the non-linear setting. See Supplementary Section~\ref{supp:models} for additional information on the training strategy and choice of hyperparameters. We apply our MRD algorithm in combination with the above methods using the same choice of hyperparameters. In addition, we set the RD penalty parameter $\lambda$ to be proportional to the validation error of the base predictive model. Supplementary Section~\ref{supp:models} describes how we evaluate this error for each base model. All models are fit by normalizing the features and response variables to have a zero mean and unit variance.
\subsubsection{An illustrative example}
\label{sec:illustrative_example}
We begin with a synthetic experiment that demonstrates the effect of our proposed training scheme on the power of the selection procedure.
To this end, we use $m=400$ samples for training, fix the auto-correlation parameter $\rho$ to be $0.1$, and construct $ Y \mid X$ that follows a polynomial data generating function (\textbf{M2}) with a signal amplitude $c=0.14$.
As a baseline for reference, we fit a lasso regression model on the training set using ADMM \cite{ADMM}, where the lasso penalty parameter is tuned via cross-validation. To analyze the influence of the model on the power of the HRT, we measure the extent to which the \emph{test} mean squared error (MSE) is increased after replacing $X_j$ by its dummy copy $\tilde{X}_j$; this difference serves as an empirical estimate of $\textrm{RD}_j$ \eqref{eq:population_RD}, which we denote by $\widehat{\textrm{RD}}_j$. Recall that in the context of the HRT, a positive $\widehat{\textrm{RD}}_j$ serves as an evidence against the null, since $\tilde{t}_j > t^*$ in~\eqref{eq:p-value}.
The left panel of Figure~\ref{fig:sim_lasso} presents selected quantiles of $\{\widehat{\textrm{RD}}_j, j\in\mathcal{H}_1\}$ and $\{\widehat{\textrm{RD}}_j, j\in\mathcal{H}_0\}$ as a function of the ADMM iterations, where the $\widehat{\textrm{RD}}_j$ scores are evaluated on an independent test set. As can be seen, the quantiles that represent the non-null set increase as the training progresses, demonstrating an improvement in the sensitivity of the model to the replacement of these features by their dummy copies. Notice that the lower 25th percentile reaches a final value that is relatively close to the scores that correspond to the null set $\{\widehat{\textrm{RD}}_j : j \in \mathcal{H}_0\}$.
Another important observation is that most of the null scores are approximately equal to zero, implying that the swap of these features with their dummy copies does not lead to significant variations in the test statistics.
Next, we fit the proposed MRD lasso model on the same training data. The test error obtained by our model is similar to that of the baseline approach; both result in a root mean squared error (RMSE) that is equal to 0.95. Also, similarly to the baseline model, the quantiles of the null $\widehat{\textrm{RD}}_j$ scores are close to zero, as shown in the right panel of Figure~\ref{fig:sim_lasso}. This phenomenon exemplifies Corollary~\ref{corollary1}. Turning to the non-null set, we can see that all the quantiles of $\{\widehat{\textrm{RD}}_j : j\in \mathcal{H}_1\}$ obtained by our MRD model increase with the training iterations, reaching final values that are higher than the baseline approach.
This advantage is corroborated by comparing the power of the selection procedure, applied with a target FDR level of $q=0.2$. The empirical power (averaged over 100 independent experiments) obtained by the MRD model is equal to 0.521, higher than the one of the baseline model that equals 0.453. In addition, each method results in an empirical FDR that falls below the nominal rate. Here, the MRD lasso is less conservative, obtaining an FDR of 0.097 whereas the base lasso model results in 0.054.
\begin{figure}[t]
\centering
\includegraphics[width=0.9\textwidth]{figs/motivating_fig_adaptive_lambda.png}
\caption{Empirical risk difference evaluated on test data as a function of the training iterations. Left: baseline lasso model. Right: the proposed MRD method. The red (lasso) and blue (proposed method) curves represent the 25th, 50th, and 75th percentiles of the $\{\widehat{\textrm{RD}}_j : j \in \mathcal{H}_1\}$. The green (lasso) and orange (proposed method) color-shaded curves represent the 75th percentile of $\{\widehat{\textrm{RD}}_j : j \in \mathcal{H}_0\}$. To reduce randomization (for
exposition purposes), each point is evaluated by averaging $\widehat{\textrm{RD}}_j$ over 100 independent realizations of $\tilde{X}_j$.
}
\label{fig:sim_lasso}
\vspace{-0.3cm}
\end{figure}
\subsubsection{Experiments with varying signal strength}
\label{sec:signal_strength}
In the illustrative example presented above we focused on a fixed signal amplitude and sample size, as well as a particular base predictive rule---lasso regression.
We now turn to study the effect of the MRD scheme more systematically, by varying the signal-to-noise ratio and also include additional predictive models. We set $m=400$ as before, but now we increase the auto-correlation parameter to $\rho=0.25$.
We begin with the polynomial model \textbf{M2} for $Y \mid X$, where we control the signal-to-noise ratio by varying the signal magnitude $c$. The empirical power ($q=0.2$) evaluated for each predictive model is summarized in Table \ref{tab:non_linear_sim_0.2}. As displayed, our MRD approach consistently improves the power of all base models, where the gain is more significant in the low power regime. Notice that the largest improvement is achieved when using lasso as a base model and the smallest gain for the choice of a neural network model (referred as NNet). In terms of the actual power obtained by each method, we typically receive the following relation in this experiment: MRD elastic net $>$ MRD lasso $>$ elastic net $>$ lasso $>$ MRD neural network $>$ neural network. Supplementary Table~\ref{non_linear_sim_0.2_full} presents the and root mean squared error (RMSE) obtained for each machine learning model, showing that the MRD loss tends to achieve RMSE similar to that of the base models. This table also includes comparisons to kernel ridge and random forest, concluding that our MRD elastic net is the most powerful method in this experiment.
Turning to the validity of the selection procedure, following Supplementary Table~\ref{non_linear_sim_0.2_full}, we observe that all methods obtain FDR below the nominal 20\% level, across all data sets. Here, the MRD versions of lasso and elastic net are less conservative in the sense that they obtain higher empirical FDR compared to their base models, whereas the MRD neural network model has comparable FDR to that of its base model.
We also perform a similar analysis to the one presented above for the sum of sines model \textbf{M3} as well as for the linear model \textbf{M1}. We summarize the results in Supplementary Section~\ref{sec:pow_q} for the linear setting and in Supplementary Section~\ref{supp:link_func_} for the non-linear one. The overall trend in both settings is similar to the one presented above: the MRD approach improves the power of the base models, and the FDR is controlled empirically. Lastly, Supplementary Section~\ref{sec:single_hyp} demonstrates that the MRD approach outperforms the baseline methods when testing for a single non-null hypothesis for a wide range of signal strength values. This experiment isolates the effect of the MRD penalty on the resulting power compared to the FDR experiments that account for multiplicity by design.
\begin{table}[t]
\caption{Synthetic non-linear data with varying signal strength $c$. The table presents the empirical Power (using FDR target level $q=0.2$) evaluated by averaging over 100 independent experiments, and the relative improvement (\% imp.) of the MRD models. See Supplementary Table~\ref{non_linear_sim_0.2_full} for FDR values.}
\label{tab:non_linear_sim_0.2}
\centering
\resizebox{0.75\textwidth}{!}{\begin{tabular}{@{}cllcllcllc@{}}
\toprule
&\multicolumn{3}{c}{Lasso}&
\multicolumn{3}{c}{Elastic Net}&
\multicolumn{3}{c}{NNet}
\\
\cmidrule(r){2-4}
\cmidrule(r){5-7}
\cmidrule(r){8-10}
$c$ &Base & MRD & \% imp. &Base & MRD & \% imp.&Base & MRD & \% imp.\\
\midrule
0.13&0.155&0.243&56.8&0.199&0.269&35.2&0.142&0.156&9.9\\
0.14&0.343&0.435&26.8&0.389&0.454&16.7&0.272&0.291&7.0\\
0.15&0.540&0.606&12.2&0.583&0.621&6.5&0.441&0.455&3.2\\
0.16&0.706&0.740&4.8&0.728&0.753&3.4&0.566&0.606&7.1\\
0.17&0.818&0.841&2.8&0.832&0.848&1.9&0.673&0.692&2.8\\
0.18&0.885&0.898&1.5&0.893&0.900&0.8&0.741&0.768&3.6\\
\bottomrule
\end{tabular}}
\end{table}
\subsubsection{Experiments with varying sample size}
\label{sec:sample_size}
Thus far we only considered data with a fixed number of samples. In what follows, we study the performance of the proposed MRD approach as a function of the sample size $n$. One can view this as a different way to modify the signal-to-noise ratio in the data, as the power is expected to increase as the sample size increases. We focus on the polynomial model \textbf{M2} for $Y \mid X$ with a correlated design in which the auto-correlation parameter $\rho=0.25$. We generated data with a fixed signal strength $c=0.1$, so that the power will be relatively low for the smallest sample size $n$. Table~\ref{tab:big_n_over_p} summarizes the results, where we deployed only lasso and MRD lasso to ease with the computational load. Following that table we can see that the MRD approach consistently improves the power of the baseline model, while keeping the FDR under control.
\begin{table}[t]
\caption{Synthetic experiments with non-linear data (\textbf{M2}) with varying number of samples $n$. The empirical FDR (nominal level $q=0.2$) and power are evaluated by averaging over 50 independent experiments. All standard errors are below 0.02.}
\label{tab:big_n_over_p}
\fontsize{8}{8}\selectfont
\centering
\ra{1}
\begin{tabular}{cllllc}
\toprule
&\multicolumn{2}{c}{MRD Lasso}&
\multicolumn{2}{c}{Lasso}&\multicolumn{1}{c}{\% imp. of}
\\
\cmidrule(r){2-3}
\cmidrule(r){4-5}
$n$ &Power & FDR & Power & FDR& power \\
\midrule
1000 & 0.189 & 0.069 & 0.097 & 0.018&94.5 \\
1500 & 0.403 & 0.109 & 0.288 & 0.048&39.9 \\
2000 & 0.648 & 0.106 & 0.563 & 0.046&15.1 \\
2500 & 0.763 & 0.086 & 0.697 & 0.040&9.5 \\
3000 & 0.823 & 0.091 & 0.791 & 0.057&4.0 \\
4000 & 0.927 & 0.116 & 0.921 & 0.061& 0.7\\
\bottomrule
\end{tabular}
\end{table}
\subsubsection{Experiments with interaction model}
\label{sec:inter_model}
In the experiments presented thus far, lasso and elastic net were more powerful than neural networks, even when applied to nonlinear data. In fact, this phenomenon is in line with the experiments reported in \cite[Section~4]{HRT}. We now conduct experiments with a sparse interaction model for the data (\textbf{M4}), for which linear predictive models result in zero power in contrast to neural networks. The results are summarized in Figure~\ref{fig:inters_NN}; we do not include linear predictive models as they did not make any discovery.\footnote{Refer to Supplementary Section~\ref{supp:interaction} for additional details on the data generation process and the training strategy.} Notice that the MRD version of the neural network model achieves higher power than the base one, while controlling the FDR.
\begin{figure}[t]
\centering
\includegraphics[width=0.7\textwidth]{interaction_NN_new1.png}
\caption{{Synthetic experiments on a sparse interaction model (\textbf{M4}) with varying signal amplitude. Power and FDR ($q=0.2$) are evaluated on $50$ independent trials.}
}
\label{fig:inters_NN}
\end{figure}
\subsubsection{Experiments with cross-validation HRT}
\label{sec:cv_hrt}
A limitation of the HRT is the reliance on data splitting, which can lead to a power loss especially when the number of samples is limited.
When data is scarce, it is more sensible to deploy the cross-validation version of the HRT (CV-HRT) proposed in \cite[][Section 3.1]{HRT}. The CV-HRT leverages the whole data for training and testing, resulting in improved power compared to a single split.
In what follows, we study the effect of the MRD approach on the CV-HRT in a small sample size regime, where $n<d$. We explore both linear (\textbf{M1}) and nonlinear (\textbf{M2}) data generating functions, where with $c=1.5$ and $\rho=0.25$.
We implemented the CV-HRT with $K=8$ folds and use only lasso as the base predictive model to ease with the computational load. The results are summarized in Table~\ref{tab:n_over_p}, showing that (i) the power is increasing with $n$; (ii) the MRD lasso consistently outperforms the baseline method; and (iii) the FDR is controlled.
In Supplementary Section~\ref{sec:dcrt_compare} we also compare our method to the state-of-the-art dCRT \cite{dCRT} framework---a clever technique to reduce the computational cost of the original CRT while avoiding data splitting. In a nutshell, this is done by distilling the high-dimensional information that $X_{-j}$ contains on $Y$ into a low-dimensional representation before applying the CRT. Yet, the complexity of dCRT is often higher than that of the CV-HRT as the former requires to fit $d$ different predictive models---one for each leave-one-covariate-out version of the data---compared to $K$ leave-fold-out models in the CV-HRT. Section~\ref{sec:dcrt_compare} shows that once combining CV-HRT with our MRD approach we achieve competitive power to that of the dCRT.
\begin{table}[t]
\caption{Synthetic experiments with linear
(\textbf{M1}) and non-linear (\textbf{M2}) data with $n < d$. The empirical FDR (nominal level $q=0.2$) and power are evaluated by averaging over 50 independent experiments, using CV-HRT with 8 folds. All standard errors are below 0.03.}
\label{tab:n_over_p}
\fontsize{8}{8}\selectfont
\centering
\ra{1}
\begin{tabular}{cllllc}
\toprule
\multicolumn{6}{c}{Linear}\\
\cmidrule(r){1-6}
&\multicolumn{2}{c}{MRD Lasso}&
\multicolumn{2}{c}{Lasso}&\multicolumn{1}{c}{\% imp. of}
\\
\cmidrule(r){2-3}
\cmidrule(r){4-5}
$n$ &Power & FDR & Power & FDR& power \\
\midrule
40 & 0.070 & 0.044 & 0.047 & 0.060&48.9 \\
60 & 0.185 & 0.103 & 0.154 & 0.096&20.1 \\
70 & 0.367 & 0.105 & 0.304 & 0.106&20.7 \\
80 & 0.582 & 0.101 & 0.566 & 0.096&2.8 \\
90 & 0.868 & 0.077 & 0.867 & 0.072& 0.1\\
\bottomrule
\end{tabular}
\quad
\begin{tabular}{cllllc}
\toprule
\multicolumn{6}{c}{Non-Linear}\\
\cmidrule(r){1-6}
&\multicolumn{2}{c}{MRD Lasso}&
\multicolumn{2}{c}{Lasso}&\multicolumn{1}{c}{\% imp. of}
\\
\cmidrule(r){2-3}
\cmidrule(r){4-5}
$n$ &Power & FDR & Power & FDR & power \\
\midrule
80 & 0.067 & 0.081 & 0.055 & 0.056& 21.8\\
100 & 0.125 & 0.109 & 0.106 & 0.099& 17.9\\
150 & 0.389 & 0.113 & 0.345 & 0.103& 12.8\\
200 & 0.648 & 0.080 & 0.616 & 0.073& 5.2\\
250 & 0.788 & 0.071 & 0.776 & 0.064& 1.5\\
\bottomrule
\end{tabular}
\end{table}
\subsubsection{Experiments under model misspecification}
\label{sec:model_misspec}
In the experiments presented thus far we sample the dummy features $\tilde{X}_j$ from the true distribution of $X_j \mid X_{-j}$. In practice, however, we often have only access to an approximation of the unknown conditionals $X_j \mid X_{-j}$. In Supplementary Section~\ref{sec:misspec_lin}, we include experiments under such model misspecification.
There, we fit our MRD models and apply the HRT by sampling approximated dummy features from a data-driven estimation of $P_X$, rather than from the true one. We commence by conducting an experiment in which we control the accuracy of the estimated conditionals. This experiment demonstrates that an inflation of the empirical FDR occurs only when the sampled dummies are of poor quality, as measured by the covariance goodness-of-fit diagnostic proposed in \cite{DeepKnockoffs}. Next, we study three different settings of increasing difficulty. In the first, $X$ is generated from a correlated multivariate Gaussian, and we sample the approximated dummy features from a multivariate Gaussian whose parameters are estimated from the data. In the second, $X$ is sampled from a Gaussian Mixture Model (GMM), whereas the dummies are sampled from a fitted multivariate Gaussian, as described above. In the third, we sample $X$ from a correlated multivariate Student $t$-distribution. When using a naive multivariate Gaussian fit for $P_X$, we report a violation in FDR control since the estimated conditionals are of low quality.
However, when applying more flexible density estimation method---a Gaussian Mixture Model \cite{GMM}---our method is shown to control the FDR in practice, supporting the discussion from Section~\ref{sec:unknown_p}.
\subsubsection{The effect of the MRD penalty parameter}
\label{sec:additional}
In the interest of space, we refer the reader to Supplementary Section~\ref{supp:lambda} that illustrates the power of the test as a function of the MRD parameter $\lambda$ in low, medium, and high power regimes. This section shows that our automatic approach for selecting $\lambda$ achieves power that is relatively close to an oracle. This section also shows that, in the high power regime ($\approx 0.9$), inappropriate choice of $\lambda$ can reduce power compared to the base model. By contrast, in the low ($\approx 0.5$) and medium ($\approx 0.7$) power regimes, the power of the MRD approach is higher than the power of the base model for all values of $0<\lambda \leq 1$.
\subsection{Real-world application}
\label{sec:real-data}
We now apply our methods to a real-world application that already appears in the knockoff literature \cite{Knockoffs_original,DeepKnockoffs}. Here, the task is to reliably detect genetic mutations associated with changes in drug resistance among human immunodeficiency viruses (HIV) of type I \cite{HIV}; specifically, we study the resistance to the Lopinavir protease inhibitor drug. The response variable $Y$ represents the log-fold increase in drug resistance measured in the $i$th virus, and each of the features ${X}_j \in \{0,1\}$ indicates the presence or absence of a specific mutation. After applying the pre-processing steps described in \cite{DeepKnockoffs}, the data contains $n=1555$ samples with $d=150$ features. Supplementary Section~\ref{supp:real-data} provides additional details about this data.
Importantly, in contrast to the fully controlled setup from Section~\ref{sec:syn_exp}, here $P_X$ is unknown and thus must be estimated. (Recall that in Supplemetary Section~\ref{sec:misspec_lin} we also study the robustness of MRD to model misspecification.) Here, we approximate $P_X$ by fitting a multivariate Gaussian on all samples $\{X^i\}_{i=1}^n$. While this estimation is most likely inaccurate due to the fact that the features are binary, we follow \cite{DeepKnockoffs} and show via semi-synthetic experiments (for which ${Y \mid X}$ is known) that the selection procedure empirically controls the FDR when sampling $\tilde{X}_j$ from the estimated distribution. Only then, we apply the selection procedure on the real data.
\begin{figure}[t]
\centering
\includegraphics[width=0.85\textwidth]{non_linear_semi_no_NN.png}
\caption{Semi-synthetic experiments with real HIV mutation features and a simulated non-linear response using the generating function \textbf{M2}. Empirical power and FDR with $q=0.2$ are evaluated over $20$ random train/test splits.
}
\label{fig:non_lin_semi}
\vspace{-0.15cm}
\end{figure}
\paragraph{Experiments with semi-synthetic data}
We generate a semi-synthetic data set by simulating $Y$ as described in~\eqref{eq:y-mid-x} while treating the real $X$ as fixed, using the polynomial non-linear generating function \textbf{M2}. Next, we randomly split the data into training and testing sets of equal size, and repeat the same experimental protocol, data normalization, and training strategy used in the synthetic experiments from Section~\ref{sec:syn_exp}.
(For the neural network base model, we slightly modified the number of training epochs due to overfitting; further details are in Supplementary Section~\ref{supp:models}.) Figure~\ref{fig:non_lin_semi} displays the FDR and power obtained by lasso and elastic net as a function of the signal amplitude; a similar figure that describes the results obtained by the base and MRD neural network models is presented in Supplementary Section~\ref{supp:semi_non_linear}. Following Figure~\ref{fig:non_lin_semi}, we can see that all methods control the FDR ($q=0.2$), demonstrating the robustness of the selection procedure to model misspecification. Regarding efficiency---our proposal consistently improves the power of the base models. In contrast to the fully synthetic experiments (Table~\ref{tab:non_linear_sim_0.2}), here the gap between the power of the base model and its MRD version increases as a function of the signal amplitude. Additional semi-synthetic experiments with a linear model that also explore the effect of the sample size are presented in Supplementary Sections \ref{supp:semi_linear} and \ref{supp:semi_vary_n}. Both demonstrate that a similar gain in performance is obtained by our MRD method.
\begin{figure}
\begin{center}
\includegraphics[width=0.5\textwidth]{real_data.png}
\end{center}
\caption{The average number of drug-resistance mutations in the HIV discovered by base/MRD models.
}
\vspace{-0.1cm}
\label{fig:real}
\end{figure}
\paragraph{Experiments with full real data} Next, we perform variable selection on the real data, i.e., with the real $(X,Y)$ pairs.
Here, we only use lasso and elastic net as base models, and deploy the same training strategy and data-normalization step described in the semi-synthetic experiments. We repeat the variable selection pipeline for 1000 independent train/test splits and present the results in Figure~\ref{fig:real}.
As portrayed, our MRD models lead to more findings than the baseline methods for various FDR levels, which aligns with the semi-synthetic experiment results. Here, this gap increases with the target FDR level.
\section{Conclusions} \label{sec:conclusion}
This paper presents a novel training framework to increase the power of the model-X randomization test. Our method has an advantage over the common practice for which the model-fitting step is not tailored to maximize the power of the HRT. Focusing on FDR control, through experiments, we demonstrate that our method consistently outperforms a wide range of base predictive models in various settings. In a broader view of the controlled variable selection problem, the model-X knockoff filter \cite{Knockoffs} provides a rigorous FDR control in finite samples under an arbitrary dependency structure of the features. This stands in contrast with the BH procedure that provably controls the FDR under independence of the p-values constructed by the HRT. Therefore, we believe that extending our proposal to work with the knockoffs framework would be of great interest.
\section*{Acknowledgments}
We sincerely thank Matteo Sesia for insightful comments about an earlier manuscript draft. S.S and Y.R. were supported by the Israel Science Foundation (grant 729/21). Y.R. also thanks the Career Advancement Fellowship, Technion, for providing research support.
\bibliographystyle{unsrt}
|
\section{Introduction}
Image super-resolution (SR) is a fundamental computer vision task, which aims to recover high-resolution textures from a degraded low-resolution (LR) image~\cite{IraniImproving}. Recent success has been achieved by deep neural networks in SR tasks, where numerous architectures have been proposed to improve image quality~\cite{dong2015image, dong2016accelerating, lim2017enhanced, niu2020single, zhang2018image}. Such achievements enable SR methods to be applied in practical applications, such as digital zoom algorithm for mobile cameras~\cite{farsiu2005multiframe}, medical imaging~\cite{oktay2016multi} and satellite imaging~\cite{yildirim2012novel}.
\begin{figure}
\centering
\includegraphics[width=\linewidth]{figures/ICCV21_teaser-crop.pdf}
\caption{An illustration of real-world blind super-resolution. The LR image is degraded with scale factor $\times 4$, Gaussian blur kernel width 0.2 and Gaussian noise level 15. A SOTA baseline IKC~\cite{gu2019blind} fails as it enlarges the degradation. Even with variant noise (vn) training, IKC-vn can not generate textures as clear as ours.\vspace{-0.5cm}}
\label{fig:teaser}
\end{figure}
In general, an image degradation process can be formulated as follows:
\begin{equation}
\vspace{-0.1cm}I^{LR} = (I^{HR} \otimes k) \downarrow_s + n, \vspace{-0.1cm}
\end{equation}
\label{eq:degradation}
where $\otimes$ indicates convolution operations, and $k$ is the blur kernel. $\downarrow_s$ usually represents bicubic down-sampling, and $n$ indicates additive noises. To generate super-resolved images, most of the existing SR methods either assume a predefined down-sampling blur kernel or a fixed noise level. In particular, earlier works on single image super-resolution (SISR) usually assume a fixed bicubic down-sampling kernel without any blur or noise consideration. Recent progresses have been made by blind super-resolution methods, which aim to super-resolve real-world LR images without degradation knowledge. However, current blind SR methods still have the assumptions of limited degradations. For example, ZSSR~\cite{shocher2018zero} and KernelGAN~\cite{bell2019blind} assume that the degradation is restricted in the LR image and they try to learn internal distribution of the LR image itself. Gu et al.~\cite{gu2019blind} mainly assume the noise level as a fixed value of zero. They propose an iterative corrected kernel estimator IKC to handle different blur degradations. Helou et al.~\cite{elhelou2020stochastic} propose a new module based on existing SR backbones such as~\cite{gu2019blind}, which has the same limitations with previous works. Nonetheless, in real-world scenarios, the degradation process is typically accompanied with variant complicated down-sampling kernels (e.g. Gaussian blur and motion blur), and noises (e.g. Gaussian noise and salt noise). The performance of the SR methods trained on a predefined degradation drops severely when facing different degradation types~\cite{gu2019blind}, thus these methods are still limited in many real-world applications.
To solve the above problems, we propose a \textbf{D}egradation-guided \textbf{M}eta-restoration network for blind \textbf{S}uper-\textbf{R}esolution (DMSR), which effectively super-resolve LR images with arbitrary real-world degradations.
The blur and noise degradations are estimated on-the-fly and are further used to guide the meta-restoration process in SR networks.
Specifically, DMSR consists of a degradation extractor and meta-restoration modules. The degradation extractor estimates the blur kernel and the noise map from the degraded LR image. This extractor is optimized by a degradation reconstruction loss. Besides, a novel degradation consistency loss is further proposed to enhance the accuracy of degradation estimation. Such a design plays a key role to guide the meta-restoration modules to generate accurate restoration parameters for different degradations.
The proposed meta-restoration modules include a \textbf{M}eta-de\textbf{N}oise \textbf{M}odule (MNM) and a \textbf{M}eta-de\textbf{B}lur \textbf{M}odule (MBM) for noise removal and blur recovery, respectively. MNM and MBM take advantage of the estimated degradations and generate meta-biases and meta-weights, respectively.
Such meta-biases and meta-weights will then serve as the restoration parameters in network to effectively restore high-resolution image features. In summary, to generate super-resolved results, our DMSR model can adjust network parameters according to different degradation situations, such that it can handle different real-world degradations. As shown in Figure~\ref{fig:teaser}, our model is capable of handling images with complicated blur and noise degradations in real-world cenarios.
The main contributions can be summarized as:
\begin{itemize}[nosep]
\item To the best of our knowledge, we are the first to address variant blur and noise degradations in one end-to-end model for blind SR. We propose two specially-designed meta-restoration modules MBM and MNM to handle blur and noise degradations in the real-world.
\item We design a degradation extractor in which the degradations are estimated dynamically and are further used to guide the meta-restoration process for SR networks. A degradation consistency loss is further proposed to enhance the estimation accuracy.
\item Evaluations on three widely-used benchmarks and real images demonstrate that our DMSR model achieves the state-of-the-art performance in blind SR tasks.
\end{itemize}
\section{Related Work}
\textbf{Single image super-resolution}. SISR aims to super-resolve the single LR image to the HR image. Most SISR methods assume the down-sampling blur kernel is predefined (usually bicubic) without any blur and noise consideration. SRCNN~\cite{dong2015image} is the first CNN based SR method while Dong et al.~\cite{dong2016accelerating} further accelerated SR inference process by putting most of the layers in the low-resolution scale. With larger networks or novel optimizations, performance improvement has been achieved in~\cite{kim2016accurate, kim2016deeply, ledig2017photo, lim2017enhanced, shi2016real, tai2017image, tai2017memnet, tong2017image, wang2018esrgan, zhang2018residual}.
EDSR~\cite{lim2017enhanced} further improved performance by removing normalization layers in residual blocks. Tong et al.~\cite{tong2017image} and Zhang et al.~\cite{zhang2018residual} used dense blocks~\cite{huang2017densely} for SR task. RCAN~\cite{zhang2018image} adds channel attention in residual blocks as a basic block to achieve the SOTA results.
Soon afterwards, some methods which consider internal or hierarchical feature correlations were proposed in~\cite{dai2019second, liu2020residual, mei2020image, niu2020single}.
In spite of the above achievements on SISR, these methods are still far from the real-world scenarios as they fail to handle the LR image beyond the assumed degradation.
\begin{figure*}
\centering
\includegraphics[width=\linewidth]{figures/ICCV21_DMSR-crop.pdf}%
\caption{An overview of our proposed DMSR model. The degradation extractor (DE) estimates the blur kernel $K_{est}$ and the noise map $N_{est}$ from the LR image. In the main SR network: (a) MNM learns to handle noise degradation where the meta-layer generates meta-biases as the convolution parameters according to the estimated noise map $N_{est}$. (b) Several residual groups~\cite{zhang2018image} are adopted to learn the deep features, followed by an up-sampling process. (c) MBM learns to handle blur degradation where the meta-layer outputs the convolution meta-weights guided by the estimated blur kernel $K_{est}$.}
\label{fig:DMSR}
\end{figure*}
\textbf{Blind super-resolution}. To address real-world super-resolution, some non-blind SR methods which assume degradation parameters are known were firstly proposed~\cite{xu2020unified, zhang2020deep, zhang2018learning, zhang2019deep}. Such a task can be regarded as an intermediate step and upper bound of blind SR, but it is still limited in practical applications as the degradation parameters are unknown in real-world scenarios. Blind SR aims to super-resolve real-world LR images whose degradation information is unavailable. ZSSR~\cite{shocher2018zero} and KernelGAN~\cite{bell2019blind}
learned the internal distribution of the degraded LR image to construct training pairs by treating LR as the training target. Nonetheless, the degradation assumption was restricted on the LR image itself and the degraded LR image was not an optimal training target in severe degradation situation. KMSR~\cite{zhou2019kernel} used GAN to augment the blur-kernel pool for more SR training pairs. Hussein et al.~\cite{hussein2020correction} proposed a closed-form correction filter that transformed the LR image to adapt to existing leading SISR methods. However, these two methods only addressed blur degradation with a noise-free assumption. Gu et al.~\cite{gu2019blind} proposed an iterative corrected kernel estimator IKC for their non-blind SR method SFTMD, but they mainly focused on blur degradation under the situation of a fixed noise level. Helou et al.~\cite{elhelou2020stochastic} further addressed the overfitting problem from the perspective of frequency domain to improve blind SR performance. However, their module was based on current SR backbones such as Gu et al.~\cite{gu2019blind}, which had the same drawbacks with previous works.
Up till now, most existing SR methods either assume a predefined down-sampling blur kernel or a fixed noise level, which is still far from actual applications. Different from that, we propose a DMSR model which can handle LR images with arbitrary blur and noise degradations.
\section{Approach}
In this section, we present the details of the proposed \textbf{D}egradation-guided \textbf{M}eta-restoration network for blind \textbf{S}uper-\textbf{R}esolution (\textbf{DMSR}). DMSR takes as input a degraded LR image and outputs a restored HR image.
As shown in Figure \ref{fig:DMSR}, DMSR consists of a degradation extractor and three restoration modules for denoising, upsampling and deblurring, respectively.
The degradation extractor (DE) estimates the degradations of the LR input. Such a kind of estimated degradations are further leveraged by the meta-restoration modules (MNM and MBM) to restore the image. The full model is optimized by a novel degradation consistency loss and reconstruction losses. We introduce the details of meta-restoration modules in Section~\ref{sec:mrm}. The degradation extractor is
introduced in Section~\ref{sec:de} and the loss functions are discussed in Section~\ref{sec:loss}.
\subsection{Meta-Restoration Modules}\label{sec:mrm}
As described in E.q.~(\ref{eq:degradation}), an HR image is sequentially degraded by blur, down-sampling and noise. Inspired by this process, we attach the MNM to the head of the network and the MBM to the end of the network, which inversely handles the degradation.
\textbf{Meta-denoise module (MNM).} There is a meta-layer at the beginning of the meta-denoise module. The guidance for the meta-layer in MNM is the estimated noise map $N_{est}$ from our degradation extractor instead of a noise level $\sigma$ which is commonly used in ~\cite{xu2020unified, zhang2018learning}. Considering the widely-used noise type, Additive White Gaussian Noise (AWGN), the probability density for each pixel $x$ is denoted as:
\begin{align}
p(x) = \frac{1}{\sigma_n \sqrt{2\pi}}exp(-\frac{x^2}{2\sigma_n^2}),
\end{align}
where $\sigma_n$ is the noise level parameter and $p(x)$ represents the probability density distribution. From this formulation, we can see that the parameter $\sigma_n$ only influences the probability density distribution of the noise in pixel $x$. However, it lacks the ability to express the exact noise value in that pixel. Therefore, we choose the noise map which provides more dense information in our model setting. Ideally, the estimated noise map is the additive noise of the input LR image and the network parameters need to learn an inverse operation. In such a case, the noise map can be regarded as the biases for each spatial position. A concatenation operation followed by a convolution layer are adopted to implement MNM, which can be formulated as:
\begin{align}
F = {\rm Conv(Concat}(I^{LR}, N_{est})),
\end{align}
where ``Conv'' and ``Concat'' represent the convolution layer and the concatenation operation, respectively. $I^{LR}$ is the input degraded LR image and $N_{est}$ indicates the estimated noise map from our degradation extractor. $F$ is the output feature maps of MNM. When the convolution kernel size is set to 1, each value in the noise map just influences the corresponding position's bias in this convolution process. In other words, the meta-layer in MNM generates meta-biases according to the estimated noise map for the network to better handle noise removal.
\textbf{Deep feature learning and up-sampling.} Between MNM and MBM, there is a network for deep feature learning and up-sampling. We adopt the residual group structure proposed in SOTA SISR method RCAN~\cite{zhang2018image}. Each residual group is composed of several sequential residual channel attention blocks (RCABs) with a long skip connection. The residual path in each RCAB consists of ``convolution + ReLU + convolution + channel attention''. Finally a convolution layer and a pixelshuffle layer enlarge the feature resolution according to the magnification scale factor.
\textbf{Meta-deblur module (MBM).} In general, a Gaussian blur process can be formulated as a convolution process:
\begin{align}
V = X \otimes K,
\end{align}
where $X$ and $V$ are input features and blurred features, respectively. $K$ is the blur kernel with the size of $k \times k$ and $\otimes$ represents the convolution operation. Since convolution is a operation on local area, so each pixel value in $V$ is calculated from a local patch with the size of $k \times k$ in $X$. Considering deblur as an inverse process of the above convolution, each piexel value in $X$ is also related to a local patch with the size of $k \times k$ in $V$, which can be also expressed by a convolution process.
In our blind SR network, MBM is to process such an inverse process. To further enhance the expression capability of the module, we make the convolution kernels spatially variant and each kernel can be regarded as a meta-weight which is generated from the meta-layer in MBM. The estimated blur kernel $K_{est}$ serves as a guidance of this meta-layer because the blur kernel influences the deblur process.
Therefore, the target of the meta-layer in MBM is to generate proper meta-weights for this dynamic convolution process. Specifically, the estimated blur kernel will be firstly dimension-reduced to $C_k$ by a fully connected layer. This fully connected layer is initialized by the PCA matrix~\cite{zhang2018learning} which records the principle information estimated from a series of random sampled blur kernels. Then we repeatedly stretch such $1 \times 1 \times C_k$ tensor to the features with $H \times W \times C_k$ where $H$ and $W$ indicate the feature resolution. The stretched features are concatenated with the network features to generate the meta-weights of this dynamic convolution layer. The meta-weights have the shape $k^2 \times H \times W$. Each spatial position with size $k^2 \times 1 \times 1$ represents a convolution kernel in that position. In such a design, the meta-layer in MBM predicts dynamic convolution parameters according to the estimated blur kernel $K_{est}$ for the network to address blur recovery.
\begin{figure}
\centering
\includegraphics[width=\linewidth]{figures/ICCV21_de-crop.pdf}%
\caption{The proposed degradation extractor estimates a blur kernel and a noise map, which is optimized by a degradation reconstruction loss and a degradation consistency loss. $I^{LR}$ and $I^{LR}_{sim}$ represent the input degraded LR image and the estimated LR image by applying the estimated degradation to the HR image, respectively. $N_{GT}$ and $K_{GT}$ are the ground truth noise map and the ground truth blur kernel. ``DE'' indicates the degradation extractor.}
\label{fig:de}
\end{figure}
\subsection{Degradation Extractor}\label{sec:de}
It is essential to extract accurate degradation for blind SR task, since degradation mismatch will produce unsatisfactory results~\cite{gu2019blind}. The goal of the degradation extractor is to estimate accurate degradation which can provide solid guidance to the meta-restoration modules (MNM and MBM).
The structure of the degradation extractor is shown in Figure~\ref{fig:de}. One convolution layer followed by two residual blocks are firstly used to extract features of the input LR image. Then there are two branches to extract noise maps and blur kernels respectively. The upper branch estimates the noise map of the input LR image by an additional convolution layer, while the lower branch extracts blur kernel. Two convolution layers and a global average pooling layer are used in the end of the module. The resulting features are reshaped to the size of the blur kernel. We use a softmax layer at the end of the blur branch to ensure there is no value shift before and after blur degradation. To accurately estimate blur kernels and noise maps, we introduce a degradation reconstruction loss and a degradation consistency loss. These two losses are discussed in Section~\ref{sec:loss}.
\subsection{Loss Function}\label{sec:loss}
There are three types of loss functions in our model. The overall loss is denoted as:
\begin{align}
\mathcal{L}_{overall} = \lambda_{RE} \mathcal{L}_{RE} + \lambda_{DR} \mathcal{L}_{DR} + \lambda_{DC} \mathcal{L}_{DC},
\end{align}
where $\mathcal{L}_{RE}$ represents reconstruction loss, which is:
\begin{align}
\mathcal{L}_{RE} = \frac{1}{CHW} \| I^{HR} - I^{SR} \|_1,
\end{align}
where ($C, H, W$) is the size of the HR image. We utilize $L_1$ loss which has been demonstrated to produce sharper results compared to $L_2$ loss.
The last two losses are shown in Figure~\ref{fig:de}. $N_{est}$ and $K_{est}$ are the estimated noise map and blur kernel, while $N_{GT}$ and $K_{GT}$ represent the ground truth noise map and the ground truth blur kernel, respectively. The degradation reconstruction loss can be interpreted as:
\begin{align}
\mathcal{L}_{DR} = \| N_{GT} - N_{est} \|_2^2 + \| K_{GT} - K_{est} \|_2^2. \label{eq:loss_dr}
\end{align}
The degradation reconstruction loss directly constraints the estimated noise map and blur kernel closer to the accurate ones, which provides a direct supervision. To further enhance the accuracy of degradation estimation, we propose a novel degradation consistency loss. We degrade the original HR image by the estimated degradation to get a simulated degraded LR image $I^{LR}_{sim}$, then we also use the degradation extractor to estimate the blur kernel $K_{sim}$ and noise map $N_{sim}$ from such simulated LR image. The degradation consistency loss can be described as:
\begin{align}
\mathcal{L}_{DC} = &\|I^{LR}_{sim} - I^{LR}_{est} \|_2^2 + \\ \notag
&\| N_{sim} - N_{est} \|_2^2 + \| K_{sim} - K_{est} \|_2^2, \label{eq:loss_dc}
\end{align}
where the first term of degradation consistency loss aims to constraint the consistency between the input LR image and the simulated degraded LR image. Similar $I^{LR}_{sim}$ and $I^{LR}_{est}$ indicates the accuracy of the degradation estimation to some extent. Similarly, the second and third terms in degradation consistency loss constraint the consistency of the estimated noise map and blur kernel, which enhance the accuracy of the degradation estimation.
\section{Experiment}
We conduct experiments on both quantitative and qualitative evaluations. We introduce the implementation details in Section \ref{sec:detail}. Evaluations on benchmarks and real cases are presented in Section \ref{sec:e1} and Section \ref{sec:e2}, followed by ablation study experiments in Section \ref{sec:ab}.
\subsection{Implementation Details}
\label{sec:detail}
\textbf{Training setups}.
To synthesize degraded images for training, we use isotropic blur kernels, bicubic down-sampling and additive white Gaussian noise following the common settings used in previous works~\cite{xu2020unified, zhang2018learning}.
Specifically, the blur kernel size is set to $15 \times 15$,
and the kernel width is randomly and uniformly sampled from the range of [0.2, 3.0].
The noise level $\sigma$ varies in the range of [0, 75].
During training, we augment images by random horizontal flipping and rotating $90^{\circ}$, $180^{\circ}$ and $270^{\circ}$. Each mini-batch contains 32 LR patches with size $48 \times 48$.
We set the channel number of residual blocks in the degradation extractor as 64 and the kernel size of all the convolution layers as $3 \times 3$.
There are 5 residual groups with each containing 20 RCABs in our full model.
The global average pooling is used at the end of the blur branch.
The weight coefficients for $\mathcal{L}_{RE}$, $\mathcal{L}_{DR}$ and $\mathcal{L}_{DC}$ are 1, 10 and 1, respectively. Adam optimizer with $\beta_1 = 0.9$, $\beta_2 = 0.999$ and $\epsilon = 1 \times 10^{-8}$ is used with initial learning rate of $1 \times 10^{-4}$. We train the model for $5 \times 10^5$ iterations and the learning rate is halved every $2 \times 10^5$ iterations.
\textbf{Datasets and Metrics.}
For fair comparisons, we use DF2K~\cite{agustsson2017ntire,timofte2017ntire} as training set following the common settings used in previous works \cite{gu2019blind, xu2020unified}.
All models are evaluated on both standard benchmarks (i.e., Set5~\cite{bevilacqua2012low}, Set14~\cite{zeyde2010single} and B100~\cite{martin2001database}) and real-world cases. Specifically, the real-world cases we used for comparisons include the commonly-used real image \textit{Flower}~\cite{lebrun2015noise} and the test set of ``NTIRE 2020 Real World Super-Resolution'' challenge~\cite{lugmayr2020ntire}. The test set of the challenge contains 100 unknown-degraded test images without ground truth.
We report quantitative results in terms of PSNR and SSIM metrics, which are calculated on Y channel of YCbCr space. Since the ground truths of the degraded images of real cases are unavailable, we conduct qualitative evaluations and a user study for fair comparisons.
\begin{table*}
\caption{Performance comparison among different blind SR methods (PSNR / SSIM). $\sigma_k$ and $\sigma_n$ are blur kernel width and AWGN level, respectively. ``+'' indicates connection of a denoise method and a blind SR method. Red / blue colors indicate the best and the second best results. [Best viewed in color]}
\label{tab:quantitative}
\centering
\scalebox{0.7}{
\begin{tabular}{lcccccccccc}
\hline
\multirow{2}{*}{Methods} &[$\sigma_k$, &\multicolumn{3}{c}{Set5~\cite{bevilacqua2012low}} & \multicolumn{3}{c}{Set14~\cite{zeyde2010single}} & \multicolumn{3}{c}{B100~\cite{martin2001database}} \\
&$\sigma_n$] &$\times$2 &$\times$3 &$\times$4 &$\times$2 &$\times$3 &$\times$4 &$\times$2 &$\times$3 &$\times$4 \\
\hline
\hline
ZSSR~\cite{shocher2018zero} & &26.60 / .5972 &25.62 / .5836 &24.58 / .5600 &25.73 / .5893 &24.48 / .5382 &23.62 / .5091 &25.31 / .5667 &24.19 / .5079 &23.43 / .4724 \\
IKC~\cite{gu2019blind} & &26.74 / .7582 &26.96 / .6546 &23.73 / .5357 &25.25 / .6732 &25.36 / .5943 &21.47 / .4312 &25.38 / .6404 &24.93 / .5540 &21.16 / .3852 \\
SFM~\cite{elhelou2020stochastic} &[0.2, &28.13 / .6856 &24.60 / .5502 &20.80 / .4333 &26.81 / .6561 &23.76 / .5213 &18.42 / .3251 &26.47 / .6315 &23.33 / .4802 &18.46 / .2924 \\
IKC~\cite{gu2019blind}-vn &15] &{\color{blue}{32.54}} / {\color{blue}{.8980}} &29.84 / .8551 &{\color{blue}{28.79}} / {\color{blue}{.8261}} &{\color{blue}{30.04}} / {\color{blue}{.8382}} &27.76 / .7618 &26.54 / {\color{red}{.7122}} &{\color{blue}{29.17}} / {\color{blue}{.8066}} &{\color{blue}{26.97}} / {\color{red}{.7221}} &{\color{blue}{25.93}} / {\color{red}{.6629}} \\
SFM~\cite{elhelou2020stochastic}-vn & &32.30 / .8962 &{\color{blue}{30.26}} / {\color{blue}{.8595}} &28.63 / .8232 &29.68 / .8350 &{\color{blue}{27.87}} / {\color{blue}{.7621}} &{\color{blue}{26.57}} / .7102 &28.89 / .8054 &26.93 / .7182 &25.92 / .6608 \\
DMSR (ours) & &{\color{red}{32.79}} / {\color{red}{.9009}} &{\color{red}{30.64}} / {\color{red}{.8637}} &{\color{red}{29.06}} / {\color{red}{.8285}} &{\color{red}{30.30}} / {\color{red}{.8417}} &{\color{red}{28.12}} / {\color{red}{.7662}} &{\color{red}{26.74}} / {\color{red}{.7122}} &{\color{red}{29.33}} / {\color{red}{.8109}} &{\color{red}{27.23}} / {\color{blue}{.7197}} &{\color{red}{26.05}} / {\color{blue}{.6626}} \\
\hline
ZSSR~\cite{shocher2018zero} & &25.33 / .5346 &25.06 / .5478 &24.28 / .5374 &24.29 / .4891 &23.95 / .4909 &23.40 / .4833 &24.06 / .4546 &23.77 / .4554 &23.28 / .4469\\
IKC~\cite{gu2019blind} & &25.69 / .7128 &25.77 / .6085 &23.46 / .5038 &24.25 / .6152 &24.47 / .5400 &21.82 / .4111 &24.54 / .5827 &24.26 / .4980 & 20.60 / .3343 \\
SFM~\cite{elhelou2020stochastic} &[1.3, &26.15 / .6168 &24.59 / .5233 &21.64 / .4400 &24.84 / .5523 &23.53 / .4738 &19.23 / .3243 &24.78 / .5187 &23.27 / .4337 &19.39 / .2933 \\
IKC~\cite{gu2019blind}-vn &15] &30.56 / .8602 &29.13 / .8278 &{\color{blue}{28.26}} / {\color{blue}{.8072}} &28.15 / .7654 &26.97 / .7195 &{\color{blue}{26.24}} / .6881 &27.34 / .7178 &26.34 / .6705 &{\color{blue}{25.65}} / .6381 \\
SFM~\cite{elhelou2020stochastic}-vn & &{\color{blue}{30.66}} / {\color{blue}{.8622}} &{\color{blue}{29.15}} / {\color{blue}{.8304}} &28.00 / .8016 &{\color{blue}{28.27}} / {\color{blue}{.7717}} &{\color{blue}{27.11}} / {\color{blue}{.7242}} &26.19 / {\color{blue}{.6885}} &{\color{blue}{27.45}} / {\color{red}{.7260}} &{\color{blue}{26.42}} / {\color{red}{.6780}} &25.64 / {\color{blue}{.6384}} \\
DMSR (ours) & &{\color{red}{31.13}} / {\color{red}{.8698}} &{\color{red}{29.65}} / {\color{red}{.8403}} &{\color{red}{28.48}} / {\color{red}{.8116}} &{\color{red}{28.51}} / {\color{red}{.7735}} &{\color{red}{27.24}} / {\color{red}{.7261}} &{\color{red}{26.29}} / {\color{red}{.6895}} &{\color{red}{27.54}} / {\color{blue}{.7252}} &{\color{red}{26.46}} / {\color{blue}{.6738}} &{\color{red}{25.70}} / {\color{red}{.6389}}\\
\hline
ZSSR~\cite{shocher2018zero} & &23.42 / .4378 &23.40 / .4643 &23.26 / .4826 &22.53 / .3761 &22.50 / .3989 &22.43 / .4202 &22.63 / .3436 &22.64 / .3683 &22.54 / .3888\\
IKC~\cite{gu2019blind} & &24.33 / .6511 &23.83 / .5079 &21.60 / .3993 &23.21 / .5606 &22.85 / .4443 &20.15 / .3058 &23.71 / .5334 &23.01 / .4111 &19.58 / .2569 \\
SFM~\cite{elhelou2020stochastic} &[2.6, &24.13 / .5255 &23.17 / .4442 &19.67 / .3246 &23.07 / .4523 &22.29 / .3820 &18.27 / .2453 &23.35 / .4225 &22.28 / .3458 &18.51 / .2192 \\
IKC~\cite{gu2019blind}-vn &15] &{\color{blue}{27.57}} / {\color{blue}{.7849}} &26.52 / .7523 &{\color{blue}{26.38}} / {\color{blue}{.7503}} &{\color{blue}{25.52}} / {\color{blue}{.6645}} &24.86 / .6373 &{\color{blue}{24.79}} / {\color{blue}{.6318}} &{\color{blue}{25.25}} / {\color{blue}{.6182}} &24.74 / .5935 &{\color{blue}{24.64}} / {\color{blue}{.5875}} \\
SFM~\cite{elhelou2020stochastic}-vn & &27.08 / .7686 &{\color{blue}{26.80}} / {\color{blue}{.7602}} &26.18 / .7425 &25.38 / .6578 &{\color{blue}{25.02}} / {\color{blue}{.6423}} &24.71 / .6287 &25.19 / .6141 &{\color{blue}{24.94}} / {\color{blue}{.6040}} &24.60 / .5855 \\
DMSR (ours) & &{\color{red}{28.81}} / {\color{red}{.8171}} &{\color{red}{27.79}} / {\color{red}{.7943}} &{\color{red}{27.10}} / {\color{red}{.7743}} &{\color{red}{26.43}} / {\color{red}{.6916}} &{\color{red}{25.81}} / {\color{red}{.6672}} &{\color{red}{25.30}} / {\color{red}{.6478}} &{\color{red}{25.86}} / {\color{red}{.6428}} &{\color{red}{25.33}} / {\color{red}{.6173}} &{\color{red}{24.93}} / {\color{red}{.6005}}\\
\hline
ZSSR~\cite{shocher2018zero} & &17.33 / .2164 &17.06 / .2142 &16.89 / .2265 &17.09 / .2167 &16.75 / .1982 &16.54 / .1936 &16.95 / .2011 &16.63 / .1777 &16.43 / .1700\\
IKC~\cite{gu2019blind} & &23.41 / .5976 &17.49 / .2372 &14.54 / .1766 &22.71 / .5137 &17.21 / .2191 &12.13 / .1013 &23.14 / .4876 &16.74 / .1898 &11.77 / .0811 \\
SFM~\cite{elhelou2020stochastic} &[0.2, &18.36 / .2468 &15.52 / .1873 &11.93 / .1112 &17.66 / .2346 &15.31 / .1723 &11.88 / .0955 &17.69 / .2227 &15.35 / .1563 &11.58 / .0812 \\
IKC~\cite{gu2019blind}-vn &50] &{\color{blue}{28.35}} / {\color{blue}{.8176}} &26.28 / .7678 &{\color{blue}{25.12}} / {\color{blue}{.7323}} &{\color{blue}{26.75}} / {\color{blue}{.7278}} &{\color{blue}{25.10}} / {\color{blue}{.6633}} &{\color{blue}{23.99}} / .6195 &{\color{blue}{26.06}} / {\color{blue}{.6763}} &{\color{blue}{24.67}} / {\color{blue}{.6138}} &{\color{blue}{23.81}} / {\color{blue}{.5754}} \\
SFM~\cite{elhelou2020stochastic}-vn & &28.25 / .8165 &{\color{blue}{26.42}} / {\color{blue}{.7715}} &25.10 / .7317 &26.44 / .7251 &25.02 / .6614 &23.98 / {\color{blue}{.6196}} &25.77 / .6753 &24.55 / .6125 &23.78 / .5752 \\
DMSR (ours) & &{\color{red}{28.58}} / {\color{red}{.8226}} &{\color{red}{26.66}} / {\color{red}{.7763}} &{\color{red}{25.38}} / {\color{red}{.7417}} &{\color{red}{26.93}} / {\color{red}{.7296}} &{\color{red}{25.30}} / {\color{red}{.6659}} &{\color{red}{24.21}} / {\color{red}{.6232}} &{\color{red}{26.20}} / {\color{red}{.6796}} &{\color{red}{24.83}} / {\color{red}{.6158}} &{\color{red}{23.94}} / {\color{red}{.5779}}\\
\hline
ZSSR~\cite{shocher2018zero} & &17.12 / .1814 &16.88 / .1906 &16.71 / .2034 &16.84 / .1641 &16.65 / .1697 &16.46 / .1764 &16.70 / .1446 &16.54 / .1483 &16.40 / .1548\\
IKC~\cite{gu2019blind} & &23.07 / .5762 &17.20 / .2094 &13.37 / .1298 &22.46 / .4969 &17.01 / .1880 &12.52 / .0991 &22.91 / .4709 &16.68 / .1611 &11.89 / .0758 \\
SFM~\cite{elhelou2020stochastic} &[1.3, &18.59 / .2243 &15.42 / .1665 &11.88 / .0991 &17.51 / .1817 &15.24 / .1475 &11.87 / .0857 &17.56 / .1654 &15.29 / .1307 &11.59 / .0713 \\
IKC~\cite{gu2019blind}-vn &50] &27.27 / .7862 &{\color{blue}{25.87}} / .7466 &{\color{blue}{24.81}} / {\color{blue}{.7171}} &{\color{blue}{25.73}} / {\color{blue}{.6766}} &{\color{blue}{24.65}} / .6345 &{\color{blue}{23.80}} / .6071 &{\color{blue}{25.24}} / .6267 &{\color{blue}{24.36}} / .5883 &{\color{blue}{23.67}} / {\color{blue}{.5633}} \\
SFM~\cite{elhelou2020stochastic}-vn & &{\color{blue}{27.32}} / {\color{blue}{.7877}} &25.82 / {\color{blue}{.7472}} &24.78 / .7155 &25.69 / .6762 &24.64 / {\color{blue}{.6361}} &23.79 / {\color{blue}{.6074}} &25.23 / {\color{red}{.6281}} &24.32 / {\color{red}{.5904}} &23.66 / {\color{blue}{.5633}} \\
DMSR (ours) & &{\color{red}{27.62}} / {\color{red}{.7942}} &{\color{red}{25.96}} / {\color{red}{.7533}} &{\color{red}{24.98}} / {\color{red}{.7256}} &{\color{red}{25.86}} / {\color{red}{.6776}} &{\color{red}{24.76}} / {\color{red}{.6369}} &{\color{red}{23.90}} / {\color{red}{.6088}} &{\color{red}{25.30}} / {\color{blue}{.6279}} &{\color{red}{24.42}} / {\color{blue}{.5897}} &{\color{red}{23.71}} / {\color{red}{.5643}}\\
\hline
ZSSR~\cite{shocher2018zero} & &16.67 / .1354 &16.61 / .1525 &16.44 / .1693 &16.40 / .1127 &16.29 / .1252 &16.20 / .1433 &16.36 / .0976 &16.28 / .1103 &16.22 / .1276\\
IKC~\cite{gu2019blind} & &22.42 / .5433 &16.62 / .1616 &14.26 / .1412 &21.91 / .4660 &16.66 / .1428 &11.72 / .0608 &22.48 / .4434 &16.40 / .1209 &11.75 / .0590 \\
SFM~\cite{elhelou2020stochastic} &[2.6, &18.05 / .1753 &15.12 / .1255 &11.73 / .0752 &17.25 / .1336 &14.84 / .1023 &11.72 / .0627 &17.28 / .1185 &15.04 / .0937 &11.51 / .0532 \\
IKC~\cite{gu2019blind}-vn &50] &{\color{blue}{25.59}} / {\color{blue}{.7272}} &24.57 / .6925 &{\color{blue}{23.85}} / {\color{blue}{.6763}} &{\color{blue}{24.25}} / {\color{blue}{.6135}} &23.49 / .5875 &{\color{blue}{23.07}} / {\color{blue}{.5742}} &{\color{blue}{24.17}} / {\color{blue}{.5703}} &23.56 / .5484 &{\color{blue}{23.20}} / {\color{blue}{.5371}} \\
SFM~\cite{elhelou2020stochastic}-vn & &25.44 / .7212 &{\color{blue}{24.72}} / {\color{blue}{.6995}} &23.77 / .6712 &24.20 / .6113 &{\color{blue}{23.57}} / {\color{blue}{.5905}} &23.06 / .5733 &24.16 / .5693 &{\color{blue}{23.65}} / {\color{blue}{.5525}} &{\color{blue}{23.20}} / .5370 \\
DMSR (ours) & &{\color{red}{26.05}} / {\color{red}{.7467}} &{\color{red}{24.86}} / {\color{red}{.7139}} &{\color{red}{24.21}} / {\color{red}{.6967}} &{\color{red}{24.56}} / {\color{red}{.6240}} &{\color{red}{23.83}} / {\color{red}{.5999}} &{\color{red}{23.23}} / {\color{red}{.5818}} &{\color{red}{24.36}} / {\color{red}{.5788}} &{\color{red}{23.75}} / {\color{red}{.5566}} &{\color{red}{23.27}} / {\color{red}{.5422}}\\
\hline
\hline
ZSSR~\cite{shocher2018zero} & &36.98 / .9567 &32.23 / .8982 &29.40 / .8264 &32.77 / .9101 &29.12 / .8206 &27.16 / .7451 &31.44 / .8910 &28.26 / .7858 &26.66 / .7063 \\
IKC~\cite{gu2019blind} &[0.2, &37.26 / .9572 &{\color{blue}{34.02}} / {\color{blue}{.9261}} &31.55 / .8931 &33.06 / .9116 &30.09 / .8421 &28.20 / .7830 &{\color{blue}{31.94}} / {\color{blue}{.8933}} &28.89 / {\color{blue}{.8066}} &27.43 / {\color{blue}{.7376}} \\
SFM~\cite{elhelou2020stochastic} &0] &{\color{blue}{37.53}} / {\color{blue}{.9581}} &33.45 / .9249 &{\color{blue}{32.11}} / {\color{blue}{.8950}} &{\color{blue}{33.23}} / {\color{blue}{.9129}} &{\color{blue}{30.12}} / {\color{blue}{.8424}} &{\color{blue}{28.48}} / {\color{blue}{.7833}} &31.93 / .8928 &{\color{blue}{28.92}} / .8061 &{\color{blue}{27.44}} / .7378 \\
DMSR-nf (ours) & &{\color{red}{37.96}} / {\color{red}{.9617}} &{\color{red}{34.49}} / {\color{red}{.9289}} &{\color{red}{32.37}} / {\color{red}{.8977}} &{\color{red}{33.48}} / {\color{red}{.9174}} &{\color{red}{30.34}} / {\color{red}{.8448}} &{\color{red}{28.73}} / {\color{red}{.7860}} &{\color{red}{32.14}} / {\color{red}{.8995}} &{\color{red}{29.14}} / {\color{red}{.8087}} &{\color{red}{27.65}} / {\color{red}{.7398}}\\
\hline
\end{tabular}
}
\end{table*}
\begin{figure*}
\centering
\begin{tabular}{p{4mm}p{21mm}p{20mm}p{18mm}p{19mm}p{19mm}p{24mm}p{15mm}p{10mm}}
\
&\scriptsize{ZSSR~\cite{shocher2018zero}}
&\scriptsize{IKC~\cite{gu2019blind}}
&\scriptsize{SFM~\cite{elhelou2020stochastic}}
&\scriptsize{IKC~\cite{gu2019blind}-vn}
&\scriptsize{SFM~\cite{elhelou2020stochastic}-vn}
&\scriptsize{DMSR (ours)}
&\scriptsize{GT}
&\ \ \
\end{tabular}\\
\includegraphics[width=0.95\linewidth]{figures/ICCV21_visual_blindsr-crop.pdf}%
\caption{Visual comparison among different blind SR methods on Set5~\cite{bevilacqua2012low}, Set14~\cite{zeyde2010single} and B100~\cite{martin2001database} datasets sequentially. Degradation: isotropic Gaussian blur kernel 2.6, additive white Gaussian noise 15 and scale factor $\times$4. [Best viewed in color]}
\label{fig:visual}
\end{figure*}
\subsection{Evaluations on Benchmarks}
\label{sec:e1}
In this section, we compare our model with SOTA blind SR methods, i.e., ZSSR~\cite{shocher2018zero}, IKC~\cite{gu2019blind} and SFM~\cite{elhelou2020stochastic} on standard benchmarks. ZSSR is the SOTA method to learn internal distribution of the LR image. IKC is the SOTA blind SR method and SFM achieves performance improvement based on IKC backbone. For IKC and SFM which assume a fixed noise level, we additionally train IKC-vn and SFM-vn models with variant noise training for more fair comparison. We attach all the websites of the implementation in the footnote\footnote{Implementation of the methods in blind SR comparison:\\
\scriptsize{
ZSSR~\cite{shocher2018zero}: \url{https://github.com/assafshocher/ZSSR}\\
IKC~\cite{gu2019blind}: \url{https://github.com/yuanjunchai/IKC}\\
SFM~\cite{elhelou2020stochastic}: \url{https://github.com/majedelhelou/SFM}\\}.}.
For fair comparisons, we train IKC and SFM with $15 \times 15$ blur kernels on DF2K dataset. We use IKC as the backbone of SFM and the percent rate of training for SFM is 50\%. We sample isotropic Gaussian blur kernels from \{0.2, 1.3, 2.6\} and AWGN levels from \{15, 50\}.
\textbf{Quantitative Comparisons.}
In Table~\ref{tab:quantitative}, ZSSR which learns the internal distribution of the LR image performs badly since the noise and blur degradation in LR images will make its performance drop significantly. For IKC and SFM which have fixed noise level assumption zero, the performance drops significantly when noise level becomes larger. Even with variant noise training, the performance of SOTA methods is increased but still limited since they do not have specially-designed modules to handle variant noises. Among these blind SR methods, our DMSR can achieve the best performance on all benchmarks in different degradation situations.
To further validate the superior performance of our model, we also conduct experiments in the noise-free situation to meet the assumption of IKC and SFM, where IKC and SFM have significantly better performance. To get the noise-free version of our model ``DMSR-nf'', we fine-tune the DMSR where we fix the noise level to 0. We train another $1 \times 10^{5}$ iterations with learning rate $1 \times 10^{-4}$. As shown in the bottom row in Table~\ref{tab:quantitative}, even in this narrow range of degradations, our model can still achieve the best performance. This further verifies the real-world super-resolution capability of our model.
\textbf{Qualitative Comparisons.} We also show visual comparison results among different blind SR methods in Figure~\ref{fig:visual}, where degradation parameters are set as isotropic blur kernel 2.6, noise level $\sigma$ 15 with scale factor $\times$4. ZSSR learns the noise distribution of the LR image so its SR results obviously contain noise. IKC and SFM fails to handle such degraded images beyond their degradation assumption. With variant noise training, IKC-vn and SFM-vn can generate better SR results, but not clear as ours. Our DMSR model can handle both noise and blur degradation well and achieves the best visual performance.
\subsection{Evaluations on Real Cases}
\label{sec:e2}
In this section, we further evaluate different methods on real cases.
We compare our DMSR model with different kinds of SR methods to show the overall practical application ability. These methods include two SOTA blind SR methods with variant noise training IKC~\cite{gu2019blind}-vn and SFM~\cite{elhelou2020stochastic}-vn. We also adopt a SOTA SISR method RCAN~\cite{zhang2018image} and a SOTA non-blind SR method UDVD~\cite{xu2020unified} to conduct comparison. For the non-blind SR method UDVD, manual grid search on degradation parameters are usually performed and the best result is chosen. However, such a design is time-consuming on real-world application and not fair for other methods since they manually choose the best result from all the generated results. So for fair comparison, we draw a degradation parameter window which contains different degradation types applied on one image. It has 24 cases of degradations with 6 different noise levels $\sigma_n$ and 4 different blur kernels $\sigma_k$ for each scale factor 2, 3, 4, where $\times$4 is shown in Supplementary. During inference, we first manually choose the most similar degraded image in the window and adopt its parameters as the input for UDVD. Such a design can save more real-world inference time and is more fair for comparison.
\textbf{Performance on real images}. We first conduct evaluation on the real image \textit{Flowers}~\cite{lebrun2015noise}. Since there is no ground truth HR image for this image, we only show the visual comparison results in Figure~\ref{fig:visual_real}. The degradation parameters [$\sigma_k$, $\sigma_n$] of UDVD is selected as [2.1, 60] for this image. As we can see, our DMSR model can achieve the best visual performance among these methods. The visual quality of RCAN is severely influenced by the noise degradation. IKC-vn and SFM-vn fail to remove the influences of the noise. Even with manually chosen degraded parameters, the SOTA non-blind SR method UDVD cannot generate textures as natural as ours and there are some artifacts in their result.
\begin{figure}
\centering
\includegraphics[width=\linewidth, page=1]{figures/ICCV21_visual_real-crop.pdf}
\caption{Performance on the real image \textit{Flowers}~\cite{zhang2018learning} among different kinds of SR methods on scale factor $\times$4. We select the parameter [$\sigma_k$=2.1, $\sigma_n$=60] from the degradation parameter window in supplementary for UDVD~\cite{xu2020unified}. [Best viewed in color]}
\label{fig:visual_real}
\end{figure}
\textbf{Performance on real-world image challenge}. In addition to the real image, we also run our model on the test set of ``NTIRE 2020 Real World Super-Resolution'' challenge~\cite{lugmayr2020ntire}. There are 100 unknown-degraded test images in Track 1 and we use these images for evaluation. The degradation parameters of UDVD for this test set are set to [1.2, 15]. Visual comparison is shown in Figure~\ref{fig:visual_challenge}. As shown in this figure, our DMSR model can generate the results with clearer and more realistic textures. To further validate the superiority of our model, we conduct a user study on this challenge test set where our DMSR is compared with RCAN, IKC-vn, SFM-vn and UDVD. We collect 3,200 votes from 16 subjects, where each subject is invited to compare our model with two other methods. Therefore, each of the four comparison combination is evaluated by 8 subjects. In each comparison process, the users are provided with two images, including a DMSR result and another method's result. Users are asked to select the one with better visual quality. The user study results are shown in Figure~\ref{fig:user_study}, where the values on Y-axis indicate the percentage of users that prefer our DMSR model over other methods. As we can see, DMSR significantly outperforms SOTA SISR method with over 97\% of users voting for ours. For SOTA blind and non-blind SR methods IKC-vn, SFM-vn and UDVD, our model still has over 88\% probability of winning. Such results validate the favorable visual quality of our DMSR model. This demonstrates that the meta-restoration modules in our model can generate proper network parameters on-the-fly for different real-world degradation situations.
\begin{figure}
\centering
\includegraphics[width=\linewidth]{figures/ICCV21_visual_challenge-crop.pdf}
\caption{Visual comparison on the test set of ``NTIRE 2020 Real World Super-Resolution'' challenge~\cite{lugmayr2020ntire}. Degradation parameters are set [$\sigma_k$=1.2, $\sigma_n$=15] from the degradation parameter window in supplementary for UDVD~\cite{xu2020unified}. [Best viewed in color]}
\label{fig:visual_challenge}
\end{figure}
\begin{figure}
\centering
\includegraphics[width=\linewidth]{figures/user_study-crop.pdf}%
\caption{User study results where values on Y-axis represent the percentage of users that prefer our DMSR over other methods.}
\label{fig:user_study}
\end{figure}
\subsection{Ablation Study}
\label{sec:ab}
\textbf{Degradation Extractor}. In this part, we will verify the effectiveness of the proposed DR loss and DC loss. As shown in Table~\ref{tab:ablation_de}, without all losses in the degradation extractor, PSNR / SSIM performance are 24.87 / 0.7194. When adding DR loss to directly supervise degradation estimation, the performance increases to 24.92 / 0.7220. After applying DC loss on the LR image and degradation (blur kernel and noise map), the final performance is further increased to 24.98 / 0.7256. Such an ablation demonstrates the effectiveness of the losses in our degradation extractor. In addition, Figure~\ref{fig:ablation_dc} shows the blur kernel estimation results with and without the degradation consistency loss. With DC loss, the estimated blur kernel is more accurate.
\begin{table}[t]
\caption{Ablation on degradation reconstruction (DR) loss and degradation consistency (DC) loss. (LR) means applying DC loss on the LR image while (KN) indicates applying DC loss on the blur kernel and noise map ($\times$4, blur kernel 1.3, noise level 50).}
\vspace{1mm}
\label{tab:ablation_de}
\centering
\scalebox{0.95}{
\begin{tabular}{c|c|c|c}
\hline
DR loss &DC loss (LR) &DC loss (KN) &PSNR / SSIM \\
\hline
\hline
& & &24.87 / .7194 \\
\hline
\checkmark & & &24.92 / .7220 \\
\hline
\checkmark &\checkmark & &24.95 / .7239 \\
\hline
\checkmark &\checkmark &\checkmark &\textbf{24.98} / \textbf{.7256} \\
\hline
\end{tabular}
}
\end{table}
\begin{figure}
\centering
\includegraphics[width=0.66\linewidth]{figures/ICCV21_ablation_dc-crop.pdf}
\caption{Ablation on degradation consistency loss ($\times4$, blur kernel width 1.3, noise level 50). [Best viewed in color]}
\label{fig:ablation_dc}
\end{figure}
\textbf{Meta-restoration Modules}.
We also conduct ablation experiments on the two types of meta-restoration modules, MNM and MBM. The ablation results can be viewed in Table~\ref{tab:ablation_mrm}. For meta-denoise module, we first verify that the noise map is superior to the noise level number $\sigma$. We run a comparison model in which the degradation extractor predicts the noise level $\sigma$ and this number will be spatially repeated as the ``noise map'' to be used in MNM. From the table, we can see that utilizing the noise map will bring about 0.1 PSNR performance improvement, which demonstrates the superiority of the noise map. For meta-deblur module, when we add MBM into the model, the performance will be further increased. Such ablation experiments verifies the effectiveness of our two types of meta-restoration modules.
\begin{table}
\caption{Ablation on meta-restoration modules. -$\sigma$ and -map indicate adopting noise level $\sigma$ or noise map to express noise degradation, respectively ($\times2$, blur kernel 2.6, noise level 15).}
\vspace{1mm}
\label{tab:ablation_mrm}
\centering
\begin{tabular}{c|c|c|c}
\hline
MNM-$\sigma$ &MNM-map &MBM &PSNR / SSIM \\
\hline
\hline
\checkmark & & &28.61 / .8119 \\
\hline
\checkmark & &\checkmark &28.70 / .8148 \\
\hline
&\checkmark & &28.72 / .8156 \\
\hline
&\checkmark &\checkmark &\textbf{28.81} / \textbf{.8171} \\
\hline
\end{tabular}
\end{table}
\textbf{The number of MBM.} We also analyze the model performance with different numbers of MBMs. As shown in Table~\ref{tab:ablation_mbm_number}, we conduct experiments on one, two and three MBMs. After one MBM equipped, adding more MBMs can not bring obvious performance increase. This is because multiple MBMs is equal to one MBM by its linear nature. Considering additional memory cost, our final model contains only one MBM as the default setting.
\begin{table}
\caption{Ablation on different numbers of MBM. ($\times 3$, blur kernel 1.3, noise level 50).}
\vspace{1mm}
\label{tab:ablation_mbm_number}
\centering
\begin{tabular}{c|c|c|c}
\hline
1 MBM &2 MBM &3 MBM &PSNR / SSIM \\
\hline
\hline
\checkmark & & &25.96 / 0.7533 \\
\hline
&\checkmark & &\textbf{25.97} / \textbf{0.7545} \\
\hline
& &\checkmark &25.95 / 0.7537 \\
\hline
\end{tabular}
\end{table}
\section{Conclusion}
In this paper, we propose a \textbf{D}egradation-guided \textbf{M}eta-restoration network for blind \textbf{S}uper-\textbf{R}esolution (DMSR) which aims to restore a real-world LR image to an HR image. DMSR consists of two types of meta-restoration modules, and a degradation extractor optimized by a tailored degradation consistency loss. The blur and noise degradations can be estimated online from the extractor and further guide the meta-restoration modules to generate restoration parameters. Therefore, our DMSR model can handle real-world LR images with arbitrary degradations. Extensive experiments on benchmarks and real cases demonstrate the real-world application ability of our model. Yet, we can still observe failure cases in some complicatedly degraded image. We will consider more types of degradations as our future work to enhance the practical application ability of our model, such as motion blur, salt-pepper noise or jpeg block artifacts.
\clearpage
{\small
\bibliographystyle{ieee_fullname}
|
\section{Introduction}
Resetting processes have attracted an increased attention over the last decade in the field of non-equilibrium statistical physics \cite{Evans_2020}.
In the model originally introduced in \cite{EvansPRL2011}, a Brownian particle is instantaneously reset to its initial position at exponentially distributed time intervals. This rather simple modification of standard Brownian motion has important effects on several basic static and dynamical observables. Returning the particle from time to time to a specific position can accelerate the detection of an absorbing target by cutting off fruitless excursions where the particle diffuses far away from the target. For a Brownian particle in an unbounded domain, resetting makes the mean first passage time (MFPT) to an absorbing target finite, and this quantity can be further minimized by a suitable choice of the resetting rate $r$ \cite{Evans_2011,EvansPRL2011}.
The effects of resetting have been explored on a wide range of random processes, such as diffusion in bounded domains\cite{Christou_2015,ray2021resetting,ahmad2022first}, anomalous diffusion\cite{Kusmierz2014PRL,KusmierzPRE2015,KusmierzPRE2019,MasoPRE2019}, searches with stochastically gated targets\cite{Bressloff_2020,Mercado_V_squez_2021}, or resetting under more general protocols \cite{Eule_2016,MonteroPRE2016,pal2016diffusion,nagar2016diffusion,boyer2017long, falcon2017localization,ChechkinPRL2018,evans2018effects}
(see \cite{Evans_2020,Shamik2022} for two reviews of this topic).
Resetting also gives rise generically to non-equilibrium stationary states (NESS) \cite{EvansPRL2011,manrubia1999stochastic,mendez2016characterization}. For instance, the position density of the Brownian particle under stochastic resetting becomes effectively localized in space at large times and converges to a NESS that resembles a Boltzmann-Gibbs distribution with an effective confining potential given by $v_{eff}(X)=\sqrt{r/D}|X-X_0|$, where $D$ is the diffusion constant of the particle and $X_0$ the resetting position\cite{Evans_2011,EvansPRL2011}. However, the process itself markedly differs from the Langevin dynamics at equilibrium in this effective potential, and the first passage properties in both cases are consequently very different. On a semi-infinite line, the MFPT to an absorbing target of a Brownian motion under resetting is always less than the MFPT at equilibrium in the corresponding effective external potential \cite{Evans_2013,giuggioli2019comparison}.
Given the advantages of search processes based on resetting over equilibrium dynamics, it is desirable to design protocols that allow Brownian particles to shorten their encounter times with a target and that are experimentally feasible. A few experiments on resetting processes have been carried out. They typically utilise microspheres manipulated with optical tweezers and different resetting protocols have been considered \cite{besga2020optimal,tal2020experimental,besga2021dynamical,Faisant_2021}. Resetting poses two important practical challenges in physical systems: (i) particles cannot be reset instantaneously and (ii) not exactly to the same position due to thermal or experimental fluctuations. In order to address these issues, different modifications to the original model have been proposed, such as non-instantaneous resetting \cite{maso2019transport,pal2019time,bodrova2020resetting,bodrova2020two,gupta2020stochastic,pal2019home} or resetting to a distribution of positions \cite{Evans_2011,besga2020optimal}.
Another convenient way of emulating resetting processes consists in using an external trapping potential that is alternatively switched on and off. During the "on" phases, the diffusing particle returns advectively towards the potential minimum (which plays a role similar to the resetting position in ideal resetting), before diffusing freely when the potential is no longer applied. The NESSs and the diffusion properties that emerge in stochastically switching harmonic potentials have been studied for Brownian particles along different schemes \cite{gupta2020stochastic,santra2021brownian}, as well as for L\'evy walks \cite{xu2022stochastic}. The work distribution \cite{gupta2022work} and entropy production have also been explored \cite{alston2022non}. Notwithstanding these advances, the properties of first passage times in fluctuating potentials remain little understood.
In a recent work\cite{Mercado_V_squez_2020}, we have exactly solved a model in one dimension that mimics stochastic resetting with an external potential. In this work, we studied a Brownian particle in a V-shaped piecewise linear potential with minimum at $X_0$, which was also taken as the initial position of the particle. The potential was turned on and off in a stochastic way at exponentially distributed times.
The mean first passage time to a target placed at the origin in this model happens to be finite \cite{Mercado_V_squez_2020}. Furthermore, the MFPT can be optimized with a suitable choice of the switch-on and switch-off rates (that can be different), {\it i.e.}, by driving the particle out of the Boltzmann-Gibbs equilibrium. Intuitively, target search can be facilitated in the "off" state due to the absence of a potential barrier to overcome. Nevertheless, on the semi-infinite line, the potential has a beneficial effect as it prevents the particle from diffusing far away in the direction opposite to the target. The interplay between these two trends gives rise to a number of rather unexpected features which are not observed in simple resetting. In particular, taking the steady potential as a reference, a perturbative theory with the switch-off rate as a small parameter allowed us to expand the MFPT as:
\begin{equation}\label{eq0}
MFPT=t^{(K)}(k)+r_1 f(k,r_0)+r_1^2g(k,r_0)+O(r_1^3),
\end{equation}
where $t^{(K)}$ is the Kramers' equilibrium time, $r_1$ the switch-off rate, $r_0$ the switch-on (resetting) rate, $k$ the potential stiffness, and $g(k,r_0)>0$. The coefficient $f(k,r_0)$ of the first order correction at small $r_1$, the so-called dispersion relation, is quite non-trivial and its sign tells us whether switching off/on the potential from time to time increases or decreases the equilibrium Kramers' time. Actually, a continuous phase transition in the optimal rate $r_1^*(k)$ which minimizes the MFPT occurs as the potential stiffness $k$ is varied. For $k<k_c$ (weak confinement regime), $f(k,r_0)>0$ for any $r_0$, therefore, from Eq. (\ref{eq0}), the optimal protocol consists in always keeping the potential on (or $r_1^*(k)=0$) and $r_0^*(k)$ is irrelevant. Conversely, for $k>k_c$ (strong confinement regime) there exists a window of values of $r_0$ centered around a certain $r_c$ such that $f(k,r_0)<0$, indicating that it is possible to improve the Kramers' time, as schematised in figure \ref{fig:Fig0}. The analysis of the marginal curve yields $k_c= 1.228780...$ in dimensionless units. At the transition, the dimensionless optimal switch-on rate is surprisingly large, $r_0^*(k_c)=r_c= 41.969 027...$, whereas for $k$ close to but above the critical value, the optimal switch-off rate grows continuously as $r_1^*(k)\simeq 32.913015\times(k-k_c)$ \cite{Mercado_V_squez_2020}. Meanwhile, the optimal MFPT decreases with $k$ and the classical resetting model of \cite{EvansPRL2011} is recovered in the limit $k\rightarrow\infty$ \cite{Mercado_V_squez_2020}.
\begin{figure}[t]
\centering
\includegraphics[width=\textwidth]{FigureRegimes.pdf}
\caption{Brownian searches assisted by intermittent potentials. {\bf Left:} Leading order of the non-equilibrium contribution to the mean search time in Eq. (\ref{eq0}), when the potential stiffness $k$ and the switch-on rate $r_0$ are in the vicinity of $k_c$ and $r_c$, respectively. {\bf Middle:} Below $k_c$, the MFPT always increases monotonously with the switch-off rate $r_1$, resulting in an optimal rate $r_1^*=0$. {\bf Right:} Above $k_c$, the MFPT is a non-monotonous function of $r_1$ and reaches a minimum at $r_1^*(k)>0$, provided $r_0$ is tuned near $r_c$.}
\label{fig:Fig0}
\end{figure}
In this paper, we extend these results by considering an arbitrary external potential applied intermittently and show that the above phenomenology drawn from the piecewise linear case qualitatively holds with other types of confining potentials. Experiments on resetting processes are typically performed in finite domains and with approximately harmonic optical traps \cite{besga2020optimal,tal2020experimental,besga2021dynamical,Faisant_2021}. We focus here on the harmonic case, but shall also consider more general confining potentials. Furthermore, our previous results, that were derived for a semi-infinite domain, are generalized to the case of finite intervals bounded by a reflective boundary.
This paper is organized as follows: in Section \ref{secMFPT} we introduce the model and the equations of motion that govern two quantities related to the distribution of the first passage time to a target site, namely, the survival probability in the Laplace domain and the MFPT. Although it seems difficult to solve these equations for a general external potential, in Section \ref{SecPerturI} we develop a perturbative method that allows us to exactly derive the dispersion relation $f(k,r_0)$ appearing in Eq. (\ref{eq0}) and which tells us under which conditions the intermittent potential improves the mean search time. Section \ref{secPoteltialPower} is devoted to the analysis of a family of confining potentials of the form $v(x)=k|x-1|^n/n$ in rescaled units. The harmonic case ($n=2$) and the linear potential ($n=1$) are treated separately in Sections \ref{SecHarmonicPot} and \ref{SecVPot}, respectively. The theoretical results obtained by the perturbative method are compared to those obtained from direct numerical integration of the coupled backward Fokker-Planck equations using a finite difference method. The latter method is also used to obtain the optimal rates beyond the perturbative regime ($k\gg k_c$). For completeness, in Section \ref{SecSteady} we derive the NESSs generated by intermittent harmonic potentials on the infinite line, in the absence of absorbing targets. These results are compared with Brownian dynamics simulations. Finally, in Section \ref{SecDiscussion} we conclude with a discussion.
\section{Mean First Passage Time}\label{secMFPT}
In this Section we analyze the MFPT of a Brownian particle to an absorbing target site placed at the origin of a finite one-dimensional domain (see Fig. \ref{fig:Fig1}). In the domain, an external potential $V(X)$ is applied intermittently in time, so that the state of the potential is characterized by a binary function $\sigma(t)$ which takes the value $\sigma=0$ when the potential is switched off, and $\sigma=1$ when it is applied. The two-state process $\sigma(t)$ is characterized by two constant transition rates, $R_0$ (for the transition $0\rightarrow1$) and $R_1$ (for $1\rightarrow0$). The particle can always be absorbed by the target, independently of the state 0 or 1 of the potential. A reflecting wall is placed at the position $X=C$, with $C>0$. The semi-infinite domain case can be simply obtained by taking the limit $C\to \infty$.
The evolution of the particle position $X(t)$ in the potential $\sigma(t)V(X)$ is given by the over-damped Langevin equation:
\begin{equation}
\frac{dX(t)}{dt}= -\frac{1}{\Gamma}\sigma(t)V^{\prime}[X(t)]+\sqrt{2D}\xi(t),
\label{ruleX1}
\end{equation}
where $\Gamma$ is the friction coefficient of the particle, $\xi(t)$ a Gaussian white noise of zero mean and correlations $\langle \xi(t)\xi(t')\rangle=\delta(t-t')$, and $D= k_BT/\Gamma$ the diffusion constant.
\begin{figure}[htp]
\centering
\includegraphics[width=\textwidth]{figure1a_1b.pdf}
\caption{a) Trajectory of a diffusive particle with diffusion constant $D=1$, in an intermittent harmonic potential of the form $V(X)=\frac{K(X-5)^2}{2}$ with $K=5$. The shaded zones represent the time intervals when the potential is turned on (here $R_0=R_1=0.02$). An absorbing boundary is placed at $X=0$ (red line) and a reflective wall at $X=10$ (green line). When the particle is absorbed, the potential is either on or off. b) $3D$ view of a particle trajectory in the intermittent harmonic potential. }
\label{fig:Fig1}
\end{figure}
In the following, we will use the dimensionless space and time variables $x=X/X_0$ and $t/(X_0^2/D)$ (which we re-note as $t$), where $X_0$ is the distance between the minimum of $V(X)$ and the target placed at $X=0$. Let us define the dimensionless parameters:
\begin{eqnarray}
r_0&=&R_0X_0^2/D, \label{adimr0}\\
r_1&=&R_1X_0^2/D, \label{adimr1
\end{eqnarray}
which are the rescaled \lq\lq on\rq\rq$\ $ and \lq\lq off\rq\rq $\ $ rates, respectively. The rescaled potential is given by $v(x)=V(xX_0)/(k_BT)$. The reflecting wall is placed at $x=c$ with $c=C/X_0>1$. In these dimensionless variables, the Langevin equation (\ref{ruleX1}) reduces to
\begin{equation}
\frac{dx}{dt}= - \sigma(t) v'(x) + \sqrt{2}\eta(t)
\end{equation}
where $\langle \eta(t)\rangle=0$ and $\langle \eta(t)\eta(t')\rangle= \delta(t-t')$.
Let us define $Q_0(x,t)$ as the probability that the particle has not hit the origin up to time $t$, given an initial position $x>0$ and initial potential state $\sigma(t=0)=0$. Similarly, $Q_1(x, t)$ corresponds to a
potential initially on. These survival probabilities satisfy the backward Fokker–Planck equations\cite{Mercado_V_squez_2020}
\begin{eqnarray}
\frac{\partial Q_1}{\partial t}=\frac{\partial^2 Q_1}{\partial x^2}- v^{\prime}(x)\frac{\partial Q_1}{\partial x} +r_1(Q_0-Q_1),\label{FPQP1}\\
\frac{\partial Q_0}{\partial t}=\frac{\partial^2 Q_0}{\partial x^2}+r_0(Q_1-Q_0),\label{FPQP2}
\end{eqnarray}
valid in the domain $x\in[0,c]$. These expressions are obtained by extending the well-known steady potential case \cite{majumdar2007brownian,bray2013persistence} to a switching process with rates $r_0$ and $r_1$ \cite{benichou2011intermittent,mercado2019first}.
Defining the Laplace transform $\widetilde{Q}(x,s)=\int^\infty_0 e^{-st}Q(x,t)dt$, Eqs. (\ref{FPQP1})-(\ref{FPQP2}) become
\begin{eqnarray}
-1=\frac{\partial^2 \widetilde{Q}_1}{\partial x^2}- v'(x)\frac{\partial \widetilde{Q}_1}{\partial x}-(s+r_1)\widetilde{Q}_1 +r_1\widetilde{Q}_0,\label{FPQP1s}\\
-1=\frac{\partial^2 \widetilde{Q}_0}{\partial x^2}-(s+r_0)\widetilde{Q}_0+r_0\widetilde{Q}_1,\label{FPQP2s}
\end{eqnarray}
from which we deduce the relations for the corresponding MFPTs $t_0(x)$ and $t_1(x)$:
\begin{eqnarray}
-1=\frac{\partial^2 t_1(x)}{\partial x^2}- v'(x)\frac{\partial t_1(x)}{\partial x}-r_1\left[t_1(x) -t_0(x)\right],\label{TP1}\\
-1=\frac{\partial^2 t_0(x)}{\partial x^2}-r_0\left[t_0(x)-t_1(x)\right],\label{TP2}
\end{eqnarray}
where we have used the usual relation $t_{\sigma}(x)=\widetilde{Q}_{\sigma}(x,s=0)$.
The functions $t_0(x)$ and $t_1(x)$ will satisfy the following boundary conditions
\begin{eqnarray}
t_{\sigma}(x=0)&=0,\label{BCts}\\
\frac{\partial t_{\sigma}(x)}{\partial x}\Big|_{x=c}&=0,\label{BCdts}
\end{eqnarray}
where the initial state of the potential is $\sigma=\{0,1\}$. The first relation enforces the absorption at $x=0$, whereas the second one follows from imposing a zero flux through the reflective wall placed at $x=c$ \cite{gardiner2004handbook}.
Let us introduce the parameter
\begin{equation}
\epsilon\equiv \frac{r_1}{r_0},
\end{equation}
which does not need to be small for the time being, and let us define the function
\begin{equation}\label{defS}
S(x)\equiv t_0(x)-t_1(x).
\end{equation}
Eqs. (\ref{TP1})-(\ref{TP2}) can be rewritten as
\begin{eqnarray}
\frac{\partial^2 t_1(x)}{\partial x^2}-v'(x)\frac{\partial t_1(x)}{\partial x}=-1-\epsilon r_0S(x),\label{TP1S}\\
\frac{\partial^2 S(x)}{\partial x^2}-r_0S(x)=-1-\frac{\partial^2 t_1(x)}{\partial x^2}.\label{TP2S}
\end{eqnarray}
By construction, $S(x)$ satisfies the boundary conditions
\begin{eqnarray}
S(x=0)&=0,\label{BCS}\\
\frac{\partial S(x)}{\partial x}\Big|_{x=c}&=0.\label{BCdS}
\end{eqnarray}
Eqs. (\ref{TP1S})-(\ref{TP2S}) take the following forms
\begin{eqnarray}
e^{v(x)}\frac{\partial}{\partial x}\left(e^{-v(x)}\frac{\partial}{\partial x}t_1(x)\right)=-1-\epsilon r_0S(x),\label{TP1S2}\\
e^{\sqrt{r_0}x}\frac{\partial}{\partial x}\left(e^{-2\sqrt{r_0}x}\frac{\partial}{\partial x}e^{\sqrt{r_0}x}S(x)\right)=-1-\frac{\partial^2 t_1(x)}{\partial x^2}.\label{TP2S2}
\end{eqnarray}
Each equation can be integrated directly and one obtains coupled expressions for the general solutions $t_1(x)$ and $S(x)$:
\begin{eqnarray}
\fl
t_1(x)=C_1\int^x_0 d\tau\ e^{v(\tau)}+C_2-\int^x_0 dy\ e^{v(y)}\int^y_0 dz\ e^{-v(z)}\left[1+\epsilon r_0S(z)\right]\label{t1integral},\\
\fl
S(x)=C_3e^{-\sqrt{r_0}x}+C_4e^{\sqrt{r_0}x}+\frac{1}{r_0}-e^{-\sqrt{r_0}x}\int^x_0 dy\ e^{2\sqrt{r_0}y}\int^y_0 dz\ e^{-\sqrt{r_0}z}\frac{\partial^2 t_1(z)}{\partial z^2}\label{Sintegral}
\end{eqnarray}
where the constants $C_i$ are determined from the boundary conditions. Integrating by parts, the double integral in Eq. (\ref{Sintegral}) simplifies to a single integral:
\begin{equation}
S(x)=C_3e^{-\sqrt{r_0}x}+C_4e^{\sqrt{r_0}x}+\frac{1}{r_0}-\int^x_0 dy\ \frac{\partial t_1(y)}{\partial y}\cosh{\sqrt{r_0}(x-y)}\label{Sintegral2}.
\end{equation}
The integral of the r.h.s. can be integrated by parts again and written in terms of $t_1$ instead of its derivative. However, for the numerical evaluation of these expressions, it is more convenient to keep Eq. (\ref{Sintegral2}), as we will see later.
Imposing the boundary conditions (\ref{BCts})-(\ref{BCdts}) or (\ref{BCS})-(\ref{BCdS}) one gets
\begin{eqnarray}
\fl t_1(x)= &\int^x_{0}dy\ e^{v(y)}\int^c_ydz\ e^{-v(z)}+\epsilon r_0\int^x_{0}dy\ e^{v(y)}\int^c_ydz\ e^{-v(z)} S(z),\label{t&S}\\
\fl S(x)= &\frac{1}{r_0}-\frac{\cosh{\sqrt{r_0}(c-x)}}{r_0\cosh{\sqrt{r_0}c}}+\sinh{\sqrt{r_0}x}\int^c_0 dy \frac{\partial t_1(y)}{\partial y}\frac{\sinh{\sqrt{r_0}(c-y)}}{\cosh{\sqrt{r_0}c}}\nonumber\\
\fl &-\int^x_0 dy \frac{\partial t_1(y)}{\partial y}\cosh{\sqrt{r_0}(x-y)}.\label{S&F&t}
\end{eqnarray}
Up to this point we have not made any approximation. Although we have obtained a formal solution of the system (\ref{TP1S})-(\ref{TP2S}), the functions are still coupled and {\it a priori} difficult to solve explicitly.
\section{Perturbative method for a general potential}\label{SecPerturI}
To make some progress, we develop an exact perturbative theory by expanding $S$ and $t_1$ in powers of $\epsilon=r_1/r_0$,
assuming $r_1\ll r_0$.
Let us look for solutions of the form:
\begin{eqnarray}
t_1(x)&=&t_1^{(0)}(x)+\epsilon t_1^{(1)}(x)+\epsilon^2 t_1^{(2)}(x)+\dots. \label{sert}\\ S(x)&=&S^{(0)}(x)+\epsilon S^{(1)}(x)+\epsilon^2 S^{(2)}(x)+\dots.\label{serS}
\end{eqnarray}
at small $\epsilon$. The function $t_1^{(0)}$ is related to the classic Kramers' problem of first passage over a steady potential barrier.
The functions $t_1^{(1)},\dots,S^{(0)},S^{(1)},\dots,$ depend on both the potential shape and the rate $r_0$, and can be determined recursively. We will particularly focus on $t_1(x)$, the MFPT of the Brownian particle starting from $x$ with a potential initially applied, and on its first order coefficient $t_1^{(1)}(x)$. The dispersion relation introduced in Eq. (\ref{eq0}) is identified with
\begin{equation}
f(k,r_0)\rightarrow\frac{t_1^{(1)}(x)}{r_0}.
\end{equation}
When the coefficient $t_1^{(1)}(x)$ changes sign, a transition between two qualitatively different behaviours occurs. If the potential is such that
\begin{equation}
t_1^{(1)}(x)>0\ {\rm for\ any}\ r_0,
\end{equation}
then switching the potential off and on back and forth ({\it i.e.}, setting $\epsilon$ small but $>0$) will always result in delaying target encounter on average compared to the case with the potential permanently applied, or $\epsilon=0$. Conversely, if
\begin{equation}
t_1^{(1)}(x)<0\ {\rm for\ some\ values\ of\ } r_0,
\end{equation}
then the intermittent dynamics of the potential can help to shorten the mean search time, as in the example sketched in figure \ref{fig:Fig0} .
\subsection{Leading order in \texorpdfstring{$\epsilon$}{Lg}}
By inserting the expansions (\ref{sert})-(\ref{serS}) into (\ref{t&S})-(\ref{S&F&t}) we obtain
at leading order:
\begin{eqnarray}
\fl
t^{(0)}_1(x)=&\int^x_{0}dy \int^c_ydz\ e^{v(y)-v(z)},\label{TP1S0}\\
\fl
S^{(0)}(x)=&\frac{1}{r_0}-\frac{\cosh{\sqrt{r_0}(c-x)}}{r_0\cosh{\sqrt{r_0}c}}+\sinh{\sqrt{r_0}x}\int^c_0 dy \int^c_ydz\ e^{v(y)-v(z)}\frac{\sinh{\sqrt{r_0}(c-y)}}{\cosh{\sqrt{r_0}c}}\nonumber\\
\fl &-\int^x_0 dy \int^c_y dz\ e^{v(y)-v(z)}\cosh{\sqrt{r_0}(x-y)}.\label{TP2S0}
\end{eqnarray}
The solution of $t_1^{(0)}(x)$ in Eq. (\ref{TP1S0}) corresponds to the MFPT of the standard problem for a particle in a steady external potential $v(x)$ \cite{gardiner2004handbook}. It is related to the well-known Kramers' escape problem in equilibrium. Eqs. (\ref{TP1S0})-(\ref{TP2S0}) combined with the definition (\ref{defS}) yield $t_0^{(0)}(x)$, which corresponds physically to the MFPT to the origin of the particle starting at $x$, with the potential initially "off" and which transits only once to the "on" state at rate $r_0$.
\subsection{Higher orders}
At linear order in $\epsilon$, one obtains the aforementioned dispersion relation, one of the main results of this paper:
\begin{eqnarray}
\fl t_1^{(1)}(x)=&t_1^{(0)}(x)-\int^x_{0}dy \int^c_ydz\ e^{v(y)-v(z)}\frac{\cosh{\sqrt{r_0}(c-z)}}{\cosh{\sqrt{r_0}c}}\nonumber\\
\fl &+r_0\left[\int^c_0 dy \int^c_y dz\ e^{v(y)-v(z)}\frac{\sinh{\sqrt{r_0}(c-y)}}{\cosh{\sqrt{r_0}c}}\right]\left[\int^x_{0}dy\int^c_ydz\ e^{v(y)-v(z)}\sinh{\sqrt{r_0}z}\right]\nonumber\\
\fl &-r_0\int^x_{0}dy\int^c_ydz\int^z_0 du \int^c_u dw\ e^{v(y)-v(z)+v(u)-v(w)}\cosh{\sqrt{r_0}(z-u)},\label{TP1S1}
\end{eqnarray}
and
\begin{eqnarray}
S^{(1)}(x)=&\sinh{\sqrt{r_0}x}\int^c_0 dy\ \frac{\partial t^{(1)}_1(y)}{\partial y}\frac{\sinh{\sqrt{r_0}(c-y)}}{\cosh{\sqrt{r_0}c}}\nonumber\\
&-\int^x_0 dy\ \frac{\partial t_1^{(1)}(y)}{\partial y}\cosh{\sqrt{r_0}(x-y)}.\label{TP2S1}
\end{eqnarray}
At order $\epsilon^m$, with $m$ an integer larger than one, Eqs. (\ref{t&S})-(\ref{S&F&t}) lead to
\begin{eqnarray}
t_1^{(m)}(x)=&r_0\int^x_{0}dy\ e^{v(y)}\int^c_ydz\ e^{-v(z)}S^{(m-1)}(z),\label{TP1Sn}\\
S^{(m)}(x)=&\sinh{\sqrt{r_0}x}\int^c_0 dy\ \frac{\partial t^{(m)}_1(y)}{\partial y}\frac{\sinh{\sqrt{r_0}(c-y)}}{\cosh{\sqrt{r_0}c}}\nonumber\\
&-\int^x_0 dy\ \frac{\partial t_1^{(m)}(y)}{\partial y}\cosh{\sqrt{r_0}(x-y)},\label{TP2Sn}
\end{eqnarray}
The relatively simple relation between $t_1^{(n)}$ and $S_1^{(n-1)}$ allows us to recursively compute any $n$-th order term in principle. The expressions rapidly become complicated, though, and we will limit our analysis to the terms of order $\epsilon$, which are sufficient for our purpose.
\subsection{Semi-infinite line}
The above expressions can be written for the case of the semi-infinite line. This can be achieved by letting the position $c$ of the reflective wall tend to infinity. The expressions (\ref{TP1S0})-(\ref{TP2S0}) become
\begin{eqnarray}
t^{(0)}_1(x)=&\int^x_{0}dy\ \int^\infty_ydz\ e^{v(y)-v(z)},\label{TP1S0Infty}\\
S^{(0)}(x)=&\frac{1-e^{-\sqrt{r_0}x}}{r_0}+\sinh{\sqrt{r_0}x}\int^\infty_0 dy \int^\infty_y dz\ e^{v(y)-v(z)}e^{-\sqrt{r_0}y}\nonumber\\
&-\int^x_0 dy \int^\infty_ydz\ e^{v(y)-v(z)}\cosh{\sqrt{r_0}(x-y)},\label{TP2S0Infty}
\end{eqnarray}
and at order one,
\begin{eqnarray}
\fl t_1^{(1)}(x)=&t_1^{(0)}(x)-\int^x_{0}dy \int^\infty_ydz\ e^{v(y)-v(z)-\sqrt{r_0}z}\nonumber\\
\fl &+r_0\left[\int^\infty_0 dy \int^\infty_y dz\ e^{v(y)-\sqrt{r_0}y-v(z)}\right]\left[\int^x_{0}dy\int^\infty_ydz\ e^{v(y)-v(z)}\sinh{\sqrt{r_0}z}\right]\nonumber\\
\fl &-r_0\int^x_{0}dy\int^\infty_ydz\int^z_0 du \int^\infty_u dw\ e^{v(y)-v(z)+v(u)-v(w)}\cosh{\sqrt{r_0}(z-u)},\label{TP1S1Infinity}\\
\fl S^{(1)}(x)=&\sinh{\sqrt{r_0}x}\int^\infty_0 dy\ \frac{\partial t^{(1)}_1(y)}{\partial y}e^{-\sqrt{r_0}y}-\int^x_0 dy\ \frac{\partial t_1^{(1)}(y)}{\partial y}\cosh{\sqrt{r_0}(x-y)},\label{TP2S1Infinity}
\end{eqnarray}
In the following we proceed to analyse these expressions, as well as Eqs. (\ref{TP1S0})-(\ref{TP2S1}) with a finite domain size $c$, for different potential shapes.
\section{Application to potentials of the form \texorpdfstring{$v(x)=k|x-1|^n/n$}{Lg}}\label{secPoteltialPower}
Let us consider a symmetric confining potential of the form $V(X)=K|X-X_0|^n/n$, with stiffness $K>0$ and exponent $n>0$, or $v(x)=k|x-1|^n/n$ in adimensional units. As the target is located at the origin and the minimum of the potential at $X_0$, in the dimensionless units defined in Section \ref{secMFPT} this minimum is at a distance unity from the target. The dimensionless stiffness is given by
\begin{equation}
k=\frac{KX_0^n}{\Gamma D}.
\end{equation}
Although we obtained expressions for any value of the starting position $x$, we will focus on the case $x=1$, {\it i.e.}, the particle starting at the minimum of the potential. The particular case of the V-shaped potential ($n=1$) has been analyzed in \cite{Mercado_V_squez_2020} on the semi-infinite line ($c=\infty$) by direct resolution of the first passage equations (\ref{TP1})-(\ref{TP2}).
In the following, let us define the function
\begin{equation}
\fl G_n(x,c)=e^{\frac{k}{n}|x-1|^n}\int^c_x dy\ e^{-\frac{k}{n}|y-1|^n}=e^{\frac{k}{n}|x-1|^n}\frac{\gamma_{\frac{1}{n}}\left(\frac{k}{n}(c-1)^n\right)-\frac{|x-1|}{x-1}\gamma_{\frac{1}{n}}\left(\frac{k}{n}|x-1|^n\right)}{n^{1-\frac{1}{n}} k^{\frac{1}{n}}},\label{Gfun}
\end{equation}
where $\gamma_a(x)=\int^x_0 dz\ z^{a-1}e^{-z}$ is the lower incomplete gamma function. Inserting $v(x)=k|x-1|^n/n$ into Eq. (\ref{TP1S0}) gives
\begin{equation}
t^{(0)}_1(x)=\int^x_0 dy\ G_n(y,c).\label{t10Vabs}
\end{equation}
Substituting the above expression into Eq. (\ref{TP2S0}) we obtain
\begin{eqnarray}
\fl S^{(0)}(x)=&\frac{1}{r_0}-\frac{\cosh{\sqrt{r_0}(c-x)}}{r_0\cosh{\sqrt{r_0}c}}-\int^x_0 dy\ G_n(y,c)\cosh{\sqrt{r_0}(x-y)}\nonumber\\
\fl &+\sinh{\sqrt{r_0}x}\int^c_0 dy\ G_n(y,c)\frac{\sinh{\sqrt{r_0}(c-y)}}{\cosh{\sqrt{r_0}c}}.\label{S0Vabs}
\end{eqnarray}
From Eq. (\ref{TP1S1}), the dispersion relation is re-expressed as
\begin{eqnarray}
\fl t_1^{(1)}(x)=&t_1^{(0)}(x)-r_0\int^x_{0}dy\int^c_ydz\int^z_0 du \int^c_u dw\ e^{\frac{k}{n}\left(|y-1|^n-|z-1|^n+|u-1|^n-|w-1|^n\right)}\cosh{\sqrt{r_0}(z-u)}\nonumber\\
\fl &-\int^x_{0}dy \int^c_ydz\ e^{\frac{k}{n}|y-1|^n-\frac{k}{n}|z-1|^n}\Bigg(\frac{\cosh{\sqrt{r_0}(c-z)}}{\cosh{\sqrt{r_0}c}}\nonumber\\
\fl &-r_0\sinh{\sqrt{r_0}z}\left[\int^c_0 du\ G_n(u,c)\frac{\sinh{\sqrt{r_0}(c-u)}}{\cosh{\sqrt{r_0}c}}\right]\bigg).\label{t11npot}
\end{eqnarray}
\subsection{Harmonic potentials}\label{SecHarmonicPot}
Let us consider the important case $n=2$, {\it i.e.}, in which the switching potential is harmonic, or $v(x)=k(x-1)^2/2$.
When the potential is permanently applied, the particle follows a bounded Orstein-Uhlenbeck (OU) process of unit mean \cite{risken1984fokker}. The MFPT to the origin, starting from $x$, is given by the Kramers' relation
\begin{equation}
t^{(0)}_1(x)=\int^x_{0}dy\ e^{\frac{k}{2}(y-1)^2}\int^c_ydz\ e^{-\frac{k}{2}(z-1)^2}.\label{OUmfpt}
\end{equation}
(See \ref{OU section} for a standard derivation of this expression.)
As mentioned earlier, all the numerical results below will consider the starting position $x=1$.
Before discussing the effects of the off-on dynamics of the potential, one can notice from the above expression that $t_1^{(0)}(x=1)$ increases monotonically with $k$ when the position of the reflecting wall $c$ is below a particular value $c_0$. In this case, the MFPT is thus minimal at $k=0$, {\it i.e.}, when the particle diffuses freely without any external force and $t_1^{(0)}(k=0,c)=c-\frac{1}{2}$. On the other hand, when $c>c_0$, the MFPT $t_1^{(0)}$ exhibits a non-monotonic behaviour with $k$ and reaches a minimum at a certain value $k_{OU}>0$ which depends on $c$, see further the blue curve of Fig. \ref{fig:FigH2}a. The value of $c_0$ corresponds to the precise point in which the slope of $t_1^{(0)}(k,c)$ at $k=0$ changes from positive to negative values, \textit{i.e.},
\begin{equation}
\frac{\partial t_1^{(0)}(k,c_0)}{\partial k}\Bigg |_{k=0}=0.
\end{equation}
Solving the above relation for $c_0$ using Eq. (\ref{OUmfpt}) we obtain
\begin{equation}
c_0=2.19148\dots
\end{equation}
This transition was studied in details in \cite{mercado2022freezing}.
Here, we will assume that the domain size is sufficiently large, or $c>c_0$, and will discuss the case $c<c_0$ afterwards.
Taking $n=2$ in Eq. (\ref{Gfun}), the function $G_2(x,c)$ can be recast as
\begin{equation}
\fl G_2(x,c)=e^{\frac{k}{2}(x-1)^2}\sqrt{\frac{\pi}{2k}}\left[\mathrm{erf}\left( \sqrt{k/2}(c-1)\right)-\mathrm{erf}\left( \sqrt{k/2}(x-1)\right)\right],
\end{equation}
where $\mathrm{erf}(x)=\frac{2}{\sqrt{\pi}}\int^z_0dz\ e^{-z^2}$ is the error function. By replacing $G_2(x,c)$ into Eq. (\ref{t11npot}), $t_1^{(1)}(x)$ can be computed by numerical integration.
Figure \ref{fig:FigH1}a displays the dispersion relation as a function of $r_0$, obtained from evaluating $t_1^{(1)}(x)$ at $x=1$, in a domain of size $c=3$ and fixing $k$ at different representative values. Similarly to the scheme of figure \ref{fig:Fig0}, this function is non-monotonic with $r_0$. When the potential stiffness is below a certain critical value, or $k<k_c(c)=1.49823\dots$ for $c=3$, the function $t_1^{(1)}$ always stays positive. This means that turning alternatively the potential off (at a small rate $r_1$) and on (at any rate $r_0$) will always increase the mean search time compared with the Kramers' case $r_1=0$. At the marginal case $k=k_c$, however, the curve of $t_1^{(1)}$ becomes tangent to the $x-$axis, at a critical resetting rate $r_0=r_c$. One finds surprisingly large value, $r_c=56.66926\dots$ for $c=3$. If the potential stiffness is slightly above $k_c$, there exists a small window of values of $r_0$ around $r_c$ for which $t_1^{(1)}$ is negative. Therefore, setting $r_0\simeq r_c$ and a small $r_1>0$ will shorten the mean search time, as illustrated in figure \ref{fig:Fig0}. The agreement between the theory and a direct numerical solution of Eqs. (\ref{TP1})-(\ref{TP2}) is excellent. To compute the numerical solutions, we used an implicit finite difference scheme which is described in \ref{finitdif}.
\begin{figure}[t
\centering
\includegraphics[width=\textwidth]{figureH1a_c.pdf}
\caption{Searches starting from $x=1$ and with the harmonic potential on at $t=0$. (a) Coefficient of the first correction in the series expansion of $t_1$ near $r_1=0$ (the \lq\lq dispertion relation\rq\rq) as a function of $r_0$ for a fixed domain size $c=3$, for various $k$ near $k_c(c=3)=1.49819\dots$. The points represent the results from numerically solving Eqs. (\ref{TP1})-(\ref{TP2}) by using a finite differences scheme. (b) and (c): Critical potential stiffness $k_c$ (next to $k_{OU}$ shown with the dotted line) and optimal switch-off rate $r_c$ as a function of the domain size $c$, respectively. }
\label{fig:FigH1}
\end{figure}
Figures \ref{fig:FigH1}b and \ref{fig:FigH1}c display the behaviour of the critical parameters $k_c$ and $r_c$, respectively, as a function of the domain size. The variations of the optimal stiffness $k_{OU}$ in equilibrium are also shown.
It is quite remarkable that $k_c$ is always very close to $k_{OU}$, but a bit lower. For instance, for $c=3$, we find $k_{OU}=1.51603\dots$, to be compared to the value $k_c=1.49823\dots$ mentioned above. Another surprising property is that $r_c$ is consistently much larger than unity: in dimensional units, the value of $r_0$ that minimizes $t_1$ is thus much larger than the inverse diffusion time to the target.
For $c<c_0$, one has $k_{OU}=0$ and a marginal dispersion relation cannot be found, therefore the pair $(k_c,r_c)$ cannot be defined. Numerical investigations indicate that $t_1^{(1)}$ is negative for all values of $k$ and $r_0$ in this case.
The results of Fig. \ref{fig:FigH1}a demonstrate the existence in large enough domains of a phase transition in the optimal parameters $(r_0^*,r_1^*)$, {\it i.e.}, the rates $(r_0,r_1)$ that minimize $t_1$. For $k<k_c$, we have $r_1^*(k)=0$; whereas $r_1^*(k)>0$ for $k>k_c$. Likewise, $r_0^*(k)$ is not defined below $k_c$, while $r_0^*(k)\simeq r_c$ for $k$ in the vicinity of $k_c$ and above. Determining the behavior of $r_1^*(k)$ slightly above $k_c$ would require an expansion at the following order $\epsilon^2$ in Eqs. (\ref{sert})-(\ref{serS}), see also Eq. (\ref{eq0}). Assuming that $t_1^{(1)}\propto k_c-k$ at $r_0=r_c$ and that the second order coefficient $t_1^{(2)}$ is $>0$ for $(k,r_0)\simeq (k_c,r_c)$, the minimization of the MFPT with respect to $r_1$ gives
\begin{equation}\label{orderparam}
r_1^*(k)\propto k-k_c,
\end{equation}
close to the transition and when $k>k_c$. Therefore the transition is continuous with an exponent $\beta=1$ for the "order parameter" $r_1^*$.
We can alternatively solve Eqs. (\ref{TP1})-(\ref{TP2}) at $k$ fixed with the discrete element method described in \ref{finitdif}, and minimize the solution $t_1(x=1)$ numerically with respect to $(r_0,r_1)$. Figure \ref{fig:FigH2}a displays the corresponding optimal search time $t_1^*(k)$ obtained. This quantity decreases monotonously with $k$. Figure \ref{fig:FigH2}b-c shows the corresponding optimal rates $r_0^*$ and $r_1^*$ as a function of $k$. The continuous character of the transition predicted by Eq. (\ref{orderparam}) can be appreciated in figure \ref{fig:FigH2}c and its inset.
Well above $k_c$, the optimal time of Fig. \ref{fig:FigH2}a becomes much smaller than the Kramers' time $t_1^{(0)}(k)$, which typically keeps increasing exponentially with $k$. In the limit $k\rightarrow\infty$, one recovers the optimal solution of the problem of diffusion with instantaneous stochastic resetting
to the starting position, where $t_1^*\rightarrow 1.5451...$ and $r_0^*\rightarrow 2.5396...$ \cite{EvansPRL2011}.
In very steep potentials, at large $k$, the diffusive particle is brought back very rapidly to the potential minimum at $x_0=1$. Therefore, the potential must be switched off rapidly to allow further diffusion and $r_1^*\rightarrow\infty$.
\begin{figure}[t
\centering
\includegraphics[width=\textwidth]{figureH2a_c.pdf}
\caption{Searches starting from $x=1$ and with the harmonic potential on at $t=0$ and with $c=3$. (a) Minimal MFPT $t_1^*$ as a function of the potential stiffness $k$. The orange line is obtained from numerical minimization of the numerical solution with respect to $(r_0,r_1)$. The blue line represents $t_1$ for a particle in a steady potential ($r_1=0$). (b) and (c): optimal rates $r_1^*(k)$ and $r_0^*(k)$. }
\label{fig:FigH2}
\end{figure}
\subsection{V-shaped potential}\label{SecVPot}
In the case $n=1$, the switching potential is of the form $v(x)=k|x-1|$ and the rescaled potential strength given by
\begin{equation}
k=\frac{KX_0}{\Gamma D}.
\end{equation}
The results are qualitatively similar to the harmonic case, see Fig. \ref{fig:FigV1} where the domain size is $c=3$, as well as to those obtained in \cite{Mercado_V_squez_2020} in the case of the semi-infinite line geometry or $c=\infty$. Notice that the curvature of the dispersion relation is larger near $r_c$ than in the harmonic case.
Setting $n=1$ in the expression (\ref{Gfun}) for $G_n(x,c)$ we get
\begin{equation}
G_1(x,c)=\frac{e^{k | x-1| }}{k} \left(1-e^{-k ( c-1) }-\frac{| x-1|}{x-1}\left(1-e^{-k | x-1|
}\right)\right).
\end{equation}
Let us denote as $t_1^{(0)}(x,-)$ the solution in the range $0\le x<1$ and $t_1^{(0)}(x,+)$ the solution in $1<x<c$. Replacing the expression for $G_1(x,c)$ into Eq. (\ref{t10Vabs}) we obtain the Kramers' times
\begin{eqnarray}
t_1^{(0)}(x,-)=&\frac{\left(2-e^{-k(c-1)}\right)\left(e^{k}-e^{-k (x-1)}\right)-xk}{k^2},\label{t10Vshape1}\\
t_1^{(0)}(x,+)=&\frac{2(e^{k}-1)+(x-2)k+e^{-k(c-1)}(2-e^{k})-e^{-k (c-x)}}{k^2}\label{t10Vshape2}.
\end{eqnarray}
\begin{comment}
From Eq. (\ref{S0Vabs}) and denoting $S^{(0)}(x,-)$ and $S^{(0)}(x,+)$ as before, we get
\begin{eqnarray}
S^{(0)}(x,-)=&\frac{1}{r_0}-\frac{\cosh{\sqrt{r_0}(c-x)}}{r_0\cosh{\sqrt{r_0}c}}+\frac{(2-e^{-k(c-1)})e^{k}}{k^2-r_0}\left(e^{-k x}-\cosh\sqrt{r_0} x+\sinh{\sqrt{r_0}x}\tanh\sqrt{r_0}c\right)\nonumber\\
&+\frac{2\sinh{\sqrt{r_0}x}}{(k^2-r_0)\cosh{\sqrt{r_0}c}}\left(\frac{k}{\sqrt{r_0}}\left[\cosh{\sqrt{r_0}(c-1)}-\frac{1}{2}\right]-(1-e^{-k (c-1) })\sinh\sqrt{r_0}(c-1)\right)\\
S^{(0)}(x,+)=&\frac{1}{r_0}-\frac{\cosh{\sqrt{r_0}(c-y)}}{r_0\cosh{\sqrt{r_0}c}}+\frac{(2-e^{-k(c-1)})e^k}{k^2-r_0}\left(\sinh{\sqrt{r_0}x}\tanh \sqrt{r_0}c-\cosh \sqrt{r_0} x\right)\nonumber\\
&+\frac{2(1-e^{-k(c-1)})\cosh \sqrt{r_0} (x-1)-\frac{2k}{\sqrt{r_0}}\sinh{\sqrt{r_0}(x-1)}+e^{-k (c-x)}}{k^2-r_0}\nonumber\\
&+\frac{2\sinh{\sqrt{r_0}x}}{(k^2-r_0)\cosh{\sqrt{r_0}c}}\left(\frac{k}{\sqrt{r_0}}\left[\cosh{\sqrt{r_0}(c-1)}-\frac{1}{2}\right]-\left(1-e^{-k (c-1) }\right)\sinh{\sqrt{r_0}(c-1)}\right)
\end{eqnarray}
\end{comment}
It is easy to check the continuity of the MFPT at $x=1$, or $t_1^{(0)}(1,-)=t_1^{(0)}(1,+)$.
The complete expressions of $S^{(0)}(x)$ and $t_1^{(1)}(x)$ are somehow intricate and we do not write them here. Taking $x=1$ in Eq. (\ref{t10Vshape1}) one gets
\begin{equation}
t_1^{(0)}(k,c)=\frac{\left(2-e^{-k(c-1)}\right)\left(e^{k}-1\right)-k}{k^2},\label{t10Vshape1x1}
\end{equation}
where we have made explicit the dependency of the MFPT with the variables $k$ and $c$.
As in the case of the harmonic potential, there exists a critical value $c_0$ such that $(i)$ if $c<c_0$ the minimum of the MFPT $t_1^{(0)}$ is achieved only at $k=0$ and, $(ii)$ if $c>c_0$, there is a finite potential strength $k$ at which the MFPT $t_1^{(0)}$ is minimum. The value $c_0$ satisfies
\begin{equation}
\frac{\partial t_1^{(0)}(k,c_0)}{\partial k}\Bigg |_{k=0}=0.
\end{equation}
Solving the above relation for $c_0$ and using Eq. (\ref{t10Vshape1x1}) we obtain
\begin{equation}
c_0=2.26376\dots
\end{equation}
\begin{figure}[t
\centering
\includegraphics[width=\textwidth]{figureV1a_c.pdf}
\caption{Searches starting from $x=1$ and with the potential on at $t=0$. (a) Coefficient of the first correction in the series expansion of $t_1$ near $r_1=0$ (the \lq\lq dispertion relation\rq\rq) as a function of $r_0$ and at the fixed value $c=3$, for various $k$ near $k_c(c=3)=0.806777\dots$. (b) and (c): Critical potential stiffness $k_c$ (next to $k_{OU}$ shown with the dotted line) and optimal switch-off rate $r_c$ as a function of the domains size $c$, respectively. }
\label{fig:FigV1}
\end{figure}
If we let $c\to\infty$, the equations (\ref{t10Vshape1})-(\ref{t10Vshape2}) reduce to the simple form
\begin{eqnarray}
t_1^{(0)}(x,-)=&\frac{2e^{k}\left(1-e^{-k x}\right)-xk}{k^2},\\
t_1^{(0)}(x,+)=&\frac{2(e^{k}-1)+(x-2)k}{k^2},
\end{eqnarray}
which were obtained in \cite{Mercado_V_squez_2020}.
With these results and by using Eq. (\ref{TP2S0Infty}) we can calculate the leading order $S^{(0)}$ for the semi-infinite line,
\begin{eqnarray}
S^{(0)}(x,-)=&\frac{1-e^{-\sqrt{r_0}x}}{r_0}+\frac{2e^{k}\left(e^{-k x}-e^{-\sqrt{r_0}x}\right)}{k^2-r_0}+\frac{2e^{-\sqrt{r_0}}\sinh{\sqrt{r_0}x}}{\sqrt{r_0}(k+\sqrt{r_0})},\\
S^{(0)}(x,+)=&\frac{1-e^{-\sqrt{r_0}x}}{r_0}+\frac{2e^{-\sqrt{r_0}x}\left(\frac{k}{\sqrt{r_0}}\sinh{\sqrt{r_0}}+\cosh{\sqrt{r_0}}-e^{k}\right)}{k^2-r_0}.
\end{eqnarray}
Recalling that $t_0(x)=S(x)+t_1(x)$, deduce the first passage time with the initial condition $\sigma(t=0)=0$:
\begin{eqnarray}
\fl t^{(0)}_0(x,-)=&\frac{1-e^{-\sqrt{r_0}x}}{r_0}+\frac{2e^{k}\left(1-e^{-k x}\right)-xk}{k^2}+\frac{2e^{k}\left(e^{-k x}-e^{-\sqrt{r_0}x}\right)}{k^2-r_0}\nonumber\\
\fl &+\frac{2e^{-\sqrt{r_0}}\sinh{\sqrt{r_0}x}}{\sqrt{r_0}(k+\sqrt{r_0})},\\
\fl t^{(0)}_0(x,+)=&\frac{1-e^{-\sqrt{r_0}x}}{r_0}+\frac{2(e^{k}-1)+(x-2)k}{k^2}\nonumber\\
\fl &+\frac{2e^{-\sqrt{r_0}x}\left(\frac{k}{\sqrt{r_0}}\sinh{\sqrt{r_0}}+\cosh{\sqrt{r_0}}-e^{k}\right)}{k^2-r_0},
\end{eqnarray}
recovering the results obtained in \cite{Mercado_V_squez_2020}.
\section{Stationary density with an intermittent harmonic potential}\label{SecSteady}
In this Section we derive the exact expressions for the non-equilibrium stationary states generated by an intermittent harmonic potential on the infinite line. These results generalise the case $r_0=r_1=\gamma$ studied in \cite{santra2021brownian}.
Let us introduce $P_\sigma(X,t)$ as the joint probability density that the particle is in the vicinity of $X$ and the potential in state $\sigma=\{0,1\}$ at time $t$ (the initial condition being implicit). The complete probability density is given by
\begin{equation}
P(X,t)=P_0(X,t)+P_1(X,t),
\end{equation}
and we will focus on $\lim_{t\rightarrow\infty} P(X,t)$.
For a general intermittent potential $V(X)$, these densities satisfy the forward Fokker-Planck equations
\begin{eqnarray}
\fl \frac{\partial}{\partial t}P_0(X,t)&=D\frac{\partial^2}{\partial X^2}P_0(X,t)-R_0 P_0(X,t)+R_1P_1(X,t),\label{dpst0}\\
\fl \frac{\partial }{\partial t}P_1(X,t)&=D\frac{\partial^2}{\partial X^2}P_1(X,t)+\frac{1}{\Gamma}\frac{\partial}{\partial X}\left[ V^{\prime}(X)P_1(X,t)\right]-R_1 P_1(X,t)+R_0P_0(X,t)\label{dpst1}.
\end{eqnarray}
For a harmonic potential $V(X)=\frac{K}{2}X^2$ (we now place the minimum of the potential at the origin), Eqs. (\ref{dpst0})-(\ref{dpst1}) read
\begin{eqnarray}
\fl \frac{\partial}{\partial t}P_0(X,t)&=D\frac{\partial^2}{\partial X^2}P_0(X,t)-R_0 P_0(X,t)+R_1P_1(X,t),\label{dpst0p}\\
\fl \frac{\partial }{\partial t}P_1(X,t)&=D\frac{\partial^2}{\partial X^2}P_1(X,t)+\frac{K}{\Gamma}\frac{\partial}{\partial X}\left[ XP_1(X,t)\right]-R_1 P_1(X,t)+R_0P_0(X,t)\label{dpst1p}.
\end{eqnarray}
We again employ the dimensionless variables and parameters $x=X/L$, $t/(L^2/D)$ (re-noted as $t$), $r_0=R_0L^2/D$, $r_1=R_1L^2/D$, where $L$ is an arbitrary length. The rescaled potential stiffness $k$ reads
\begin{eqnarray}
k&=&\frac{K L^2}{\Gamma D}, \label{adimK}
\end{eqnarray}
The joint densities associated to $x=X/L$ are denoted as $p_0(x,t)$ and $p_1(x,t)$.
In the steady state limit, the time derivatives are set to zero in Eqs. (\ref{dpst0p})-(\ref{dpst1p}),
\begin{eqnarray}
\frac{\partial^2 p_0(x)}{\partial x^2}-r_0 p_0(x)+r_1p_1(x)=0,\label{dpst0p2}\\
\frac{\partial^2 p_1(x)}{\partial x^2 }+k\frac{\partial}{\partial x}\left[xp_1(x)\right]-r_1 p_1(x)+r_0p_0(x)=0\label{dpst1p2}.
\end{eqnarray}
Taking the spatial Fourier transform $\widetilde{f}(\nu)=\int_{-\infty}^\infty dx\ e^{-i\nu x}f(x)$ of Eqs. (\ref{dpst0p2})-(\ref{dpst1p2}) gives,
\begin{eqnarray}
-\left(\nu^2+r_0 \right)\widetilde{p}_0(\nu)+r_1\widetilde{p}_1(\nu)=0,\label{dpst0p3}\\
-\left(\nu^2+r_1\right)\widetilde{p}_1(\nu)-k\nu \frac{\partial}{\partial\nu}\widetilde{p}_1(\nu)+r_0\widetilde{p}_0(\nu)=0\label{dpst1p3},
\end{eqnarray}
where we have use the identities $\widetilde{\frac{\partial f(x)}{\partial x}}=i\nu \widetilde{f}(\nu)$ and $\widetilde{xf(x)}=i \frac{\partial\widetilde{f}(\nu)}{\partial \nu}$.
Combining Eqs. (\ref{dpst0p3})-(\ref{dpst1p3}) gives
\begin{equation}
\frac{\partial \widetilde{p}_1(\nu)}{\partial\nu}+\frac{\nu\left(\nu^2+r_0+r_1\right)}{k\left(\nu^2+r_0\right)}\widetilde{p}_1(\nu)=0,
\end{equation}
which is solved as
\begin{equation}
\widetilde{p}_1(\nu)=Ae^{-\int^{\nu} a(\tau)d\tau},
\end{equation}
where
\begin{equation}
a(\tau)=\frac{\tau\left(\tau^2+r_0+r_1\right)}{k\left(\tau^2+r_0\right)},\label{afunction}
\end{equation}
and $A$ is a constant to be determined later from the normalization condition. We obtain
\begin{equation}
\widetilde{p}_1(\nu)=Ae^{-\frac{\nu^2+r_1\ln{\left(\nu^2+r_0\right)}}{2k}}=\frac{Ae^{-\frac{\nu^2}{2k}}}{\left(\nu^2+r_0\right)^{\frac{r_1}{2k}}}.\label{p1sigma}
\end{equation}
From Eq. (\ref{dpst0p3}) the density $\widetilde{p}_0(\nu)$ is given by
\begin{equation}
\widetilde{p}_0(\nu)=\frac{r_1}{\nu^2+r_0}\widetilde{p}_1(\nu)=\frac{Ar_1e^{-\frac{\nu^2}{2k}}}{\left(\nu^2+r_0\right)^{\frac{r_1}{2k}+1}}.\label{p0sigma}
\end{equation}
The normalization condition imposes
\begin{equation}
\widetilde{p}_0(\nu=0)+\widetilde{p}_1(\nu=0)=\int^{\infty}_{-\infty}dx\left[p_0(x)+p_1(x)\right]=1,
\end{equation}
from which we deduce
\begin{equation}
A=\frac{r_0^{\frac{r_1}{2k}+1}}{r_0+r_1}.
\end{equation}
The full position density $\widetilde{p}(\nu)=\widetilde{p}_0(\nu)+\widetilde{p}_1(\nu)$ therefore reads
\begin{equation}
\widetilde{p}(\nu)=\frac{r_0^{\frac{r_1}{2k}+1}\left(\nu^2+r_0+r_1\right)e^{-\frac{\nu^2}{2k}}}{\left(r_0+r_1\right)\left(\nu^2+r_0\right)^{\frac{r_1}{2k}+1}}.\label{pofk}
\end{equation}
By setting $r_0=r_1\equiv\gamma$, this expression reduces to the result derived in \cite{santra2021brownian}.
We now consider a few limiting cases, where this expression simplifies.
\subsection{Limits \texorpdfstring{$r_0=\infty$}{Lg} or \texorpdfstring{$r_1=0$}{Lg}}
In those two cases, the potential always stays in the \lq\lq on" state and Eq. (\ref{pofk}) reduces to
\begin{equation}
\widetilde{p}(\nu,r_0=\infty,r_1=0)=e^{-\frac{\nu^2}{2k}},\label{pofkOH}
\end{equation}
which is easily inverted as
\begin{equation}
p(x,r_0=\infty,r_1=0)=p_{OU}(x)=\sqrt{\frac{k}{2\pi}}e^{-\frac{kx^2}{2}}.\label{OrnsteinU}
\end{equation}
One recovers the equilibrium distribution $p_{OU}(x)$ for the Ornstein-Uhlenbeck process \cite{risken1984fokker}.
\subsection{Limit \texorpdfstring{$r_1\ll k$}{Lg}}
In this limit, the potential is steep or $r_1/k\approx 0$. The probabilities $\widetilde{p}_0$ and $\widetilde{p}_1$ in Eqs. (\ref{p1sigma})-(\ref{p0sigma}) take the approximate forms
\begin{eqnarray}
\widetilde{p}_1(\nu)&=\frac{r_0}{r_0+r_1}e^{-\frac{\nu^2}{2k}},\label{p1sigma2}\\
\widetilde{p}_0(\nu)&=\frac{r_1}{r_0+r_1}\left(\frac{r_0e^{-\frac{\nu^2}{2k}}}{\nu^2+r_0}\right).\label{p0sigma2}
\end{eqnarray}
The inverse Fourier transform of Eq. (\ref{p1sigma2}) reduces to the Ornstein-Uhlenbeck distribution (\ref{OrnsteinU}), weighted by the probability that the potential is turned on. On the other hand, the inverse transform of Eq. (\ref{p0sigma2}) can be obtained from the convolution theorem by noticing that the inverse transform of $r_0/(\nu^2+r_0)$ is $\frac{\sqrt{r_0}}{2}e^{-\sqrt{r_0}|x|}$, and the inverse transform of $e^{-\nu^2/2k}$ is again given by Eq. (\ref{OrnsteinU}). Therefore
\begin{eqnarray}
p_0(x)&=\frac{r_1}{r_0+r_1}\int^\infty_{-\infty}\left(\sqrt{\frac{k}{2\pi}}e^{-\frac{ky^2}{2}}\right)\frac{\sqrt{r_0}}{2}e^{-\sqrt{r_0}|x-y|}dy.\label{p0smallr1}
\end{eqnarray}
One recognizes in this result the probability distribution of an instantaneous resetting process with rate $r_0$, averaged over a equilibrium Orstein-Uhlenbeck distribution of resetting points, $p_{OU}(y)=\sqrt{\frac{k}{2\pi}}e^{-\frac{ky^2}{2}}$, which is itself weighted by the probability that the potential is turned off \cite{Evans_2011}. In the steep potential limit, the total probability density $p(x)=p_0(x)+p_1(x)$ thus reads
\begin{equation}\label{px1}
\fl p(x)=\frac{r_0}{r_0+r_1}\sqrt{\frac{k}{2\pi}}e^{-\frac{kx^2}{2}}+\frac{r_1}{r_0+r_1}\int^\infty_{-\infty}\left(\sqrt{\frac{k}{2\pi}}e^{-\frac{ky^2}{2}}\right)\frac{\sqrt{r_0}}{2}e^{-\sqrt{r_0}|x-y|}dy.
\end{equation}
We rewrite the integral in Eq. (\ref{p0smallr1}) as
\begin{eqnarray}
\fl p_0(x)&=\frac{r_1}{2(r_0+r_1)}\sqrt{\frac{r_0k}{2\pi}}\left(\int^x_{-\infty}e^{-\frac{ky^2}{2}-\sqrt{r_0}(x-y)}dy+\int^\infty_{x}e^{-\frac{ky^2}{2}-\sqrt{r_0}(y-x)}dy\right)\nonumber\\
\fl &=\frac{r_1e^{\frac{r_0}{2k}}}{2(r_0+r_1)}\sqrt{\frac{r_0k}{2\pi}}\left(e^{-\sqrt{r_0}x}\int^x_{-\infty}e^{-\frac{k(y-\sqrt{r_0}/k)^2}{2}}dy+e^{\sqrt{r_0}x}\int^\infty_{x}e^{-\frac{k(y+\sqrt{r_0}/k)^2}{2}}dy\right)\nonumber\\
\fl &=\frac{r_1\sqrt{r_0}e^{\frac{r_0}{2k}}}{4(r_0+r_1)}\left(e^{-\sqrt{r_0}x}\mathrm{erfc}\left(\frac{\sqrt{r_0}-kx}{\sqrt{2k}}\right)+e^{\sqrt{r_0}x}\mathrm{erfc}\left(\frac{\sqrt{r_0}+kx}{\sqrt{2k}}\right)\right).\label{p0smallr1_2}
\end{eqnarray}{}
After Eq. (\ref{px1}) or (\ref{p0smallr1_2}), $p(x)$ is symmetric and in the asymptotic analysis below,
we consider the positive part, when $x\to +\infty$. The negative tail follows from symmetry. At large $z$, we use $\mathrm{erfc(z)}\approx e^{-z^2}/\sqrt{\pi}z$ and $\mathrm{erfc(-z)}\approx 2-e^{-z^2}/\sqrt{\pi}z$. One deduces the large $x$ behavior
\begin{equation}
\fl p_0(x)\approx \frac{r_1\sqrt{r_0}e^{\frac{r_0}{2k}}}{2(r_0+r_1)}\left(e^{-\sqrt{r_0}x}-\frac{\sqrt{2r_0k}e^{-\frac{kx^2}{2}-\frac{r_0}{2k}}}{\sqrt{\pi}(k^2x^2-r_0)}\right)\approx \frac{r_1e^{\frac{r_0}{2k}}}{r_0+r_1}\left(\frac{\sqrt{r_0}e^{-\sqrt{r_0}x}}{2}\right).
\end{equation}
Thus $p_0(x)$ decays exponentially for large $x$, which is much slower than the Gaussian decay of $p_1(x)$. Adding the two and using symmetry, one obtains the total probability density $p(x)$ at large $|x|$
\begin{equation}
p(x)\approx\frac{r_1\sqrt{r_0}e^{\frac{r_0}{2k}-\sqrt{r_0}|x|}}{2(r_0+r_1)}.\label{smallr1largex}
\end{equation}
\subsection{General case}
To tackle the general case for arbitrary rates $r_0$ and $r_1$, we take advantage of the convolution theorem again, noticing that the inverse Fourier transform of $(\nu^2+r_0)^{-a}$ is \cite{abramowitz}
\begin{equation}
\fl \frac{1}{2\pi} \int^\infty_{-\infty}\frac{e^{i\nu x}d\nu}{\left(\nu^2+r_0\right)^a}=
\frac{1}{\pi}\int^\infty_{0}\frac{\cos{(\nu x})d\nu}{\left(\nu^2+r_0\right)^a}=\frac{\left(2\sqrt{r_0}|x|^{-1}\right)^{\frac{1}{2}-a}}{\sqrt{\pi}\Gamma(a)}\mathbb{K}_{a-\frac{1}{2}}\left(\sqrt{r_0}|x|\right),
\end{equation}
where $\mathbb{K}_\alpha(x)$ is the modified Bessel function of the second kind and $\Gamma(\cdot)$ the Gamma function. Eq. (\ref{pofk}) can be recast as
\begin{eqnarray}
\fl p(x)=&\frac{r_1}{r_0+r_1}\left[\frac{2^{-\frac{r_1+k}{2k}}r_0^{\frac{r_1+3k}{4k}}}{\sqrt{\pi}\Gamma(\frac{r_1}{2k}+1)}\right]\int^{\infty}_{-\infty} \left(\sqrt{\frac{k}{2\pi}}e^{-\frac{ky^2}{2}}\right)|x-y|^{\frac{r_1+k}{2k}}\mathbb{K}_{\frac{r_1+k}{2k}}\left(\sqrt{r_0}|x-y|\right)dy\nonumber\\
\fl &+\frac{r_0}{r_0+r_1}\left[\frac{2^{-\frac{r_1-k}{2k}}r_0^{\frac{r_1+k}{4k}}}{\sqrt{\pi}\Gamma(\frac{r_1}{2k})}\right]\int^{\infty}_{-\infty} \left(\sqrt{\frac{k}{2\pi}}e^{-\frac{ky^2}{2}}\right)|x-y|^{\frac{r_1-k}{2k}}\mathbb{K}_{\frac{r_1-k}{2k}}\left(\sqrt{r_0}|x-y|\right)dy.
\end{eqnarray}
\begin{figure}[htp]
\centering
\includegraphics[width=.6\textwidth]{SteadyMuFix-Figure2.pdf}
\caption{Particle density for an intermittent potential of the form $v(x)=\frac{k}{2}x^2$, with fixed rate $r_0=0.01$ and stiffness $k=1$, and for several values of $r_1$. The solid lines represent the approximation (\ref{plargex}) and the symbols simulation results obtained with the Gillespie algorithm.}
\label{fig:RelativeVarianceL}
\end{figure}
The large $x$ behavior is obtained from the expansion $\mathbb{K}_{\alpha}(z)\approx \sqrt{\pi}e^{-z}/\sqrt{2z}$ at large $z$, or
\begin{eqnarray}
\fl &\int^{\infty}_{-\infty} \left(\sqrt{\frac{k}{2\pi}}e^{-\frac{ky^2}{2}}\right)|x-y|^{\frac{r_1+k}{2k}}\mathbb{K}_{\frac{r_1+k}{2k}}\left(\sqrt{r_0}|x-y|\right)dy\nonumber\\
\fl &\approx \int^{\infty}_{-\infty} \left(\frac{\sqrt{k}e^{-\frac{ky^2}{2}}}{2}\right)r_0^{-\frac{1}{4}}(x-y)^{\frac{r_1}{2k}}e^{-\sqrt{r_0}(x-y)}dy\nonumber\\
\fl &\approx r_0^{-\frac{1}{4}}x^{\frac{r_1}{2k}}e^{\frac{r_0}{2k}-\sqrt{r_0}x}\int^{\infty}_{-\infty} \left(\frac{\sqrt{k}e^{-\frac{k(y-\sqrt{r_0}/k)^2}{2}}}{2}\right)dy=\sqrt{\frac{\pi}{2}}r_0^{-\frac{1}{4}}x^{\frac{r_1}{2k}}e^{\frac{r_0}{2k}-\sqrt{r_0}x},\label{KBesselApp}
\end{eqnarray}
similarly,
\begin{eqnarray}
\fl &\int^{\infty}_{-\infty} \left(\sqrt{\frac{k}{2\pi}}e^{-\frac{y^2}{2}}\right)|x-y|^{\frac{r_1-k}{2k}}\mathbb{K}_{\frac{r_1-k}{2k}}\left(\sqrt{r_0}|x-y|\right)dy\approx
\sqrt{\frac{\pi}{2}} r_0^{-\frac{1}{4}}x^{\frac{r_1}{2k}-1}e^{\frac{r_0}{2k}-\sqrt{r_0}x}.\label{KBesselApp2}
\end{eqnarray}
Combining the expressions (\ref{KBesselApp})-(\ref{KBesselApp2}) one obtains
\begin{eqnarray}
\fl p(x)\approx\frac{r_0^{\frac{r_1+2k}{4k}}x^{\frac{r_1}{2k}}e^{\frac{r_0}{2k}-\sqrt{r_0}x}}{2^{\frac{r_1}{2k}}\Gamma(\frac{r_1}{2k})(r_0+r_1)}\left(k+\frac{\sqrt{r_0}}{x}\right)\approx\frac{k r_0^{\frac{r_1+2k}{4k}} e^{\frac{r_0}{2k}}}{2^{\frac{r_1}{2k}}\Gamma(\frac{r_1}{2k})(r_0+r_1)} |x|^{\frac{r_1}{2k}}e^{-\sqrt{r_0}|x|},\label{plargex}
\end{eqnarray}
where we have replaced $x$ by $|x|$ by symmetry.
We conclude that the exponential
tail of the non-equilibrium steady state distribution exhibits an algebraic prefactor, or $p(x)\sim |x|^{\frac{r_1}{2k}}e^{-\sqrt{r_0}|x|}$. The power-law exponent is non-trivial and depends continuously on the system parameters.
Notice that in the limit $r_1\approx 0$, $\Gamma(\frac{r_1}{2k})\approx \frac{2k
}{r_1}$ and Eq. (\ref{plargex}) reduces to Eq. (\ref{smallr1largex}). Our results are in very good agreement with simulation results obtained with the Gillespie algorithm\cite{GILLESPIE1976403}, as displayed in Fig. \ref{fig:RelativeVarianceL}.
\section{Discussion}\label{SecDiscussion}
In comparison with the classical Kramers' problem \cite{kramers1940brownian}, the theory of first passage times in time-dependent or fluctuating potentials is much less understood.
We have studied the motion of a Brownian particle which is driven out-of-equilibrium by means of an intermittent confining potential in a $1d$ bounded domain. The dynamics of the potential is defined by a two-state process, characterized by two rates $r_0$ and $r_1$. When the potential is "on", the particle is attracted toward the potential minimum, similarly to a resetting process. In the "off" state, the particle diffuses freely and has no barrier to overcome to reach an absorbing target. By properly choosing the rates $r_0$ and $r_1$, one can minimize the mean search time for a target located at a fixed position. The optimal choice of these parameters becomes non-trivial when the rescaled potential stiffness is larger than a critical value. In this case, the optimal switch-off rate $r_1^*$ is non-zero and the mean first passage time is improved with respect to the Kramers' time. Importantly, this transition exists if the domain size is large enough, the positions of the target and potential minimum being fixed. We have studied the dependence of the critical parameters on the domain size. In the limit of infinite stiffness, the particle undergoes instantaneous and perfect resetting to the potential minimum. In this case $r_1^*\rightarrow\infty$ and the well-studied resetting model introduced in \cite{EvansPRL2011} is recovered.
In unbounded domains free of absorbing targets and with an intermittent harmonic potential, we have shown that the particle always reaches a non-equilibrium stationary state, for any non-vanishing $r_0$ and $r_1$. Due to the intermittency of the potential, the particle density strongly differs from the Boltzmann-Gibbs distribution, but it does not take the simple exponential form of a pure resetting process either: it exhibits exponential tails with a power-law prefactor instead. One can actually notice from Eq. (\ref{plargex}) that this power-law correction disappears in the large stiffness limit. These findings are similar to those of \cite{santra2021brownian}, corresponding to the case $r_0=r_1=\gamma$, although the power-law corrections were not determined explicitly.
Our set-up is reminiscent of the phenomenon of resonant activation \cite{ResonantDoering1992,redner2001guide}. In that problem, the time taken by a Brownian particle to cross a fluctuating energy barrier (of a piecewise linear potential) is calculated. The barrier height switches stochastically between a higher and a lower value at some rate $\gamma$, which is the same for both transitions. Interestingly, the mean first crossing time can be minimized for a finite value of $\gamma$, which thus corresponds to a "resonance" for the reaction rate. Our set-up is somehow similar to the resonant activation set-up with a vanishing lower barrier (no potential), and if one sets $r_0=r_1=\gamma$ and $n=1$. This problem was revisited recently in the context of resetting processes and using harmonic traps \cite{santra2021brownian}. In that case, the existence of an optimal switching rate $\gamma$ was shown by numerical simulations. No phase transition occurs in this problem, though. By letting $r_0$ and $r_1$ vary independently, as we have done here, not only lower values of the mean first passage time can be reached in principle, but also a completely different phenomenology is unveiled. This can be summarized by the non-monotonic behavior of the dispersion relation $f(k,r_0)$ with respect to $r_0$, and the fact that this function changes sign when $k$ is larger than a critical value. These two combined features trigger the phase transition to the finite optimal rates $r_0^*$ and $r_1^*$.
We have focused here on the case where the initial state of the potential is "on".
Under this initial condition, we studied how getting the system out of equilibrium by switching the potential off at some small rate $r_1$ compared to the switch-on rate $r_0$ can drastically change the optimal MFPT. Further analysis of other regimes in the parameter space could also be done. When the rate $r_1$ is much larger than $r_0$, for instance, the particle is mostly freely diffusing and our analysis is not valid. In the semi-infinite geometry the MFPT diverge at $r_0=0$ and a perturbation theory is not feasible. The limit of infinite potential stiffness with arbitrary rates $r_0$ and $r_1$ has been previously studied in \cite{Mercado_V_squez_2020}. In this case, our model reduces to the problem of resetting with refractory periods \cite{evans2018effects}, in which after resetting, the particle remains immobile during a mean time $1/r_1$.
If the potential is initially in the "off" state, the full exact solution of the case $n=1$ shows qualitatively different properties whose analysis is more involved \cite{Mercado_V_squez_2020}. There is again a transition at a critical stiffness $k_c'$ (different from $k_c$) above which $r_1^*$ becomes non-zero, and the transition is discontinuous in this case. It would be interesting study this problem for other types of trapping potentials.
The present study could motivate future experiments as well as extensions of the theory to two-dimensional resetting potentials. More complicated potential shapes, not necessarily confining, could be explored as well.
Another interesting problem is the study of the distribution of the work performed by the Brownian particle until it is absorbed. The mean work can then define a search cost, whose optimal parameters might differ from those of the search time.
\vspace{.5cm}
{\bf Acknowledgements:}
GMV thanks CONACYT (Mexico) for a scholarship support and the Laboratoire de Physique Th\'eorique et Mod\`eles Statistiques (LPTMS) for hospitality. We acknowledge support from Ciencia de Frontera 2019 (CONACYT), project \lq\lq Sistemas complejos estoc\'asticos: Agentes m\'oviles, difusi\'on de part\'iculas, y din\'amica de espines\rq\rq \ (Grant 10872).
|
\section{Introduction}
There is mounting evidence for the existence of dark matter in galaxies, clusters of galaxies and the Universe at large scale, possibly in the form of a population of new elementary particles, not contained in the Standard Model of Particle Physics (for reviews, see {\it e.g.} \cite{Jungman:1995df,Bertone:2004pz,Bergstrom:2000pn,Feng:2010gw}). Astronomical and cosmological observations demonstrate that dark matter particles interact with the electromagnetic radiation much more weakly than the hadrons or the charged leptons, however observations do not require the dark matter particle to be completely decoupled from the photon.
As is well known, for an electrically neutral fermion, the Lorentz- and gauge symmetries allow a magnetic- and electric dipole moment, and an anapole moment~\cite{Fujikawa:1980yx,Petcov:1976ff,Pal:1981rm,Shrock:1982sc,Giunti:2008ve, Nieves:1981zt,Kayser:1982br}. For an electrically neutral complex vector, also an electric and magnetic quadrupole moments exist in general ~\cite{Aronson:1969ltq,Gaemers:1978hg,Hagiwara:1986vm}. Therefore, even if the dark matter particle is electrically neutral, it may couple to the photon via the different electromagnetic multipoles. In fact, if the dark matter particle has interactions with the Standard Model particles, as many models suggest, such electromagnetic multipoles will be generically generated at the quantum level. This interaction could play an important role in the direct detection of dark matter particles through the scattering with nuclei, as discussed in several works, {\it e.g.} \cite{Pospelov:2000bq,Sigurdson:2004zp,Masso:2009mu,Chang:2010en,Barger:2010gv,Banks:2010eh,Ho:2012bg,Kopp:2014tsa,Ibarra:2015fqa,Hambye:2021xvd,Hisano:2020qkq,DelNobile:2014eta,Garny:2015wea,Abe:2018emu,Sandick:2016zut,Kang:2018oej,Baker:2018uox}.
In this paper we will concentrate on Majorana fermions as dark matter candidates. In this case, the invariance of the Majorana field under the charge conjugation operation only allows the anapole moment. Concretely, we will consider the lightest neutralino in the Minimal Supersymmetric Standard Model (MSSM) as an archetype of Majorana dark matter candidate. The gauge and Yukawa interactions of the lightest neutralino with the charged particles of the Standard Model will generate an anapole moment at the one loop level. In the pure bino limit, the dark matter particle is a singlet Majorana fermion that couples to the Standard Model fermions via a t-channel mediator (the sfermions). The anapole moment of the singlet Majorana fermion has been calculated in \cite{Kopp:2014tsa}. In the pure wino and higgsino limits (as well as in the mixed cases), the dark matter particle has $SU(2)_L$ charge and also interacts with the $W$-boson, and special care has to be taken in order to ensure the gauge invariance of the result.
Similar challenges have been found in the past in the calculation of the neutrino charge radius \cite{Bardeen:1972vi,Abers:1973qs,Fujikawa:1972fe,Lee:1973fw,PhysRevD.43.2956}, or in the calculation of the off-shell magnetic form factors of quarks and leptons in non-Abelian gauge theories \cite{Papavassiliou:1993qe,CabralRosetti:2002tf,Fujikawa:1972fe,Bernabeu:2007rr}, which naively yield gauge-dependent results. The gauge dependence, clearly unphysical, arises due to redundancies in the individual Green functions which are introduced by the gauge-fixing procedure. This problem was solved by introducing the so-called pinch technique \cite{Cornwall:1989gv,Papavassiliou:1989zd,Bernabeu:2000hf,PhysRevD.61.013001,Bernabeu:2002pd}, which consists in an algorithmic diagrammatic construction of physical subamplitudes by resumming topologically similar terms within an amplitude and ultimately defining a proper and physical vertex by including only vertex-like contributions (see \cite{Binosi:2009qm} for a review). Furthermore, the resulting effective Green functions coincides with the one calculated using the background field method in the quantum Feynman gauge \cite{Denner:1994nn,Hashimoto:1994ct,Papavassiliou:1994yi}.
In this paper we will apply the background field method to calculate the anapole moment of a spin 1/2 Majorana fermion that interacts both via Yukawa couplings and via gauge couplings, showing explicitly that the result is finite and gauge invariant. The general result is presented in \cref{sec:1-loop_calculation}. In \cref{sec:AnapoleMoment_MSSM} we particularize our results to the lightest neutralino in the MSSM, and in \cref{sec:SimplifiedMSSM} we study some well motivated MSSM scenarios. Then, in \cref{sec:DDlimits_pMSSM} we briefly discuss the prospects of detection of a Majorana dark matter candidate via its anapole moment in direct search experiments, and finally in \cref{sec:conclusions} we present our conclusions. We also include Appendix \ref{sec:ParticleSpectrumMSSM} summarizing the calculation of the particle mass eigenstates in terms of the interaction eigenstates in the MSSM.
\section{One-Loop Calculation of the Anapole Moment of a Majorana Fermion}\label{sec:1-loop_calculation}
We consider a Majorana fermion, that we denote by $\chi$, with mass $m_\chi$. The interaction vertex of a Majorana fermion with the photon is restricted by the Lorentz- and gauge symmetries to be of the form \cite{Nieves:1981zt,Kayser:1982br,Giunti:2008ve}
\begin{equation}
M_\mu(q)=f_A(q^2) (q^2\g\mu -q_\mu \slashed{q})\g5,
\end{equation}
where $q_\mu$ denotes the photon outgoing momentum and $f_A(q^2)$ is the anapole form factor. This interaction vertex generates at low momentum the C- and P-violating effective Lagrangian
\begin{equation}\label{eq:EffectiveLagrangianAnapole}
\Lag_\text{eff} = \frac{\mathcal{A}}{2}\, \bar{\chi} \g\mu\g5\chi\partial_\nu F^{\mu\nu}\;,
\end{equation}
where $\mathcal{A}$ is the anapole moment, defined as the zero momentum limit of the anapole form factor:
\begin{equation}\label{eq:definitionAnapoleMoment}
\mathcal{A}=\lim\limits_{q^2\rightarrow 0} f_A(q^2).
\end{equation}
Being $\chi$ electrically neutral, the interaction with the photon can only arise at the quantum level through a coupling with charged particles. In this work, we will consider the cases where $\chi$ interacts with a charged gauge boson and/or with a charged scalar.
We first consider a scenario where $\chi$ couples to a charged Dirac fermion, $\chi^\mp$ with mass $m_{\chi^-}$, and an electrically charged gauge boson, $V^\pm$ with mass $m_V$ acquired through the spontaneous breaking of a gauge symmetry. The interaction Lagrangian reads:
\begin{align}
\label{eq:InteractionsLagrangian:Vector}
\Lag_\text{FFV} &= \bar\chi\gamma^\mu \left[v_L P_L + v_R P_R\right] \chi^- V_\mu^+
+\bar\chi\left[c^G_L P_L + c^G_R P_R\right] \chi^- G^+ +\hc,
\end{align}
where $G^\pm$ are the Goldstone bosons arising from the spontaneous symmetry breaking.
To calculate the anapole moment we employ the background field method (BFM) \cite{Denner:1994xt,Denner:1994nn}. Namely, we replace the photon with the background photon $\gamma\rightarrow \hat\gamma$ and the $\gamma VV$-vertex with its BFM version in the quantum Feynman gauge. Explicitly, the triple gauge vertex reads \cite{Denner:1994xt}
\begin{align}\label{eq:BFMFeynmanRulesGaugeVerticesAWW}
i \hat\Gamma_{\gamma VV}^{\mu \nu\rho}(k_1,k_2,k_3) &= -i e \left[g_{\nu\rho}(k_3-k_2)_\mu + g_{\mu\nu}(k_2-k_1+k_3)_\rho +g_{\rho\mu} (k_1-k_3-k_2)_\nu \right],
\end{align}
while the gauge-gauge-Goldstone reads:
\begin{align}\label{eq:BFMFeynmanRulesGaugeVerticesAWG}
i\hat\Gamma_{\gamma VG}^{\mu \nu}(k_1,k_2,k_3) &= 0.
\end{align}
The one-loop diagrams relevant for the calculation of the anapole moment in the BFM are shown in \cref{fig:TriangleDiagramVectorandScalar}. We obtain\footnote{
We have used the Feynman rules for Majorana fermions derived in \cite{Denner:1992vzaFeynmanRulesMajorana1,Denner:1992meFeynmanRulesMajorana2}; the calculation was performed with the help of \texttt{FeynCalc} \cite{MERTIG1991345,Shtabovenko:2016sxi,Shtabovenko:2020gxv}, \texttt{FeynHelpers} \cite{Shtabovenko:2016whf} and \texttt{Package-X} \cite{Patel:2015tea}.}:
\begin{align}\label{Anapole:eq:Fvector}
\mathcal{A}_V
&=\frac{e}{96\pi^2m_\chi^2}\Big\{2\left[\abs{v_L}^2-\abs{v_R}^2\right]\mathcal{F}_V\Big(\frac{m_{\chi^-}}{m_\chi},\frac{m_V}{m_\chi}\Big)+ \left[\abs{c^G_L}^2-\abs{c^G_R}^2\right]\mathcal{F}_S\Big(\frac{m_{\chi^-}}{m_\chi},\frac{m_V}{m_\chi}\Big)\Big\},
\end{align}
where
\begin{align}
\mathcal{F}_X(\mu,\eta)&=\frac{3}{2}\log(\frac{\mu^2}{\eta^2})+(3\eta^2-3\mu^2+n_X) f(\mu,\eta),
\end{align}
for $X=V,S$, with $n_V=-7$, $n_S=1$,
and
\begin{align}\label{eq:loopFunctionf}
f(\mu,\eta)&=\begin{cases}
\frac{1}{2\sqrt\Delta} \log\frac{\mu^2+\eta^2-1+\sqrt{\Delta}}{\mu^2+\eta^2-1-\sqrt{\Delta}} & \Delta\neq 0 \\
\frac{2}{(\mu^2-\eta^2)^2-1} & \Delta=0
\end{cases}\;,
\end{align}
with $\Delta\equiv\Delta(\mu,\eta)=(\mu^2+\eta^2-1)^2-4\mu^2\eta^2$. Contour plots of $\mathcal{F}_{V}(\mu,\eta)$ and $\mathcal{F}_{S}(\mu,\eta)$ are shown in \cref{fig:Fscalar_Fvector_Scan}, and present a discontinuity at $\mu^2+\eta^2=1$. The anapole interaction, being P-violating, must vanish if the underlying model preserves parity, namely when $v_L=v_R$ and $c^G_L=c^G_R$, as apparent from Eq.~(\ref{Anapole:eq:Fvector}).
\begin{figure}
\centering
\begin{subfigure}[c]{1\linewidth}
\begin{equation*}
\feynmandiagram[small,vertical=i3 to e2] {
i1 --[ boson, edge label' = \( V \)] i2 --[fermion, edge label' = \( \chi^- \)] i3 --[fermion, edge label' = \( \chi^- \)] i1 -- a[particle=\(\chi\)],
e1 [particle=\(\chi\)] -- i2,
e2 [particle=\({\hat\gamma}\)] --[photon] i3,
};
\feynmandiagram[small, vertical= i3 to e2] {
i1 --[anti fermion, edge label' = \( \chi^- \)] i2 --[ boson, edge label' = \( V \)] i3 --[boson, edge label' = \( V \)] i1 -- a[particle=\(\chi\)],
e1 [particle=\(\chi\)] -- i2,
e2 [particle=\({\hat\gamma}\)] --[photon] i3,
};
\feynmandiagram[small, vertical= i3 to e2] {
i1 --[charged scalar, edge label' = \( G^-\)] i2 --[fermion, edge label' = \( \chi^- \)] i3 --[fermion, edge label' = \( \chi^- \)] i1 -- a[particle=\(\chi\)],
e1 [particle=\(\chi\)] -- i2,
e2 [particle=\({\hat\gamma}\)] --[photon] i3,
};
\feynmandiagram[small, vertical= i3 to e2] {
i1 --[anti fermion , edge label' = \( \chi^- \)] i2 --[anti charged scalar, edge label' = \( G^- \)] i3 --[anti charged scalar, edge label' = \( G^- \)] i1 -- a[particle=\(\chi\)],
e1 [particle=\(\chi\)] -- i2,
e2 [particle=\({\hat\gamma}\)] --[photon] i3,
};
\end{equation*}
\end{subfigure}
\begin{subfigure}[c]{1\linewidth}
\begin{equation*}
\feynmandiagram[small, vertical= i3 to e2] {
i1 --[charged scalar, edge label' = \( S\)] i2 --[fermion, edge label' = \( f \)] i3 --[fermion, edge label' = \( f \)] i1 -- a[particle=\(\chi\)],
e1 [particle=\(\chi\)] -- i2,
e2 [particle=\({\hat\gamma}\)] --[photon] i3,
};
\feynmandiagram[small, vertical= i3 to e2] {
i1 --[anti fermion , edge label' = \( f \)] i2 --[anti charged scalar, edge label' = \( S \)] i3 --[anti charged scalar, edge label' = \( S \)] i1 -- a[particle=\(\chi\)],
e1 [particle=\(\chi\)] -- i2,
e2 [particle=\({\hat\gamma}\)] --[photon] i3,
};
\end{equation*}
\end{subfigure}
\caption{Feynman diagrams generating an anapole moment for a Majorana fermion at the one-loop level in the background field formulation, via the mediation of an electrically vector boson (top) or the mediation of a charged scalar (bottom).
}
\label{fig:TriangleDiagramVectorandScalar}
\end{figure}
\begin{figure}[t!]
\centering
\includegraphics[width=.49\textwidth, clip = true]{Fvector.pdf}
\includegraphics[width=.49\textwidth,clip = true]{Fscalar.pdf}
\caption{Absolute values of the functions $\mathcal{F}_V(\mu,\eta)$ (left) and $\mathcal{F}_{S}(\mu,\eta)$ (right).}
\label{fig:Fscalar_Fvector_Scan}
\end{figure}
We also consider the scenario where $\chi$ couples to a charged Dirac fermion $f$ and a charged complex scalar $S$, with masses $m_f$ and $m_S$, and which charges $\pm e Q_f$ respectively (see also \cite{Kopp:2014tsa,Garny:2015wea,Sandick:2016zut,Baker:2018uox})
The interaction Lagrangian is in this case can be written as
\begin{align}
\label{eq:InteractionsLagrangian:Scalar}
\Lag_\text{FFS} &= \bar\chi\left[c_L P_L + c_R P_R\right] S^* f +\hc,
\end{align}
allowing $\chi$ to interact with the (background) photon field via the diagrams shown in \cref{fig:TriangleDiagramVectorandScalar}.
The induced scalar contribution to the anapole moment reads
\begin{equation}\label{Anapole:eq:Fscalar}
\mathcal{A}_S =- \frac{e}{96\pi^2m_\chi^2}Q_f\left[\abs{c_L}^2-\abs{c_R}^2\right]\mathcal{F}_S\Big(\frac{m_f}{m_\chi},\frac{m_S}{m_\chi}\Big)\;.
\end{equation}
The resulting vector- and scalar contributions to the anapole moment of $\chi$ are shown in \cref{fig:ScalarAnapolePlot,fig:VectorAnapolePlot} as a function of $\eta=m_{S,V}/m_\chi$, for different values of the fermion mass $m_{f, \chi^-}$. In both cases the anapole moment is enhanced for $\eta\approx 1$ and $m_{f,\chi^-} \ll m_\chi$.
The dependence of the anapole moment with $\mu=m_{f,\chi^-}/m_\chi$ is similar, see also \cref{fig:Fscalar_Fvector_Scan}.
The general formulas \cref{Anapole:eq:Fvector} and \cref{Anapole:eq:Fscalar} simplify when the charged fermions are much heavier than the vector/scalar and the Majorana fermion, {\it i.e.} when $m_{f,\chi^-}$. In this case, we find
\begin{align}\label{eq:AnapoleFunctionsHeavyeInternalFermionLimit}
\mathcal{A}_V & \simeq \frac{e}{96\pi^2m_{\chi^-}^2}\left\{2\left[\abs{v_L}^2-\abs{v_R}^2\right] \left(3+5\log{\frac{m_V^2}{m_{\chi^-}^2}}\right)+\left[\abs{c_L^G}^2-\abs{c_R^G}^2\right] \left(3+\log{\frac{m_V^2}{m_{\chi^-}^2}}\right)\right\}, \nonumber \\
\mathcal{A}_S &\simeq -\frac{e}{96\pi^2m_f^2}Q_f\left[\abs{c_L}^2-\abs{c_R}^2\right] \left(3+\log{\frac{m_S^2}{m_f^2}}\right),
\end{align}
which are independent of $m_\chi$. Analogously, in the heavy scalar/vector limit, {\it i.e} when $m_{V,S}\gg m_\chi, m_f$
\begin{align}
\mathcal{A}_V &\simeq \frac{e}{96\pi^2m_V^2}\left\{2\left[\abs{v_L}^2-\abs{v_R}^2\right] \left(-3+2\log{\frac{m_{\chi^-}^2}{m_V^2}}\right) - \left[\abs{c_L^G}^2-\abs{c_R^G}^2\right] \left(3+2\log{\frac{m_{\chi^-}^2}{m_V^2}}\right) \right\},\nonumber \\ \label{eq:AnapoleFunctionsHeavyeInternalBosonLimit}
\mathcal{A}_S &\simeq \frac{e}{96\pi^2m_S^2}Q_f\left[\abs{c_L}^2-\abs{c_R}^2\right] \left(3+2\log{\frac{m_f^2}{m_S^2}}\right).
\end{align}
\begin{figure}[!hbt]
\centering
\includegraphics[width=1\linewidth]{Anapole_vector_eta_running.pdf}
\caption{Anapole moment (normalized to the nuclear magneton $\mu_N$) induced at the one loop level via the interaction of the Majorana fermion $\chi$ with a charged gauge boson $V$ and a charged fermion $f$, as a function of $m_V/m_\chi$, for different values of the Majorana mass and different values of the charged fermion mass. For the plot, we assumed for concreteness $v_L=1$, $v_R, c_L^G, c_R^G=0$ and $Q_f=-e$.}
\label{fig:VectorAnapolePlot}
\end{figure}
\begin{figure}[!hbt]
\centering
\includegraphics[width=1\linewidth]{Anapole_scalar_eta_running.pdf}
\caption{Same as Fig. \ref{fig:VectorAnapolePlot} but for a Majorana fermion that interacts with a charged scalar $S$ and a charged fermion $f$. For the plot, we assumed for concreteness $c_L=1$, $c_R=0$ and $Q_f=-1$.}
\label{fig:ScalarAnapolePlot}
\end{figure}
This general formalism can be applied in particular to calculate the anapole moment of the Standard Model neutrinos, through its interactions with the $W$ boson and the charged leptons. In this case, $v_L=g/\sqrt{2}$, $v_R=c_L^G=c_R^G=0$, resulting in~ \cite{Bernabeu:2000hf,Bernabeu:2002pd}
\begin{align}
{\cal A}&
\simeq \frac{e G_F}{12 \sqrt{2} \pi^2} (-3+2\log\frac{m_\ell^2}{m_W^2}),
\end{align}
where $G_F=\sqrt{2} g^2/8 m_W^2$ is the Fermi constant, with $m_W$ the W-boson mass, and $m_\ell$ is the charged lepton mass.
For Dirac fermions, the anapole moment is half as large as for Majorana fermions, due to the halving of the number of diagrams.
\section{Anapole Moment of the Lightest Neutralino in the MSSM}\label{sec:AnapoleMoment_MSSM}
An archetype of Majorana fermion interacting with charged particles both via a charged vector mediator and a charged scalar mediator is the lightest neutralino in the MSSM. The MSSM Lagrangian contains an interaction term between the lightest neutralino, the charginos $\chi_j$, $j=1,2$, and the W-boson (and its Goldstone boson). This term has the form
\begin{align}
\label{eq:InteractionsLagrangian:VectorMSSM}
\Lag &\supset \bar\chi\gamma^\mu \left[v^j_L P_L + v^j_R P_R\right] \chi_j^- W_\mu^+
+\bar\chi\left[c^{G,j}_L P_L + c^{G,j}_R P_R\right]\chi_j^- G^+ +\hc,
\end{align}
with
\begin{align}\label{eq:MSSMVectorCouplings}
v^j_L &= -gN_{12} U_{j1}^* - g\frac{1}{\sqrt2} N_{13} U_{j2}^*,\nonumber \\
v^j_R &= -gN_{12}^* V_{j1} +g\frac{1}{\sqrt2} N_{14}^* V_{j2}, \nonumber\\
c_L^{G,j} &=g\cos\beta\left[N_{13}^* U_{j1}^*-\frac{1}{\sqrt 2}U_{j2}^*(N_{12}^*+\tan\theta_W N_{11}^*)\right], \nonumber \\
c_R^{G,j} &=-g\sin\beta\left[N_{14}V_{j1}+\frac{1}{\sqrt 2} V_{j2}(N_{12}+\tan\theta_W N_{11})\right],
\end{align}
where $\tan\beta=\langle H_2^0\rangle/\langle H_1^0\rangle$ denotes the ratio between the expectation values of the neutral components of the up-type Higgs and the down-type Higgs doublet, $\theta_W$ is the Weinberg's angle, $N_{ij}$, $i,j=1,\ldots,4$ are the elements of the neutralino mixing matrix, and $U_{ij}$ ($V_{ij}$), $i,j=1,2$ are the elements of the mixing matrix of the negatively (positively) charged chargino (see \cref{sec:ParticleSpectrumMSSM} for a brief summary of the construction of the mass eigenstates in the MSSM from the interaction eigenstates).
Further, the Lagrangian contains an interaction terms with the chargino and the charged Higgs, of the form
\begin{align}
\label{eq:InteractionsLagrangian:Higgs}
\Lag_\text{FFS} &\supset \bar\chi\left[c^{H,j}_L P_L + c^{H,j}_R P_R\right] H^+ \chi_j^- +\hc,
\end{align}
with
\begin{align}
c_L^{H,j} &= -g\sin\beta\left[N_{13}^* U_{j1}^*-\frac{1}{\sqrt 2}U_{j2}^*(N_{12}^*+\tan\theta_W N_{11}^*)\right], \nonumber \\
c_R^{H,j} &=-g\cos\beta\left[N_{14}V_{j1}+\frac{1}{\sqrt 2} V_{j2}(N_{12}+\tan\theta_W N_{11})\right],
\label{eq:couplings_chargino_chargedH_R_L}
\end{align}
as well as an interaction term with the SM fermions and sfermions of the form
\begin{align}
\label{eq:InteractionsLagrangian:Sfermions}
\Lag_\text{FFS} &\supset \bar\chi\left[c^{i,a}_L P_L + c^{i,a}_R P_R\right] {\widetilde f}_a f_i +\hc,
\end{align}
with
\begin{align}
c^{i,1}_L&=G^{{f}_{iL}}\cos\theta_{\widetilde{f}_a} + H^{{f}_{iR}} \sin\theta_{\widetilde{f}_a}, \nonumber \\
c^{i,1}_R&=G^{{f}_{iR}}\sin\theta_{\widetilde{f}_a} + H^{{f}_{iL}} \cos\theta_{\widetilde{f}_a}, \nonumber \\
c^{i,2}_L&=-G^{{f}_{iL}}\sin\theta_{\widetilde{f}_a} + H^{{f}_{iR}} \cos\theta_{\widetilde{f}_a}, \nonumber \\
c^{i,2}_R&=G^{{f}_{iR}}\cos\theta_{\widetilde{f}_a} - H^{{f}_{iL}} \sin\theta_{\widetilde{f}_a},
\end{align}
and
\begin{align}
G^{{f}_{iL}}&=-\sqrt{2}g\left[T^{f_i}_{3L}N^*_{12}+\tan\theta_W(Q_{f_i}-T^{f_i}_{3L})N^*_{11}\right], \nonumber \\
G^{{f}_{iR}}&=\sqrt{2}g\tan\theta_WQ_{f_i} N_{11}, \nonumber\\
H^{{f}_{iL}} &=- \frac{g}{\sqrt{2}m_W}m_{f_i} \times \begin{cases}
N_{14}/\sin\beta, & f_i =u\text{-type} \nonumber\\
N_{13}/\cos\beta, & f_i = d\text{-type}, \ell\\
\end{cases}\\
H^{{f}_{iR}} &= H^{{f}_{iL}*}.
\end{align}
These interactions induce at the one loop level an anapole moment for the lightest neutralino $\chi$:
\begin{align}
\mathcal{A}=\mathcal{A}_W+\mathcal{A}_{\widetilde{f}}+\mathcal{A}_H.
\end{align}
Using the general results of \cref{sec:1-loop_calculation} for the vector and scalar contributions to the anapole moment of a Majorana fermion, one finds
\begin{align}
\mathcal{A}_W &= \frac{e}{96\pi^2m_\chi^2}
\Big\{2\sum_{j}\left[|v^{j}_L|^2-|v^{j}_R|^2\right]\mathcal{F}_W\Big(\frac{m_{\chi^-_j}}{m_\chi},\frac{m_{W^+}}{m_\chi}\Big)\nonumber \\ \nonumber
&~~~~~~~~~~~~~~~+\sum_{j}\left[|c^{G,j}_L|^2-|c^{G,j}_R|^2\right]\mathcal{F}_S\Big(\frac{m_{\chi^-_j}}{m_\chi},\frac{m_{W^+}}{m_\chi}\Big)\Big\}, \nonumber\\
%
\mathcal{A}_{\widetilde{f}} &= - \frac{e}{96\pi^2m_\chi^2}\sum_{i,a}N^i_cQ_i\left[|c^{i,a}_L|^2-|c^{i,a}_R|^2\right]\mathcal{F}_S\Big(\frac{m_{f_i}}{m_\chi},\frac{m_{\widetilde{f}_a}}{m_\chi}\Big), \nonumber \\
%
\mathcal{A}_{H} &=- \frac{e}{96\pi^2m_\chi^2}\sum_{j}Q_j\left[|c^{H,j}_L|^2-|c^{H,j}_R|^2\right]\mathcal{F}_S\Big(\frac{m_{\chi^-_j}}{m_\chi},\frac{m_{H^+}}{m_\chi}\Big).
\end{align}
In what follows, we will particularize these expressions to some well motivated MSSM scenarios.
\section{MSSM scenarios}\label{sec:SimplifiedMSSM}
In order to gain insight into the rich physics of supersymmetric models, we will study first in subsections \ref{sec:pure_heavy_sfermion}, \ref{sec:Light_sfermions} and
\ref{sec:mixed_heavy_sfermion} some simplified scenarios where some SUSY particles are integrated out. Lastly, in subsection
\ref{sec:FullMSSM}, we will consider a general MSSM scenario.
\subsection{Pure lightest neutralino \& heavy sfermions}
\label{sec:pure_heavy_sfermion}
Let us first consider a number of toy models where the lightest neutralino practically coincides with an interaction eigenstate, either the bino, the higgsino, or the wino. We also consider first that all sfermions are decoupled, so that ${\cal A}_{\widetilde f}\simeq 0$.
\subsubsection*{Bino limit}
In the limit $M_1\ll M_2, |\mu|, m_{\widetilde f}$, the lightest neutralino is practically inert and in particular does not couple to the $W$ boson, so that ${\cal A}_{W}\simeq 0$, nor to the charged Higgs, so that ${\cal A}_{H}\simeq 0$. The anapole moment in this toy model is therefore expected to be very suppressed.
\subsubsection*{Higgsino limit}
In the limit $|\mu|\ll M_1, M_2, m_{\widetilde f}$ the two lightest neutralinos are nearly degenerate in mass and form a pseudo-Dirac pair. Further, there is only one light chargino, which practically coincides with the charged Higgsino. The effective couplings of the lightest neutralino to the $W$-boson and the lightest chargino read:
\begin{align}
&v^1_L \simeq -\frac{g}{2},~~~~~
v^1_R \simeq \frac{g}{2}, \nonumber \\
&c_L^{G,1} \simeq 0,~~~~~~
c_R^{G,1} \simeq 0.
\end{align}
and are manifestly parity conserving. The vector contribution to the anapole moment is therefore suppressed in this scenario, ${\cal A}_W\simeq 0$. The same result holds for a minimal dark matter scenario where the dark matter particle is a Majorana fermion, doublet under $SU(2)_L$ and with hypercharge $1/2$.
In the MSSM, moreover, the lightest neutralino also couples to the chargino and to the charged Higgs, which may be light. On the other hand, it follows from \cref{eq:couplings_chargino_chargedH_R_L} that in the Higgsino limit the coupling strengths are $c_R^{H,1}, c_L^{H,1} \simeq 0$, and therefore ${\cal A}_{H}\simeq 0$ regardless of the mass of the charged Higgs.
\subsubsection*{Wino limit}
In the limit $M_2\ll M_1, |\mu|, m_{\widetilde f}$, there is only one light neutralino and one light chargino, which are composed mainly by a neutral wino and a charged wino respectively. In this limit, the anapole moment only receives contributions from the chargino-$W$ loop. The relevant coupling constants read
\begin{align}
&v^1_L = -g , ~~~~~
v^1_R = -g, \nonumber \\
&c_L^{G,1} =0, ~~~~~~
c_R^{G,1} =0.
\end{align}
which are manifestly parity conserving and lead to a suppressed anapole moment.
It is apparent from these limiting cases that in order to enhance the anapole moment it is necessary to couple the lightest neutralino to new light particles with parity breaking interactions, and/or to introduce an admixture in the neutralino eigenstate of different interaction eigenstates. We discuss these two possibilities below.
\subsection{Light sfermion scenarios}\label{sec:Light_sfermions}
In this subsection we revisit the scenarios considered above, but allowing for a contribution to the anapole moment from fermion-sfermion loops.
\subsubsection*{Bino limit}
As discussed in subsection \ref{sec:pure_heavy_sfermion}, in the limit of heavy sfermions, the lightest neutralino does not couple to the $W$ boson nor to the charged Higgs, therefore ${\cal A}_W, {\cal A}_H\simeq 0$. On the other hand, the bino couples to the Standard Model fermions and sfermions, and the sfermions in the loop could contribute sizably to the anapole moment if they are sufficiently light. We consider here a simplified scenario where the bino couples to the left- and right-handed components of a Standard Model fermion $f$ (with color charge $N_c$, electric charge $Q_f$ and isospin $T^f_{3L}$), and the sfermions $\tilde f_L$ and $\tilde f_R$. We denote the two scalar mass eigenstates as $\tilde f_1$ and $\tilde f_2$, which are obtained from the interaction eigenstates $\tilde f_L $ and $\tilde f_R$ by rotating by the angle $\theta_{\tilde f}$ (see Appendix \ref{sec:ParticleSpectrumMSSM}). The strength of the Yukawa coupling of the lightest neutralino to the sfermion mass eigenstates $\tilde f_1$ and $\tilde f_2$ and the left- and right-handed components of the Standard Model fermion $f$ explicitly read:
\begin{alignat}{2}
c^{1}_L&=-\sqrt{2}g\left[\tan\theta_W(Q_{f}-T^{f}_{3L})\right]\cos\theta_{\widetilde{f}} ,~~~
&&c^{1}_R=\sqrt{2}g\tan\theta_WQ_{f}\sin\theta_{\widetilde{f}}, \nonumber \\
c^{2}_L&=\sqrt{2}g\left[\tan\theta_W(Q_{f}-T^{f_i}_{3L})\right]\sin\theta_{\widetilde{f}
},~~~
&&c^{2}_R=\sqrt{2}g\tan\theta_WQ_{f}\cos\theta_{\widetilde{f}},
\end{alignat}
which are in general parity violating and therefore will generate a non-vanishing contribution to the anapole moment.
We show in the top left panel of \cref{fig:ScatterPlotsLimits} a scatter plot of the expected anapole moment (normalized to the nuclear magneton) for the pure bino scenario for $m_\chi\in [10^1,10^4]$ GeV, $m_{\widetilde f_1} \in [m_\chi, 10 m_\chi]$, $m_{\widetilde f_2}\in [m_{\widetilde f_1}, 10 m_\chi]$, and $\theta_{\widetilde f}\in [0,2\pi]$. In the plot we have taken for concreteness $m_f=m_\tau=1.7$ GeV, and we have imposed the constraints on the stau mass from ATLAS~\cite{ATLAS:2019gti} and from the LEP experiments \cite{Berggren:2001kb}. Generically, one finds $|{\cal A}|/\mu_{N}\sim 10^{-8} (m_\chi/100\,{\rm GeV})^{-2}$ fm, although there are a few points with $10^{-6}\,{\rm fm}\lesssim |\mathcal{A}|/\mu_N\lesssim 10^{-5}$ fm for $m_\chi \lesssim 100\gev$ where the anapole moment is enhanced, corresponding to a compressed spectrum scenario where the stau mass is close to the bino mass.
\subsubsection*{Higgsino limit}
In order to generate an anapole moment in this simplified scenario it is also necessary to introduce new light degrees of freedom with parity violating couplings. As for the bino limit analyzed above, we consider the scenario where the Higgsino couples to the left- and right-handed components of a Standard Model fermion $f$ and the sfermions $\widetilde f_L$ and $\widetilde f_R$, with mass eigenstates $\widetilde f_1$ and $\widetilde f_2$. The coupling strengths to the mass eigenstates explicitly read:
\begin{alignat}{2}
c^{1}_L&= H^{{f}_{L}} \sin\theta_{\widetilde{f}},\quad
&&c^{1}_R= H^{{f}_{L}} \cos\theta_{\widetilde{f}},\nonumber\\
c^{2}_L&= H^{{f}_{L}} \cos\theta_{\widetilde{f}},\quad
&&c^{2}_R=-H^{{f}_{L}} \sin\theta_{\widetilde{f}},
\end{alignat}
with
\begin{align}
H^{{f}_{L}} &=- \frac{g}{2m_W}m_{f} \times \begin{cases}
1/\sin\beta, & f =u\text{-type}\\
1/\cos\beta, & f = d\text{-type}, \ell\\
\end{cases}\,,
\end{align}
which are as before parity violating.
We show in the top right panel of \cref{fig:ScatterPlotsLimits} a scatter plot of the anapole moment for the pure higgsino scenario, for the same range of parameters as for the pure bino scenario, and taking $\tan\beta=5$ (red points) or $\tan\beta=50$ (blue points). Clearly the anapole moment increases with $\tan\beta$, as the Higgsino coupling to the tau-stau grows with $\cos^{-2}\beta$.
\subsubsection*{Wino limit.}
Similarly to the previous two scenarios, in the wino limit the anapole moment can only be generated by parity-violating interactions of the lightest neutralino with fermions and sfermions. The coupling strengths to the sfermion mass eigenstates $\widetilde f_1$ and $\widetilde f_2$ read in this limit:
\begin{alignat}{2}
c^{i,1}_L&=-\sqrt{2}g T^{f_i}_{3L}\cos\theta_{\widetilde{f}},\quad
&&c^{i,1}_R=0, \nonumber \\
c^{i,2}_L&=\sqrt{2}g T^{f_i}_{3L}\sin\theta_{\widetilde{f}}, \quad
&&c^{i,2}_R=0,
\end{alignat}
which are clearly parity violating.
The expected anapole moment in this scenario is shown in the lower panel of \cref{fig:ScatterPlotsLimits}, for the same ranges of parameters as for the Bino limit.
\begin{figure}[t!]
\centering
\includegraphics[width=0.49\textwidth, clip = true]{BinoLogLog_rast_200.pdf}
\includegraphics[width=0.49\textwidth, clip = true]{Higgsino_rast_200.pdf}\\
\includegraphics[width=0.49\textwidth,clip = true]{Wino_rast_200.pdf}
\caption{Anapole moment (normalized to the nucleon magneton) for simplified MSSM scenarios with pure bino (top left), pure higgsino (top right), and pure wino (bottom) lightest neutralino, coupling only with the tau and staus. For details, see subsection \ref{sec:Light_sfermions}.}
\label{fig:ScatterPlotsLimits}
\end{figure}
\subsection{Mixed lightest neutralino \& decoupled sfermions}
\label{sec:mixed_heavy_sfermion}
Finally, we consider a simplified scenario where the sfermions are very heavy, so that ${\cal A}_{\widetilde f}\simeq 0$, but with an admixture of interaction eigenstates in the lightest neutralino mass eigenstates, which may allow parity violating interactions.
\subsubsection*{Mixed Bino-Higgsino}
In the limit $M_1,\mu \ll M_2$, there is only one light chargino, which is purely a charged Higgsino. The couplings of the lightest neutralino to the charged Higgsino and the $W$ are:
\begin{alignat}{2}
&v^1_L = - g\frac{1}{\sqrt2} N_{13},\quad &&v^1_R = +g\frac{1}{\sqrt2} N_{14}^*, \nonumber \\
&c_L^{G,1} =-\frac{g}{\sqrt{2}}\cos\beta\tan\theta_W N_{11}^*, \quad
&&c_R^{G,1} =-\frac{g}{\sqrt{2}}\sin\beta\tan\theta_W N_{11},
\end{alignat}
which are in general parity violating, thus leading to a non-zero ${\cal A}_W$. The couplings to the chargino and the charged Higgs read
\begin{align}
c_L^{H,1} = g\sin\beta\tan\theta_W N_{11}^*, ~~~~~
c_R^{H,1} =-g\cos\beta\tan\theta_W N_{11},
\end{align}
which are also in general parity violating and can further increase the anapole moment.
We show in the left panel in \cref{fig:ScatterPlotsLimitsMixed} the expected anapole moments for this scenario, taking for concreteness $M_1$, $\mu\in [100,10^5]\gev$ and $\tan\beta=5$. We assume for simplicity that the charged Higgs is very heavy and does not contribute to the anapole moment (although clearly for a light charged Higgs the anapole moment could be enhanced). In the plot we also indicate whether the lightest neutralino is bino like ($|N_{11}|>0.95$), higgsino like ($\sqrt{N_{13}^2+N_{14}^2}>0.95$) or a mixed state. As expected, the anapole moment is enhanced when the lightest neutralino is not a pure state, but an admixture of bino and higgsino.
\subsubsection*{Mixed Bino-Wino}
In the limit $M_1, M_2\ll \mu$, there is only one light chargino, which is purely a charged wino. The couplings of the lightest neutralino to the charged Higgsino and the W are:
\begin{alignat}{2}\label{eq:MSSMVectorCouplings_WB}
&v^1_L = -gN_{12}, \quad
&&v^1_R = -gN_{12}^*, \nonumber \\
&c_L^{G,1} =0, \quad
&&c_R^{G,1} =0,
\end{alignat}
which preserve parity and therefore give ${\cal A}_W\simeq 0$. Further, the couplings to the chargino and the charged Higgs are:
\begin{align}
c_L^{H,1} = 0,\quad
c_R^{H,1} =0.
\end{align}
Therefore, also in the scenario where the lightest neutralino is a mixed bino-wino state, only the sfermion loops can generate a non-vanishing anapole moment.
\subsubsection*{Mixed Wino-Higgsino}
In the limit $M_2,\mu\ll M_1$ both charginos can be light and contribute to the anapole moment via the interactions with the $W$ and with the charged Higgs boson. The coupling strengths of the lightest neutralino to the charginos $\chi^\pm_i$, $i=1,2$ and the $W$ boson read:
\begin{align}\label{eq:MSSMVectorCouplings_WH}
v^j_L &= -gN_{12} U_{j1}^* - g\frac{1}{\sqrt2} N_{13} U_{j2}^*, \nonumber \\
v^j_R &= -gN_{12}^* V_{j1} +g\frac{1}{\sqrt2} N_{14}^* V_{j2}, \nonumber\\
c_L^{G,j} &=g\cos\beta\left[N_{13}^* U_{j1}^*-\frac{1}{\sqrt 2}U_{j2}^*(N_{12}^*)\right], \nonumber\\
c_R^{G,j} &=-g\sin\beta\left[N_{14}V_{j1}+\frac{1}{\sqrt 2} V_{j2}(N_{12})\right],
\end{align}
while for the charged Higgs boson,
\begin{align}
c_L^{H,j} &= -g\sin\beta\left[N_{13}^* U_{j1}^*-\frac{1}{\sqrt 2}U_{j2}^*(N_{12}^*)\right], \nonumber \\
c_R^{H,j} &=-g\cos\beta\left[N_{14}V_{j1}+\frac{1}{\sqrt 2} V_{j2}(N_{12})\right].
\end{align}
These interactions are in general parity violating and lead to a non-vanishing anapole moment. A numerical scan of this scenario is shown in the right panel in \cref{fig:ScatterPlotsLimitsMixed}, for the same set-up as in the bino-higgino mixed case; the conclusions in the wino-higgsino case are also analogous to that case.
\begin{figure}[t!]
\centering
\includegraphics[width=0.49\textwidth, clip = true]{Bino-Higgsino_rast_200.pdf}
\includegraphics[width=0.49\textwidth,clip= true]{Wino-Higgsino_rast_200.pdf}
\caption{Anapole moment (normalized to the nucleon magneton) for simplified MSSM scenarios with mixed bino-higgsino (left) and wino-higgsino (right) lightest neutralino For details, see subsection \ref{sec:mixed_heavy_sfermion}.}
\label{fig:ScatterPlotsLimitsMixed}
\end{figure}
\subsection{General MSSM scenarios}
\label{sec:FullMSSM}
So far we have concentrated in some limiting scenarios where most SUSY particles are assumed to be very heavy and integrated-out. On the other hand, in generic scenarios several SUSY particles can be light and can contribute sizably to the anapole moment. To estimate the anapole moment expected in a generic SUSY scenario, we will consider in this subsection MSSM scenarios defined by the ranges indicated in table \ref{table:ParameterSpaceFullMSSM} (at the scale $\Lambda=3$ TeV).
\begin{table}
\centering
\begin{tabular}{|c|c|}
\hline
Parameter & Range \\ \hline
$M_1$ & $[100, 2000]$ GeV \\ \hline
$M_2$ & $[100, 2000]$ GeV \\ \hline
$M_3$ & $[2000,5000]$ GeV \\ \hline
$A_{t,b,\tau}$ & $[-4000,4000]$ GeV \\ \hline
$m_A$ & $[10^3, 10^5]$ GeV \\ \hline
$\tan\beta$ & $[3,50]$ \\ \hline
$\mu$ & $[100,2000]$ GeV \\ \hline
$m_{\widetilde{\ell}_{L,R}}$ & $[100, 2000]$ GeV \\ \hline
$m_{\widetilde{q}_{L_{1,2}}}$ & $[400,2000]$ GeV \\ \hline
$m_{\widetilde{u}_{R_{1,2}}}$ , $m_{\widetilde{d}_{R_{1,2}}}$ & $[400, 2000]$ GeV \\ \hline
$m_{\widetilde{q}_{L_3}}$ & $[300,2000]$ GeV \\ \hline
$m_{\widetilde{u}_{R_3}}$, $m_{\widetilde{d}_{R_3}}$ & $[300,2000]$ GeV \\ \hline
\end{tabular}
\caption{Ranges of parameters, defined at the scale $\Lambda=3$ TeV, for the MSSM scan described in subsection \ref{sec:FullMSSM}.}
\label{table:ParameterSpaceFullMSSM}
\end{table}
From those boundary conditions, we generate the low energy spectrum using \texttt{SOFTSUSY4.0} \cite{Allanach:2017hcf}. We then select the points satisfying the LEP constraints (using \texttt{micrOmegaS$_3$} \cite{Belanger:2013oya}), and ATLAS and CMS constraints (using \texttt{SModelS v2} \cite{Alguero:2021dig}), leading to a Higgs boson with mass in the range 123-127 GeV (using \texttt{HiggsBounds v4} \cite{Bechtle:2013wla} and \texttt{HiggsSignals} \cite{Stal:2013hwa}), and satisfying various flavor physics constraints (using SuperIso v3.0 \cite{Mahmoudi:2009zz} and GM2Calc \cite{Athron:2015rva}).~\footnote{We used \texttt{PySLHA} \cite{Buckley:2013jua} for linking the various codes via the SLHA \cite{Allanach:2008qq} format.} Finally, for the points satisfying all our constraints we calculate the expected anapole moment using the general expressions from \cref{sec:AnapoleMoment_MSSM}. The result of the scan in shown in \cref{fig:pMSSM_without_DD}.
We find points where the anapole moment can reach values up to $|{\cal A}|/\mu_N\sim 10^{-6}ß\,\,\text{fm}$. These correspond to scenarios where the anapole moment is dominated by the fermion-sfermion contributuion, in accordance with the results for the simplified models of \cref{sec:Light_sfermions} (with ${\cal O}(1)$ enhancements when several sfermions circulate in the loop), and correspond to scenarios where the lightest neutralino contains a significant bino and/or wino component. For scenarios where the lighest neutralino is Higgsino like, the anapole moment is typically more suppressed.
\begin{figure}[t!]
\centering
\includegraphics[width=.7\linewidth]{pMSSM_rast_200.pdf}
\caption{Anapole moment for MSSM scenarios with parameters in the ranges listed in Table \ref{table:ParameterSpaceFullMSSM} and satisfying the experimental constraints discussed in subsection \ref{sec:FullMSSM}.}
\label{fig:pMSSM_without_DD}
\end{figure}
\section{Direct Dark Matter Detection Through the Anapole Moment}\label{sec:DDlimits_pMSSM}
The effective Lagrangian \cref{eq:EffectiveLagrangianAnapole} gives rise to a dark matter interaction with the nuclei, that can induce an observable signal in direct detection experiments.\footnote{More strictly, the contact interaction approximation holds when the momentum transfer is smaller than the masses in the loop, which we assume here. For coupling to electrons, a momentum-dependent form factor should instead be considered \cite{Kopp:2014tsa}.}
The differential scattering cross section induced by the interaction of the Majorana dark matter particle with a target nucleus via the anapole moment reads: \cite{Ho:2012bg,DelNobile:2014eta}:
\begin{align}\label{directdetection:eq:AnapoleDiffxsec}
\frac{d\sigma}{dE_R}
=
\alpha_{\rm{EM}}\,
\mathcal{A}^2
\biggl[
Z^2\biggl(2m_T-\biggl(1+\frac{m_T}{m_\chi}\biggr)^2\frac{E_R}{v^2}\biggr)F^2_Z(q^2)
+
\frac{1}{3}\frac{m_T}{m^2_\chi}\left(\frac{\bar{\mu}_T}{\mu_N}\right)^2\frac{E_R}{v^2}F^2_D(q^2)
\biggr]
\,,
\end{align}
where $m_T$ and $Z$ are the nucleus mass and electric charge, $E_R$ is the recoil energy (related to the momentum transfer through $q^2=2 m_T E_R$) and $v$ is the dark matter speed relative to the nucleus. Further,
$F_Z$ and $F_D$ are the charge and magnetic dipole moment form factors~\cite{Helm:1956zz,Lewin:1995rx}:
\begin{align}
F^2_Z(q^2)
&=
\left(\frac{3j_1(qR)}{qR}\right)^2 e^{-q^2s^2}, \\
F^2_D(q^2)
&=
\left\{
\begin{array}{ll}
\left[\frac{\sin(qR_D)}{qR_D}\right]^2 & (qR_D<2.55, qR_D>4.5)\\
0.047 & (2.55\leq qR_D\leq4.5)
\end{array}
\right.\,.
\end{align}
where $j_1(x)$ is a spherical Bessel function of the first kind, $R=\sqrt{c^2+\frac{7}{3}\pi^2 a^2-5s^2}$ (with $c=(1.23A^{1/3}-0.60)\,\mbox{fm}$, $a=0.52\,\mbox{fm}$ and $s=0.9\,\mbox{fm}$) and $R_D\simeq 1.0A^{1/3}$ fm. $A$ denotes the mass number of target nuclei. Further, ${\mu}_N=e/2m_p$ denotes the nuclear magneton, and $\bar \mu_T$ is the weighted dipole moment for the target nuclei, defined as:
\begin{align}
\bar{\mu}_T
=
\left(
\sum_{i}f_i\mu_{i}^2\frac{S_{i}+1}{S_{i}}
\right)^{1/2}\,,
\end{align}
where $f_i$, $\mu_{i}$, and $S_{i}$ are the elemental abundance, nuclear magnetic moment, and spin, respectively, of the isotope $i$ \cite{Chang:2010en}.
The differential event rate at a direct detection experiment reads:
\begin{align}
\frac{dR}{dE_R}
=
\frac{1}{m_T}\frac{\rho_{\rm{loc}}}{m_\chi}\int d^3v\, v f_{\rm{Lab}}({\vec{v}})\frac{d\sigma}{dE_R}\;,
\label{eq:dRdE}
\end{align}
where $\rho_{\rm{loc}}=0.3\,\mbox{GeV}\,\mbox{cm}^{-3}$ and $f_{\rm{Lab}}(\vec{v})$ denotes the dark matter velocity distribution in the laboratory frame. For the latter, we will adopt a Maxwell-Boltzmann distribution in the galactic frame, truncated at the escape velocity from the Galaxy, $v_{\text{esc}}$:
\begin{equation}
f_{\rm{Lab}}(\vec{v}) = f (\vec{v} + \vec{v}_\text{E}) ~,
\end{equation}
with $\vec{v}_{\text{E}}$ the velocity of the Earth in the galactic frame and
\begin{equation}
f (\vec{v}) =
\begin{cases}
\frac{1}{\cal N} e^{-v^2/v_0^2} & (|\vec{v}| < v_{\text{esc}}) \\
0& (|\vec{v}| > v_{\text{esc}})
\end{cases}
~,
\end{equation}
with
\begin{equation}
{\cal N} = \pi^{3/2} v_0^3 \biggl[
\text{erf} \biggl(\frac{v_{\text{esc}}}{v_0}\biggr)
- \frac{2 v_{\text{esc}}}{\sqrt{\pi} v_0} e^{-
\frac{v_{\text{esc}}^2}{v_0^2}}
\biggr]~.
\end{equation}
Hereafter we take
$v_{\rm{esc}}=544\,{\rm km}\,{\rm s}^{-1}$,
$v_{0}=220\,{\rm km}\,{\rm s}^{-1}$
and
$v_{\rm E}=232\,{\rm km}\,{\rm s}^{-1}$.
Finally, we calculate the number of events at a given direct detection experiment integrating $dR/dE_R$ over the recoil energy, taking into account the corresponding detection efficiency.
\begin{figure}[t!]
\centering
\includegraphics[width=.6\linewidth]{figures/limit.pdf}
\caption{Upper limit on the anapole moment of a Majorana spin 1/2 fermion as dark matter candidate from the XENON1T, SuperCDMS and CRESST-III data, and projected sensitivity for XENONnT.}
\label{fig:pMSSM_with_DD}
\end{figure}
We show in \cref{fig:pMSSM_with_DD} the 90\% C.L. upper limits on the anapole moment $\mathcal{A}$ normalized by the nuclear magneton $\mu_N$ from the non-observation of a dark matter signal at the XENON1T \cite{Aprile:2018dbl}, SuperCDMS \cite{Agnese:2014aze}, and CRESST-III \cite{Amole:2019fdf} experiments, alongside with the expected sensitivity of the XENONnT experiment \cite{Aprile:2015uzo}.~\footnote{ Details of the estimation of the detection efficiency are given in Appendix B of Ref.~\cite{Hisano:2020qkq}.} We find that the current sensitivity from the XENON experiment reaches ${\cal A}/\mu_N \sim 10^{-5}\,\,\text{fm}$ at $m_{\rm DM}\sim 30$ GeV, which is about one order of magnitude larger than the maximum anapole moment we predict for generic MSSM scenarios. For these scenarios, it would be necessary an improvement in sensitivity by at least one order of magnitude in order to probe the anapole moment of a spin 1/2 Majorana dark matter candidate, unless the Earth is immersed in a region of the galaxy with an overdensity of dark matter. Let us note that for special choices of parameters, namely when the dark matter candidate is almost degenerate in mass with the scalar (or vector) in the loop and when the fermion is very light, the anapole moment is enhanced ({\it cf.} Figs.~ \ref{fig:VectorAnapolePlot} and \ref{fig:ScalarAnapolePlot}, and also \cite{Garny:2015wea}). In these very special cases, a signal might be expected.
\section{Conclusions}\label{sec:conclusions}
In this work we have calculated the leading contribution to the anapole moment of a spin 1/2 Majorana fermion that interacts via a Yukawa or a gauge interaction with electromagentically charged particles. To ensure the finiteness and the gauge independence of the vector contribution, we employed the background field method.
We have applied our general results to calculate the anapole moment of the lightest neutralino in the Minimal Supersymmetric Standard Model. Since the anapole interaction violates parity, only those MSSM scenarios violating parity will generate a non-vanishing anapole moment. We have also studied various limits where many supersymmetric particles are integrated out, and which can be identified with simplified dark matter models where the dark matter candidate is a Majorana fermion, that transforms as a singlet, doublet or triplet of $SU(2)_L$, and which could interact with a fermion and a sfermion via a Yukawa coupling.
Lastly, we have derived upper limits on the anapole moment of a Majorana fermion as dark matter candidate, from the null search results of direct detection experiments. For the parameters of the Standard Halo Model, we find that it would be necessary an improvement of sensitivity of current experiments by at least one order of magnitude in order to probe the anapole moment of generic dark matter scenarios.
\acknowledgments
The work of A.I. and M.R. was supported by the Collaborative Research Center SFB1258 and by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) under Germany's Excellence
Strategy - EXC-2094 - 390783311.
The Feynman diagrams in this paper were drawn with the help of \texttt{TikZ-Feynman} \cite{ELLIS2017103}
\section{Introduction}
There is mounting evidence for the existence of dark matter in galaxies, clusters of galaxies and the Universe at large scale, possibly in the form of a population of new elementary particles, not contained in the Standard Model of Particle Physics (for reviews, see {\it e.g.} \cite{Jungman:1995df,Bertone:2004pz,Bergstrom:2000pn,Feng:2010gw}). Astronomical and cosmological observations demonstrate that dark matter particles interact with the electromagnetic radiation much more weakly than the hadrons or the charged leptons, however observations do not require the dark matter particle to be completely decoupled from the photon.
As is well known, for an electrically neutral fermion, the Lorentz- and gauge symmetries allow a magnetic- and electric dipole moment, and an anapole moment~\cite{Fujikawa:1980yx,Petcov:1976ff,Pal:1981rm,Shrock:1982sc,Giunti:2008ve, Nieves:1981zt,Kayser:1982br}. For an electrically neutral complex vector, also an electric and magnetic quadrupole moments exist in general ~\cite{Aronson:1969ltq,Gaemers:1978hg,Hagiwara:1986vm}. Therefore, even if the dark matter particle is electrically neutral, it may couple to the photon via the different electromagnetic multipoles. In fact, if the dark matter particle has interactions with the Standard Model particles, as many models suggest, such electromagnetic multipoles will be generically generated at the quantum level. This interaction could play an important role in the direct detection of dark matter particles through the scattering with nuclei, as discussed in several works, {\it e.g.} \cite{Pospelov:2000bq,Sigurdson:2004zp,Masso:2009mu,Chang:2010en,Barger:2010gv,Banks:2010eh,Ho:2012bg,Kopp:2014tsa,Ibarra:2015fqa,Hambye:2021xvd,Hisano:2020qkq,DelNobile:2014eta,Garny:2015wea,Abe:2018emu,Sandick:2016zut,Kang:2018oej,Baker:2018uox}.
In this paper we will concentrate on Majorana fermions as dark matter candidates. In this case, the invariance of the Majorana field under the charge conjugation operation only allows the anapole moment. Concretely, we will consider the lightest neutralino in the Minimal Supersymmetric Standard Model (MSSM) as an archetype of Majorana dark matter candidate. The gauge and Yukawa interactions of the lightest neutralino with the charged particles of the Standard Model will generate an anapole moment at the one loop level. In the pure bino limit, the dark matter particle is a singlet Majorana fermion that couples to the Standard Model fermions via a t-channel mediator (the sfermions). The anapole moment of the singlet Majorana fermion has been calculated in \cite{Kopp:2014tsa}. In the pure wino and higgsino limits (as well as in the mixed cases), the dark matter particle has $SU(2)_L$ charge and also interacts with the $W$-boson, and special care has to be taken in order to ensure the gauge invariance of the result.
Similar challenges have been found in the past in the calculation of the neutrino charge radius \cite{Bardeen:1972vi,Abers:1973qs,Fujikawa:1972fe,Lee:1973fw,PhysRevD.43.2956}, or in the calculation of the off-shell magnetic form factors of quarks and leptons in non-Abelian gauge theories \cite{Papavassiliou:1993qe,CabralRosetti:2002tf,Fujikawa:1972fe,Bernabeu:2007rr}, which naively yield gauge-dependent results. The gauge dependence, clearly unphysical, arises due to redundancies in the individual Green functions which are introduced by the gauge-fixing procedure. This problem was solved by introducing the so-called pinch technique \cite{Cornwall:1989gv,Papavassiliou:1989zd,Bernabeu:2000hf,PhysRevD.61.013001,Bernabeu:2002pd}, which consists in an algorithmic diagrammatic construction of physical subamplitudes by resumming topologically similar terms within an amplitude and ultimately defining a proper and physical vertex by including only vertex-like contributions (see \cite{Binosi:2009qm} for a review). Furthermore, the resulting effective Green functions coincides with the one calculated using the background field method in the quantum Feynman gauge \cite{Denner:1994nn,Hashimoto:1994ct,Papavassiliou:1994yi}.
In this paper we will apply the background field method to calculate the anapole moment of a spin 1/2 Majorana fermion that interacts both via Yukawa couplings and via gauge couplings, showing explicitly that the result is finite and gauge invariant. The general result is presented in \cref{sec:1-loop_calculation}. In \cref{sec:AnapoleMoment_MSSM} we particularize our results to the lightest neutralino in the MSSM, and in \cref{sec:SimplifiedMSSM} we study some well motivated MSSM scenarios. Then, in \cref{sec:DDlimits_pMSSM} we briefly discuss the prospects of detection of a Majorana dark matter candidate via its anapole moment in direct search experiments, and finally in \cref{sec:conclusions} we present our conclusions. We also include Appendix \ref{sec:ParticleSpectrumMSSM} summarizing the calculation of the particle mass eigenstates in terms of the interaction eigenstates in the MSSM.
\section{One-Loop Calculation of the Anapole Moment of a Majorana Fermion}\label{sec:1-loop_calculation}
We consider a Majorana fermion, that we denote by $\chi$, with mass $m_\chi$. The interaction vertex of a Majorana fermion with the photon is restricted by the Lorentz- and gauge symmetries to be of the form \cite{Nieves:1981zt,Kayser:1982br,Giunti:2008ve}
\begin{equation}
M_\mu(q)=f_A(q^2) (q^2\g\mu -q_\mu \slashed{q})\g5,
\end{equation}
where $q_\mu$ denotes the photon outgoing momentum and $f_A(q^2)$ is the anapole form factor. This interaction vertex generates at low momentum the C- and P-violating effective Lagrangian
\begin{equation}\label{eq:EffectiveLagrangianAnapole}
\Lag_\text{eff} = \frac{\mathcal{A}}{2}\, \bar{\chi} \g\mu\g5\chi\partial_\nu F^{\mu\nu}\;,
\end{equation}
where $\mathcal{A}$ is the anapole moment, defined as the zero momentum limit of the anapole form factor:
\begin{equation}\label{eq:definitionAnapoleMoment}
\mathcal{A}=\lim\limits_{q^2\rightarrow 0} f_A(q^2).
\end{equation}
Being $\chi$ electrically neutral, the interaction with the photon can only arise at the quantum level through a coupling with charged particles. In this work, we will consider the cases where $\chi$ interacts with a charged gauge boson and/or with a charged scalar.
We first consider a scenario where $\chi$ couples to a charged Dirac fermion, $\chi^\mp$ with mass $m_{\chi^-}$, and an electrically charged gauge boson, $V^\pm$ with mass $m_V$ acquired through the spontaneous breaking of a gauge symmetry. The interaction Lagrangian reads:
\begin{align}
\label{eq:InteractionsLagrangian:Vector}
\Lag_\text{FFV} &= \bar\chi\gamma^\mu \left[v_L P_L + v_R P_R\right] \chi^- V_\mu^+
+\bar\chi\left[c^G_L P_L + c^G_R P_R\right] \chi^- G^+ +\hc,
\end{align}
where $G^\pm$ are the Goldstone bosons arising from the spontaneous symmetry breaking.
To calculate the anapole moment we employ the background field method (BFM) \cite{Denner:1994xt,Denner:1994nn}. Namely, we replace the photon with the background photon $\gamma\rightarrow \hat\gamma$ and the $\gamma VV$-vertex with its BFM version in the quantum Feynman gauge. Explicitly, the triple gauge vertex reads \cite{Denner:1994xt}
\begin{align}\label{eq:BFMFeynmanRulesGaugeVerticesAWW}
i \hat\Gamma_{\gamma VV}^{\mu \nu\rho}(k_1,k_2,k_3) &= -i e \left[g_{\nu\rho}(k_3-k_2)_\mu + g_{\mu\nu}(k_2-k_1+k_3)_\rho +g_{\rho\mu} (k_1-k_3-k_2)_\nu \right],
\end{align}
while the gauge-gauge-Goldstone reads:
\begin{align}\label{eq:BFMFeynmanRulesGaugeVerticesAWG}
i\hat\Gamma_{\gamma VG}^{\mu \nu}(k_1,k_2,k_3) &= 0.
\end{align}
The one-loop diagrams relevant for the calculation of the anapole moment in the BFM are shown in \cref{fig:TriangleDiagramVectorandScalar}. We obtain\footnote{
We have used the Feynman rules for Majorana fermions derived in \cite{Denner:1992vzaFeynmanRulesMajorana1,Denner:1992meFeynmanRulesMajorana2}; the calculation was performed with the help of \texttt{FeynCalc} \cite{MERTIG1991345,Shtabovenko:2016sxi,Shtabovenko:2020gxv}, \texttt{FeynHelpers} \cite{Shtabovenko:2016whf} and \texttt{Package-X} \cite{Patel:2015tea}.}:
\begin{align}\label{Anapole:eq:Fvector}
\mathcal{A}_V
&=\frac{e}{96\pi^2m_\chi^2}\Big\{2\left[\abs{v_L}^2-\abs{v_R}^2\right]\mathcal{F}_V\Big(\frac{m_{\chi^-}}{m_\chi},\frac{m_V}{m_\chi}\Big)+ \left[\abs{c^G_L}^2-\abs{c^G_R}^2\right]\mathcal{F}_S\Big(\frac{m_{\chi^-}}{m_\chi},\frac{m_V}{m_\chi}\Big)\Big\},
\end{align}
where
\begin{align}
\mathcal{F}_X(\mu,\eta)&=\frac{3}{2}\log(\frac{\mu^2}{\eta^2})+(3\eta^2-3\mu^2+n_X) f(\mu,\eta),
\end{align}
for $X=V,S$, with $n_V=-7$, $n_S=1$,
and
\begin{align}\label{eq:loopFunctionf}
f(\mu,\eta)&=\begin{cases}
\frac{1}{2\sqrt\Delta} \log\frac{\mu^2+\eta^2-1+\sqrt{\Delta}}{\mu^2+\eta^2-1-\sqrt{\Delta}} & \Delta\neq 0 \\
\frac{2}{(\mu^2-\eta^2)^2-1} & \Delta=0
\end{cases}\;,
\end{align}
with $\Delta\equiv\Delta(\mu,\eta)=(\mu^2+\eta^2-1)^2-4\mu^2\eta^2$. Contour plots of $\mathcal{F}_{V}(\mu,\eta)$ and $\mathcal{F}_{S}(\mu,\eta)$ are shown in \cref{fig:Fscalar_Fvector_Scan}, and present a discontinuity at $\mu^2+\eta^2=1$. The anapole interaction, being P-violating, must vanish if the underlying model preserves parity, namely when $v_L=v_R$ and $c^G_L=c^G_R$, as apparent from Eq.~(\ref{Anapole:eq:Fvector}).
\begin{figure}
\centering
\begin{subfigure}[c]{1\linewidth}
\begin{equation*}
\feynmandiagram[small,vertical=i3 to e2] {
i1 --[ boson, edge label' = \( V \)] i2 --[fermion, edge label' = \( \chi^- \)] i3 --[fermion, edge label' = \( \chi^- \)] i1 -- a[particle=\(\chi\)],
e1 [particle=\(\chi\)] -- i2,
e2 [particle=\({\hat\gamma}\)] --[photon] i3,
};
\feynmandiagram[small, vertical= i3 to e2] {
i1 --[anti fermion, edge label' = \( \chi^- \)] i2 --[ boson, edge label' = \( V \)] i3 --[boson, edge label' = \( V \)] i1 -- a[particle=\(\chi\)],
e1 [particle=\(\chi\)] -- i2,
e2 [particle=\({\hat\gamma}\)] --[photon] i3,
};
\feynmandiagram[small, vertical= i3 to e2] {
i1 --[charged scalar, edge label' = \( G^-\)] i2 --[fermion, edge label' = \( \chi^- \)] i3 --[fermion, edge label' = \( \chi^- \)] i1 -- a[particle=\(\chi\)],
e1 [particle=\(\chi\)] -- i2,
e2 [particle=\({\hat\gamma}\)] --[photon] i3,
};
\feynmandiagram[small, vertical= i3 to e2] {
i1 --[anti fermion , edge label' = \( \chi^- \)] i2 --[anti charged scalar, edge label' = \( G^- \)] i3 --[anti charged scalar, edge label' = \( G^- \)] i1 -- a[particle=\(\chi\)],
e1 [particle=\(\chi\)] -- i2,
e2 [particle=\({\hat\gamma}\)] --[photon] i3,
};
\end{equation*}
\end{subfigure}
\begin{subfigure}[c]{1\linewidth}
\begin{equation*}
\feynmandiagram[small, vertical= i3 to e2] {
i1 --[charged scalar, edge label' = \( S\)] i2 --[fermion, edge label' = \( f \)] i3 --[fermion, edge label' = \( f \)] i1 -- a[particle=\(\chi\)],
e1 [particle=\(\chi\)] -- i2,
e2 [particle=\({\hat\gamma}\)] --[photon] i3,
};
\feynmandiagram[small, vertical= i3 to e2] {
i1 --[anti fermion , edge label' = \( f \)] i2 --[anti charged scalar, edge label' = \( S \)] i3 --[anti charged scalar, edge label' = \( S \)] i1 -- a[particle=\(\chi\)],
e1 [particle=\(\chi\)] -- i2,
e2 [particle=\({\hat\gamma}\)] --[photon] i3,
};
\end{equation*}
\end{subfigure}
\caption{Feynman diagrams generating an anapole moment for a Majorana fermion at the one-loop level in the background field formulation, via the mediation of an electrically vector boson (top) or the mediation of a charged scalar (bottom).
}
\label{fig:TriangleDiagramVectorandScalar}
\end{figure}
\begin{figure}[t!]
\centering
\includegraphics[width=.49\textwidth, clip = true]{Fvector.pdf}
\includegraphics[width=.49\textwidth,clip = true]{Fscalar.pdf}
\caption{Absolute values of the functions $\mathcal{F}_V(\mu,\eta)$ (left) and $\mathcal{F}_{S}(\mu,\eta)$ (right).}
\label{fig:Fscalar_Fvector_Scan}
\end{figure}
We also consider the scenario where $\chi$ couples to a charged Dirac fermion $f$ and a charged complex scalar $S$, with masses $m_f$ and $m_S$, and which charges $\pm e Q_f$ respectively (see also \cite{Kopp:2014tsa,Garny:2015wea,Sandick:2016zut,Baker:2018uox})
The interaction Lagrangian is in this case can be written as
\begin{align}
\label{eq:InteractionsLagrangian:Scalar}
\Lag_\text{FFS} &= \bar\chi\left[c_L P_L + c_R P_R\right] S^* f +\hc,
\end{align}
allowing $\chi$ to interact with the (background) photon field via the diagrams shown in \cref{fig:TriangleDiagramVectorandScalar}.
The induced scalar contribution to the anapole moment reads
\begin{equation}\label{Anapole:eq:Fscalar}
\mathcal{A}_S =- \frac{e}{96\pi^2m_\chi^2}Q_f\left[\abs{c_L}^2-\abs{c_R}^2\right]\mathcal{F}_S\Big(\frac{m_f}{m_\chi},\frac{m_S}{m_\chi}\Big)\;.
\end{equation}
The resulting vector- and scalar contributions to the anapole moment of $\chi$ are shown in \cref{fig:ScalarAnapolePlot,fig:VectorAnapolePlot} as a function of $\eta=m_{S,V}/m_\chi$, for different values of the fermion mass $m_{f, \chi^-}$. In both cases the anapole moment is enhanced for $\eta\approx 1$ and $m_{f,\chi^-} \ll m_\chi$.
The dependence of the anapole moment with $\mu=m_{f,\chi^-}/m_\chi$ is similar, see also \cref{fig:Fscalar_Fvector_Scan}.
The general formulas \cref{Anapole:eq:Fvector} and \cref{Anapole:eq:Fscalar} simplify when the charged fermions are much heavier than the vector/scalar and the Majorana fermion, {\it i.e.} when $m_{f,\chi^-}$. In this case, we find
\begin{align}\label{eq:AnapoleFunctionsHeavyeInternalFermionLimit}
\mathcal{A}_V & \simeq \frac{e}{96\pi^2m_{\chi^-}^2}\left\{2\left[\abs{v_L}^2-\abs{v_R}^2\right] \left(3+5\log{\frac{m_V^2}{m_{\chi^-}^2}}\right)+\left[\abs{c_L^G}^2-\abs{c_R^G}^2\right] \left(3+\log{\frac{m_V^2}{m_{\chi^-}^2}}\right)\right\}, \nonumber \\
\mathcal{A}_S &\simeq -\frac{e}{96\pi^2m_f^2}Q_f\left[\abs{c_L}^2-\abs{c_R}^2\right] \left(3+\log{\frac{m_S^2}{m_f^2}}\right),
\end{align}
which are independent of $m_\chi$. Analogously, in the heavy scalar/vector limit, {\it i.e} when $m_{V,S}\gg m_\chi, m_f$
\begin{align}
\mathcal{A}_V &\simeq \frac{e}{96\pi^2m_V^2}\left\{2\left[\abs{v_L}^2-\abs{v_R}^2\right] \left(-3+2\log{\frac{m_{\chi^-}^2}{m_V^2}}\right) - \left[\abs{c_L^G}^2-\abs{c_R^G}^2\right] \left(3+2\log{\frac{m_{\chi^-}^2}{m_V^2}}\right) \right\},\nonumber \\ \label{eq:AnapoleFunctionsHeavyeInternalBosonLimit}
\mathcal{A}_S &\simeq \frac{e}{96\pi^2m_S^2}Q_f\left[\abs{c_L}^2-\abs{c_R}^2\right] \left(3+2\log{\frac{m_f^2}{m_S^2}}\right).
\end{align}
\begin{figure}[!hbt]
\centering
\includegraphics[width=1\linewidth]{Anapole_vector_eta_running.pdf}
\caption{Anapole moment (normalized to the nuclear magneton $\mu_N$) induced at the one loop level via the interaction of the Majorana fermion $\chi$ with a charged gauge boson $V$ and a charged fermion $f$, as a function of $m_V/m_\chi$, for different values of the Majorana mass and different values of the charged fermion mass. For the plot, we assumed for concreteness $v_L=1$, $v_R, c_L^G, c_R^G=0$ and $Q_f=-e$.}
\label{fig:VectorAnapolePlot}
\end{figure}
\begin{figure}[!hbt]
\centering
\includegraphics[width=1\linewidth]{Anapole_scalar_eta_running.pdf}
\caption{Same as Fig. \ref{fig:VectorAnapolePlot} but for a Majorana fermion that interacts with a charged scalar $S$ and a charged fermion $f$. For the plot, we assumed for concreteness $c_L=1$, $c_R=0$ and $Q_f=-1$.}
\label{fig:ScalarAnapolePlot}
\end{figure}
This general formalism can be applied in particular to calculate the anapole moment of the Standard Model neutrinos, through its interactions with the $W$ boson and the charged leptons. In this case, $v_L=g/\sqrt{2}$, $v_R=c_L^G=c_R^G=0$, resulting in~ \cite{Bernabeu:2000hf,Bernabeu:2002pd}
\begin{align}
{\cal A}&
\simeq \frac{e G_F}{12 \sqrt{2} \pi^2} (-3+2\log\frac{m_\ell^2}{m_W^2}),
\end{align}
where $G_F=\sqrt{2} g^2/8 m_W^2$ is the Fermi constant, with $m_W$ the W-boson mass, and $m_\ell$ is the charged lepton mass.
For Dirac fermions, the anapole moment is half as large as for Majorana fermions, due to the halving of the number of diagrams.
\section{Anapole Moment of the Lightest Neutralino in the MSSM}\label{sec:AnapoleMoment_MSSM}
An archetype of Majorana fermion interacting with charged particles both via a charged vector mediator and a charged scalar mediator is the lightest neutralino in the MSSM. The MSSM Lagrangian contains an interaction term between the lightest neutralino, the charginos $\chi_j$, $j=1,2$, and the W-boson (and its Goldstone boson). This term has the form
\begin{align}
\label{eq:InteractionsLagrangian:VectorMSSM}
\Lag &\supset \bar\chi\gamma^\mu \left[v^j_L P_L + v^j_R P_R\right] \chi_j^- W_\mu^+
+\bar\chi\left[c^{G,j}_L P_L + c^{G,j}_R P_R\right]\chi_j^- G^+ +\hc,
\end{align}
with
\begin{align}\label{eq:MSSMVectorCouplings}
v^j_L &= -gN_{12} U_{j1}^* - g\frac{1}{\sqrt2} N_{13} U_{j2}^*,\nonumber \\
v^j_R &= -gN_{12}^* V_{j1} +g\frac{1}{\sqrt2} N_{14}^* V_{j2}, \nonumber\\
c_L^{G,j} &=g\cos\beta\left[N_{13}^* U_{j1}^*-\frac{1}{\sqrt 2}U_{j2}^*(N_{12}^*+\tan\theta_W N_{11}^*)\right], \nonumber \\
c_R^{G,j} &=-g\sin\beta\left[N_{14}V_{j1}+\frac{1}{\sqrt 2} V_{j2}(N_{12}+\tan\theta_W N_{11})\right],
\end{align}
where $\tan\beta=\langle H_2^0\rangle/\langle H_1^0\rangle$ denotes the ratio between the expectation values of the neutral components of the up-type Higgs and the down-type Higgs doublet, $\theta_W$ is the Weinberg's angle, $N_{ij}$, $i,j=1,\ldots,4$ are the elements of the neutralino mixing matrix, and $U_{ij}$ ($V_{ij}$), $i,j=1,2$ are the elements of the mixing matrix of the negatively (positively) charged chargino (see \cref{sec:ParticleSpectrumMSSM} for a brief summary of the construction of the mass eigenstates in the MSSM from the interaction eigenstates).
Further, the Lagrangian contains an interaction terms with the chargino and the charged Higgs, of the form
\begin{align}
\label{eq:InteractionsLagrangian:Higgs}
\Lag_\text{FFS} &\supset \bar\chi\left[c^{H,j}_L P_L + c^{H,j}_R P_R\right] H^+ \chi_j^- +\hc,
\end{align}
with
\begin{align}
c_L^{H,j} &= -g\sin\beta\left[N_{13}^* U_{j1}^*-\frac{1}{\sqrt 2}U_{j2}^*(N_{12}^*+\tan\theta_W N_{11}^*)\right], \nonumber \\
c_R^{H,j} &=-g\cos\beta\left[N_{14}V_{j1}+\frac{1}{\sqrt 2} V_{j2}(N_{12}+\tan\theta_W N_{11})\right],
\label{eq:couplings_chargino_chargedH_R_L}
\end{align}
as well as an interaction term with the SM fermions and sfermions of the form
\begin{align}
\label{eq:InteractionsLagrangian:Sfermions}
\Lag_\text{FFS} &\supset \bar\chi\left[c^{i,a}_L P_L + c^{i,a}_R P_R\right] {\widetilde f}_a f_i +\hc,
\end{align}
with
\begin{align}
c^{i,1}_L&=G^{{f}_{iL}}\cos\theta_{\widetilde{f}_a} + H^{{f}_{iR}} \sin\theta_{\widetilde{f}_a}, \nonumber \\
c^{i,1}_R&=G^{{f}_{iR}}\sin\theta_{\widetilde{f}_a} + H^{{f}_{iL}} \cos\theta_{\widetilde{f}_a}, \nonumber \\
c^{i,2}_L&=-G^{{f}_{iL}}\sin\theta_{\widetilde{f}_a} + H^{{f}_{iR}} \cos\theta_{\widetilde{f}_a}, \nonumber \\
c^{i,2}_R&=G^{{f}_{iR}}\cos\theta_{\widetilde{f}_a} - H^{{f}_{iL}} \sin\theta_{\widetilde{f}_a},
\end{align}
and
\begin{align}
G^{{f}_{iL}}&=-\sqrt{2}g\left[T^{f_i}_{3L}N^*_{12}+\tan\theta_W(Q_{f_i}-T^{f_i}_{3L})N^*_{11}\right], \nonumber \\
G^{{f}_{iR}}&=\sqrt{2}g\tan\theta_WQ_{f_i} N_{11}, \nonumber\\
H^{{f}_{iL}} &=- \frac{g}{\sqrt{2}m_W}m_{f_i} \times \begin{cases}
N_{14}/\sin\beta, & f_i =u\text{-type} \nonumber\\
N_{13}/\cos\beta, & f_i = d\text{-type}, \ell\\
\end{cases}\\
H^{{f}_{iR}} &= H^{{f}_{iL}*}.
\end{align}
These interactions induce at the one loop level an anapole moment for the lightest neutralino $\chi$:
\begin{align}
\mathcal{A}=\mathcal{A}_W+\mathcal{A}_{\widetilde{f}}+\mathcal{A}_H.
\end{align}
Using the general results of \cref{sec:1-loop_calculation} for the vector and scalar contributions to the anapole moment of a Majorana fermion, one finds
\begin{align}
\mathcal{A}_W &= \frac{e}{96\pi^2m_\chi^2}
\Big\{2\sum_{j}\left[|v^{j}_L|^2-|v^{j}_R|^2\right]\mathcal{F}_W\Big(\frac{m_{\chi^-_j}}{m_\chi},\frac{m_{W^+}}{m_\chi}\Big)\nonumber \\ \nonumber
&~~~~~~~~~~~~~~~+\sum_{j}\left[|c^{G,j}_L|^2-|c^{G,j}_R|^2\right]\mathcal{F}_S\Big(\frac{m_{\chi^-_j}}{m_\chi},\frac{m_{W^+}}{m_\chi}\Big)\Big\}, \nonumber\\
%
\mathcal{A}_{\widetilde{f}} &= - \frac{e}{96\pi^2m_\chi^2}\sum_{i,a}N^i_cQ_i\left[|c^{i,a}_L|^2-|c^{i,a}_R|^2\right]\mathcal{F}_S\Big(\frac{m_{f_i}}{m_\chi},\frac{m_{\widetilde{f}_a}}{m_\chi}\Big), \nonumber \\
%
\mathcal{A}_{H} &=- \frac{e}{96\pi^2m_\chi^2}\sum_{j}Q_j\left[|c^{H,j}_L|^2-|c^{H,j}_R|^2\right]\mathcal{F}_S\Big(\frac{m_{\chi^-_j}}{m_\chi},\frac{m_{H^+}}{m_\chi}\Big).
\end{align}
In what follows, we will particularize these expressions to some well motivated MSSM scenarios.
\section{MSSM scenarios}\label{sec:SimplifiedMSSM}
In order to gain insight into the rich physics of supersymmetric models, we will study first in subsections \ref{sec:pure_heavy_sfermion}, \ref{sec:Light_sfermions} and
\ref{sec:mixed_heavy_sfermion} some simplified scenarios where some SUSY particles are integrated out. Lastly, in subsection
\ref{sec:FullMSSM}, we will consider a general MSSM scenario.
\subsection{Pure lightest neutralino \& heavy sfermions}
\label{sec:pure_heavy_sfermion}
Let us first consider a number of toy models where the lightest neutralino practically coincides with an interaction eigenstate, either the bino, the higgsino, or the wino. We also consider first that all sfermions are decoupled, so that ${\cal A}_{\widetilde f}\simeq 0$.
\subsubsection*{Bino limit}
In the limit $M_1\ll M_2, |\mu|, m_{\widetilde f}$, the lightest neutralino is practically inert and in particular does not couple to the $W$ boson, so that ${\cal A}_{W}\simeq 0$, nor to the charged Higgs, so that ${\cal A}_{H}\simeq 0$. The anapole moment in this toy model is therefore expected to be very suppressed.
\subsubsection*{Higgsino limit}
In the limit $|\mu|\ll M_1, M_2, m_{\widetilde f}$ the two lightest neutralinos are nearly degenerate in mass and form a pseudo-Dirac pair. Further, there is only one light chargino, which practically coincides with the charged Higgsino. The effective couplings of the lightest neutralino to the $W$-boson and the lightest chargino read:
\begin{align}
&v^1_L \simeq -\frac{g}{2},~~~~~
v^1_R \simeq \frac{g}{2}, \nonumber \\
&c_L^{G,1} \simeq 0,~~~~~~
c_R^{G,1} \simeq 0.
\end{align}
and are manifestly parity conserving. The vector contribution to the anapole moment is therefore suppressed in this scenario, ${\cal A}_W\simeq 0$. The same result holds for a minimal dark matter scenario where the dark matter particle is a Majorana fermion, doublet under $SU(2)_L$ and with hypercharge $1/2$.
In the MSSM, moreover, the lightest neutralino also couples to the chargino and to the charged Higgs, which may be light. On the other hand, it follows from \cref{eq:couplings_chargino_chargedH_R_L} that in the Higgsino limit the coupling strengths are $c_R^{H,1}, c_L^{H,1} \simeq 0$, and therefore ${\cal A}_{H}\simeq 0$ regardless of the mass of the charged Higgs.
\subsubsection*{Wino limit}
In the limit $M_2\ll M_1, |\mu|, m_{\widetilde f}$, there is only one light neutralino and one light chargino, which are composed mainly by a neutral wino and a charged wino respectively. In this limit, the anapole moment only receives contributions from the chargino-$W$ loop. The relevant coupling constants read
\begin{align}
&v^1_L = -g , ~~~~~
v^1_R = -g, \nonumber \\
&c_L^{G,1} =0, ~~~~~~
c_R^{G,1} =0.
\end{align}
which are manifestly parity conserving and lead to a suppressed anapole moment.
It is apparent from these limiting cases that in order to enhance the anapole moment it is necessary to couple the lightest neutralino to new light particles with parity breaking interactions, and/or to introduce an admixture in the neutralino eigenstate of different interaction eigenstates. We discuss these two possibilities below.
\subsection{Light sfermion scenarios}\label{sec:Light_sfermions}
In this subsection we revisit the scenarios considered above, but allowing for a contribution to the anapole moment from fermion-sfermion loops.
\subsubsection*{Bino limit}
As discussed in subsection \ref{sec:pure_heavy_sfermion}, in the limit of heavy sfermions, the lightest neutralino does not couple to the $W$ boson nor to the charged Higgs, therefore ${\cal A}_W, {\cal A}_H\simeq 0$. On the other hand, the bino couples to the Standard Model fermions and sfermions, and the sfermions in the loop could contribute sizably to the anapole moment if they are sufficiently light. We consider here a simplified scenario where the bino couples to the left- and right-handed components of a Standard Model fermion $f$ (with color charge $N_c$, electric charge $Q_f$ and isospin $T^f_{3L}$), and the sfermions $\tilde f_L$ and $\tilde f_R$. We denote the two scalar mass eigenstates as $\tilde f_1$ and $\tilde f_2$, which are obtained from the interaction eigenstates $\tilde f_L $ and $\tilde f_R$ by rotating by the angle $\theta_{\tilde f}$ (see Appendix \ref{sec:ParticleSpectrumMSSM}). The strength of the Yukawa coupling of the lightest neutralino to the sfermion mass eigenstates $\tilde f_1$ and $\tilde f_2$ and the left- and right-handed components of the Standard Model fermion $f$ explicitly read:
\begin{alignat}{2}
c^{1}_L&=-\sqrt{2}g\left[\tan\theta_W(Q_{f}-T^{f}_{3L})\right]\cos\theta_{\widetilde{f}} ,~~~
&&c^{1}_R=\sqrt{2}g\tan\theta_WQ_{f}\sin\theta_{\widetilde{f}}, \nonumber \\
c^{2}_L&=\sqrt{2}g\left[\tan\theta_W(Q_{f}-T^{f_i}_{3L})\right]\sin\theta_{\widetilde{f}
},~~~
&&c^{2}_R=\sqrt{2}g\tan\theta_WQ_{f}\cos\theta_{\widetilde{f}},
\end{alignat}
which are in general parity violating and therefore will generate a non-vanishing contribution to the anapole moment.
We show in the top left panel of \cref{fig:ScatterPlotsLimits} a scatter plot of the expected anapole moment (normalized to the nuclear magneton) for the pure bino scenario for $m_\chi\in [10^1,10^4]$ GeV, $m_{\widetilde f_1} \in [m_\chi, 10 m_\chi]$, $m_{\widetilde f_2}\in [m_{\widetilde f_1}, 10 m_\chi]$, and $\theta_{\widetilde f}\in [0,2\pi]$. In the plot we have taken for concreteness $m_f=m_\tau=1.7$ GeV, and we have imposed the constraints on the stau mass from ATLAS~\cite{ATLAS:2019gti} and from the LEP experiments \cite{Berggren:2001kb}. Generically, one finds $|{\cal A}|/\mu_{N}\sim 10^{-8} (m_\chi/100\,{\rm GeV})^{-2}$ fm, although there are a few points with $10^{-6}\,{\rm fm}\lesssim |\mathcal{A}|/\mu_N\lesssim 10^{-5}$ fm for $m_\chi \lesssim 100\gev$ where the anapole moment is enhanced, corresponding to a compressed spectrum scenario where the stau mass is close to the bino mass.
\subsubsection*{Higgsino limit}
In order to generate an anapole moment in this simplified scenario it is also necessary to introduce new light degrees of freedom with parity violating couplings. As for the bino limit analyzed above, we consider the scenario where the Higgsino couples to the left- and right-handed components of a Standard Model fermion $f$ and the sfermions $\widetilde f_L$ and $\widetilde f_R$, with mass eigenstates $\widetilde f_1$ and $\widetilde f_2$. The coupling strengths to the mass eigenstates explicitly read:
\begin{alignat}{2}
c^{1}_L&= H^{{f}_{L}} \sin\theta_{\widetilde{f}},\quad
&&c^{1}_R= H^{{f}_{L}} \cos\theta_{\widetilde{f}},\nonumber\\
c^{2}_L&= H^{{f}_{L}} \cos\theta_{\widetilde{f}},\quad
&&c^{2}_R=-H^{{f}_{L}} \sin\theta_{\widetilde{f}},
\end{alignat}
with
\begin{align}
H^{{f}_{L}} &=- \frac{g}{2m_W}m_{f} \times \begin{cases}
1/\sin\beta, & f =u\text{-type}\\
1/\cos\beta, & f = d\text{-type}, \ell\\
\end{cases}\,,
\end{align}
which are as before parity violating.
We show in the top right panel of \cref{fig:ScatterPlotsLimits} a scatter plot of the anapole moment for the pure higgsino scenario, for the same range of parameters as for the pure bino scenario, and taking $\tan\beta=5$ (red points) or $\tan\beta=50$ (blue points). Clearly the anapole moment increases with $\tan\beta$, as the Higgsino coupling to the tau-stau grows with $\cos^{-2}\beta$.
\subsubsection*{Wino limit.}
Similarly to the previous two scenarios, in the wino limit the anapole moment can only be generated by parity-violating interactions of the lightest neutralino with fermions and sfermions. The coupling strengths to the sfermion mass eigenstates $\widetilde f_1$ and $\widetilde f_2$ read in this limit:
\begin{alignat}{2}
c^{i,1}_L&=-\sqrt{2}g T^{f_i}_{3L}\cos\theta_{\widetilde{f}},\quad
&&c^{i,1}_R=0, \nonumber \\
c^{i,2}_L&=\sqrt{2}g T^{f_i}_{3L}\sin\theta_{\widetilde{f}}, \quad
&&c^{i,2}_R=0,
\end{alignat}
which are clearly parity violating.
The expected anapole moment in this scenario is shown in the lower panel of \cref{fig:ScatterPlotsLimits}, for the same ranges of parameters as for the Bino limit.
\begin{figure}[t!]
\centering
\includegraphics[width=0.49\textwidth, clip = true]{BinoLogLog_rast_200.pdf}
\includegraphics[width=0.49\textwidth, clip = true]{Higgsino_rast_200.pdf}\\
\includegraphics[width=0.49\textwidth,clip = true]{Wino_rast_200.pdf}
\caption{Anapole moment (normalized to the nucleon magneton) for simplified MSSM scenarios with pure bino (top left), pure higgsino (top right), and pure wino (bottom) lightest neutralino, coupling only with the tau and staus. For details, see subsection \ref{sec:Light_sfermions}.}
\label{fig:ScatterPlotsLimits}
\end{figure}
\subsection{Mixed lightest neutralino \& decoupled sfermions}
\label{sec:mixed_heavy_sfermion}
Finally, we consider a simplified scenario where the sfermions are very heavy, so that ${\cal A}_{\widetilde f}\simeq 0$, but with an admixture of interaction eigenstates in the lightest neutralino mass eigenstates, which may allow parity violating interactions.
\subsubsection*{Mixed Bino-Higgsino}
In the limit $M_1,\mu \ll M_2$, there is only one light chargino, which is purely a charged Higgsino. The couplings of the lightest neutralino to the charged Higgsino and the $W$ are:
\begin{alignat}{2}
&v^1_L = - g\frac{1}{\sqrt2} N_{13},\quad &&v^1_R = +g\frac{1}{\sqrt2} N_{14}^*, \nonumber \\
&c_L^{G,1} =-\frac{g}{\sqrt{2}}\cos\beta\tan\theta_W N_{11}^*, \quad
&&c_R^{G,1} =-\frac{g}{\sqrt{2}}\sin\beta\tan\theta_W N_{11},
\end{alignat}
which are in general parity violating, thus leading to a non-zero ${\cal A}_W$. The couplings to the chargino and the charged Higgs read
\begin{align}
c_L^{H,1} = g\sin\beta\tan\theta_W N_{11}^*, ~~~~~
c_R^{H,1} =-g\cos\beta\tan\theta_W N_{11},
\end{align}
which are also in general parity violating and can further increase the anapole moment.
We show in the left panel in \cref{fig:ScatterPlotsLimitsMixed} the expected anapole moments for this scenario, taking for concreteness $M_1$, $\mu\in [100,10^5]\gev$ and $\tan\beta=5$. We assume for simplicity that the charged Higgs is very heavy and does not contribute to the anapole moment (although clearly for a light charged Higgs the anapole moment could be enhanced). In the plot we also indicate whether the lightest neutralino is bino like ($|N_{11}|>0.95$), higgsino like ($\sqrt{N_{13}^2+N_{14}^2}>0.95$) or a mixed state. As expected, the anapole moment is enhanced when the lightest neutralino is not a pure state, but an admixture of bino and higgsino.
\subsubsection*{Mixed Bino-Wino}
In the limit $M_1, M_2\ll \mu$, there is only one light chargino, which is purely a charged wino. The couplings of the lightest neutralino to the charged Higgsino and the W are:
\begin{alignat}{2}\label{eq:MSSMVectorCouplings_WB}
&v^1_L = -gN_{12}, \quad
&&v^1_R = -gN_{12}^*, \nonumber \\
&c_L^{G,1} =0, \quad
&&c_R^{G,1} =0,
\end{alignat}
which preserve parity and therefore give ${\cal A}_W\simeq 0$. Further, the couplings to the chargino and the charged Higgs are:
\begin{align}
c_L^{H,1} = 0,\quad
c_R^{H,1} =0.
\end{align}
Therefore, also in the scenario where the lightest neutralino is a mixed bino-wino state, only the sfermion loops can generate a non-vanishing anapole moment.
\subsubsection*{Mixed Wino-Higgsino}
In the limit $M_2,\mu\ll M_1$ both charginos can be light and contribute to the anapole moment via the interactions with the $W$ and with the charged Higgs boson. The coupling strengths of the lightest neutralino to the charginos $\chi^\pm_i$, $i=1,2$ and the $W$ boson read:
\begin{align}\label{eq:MSSMVectorCouplings_WH}
v^j_L &= -gN_{12} U_{j1}^* - g\frac{1}{\sqrt2} N_{13} U_{j2}^*, \nonumber \\
v^j_R &= -gN_{12}^* V_{j1} +g\frac{1}{\sqrt2} N_{14}^* V_{j2}, \nonumber\\
c_L^{G,j} &=g\cos\beta\left[N_{13}^* U_{j1}^*-\frac{1}{\sqrt 2}U_{j2}^*(N_{12}^*)\right], \nonumber\\
c_R^{G,j} &=-g\sin\beta\left[N_{14}V_{j1}+\frac{1}{\sqrt 2} V_{j2}(N_{12})\right],
\end{align}
while for the charged Higgs boson,
\begin{align}
c_L^{H,j} &= -g\sin\beta\left[N_{13}^* U_{j1}^*-\frac{1}{\sqrt 2}U_{j2}^*(N_{12}^*)\right], \nonumber \\
c_R^{H,j} &=-g\cos\beta\left[N_{14}V_{j1}+\frac{1}{\sqrt 2} V_{j2}(N_{12})\right].
\end{align}
These interactions are in general parity violating and lead to a non-vanishing anapole moment. A numerical scan of this scenario is shown in the right panel in \cref{fig:ScatterPlotsLimitsMixed}, for the same set-up as in the bino-higgino mixed case; the conclusions in the wino-higgsino case are also analogous to that case.
\begin{figure}[t!]
\centering
\includegraphics[width=0.49\textwidth, clip = true]{Bino-Higgsino_rast_200.pdf}
\includegraphics[width=0.49\textwidth,clip= true]{Wino-Higgsino_rast_200.pdf}
\caption{Anapole moment (normalized to the nucleon magneton) for simplified MSSM scenarios with mixed bino-higgsino (left) and wino-higgsino (right) lightest neutralino For details, see subsection \ref{sec:mixed_heavy_sfermion}.}
\label{fig:ScatterPlotsLimitsMixed}
\end{figure}
\subsection{General MSSM scenarios}
\label{sec:FullMSSM}
So far we have concentrated in some limiting scenarios where most SUSY particles are assumed to be very heavy and integrated-out. On the other hand, in generic scenarios several SUSY particles can be light and can contribute sizably to the anapole moment. To estimate the anapole moment expected in a generic SUSY scenario, we will consider in this subsection MSSM scenarios defined by the ranges indicated in table \ref{table:ParameterSpaceFullMSSM} (at the scale $\Lambda=3$ TeV).
\begin{table}
\centering
\begin{tabular}{|c|c|}
\hline
Parameter & Range \\ \hline
$M_1$ & $[100, 2000]$ GeV \\ \hline
$M_2$ & $[100, 2000]$ GeV \\ \hline
$M_3$ & $[2000,5000]$ GeV \\ \hline
$A_{t,b,\tau}$ & $[-4000,4000]$ GeV \\ \hline
$m_A$ & $[10^3, 10^5]$ GeV \\ \hline
$\tan\beta$ & $[3,50]$ \\ \hline
$\mu$ & $[100,2000]$ GeV \\ \hline
$m_{\widetilde{\ell}_{L,R}}$ & $[100, 2000]$ GeV \\ \hline
$m_{\widetilde{q}_{L_{1,2}}}$ & $[400,2000]$ GeV \\ \hline
$m_{\widetilde{u}_{R_{1,2}}}$ , $m_{\widetilde{d}_{R_{1,2}}}$ & $[400, 2000]$ GeV \\ \hline
$m_{\widetilde{q}_{L_3}}$ & $[300,2000]$ GeV \\ \hline
$m_{\widetilde{u}_{R_3}}$, $m_{\widetilde{d}_{R_3}}$ & $[300,2000]$ GeV \\ \hline
\end{tabular}
\caption{Ranges of parameters, defined at the scale $\Lambda=3$ TeV, for the MSSM scan described in subsection \ref{sec:FullMSSM}.}
\label{table:ParameterSpaceFullMSSM}
\end{table}
From those boundary conditions, we generate the low energy spectrum using \texttt{SOFTSUSY4.0} \cite{Allanach:2017hcf}. We then select the points satisfying the LEP constraints (using \texttt{micrOmegaS$_3$} \cite{Belanger:2013oya}), and ATLAS and CMS constraints (using \texttt{SModelS v2} \cite{Alguero:2021dig}), leading to a Higgs boson with mass in the range 123-127 GeV (using \texttt{HiggsBounds v4} \cite{Bechtle:2013wla} and \texttt{HiggsSignals} \cite{Stal:2013hwa}), and satisfying various flavor physics constraints (using SuperIso v3.0 \cite{Mahmoudi:2009zz} and GM2Calc \cite{Athron:2015rva}).~\footnote{We used \texttt{PySLHA} \cite{Buckley:2013jua} for linking the various codes via the SLHA \cite{Allanach:2008qq} format.} Finally, for the points satisfying all our constraints we calculate the expected anapole moment using the general expressions from \cref{sec:AnapoleMoment_MSSM}. The result of the scan in shown in \cref{fig:pMSSM_without_DD}.
We find points where the anapole moment can reach values up to $|{\cal A}|/\mu_N\sim 10^{-6}ß\,\,\text{fm}$. These correspond to scenarios where the anapole moment is dominated by the fermion-sfermion contributuion, in accordance with the results for the simplified models of \cref{sec:Light_sfermions} (with ${\cal O}(1)$ enhancements when several sfermions circulate in the loop), and correspond to scenarios where the lightest neutralino contains a significant bino and/or wino component. For scenarios where the lighest neutralino is Higgsino like, the anapole moment is typically more suppressed.
\begin{figure}[t!]
\centering
\includegraphics[width=.7\linewidth]{pMSSM_rast_200.pdf}
\caption{Anapole moment for MSSM scenarios with parameters in the ranges listed in Table \ref{table:ParameterSpaceFullMSSM} and satisfying the experimental constraints discussed in subsection \ref{sec:FullMSSM}.}
\label{fig:pMSSM_without_DD}
\end{figure}
\section{Direct Dark Matter Detection Through the Anapole Moment}\label{sec:DDlimits_pMSSM}
The effective Lagrangian \cref{eq:EffectiveLagrangianAnapole} gives rise to a dark matter interaction with the nuclei, that can induce an observable signal in direct detection experiments.\footnote{More strictly, the contact interaction approximation holds when the momentum transfer is smaller than the masses in the loop, which we assume here. For coupling to electrons, a momentum-dependent form factor should instead be considered \cite{Kopp:2014tsa}.}
The differential scattering cross section induced by the interaction of the Majorana dark matter particle with a target nucleus via the anapole moment reads: \cite{Ho:2012bg,DelNobile:2014eta}:
\begin{align}\label{directdetection:eq:AnapoleDiffxsec}
\frac{d\sigma}{dE_R}
=
\alpha_{\rm{EM}}\,
\mathcal{A}^2
\biggl[
Z^2\biggl(2m_T-\biggl(1+\frac{m_T}{m_\chi}\biggr)^2\frac{E_R}{v^2}\biggr)F^2_Z(q^2)
+
\frac{1}{3}\frac{m_T}{m^2_\chi}\left(\frac{\bar{\mu}_T}{\mu_N}\right)^2\frac{E_R}{v^2}F^2_D(q^2)
\biggr]
\,,
\end{align}
where $m_T$ and $Z$ are the nucleus mass and electric charge, $E_R$ is the recoil energy (related to the momentum transfer through $q^2=2 m_T E_R$) and $v$ is the dark matter speed relative to the nucleus. Further,
$F_Z$ and $F_D$ are the charge and magnetic dipole moment form factors~\cite{Helm:1956zz,Lewin:1995rx}:
\begin{align}
F^2_Z(q^2)
&=
\left(\frac{3j_1(qR)}{qR}\right)^2 e^{-q^2s^2}, \\
F^2_D(q^2)
&=
\left\{
\begin{array}{ll}
\left[\frac{\sin(qR_D)}{qR_D}\right]^2 & (qR_D<2.55, qR_D>4.5)\\
0.047 & (2.55\leq qR_D\leq4.5)
\end{array}
\right.\,.
\end{align}
where $j_1(x)$ is a spherical Bessel function of the first kind, $R=\sqrt{c^2+\frac{7}{3}\pi^2 a^2-5s^2}$ (with $c=(1.23A^{1/3}-0.60)\,\mbox{fm}$, $a=0.52\,\mbox{fm}$ and $s=0.9\,\mbox{fm}$) and $R_D\simeq 1.0A^{1/3}$ fm. $A$ denotes the mass number of target nuclei. Further, ${\mu}_N=e/2m_p$ denotes the nuclear magneton, and $\bar \mu_T$ is the weighted dipole moment for the target nuclei, defined as:
\begin{align}
\bar{\mu}_T
=
\left(
\sum_{i}f_i\mu_{i}^2\frac{S_{i}+1}{S_{i}}
\right)^{1/2}\,,
\end{align}
where $f_i$, $\mu_{i}$, and $S_{i}$ are the elemental abundance, nuclear magnetic moment, and spin, respectively, of the isotope $i$ \cite{Chang:2010en}.
The differential event rate at a direct detection experiment reads:
\begin{align}
\frac{dR}{dE_R}
=
\frac{1}{m_T}\frac{\rho_{\rm{loc}}}{m_\chi}\int d^3v\, v f_{\rm{Lab}}({\vec{v}})\frac{d\sigma}{dE_R}\;,
\label{eq:dRdE}
\end{align}
where $\rho_{\rm{loc}}=0.3\,\mbox{GeV}\,\mbox{cm}^{-3}$ and $f_{\rm{Lab}}(\vec{v})$ denotes the dark matter velocity distribution in the laboratory frame. For the latter, we will adopt a Maxwell-Boltzmann distribution in the galactic frame, truncated at the escape velocity from the Galaxy, $v_{\text{esc}}$:
\begin{equation}
f_{\rm{Lab}}(\vec{v}) = f (\vec{v} + \vec{v}_\text{E}) ~,
\end{equation}
with $\vec{v}_{\text{E}}$ the velocity of the Earth in the galactic frame and
\begin{equation}
f (\vec{v}) =
\begin{cases}
\frac{1}{\cal N} e^{-v^2/v_0^2} & (|\vec{v}| < v_{\text{esc}}) \\
0& (|\vec{v}| > v_{\text{esc}})
\end{cases}
~,
\end{equation}
with
\begin{equation}
{\cal N} = \pi^{3/2} v_0^3 \biggl[
\text{erf} \biggl(\frac{v_{\text{esc}}}{v_0}\biggr)
- \frac{2 v_{\text{esc}}}{\sqrt{\pi} v_0} e^{-
\frac{v_{\text{esc}}^2}{v_0^2}}
\biggr]~.
\end{equation}
Hereafter we take
$v_{\rm{esc}}=544\,{\rm km}\,{\rm s}^{-1}$,
$v_{0}=220\,{\rm km}\,{\rm s}^{-1}$
and
$v_{\rm E}=232\,{\rm km}\,{\rm s}^{-1}$.
Finally, we calculate the number of events at a given direct detection experiment integrating $dR/dE_R$ over the recoil energy, taking into account the corresponding detection efficiency.
\begin{figure}[t!]
\centering
\includegraphics[width=.6\linewidth]{figures/limit.pdf}
\caption{Upper limit on the anapole moment of a Majorana spin 1/2 fermion as dark matter candidate from the XENON1T, SuperCDMS and CRESST-III data, and projected sensitivity for XENONnT.}
\label{fig:pMSSM_with_DD}
\end{figure}
We show in \cref{fig:pMSSM_with_DD} the 90\% C.L. upper limits on the anapole moment $\mathcal{A}$ normalized by the nuclear magneton $\mu_N$ from the non-observation of a dark matter signal at the XENON1T \cite{Aprile:2018dbl}, SuperCDMS \cite{Agnese:2014aze}, and CRESST-III \cite{Amole:2019fdf} experiments, alongside with the expected sensitivity of the XENONnT experiment \cite{Aprile:2015uzo}.~\footnote{ Details of the estimation of the detection efficiency are given in Appendix B of Ref.~\cite{Hisano:2020qkq}.} We find that the current sensitivity from the XENON experiment reaches ${\cal A}/\mu_N \sim 10^{-5}\,\,\text{fm}$ at $m_{\rm DM}\sim 30$ GeV, which is about one order of magnitude larger than the maximum anapole moment we predict for generic MSSM scenarios. For these scenarios, it would be necessary an improvement in sensitivity by at least one order of magnitude in order to probe the anapole moment of a spin 1/2 Majorana dark matter candidate, unless the Earth is immersed in a region of the galaxy with an overdensity of dark matter. Let us note that for special choices of parameters, namely when the dark matter candidate is almost degenerate in mass with the scalar (or vector) in the loop and when the fermion is very light, the anapole moment is enhanced ({\it cf.} Figs.~ \ref{fig:VectorAnapolePlot} and \ref{fig:ScalarAnapolePlot}, and also \cite{Garny:2015wea}). In these very special cases, a signal might be expected.
\section{Conclusions}\label{sec:conclusions}
In this work we have calculated the leading contribution to the anapole moment of a spin 1/2 Majorana fermion that interacts via a Yukawa or a gauge interaction with electromagentically charged particles. To ensure the finiteness and the gauge independence of the vector contribution, we employed the background field method.
We have applied our general results to calculate the anapole moment of the lightest neutralino in the Minimal Supersymmetric Standard Model. Since the anapole interaction violates parity, only those MSSM scenarios violating parity will generate a non-vanishing anapole moment. We have also studied various limits where many supersymmetric particles are integrated out, and which can be identified with simplified dark matter models where the dark matter candidate is a Majorana fermion, that transforms as a singlet, doublet or triplet of $SU(2)_L$, and which could interact with a fermion and a sfermion via a Yukawa coupling.
Lastly, we have derived upper limits on the anapole moment of a Majorana fermion as dark matter candidate, from the null search results of direct detection experiments. For the parameters of the Standard Halo Model, we find that it would be necessary an improvement of sensitivity of current experiments by at least one order of magnitude in order to probe the anapole moment of generic dark matter scenarios.
\acknowledgments
The work of A.I. and M.R. was supported by the Collaborative Research Center SFB1258 and by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) under Germany's Excellence
Strategy - EXC-2094 - 390783311.
The Feynman diagrams in this paper were drawn with the help of \texttt{TikZ-Feynman} \cite{ELLIS2017103}
|
\section{\label{sec:intro} Introduction}
Animals native to deserts have an extreme shortage of food and water, making any wastage of energy detrimental to them. As such, their bodies have undergone evolutionary changes to have the optimal shape required to walk on the surface or even exhibit subsurface motion with minimum loss of energy. For example, sand lizards \citep{maladen2009undulatory, goldman2010wiggling, sharpe2013environmental} and sidewinder snakes \citep{marvi2014sidewinding, ZHU2021104629} employ a wiggling motion to move in the sand. A comprehensive understanding of this kind of motion has various applications in sub-terrain robotics \citep{raibert2008bigdog, zhang2013ground}, in rescue operations through sand or snow \citep{URQUHART201023}, and in mining related operations.
The subsurface motion of animals has garnered interest in the fields of earth-sciences \citep{PhysRevLett.109.238302,PhysRevE.89.012201}, biology \citep{maladen2009undulatory, mazouchova2010utilization, RevModPhys.86.943, sharpe2015controlled}, and engineering \citep{Hu10081, meirion2010empirical, li2013terradynamics} owing to its interesting dynamics. To understand the mechanism behind their movement through the granular medium, researchers \citep{maladen2009undulatory, sharpe2013environmental} conducted laboratory experiments on the creatures. \citet{maladen2009undulatory} studied how a sand lizard moves within the granular media with the help of high-speed x-ray imaging. Surprisingly, they noticed that the lizard does not use its limbs for propulsion, but it generates thrust by propagating a wavy motion of its body once it is under the surface. \citet{sharpe2013environmental} investigated the neuromechanical movement of sandfish lizard during its walking above the surface or sand swimming under the surface of a granular medium with the help of visible light imaging using electromyogram (EMG). The authors reported that the frictional forces play a prominent role in resisting the intrusion of the creatures. Moreover, they observed that the resistance to the undulatory motion of the creatures increases with the depth. Despite the resistance, the sand-dwelling creatures have adopted certain mechanisms to move within the bed of granular particles. \citet{maladen2011undulatory, maladen2011granular} have tried to comprehend this phenomenon by developing sand swimming robots. The ratio of forwarding speed to the wave speed of a robot was noticed \citep{maladen2011undulatory} to increases with an increase in the inter-particle friction but decreases with an increase in the particle-robot friction. In addition, \cite{maladen2011granular} investigated various head shapes of the robot and their influence on the drag-induced lift. The authors noticed that for certain wedge shapes of the robot, it reaches the free surface whereas, for other ones, it sinks to the bottom, indicating the importance of the robot's shape on its rise/sink dynamics. Apart from these studies, to gain a better insight into the creatures movement within granular media, they have been modelled as self-energized objects.
Few recent studies focused on understanding the dynamics of a self-energized object in granular media either translating (\citep{ding2011drag,guillard2014lift, kumar2017scaling,Bitang2021drag}) or oscillating horizontally in both two (\cite{PhysRevE.94.062906}) and three-dimensional systems (\cite{ping2020sink},\cite{liu2021locomotion}). \cite{PhysRevE.94.062906} explained the mechanism behind the rise and sink of a horizontally oscillating circular intruder in a two-dimensional system with the help of a mathematical model. They stated that the amplitude and frequency at which the intruder object oscillates mainly contribute to its rise or sink. They have also reported a minimum oscillation amplitude ($A_{min}$) below which the intruder does not sink irrespective of its frequency. \cite{ping2020sink} noticed that the intruder rises at low amplitude rates and sinks at high amplitude rates. They also found that an intruder might either rise or sink or remain at the same initial vertical position depending on its oscillating frequency and amplitude in a three-dimensional system. Further, the authors explained the driving mechanisms such as fluidization or cavity formation behind the intruder's vertical dynamics.
The previous studies were concerned mostly with the sole effect of the intruder's horizontal wiggling motion on its vertical dynamics. However, a coupled effect of wiggling motion along with other properties of the intruder can enhance the rise/sink dynamics. To this extent, \cite{liu2021locomotion} studied the combined effect of rotation and oscillation of a spherical intruder on its rise/sink dependence within a three-dimensional granular media. The effect of intruder's shape, coupled with its wiggling motion has not been studied to the best of our knowledge. In this regard, we numerically investigated how the shape of the intruder affects its vertical motion induced by horizontal wiggling. We studied how the oscillation parameters affect their vertical dynamics for each of these shapes. Further, we probed the influence of the properties of the granular medium, such as the coefficient of friction on the intruder's vertical motion. Finally, we proposed a mathematical model that predicts the intruder's rise/sink dynamics depending on its shape and the oscillation parameters.
\begin{figure}
\centering
\begin{minipage}{0.65\textwidth}\hspace*{-1cm}
\includegraphics[width=1.25\textwidth]{mainregion}
\end{minipage}\vfill\vspace{-1cm}
\begin{minipage}{0.55\textwidth}\hspace*{-1cm}
\includegraphics[width=1.25\textwidth]{shapes}
\end{minipage}
\caption{Initial configuration with one of the intruders (triangle) placed in the center (taken as origin) of the system and at a depth $h=105d$ from the free surface. The base is made of particles of size $1d$ (blue particles) at $y=0$ while the top surface is free to move and periodic boundary conditions are applied in $x$ direction. The intruder shapes that are considered in our study are disk $OS1$, square $OS2$, rectangle with its longer dimension along the $y$-axis $OS3$, rectangle with its longer dimension along the $x$-axis $OS4$, and equilateral triangle $OS5$. The intruder is oscillated horizontally with a velocity $V_{x}=A$ $sin( 2\pi t/T )$ where $A$, $T$ represents the amplitude and the time period of oscillation and $t$ is the time elapsed.}
\end{figure}
\section{\label{sec:simu_method} Simulation methodology}
To study the dynamics of a horizontally oscillating intruder within a two-dimensional granular medium, we used the discrete element method (\cite{cundall1979discrete}). Figure 1 shows the initial configuration of our system having dimensions of 300$d$ ${\times}$ 195$d$ along the $x$ and the $y$-axis respectively, where $d$ is the mean particle diameter. The intruder is placed at a depth of $105d$ from the free surface and at the centre of the simulation system. A set of particles are introduced uniformly at the top of the system which gets settled at the bottom due to gravity, while keeping the intruder stationary. Then, another set of particles are introduced and so on until the height of the granular bed reaches $195d$. The total number of particles comprising the system at the end is $N_t=63000$. The diameter of the particles ranges from $0.9d$ to $1.1d$ to avoid crystallization and while pouring and settling, we ensured that there are no overlaps among the particles. We further continued the simulation until the total kinetic energy of all the particles in the system have reached almost zero. At time $t=0$, the intruder is oscillated horizontally with a velocity $V_{x}=A$ $sin( 2\pi t/T )$ where $A$, $T$ represents the amplitude, and the time period of oscillation and $t$ is the time elapsed.
In our work, we have considered five different shaped intruders, which are pictorially represented in figure 1. Each of the individual intruder shapes is created by gluing a set of spherical particles having a diameter of $0.5d$ in such a way that their entire mass is the same for all the shapes.
In the discrete element method (DEM), the positions and the velocities of particles are updated at regular intervals of time by integrating the equations of motion. The forces considered are the contact force and the body force. The normal $F_{ij}^n$ and the tangential $F_{ij}^t$ components of contact force between two particles $i$ and $j$ at a given time $t$, is calculated using the contact force model (\cite{Brilliantov,silbert2001granular}), as shown in equations 2.1 and 2.2. According to the model, two particles $i$ and $j$ are said to be in contact if the overlap is $\delta \geq0$, where $\delta={R_i+R_j}-{r_{ij}}$. Here, $R_{i}$, $R_j$ are the radii of the two contacting particles, and $r_{ij}$ is the instantaneous distance between the centres of the two particles.
\begin{equation}
{F_{ij}^n=\sqrt{(R_{\textrm{eff}}\delta_{ij})} (K_n\delta_{ij}\hat{n}_{ij}-m_{\textrm{eff}}\gamma_n v_{ij}^n)}
\end{equation}
\begin{equation}
{F_{ij}^t=-min(\mu F_n,\sqrt{(R_{\textrm{eff}}\delta_{ij})} (K_t\Delta s_{t}+m_{\textrm{eff}}\gamma_t v_{ij}^t)}
\end{equation}
Here, $K_n = 2 \times 10^6 \rho dg$ and $K_t = 2.46 \times 10^6 \rho dg$ are the nonlinear spring constants, where `n' and `t' in the subscripts or superscripts correspond to normal and tangential components of respective parameters. Here, $v_{ij}$ is relative velocity, and $\hat{n}_{ij}$ is a unit vector in the direction of the line joining the centres of particles $i$ and $j$. The damping coefficients $\gamma_n$ and $\gamma_t$ are set to 2500$\sqrt{g/d^3}$ and $\Delta s_t$ is the tangential displacement vector between the two particles in contact. The effective mass $m_{\textrm{eff}}$ and the effective radius $R_{\textrm{eff}}$ for a given pair of contacts are expressed as $\frac{m_im_j}{m_i+m_j}$ and $\frac{R_iR_j}{R_i+R_j}$ respectively. The maximum value $F_{ij}^t$ can reach is $\mu F_{ij}^n$ because, at this threshold, the particles slip due to the dynamic friction. The time-step is $\Delta t = 1\times10^{-4}\sqrt{d/g}$ for all cases. The coefficient of friction $\mu$ is 0.1 for all the simulations unless specified. Each of the simulations was performed for a run time of $10^7 \Delta t$ to maintain parity among all the calculated results. The simulations are performed using dimensionless units, by considering acceleration due to gravity g, mean particle diameter $d$, and density $\rho$ as the basic units. The values of $d$, $\rho$, and $g$ are set to 1.0 without loss of generality. All the simulations are carried out using the Large-scale Atomic/Molecular Massively Parallel Simulator (LAMMPS) (https://www.lammps.org, \cite{PLIMPTON19951}), and for the visualization, OVITO package (\cite{ovito}) has been utilized.
\section{\label{sec:resdis} Results and Discussion}
\begin{figure}
\centering
\includegraphics[width=0.75\linewidth]{shape_time}
\caption{The vertical displacement of the intruder (a) disc, (b) square, (c) narrow-rectangle, (d) wide-rectangle, and (e) triangle shapes as a function of simulation time($t$) for an oscillation amplitude $A/d$= 3 and at different time period ($T/\sqrt{d/g}$).\label{fig:disp}}
\end{figure}
In this section, we presented the numerical results obtained for five different intruder shapes subjected to different oscillation parameters. We horizontally oscillated each intruder at different constant amplitudes $A/d=$ 0.5, 1, 3, 5 and at various constant time periods $T$ ranging from 0.25 to 8. This section is organized as follows: Subsection 3.1 demonstrates the vertical displacement of each intruder as a function of time at various time periods $T$ and for an amplitude $A/d=3$. The average rate of vertical displacement $V_y$ dependence on the intruder's shape at different $A/d$, $T$ and $\mu$ is discussed in subsection 3.2. In subsection 3.3, we showed the average rate of vertical displacement of the intruder as a function of the oscillating phase-angle $\phi$. In subsection 3.4, we elucidated the mean flow fields around the intruder. Lastly, in subsection 3.5, we have compared our results with the proposed mathematical model and explained the physical phenomenon leading to the rise and sink of the intruder for different parameters considered in the study.
\subsection{Vertical displacement of oscillating intruder}
\begin{figure}
\centering
\includegraphics[width=0.75\linewidth]{nrectrise}
\label{fig:init}
\vspace{-1cm}
\caption{ A pictorial representation depicting the position of the narrow-rectangle $OS3$ for $A/d$=3 and $T/\sqrt{d/g}$=7 at different simulation time $t/\sqrt{d/g}$: (a) $0$ (b) $100$ (c) $300$ (d) $500$ (e) $700$ and (f) $1000$.}
\end{figure}
\begin{figure}
\centering
\includegraphics[width=0.75\linewidth]{nrectsink}
\label{fig:init}
\vspace{-1cm}
\caption{A pictorial representation depicting the position of the narrow-rectangle $OS3$ for $A/d$=3 and $T/\sqrt{d/g}$=1 at different simulation time $t/\sqrt{d/g}$: (a) $0$ (b) $100$ (c) $300$ (d) $500$ (e) $700$ and (f) $1000$.}
\end{figure}
\begin{figure}
\centering
\includegraphics[width=0.75\linewidth]{riserate_timeperiod}
\caption{The rise rate($V_{y}$ ) of the horizontally oscillating intruder as a function of its time-period($T$) for different amplitude $A$. Here, each plot corresponds to a different intruder shape: (a) disk, (b) square, (c) narrow-rectangle, (d) wide-rectangle, and (e) triangle.}
\end{figure}
In this subsection, we showed the vertical displacement of the intruders as a function of the simulation time $t$ for an amplitude of $A/d=3$ at different time-periods $T/\sqrt{d/g}$. Figure 2 a shows the vertical displacement of a disk-shaped intruder OS1 oscillated at different $T$. At time periods of oscillation $T \geq 2$, a wake is formed either to the left side of the intruder or to the right side, depending on its direction of motion. In this sense, when the intruder moves from left to right, the wake is developed to the left side of the intruder. When the intruder changes its direction of oscillation and starts to move from right to left, it interacts with the wake that is on its left side. When the intruder reaches the middle point of oscillation, the wake to its left vanishes, and simultaneously another wake evolves to the intruder's right side. When the intruder is traversing the granular medium, the particles above the wake region tries to fill the wake due to the action of gravity. In the process, a bed of particles is created on the edges of the wake region. When the intruder changes its direction of motion, it must climb the bed of particles to move ahead, and thus a vertical displacement of the intruder takes place. This is the reason behind the rise of the disk-shaped intruder at longer time periods. Interestingly, the intruder neither sinks nor rises at certain intermediate time-periods $T = 2$. At time periods $T$ ranging from 0.25 to 1, the wake is formed not only beside the intruder but also above and below it. This is due to its high oscillation frequency and, consequently, a greater momentum transfer to the surrounding particles. The presence of the wake below the intruder propels it to sink due to the gravity acting on it. Thus, the disk-shaped intruder sinks at shorter time periods or larger frequencies of oscillation. Similar behavior has been observed in both 2D \citep{PhysRevE.94.062906} and 3D \citep{ping2020sink} granular systems, where the disk (2D) and the spherical (3D) shaped intruders rise at lower frequencies and sink at higher frequencies of oscillation.
The square-shaped intruder shows similar behavior (figure 2 b) to that of the disk one (in supplementary information we have provided the links for the videos showing the rise and sink of the square shaped intruder when oscillated at time period of 5 and 1 within the granular medium). However, the square-shaped intruder is noticed to move to lower vertical distances than the disk one for longer time periods. This is due to the larger stress experienced by the square one ($OS2$) as compared to that of the disk one ($OS1$) from the particles above. The reason for it is due to the presence of a flat surface at the top of the square intruder and a curved one for the disk one. Figure 2 c shows the vertical displacement of a rectangle with a small base ($OS3$) whose behavior is like that of the disk and the square shapes. Though rectangle and square-shaped intruders have flat top surfaces, the former moves to a higher vertical distance than the latter one. The reason for this behavior is that the rectangle intruder ($OS3$) has a smaller top surface than the square one and hence a smaller stress from the particles above it. A pictorial representation of the rectangle intruder ($OS3$) is shown to depict this rise and sink phenomena at different simulation times $t/\sqrt{d/g}$ when oscillated at a higher time period ($T/\sqrt{d/g}=7$) (figure 3) and at a lower one ($T/\sqrt{d/g}=1$) (figure 4) for a given amplitude $A/d=3$. Further, the rectangle with a larger base/top surface ($OS4$) moves upwards at a slower rate than (figure 2 d) that of the square one and the rectangle one with a smaller base ($OS3$). This is due to a larger top surface and consequently a higher stress from the particles above it. Interestingly, the sinking behavior is observed to be independent of the base length of the quadrilaterals ($OS2, OS3$ and $OS4$) considered in our study. The
triangular intruder behaved differently as compared to all the other shapes. In this sense, the triangular intruder is noticed to sink always irrespective of the time periods (figure 2 e). In this case, a bed of particles is not created near the edges of the wake owing to the intruder's inclined sides and sharp edges. An intriguing observation is that the maximum vertical distance traversed by the intruder varies non-monotonically with the time period. Apart from the maximum vertical distance travelled by an intruder, how quickly an intruder can rise, or sink is equally important. This aspect of the intruder is discussed in the next subsection.
\subsection{Rate of rise of intruder with time-period}
\begin{figure}
\centering
\includegraphics[width=0.75\linewidth]{nw_riserate_timeperiod}
\caption{The rise rate ($V_{y}$) of the horizontally oscillating intruder as a function of its time-period ($T$) for different friction coefficient $\mu$ and amplitude $A/d=3$. Here, each plot corresponds to a different intruder shape: (a) disk, (b) square, (c) narrow-rectangle, (d) wide-rectangle, and (e) triangle.}
\end{figure}
In this subsection, we explain how the vertical displacement rate of an intruder varies with its shape and oscillation parameters. The rate of change of vertical displacement is defined as $V_{y} = (y_{f}-y_{i})/(t_{f} - t_{i})$. Here, $y_i$ and $y_f$ are the initial and final vertical positions of the intruder at times $t_i$ and $t_f$. Note that $t_i$ is considered at $1/10^{th}$ of the total simulation time ( 1000$\sqrt{d/g}$). For some cases, we noticed the intruder reaches its final vertical position before the end of the simulation (1000 $\sqrt{d/g})$. An example of such behaviour can be seen in figure \ref{fig:disp} a for a circular intruder at time period $T=4$ for which $t_f=650$. For these type of cases, we have taken $t_f$ as the time at which the intruder is about to reach its final vertical position. Henceforth, the positive value of $V_y$ implies the intruder is rising and the negative value of $V_y$ corresponds to sinking. Figure 5 shows the intruder's rate of rise/sink as a function of time-period ($T$) and for amplitudes, $A/d =$ 0.5, 1, 3, and 5. The rate of rise/sink is negligible at all time periods for the amplitudes ($A$) of 0.5 and 1 for all the intruder shapes. Similar behavior has been reported for a oscillating disk in a previous work by \cite{PhysRevE.94.062906}, where the authors reported that to facilitate the vertical motion of the intruder, a minimum amplitude of oscillation is necessary.
Figure 5 a shows a slightly negative $V_y$ for $A/d = 3$ and at $T\leq1$ for a disk-shaped intruder. This result is consistent with the negative vertical displacement observed in figure 2 a for $T\leq1$. At $T\geq2$, we observed a positive $V_y$ for the range of time periods considered in our study. Surprisingly, as the time-period increases, the rise rate first increases, reaches a maxima and then decreases. When the intruder changes its direction of motion, it is impelled to climb over a bed of particles leading to its rise at large time periods. Suppose, if the intruder is moving from left to right, then the above-mentioned bed of particles corresponds to the ones that are trying to fill the wake which is formed just to the right of the intruder. These particles could be the ones that fall from above the intruder or the ones that are adjacent to the wake. As the time period increases, more particles get piled up, and consequently, the intruder has to climb over a larger set of particles. This leads to an increase in its vertical position and its rise rate. As time period increases, we noticed a maxima and then a decrease in the rise rate. The reason for this is at larger time periods, greater number of particles gets piled up which dampens the upward motion of the intruder. In summary, the group of particles falling behind the intruder, or in other words, the size of the bed of particles behind it, is responsible for the non-monotonic behavior of the intruder's rise rate. Even at amplitude $A/d = 5$, the non-monotonic behavior in the rise rate is noticed. Moreover, the rise rate increases with an increase in the amplitude.
The rate of rise/sink of a square intruder ($OS2$) as a function of the time period is shown in figure 5 b. At time periods $T\leq2$, amplitude $A/d = 3$, the square intruder has a negative rate of vertical displacement or sink rate. Interestingly, as the $T$ increases, the sink rate gradually increases reaching a maxima and then decreases. At $T < 2$, a wake is formed not only on either sides of the intruder but also above and below it as a result of a high frequency of oscillation. The action of gravity on the intruder coupled with a low area fraction of particles below it results in its sinking. As the time period increases, the size of the wake above the intruder decreases, and consequently, the number of particles interacting, or in other words, the stress exerted on the top surface of the intruder increases. This results in an increase in the sink rate. With a further increase in the time period, the wake size below the intruder decreases, resulting in the resistance to the downward motion of the intruder. In summary, the wake dynamics above and below the intruder are responsible for the sink rate's non-monotonic behavior. At time periods $T \geq 2$, the square intruder experiences mostly a positive rate of vertical displacement. The square-shaped intruder shows a non-monotonic rise rate as a function of time period at $T \geq 2$, similar to that of the disk-shaped intruder. However, the square-shaped intruder has lower rise rates than that of the disk-shaped intruder. This is because the curved base of the disk-shaped intruder enables it to ascend the slant bed of particles more quickly than that of square one.
Figure 5 c displays the rise/sink rate of a rectangle-shaped ($OS3$) intruder as a function of time period. The rectangle-shaped intruder has a smaller base and a larger height. The rectangle-shaped intruder shows qualitatively similar behavior to that of the square-shaped one. However, at $T\leq2$, the sink rate is smaller for the rectangle-shaped intruder ($OS3$) as compared to that of the square-shaped intruder($OS2$). This is due to a smaller top surface of the rectangle-shaped intruder ($4.5d$) than that of the square-shaped one ($6.5d$), which yields in smaller stress experienced by the top surface of $OS3$ than that of $OS2$. Due to a small base, $OS3$ can climb the slant bed of particles more easily than that of $OS2$. This results in slightly higher rise rates for the $OS3$ shape than the $OS2$ one. For the rectangle-shaped intruder with a larger base and a smaller height ($OS4$), an
opposite behavior is witnessed (figure 5 d). In this sense, the rise rate is smaller for $OS4$ as compared to that of $OS3$ and $OS2$. Moreover, the magnitude of the sink rate is greater for $OS4$ than that of $OS2$ and $OS3$ owing to the larger top surface of $OS4$. The rate of
vertical displacement of the equilateral-triangle-shaped intruder ($OS5$) is shown in figure 5 e. The triangle-shaped intruder shows a mostly negative rate of vertical displacement because the V-shaped structure formed by its two edges at the vertices disables it to climb over the bed of particles. The intruder displayed a non-monotonic sink rate dependence on the time period. However, the magnitude of the sink rate is significantly higher than the other shapes considered in our study. The reason for it is due to an almost continual downward stress exerted by the particles on the triangle's slant edges. We have also found that there is an increase in the rate of rise of the intruder with the increase in the intergranular friction of $\mu=0.0$ to 0.5 (figure 6). The same kind of trend has also been reported by \cite{liu2021locomotion} for a 3D system with a circular intruder and also stated that there is a saturation of rise rate when $\mu\geq0.5$.
\begin{figure}
\centering
\includegraphics[width=0.9\linewidth]{phase_diagram}
\vspace*{-1cm}
\caption{Oscillatory motion of the intruder as sine wave function representing the phase angle($\phi$)}
\end{figure}
Moreover, due to its unique geometry, each shape has a different angle of contact around its surface with the surrounding particles when oscillating horizontally. With square and rectangle shapes having a flat outer surface, triangular shape with an inclined angle, and disk with a smooth curvature. If we compare the positive $V_{y}$ value which correspond to the rise of the intruder for the different shapes at $A/d=$ 3 and 5, than it is in the order of : $V_{y};OS1 > V_{y};OS3 > V_{y};OS2 > V_{y};OS4 > V_{y};OS5$. Thus confirming that the geometric shape and orientation also affect the intruder's movement and its rate of rise in the system when oscillated horizontally.
\subsection{Average rate of vertical displacement of an intruder with phase angle}
\begin{figure}
\centering
\includegraphics[width=0.75\linewidth]{riserate_phaseangle}
\caption{The rise rate(Vy) of the intruder vs the phase angle at $A/d=3$ and different $T/\sqrt{d/g}$ for (a) disk, (b) square, (c) narrow-rectangle, (d) wide-rectangle, and (e) triangle shaped intruder object.}
\end{figure}
In this subsection, we elucidate how the average rate of vertical displacement of the intruder varies with different positions of the oscillation cycle. One oscillation cycle involves the intruder travelling a distance of $``A"$ from the centre to the right, then a distance of $``2A"$ from right to the left, followed by a distance of $``A"$ from left to the centre, where $``A"$ is the amplitude. If we consider one oscillation cycle as a sine wave function, then each phase angle ($\phi$) represents different horizontal positions of the intruder as shown in figure 7. Here, the phase angle $\phi=0$ or $10\phi/\pi=0$ represents the centre point of oscillation when the intruder is moving from left to right, $\phi=\pi/2$ or $10\phi/\pi=5$ indicates the rightmost point of oscillation. In the same way, $\phi=\pi$ or $10\phi/\pi=10$ denotes the centre point of oscillation when the intruder is moving from right to left, $\phi=3\pi/2$ or $10\phi/\pi=15$ indicates the leftmost point of oscillation and $\phi=2\pi$ or $10\phi/\pi=20$ represents the centre point. Figure 8 a displays the average rate of vertical displacement ($V_y$) of the disk-shaped intruder as a function of its phase angle at different time periods and for an amplitude of $A/d=3$. Here, $V_y$ increases with $\phi$ from $10\phi/\pi=0$ to $10\phi/\pi\approx5$ where the intruder gradually climbs over the particles. When the intruder changes its direction of motion ($10\phi/\pi=5$) and moves from right to left, the wake to the left of the intruder gradually decreases. This is associated with an increase in the number of particles interacting with the intruder increasing the resistance to the vertical motion of the intruder. Therefore, $V_y$ decreases from $10\phi/\pi\approx5$ to $10\phi/\pi\approx10$. However, from $10\phi/\pi\approx10$ to $10\phi/\pi\approx15$ the intruder again climbs over the particles yielding an increase in the average rate of vertical displacement $V_y$. When the intruder moves from left to right, another wake evolves to the right of it. At $10\phi/\pi=15$, the intruder changes its direction of motion and moves from right to left which results in a decrease in $V_y$ due to the presence of wake to the right of the intruder. Interestingly, we witnessed both the positive and negative rates of vertical displacement in a single oscillation cycle at all timeperiods and for $A/d=3$ for the disk-shaped intruder. At smaller timeperiods of oscillation, lower $V_y$ is evidenced whereas, at larger timeperiods, greater $V_y$ is noticed. This result is consistent with $V_y$ as a function of time period (figure 5 a).
The square-shaped intruder (figure 8 b) shows qualitatively similar trends to that of the disk-shaped one. The magnitude of $V_y$ is greater for the disk-shaped intruder ($OS1$) as compared to that of a square-shaped one ($OS2$) although the diameter of $OS1$ ($6.5d$) and the side of $OS2$ ($7.0d$) are almost of the same length. The disk has a curved surface at the top whereas the square has a flat top surface and hence square-shaped intruder experiences greater stress from the particles above it than the disk-shaped one. This results in a smaller $V_y$ for a square-shaped intruder as compared to that of a disk-shaped one. However, for a rectangle-shaped intruder having a shorter top surface ($4.5d$), a greater $V_y$ is evidenced (figure 8 c) as compared to the square one, due to smaller stress experienced from the particles above it. For a rectangle-shaped intruder with a larger base ($9.5d$), we noticed a smaller $V_y$ due to greater stress experienced by the intruder from the particles above it (figure 8 d). For a triangle-shaped intruder, we evidenced a negative rate of vertical displacement $V_y$ for most of the phase angles. This could be due to its asymmetric geometry and either of the two inclining side walls experiencing stress from the particles above it throughout the oscillation cycle.
\subsection{Mean flow fields}
\begin{figure}
\hspace{-0.9cm}
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p0_afract1}
\caption{}
\label{fig:y equals x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p5_afract1}
\caption{}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p10_afract1}
\caption{}
\label{fig:five over x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p15_afract1}
\caption{}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.0cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p19_afract1}
\caption{}
\label{fig:five over x}
\end{subfigure}
\hspace{-0.9cm}
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p0_velt1}
\caption{}
\label{fig:y equals x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p5_velt1}
\caption{}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p10_velt1}
\caption{}
\label{fig:five over x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p15_velt1}
\caption{}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.0cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p19_velt1}
\caption{}
\label{fig:five over x}
\end{subfigure}
\hspace{-0.9cm}
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p0_prsrt1}
\caption{$10\phi/\pi=0$}
\label{fig:y equals x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p5_prsrt1}
\caption{$10\phi/\pi=5$}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p10_prsrt1}
\caption{$10\phi/\pi=10$}
\label{fig:five over x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p15_prsrt1}
\caption{$10\phi/\pi=15$}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.0cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p19_prsrt1}
\caption{$10\phi/\pi=19$}
\label{fig:five over x}
\end{subfigure}
\caption{The time-averaged flow fields for depicting the area fraction $\Phi$, velocity $V$ and pressure $P$ around the intruder $OS1$ (disk) for $T/\sqrt{d/g}=1$ and different phase angle $10\phi/\pi$ : (a), (f), (k) 0.0, (b) (g), (l) 5.0, and (c), (h), (m) 10.0, (d), (i), (n) 15.0 and (e), (j), (o) 19.0. The oscillating amplitude of the intruder is $A/d=3$.\label{fig:mff_disc}}
\end{figure}
\begin{figure}
\hspace{-0.9cm}
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p0_afract1}
\caption{}
\label{fig:y equals x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p5_afract1}
\caption{}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p10_afract1}
\caption{}
\label{fig:five over x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p15_afract1}
\caption{}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.0cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p19_afract1}
\caption{}
\label{fig:five over x}
\end{subfigure}
\hspace{-0.9cm}
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p0_velt1}
\caption{}
\label{fig:y equals x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p5_velt1}
\caption{}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p10_velt1}
\caption{}
\label{fig:five over x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p15_velt1}
\caption{}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.0cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p19_velt1}
\caption{}
\label{fig:five over x}
\end{subfigure}
\hspace{-0.9cm}
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p0_prsrt1}
\caption{$10\phi/\pi=0$}
\label{fig:y equals x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p5_prsrt1}
\caption{$10\phi/\pi=5$}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p10_prsrt1}
\caption{$10\phi/\pi=10$}
\label{fig:five over x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p15_prsrt1}
\caption{$10\phi/\pi=15$}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.0cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p19_prsrt1}
\caption{$10\phi/\pi=19$}
\label{fig:five over x}
\end{subfigure}
\caption{The time-averaged flow fields for depicting the area fraction $\Phi$, velocity $V$ and pressure $P$ around the intruder $OS3$ (rectangle with its longer dimension along the y-axis) for $T/\sqrt{d/g}=1$ and different phase angle $10\phi/\pi$ : (a), (f), (k) 0.0, (b) (g), (l) 5.0, and (c), (h), (m) 10.0, (d), (i), (n) 15.0 and (e), (j), (o) 19.0. The oscillating amplitude of the intruder is $A/d=3$.\label{fig:mff_rectangle}}
\end{figure}
\begin{figure}
\hspace{-0.9cm}
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os5a3p0_afract1}
\caption{}
\label{fig:y equals x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os5a3p5_afract1}
\caption{}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os5a3p10_afract1}
\caption{}
\label{fig:five over x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os5a3p15_afract1}
\caption{}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.0cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os5a3p19_afract1}
\caption{}
\label{fig:five over x}
\end{subfigure}
\hspace{-0.9cm}
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os5a3p0_velt1}
\caption{}
\label{fig:y equals x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os5a3p5_velt1}
\caption{}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os5a3p10_velt1}
\caption{}
\label{fig:five over x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os5a3p15_velt1}
\caption{}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.0cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os5a3p19_velt1}
\caption{}
\label{fig:five over x}
\end{subfigure}
\hspace{-0.9cm}
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os5a3p0_prsrt1}
\caption{$10\phi/\pi=0$}
\label{fig:y equals x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os5a3p5_prsrt1}
\caption{$10\phi/\pi=5$}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os5a3p10_prsrt1}
\caption{$10\phi/\pi=10$}
\label{fig:five over x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os5a3p15_prsrt1}
\caption{$10\phi/\pi=15$}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.0cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os5a3p19_prsrt1}
\caption{$10\phi/\pi=19$}
\label{fig:five over x}
\end{subfigure}
\caption{The time-averaged flow fields for depicting the area fraction $\Phi$, velocity $V$ and pressure $P$ around the intruder $OS5$ (triangle) for $T/\sqrt{d/g}=1$ and different phase angle $10\phi/\pi$ : (a), (f), (k) 0.0, (b) (g), (l) 5.0, and (c), (h), (m) 10.0, (d), (i), (n) 15.0 and (e), (j), (o) 19.0. The oscillating amplitude of the intruder is $A/d=3$.\label{fig:mff_triangle}}
\end{figure}
In this subsection, we have shown the time-averaged flow fields by using discrete microscopic data like velocities, positions, stress, etc., of each particle around the designated intruder region. The considered parameters such as the area fraction $\Phi(t)$, velocity $v(t)$, stress tensor $\boldsymbol{\sigma_{ij(t)}}$ and the pressure $P(t)$ are calculated at any position $p$ with position vector $\boldsymbol{r_p}$ and at an arbitrary time $t$ as described in Glasser and Goldhirsch's implementation of the Gaussian coarse-graining function \citep{glasser2001scale, dhiman2020origin, reddy2021granular} :
\begin{equation}
\Phi(t) = \sum_{i=1}^{n} \frac{\pi d_i^2}{4} \mathcal{W}(\bm{r_p}-\bm{r_i(t)})
\end{equation}
\begin{equation}
\bm{v}(t) = \left[\sum_{i=1}^{n} \frac{\pi d^2_i}{4} \bm{v_i} \mathcal{W}(\bm{r_p}-\bm{r_i(t)}) \right]/\Phi
\end{equation}
\begin{equation}
\bm{\sigma_{ij}}(t)= \sum_{i=1}^{n}\sum_{j=i+1}^{n}(\bm{F^{ij} r_{ij}}) \int_{s=0}^{1} \mathcal{W}(\bm{r_p}-\bm{r_i(t)}+s\bm{r_{ij}})ds
\end{equation}
\begin{equation}
P(t) =\frac{-tr(\sigma_{ij}(t))}{2}
\end{equation}
\begin{equation}
\mathcal{W}(\bm{r})=\frac{1}{\pi w^2}e^{-\bm{r}^2/w^2}
\end{equation}
Here, $\mathcal{W}(\bm{r})$ is the coarse-graining function, $\rho$, $d_i$ and $\bm{r_i(t)}$ are the density, diameter and the position vector of the particle $i$. $\bm{F^{ij}}$ is the force on the particle $i$ due to particle $j$ and $\bm{r_{ij}}$ is a vector in the direction of line joining the centres of two particles $i$ and $j$. Moreover, $w=1.0$ and $\mathcal{W}(\bm{r_p- r_i})=0$ if $|\bm{r_p- r_i}|>3w$ and $\phi,\bm{v}$ and $P$ are the time-averaged area fraction, velocity and pressure. The flow fields presented are the region around the $15d$ radius from the centre of the intruder ($D_i=5d$) and they are averaged over a minimum of $5000$ frames.
Figure \ref{fig:mff_disc} displays the mean flow field of area fraction when the intruder is at the centre point of oscillation ($10\phi/\pi=0$) while it is moving from left to right. The area fraction is minimum in a small region on the left side of the intruder due to the development of wake. However, in a small region to the right side of the intruder, the area fraction is witnessed to be slightly lower than that of the bulk. In the above and below the regions of the intruder, the area fraction is almost the same as that of the bulk as the intruder can affect only those particles that are close to it. Figure \ref{fig:mff_disc} b shows the area fraction at the rightmost point of oscillation ($10\phi/\pi=5$) when the intruder has changed its direction of motion and has just started to move from right to left. A larger wake is witnessed to the left side of the intruder in this case as compared to that of the one in figure \ref{fig:mff_disc} a. However, this wake gradually disappears as the intruder moves from right to left as the particles surrounding the wake try to fill it due to the action of gravity. Consequently, by the time the intruder reaches the centre point of oscillation ($10\phi/\pi=10$), this wake is replaced by a mildly fluidized set of particles or in other words, a slightly smaller area fraction to the left of the intruder (figure \ref{fig:mff_disc} b). Moreover, another wake begins to develop to the right side of the intruder during this time. As the intruder reaches the rightmost point of oscillation ($10\phi/\pi=15$), a large trailing wake is evidenced to the right side of the intruder (figure \ref{fig:mff_disc} d). Moreover, the mildly fluidized bed to the left side of the intruder is filled by particles above it and hence the area fraction becomes close to that of the bulk. Again as the intruder moves from right to left and reaches close ($10\phi/\pi=19$) to the centre point of oscillation, the wake to its right is slightly filled by particles and generating a fluidized bed(figure \ref{fig:mff_disc} e). A small region of dark blue to the left side of the intruder signifies the presence of another wake.
Figure \ref{fig:mff_disc} f illustrates velocity ($V$) fields when the intruder is at the centre point of oscillation ($10\phi/\pi=0$). The velocity is maximum on the right side of the intruder as the particles move along with the intruder while it is moving from left to right. The velocity is minimum in the regions above and below the intruder as the particles in this region are negligibly affected by the intruder's movement. The velocity of the particles on the left side of the intruder is significantly less than that on the right side. The reason for this might be due to a mildly fluidized bed of particles as noticed in figure \ref{fig:mff_disc} a. As the intruder moves from the centre point of oscillation ($10\phi/\pi=0$) to the rightmost ($10\phi/\pi=15$), a large wake is developed to the left side of the intruder as shown in figure \ref{fig:mff_disc} b. The particles surrounding the wake try to fill it with larger velocities which are represented by a region of red to the left of the intruder(figure \ref{fig:mff_disc} g). When the intruder moves from right to left, it pushes the particles to move along with it. This can be evidenced in figure \ref{fig:mff_disc} h: the zones of red colour to the left of the intruder. Figure \ref{fig:mff_disc} i shows the velocity field when the intruder is at the leftmost point of oscillation. The particle velocities on the left side of the intruder are slightly lower because the intruder has started to move towards the right. The regions of red colour at a certain distance from the right surface of the intruder represents the particles that are trying to fill the wake that is formed between them and the intruder. As the intruder moves from left to right, the intruder pushes the particles lying to its left and hence a region of red colour is seen in figure \ref{fig:mff_disc} j ($10\phi/\pi=19$).
Figure \ref{fig:mff_disc} k shows the pressure fields around the intruder when it is at the centre position of oscillation ($10\phi/\pi=0$). As the intruder is moving towards its right, greater pressure is noticed on the particles to the right. The zones of blue colour to the left of the intruder denotes the presence of wake. As the intruder starts to move towards its left after reaching the rightmost point ($10\phi/\pi=5$) of oscillation, the pressure on the particles to its right is small (figure \ref{fig:mff_disc} l). To the left of the intruder, pressure is very less due to the presence of wake as noticed in figure \ref{fig:mff_disc} b. When the intruder reaches the centre position ($10\phi/\pi=10$) from the right, the pressure is more to the left of the intruder (figure \ref{fig:mff_disc} m) as the intruder pushes the particles to its left while it is traversing. Figure \ref{fig:mff_disc} n shows the pressure when the intruder is at the leftmost point of oscillation. Very low pressure to the right of the intruder further confirms the presence of wake. Figure \ref{fig:mff_disc} o shows a greater pressure to the right of it as the intruder is moving towards its right.
Figure \ref{fig:mff_rectangle} shows the mean flow fields around a rectangle-shaped intruder with a small base length ($4.5d$) at different positions of oscillation. The wake region behind the rectangle-shaped intruder (figure \ref{fig:mff_rectangle} b and d) is larger than the disk-one (figure \ref{fig:mff_disc} b and d). The reason for this is the rectangle has a flat surface that pushes more particles while it is oscillating horizontally whereas, the disk with a curved surface can push fewer particles. Moreover, the $y$ dimension length of the rectangle ($9.5d$) is larger than the diameter of the disk ($7.0$d). Due to the above-mentioned reasons, the regions of high velocities beside the wake are wider for the rectangle-shaped one (figures \ref{fig:mff_rectangle} g and i). The pressure fields are observed to be almost the same for both the disk-shaped and the rectangle-shaped intruders.
Figure \ref{fig:mff_triangle} shows the mean flow fields of area fraction, velocity and pressure around an equilateral triangle-shaped intruder at different positions of oscillation. The pressure fields answer the question: why the triangle-shaped intruder has mostly a negative vertical displacement. Either of the two slant faces of the intruder experience a vertical component of stress pointing downwards during its entire oscillation except when it changes its direction of motion. This can be witnessed in figures \ref{fig:mff_triangle} k, \ref{fig:mff_triangle} m and \ref{fig:mff_triangle} o. In supplementary information we have also shown the mean flow fields around a square (Figure 1 in supplementary information) and a rectangle-shaped intruder (Figure 2 in supplementary information) with a large base length ($9.5d$) at different positions of oscillation.
\subsection{\label{sec:phase angle}Cavity model}
\begin{figure}
\centering
\includegraphics[width=0.75\linewidth]{gen_shape}
\caption{ A general shape ocillating horizontally with granular particles around it.\label{fig:genshape}}
\end{figure}
We modeled the rising behaviour of the intruder by considering an arbitrary shape of the intruder and $(x,y) \in $ (collection of points on the surface). In the granular medium, its position in the $x$ direction is defined as $x_{\text{center of mass}}$= $A$ $sin (\omega t)$ (figure \ref{fig:genshape}) owing to its horizontal oscillation. Now, if the orientation of an object is considered (with no rotational motion), then we can assign the axis such that $g= -|g|\hat{y}$ where $|g|$ is the magnitude of gravity. For the intruder to rise, an additional layer of particles has to form below the intruder as a result of free-fall in the cavity formed in the wake of the intruder. To form this additional bed, the particles surrounding the intruder have to drop below a certain point or threshold termed as ``point of no return" and defined as a certain y-coordinate ($y_{nr}$), in a sense, if the particle's $y$ position is below $y_{nr}$, it becomes the part of the additional bed of particles. Therefore, the point of no return can be defined as a point on the surface of the intruder where tangent to its surface is $\pi/2$. In cases with multiple points on such surfaces, we assume that it is the lowest point on the surface because of its proximity to bottom layer. Consider an intruder placed at a position $X_0$ interacting with the particles $P_1$, $P_2$, and $P_3$ (figure \ref{fig:genshape}). As the intruder moves from $X_0$ to $X_1$ position, it may be possible that particle $P_3$ will move down, whereas the particles $P_1$ and $P_2$ move upwards. So, we can say that the “point of no return” is somewhere in between the $P_2$ and $P_3$ position. This can be defined as the minimum $y$ for which $\frac{dy}{dx}=\infty$.
Therefore, any granular particle around the intruder whose $y<y_{nr}$ will eventually settle to the bottom of the cavity. Let us also consider, the $y-$position of the top surface of the intruder as $y_0$, then, a particle situated above the intruder has to move at least ($y_{0} - y_{nr} + \frac{d}{2}$) in one-half time period `$T$' of oscillation to be a part of the additional bed at the bottom. If one were to focus on the one-half oscillations such that at $t=0$, it exists at one end of the cavity, and at $t=T/2$, it exists on the other end. When the intruder travels for time``$t$", the net-free fall into the cavity begins at``$-t$". Therefore, the total time for net free-fall is ``$2t$" or a free-fall distance of $2gt^2$. The differential number of particles that cross the point of no return before the intruder approaches $x$ at time $t$,
\begin{figure}
\centering
\includegraphics[width=0.75\linewidth]{shapes3}
\caption{The shapes $OS1$, $OS2$ and $OS5$ with the points $y_{nr}$ and $y_0$ where the particles covering this distance of ($l=y_0-y_{nr}$) will fall beneath the base of the intruder.\label{fig:shapes}}
\end{figure}
\begin{equation}
dn = \frac{(2gt^{2}-l-\frac{d}{2})4\phi}{\pi d^2} dx;
\end{equation}
\begin{equation}
dn = \frac{(2gt^{2}-l-\frac{d}{2})4\phi}{\pi d^2} \frac{2\pi A}{T} sin \big(\frac{2\pi t}{T}\big) dt;
\end{equation}
In equation 3.6, $l=y_0-y_{nr}$ is the distance the particles have to cover to fall beneath the base of the intruder, and ($2gt^2-l-d/2$) is the height of the zone of the particles that have crossed the point of no return and reached the bottom of the intruder. The first particle crosses the point of no return at $\sqrt{(l+\frac{d}{2})/2g}$, therefore, total particles reaching the bottom in one-half oscillation,
\begin{equation}
\int_{0}^{N}dn = \int_{\sqrt{\frac{l+\frac{d}{2}}{2g}}}^{T/2} \frac{(2gt^{2}-l-\frac{d}{2})4\phi}{\pi d^2} \frac{2\pi A}{T} sin \big(\frac{2\pi t}{T}\big) dt;
\end{equation}
\begin{equation}
N = \frac{4\phi 2\pi A}{\pi d^2 T} \int_{\sqrt{\frac{l+\frac{d}{2}}{2g}}}^{T/2} \big(2gt^{2}-l-\frac{d}{2}\big) sin \big(\frac{2\pi t}{T}\big) dt;
\end{equation}
Assuming $l^{'}= l+ \frac{d}{2}$ and $\Lambda$ to be the integral part,
\begin{equation}
\Lambda =\frac{T^2}{4\pi}\Bigg(\bigg(1-\frac{2}{\pi^2}\bigg)gT-\frac{2l'}{T}-\frac{2}{\pi^2}gT\cos\bigg(\frac{2\pi}{T}\sqrt\frac{l'}{2g}\bigg)-\frac{4}{\pi}g\sqrt\frac{l'}{2g}\sin\bigg(\frac{2\pi}{T}\sqrt\frac{l'}{2g}\bigg)\Bigg)
\end{equation}
If we are to assume, the particles in the cavity form a uniform layer at the bottom of cavity, then, the rate of rise $V_y$ can be given as elevation per half-oscillation and net oscillation as $N\pi (d^2/4) /(\phi 2A)$,
\begin{equation}
V_y = \frac{4\phi 2\pi A}{\pi d^2 T} \Lambda \frac{\pi d^2/4}{\frac{\phi 2 AT}{2}} ;
\end{equation}
\begin{equation}
V_y = \frac{2\pi}{T^{2}} \Lambda ;
\end{equation}
\begin{equation}
V_y = \frac{1}{2}\Bigg(\bigg(1-\frac{2}{\pi^2}\bigg)gT-\frac{2l'}{T}-\frac{2}{\pi^2} gT\cos\bigg(\frac{2\pi}{T}\sqrt\frac{l'}{2g}\bigg)-\frac{4}{\pi}g\sqrt\frac{l'}{2g}\sin\bigg(\frac{2\pi}{T}\sqrt\frac{l'}{2g}\bigg)\Bigg)
\end{equation}
This equation describes $V_y$ with respect to $T$ for a given shape (fixed $l^{'}$).
For $V_y = 0$, we get
\begin{equation}
T_{rise} = \sqrt{2l^{'}/g}
\end{equation}
\begin{equation}
V_y = \frac{gT}{2}\Bigg(\bigg(1-\frac{2}{\pi^2}\bigg)-\bigg(\frac{T_{rise}}{T}\bigg)^2-\frac{2}{\pi^2} \cos\bigg(\pi\frac{ T_{rise}}{T}\bigg)-\frac{2}{\pi}\frac{T_{rise}}{T}\sin\bigg(\pi\frac{ T_{rise}}{T}\bigg)\Bigg)
\label{eqn:fin}
\end{equation}
Additionally, $V_y$ cannot increase indefinitely with $T$ due to cavity filling up. At some $T_{max} \approx \sqrt{ \frac{8h}{g}}$
, it will start to decrease with
\begin{equation}
V_{y} \approx \frac{h-l}{T}
\end{equation}
showing an inverse relationship with timeperiod ($T$) at higher $T$ as observed in all the cases. Here, $``h"$ indicates the height of the oscillating object.
To summarise,
\begin{equation}
V_y=
\begin{cases}
\frac{gT}{2}\Bigg(\bigg(1-\frac{2}{\pi^2}\bigg)-\bigg(\frac{T_{rise}}{T}\bigg)^2-\frac{2}{\pi^2} \cos\bigg(\pi\frac{ T_{rise}}{T}\bigg)-\frac{2}{\pi}\frac{T_{rise}}{T}\sin\bigg(\pi\frac{ T_{rise}}{T}\bigg)\Bigg)
,& \text{if } T_{rise}<T<T_{max}\\
\frac{h-l}{T}, & \text{if } T>T_{max}
\end{cases}
\end{equation}
\begin{table}
\centering
\begin{tabular}{c c c c}
\rule{0pt}{0.5ex}
Shape & $l$ or $(l^{'}-d/2)$ & $T_{rising}(cavity model)$ & $T_{rising}(observed)$\\
\\
OS1 & $3.50$ & 2.82 & 2.5-3.0\\
OS2 & $6.50$ & 3.74 & 3.0-4.0\\
OS3 & $9.50$ & 4.47 & 3.0-4.0\\
OS4 & $4.50$ & 3.16 & 2.0-3.0\\
OS5 & $8.22$ & 4.17 & 4.0-5.0\\
\end{tabular}
\caption{Comparison between value of $T_{rising}$ from theoretical estimate and the numerical simulations for an oscillating amplitude $A/d=5$. \label{table:table2}}
\end{table}
From Eqn. \ref{eqn:fin}, we can say that an intruder can not sink when it is oscillated above its critical time period. The model will hold as long as the length of cavity is greater than one particle diameter, i.e., $2A>d$ or $A>d/2$, declaring $A_{min} \approx d/2$ for all the intruder which is consistent with our results. The sinking regime is induced by the fluidization of granular bed of the cavity and is more complicated to predict while taking into account the shape of the intruder. We have shown the vertical velocity by colormaping it as a function of $A$ and $T$ in figure \ref{colrmap} for all the intruder shapes.
\begin{figure}
\centering
\includegraphics[width=0.8\textwidth]{phasediagrm}
\caption{The colormap represents the rise rate $V_{y}$ of the intruder (a) disk, (b) square, (c) narrow-rectangle, (d) wide-rectangle, and (e) triangle for all the oscillated $T$ and $A$.\label{colrmap}}
\end{figure}
\section{\label{sec:conclusions} Conclusions}
In the present work, we analyzed the vertical dynamics of a horizontally oscillating intruder (various shapes considered) via a numerical simulation method. Depending on the oscillation amplitude and time-period, the intruder can rise, sink, or almost remain in its initial position.
\subsection{Vertical displacement of oscillating intruder}
The vertical displacement of the intruder is sensitive to its oscillation parameters. We found that the intruder object rises in the granular medium at a high time period and sinks when oscillated at a low time period for $A/d > 1$. However, the triangular intruder is observed to have a negligible rise even when it is oscillated at a high time period. The final vertical settling position of the intruder changes non-monotonically with the time period of oscillation.
\subsection{Rate of rise or sink of intruder with time-period}
The shape of the intruder has a significant influence on its rate of climb or sink within the granular medium. We observed a maxima and minima for the rate of rise and sink for all the intruder shapes. The rate of sink was found to be the highest for $T/\sqrt{d/g}=1$ for all the intruder shapes when oscillated at $A/d =$ 3 and 5. Among all the shapes, we found that the disk ($OS1$) has the higher rate of rise, and triangle ($OS5$) has the higher rate of sink.
\subsection{Average rate of vertical displacement of an intruder with phase angle}
The average rate of vertical displacement of the intruder varies with phase angle (Figure 7). The phase angle $\phi=0$ or $10\phi/\pi=0$ represents the centre point of oscillation when the intruder is moving from left to right, $\phi=\pi/2$ or $10\phi/\pi=5$ indicates the rightmost point of oscillation. The $V_y$ increases with $\phi$ where the intruder gradually climbs over the particles. While there is a gradual decrease in $V_y$ at certain range of phase angle which can be attributed to greater number of particles in the path of oscillating intruder providing a greater resistance and hampering the intruder's positive vertical displacement.
\subsection{Mean flow fields}
The mean flow fields are reported for different phase angles around the intruder. The velocity field around the intruder shows that flow velocity is more on one side of the oscillating direction for the different phase angles. The pressure field around each intruder is asymmetric for different phase angles due to the wake formation. The area fraction field is observed to be less on one side and more on the other side due to the wake formation either to the left side of the intruder or to the right side, depending on its direction of motion. At the same time, the area fraction in the regions above and below the intruder is nearly equal to that of the bulk.
\subsection{Cavity Model}
We developed a theoretical model to predict motion of intruders oscillating in the granular medium at a specific amplitude and time period. The model was able to identify a critical time period, below which an oscillating intruder will not rise. For all the intruder shapes, a point of no return was proposed; if the granular particle passes this point, it will enter the cavity. These particles settling in the cavity will help the intruder to climb on them and rise.
\subsection{Scope for future work}
It will be interesting to study (i) the effect of the nature of the constituent granular particles on the rise/sink dynamics of oscillating intruders, (ii) the impact of orientation for a triangular intruder on its rise or sink (iii) effect of the aspect ratio of the cylinder intruder on its vertical dynamics, and (iv) the rise and sink dynamics of horizontally oscillating intruder in a three-dimensional granular medium. \\\\
\textbf{Acknowledgement}
We thank PARAM-ISHAN, the high-performance computing facility of IITG, where the simulations were performed.\\
\textbf{Declaration of Interests:} The authors report no conflict of interest.
\bibliographystyle{jfm}
\section*{\LARGE Supplementary Information}
\end{center}
1. The link for a video showing the rise of the square $OS2$ intruder when oscillated at time period $T/\sqrt{d/g}=5$ and amplitude $A/d= 5$. Link:\href{https://drive.google.com/file/d/1ARIHfsZetvbZ2KsdxJ03V4bQ_8KgagcV/view?usp=sharing}{square rise video} \\
2. The link for a video showing the sink of the square $OS2$ intruder when oscillated at time period $T/\sqrt{d/g}=1$ and amplitude $A/d= 5$. Link: \href{https://drive.google.com/file/d/1tayN64p0lYUhUrMNFPX4s9EXAj5_TY8U/view?usp=sharing}{square sink video}\\
\begin{figure}[h]
\hspace{-0.9cm}
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p0_afract1}
\caption{}
\label{fig:y equals x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p5_afract1}
\caption{}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p10_afract1}
\caption{}
\label{fig:five over x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p15_afract1}
\caption{}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.0cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p19_afract1}
\caption{}
\label{fig:five over x}
\end{subfigure}
\hspace{-0.9cm}
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p0_velt1}
\caption{}
\label{fig:y equals x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p5_velt1}
\caption{}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p10_velt1}
\caption{}
\label{fig:five over x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p15_velt1}
\caption{}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.0cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p19_velt1}
\caption{}
\label{fig:five over x}
\end{subfigure}
\hspace{-0.9cm}
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p0_prsrt1}
\caption{$10\phi/\pi=0$}
\label{fig:y equals x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p5_prsrt1}
\caption{$10\phi/\pi=5$}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p10_prsrt1}
\caption{$10\phi/\pi=10$}
\label{fig:five over x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p15_prsrt1}
\caption{$10\phi/\pi=15$}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.0cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os2a3p19_prsrt1}
\caption{$10\phi/\pi=19$}
\label{fig:five over x}
\end{subfigure}
\caption{The time-averaged flow fields for depicting the area fraction $\Phi$, velocity $V$ and pressure $P$ around the intruder $OS2$ (square) for $T/\sqrt{d/g}=1$ and different phase angle $10\phi/\pi$ : (a), (f), (k) 0.0, (b) (g), (l) 5.0, and (c), (h), (m) 10.0, (d), (i), (n) 15.0 and (e), (j), (o) 19.0. The oscillating amplitude of the intruder is $A/d=3$.\label{fig:mff_square}}
\end{figure}
\begin{figure}
\hspace{-0.9cm}
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p0_afract1}
\caption{}
\label{fig:y equals x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p5_afract1}
\caption{}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p10_afract1}
\caption{}
\label{fig:five over x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p15_afract1}
\caption{}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.0cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p19_afract1}
\caption{}
\label{fig:five over x}
\end{subfigure}
\hspace{-0.9cm}
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p0_velt1}
\caption{}
\label{fig:y equals x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p5_velt1}
\caption{}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p10_velt1}
\caption{}
\label{fig:five over x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p15_velt1}
\caption{}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.0cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p19_velt1}
\caption{}
\label{fig:five over x}
\end{subfigure}
\hspace{-0.9cm}
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p0_prsrt1}
\caption{$10\phi/\pi=0$}
\label{fig:y equals x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p5_prsrt1}
\caption{$10\phi/\pi=5$}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p10_prsrt1}
\caption{$10\phi/\pi=10$}
\label{fig:five over x}
\end{subfigure}
\hspace{-1.1cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p15_prsrt1}
\caption{$10\phi/\pi=15$}
\label{fig:three sin x}
\end{subfigure}
\hspace{-1.0cm}
\hfill
\begin{subfigure}[b]{0.25\textwidth}
\centering
\includegraphics[width=\textwidth]{phaseflow/os4a3p19_prsrt1}
\caption{$10\phi/\pi=19$}
\label{fig:five over x}
\end{subfigure}
\caption{The time-averaged flow fields for depicting the area fraction $\Phi$, velocity $V$ and pressure $P$ around the intruder $OS4$ (rectangle with its longer dimension along the x-axis) for $T/\sqrt{d/g}=1$ and different phase angle $10\phi/\pi$ : (a), (f), (k) 0.0, (b) (g), (l) 5.0, and (c), (h), (m) 10.0, (d), (i), (n) 15.0 and (e), (j), (o) 19.0. The oscillating amplitude of the intruder is $A/d=3$.\label{fig:mff_wrectangle}}
\end{figure}
\bibliographystyle{unsrt}
\end{document} |
\section{Introduction}
In this article, we are interested in developing a multi-type analogue of Kingman's coalescent as a death chain, called a {\it replicator coalescent}, with the following interpretation. Blocks take one of $k$ different types. Mergers within blocks may take place as well as mergers of blocks with two different types. In the latter case, we will need to specify what type the two merging blocks of different type will take. To this end, let us introduce the $k\times k$ rate matrix $\bm C = (C_{i,j})$ the merger rate matrix with $C_{i,j}>0$ for all $i,j\in\{1,\cdots, k\}$. This matrix (which is not an intensity matrix) encodes the evolution of a continuous-time Markov chain, say $({\bm n}_t, t\geq 0) $, on the state space
\[
\mathbb{N}^k_* = \left\{\bm \eta \in \mathbb{N}^k_0: \sum_{i=1}^k\eta_i\geq 1\right\}=\mathbb{N}_0^k\setminus\{\bm{0}\},
\]
where $\mathbb{N}_0 = \{0,1,2, \cdots\}$, in the following way. Given that ${\bm n}(t) = (n_1 , \cdots, n_k )\in \mathbb{N}^k_*$ with $\sum_{i =1}^k n_i > 1$:
\begin{itemize}
\item For $i\in\{1,\cdots,k\}$ any two specific blocks of type $i$ will merge at rate $C_{i,i}$, and hence a total merger rate of type $i$ blocks equal to
$
C_{i,i}{n_i \choose 2}.
$
\item For $i\neq j$, both selected from $\{1,\cdots, k\}$, any block of type $i$ will merge with any block of type $j$, producing a single block of type $i$, at rate $C_{i, j}$.
\end{itemize}
The $k$ states for which $\sum_{i =1}^k n_i = 1$ are absorbing, representing the end of the process in which there is one final surviving block.
\smallskip
One may interpret $({\bm n}(t), t\geq 0) $ as a simple model for competitive interaction in a population composed of $k$ species that exhibit intra- and inter-species agression. The rate $C_{i,i}$ is the rate at which two individuals in within species $i$ fight, with one killing the other. Moreover, at rate $C_{i,j}$ individuals from species $i$ and $j$ encounter one another, resulting in a fight in which $i$ survives and $j$ is killed. In this respect, our replicator coalescent echos features of the so-called `O.K. Corral model' describing a famous 19th Century Arizona shoot-out between lawmen and outlaws; \cite{King, Vking, Vking2}.
\smallskip
The reader will note that, the rate at which within-type mergers occur is that of Kingman's coalescent. When there is only one type, and hence only within-type coalescence occurs,
the replicator coalescent is therefore nothing more than the death chain of a Kingman coalescent.
In this sense, the process $(\bm n, \mathbb{P})$ may be thought of as a multi-type variant of the Kingman death chain. Unfortunately, the specific structure of the replicator coalescent, does not permit an interpretation in terms of exchangeable partition structures as is the case for Kingman's coalescent.
\smallskip
Although the replicator coalescent lives in the space $\mathbb{N}^k_*$, we will often prefer to describe it via an
{\it $L^1$-polar decomposition}. To this end, define
\[
\sigma(t) = ||\bm n(t)||_1 = n_1(t)+\cdots+n_k(t)\in \mathbb{N}
\]
and let
\[
\bm r(t) = \arg(\bm n(t)): = \sigma(t)^{-1}\bm{n}(t)\in\mathcal{S}^k,
\]
where
\[
\mathcal{S}^{k}:=\left\{ (x_1,x_2,...,x_{k})\in\mathbb{R}^k:\sum_{i=1}^{k}x_i=1 \mbox{, } x_i\geq0 \mbox{ }\forall i\right\}
\]
is the $k$-dimensional simplex.
\smallskip
As such, we often refer to the process $\bm n$ as $(\sigma, \bm r)$. In particular, if $\bm\eta =(\eta_1,\cdots,\eta_k)\in \mathbb{N}^k_*$, then, we will use
$\mathbb{P}_{\bm\eta}$
for the law of the replicator coalescent issued from state $\bm n(0) = \bm \eta$. We think of such laws on the standard Skorokhod space $(\mathbb{D}, \mathcal{D})$, where $\mathbb{D}$ is the space of c\`adl\`ag paths from $[0,\infty)$ to $\mathbb{N}^k_*$, equivalently on $\mathbb{N}\circ\mathcal{S}^k: = \{(n,\bm x)\in \mathbb{N}\times\mathcal{S}^k: n\times \bm x\in\mathbb{N}^k_*\}$, and $\mathcal{D}$ is the Borel sigma algebra on $\mathbb{D}$ generated from the usual Skorokhod metric.
\smallskip
Our main results concern the behaviour of the replicator coalescent as it `comes down from infinity'. That is to say, we are interested in characterising the behaviour of the replicator coalescent as we start it from an initial population that is arbitrarily large, under some consistency conditions which we must check. In doing so, we will unravel a remarkable connection with the theory of evolutionary dynamical systems, described by so called {\it replicator equations}, hence our choice of the name {\it replicator coalescent}.
Before describing this connection, let us momentarily address what we mean by coming down from infinity.
\smallskip
There is no single point on the boundary of $\mathbb{N}^k_*$ that represents an appropriate `infinity' to come down from.
In this respect, there are multiple ways we could define such a notion. We opt for a wide definition, that does not necessarily enforce uniqueness. We say that the replicator coalescent comes down from infinity
if
there exists a in law on $\mathbb{P}^\infty$ on $(\mathbb{D}, \mathcal{D})$
which is consistent with $\mathbb{P}$ in the sense that,
\[
\mathbb{P}^\infty(\bm n(t+s) = \bm n)
= \sum_{\substack{\bm n'\in \mathbb{N}^k_*\\ \norm{\bm n'}_1\geq \norm{\bm n}_1}} \mathbb{P}^\infty(\bm n(t) = \bm n') \mathbb{P}_{\bm n'}(\bm n(s) = \bm n)
, \qquad s, t>0, \bm n\in \mathbb{N}^k_*,
\]
$\mathbb{P}^\infty(\sigma(t)<\infty)=1$, for all $t>0$, and $\mathbb{P}^\infty(\lim_{t\downarrow0}\sigma(t) = \infty)=1$.
In essence, $\mathbb{P}^\infty$ is an entrance law.
Through stochastic comparison to an appropriate Kingman coalescent, as well as a careful time reversal argument, we are able to establish the following general result for replicator coalescents. To give a formal statement of this, define
\[
\mathcal{S}^{k}_+:=\left\{ (x_1,x_2,...,x_{k})\in\mathbb{R}^k:\sum_{i=1}^{k}x_i=1 \mbox{, } x_i>0 \mbox{ }\forall i\right\}.
\]
\begin{theorem}\label{comingdownfrominfinity}For any sequence $(\bm \eta^N, N\geq 1)$ in $\mathbb{N}^k_*$ such that $(\norm{\bm \eta^N}_1, \arg(\bm\eta^N))\to (\infty, \bm r)$ with $ \bm r \in \mathcal{S}^k_+$,
the replicator coalescent comes down from infinity as we can take $\mathbb{P}^\infty = \lim_{N\to\infty}\mathbb{P}_{\bm \eta^N}$ on $(\mathbb{D}, \mathcal{D})$.
\end{theorem}
\smallskip
With coming down from infinity established, our remaining results address the early time (in fact instantaneous in a certain sense) behaviour of the model.
In the field of evolutionary game theory, the so-called `replicator equations' describe a population of $k$ types, with each type being described as a continuum $x_i(t)$, $t\geq0$, $i\in\{1,\cdots, k\}$, representing the proportion of the total population, so that $\sum_{i=1}^k x_i(t) = 1$, i.e. $\bm{x}\in\mathcal{S}^k$, $k$-dimensional simplex, where $\bm{x}(t) = (x_1(t),\cdots, x_k(t))$. The replicator equations satisfy the differential equation
\[
\dot x_i(t)=x_i(t)(f_i(\bm{x}(t))-\overline{f}(\bm{x}(t))), \qquad i = 1,\cdots, k,\, t\geq0,
\]
where $f_i(\bm{x}(t))$ is the fitness of type $i$ and $\overline{f}(\bm{x}(t))=\sum_{i=1}^nx_if_i(\bm{x}(t))$ is the average population fitness.
\smallskip
Fitness is often assumed to depend linearly upon the population distribution, and population types survive according to their accumulated payoff in an iterated two-player game with payoff matrix $A$. The entry $A_{i,j}$ describes the reward per unit of population of type $i$ player whose per unit of opponent is of type $j$. Then
\[f_i(\bm{x})=\sum_{j=1}^n A_{i,j}x_j.
\]
This replicator equation, henceforth referred to as the {\it $\bm A$-replicator equation} is otherwise written as
\begin{equation}\label{originalrepeq}
\dot x_i(t)=x_i(t)([{\bm A} {\bm x}(t)]_i-{\bm x}(t)^T{\bm A} {\bm x}(t)), \qquad i = 1,\cdots,k, \, t\geq0,
\end{equation}
\smallskip
If the system \eqref{originalrepeq} can be solved by a fixed point in the simplex, i.e. $x_i(t) = x^*_i$, $i = 1, \cdots, k$, for some vector ${\bm x}^* = (x^*_1, \cdots, x^*_k)\in\mathcal{S}^k$, then we see that, necessarily,
\[
[\bm{A}\bm{x}^*]_i=(\bm{x}^*)^T\bm{A}\bm{x}^* \quad i =1, \cdots, k.
\]
In turn, this implies that there is a constant, $c>0$, such that ${\bm A}{\bm x}^*=c\bm{1}$, so, ${\bm x}^*=c\bm{A}^{-1}\bm{1}$, where $\bm 1$ is the vector in $\mathbb{R}^k$ with unit entries. Since ${\bm x}^*\in\mathcal{S}^k$, it follows that $\bm{1}^T{\bm x}^*=1$, and hence $c=(\bm{1}^TA^{-1}\bm{1})^{-1}$, thus \eqref{originalrepeq} is solved by
\begin{equation}
{\bm x}^*=\dfrac{A^{-1}\bm{1}}{\bm{1}^TA^{-1}\bm{1}}.
\end{equation}
\smallskip
If ${\bm x}^*$ satisfies the relation
\[
({\bm x}^*)^T{\bm A}{\bm x} >{\bm x}^T{\bm A}{\bm x}, \qquad {\bm x}\in\mathcal{S}^k,
\]
then it is called an {\it evolutionary stable state} (ESS). Theorem 7.2.4 of \cite{HS} states that if ${\bm x}^*$ is a ESS, then
\begin{equation}
\lim_{t\to\infty}{\bm x}(t) = {\bm x}^*.
\label{ESScgce}
\end{equation}
\smallskip
The following results give us a remarkable connection between the theory of replicator equations and our coalescent model. To this end we will always take
\begin{equation}
A_{i,j} = -\left(C_{ji} \mathbf{1}_{j\neq i} + \frac{1}{2} C_{i,i}\right).
\label{A}
\end{equation}
Thanks to some standard theory and the assumed properties of the matrix $\bm C$, this offers us the existence of an ESS.
\begin{lemma}\label{ESSlem}
The $\bm A$-replicator equation has an ESS $\bm x^*\in\mathcal{S}^k_+$
\end{lemma}
Let us now state the connection between the notion of coming down from infinity for the replicator coalescent and the ESS $\bm x^*$.
\begin{theorem}\label{prereplicator} For a sequence $(\bm \eta^N, N\geq 1)$ in $\mathbb{N}^k_*$ such that $(\norm{\bm \eta^N}_1, \arg(\bm\eta^N))\to (\infty, \bm r)$ with $ \bm r \in \mathcal{S}^k_+$, let $\bm R(t) = \bm r(\tau(t))$, $t\geq0$ where
\[
\tau(t)
= \inf\{s>0: \int_0^s \sigma(u){\rm d} u>t\}, \qquad t\geq 0.
\]
Suppose $\bm x(t) = (x_1(t), \cdots, x_k(t))$ solves the corresponding $\bm A$-replicator equation, then
\[
\lim_{N\to\infty}\mathbb{E}_{{\bm \eta}^N}[| R_i(t)- x_i(t)|]=0,\qquad i =1,\cdots, k,
\]
and in particular,
\[
\lim_{t\uparrow\infty}\lim_{N\to\infty}\mathbb{E}_{{\bm \eta}^N}[| R_i(t)- x_i^*|]=0,\qquad i =1,\cdots, k.
\]
\end{theorem}
In words, Theorem \ref{prereplicator} says that, by dilating time arbitrarily close to zero, as the replicator coalescent comes down from infinity, its projection $\bm r$ in the simplex behaves deterministically like the solution to an $\bm A$-replicator equation.
\begin{theorem}\label{postreplicator}For any sequence $(\bm \eta^N, N\geq 1)$ in $\mathbb{N}^k_*$ such that $(\norm{\bm \eta^N}_1, \arg(\bm\eta^N))\to (\infty, \bm r)$ and $ \bm r \in \mathcal{S}^k_+$
and for $i =1,\cdots, k$,
\[
\lim_{m\to\infty} \lim_{N\to\infty}\mathbb{E}_{{\bm \eta}^N}[| r_i(\gamma_m)-\bm x_i^*|]=0,\qquad i =1,\cdots, k,
\]
where
\[
\gamma_m=\inf\{t>0: \sigma(t) = m\}\qquad m\in\mathbb{N}.
\]
\end{theorem}
\begin{figure}[h!]
\label{fig}
\begin{center}
\includegraphics[width=8cm, angle=90, trim=20 40 120 40, clip=true]{prism.pdf}
\end{center}
\caption{\it Simulations of a replicator coalescent with $k = 3$ initiated from a variety of initial states with an initial number of blocks $\sigma (0)=10^{15}$. Each path represents a simulation from a different initial state, presented in barycentric coordinates in the 3-simplex and a logarithmic axis for the total number of blocks. The matrix $A$ is circulant with entries $A_{i,i}=A_{i,i+1}=1$ and other entries zero. }
\end{figure}
In contrast to Theorem \ref{prereplicator}, Theorem \ref{postreplicator} shows that, moving backwards through time, towards the instantaneous event at which the replicator coalescent comes down from infinity at the origin of time, the process $\bm r$ necessarily approaches the ESS $\bm x^*$. As such, working backwards in time, the replicator coalescent never gets to see the `initial state' $(\infty, \bm r)$, from which $\mathbb{P}^\infty$ is constructed in Theorem \ref{comingdownfrominfinity}.
\smallskip
Put together Theorems \ref{prereplicator} and \ref{postreplicator} show that $\bm x^*$ is a `bottleneck' for the replicator coalescent. Figure \ref{fig} simulates an example where $k = 3$, in which the bottleneck phenomenon can clearly be seen.
\smallskip
The remainder of this paper is structured as follows. In the next section, we discuss how we can compare the process $(\sigma(t), t\geq0)$ with Kingman's coalescent on the same probability space, when it is issued from a finite number of blocks. This comparison is used frequently in several of our proofs. In Section \ref{proof1}, we provide the proof of Theorem \ref{comingdownfrominfinity}. Our approach appeals to Hunt-Nagasawa time duality theory and we build a time-reversed dual process to $\bm n$ and show that it explodes in an almost surely finite time. In Section \ref{smgsect} we treat the Markov process $\bm n$ as a semimartingale and study its decomposition as the sum of a martingale and a bounded variation compensator. This provides the basis for the proofs of Theorem \ref{prereplicator} and \ref{postreplicator}, which are given in Section \ref{prepostproofs}.
\section{Stochastic comparison with Kingman's coalescent}
As alluded to above, there are various points in our reasoning where we will compare the number of blocks in a replicator coalescent with the number of blocks in an appropriately formulated Kingman coalescent on the same probability space.
The first such result is below, in which the basic idea of the stochastic comparison is laid out.
\begin{lemma}\label{hitfromabove} Define
\[
\gamma_{m}=\inf\{t>0: \sigma(t)=m\},
\qquad m\in \mathbb{N}.
\]
For any sequence $(\bm \eta^N, N\geq 1)$ in $\mathbb{N}^k_*$ such that $(\norm{\bm \eta^N}_1, \arg(\bm\eta^N))\to (\infty, \bm r)$ and $ \bm r \in \mathcal{S}^k_+$,
\[
\lim_{\theta\to0}\lim_{N\to\infty}\mathbb{E}_{{\bm \eta}^N}[{\rm e}^{-\theta\gamma_m} ]=1\,\,\text{ and }\,\,
\lim_{m\to\infty}\lim_{N\to\infty}\mathbb{E}_{{\bm \eta}^N}[{\rm e}^{-\theta\gamma_m} ]=1.
\]
\end{lemma}
\begin{proof}
The process $\sigma$ decrements by one with each block merger, analogously to the block counting process of a standard Kingman coalescent. It is therefore sufficient to prove that $\sigma$ decreases at least as fast as a Kingman block counting process. From finite starting states, we can construct such a Kingman coalescent $\nu$ on the same space as $\sigma$ with that $\sigma\leq \nu$ by considering the minimal rate of $\sigma$.
\smallskip
The total rate of mergers in state $\bm{n}$ is given by
\begin{align}\label{rates}
\lambda(\bm{n})=\sum_{i=1}^k\left(\sum_{j\neq i}C_{ji}n_{j}n_i +\frac{C_{i,i}}{2}n_i^2 - \frac{C_{i,i}}{2} n_i\right)\,,
\end{align}
which depends not just on the total number of blocks, but also on the distribution of block types. However, since $C_{i,j}>0$ for all $i,j$,
we can choose a constant $0<C< \underline{C}:=\min_{i,j}C_{i,j}$ such that
\[
\lambda(\bm{n})> C{\norm{\bm n}_1 \choose 2} - \sum_{i=1}^k \frac{(C_{i,i}-\underline{C})}{2}n_i> C{\norm{\bm n}_1 \choose 2} - \frac{(\overline{C}-\underline{C})}{2}\norm{\bm n}_1,
\]
where $\overline{C} = \max_{i}C_{i,i}$. For each $\varepsilon>0$, we can therefore choose $N_\varepsilon>0$ such that, for all $\norm{\bm n}_1>N_\varepsilon$,
\[
\lambda(\bm{n})>(1-\varepsilon)C{\norm{\bm n}_1 \choose 2}.
\]
It follows that we can stochastically embed a Kingman death chain $(\nu(t), t\geq0)$ and the process $({\bm n}(t), t\geq 0)$ on the same space such that, for any ${\bm \eta} = (\sigma(0),\arg({\bm n}(0)))$ such that $\sigma(0)>m>N_\varepsilon$,
\[
\mathbb{E}_{\bm \eta}[{\rm e}^{-\theta\gamma_m} ]\geq \mathbb{E}[{\rm e}^{-\theta\beta_m}| \nu(0) = \sigma(0)], \qquad \theta\geq0,
\]
where
\[
\beta_{m}=\inf\{t>0:\nu(t)=m\}.
\qquad m\in \mathbb{N}.
\]
Now
suppose that the sequence $(\bm \eta^N, N\geq 1)$ in $\mathbb{N}^k_*$ such that $(\norm{\bm \eta^N}_1, \arg(\bm\eta^N))\to (\infty, \bm r)$ and $ \bm r \in \mathcal{S}^k_+$. Appealing to the skip free nature of the process $(\sigma(t), t\geq 0)$ and $(\nu(t), t\geq0)$, we see tha
\begin{equation}
\lim_{\theta\to0}\lim_{N\to\infty}\mathbb{E}_{{\bm \eta}^N}[{\rm e}^{-\theta\gamma_m} ]\geq \lim_{\theta\to0}\lim_{N\to\infty}\mathbb{E}\left[\left.{\rm e}^{-\theta\beta_m}\right| \nu(0) = \norm{\bm \eta^N}_1\right]=1,
\label{nontrivl}
\end{equation}
and similarly
\begin{equation}
\lim_{m\to\infty}\lim_{N\to\infty}\mathbb{E}_{{\bm \eta}^N}[{\rm e}^{-\theta\gamma_m} ]\geq \lim_{m\to\infty}\lim_{N\to\infty}\mathbb{E}\left[\left.{\rm e}^{-\theta\beta_m}\right| \nu(0) = \norm{\bm \eta^N}_1\right]=1,
\label{mtoinfty}
\end{equation}
thus completing the proof.
\end{proof}
\section{Proof of Theorem \ref{comingdownfrominfinity}}\label{proof1}
The computations in Lemma \ref{hitfromabove} do not show the {\it existence} of a stochastic process which comes down from infinity, irrespective of the fact that we can bound $\sigma$ by a Kingman coalescent on the same probability space for all finite points of issue.
\smallskip
To construct a process coming down from infinity, we want to introduce a {\it dual} process, which we will refer to as $(\hat{\bm n}(t), t\geq 0)$, with probabilities $\hat{\mathbb{P}}:= (\hat{\mathbb{P}}_{\bm\eta}, {\bm\eta}\in \mathbb{N}^k_*)$. Suppose we introduce a partial ordering so that, for $\bm n, \bm n'\in \mathbb{N}^k_*$, we write $\bm n\prec \bm n'$ if $\norm{\bm n'}_1 = \norm{\bm n}_1 + 1$. Moreover for $\bm n, \bm n' \in \mathbb{N}^k_*$ with $\bm n\prec \bm n'$, let us denote by $q_{\bm n', \bm n}$ and $\hat{q}_{\bm n, \bm n'}$ the Markov transition rates of the process $(\bm n(t), t\geq 0)$ and $(\hat{\bm n}(t), t\geq 0)$, respectively.
\smallskip
As always, $(\bm \eta^N, N\geq 1)$ is a sequence in $\mathbb{N}^k_*$ such that $(\norm{\bm \eta^N}_1, \arg(\bm\eta^N))\to (\infty, \bm r)$ and $ \bm r \in \mathcal{S}^k_+$.
We would like to work with the terminal distribution
on ${\bm n}\in \mathbb{N}^k_*$
\[
{\bm\mu}_m({\bm n}) =\lim_{N\to\infty}\mathbb{P}_{{\bm \eta}^N}({\bm n}(\gamma_m) = \bm n) = \lim_{N\to\infty}{P}_{{\bm \eta}^N}(T(\bm n)<\infty) , \qquad \norm{\bm n}_1 = m\in\mathbb{N}.
\]
with $\sum_{\norm{\bm n}_1 = m }{\bm\mu}_m(\bm n)=1$, where
\begin{equation}
T({\bm n}) = \inf\{t>0: {\bm n}(t) = \bm n\}, \qquad \bm n\in \mathbb{N}^k_*.
\label{Tn}
\end{equation}
In order to justify the existence of this limit, we recall from Lemma \ref{hitfromabove} that
\begin{equation}
\lim_{N\to\infty}{P}_{{\bm \eta}^N}(\gamma_n<\infty)=1.
\label{gammamcgce}
\end{equation}
In addition, since the transition rates of the Markov process $(1/\sigma, \bm r)$ are the same for each $\bm \eta^N$, Theorem 1 in \cite{Karr} tells us that the process $(1/\sigma , \bm r)$ converges weakly as $N\to 0$. The weak convergence of $\bm r(\gamma_m)$ follows by the aforesaid, \eqref{gammamcgce} and the continuity of composition with respect to the Skorokhod topology; cf. \cite{Whitt}.
\smallskip
Now fix $m\in\mathbb{N}$ and define
\begin{equation}
{h}({\bm n}) = \mathbb{E}_{{\bm \mu}_m}\left[\int_0^\infty \mathbf{1}_{({\bm n}(t) = {\bm n})}{\rm d} t\right] = \mu_{\norm{\bm n}_1}(\bm n)/{q}_{\bm n},\qquad \norm{\bm n}_1\leq m,
\label{hath}
\end{equation}
where ${q}_{\bm n} = \sum_{\bm n\prec \bm n'}{q}_{\bm n, \bm n'}$ is the holding rate in state $\bm n$ of $({\bm n}(t), t\geq0)$ and the second equality holds by the Markov property. Note, in particular, we see that $h$ does not depend on $m\in\mathbb{N}$.
\smallskip
We can now define the process $(\hat{\bm n}(t), t\geq0)$ via
\begin{equation}
\hat{q}_{\bm n, \bm n'} = \frac{{h}(\bm n')}{{h}(\bm n)}q_{\bm n', \bm n}, \qquad \bm n\prec \bm n'.
\label{qdef}
\end{equation}
It is interesting to note for later that, on the one hand, from \eqref{qdef},
\begin{equation}
\hat{q}_{\bm n} = \frac{1}{{h}(\bm n)}\sum_{\bm n\prec \bm n'} {h}(\bm n') {q}_{\bm n', \bm n}, \qquad \bm n\in\mathbb{N}^k_*.
\label{onehand}
\end{equation}
On the other hand, by the Markov property
\[
\mu_{\norm{\bm n}_1}(\bm n)= \sum_{\bm n\prec \bm n'} \mu_{\norm{\bm n'}_1}(\bm n') \frac{{q}_{\bm n',\bm n}}{{q}_{\bm n'}}
\qquad \bm n\in \mathbb{N}^k_*
\]
so that, from \eqref{hath},
\begin{equation}
h(\bm n) = \sum_{\bm n\prec \bm n'}{h}(\bm n') \frac{ {q}_{\bm n',\bm n}}{q_{\bm n}} \qquad \bm n\in \mathbb{N}^k_*.
\label{otherhand}
\end{equation}
Comparing \eqref{onehand} with \eqref{otherhand}, we see that
\begin{equation}q_{\bm n} = \hat{q}_{\bm n},\qquad \bm n \in \mathbb{N}^k_*.
\label{theqs}
\end{equation}
According to Theorem 3.5 \cite{Nagasawa} (see also \cite{Hunt}), for any last exit time, say ${\mathtt{k}}$,
\begin{equation}
({\bm n}((t-{\mathtt{k}})-),0< t<{\mathtt{k}}) \text{ under } {\mathbb{P}}_{{\bm\mu}_m}
\label{timereversal}
\end{equation}
has transitions which agree with those of \eqref{qdef}, that is to say, of $(\hat{\bm n}(t), t\geq0)$ under $\hat{\mathbb{P}}$. Note, there are some additional criteria which are needed to verify for the conclusion of Theorem 3.5 \cite{Nagasawa} to hold, however they are trivial in the current setting.
We additionally note that the choice of $m\in\mathbb{N}$ is not important because of the consistency in the definition of $h$. A good example of a natural choice of $\mathtt{k}$ is $\gamma_1$.
\smallskip
The same theory of time reversal in \cite{Nagasawa} also gives us a converse relationship. If we define
\begin{equation}
\hat{h}({\bm n}) = \hat{\mathbb{E}}_{{\bm\mu}_1}\left[\int_0^\infty \mathbf{1}_{(\hat{\bm n}(t) = {\bm n})}{\rm d} t\right] = \hat{\mathbb{P}}_{{\bm\mu}_1}(\hat{T}(\bm n)<\infty)/q_{\bm n}, \qquad \norm{\bm n}_1\leq m,
\label{h}
\end{equation}
where $\hat{q}_{\bm n}$ is defined in the same way as $\hat{q}_{\bm n}$ as the off-diagonal row sum and $\hat{T}(\bm n)$ is defined in the same way as \eqref{Tn}. From the time reversal \eqref{timereversal} and the equality \eqref{theqs}, it becomes apparent that $h(\bm n) = \hat{h}(\bm n)$, $\norm{\bm{n}}_1\leq m$.
We may again invoke Theorem 3.5 in \cite{Nagasawa} and conclude that for each fixed $m\in\mathbb{N}$, and for any last exit time, say $\hat{\mathtt{k}}$,
\begin{equation}
(\hat{\bm n}((t-\hat{\mathtt{k}})-),0< t<\hat{\mathtt{k}}) \text{ under } \hat{\mathbb{P}}_{{\bm\mu}_1}
\label{timereversal2}
\end{equation}
has transitions which agree with those of $({\bm n}(t), 0\leq t\leq{\gamma}_1)$.
Comparing the two time-reversal statements \eqref{timereversal} and \eqref{timereversal2}, the last exit times
\[
\hat{\gamma}_m = \sup\{t>0: \norm{\hat{\bm n}(t)}_1 = m \}, \qquad m\in \mathbb{N},
\]
(with the usual definition $\sup\emptyset = 0$), which are in fact a first passage times because of the monotonicity of $(\norm{\hat{\bm n}(t)}_1, t\geq0)$, are such that
\[
\hat{\mathbb{P}}_{\bm\mu_1}(\hat{\bm n}(\hat{\gamma}_m) = \bm n) = {\bm\mu}_{m}(\bm n), \qquad m\in \mathbb{N}, \norm{\bm n}_1 = m.
\]
From \eqref{nontrivl} and \eqref{mtoinfty}, we now see, with the help of monotonicity,
\[
\hat\zeta := \inf\{t>0 : \norm{\hat{\bm n}(t)}_1 = \infty\}
=\lim_{m\to\infty}\hat{\gamma}_m
\]
is $\hat{\mathbb{P}}_{\bm\mu_1}$-almost surely finite. Indeed,
from \eqref{mtoinfty} and the Markov property, we have that
\begin{align}
\lim_{\theta\to0}\lim_{m\to\infty}\mathbb{E}_{\bm\mu_m}\left[{\rm e}^{-\theta\gamma_1}\right] &=
\lim_{\theta\to0}\lim_{m\to\infty}\lim_{N\to\infty}\int_{\norm{\bm n}_1 = m} \mathbb{P}_{{\bm\eta}^N}({\bm n}(\gamma_m) = \bm n)\mathbb{E}_{\bm n}\left[{\rm e}^{-\theta\gamma_1}\right] \notag\\
&=
\lim_{\theta\to0}\lim_{N\to\infty}\mathbb{E}_{{\bm \eta}^N}[{\rm e}^{-\theta\gamma_1} ] = 1.
\end{align}
It follows that
\[
\lim_{\theta\to0} \hat{\mathbb{E}}_{{\bm\mu}_1}\left[{\rm e}^{-\theta \hat{\zeta}}\right] =
\lim_{\theta\to0}\lim_{m\to\infty} \hat{\mathbb{E}}_{{\bm\mu}_1}\left[{\rm e}^{-\theta \hat{\gamma}_m}\right] = \lim_{\theta\to0}\lim_{m\to\infty}\mathbb{E}_{{\bm\mu}_m}\left[{\rm e}^{-\theta {\gamma}_1}\right] =1.
\]
\smallskip
In conclusion the process $(\hat{\bm n}(t),t\geq 0)$ under $\hat{\mathbb{P}}_{\bm\mu_1}$ explodes in an almost surely finite time. Since it is dual to $(\bm n(t), 0\leq t\leq \gamma_1)$ under $\mathbb{P}$, in the sense of time reversal, it follows that the latter can be constructed as coming `down from infinity'. \hfill$\square$
\bigskip
\begin{remark}\rm
It is tempting to say that, in fact, the above proof constructs the process `coming down' from the boundary point $(\infty, {\bm r})$, written in $L^1$-polar coordinates, in $\partial\mathbb{N}^k_*$.
Reflecting on Theorem \ref{postreplicator}, which we have yet to prove, `coming down' from the boundary point $(\infty, {\bm r})$ does not make immediate sense. What is remarkable about the existence of the ESS $\bm x^*$ as a bottleneck is that, despite the construction of the function $h$, and hence the time reversed process, $\hat{\bm n}$, in the above proof, there is no real dependence on the limiting sequence $(\bm \eta^N, N\geq 1)$ other than $\bm r = \lim_{N\to\infty}\arg(\bm \eta^N)$ does not converge to a boundary point of the simplex where $r_i = 0$ for some $i = 1,\cdots, k$. Indeed, Theorem \ref{postreplicator}
shows us that, irrespective of the boundary point $(\infty, {\bm r})$ used in the proof of Theorem \ref{prereplicator},
\[
\lim_{m\to\infty} \hat{\mathbb{P}}_{\bm\mu_1}(\hat{\bm n}(\hat{\gamma}_m)/N = \bm r) =\lim_{m\to\infty}
\lim_{N\to\infty}\mathbb{P}_{\bm \eta^N}(\bm r(\gamma_m) = \bm r) =
\left\{
\begin{array}{ll}
1 & \text{ if } \bm r = \bm x^*\\
0 & \text{ otherwise. }
\end{array}
\right.
\]
\end{remark}
\section{Semimartingale representation}\label{smgsect}
We would like to treat the replicator coalescent $(\bm n(t), t\geq0)$ as a semimartingale. It turns out to be more convenient to consider instead the vectorial process
\[
\bm y(t)=\begin{pmatrix}\bm r(t\wedge \gamma_1)\\\\ {1}/{\sigma(t\wedge \gamma_1)}\end{pmatrix},\qquad t\geq 0,
\]
where
\[
\gamma_1 = \inf\{t>0: \sigma(t) = 1\}.
\]
Naturally, by expressing the evolution of $(\bm y(t), t\geq0)$ as a that of a semimartingale our interest is predominantly in the process $(\bm r(t), t\geq0)$ so as to make a link with the replicator equations in \eqref{originalrepeq}.
\smallskip
\begin{lemma}\label{2} For each $\bm\eta\in\mathbb{N}^k_*$,
the process $\bm y$ under $\mathbb{P}_{\bm\eta}$ has a semimartingale decomposition
\begin{equation}
\bm y(t) = \bm y(0)+ \bm m(t) + \bm \alpha(t), \qquad t\geq0
\label{ysemimg}
\end{equation}
where $(\bm m(t), t\geq0)$ is a martingale taking the form
\[
\bm m(t) = \sum_{s\leq t\wedge \gamma_1}\Delta \bm y(s) - \bm\alpha(t), \qquad t\geq0,
\] such that
$
\Delta\bm y(t) =\bm y(t)- \bm y(t-)
$
and $(\bm \alpha(t), t\geq0)$ is a compensator taking the form
\begin{equation}
\bm\alpha(t) =\int_{0}^{t\wedge \gamma_1 } \frac{\sigma(s)}{\sigma(s)-1}\sum_{i = 1}^k \begin{pmatrix} \sigma(s)({\bm r} (s)-\bm{e_i}) \\ \\ 1\end{pmatrix}r_i(s) [\sigma(s)^{-1} {\rm diag}(\bm A)\bm{1}-\bm A\bm r(s) ]_i \,{\rm d} s.
\label{da}
\end{equation}
\end{lemma}
\begin{proof}
A standard computation using the compensation formula tells us that
$\bm m$ is a martingale providing $\sum_{s\leq t}\norm{\Delta \bm y(s)}_1$ has finite expectation for each $t\geq 0$, which is equivalent to the existence of the compensator $\bm \alpha(t)$. The latter is given by the rates that define the replicator coalescent. More precisely, recalling the definition of the matrix $\bm A$ in \eqref{A},
\begin{align}
\bm\alpha(t)
&=\int_{0}^{t\wedge \gamma_1}\sum_{i=1}^k\begin{pmatrix}\dfrac{\bm{n(s)}-\bm{e_i}}{\sigma(s)-1}-\dfrac{\bm{n(s)}}{\sigma(s)}\\ \\ \dfrac{1}{\sigma(s)-1}-\dfrac{1}{\sigma(s)}\end{pmatrix}\Bigg[ \sum_{\substack{j=1 \\ j\neq i}}^kn_j(s)n_i(s)C_{ji}+\frac{1}{2}n_i(s)(n_i(s)-1)C_{i,i}\Bigg] {\rm d} s\notag\\
&=\int_{0}^{t\wedge \gamma_1}\sum_{i=1}^k\begin{pmatrix}\dfrac{\bm{n(s)}-\bm{e_i}\sigma(s)}{(\sigma(s)-1)\sigma(s)}\\\\ \dfrac{1}{(\sigma(s)-1)\sigma(s)}\end{pmatrix}\Bigg[ \sum_{\substack{j=1 }}^kn_i(s)A_{i,i}-n_j(s)n_i(s)A_{i,j} \Bigg] {\rm d} s\notag\\
&=\int_{0}^{t\wedge \gamma_1} \dfrac{\sigma(s)}{\sigma(s)-1}\sum_{i = 1}^k \begin{pmatrix} \sigma(s)(\bm r (s)-\bm{e_i}) \\ \\1\end{pmatrix}r_i(s) [\sigma(s)^{-1} {\rm diag}(\bm A)\bm{1}-\bm A\bm r(s) ]_i \,{\rm d} s,
\label{deriveda}
\end{align}
as required. Note, if we identify the compensator via the density $(\bm\lambda(t), t\geq0)$, where
\begin{equation}
\bm\alpha(t) = :\int_0^{t\wedge \gamma_1} \bm\lambda(s){\rm d} s
\label{lambda}
\end{equation}
then, in the above representation of $\bm\alpha$, the largest term is of order $\sigma(s)$, which, because the process $\bm n$ is non-increasing, we can easily conclude that, for all $\bm\eta\in\mathbb{N}^k_*$ and any time $t\geq 0$,
\begin{equation}
\mathbb{E}_{\bm \eta}\left[ \sum_{s\leq t \wedge \gamma_1}\norm{\Delta\bm y(s)}_1\right]\leq
\mathbb{E}_{\bm \eta}\left[\int_0^{t\wedge \gamma_1} \norm{\bm\lambda (s)}_1 {\rm d} s\right]\leq C\norm{\bm\eta}_1 \mathbb{E}_{\bm \eta}[t\wedge \gamma_1]\leq C\norm{\bm\eta}_1t,
\label{mgcontrol}
\end{equation}
for an unimportant constant $C>0$. This
ensures that $\bm m$ is a martingale and that $\bm\alpha$ is well defined.
\end{proof}
For the proof of Theorems \ref{prereplicator}, we are interested in the behaviour of the process $\bm r$ under $\mathbb{P}_{\bm\eta}$ for any $\bm\eta$ such that $\norm{\bm\eta}_1\to\infty$ and $\arg(\bm\eta)\to\bm r$ for some $\bm r\in\mathcal{S}^k_+$. Heuristically speaking, the term $\sigma(s)({\bm r} (s)-\bm{e_i})$ in the expression for $\bm\alpha$ suggests that $\alpha(t)$ explodes for as $t\to 0$. The undesirable factor $\sigma(s)$ can be removed however by an appropriate time change and in doing so, we begin to see where the relationship with the replicator equations emerges.
\begin{lemma}
\label{3} Suppose we define the sequence of stopping times $(\tau(t),
t\geq 0)$, which are defined by the right inverse,
\begin{equation}
\tau(t)
= \inf\{u>0: \int_0^u \sigma(s){\rm d} s>t\}, \qquad t\geq 0
\label{taudef}
\end{equation}
Then
$\bm y^\tau: = \bm y\circ\tau$ has semimartingale decomposition
$\bm y^\tau = \bm m^\tau + \bm\alpha^\tau $, where $ \bm m^\tau:= \bm m \circ \tau$ is a martingale and, for
$t\geq0$,
\begin{align}
\bm\alpha^\tau(t)
&=\int_{0}^{t \wedge \tau^{-1}(\gamma_1)} \dfrac{\sigma(\tau(s))}{\sigma(\tau(s))-1}\notag\\
&\hspace{2cm}\sum_{i = 1}^k \begin{pmatrix} \bm r (\tau(s))-\bm{e_i} \\ \\\dfrac{1}{\sigma(\tau(s))}\end{pmatrix} r_i(\tau(s)) [ \sigma(\tau(s))^{-1} {\rm diag}(\bm A)\bm{1}- \bm A\bm r(\tau(s)) ]_i \,{\rm d} s
\label{alphatau}
\end{align}
\end{lemma}
\begin{proof}
We use basic Steitjes calculus to tell us that
\begin{equation*}
{\rm d} \bm\alpha^\tau(t) = {\rm d} \bm\alpha(s)|_{s = \tau(t)}{\rm d} \tau(t).
\end{equation*}
Moreover,
\begin{equation}
\int_0^{\tau(t)} \sigma(s){\rm d} s = t \,\,\,\text{ and hence } \,\,\, \sigma(\tau(t)){\rm d} \tau(t) = {\rm d} t
\label{dt}.
\end{equation}
Combining these observations with the conclusion of Lemma \ref{2} the result follows.
In particular, from \eqref{lambda},
\[
\int_0^{\tau(t)\wedge \gamma_1} \bm\lambda(s){\rm d} s = \int_0^{t \wedge\tau^{-1}(\gamma_1)} \frac{\bm\lambda(\tau (u))}{\sigma(\tau(u))}{\rm d} u.
\]
Technically, we need to verify that $\bm m^\tau$ is a martingale rather than a local martingale, however a computation similar to \eqref{mgcontrol} taking advantage of \eqref{alphatau} is easily executed affirming the required martingale status.
\end{proof}
Next we look at how controllable the martingale components in the above to semimartingale decompositions are. We consider their second moment behaviour.
\begin{lemma}\label{2upper}
For each $\bm\eta \in\mathbb{N}^k_*$, the martingale $\bm m^\tau$ under $\mathbb{P}_{\bm \eta}$ satisfies
\[
\mathbb{E}_{\bm \eta}\left[\norm{\bm m^\tau(t)}^2_2\right] \leq C\mathbb{E}_{\bm\eta}\left[ \int_0^{\tau(t ) \wedge\gamma_1}\frac{\sigma(s)}{(\sigma(s)-1)^2} {\rm d} s\right] , \qquad t\geq0.
\]
\end{lemma}
\begin{proof}
Steiltjes calculus, or equivalently general semi-martingale calculus, tells us that, since $\bm m$ has bounded variation,
\begin{align*}
\norm{\bm m (t)}^2_2 =2\int_0^{t\wedge \gamma_1} \bm m(s-)\cdot{\rm d}\bm m(s) + \sum_{0<s\leq t \wedge \gamma_1}\Delta
\norm{\bm m (s)}_2^2 .
\end{align*}
As all vector entries are bounded, it is easy to show that
$\textstyle\int_0^{t\wedge \gamma_1} \bm m(s-)\cdot{\rm d}\bm m(s)$, $t\geq0$, is a martingale.
\smallskip
Let us now show that there exists an adapted increasing bounded variation process, say $\bm\beta$, which is the compensator of $ \sum_{s\leq t }\Delta \norm{\bm m (s)}_2^2$, $t\geq0$ so that
\[
\norm{\bm m (t)}_2^2 -\bm\beta(t), t\geq 0
\]
is a martingale with initial value $\norm{ \bm m (0+)}^2_2$.
Noting that $\Delta \norm{\bm m (t)}_2^2 = \Delta \norm{\bm y (t)}_2^2$ we have, on the event that $t$ is a time at which the number of blocks of type $i$ decreases,
\begin{align*}
\Delta \norm{\bm y (t)}_2^2
&= \left(
\frac{(\bm{r}(t)-\bm{e_i})\cdot(\bm{r}(t)-\bm{e_i})}{(\sigma(t)-1)^2} + \frac{1}{(\sigma(t)-1)^2}
\right) \notag\\
&\hspace{4cm}- \left(\frac{\bm{r}(t)\cdot \bm{r}(t)}{\sigma(t)^2} + \frac{1}{\sigma(t)^2}\right)\notag\\
&=\frac{
2\sigma(t)\bm{r}(t)\cdot \bm{r}(t)+ 2 \sigma(t) -1 - 2\sigma(t)^2 \bm{r}(t)\cdot \bm{e_i}
}{\sigma(t)^2(\sigma(t)-1 )^2}\notag\\
&=: \bm\gamma_i(t).
\end{align*}
Appealing to \eqref{dt}, a calculation in the spirit of \eqref{deriveda} gives us
\begin{align*}
\bm \beta(t) &=\int_0^{t \wedge \gamma_1}\sum_{i=1}^k \gamma_i(s)\left[ \sum_{j\neq i}n_j(s)n_i(s)C_{i,j}+\frac{1}{2}n_i(s)(n_i(s)-1)C_{i,i}\right] {\rm d} s\\
& \leq 4 \int_0^{t \wedge \gamma_1} \frac{\sigma(s)}{(\sigma(s)-1)^2} \left[ \sum_{i=1}^k\sum_{j=1}^kr_j(s)r_i(s)C_{i,j}
\right] {\rm d} s\\
&\leq C \int_0^{t\wedge \gamma_1}\frac{\sigma(s)}{(\sigma(s)-1)^2} {\rm d} s,
\end{align*}
for some $C>0$,
where we have used that \[
\sigma(t)^2 = (n_1(t) +\cdots+n_k(t))^2\geq \bm{n}(t)\cdot \bm{n}(t)
\]
and hence $ \bm{r}(t)\cdot \bm{r}(t)\leq 1 $.
Taking expectation gives the desired inequality.
\end{proof}
As the reader may now expect, our ultimate objective is to show that for any sequence of starting initial configurations $\bm \eta^N\in \mathbb{N}^k_*$ such that $\norm{\bm \eta^N}_1\to\infty$ as $N\to\infty$ and $\arg(\bm \eta^N)\to \bm r\in \mathcal{S}^k_+$, the martingale component $\bm m^\tau$ disappears. This tells us that the behaviour of $(\bm r(t), t\geq0)$ behaves increasingly like the compensator term, which is further key to controlling its behaviour. To this end, we conclude this section with two more results that provide us with the desired control of the aforesaid martingale component.
\begin{lemma}\label{cor1} For any sequence $(\bm \eta^N, N\geq 1)$ in $\mathbb{N}^k_*$ such that $(\norm{\bm \eta^N}_1, \arg(\bm\eta^N))\to (\infty, \bm r)$ and $ \bm r \in \mathcal{S}^k_+$,
\[
\tau^{-1}(t) = \int^{t}_0 \sigma(s){\rm d} s \to \infty, \, \, \tau(t)\to 0,\, \, \text{ and }\,\, |\tau(t)\wedge \gamma_1-\tau(t)|\to0,
\]
weakly as $N\to\infty$, for any $t\geq0$.
\end{lemma}
\begin{proof}
In the spirit of the comparison with an auxiliary Kingman coalescent in Lemma \ref{hitfromabove}, using the notation from there,
we note from \eqref{rates} that there exists a constant $C$ such that
\[
\lambda(\bm n)=\sum_{i=1}^k\left(\sum_{j\neq i}C_{ji}n_{j}n_i +\frac{C_{i,i}}{2}n_i^2 - \frac{C_{i,i}}{2} n_i\right)
\leq C{\norm{\bm n}_1\choose 2}.
\]
This shows that there is a death chain $(\nu(t), t\geq0)$, representing the number of blocks in a Kingman coalescent with merger rate $C$ such that, for any $\bm \eta\in\mathbb{N}^k_*$, on the same probability space, we can stochastically bound $\sigma(t)\geq \nu(t)$, $t\geq0$.
\smallskip
We now note that, for any large $M>0$ there exists a constant $C>0$ (not necessarily the same as before) such that, for any $m$ sufficiently large,
\begin{align}
\lim_{N\to\infty}\mathbb{P}_{{\bm \eta}^N}\left(\int_0^{\gamma_m} \sigma(s){\rm d} s> M\right)
&\geq \lim_{N\to\infty}\mathbb{P}_{{\bm \eta}^N}\left(\int_0^{\beta_m} \nu(s){\rm d} s> M\right) \notag\\
&= \Pr\left(\sum_{n = m+1}^\infty \frac{n}{C{n\choose 2}}\mathbf{e}^{(n)}_{1} >M\right)\notag\\
&=\Pr\left(\sum_{n = m+1}^\infty \frac{1}{n-1}\mathbf{e}^{(n)}_{1} >\frac{CM}{2}\right),
\label{eq1}
\end{align}
where $({\bf e}^{n}_1, n\geq 1)$, is a sequence of iid unit-mean exponentially distributed random variables.
If we write $(N(t), t\geq 0)$ for a Poisson process with unit rate, then almost surely we have
\[
\sum_{n = m+1}^\infty \frac{1}{n-1}\mathbf{e}^{(n)}_{1} = \int_0^\infty \frac{1}{N(s)+m}{\rm d} s
=\int_0^\infty \frac{s}{N(s)+m}\frac{{\rm d} s}{s} =\infty
\]
where the final equality follows by the strong law of large numbers for Poisson processes. As such the right-hand side of \eqref{eq1} is equal to 1.
\smallskip
Since $M$ and $m$ can be arbitrarily large, this shows the first claim as soon as we note that $\tau^{-1}(t) = \int_0^t \sigma(u){\rm d} u$, which is an easy consequence of \eqref{dt}. On the other hand, note that since
$
\int_0^{\tau(t)} \sigma(s){\rm d} s = t,
$
when $\sigma(0)= {\bm \eta}^N \rightarrow\infty$, the above comparison with Kingman's coalescent shows that almost surely that, since $\int_0^u\sigma(s){\rm d} s $ converges weakly to infinity for all $u>0$, then $\tau(t)$ converges weakly to 0. Indeed, if with positive probability $\tau(t)>\varepsilon$ in the limit as $N\to\infty$, then, on that event,
$\int_0^{\tau(t)} \sigma(s){\rm d} s\geq \int_0^{\varepsilon} \sigma(s){\rm d} s$, which explodes in distribution. This in turn contradicts the definition of $\tau(t)$. This proves the second and third statements of the corollary.
\end{proof}
\begin{cor}\label{cor2}
From Lemma \ref{2upper} and Lemma \ref{cor1}, we deduce that, for any sequence $(\bm \eta^N, N\geq 1)$ in $\mathbb{N}^k_*$ such that $(\norm{\bm \eta^N}_1, \arg(\bm\eta^N))\to (\infty, \bm r)$ and $ \bm r \in \mathcal{S}^k_+$,
\[
\lim_{N\to\infty}\mathbb{E}_{\bm \eta^N}\left[\norm{\bm m^\tau(t) }^2_2\right] =0
\]
\end{cor}
\begin{proof}
We have from Lemma \ref{2upper} and using the fact that
$
\int_0^{\tau(t)}\sigma(s){\rm d} s = t,
$
we have
\begin{align*}
\mathbb{E}_{\bm \eta^N}\left[\norm{\bm m^\tau(t) }^2_2\right] &\leq C\mathbb{E}_{\bm\eta^N}\left[ \int_0^{\tau(t )\wedge\gamma_1}\frac{\sigma(s)}{(\sigma(s)-1)^2} {\rm d} s\right] \leq C t\mathbb{E}_{\bm \eta^N}\left[\frac{1}{(\sigma(\tau(t)) -1)^2}\wedge \frac{1}{4}\right],
\end{align*}
where the right-hand side may be infinite.
We can choose $N$ sufficiently large such that $\tau(t)$ is less than $\delta$ with probability at least $1-\epsilon$ so that,
\begin{align*}
\mathbb{E}_{\bm \eta^N}\left[\frac{1}{(\sigma(\tau(t)) -1)^2}\wedge \frac{1}{4}\right]&\leq \mathbb{E}_{\bm \eta^N}\left[\frac{1}{(\sigma(\epsilon) -1)^2}\wedge\frac{1}{4} ; \tau(t)< \delta\right] + \frac{1}{4}\mathbb{P}_{\bm \eta^N}(\tau(t)\geq \delta)\notag \\
&\leq \mathbb{E}_{\bm \eta^N}\left[\frac{1}{\nu(\epsilon)^2}\wedge \frac{1}{4}\right] + \epsilon,
\end{align*}
where we have again compared with a lower bounding Kingman coalescent $(\nu(t), t\geq0)$ on the same space, as in Lemma \ref{cor1}. Recall the classical result for Kingman's coalescent coming down from infinity that, when the collision rate is $C>0$,
\[
\epsilon\nu(\epsilon)\to 2/C
\]
almost surely as $\epsilon\to 0$; cf \cite{Brazil}. We can now easily conclude that
\[
\lim_{N\to\infty}\mathbb{E}_{\bm \eta^N}\left[\norm{\bm m^\tau(t)}^2_2\right] = 0,
\]
and this concludes the proof.
\end{proof}
\section{Proofs of Theorems \ref{prereplicator} and \ref{postreplicator}}\label{prepostproofs}
We begin by quickly addressing the existence of the ESS $\bm x^*$ by verifying standard criteria from the theory of replicator equations as per e.g. Chapter 6 and 7 of \cite{HS}.
\begin{proof}[Proof of Lemma \ref{ESSlem}]
From \eqref{A}, we observe that $0<\sum_{j=1}^kA^{-1}_{i,j} <\sum_{i=1}^k\sum_{j=1}^kA^{-1}_{i,j}$, thus $\bm{x}^*\in \mathcal{S}^k_+$.
From Theorem 6.4.1 of \cite{HS}, it suffices to show that
\[
(\bm x^*)^TA\bm x-\bm x^TA\bm x>0
\]
for all $\bm x\in\mathcal{S}^k$ sufficiently close but not equal to $\bm x^*$, see also \cite{Cressman_2014}.
\smallskip
As $-\bm A$ has strictly non-negative entries, $\bm x^TA\bm x<0$ and $(\bm x^*)^TA\bm x<0$. For $\bm x$ is sufficiently close to $\bm x^*$, remembering that $\bm x^*\in \mathcal{S}^+_k$, we can consider elements of $\mathcal{S}^k$ of the form $\bm x=\bm x^*+\varepsilon\bm u$ for $\varepsilon>0$ and $\bm u\in\mathbb{S}^{k-1}$. We have for these elements,
\begin{align*}
(\bm x^*)^T \bm A \bm x-{\bm x}^T\bm A\bm x &=-\varepsilon\bm u^T\bm A \bm x^* -\varepsilon^2\bm u^T\bm A \bm u>0
\end{align*}
In conclusion, $((\bm x^*)^TA\bm x-\bm x^TA\bm x)>0$, as required.
\end{proof}
Recall from \eqref{ESScgce} that the existence of an ESS $\bm x^*$ implies that the solution to the $\bm A$-replicator equation has the limit $\bm x(t)\to \bm x^*$. Reinterpreting \eqref{originalrepeq} in its integral form, this tells us that
\begin{equation}\label{mild}
\bm x(t) = \bm x(0) +\int_0^t x_i(s)([{\bm A} {\bm x}(s)]_i-{\bm x}(s)^T{\bm A} {\bm x}(s)){\rm d} s, \qquad t\geq0.
\end{equation}
This representation makes it easier to give the heuristic basis of the proof of Theorem \ref{prereplicator}.
\smallskip
Following our earlier heuristic reasoning, we can now see that, under $\mathbb{P}_{\bm\eta}$ as $\norm{\bm\eta}_1\to\infty$ the integrand in the expression for $\bm\alpha^\tau$ appears to have a similar structure to the replicator equations \eqref{originalrepeq}. That is, under $\mathbb{P}_{\bm\eta}$ as $\norm{\bm\eta}_1\to\infty$ and as $t\to 0$,
\[
\frac{{\rm d} \bm\alpha^\tau(t)}{{\rm d} t}\approx
\begin{pmatrix}\bm\theta(t)\\ \\ 0 \end{pmatrix}
\]
where
\[
\bm\theta_i(t) = { r}_i(\tau(t) )\Big([\bm A\bm r(\tau(t))]_i -\bm r(\tau(t))^T\bm A\bm r(\tau(t))) \Big).
\]
On the other hand, if we can show that $\bm m^\tau\to0$ as $\norm{\bm\eta}_1\to\infty$, then, since $\bm y^\tau = \bm m^\tau + \bm\alpha^\tau $,
reading off the first component of $\bm y^\tau$, i.e. $\bm R(t): = \bm r(\tau(t))$, roughly speaking we see that
\[
R_i(t) \approx r_i(0)+ \int_0^t R_i(s )\Big([\bm A\bm R(s)]_i -\bm R(s)^T\bm A\bm R(s)) \Big){\rm d} s,
\]
as $\norm{\bm\eta}_1\to\infty$, given that Corollary \ref{cor2} shows the martingale component is negligible. In other words, the process $(\bm R (t), t\geq0)$, begins to resemble the replicator equation in its integral form \eqref{mild}. It now looks like a reasonable conjecture that $\bm R(t)\to \bm x^*$, just as the solution to the replicator equation does.
\smallskip
Let us thus move to the proof of Theorem \ref{prereplicator}, which, as alluded to earlier, boils down to the control we have on the martingale $\bm m^\tau$ under $\mathbb{P}_{\bm\eta}$ as $\norm{\bm \eta}_1\to\infty$, thanks to Corollary \ref{cor2}.
\begin{proof}[Proof of Theorem \ref{prereplicator}]
Write $\bm R_i(t) = \bm r(\tau(t))$ on the event
\[
A_t := \{t<\tau^{-1}(\gamma_1) \},\qquad t\geq0,
\]
and note from Lemma \ref{cor1} and Lemma \ref{hitfromabove} that $\lim_{N\to\infty}\mathbb{P}_{\bm \eta^N}(A_t)=1$. We have
\begin{align}
&\mathbb{E}_{\bm \eta^N}\Bigg[\Bigg(
{\bm R}(t) - {\bm r}- \int_0^t \Big(\sum_{i=1}^k {\bm e}_iR_i(s)[\bm A\bm R(s)]_i - (\bm R(s)^T\bm A\bm R(s) ) \bm R(s) \Big){\rm d} s \Bigg)^2 \mathbf{1}_{A_t}\Bigg]^{1/2}
\notag\\
&\leq \mathbb{E}_{\bm \eta^N}\Bigg[ \Bigg({\bm R}(t) - {\bm r}- \int_0^t \frac{\sigma(\tau(s))}{\sigma(\tau(s))-1}
\notag\\
&\hspace{3.5cm}\sum_{i = 1}^k
(\bm R (s)-\bm{e_i} ) R_i(s) [ \sigma(\tau(s))^{-1} {\rm diag}(\bm A)\bm{1}- \bm A\bm R(s) ]_i \,{\rm d} s
\Bigg)^2\mathbf{1}_{A_t}\Bigg]^{1/2}\notag\\
&+ \mathbb{E}_{\bm \eta^N}\Bigg[ \Bigg( \int_0^t \frac{1}{\sigma(\tau(s))-1}\Big(\sum_{i=1}^k {\bm e}_iR_i(s)[\bm A\bm R(s)]_i - (\bm R(s)^T\bm A\bm R(s) ) \bm R(s) \Big)\,{\rm d} s
\Bigg)^2\mathbf{1}_{A_t}\Bigg]^{1/2}\notag\\
&+ \mathbb{E}_{\bm \eta^N}\Bigg[ \Bigg(\int_0^t \frac{1}{\sigma(\tau(s))-1}
\Big(
\bm ({\bm R}(s)^T{\rm diag}(\bm A) \bm 1)\bm R(t)
- \sum_{i=1}^k {\bm e}_iR_i(s)[{\rm diag}(\bm A) \bm 1]_i
\Big)
\Bigg)^2\mathbf{1}_{A_t}\Bigg]^{1/2}.\notag\\
\label{whopper}
\end{align}
From Corollary \ref{cor2}, the first term after the inequality tends to zero as $N\to\infty$. Up to a multiplicative constant, the second and third terms after the inequality can be bounded by
\[
t^2\mathbb{E}_{\bm \eta^N}\Bigg[\frac{1}{(\sigma(\tau(t)) -1)^2}\wedge\frac{1}{4}\Bigg],
\]
where we have used the monotonicity of $\tau(\cdot)$ and $\sigma(\cdot)$.
As noted in the proof of Corollary \ref{cor2}, the latter tends to zero as $N\to\infty$.
It now follows that
\begin{align}
&\lim_{N\to\infty}\mathbb{E}_{\bm \eta^N}\Bigg[\Bigg(
{\bm R}(t) - {\bm r}- \int_0^t \sum_{i=1}^k {\bm e}_iR_i(s) [\bm A\bm R(s)]_i \notag\\
&\hspace{6cm}- (\bm R(s)^T\bm A\bm R(s) )\bm R(s) {\rm d} s \Bigg)^2\mathbf{1}_{A_t}\Bigg]=0
\label{newnormcgce}
\end{align}
As all of the vectorial and matrix terms in \eqref{newnormcgce} are bounded, it is also easy to see with the help of \eqref{cor1} that
\begin{align*}
&\lim_{N\to\infty}\mathbb{E}_{\bm \eta^N}\Bigg[\Bigg(
{\bm R}(t) - {\bm r}- \int_0^t \sum_{i=1}^k {\bm e}_iR_i(s) [\bm A\bm R(s)]_i - (\bm R(s)^T\bm A\bm R(s) )\bm R(s) {\rm d} s \Bigg)^2\mathbf{1}_{A_t^c}\Bigg]\notag\\
&\leq \lim_{N\to\infty}C t^2 \mathbb{P}_{\bm \eta^N}(A_t^c)=0,
\end{align*}
which gives us
\begin{align}
&\lim_{N\to\infty}\mathbb{E}_{\bm \eta^N}\Bigg[\Bigg(
{\bm R}(t) - {\bm r}- \int_0^t \sum_{i=1}^k {\bm e}_iR_i(s) [\bm A\bm R(s)]_i \notag\\
&\hspace{6cm} - (\bm R(s)^T\bm A\bm R(s) )\bm R(s) {\rm d} s \Bigg)^2\Bigg]=0.
\label{newnormcgce2}
\end{align}
Consider the replicator equation initiated from any $\bm r\in \mathcal{S}^k_+$. Similarly to \eqref{mild}, albeit in vectorial form, we can write the solution to \eqref{originalrepeq}, when issued from $\bm r$ as
\[
\bm x(t) - \bm r - \int_0^t\sum_{i=1}^k {\bm e}_i x_i(s)[{\bm A} {\bm x}(s)]_i-({\bm x}(s)^T{\bm A} {\bm x}(s))\bm x(s){\rm d} s=0.
\]
Subtracting this off in \eqref{newnormcgce}, we see that
\begin{align*}
&\norm{R_i(t)- x_i(t) }_{ L^1(\mathbb{P}_{\bm \eta^N})}\notag\\
&\leq \mathbb{E}_{\bm \eta^N}\Bigg[\Bigg|
{R}_i(t) - { r_i}- \int_0^t R_i(s)\Big([\bm A\bm R(s)]_i - \bm R(s)^T\bm A\bm R(s) \Big){\rm d} s \Bigg| \Bigg]\notag\\
&+\int_0^t \left\|
|R_i(s)- x_i(s)| \Big|[\bm A\bm R(s)]_i - \bm R(s)^T\bm A\bm R(s) \Big|
\right\|_{ L^1(\mathbb{P}_{\bm \eta^N})}{\rm d} s\notag\\
&+\int_0^t \left\|
x_i(s) \Big|[\bm A\bm (R(s)-\bm x(s))]_i - \bm R(s)^T\bm A(\bm R(s)-\bm x(s)) \Big|
\right\|_{ L^1(\mathbb{P}_{\bm \eta^N})}{\rm d} s\notag\\
&+\int_0^t \left\|
x_i(s) \Big| (\bm R(s)-\bm x(s))^T\bm A\bm x(s) \Big|
\right\|_{ L^1(\mathbb{P}_{\bm \eta^N})}{\rm d} s\notag\\
\end{align*}
Noting that $0\leq R_i(s), x_i(s) \leq 1$ for all $i =1\cdots, k$, $s\geq 0$, we have,
\begin{align}
&\norm{(R_i(t)- x_i(t)) }_{ L^1(\mathbb{P}_{\bm \eta^N})}\notag\\
&\leq \mathbb{E}_{\bm \eta^N}\Bigg[\Bigg|
{R}_i(t) - { r_i}- \int_0^t R_i(s)\Big([\bm A\bm R(s)]_i - \bm R(s)^T\bm A\bm R(s) \Big){\rm d} s \Bigg| \Bigg]\notag\\
&\hspace{2cm}+C\int_0^t \norm{(R_i(s)- x_i(s)) }_{ L^1(\mathbb{P}_{\bm \eta^N})}{\rm d} s,
\label{pregron}
\end{align}
where $C>0$ is an unimportant constant.
Hence, using \eqref{newnormcgce2} and dominated convergence,
\begin{align*}
u(t)&:=\lim_{N\to\infty}\sup_{N'\geq N}\norm{(R_i(t)- x_i(t)) }_{L^1(\mathbb{P}_{\bm \eta^{N'}})}\notag\\
&\leq C\int_0^t \lim_{N\to\infty}\sup_{N'\geq N}
\norm{(R_i(s)- x_i(s)) }_{L^1(\mathbb{P}_{\bm \eta^{N'}})}{\rm d} s\notag\\
& = C\int_0^t u(s){\rm d} s,
\end{align*}
where $C>0$ is an unimportant constant.
Gr\"onwall's Lemma now tells us that
\begin{equation}
\lim_{N\to\infty}\norm{(R_i(t)- x_i(t)) }_{ L^1(\mathbb{P}_{\bm \eta^N})} = 0.
\label{onAt}
\end{equation}
By taking $t\to\infty$, we easily deduce that
\[
\lim_{t\to\infty}\lim_{N\to\infty}
\norm{R_i(t)- x_i^*}_{ L^1(\mathbb{P}_{\bm \eta^N})}
\leq \lim_{t\to\infty}\lim_{N\to\infty}\norm{R_i(t)- x_i(t)}_{ L^1(\mathbb{P}_{\bm \eta^N})}
+\lim_{t\to\infty}|x_i(t)-x_i^*| =0.
\]
This completes the proof of the theorem.
\end{proof}
Let us now turn our attention to the proof of the outstanding main result, which shows that the ESS $\bm x^*$ is inevitably what we see when approaching the bottleneck backwards in time.
\begin{proof}[Proof of Theorem \ref{postreplicator}]
From Lemmas \ref{2upper} and \ref{hitfromabove} we have, for $m$ sufficiently large
\[
\mathbb{E}_{\bm \eta}\left[\norm{\bm m ( \gamma_m)}^2_2\right] \leq C\mathbb{E}_{\bm\eta}\left[ \int_0^{\gamma_m }\frac{\sigma(s)}{(\sigma(s)-1)^2} {\rm d} s\right] \leq C\frac{1}{m}\mathbb{E}_{\bm \eta}[\gamma_m]
\]
where $C$ is a constant whose value may vary in each expression. Recall that we may compare $\gamma_m$ to $\beta_m$ for an associated Kingman coalescent, it the sense that $\gamma_m\leq \beta_m$, cf. Lemma \ref{cor1}. Moreover, it is well known for Kingman's coalescent with e.g. collision rate $C>0$ that
\[
\lim_{m\to\infty}\lim_{n\to \infty}\mathbb{E}[\beta_m| \nu(0) = n] =\lim_{m\to\infty}\lim_{n\to \infty}\sum_{k =m+1}^n\frac{2}{Ck(k-1)} =0.
\]
As such, we have that
\begin{equation}
\lim_{m\to\infty}\lim_{\norm{\bm\eta}_1\to\infty}\mathbb{E}_{\bm \eta}\left[\norm{\bm m( \gamma_m) }^2_2\right] =0.
\label{mnotau}
\end{equation}
Next recall from \eqref{dt} that
\begin{equation}
\tau^{-1}(\gamma_m) = \int_0^{\gamma_m} \sigma(u){\rm d} u.
\label{inversetau}
\end{equation}
Moreover, from the proof of Lemma \ref{cor1}, we see that the left hand side above converges weakly to $\infty$ as $\bm\eta^N$ converges. In the spirit of \eqref{whopper} we can write
\begin{align}
&\mathbb{E}_{\bm \eta^N}\Bigg[\Bigg(
{\bm r}(\gamma_m) - {\bm r}- \int_0^{\tau^{-1}(\gamma_m)} \Big(\sum_{i=1}^k {\bm e}_iR_i(s)[\bm A\bm R(s)]_i - (\bm R(s)^T\bm A\bm R(s) ) \bm R(s) \Big){\rm d} s \Bigg)^2\Bigg]^{1/2}
\notag\\
&\leq \mathbb{E}_{\bm \eta^N}\Bigg[ \Bigg({\bm r}(\gamma_m) - {\bm r}- \int_0^{\tau^{-1}(\gamma_m)} \frac{\sigma(\tau(s))}{\sigma(\tau(s))-1}\notag\\
&\hspace{4cm}\sum_{i = 1}^k
(\bm R (s)-\bm{e_i} ) R_i(s) [ \sigma(\tau(s))^{-1} {\rm diag}(\bm A)\bm{1}- \bm A\bm R(s) ]_i \,{\rm d} s
\Bigg)^2\Bigg]^{1/2}\notag\\
&+ \mathbb{E}_{\bm \eta^N}\Bigg[ \Bigg( \int_0^{\tau^{-1}(\gamma_m)} \frac{1}{\sigma(\tau(s))-1}\Big(\sum_{i=1}^k {\bm e}_iR_i(s)[\bm A\bm R(s)]_i - (\bm R(s)^T\bm A\bm R(s) ) \bm R(s) \Big)\,{\rm d} s
\Bigg)^2\Bigg]^{1/2}\notag\\
&+ \mathbb{E}_{\bm \eta^N}\Bigg[ \Bigg(\int_0^{\tau^{-1}(\gamma_m)} \frac{1}{\sigma(\tau(s))-1}
\Big(
\bm ({\bm R}(s)^T{\rm diag}(\bm A) \bm 1)\bm R(t)
- \sum_{i=1}^k {\bm e}_iR_i(s)[{\rm diag}(\bm A) \bm 1]_i
\Big)
\Bigg)^2\Bigg]^{1/2}\notag\\
&\leq \norm{\bm m(\gamma_m)}_{L^2(\bm\eta^N)}
+ \frac{C}{m-1}\mathbb{E}_{\bm \eta^N}[\gamma_m],\notag\\
\label{whopper2}
\end{align}
where we have used \eqref{ysemimg}, \eqref{alphatau}. Now appealing to \eqref{mnotau}, the right-hand side above converges to zero as $N\to\infty$ and $m\to\infty$.
\smallskip
Next we remind ourselves of remaining calculations in the proof of Theorem \ref{comingdownfrominfinity} that follow \eqref{newnormcgce}.
In a similar spirt to \eqref{pregron}, we can introduce and subtract additional terms, some of which depend on $t$, which may be arbitrarily large, we ge
\begin{align}
&\lim_{m\to\infty}\lim_{N\to\infty} \norm{r_i(\gamma_m) - x^*_i}_{L^1(\mathbb{P}_{\bm\eta^N})}\notag\\
&\leq\lim_{m\to\infty} \lim_{N\to\infty}
\mathbb{E}_{\bm \eta^N}\Bigg[\Bigg|
r_i(\gamma_m) - r_i- \int_0^{\tau^{-1}(\gamma_m)} R_i(s)\Big([\bm A\bm R(s)]_i - \bm R(s)^T\bm A\bm R(s) \Big) {\rm d} s \Bigg|\Bigg]\notag\\
&+\lim_{t\to\infty} \lim_{N\to\infty}
\mathbb{E}_{\bm \eta^N}\Bigg[\Bigg|
R_i(t)- r_i- \int_0^{t} R_i(s)\Big([\bm A\bm R(s)]_i - \bm R(s)^T\bm A\bm R(s) \Big) {\rm d} s \Bigg|\Bigg]\notag\\
&+\lim_{m\to\infty} \lim_{N\to\infty}
\mathbb{E}_{\bm \eta^N}[|
R_i(t)- x^*_i |]\notag\\
&+ \lim_{t\to\infty}\lim_{m\to\infty} \lim_{N\to\infty}
\mathbb{E}_{\bm \eta^N}\Bigg[ \Bigg|
\int_{\tau^{-1}(\gamma_m)\wedge t}^{\tau^{-1}(\gamma_m)\vee t} R_i(s)\Big([\bm A\bm R(s)]_i - \bm R(s)^T\bm A\bm R(s) \Big) {\rm d} s\Bigg| \Bigg].\notag\\
\label{gotokingman}
\end{align}
With the exception of the last one, each of the terms on the right-hand side of \eqref{gotokingman} have already been shown to tend to zero. For the last one,
note that the first and second terms on the right-hand side of \eqref{gotokingman}
tell us that, as $N$ and $m$ tend to infinity (in that order), the $\norm{\cdot}_{L^1(\mathbb{P}_{\bm\eta^N})}$ norm
of the integrals
\[
\int_0^{\tau^{-1}(\gamma_m)} R_i(s)\Big([\bm A\bm R(s)]_i - \bm R(s)^T\bm A\bm R(s) \Big) {\rm d} s
\]
and
\[
\int_0^{t} R_i(s)\Big([\bm A\bm R(s)]_i - \bm R(s)^T\bm A\bm R(s) \Big) {\rm d} s
\]
both converge.
This allows us to conclude that
with the help of
Lemma \ref{cor1}, in particular, \eqref{eq1} in its proof, that
\begin{align*}
&\lim_{t\to\infty}\lim_{m\to\infty} \lim_{N\to\infty}
\mathbb{E}_{\bm \eta^N}\Bigg[ \Bigg|
\int_{\tau^{-1}(\gamma_m)\wedge t}^{\tau^{-1}(\gamma_m)\vee t} R_i(s)\Big([\bm A\bm R(s)]_i - \bm R(s)^T\bm A\bm R(s) \Big) {\rm d} s\Bigg| \Bigg]\notag\\
&\leq \lim_{t\to\infty}\lim_{m\to\infty} \lim_{N\to\infty}
\mathbb{E}_{\bm \eta^N}\Bigg[ \Bigg|
\int_{t}^{ \tau^{-1}(\gamma_m)} R_i(s)\Big([\bm A\bm R(s)]_i - \bm R(s)^T\bm A\bm R(s) \Big) {\rm d} s \Bigg| \, \mathbf{1}_{( \tau^{-1}(\gamma_m)> t)}\Bigg]\notag\\
&+\lim_{t\to\infty}\lim_{m\to\infty} \lim_{N\to\infty}
\mathbb{E}_{\bm \eta^N}\Bigg[ \Bigg|
\int_{ \tau^{-1}(\gamma_m)}^t R_i(s)\Big([\bm A\bm R(s)]_i - \bm R(s)^T\bm A\bm R(s) \Big) {\rm d} s \Bigg|\,\mathbf{1}_{( \tau^{-1}(\gamma_m)\leq t)} \Bigg]\notag\\
&=0.
\end{align*}
This concludes the proof.
\end{proof}
\section*{Acknowledgements}
LP was visiting TR and AEK as part of a doctoral visiting programme sponsored by the Internationalisation Research Office at the University of Bath. She would like to thank the university for their support. TR would like to thank Chris Guiver for useful discussions. AEK and TR acknowledge EPSRC grant support from EP/S036202/1.
|
\section{Introduction}
According to Crystal \cite{crystal2011dictionary}, context is to refer to specific parts of an utterance (or text) near or adjacent to a unit which is the focus of attention. The occurrence of a unit is determined by its context, which is specified in terms of the unit’s relations. Thus this definition has confirmed the role of context for placing words in sentences. The word is the basic semantic unit of a sentence so it can be inferred that context has a decisive role in understanding the semantics of a language.
In natural language processing, context can be considered as an important source of information. CoBAn, a context-based model for data leakage prevention \cite{katz2014coban} leveraged strength of both keyword-based and statistical approach in their approach. Automatic detection and correction of spelling are one of the most common problems in natural language processing. A context-based approach like N-gram for Vietnamese Spell Checking \cite{thi2015using} achieve high accuracy approximate 94\% F-score on the Vietnamese text. In research on forum spamming detection, Niu et al. \cite{niu2007quantitative} proposed an effective context-based approach consisting of redirection and cloaking analysis. Recently, deep learning approaches have brought significant breakthoughs in natural language processing \cite{vaswani2017attention,devlin2018bert,brown2020language} in general and Vietnamese text processing \cite{nguyen2018relation,nguyen2019deep,do2021vsec,thanh2021summary} in particular.
In our study, we want to test whether context can help deep learning models in the problem of lost information recovery. The hypothesis we want to verify is: in a situation where most words are modified and the sentence restoring is hampered by ambiguity, can a deep learning model can learn and base on the context to recover the original sentence.
The experiment is inspired by the controversial work so-called innovating writing of Vietnamese (\textit{Tieq Viet}{}) by Bui Hien \cite{bui2017chu}. This proposal of Vietnamese only contains 31 characters in its character set instead of 38 characters as the standard version.
As a result, multiple words in the standard version may be translated into the same word in the proposed version, leading to information loss.
\begin{table}
\centering
\caption{Example for ambiguous in \textit{Tieq Viet}{}. Both translations are valid but convey different (sometimes opposite) meanings.}
\label{tab:ambiguous_example}
\begin{tabular}{|C|C|C|}
\hline
\textbf{\textit{Tieq Viet}{}}&\textbf{Vietnamese}&\textbf{Meaning}\\
\hline
Tôi za cợ mua \textbf{can'}&(1) Tôi ra chợ mua \textbf{chanh} & (1) I went to the market to buy \textbf{lemons}\\
&(2) Tôi ra chợ mua \textbf{tranh} & (2) I went to the market to buy \textbf{paintings}\\
\hline
\textbf{Cân câu} ở dây zất nổi tiếq&(1) \textbf{Trân châu} ở đây rất nổi tiếng &(1) \textbf{Pearl} here is very famous\\
&(2) \textbf{Chân trâu} ở đây rất nổi tiếng & (2) \textbf{Buffalo legs} here are very famous\\
\hline
Họ tấn kôq zữ zội kuá, ta xôq wể \textbf{xôq} vào& (1) Họ tấn công dữ dội quá, ta không thể \textbf{xông} vào & (1) They attacked so fiercely, we \textbf{must not break in}\\
& (2) Họ tấn công dữ dội quá, ta không thể \textbf{không} vào & (2) They attacked so fiercely, we \textbf{must enter}\\
\hline
Kô tìm wấy một kái \textbf{xák} cên bàn làm việk& (1) Cô tìm thấy một cái \textbf{khác} trên bàn làm việc & (1) She found \textbf{another} on her desk\\
& (2) Cô tìm thấy một cái \textbf{xác} trên bàn làm việc & (2) She found \textbf{a corpse} on her desk\\
\hline
Nó sẽ \textbf{zàn'} một số tiền lớn& (1) Nó sẽ \textbf{giành} một số tiền lớn & (1) He will \textbf{win} a large amount of money\\
& (2) Nó sẽ \textbf{dành} một số tiền lớn & (2) He will \textbf{save} a large amount of money\\
\hline
\end{tabular}
\end{table}
\section{Problem Formulation}
Consonant phonemes in Vietnamese are represented by single or multiple characters. In \textit{Tieq Viet}{}, existing phonemes are changed as the following:
\begin{itemize}
\item Ch and Tr are replaced by C
\item Đ is replaced by D
\item Gh is replaced by G
\item Ph is replaced by F
\item C, and Q are replaced by K
\item Ng and Ngh are replaced by Q
\item Kh is replaced by X
\item Th is replaced by W
\item D, Gi and R are replaced by Z
\item Nh is replaced by N'
\end{itemize}
After replacement, the alphabet does not contain the letter Đ any more and is added with some letter such as F, J, W, Z. With such replacement of consonances, the ambiguities between the words are obvious. Some of the ambiguous examples are shown in Table \ref{tab:ambiguous_example}. Without understanding the context, it is impossible to restore the sentences into the standard Vietnamese.
The problem for restoring the sentences from \textit{Tieq Viet}{} to standard Vietnamese can be formulated as follow:
\begin{itemize}
\item $C_{tieqviet}$ is the character set of \textit{Tieq Viet}{}
\item $C_{standard}$ is the character set of the standard Vietnamese
\item Given a sentence $S_{tieqviet}=[c_i|c_i \in C_{tieqviet}]$ obtained by converting a original $S_{standard}=[c_i|c_i \in C_{standard}]$
\item The system need to restore the sentence as the original version $S_{standard}$.
\end{itemize}
Looking at Table \ref{tab:ambiguous_example}, we can see that there is no restoring rule that can be applied in every reverse conversion. An effective model solving this problem is not a simple mapping between one-to-one from characters in $C_{tieqviet}$ to $C_{standard}$. In the next section, we describe our experiment in restoring sentence from \textit{Tieq Viet}{} and verify the importance of context in language understanding. Given a sentence written in \textit{Tieq Viet}{}, the model needs to restore the original in the standard Vietnamese.
\section{Experiment}
\subsection{Data Preparation}
The data for the experiment is crawled from Vietnamese digital news websites and converted into \textit{Tieq Viet}{} by the rules described in the previous section. The dataset only contains pairs of sentences written in \textit{Tieq Viet}{} and standard Vietnamese. No additional information is added into the dataset.
The training and validation set of data is divided from the dataset. The training set contains 500 pairs of sentences and the validation test contains 100 pairs of sentences.
\begin{table}
\caption{Parameters of the LSTM model}
\label{tab:para}
\begin{center}
\begin{tabular}{lr}
\hline
\textbf{Parameters}& \textbf{Value}\\
\hline
Embedding dimension&227\\
Hidden dimension&512\\
Number of hidden layers&2\\
Batch size&32\\
Sequence length&50\\
Learning rate&0.001\\
Number of epochs&300\\
\hline
\end{tabular}
\end{center}
\end{table}
\subsection{Model Architecture}
For input representation for our model, we use character level embedding technique. Each sentence is a sequence of characters $S = [c_1, c_2, ... , c_n]$. In order to enable the model to restore the sentence to the standard version of Vietnamese, we need to obtain a character set $C$ that is the union of the character set of standard Vietnamese and \textit{Tieq Viet}{} ($C_{standard}$ and $C_{tieqviet}$. We also add to $C$ the \textit{UNK} and \textit{PAD} tokens for representing unknown and padding characters. For character embedding, let $m$ is the quantity of set $C$ ($m=|C|$), each character is represented as an one-hot vector $c_i^m$.
In order to process the sentences with different length in a batch, we uniform all sentences into the same length. The maximum sequence length is set to 50 (characters), all sentence longer than 50 characters are pruned and the shorter ones are padded with \textit{PAD} tokens.
We use a simple model as 2 stacked bidirectional layers LSTM \cite{sundermeyer2012lstm} followed by a fully connected layer. The architecture of the model is demonstrated in Figure \ref{fig:model_architecture}.
\begin{figure*}
\centering
\includegraphics[width=.7\linewidth]{architecture.png}
\caption{Architecture of the model}
\label{fig:model_architecture}
\end{figure*}
In the training phase, we use Adam optimizer with Cross Entropy Loss to train the neural network with stacked LSTM architecture. The parameters are shown in Table \ref{tab:para}.
\subsection{Experimental Result and Discussion}
After training the model with the parameter listed in the previous section, we obtain a model with 96.32\% accuracy predicting the data in the validation set. The loss and accuracy variation is shown in the Figure \ref{fig:loss} and \ref{fig:acc}. Looking at the graphs, we can see that the model struggle to find the loss optimization direction until epochs 50s.
The loss does not decrease much from epochs 150s. At that period, the model has learned almost restoring rules based on its context understanding and memory. However, the optimization still continues. The less common rules are learned during this period.
The result of prediction in the validation set gives us the quantity measurement for the ability of our model in understanding the context and restoring the text to standard Vietnamese. For further understanding, we investigate cases that the system did not restore successfully. Most of the cases are names, abbreviations or rare words. Table \ref{tab:error} shows some examples of the model prediction errors, $W_{tieqviet}$,$W_{pred}$ and $W_{standard}$ are the word in \textit{Tieq Viet}{}, predicted word by the model and the correct word in standard Vietnamese.
\begin{table}
\caption{Examples of errors}
\label{tab:error}
\begin{center}
\begin{tabular}{llll}
\hline
\textbf{Type}&\textbf{W\textsubscript{tieqviet}}&\textbf{W\textsubscript{pred}}&\textbf{W\textsubscript{standard}}\\
\hline
name&Cin'&Trinh&Chinh\\
name&Tà Zụt&Tà Dụt&Tà Rụt\\
abbreviation&G&G&GH\\
name&Cu Zị&Tru Rị&Chu Dị\\
rare word&cíc&chích&trích\\
\hline
\end{tabular}
\end{center}
\end{table}
\begin{figure}
\centering
\includegraphics[width=.8\linewidth]{loss.png}
\caption{Loss in the training and validation data}
\label{fig:loss}
\end{figure}
\begin{figure}
\centering
\includegraphics[width=.8\linewidth]{acc.png}
\caption{Accuracy in the training and validation data}
\label{fig:acc}
\end{figure}
\section{Conclusions}
In this paper, we analyze the ability of deep learning models to recover the lost information caused by translating standard Vietnamese into \textit{Tieq Viet}{}.
To remain as generality as possible, we use the simple architecture as LSTM in our experiment.
We also limit the amount of training data and testing data comparatively less than other tasks in NLP.
Our experiment suggests that deep learning models are able to recover the loss of information based on the context with good performance (96.32\%).
This result also provides an empirical fact for scientific debates about \textit{Tieq Viet}{} as well as other Vietnamese linguistic innovation proposals.
\bibliographystyle{splncs04}
|
\section{Introduction}
The analytical theory of radar signal processing employs cross-correlation technique for target detection and parameter estimation \cite{levanon1988radar,peebles1998radar}. The radar's ability to distinguish closely-spaced targets is completely specified by the \textit{ambiguity function} (AF) of its transmit waveform. Through the AF, the transmit waveform enters into the performance analyses related to detection, target parameter accuracy, and resolution of multiple closely-spaced targets. The AF was first introduced by Ville \cite{ville1948theorie} and its significance as a signal design metric in the mathematical radar theory is credited to Woodward \cite{woodward1965probability,woodward1967radar}, later expounded in detail by Siebert \cite{siebert1956radar}. The AF is not uniquely defined, including in the works of Woodward, which focused on narrowband waveforms \cite{peebles1998radar,george2010implementation,pinilla2021banraw,pinilla2021wavemax}.
However, many radar applications such as for ground penetration \cite{giovanneschi2019dictionary}, synthetic apertures \cite{vouras2022overview}, and vehicular sensing systems \cite{mishra2019toward} employ wideband waveforms that yield higher range resolution and improved interference suppression. Unlike the narrowband AF (NAF), the Doppler effect on the envelopes of transmit signal reflected off the targets is not constant across the bandwidth. This led to several generalizations of Woodward's definition to wideband ambiguity function (WAF) \cite{speiser1967wide,kelly1965matched,rihaczek1967delay}. In this paper, we focus on such wideband interpretations of AF.
There is a large body of research on using the AF as an aid to select suitable radar waveforms. An AF equal to zero except at one point is ideal for detection tasks \cite[Chapter 3]{jankiraman2007design}. But, in this case, the probability of the target lying within the response region would be near zero \cite{rihaczek1996principles}. In the absence of an ideal AF, significant theoretical efforts have been devoted to the problem of finding functions of delay and Doppler that are not only realizable as AFs but also have suitable radar performance. The resulting procedure of \textit{waveform design} has traditionally focused on achieving AFs that are \textit{thumbtack} with a sharp central spike and low sidelobes in the delay-Doppler plane. The inverse problem - given an AF, design a signal that yields it - is traced back to the 1970 work by Rudolf de Buda. This study claimed that when the NAF is bounded by a \textit{Hermite function}, then the signal is also a Hermite function where the polynomial is found from its AF by comparing coefficients \cite{de1970signals}. Later works such as \cite{jaming2010phase} extended de Buda's results by showing that the bounding assumption over the radar AF is removed to uniquely identify (up to trivial ambiguities) a Hermite function and \textit{rectangular pulse trains}. More recently, phase retrieval techniques have been applied to estimate a band-limited signal from its NAF \cite{pinilla2021banraw}.
The interest in studying both NAF and WAF in a unified framework resulted in analyzing these functions from the perspective of a group representation theory \cite{chaiyasena1990wavelet}. The NAF and WAF are coefficients of the unitary representations of their respective groups. For example, for the NAF, the delayed and Doppler-shifted replicas of a signal are obtained by a unitary operator that is a member of a Heisenberg group \cite{howard2006finite}. On the other hand, the time dilated and delayed replicas result from the transmit signal through a unitary operator that comes from an affine group. The wideband cross-AFs are, therefore, affine wavelet transforms \cite{chaiyasena1990wavelet}.
In this paper, we investigate group-theoretic formulations to design signals that obey a given WAF. Similar prior works were largely limited to analyzing the NAF. In \cite{howard2006finite}, using the theory developed in \cite{calderbank1997Z4} for the extraspecial 2-group, it was shown that finite Heisenberg-Weyl groups provide a unifying framework for several sequences to design narrowband phase-coded radar waveforms. Later, this was expanded to design complementary sequences in \cite{pezeshki2008doppler,dang2020coordinating}. Initial investigations into the group representation theory for WAF appeared in \cite{auslander1990wide,chaiyasena1990wavelet,chaiyasena1992wavelet}. This was expanded to include Mellin transform in \cite{shenoy1995wide}. Nearly all of the aforementioned works did not examine the design of wideband waveforms from a given WAF using group-theoretic tools. In this work, we build upon the unitary representation of WAF to design complementary sequences. In particular, we exploit the seminal work of \cite{daubechies1988time,daubechies1990wavelet} to build a tight frame, whose bounding constants are then utilized to obtain low WAF sidelobes. We show that the resulting tight frame is related to the wavelet transform that defines the WAF.
The rest of the paper is organized as follows. In the next section, we introduce the definitions of WAF. We then make a connection with affine groups in Section~\ref{sec:grp}. We analytically design the signal using this theory in Section~\ref{sec:numexp} before concluding in Section~\ref{sec:summ}. Throughout the paper, for reference, the NAF of an uncoded pulse $w(t)$ with duration $T_{c}$ and unit energy
$
\int_{-\frac{T_{c}}{2}}^{\frac{T_{c}}{2}}|w(t)|^{2} d t=1
$
is the inner product of the transmit waveform $w(t)$ and its time-delayed/frequency-shifted version:
\begin{align}
\psi_{w}(\tau, \nu)=\int_{-\frac{T_{c}}{2}}^{\frac{T_{c}}{2}} w(t) w^{*}(t-\tau) e^{-j \nu t} d t,
\end{align}
where $(\tau, \nu)$ are the delay-Doppler coordinates.
\section{WAF of Radar Pulses}
As a traveling wavefield reflects off a moving target, the field either expands or compresses in time because of the movement of the target. When a narrowband waveform is transmitted, this compressive effect is ignored for the waveform's complex envelope and only considered for the carrier. The WAF for which this approximation is not permissible is
\begin{align}
\chi_{w}^{1}(\tau, \nu)=\sqrt{\gamma}\int_{-\frac{T_{c}}{2}}^{\frac{T_{c}}{2}} w(t) w^{*}(\gamma(t-\tau)) e^{-j \nu t} d t,
\label{eq:WAF}
\end{align}
where the factor $\gamma=1+f_{v} / f_{c}$ accounts for the stretching/compressing in time of the reflected signal (Doppler factor). Assume $f_{0}$ to be the central frequency of the spectra $W(\nu)$. Denote
\begin{align*}
\Delta f &= \nu - f_{0}, & \textit{ frequency deviation}, \\
\delta &= \frac{2v}{c+v}, & \textit{the relative velocity}.
\end{align*}
Then,
\begin{align}
w(\gamma(t-\tau)) &= e^{-2\pi j f_{0}\delta(t-\tau)}\nonumber\\
&\times \int_{-\frac{T_{c}}{2}}^{\frac{T_{c}}{2}} W(\nu)e^{2\pi j \nu(t-\tau)}e^{-2\pi j\Delta f \delta(t-\tau)} d\nu.
\end{align}
Observe that there are two factors affecting the signal behaviour in time $e^{-2\pi j f_{0}\delta(t-\tau)}$ and $e^{-2\pi j\Delta f \delta(t-\tau)}$. The first shifts the signal spectra; the second accounts for the stretching/compressing in time of the reflected signal. If the target-source velocity $v\ll c$ then $\delta \ll 1$ and thus $e^{-2\pi j\Delta f \delta(t-\tau)}\approx 1$. In this case,
\begin{align}
w(\gamma(t-\tau))=e^{-2\pi j f_{0}(\gamma-1)(t-\tau)}w(t-\tau).
\label{eq:observation}
\end{align}
It follows from \eqref{eq:observation} that the WAF is, equivalently,
\begin{align}
\chi_{w}^{1}(\tau, \nu) = \sqrt{\gamma}e^{-2\pi j f_{0}(\gamma-1)\tau}\int_{-\frac{T_{c}}{2}}^{\frac{T_{c}}{2}} w(t) w^{*}(t-\tau) e^{-j \nu t} dt.
\label{eq:finalWAF}
\end{align}
There is a scalar term in front of the integral to account for a change in amplitude of the reflected signal as it is stretched. The amplitude scaling is necessary for the conservation of energy when the waveform is stretched in time.
Note that, like its narrowband counterpart, the definition of WAF is also not unique. The form in \eqref{eq:finalWAF} (hereafter, $\chi_{w}(\tau, \nu)$) is due to Kelly-Wishner \cite{kelly1965matched} and Altes \cite{altes1970methods,altes1973some}. A second form appears as wavelets in the works by Daubechies \cite{daubechies1988time}; Auslander and Gertner \cite{auslander1990wide}; Miller \cite{miller1991topics}:
\begin{align}
\chi_{w}^{2}(\tau, \nu)=\frac{1}{\sqrt{\gamma}} \int_{-\frac{T_{c}}{2}}^{\frac{T_{c}}{2}} w(t) w^\ast\left(\frac{t-\tau}{\gamma}\right)e^{-j \nu t} dt.
\end{align}
Speiser \cite{speiser1967wide} and Chaiyasena et al. \cite{chaiyasena1992wavelet} deal with the following WAF, where the dilation is inside the integral:
\begin{align}
\chi_{w}^{3}(\tau, \nu)=\sqrt{\gamma} \int_{-\frac{T_{c}}{2}}^{\frac{T_{c}}{2}} w(t) w^\ast(\gamma t-\tau) e^{-j \nu t} dt.
\end{align}
In \cite{heil1989continuous,fowler1991signal}, the dilation is included as an exponential (similar to a Doppler shift):
\begin{align}
\chi_{w}^{4}(\tau, \nu)=e^{\frac{\nu}{2}} \int_{-\frac{T_{c}}{2}}^{\frac{T_{c}}{2}} w(t) w^\ast\left(e^{-\nu} t-\tau\right) e^{-j \nu t}dt.
\end{align}
In this paper, we concern ourselves with the definition in \eqref{eq:finalWAF}.
Consider a baseband waveform constructed by phase coding translates of $w(t)$ with a unimodular sequence $x[n]$ of length $L$ as
$$
x(t)=\sum_{\ell=0}^{L-1} x[\ell] w\left(t-\ell T_{c}\right),
$$
with the energy
$$
\begin{aligned}
E_{x} &=\int_{\mathbb{R}}|x(t)|^{2} d t =\left(\sum_{\ell=0}^{L-1} x[\ell]^{2}\right) \int_{-\frac{T_{c}}{2}}^{\frac{T_{c}}{2}}|w(t)|^{2} d t =L.
\end{aligned}
$$
The WAF $\chi_{x}(\tau, \nu)$ of $x(t)$ becomes
\begin{align}
\chi_{x}(\tau, \nu)&= \sqrt{\gamma}\int_{-\frac{T_{c}}{2}}^{\frac{T_{c}}{2}} x(t) x^{\ast}(\gamma(t-\tau)) e^{-j \nu t} dt \nonumber\\
&= \sqrt{\gamma}\int_{-\frac{T_{c}}{2}}^{\frac{T_{c}}{2}} \sum_{\ell,\ell^{\prime}=0}^{L-1} x[\ell] w\left(t-\ell T_{c}\right) x^{*}[\ell^{\prime}] \nonumber\\
&\hspace{8em}\times w^{*}\left(\gamma t-\gamma\tau - \ell^{\prime} T_{c}\right) e^{-j \nu t} dt \nonumber\\
&=\sum_{\ell,k=0}^{L-1} A_{x}^{\ell}\left(k, \nu T_{c}\right) \chi_{w}\left(\tau- \frac{T_{c}(k+ \ell (\gamma-1))}{\gamma} , \nu\right),
\end{align}
where $\displaystyle A_{x}^{\ell}\left(k, \nu T_{c}\right)= x[\ell] x^{*}[\ell-k] e^{-j \nu \ell T_{c}}$.
Next, we extend WAF to complementary sequence pair \cite{dang2020coordinating}. Denote a binary sequence of length $N$ by $P=\left\{p_{n}\right\}_{n=0}^{N-1}$ and the complement of $p_{n}$ by $\bar{p}_{n}=1-p_{n}$. The $P$-pulse train $x_{P}(t)$ transmitted at a pulse repetition interval $T$ is
\begin{align}
\label{eq:biPulseTrain}
x_{P}(t)=\sum_{n=0}^{N-1} p_{n} x(t-n T)+\bar{p}_{n} \tilde{x}(t-n T).
\end{align}
Multiplying \eqref{eq:biPulseTrain} by a discrete-valued real nonnegative sequence $Q=\left\{q_{n}\right\}_{n=0}^{N-1}$, $\left(q_{n} \geq 0\right)$ of length $N$ gives the $Q$-pulse train $x_{Q}(t)$ is
\begin{align}
x_{Q}(t)=\sum_{n=0}^{N-1} q_{n}\left[p_{n} x(t-n T)+\bar{p}_{n} \tilde{x}(t-n T)\right].
\label{eq:xq}
\end{align}
Transmitting $x_{P}(t)$ and correlating the return with $x_{Q}(t)$ yields
\begin{align}
\chi_{P Q}(\tau, \nu) &=\int_{\mathbb{R}} x_{P}(t) x_{Q}^{\ast}(\gamma(t-\tau)) e^{-j \nu t} d t \\
&\approx\frac{1}{\sqrt{\gamma}}\sum_{n=0}^{N-1} q_{n} e^{-j \nu n T}\left[p_{n} \chi_{x}(\tau, \nu)+\bar{p}_{n} \chi_{\tilde{x}}(\tau, \nu)\right],
\label{eq:initWAF}
\end{align}
where range aliases at offset $\pm n T, n=$ $1,2, \ldots, N-1$ are ignored and the last approximation follows from the fact that $\nu \ll 1/T$ so that the phase rotation within one coherent processing interval (CPI) (\emph{slow time}) can be approximated as a constant. Our goal is to obtain the sequences $p_{n}$ and $q_{n}$ from a given WAF.
\section{Group-Theoretic Connections of WAF}
\label{sec:grp}
The WAF in \eqref{eq:WAF} is related to a representation of the affine or $a\cdot x + b$ group.
The $a\cdot x + b$ group is a set $\mathbb{R}\setminus \{0\}\times \mathbb{R}$ equipped with the product
\begin{align}
(a,b) \circ (a^{\prime},b^{\prime}) = (a\cdot a^{\prime}, b + a\cdot b^{\prime}).
\end{align}
The unity of the group is $(1,0)$ because
\begin{align}
(1,0) \circ (a,b) &= (a,b) \nonumber\\
(a,b) \circ (1,0) &= (a,b).
\end{align}
The right and left inverse of $(a,b)$ is $\left(\frac{1}{a},-\frac{b}{a}\right)$ since
\begin{align}
(a,b) \circ \left(\frac{1}{a},-\frac{b}{a}\right) &= (1,0) \nonumber\\
\left(\frac{1}{a},-\frac{b}{a}\right)\circ (a,b) &= (1,0).
\end{align}
The group is non-commutative
\begin{align}
(a,b) \circ (a^{\prime},b^{\prime}) &= (a\cdot a^{\prime}, b + a\cdot b^{\prime}) \nonumber\\
(a^{\prime},b^{\prime}) \circ (a,b) &= (a\cdot a^{\prime}, b^{\prime} + a^{\prime}\cdot b).
\end{align}
From the definition of this group, we now introduce unitary representation.
\subsection{Unitary Representation of WAF}
A representation of the group $\mathbb{R}\setminus \{0\}\times \mathbb{R}$ in the space $L^{2}(\mathbb{R})$ is a pair $\{ \mathcal{U},L^{2}(\mathbb{R}) \}$ where $\mathcal{U}$ is a mapping which assigns to every element $(a,b) \in \mathbb{R}\setminus \{0\}\times \mathbb{R}$ a linear mapping $\mathcal{U}_{(a,b)}: L^{2}(\mathbb{R}) \rightarrow L^{2}(\mathbb{R})$ such that
\begin{align}
\mathcal{U}_{(1,0)} &= 1_{L^{2}(\mathbb{R})} \nonumber \\
\mathcal{U}_{((a,b) \circ (a^{\prime},b^{\prime}))} &= \mathcal{U}_{(a,b)} \circ \mathcal{U}_{(a^{\prime},b^{\prime})},
\end{align}
for all $(a,b) \in \mathbb{R}\setminus \{0\}\times \mathbb{R}$. In particular,
\begin{align}
\mathcal{U}_{(a,b)} \circ \mathcal{U}_{(\frac{1}{a},-\frac{b}{a})} = \mathcal{U}_{(1,0)}.
\end{align}
If $L^{2}(\mathbb{R})$ is a Hilbert space, a linear representation $\{\mathcal{U},L^{2}(\mathbb{R}) \}$ is said to be unitary if the automorphism $\mathcal{U}_{(a,b)}$ forms a unitary operator of $L^{2}(\mathbb{R})$ for all $(a,b) \in \mathbb{R}\setminus \{0\}\times \mathbb{R}$.
Now consider that $\mathcal{U}$ defines a morphism $(a,b)\rightarrow \mathcal{U}_{(a,b)}$ of the group $\mathbb{R}\setminus \{0\}\times \mathbb{R}$ into a unitary group $\underline{\mathcal{U}}(L^{2}(\mathbb{R}))$ of $L^{2}(\mathbb{R})$ operators such that
\begin{align}
\mathcal{U}_{(a,b)^{-1}}= \left( \mathcal{U}_{(a,b)} \right)^{*}, \forall (a,b)\in \mathbb{R}\setminus \{0\}\times \mathbb{R}.
\end{align}
Unitary is equivalent to
\begin{align}
\lVert \mathcal{U}_{(a,b)} f \rVert = \lVert f \rVert,
\end{align}
for all $(a,b)\in \mathbb{R}\setminus \{0\}\times \mathbb{R}; f\in L^{2}(\mathbb{R}),$ or
\begin{align}
\langle \mathcal{U}_{(a,b)} f, \mathcal{U}_{(a,b)} g \rangle = \langle f,g \rangle,
\end{align}
for all $(a,b)\in \mathbb{R}\setminus \{0\}\times \mathbb{R}; f,g\in L^{2}(\mathbb{R})$.
Define the translation representation
\begin{align}
(T_{(1,s)} f)(t) = f(t-s), (1,s) \in \mathbb{R}\setminus \{0\}\times \mathbb{R}.
\end{align}
Then it follows that the above representation $T$ is unitary and commutative
\begin{align}
T_{(1,s)\circ (1,s^{\prime})} = T_{(1,s + s^{\prime})} &= T_{(1,s^{\prime}) \circ (1,s)} \nonumber\\
&=T_{(1,s)}\circ T_{(1,s^{\prime})}.
\end{align}
The unitary of the translation representation follows from
\begin{align}
\langle T_{(1,s)}h,T_{(1,s)}g \rangle &= \int_{-\infty}^{\infty} h(t-s)g(t-s) dt \nonumber\\
&=\langle h, g \rangle.
\end{align}
Define the dilation representation by
\begin{align}
(D_{\lambda,0}h)(t) = \frac{1}{\sqrt{\lvert \lambda \rvert}} h\left( \frac{t}{\lambda}\right),
\end{align}
for all $(\lambda,0)\in \mathbb{R}\setminus \{0\}\times \mathbb{R}$. It is easy to that the above representation $D$ is unitary and commutative
\begin{align}
D_{(\lambda,0)} \circ D_{(\lambda^{\prime},0)} &= D_{(\lambda,0) \circ (\lambda^{\prime},0)} \nonumber\\
&=D_{(\lambda \lambda^{\prime},0)},
\end{align}
and
\begin{align}
D_{(\lambda^{\prime},0)} \circ D_{(\lambda,0)} &= D_{(\lambda^{\prime},0) \circ (\lambda,0)} \nonumber\\
&=D_{(\lambda \lambda^{\prime},0)}.
\end{align}
The unitary of the dilation representation follows from
\begin{align}
\langle D_{(\lambda,0)}h,D_{(\lambda,0)}g \rangle &= \int_{-\infty}^{\infty} \frac{1}{\lambda}h\left(\frac{t}{\lambda}\right) g\left(\frac{t}{\lambda}\right) dt \nonumber\\
&= \int_{-\infty}^{\infty} h(s) g(s) ds = \langle h, g \rangle,
\end{align}
where a change of variables was needed, i.e. $s = \frac{t}{\lambda}$.
Considering the translation and dilation representations we are ready to define the WAF based on $T$ and $D$. To this end, we consider the product of dilation and translation operators in the set of unitary representations
\begin{align}
DT_{(\lambda,s)} \mathrel{\ensurestackMath{\stackon[1pt]{=}{\scriptstyle\Delta}}} D_{(\lambda,0)} \circ T_{(1,s)},
\end{align}
such that for any $h\in L^{2}(\mathbb{R})$, we have
\begin{align}
(DT_{(\lambda,s)} h)(t) &= D_{(\lambda,0)} \circ (T_{(1,s)} h)(t) \nonumber\\
&= (D_{(\lambda,0)} h)(t-s) \nonumber\\
&= \frac{1}{\sqrt{\lvert \lambda \rvert}} h\left( \frac{t-s}{\lambda} \right).
\end{align}
Observe that the product between translation and dilation representations is not commutative
\begin{align}
( T_{(1,s)} \circ D_{(\lambda,0)} h)(t) &= \frac{1}{\sqrt{\lvert \lambda \rvert}} h\left( \frac{t-\lambda s}{\lambda} \right) \nonumber\\
&\neq ( D_{(\lambda,0)} \circ T_{(1,\lambda s)} h)(t).
\end{align}
We now introduce the notation
\begin{align}
h^{(\lambda,s)}(t) &\mathrel{\ensurestackMath{\stackon[1pt]{=}{\scriptstyle\Delta}}} ( T_{(1,s)} \circ D_{(\lambda,0)} h)(t) \nonumber\\
&\mathrel{\ensurestackMath{\stackon[1pt]{=}{\scriptstyle\Delta}}} \frac{1}{\sqrt{\lvert \lambda \rvert}} h\left( \frac{t-s}{\lambda} \right).
\end{align}
Thus, the WAF in \eqref{eq:WAF} can be defined based on the following inner product with a $w(t)$ baseband pulse shape with duration limited to a chip interval $T_{c}$ and unit energy
\begin{align}
&\langle w,w^{(1/\gamma,\tau)} \rangle \nonumber\\
&=\sqrt{\gamma} \int\limits_{-\frac{T_{c}}{2}}^{\frac{T_{c}}{2}} w(t) w^{*}\left( \gamma (t-\tau) \right) dt \nonumber\\
&=\underbrace{\sqrt{\gamma} e^{-2\pi j f_{0}(\gamma-1)\tau}\int\limits_{-\frac{T_{c}}{2}}^{\frac{T_{c}}{2}} w(t) w^{*}(t-\tau) e^{-j \nu t} dt}_{\chi_{w}^{1}(\tau, \nu)},
\label{eq:design}
\end{align}
which the second comes from \eqref{eq:observation} leading to the same WAF as in~\eqref{eq:finalWAF}.
\subsection{Wavelet Expansion and WAF}
The unitary representation of WAF is connected with the wavelet expansion. Define points of the grid from constants $\gamma_{0},\tau_{0}>0$, $\gamma\not =1,0$. The points of the grid are
\begin{align}
\frac{1}{\gamma_{m}} = \frac{1}{\gamma_{0}^{m}} \text{ and } \tau_{mn} = n\tau_{0}\frac{1}{\gamma^{m}},
\label{eq:grid}
\end{align}
for $m,n\in \mathbb{Z}$. Define the function on the grid by the discrete translation and dilation operators
\begin{align}
h_{mn}(t) &= ( D_{(1/\gamma_{m},0)} \circ T_{(1,\tau_{mn})} h)(t) \nonumber\\
&=\frac{1}{\sqrt{\lvert \lambda_{0}^{m} \rvert}} h\left( \frac{t}{\lambda_{0}^{m}} -n\tau_{0} \right).
\label{eq:wavelet}
\end{align}
Observe that \eqref{eq:wavelet} follows the structure of the wavelet case in \cite{daubechies1990wavelet}. The implication is that we can build a frame in order to design the waveforms $x_{P}(t)$, and $x_{Q}(t)$ in \eqref{eq:biPulseTrain} and \eqref{eq:xq}, respectively.
In order to build a frame based on wavelet expansion select a constant $K>0 $ and define the operator
\begin{align}
P(u(t)) = I - \frac{2\sum_{m,n} \langle h_{mn} , u\rangle h_{mn}(t)}{K},
\end{align}
where $I$ is the identity operator. Then, from \eqref{eq:biPulseTrain}, the frame $\tilde{h}_{mn}$ is obtained using $\tilde{h}_{0n}$ by applying the dilation operation as
\begin{align}
\tilde{h}_{mn}(t) &= D_{(1/\gamma_{m},0)}\tilde{h}_{0n}(t) \nonumber\\
&=\frac{1}{\gamma_{0}^{m/2}}\tilde{h}_{0n}\left(\frac{1}{\gamma_{0}^{m}}t\right),
\end{align}
where
\begin{align}
\tilde{h}_{0n}(t) = \left(\frac{2}{K} \sum_{k} P^{k}\right) h_{0n}(t).
\end{align}
Thus, using this expansion we have that the signal $u(t)$ can be represented as \cite{daubechies1990wavelet}
\begin{align}
u(t) = \sum_{m,n} \langle h_{mn} , u\rangle \tilde{h}_{mn}(t).
\label{eq:expansion}
\end{align}
Observe that from \eqref{eq:expansion}, we have that the term $\langle h_{mn} , u\rangle $ can be understood as the WAF. Following \eqref{eq:design}, when $w(t) = u(t)$ and $w^{(1/\gamma,\tau)} = h^{(1/\gamma,\tau)}$. Therefore, the wavelet expansion is applicable for designing the waveforms $x_{P}(t)$, and $x_{Q}(t)$. To this end, we use the following isometry that the frame $\tilde{h}_{mn}(t)$ satisfies:
\begin{align}
A\lVert u(\cdot) \rVert^{2} \leq \sum_{m,n} \lvert \langle h_{mn} , u\rangle \rvert^{2} \leq B \lVert u(\cdot) \rVert^{2},
\end{align}
for some constants $A>0$ and $B<\infty$. To better represent the signal $u(t)$ using \eqref{eq:expansion}, the ratio $B/A$ needs to be small; ideally, $B/A=1$ \cite{daubechies1990wavelet}. Hence, we pursuit the minimization of $B/A$ by properly selecting the sequences $p_{n}$ and $q_{n}$ in \eqref{eq:xq} since they are the only free parameters of the waveforms $x_{P}$ and $x_{Q}$. The analytical estimation of $A$ and $B$ is usually computationally expensive. Therefore, we target achieving the Welch bound. This is equivalent to minimizing the ratio $B/A$ \cite{xia2005achieving}. We propose to design the sequences $p_{n}$ and $q_{n}$ using a strategy relying on difference sets that have been shown to precisely achieve the Welch bound \cite{xia2005achieving}.
\section{Numerical Example}
\label{sec:numexp}
\begin{figure}[t!]
\centering
\includegraphics[width=1.0\linewidth]{AF.png}
\caption{\footnotesize{Wideband cross-AF for the designed signals $x_{P}$ and $x_{Q}$.}}
\label{fig:orthoini}
\end{figure}
Difference sets have been well studied in the combinatorial design theory \cite{dinitz1992contemporary,aigner2012combinatorial}. They are known to exist for certain cases and a comprehensive repository of difference sets is provided in \cite{list2021}. As an illustration of our approach, we employ the Singer difference sets \cite{singer1938theorem} to design the sequences $p_{n}$ and $q_{n}$ in \eqref{eq:xq}.
Consider the prime number $q=11$ and a power constant $d=2$. Then, the size of the sequences is directly determined from these values as $$N=\frac{q^{d+1}-1}{q-1}=133.$$ Define $C_{1} = \frac{q^{d}-1}{q-1}$ and $C_{2}=\frac{q^{d-1}-1}{q-1}$. This yields a $(N,C_{1},C_{2})$-difference set. Under this setup, the resultant difference set is \begin{align}
\mathcal{F} = \{0, 1, 8, 14, 30, 45, 47, 56, 66,106,109,129 \}.
\label{eq:set}
\end{align}
From \eqref{eq:design}, the WAF in \eqref{eq:initWAF} corresponds to the inner product between $x_{P}$ and $x_{Q}$. The function uses the product $p_{n}q_{n}$ as
\begin{align}
&\left \lvert \langle x_{P},x_{Q}^{(1/\gamma,\tau)} \rangle \right \rvert \equiv \chi_{P Q}(\tau, \nu) \nonumber\\
&\approx \frac{1}{\sqrt{\gamma}}\sum_{n=0}^{N-1} q_{n} e^{-j \nu n T}\left[p_{n} \chi_{x}(\tau, \nu)+\bar{p}_{n} \chi_{\tilde{x}}(\tau, \nu)\right] \nonumber\\
&\leq \frac{1}{\sqrt{\gamma}}\sum_{n=0}^{N-1} q_{n}p_{n}\lvert \chi_{x}(\tau, \nu) \rvert + q_{n}(1-p_{n})\lvert \chi_{\tilde{x}}(\tau, \nu) \rvert.
\end{align}
Therefore, in order to minimize the ratio $B/A$ of the resultant frame applied to $x_{Q}$ (following the strategy explained in the previous section), we need to design $p_{n}q_{n}$. To this end, we set $p_{n}q_{n}=1$ for all $n\in \mathcal{F}$, and $p_{n}q_{n}=0$ for all $n \in \{0,\dots,N \}\setminus \mathcal{F}$. From these constraints, we can determine $(p_{n},q_{n})$ as
\begin{equation}
(p_{n},q_{n}) = \left\lbrace \begin{array}{ll}
(1,1) & \text{ if } n \in \mathcal{F} \\
(n\mod 2,n+1 \mod 2) & \text{ if } n\not \in \mathcal{F}
\end{array} \right..
\end{equation}
The resultant wideband cross-AF is plotted in Fig.~\ref{fig:orthoini}.
In the context of tight frames in \cite{tropp2008conditioning,mosher2012non}, it has been shown that, if the Welch bound is reached, with overwhelming probability we are able to guarantee the reconstruction. It turns out that difference sets can provide patterns that reach the Welch bound \cite{xia2005achieving}. For the particular scenario we considered, this bound is $\mu = \sqrt{\frac{N-C_{1}}{C_{1}(N-1)}}=\sqrt{\frac{121}{1584}}\approx 0.27$. Therefore, $\frac{B}{A}=1+\mathcal{O}(\mu)$. We remark that this strategy is limited by the calculation of the difference set in \eqref{eq:set}, which is computationally demanding. In the future, we intend to develop a numerical algorithm to estimate new difference sets to produce higher values of $N$.
\section{Summary}
\label{sec:summ}
We analytically demonstrated design procedure a wideband radar waveform using group-theoretic strategy via difference sets. We first mathematically expressed the waveform's WAF as a coefficient function of the unitary representation of the group $a\cdot x + b$. From this representation, we connected the wavelet expansions of frame to the WAF. This allowed us to derive a strategy to design two binary sequences in order to minimize the ratio of the bounding constant of the wavelet frame so constructed. The analytical estimation of these bounds is usually computationally expensive. As an alternative, we targeted achieving the Welch bound using difference sets. Our proposed group-theoretic waveform design guarantees a near-optimal reconstruction.
\begin{comment}
The $\chi_{P Q}(\tau, \nu)$ is well approximated by
$$
\begin{aligned}
\chi_{P Q}(\tau, \nu) &=\sum_{n=0}^{N-1} q_{n} e^{-j \nu n T} \\
\times & \sum_{k=-(L-1)}^{L-1}\left[p_{n} C_{x}[k]+\bar{p}_{n} C_{y}[k]\right] C_{\Omega}\left(\tau-k T_{c}\right)
\end{aligned}
$$
A key fact to take from $(18)$ is that it is a linear combination of translates of $C_{\Omega}$, and of course that this function has support twice the chip-length about the origin. Accordingly, it is convenient to leave this aside and consider
$$
\begin{array}{l}
\chi_{P Q}(k, \theta) \\
\quad=\sum_{k=-(L-1)}^{L-1}\left[p_{n} C_{x}[k]+\bar{p}_{n} C_{y}[k]\right] \sum_{n=0}^{N-1} q_{n} e^{-j \nu T}
\end{array}
$$
which, after some simple algebraic manipulations, we can write as
$$
\begin{aligned}
\chi_{P Q}(k, \theta)=& \frac{1}{2}\left[C_{x}[k]+C_{y}[k]\right] \sum_{n=0}^{N-1} q_{n} e^{j n \theta} \\
&-\frac{1}{2}\left[C_{x}[k]-C_{y}[k]\right] \sum_{n=0}^{N-1}(-1)^{p_{n}} q_{n} e^{j n \theta}
\end{aligned}
$$
where $\theta=\nu T$ is the relative Doppler shift over a PRI $T$.
\end{comment}
\bibliographystyle{IEEEtran}
|
\section{Introduction}
\label{s.int}
Distribution crises are extreme situations where the supply of a critically important good is so small that the actors realistically do not even have the necessary minimum available to ensure function. Such situations have two basic characteristics from a distribution point of view:
{\bf 1.} The {\em ethical fairness} of the distribution of supply of critical goods is important. According to the rules of fairness, which are declared in advance, it is possible to hypothetically distribute the supply of a critical commodity fairly among organizations.
In other words, let's imagine that buyers have {\em rights to purchase a fair amount} of the commodity in question. The amount of rights to purchase the commodity corresponds to the amount of the commodity available on the market, and therefore the typically assigned rights are very few, i.e., significantly less than the minimum necessary to run the organizations.
Studying the determination of a fair allocation of scarce resources for each crisis individually according to the needs of individual facilities (sometimes e.g. facilities for seniors, sometimes paediatric facilities) in such a way as to maximise the benefit of the available material and to distribute its limited amount among all facilities according to their needs on the basis of a fair distribution model (i.e. a fair distribution of rights in a specific situation) is one of the important outcomes of our project.
In the next text, we assume that such a fair allocation of rights is already defined.
{\bf 2.} The existence of a {\em market for a critical commodity} is another essential aspect of the distribution. Lack leads to a significant increase in price, organizations try to obtain more than a fair amount to cover their needs, and this is always at the expense of other participants. A free market leads to a narrowing of distribution.
Experience shows that even centrally controlled distribution is not socially advantageous, for instance distributors do not have sufficient advantage in such an environment and try to leave it.
Since neither the free market nor the decision-making of the central authority is the most socially advantageous solution, we propose a hybrid model based on the autonomous behavior of the participants.
In this paper, we will partition the buyers into two main categories: {\em Active buyers} are market participants, who can be richer or more assertive or risk-seeking.
{\em Passive buyers} are hesitant or risk-averse or poorer market participants. For simplicity, we will continue in this paper to use only the terms {\em active and passive buyers}, without specifying their motivation in more detail.
\medskip
{\em Since the flow of money and critical goods in a free market during
a distribution crisis is mainly concentrated between sellers and active buyers, our aim is to extend the flow to passive buyers, in order to avoid situations where the distribution of scarce strategic material reaches only the most active or the wealthiest.}
\medskip
Our strategy may be thought of as analogous to the basic strategy of \cite{DKA} which, however, studies a different setting: maximising the potential of the marketplace itself to serve as a re-distributive tool.
\subsection{Main idea}
\label{sub.mi}
We will now describe the main idea of our solution.
Our proposed system of distribution of scarce strategic goods in a crisis is formed by a sequence of markets over time. In each market, all buyers have rights to purchase the commodity in question, the amount of rights of each participant corresponds to a fair distribution of the current offer.
In each market of the sequence, both the critical commodity and the rights are traded. There is only one limitation: at the end of each market, each buyer must have at least as many rights as the critical goods.
There are three basic types of buyers. (1) The buyer buys exactly as much of the good on the market as it has assigned rights. (2) The buyer (active) buys more goods than it has assigned rights, and it has to buy additional rights from other market participants. (3) The buyer (passive) buys less goods than it has assigned rights and sells its remaining rights.
\medskip
{\em In this way, active buyers get more of the commodity, much as they would get on the free market.
But at the same time, they will pay for the rights to passive buyers, thereby expanding the flow of money in the market, and passive buyers will effectively get extra funds to buy the commodity or rights in the next market following the current one.
In each market, buyers will get new rights to buy the commodities on a fair basis and independently of the market that has just ended. The resulting benefit for all market participants, i.e. participating buyers and suppliers, increases by the widening of the flow of money and critical goods and is higher than by trading on the open market.}
\medskip
{\bf An overview of our distribution system:}
Our model consists of a sequence of markets over time: the first market takes place at time one, when it ends, the second market begins and so on. Each market has two parts:
1. Sellers announce the supply for the good, buyers announce the demand for the good, which greatly exceeds the announced supply.
On the basis of this input, the system assigns, according to pre-agreed rules of fairness, to each buyer a fair amount of {\em right to the good}.
2. Then both the good and the right are traded with the unique condition: at the end of each market, each buyer must have sufficient amount of the right for the acquired good. The idea is that some buyers want to buy more of the good right away, so according to the rules of the market, they buy from hesitant buyers an amount of rights assigned to them. With this money saved, even those hesitant can buy the good in the next market, because the rights are recalculated before each market, and thus renewed.
\subsection{Frustration and Willingness to Pay}
\label{sub.fru}
We need to introduce some measures indicating how successful the proposed hybrid mechanism is. We recall that our goal is to widen the flow of the critical good in the time of a distribution crisis.
For a single market, we define the {\em frustration} of a buyer $b$ as the ratio $a/r\leq 1$ where $r$ is the amount of the rights assigned to $b$ and $a$ is the difference between $r$ and the amount of the good purchased by $b$, if this is at least zero, and it is defined to be zero otherwise.
We note that the notion of frustration extends to normal times. In normal times, the amount of assigned rights is equal to the demand and moreover $b$ can buy all the goods it demands. Hence, its frustration is zero. Our concept of {\em frustration} is somewhat similar to the concept of {\em deprivation cost} introduced in \cite{HPJ}.
Our aim is to show that in a sequence of markets of our system, {\em the frustration of each buyer becomes smaller than it would be in the free market (with analogously defined frustration)}. In order for that to happen it is needed that the frustrated buyers increase their {\em willingness to pay} (formally introduced in section \ref{s.market}). Our proposed mechanism changes the willingness to pay by trading the assigned rights.
\medskip
\subsection{Main Contribution} We suggest a new market mechanism for distribution crises based on autonomous behavior of participants. We initiate the study of properties of our system, in the middle of a crisis. A study of the beginning and the end of a crisis is postponed to future work. Next two chapters describe the model of fairness and the definition of the market. In the fourth section we show that a simple auction-based mechanism approximates the equilibrium of the Market in a strongly polynomial number of steps. In the fifth section we observe how the frustration decreases in the sequence of Markets, confirming the goal of the paper. Finally, in the last section we present some initial results on another (sellers-driven) market mechanism.
\section{Fairness}
\label{s.fair}
In this section we study the rules of the {\em ethical fairness} of the distribution of supply of critical goods. These rules need to be declared in the beginning of each crisis but may differ for different crises.
According to the declared fairness rules, it has to be possible to {\em hypothetically} distribute the available supply of a critical commodity fairly among participants.
Clearly, a fair distribution depends on the total available supply and the individual needs of the participants. We will view a fair distribution as an algorithm. Its input consists of (1) the total available supply and (2) the individual needs of the participants.
We need to address the issue of the {\em truthfulness of the inputs of the fair assignment} since there are situations when it may be advantageous for a buyer to declare a higher than actual need or for a seller to declare lower than actual availability of the good. We are not aware of a general mechanism ensuring truthfulness in our setting. The issue of truthful reporting is discussed in subsection \ref{r1}.
Next we introduce some basic properties of a fair distribution.
\subsection{Fair Distribution: Basic Notions}
We denote the (finite) set of buyers by $B$. We will assume, for simplicity, that there is only one good to be distributed. We will denote by $G$ the set of available good; we denote by $|G|$ the size of $G$. If the good is indivisible then $G$ is a finite set.
Each buyer $b\in B$ has its {\em truthful demand} $d_b$ for the good. A crisis is characterized by $d= \sum_{b\in B} d_b$ being much bigger than the size of $G$.
A {\em distribution} is a function $f= f(|G|,(d_b; b\in B))$ which, given the input consisting of $G$ and $(d_b; b\in B)$ determines for each $b\in B$, the amount $f(b)$ of $G$ assigned to $b$; clearly, $\sum_{b\in B}f(b)$ equals the size of $G$.
We say that $f$ is
\begin{itemize}
\item
{\em Monotone.} If $b\in B$ and $x\leq x'$ then $f(x,(d_b; b\in B))\leq f(x',(d_b; b\in B))$.
\item
{\em Consistent.} If $b,b'\in B$ then the distribution $f(f(b)+ f(b'), d_b, d_{b'})$ is $f(b), f(b')$.
\item
{\em Self-dual.} Loss, i.e., $d_b- f(b)$ is distributed in the same way as $f(b)$.
\item
{\em Fair} if it is monotone, consistent and self-dual.
\end{itemize}
Studying fairness differs for the divisible and indivisible goods. In this paper we restrict ourselves to the indivisible goods, but we have in mind the case of critical good needed in large quantities, like respirators, and thus it is almost liquid. Hence, for fairness concepts, we take inspiration from the divisible case.
\subsubsection {Case of Divisible Goods}
\label{sub.div}
We consider two distributions which satisfy the three properties above and are also efficiently computable: the {\em proportional distribution} (PD) and the {\em contested garmet distribution} (CGD).
\begin{definition}
\label{def.cg}
The constrained equal distribution for $(|G|, d_1, \ldots, d_n)$ is given by the following recursive procedure: if there is $i$ such that $d_i< |G|/n$ then assign $d_i$ to $i$ and distribute the rest to the remaining participants in the same way, else give $|G|/n$ to each participant.
The {\em contested garmet} (CGD) is a distribution $f$ of a {\em divisible good} which is monotone, consistent, self-dual and satisfies: If $|G|\leq (d_1+\ldots d_n)/2$ then $f$ coincides with the constrained equal distribution for $(|G|, d_1/2, \ldots, d_n/2)$.
\end{definition}
\begin{theorem} [Aumann, Maschler \cite{AM}]
\label{thm.1}
The CGD is unique and there is a polynomial algorithm that finds it.
\end{theorem}
\subsubsection{Optimisation of fairness}
\label{sub.oopt}
There are many fair distributions of divisible goods. We can choose a preferred one by {\em optimising} a function over the set of fair distributions. A crisis can have many different forms and according to features of a crisis, we can adopt the fairness distribution by optimising different functions.
From the ethical point of view, an approach maximising social welfare is preferred for a critical distribution, where we consider other
parameters of the current crisis, not only the need itself. In addition, for similar actors with similar needs, a uniform
approach is preferred.
From a welfare perspective, an egalitarian welfare distribution does not require to distribute scarce resources equally, since equality of welfare is different from equality of resources and is morally valuable as a goal.
Hence, our approach is consistent with both, the egalitarian ethical perspectives via equality of welfare in society, as well as with the utilitarian ethical perspectives that emphasize maximising the benefits produced by scarce resources, i.e., the greatest total welfare to members of society.
\begin{itemize}
\item
An example of such approach to fair distribution is first to structure buyers according to social preference for the particular crisis and then apply CGD in each part.
\item
Another possible approach looks almost like cheating: respect fairness properties and ethical preferences for the current crisis, and use an optimisation of fairness as a mechanism helping the social welfare, e.g., minimise the total (maximal individual respectively) frustration. For example, assign less rights for the good to buyers with highest willingness to pay.
\end{itemize}
The features of the adapted fair distribution should be generally accepted in the society and the second approach is questionable from this point of view. Optimising fairness of allocating resources is extensively studied nowadays, see e.g. \cite{S}, \cite{V}.
For a survey of fair allocation of scarce resources, see \cite{T}.
\subsubsection{Adaptation to the distribution of indivisible good}
\label{sub.indist}
Distributions of divisible goods can be naturally adopted to distribution of indivisible good for instance as follows:
(1) Find the {\em fractional} distribution as if the good is divisible,
(2) Round down the fractional distribution for the participants,
(3) Distribute the surplus reflecting the society preferences by a chosen optimisation mechanism. A simple possibility is to linearly order the participants and round up the fractional solution for the participants in an initial segment.
As pointed out by Ron Holzman, these adaptations do not preserve the good properties of the original method in the divisible setting but may help the central authority to {\em enhance (its understanding of) the fairness} by treating participants in an unequal but socially beneficial and accepted way.
\section{A Sequence of Markets for one scarce indivisible good}
\label{s.market}
In the previous section we studied mechanisms for a {\em fair distribution} of the limited available amount of the good among all participants, i.e., a fair distribution of {\em rights to the good}.
In this section, each critical episode will consist of a finite sequence of {\em Markets} which happen one after another in time. The participants are divided into buyers and sellers depending on whether they produce or consume the good, not the right. We will assume that for each Market of the sequence, a fair allocation of rights to the buyers is already defined. The good and the right are traded with the only condition that after each market of the sequence ends, each buyer needs to have at least as many items of the right as the items of the good. It remains to specify Markets in detail.
\subsection{A view of a single Market}
\label{sub.m}
Let us describe how a market with items of one scarce commodity called the Good and with items of the Right could work.
The first step towards a practical implementation of a functioning crisis distribution system based on our suggested mechanism is to create a Certified Public Portal (CEP) facilitating trading both in normal and critical times.
For example by the Czech law, in various legal crisis settings the authorities in charge can require all dealings concerning strategic goods in a prescribed portal, and all the production and storage reported.
The Certified Public Portal (CEP) sends out a message to central authorities that a distribution crisis is happening for a commodity called Good.
A central authority reacts by declaring a crisis and declares that CEP is a designed portal for the distribution of the Good during this crisis.
The central authority declares the schedule for trading in the portal:
a. Time period for declaring the demand and the offer in the portal in which trading is frosen. Mechanisms for truthful declarations need to be in place.
b. The portal freezes demands and offers and issues the items of the Right according to the agreed on fair distribution.
c. The portal opens trading with the Good and the Right.
d. End of trading: All the buyers who have more items of the Good than items of the Right are penalised. Unmatched items of the Right disappear. A schedule of next trading is declared.
If new supply of items of the Good appears during the trading, CEP flexibly recalculates and distributes new items of the Right to the buyers.
There needs to be a protocol for maintaining {\em money} obtained by selling items of the Right. It is an ethical requirement that such money stays in the system and is used for buying items of the Good or the Right in the future Markets. This rule also supports enhancing individual willingness to pay by the mechanism of trading the rights. We introduce the third commodity called the Money in the formal definition of Market below.
\subsection{Definition of a Single Market of a Critical Episode}
\label{sub.m}
\begin{itemize}
\item
The participants of each Market of the sequence of Markets of a critical episode are the same, and are partitioned into {\em buyers} and {\em sellers}. We denote by $B$ the set of the buyers and by $S$ the set of the sellers.
\item
In each Market of the sequence, three indivisible commodities will be traded: {\em Good, Right, Money}. We denote by $G$ the set of all the items of the Good, by $R$ the set of all the items of the Right and by $M$ the set of all the items of the Money. The trading is facilitated by selling and buying items of commodities. In these acts, the price of the same commodity may differ. However,
\item
We require that the price of each unit of Money, i.e., of each element of $M$, is always constant.
We denote by $\delta$ the price of the unit of the Money and for simplicity we assume $\delta = 1$.
Another reason to have Money as a commodity is that the utility for Money differs among the participants and we will use this fact for studying the considered sequence of markets of a critical episode. For similar treatment of Money, see \cite {DKA}.
\item
We denote by $u_p(H,x)$ the utility of $x$ items of set $H$ for a participant $p$. All $u_p(H,x)$ in this paper will be monotone.
\item
We will further assume that for a buyer $b$, $u_b(G,x)+u_b(G,y)\geq u_b(G,x+y)$ which is a natural assumption for a critical commodity.
\item
We will further have that for each participant $p$, $u_p(M,x)$ depends linearly on $x$.
\item
Sellers have a positive utility only for Money.
\item
The dynamics of the Market is determined by $u_b(M,x)$ and $u_b(G,x)$, $b$ buyer. These individual utilities are crucial for studying the Market and its outcome and they are not disclosed.
\item
The {\em Willingness to pay} of a buyer $b$ is an important function which, unlike the utility functions, can be observed in the Market. The willingness to pay associates, with a non-negative integer $x$, the number $w_b(x)$ of items of the Money of the same utility as $x$ items of the Good. Formally, $w_b(x)= u_b^{-1}(M, u_b(G,x))$.
\item
In the Market, each participant has an initial endowment of the commodities, and trades them according to its utility function. Let us denote by $m^b, r^b$ the initial endowments of Money and Right for a buyer $b$.
\item
We assume that for each Market, initial endowments of Good, Right and Money, i.e., subsets of $G$, $R$ and $M$ for the buyers and the sellers are known in the market's beginning. {\em Why can we assume this?}
For the Good this follows from truthful reporting of availability of the Good by the sellers.
For the Right this follows from truthful reporting of the demand by the buyers which determines the distribution of the items of the Right to each buyer.
For the Money, it is practical to assume that each of the participants has initially sufficiently large amount of items of Money. This allows us to model broader situations.
\item
For each buyer, the relation of its utility for Good and for Money is crucial. We will assume:
\begin{enumerate}
\item
$m^b\geq 4r^b$,
\item
For each $x\leq r^b$, $u_b(G,x)> 2u_b(M,x)$
\item
For each $x\geq 1/2m^b$, $u_b(M,m^b)> u_b(M,m^b-x)+ u_b(G, x)$.
\end{enumerate}
\item
In order to study the behavior of a Market, we introduce the notion of a {\em solution} and an {\em equilibrium}. A {\em solution} consists of (1) a price vector giving the price per item for each of the three commodities, and (2) a partition of a subset of the union of all the initial endowments into {\em baskets}, one basket for each participant.
Given a solution, we say that the assigned basket of a participant is {\em feasible} if it satisfies: (1) the total price of the basket is at most the total price of its initial endowment and (2) in the basket, the number of items of Good is at most the number of items of Right. A solution is {\em feasible} if all the baskets are feasible.
A solution is an {\em equilibrium} if for each participant, (1) the total price of its basket is equal to the total price of its initial endowment and (2) its utility of its basket is maximum among all feasible sets of items.
\end{itemize}
\subsection{Strategy and coalition proofness}
\label{r1}
Our strategical aim is that the rights are sold as soon as possible so that passive buyers get funds without delay and can soon buy the Good in subsequent markets.
We require that after each Market of the sequence, for each buyer there is a check whether it has at least as many items of the Good as of the Right.
Is this a feasible process? We list features of the proposed system supporting the strategy and coalition proofness.
(1) The distribution system is implemented in a certified portal, the history of trading provides indirect mechanisms for (checking) truthful reporting of demand and supply,
(2) The complete history of trading of the Right is known by using tailored data structures,
(3) We suggest to have some special participants which help ensuring strategy and coalition proofness, e.g., a participant in charge of the rights.
(4) It is possible to implement the Market using anonymous mechanisms. In this paper, we study one such {\em buyers-driven} mechanism, see Definition \ref{def.auc} and Corollary \ref{thm.auc}. Studying {\em sellers-driven} mechanism is initiated in the last section.
\begin{definition}
\label{def.auc}
The {\em Couple mechanism} is the following way to implement the Market which is driven by the activity of the buyers: (1) In the beginning, the central authority assigns the items of Good to buyers arbitrarily so that each buyer has the same number of items of Good and Right. Each buyer arbitrarily pairs the items of Good and Right into items of {\em Couple}. (2) The buyers subsequently trade the items of Couple. (3) In the end of trading the prices are cleared, i.e., the price of each item of Couple is equally divided between Good and Right and the sellers obtain the resulting money for their items of Good, and the buyers obtain the resulting money for their items of Right;
(4) An {\em equilibrium} for this mechanism is defined as the market clearing for the trading part of the mechanism.
\end{definition}
\section{Computing Market equilibrium}
\label{s.am}
In this section we gather information on the defined Market in particular we introduce an efficient algorithm for finding an approximate equilibrium.
\subsection{An Auction-based Algorithm}
\label{r5}
We describe an efficient auction based algorithm to find an approximate equilibrium for the Market. The approximation ratio of the algorithm is $1- 2\epsilon$ where $\epsilon$ satisfies, for each buyer $b$,
$1> \epsilon > 2/m^b$.
For the purpose of the algorithm, we introduce one more commodity of indivisible items called the Couple.
Each item of Couple is a pair $(s,t)$ where $s$ is an item of Good and $t$ is an item of Right. We denote by $u_p(C,x)$ the utility of $x$ items of Couple for a participant $p$, and we let $u_p(C,x)= u_p(G,x)$.
The algorithm {\em auctions} items of Couple. We will denote the current price of one item of Good (Right, Money, Couple respectively) by $\pi_G$ ($\pi_R$, $\pi_M$, $\pi_C$ respectively).
\medskip\noindent
{\bf The algorithm description.}
\begin{itemize}
\item
Initially, we let $\pi_M= \pi_G= \pi_R:= 1, \pi_C:= 2$ and each buyer gets the surplus money covering its initial endowment.
\item
The algorithm is divided into {\em iterations}. During each iteration, some items of Couple are sold for $\pi_C$ and some for $(1+\epsilon)\pi_C$, and analogously for Good and Right. The price $\pi_M$ is always constant equal to $1$.
\item
Each iteration is divided into {\em rounds}. An iteration ends when the price of Couple is raised from $\pi_C$ to $(1+\epsilon)\pi_C$.
\item
Round: consider buyers one by one. Let buyer $b$ be considered. Let us denote by $o^b$ the number of items of Couple $b$ currently has, and by $o_+^b$ the number of items of Couple $b$ currently has of price $(1+\epsilon)\pi_C$.
\item
Let $S^b$ be $b$'th optimal basket given the current price $\pi_C$, i.e., a set of items of Couple and of Money of max total utility which $b$ can buy with its cash plus $\pi_Co^b$. Let $s^b$ denote the number of items of Couple in $S^b$.
\begin{enumerate}
\item
If $s^b< o^b$ then $b$ does nothing, the algorithm moves to the next buyer.
[if this happens then the current basket of $b$ is optimal for the previous price $\pi_C/ (1+\epsilon)$ and $o_+^b= 0$.]
\item
If $s^b\geq o^b$ then $b$ buys items of Couple via the {\em Outbid}.
\end{enumerate}
\medskip\noindent
{\bf OUTBID:}
\begin{itemize}
\item
The system buys as many as possible but at most $s^b- o_+^b$ items of Couple for price $\pi_C$ and sells them to $b$ for price $(1+\epsilon)\pi_C$. First, it buys from $b$ itself.
\item
An alternative for buying the items of Couple is to buy separately items of Good and Right and compose them into items of Couple. This happens when some units of Right and (necessarily the same amount of units of) Good are not yet coupled in previous tradings. We observe that this happens only if they are available for the initial price from the participants. In this situation, the system again buys items of Right first from the buyer $b$.
\item
However, the system pays nothing if it buys items of Right from an initial endowment of a buyer for the initial price since the payment is already in the surplus money.
\end{itemize}
\item
If no more Couple is available at price $\pi_C$ after the Outbid then the current round and iteration terminate, $\pi_G:= (1+\epsilon)\pi_G$ , $\pi_R:= (1+\epsilon)\pi_R$ ,
$\pi_C:= (1+\epsilon)\pi_C$ and the surplus money are updated:
everybody who had Good or Right in its initial endowment gets extra surplus money, $\epsilon\pi_G$ or $\epsilon\pi_R$.
\item
If a round went through all players, the algorithm proceeds with next round.
\item
When nobody wants to buy new items of Couple, the whole trading ends. The system takes all items of Money from the buyers, sells them to the buyers and sellers and keeps whatever items remain.
\item
The OUTPUT consists of (1) the collection of the final baskets of each participant and (2) the price-vector of the terminal prices $\pi_G, \pi_R, \pi_C$.
\end{itemize}
\medskip
\subsection{Analysis of the Algorithm}
\label{sub.anall}
\begin{itemize}
\item
We recall that we denote by $m^b, r^b$ the initial endowments of Money and Right for $b\in B$, and we assume:
(1) $m^b\geq 4r^b$,
(2) for each $x\leq r^b$, $u_b(C,x)> 2u_b(M,x)$ and
(3) for each $x\geq m^b/2$, $u_b(M,m^b)> u_b(M,m^b-x)+ u_b(C, x)$.
\item
We denote by $m, r, g$ the total initial endowments of Money, Right and Good and recall that $r= g$.
\item
We note that at each stage of the algorithm, the total surplus is at most $2m$: it is true in the beginning by assumption (1), the surplus is gradually decreased during each iteration and at the end of each iteration, deleted funds are given back.
\end{itemize}
{\em Claim 1.}
In the first iteration, all items of Good and Right are paired.
\begin{proof}
By assumptions (2) all the buyers prefer to buy at least the fair amount of items of Couple for the initial price; by assumption (1) there is enough cash in the initial surplus of each buyer to do it.
\end{proof}
{\em Claim 2.}
After the end of the first iteration: (1) a buyer owes to the system only money for items of Money in its initial endowment and (2) total cash among participants is always at most $m$.
\begin{proof}
The first part follows from Claim 1 since all items of Good and Right are sold and bought at the end of the first interaction. For the second part we note that among sellers, the total cash is $g\pi_G$ since all items of Good were sold in the first iteration and among buyers, the total cash is at most $m-g\pi_G$ since the buyers payed for the items of Good and there is no cash left from the initial endowments of Right since all items of Right were sold and bought in the first iteration.
\end{proof}
{\em Claim 3.}
The number of rounds in an iteration is at most $2+ |B|$.
\begin{proof}
We observe that in each fully completed round, either none of the buyers buys items of Couple and the trading ends, or none of the buyers buys items of Couple in the next round and the trading ends or at least one buyer acts for the last time in this iteration: if in the current round every buyer buys items of Couple only from itself then in the next round nobody buys since nobody got additional cash. Hence let a buyer $b$ buy items of Couple from another buyer in the current round. It means that $b$ gets no additional cash in this iterations since it has no items of Couple for $\pi_C$, otherwise it would have to buy these first by the rules of the outbid and the current round is the last active round for $b$.
\end{proof}
{\em Claim 4.}
The total number of iterations is at most $1+\log_{1+\epsilon}m$.
\begin{proof}
Each iteration raises the price of Couple by the factor of $(1+\epsilon)$ and the max price per unit of Couple cannot be bigger than the total surplus.
\end{proof}
{\em Claim 5.}
Relative to terminating prices, each buyer or seller gets a basket of utility at least $(1-2\epsilon)$ times the utility of its optimal feasible basket.
\begin{proof}
(1) Buyers owe nothing to the system since after the end of the trading they keep only the items of Money they can buy with their remaining cash.
(2) After the end of trading and buying items of Money, each participant is left with less than $1$ dollar by the second part of Claim 2.
(3) The basket of each seller is optimal since all items of Good were sold.
(4) The only reason why the basket of buyer $b$ is not optimal is:
For some items of Couple, $b$ payed $(1+\epsilon)\pi_C$ where $\pi_C$ is the terminal price of Couple.
Let $c$ denote the total number of items of Couple in b's {\em optimal basket} and let $m_b$ denote the total number of items of Money in b's {\em optimal basket}. The utility of the {\em optimal basket} of $b$ is thus $u_b(C,c)+ u_b(M,m_b)$. By assumption (3), $m_b> c\pi_C$.
In $b$'s {\em terminal basket}, there are $c$ items of Couple and at least $m_b- \epsilon\pi_Cc-1$ items of Money. First let $ \epsilon\pi_Cc\geq 1$.
The utility of $b$'s {\em terminal basket} is thus, using the assumption on the linearity of the utility of Money, at least
$u_b(C,c)+ u_b(M,(1-2\epsilon)m_b)= u_b(C,c)+ (1-2\epsilon) u_b(M,m_b)$.
Secondly let $ \epsilon\pi_Cc< 1$.
The utility of $b$'s {\em terminal basket} is thus at least
$u_b(C,c)+ u_b(M,(m_b-2))$ and Claim 5 holds since we assume $1> \epsilon > 2/m^b$.
\end{proof}
This finishes the analysis of the algorithm. We note that the outcome of the algorithm has an interesting feature: the terminal price of Right is equal to the terminal price of Good. The analysis is summarized in the next theorem.
\begin{theorem}
\label{thm.main}
The following holds.
\begin{enumerate}
\item
Assuming an act of a buyer in each round takes a constant time, the auction-based algorithm is strongly polynomial in the input size.
\item
For each participant, its basket assigned by the auction-based algorithm is feasible and its price plus $1$ is bigger than the total price of its initial endowment.
\item
Relative to terminating prices, each buyer or seller gets a basket of utility at least $(1-2\epsilon)$ times the utility of its optimal feasible basket.
\end{enumerate}
\end{theorem}
\begin{proof}
(1) It follows from Claims 3, 4 that the time complexity of the auction-based algorithm behaves asymptotically as $|B|^2(1+\log_{1+\epsilon}m)$.
(2) follows from (2) of the proof of Claim 5. (3) is Claim 5.
\end{proof}
Claim 1 of the above analysis of the auction-based algorithm means that the algorithm also provides an implementation of the Couple mechanism of Definition \ref{def.auc}.
Hence, we get the following
\begin{corollary}
\label{thm.auc}
There is an auction-based implementation of the Couple mechanism which leads in a strongly polynomial (in the input size) number of steps to an approximate equilibrium.
\end{corollary}
\section{Development of Willingness to Pay and Frustration in the Sequence of Markets}
\label{s.wp}
The Markets happen subsequently in a sequence. How the parameters of subsequent Markets of the sequence change? We distinguish two regimes, (1) Deep in the crisis and (2) At the beginning or approaching the end of the crisis.
In this paper we study only the regime (1).
This enables us to assume that the individual utility of the Good does not change in subsequent Markets.
What changes is the individual utility of the Money: buyers who sell items of the Right enter the subsequent Market with more Money and the new items of Money can be used, by the rules, only to buy items of Good or Right. Hence, the utility function of Money changes for these buyers.
We note that, since the individual utility of the Good is unchanged, the change of the individual utility of the Money can equivalently be described as a change of the willingness to pay.
\begin{definition}[development of the willingness to pay]
\label{def.ww}
Let buyer $b$ sell, in the current Market, items of the Right for the total price $y_b$. If $b$ buys Right then we let $y_b= 0$. Let $w_b$ denote its willingness to pay in the current Market. Then for the next Market, its {\em potential willingness to pay}, denoted by $w'_b$, is $w'_b(z):= w_b(z)+ y_b$, $z$ arbitrary.
\end{definition}
\begin{theorem}
\label{thm.wp}
Let us consider a sequence of Markets satisfying (1) the total supply, the individual demand and the individual utility of Good does not change in the sequence, (2) the Markets are implemented by the auction-based algorithm and (3) after a Market of the sequence ends, the willingness to pay in the subsequent Market is equal to the potential willingness to pay. Then in all but possibly the first Market, each individual frustration is at most $1/2$.
\end{theorem}
\begin{proof}
Let a Market $M(i), i\geq 1$ of the sequence ended and let us consider the next Market $M(i+1)$. By the assumptions of the theorem, the auction-based algorithm repeats the steps of Market $M(i)$. After the final step of the auction for $M(i)$,
the willingness to pay of the buyers with zero frustration in $M(i)$ (let us call them {\em happy}) is saturated.
However, the buyers with positive frustration in $M(i)$ (let us call them {\em frustrated}) remain active since they acquired additional funds in $M(i)$. Let $b$ be such a frustrated buyer. We recall that its willingness to pay, given the current price of the Couple (which is equal to the final price of the Couple in $M(i)$), covers the number of items of the Couple which is equal to the number $r_b$ of items of the Right $b$ currently sold (which is equal to the number of items of the Right $b$ sold in $M(i)$). Let us denote by $S$ the set of $r_b$ items of the Couple which contain the items of the Right buyer $b$ sold so far in $M(i+1)$.
Buyer $b$ buys the Couple of $S$ at an increased price which in turn frees funds of active buyers who may buy back. During this process the frustration of $b$ can only go down. Hence, we only need to consider the case that the frustration of $b$ is strictly bigger than $1/2$. Let $0< r'_b< r_b$ be such that $r_b-r'_b$ is equal to the half of the number of assigned rights to $b$.
Let us assume that $b$ doubled the price of the Couple in its first bid, and buys $r'_b$ additional items of the Couple of $S$. Buyer $b$ only needs to buy items of the Good by which $b$ spends all $y_b$ additional items of the Money it got from the previous Market $M(i)$: $2r'_by_b/r_b$ items of the Money for buying $r'_b$ items of the Good from $S$, and $(r_b-2r'_b)y_b/r_b$ items of the Money which are needed to increase the price of items of the Good $b$ already has.
We observe that happy buyers from whom $b$ bought new items of the Couple are not willing to buy back since:
They obtain $2r'_by_b/r_b$ items of the Money for the sold $r'_b$ items of the Couple of $S$ and need $2(r_b-r'_b)y_b/r_b$ items of the Money to increase the price of their remaining $(r_b-r'_b)$ items of the Couple in $S$; clearly by the definition of $r'_b$, $(r_b-r'_b)\geq r'_b$.
Summarizing, the frustration of $b$ is at most $1/2$ by spending in addition only the Money obtained from selling the Right in $M(i)$.
\end{proof}
\section{Seller-Driven Market: Preliminary Results}
Next, we numerically study more realistic seller-driven Market mechanism which is a variant of the double-auction with two kinds of auctioned goods. A continuation of this study is a work in progress \cite{CFLS}.
A sequence of the below described Markets can be thought of as a multi-agent game. We use a state of the art deep reinforcement learning algorithm to approximate optimal strategies of the players. The algorithm tries to find a strategy for each participant which maximises the expected future sum of its utility.
Each agent's strategy is parameterized by a deep neural network. The strategy (policy) is trained by Twin Delayed Deep Deterministic Policy Gradient (TD3) \cite{TD3}.
Let us begin by defining the the Market mechanism.
\begin{definition}[Sellers Market Mechanism]
\label{def.market_mech}
In the beginning of each Market of the sequence,
(1) each buyer $b$ receives $m_b$ additional units of Money, and each seller receives $g$ additional units of Good.
(2) Each seller declares the amount of Good for sale along with the selling price.
(3) Each buyer $b$ declares the demand $d_b$ for Good and (4) the resulting items of Right are distributed according to the CGD, see Definition \ref{def.cg}.
Then, (5) each buyer declares the amount of Rights he is willing to sell along with the selling price.
Each buyer, given the declared quantities and prices, orders a number of offered items of the Good and the Right by declaring its desired prices and volumes for the Good and the Right.
The Market randomly pairs the compatible offers and orders, starting with the cheapest offers. In order to buy items of Good, the buyer needs a sufficient amount of items of Right. Therefore, a buyer first buys items of Good and pairs them with its items of Right until it has no Right left. Then, it buys equal amount of Good and Right. Finally, each buyer $b$ consumes at most its demand $d_b$ of purchased Good and keeps the possible surplus for the future.
\end{definition}
\subsection{Utilities}\label{s.rl_u}
Next, we describe the utilities of participants in a sequence of Markets which models a period of a developed distribution crisis. For a better understanding, we measure the amount of Good and Money in {\em units} in this section, similarly as if they are divisible.
The utility of a seller $s$ {\em in the end of each Market of the sequence} consists of (1) the amount of Money $s$ received during that Market (denoted by $\Delta M_s$) and (2) a small negative utility (denoted by $c_{\rm store}$) per unit of Good the seller still keeps which models the cost of storing the Good and motivates sellers to sell the Good promptly.
At the end of the whole period, the sellers also get some small utility (denoted by $c_{\rm end\ supply}$) per unit of Good they are left with since they would be able to sell the remaining Good eventually.
Utility of the buyers reflect their need to keep a steady supply of Good throughout the period. At the end of each Market, their utility is a linear function of the number of items of Good they have, clipped to some minimum if they have no Good, and maximum if their demand is saturated. At the end of the period, they also get some small utility for the Money they have. Formally,
\begin{definition}[Utility]
Consider a sequence of Markets $X_1, \ldots, X_T$. For $t= 1, \ldots, T$ let (1) $d_b(t)$ denote the demand of buyer $b$ in market $X(t)$, (2) let $M_p(t)$ and $G_p(t)$ be the amount of Money and Good participant $p$ has at the end of Market $X_t$, (3) let $\Delta M_p(t)$ denote the amount of Money $p$ earned in $X(t)$, and (4) we also let $D(T)=1$ and $D(t)=0$ for $t< T$.
For a seller $s$,
\begin{equation}
u_s(t) = \Delta M_s(t) + c_{\rm store} G_s(t) + D(t) c_{\rm end\ supply} G_s(t),
\end{equation}
For a buyer $b$,
\begin{equation}
u_b(t) = c_{\rm in\ stock} \min\left\{1, \frac{G_b(t)}{d_b(t)}\right\} + c_{\rm missing} \max\left\{0, 1 - \frac{G_b(t)}{d_b(t)}\right\} + D(t) c_{\rm money} M_b(t).
\end{equation}
\end{definition}
\subsection{Results}\label{s.rl_results}
In this section, we present results of a particular instance of a sequence of the above described Markets. We aim to model a situation in which there is a large discrepancy between the active and passive buyers. Specifically, we consider a sequence of $T = 10$ Markets with four buyers and four sellers. The demands and incomes of buyers do not change for $t = 1, \ldots, 10$ and are given in Table \ref{tab.buyer_stats}. The sellers receive $g = 1/4 + \mathcal{N}(0,1/40)$ units of Good per Market, where $\mathcal{N}$ is the normal distribution. At the start of the simulation, the participant have no Money or Goods.
\begin{table}[t]
\begin{center}
\begin{tabular}{ c|c|c|c|c }
\hline
Buyer & 1 & 2 & 3 & 4 \\
\hline \hline
$m_b$ & $4/4$ & $5/4$ & $6/4$ & $1/4$ \\
$d_b$ & $1/2$ & $1/2$ & $1/2$ & $5/2$ \\
\hline
\end{tabular}
\end{center}
\caption{Demands and earnings of the buyers.}
\label{tab.buyer_stats}
\end{table}
We use the following values for the constants: $c_{\rm store}=-0.5$, $c_{\rm end\ supply}=0.1$, $c_{\rm in\ stock} = 2$, $c_{\rm missing}=-1$ and $c_{\rm money}=0.1$. These ensure that the utility is mainly influenced by the primary motivation of each participant. The choice $c_{\rm in\ stock} = -2c_{\rm missing}$ aims to keep the mean utility near zero.
The first three buyers together have $93.75\%$ of the Money and thus in the free market will receive $93.75\%$ of the Goods. In contrast, the fair distribution following CGD is uniform if all Goods from the previous Markets are sold. If the sellers choose to offer more then the amount corresponding to uniform distribution, the CGD allocates the surplus Rights to the passive buyer first.
To train the strategy, the agents played $36\ 000$ games, but the system stabilized after only $\approx 20\ 000$ games. The final prices for each Market are shown in Figure \ref{fig:prices}. Let us focus on the Goods first. The desired price for all buyers is larger than the selling price, thus the price set by sellers is acceptable for the buyers. The selling price is higher than the market clearing price\footnote{The market clearing price is four in this case because the sellers get one unit of Goods in total per step, while the buyers get four units of Money.}, which implies that some Goods do not get sold\footnote{Additionally, the sellers choose not to offer all Goods they have.}. Indeed, only $\approx 90\%$ of the Goods are sold. A possible explanation: during training, the agents are forced to explore and thus sometimes take sub-optimal actions. From the sellers' perspective, the selling price thus needs to be higher to ensure buyers are not left with extra Money.
The price of Right generally follows the price of Good and is larger for the active buyers. This suggests that Money the passive buyer receives for selling Right is more important for him compared to the other buyers and so he is willing to decrease the price in order to increase the chance a trade will be completed. As one would expect, the desired price of Right of the last buyer is lower than the selling prices, since he aims to sell his Rights.
The active buyers buy on average $\approx 0.05$ units of Right per step, which is $\approx 20\%$ of the Right assigned to them by the uniform distribution. Specifically, the buyers bought $(0.17, 0.33, 0.7, 0)$ units of Right in total. Figure \ref{fig:prices} shows the evolution of frustration during the sequence of Markets. For the active buyers the frustration is zero, while for the passive buyer it decreases over time. At the end of the sequence, his frustration is $\approx 0.4$ in agreement with Theorem \ref{thm.wp}.
The amount of Goods each buyer purchased during the sequence of Markets was $(2.47, 2.73, 3.1, 1.46)$. The passive buyer was thus able to obtain $\approx 15\%$ of the total amount of Good, while in the free marker he would have Money for only $\approx 6\%$.
\begin{figure}[t]
\centering
\includegraphics[width=0.45\textwidth]{prices.png}
\includegraphics[width=0.45\textwidth]{frustration.png}
\label{fig:prices}
\end{figure}
Figure \ref{fig:prices} shows, Left: selling and desired prices for each Market after convergence. The buyers are arranged from left to right and then from top to bottom.
The selling price of Goods is averaged over all sellers. Right: Evolution of frustration of each buyer during the sequence.
\section{Conclusion} In this paper, we define and study a new market mechanism for distribution crises based on autonomous behavior of participants. The main ingredients of the mechanism are the model of fairness and the definition of Market. We show that a simple auction-based Couple mechanism implementing the Market approximates the equilibrium of the Market in a strongly polynomial number of steps. We also confirm that the frustration decreases in the sequence of Markets implemented by the Couple mechanism, confirming the goal of the paper.
Finally, in the last section we present some initial results on another (sellers-driven) market mechanism implementing the Market. More thorough study of this mechanism is work in progress.
\subsubsection{Acknowledgments} We regularly discuss with several people: Jan Bok, Martin \v{C}ern\'{y}, Jakub \v{C}ern\'{y}, Sameer Desai, Ji\v{r}\'{i} Fink, Iva Holmerov\'{a}, Ron Holzman, Zbyn\v{e}k Loebl, Jitka Soukupov\'{a}.
|
\section{Introduction}
\label{Introduction}
The idea that time may emerge from quantum entanglement was first proposed in 1983 by Don Page and William Wootters \cite{pagewootters,wootters,pagearrow} to solve the, so called, “problem of time”. This arises in the context of canonical quantization of gravity where, according to the Wheeler-DeWitt equation, the whole universe should be in an eigenfunction of the total Hamiltonian \cite{dewitt,isham}. Page and Wootter (PaW) theory splits the total Hilbert space into two entangled subsystems, $C$ and $S$, where $C$ is the clock subspace of an appropriately chosen clock observable. Looking at the relative state (in Everett sense \cite{everett}) of the subsystem $S$, PaW show that the dynamical Schrödinger evolution can be recovered with respect to the clock values. This approach has recently attracted a large interest and has stimulated several generalizations (see for example \cite{lloydmaccone,esp2,vedral,vedraltemperature,macconeoptempoarrivo,interacting,simile,simile2,leonmaccone,review,review2,nostro,nostro2,timedilation,scalarparticles,dirac,foti,brukner,wigner,indefinite,asimmetry,pinto1,pinto2}), including an experimental illustration \cite{esp1}.
The PaW framework can be read as an internalization of the time reference frame, with the clock being an
appropriately chosen physical system and time is considered as \lq\lq what is shown on a quantum clock\rq\rq.
We study here the possibility to extend this protocol in order to internalizing, together,
the temporal and the spatial reference frames. In this approach also space becomes an emerging property of entangled subsystems and the concept of position is recovered relative to \lq\lq what is shown on a quantum rod\rq\rq.
Quantum reference frames for the spatial degree of freedom have been extensively studied in quantum information and quantum foundations (see for example \cite{burnett,QRF1,QRF2,QRF3,QRF4,QRF5,QRF6,QRF7,QRF8,QRF9,QRF10,QRF11,QRF12,QRF13,QRF14,QRF15,QRF16,QRF17,QRF18,QRF19,QRF20,QRF21}). In the quantum gravity literature, it has been suggested that quantum reference frames are needed to formulate a quantum theory of gravity \cite{dewitt,afundamental,QG1,QG2}. In \cite{change1} (see also \cite{change2,change3,change4,change5,change6,change7,change8,change9}) has also been introduced a formalism for describing transformations to change the description between different quantum reference frames in various contexts. Just as the PaW mechanism has been extensively studied in order to describe the temporal degree of freedom, all these works have dealt only with internalization of the space reference frame leaving time as an external parameter in the theory. Only recently, in \cite{giacomini}, has been introduced a fully relational formulation of a $1+1$ dimensional spacetime for the case of a system of $N$ relativistic quantum particles in a weak gravitational field.
In this work we first focus on space and we divide the total Hilbert space in two entangled subsystems, $R$ and $S$, where $R$ is the quatum rod that acts as a spatial reference frame for $S$. A generalization of the PaW mechanism for the spatial degree of freedom has already been addressed in \cite{hoehn1,hoehn2,hoehn3} (see also \cite{change2,change3}). Here we give our own version adopting and generalizing the approach outlined in \cite{pegg} (see also \cite{peggbar}). We consider indeed discrete spectra for the momentum operators and we take the spatial degree of freedom described by POVMs. This choice allow us to recover continuous values for the spatial degrees of freedom even if the momenta have discrete spectra (the generalization to the case of a continuous spectrum is also disussed). We therefore assume the Universe satisfying a constraint on total momentum $\hat{P}_{tot} \ket{\Psi} = 0$. Even if the global position is completely undetermined, a well-defined relative position emerges from the entanglement between the two subsystems $R$ and $S$.
Finally we introduce an additional subsystem $C$ acting as a clock and we consider the Universe satisfying a double constraint: both on total momentum and total energy, that is $\hat{P}_{tot} \ket{\Psi} = 0$ and $ \hat{H}_{tot}\ket{\Psi} = 0$. We show that this framework can be implemented consistently and we thus provide a model of non-relativistic quantum spacetime emerging from entanglement.
In order to facilitate the reading and simplify the notation, in Sections 2, 3 and 4 we consider a single spatial degree of freedom for the subsystems $R$ and $S$. In Section 5 we generalize the results to the case of $3+1$ dimensional spacetime and we discuss some examples.
\section{Emergent Relative Position from Entanglement}
\label{space}
\subsection{General Framework}
We divide the total Hilbert space (the \lq\lq Universe\rq\rq) in two subsystems $R$ and $S$ where
$R$ acts as quantum reference frame for $S$. We consider the two subsystems non-interacting and entangled with global Hamiltonian
\begin{equation}
\hat{H} = \hat{H}_R + \hat{H}_S
\end{equation}
where $\hat{H}_R$ and $\hat{H}_S$ act on $R$ and $S$ respectively. We consider the momenta of $R$ and $S$ having a discrete, bounded, non-degenerate spectra and introduce the spatial degrees of freedom as POVMs. The case of momenta with continuous, unbounded spectrum will be discussed in Section 3.5. We begin by first considering the $R$ subspace.
In introducing the POVMs of space we follow a generalization of the framework outlined in \cite{pegg} (see also \cite{nostro,nostro2}), namely we assume the momentum operator $\hat{P}_R$ of $R$ with point-like spectrum, equally-spaced eigenvalues and non-degenerate eigenstates. It can be illustrated by taking $d_R$ momentum states $\ket{p_k}$ and $p_k$ momentum levels with $k=0,1,2,...,d_R -1$ such that (we set $\hslash=1$):
\begin{equation}\label{pk}
p_k = p^{(R)}_0 + \frac{2\pi}{L_R} k .
\end{equation}
In this space we can define the states
\begin{equation}\label{statixj}
\ket{x_j}_R = \frac{1}{\sqrt{d_R}}\sum_{j=0}^{d_R -1}e^{- i p_k x_j}\ket{p_k}_R
\end{equation}
and the values $x_j = x_0 + j \frac{L_R}{D_R}$
with $j=0,1,2,...,z=D_R -1$ and with the constraint $z+1=D_R \ge d_R$. If we take $D_R=d_R$ the states (\ref{statixj}) are orthogonal (with the $D_R=d_R$ values of $x_j$ uniformly distributed over $L_R$) and the spatial degree of freedom is described by the Hermitian operator $\hat{X}_R = \sum_{j}x_j\ket{x_j}\bra{x_j}$ complement of $\hat{P}_R$. If, instead, we take $D_R > d_R$ the number of the states $\ket{x_j}_R$ is greater than the number of momenta states in $R$ (with the $D_R$ values of $x_j$ again uniformly distributed over $L_R$). These states still satisfy the key property $\ket{x_j}_R = e^{- i\hat{P}_R(x_j - x_0) }\ket{x_0}_R$ and it can furthermore be used for writing the resolution of the identity:
\begin{equation}\label{pomidentity}
\mathbb{1}_{R} = \frac{d_R}{D_R} \sum_{j=0}^{D_R -1} \ket{x_j}\bra{x_j}.
\end{equation}
Thanks to (\ref{pomidentity}) the spatial degree of freedom is represented by a POVM, being $d_R D^{-1}_{R} \ket{x_j}\bra{x_j}$ the $D_R$ non-orthogonal elements. In order to obtain a continuous representation of the coordinate $x$ (maintaining a discrete momentum spectrum), we can now consider the limit $z \longrightarrow \infty$, defining
\begin{equation}\label{xstateinf}
\ket{x}_R = \sum_{k=0}^{d_R -1 } e^{- i p_k x}\ket{p_k}_R
\end{equation}
where $x$ can now take any real value from $x_0$ to $x_0 + L_R$. In this limiting case the resolution of the identity (\ref{pomidentity}) becomes
\begin{equation}\label{newresolution}
\mathbb{1}_{R} = \frac{1}{L_R} \int_{x_0}^{x_0+L_R} dx \ket{x} \bra{x} .
\end{equation}
The states $\ket{x_j}$ and $\ket{x}$ are not orthogonal, but we will see in the following that this will not constitute a problem in our derivation of spacetime.
As mentioned, also the subspace $S$ can be equipped with the POVMs of space considering $\hat{P}_S$ with discrete, bounded spectrum and applying the same formalsim adopted in the subspace $R$. So we assume that also in $S$ all the momentum eigenvalues can be written as multiples of a minimum step, that is $p_k = p^{(S)}_0 + \frac{2\pi}{L_S} k$ with $k=0,1,2,...,d_S -1$. We thus define the states $\ket{y_l}_S = \frac{1}{\sqrt{d_S}}\sum_{l=0}^{d_S -1}e^{-i p_k y_l}\ket{p_k}_S$ and the $z+1=D_S$ values $y_l = y_0 + l \frac{L_S}{D_S}$ or, in the limiting case ($z \longrightarrow \infty$) in which $y$ take any real value from $y_0$ to $y_0 + L_S$, we consider the states $\ket{y}_S = \sum_{k=0}^{d_S -1 } e^{- i p_k y}\ket{p_k}_S$. Also in this case, when taking $D_S=d_S$ we can define the operator $\hat{Y}_S = \sum_{l}y_l\ket{y_l}\bra{y_l}$ (complement of $\hat{P}_S$) which is an Hermitian operator.
\subsection{Emergent Relative Distance}
In order to obtain the emergence of space from entanglement we consider now the following constraint on the total momentum:
\begin{equation}\label{constmomentum}
\hat{P}\ket{\Psi} = ( \hat{P}_R + \hat{P}_S)\ket{\Psi} = 0
\end{equation}
where $\hat{P}_R $ and $\hat{P}_S$ act on $R$ and $S$ respectively. Assuming $d_R \gg d_S$ the global state $\ket{\Psi}$ satisfying (\ref{constmomentum}) can be writen as
\begin{equation}\label{miserveperlafine}
\ket{\Psi} = \sum_{k=0}^{d_S -1} c_k \ket{p=-p_k}_R\otimes\ket{p_k}_S .
\end{equation}
We can now expand $\ket{\Psi}$ in the $\left\{\ket{x_j}\right\}$ basis on $R$ through (\ref{pomidentity}), thus obtaining
\begin{equation}\label{stato1}
\begin{split}
\ket{\Psi} & = \frac{d_R}{D_R} \sum_{j=0}^{D_R-1} \ket{x_j} \braket{x_j|\Psi} = \\& = \frac{\sqrt{d_R}}{D_R} \sum_{j=0}^{D_R-1} \ket{x_j}_R\otimes\sum_{k=0}^{d_S -1} c_k e^{- i p_k x_j}\ket{p_k}_S = \\&= \frac{\sqrt{d_R}}{D_R} \sum_{j=0}^{D_R-1} \ket{x_j}_R\otimes\ket{\phi(x_j)}_S
\end{split}
\end{equation}
where in last step we have defined $\ket{\phi(x_j)}_S = \sum_{k=0}^{d_S -1} c_k e^{- i p_k x_j}\ket{p_k}_S$. This state can be obtained from the global state $\ket{\Psi}$ through the \textit{relative state} definition (in Everett sense \cite{everett}) of the subsystem $S$ with respect to $R$ \cite{nostro}:
\begin{equation}\label{defstatorelativo}
\ket{\phi(x_j)}_S = \frac{\braket{x_j|\Psi}}{1/\sqrt{d_R}}.
\end{equation}
Now using the fact that $\ket{x_j }_R = e^{- i\hat{P}_R (x_j -x_0)}\ket{x_0}_R$ and equations (\ref{constmomentum}) and (\ref{defstatorelativo}), we obtain
\begin{equation}\label{trasldiscreta}
\begin{split}
\ket{\phi(x_j)}_S & = \sqrt{d_R}\braket{\phi(x_j)|\Psi} = \sqrt{d_R} \bra{x_0}e^{i\hat{P}_R (x_j -x_0)}\ket{\Psi} = \\&
= \sqrt{d_R} \bra{x_0}e^{i (\hat{P} - \hat{P}_S) (x_j -x_0)}\ket{\Psi} = e^{- i \hat{P}_S (x_j -x_0)}\ket{\phi(x_0)}_S
\end{split}
\end{equation}
that is, we have that the operator $\hat{P}_S$ is the generator of spatial traslations in the coordinate $x_j$. In this framework it is evident that the translation moves the system with respect to the coordinate of the reference frame $R$ and therefore \lq\lq external\rq\rq to $S$. Furthermore we want to discuss briefly the consequences of using states $\ket{x_j}_R$ in $R$ that are not orthogonal. Clearly this fact introduces a possible conceptual warning because considering $\ket{x_j}_R$ that are not orthogonal implies that these are partially indistinguishable with a single measurement, the probability of indistinguishability being proportional to $\left| \braket{x_i|x_j}\right|^2$. Nevertheless, as mentioned previously, this does not constitute a problem in our framework. Indeed, even if the $\ket{x_j}_R$ are partially indistinguishable, the state of the system $S$ conditioned on a given $x_j$ does not dependes on $x_i \ne x_j$ (as we can clearly see in equations (\ref{stato1}) and (\ref{trasldiscreta})) and so interference phenomena are not present even if the coordinates in $R$ are not orthogonal.
These results can easily extended in the limiting case $z \longrightarrow \infty$. Indeed in this case the global state satisfying the constraint (\ref{constmomentum}) can be written:
\begin{equation}\label{statoglobalecontinuo}
\begin{split}
\ket{\Psi} & = \frac{1}{L_R} \int_{x_0}^{x_0 + L_R} d x \ket{x} \braket{x|\Psi} = \\&= \frac{1}{L_R} \int_{x_0}^{x_0 + L_R} d x \ket{x}_R \otimes \sum_{k=0}^{d_S-1} c_k e^{- i p_k x} \ket{p_k}_S =\\&= \frac{1}{L_R} \int_{x_0}^{x_0 + L_R} d x \ket{x}_R \otimes \ket{\phi(x)}_S
\end{split}
\end{equation}
and, for the relative state $\ket{\phi(x)}_S = \braket{x|\Psi}$, can be easily obtained
\begin{equation}\label{traslcontinua}
\begin{split}
\hat{P}_S\ket{\phi(x)}_S &= \bra{x}\hat{P}_S\ket{\Psi} = \bra{x}(\hat{P} - \hat{P}_R)\ket{\Psi} = - \bra{x}\hat{P}_R\ket{\Psi} = \\&
= - \sum_{k=0}^{d_R -1} \bra{p_k}p_k e^{i p_k x} \ket{\Psi} = i\frac{\partial}{\partial x} \braket{x|\Psi} = i\frac{\partial}{\partial x} \ket{\phi(x)}_S
\end{split}
\end{equation}
that is the same of equation (\ref{trasldiscreta}), showing that the momentum $\hat{P}_S$ is the generator of translations in the coordinates $x$, but written through the differential expression $\hat{P}_S\ket{\phi(x)}_S = i\frac{\partial}{\partial x} \ket{\phi(x)}_S$.
In this framework the absolute position of $R+S$ is totally indeterminate. However, considering discrete values for the coordinates in $R$ and $S$, we can look for the conditional probability of obtaining $y_l$ on $S$ conditioned of having $x_j$ on $R$, where $y_l=y_0 + l\frac{L_S}{D_S}$, $x_j=x_0 + j\frac{L_R}{D_R}$. We have (see Appendix A for the proof)
\begin{equation}\label{conditionalprobabilitydiscreta}
P(y_l \: on \: S \:|\: x_j \: on \: R) =\frac{d_S}{D_S} \left|\braket{y_l|\phi(x_j)} \right|^2 = \frac{1}{D_S} \left| \sum_{k=0}^{d_S-1} c_k e^{i p_k(y_l-x_j)} \right|^2
\end{equation}
that is a well-defined probability distribution, where $\sum_{l=0}^{D_S -1} P(y_l \: on \: S \:|\: x_j \: on \: R) = 1$. Working instead in the limit $z \longrightarrow \infty$, the probability for a value of $y$ in the small range between $y$ and $y + dy$ is given by $P(y \: on \: S \:|\: x \: on \: R)dy$, where the probability density $P(y \: on \: S \:|\: x \: on \: R)$ is (the proof is given in Appendix B):
\begin{equation}\label{conditionalprobability}
\begin{split}
P(y \: on \: S \:|\: x \: on \: R) = \frac{1}{L_S} \left| \braket{y|\phi(x)} \right|^2 =\frac{1}{L_S} \left| \sum_{k=0}^{d_S-1} c_k e^{ i p_k(y-x)} \right|^2
\end{split}
\end{equation}
that is again a well-defined probability density distribution depending on the distance between $S$ and $R$. Indeed, also in this case, if we consider the integral over all possible values of $y$ we obtain
\begin{equation}
\int_{y_0}^{y_0 + L_S} dy P(y \: on \: S \:|\: x \: on \: R) = \frac{1}{L_S} \int_{y_0}^{y_0 + L_S} dy \sum_{k}\sum_{n} c_k c^{*}_n e^{i(p_k - p_n)(y-x)} = 1
\end{equation}
where we have used (see Appendix C):
\begin{equation}\label{delta}
\int_{y_0}^{y_0 + L_S} dy e^{iy(p_k - p_n)} = L_S\delta_{p_k,p_n} .
\end{equation}
Equations (\ref{conditionalprobabilitydiscreta}) and (\ref{conditionalprobability}) display an essential feature of the complementarity between positions and momenta. Indeed, if the system $S$ is in an eigenstate of the momentum, in the right-hand side of (\ref{conditionalprobabilitydiscreta}) and (\ref{conditionalprobability}) there is only one term of modulus unity and we have $P(y_l \: on \: S \:|\: x_j \: on \: R) = 1/D_S$ and $P(y \: on \: S \:|\: x \: on \: R) = 1/L_S$. So, in this case, the probability $P(y_l \: on \: S \:|\: x_j \: on \: R)$ and the probability density $P(y \: on \: S \:|\: x \: on \: R)$ are constant across the whole interval $\left[y_0,y_0+L_S \right]$ indicating that, when the momentum of the system $S$ can be determined exactly, thus the position with respect to the reference frame $R$ is completely random.
We have so considered a \lq\lq positionless\rq\rq Universe, satisfying the constraint (\ref{constmomentum}) on the total momentum (where the absolute position is totally indeterminate) and we found the well-defined conditional probability $P(y_l \: on \: S \:|\: x_j \: on \: R)$ (for the case of discrete coordinates) and the probability density $P(y \: on \: S \:|\: x \: on \: R)$ (for the limiting case $z \longrightarrow \infty$) where appears the relative distance between the two entangled subsystems.
\subsection{On the Position-Momentum Uncertainty Relation}
In this paragraph we want to focus on the quantity $\delta x$, namely the minimum interval in the $x$ values of $R$ over which the state of the system $\ket{\phi (x)}_S$ varies significantly. We will show that, if the momentum spread in the expansion (\ref{miserveperlafine}) is $\Delta p$, than $\delta x \ge \hslash /\Delta p$ (re-introducing $\hslash \ne 1$). This means that will be impossible to distinguish states of the system $S$ conditioned to $x$ values on $R$ which are close to each other less than $\simeq \hslash /\Delta p$, in accordance with position-momentum uncertainty relation.
For the sake of simplicity we consider here $D_R=D_S=d_R=d_S = d$ and $L_R = L_S = L$. We assume also discrete values for the space, so we have $\ket{x_j}_R = \frac{1}{\sqrt{d}} \sum_{k}e^{-ip_kx_j} \ket{p_k}_R$ and $\ket{y_l}_S = \frac{1}{\sqrt{d}} \sum_{k}e^{- ip_k y_l} \ket{p_k}_S$ with $x_j=x_0 + j\frac{L}{d}$ and $y_l=y_0 + l\frac{L}{d}$. As already mentioned, in this particular case we can define the operators $\hat{X}_R = \sum_{j}x_j\ket{x_j}\bra{x_j}$ and $\hat{Y}_S = \sum_{l}y_l\ket{y_l}\bra{y_l}$ (complement of $\hat{P}_R$ and $\hat{P}_S$ respectively) which are Hermitian operators.
The crucial point for our argument here is to understand that in this framework, since the reference frame $R$ and the system $S$ are entangled in the global state $\ket{\Psi}$, the $\Delta p$ related to the spread of the coefficients in the expansion (\ref{miserveperlafine}), that is $ \ket{\Psi} = \sum_{k=0}^{d_S -1} c_k \ket{p=-p_k}_R\otimes\ket{p_k}_S$, does not refer exclusively to $R$, but to $R$ and $S$ together. For this reason what we will find is that a limited spread in the expansion in the momentum eigenbasis will reduce the distinguishability of states of $S$ conditioned on proximal values of $R$. So, starting from equation
\begin{equation}\label{equazioneevoluzione2}
\ket{\phi(x_j)}_S = \frac{\braket{x_j|\Psi}}{1/\sqrt{d}} = \sum_{k=0}^{d -1} c_k e^{- i \hslash^{-1} p_k x_j}\ket{p_k}_S,
\end{equation}
we can calculate in the space $S$:
\begin{equation}\label{ultima}
\begin{split}
\braket{\phi (x_i) | \phi (x_j)}
= \sum_{k=0}^{d-1} \left| c_k \right|^2 e^{- i\hslash^{-1} p_k (x_j - x_i)}.
\end{split}
\end{equation}
Equations (\ref{ultima}) indicates that, if $\left| c_k \right|^2$ has a spread $\simeq \Delta p$, than the scalar product $f(x_j - x_i) = \braket{\phi (x_i) | \phi (x_j)}$ will have a spread of the order $\simeq \hslash/ \Delta p$. This means that the state $\ket{\phi(x_j)}_S$ of the subsystem $S$ varies significantly for intervals
\begin{equation}
\delta x \geq \hslash/ \Delta p
\end{equation}
where $\Delta p$ is indeed the uncertainty in momentum related to the spread of the coefficients $c_k$.
This means that it is impossible to distinguish states of the system $S$ conditioned to $x$ values on $R$ which are closer than $\simeq \hslash /\Delta p$ to each other, in accordance with the position-momentum uncertainty relation.
Expression (\ref{ultima}) for $f(x_j - x_i)$ holds also in the case of non-orthogonal space states where the spatial degrees of freedom are described by POVMs. So we notice here that the function $f(x_j - x_i)$, and consequently the scale on which the system $S$ varies significantly, is not related to the overlap of the states in $R$. Namely the fact of using coordinates states that are not orthogonal does not have an effect on the derivation of the function $f(x_j - x_i)$. As already mentioned, this is because, calculating the conditioned state of $S$ to a certain value $x_j$ on $R$ through (\ref{equazioneevoluzione2}), we find no contributions from different positions $x_i \ne x_j$, and so interference phenomena are not present even if the position states are not orthogonal. Rather $f(x_j - x_i)$ is related to the spread of the coefficients appearing in the global state $\ket{\Psi}$ and this fact shows us a condition for a good functioning of our framework: a large spread in the coefficients within the global state in the expansion (\ref{miserveperlafine}) is needed in order to distinguish states of $S$ projected to closer values of $R$ \cite{asimmetry}.
\section{Spacetime from Entanglement}
\label{spacetime}
\subsection{Introducing the $C$ Subspace}
In order to introduce the temporal degree of freedom we have to consider an additional Hilbert space and assign it to time. We so assume that the Universe is divided into three subsystems, that is we work in $\mathcal{H} = \mathcal{H}_C\otimes\mathcal{H}_R\otimes\mathcal{H}_S$, where $\mathcal{H}_C$ is the time Hilbert space. The three subsystems are non-interacting but still entangled, so we have
\begin{equation}
\hat{H} = \hat{H}_C + \hat{H}_R + \hat{H}_S
\end{equation}
where $\hat{H}_C$, $\hat{H}_R$ and $\hat{H}_S$ act on $C$, $R$ and $S$ respectively. To be as general as possible, we consider the clock Hamiltonian $\hat{H}_C$ with bounded, discrete spectrum with unequally-spaced energy levels and we introduce also the time observable described by a POVM \cite{nostro,nostro2}.
We start assuming $\hat{H}_C$ with point-like spectrum, non-degenerate eigenstates and having rational energy differences.
The framewowrk can be illustrated by taking $p+1 = d_{C}$ energy states $\ket{E_i}$ and $E_i$ energy levels with $i=0,1,2,...,d_C -1$ such that $\frac{E_i -E_0 }{E_1 - E_0} = \frac{A_i}{B_i}$,
where $A_i$ and $B_i$ are integers with no common factors. Doing this we obtain (we set again $\hslash=1$):
\begin{equation}\label{ei}
E_i = E_0 + r_i \frac{2\pi}{T}
\end{equation}
where $T=\frac{2\pi r_1}{E_1}$, $r_i = r_1\frac{A_i}{B_i}$ for $i>1$ (with $r_0=0$) and $r_1$ equal to the lowest common multiple of the values of $B_i$. In this space we define the states
\begin{equation}\label{timestates}
\ket{t_m}_C = \frac{1}{\sqrt{d_C}}\sum_{i=0}^{d_C -1 }e^{-i E_i t_m}\ket{E_i}_C
\end{equation}
where $t_m = t_0 + m \frac{T}{D_C}$ with $m=0,1,2,...,s=D_C-1$ and $s+1 \ge r_p$\footnote{We notice here that also in this case, by assuming the energy spectrum with equally-spaced eigenvalues and taking $D_C=d_C$, the time states (\ref{timestates}) are orthogonal and the temporal degree of freedom is described by the Hermitian operator $\hat{T}_C = \sum_{m}t_m \ket{t_m}\bra{t_m}$.}. The number of $\ket{t_m}_C$ states is therefore greater than the number of energy states in $\mathcal{H}_{C}$ and the $D_C$ values of $t_m$ are uniformly distributed over $T$. These states satisfy the key property $\ket{t_m}_C = e^{- i\hat{H}_C(t_m - t_0) }\ket{t_0}_C$ and furthermore can be used for writing the resolution of the identity in the $C$ subspace:
\begin{equation}\label{pomidentity2}
\mathbb{1}_{C} = \frac{d_C}{D_C} \sum_{m=0}^{D_C -1} \ket{t_{m}}\bra{t_{m}}.
\end{equation}
Thanks to property (\ref{pomidentity2}) also time is represented by a POVM, being $d_C D^{-1}_{C} \ket{t_m}\bra{t_m}$ the $D_C$ non-orthogonal elements. As we did for space, in order to obtain a continuous flow of time in the PaW framework, we can now consider the limit $s \longrightarrow \infty$, defining
\begin{equation}\label{alphastateinf}
\ket{t}_C = \sum_{i=0}^{d_C-1} e^{- i E_i t}\ket{E_i}_C
\end{equation}
where $t$ can now take any real value from $t_0$ to $t_0 + T$. In this limiting case the resolution of the identity (\ref{pomidentity2}) becomes
\begin{equation}\label{newresolution2}
\mathbb{1}_{C} = \frac{1}{T} \int_{t_0}^{t_0+T} d t \ket{t} \bra{t} .
\end{equation}
As in the case of space, the states $\ket{t_m}_C$ and $\ket{t}_C$ are not orthogonal, but thanks to the properties (\ref{pomidentity2}) and (\ref{newresolution2}) they can be used as time states for introducing time through the PaW mechanism. This framework allows us to use a generic Hamiltonian as a clock Hamiltonian, with the only constraint of considering rational ratios of energy levels. However, we emphasize that this limitation can be opportunely relaxed. Indeed, in the case of non-rational ratios of energy levels, the resolutions of the identity (\ref{pomidentity2}) and (\ref{newresolution2}) are no longer exact but, since any real number can be approximated with arbitrary precision by a ratio between two rational numbers, the residual terms in the resolutions of the identity and consequent small corrections can be arbitrarily reduced. In this way we can consider that the mechanism works, at least approximately, for every generic Hamiltonian with no restrictions \cite{nostro,nostro2}.
\subsection{Emergent $1+1$ Dimensional Spacetime}
We want now to obtain a model of spacetime emerging from entanglement. So we consider the global state $\ket{\Psi} \in \mathcal{H}_C\otimes\mathcal{H}_R\otimes\mathcal{H}_S$ simultaneously satisfying
\begin{equation}\label{1}
\hat{H}\ket{\Psi} = (\hat{H}_C + \hat{H}_R + \hat{H}_S )\ket{\Psi}=0
\end{equation}
and
\begin{equation}\label{2}
\hat{P}\ket{\Psi} = (\hat{P}_R + \hat{P}_S )\ket{\Psi}=0
\end{equation}
where we have assumed $\hat{P}_C = 0$\footnote{We emphasize that the mechanism works also with $\hat{P}_C \ne 0$ but, in this case, there will be strong limitations in the relation between energy and momenta to ensure that (\ref{1}) and (\ref{2}) are simultaneously satisfied. The framework with $\hat{P}_C = 0$ can be implemented for example by assuming the subspace $C$ describing the internal degree of freedom (i.e. the spin) of the system $R$.}. If we want to look at the explicit form of the state $\ket{\Psi}$ we need to know the relation between the momenta and the energy of $R$ and $S$. Nevertheless, assuming again $d_C, d_R \gg d_S$, we can write in general:
\begin{equation}\label{statoglobalespaziotempo}
\ket{\Psi} = \sum_{k=0}^{d_S -1} c_k \ket{E=-\epsilon_k}_C\otimes\ket{p=-p_k}_R\otimes\ket{p_k}_S
\end{equation}
where $$\epsilon_k= E^{(R)}(-p_k) + E^{(S)}(p_k)$$ is the energy function related to the momenta of $R$ and $S$\footnote{For simplicity we consider here that the energy function depends only on the momenta and not on the coordinates. Clearly the model works also considering the presence of external potentials in $R$ and $S$ (equations (\ref{evoluzioneRS}), (\ref{evoluzioneRSc}) and (\ref{m}) that we will find in the following would be indeed still valid) but, in this case, the state $\ket{\Psi}$ can not be written in the simple form (\ref{statoglobalespaziotempo}) and we can not explicitly calculate the conditional probabilities (\ref{probfinalediscreta}) and (\ref{probfinale}). For this reason we prefer to simplify the model, as we believe this choice helps to capture the essence of the mechanism. In Section 3.5 we give a generalization to the case where external potentials are present in $R$ and $S$.}. If, for example, we consider $R$ and $S$ as free particles (with mass $M$ and $m$ respectively) we have $\hat{H}_R = \frac{\hat{P}^{2}_R}{2M}$ and $\hat{H}_S = \frac{\hat{P}^{2}_S}{2m}$, which implies $\epsilon_k = \frac{p^{2}_k}{2M} + \frac{p^{2}_k}{2m}$.
Starting from the state $\ket{\Psi}$ satisfying (\ref{1}) and (\ref{2}), we can now expand it on the basis $\left\{\ket{t_m}_C\right\}$ in $C$ thanks to (\ref{pomidentity2}), thus obtaining
\begin{equation}\label{serveperGLM}
\begin{split}
\ket{\Psi} &= \frac{d_C}{D_C} \sum_{m=0}^{D_C -1} \ket{t_m} \braket{t_m|\Psi} = \frac{\sqrt{d_C}}{D_C} \sum_{m=0}^{D_C -1} \ket{t_m}_C \otimes \ket{\phi(t_m)}_{R,S}
\end{split}
\end{equation}
where $\ket{\phi(t_m)}_{R,S} = \sqrt{d_C} \braket{t_m|\Psi}$ is state of the composite system $R+S$ at time $t_m$, namely it is the \textit{relative state} (in Everett sense \cite{everett}) of $R+S$ conditioned on having the value $t_m$ on $C$. For such a state, through (\ref{1}) and the relative state definition, it is easy to find the time evolution with respect to the clock $C$:
\begin{equation}\label{evoluzioneRS}
\begin{split}
\ket{\phi(t_m)}_{R,S} &=\sqrt{d_C}\braket{t_m|\Psi} = \sqrt{d_C} \bra{t_0} e^{i\hat{H}_C(t_m - t_0)}\ket{\Psi}= \\&
= \sqrt{d_C} \bra{t_0} e^{-i (\hat{H}_R + \hat{H}_S - \hat{H})(t_m - t_0)}\ket{\Psi}= e^{-i (\hat{H}_R + \hat{H}_S)(t_m - t_0)}\ket{\phi(t_0)}_{R,S}
\end{split}
\end{equation}
where $\ket{\phi(t_0)}_{R,S}= \sqrt{d_C} \braket{t_0|\Psi}$ is the state of $R+S$ conditioned on $t_0$ that is the value of the clock taken as initial time. Equation (\ref{evoluzioneRS}) shows, as expected, the simultaneous evolution of $R$ and $S$ over time. Having indeed considered a quantum spatial reference frame, it was reasonable to expect that it also evolves in time together with the subsystem $S$. We can consider then the limiting case $s \longrightarrow \infty$ where $t$ takes all the real values between $t_0$ and $t_0+T$. The global state can now be written
\begin{equation}
\begin{split}
\ket{\Psi} = \frac{1}{T} \int_{t_0}^{t_0 +T} dt \ket{t} \braket{t|\Psi} = \frac{1}{T} \int_{t_0}^{t_0 +T} dt \ket{t}_C \otimes \ket{\phi(t)}_{R,S}
\end{split}
\end{equation}
and defining the relative state of $R+S$ as $\ket{\phi(t)}_{R,S} = \braket{t|\Psi}$ we obtain \cite{nostro}:
\begin{equation}\label{evoluzioneRSc}
i \frac{\partial}{\partial t}\ket{\phi(t)}_{R,S} = \left(\hat{H}_R + \hat{H}_S\right)\ket{\phi(t)}_{R,S}
\end{equation}
that is the Schrödinger evolution for the state of $R+S$ with respect to the clock time $t$, written in the usual differential form.
We can therefore expand the state $\ket{\Psi}$ in the coordinates $\left\{\ket{x_j}_R\right\}$ in $R$, thus obtaining:
\begin{equation}
\ket{\Psi} = \frac{d_R}{D_R} \sum_{j=0}^{D_R -1} \ket{x_j} \braket{x_j|\Psi} = \frac{\sqrt{d_R}}{D_R} \sum_{j=0}^{D_R -1} \ket{x_j}_R \otimes \ket{\varphi(x_j)}_{C,S}
\end{equation}
where $\ket{\varphi(x_j)}_{C,S}=\sqrt{d_R}\braket{x_j|\Psi}$ is the relative state of $C+S$ conditioned to the value $x_j$ on the reference frame $R$. All the results found in the previous Section apply to the state $\ket{\varphi(x_j)}_{C,S}$. Indeed we have also in this case
\begin{equation}\label{m}
\ket{\varphi(x_j)}_{C,S} = e^{-i \hat{P}_S(x_j - x_0)} \ket{\varphi(x_0)}_{C,S}
\end{equation}
where the momentum of the clock $C$ does not appear since we have chosen $\hat{P}_C = 0$. Also here we consider the limit $z \longrightarrow \infty$, where again $x$ can take all the real values between $x_0$ and $x_0 + L_R$. In this case the global state can be written
\begin{equation}\label{mm}
\begin{split}
\ket{\Psi} = \frac{1}{L_R} \int_{x_0}^{x_0 +L_R} dx \ket{x} \braket{x|\Psi} = \frac{1}{L_R} \int_{x_0}^{x_0 +L_R} dx \ket{x}_R \otimes \ket{\varphi(x)}_{C,S}
\end{split}
\end{equation}
and defining the relative state of $C+S$ as $\ket{\varphi(x)}_{C,S} = \braket{x|\Psi}$ we obtain $\hat{P}_S \ket{\varphi(x)}_{C,S} = i \frac{\partial}{\partial x} \ket{\varphi(x)}_{C,S}$. Through this latter equation and (\ref{m}) we can see again that $\hat{P}_S$ is the generator of translations in the coordinate values $x$ for the relative state $\ket{\varphi(x)}_{C,S}$.
Finally we can expand the state $\ket{\Psi}$ simultaneously on the coordinates $\left\{\ket{x_j}_R\right\}$ in $R$ and on the time basis $\left\{\ket{t_m}_C\right\}$ in $C$. We have for the global state:
\begin{equation}\label{45}
\begin{split}
\ket{\Psi} &= \left(\frac{d_C}{D_C} \sum_{m=0}^{D_C -1} \ket{t_m}\bra{t_m} \otimes \frac{d_R}{D_R} \sum_{j=0}^{D_R -1} \ket{x_j}\bra{x_j} \right)\ket{\Psi}=\\&
= \frac{\sqrt{d_C}}{D_C} \frac{\sqrt{d_R}}{D_R} \sum_{m=0}^{D_C -1}\sum_{j=0}^{D_R -1}\ket{t_m}_C\otimes\ket{x_j}_R\otimes\ket{\psi(t_m,x_j)}_S
\end{split}
\end{equation}
where $\ket{\psi(t_m,x_j)}_S =\sqrt{d_C} \sqrt{d_R}(\bra{t_m}\otimes\bra{x_j})\ket{\Psi}$ is the relative state of the system $S$ at time $t_m$ conditioned on the value $x_j$ for the reference frame $R$. With the state $\ket{\psi(t_m,x_j)}_S$ we have not yet defined the position of the system $S$. This state indeed gives us the value of the time that enters as a parameter thanks to the entanglement with the subspace $C$ and indicates the position of the reference frame $R$. What we can now search is the conditional probability of having a certain position $y_l$ in $S$ at time $t_m$ and knowing that the reference frame is in $x_j$, that is (see Appendix D):
\begin{multline}\label{probfinalediscreta}
P(y_l \: on\: S\:|\:x_j\:on\:R, \: t_m \: on \:C) = \frac{d_S}{D_S} |\braket{y_l|\psi(t_m,x_j)}|^2 = \frac{1}{D_S} \left| \sum_{k=0}^{d_S -1} c_k e^{-i\epsilon_k t_m}e^{ip_k(y_l-x_j)} \right|^2
\end{multline}
where, we recall, $\epsilon_k$ is the energy function related to the momenta $p_k$ of $R$ and $S$ and where it is easy to verify that $\sum_{l=0}^{D_S -1} P(y_l \: on\: S\:|\:x_j\:on\:R, \: t_m \: on \:C) = 1$ given each $x_j$ and $t_m$. Clearly we can extend these results also to the limiting cases $z,s \longrightarrow \infty$. Indeed we can write the global state $\ket{\Psi}$ as
\begin{equation}\label{47}
\begin{split}
\ket{\Psi} &= \left( \frac{1}{T}\int_{t_0}^{t_0 + T} dt \ket{t}\bra{t} \otimes \frac{1}{L_R}\int_{x_0}^{x_0 + L_R} dx \ket{x}\bra{x} \right) \ket{\Psi} = \\&
= \frac{1}{T} \frac{1}{L_R} \int_{t_0}^{t_0 + T} dt \int_{x_0}^{x_0 + L_R} dx \ket{t}_C \otimes \ket{x}_R \otimes \ket{\psi(t,x)}_S
\end{split}
\end{equation}
where again $\ket{\psi(t,x)}_S = (\bra{t}\otimes\bra{x})\ket{\Psi}$ is the relative state of the system $S$ at time $t$ conditioned on the value $x$ for the reference frame $R$. The conditional probability density of having a certain position $y$ in $S$ at time $t$ and knowing that the reference frame is in $x$ is (see Appendix E):
\begin{equation}\label{probfinale}
P(y \: on\: S\:|\:x\:on\:R,\: t \: on \:C) = \frac{1}{L_S}\left| \braket{y|\psi(t,x)} \right|^2= \frac{1}{L_S}\left| \sum_{k=0}^{d_S -1} c_k e^{-i\epsilon_k t}e^{ip_k(y-x)} \right|^2 .
\end{equation}
We notice that also the probability density (\ref{probfinale}) is well-defined for each time (indeed it is easy to verify that $ \int_{y_0}^{y_0 + L_S} dy P(y \: on\: S\:|\:x\:on\:R,\: t \: on \:C) =1$ for all $x$ and $t$) and it depends on time $t$ as well as on the distance $y-x$ between $S$ and $R$.
So, through entanglement, we have found for the subsystem $S$ a conditional probability density that give us informations about the evolution of $S$ in time and space, where for time we consider the clock time and for space we consider the relative distance between $S$ and the quantum reference frame $R$. All these results are obtained within a globally static and \lq\lq positionless\rq\rq Universe.
To conclude this paragraph we notice that a good spatial reference frame is a reference that moves only slightly in time. If a good spatial reference frame is considered, one can look at the evolution of $S$ by itself. We show this point with an example: assuming $R$ and $S$ as free particles (with mass $M$ and $m$ respectively), we could take $M \gg m$ thus obtaining $\frac{\hat{P}^{2}_R}{2M} \ll \frac{\hat{P}^{2}_S}{2m}$.
Starting from the state (\ref{47}) we can consider the relative state $\ket{\psi(t,x)}_S = (\bra{t}\otimes\bra{x})\ket{\Psi}$ and investigate its evolution. If the mass $M$ is sufficiently large, we have:
\begin{equation}\label{evS2}
i \frac{\partial}{\partial t}\ket{\psi(t,x)}_{S} \simeq \hat{H}_S \ket{\psi(t,x)}_{S} .
\end{equation}
Equation (\ref{evS2}) shows that if $M$ is sufficiently large, the evolution of $S$ alone can be recovered with respect to time $t$ and with respect to a spatial reference frame that does not evolve (or that move negligibly in time). Furthermore, equation (\ref{evS2}) together with the property $\hat{P}_S \ket{\psi(t,x)}_{S} = i \frac{\partial}{\partial x} \ket{\psi(t,x)}_{S}$ lead to:
\begin{equation}\label{evfinale31+1}
i \frac{\partial}{\partial t} \ket{\psi(t, x)}_S \simeq - \frac{1}{2m}\frac{\partial^{2}}{\partial x^{2}} \ket{\psi(t,x)}_{S}
\end{equation}
which clearly describes the dynamics of the particle in $S$ with respect to the coordinates of the $1+1$ dimensional quantum reference frame.
We emphasize here that, in this case, we can write the equation (\ref{evfinale31+1}) for the state $\ket{\psi(t,x)}_{S}$ because the values of time and space of the subspaces $C$ and $R$ enter as parameters in $S$ thanks to the entanglement present in the global state $\ket{\Psi}$. We will return to this point later, in Section 5, when we also discuss the example of relativistic particles.
\subsection{A simple Example}
We consider here a simple example assuming $R$ and $S$ as free particles with mass $M$ and $m$ respectively and $d_R=d_S =3$. We start assuming $D_R =D_S = d_R =d_S$, $L_R=L_S=L$ and discrete values of space and time. We have therefore: $p^{(R)}_k = p^{(S)}_k = p_0 + \frac{2\pi}{L} k$,
with $p_0=-\frac{2\pi}{L}$ (that implies $p_1=0$, $p_2=\frac{2\pi}{L}$), $x^{(R)}_j = x_0+j\frac{L}{3} = 0,\frac{L}{3},\frac{2L}{3}$ and $y^{(S)}_l = y_0+l\frac{L}{3} = 0,\frac{L}{3},\frac{2L}{3}$. The global state satisfying the constraints on total energy and total momentum can be written as:
\begin{equation}
\ket{\Psi} = c_0 \ket{E_{2,0}}_C\ket{p_2}_R\ket{p_0}_S + c_1 \ket{E_{1,1}}_C\ket{p_1}_R\ket{p_1}_S + c_2 \ket{E_{0,2}}_C\ket{p_0}_R\ket{p_2}_S
\end{equation}
where $E_{k,n} = -( \frac{p^{2}_k}{2M} + \frac{p^{2}_n}{2m} )$ and where we assume, for simplicity, the coefficients $c_i$ to be real. Furthermore we have $E_{2,0}= E_{0,2}=\epsilon= (\frac{2\pi}{L})^2 (\frac{1}{2M} + \frac{1}{2m})$ and $E_{1,1}=0$. We can now expand the global state $\ket{\Psi}$ simultaneously on the coordinates $\left\{\ket{x_j}_R\right\}$ in $R$ and on the time basis $\left\{\ket{t_m}_C\right\}$ in $C$, and then we search the state $\ket{\psi(t_m,x_j)}_S = \sqrt{d_C}\sqrt{3}(\bra{t_m}\otimes\bra{x_j})\ket{\Psi}$, thus obtaining:
\begin{equation}
\begin{split}
\ket{\psi(t_m,x_j)}_S &= \sqrt{3} \left[c_0 e^{-i\epsilon t_m}\braket{x_j|p_2}\ket{p_0}_S + c_1 \braket{x_j|p_1}\ket{p_1}_S + c_2 e^{-i\epsilon t_m}\braket{x_j|p_0}\ket{p_2}_S \right] = \\&
=c_0 e^{-i\epsilon t_m}e^{i\frac{2\pi}{L}x_j}\ket{-\frac{2\pi}{L}}_S +c_1 \ket{0}_S +c_2 e^{-i\epsilon t_m}e^{-i\frac{2\pi}{L}x_j}\ket{\frac{2\pi}{L}}_S.
\end{split}
\end{equation}
We can now calculate the conditional probability of obtaining $y_l$ on $S$ conditioned on having $x_j$ on $R$ and $t_m$ on $C$. Considering $d_S = D_S =3$, we have:
\begin{multline}\label{esempio1}
P(y_l \: on\: S\:|\:x_j\:on\:R,\: t_m \: on \:C) = \left| \braket{y_l| \psi(t_m,x_j)}\right|^2 = \\
= \frac{1}{3}\left| c_0 e^{-i\epsilon t_m}e^{-i\frac{2\pi}{L}(y_l - x_j)} + c_1 + c_2 e^{-i\epsilon t_m}e^{i\frac{2\pi}{L}(y_l-x_j)} \right|^2 .
\end{multline}
Proceeding with the calculations from equation (\ref{esempio1}) and remembering we have real coefficients, we obtain
\begin{multline}
P(y_l \: on\: S\:|\:x_j\:on\:R,\: t_m \: on \:C) = \frac{1}{3} + \frac{2}{3}c_0 c_1 \cos(\epsilon t_m + \frac{2\pi}{L}( y_l - x_j))+ \\ + \frac{2}{3}c_1 c_2 \cos(\epsilon t_m - \frac{2\pi}{L}(y_l -x_j)) + \frac{2}{3}c_0 c_2\left( 1- 2\sin^{2}( \frac{2\pi}{L}(y_l-x_j)) \right)
\end{multline}
that is the expression of how the probability of having a certain relative distance between the particles $S$ and $R$ given $x_j$ for the reference frame $R$ at time $t_m$.
If we consider the limiting cases $s,z\longrightarrow\infty$ (mantaining the assumption $L_R=L_S=L$),
we obtain for the probability density:
\begin{multline}
P(y \: on\: S\:|\:x\:on\:R,\: t \: on \:C) = \frac{1}{L} + \frac{2}{L}c_0 c_1 \cos(\epsilon t + \frac{2\pi}{L}( y - x))+ \\ + \frac{2}{L}c_1 c_2 \cos(\epsilon t - \frac{2\pi}{L}(y -x)) + \frac{2}{L}c_0 c_2\left( 1- 2\sin^{2}( \frac{2\pi}{L}(y-x)) \right) .
\end{multline}
\subsection{On the Quantum Speed Limit Time}
An important question is the time scale over which the conditioned state $\ket{\phi (t)}_{R,S}$ evolve into an othogonal configuration, thus becoming fully distinguishable. In dealing with this topic it is useful what was already said in Section 2.3. For the sake of simplicity we consider again the case of $d_R=D_R$, $d_S=D_S$ that leads to discrete values of space and orthogonal states. For the temporal degree of freedom we consider the limiting case $s \longrightarrow \infty$. The conditioned state of $R+S$ can be obtained from (\ref{statoglobalespaziotempo}), calculating $\ket{\phi(t)}_{R,S} = \braket{t|\Psi}$. We have ($\hslash \ne 1$):
\begin{equation}\label{equazione}
\ket{\phi(t)}_{R,S} = \sum_{k=0}^{d_S - 1} c_k e^{-i \hslash^{-1} \epsilon_k t}\ket{p=-p_k}_R\otimes\ket{p_k}_S
\end{equation}
where $\epsilon_k= E^{(R)}(-p_k) + E^{(S)}(p_k)$ is the energy function related to the momenta $p_k$ of $R$ and $S$. Starting from equation (\ref{equazione}) we can calculate in the space $R+S$:
\begin{equation}\label{ultima1}
\begin{split}
\braket{\phi (t_0) | \phi (t)} = \sum_{k=0}^{d_S - 1} |c_k|^2 e^{-i \hslash^{-1} \epsilon_k (t - t_0)} .
\end{split}
\end{equation}
Looking at equation (\ref{ultima1}), we can now consider the quantum speed limit time $\delta t$ which gives us the minimum time needed for $R+S$ to evolve to an orthogonal configuration. We have \cite{speedlimit,margolus}:
\begin{equation}\label{dalpha}
\delta t \geq max \left( \frac{\pi\hslash}{2 E_{R,S}} , \frac{\pi\hslash}{2 \Delta E} \right)
\end{equation}
where $E_{R,S} = \bra{\phi(t_0)}\hat{H}_R + \hat{H}_S\ket{\phi(t_0)} $ and $\Delta E$ is the spread in energy related to the coefficients $c_k$ through
\begin{equation}
\Delta E = \sqrt{\bra{\phi(t_0)} (\hat{H}_R + \hat{H}_S - E_{R,S} )^2\ket{\phi(t_0)}}.
\end{equation}
The aspect we emphasize is that, as in the case of space, the function $f(t - t_0) = \braket{\phi (t_0) | \phi (t)}$, and consequently the time scale on which $R+S$ varies significantly, is not related to the overlap of the states of the clock. This can be seen considering that in $f(t - t_0)$ do not enter time values different from $t, t_0$ and $f(t - t_0)$ takes the form expressed in \cite{speedlimit}. So the fact that our time states are not orthogonal does not have a consequence on the speed at which the state $\ket{\phi(t)}_{R,S}$ evolves with respect to $t$. Rather $f(t - t_0)$ is related to the spread of the coefficients $c_k$ appearing in the state (\ref{equazione}). These considerations, together with equation (\ref{dalpha}), indicate the key point in this framework: a large spread in the coefficients $c_k$ within state $\ket{\phi(t)}_{R,S}$, and so in the global state
$\ket{\Psi} = \sum_{k=0}^{d_S -1} c_k \ket{E=-\epsilon_k}_C\otimes\ket{p=-p_k}_R\otimes\ket{p_k}_S$, is needed to make the time evolution of the subsystem $R+S$ faster \cite{asimmetry}.
\subsection{Introducing External Potentials in $R$ and $S$}
We illustrate here the case in which external potentials are present within $R$ and $S$ by considering these two subspaces consisting of two harmonic oscillators. We use this example also to extend our framework assuming momentum operators with continuous spectra. So far we have indeed always used momentum operators in $R$ and $S$ with discrete spectra, but the entire discussion can be easily generalized to the case of continuous values for momenta and coordinates, with orthogonal position states. Such a framework allows us to more easily address the problem of considering the presence of external potentials in $R$ and $S$. What we need is indeed to have Hermitian operators $\hat{X}$ (within $R$) and $\hat{Y}$ (within $S$) in order to describe the potentials of the harmonic oscillators. In the subspace $C$ we assume the framework described so far working in the limiting case $s \longrightarrow \infty$.
We therefore start considering the Hamiltonians of $R$ and $S$ written as:
\begin{equation}
\begin{split}
& \hat{H}_R= \frac{\hat{P}^{2}_R}{2M} + V_R(\hat{X}) = \frac{\hat{P}^{(2)}_R}{2M} + \frac{1}{2}M\omega_R\hat{X}^{2}
\\& \hat{H}_S= \frac{\hat{P}^{2}_S}{2m} + V_S(\hat{Y}) = \frac{\hat{P}^{(2)}_S}{2m} + \frac{1}{2}m \omega_S \hat{Y}^{2} .
\end{split}
\end{equation}
In this framework, the global state $\ket{\Psi}$ satisfying the constraint on total momentum $\left( \hat{P}_R + \hat{P}_S\right)\ket{\Psi}=0$ is:
\begin{equation}\label{Gstato1}
\ket{\Psi} = \sum_{n=0}^{d_C - 1} \int dp ~ c_n \psi(p) \ket{E_n}_C \otimes \ket{-p}_R \otimes \ket{p}_S
\end{equation}
where $\sum_{n=0}^{d_C - 1} |c_n|^2 = \int dp |\psi(p)|^2=1$. The state (\ref{Gstato1}) can be rewritten in the energy eigenbasis for $R$ and $S$ as
\begin{equation}\label{Gstato2}
\ket{\Psi} = \sum_{n=0}^{d_C - 1} \sum_{k} \sum_{l} \int dp ~ c_n \psi(p) \beta(-p,E_k) \beta(p,E_l) \ket{E_n}_C \otimes \ket{E_k}_R \otimes \ket{E_l}_S
\end{equation}
where $\beta(a,b) = \braket{b|a}$. Through the state (\ref{Gstato2}) we can now impose the constraint on total energy $\hat{H}\ket{\Psi} = \left( \hat{H}_C + \hat{H}_R + \hat{H}_S\right)\ket{\Psi}=0$ where the Hamiltonians of $R$ and $S$ can be rewritten ($\hslash=1$): $\hat{H}_R = \omega_R\left( \hat{a}^{\dagger}_R\hat{a}_R + \frac{1}{2} \right)$ and $\hat{H}_S = \omega_S\left( \hat{a}^{\dagger}_S \hat{a}_S + \frac{1}{2} \right)$, being $\hat{a}^{\dagger}_R$, $\hat{a}^{\dagger}_S$, $\hat{a}_R$ and $\hat{a}_S$ the usual rising and lowering operators for the subsystems $R$ and $S$. For the global state $\ket{\Psi}$ we thus find:
\begin{equation}\label{Gstatoe}
\ket{\Psi} = \sum_{k} \sum_{l} \int dp ~ \tilde{c}_{kl} \psi(p) \beta(-p,E_k) \beta(p,E_l) \ket{E=-\epsilon_{kl}}_C \otimes \ket{E_k}_R \otimes \ket{E_l}_S
\end{equation}
with
\begin{equation}
\epsilon_{kl} = \omega_R\left( k + \frac{1}{2} \right) + \omega_S \left( l + \frac{1}{2} \right) .
\end{equation}
The state (\ref{Gstatoe}) provides the explicit form of the global state of our quantum Universe simultaneously satisfying both the constraints: on total energy and total momentum. We can then expand again the subspaces $R$ and $S$ back on the momentum eigenbasis and rewriting (\ref{Gstatoe}) as
\begin{multline}\label{Gstatodef}
\ket{\Psi} = \int dp' \sum_{k} \sum_{l} \int dp ~ \tilde{c}_{kl} \psi(p) \beta(-p,E_k) \beta(p,E_l) \\
\times \beta^{*}(-p',E_k) \beta^{*}(p',E_l) \ket{E=-\epsilon_{kl}}_C \otimes \ket{-p'}_R \otimes \ket{p'}_S .
\end{multline}
Through the states (\ref{Gstatoe}) and (\ref{Gstatodef}) we can find again all the results shown in Section 3.2. For the relative state $\ket{\phi(t)}_{R,S} = \braket{t|\Psi}$ we have:
\begin{equation}
\begin{split}
i \frac{\partial}{\partial t}\ket{\phi(t)}_{R,S} & = \left(\hat{H}_R + \hat{H}_S\right)\ket{\phi(t)}_{R,S} = \\&
= \left(\frac{\hat{P}^{(2)}_R}{2M} + \frac{1}{2}M\omega_R\hat{X}^{2} + \frac{\hat{P}^{(2)}_S}{2m} + \frac{1}{2}m \omega_S \hat{Y}^{2}\right)\ket{\phi(t)}_{R,S} .
\end{split}
\end{equation}
which provides the Schrödinger evolution for the subsystem $R+S$. In the same way, for the relative state $\ket{\varphi(x)}_{C,S} = \sqrt{2\pi}\braket{x|\Psi}$ we have: $ \ket{\varphi(x+a)}_{C,S}= e^{-i a \hat{P}_S}\ket{\varphi(x)}_{C,S}$
which shows how the operator $\hat{P}_S$ is the generator of translations in the values of the reference frame $R$ for the relative state of the subsystem $C+S$. Finally we expand the state $\ket{\Psi}$ simultaneously on the coordinates in $R$ and on the time basis in $C$ thus finding:
\begin{equation}\label{Gespansione}
\begin{split}
\ket{\Psi}
= \frac{1}{T \sqrt{2\pi} } \int dt \int dx \ket{t}_C \otimes \ket{x}_R \otimes \ket{\psi(t,x)}_S
\end{split}
\end{equation}
where the integral on $dt$ is evaluated from $t_0$ and $t_0 +T$ and where now the relative state $\ket{\psi(t,x)}_S = \sqrt{2\pi} \left( \bra{t}\otimes\bra{x}\right)\ket{\Psi}$ reads
\begin{multline}\label{Gfin}
\ket{\psi(t,x)}_S = \int dp' \sum_{k} \sum_{l} \int dp ~ \tilde{c}_{kl} \psi(p) \beta(-p,E_k) \beta(p,E_l) \\ \times \beta^{*}(-p',E_k) \beta^{*}(p',E_l) e^{-i\epsilon_{kl}t} e^{-ixp'} \ket{p'}_S .
\end{multline}
Through the state (\ref{Gfin})
we can search also in this case the probability density $P(y \: on\: S\:|\:x\:on\:R,\: t \: on \:C) = \left| \braket{y|\psi(t,x)} \right|^2$ obtaining:
\begin{multline}\label{Gprobfinale}
P(y \: on\: S\:|\:x\:on\:R,\: t \: on \:C) = \frac{1}{2\pi} |\int dp' \sum_{k} \sum_{l} \int dp ~ \tilde{c}_{kl} \psi(p) \beta(-p,E_k) \beta(p,E_l) \\ \times \beta^{*}(-p',E_k) \beta^{*}(p',E_l) e^{-i\epsilon_{kl}t} e^{ip'(y-x)}|^2
\end{multline}
which still depends on time $t$ and on the relative distance $y-x$ between $S$ and $R$.
\section{Multiple Time Measurements}
Throughout this work, we have seen how conditional probabilities lie at the heart of the PaW mechanism. This aspect of the theory has been criticised by K. V. Kuchar \cite{kuchar} who emphasized that the PaW mechanism is not able to provide the correct propagators when considering multiple measurements. Indeed measurements of the system at two times will give the wrong statistics because the first measurement \lq\lq collapses\rq\rq the time state and freezes the rest of the Universe (namely $R$ and $S$ in our framework). Two possible ways out of this problem have been proposed: the first by R. Gambini, R. A. Porto, J. Pullin, and S. Torterolo (GPPT) in \cite{gppt} (see also \cite{esp1}) and the second by V. Giovannetti, S. Lloyd and L. Maccone (GLM) in \cite{lloydmaccone}.
We will now explore how these proposals can be applied to our framework of emerging spacetime. For the sake of simplicity we consider again a simple case: we start from the framework described in Sections 2.1 and 3.1, we work with discrete values of space and time and we choose $d_C=D_C$, $d_R=D_R$, $d_S=D_S$. This latter assumption implies that we are considering an equally-spaced spectrum for $\hat{H}_C$ and we emphasize that this choice leads to orthogonal states of time and position, namely $\braket{t_m|t_{m'}}=\delta_{m,m'}$ on $C$, $\braket{x_i|x_{j}}=\delta_{i,j}$ on $R$ and $\braket{y_l|y_{k}}=\delta_{l,k}$ on $S$.
In the case of GPPT theory, this simplified framework can then be readily generalized to the case of unequally-spaced levels for $\hat{H}_C$ and to the limiting cases $z,s \longrightarrow \infty$, where time and position are represented by POVMs. Conversely, for the GLM proposal the assumption of orthogonal time states in $C$ and orthogonal position states in $R$ and $S$ will be necessary.
\subsection{The GPPT proposal}
As pointed out in \cite{esp1} one of the main ingredients of the GPPT theroy is the averaging over the abstract coordinate time (the \lq\lq external time\rq\rq) in order to eliminate any external time dependence in the observables. With the perspective of calculating the probabilities for multiple time measurements, we look in this section at the probability $P(y_l \: on \: S, \: x_j \: on \: R \: | \: t_m \: on \: C)$ of having $y_l$ on $S$ and $x_j$ on $R$ conditioned to having $t_m$ on $C$. This probability essentially is not different from the probabilities we have calculated so far (apart from a numerical factor). We will see indeed that it will depend on the relative distance between $R$ and $S$ in the same way as we found in the previous Section. What clearly is different is the interpretation of this probability, where the value of the reference frame $R$ is not given and can vary. Following GPPT this probability is given by \cite{gppt}:
\begin{equation}\label{cpGPPT}
\begin{split}
P(y_l \: on \: S, \: x_j \: on \: R \: | \: t_m \: on \: C) &= \frac{\int d\theta \: Tr \left[ \hat{\Pi}_{t_m,x_j,y_l}(\theta) \hat{\rho} \right]}{\int d\theta \: Tr \left[ \hat{\Pi}_{t_m}(\theta) \hat{\rho} \right]} = \\&
= \frac{1}{d_R} \frac{1}{d_S} \left| \sum_{k=0}^{d_S - 1} c_k e^{-i\epsilon_k t_m } e^{i p_k (y_l - x_j)}\right|^2
\end{split}
\end{equation}
where $\hat{\rho}=\ket{\Psi}\bra{\Psi}= \sum_{k}\sum_{k'}c_k c^{*}_{k'}\ket{E=-\epsilon_k}\bra{E=-\epsilon_{k'}}\otimes\ket{p=-p_k}\bra{p=-p_{k'}}\otimes\ket{p_k}\bra{p_{k'}}$ is the global state of the Universe, $\theta$ is the external time, $\hat{\Pi}_{t_m}(\theta)=\hat{U}^{\dagger} (\theta) \hat{\Pi}_{t_m} \hat{U}(\theta)$ (with $\hat{U}(\theta) = e^{-i\hat{H}\theta}$) is the projector relative to the result $t_m$ for a clock measurement at external time $\theta$ and $\hat{\Pi}_{t_m,x_j,y_l}(\theta)=\hat{U}^{\dagger} (\theta) \hat{\Pi}_{t_m,x_j,y_l} \hat{U}(\theta)$ is the projector relative to the result $y_l$ for a measurement on $S$, $x_j$ for a measurement on $R$ and $t_m$ for a measurement on $C$ at external time $\theta$ (we are working here in the Heisenberg picture with respect to the external time $\theta$). Equation (\ref{cpGPPT}) now takes the place of equations (\ref{probfinalediscreta}) and (\ref{probfinale}) and, as expected, depends on time $t_m$ and on the distance $y_l - x_j$ between the two subsystems $S$ and $R$.
Equation (\ref{cpGPPT}) can be generalized to the case of multiple time measurements. For two measurements at times $t_m$ and $t_{m'}$ (with $t_{m'} > t_m$) we have:
\begin{multline}\label{cpGPPT2}
P(y_{l'} \: on \: S, x_{j'} \: on \: R \: | \:t_{m'} \: on \: C,y_l, x_j, t_m) =\\
= \frac{\int d\theta \int d\theta' \: Tr \left[\hat{\Pi}_{t_{m'},x_{j'},y_{l'}}(\theta) \hat{\Pi}_{t_m,x_j,y_l}(\theta') \hat{\rho} \hat{\Pi}_{t_m,x_j,y_l}(\theta') \right]}{\int d\theta \int d\theta' \: Tr \left[\hat{\Pi}_{t_{m'}}(\theta) \hat{\Pi}_{t_m,x_j,y_l}(\theta') \hat{\rho} \hat{\Pi}_{t_m,x_j,y_l}(\theta') \right]}
\end{multline}
which provides the conditional probability of obtaining $y_{l'}$ and $x_{j'}$ on $S$ and $R$ at clock time $t_{m'}$, given that a \lq\lq previous\rq\rq joint measurement of $S$, $R$ and $C$ returns $y_l$, $x_j$ and $t_m$. Proceeding with the calculations from the equation (\ref{cpGPPT2}) we obtain:
\begin{equation}\label{cpGPPT3}
\begin{split}
P(y_{l'} \: on \: S, x_{j'} \: on \: R \: | \:t_{m'} \: on \: C,y_l, x_j, t_m)
= \frac{1}{d^{2}_R} \frac{1}{d^{2}_S} \left| \sum_{k=0}^{d_S-1} e^{-i\epsilon_k(t_{m'} - t_m)} e^{ip_k(\Delta_f - \Delta_i)}\right|^2
\end{split}
\end{equation}
where we have written $\Delta_i=y_l - x_j$ and $\Delta_f=y_{l'} - x_{j'}$ respectively the initial distance and the final distance (namely the distance at the first measurement at time $t_m$ and the distance at the second measurement at time $t_{m'}$) between the particle $S$ and $R$. This equation provides the the correct propagator (the same result can be indeed obtained calculating $\left|\bra{x_{j'}} \bra{y_{l'}} e^{-i(\hat{H}_R + \hat{H}_S)(t_{m'} - t_m)}\ket{x_j}\ket{y_l}\right|^2$) and again depends on the initial and the final relative distances between $S$ and $R$.
As previously mentioned, these results can be readily generalized to the case of unequally-spaced levels for $\hat{H}_C$ and to the limiting cases $z,s \longrightarrow \infty$. Indeed, in our framework, the fact of using POVMs in describing time and space does not constitute a problem in the application of the GPPT theory because when we calculate the probability $P(y_{l'} \: on \: S, x_{j'} \: on \: R \: | \:t_{m'} \: on \: C,y_l, x_j, t_m)$ through the (\ref{cpGPPT2}) we do not find terms related to the overlap between the states and therefore interference phenomena are not present even if the states are not orthogonal \cite{nostro2}.
\subsection{GLM's Multiple Measurements}
We focus now on the GLM proposal applying it directly to our case of emergent spacetime. In this Section we consider the global state of the Universe written as in (\ref{serveperGLM}), that in our particular case of orthogonal states of time and space ($d_C=D_C$, $d_R=D_R$, $d_S=D_S$) becomes
\begin{equation}\label{statoGLM}
\begin{split}
\ket{\Psi}
= \frac{1}{\sqrt{d_C}}\sum_{m=0}^{d_C -1} \ket{t_m}_C \otimes \hat{U}_{R,S}(t_m - t_0)\ket{\phi(t_0)}_{R,S}
\end{split}
\end{equation}
where $\ket{\phi(t_0)}_{R,S}$ is the state of $R+S$ conditioned on $t_0$ that is the value of the clock taken as initial time and where thanks to the (\ref{evoluzioneRS}) we have defined $\hat{U}_{R,S}(t_m - t_0)=e^{-i(\hat{H}_R + \hat{H}_S)(t_{m} - t_0)}$.
Again we start considering to perform a single measurement within $R+S$ at time $t_{m'}$. We divide the spaces $R$ and $S$ into two subsystems respectively: $\mathcal{H}_R = \mathcal{H}_{Q_R}\otimes\mathcal{H}_{M_R}$ and $\mathcal{H}_S = \mathcal{H}_{Q_S}\otimes\mathcal{H}_{M_S}$ where $Q_R$, $Q_S$ are the systems to be measured (the \textit{observed}) and $M_R$, $M_S$ are the ancillary memory systems (the \textit{observers}). In this framework GLM use von Neumann's prescription for measurements \cite{vonneumann}, where a measurement apparatus essentially consists in an (ideally instantaneous) interaction between the observed and the observers. The interaction correlates $Q_R$ with $M_R$ and $Q_S$ with $M_S$ along the eigenbasis $\{ \ket{x_j , y_l}\}$ of the observables $\hat{X}=\sum_{j}x_j\ket{x_j}\bra{x_j}$ and $\hat{Y}= \sum_{l}y_l\ket{y_l}\bra{y_l}$ to be measured, that is
\begin{equation}\label{mapping}
\ket{\phi(t_m)}_{Q_R,Q_S}\otimes\ket{r,r}_{M_R,M_S} \rightarrow \sum_{j=0}^{d_R -1}\sum_{l=0}^{d_S -1}\left( \braket{x_j,y_l|\phi(t_m)} \right)\ket{x_j,y_l}_{Q_R,Q_S}\otimes\ket{x_j,y_l}_{M_R,M_S}
\end{equation}
where $\ket{r,r}_{M_R,M_S}$ is the stete of the memories before the interaction and $\braket{x_j,y_l|\phi(t_m)}$ is the probabiliy amplitude of obtaining $x_j$ and $y_l$ when measuring the observables $\hat{X}$ and $\hat{Y}$. In this framework the Hamiltonian of $R+S$ can be written as
\begin{equation}\label{hamiltonianaGLM}
\hat{H}_R(t_m) + \hat{H}_S(t_m)= \hat{H}_{Q_R} + \hat{H}_{Q_S} + \delta_{m,m'}\left( \hat{h}_{Q_R,M_R} + \hat{h}_{Q_S,M_S} \right)
\end{equation}
where $\hat{h}_{Q_i,M_i}$ are responsible for the mapping equation (\ref{mapping}). So we can write the global state (\ref{statoGLM}) including the measurement thus obtaining \cite{lloydmaccone,esp2}
\begin{multline}\label{singolamisuraGLM}
\ket{\Psi} = \frac{1}{\sqrt{d_C}}\sum_{m < m'} \ket{t_m}_C \otimes \hat{U}_{R,S}(t_m - t_0)\ket{\phi(t_0)}_{Q_R,Q_S}\otimes\ket{r,r}_{M_R,M_S} + \\
+ \frac{1}{\sqrt{d_C}}\sum_{m \ge m'} \ket{t_m}_C \otimes \sum_{j=0}^{d_R -1}\sum_{l=0}^{d_S -1}\left( \braket{x_j,y_l|\phi(t_m)} \right) \hat{U}_{Q_R,Q_S}(t_m - t_{m'})\ket{x_j,y_l}_{Q_R,Q_S}\otimes\ket{x_j,y_l}_{M_R,M_S}
\end{multline}
where the first summation describes the evolution of $R+S$ prior to the measurement, when the memories are in the state $\ket{r,r}_{M_R,M_S}$, whereas the second summation describes the evolution after the measurement, when the memories are correlated with the subsystems $Q_R$ and $Q_S$. Now the probability that, at a given time $t_{m'}$, the values $x_{j'}$ and $y_{l'}$ will be registered by the memories $M_R$ and $M_S$ respectively can be expressed as \cite{lloydmaccone}:
\begin{equation}\label{probGLM}
P(x_{j'},y_{l'} \: | \: t_{m'} ) = \frac{|| \left( _{C}\bra{t_{m'}}\otimes _{M_R}\bra{x_{j'}}\otimes _{M_S}\bra{y_{l'}}\right)\ket{\Psi}||^2}{1/d_C}
\end{equation}
where we use the norm of a vector as $||\ket{v}||^2 = \braket{v|v}$. Equation (\ref{probGLM}) returns the correct result
\begin{equation}
P(x_{j'},y_{l'} \: | \: t_{m'} ) = \left| \braket{x_{j'},y_{l'}|\phi(t_{m'})} \right|^2 = \frac{1}{d_R} \frac{1}{d_S} \left| \sum_{k=0}^{d_S - 1} c_k e^{-i\epsilon_k t_{m'} } e^{i p_k (y_{l'} - x_{j'})}\right|^2 .
\end{equation}
The GLM formalism allows us easily to calculate also the probability $P(y_{l'} \: | \:x_{j'}, t_{m'} )$ simply by dividing equation (\ref{probGLM}) by $1/d_R$. In this case we obtain: $P(y_{l'} \: | \:x_{j'}, t_{m'} ) = \frac{1}{d_S} \left| \sum_{k=0}^{d_S - 1} c_k e^{-i\epsilon_k t_{m'} } e^{i p_k (y_{l'} - x_{j'})}\right|^2$ in accordance with our previous results.
It is now possible to extend equations (\ref{hamiltonianaGLM}), (\ref{singolamisuraGLM}) and (\ref{probGLM}) in order to perform multiple measurements. The framework allows an arbitrary number of measurements but we consider here only the simple case of a double measurement at times $t_{m'}$ and $t_{m''}$ (with $t_{m''} > t_{m'}$). What we have to do is simply consider a larger set of memories $M^{(1)}_R$, $M^{(1)}_S$, $M^{(2)}_R$ and $M^{(2)}_S$ (where $M^{(1)}_R$, $M^{(1)}_S$ refer to the first measurement and $M^{(2)}_R$, $M^{(2)}_S$ refer to the second measurement) which couple with $Q_R$ and $Q_S$ through the time-dependent Hamiltonian
\begin{multline}
\hat{H}_R(t_m) + \hat{H}_S(t_m)= \hat{H}_{Q_R} + \hat{H}_{Q_S} +\\+ \delta_{m,m'}\left( \hat{h}_{Q_R,M^{(1)}_R} + \hat{h}_{Q_S,M^{(1)}_S} \right)
+ \delta_{m,m''}\left( \hat{h}_{Q_R,M^{(2)}_R} + \hat{h}_{Q_S,M^{(2)}_S} \right) .
\end{multline}
The global state (\ref{statoGLM}) including the double measurement can then be written \cite{lloydmaccone,esp2}
\begin{multline}\label{doppiamisuraGLM}
\ket{\Psi} = \frac{1}{\sqrt{d_C}}\sum_{m < m'} \ket{t_m}_C \otimes \hat{U}_{R,S}(t_m - t_0)\ket{\phi(t_0)}_{Q_R,Q_S}\otimes\ket{r,r}_{M^{(1)}_R,M^{(1)}_S}\otimes \ket{r,r}_{M^{(2)}_R,M^{(2)}_S} + \\
+ \frac{1}{\sqrt{d_C}} \sum_{m' \le m < m''} \ket{t_m}_C \otimes \sum_{j=0}^{d_R -1}\sum_{l=0}^{d_S -1}\left( \braket{x_j,y_l|\phi(t_m)} \right)\\
\times \hat{U}_{Q_R,Q_S}(t_m - t_{m'})\ket{x_j,y_l}_{Q_R,Q_S} \otimes\ket{x_j,y_l}_{M^{(1)}_R,M^{(1)}_S}\otimes\ket{r,r}_{M^{(2)}_R,M^{(2)}_S} + \\
+ \frac{1}{\sqrt{d_C}} \sum_{m \ge m''} \ket{t_m}_C \otimes \sum_{i=0}^{d_R -1}\sum_{k=0}^{d_S -1} \sum_{j=0}^{d_R -1}\sum_{l=0}^{d_S -1} \left( \bra{x_i,y_k}\hat{U}_{Q_R,Q_S}(t_{m''} -t_{m'})\ket{x_j,y_l}\right) \left( \braket{x_j,y_l|\phi(t_m)}\right) \\
\times \hat{U}_{Q_R,Q_S}(t_m - t_{m''})\ket{x_i,y_k}_{Q_R,Q_S}\otimes\ket{x_j,y_l}_{M^{(1)}_R,M^{(1)}_S}\otimes\ket{x_i,y_k}_{M^{(2)}_R,M^{(2)}_S} .
\end{multline}
Through the state (\ref{doppiamisuraGLM}) we search now the probability of obtaining $x_{j''}$ and $y_{l''}$ on $R$ and $S$ at time $t_{m''}$, given that a \lq\lq previous\rq\rq measurement at time $t_{m'}$ returns $x_{j'}$ and $y_{l'}$. This can be formally expressed as follows \cite{lloydmaccone}
\begin{multline}\label{probdoppioGLM}
P\left( \left( x_{j''},y_{l''} \: | \: t_{m''} \right)\:|\:\left( x_{j'},y_{l'} \: | \: t_{m'} \right) \right) = \frac{P(x_{j''},y_{l''},x_{j'},y_{l'}\:|\:t_{m''})}{P(x_{j'},y_{l'} \: | \: t_{m'})}=\\
= \frac{||(_{C}\bra{t_{m''}}\otimes _{M^{(1)}_R}\bra{x_{j'}}\otimes _{M^{(1)}_S}\bra{y_{l'}} \otimes _{M^{(2)}_R}\bra{x_{j''}}\otimes _{M^{(2)}_S}\bra{y_{l''}})\ket{\Psi} ||^2}{|| (_{C}\bra{t_{m'}}\otimes _{M^{(1)}_R}\bra{x_{j'}}\otimes _{M^{(1)}_S}\bra{y_{l'}})\ket{\Psi} ||^2}
\end{multline}
which returns the correct result for a two-times measurement:
\begin{equation}\label{pf}
\begin{split}
P\left( \left( x_{j''},y_{l''} \: | \: t_{m''} \right)\:|\:\left( x_{j'},y_{l'} \: | \: t_{m'} \right) \right) &= \left| \bra{x_{j''},y_{l''}}\hat{U}_{Q_R,Q_S}(t_{m''} -t_{m'})\ket{x_{j'},y_{l'}}\right|^2 =\\&
= \frac{1}{d^{2}_R} \frac{1}{d^{2}_S} \left| \sum_{k=0}^{d_S-1} e^{-i\epsilon_k(t_{m''} - t_{m'})} e^{ip_k(\Delta_f - \Delta_i)}\right|^2
\end{split}
\end{equation}
where $\Delta_i=y_{l'} - x_{j'}$ and $\Delta_f=y_{l''} - x_{j''}$ are again the distances between $R$ and $S$ at times $t_{m'}$ and $t_{m''}$ respectively.
The result (\ref{pf}) follows from the fact that $$P(x_{j''},y_{l''},x_{j'},y_{l'}\:|\:t_{m''}) = \left| \left( \bra{x_{j''},y_{l''}}\hat{U}_{Q_R,Q_S}(t_{m''} -t_{m'})\ket{x_{j'},y_{l'}}\right) \left( \braket{x_{j'},y_{l'}|\phi(t_{m'})}\right) \right|^2$$ obtained from the third summation in (\ref{doppiamisuraGLM}) and $P(x_{j'},y_{l'} \: | \: t_{m'}) = \left| \braket{x_{j'},y_{l'}|\phi(t_{m'})} \right|^2$ obtained from the second summation in (\ref{doppiamisuraGLM}). It is finally easy to verify that the probability $P\left( \left( y_{l''} \: | \: x_{j''}, t_{m''} \right)\:|\:\left( y_{l'} \: | \:x_{j'}, t_{m'} \right) \right)$ can be obtained dividing (\ref{pf}) by $1/d^2_{R}$. So we find: $P\left( \left( y_{l''} \: | \: x_{j''}, t_{m''} \right)\:|\:\left( y_{l'} \: | \:x_{j'}, t_{m'} \right) \right)=\frac{1}{d^{2}_S} \left| \sum_{k=0}^{d_S-1} e^{-i\epsilon_k(t_{m''} - t_{m'})} e^{ip_k(\Delta_f - \Delta_i)}\right|^2$.
As we mentioned previously the GLM proposal can not be generalized, in our framework, to the case of non-orthogonal states of time and space and consequently in applying the GLM theory we are forced to assume $D_R=d_R$, $D_S=d_S$ and equally-spaced energy levels in $\hat{H}_C$.
\section{Generalization to $3+1$ Dimensional Spacetime}
\label{Generalization}
We generalize here the results of Section 3.2 to the case of $3+1$ dimensional spacetime, meaning that we have now three degrees of freedom within the subspaces $R$ and $S$. The constraint on total energy reads again:
\begin{equation}\label{4constraint1}
\hat{H}\ket{\Psi} = ( \hat{H}_C + \hat{H}_R +\hat{H}_S)\ket{\Psi}=0 .
\end{equation}
The Hamiltonians $\hat{H}_R$ and $\hat{H}_S$ in (\ref{4constraint1}) depend respectively on the operators $\hat{P}^{(1)}_R$, $\hat{P}^{(2)}_R$, $\hat{P}^{(3)}_R$ and $\hat{P}^{(1)}_S$, $\hat{P}^{(2)}_S$, $\hat{P}^{(3)}_S$ where $1,2,3$ are the three degrees of freedom identifying three orthogonal directions in space\footnote{Also in this case, for simplicity, we assume that no external potentials are present in $R$ and $S$.}. The constraint on the total momentum reads now $\vec{P}\ket{\Psi} = (\vec{P}_R + \vec{P}_S)\ket{\Psi}=0$, which we rewrite as
\begin{equation}\label{4constraint2}
\begin{split}
& (\hat{P}^{(1)}_R + \hat{P}^{(1)}_S)\ket{\Psi}=0
\\& (\hat{P}^{(2)}_R + \hat{P}^{(2)}_S)\ket{\Psi}=0
\\& (\hat{P}^{(3)}_R + \hat{P}^{(3)}_S)\ket{\Psi}=0
\end{split}
\end{equation}
where, also in this case, for simplicity we have chosen $\vec{P}_C = 0$ (with $\hat{P}^{(1)}_C = \hat{P}^{(2)}_C=\hat{P}^{(3)}_C=0$). So, assuming $d_C, d^{(1)}_R,d^{(2)}_R,d^{(3)}_R \gg d^{(1)}_S,d^{(2)}_S,d^{(3)}_S$ and simplifying the notation as much as possible, the global state $\ket{\Psi}$ satisfying the constraints (\ref{4constraint1}) and (\ref{4constraint2}) can be written as
\begin{equation}\label{4statoglobale}
\ket{\Psi} = \sum_{i=0}^{d^{(1)}_S - 1} \sum_{j=0}^{d^{(2)}_S - 1} \sum_{k=0}^{d^{(3)}_S - 1} c_{ijk}\ket{-\epsilon_{ijk}}_C \otimes \ket{-p^{(1)}_i , -p^{(2)}_j, -p^{(3)}_k }_R \otimes \ket{p^{(1)}_i , p^{(2)}_j, p^{(3)}_k }_S
\end{equation}
where $d^{(1)}_R,d^{(2)}_R,d^{(3)}_R$ and $d^{(1)}_S,d^{(2)}_S,d^{(3)}_S$ are the dimensions of the subspaces of $R$ and $S$ (associated with the three spatial directions 1,2,3) and $\epsilon_{ijk}$ is the energy function related with the momenta of $R$ and $S$. In the next two paragraphs we will study separately the case of discrete values for space and time and then the case of continuous values for space and time.
\subsection{Discrete Values for Space and Time}
Starting from the state $\ket{\Psi}$ satisfying (\ref{4constraint1}) and (\ref{4constraint2}), we can now expand it on the basis $\left\{\ket{t_a}_C\right\}$ in $C$ thanks to (\ref{pomidentity2}), thus obtaining
\begin{equation}
\begin{split}
\ket{\Psi} = \frac{d_C}{D_C} \sum_{a=0}^{D_C -1}\ket{t_a}\braket{t_a|\Psi} = \frac{\sqrt{d_C}}{D_C}\sum_{a=0}^{D_C -1}\ket{t_a}_C \otimes \ket{\phi(t_a)}_{R,S}
\end{split}
\end{equation}
where the relative state $\ket{\phi(t_a)}_{R,S} = \sqrt{d_C}\braket{t_a|\Psi}$ takes now the form
\begin{equation}
\ket{\phi(t_a)}_{R,S} = \sum_{i=0}^{d^{(1)}_S - 1} \sum_{j=0}^{d^{(2)}_S - 1} \sum_{k=0}^{d^{(3)}_S - 1} c_{ijk} e^{-it_a \epsilon_{ijk}} \ket{-p^{(1)}_i , -p^{(2)}_j, -p^{(3)}_k }_R \otimes \ket{p^{(1)}_i , p^{(2)}_j, p^{(3)}_k }_S .
\end{equation}
For this relative state we again easily find the Schrödiger evolution with respect to the clock values, namely
\begin{equation}
\ket{\phi(t_a)}_{R,S} = e^{-i (\hat{H}_R + \hat{H}_S)(t_a - t_0)}\ket{\phi(t_0)}_{R,S}
\end{equation}
where $\ket{\phi(t_0)}_{R,S}= \sqrt{d_C} \braket{t_0|\Psi}$ is the state of $R+S$ conditioned on $t_0$ that is the value of the clock taken as initial time. All the consideration made in Section 3.2 are clearly still valid in this case and we do not repeat them.
We emphasize here that in each subspace of $R$, related to the three degrees of freedom, we apply the formalism described in Section 2. This means considering the states $\ket{x^{(J)}_n} = 1/\sqrt{d^{(J)}_R}\sum_{k=0}^{d^{(J)}_R -1}e^{-i p^{(J)}_k x^{(J)}_n}\ket{p^{(J)}_k}$ and the values $x^{(J)}_n = x^{(J)}_0 + n L^{(J)}_R/D^{(J)}_R$ with $n=0,1,2,...,z=D^{(J)}_R -1$ for $J=1,2,3$. The same clearly holds for the subspaces within the system $S$ that we equip with the states $\ket{y^{(J)}_q} = 1/\sqrt{d^{(J)}_S}\sum_{k=0}^{d^{(J)}_S -1}e^{-i p^{(J)}_k y^{(J)}_q}\ket{p^{(J)}_k}$ and with the values $y^{(J)}_q = y^{(J)}_0 + q L^{(J)}_S/D^{(J)}_S$ with $q=0,1,2,...,z=D^{(J)}_S -1$ (for semplicity we choose $D^{(J)}_R = D^{(J)}_S =z+1 ~ \forall J$). We can now expand the state $\ket{\Psi}$ in the coordinates $\left\{ \ket{x^{(1)}_l , x^{(2)}_m, x^{(3)}_n}_R\right\}$ in $R$:
\begin{equation}
\begin{split}
\ket{\Psi} &=\frac{d^{(1)}_R}{D^{(1)}_R} \frac{d^{(2)}_R}{D^{(2)}_R} \frac{d^{(3)}_R}{D^{(3)}_R} \sum_{l=0}^{D^{(1)}_R - 1} \sum_{m=0}^{D^{(2)}_R - 1} \sum_{n=0}^{D^{(3)}_R - 1}\ket{x^{(1)}_l , x^{(2)}_m, x^{(3)}_n}\braket{x^{(1)}_l , x^{(2)}_m, x^{(3)}_n|\Psi} =\\&
= \frac{\sqrt{d^{(1)}_R}}{D^{(1)}_R} \frac{\sqrt{d^{(2)}_R}}{D^{(2)}_R} \frac{\sqrt{d^{(3)}_R}}{D^{(3)}_R} \sum_{l=0}^{D^{(1)}_R - 1} \sum_{m=0}^{D^{(2)}_R - 1} \sum_{n=0}^{D^{(3)}_R - 1}\ket{x^{(1)}_l , x^{(2)}_m, x^{(3)}_n}_R \otimes \ket{\varphi(x^{(1)}_l , x^{(2)}_m, x^{(3)}_n)}_{C,S}
\end{split}
\end{equation}
where $\ket{\varphi(x^{(1)}_l , x^{(2)}_m, x^{(3)}_n)}_{C,S}= \sqrt{d^{(1)}_R d^{(2)}_R d^{(3)}_R} \braket{x^{(1)}_l , x^{(2)}_m, x^{(3)}_n|\Psi}$ is the relative state of $C+S$ conditioned to the value $(x^{(1)}_l , x^{(2)}_m, x^{(3)}_n)$ of the reference frame $R$. For this relative state we find:
\begin{multline}\label{4trasl}
\ket{\varphi(x^{(1)}_l , x^{(2)}_m, x^{(3)}_n)}_{C,S} = \sqrt{d^{(1)}_R d^{(2)}_R d^{(3)}_R} \braket{x^{(1)}_l , x^{(2)}_m, x^{(3)}_n|\Psi}=\\
= \sqrt{d^{(1)}_R d^{(2)}_R d^{(3)}_R} \bra{x^{(1)}_l , x^{(2)}_m, x^{(3)}_n}e^{i\hat{P}^{(1)}_R(x^{(1)}_l - x^{(1)}_0)}e^{i\hat{P}^{(2)}_R(x^{(2)}_m - x^{(2)}_0)}e^{i\hat{P}^{(3)}_R(x^{(3)}_n - x^{(3)}_0)}\ket{\Psi}=\\
=e^{-i\hat{P}^{(1)}_S(x^{(1)}_l - x^{(1)}_0)}e^{-i\hat{P}^{(2)}_S(x^{(2)}_m - x^{(2)}_0)}e^{-i\hat{P}^{(3)}_S(x^{(3)}_n - x^{(3)}_0)} \ket{\varphi(x^{(1)}_0 , x^{(2)}_0, x^{(3)}_0)}_{C,S}
\end{multline}
where we used the relative state definition and the constraint (\ref{4constraint2}). Equation (\ref{4trasl}) can be rewritten in a more compact form as
\begin{equation}
\ket{\varphi(\vec{x_0} + \vec{a})}_{C,S} = e^{-i\vec{a} \cdot \vec{P}_S} \ket{\varphi(\vec{x_0})}_{C,S}
\end{equation}
where $\vec{P}_S = (\hat{P}^{(1)}_S,\hat{P}^{(2)}_S,\hat{P}^{(3)}_S)$, $\vec{x_0} = (x^{(1)}_0 , x^{(2)}_0, x^{(3)}_0)$ is the initial position of the reference frame and the translation vector is $\vec{a} = (x^{(1)}_l - x^{(1)}_0, x^{(2)}_m - x^{(2)}_0, x^{(3)}_n - x^{(3)}_0)$.
Finally we can expand the state $\ket{\Psi}$ simultaneously on time $\left\{\ket{t_a}_C\right\}$ and on the coordinates $\left\{ \ket{x^{(1)}_l , x^{(2)}_m, x^{(3)}_n}_R\right\}$, thus obtaining:
\begin{equation}
\begin{split}
\ket{\Psi} &= \left( \frac{d_C}{D_C} \sum_{a
\ket{t_a}\bra{t_a} \otimes \frac{d^{(1)}_R}{D^{(1)}_R} \frac{d^{(2)}_R}{D^{(2)}_R} \frac{d^{(3)}_R}{D^{(3)}_R} \sum_{l,m,n}
\ket{x^{(1)}_l , x^{(2)}_m, x^{(3)}_n}\bra{x^{(1)}_l , x^{(2)}_m, x^{(3)}_n} \right)\ket{\Psi} = \\&
= \frac{\sqrt{d_C}}{D_C}\frac{\sqrt{d^{(1)}_R}}{D^{(1)}_R} \frac{\sqrt{d^{(2)}_R}}{D^{(2)}_R} \frac{\sqrt{d^{(3)}_R}}{D^{(3)}_R} \sum_{a}\sum_{l,m,n}
\ket{t_a}_C \otimes \ket{x^{(1)}_l , x^{(2)}_m, x^{(3)}_n}_R \otimes \ket{\psi(t_a,x^{(1)}_l , x^{(2)}_m, x^{(3)}_n)}_S
\end{split}
\end{equation}
where the summation on time runs from $0$ to $D_C -1$, the summations on $l,m,n$ run from $0$ to $D^{(1)}_R -1$, $D^{(2)}_R -1$, $D^{(3)}_R -1$ respectively and where $\ket{\psi(t_a,x^{(1)}_l , x^{(2)}_m, x^{(3)}_n)}_S = \sqrt{d_C}\sqrt{d^{(1)}_R d^{(2)}_R d^{(3)}_R}(\bra{t_a}\otimes\bra{x^{(1)}_l , x^{(2)}_m, x^{(3)}_n})\ket{\Psi}$ is the relative state of the system $S$ at time $t_a$ and conditioned on the value $(x^{(1)}_l , x^{(2)}_m, x^{(3)}_n)$ for the spatial reference frame $R$. Through this state, extending the formalism of Section 3.2, we can search the conditional probability:
\begin{multline}\label{4probdiscreta}
P(y^{(1)}_p, y^{(2)}_q,y^{(3)}_r\:|\:x^{(1)}_l , x^{(2)}_m, x^{(3)}_n,t_a) = \\
= \frac{d^{(1)}_S}{D^{(1)}_S} \frac{d^{(2)}_S}{D^{(2)}_S} \frac{d^{(3)}_S}{D^{(3)}_S}
\left|\braket{y^{(1)}_p, y^{(2)}_q,y^{(3)}_r|\psi(t_a,x^{(1)}_l , x^{(2)}_m, x^{(3)}_n)}\right|^2=\\
=\frac{1}{D^{(1)}_S} \frac{1}{D^{(2)}_S} \frac{1}{D^{(3)}_S} \left| \sum_{i,j,k
c_{ijk} e^{-it_a\epsilon_{ijk}} e^{ip^{(1)}_i(y^{(1)}_p - x^{(1)}_l )} e^{ip^{(2)}_j (y^{(2)}_q - x^{(2)}_m )} e^{ip^{(3)}_k(y^{(3)}_r - x^{(3)}_n )}\right|^2
\end{multline}
where the summations on $i,j,k$ run from $0$ to $d^{(1)}_S - 1$, $d^{(2)}_S - 1$ and $d^{(3)}_S - 1$ respectively. Equation (\ref{4probdiscreta}) provides the probability of having a certain position $(y^{(1)}_p, y^{(2)}_q,y^{(3)}_r)$ on $S$ at time $t_a$ and knowing that the spatial reference frame $R$ is in $(x^{(1)}_l , x^{(2)}_m, x^{(3)}_n)$. This conditional probability is well-defined (indeed it is easy to verify that we have $\sum_{p=0}^{D^{(1)}_S - 1} \sum_{q=0}^{D^{(2)}_S - 1} \sum_{r=0}^{D^{(3)}_S - 1} P(y^{(1)}_p, y^{(2)}_q,y^{(3)}_r\:|\:x^{(1)}_l , x^{(2)}_m, x^{(3)}_n,t_a)=1$) and, as expected depends on the relative distance between $R$ and $S$.
\subsection{Continuous Values for Space and Time}
We consider now the case of continuous values for space and time. We therefore assume $s\longrightarrow \infty$ for the space $C$ and $z\longrightarrow \infty$ within the subspaces of $R$ and $S$. This implies that we have the states $\ket{x^{(J)}} = \sum_{k=0}^{d^{(J)}_R -1}e^{-i p^{(J)}_k x^{(J)}}\ket{p^{(J)}_k}$ with $x^{(J)} \in \left[ x^{(J)}_0 , x^{(J)}_0 + L^{(J)}_R \right]$ within $R$ and the states $\ket{y^{(J)}} = \sum_{k=0}^{d^{(J)}_S -1}e^{-i p^{(J)}_k y^{(J)}}\ket{p^{(J)}_k}$ with $y^{(J)} \in \left[ y^{(J)}_0 , y^{(J)}_0 + L^{(J)}_S \right]$ within $S$ for $J=1,2,3$. Starting from the state (\ref{4statoglobale}) we can write:
\begin{equation}
\ket{\Psi} = \frac{1}{T} \int_{t_0}^{t_0 + T} dt \ket{t}\braket{t|\Psi} = \frac{1}{T} \int_{t_0}^{t_0 + T} dt \ket{t}_C\otimes\ket{\phi(t)}_{R,S}
\end{equation}
where the relative state $\ket{\phi(t)}_{R,S} = \braket{t|\Psi}$ takes now the form
\begin{equation}\label{86}
\ket{\phi(t)}_{R,S} = \sum_{i=0}^{d^{(1)}_S - 1} \sum_{j=0}^{d^{(2)}_S - 1} \sum_{k=0}^{d^{(3)}_S - 1} c_{ijk} e^{-it \epsilon_{ijk}} \ket{-p^{(1)}_i , -p^{(2)}_j, -p^{(3)}_k}_R \otimes \ket{p^{(1)}_i , p^{(2)}_j, p^{(3)}_k }_S .
\end{equation}
As in the $1+1$ dimensional case, using (\ref{4constraint1}) and (\ref{86}), for this relative state we find:
\begin{equation}\label{4evcont}
i \frac{\partial}{\partial t}\ket{\phi(t)}_{R,S} = (\hat{H}_R + \hat{H}_S)\ket{\phi(t)}_{R,S}
\end{equation}
which provides the Scrhödinger evolution of $R+S$ with respect to the clock time $t$.
We can now expand the global state $\ket{\Psi}$ in the coordinate basis $\left\{ \ket{x^{(1)} , x^{(2)}, x^{(3)} }_R\right\}$ in $R$, that is
\begin{equation}\label{87}
\begin{split}
\ket{\Psi} &= \frac{1}{L^{(1)}_R} \frac{1}{L^{(2)}_R} \frac{1}{L^{(3)}_R} \int dx^{(1)} \int dx^{(2)} \int dx^{(3)} \ket{x^{(1)} , x^{(2)}, x^{(3)}} \braket{x^{(1)} , x^{(2)}, x^{(3)}|\Psi}=\\&
=\frac{1}{L^{(1)}_R} \frac{1}{L^{(2)}_R} \frac{1}{L^{(3)}_R} \int dx^{(1)} \int dx^{(2)} \int dx^{(3)} \ket{x^{(1)} , x^{(2)}, x^{(3)}}_R \otimes \ket{\varphi(x^{(1)} , x^{(2)}, x^{(3)})}_{C,S}
\end{split}
\end{equation}
where each integral on $dx^{(J)}$ is evaluated from $x^{(J)}_0$ to $x^{(J)}_0 + L^{(J)}_R$ and where the state $\ket{\varphi(x^{(1)} , x^{(2)}, x^{(3)})}_{C,S}$ takes the form:
\begin{equation}\label{4statoCS}
\ket{\varphi(x^{(1)} , x^{(2)}, x^{(3)})}_{C,S} = \sum_{i,j,k}
c_{ijk} e^{-ip^{(1)}_i x^{(1)}} e^{-ip^{(2)}_j x^{(2)}} e^{-ip^{(3)}_k x^{(3)}} \ket{-\epsilon_{ijk}}_C \otimes \ket{p^{(1)}_i , p^{(2)}_j, p^{(3)}_k }_S
\end{equation}
where the summations on $i,j,k$ run from $0$ to $d^{(1)}_S - 1$, $d^{(2)}_S - 1$ and $d^{(3)}_S - 1$ respectively. Using the definition (\ref{4statoCS}) and the constraint (\ref{4constraint2}), for the relative state $\ket{\varphi(x^{(1)} , x^{(2)}, x^{(3)})}_{C,S} = \braket{x^{(1)} , x^{(2)}, x^{(3)}|\Psi}$ we can now obtain:
\begin{multline}
i\left(\frac{\partial}{\partial x^{(1)}} + \frac{\partial}{\partial x^{(2)}} + \frac{\partial}{\partial x^{(3)}} \right)\ket{\varphi(x^{(1)} , x^{(2)}, x^{(3)})}_{C,S}= \\
= \sum_{i,j,k} c_{ijk} p^{(1)}_i e^{ip^{(1)}_i x^{(1)}} e^{ip^{(2)}_j x^{(2)}} e^{ip^{(3)}_k x^{(3)}} \ket{-\epsilon_{ijk}}_C \otimes \ket{p^{(1)}_i , p^{(2)}_j, p^{(3)}_k }_S + \\
+ \sum_{i,j,k} c_{ijk} p^{(2)}_j e^{ip^{(1)}_i x^{(1)}} e^{ip^{(2)}_j x^{(2)}} e^{ip^{(3)}_k x^{(3)}} \ket{-\epsilon_{ijk}}_C \otimes \ket{p^{(1)}_i , p^{(2)}_j, p^{(3)}_k }_S + \\
+ \sum_{i,j,k} c_{ijk} p^{(3)}_k e^{ip^{(1)}_i x^{(1)}} e^{ip^{(2)}_j x^{(2)}} e^{ip^{(3)}_k x^{(3)}} \ket{-\epsilon_{ijk}}_C \otimes \ket{p^{(1)}_i , p^{(2)}_j, p^{(3)}_k }_S = \\ = \left(\hat{P}^{(1)}_S + \hat{P}^{(2)}_S +\hat{P}^{(3)}_S \right) \ket{\varphi(x^{(1)} , x^{(2)}, x^{(3)})}_{C,S}
\end{multline}
which shows $\vec{P}_S=(\hat{P}^{(1)}_S,\hat{P}^{(2)}_S,\hat{P}^{(3)}_S)$ to be the generator of translations for the states of $C+S$ acting on the coordinates of the spatial reference frame $\vec{x} = (x^{(1)} , x^{(2)}, x^{(3)})$.
Expanding the state $\ket{\Psi}$ simultaneously on the coordinates basis $\left\{ \ket{x^{(1)} , x^{(2)}, x^{(3)} }_R\right\}$ and on the time basis $\left\{\ket{t}_C\right\}$ we find:
\begin{multline}\label{4esp}
\ket{\Psi} = A \left( \int dt \ket{t}\bra{t} \otimes \int dx^{(1)} \int dx^{(2)} \int dx^{(3)} \ket{x^{(1)} , x^{(2)}, x^{(3)}} \bra{x^{(1)} , x^{(2)}, x^{(3)}} \right) \ket{\Psi} =\\
= A \int dt \int dx^{(1)} \int dx^{(2)} \int dx^{(3)} \ket{t}_C\otimes \ket{x^{(1)} , x^{(2)}, x^{(3)}}_R \otimes \ket{\psi(t,x^{(1)} , x^{(2)}, x^{(3)})}_S
\end{multline}
where $A= \frac{1}{T}\frac{1}{L^{(1)}_R} \frac{1}{L^{(2)}_R} \frac{1}{L^{(3)}_R}$. In equation (\ref{4esp}) the integral on time is evaluated from $t_0$ to $t_0 + T$ and each integral on $dx^{(J)}$ is evaluated from $x^{(J)}_0$ to $x^{(J)}_0 + L^{(J)}_R$. The state $\ket{\psi(t,x^{(1)} , x^{(2)}, x^{(3)})}_S = (\bra{t}\otimes\bra{x^{(1)} , x^{(2)}, x^{(3)}})\ket{\Psi}$
takes now the form
\begin{equation}
\ket{\psi(t,x^{(1)} , x^{(2)}, x^{(3)})}_S = \sum_{i,j,k} c_{ijk} e^{-it\epsilon_{ijk}} e^{-ip^{(1)}_i x^{(1)}} e^{-ip^{(2)}_j x^{(2)}} e^{-ip^{(3)}_k x^{(3)}} \ket{p^{(1)}_i , p^{(2)}_j, p^{(3)}_k }_S
\end{equation}
where the summations on $i,j,k$ run again from $0$ to $d^{(1)}_S - 1$, $d^{(2)}_S - 1$ and $d^{(3)}_S - 1$ respectively.
Through this state we can calculate the conditional probability density of having the position $(y^{(1)},y^{(2)},y^{(3)})$ on $S$ at time $t$ and knowing that the spatial reference frame $R$ is in $(x^{(1)} , x^{(2)}, x^{(3)})$. We have:
\begin{multline}
P(y^{(1)},y^{(2)},y^{(3)}\:|\:x^{(1)} , x^{(2)}, x^{(3)},t) =\\
= \frac{1}{L^{(1)}_S} \frac{1}{L^{(2)}_S} \frac{1}{L^{(3)}_S} \left| \braket{y^{(1)},y^{(2)},y^{(3)}|\psi(t,x^{(1)} , x^{(2)}, x^{(3)})} \right|^2 = \\
= \frac{1}{L^{(1)}_S} \frac{1}{L^{(2)}_S} \frac{1}{L^{(3)}_S} \left| \sum_{i,j,k
c_{ijk} e^{-it \epsilon_{ijk}} e^{ip^{(1)}_i(y^{(1)} - x^{(1)} )} e^{ip^{(2)}_j (y^{(2)} - x^{(2)} )} e^{ip^{(3)}_k(y^{(3)} - x^{(3)} )} \right|^2 .
\end{multline}
As in the previous cases, this probability density is well-defined (indeed we have $\int dy^{(1)} \int dy^{(2)} \int dy^{(3)} P(y^{(1)},y^{(2)},y^{(3)}\:|\:x^{(1)} , x^{(2)}, x^{(3)},t)=1$ with each integral on $dy^{(J)}$ evaluated from $y^{(J)}_0$ to $y^{(J)}_0 + L^{(J)}_S$) and it depends on time and on the relative distance between $R$ and $S$ in a 3-dimensional continuous space.
\subsection{Free Particles (with $M\gg m$) in $3+1$ Spacetime}
We give here a simple example of an emerging $3+1$ dimensional spacetime using continuous values of space and time, by starting from the framework described in Section 5.2. In doing so we adopt a slightly different formalism, which allows us to emphasize how space and time are treated here on equal footing.
We consider two systems that we call $\mathfrak{R}$ and $S$. The system $\mathfrak{R}$ acts as spacetime reference frame for $S$ and it is composed of a free particle of mass $M$ together with an additional degree of freedom (with zero momentum) that acts as a clock. We choose also $S$ as free particle of mass $m$ and we assume $M \gg m$ (as mentioned in Section 3.2 this choice implies that we will be able to neglect the kinetic energy term of $\mathfrak{R}$ with respect to the kinetic energy of $S$, namely $\mathfrak{R}$ is a good reference frame and moves very slightly in time).
The global Hamiltonian can be written:
\begin{equation}
\hat{H}=\hat{H}^{(0)}_{\mathfrak{R}} +\hat{H}^{(1)}_{\mathfrak{R}}+ \hat{H}^{(2)}_{\mathfrak{R}} + \hat{H}^{(3)}_{\mathfrak{R}} +\hat{H}_{S}
\end{equation}
where $\hat{H}^{(0)}_{\mathfrak{R}}$ is the Hamiltonian of the temporal reference frame (which takes the place of what was $\hat{H}_C$ in the previous discussion), $\hat{H}^{(1)}_{\mathfrak{R}}$, $\hat{H}^{(2)}_{\mathfrak{R}}$, $\hat{H}^{(3)}_{\mathfrak{R}}$ are the Hamiltonians depending on the momenta of the reference frame in the three spatial directions through $\hat{H}^{(1)}_{\mathfrak{R}} = \left( \hat{P}^{(1)}_{\mathfrak{R}} \right)^2/2M$, $\hat{H}^{(2)}_{\mathfrak{R}} = \left( \hat{P}^{(2)}_{\mathfrak{R}} \right)^2/2M$, $\hat{H}^{(3)}_{\mathfrak{R}} = \left( \hat{P}^{(3)}_{\mathfrak{R}} \right)^2/2M$ and $\hat{H}_S = \hat{H}^{(1)}_S + \hat{H}^{(2)}_S+ \hat{H}^{(3)}_S$ is the Hamiltonian of $S$ depending on the momenta $\hat{P}^{(1)}_S$, $\hat{P}^{(2)}_S$, $\hat{P}^{(3)}_S$ through $\hat{H}^{(1)}_{S} = \left( \hat{P}^{(1)}_{S} \right)^2/2m$, $\hat{H}^{(2)}_{S} = \left( \hat{P}^{(2)}_{S} \right)^2/2m$, $\hat{H}^{(3)}_{S} = \left( \hat{P}^{(3)}_{S} \right)^2/2m$.
With the intent of treating space and time on equal footing, within the time subspace we rewrite the time states as $\ket{x^{(0)}} = \sum_{k=0}^{d^{(0)}_{\mathfrak{R}} -1} e^{-ix^{(0)} p^{(0)}_k} \ket{p^{(0)}_k}$ and the time values as $x^{(0)} \in \left[ x^{(0)}_0, x^{(0)}_0 + L^{(0)}_{\mathfrak{R}} \right]$, where $d^{(0)}_{\mathfrak{R}}$ is the dimension of the time subspace, $p^{(0)}_k$ are the eigenvalues of $\hat{H}^{(0)}_{\mathfrak{R}}$ and where $L^{(0)}_{\mathfrak{R}}$ takes now the place of what was $T$ in the previous discussion. Furthermore we redefine the position states as $\ket{x^{(J)}} = \sum_{k=0}^{d^{(J)}_{\mathfrak{R}} -1} e^{i x^{(J)} p^{(J)}_k} \ket{p^{(J)}_k}$ in $\mathfrak{R}$ and $\ket{y^{(J)}} = \sum_{k=0}^{d^{(J)}_{S} -1} e^{i y^{(J)} p^{(J)}_k} \ket{p^{(J)}_k}$ in $S$ for $J=1,2,3$.
The constraints (\ref{4constraint1}) and (\ref{4constraint2}) read now:
\begin{equation}\label{5constraint1}
\hat{H}\ket{\Psi} = \left( \hat{H}^{(0)}_{\mathfrak{R}} +\hat{H}^{(1)}_{\mathfrak{R}}+ \hat{H}^{(2)}_{\mathfrak{R}} + \hat{H}^{(3)}_{\mathfrak{R}} +\hat{H}_{S} \right)\ket{\Psi}=0
\end{equation}
and
\begin{equation}\label{5constraint2}
\begin{split}
\vec{P}\ket{\Psi} = \left( \vec{P}_{\mathfrak{R}} + \vec{P}_S \right)\ket{\Psi} = 0
\end{split}
\end{equation}
with $ (\hat{P}^{(1)}_{\mathfrak{R}} + \hat{P}^{(1)}_S)\ket{\Psi}=(\hat{P}^{(2)}_{\mathfrak{R}} + \hat{P}^{(2)}_S)\ket{\Psi}= (\hat{P}^{(3)}_{\mathfrak{R}} + \hat{P}^{(3)}_S)\ket{\Psi}=0$. Assuming again $d^{(0)}_{\mathfrak{R}}, d^{(1)}_{\mathfrak{R}},d^{(2)}_{\mathfrak{R}},d^{(3)}_{\mathfrak{R}} \gg d^{(1)}_S,d^{(2)}_S,d^{(3)}_S$, the global state $\ket{\Psi}$ simultaneously satisfying (\ref{5constraint1}) and (\ref{5constraint2}) can be written as
\begin{equation}
\ket{\Psi} = \sum_{i=0}^{d^{(1)}_S - 1} \sum_{j=0}^{d^{(2)}_S - 1} \sum_{k=0}^{d^{(3)}_S - 1} c_{ijk} \ket{p^{(0)}=- \epsilon_{ijk}, -p^{(1)}_i , -p^{(2)}_j, -p^{(3)}_k}_{\mathfrak{R}} \otimes \ket{p^{(1)}_i , p^{(2)}_j, p^{(3)}_k }_S
\end{equation}
where $p^{(0)}$ is the value for the energy of the time reference and the energy function $\epsilon_{ijk}$ is: $\epsilon_{ijk} = \left(\frac{1}{2M} + \frac{1}{2m}\right) \left( \left(p^{(1)}_i\right)^{2} + \left(p^{(2)}_j\right)^{2} + \left(p^{(3)}_k\right)^{2}\right) \simeq \frac{1}{2m}\left( \left(p^{(1)}_i\right)^{2} + \left(p^{(2)}_j\right)^{2} + \left(p^{(3)}_k\right)^{2}\right)$.
We can now expand the global state $\ket{\Psi}$ in the basis $\left\{\ket{x^{(0)},x^{(1)},x^{(2)},x^{(3)}}_{\mathfrak{R}} \right\}$ in the space $\mathfrak{R}$, thus obtaining:
\begin{multline}
\ket{\Psi} = A \int dx^{(0)} \int dx^{(1)} \int dx^{(2)} \int dx^{(3)} \ket{x^{(0)},x^{(1)},x^{(2)},x^{(3)}}\braket{x^{(0)},x^{(1)},x^{(2)},x^{(3)}|\Psi} =\\
= A\int dx^{(0)} \int dx^{(1)} \int dx^{(2)} \int dx^{(3)} \ket{x^{(0)},x^{(1)},x^{(2)},x^{(3)}}_{\mathfrak{R}} \otimes \ket{\psi(x^{(0)},x^{(1)},x^{(2)},x^{(3)})}_S
\end{multline}
where $A= \frac{1}{L^{(0)}_{\mathfrak{R}}} \frac{1}{L^{(1)}_{\mathfrak{R}}} \frac{1}{L^{(2)}_{\mathfrak{R}}} \frac{1}{L^{(3)}_{\mathfrak{R}}}$ and the integrals on $dx^{(J)}$ are evaluated from $x^{(J)}_0$ to $x^{(J)}_0 + L^{(J)}_{\mathfrak{R}}$ for $J=0,1,2,3$. The state $ \ket{\psi(x^{(0)},x^{(1)},x^{(2)},x^{(3)})}_S = \braket{x^{(0)},x^{(1)},x^{(2)},x^{(3)}|\Psi}$ is the relative state of the system $S$ conditioned on the value $(x^{(0)},x^{(1)},x^{(2)},x^{(3)})$ for the spacetime reference frame $\mathfrak{R}$ and it takes the form:
\begin{multline}\label{5statoS}
\ket{\psi(x^{(0)},x^{(1)} , x^{(2)}, x^{(3)})}_S \simeq \sum_{i=0}^{d^{(1)}_S - 1} \sum_{j=0}^{d^{(2)}_S -1} \sum_{k=0}^{d^{(3)}_S - 1} c_{ijk} e^{-i \frac{1}{2m}\left( (p^{(1)}_i)^{2} + (p^{(2)}_j)^{2} + (p^{(3)}_k)^{2}\right) x^{(0)}} \\ \times e^{ip^{(1)}_i x^{(1)}} e^{ip^{(2)}_j x^{(2)}} e^{ip^{(3)}_k x^{(3)}} \ket{p^{(1)}_i , p^{(2)}_j, p^{(3)}_k }_S .
\end{multline}
For the relative state (\ref{5statoS}), through (\ref{5constraint1}) and (\ref{5constraint2}), we easily find:
\begin{equation}\label{evfinale1}
i \frac{\partial}{\partial x^{(0)}} \ket{\psi(x^{(0)}, x^{(1)} , x^{(2)}, x^{(3)})}_S \simeq \hat{H}_S \ket{\psi(x^{(0)},x^{(1)} , x^{(2)}, x^{(3)})}_S
\end{equation}
and
\begin{equation}\label{evfinale2}
- i\frac{\partial}{\partial x^{(J)}} \ket{\psi(x^{(0)},x^{(1)} , x^{(2)}, x^{(3)})}_{S} = \hat{P}^{(J)}_S \ket{\psi(x^{(0)},x^{(1)} , x^{(2)}, x^{(3)})}_{S}
\end{equation}
for $J=1,2,3$. Equations (\ref{5statoS}), (\ref{evfinale1}) and (\ref{evfinale2}) lead to (writing $\vec{x}=(x^{(1)} , x^{(2)}, x^{(3)})$):
\begin{equation}\label{evfinale3}
i \frac{\partial}{\partial x^{(0)}} \ket{\psi(x^{(0)}, \vec{x})}_S \simeq - \frac{1}{2m}\left(\frac{\partial^{2}}{\left(\partial x^{(1)}\right)^2} + \frac{\partial^{2}}{\left(\partial x^{(2)}\right)^2} + \frac{\partial^{2}}{\left(\partial x^{(3)}\right)^2} \right)\ket{\psi(x^{(0)},\vec{x})}_{S}
\end{equation}
which describes the dynamics of the particle in $S$ with respect to the coordinates of the $3+1$ dimensional quantum reference frame.
We emphasize here that the formalism adopted allows us to write the equation (\ref{evfinale3}) for the state $\ket{\psi(x^{(0)},x^{(1)} , x^{(2)}, x^{(3)})}_S$ because the values of time and space of the subspace $\mathfrak{R}$ enter as parameters in $S$ thanks to the entanglement present in the global state $\ket{\Psi}$.
\subsection{System $S$ as a Relativistic Particle}
The formalism adopted in the previous paragraph is particularly well suited in describing the behavior of a relativistic particle. Considering indeed the system $S$ to be a relativistic particle with no internal degree of freedom (namely with spin $0$), we have for the energy function ($c=1$):
\begin{equation}\label{KGenergy}
\epsilon_{ijk} \simeq \pm \sqrt{(p^{(1)}_i)^2 + (p^{(2)}_j)^2 +(p^{(3)}_k)^2 + m^2}
\end{equation}
which can be obtained from the energy constraint
$\left( \left(\hat{H}^{(0)}_{\mathfrak{R}} \right)^2 - \left|\vec{P}_{S}\right|^2 -m^2 \right)\ket{\Psi}\simeq 0$
(where $\vec{P}_{S}=\left(\hat{P}^{(1)}_{S},\hat{P}^{(2)}_{S},\hat{P}^{(3)}_{S} \right)$ and the kinetic energy term of $\mathfrak{R}$ has been neglected).
The relative state (\ref{5statoS}) of the system $S$ conditioned on the value $(x^{(0)},x^{(1)},x^{(2)},x^{(3)})$ of the spacetime reference frame $\mathfrak{R}$ reads now:
\begin{multline}\label{5statoS2}
\ket{\psi_{\pm}(x^{(0)},x^{(1)} , x^{(2)}, x^{(3)})}_S \simeq \sum_{i=0}^{d^{(1)}_S - 1} \sum_{j=0}^{d^{(2)}_S -1} \sum_{k=0}^{d^{(3)}_S - 1} c_{ijk} e^{\mp i x^{(0)} \sqrt{(p^{(1)}_i)^2 + (p^{(2)}_j)^2 +(p^{(3)}_k)^2 + m^2} } \\ \times e^{ip^{(1)}_i x^{(1)}} e^{ip^{(2)}_j x^{(2)}} e^{ip^{(3)}_k x^{(3)}} \ket{p^{(1)}_i , p^{(2)}_j, p^{(3)}_k }_S
\end{multline}
where we have considered together both the results for the energy function (\ref{KGenergy}).
For the relative state (\ref{5statoS2}) we find:
\begin{multline}\label{5.1}
\frac{\partial^2}{\partial (x^{(0)})^2} \ket{\psi_{\pm}(x^{(0)},x^{(1)} , x^{(2)}, x^{(3)})}_S \simeq \\ \simeq - \left( \left(\hat{P}^{(1)}_S\right)^2 + \left(\hat{P}^{(2)}_S\right)^2 + \left(\hat{P}^{(3)}_S\right)^2 + m^2 \right) \ket{\psi_{\pm}(x^{(0)},x^{(1)} , x^{(2)}, x^{(3)})}_S
\end{multline}
and
\begin{equation}\label{5.2}
\begin{split}
\frac{\partial^2}{\partial (x^{(J)})^2} \ket{\psi_{\pm}(x^{(0)},x^{(1)} , x^{(2)}, x^{(3)})}_S = - \left(\hat{P}^{(J)}_S\right)^2 \ket{\psi_{\pm}(x^{(0)},x^{(1)} , x^{(2)}, x^{(3)})}_S
\end{split}
\end{equation}
with $J=1,2,3$. Through equations (\ref{5.1}) and (\ref{5.2}) we easily obtain:
\begin{equation}\label{KG}
\left(\frac{\partial^2}{\partial (x^{(0)})^2} - \frac{\partial^2}{\partial (x^{(1)})^2} - \frac{\partial^2}{\partial (x^{(2)})^2} - \frac{\partial^2}{\partial (x^{(3)})^2} +m^2 \right) \ket{\psi_{\pm}(x^{(0)}, \vec{x})}_S \simeq 0
\end{equation}
which describes the dynamics of the particle in $S$ with respect to the coordinates of the $3+1$ dimensional quantum reference frame. Equation (\ref{KG}) has the form of the Klein-Gordon equation but differs from it being the derivatives applied to the state $\ket{\psi_{\pm}(x^{(0)},x^{(1)} , x^{(2)}, x^{(3)})}_S$ and not to the wave function. Also in this case, this is possible since the time and space values of $\mathfrak{R}$ enter as parameters in the state of $S$ through the entanglement present in the global state $\ket{\Psi}$.
A similar result can be obtained considering the system $S$ as a relativistic particle with spin $1/2$. In this case the global state of the Universe can be written:
\begin{equation}
\ket{\Psi} = \sum_{\sigma = 0}^{3} \sum_{n=0}^{d^{(0)}_{\mathfrak{R}} - 1} \sum_{i=0}^{d^{(1)}_S - 1} \sum_{j=0}^{d^{(2)}_S - 1} \sum_{k=0}^{d^{(3)}_S - 1} c_{nijk} \ket{p^{(0)}_n , -p^{(1)}_i , -p^{(2)}_j, -p^{(3)}_k}_{\mathfrak{R}} \otimes \ket{p^{(1)}_i , p^{(2)}_j, p^{(3)}_k,\sigma}_S
\end{equation}
where we have introduced the spin degree of freedom within the subspace $S$ in accordance to \cite{dirac,librodirac} and where the value of $p^{(0)}_n$ is constrained through
\begin{equation}\label{dirac1}
\left( \hat{H}^{(0)}_{\mathfrak{R}} + \vec{\alpha} \cdot \vec{P}_S + \beta m \right)\ket{\Psi} \simeq 0 .
\end{equation}
In equation (\ref{dirac1}) we have written for the system $S$ the free Dirac Hamiltonian as $\hat{H}_S = \vec{\alpha}\cdot \vec{P}_S + \beta m$ \cite{dirac} and we have again neglected the kinetic energy term of $\mathfrak{R}$. The state $\ket{\psi(x^{(0)},x^{(1)} , x^{(2)}, x^{(3)})}_S = \braket{x^{(0)},x^{(1)} , x^{(2)}, x^{(3)}|\Psi}$ reads now:
\begin{multline}\label{diracrel}
\ket{\psi (x^{(0)},x^{(1)} , x^{(2)}, x^{(3)})}_S = \sum_{\sigma = 0}^{3} \sum_{n=0}^{d^{(0)}_{\mathfrak{R}} - 1} \sum_{i=0}^{d^{(1)}_S - 1} \sum_{j=0}^{d^{(2)}_S -1} \sum_{k=0}^{d^{(3)}_S - 1} c_{nijk} e^{- ip^{(0)}_n x^{(0)}} \\ \times e^{ip^{(1)}_i x^{(1)}} e^{ip^{(2)}_j x^{(2)}} e^{ip^{(3)}_k x^{(3)}} \ket{p^{(1)}_i , p^{(2)}_j, p^{(3)}_k,\sigma}_S.
\end{multline}
For the relative state (\ref{diracrel}) still holds
\begin{equation}\label{dirac2}
i \frac{\partial}{\partial x^{(0)}} \ket{\psi(x^{(0)},x^{(1)} , x^{(2)}, x^{(3)})}_S \simeq \hat{H}_S \ket{\psi(x^{(0)},x^{(1)} , x^{(2)}, x^{(3)})}_S
\end{equation}
and
\begin{equation}\label{dirac3}
- i \frac{\partial}{\partial x^{(J)}} \ket{\psi(x^{(0)},x^{(1)} , x^{(2)}, x^{(3)})}_{S} = \hat{P}^{(J)}_S \ket{\psi(x^{(0)},x^{(1)} , x^{(2)}, x^{(3)})}_{S} .
\end{equation}
So, starting from equations (\ref{dirac2}) and (\ref{dirac3}), writing $\vec{\alpha}=(\alpha^{(1)}, \alpha^{(2)}, \alpha^{(3)})$ and remembering that $\hat{H}_S = \vec{\alpha}\cdot \vec{P}_S + \beta m$, we obtain:
\begin{multline}
i \frac{\partial}{\partial x^{(0)}} \ket{\psi(x^{(0)},\vec{x})}_S \simeq \left(-i \alpha^{(1)}\frac{\partial}{\partial x^{(1)}} -i \alpha^{(2)}\frac{\partial}{\partial x^{(2)}} -i \alpha^{(3)}\frac{\partial}{\partial x^{(3)}} + \beta m \right) \ket{\psi(x^{(0)},\vec{x})}_S
\end{multline}
which has the form of the Dirac equation and again describes the dynamics of the particle in $S$ with respect to the coordinates of the $3+1$ dimensional quantum reference frame. All the considerations made for equation (\ref{KG}) still apply in this case. Clearly, in order to give a complete relativistic generalization of the model, in addition to this discussion, we need to consider relativistic reference frames and a protocol that allows to change the point of view between different observers in different reference frames (so that dilation of times and contraction of lengths can be derived), but this is beyond the scope of the present work.
\section{Conclusions}
\label{Conclusions}
The PaW mechanism was originally introduced in order to describe the emergence of time from entanglement.
In this work we first extended the PaW mechanism at the spatial degree of freedom and then we provide a description of a model of non-relativistic quantum spacetime. In doing this we started focusing on space and we showed that, in a closed quantum system satisfying a global constraint on total momentum (and therefore with the absolute position totally indeterminate), a well-defined relative position emerge between the subsystems $S$ and $R$, where the latter is taken as quantum spatial reference frame. In the spaces $R$ and $S$, generalizing the approach outlined in \cite{nostro,nostro2,pegg}, we considered non-degenerate, discrete spectra for the momentum operators and we introduce POVMs in describing the spatial degrees of freedom. In this way we recovered continuous values of space in $S$ and $R$ also for a discrete momentum spectra (the case of momentum with continuous spectrum was then also treated in Section 3.5). Finally we introduced in the Universe an additional subsystem $C$ acting as a clock and we considered the Universe satisfying a double constraint: both on total momentum and total energy. We showed how this framework can be implemented without contradiction in the simple case of one spatial degree of freedom (considering also the case of multiple time measurements) and in the \lq\lq more physical\rq\rq case of three spatial degrees of freedom thus providing a $3+1$ dimensional quantum spacetime emerging from entanglement.
\vspace{5mm}
\textit{Acknowledgements} : We acknowledge funding from the H2020 QuantERA ERA-NET Cofund in Quantum Technologies projects QCLOCKS.
|
\section{Introduction}
The \emph{IA-automorphism group} $\IA_n$ of the free group $F_n$ of rank $n$ is the kernel of the canonical surjective map from the automorphism group $\Aut(F_n)$ of $F_n$ to the general linear group $\GL(n,\Z)$.
Magnus \cite{Magnus} discovered a finite set of generators for $\IA_n$.
Cohen-Pakianathan \cite{CP}, Farb \cite{Farb} and Kawazumi \cite{Kawazumi} independently determined the first homology group $H_1(\IA_n,\Z)$.
They proved that the \emph{Johnson homomorphism}
for $\Aut(F_n)$ induces an isomorphism
\begin{equation}\label{H1IAn}
\tau:H_1(\IA_n,\Z)\xrightarrow{\cong} \Hom(H_{\Z},\bigwedge^2 H_{\Z}),
\end{equation}
where $H_{\Z}=H_1(F_n,\Z)$.
The adjoint action of $\Aut(F_n)$ on $\IA_n$ induces an action of $\GL(n,\Z)$ on $H_i(\IA_n,\Z)$, and the Johnson homomorphism preserves the $\GL(n,\Z)$-action.
Krsti\'{c}--McCool \cite{KM} showed that $\IA_3$ is not finitely presentable and after that, Bestvina--Bux--Margalit \cite{BBM} showed that $H_2(\IA_3,\Z)$ has infinite rank.
However, it is still open whether or not $\IA_n$ is finitely presentable for $n\ge 4$.
About the second cohomology of $\IA_n$, Pettet \cite{Pettet} determined the $\GL(n,\Z)$-subrepresentation of $H^2(\IA_n,\Q)$ that is obtained by using the Johnson homomorphism. This subrepresentation is regarded as the second Albanese cohomology of $\IA_n$, which we will explain below.
Day--Putman \cite{DP} obtained a finite set of generators of $H_2(\IA_n,\Z)$ as $\GL(n,\Z)$-representations.
For $n=3$, Satoh \cite{Satoh2021} detected a nontrivial irreducible subrepresentation of $H^2(\IA_3,\Q)$, which can not be detected by the Johnson homomorphism.
However, the second homology of $\IA_n$ has not been completely determined.
It is more difficult to determine higher degree homology of $\IA_n$.
For a group $G$, we consider the following
quotient group of the rational homology of $G$, which is predual to what Church--Ellenberg--Farb \cite{CEF} called the Albanese cohomology.
The canonical surjection $\pi:G\twoheadrightarrow H_1(G,\Z)$ induces a group homomorphism
$\pi_*:H_i(G,\Q)\to H_i(H_1(G,\Z),\Q)$ on homology.
Define the \emph{Albanese homology} of $G$ as
$$H^A_i(G,\Q):=\im (\pi_*:H_i(G,\Q)\to H_i(H_1(G,\Z),\Q)).$$
Since we have $H_i(H_1(G,\Z),\Q))\cong \bigwedge^i H_1(G,\Q)$, where $\bigwedge^i H_1(G,\Q)$ is the $i$-th exterior power of $H_1(G,\Q)$, it is easier to determine the Albanese homology $H^A_*(G,\Q)$ than the ordinary homology $H_*(G,\Q)$.
Let $H=H_1(F_n,\Q)$ and $U=\Hom(H,\bigwedge^2 H)$.
Then the Johnson homomorphism induces a $\GL(n,\Z)$-homomorphism
$$\tau_*:H_i(\IA_n,\Q)\to H_i(U,\Q).$$
Therefore, we have $\GL(n,\Z)$-homomorphisms
$$ H_i(\IA_n,\Q)\twoheadrightarrow H^A_i(\IA_n,\Q)\hookrightarrow H_i(U,\Q)\cong \bigwedge^i U.$$
Since $H_i(U,\Q)$ is an algebraic $\GL(n,\Q)$-representation, the $\GL(n,\Z)$-representation structure on $H^A_i(\IA_n,\Q)$ extends to an algebraic $\GL(n,\Q)$-representation structure.
In particular, since $H^A_i(\IA_n,\Q)$ is completely reducible, any subrepresentations and quotient representations of $H^A_i(\IA_n,\Q)$ can be considered as direct summands.
As $\GL(n,\Q)$-representations, $H^A_1(\IA_n,\Q)$ is determined by \eqref{H1IAn} and $H^A_2(\IA_n,\Q)$ is determined by Pettet \cite{Pettet}.
To the best of our knowledge, the Albanese homology of $\IA_n$ of degree greater than $2$ is not known other than non-triviality \cite{CHP} and upper bounds of dimensions \cite{CEF}, which we will explain later.
Church--Farb \cite{CFrep} introduced the notion of representation stability for a sequence
$$V_0\xto{\phi_0} V_1\xto{\phi_1}V_2\to \cdots \to V_n\xto{\phi_n} V_{n+1}\to \cdots $$
of algebraic $\GL(n,\Q)$-representations, where $\phi_n: V_n\to V_{n+1}$ is a $\GL(n,\Q)$-homomorphism considering $V_{n+1}$ as a $\GL(n,\Q)$-representation via the canonical inclusion map $\GL(n,\Q)\hookrightarrow \GL(n+1,\Q)$.
Note that irreducible algebraic $\GL(n,\Q)$-representations are classified by \emph{bipartitions} with at most $n$ parts, which are pairs of partitions with total length at most $n$ (see Section \ref{irrrep} for details).
For a bipartition $\ul\lambda$, let $V_{\ul\lambda}(n)$ denote the irreducible $\GL(n,\Q)$-representation corresponding to $\ul\lambda$.
A sequence $\{V_n\}$ of algebraic $\GL(n,\Q)$-representations is \emph{representation stable}
if $\{V_n\}$ satisfies the following three conditions
for sufficiently large $n$:
\begin{itemize}
\item $\phi_n: V_n\to V_{n+1}$ is injective,
\item $\im \phi_n$ spans $V_{n+1}$ as a $\GL(n+1,\Q)$-representation,
\item for each bipartition $\ul\lambda$, the multiplicity of $V_{\ul\lambda}(n)$ in $V_n$ is constant.
\end{itemize}
For example, $H_i(U,\Q)\cong \bigwedge^i U$ is representation stable for each $i\ge 0$.
We consider an analogue of $\IA_n$ to the outer automorphism group $\Out(F_n)$ of $F_n$.
Let $\IO_n$ denote the kernel of the canonical surjective map from $\Out(F_n)$ to $\GL(n,\Z)$.
Kawazumi \cite{Kawazumi} determined $H^A_1(\IO_n,\Q)$, and Pettet \cite{Pettet} determined $H^A_2(\IO_n,\Q)$ as $\GL(n,\Q)$-representations.
However, as in the case of $\IA_n$, the Albanese homology of $\IO_n$ of degree greater than $2$ is not known.
Moreover, even non-triviality of the homology of $\IO_n$ of degree greater than $2$ does not seem to be known.
The aim of this paper is to determine the Albanese homology $H^A_i(\IA_n,\Q)$ and $H^A_i(\IO_n,\Q)$ as $\GL(n,\Q)$-representations.
We use \emph{abelian cycles} in $H_i(\IA_n,\Q)$, which are induced by $i$-tuples of mutually commuting elements of $\IA_n$.
Then we obtain a representation-stable $\GL(n,\Q)$-subrepresentation of $H^A_i(\IA_n,\Q)$, which conjecturally coincides with the entire $H^A_i(\IA_n,\Q)$.
In particular, we obtain a lower bound of the dimension of $H^A_i(\IA_n,\Q)$ for sufficiently large $n$ with respect to $i$.
We also obtain non-triviality and a lower bound of the dimension of $H^A_i(\IO_n,\Q)$ for sufficiently large $n$ with respect to $i$.
Moreover, we determine $H^A_3(\IA_n,\Q)$ and $H^A_3(\IO_n,\Q)$ for $n\ge 9$.
We also study the relation between the Albanese homology of $\IA_n$ and the cohomology of $\Aut(F_n)$ with twisted coefficients.
\subsection{Non-triviality of $H^A_i(\IA_n,\Q)$}
Let $i\ge 1$.
First, we observe that $H^A_i(\IA_n,\Q)$ is non-trivial for $n\ge i+1$. We detect a non-trivial representation-stable quotient of $H^A_i(\IA_n,\Q)$.
For $g\ge 1$, $\IA_{2g}$ includes the \emph{Torelli group} $\I_{g,1}$ of a connected oriented surface of genus $g$ with one boundary component.
Church--Farb \cite{CFAbelJacobi} used an $\Sp(2g,\Z)$-homomorphism
$$\tau_i:H_i(\I_{g,1},\Q)\to\bigwedge^{i+2} H,$$
which was introduced by Johnson \cite{Johnsonsurvey},
to detect a non-trivial representation-stable subrepresentation in the image of $\tau_i$.
The following theorem can be regarded as an analogue of this result of Church--Farb.
\begin{theorem}[Theorem \ref{nontriviality}]\label{nontrivialintro}
For $n\ge i+1$, we have a surjective $\GL(n,\Q)$-homomorphism
$$H^A_i(\IA_n,\Q) \twoheadrightarrow \Hom(H,\bigwedge^{i+1} H)\cong \left(\bigwedge^{i+1}H\right)\otimes H^*,$$
where $H^*=\Hom_{\Q}(H,\Q)$.
\end{theorem}
Cohen--Heap--Pettet \cite{CHP} obtained non-trivial subspaces of $H_A^i(\IA_n,\Q)$ whose dimensions are bounded above by a polynomial in $n$ of degree $2i$. However, they did not consider the $\GL(n,\Q)$-action on $H_A^i(\IA_n,\Q)$, and their non-trivial subspaces are not $\GL(n,\Q)$-subrepresentations.
Theorem \ref{nontrivialintro} gives another proof of non-triviality of $H^A_i(\IA_n,\Q)$.
\begin{corollary}[Cohen--Heap--Pettet \cite{CHP}]
For $n\ge i+1$, $H^A_i(\IA_n,\Q)$ is non-trivial.
\end{corollary}
To observe the representation stability of the subrepresentation of $H^A_i(\IA_*,\Q)$ that is detected in Theorem \ref{nontrivialintro}, we write $H$ as $H_n$ and $\Hom_{\Q}(H,\Q)$ as $H_n^*$.
The abelian cycles and the $\GL(n,\Q)$-homomorphisms that we use to prove Theorem \ref{nontrivialintro} are compatible with the canonical inclusion maps $$\IA_n\hookrightarrow \IA_{n+1},\quad H_n\hookrightarrow H_{n+1},\quad H_n^*\hookrightarrow H_{n+1}^*,$$
which implies the representation stability of the subrepresentation of $H^A_i(\IA_*,\Q)$.
Let
$$\GL(\infty,\Q)=\varinjlim_{n} \GL(n,\Q),\quad \IA_{\infty}=\varinjlim_{n}\IA_{n},$$
and
$$\bfH=\varinjlim_{n}H_n,\quad \bfH^*=\varinjlim_{n}(H_n)^{*}.$$
We can rephrase the representation stability of the subrepresentation in the sense of $\GL(\infty,\Q)$-representations as follows.
\begin{corollary}[Corollary \ref{infinitedimensional}]\label{introinfinitedimensional}
We have a surjective $\GL(\infty,\Q)$-homomorphism
$$H^A_i(\IA_{\infty},\Q) \twoheadrightarrow \left(\bigwedge^{i+1} \bfH\right)\otimes\bfH^*.$$
In particular, we have $\dim_{\Q}(H^A_i(\IA_{\infty},\Q))=\dim_{\Q}(H_i(\IA_{\infty},\Q))=\infty$.
\end{corollary}
\subsection{Conjectural structure of $H^A_i(\IA_n,\Q)$}
Next, we detect a subquotient representation of $H^A_i(\IA_n,\Q)$, which is conjecturally equal to the entire $H^A_i(\IA_n,\Q)$.
For $i\ge 1$, let
$$U_i=\Hom(H,\bigwedge^{i+1} H)\cong \left(\bigwedge^{i+1} H\right)\otimes H^*.$$
Note that we have $U=U_1$ and that $U_i$ vanishes for $n\le i$.
We have a direct sum decomposition
$$U_i=U_i^{\tree}\oplus U_i^{\wheel},$$
where
$U_i^{\tree}$ denotes the subrepresentation of $U_i$ that is isomorphic to $V_{1^{i+1},1}$, and where $U_i^{\wheel}$ denotes the other subrepresentation that is isomorphic to $V_{1^i,0}$ for $n\ge i+1$.
For the graded $\GL(n,\Q)$-representation $U_*=\bigoplus_{i\ge 1} U_i$,
let $S^*(U_*)=\bigoplus_{i\ge 0} S^*(U_*)_i$ denote the graded-symmetric algebra of $U_*$.
We define the \emph{traceless part} $W_*=\wti{S}^* (U_*)$ of $S^*(U_*)$, which consists of elements that vanish under any contraction maps between distinct factors of $S^*(U_*)$
(see Section \ref{tracelesspartofgradedsymmetricalgebra} for details).
We can also construct $W_*$ by using an operad $\calC om$ of non-unital commutative algebras as we will see in Section \ref{KV}.
We construct a $\GL(n,\Q)$-homomorphism
$$F_i: H_i(U,\Q)\to S^*(U_*)_i$$
by combining two kinds of contraction maps.
Then, we obtain $W_i$ as a subquotient representation of $H^A_i(\IA_n,\Q)$, which is our main result.
\begin{theorem}[Theorem \ref{Johnsonpart}]\label{Johnsonpartintro}
For $n\ge 3i$, we have
$$F_i(H^A_i(\IA_n,\Q))\supset W_i.$$
\end{theorem}
Theorem \ref{Johnsonpartintro} implies that $H^A_i(\IA_n,\Q)$ includes a representation-stable subrepresentation which is isomorphic to $W_i$.
\begin{remark}
We can decompose $W_i$ into direct summands
$$
W_i=\bigoplus_{(\mu,\nu)\in P_i}W(\mu,\nu),
$$
where $P_i$ denotes the set of pairs of partitions $(\mu,\nu)$ such that $\mu$ and $\nu$ are partitions of non-negative integers whose sum is $i$.
Recently Lindell \cite{Lindell} studied the Albanese homology $H^A_i(\I_{g,1},\Q)$ of the Torelli group $\I_{g,1}$.
Lindell's result \cite[Theorem 1.5]{Lindell} implies that for each pair of partitions $(\lambda,\mu)$ under some conditions, $H^A_i(\I_{g,1},\Q)$ contains an $\Sp(2g,\Q)$-subrepresentation $W^{\I_{g,1}}_i(\lambda,\mu)$ corresponding to $(\lambda,\mu)$.
\end{remark}
By \eqref{H1IAn}, we have $H^A_1(\IA_n,\Q)\cong W_1$ for $n\ge 3$.
By \cite{Pettet}, we have $H^A_2(\IA_n,\Q)\cong W_2$ for $n\ge 6$.
For $i=3$, we obtain the following theorem.
\begin{theorem}[Theorem \ref{thirdAlbanese}]
For $n\ge 9$, we have a $\GL(n,\Q)$-isomorphism
$$F_3: H^A_3(\IA_n,\Q)\xrightarrow{\cong} W_3.$$
\end{theorem}
It seems natural to make the following conjecture.
\begin{conjecture}[Conjecture \ref{conjectureAlbanese}]\label{conjintro}
For $n\ge 3i$, we have a $\GL(n,\Q)$-isomorphism
$$F_i: H^A_i(\IA_n,\Q)\xrightarrow{\cong} W_i.$$
\end{conjecture}
\subsection{Coalgebra structure of $H^A_*(\IA_n,\Q)$}
For any group $G$, it is well known that $H_*(G,\Q)$ has a coalgebra structure.
Then $H^A_*(G,\Q)$ is a subcoalgebra of $H_*(H_1(G,\Z),\Q)$. (See Section \ref{coalgebra} for details.)
We also have a coalgebra structure on $S^*(U_*)$ (see Section \ref{tracelesspartofgradedsymmetricalgebra}).
Then the graded $\GL(n,\Q)$-homomorphism $F_*=\bigoplus_{i}F_i$ is compatible with comultiplications.
\begin{proposition}[Proposition \ref{coalgebramap}]
The graded $\GL(n,\Q)$-homomorphism
$$F_*=\bigoplus_{i} F_i: H_*(U,\Q)\to S^*(U_*)$$
is a coalgebra map.
\end{proposition}
For a coalgebra $A$, let $\Prim(A)$ denote the primitive part of $A$.
We have
$$\Prim(S^*(U_*))=U_*\subset W_*.$$
The $\GL(n,\Q)$-homomorphism $F_*$ restricts to a graded $\GL(n,\Q)$-homomorphism
$$
F_*: \Prim(H^A_*(\IA_n,\Q))\to \Prim(S^*(U_*))=U_*.
$$
Therefore, it is natural to make the following conjecture, which implies that Theorem \ref{nontrivialintro} determines the primitive part of $H^A_*(\IA_n,\Q)$.
Let $\Prim(H^A_*(\IA_n,\Q))_i$ denote the degree $i$ part of $\Prim(H^A_*(\IA_n,\Q))$.
\begin{conjecture}[Conjecture \ref{conjectureprim}]
For $n\ge 3i$, the $\GL(n,\Q)$-homomorphism
$$
F_i:\Prim(H^A_*(\IA_n,\Q))_i\to U_i
$$
is an isomorphism.
\end{conjecture}
\subsection{Lower bound of the dimension of $H^A_i(\IA_n,\Q)$}
Church--Ellenberg--Farb \cite{CEF} introduced the theory of FI-modules and studied the representation stability of $H^A_i(\IA_n,\Q)$. They obtained the following theorem about the stability and an upper bound of the dimension of $H^A_i(\IA_n,\Q)$.
\begin{theorem}[Church--Ellenberg--Farb \cite{CEF}]\label{CEHdimension}
For each $i\ge 0$, there exists a polynomial $P_i(T)$ of degree $\le 3i$ such that $\dim_{\Q}(H^A_i(\IA_n,\Q))=P_i(n)$ for sufficiently large $n$ with respect to $i$.
\end{theorem}
We obtain a lower bound of $\dim_{\Q}(H^A_i(\IA_n,\Q))$.
As a consequence of Theorem \ref{Johnsonpartintro}, or directly, it can be shown that the \emph{traceless part} $H_i(U,\Q)^{\tl}$ of $H_i(U,\Q)$ is contained in $H^A_i(\IA_n,\Q)$, where $H_i(U,\Q)^{\tl}\subset H_i(U,\Q)$ is the subrepresentation that vanishes under any contraction maps. (See Section \ref{Tracelesspart}.)
\begin{theorem}[Theorem \ref{tracelessimage}] \label{tracelessimageintro}
We have $H_i(U,\Q)^{\tl}\subset H^A_i(\IA_n,\Q)$ for $n\ge 3i$.
\end{theorem}
We have $\dim_{\Q}(H_i(U,\Q)^{\tl})=P'_i(n)$ for $n\ge 3i$, where $P'_i(T)$ is a polynomial of degree $3i$. By Theorems \ref{CEHdimension} and \ref{tracelessimageintro}, we obtain the following theorem about the dimension of $H^A_i(\IA_n,\Q)$.
\begin{theorem}[Theorem \ref{dimension}]\label{dimensionintro}
We have $\dim_{\Q}(H^A_i(\IA_n,\Q))\ge P'_i(n)$ for $n\ge 3i$.
Moreover, there exists a polynomial $P_i(T)$ of degree exactly $3i$ such that we have
$\dim_{\Q}(H^A_i(\IA_n,\Q))=P_i(n)$
for sufficiently large $n$ with respect to $i$.
\end{theorem}
\subsection{Non-triviality of $H^A_i(\IO_n,\Q)$}
In a way similar to $\IA_n$, by using abelian cycles, we detect a non-trivial quotient representation of $H^A_i(\IO_n,\Q)$.
Note that unlike the case of $\IA_n$, there is no canonical inclusion map $\IO_n\hookrightarrow \IO_{n+1}$, so we do not consider the representation stability for $H^A_i(\IO_*,\Q)$.
\begin{theorem}[Theorem \ref{ConnectedpartIO}]\label{introconnectedpartIO}
Let $i\ge 2$.
For $n\ge i+2+\frac{1-(-1)^i}{2}$, we have a surjective $\GL(n,\Q)$-homomorphism
\begin{gather*}
H^A_i(\IO_n,\Q)\twoheadrightarrow \bigwedge^i H.
\end{gather*}
For sufficiently large $n$ with respect to $i$, we have a surjective $\GL(n,\Q)$-homomorphism
\begin{gather*}
H^A_i(\IO_n,\Q)\twoheadrightarrow \Hom(H,\bigwedge^{i+1} H).
\end{gather*}
\end{theorem}
By Pettet \cite{Pettet}, we have non-triviality of $H^A_2(\IO_n,\Q)$. We obtain non-triviality of $H^A_i(\IO_n,\Q)$ for $i\ge 3$.
\begin{corollary}
Let $i\ge 2$. For $n\ge i+2+\frac{1-(-1)^i}{2}$, $H^A_i(\IO_n,\Q)$ is non-trivial.
\end{corollary}
\subsection{Lower bound of the dimension of $H^A_i(\IO_n,\Q)$}
Unlike the case of $\IA_n$, the stability or an upper bound of the dimension of $H^A_i(\IO_n,\Q)$ is not known.
We detect a lower bound of the dimension of $H^A_i(\IO_n,\Q)$.
Let $U^O=U_1^{\tree}$.
We have an isomorphism $H_1(\IO_n,\Q)\cong U^O$ by \cite{Kawazumi}.
The canonical projection $\pi:\IA_n\twoheadrightarrow \IO_n$ induces a $\GL(n,\Q)$-homomorphism
$\pi_*: H^A_i(\IA_n,\Q)\to H^A_i(\IO_n,\Q)$.
By using Theorem \ref{tracelessimageintro}, we obtain a lower bound of the dimension of $H^A_i(\IO_n,\Q)$.
\begin{theorem}[Theorem \ref{dimensionIO}]\label{introdimensionIO}
For $n\ge 3i$, $H^A_i(\IO_n,\Q)$ contains a subrepresentation which is isomorphic to $H_i(U,\Q)^{\tl}$.
In particular, we have $\dim_{\Q}(H^A_i(\IO_n,\Q))\ge P'_i(n)$ for $n\ge 3i$.
\end{theorem}
\subsection{Conjectural structure of $H^A_i(\IO_n,\Q)$}
Here, we propose a conjectural structure of $H^A_i(\IO_n,\Q)$ and the relation between $H^A_*(\IO_n,\Q)$ and $H^A_*(\IA_n,\Q)$.
Let $U^O_1=U^O$ and $U^O_i=U_i$ for $i\ge 2$.
For the graded $\GL(n,\Q)$-representation $U^O_*=\bigoplus_{i\ge 1} U^O_i$, let $S^*(U^O_*)$ denote the graded-symmetric algebra of $U^O_*$.
Let $W^O_*=\wti{S}^*(U^O_*)$ denote the traceless part of $S^*(U^O_*)$.
Then we can decompose $W^O_i$ into direct summands
$$
W^O_i=\bigoplus_{(\mu,\nu)\in P^O_i} W(\mu,\nu),
$$
where $P^O_i$ denotes the subset of $P_i$ consisting of pairs of partitions $(\mu,\nu)$ such that $\nu$ has no part of size $1$.
By \cite{Kawazumi}, we have $H^A_1(\IO_n,\Q)\cong W^O_1$ for $n\ge 3$. By \cite{Pettet}, we have $H^A_2(\IO_n,\Q)\cong W^O_2$ for $n\ge 6$. For $i=3$, we obtain the following theorem.
\begin{theorem}[Theorem \ref{thirdAlbaneseIO}]
For $n\ge 9$, we have
$$
H^A_3(\IO_n,\Q)\cong W^O_3
$$
as $\GL(n,\Q)$-representations.
\end{theorem}
It seems natural to make the following conjecture, which is an analogue of Conjecture \ref{conjintro}.
\begin{conjecture}[Conjecture \ref{conjectureAlbaneseIO}]\label{conjintroIO}
For sufficiently large $n$ with respect to $i$, we have a $\GL(n,\Q)$-isomorphism
$$
H^A_i(\IO_n,\Q)\cong W^O_i.
$$
\end{conjecture}
On the relation between $H^A_*(\IO_n,\Q)$ and $H^A_*(\IA_n,\Q)$, the Hochschild--Serre spectral sequence for the exact sequence
$$
1\to \Inn(F_n)\to \IA_n\to \IO_n\to 1,
$$
where $\Inn(F_n)$ is the inner automorphism group of $F_n$, leads to the following proposition.
\begin{proposition}[Proposition \ref{AlbaneseIAandIO2}]\label{AlbaneseIAandIO2intro}
For $n\ge 2$, we have a $\GL(n,\Q)$-isomorphism
\begin{gather*}
\begin{split}
H^A_i(\IA_n,\Q) \xrightarrow{\cong} H^A_i(\IO_n,\Q) \oplus (H^A_{i-1}(\IO_n,\Q)\otimes H).
\end{split}
\end{gather*}
\end{proposition}
By Theorem \ref{Johnsonpartintro} and Proposition \ref{AlbaneseIAandIO2intro}, we obtain the following proposition, which partially ensures Conjecture \ref{conjintroIO}.
\begin{proposition}[Proposition \ref{IOnWO}]
For $n\ge 3i$, we have an injective $\GL(n,\Q)$-homomorphism
$$W^O_i \oplus (W^O_{i-1}\otimes H)\hookrightarrow H^A_i(\IO_n,\Q) \oplus (H^A_{i-1}(\IO_n,\Q) \otimes H).$$
\end{proposition}
Now we have the following equivalence between conjectures about the structures of $H^A_*(\IA_n,\Q)$ and $H^A_*(\IO_n,\Q)$.
\begin{proposition}[Proposition \ref{AlbaneseIAandIO}]
The followings are equivalent.
\begin{enumerate}
\item For any $i$, we have a $\GL(n,\Q)$-isomorphism $H^A_i(\IA_n,\Q)\cong W_i$ for sufficiently large $n$ with respect to $i$ (cf. Conjecture \ref{conjintro}).
\item Conjecture \ref{conjintroIO}.
\end{enumerate}
\end{proposition}
\subsection{Relation between $H^A_*(\IA_n,\Q)$ and the cohomology of $\Aut(F_n)$ with twisted coefficients}
The stable cohomology of $\Aut(F_n)$ with twisted coefficients has been studied by many authors.
Satoh computed the first and second homology with coefficients in $H$ and $H^*$ \cite{Satoh2006, Satoh2007}.
Djament--Vespa \cite{Djament-Vespa} and Randal-Williams \cite{Randal-Williams} obtained the stable cohomology $H^*(\Aut(F_n),H^{\otimes p})$. Djament \cite{Djament19}, Vespa \cite{Vespa} and Randal-Williams \cite{Randal-Williams} obtained the stable cohomology $H^*(\Aut(F_n),(H^*)^{\otimes q})$.
Let $H^{p,q}=H^{\otimes p}\otimes (H^*)^{\otimes q}$.
Kawazumi--Vespa \cite{Kawazumi--Vespa} studied the stable cohomology $H^*(\Aut(F_n),H^{p,q})$.
Their conjecture \cite[Conjecture 6]{Kawazumi--Vespa} implies the following conjecture, where $\calC_{\calP_0^{\circlearrowright}}$ is the wheeled PROP associated to the operadic suspension $\calP_0$ of the operad $\calC om$ of non-unital commutative algebras (see Section \ref{KV} for details.)
\begin{conjecture}[Kawazumi--Vespa {\cite[Conjecture 6]{Kawazumi--Vespa}}, Conjecture \ref{conjectureKV}]\label{conjKVintro}
For $p,q\ge 0$, we stably have an isomorphism of graded $\Q[\gpS_{p}\times \gpS_{q}]$-modules
$$
H^{*}(\Aut(F_n), H^{p,q})=
\calC_{\calP_0^{\circlearrowright}}(p,q).
$$
\end{conjecture}
We make the following conjecture about the relation between the Albanese (co)homology of $\IA_n$ and the cohomology of $\Aut(F_n)$ with twisted coefficients, where the Albanese cohomology $H_A^i(\IA_n,\Q)$ of $\IA_n$ is isomorphic to $H^A_i(\IA_n,\Q)^*$ as $\GL(n,\Q)$-representations.
\begin{conjecture}[Conjecture \ref{cohomologyAut}]\label{cohomologyAutintro}
Let $i$ be a non-negative integer and $\ul\lambda$ a bipartition.
Then, for sufficiently large $n$, we have a linear isomorphism
$$
H^i(\Aut(F_n),V_{\ul\lambda})\cong (H_A^i(\IA_n,\Q)\otimes V_{\ul\lambda})^{\GL(n,\Z)}.
$$
\end{conjecture}
Then we have the following relation between the conjectural structure of the Albanese homology of $\IA_n$ and the above two conjectures.
\begin{proposition}[Proposition \ref{AlbaneseandAut}]
Let $i$ be a non-negative integer.
If two of the followings hold, then so does the third.
\begin{enumerate}
\item We have a $\GL(n,\Q)$-isomorphism $H^A_i(\IA_n,\Q)\cong W_i$ for sufficiently large $n$
(cf. Conjecture \ref{conjintro}).
\item Conjecture \ref{conjKVintro} holds for cohomological degree $i$.
\item Conjecture \ref{cohomologyAutintro} holds for cohomological degree $i$.
\end{enumerate}
\end{proposition}
\subsection{Conjectural structures of $H_A^*(\I_{g,1},\Q)$, $H_A^*(\I_{g},\Q)$ and $H_A^*(\I_{g}^{1},\Q)$}
Let $\I_{g}$ (resp. $\I_{g}^{1}$) denote the Torelli group of a closed surface (resp. a surface with one marked point) of genus $g$.
We propose conjectural structures of the Albanese cohomology of the Torelli groups $\I_{g}$, $\I_{g,1}$ and $\I_{g}^{1}$.
Note that the Albanese cohomology and homology of the Torelli groups are isomorphic since algebraic $\Sp(2g,\Q)$-representations are self-dual.
In a way similar to $W_*=\wti{S}^*(U_*)$ and $W^O_*=\wti{S}^*(U^O_*)$, we define $\Sp(2g,\Q)$-representations $\wti{S}^*(X''_*)$, $\wti{S}^*(Y''_*)$ and $\wti{S}^*(Z''_*)$.
\begin{conjecture}[Conjecture \ref{Torellialb}]
We stably have $\Sp(2g,\Q)$-isomorphisms
$$
H_A^*(\I_{g},\Q)\cong \wti{S}^*(X''_*),\quad H_A^*(\I_{g,1},\Q)\cong \wti{S}^*(Y''_*),\quad
H_A^*(\I_{g}^{1},\Q)\cong \wti{S}^*(Z''_*).
$$
\end{conjecture}
We also study the structures of the cohomology of Lie algebras associated to $\I_{g}$, $\I_{g,1}$ and $\I_{g}^{1}$.
\subsection{Outline}
The rest of the paper is organized as follows.
In Section \ref{Preliminary}, we recall algebraic $\GL(n,\Q)$-representations and the notion of traceless parts.
In Section \ref{Abeliancycles}, we recall the notion of abelian cycles. We construct an abelian cycle for $\IA_n$ corresponding to each pair of partitions.
In Section \ref{Connectedpart}, we obtain Theorem \ref{nontrivialintro}.
In Section \ref{Tracelesspart}, we show Theorem \ref{tracelessimageintro}, which induces Theorem \ref{dimensionintro} about the dimension of $H^A_i(\IA_n,\Q)$.
In Section \ref{Generalpart}, we study the structure of $H^A_i(\IA_n,\Q)$ and prove Theorem \ref{Johnsonpartintro}.
In Section \ref{coalgebra}, we recall a coalgebra structure on group homology and study the coalgebra structure of $H^A_*(\IA_n,\Q)$.
In Section \ref{albanesecohomology}, we study the algebra structure of the Albanese cohomology $H_A^*(\IA_n,\Q)$.
In Section \ref{Albanesehomology}, we study the Albanese homology $H^A_i(\IO_n,\Q)$. We obtain Theorems \ref{introconnectedpartIO} and \ref{introdimensionIO}. We also study the relation between $H^A_i(\IO_n,\Q)$ and $H^A_i(\IA_n,\Q)$.
In Sections \ref{ThirdhomologyIO} and \ref{Thirdhomology}, we obtain $H^A_3(\IO_n,\Q)$ and $H^A_3(\IA_n,\Q)$ for $n\ge 9$.
In Section \ref{KV}, we study the relation between $H_A^*(\IA_n,\Q)$ and $H^*(\Aut(F_n),H^{p,q})$.
In Section \ref{Sprep}, we recall algebraic $\Sp(2g,\Q)$-representations.
In Section \ref{problems}, we discuss the Albanese cohomology of the Torelli groups and the cohomology of Lie algebras associated to the Torelli groups.
In Appendix \ref{Albanesefunctor}, we give a brief summary of some properties of Albanese homology and cohomology of groups.
\subsection*{Acknowledgements}
The author would like to thank her supervisor Kazuo Habiro for valuable advice. She also thanks Nariya Kawazumi and Christine Vespa for comments about topics around homology of $\IA_n$.
This work was supported by JSPS KAKENHI Grant Number JP22J14812.
\section{Preliminaries}\label{Preliminary}
In this section, we recall representation theory of $\GL(n,\Q)$ and of $\GL(\infty,\Q)$, and introduce the notion of traceless tensor products and traceless parts of graded-symmetric algebras.
\subsection{Notations and conventions}
For a non-negative integer $j$, let $[j]$ denote the set $\{1,\cdots,j\}$.
Let $n\ge 1$.
Let $F_n=\langle x_1,\cdots,x_n\rangle$.
Let $H=H(n)=H_1(F_n,\Q)=\bigoplus_{j=1}^n \Q e_j$, where we fix the basis $\{e_j\}_{j=1}^{n}$ for $H$.
We have $H^*=H(n)^*=H^1(F_n,\Q)=\bigoplus_{j=1}^n \Q e_j^*$.
In what follows, we consider representations of $\GL(H,\Q)=\GL(n,\Q)$ over $\Q$, which are the same as $\Q[\GL(n,\Q)]$-representations. Sometimes we simply write ``representations'' to mean $\GL(n,\Q)$-representations.
In computations, we use the following matrices in $\GL(n,\Q)$.
Let $\id\in \GL(n,\Q)$ denote the identity matrix.
For distinct elements $k,l\in [n]$,
let $E_{k,l}\in \GL(n,\Q)$ denote the matrix that maps $e_l$ to $e_k+e_l$ and fixes $e_a$ for $a\neq l$. Then $E_{k,l}$ maps the dual basis $e_k^*$ to $e_k^*-e_l^*$ and fixes $e_a^*$ for $a\neq k$.
Let $P_{k,l}\in \GL(n,\Q)$ denote the matrix that exchanges $e_k$ and $e_l$ and fixes $e_a$ for $a\neq k,l$.
For $k=l$, we have $P_{k,k}=\id$.
\subsection{Irreducible polynomial representations of $\GL(n,\Q)$}
Here we recall several notions from representation theory.
See \cite{FH} for details.
Let $n\ge 1$.
A \emph{partition} $\lambda=(\lambda_1,\lambda_2,\dots,\lambda_n)$ with at most $n$ parts is a sequence of non-negative integers such that $\lambda_1\ge\lambda_2\ge\dots\ge\lambda_n$.
Let $l(\lambda)=\max(\{0\}\cup\{i\mid \lambda_{i}> 0\})$ denote the \emph{length} of $\lambda$ and $|\lambda|=\lambda_1+\cdots+\lambda_{l(\lambda)}$ the \emph{size} of $\lambda$.
We write $\lambda \vdash |\lambda|$.
A \emph{Young diagram} for a partition $\lambda$ is a diagram with $\lambda_i$ boxes in the $i$-th row such that the rows of boxes are left-aligned.
A \emph{tableau} on a Young diagram is a numbering of the boxes by integers in $[|\lambda|]$.
A tableau is \emph{standard} if the numbering of each row and each column is increasing.
The \emph{canonical tableau} on a Young diagram is a standard tableau whose numbering starts from the first row from left to right and followed by the second row from left to right and so on.
Let
\begin{gather*}
a_{\lambda}= \sum_{\sigma\in R} \sigma\in \Q[\gpS_{|\lambda|}],\quad b_{\lambda}= \sum_{\tau \in C} \sgn(\tau) \tau\in \Q[\gpS_{|\lambda|}],
\end{gather*}
where $R$ (resp. $C$) is a subgroup of $\gpS_{|\lambda|}$ preserving rows (resp. columns) of the canonical tableau on the Young diagram corresponding to $\lambda$.
The \emph{Young symmetrizer} $c_{\lambda}$ is defined by
\begin{gather*}
c_{\lambda}= b_{\lambda} a_{\lambda}\in \Q[\gpS_{|\lambda|}].
\end{gather*}
Let $S^\lambda=\Q[\gpS_{|\lambda|}] c_{\lambda}$ denote the \emph{Specht module} corresponding to the partition $\lambda$, which is an irreducible representation of $\gpS_{|\lambda|}$.
We call a $\GL(n,\Q)$-representation $V$ \emph{polynomial} if after choosing a basis for $V$, the $(\dim V)^2$ coordinate functions of the action $\GL(n,\Q)\to \GL(V)$ are polynomial functions of the $n^2$ variables.
Consider $H\cong \Q^n$ as the standard representation of $\GL(n,\Q)$.
For a partition $\lambda$, let
$$V_{\lambda}= H^{\otimes |\lambda|}\otimes_{\Q[\gpS_{|\lambda|}]}S^\lambda.$$
If $\lambda$ has at most $n$ parts, then $V_{\lambda}$ is an irreducible polynomial $\GL(n,\Q)$-representation, and otherwise, we have $V_{\lambda}=0$.
For a non-negative integer $p$, by the Schur--Weyl duality, we have a decomposition of $H^{\otimes p}$ as $\GL(n,\Q)\times \gpS_{p}$-modules
$$
H^{\otimes p}= \bigoplus_{\lambda\vdash p \text{ with at most $n$ parts}} V_{\lambda}\otimes S^{\lambda}.
$$
It is well known that irreducible polynomial representations of $\GL(n,\Q)$ are classified by partitions with at most $n$ parts, that is, any irreducible $\GL(n,\Q)$-representation is isomorphic to $V_{\lambda}$ for a partition $\lambda$ with at most $n$ parts.
We have the following irreducible decomposition of the tensor product of two irreducible polynomial $\GL(n,\Q)$-representations $V_{\lambda}$ and $V_{\mu}$
$$
V_{\lambda}\otimes V_{\mu}=\bigoplus_{\nu} V_{\nu}^{\oplus N_{\lambda\mu}^{\nu}},
$$
where $N_{\lambda\mu}^{\nu}$ is the Littlewood--Richardson coefficient.
\subsection{Irreducible algebraic representations of $\GL(n,\Q)$}\label{irrrep}
We call a $\GL(n,\Q)$-representation $V$ \emph{algebraic} if after choosing a basis for $V$, the $(\dim V)^2$ coordinate functions of the action $\GL(n,\Q)\to \GL(V)$ are rational functions of the $n^2$ variables.
Here we recall irreducible algebraic representations of $\GL(n,\Q)$, which generalizes irreducible polynomial representations of $\GL(n,\Q)$. See \cite{FH,Koike,Patzt} for details.
Let $p$ and $q$ be positive integers.
For a pair $(k,l)\in[p]\times [q]$, the \emph{contraction map}
$$c_{k,l}:H^{\otimes p}\otimes (H^{*})^{\otimes q}\rightarrow H^{\otimes p-1}\otimes (H^{*})^{\otimes q-1}$$
is defined for $v_1\otimes\cdots\otimes v_{p}\in H^{\otimes p}$ and $f_1\otimes\cdots\otimes f_{q} \in (H^{*})^{\otimes q}$ by
$$c_{k,l}((v_1\otimes\cdots\otimes v_{p}) \otimes(f_1\otimes\cdots\otimes f_{q}))
= \langle v_k,f_l\rangle
(v_1\otimes\cdots\hat{v}_{k}\cdots\otimes v_{p})\otimes (f_1\otimes\cdots\hat{f}_{l}\cdots\otimes f_{q}),
$$
where
$\langle -,-\rangle:H\otimes H^{*}\rightarrow \Q$
denotes the dual pairing,
and where $\hat{v}_{k}$ (resp. $\hat{f}_{l}$) denotes the omission of $v_{k}$ (resp. $f_{l}$).
For $p,q\ge 0$, let $T_{p,q}$ denote the \emph{traceless part} of $H^{\otimes p}\otimes (H^{*})^{\otimes q}$, which is defined by
$$T_{p,q}=\bigcap_{(k,l)\in [p]\times [q]} \ker c_{k,l}\subset H^{\otimes p}\otimes (H^{*})^{\otimes q}.$$
Note that we have $T_{0,q}=(H^*)^{\otimes q}$ and $T_{p,0}=H^{\otimes p}$.
A \emph{bipartition} $\ul{\lambda}=(\lambda^{+},\lambda^{-})$ with at most $n$ parts is a pair of two partitions $\lambda^{+}$ and $\lambda^{-}$ such that $l(\ul\lambda)=l(\lambda^{+})+l(\lambda^{-})\le n$.
The \emph{size} $|\ul\lambda|$ of $\ul\lambda$ is defined by $|\lambda^{+}|+|\lambda^{-}|$.
For a bipartition $\ul\lambda$, set $p=|\lambda^{+}|$ and $q=|\lambda^{-}|$.
Let
$$
V_{\ul\lambda}=T_{p,q}\otimes_{\Q[\gpS_{p}\times\gpS_{q}]} (S^{\lambda^{+}}\otimes S^{\lambda^{-}}).
$$
If $\ul\lambda$ has at most $n$ parts, then $V_{\ul\lambda}$ is an irreducible algebraic representation, and otherwise, we have $V_{\ul\lambda}=0$.
We have the following decomposition of $T_{p,q}$ as a $\GL(n,\Q)\times (\gpS_p\times \gpS_q)$-modules, which generalizes the Schur--Weyl duality for $H^{\otimes p}$
\begin{gather}\label{Tpq}
T_{p,q}=\bigoplus_{\substack{\ul\lambda: \text{bipartition with at most $n$ parts} \\ |\lambda^{+}|=p,\;|\lambda^{-}|=q}} V_{\ul\lambda}\otimes (S^{\lambda^{+}}\otimes S^{\lambda^{-}}).
\end{gather}(See \cite[Theorem 1.1]{Koike}.)
It is well known that irreducible algebraic representations of $\GL(n,\Q)$ are classified by bipartitions with at most $n$ parts, that is, any irreducible algebraic $\GL(n,\Q)$-representation is isomorphic to $V_{\ul\lambda}$ for a bipartition $\ul\lambda$ with at most $n$ parts.
(See also \cite{Patzt} for the correspondence between irreducible algebraic representations and bipartitions.)
For a bipartition $\ul\lambda=(\lambda^{+},\lambda^{-})$ with at most $n$ parts, we have
$V_{\ul\lambda}=V_{\mu}\otimes \det^{k}$,
where $\mu$ is a partition and $k$ is an integer satisfying
$$(\lambda^{+}_1,\cdots, \lambda^{+}_{l(\lambda^{+})},0,\cdots,0,-\lambda^{-}_{l(\lambda^{-})},\cdots,-\lambda^{-}_1)= (\mu_1+k,\cdots, \mu_n+k),$$
and where $\det$ denotes the $1$-dimensional determinant representation.
The \emph{dual} of $\ul\lambda$ is defined by $\ul\lambda^*=(\lambda^{-},\lambda^{+})$.
Note that we have a $\GL(n,\Q)$-isomorphism $(V_{\ul\lambda})^*\cong V_{\ul\lambda^*}$.
For two bipartitions $\ul\lambda, \ul\mu$ such that $n\ge l(\ul\lambda)+l(\ul\mu)$, we have the following irreducible decomposition of the tensor product of $V_{\ul\lambda}$ and $V_{\ul\mu}$
$$
V_{\ul\lambda}\otimes V_{\ul\mu}=\bigoplus_{\ul\nu} V_{\ul\nu}^{\oplus N_{\ul\lambda \ul\mu}^{\ul\nu}},
$$
where $N_{\ul\lambda \ul\mu}^{\ul\nu}=
\sum_{\alpha\beta\theta\delta}
(\sum_{\kappa}N_{\kappa\alpha}^{\lambda^+}N_{\kappa\beta}^{\mu^-})
(\sum_{\epsilon}N_{\epsilon\theta}^{\lambda^-}N_{\epsilon\delta}^{\mu^+})
N_{\alpha\delta}^{\nu^+}N_{\beta\theta}^{\nu^-}$ (see \cite{Koike} for details).
\subsection{Generator of the traceless part $T_{p,q}$}
Here we give a generator of the traceless part $T_{p,q}$ of $H^{\otimes p}\otimes (H^*)^{\otimes q}$.
We have the following explicit highest weight vectors of $T_{p,q}$.
\begin{lemma}[Theorems 2.7 and 2.11 of \cite{BCHLLS}]\label{hwv}
Let $p,q\ge 0$.
For a bipartition $\ul\lambda$ with at most $n$ parts such that $|\lambda^{+}|=p$ and $|\lambda^{-}|=q$, let $$e(\ul\lambda)=(e_1^{\otimes \lambda^{+}_1} \otimes \cdots \otimes e_{l(\lambda^{+})}^{\otimes \lambda^{+}_{l(\lambda^{+})}}) \otimes ((e_n^*)^{\otimes \lambda^{-}_1} \otimes \cdots \otimes (e_{n-l(\lambda^{-})+1}^{*})^{\otimes \lambda^{-}_{l(\lambda^{-})}})
\in H^{\otimes p}\otimes (H^*)^{\otimes q}.$$
Let $St_{\lambda^+}$ (resp. $St_{\lambda^-}$) denote the subset of $\gpS_p$ (resp. $\gpS_q$) consisting of permutations which send the canonical tableau to standard tableaux on the Young diagram corresponding to $\lambda^+$ (resp. $\lambda^-$).
Then the set
$$\{(\pi b_{\lambda^{+}}\otimes \id) (\id\otimes \rho b_{\lambda^{-}}) e(\ul\lambda)\mid |\lambda^{+}|=p,\: |\lambda^{-}|=q,\: \pi\in St_{\lambda^+},\: \rho\in St_{\lambda^-}\}$$
is a basis for the space of all highest weight vectors of $T_{p,q}$.
In particular, for each $\ul\lambda$, $(\pi b_{\lambda^{+}}\otimes \id) (\id\otimes \rho b_{\lambda^{-}}) e(\ul\lambda)$ generates an irreducible subrepresentation of $T_{p,q}$ which is isomorphic to $V_{\ul\lambda}$.
\end{lemma}
\begin{lemma}\label{tracelessgen}
Let $n\ge p+q$.
Then the traceless part $T_{p,q}$ of $H^{\otimes p}\otimes (H^*)^{\otimes q}$ is generated by
$$e_{p,q}=e_1\otimes \cdots \otimes e_p \otimes e_n^*\otimes \cdots \otimes e_{n-q+1}^* \in H^{\otimes p}\otimes (H^*)^{\otimes q}$$
as a $\GL(n,\Q)$-representation.
\end{lemma}
\begin{proof}
The proof is analogous to that of \cite[Lemma 2.1]{Lindell}.
By Lemma \ref{hwv}, the traceless part $T_{p,q}$ is generated by
$$\{(\pi b_{\lambda^{+}}\otimes \id) (\id\otimes \rho b_{\lambda^{-}}) e(\ul\lambda)\mid |\lambda^{+}|=p,\: |\lambda^{-}|=q,\: \pi\in St_{\lambda^+},\: \rho\in St_{\lambda^-}\}.$$
Therefore, it suffices to show that
$$
e_J:= e_{j_1}\otimes \cdots \otimes e_{j_p} \otimes e_{j_{n}}^*\otimes \cdots \otimes e_{j_{n-q+1}}^* \in \Q[\GL(n,\Q)] e_{p,q}
$$
for $j_1, \cdots, j_p \in [p]$, $j_{n},\cdots,j_{n-q+1}\in \{n,\cdots,n-q+1\}$.
Let
$$K_p=\{k\in [p]\mid e_{j_k}=e_{j_l} \text{ for some }l<k\}$$
and
$$K'_q=\{k\in [q]\mid e_{j_{n-k+1}}^*=e_{j_{n-l+1}}^* \text{ for some } l<k\}.$$
We can reorder the basis $\{e_1,\cdots,e_n\}$ for $H$ by using permutation matrices in such a way that $e_{j_k}=e_k$ for $k\in [p]\setminus K_p$, that is, we may assume that $e_J$ coincides with
$e_1\otimes \cdots\otimes e_p\otimes e_{j_{n}}^*\otimes \cdots \otimes e_{j_{n-q+1}}^*$
except for tensor factors where $e_J$ has repeating elements.
We can also assume that $e_J$ coincides with $e_{p,q}$ except for tensor factors where $e_J$ has repeating elements
by reordering the basis $\{e_1,\cdots,e_n\}$ again in such a way that $e_{j_{n-k+1}}^*=e_{n-k+1}^*$ for $k\in [q]\setminus K'_q$.
Now, we have to check that $e_{J}\in \Q[\GL(n,\Q)] e_{p,q}$.
Define
$$E_J:=\prod_{k\in K_p} (E_{j_k,k}-\id)\prod_{k\in K_q}(\id-E_{n-k+1,j_{n-k+1}})\in \Q[\GL(n,\Q)].$$
Then we have
\begin{gather*}
e_{J}=E_J(e_{p,q})\in \Q[\GL(n,\Q)] e_{p,q},
\end{gather*}
which completes the proof.
\end{proof}
\begin{corollary}\label{projgen}
Let $n\ge p+q$.
Let $X$ be a $\GL(n,\Q)$-representation with a projection $\pi:T_{p,q}\twoheadrightarrow X$.
Then $X$ is generated by $\pi(e_{p,q})$ as a $\GL(n,\Q)$-representation.
\end{corollary}
\subsection{Traceless tensor products}\label{tracelesswedge}
Here we define traceless tensor products of algebraic $\GL(n,\Q)$-representations.
By Lemma \ref{hwv}, we have a subrepresentation $V_{\ul\lambda}\subset H^{\otimes |\lambda^+|}\otimes (H^*)^{\otimes |\lambda^-|}$ which is generated by $(b_{\lambda^{+}}\otimes \id) (\id\otimes b_{\lambda^{-}}) e(\ul\lambda)$ for each bipartition $\ul\lambda$.
Let $\ul\lambda$ and $\ul\mu$ be two bipartitions. Let $p=|\lambda^{+}|, q=|\lambda^{-}|, r=|\mu^{+}|$ and $s=|\mu^{-}|$.
Define the \emph{traceless tensor product} $V_{\ul\lambda}\wti{\otimes} V_{\ul\mu}$ of $V_{\ul\lambda}$ and $V_{\ul\mu}$ as
$$V_{\ul\lambda}\wti{\otimes} V_{\ul\mu}=(V_{\ul\lambda}\otimes V_{\ul\mu})\cap T_{p+r,q+s}\subset H^{\otimes (p+r)}\otimes (H^*)^{\otimes (q+s)}.$$
In other words, $V_{\ul\lambda}\wti{\otimes} V_{\ul\mu}$ is a subrepresentation of $V_{\ul\lambda}\otimes V_{\ul\mu}$ which vanishes under any contraction maps.
Then we have for $n\ge l(\ul\lambda)+l(\ul\mu)$,
$$V_{\ul\lambda}\wti{\otimes} V_{\ul\mu}\cong \bigoplus_{|\ul\nu|= |\ul\lambda|+|\ul\mu|} V_{\ul\nu}^{\oplus N_{\ul\lambda \ul\mu}^{\ul\nu}}\subset
\bigoplus_{\ul\nu} V_{\ul\nu}^{\oplus N_{\ul\lambda \ul\mu}^{\ul\nu}}
\cong V_{\ul\lambda}\otimes V_{\ul\mu}.$$
Let $M$ be an algebraic $\GL(n,\Q)$-representation. For each bipartition $\ul\lambda$, define a vector space $$M_{\ul\lambda}=\Hom_{\GL(n,\Q)}(V_{\ul\lambda},M).$$
Since the category of algebraic $\GL(n,\Q)$-representations is semisimple, we have a natural isomorphism
$$
\iota_M: M\xrightarrow{\cong} \bigoplus_{\ul\lambda}V_{\ul\lambda}\otimes M_{\ul\lambda}.
$$
For two algebraic $\GL(n,\Q)$-representations $M$ and $N$, we have
$$
\iota_M\otimes \iota_N: M\otimes N \xrightarrow{\cong} \left(\bigoplus_{\ul\lambda}V_{\ul\lambda}\otimes M_{\ul\lambda}\right)
\otimes
\left(\bigoplus_{\ul\mu}V_{\ul\mu}\otimes N_{\ul\mu}\right)
\cong
\bigoplus_{\ul\lambda,\ul\mu}(V_{\ul\lambda}\otimes V_{\ul\mu})\otimes (M_{\ul\lambda}\otimes N_{\ul\mu}).
$$
Define the \emph{traceless tensor product} $M \wti{\otimes} N$ of $M$ and $N$ as
$$
M \wti{\otimes} N=(\iota_{M}\otimes \iota_{N})^{-1} \left(\bigoplus_{\ul\lambda,\ul\mu}(V_{\ul\lambda}\wti{\otimes} V_{\ul\mu})\otimes (M_{\ul\lambda}\otimes N_{\ul\mu})\right)\subset M\otimes N.
$$
Let $M^{\wti{\otimes} 0}=\Q$ and $M^{\wti{\otimes} 1}=M$.
For $n\ge 2$, we define $M^{\wti{\otimes}n}=M^{\wti{\otimes}n-1}\wti{\otimes} M\subset M^{\otimes n}$ iteratively, and define the \emph{traceless part} $\wti{T}^*M$ of the tensor algebra $T^*M$ as
$$\wti{T}^*M=\bigoplus_{n\ge 0} M^{\wti{\otimes}n}\subset T^*M.$$
Let $\bigwedge^* M$ denote the exterior algebra of $M$ and $\Sym^* M$ the symmetric algebra of $M$.
We have canonical projections $T^*M\twoheadrightarrow \bigwedge^* M$ and $T^*M \twoheadrightarrow \Sym^* M$.
We define the \emph{traceless part} $\wti{\bigwedge}^* M$ of $\bigwedge^* M$ as the image of $\wti{T}^*M$ under the above projection, and the \emph{traceless part} $\wti{\Sym}^* M$ of $\Sym^* M$ in a similar way.
\subsection{Traceless parts of graded-symmetric algebras}\label{tracelesspartofgradedsymmetricalgebra}
Let $M_*=\bigoplus_{i\ge 1} M_i$ be a graded algebraic $\GL(n,\Q)$-representation.
Let $S^*(M_*)$ denote the graded-symmetric algebra of $M_*$.
That is, we have the following graded-commutativity
$$
y x =(-1)^{ij} x y
$$
for $x\in M_i$ and $y\in M_j$.
Then we have $S^k (M_i)=\Sym^k(M_i)$ for even $i$ and $S^k (M_i)=\bigwedge^k(M_i)$ for odd $i$.
We have a canonical projection $T^*M_*\twoheadrightarrow S^*(M_*)$.
Define the \emph{traceless part} $\wti{S}^* (M_*)=\bigoplus_{i\ge 0} \wti{S}^* (M_*)_i$ of the graded-symmetric algebra $S^*(M_*)$ as the image of $\wti{T}^*M_*$ under the projection.
Then $\wti{S}^* (M_*)$ is a graded $\GL(n,\Q)$-representation satisfying
\begin{gather*}
\wti{S}^* (M_*)_i =\bigoplus_{k_1+2k_2 +\cdots + p k_p=i} \left(\wti{S}^{k_1}M_{1}\right) \wti{\otimes}\cdots \wti{\otimes} \left(\wti{S}^{k_p}M_{p}\right).
\end{gather*}
The graded-symmetric algebra $S^*(M_*)$ has a coalgebra structure defined as follows.
For an element $x=x_1\cdots x_k\in S^*(M_*)$, where $x_j\in M_{i_j}$, and for $\sigma\in \gpS_k$, let $\sgn(\sigma; x)\in \{1,-1\}$ denote the sign satisfying
$$
x_{\sigma(1)}\cdots x_{\sigma(k)}= \sgn(\sigma; x)x_1\cdots x_k.
$$
Then the comultiplication $\Delta$ is defined by
$$
\Delta(x_1\cdots x_k)=\sum_{p=0}^k \sum_{\sigma\in \Sh(p,k-p)}\sgn(\sigma; x) x_{\sigma(1)}\cdots x_{\sigma(p)} \otimes x_{\sigma(p+1)}\cdots x_{\sigma(k)},
$$
where $\Sh(p,k-p)\subset \gpS_k$ denotes the set of $(p,k-p)$-shuffles.
Then we can check that the coalgebra structure of $S^*(M_*)$ induces a subcoalgebra structure of the traceless part $\wti{S}^*(M_*)$. We can also check that the primitive part of $S^*(M_*)$ is $M_*$.
\begin{remark}
The traceless part $\wti{S}^*(M_*)$ does not inherit the algebra structure of $S^*(M_*)$. However, we can consider an algebra structure on $\wti{S}^*(M_*)$ in the symmetric monoidal category that we introduce below.
Let $\mathbf{Rep}^{\text{alg}}(\GL(n,\Q))$ denote the category of algebraic $\GL(n,\Q)$-representations and $\GL(n,\Q)$-homomorphisms.
The traceless tensor product $\wti{\otimes}$ and the symmetry $\wti{\tau}_{V,W}: V\wti{\otimes}W\to W\wti{\otimes}V$ which is the restriction of the usual symmetry $\tau_{V,W}:V\otimes W\xrightarrow{\cong} W\otimes V$
form a symmetric monoidal structure $(\mathbf{Rep}^{\text{alg}}(\GL(n,\Q)),\wti{\otimes}, \wti{\tau})$.
Then $\wti{S}^*(M_*)$ is a bialgebra in $(\mathbf{Rep}^{\text{alg}}(\GL(n,\Q)),\wti{\otimes}, \wti{\tau})$.
\end{remark}
\subsection{$\GL(\infty,\Q)$-representations}\label{prestable}
Let $n\ge 0$.
We have an inclusion $\GL(n,\Q)\hookrightarrow \GL(n+1,\Q)$ sending $A\in \GL(n,\Q)$ to $A\oplus {1}\in \GL(n+1,\Q)$.
Let $\GL(\infty,\Q)=\varinjlim_{n}\GL(n,\Q)=\bigcup_{n\ge 1} \GL(n,\Q)$.
Here we recall representation theory of $\GL(\infty,\Q)$. See \cite{SamSnowden} for details.
We have a canonical inclusion $H(n)\hookrightarrow H(n+1)$ sending the basis vector $e_j$ to $e_j$ for $j\in [n]$.
We also have an inclusion $H(n)^*\hookrightarrow H(n+1)^*$ sending the dual basis vector $e_j^*$ to $e_j^*$ for $j\in [n]$.
Let $\bfH=\varinjlim_{n} H(n)=\bigcup_{n\ge 1} H(n)$, and $\bfH^*=\varinjlim_{n} (H(n)^*)=\bigcup_{n\ge 1}(H(n)^*)$.
The group $\GL(\infty,\Q)$ acts on the tensor product $\bfH^{\otimes p}\otimes (\bfH^*)^{\otimes q}$ for any $p,q\ge 0$.
We call a $\GL(\infty,\Q)$-representation \emph{algebraic} if it is a subquotient of a finite direct sum of tensor products $\bfH^{\otimes p}\otimes (\bfH^*)^{\otimes q}$ for $p,q\ge 0$.
Note that the category of algebraic $\GL(\infty,\Q)$-representations is not semisimple.
For example, the contraction map $\bfH\otimes \bfH^*\twoheadrightarrow \Q$ does not split.
We consider the contraction maps $c_{k,l}$ and the traceless part $T_{p,q}$ for $\GL(\infty,\Q)$ as in the case of $\GL(n,\Q)$.
For any bipartition $\ul\lambda$ such that $|\lambda^{+}|=p$ and $|\lambda^{-}|=q$,
define a $\GL(\infty,\Q)$-representation $V_{\ul\lambda}$ as
$$
V_{\ul\lambda}=T_{p,q}\otimes_{\Q[\gpS_p\times\gpS_q]}(S^{\lambda^{+}}\otimes S^{\lambda^{-}}).
$$
Then as in \eqref{Tpq}, we have the following decomposition of the traceless part $T_{p,q}$ as $\GL(\infty,\Q)$-representations
$$
T_{p,q}=\bigoplus_{\substack{\ul\lambda=(\lambda^{+},\lambda^{-}) \\ |\lambda^{+}|=p,\;|\lambda^{-}|=q}} V_{\ul\lambda}\otimes (S^{\lambda^{+}}\otimes S^{\lambda^{-}}).
$$
Moreover, as in the case of $\GL(n,\Q)$, it is known that
irreducible algebraic representations of $\GL(\infty,\Q)$ are classified by bipartitions. (See Proposition 3.14 in \cite{SamSnowden}.)
\section{Abelian cycles in $H^A_i(\IA_n,\Q)$}\label{Abeliancycles}
Here we recall the notion of abelian cycles and construct abelian cycles in $H_i(\IA_n,\Q)$.
\subsection{Definition of abelian cycles}
Let $i\ge 1$ and $\Z^i=\bigoplus_{k=1}^i \Z z_k$.
Let $(\phi_1,\cdots,\phi_i)$ be an $i$-tuple of mutually commuting elements of $\IA_n$.
Then we have a group homomorphism $\Z^i\to \IA_n$ mapping $z_k$ to $\phi_k$ for $1\le k\le i$,
which induces a group homomorphism $$H_i(\Z^i,\Q)\to H_i(\IA_n,\Q).$$
We have $H_i(\Z^i,\Q)\cong H_i(T^i,\Q)\cong \Q$, where $T^i$ is the $i$-dimensional torus.
Let $A(\phi_1,\cdots,\phi_i)\in H_i(\IA_n,\Q)$ denote the image of the fundamental class of $H_i(T^i,\Q)$ and call it the \emph{abelian cycle} determined by $(\phi_1,\cdots,\phi_i)$.
\subsection{Abelian cycles in $H_i(\IA_n,\Q)$}\label{secabeliancycle}
Magnus's set of generators of $\IA_n$ is
$$
\{g_{a,b}\mid 1\le a,b \le n,\; a\ne b \}\cup\{f_{a,b,c}\mid 1\le a,b,c\le n,\; a< b,\; a\ne c\ne b\},
$$
where $g_{a,b}$ and $f_{a,b,c}$ are defined by
\begin{gather*}
g_{a,b}(x_b)=x_a x_b x_a^{-1}, \quad g_{a,b}(x_d)=x_d \text{ for }d\neq b,\\
f_{a,b,c}(x_c)=x_c[x_a,x_b], \quad f_{a,b,c}(x_d)=x_d \text{ for }d\neq c.
\end{gather*}
For $k>l$, let
$$
h_{k,l}:=g_{k,l} g_{k,l+1}\cdots g_{k,k-1}\in\IA_n.
$$
Let $\Aut(F_n)(k,l)$ denote the image of the canonical injective map
$$\Aut(F_{k-l})\hookrightarrow \Aut(F_n),\; x_j\mapsto x_{j+l-1}.$$
Since $h_{k,l}$ fixes $x_j$ for $j\in \{1,\cdots,l-1,k,\cdots,n\}$ and maps $x_j$ to $x_k x_j x_k^{-1}$ for $j\in \{l,l+1,\cdots,k-1\}$, it follows that $h_{k,l}$ commutes with any element of $\Aut(F_n)(k,l)$.
For positive integers $a$ and $r$, set
$$\mathbf{g}_{r,a}=(g_{a+1,a}=h_{a+1,a}, h_{a+2,a},\cdots, h_{a+r,a})$$
and
$$\mathbf{f}_{r,a}=(f_{a,a+1,a+2}, h_{a+3,a},h_{a+4,a},\cdots, h_{a+r+1,a}).$$
\begin{lemma}\label{abeliancycle}
For $n\ge a+r$, $\mathbf{g}_{r,a}$ is an $r$-tuple of mutually commuting elements.
For $n\ge a+r+1$, $\mathbf{f}_{r,a}$ is an $r$-tuple of mutually commuting elements.
\end{lemma}
\begin{proof}
For $\mathbf{g}_{r,a}$, it suffices to check that $h_{a+i,a}$ and $h_{a+j,a}$ commute for $1\le i<j\le r$.
Since $h_{a+j,a}$ commutes with any elements of $\Aut(F_n)(a+j,a)$ and since we have $h_{a+i,a}\in \Aut(F_n)(a+j,a)$, it follows that $h_{a+j,a}$ commutes with $h_{a+i,a}$.
We can also check that $\mathbf{f}_{r,a}$ is an $r$-tuple of mutually commuting elements by using the fact that
$f_{a,a+1,a+2}\in \Aut(F_n)(a+j,a)$ for any $3\le j\le r+1$.
\end{proof}
Let $i\ge 0$.
We call $(\mu,\nu)$ \emph{a pair of partitions of total size $i$}, denoted by $(\mu,\nu)\vdash i$, if $\mu$ and $\nu$ are partitions with $|\mu|+|\nu|=i$.
(Note that pairs of partitions are the same as bipartitions, but we regard them as different notions.)
For $n\ge i+2l(\mu)+l(\nu)$,
define an $i$-tuple $\mathbf{h}_{(\mu,\nu)}$ of elements of $\IA_n$ by
$$
\mathbf{h}_{(\mu,\nu)}=(\mathbf{f}_{\mu_1,s(1)},\cdots, \mathbf{f}_{\mu_{l(\mu)},s(l(\mu))}, \mathbf{g}_{\nu_1,t(1)}, \cdots, \mathbf{g}_{\nu_{l(\nu)},t(l(\nu))}),
$$
where
$$s(j)=1+\sum_{p=1}^{j-1}(\mu_p +2),\quad
t(k)=1+|\mu|+2l(\mu)+\sum_{p=1}^{k-1}(\nu_p +1).$$
Then we can check that $\mathbf{h}_{(\mu,\nu)}$ consists of mutually commuting elements.
For example, we have
\begin{gather*}
\begin{split}
\mathbf{h}_{(2, 0)}&=\mathbf{f}_{2,1}=(f_{1,2,3},\; h_{4,1}),\\
\mathbf{h}_{(0,2)}&=\mathbf{g}_{2,1}=(h_{2,1},\; h_{3,1}),\\
\mathbf{h}_{(1^2,0)}&=(\mathbf{f}_{1,1},\mathbf{f}_{1,4})=(f_{1,2,3},\; f_{4,5,6}),\\
\mathbf{h}_{(0,1^2)}&=(\mathbf{g}_{1,1},\mathbf{g}_{1,3})=(h_{2,1},\; h_{4,3}),\\
\mathbf{h}_{(1,1)}&=(\mathbf{f}_{1,1},\mathbf{g}_{1,4})=(f_{1,2,3},\; h_{5,4}).
\end{split}
\end{gather*}
Then we obtain an abelian cycle corresponding to each pair of partitions.
\begin{definition}\label{abeliancyclepairpart}
Let $(\mu,\nu)\vdash i$ be a pair of partitions.
For $n\ge i+2l(\mu)+l(\nu)$, define $\alpha_{(\mu,\nu)}=A(\mathbf{h}_{(\mu,\nu)})\in H_i(\IA_n,\Q)$ as the abelian cycle corresponding to the $i$-tuple $\mathbf{h}_{(\mu,\nu)}$ of mutually commuting elements.
\end{definition}
\begin{remark}
The above construction gives an abelian cycle $\alpha_{(\mu,\nu)}$ in $H_i(\IA_n,\Z)$ for each $(\mu,\nu)\vdash i$.
\end{remark}
\section{Non-triviality of $H^A_i(\IA_n,\Q)$}\label{Connectedpart}
In this section, we construct two types of contraction maps each of which detects an irreducible $\GL(n,\Q)$-quotient representation of $H^A_i(\IA_n,\Q)$.
Let
$$U=\Hom(H,\bigwedge^2 H)\cong \left(\bigwedge^2 H\right)\otimes H^{*}.$$
For $a,b,c\in [n]$,
let
$$e_{a,b}^{c}:=(e_a\wedge e_b) \otimes e_c^*\in U.$$
Then we have the following basis for $U$ induced by Magnus's set of generators of $\IA_n$
\begin{gather*}
\{e_{a,b}^{b}\mid 1\le a,b \le n,\; a\ne b \}\cup\{e_{a,b}^{c}\mid 1\le a,b,c\le n,\; a< b,\; a\ne c\ne b\}\\
=\{e_{a,b}^{c}\mid 1\le a,b,c\le n,\; a< b\}.
\end{gather*}
\subsection{Contraction maps}\label{subseccontraction}
Let
$$M_i:=(H^{\otimes 2}\otimes H^{*})^{\otimes i}=H^{\otimes 2i}\otimes (H^*)^{\otimes i}.$$
Let $\iota_{i}$ be the canonical injective map
\begin{gather*}
\iota_{i}: \bigwedge^{i} U \hookrightarrow M_i,\quad
u_1\wedge\cdots\wedge u_i\mapsto
\sum_{\sigma\in \gpS_i}
\sgn(\sigma) \varphi(u_{\sigma(1)})\otimes\cdots\otimes \varphi(u_{\sigma(i)}),
\end{gather*}
where
$$
\varphi:U \hookrightarrow H^{\otimes 2}\otimes H^*,\quad (a\wedge b)\otimes d^* \mapsto (a\otimes b- b\otimes a)\otimes d^*.
$$
For $i\ge 1$, let
$$U_i=\Hom(H,\bigwedge^{i+1} H)\cong \left(\bigwedge^{i+1} H\right)\otimes H^*.$$
Then we have $U=U_1$. Note that $U_i$ vanishes for $n\le i$.
We have a direct sum decomposition
$$U_i=U_i^{\tree}\oplus U_i^{\wheel},$$
where
$U_i^{\tree}$ denotes the subrepresentation of $U_i$ that is isomorphic to $V_{1^{i+1},1}$, and where $U_i^{\wheel}$ denotes the other subrepresentation that is isomorphic to $V_{1^i,0}$ for $n\ge i+1$.
In what follows, we assume $n\ge i+1$ and we identify $U_i^{\wheel}$ with $V_{1^i,0}$.
Define a $\GL(n,\Q)$-homomorphism
\begin{gather*}
c_{i}: M_i\to U_i\cong \left(\bigwedge^{i+1} H\right) \otimes H^*
\end{gather*}
by
$$c_{i}\left(\bigotimes_{j=1}^i (a_j\otimes b_j \otimes d_j^*)\right)=\left(\prod_{j=2}^i d_j^*(b_{j-1})\right) a_1\wedge a_2\wedge\cdots\wedge a_i\wedge b_i \otimes d_1^*.$$
We also define a $\GL(n,\Q)$-homomorphism
\begin{gather*}
c^{\tree}_{i}: M_i\to U_i^{\tree}\cong V_{1^{i+1},1}
\end{gather*}
to be the composition of the contraction map $c_{i}$ and the canonical projection $U_i\twoheadrightarrow U_i^{\tree}$.
Define another $\GL(n,\Q)$-homomorphism
\begin{gather*}
c^{\wheel}_{i}: M_i\to U_i^{\wheel} \cong V_{1^i,0}
\end{gather*}
by
$$c^{\wheel}_{i}\left(\bigotimes_{j=1}^i (a_j\otimes b_j \otimes d_j^*)\right)= \left(\prod_{j=1}^i d_j^*(b_{j-1})\right) a_1\wedge a_2\wedge\cdots\wedge a_i,$$
where $b_{0}$ means $b_{i}$.
\subsection{Non-trivial quotient representation of $H^A_i(\IA_n,\Q)$}
Here we detect two irreducible quotient representations of $H^A_i(\IA_n,\Q)$ by using $c^{\tree}_{i}$ and $c^{\wheel}_{i}$.
Recall that in Definition \ref{abeliancyclepairpart}, we defined the abelian cycle $\alpha_{(0,i)}\in H_i(\IA_n,\Q)$ corresponding to the pair of partition $(0,i)$ for $n\ge i+1$, and that we have the following $\GL(n,\Z)$-homomorphisms
\begin{gather*}
\xymatrix{
H_i(\IA_n,\Q)\ar[r]^-{\tau_*}
&H_i(U,\Q)=\bigwedge^i U \ar[r]^-{\iota_i}
& M_i\ar[rr]^-{c^{\wheel}_i}\ar[rrd]^-{c^{\tree}_i}
&& U_i^{\wheel}\\
&&&& U_i^{\tree},
}
\end{gather*}
where $\tau_* $ is induced by the Johnson homomorphism.
\begin{lemma}\label{lemconnected}
For $n\ge i+1$, we have
\begin{gather*}
c^{\wheel}_{i} \iota_{i} \tau_* (\alpha_{(0,i)}) = i!\: e_2\wedge e_3\wedge\cdots \wedge e_{i+1}\in
U_i^{\wheel}\setminus \{0\},
\end{gather*}
and
\begin{gather*}
c_{i} \iota_{i} \tau_* (\alpha_{(0,i)})= (-1)^i (i+1)!\: e_1\wedge e_2\wedge\cdots \wedge e_{i+1}\otimes e_{1}^*.
\end{gather*}
Therefore, for $n\ge i+2$, we have
\begin{gather*}
(\id- E_{1,n})c^{\tree}_{i} \iota_{i} \tau_* (\alpha_{(0,i)}) =(-1)^i (i+1)!\: e_1\wedge e_2\wedge \cdots \wedge e_{i+1}\otimes e_{n}^* \in U_i^{\tree}\setminus \{0\}.
\end{gather*}
\end{lemma}
\begin{proof}
We have
\begin{gather*}
\tau_* (\alpha_{(0,i)})=
e_{2,1}^{1} \wedge (e_{3,1}^{1}+e_{3,2}^2)
\wedge \cdots \wedge (\sum_{j=1}^i e_{i+1,j}^{j})
\in \bigwedge^{i} U.
\end{gather*}
First, we consider the image under $c^{\wheel}_{i}$.
By the definition of $c^{\wheel}_{i}$,
we have
\begin{gather*}
c^{\wheel}_{i} \iota_{i} \tau_* (\alpha_{(0,i)}) = c^{\wheel}_{i} \iota_{i} ( e_{2,1}^{1} \wedge e_{3,1}^{1}\wedge \cdots \wedge e_{i+1,1}^{1})
\in \Z (e_2\wedge e_3\wedge\cdots \wedge e_{i+1}).
\end{gather*}
Since the inclusion $\iota_{i}$ gives $i!$ copies of $e_2\wedge e_3\wedge \cdots\wedge e_{i+1}$, we obtain
\begin{gather*}
c^{\wheel}_{i} \iota_{i} \tau_* (\alpha_{(0,i)}) = i!\: e_2\wedge e_3\wedge\cdots \wedge e_{i+1}\in V_{1^i,0}\setminus\{0\}\cong U_i^{\wheel}\setminus \{0\}.
\end{gather*}
Next, we consider the image under the contraction map $c^{\tree}_{i}$.
For $K=(k_1,\cdots,k_{3i})\in [n]^{3i}$, let $e_{K}=\bigotimes_{j=1}^i (e_{k_j}\otimes e_{k_{2i+1-j}}\otimes e_{k_{2i+j}}^*)$.
Then $\{e_{K} \mid K\in [n]^{3i} \}$
forms a basis for $M_i$.
We write
\begin{gather*}
\iota_{i} \tau_* (\alpha_{(0,i)})=\sum_{K\in [n]^{3i}} a_K e_K \in M_i,
\end{gather*}
where $a_K\in \Z$.
Then we can easily check the following properties of the coefficient $a_K$
\begin{itemize}
\item for each $K\in [n]^{3i}$, we have $a_K\in \{0,1,-1\}$.
\item for $K\notin [i+1]^{3i}$, we have $a_K=0$.
\item for $K\in [i+1]^{3i}$ such that $k_{2i+j}\neq \min\{k_j,k_{2i+1-j}\}$ for some $j\in [i]$, we have $a_K=0$.
\end{itemize}
By the above properties, if we have $c_{i}(a_K e_K)\in (\bigwedge^{i+1} H \otimes H^*)\setminus \{0\}$, then there exists a permutation $\sigma\in \gpS_{i+1}$ such that for any $j\in [i+1]$, we have $k_j=\sigma(j)$.
\begin{claim}\label{exist}
For each $\sigma\in \gpS_{i+1}$, there uniquely exists $K\in [i+1]^{3i}$
such that
\begin{itemize}
\item $k_j=\sigma(j)$ for $j\in [i+1]$
\item $c_{i}(a_K e_K)\neq 0$.
\end{itemize}
In particular, we have
$$c_{i}(a_K e_K)= a_K (e_{\sigma(1)}\wedge e_{\sigma(2)}\wedge \cdots\wedge e_{\sigma(i+1)})\otimes e_1^{*} \neq 0.$$
\end{claim}
\begin{proof}[Proof of Claim \ref{exist}]
Define $K\in [i+1]^{3i}$ as
\begin{gather*}
k_j=
\begin{cases}
\sigma(j) & (1\le j\le i+1)\\
\min \{k_{2i+2-j}, \cdots , k_{i+1}\} & (i+2\le j \le 2i)\\
\min \{k_{j-2i},\cdots , k_{i+1} \} & (2i+1\le j\le 3i).
\end{cases}
\end{gather*}
Then we can check that
\begin{gather*}
c_{i}(a_K e_K)=a_K (e_{\sigma(1)}\wedge e_{\sigma(2)}\wedge \cdots\wedge e_{\sigma(i+1)})\otimes e_1^{*}.
\end{gather*}
The uniqueness follows from the construction.
\end{proof}
\begin{claim}\label{sgn}
For each $\sigma\in \gpS_{i+1}$, let $K(\sigma)$ denote the unique element of $[i+1]^{3i}$ that we constructed in the proof of Claim \ref{exist}.
Then we have $a_{K(\sigma)}=(-1)^i \sgn (\sigma)$.
\end{claim}
\begin{proof}[Proof of Claim \ref{sgn}]
We use the induction on $i$.
For $i=1$, we have
$$a_{K(\id)}=-1=(-1)^1 \sgn (\id), \quad a_{K((12))}=1=(-1)^1 \sgn((12)).$$
Assume that the statement holds for $i\ge 1$.
For any $\sigma\in \gpS_{i+1}$, define $\tau\in \gpS_{i+1}$ as
\begin{gather*}
\tau(j)=
\begin{cases}
\sigma(1) & (j=1)\\
j-1 & (2\le j\le \sigma(1))\\
j &(\sigma(1)+1\le j\le i+1).
\end{cases}
\end{gather*}
Let $\ti{\tau}=\tau^{-1}\sigma$.
Then $\ti{\tau}$ maps $1$ to $1$, so we regard $\ti{\tau}\in \gpS_i$ by identifying $\{2,\cdots,i+1\}$ with $\{1,\cdots,i\}$ via the order preserving bijection.
We have
$$a_{K(\sigma)}=a_{K(\tau\ti{\tau})}=
\begin{cases}
(-1)a_{K(\ti{\tau})} & (\sigma(1)=1)\\
(-1)^{\sigma(1)-2}a_{K(\ti{\tau})} & (\sigma(1)\neq 1).
\end{cases}
$$
Therefore, in any case, we have
$a_{K(\sigma)}=(-1)^{\sigma(1)}a_{K(\ti{\tau})}$.
Since we have $\sgn(\tau)=(-1)^{\sigma(1)-1}$, by the hypothesis of the induction, we have
\begin{gather*}
\begin{split}
(-1)^{\sigma(1)} a_{K(\ti{\tau})}
&=(-1)^{\sigma(1)}(-1)^i \sgn(\ti{\tau})
=(-1)^{i+1} \sgn(\tau) \sgn(\ti{\tau})
=(-1)^{i+1}\sgn(\sigma),
\end{split}
\end{gather*}
which completes the proof.
\end{proof}
By using Claims \ref{exist} and \ref{sgn}, we have
\begin{gather*}
\begin{split}
c_{i} \iota_{i} \tau_* (\alpha_{(0,i)})
&=\sum_{K\in [n]^{3i}} c_{i} (a_K e_K)\\
&=\sum_{\sigma\in \gpS_{i+1}} a_{K(\sigma)} (e_{\sigma(1)}\wedge e_{\sigma(2)}\wedge \cdots\wedge e_{\sigma(i+1)})\otimes e_1^{*}\\
&=\sum_{\sigma\in \gpS_{i+1}} a_{K(\sigma)} \sgn(\sigma) (e_1\wedge e_2\wedge\cdots\wedge e_{i+1})\otimes e_1^{*}\\
&=(-1)^i (i+1)!\: e_1\wedge e_2\wedge\cdots \wedge e_{i+1}\otimes e_{1}^*.
\end{split}
\end{gather*}
Since for $n\ge i+2$, we have
$$(\id- E_{1,n})c_{i} \iota_{i} \tau_* (\alpha_{(0,i)}) =(-1)^i (i+1)!\: e_1\wedge e_2\wedge \cdots \wedge e_{i+1}\otimes e_{n}^* \in U_i^{\tree}\setminus \{0\},$$
the proof is complete.
\end{proof}
\begin{theorem}\label{nontriviality}
For $n\ge i+1$, we have a surjective $\GL(n,\Q)$-homomorphism
$$H^A_i(\IA_n,\Q) \twoheadrightarrow \Hom(H,\bigwedge^{i+1} H)\cong V_{1^i,0} \oplus V_{1^{i+1},1}.$$
Therefore, $H^A_i(\IA_n,\Q)$ includes a $\GL(n,\Q)$-subrepresentation which is isomorphic to $\Hom(H,\bigwedge^{i+1} H)$.
\end{theorem}
\begin{proof}
This directly follows from Lemma \ref{lemconnected}.
\end{proof}
\subsection{A representation-stable subrepresentation of $H^A_i(\IA_n,\Q)$}
Here we observe that the non-trivial subrepresentation of $H^A_i(\IA_n,\Q)$ that is detected in Theorem \ref{nontriviality} is representation stable.
We have a canonical inclusion map $\IA_n\hookrightarrow \IA_{n+1}$ sending $f\in\IA_n$ to $f\in \IA_{n+1}$ which is the same as $f$ on $F_n\subset F_{n+1}$ and fixes $x_{n+1}$.
Let $H_i(\IA_*,\Q)$ denote the sequence of group homomorphisms $H_i(\IA_n,\Q)\to H_i(\IA_{n+1},\Q)$ induced by the inclusion maps.
Since the inclusion map $\IA_n\hookrightarrow \IA_{n+1}$ sends
$g_{a,b}\in \IA_n$ to $g_{a,b}\in \IA_{n+1}$ and $f_{a,b,c}\in \IA_n$ to $f_{a,b,c}\in \IA_{n+1}$,
the abelian cycle $\alpha_{(0,i)}\in H_i(\IA_n,\Q)$ is sent to $\alpha_{(0,i)}\in H_i(\IA_{n+1},\Q)$.
Therefore, the element $\tau_*(\alpha_{(0,i)})\in H^A_i(\IA_n,\Q)$ is sent to $\tau_*(\alpha_{(0,i)})\in H^A_i(\IA_{n+1},\Q)$.
We can check that the canonical inclusion maps $H(n)\hookrightarrow H(n+1)$ and $H(n)^*\hookrightarrow H(n+1)^*$ that we have observed in Section \ref{prestable} send $e_1\wedge e_2\wedge\cdots \wedge e_{i+1}\otimes e_1^*\in \bigwedge^{i+1} H(n)\otimes H(n)^*$ to $e_1\wedge e_2\wedge\cdots\wedge e_{i+1}\otimes e_1^*\in \bigwedge^{i+1} H(n+1) \otimes H(n+1)^*$.
Let $\left(\bigwedge^{i+1} H\right)\otimes H^*$ denote the sequence of group homomorphisms $\left(\bigwedge^{i+1} H(n)\right)\otimes H(n)^*\hookrightarrow \left(\bigwedge^{i+1} H(n+1)\right)\otimes H(n+1)^*$.
By Theorem \ref{nontriviality}, we have the following proposition.
\begin{proposition}\label{representationstabilityofconnectedpart}
The sequence $H^A_i(\IA_*,\Q)$ includes a representation-stable sequence which is isomorphic to $\left(\bigwedge^{i+1} H\right) \otimes H^*$.
\end{proposition}
By the representation stability, we can consider an analogue of Theorem \ref{nontriviality} in the category of algebraic $\GL(\infty,\Q)$-representations.
Let $\IA_{\infty}=\varinjlim_{n}\IA_n$ denote the direct limit.
Both group homology and Albanese homology preserve direct limits (see Proposition \ref{preservedirectlimit}), that is, we have
$$
H_i(\IA_{\infty},\Q)\cong \varinjlim_{n}H_i(\IA_n,\Q),\quad H^A_i(\IA_{\infty},\Q)\cong \varinjlim_{n}H^A_i(\IA_n,\Q).
$$
Since $\alpha_{(0,i)}$ is preserved under $H_i(\IA_n,\Q)\to H_i(\IA_{n+1},\Q)$, we obtain a cycle $\alpha_{(0,i)}$ in $H_i(\IA_{\infty},\Q)$ and an element $\tau_*(\alpha_{(0,i)})\in H^A_i(\IA_{\infty},\Q)$.
Therefore, by Lemma \ref{lemconnected}, we have a $\GL(\infty,\Q)$-homomorphism
$$c_{i} \iota_{i}: H^A_i(\IA_{\infty},\Q) \to \left(\bigwedge^{i+1} \bfH\right)\otimes\bfH^*$$
such that
\begin{gather*}
c_{i} \iota_{i} \tau_* (\alpha_{(0,i)})= (-1)^i (i+1)!\: e_1\wedge e_2\wedge\cdots \wedge e_{i+1}\otimes e_{1}^*.
\end{gather*}
\begin{corollary}\label{infinitedimensional}
The $\GL(\infty,\Q)$-homomorphism
$$
c_{i} \iota_{i}: H^A_i(\IA_{\infty},\Q)\to\left(\bigwedge^{i+1} \bfH\right)\otimes\bfH^*
$$
is surjective.
In particular, for each $i\ge 1$, $H_i(\IA_{\infty},\Q)$ is infinite dimensional.
\end{corollary}
\begin{remark}
We have a non-split exact sequence
$$0\to V_{1^{i+1},1}\to \left(\bigwedge^{i+1} \bfH\right)\otimes\bfH^*\to V_{1^i,0}\to 0,$$
which generalizes the observation in Section \ref{prestable} that $\bfH\otimes \bfH^*\to \Q$ does not split.
Therefore, $H^A_i(\IA_{\infty},\Q)$ is not semisimple.
\end{remark}
\section{The traceless part of $H^A_i(\IA_n,\Q)$}\label{Tracelesspart}
Let $H_i(U,\Q)^{\tl}$ denote the traceless part $\wti{\bigwedge}^i U$ of $H_i(U,\Q)=\bigwedge^i U$.
In this section, we show that the traceless part of $H_i(U,\Q)$ is contained in $H^A_i(\IA_n,\Q)$.
Note that we have
$$H_i(U,\Q)^{\tl}=\pi(T_{2i,i}),$$
where $\pi: H^{\otimes 2i}\otimes (H^{*})^{\otimes i}=M_i\to \bigwedge^{i} U$ is defined by
$$
\left(\bigotimes_{j=1}^i (a_j\otimes b_j)\right) \otimes \left(\bigotimes_{j=1}^i c_j^*\right)\mapsto \bigwedge_{j=1}^i ((a_j\wedge b_j)\otimes c_j^*).
$$
\begin{theorem}\label{tracelessimage}
Let $n\ge 3i$.
We have $H_i(U,\Q)^{\tl}\subset H^A_i(\IA_n,\Q)$.
\end{theorem}
\begin{proof}
By Corollary \ref{projgen}, the traceless part $H_i(U,\Q)^{\tl}$ is generated by
$$\pi(e_{2i,i})=\bigwedge_{j=1}^{i}
e_{2j-1,2j}^{n-j+1}
$$
as a $\GL(n,\Q)$-representation.
Therefore, we have to show that $\pi(e_{2i,i})\in H^A_i(\IA_n,\Q)$.
For this purpose, we use the abelian cycle $\alpha_{(0,1^i)}\in H_i(\IA_n,\Q)$ that we defined in Definition \ref{abeliancyclepairpart}.
We have
\begin{gather*}
\tau_*(\alpha_{(0,1^i)})=\bigwedge_{j=1}^i
e_{2j,2j-1}^{2j-1}
\in H^A_i(\IA_n,\Q).
\end{gather*}
We can transform $\tau_*(\alpha_{(0,1^i)})$ into $\pi(e_{2i,i})$ by an action of $$\prod_{j=1}^i (\id-E_{2j-1,n-j+1})\in \Q[\GL(n,\Q)].$$
Therefore, we have $\pi(e_{2i,i})\in H^A_i(\IA_n,\Q)$.
\end{proof}
Church--Ellenberg--Farb \cite[Theorem 7.2.3]{CEF} proved that for each $i\ge 0$,
there exists a polynomial $P_i(T)$ of degree $\le 3i$ such that $\dim_{\Q}(H^A_i(\IA_n,\Q))=P_i(n)$ for sufficiently large $n$ with respect to $i$.
On the other hand, we have the following decomposition of $H_i(U,\Q)$
\begin{gather}\label{decompositionofwedgeU}
H_i(U,\Q)=\bigwedge^i U=\bigoplus_{\lambda \vdash i} (\repS_{\lambda}(\repS_{1^2} H)\otimes \repS_{\lambda'}(H^*)),
\end{gather}
where $\repS_{\lambda}$ denotes the \emph{Schur functor}, which sends a vector space $V$ to $\repS_{\lambda}(V)=V_{\lambda}$, and
where $\lambda'$ denotes the \emph{conjugate} partition $\lambda'$ to $\lambda$, which is obtained from the Young diagram corresponding to $\lambda$ by interchanging rows and columns.
(See \cite[Exercise 6.11]{FH}.)
In particular, we have $V_{1^{2i},1^{i}} \subset H_i(U,\Q)^{\tl}$.
By \eqref{decompositionofwedgeU}, we obtain $\dim_{\Q}(H_i(U,\Q)^{\tl})=P'_i(n)$ for $n\ge 3i$, where $P'_i(T)$ is a polynomial of degree $3i$.
By Theorem \ref{tracelessimage}, we obtain the following theorem.
\begin{theorem}\label{dimension}
For $n\ge 3i$, we have $\dim_{\Q}(H^A_i(\IA_n,\Q))\ge P'_i(n)$.
Moreover, there exists a polynomial $P_i(T)$ of degree $3i$ such that $\dim_{\Q}(H^A_i(\IA_n,\Q))=P_i(n)$ for sufficiently large $n$ with respect to $i$.
\end{theorem}
\section{The structure of $H^A_i(\IA_n,\Q)$}\label{Generalpart}
In this section, we introduce a graded $\GL(n,\Q)$-representation $W_*$.
The degree $i$ part $W_i$ is graded over the set of pairs of partitions of total size $i$.
We show that $W_i$ is a subquotient of $H^A_i(\IA_n,\Q)$.
The non-trivial quotient representations that we detected in Theorem \ref{nontriviality} are the degree $(i,0)$ and $(0,i)$ parts, and the traceless part $H_i(U,\Q)^{\tl}$ is the direct sum of the degree $(1^j,1^k)$ parts for $j+k=i$.
\subsection{Conjectural structure of $H^A_i(\IA_n,\Q)$}
Recall that for $n\ge i+1$, we have
$$U_i=\Hom(H,\bigwedge^{i+1} H)=U_i^{\tree}\oplus U_i^{\wheel}\cong V_{1^{i+1},1}\oplus V_{1^i,0}.$$
Let $U_*=\bigoplus_{i\ge 1} U_i$, which is a graded algebraic $\GL(n,\Q)$-representation.
Define $W_*=\wti{S}^* (U_*)$ as the traceless part of the graded-symmetric algebra $S^* (U_*)$ of $U_*$, which we defined in Section \ref{tracelesswedge}.
We can also construct $W_*$ by using an operad $\calC om$ of non-unital commutative algebras as we explain in Section \ref{KV}.
For $i\ge 0$, let $(\mu,\nu)\vdash i$ be a pair of partitions.
If we write
$$\mu=(\mu_1^{k_1'},\cdots,\mu_r^{k_r'}),\quad \nu=(\nu_1^{k_1''},\cdots,\nu_s^{k_s''}),$$
then it means that $\mu_1>\mu_2>\cdots>\mu_r$ and $\mu_j$ appears $k_j'>0$ times in $\mu$ and that $\nu_1>\nu_2>\cdots>\nu_s$ and $\nu_j$ appears $k_j''>0$ times in $\nu$.
Then the length of $\mu$ (resp. $\nu$) is $l(\mu)=\sum_{j=1}^r k_j'$ (resp. $l(\nu)=\sum_{j=1}^s k_j''$).
Let
$$U^{\tree}_{\mu}=\bigotimes_{j=1}^r S^{k_j'} (U_{\mu_j}^{\tree}),\quad
U^{\wheel}_{\nu}=\bigotimes_{j=1}^s S^{k_j''} (U_{\nu_j}^{\wheel}).$$
Then we have
$$S^*(U_*)= \bigoplus_{i\ge 0} \bigoplus_{(\mu,\nu)\vdash i} U^{\tree}_{\mu}\otimes U^{\wheel}_{\nu}.$$
Since
$W_i=\wti{S}^* (U_*)_i$ by the definition of $W_*$,
we have
$$W_i= \bigoplus_{(\mu,\nu)\vdash i} W(\mu,\nu)\subset S^*(U^*)_i,$$
where
$$W(\mu,\nu)=
\wti{\bigotimes}_{j=1}^r \wti{S}^{k_j'}\left(U_{\mu_j}^{\tree}\right) \wti{\otimes}\;
\wti{\bigotimes}_{j=1}^s \wti{S}^{k_j''}\left(U_{\nu_j}^{\wheel}\right)\subset U^{\tree}_{\mu}\otimes U^{\wheel}_{\nu}.$$
For example, we have for $n\ge 3$,
$$W_1=W(1,0)\oplus W(0,1)\cong V_{1^2,1}\oplus V_{1,0},$$
and we have for $n\ge 6$,
\begin{gather*}
\begin{split}
W_2&=W(2,0)\oplus W(0,2)\oplus W(1^2,0)\oplus W(1,1)\oplus W(0,1^2)\\
&\cong V_{1^3,1}\oplus V_{1^2,0} \oplus (V_{1^4,1^2}\oplus V_{2 1^2,2}\oplus V_{2^2,1^2})\oplus (V_{21,1}\oplus V_{1^3,1})\oplus V_{1^2,0}.
\end{split}
\end{gather*}
Here, we observe that the subrepresentation $W(\mu,\nu)$ of $W_i$ is an image of the traceless part $T_{i+l(\mu),l(\mu)}$ under a projection.
Let
$$\pi_j^{\mu}: H^{\otimes k_j'(1+\mu_j)}\otimes (H^*)^{\otimes k_j'}=(H^{\otimes (1+\mu_j)}\otimes H^*)^{\otimes k_j'}\twoheadrightarrow (V_{1^{1+\mu_j}, 1})^{\otimes k_j'}\twoheadrightarrow S^{k_j'} (V_{1^{1+\mu_j}, 1})
$$
and
$$
\pi_j^{\nu}: H^{\otimes k_j''\nu_j}= (H^{\otimes \nu_j})^{\otimes k_j''} \twoheadrightarrow (V_{1^{\nu_j}})^{\otimes k_j''}\twoheadrightarrow S^{k_j''} (V_{1^{\nu_j}})
$$
be the composition of two canonical projections, and let
\begin{gather*}
\begin{split}
\pi^{(\mu,\nu)}=\left(\bigotimes_{j=1}^r \pi_j^{\mu} \right) \otimes \left(\bigotimes_{j=1}^s \pi_j^{\nu}\right):
H^{\otimes (i+l(\mu))} \otimes (H^*)^{\otimes l(\mu)}\to
U^{\tree}_{\mu}\otimes U^{\wheel}_{\nu}.
\end{split}
\end{gather*}
Then we have
$$W(\mu,\nu)=\pi^{(\mu,\nu)}(T_{i+l(\mu), l(\mu)}).$$
Define
\begin{gather*}
\begin{split}
&F_{(\mu,\nu)}:
H_i(U,\Q)=\bigwedge^i U
\to
U^{\tree}_{\mu}\otimes U^{\wheel}_{\nu}
\end{split}
\end{gather*}
to be the composition of the inclusion
$\iota_{i}: \bigwedge^i U\hookrightarrow M_i$
and
$$\left(\bigotimes_{j=1}^r \frac{1}{k_j'!} \prod^{k_j'}c^{\tree}_{\mu_j} \right)
\otimes
\left(\bigotimes_{j=1}^s \frac{1}{k_j''!} \prod^{k_j''}c^{\wheel}_{\nu_j}
\right)
: M_i
\to
U^{\tree}_{\mu}\otimes U^{\wheel}_{\nu}.$$
Then we have a $\GL(n,\Q)$-homomorphism
\begin{gather*}
F_i:= \bigoplus_{(\mu,\nu)\vdash i} F_{(\mu,\nu)} : H_i(U,\Q)\to \bigoplus_{(\mu,\nu)\vdash i}
U^{\tree}_{\mu}\otimes U^{\wheel}_{\nu}.
\end{gather*}
\begin{theorem}\label{Johnsonpart}
For $n\ge 3i$, we have
$$F_i (H^A_i(\IA_n,\Q)) \supset W_i.$$
\end{theorem}
We will prove Theorem \ref{Johnsonpart} in the rest of this section by using the abelian cycles $\alpha_{(\mu,\nu)}$.
In a way similar to Proposition \ref{representationstabilityofconnectedpart}, we can check that the Albanese homology $H^A_i(\IA_n,\Q)$ includes a representation-stable subrepresentation which is isomorphic to $W_i$.
It seems natural to make the following conjecture, which holds for $i=1$ \cite{CP, Farb, Kawazumi}, for $i=2$ \cite{Pettet} and for $i=3$ as we will observe in Theorem \ref{thirdAlbanese}.
\begin{conjecture}\label{conjectureAlbanese}
For $n\ge 3i$, $F_i$ restricts to a $\GL(n,\Q)$-isomorphism
$$
F_i : H^A_i(\IA_n,\Q) \xrightarrow{\cong} W_i.
$$
\end{conjecture}
Conjecture \ref{conjectureAlbanese} implies that as a $\GL(n,\Q)$-representation, the Albanese homology $H^A_i(\IA_n,\Q)$ is generated by the images of abelian cycles of $H_i(\IA_n,\Q)$ under $\tau_*$.
We would like to realize $W_i$ as a subrepresentation of $H^A_i(\IA_n,\Q)$.
\begin{problem}
Construct a lift
$$
W_i\to H^A_i(\IA_n,\Q)
$$
of the inclusion map $W_i\hookrightarrow F_i(H^A_i(\IA_n,\Q))$
along $H^A_i(\IA_n,\Q)\xto{F_i} F_i(H^A_i(\IA_n,\Q))$
as $\GL(n,\Q)$-representations for sufficiently large $n$ with respect to $i$.
\end{problem}
We would like to realize the Albanese homology $H^A_i(\IA_n,\Q)$ as a subrepresentation of $H_i(\IA_n,\Q)$.
\begin{problem}
Construct a section of
$$
H_i(\IA_n,\Q)\overset{\tau_*}{\twoheadrightarrow} H^A_i(\IA_n,\Q)
$$
as $\GL(n,\Z)$-representations for sufficiently large $n$ with respect to $i$.
\end{problem}
\subsection{Computation of the contraction maps}
Here we consider a condition for $(\mu,\nu)$ and $(\xi,\eta)$ that $F_{(\mu,\nu)}(\tau_*(\alpha_{(\xi,\eta)}))$ vanishes.
In a way similar to Lemma \ref{lemconnected}, we obtain the following lemma.
\begin{lemma}\label{lemcontractioncomputation}
For $n\ge i+2$, we have
\begin{gather*}
c^{\wheel}_{i} \iota_{i} \tau_* (\alpha_{(i,0)}) = 0,
\end{gather*}
and
\begin{gather*}
c^{\tree}_{i} \iota_{i} \tau_* (\alpha_{(i,0)}) = (-1)^{i-1}(i+1)! \: e_1\wedge e_2\wedge e_4\wedge \cdots \wedge e_{i+2}\otimes e_{3}^* \in U_i^{\tree}\setminus \{0\}.
\end{gather*}
\end{lemma}
\begin{proof}
For the abelian cycle $\alpha_{(i,0)}$, we have
\begin{gather*}
\tau_* (\alpha_{(i,0)})=
e_{1,2}^{3}
\wedge (\sum_{j=1}^{3} e_{4,j}^{j})
\wedge \cdots \wedge (\sum_{j=1}^{i+1} e_{i+2,j}^{j}).
\end{gather*}
Let $x=e_{a_1,b_1}^{d_1} \wedge e_{a_2,b_2}^{b_2}\wedge\cdots \wedge e_{a_i,b_i}^{b_i}\in \bigwedge^i U$.
If $d_1\notin \{a_1,\cdots, a_i, b_1\}$,
then we can check that $c^{\wheel}_{i}\iota_{i}(x)=0$.
Therefore, we have $c^{\wheel}_{i} \iota_{i} \tau_* (\alpha_{(i,0)}) = 0$.
The computation of the image of $\tau_* (\alpha_{(i,0)})$ under $c^{\tree}_{i} \iota_{i}$ is similar to the computation of the image of $\tau_* (\alpha_{(0,i)})$ in Lemma \ref{lemconnected}.
\end{proof}
We call elements of the form
$$
e_{a_1,b_1}^{d_1}\wedge e_{a_2,b_2}^{d_2}\wedge\cdots \wedge e_{a_i,b_i}^{d_i}\in \bigwedge^i U
$$
the \emph{basis elements} of $\bigwedge^i U$.
Two basis elements $x=e_{a_1,b_1}^{d_1}\wedge e_{a_2,b_2}^{d_2}\wedge\cdots \wedge e_{a_k,b_k}^{d_k}$ of $\bigwedge^k U$ and $y=e_{p_1,q_1}^{r_1}\wedge e_{p_2,q_2}^{r_2}\wedge\cdots \wedge e_{p_l,q_l}^{r_l}$ of $\bigwedge^l U$ are said to be \emph{disjoint} if $\{a_j,b_j,d_j\}_{j=1}^{k}\cap \{p_j,q_j,r_j\}_{j=1}^{l}=\emptyset$.
If basis elements $x\in \bigwedge^k U$ and $y\in \bigwedge^l U$ are disjoint, then it is easy to see that \begin{equation}\label{disjoint}
c^{\wheel}_{k+l}\iota_{k+l}(x\wedge y)=c^{\tree}_{k+l}\iota_{k+l}(x\wedge y)=0.
\end{equation}
Let $P_i$ denote the set of pairs of partitions of total size $i$.
For $l\in\{0,\cdots,i\}$, let $P_i^l$ denote the subset of $P_i$ consisting of elements $(\mu,\nu)$ with $l(\mu)=l$.
For $(\xi,\eta), (\mu,\nu) \in P_i^l$, we write
$(\xi,\eta)\ge (\mu,\nu)$
if
$\xi_j\ge \mu_j$ for all $j\in [l]$
and
if there exist a decomposition $L_1\sqcup\cdots\sqcup L_{l+l(\eta)} = \{1,\cdots,l(\nu)\}$ and $\sigma\in \gpS_l$ such that
\begin{gather}\label{partialorder1}
\xi_j-\mu_{\sigma(j)}=\sum_{k\in L_j}\nu_k \quad(1\le j\le l),
\end{gather}
\begin{gather}\label{partialorder2}
\eta_j=\sum_{k\in L_{l+j}}\nu_k\quad (1\le j\le l(\eta)).
\end{gather}
We can check that $(P_i^l,\ge)$ is a partially ordered set with the minimum element $(1^l, 1^{i-l})$ and with the maximal elements $(\mu,0)$ for $\mu\vdash i$ with $l(\mu)=l$.
\begin{lemma}\label{lempairpartcontraction}
For $(\xi,\eta),(\mu,\nu)\in P_i^l$,
we have
\begin{gather*}
F_{(\mu,\nu)}(\tau_*(\alpha_{(\xi,\eta)}))=0 \quad \text{if } (\xi,\eta)\ngeq (\mu,\nu).
\end{gather*}
\end{lemma}
\begin{proof}
Let $(\mu,\nu)\in P_i^l$.
Suppose that we have $F_{(\mu,\nu)}(\tau_*(\alpha_{(\xi,\eta)}))\neq 0$ for $(\xi,\eta)\in P_i^l$.
We have
\begin{gather}\label{taualpha}
\tau_*(\alpha_{(\xi,\eta)})=
\tau(\xi,1)\wedge\cdots\wedge \tau(\xi,l)\wedge \tau(\eta,1)\wedge\cdots\wedge \tau(\eta,l(\eta))\in \bigwedge^i U,
\end{gather}
where $\tau(\xi,j)$ (resp. $\tau(\eta,j)$) is obtained from $\tau_*(\alpha_{(\xi_j,0)})$ (resp. $\tau_*(\alpha_{(0,\eta_j)})$) by the shift that is appeared in the definition of $\alpha_{(\xi,\eta)}$.
Each $\tau(\xi,j)$ is a linear sum of basis elements
$e_{a_1,b_1}^{d_1}\wedge e_{a_2,b_2}^{b_2}\wedge \cdots \wedge e_{a_{\xi_j},b_{\xi_j}}^{b_{\xi_j}}$
of $\bigwedge^{\xi_j} U$ such that $d_1\notin \{a_1,\cdots, a_{\xi_j}, b_1\}$.
As in the proof of Lemma \ref{lemcontractioncomputation}, for any subset $K\subset \{2,\cdots, \xi_j\}$, we have
$$c^{\wheel}_{1+|K|}\iota_{1+|K|}(e_{a_1,b_1}^{d_1}\wedge \bigwedge_{k\in K} e_{a_{k},b_{k}}^{b_{k}})=0.$$
Since $e_{a_1,b_1}^{d_1}$ and any basis elements that appear in $\tau(\xi,p) (1\le p\le l, p\neq j)$ or $\tau(\eta,q) (1\le q\le l(\eta))$ are disjoint, the wedge product of $e_{a_1,b_1}^{d_1}$ and any other factors vanishes under $c^{\tree}_{\mu_{j'}}\iota_{\mu_{j'}}$ for any $j'\in [l]$ and $c^{\wheel}_{\nu_{j'}}\iota_{\nu_{j'}}$ for any $j'\in [l(\nu)]$.
Therefore, in order to satisfy $F_{(\mu,\nu)}(\tau_*(\alpha_{(\xi,\eta)}))\neq 0$, $e_{a_1,b_1}^{d_1}$ has to be mapped under $c^{\tree}_{\mu_{j'}}\iota_{\mu_{j'}}$ for some $j'\in [l]$ as a wedge product with some other factors in $\tau(\xi,j)$.
It follows that we need $\xi_j\ge \mu_j$ for all $j\in [l]$.
In what follows, we restrict to the condition that for any $j\in [l]$, any element $e_{a_1,b_1}^{d_1}$ that appears in $\tau(\xi,j)$ is mapped under $c^{\tree}_{\mu_{j'}}\iota_{\mu_{j'}}$ for some $j'\in [l]$ as a wedge product with some other factors in $\tau(\xi,j)$.
If a pair of $\sigma\in \gpS_l$ and $L_1\sqcup\cdots\sqcup L_{l+l(\nu)}= \{1,\cdots,l(\nu)\}$ does not satisfy \eqref{partialorder1},
then one of the following holds:
\begin{itemize}
\item there exist distinct elements $j,j'\in [l]$ such that the wedge product of some factors of a basis element which appears in $\tau(\xi,j)$ and other factors of a basis element which appears in $\tau(\xi,j')$ are mapped under $c^{\wheel}_{\nu_{j''}}\iota_{\nu_{j''}}$ for some $j''\in [l(\nu)]$,
\item there exist $j\in [l]$ and $j'\in [l(\nu)]$ such that the wedge product of some factors of a basis element which appears in $\tau(\xi,j)$ and other factors of a basis element which appears in $\tau(\eta,j')$ are mapped under $c^{\wheel}_{\nu_{j''}}\iota_{\nu_{j''}}$ for some $j''\in [l(\nu)]$.
\end{itemize}
By \eqref{disjoint}, in both cases, the values under $c^{\wheel}_{\nu_{j''}}\iota_{\nu_{j''}}$ are zero, which contradicts $F_{(\mu,\nu)}(\tau_*(\alpha_{(\xi,\eta)}))\neq 0$.
The case where a pair of $\sigma\in \gpS_l$ and $L_1\sqcup\cdots\sqcup L_{l+l(\nu)}= \{1,\cdots,l(\nu)\}$ does not satisfy \eqref{partialorder2} is similar.
Therefore, we need such a pair, which completes the proof.
\end{proof}
\subsection{Proof of Theorem \ref{Johnsonpart}}
To prove Theorem \ref{Johnsonpart}, we use the following lemma, which is an analogue of \cite[Theorem 1.5]{Lindell}.
\begin{lemma}\label{Johnsonpartmunu}
Let $(\mu,\nu)\vdash i$.
Then for $n\ge i+2l(\mu)+l(\nu)$, we have
$$F_{(\mu,\nu)} (H^A_i(\IA_n,\Q)) \supset W(\mu,\nu).$$
\end{lemma}
\begin{proof}
Our proof is analogous to the proof of \cite[Theorem 1.5]{Lindell}.
By Corollary \ref{projgen}, $W(\mu,\nu)=\pi^{(\mu,\nu)}(T_{i+l(\mu), l(\mu)})$ is generated by the element $\pi^{(\mu,\nu)}(e_{i+l(\mu),l(\mu)})$.
Therefore, it suffices to show that
there is an element $x \in \Q[\GL(n,\Q)]$ such that
$x (F_{(\mu,\nu)}(\tau_*(\alpha_{(\mu,\nu)})))=\pi^{(\mu,\nu)}(e_{i+l(\mu),l(\mu)})$.
Here, we write
$$\mu=(\mu_1,\cdots,\mu_{l(\mu)})=(\ti{\mu}_1^{k_1'},\cdots, \ti{\mu}_r^{k_r'}),\quad \nu=(\nu_1,\cdots, \nu_{l(\nu)})=(\ti{\nu}_1^{k_1''},\cdots, \ti{\nu}_s^{k_s''}).$$
As in \eqref{taualpha}, we have
$$
\tau_*(\alpha_{(\mu,\nu)})=
\tau(\mu,1)\wedge\cdots\wedge \tau(\mu,l(\mu))\wedge \tau(\nu,1)\wedge\cdots\wedge \tau(\nu,l(\nu))\in \bigwedge^i U.
$$
For $1\le j\le r$ and $1\le m\le k_j'$, let $\tau(\mu,j,m)=\tau(\mu,\phi_{\mu}(j,m))$, where $\phi_{\mu}(j,m)=k_1'+\cdots + k_{j-1}'+m$. In a similar way, we define $\phi_{\nu}(j,m)$ and $\tau(\nu,j,m)$.
Then we have
\begin{gather*}
\begin{split}
&F_{(\mu,\nu)}(\tau_*(\alpha_{(\mu,\nu)}))\\
&=\left(\bigotimes_{j=1}^r \frac{1}{k_j'!} \prod_{m=1}^{k_j'}c^{\tree}_{\ti{\mu}_j}\iota_{\ti{\mu}_j} (\tau(\mu,j,m)) \right)\otimes
\left(\bigotimes_{j=1}^s \frac{1}{k_j''!} \prod_{m=1}^{k_j''}c^{\wheel}_{\ti{\nu}_j}\iota_{\ti{\nu}_j} (\tau(\nu,j,m)) \right).
\end{split}
\end{gather*}
By Lemma \ref{lemcontractioncomputation}, we have
$$c^{\tree}_{\ti{\mu}_j}\iota_{\ti{\mu}_j} (\tau(\mu,j,m))=(-1)^{\ti{\mu}_j-1}(\ti{\mu}_j+1)! \: s(\phi_{\mu}(j,m))(e_{1}\wedge e_{2}\wedge e_{4}\wedge \cdots \wedge e_{\ti{\mu}_j+2}\otimes e_{3}^*),$$
where $s(j)$ is the function that we used in Section \ref{secabeliancycle} to define the abelian cycle $\alpha_{(\mu,\nu)}$, and where $s(\phi_{\mu}(j,m))$ denotes the shift homomorphism by $s(\phi_{\mu}(j,m))$.
By Lemma \ref{lemconnected}, we also have
$$c^{\wheel}_{\ti{\nu}_j}\iota_{\ti{\nu}_j} (\tau(\nu,j,m))=(\ti{\nu}_j)!\: t(\phi_{\tau}(j,m))(e_2\wedge e_3\wedge\cdots \wedge e_{\ti{\nu}_j+1}).$$
Therefore, we can take an element $x \in \Q[\GL(n,\Q)]$ to satisfy
$x (F_{(\mu,\nu)}(\tau_*(\alpha_{(\mu,\nu)})))=\pi^{(\mu,\nu)}(e_{i+l(\mu),l(\mu)})$, which completes the proof.
\end{proof}
\begin{remark}
Let $\mu\cup \nu$ denote the partition of $i$ that is obtained from $\mu$ and $\nu$ by reordering the parts.
We can also use the abelian cycle $\alpha_{(0,\mu\cup\nu)}$ to prove Lemma \ref{Johnsonpartmunu}. That is, we can also show that $\tau_*(\alpha_{(0,\mu\cup\nu)})$ generates $W(\mu,\nu)$.
However, we need the abelian cycle $\alpha_{(\mu,\nu)}$ to show that $F_{(\mu,\nu)}(H^A_i(\IA_n,\Q))$ includes the direct sum of $W(\mu,\nu)$.
\end{remark}
\begin{proof}[Proof of Theorem \ref{Johnsonpart}]
Let $F_{i}^{l}:=\bigoplus_{(\mu,\nu)\in P_i^l} F_{(\mu,\nu)}$.
For $(\mu,\nu)\in P_i^l$ and $(\xi,\eta)\in P_i^{l'}$ with $l\neq l'$, any irreducible component of $W(\mu,\nu)$ and any irreducible component of $W(\xi,\eta)$ are not isomorphic. Therefore, it suffices to show that we have
$$\bigoplus_{(\mu,\nu)\in P_i^l} W(\mu,\nu)\subset F_{i}^{l} (H^A_i(\IA_n,\Q))$$
for any $l\in\{0,\cdots,i\}$.
By Lemma \ref{Johnsonpartmunu}, it suffices to show that for each $(\xi,\eta)\in P_i^l$, the element $$F_{(\xi,\eta)}(\tau_*(\alpha_{(\xi,\eta)}))\in W(\xi,\eta)\subset \bigoplus_{(\mu,\nu)\in P_i^l} W(\mu,\nu)$$
is included in $F_{i}^{l} (H^A_i(\IA_n,\Q))$.
In what follows, we identify an element of $W(\xi,\eta)$ with the image under the canonical inclusion $W(\xi,\eta)\hookrightarrow \bigoplus_{(\mu,\nu)\in P_i^l} W(\mu,\nu)$.
We use the induction with respect to the partial order $\ge$ of $P_i^l$.
For the minimum element $(1^l,1^{i-l})$ of $P_i^l$, by Lemma \ref{lempairpartcontraction}, we have
\begin{gather*}
\begin{split}
F_{(1^l,1^{i-l})}(\tau_*(\alpha_{(1^l,1^{i-l})}))=
F_{i}^{l}(\tau_*(\alpha_{(1^l,1^{i-l})}))\in F_{i}^{l} (H^A_i(\IA_n,\Q)).
\end{split}
\end{gather*}
For $(\xi,\eta)\in P_i^l$, suppose that for any $(\zeta,\epsilon)\le(\xi,\eta)$, we have
$$
F_{(\zeta,\epsilon)}(\tau_*(\alpha_{(\zeta,\epsilon)}))\in F_{i}^{l} (H^A_i(\IA_n,\Q)).$$
Then by Lemma \ref{lempairpartcontraction}, we have
\begin{gather*}
\begin{split}
F_{i}^{l} (\tau_* (\alpha_{(\xi,\eta)}))&=F_{(\xi,\eta)}(\tau_*(\alpha_{(\xi,\eta)}))+ X(\xi,\eta)
\end{split}
\end{gather*}
where $X(\xi,\eta)$ is an element of $\bigoplus_{(\zeta,\epsilon)\le (\xi,\eta)} W(\zeta,\epsilon)$.
Therefore, by the hypothesis of the induction, we have
$$
F_{(\xi,\eta)}(\tau_*(\alpha_{(\xi,\eta)}))\in F_{i}^{l} (H^A_i(\IA_n,\Q)).
$$
This completes the proof.
\end{proof}
\section{Coalgebra structure of $H^A_*(\IA_n,\Q)$}\label{coalgebra}
Here we recall the coalgebra structure of the rational homology of groups. We show that the map $F_*=\bigoplus_{i\ge 0} F_i: H_*(U,\Q) \to S^*(U_*)$, which we constructed in Section \ref{Generalpart}, is a coalgebra map.
\subsection{Coalgebra structure of $H_*(G,\Q)$}
Let $G$ be a group.
We briefly recall the graded-cocommutative coalgebra structure $(H_*(G,\Q), \Delta_*^G,\epsilon_*)$. (See \cite{Brown} for details.)
The rational homology $H_*(G,\Q)$ is defined by
$$
H_*(G,\Q)=H_*(F\otimes_{G}\Q),
$$
where $F$ is a projective resolution of $\Z$ over $\Z[G]$.
Here, we take the bar resolution.
The diagonal map $\Delta^G: G\to G\times G,\;g\mapsto (g,g)$ induces a homomorphism
$$\Delta_*^G: H_*(G,\Q)\to H_*(G,\Q)\otimes H_*(G,\Q),$$
which coincides with the map induced by the Alexander--Whitney map
$$\Delta: F\to F\otimes F,\quad (g_0,\cdots,g_n)\mapsto \sum_{p=0}^{n}(g_0,\cdots,g_p)\otimes (g_p,\cdots,g_n).$$
(See Brown \cite[Section 1 of Chapter 5]{Brown}.)
Then the induced map $\Delta_*^G$ can be written explicitly as follows:
$$\Delta_*^G([x_1\otimes \cdots \otimes x_i])=\sum_{p=0}^i [x_1\otimes \cdots \otimes x_p] \otimes [x_{p+1}\otimes \cdots \otimes x_i]$$
for $x_1,\cdots, x_i\in G$.
We also have a trivial map $\epsilon: G\to 1$, which induces
$$\epsilon_*: H_*(G,\Q)\to \Q.$$
The canonical projection $\pi^G: G\twoheadrightarrow G^{\ab}$ induces a coalgebra map
$$\pi^G_*: H_*(G,\Q)\to H_*(G^{\ab},\Q).$$
Therefore, the coalgebra structure of $H_*(G^{\ab},\Q)$ induces a subcoalgebra structure on $H^A_*(G,\Q)$.
\subsection{Coalgebra structure of $H^A_*(\IA_n,\Q)$}
As we saw in the previous subsection,
we have a coalgebra structure of $H_*(U,\Q)$, which is compatible with the graded $\GL(n,\Q)$-representation structure.
We consider the coalgebra structure on $S^*(U_*)$ that we observed in Section \ref{tracelesspartofgradedsymmetricalgebra}.
Then the two coalgebra structures are compatible in the sense of the following proposition.
\begin{proposition}\label{coalgebramap}
The graded $\GL(n,\Q)$-homomorphism
$$F_*=\bigoplus_{i\ge 0} F_i: H_*(U,\Q) \to S^*(U_*)$$
is a coalgebra map.
\end{proposition}
\begin{proof}
It suffices to show that we have
$$
(F_*\otimes F_*) \Delta_*^U(x)=\Delta F_* (x)
$$
for $x=x_1\wedge \cdots \wedge x_i\in H_i(U,\Q)$.
We have
$$
F_i (x)=\sum_{(\mu,\nu)\vdash i}F_{(\mu,\nu)}(x_1\wedge \cdots \wedge x_i)
$$
and
$$
\Delta_*^U (x)=\sum_{p=0}^i\sum_{\sigma\in \Sh(p,i-p)} \sgn(\sigma) (x_{\sigma(1)}\wedge \cdots\wedge x_{\sigma(p)})\otimes (x_{\sigma(p+1)}\wedge \cdots\wedge x_{\sigma(i)}).
$$
Let $p\in \{0,\cdots,i\}$. For pairs of partitions $(\xi,\eta)\vdash p, (\zeta,\epsilon)\vdash i-p$, we write $\xi=(\xi_1^{k_1'},\cdots, \xi_r^{k_r'})$, $\eta=(\eta_1^{k_1''},\cdots, \eta_s^{k_s''})$ and $\zeta=(\zeta_1^{m_1'},\cdots, \zeta_t^{m_t'})$, $\epsilon=(\epsilon_1^{m_1''},\cdots, \epsilon_u^{m_u''})$.
Then we can check that
\begin{gather*}
\begin{split}
\Delta F_i (x)
&= \sum_{p=0}^i \sum_{\substack{(\xi,\eta)\vdash p\\ (\zeta,\epsilon)\vdash i-p}} \sum_{\tau\in \gpS_i}\frac{1}{(\prod_{j=1}^r k_j'!) (\prod_{j=1}^s k_j''!) (\prod_{j=1}^t m_j'!)(\prod_{j=1}^u m_j''!)} \sgn(\tau) \\
&
\quad\times \left(\bigotimes_{j=1}^r \prod^{k_{j}'}c^{\tree}_{\xi_j} \otimes \bigotimes_{j=1}^s \prod^{k_{j}''}c^{\wheel}_{\eta_j}\right)
(x_{\tau(1)}\otimes \cdots\otimes x_{\tau(p)})
\\
&\quad\otimes
\left(\bigotimes_{j=1}^r \prod^{m_{j}'}c^{\tree}_{\zeta_j}\otimes \bigotimes_{j=1}^s \prod^{m_{j}''}c^{\wheel}_{\epsilon_j}\right)
(x_{\tau(p+1)}\otimes \cdots\otimes x_{\tau(i)})\\
&= (F_*\otimes F_*) \Delta_*^U (x).
\end{split}
\end{gather*}
\end{proof}
By Proposition \ref{coalgebramap}, the subcoalgebra $H^A_*(\IA_n,\Q)\subset H_*(U,\Q)$ is mapped to a subcoalgebra of $S^*(U_*)$, which includes $W_*$ as a subcoalgebra.
For a coalgebra $A$, let $\Prim(A)$ denote the \emph{primitive part} of $A$.
We can check that
$$\Prim(S^*(U_*))=U_*\subset W_*.$$
Since coalgebra maps preserve the primitive part, the graded $\GL(n,\Q)$-homomorphism $F_*$ restricts to
$$F_*: \Prim(H^A_*(\IA_n,\Q))\to \Prim(S^*(U_*))=U_*.$$
Conjecture \ref{conjectureAlbanese} leads to the following conjecture.
Let $\Prim(H^A_*(\IA_n,\Q))_i$ denote the degree $i$ part of $\Prim(H^A_*(\IA_n,\Q))$.
\begin{conjecture}\label{conjectureprim}
For $n\ge 3i$, the $\GL(n,\Q)$-homomorphism
$$F_i:\Prim(H^A_*(\IA_n,\Q))_i\to U_i$$
is an isomorphism.
\end{conjecture}
\section{Albanese cohomology of $\IA_n$}\label{albanesecohomology}
In this section, we study the subalgebra of the rational cohomology algebra $H^*(\IA_n,\Q)$ that Church--Ellenberg--Farb \cite{CEF} called the Albanese cohomology of $\IA_n$.
\subsection{Albanese cohomology of groups}
For a group $G$, the \emph{Albanese cohomology} $H_A^i(G,\Q)$ of $G$ is defined by
$$
H_A^i(G,\Q)=\im (\pi^*:H^i(H_1(G,\Z),\Q)\to H^i(G,\Q)),
$$
where $\pi:G\twoheadrightarrow H_1(G,\Z)$ is the abelianization map.
We have a linear isomorphism
$$
H_A^i(G,\Q)\xrightarrow{\cong} (H^A_i(G,\Q))^*=\Hom_{\Q}(H^A_i(G,\Q),\Q).
$$
(See Lemma \ref{dualityisom}.)
It is well known that $H^*(G,\Q)$ is a graded-commutative algebra with the cup product as a multiplication, which is the dual of the comultiplication of $H_*(G,\Q)$.
Then $H_A^*(G,\Q)$ is a subalgebra of $H^*(G,\Q)$.
Since we have $H^i(H_1(G,\Z),\Q))\cong \bigwedge^i H^1(G,\Q)$, the cohomology algebra $H_A^*(G,\Q)$ is generated by $H^1(G,\Q)$ as an algebra.
\subsection{Albanese cohomology of $\IA_n$}
As we saw in the previous subsection, the Albanese cohomology $H_A^*(\IA_n,\Q)$ has a graded-symmetric algebra structure and is generated by $H^1(\IA_n,\Q)$.
Moreover, the linear isomorphism
$$
H_A^i(G,\Q)\xrightarrow{\cong} (H^A_i(G,\Q))^*
$$
is a $\GL(n,\Q)$-isomorphism (see Proposition \ref{dualityisomIA}).
Let $S^*(U_*)^*$ (resp. $H_*(U,\Q)^*$) denote the graded dual of $S^*(U_*)$ (resp. $H_*(U,\Q)$) and let
$$F^*: S^*(U_*)^*\to H_*(U,\Q)^*\twoheadrightarrow H_A^*(\IA_n,\Q)$$
denote the composition of the dual map of $F_*$ and the canonical surjection.
Then by Proposition \ref{coalgebramap}, $F^*$ is an algebra map.
\begin{proposition}
The graded $\GL(n,\Q)$-homomorphism
$$F^*: S^*(U_*)^*\to H_A^*(\IA_n,\Q)$$
is an algebra map.
\end{proposition}
Let $\langle R_2\rangle$ denote the ideal of $H^*(U,\Q)$ generated by $R_2 = \ker (\tau^*: H^2(U,\Q)\to H^2(\IA_n,\Q))$.
We have a surjective $\GL(n,\Q)$-homomorphism
$$
H^*(U,\Q)/\langle R_2\rangle \twoheadrightarrow H_A^*(\IA_n,\Q).
$$
\begin{conjecture}\label{quadratic}
The Albanese cohomology algebra $H_A^*(\IA_n,\Q)$ is stably quadratic, that is, the surjective $\GL(n,\Q)$-homomorphism
$$
H^*(U,\Q)/\langle R_2\rangle \twoheadrightarrow H_A^*(\IA_n,\Q)
$$
is an isomorphism for sufficiently large $n$ with respect to the cohomological degree.
\end{conjecture}
Conjecture \ref{quadratic} holds for $*=3$. See Remark \ref{quadratic3}.
\section{Albanese homology of $\IO_n$}\label{Albanesehomology}
The \emph{inner automorphism group} $\Inn(F_n)$ of $F_n$ is the normal subgroup of $\Aut(F_n)$ consisting of $\{\sigma_x \mid x\in F_n\}$, where $\sigma_x(y)=xyx^{-1}$ for any $y\in F_n$.
The \emph{outer automorphism group} $\Out(F_n)$ of $F_n$ is the quotient group of $\Aut(F_n)$ by $\Inn(F_n)$.
Since we have $\Inn(F_n)\subset \IA_n$, we have a surjection
$\Out(F_n)\twoheadrightarrow \GL(n,\Z)$.
Let $\IO_n$ denote its kernel.
That is, we have exact sequences
$$
1\to \IO_n \to \Out(F_n)\to \GL(n,\Z) \to 1
$$
and
$$
1\to \Inn(F_n)\to \IA_n \xrightarrow{\pi} \IO_n\to 1.
$$
As in the case of $\Aut(F_n)$, the Johnson homomorphism for $\Out(F_n)$ induces an isomorphism on the first homology \cite{Kawazumi}
$$
\tau^O : H_1(\IO_n,\Z)\xrightarrow{\cong} \Hom(H_{\Z}, \bigwedge^2 H_{\Z})/H_{\Z}.
$$
We can also consider $H_i(\IO_n,\Q)$ as a $\GL(n,\Z)$-representation, and the Johnson homomorphism preserves the $\GL(n,\Z)$-action.
Then we have
$$H_1(\IO_n,\Q)\cong\Hom(H, \bigwedge^2 H)/H \cong V_{1^2,1}.$$
Let $U^O=\Hom(H, \bigwedge^2 H)/H$.
The Johnson homomorphism induces a $\GL(n,\Z)$-homomorphism on homology
$$
\tau^O_*: H_i(\IO_n,\Q)\to H_i(U^O,\Q).
$$
In this section, we study the Albanese homology of $\IO_n$ and observe some relation between $H^A_i(\IO_n,\Q)$ and $H^A_i(\IA_n,\Q)$.
\subsection{A set of generators for $H_1(\IO_n,\Q)$}\label{generatorforIOn}
Here we obtain a set of generators for $H_1(\IO_n,\Q)$, which is induced by Magnus's set of generators for $\IA_n$.
The projection $\pi: \IA_n\twoheadrightarrow \IO_n$ induces a map
$$
\pi_*: H_1(\IA_n,\Q) \to H_1(\IO_n,\Q).
$$
Then we have the following commutative diagram of $\GL(n,\Q)$-representations:
\begin{gather*}
\xymatrix{
H_1(\IA_n,\Q)\ar@{->>}[r]^{\pi_*}\ar[d]^{\tau}_{\cong}
&
H_1(\IO_n,\Q)\ar[d]^{\tau^O}_{\cong}
\\
U=\Hom(H,\bigwedge^2 H) \ar@{->>}[r]^-{\pr}
&
U^O=\Hom(H,\bigwedge^2 H)/ H,
}
\end{gather*}
where the bottom map is the canonical surjection.
Magnus's set of generators for $\IA_n$ induces the following set of generators for $U^O$:
$$\{\overline{g_{a,b}}\mid 1\le a,b \le n,\; a\ne b\}\cup \{\overline{f_{a,b,c}}\mid 1\le a,b,c\le n,\; a< b,\; a\ne c\ne b\},$$
where
$$\overline{g_{a,b}}=\pr\tau(g_{a,b})= \pr(e_{a,b}^{b})\in U^O,\quad
\overline{f_{a,b,c}}=\pr\tau(f_{a,b,c})=\pr(e_{a,b}^{c})\in U^O.$$
We can check that
$$
\tau(f_{a,b,c})=e_{a,b}^{c} \in U_{1}^{\tree}\subset U
$$
and that
\begin{gather*}
\begin{split}
\tau(g_{a,b})- \frac{1}{n-1} (\sum_{j=1}^n e_{a,j}^{j})
&=\frac{1}{n-1}(\sum_{j\neq a,b} P_{j,c}) (e_{a,b}^{b} -e_{a,c}^{c})
\\
&= \frac{1}{n-1}(\sum_{j\neq a,b} P_{j,c})(\id- E_{c,b}- P_{c,b}) (e_{a,b}^{c}) \in U_{1}^{\tree},
\end{split}
\end{gather*}
where $c\in [n]$ is an element distinct from $a$ and $b$.
Therefore, we obtain an isomorphism $U^O \xrightarrow{\cong} U_{1}^{\tree}$ defined by
$$\overline{f_{a,b,c}} \mapsto e_{a,b}^{c}\in U_{1}^{\tree},\quad \overline{g_{a,b}} \mapsto e_{a,b}^{b}- \frac{1}{n-1} (\sum_{j=1}^n e_{a,j}^{j}) \in U_{1}^{\tree},$$
and thus we obtain the canonical injective map
$$U^O \hookrightarrow U=U_{1}^{\tree}\oplus U_{1}^{\wheel}.$$
In what follows, we consider $U^O$ as a subrepresentation of $U$.
\subsection{Computation of the contraction maps}
The inclusion map
$\iota_{i}:\bigwedge^i U \hookrightarrow M_i$, which we defined in Section \ref{subseccontraction},
restricts to an inclusion map
\begin{gather*}
\iota_{i}: \bigwedge^{i} U^O \hookrightarrow M_i.
\end{gather*}
Then we can consider the composition of $\iota_{i}$ and each of the two contraction maps $c^{\wheel}_{i}$ and $c^{\tree}_{i}$, which we defined in Section \ref{subseccontraction}.
The abelian cycle $\alpha_{(0,i)}$ of $H_i(\IA_n,\Q)$ induces an abelian cycle $\pi_*(\alpha_{(0,i)})$ of $H_i(\IO_n,\Q)$.
Here we compute the two contraction maps for $\tau^O_*\pi_*(\alpha_{(0,i)})$ as in Lemma \ref{lemconnected}.
\begin{lemma}\label{lemcontractionout0i}
(1) For $i=1$, we have $c^{\wheel}_{1} \iota_{1} \tau^O_* \pi_*(\alpha_{(0,1)}) = 0.$ \\
(2) For $i\ge 2$, we have $c^{\wheel}_{i} \iota_{i} \tau^O_* \pi_*(\alpha_{(0,i)})\neq 0$ if $n\ge i+2+\frac{1-(-1)^i}{2}$.\\
(3) For $i\ge 1$, we have $c^{\tree}_{i} \iota_{i} \tau^O_* \pi_*(\alpha_{(0,i)})\neq 0$ for sufficiently large $n$.
\end{lemma}
\begin{proof}
The proof is similar to that of Lemma \ref{lemconnected}.
We have
\begin{gather*}
\begin{split}
\tau^O_* \pi_*(\alpha_{(0,i)})
&=\overline{g_{2,1}}\wedge \left(\overline{g_{3,1}}+\overline{g_{3,2}}\right) \wedge \cdots\wedge \left(\sum_{j=1}^i \overline{g_{i+1,j}}\right)
\\
&=
\bigwedge_{k=1}^{i}
\left(\sum_{j=1}^{k}\frac{n-k-1}{n-1} e_{k+1,j}^{j}
-\frac{k}{n-1}\sum_{j=k+2}^n e_{k+1,j}^{j}\right).
\end{split}
\end{gather*}
For $i=1$, we have
\begin{gather*}
\begin{split}
c^{\wheel}_{1} \iota_{1} \tau^O_* \pi_*(\alpha_{(0,1)}) &=c^{\wheel}_{1} \iota_{1} \left( \frac{n-2}{n-1}e_{2,1}^{1} -\frac{1}{n-1}\sum_{j=3}^n e_{2,j}^{j}\right)\\
&=\frac{n-2}{n-1}e_2-\frac{1}{n-1}(n-2)e_2=0,
\end{split}
\end{gather*}
which proves (1).
For $i\ge 2$, $n\ge i+1$, we have
\begin{gather*}
\begin{split}
&c^{\wheel}_{i} \iota_{i} \tau^O_* \pi_*(\alpha_{(0,i)}) \\
&\quad = \frac{i! (n-i-1)((n-2)\cdots(n-i)+(-1)^i i!)}{(n-1)^i} e_2\wedge e_3\wedge \cdots \wedge e_{i+1}\in V_{1^i,0}.
\end{split}
\end{gather*}
If $i$ is even, then we have $(n-2)\cdots(n-i)+(-1)^i i!>0$.
If $i$ is odd, then we have $(n-2)\cdots(n-i)+(-1)^i i!>0$ for $n\ge i+3$.
Since we have $i! (n-i-1)\neq 0$ for $n\ge i+2$, we have (2).
For $i\ge 1$, $n\ge i+1$, one can show that
\begin{gather*}
\begin{split}
c^{\tree}_{i} \iota_{i} \tau^O_* \pi_*(\alpha_{(0,i)})
&= \frac{(i+1)!(n-i-1)Q_i(n)}{(n-1)^i} e_2\wedge e_3\wedge \cdots \wedge e_{i+1} \wedge e_{1}\otimes e_1^*\\
&\quad + \sum_{j=i+2}^{n} \frac{R_{i}(n)}{(n-1)^i} e_2\wedge e_3\wedge \cdots \wedge e_{i+1} \wedge e_{j}\otimes e_j^*
\in V_{1^{i+1},1},
\end{split}
\end{gather*}
where $Q_{i}(n)$ is a monic polynomial of degree $i-1$ and $R_{i}(n)$ is a polynomial of degree $i-1$.
Since $Q_{i}(n)$ is monic, we have (3).
\end{proof}
\begin{remark}
We can say that to satisfy $c^{\tree}_{i} \iota_{i} \tau^O_* \pi_*(\alpha_{(0,i)})\neq 0$, the condition $n\ge 2+\max(i,\lfloor \frac{i-1}{i+1}2^i\rfloor)$ is enough.
We need $n\ge i+2$, and if $i\le 4$, then the condition that $n\ge i+2$ is sufficient.
\end{remark}
\begin{theorem}\label{ConnectedpartIO}
Let $i\ge 2$.
For $n\ge i+2+\frac{1-(-1)^i}{2}$, we have a surjective $\GL(n,\Q)$-homomorphism
\begin{gather*}
H^A_i(\IO_n,\Q)\twoheadrightarrow \bigwedge^i H\cong V_{1^i,0}.
\end{gather*}
For sufficiently large $n$ with respect to $i$, we have a surjective $\GL(n,\Q)$-homomorphism
\begin{gather*}
H^A_i(\IO_n,\Q)\twoheadrightarrow \Hom(H,\bigwedge^{i+1} H) \cong V_{1^{i+1},1} \oplus V_{1^i,0}.
\end{gather*}
\end{theorem}
\begin{proof}
This directly follows from Lemma \ref{lemcontractionout0i}.
\end{proof}
\subsection{The traceless part of $H^A_i(\IO_n,\Q)$}
We have a commutative diagram
\begin{gather*}
\xymatrix{
H_i(\IA_n,\Q)\ar[r]^-{\pi_*}\ar[d]^-{\tau_*}
&
H_i(\IO_n,\Q)\ar[d]^-{\tau^O_*}
\\
H_i(U,\Q)\ar@{->>}[r]_-{\pr_*}
&
H_i(U^O,\Q).
}
\end{gather*}
Therefore, we have
\begin{gather}\label{AlbaneseIOandIA}
\pr_*(H^A_i(\IA_n,\Q))\subset H^A_i(\IO_n,\Q).
\end{gather}
\begin{question}
Is $\pr_*: H^A_i(\IA_n,\Q) \to H^A_i(\IO_n,\Q)$ surjective for any $n$?
\end{question}
We have the following decomposition of $H_i(U,\Q)$ as $\GL(n,\Q)$-representations
\begin{gather*}
\begin{split}
H_i(U,\Q)&=\bigwedge^i U= \left(\bigwedge^i U^O\right) \oplus Y_i,
\end{split}
\end{gather*}
where $Y_i$ is a subrepresentation of $H_i(U,\Q)$ whose irreducible decomposition does not include $V_{\ul\lambda}$ for any $\ul\lambda$ such that $|\ul\lambda|=3i$.
Therefore, by Theorem \ref{tracelessimage}, we obtain the following theorem.
Recall that we have $\dim_{\Q}(H_i(U,\Q)^{\tl})=P'_i(n)$ for $n\ge 3i$, where $P'_i(T)$ is a polynomial of degree $3i$.
\begin{theorem}\label{dimensionIO}
For $n\ge 3i$, we have
$$H_i(U,\Q)^{\tl}\subset H^A_i(\IO_n,\Q).$$
In particular, we have $\dim_{\Q}(H^A_i(\IO_n,\Q))\ge P'_i(n)$ for $n\ge 3i$.
\end{theorem}
\begin{conjecture}
There is a polynomial $P^O_i(T)$ of degree $3i$ such that we have $\dim_{\Q}(H^A_i(\IO_n,\Q))=P^O_i(n)$ for sufficiently large $n$ with respect to $i$.
\end{conjecture}
Moreover, by Theorem \ref{Johnsonpart}, we have a direct summand $\wti{W_i}$ of $H^A_i(\IA_n,\Q)$ which is isomorphic to $W_i$.
Therefore, by \eqref{AlbaneseIOandIA}, we have for $n\ge 3i$,
$$\pr_*(\wti{W_i})\subset H^A_i(\IO_n,\Q).$$
\subsection{Conjectural structure of $H^A_i(\IO_n,\Q)$}
Here we propose a conjectural structure of $H^A_i(\IO_n,\Q)$.
Define $U^O_i$ by
$$U^O_i=
\begin{cases}
U^O \cong U_1^{\tree} & (i=1)\\
U_i & (i\ge 2).
\end{cases}
$$
For the graded $\GL(n,\Q)$-representation $U^O_*=\bigoplus_{i\ge 1} U^O_i$, let
$S^* (U^O_*)$ denote the graded-symmetric algebra of $U^O_*$.
Let
$W^O_*=\wti{S}^* (U^O_*)$ denote the traceless part of $S^*(U^O_*)$.
Let
$P^O_i\subset P_i$ denote the subset of $P_i$ consisting of pairs of partitions $(\mu,\nu)$ of total size $i$ such that $\nu$ has no part of size $1$.
Then we have
$$
W^O_i=\bigoplus_{(\mu,\nu)\in P^O_i} W(\mu,\nu).
$$
We make the following conjecture, which is true for $i=1$ by Kawazumi \cite{Kawazumi}, for $i=2$ by Pettet \cite{Pettet} and for $i=3$ as we will observe in Theorem \ref{thirdAlbaneseIO}.
\begin{conjecture}\label{conjectureAlbaneseIO}
For sufficiently large $n$ with respect to $i$, we have a $\GL(n,\Q)$-isomorphism
$$H^A_i(\IO_n,\Q) \xrightarrow{\cong} W^O_i.$$
\end{conjecture}
Since we have a direct sum decomposition
$$S^*(U^O_*)_i=\bigoplus_{(\mu,\nu)\in P^O_i}
U_{\mu}^{\tree} \otimes U_{\nu}^{\wheel},$$
there is a canonical surjective $\GL(n,\Q)$-homomorphism
$$ \Pr : S^*(U_*)_i=
\bigoplus_{(\mu,\nu)\in P_i}
U_{\mu}^{\tree} \otimes U_{\nu}^{\wheel}\twoheadrightarrow S^*(U^O_*)_i=\bigoplus_{(\mu,\nu)\in P^O_i}
U_{\mu}^{\tree} \otimes U_{\nu}^{\wheel}.$$
Then we have a $\GL(n,\Q)$-homomorphism
$$G_{i}: H_i(U^O,\Q)=\bigwedge^i U^O \hookrightarrow \bigwedge^i U \xrightarrow{F_i} S^*(U_*)_i\xrightarrow{\Pr} S^*(U^O_*)_i.$$
We expect that $G_i$ restricts to a $\GL(n,\Q)$-isomorphism
$G_i: H^A_i(\IO_n,\Q) \xrightarrow{\cong} W^O_i$, which implies that Conjecture \ref{conjectureAlbaneseIO} is true.
\subsection{Structures of $H^A_i(\IO_n,\Q)$ and $H^A_i(\IA_n,\Q)$}
Here we study the relation between the structures of $H^A_i(\IO_n,\Q)$ and $H^A_i(\IA_n,\Q)$.
Recall that we have an exact sequence of groups with $\Aut(F_n)$-actions
$$1\to \Inn(F_n)\to \IA_n\to \IO_n\to 1.$$
Since we have $\Inn(F_n)\cong F_n$ for $n\ge 2$, we identify $\Inn(F_n)$ with $F_n$.
By Proposition \ref{spectralsequenceaction} and Remark \ref{cospectralsequence}, we obtain the following proposition.
\begin{proposition}\label{AlbaneseIAandIO2}
For $n\ge 2$, we have a $\GL(n,\Q)$-isomorphism
\begin{gather*}
\begin{split}
H^A_i(\IA_n,\Q) \xrightarrow{\cong} H^A_i(\IO_n,\Q)\oplus (H^A_{i-1}(\IO_n,\Q)\otimes H).
\end{split}
\end{gather*}
\end{proposition}
\begin{proof}
The canonical injective $\Aut(F_n)$-homomorphism $F_n \hookrightarrow \IA_n$ induces an injective $\Aut(F_n)$-homomorphism $(F_n)^{\ab}=H_{\Z}\to (\IA_n)^{\ab}=H_1(\IA_n,\Z)$.
By Proposition \ref{spectralsequenceaction},
we obtain a filtration
$$
0=\calF_{-1}\subset \calF_{0}\subset \cdots\subset \calF_{i}=H^A_i(\IA_n,\Q)
$$
of $\Aut(F_n)$-modules such that there is an $\Aut(F_n)$-homomorphism
$$\iota:
\bigoplus_{r=0}^{i} \calF_{r}/\calF_{r-1}\hookrightarrow \bigoplus_{p+q=i} H^A_p(\IO_n,\Q)\otimes H^A_q(F_n,\Q).$$
The $\Aut(F_n)$-actions on $H^A_*(\IA_n,\Q)$, $H^A_*(\IO_n,\Q)$ and $H^A_*(F_n,\Q)$ induce $\GL(n,\Z)$-actions, which extend to the structures of algebraic $\GL(n,\Q)$-representations.
Hence, the filtration $\calF_*$ of $H^A_i(\IA_n,\Q)$ is a filtration of $\GL(n,\Q)$-representations
and $\iota$ is a $\GL(n,\Q)$-homomorphism.
Therefore, we have $\GL(n,\Q)$-homomorphisms
$$H^A_i(\IA_n,\Q)\cong \bigoplus_{r=0}^{i} \calF_{r}/\calF_{r-1} \hookrightarrow \bigoplus_{p+q=i} H^A_p(\IO_n,\Q)\otimes H^A_q(F_n,\Q).$$
In order to show that $H^A_i(\IA_n,\Q)\cong \bigoplus_{p+q=i} H^A_p(\IO_n,\Q)\otimes H^A_q(F_n,\Q)$, we use the cohomological Hochschild--Serre spectral sequence. We can easily check that $H^q(F_n,\Q)=0$ for $q\ge 2$, and that $\IO_n$ acts trivially on $H^*(F_n,\Q)$.
By Remark \ref{cospectralsequence}, it suffices to show that the differential $d_2^{0,1}: E_2^{0,1}\to E_2^{2,0}$ is a zero map, which follows from the fact that
$H^1(\IA_n,\Q)\cong H^1(\IO_n,\Q)\oplus H^1(F_n,\Q)=E_2^{1,0}\oplus E_2^{0,1}$. This completes the proof.
\end{proof}
To study the relation between $H^A_*(\IO_n,\Q)$ and $H^A_*(\IA_n,\Q)$, we use the following lemma.
\begin{lemma}\label{WiWoi}
We have $W_i\cong W^O_i \oplus (W^O_{i-1}\otimes H)$ as $\GL(n,\Q)$-representations for $n\ge 3i$.
\end{lemma}
\begin{proof}
By the definitions of $W_i$ and $W^O_i$, it suffices to show that
\begin{gather}\label{WiWOiisom}
\bigoplus_{(\mu,\nu)\in P^O_{i-1}}W(\mu,\nu) \otimes H \cong \bigoplus_{(\xi,\eta)\in P_i\setminus P^O_i} W(\xi,\eta).
\end{gather}
Let $(\mu,\nu)\in P^O_{i-1}$.
We write $\mu=(\mu_1^{k_1'},\cdots,\mu_r^{k_r'})$ and $\nu=(\nu_1^{k_1''},\cdots,\nu_s^{k_s''})$.
Let $\mu-\mu_{j}=(\mu_1^{k_1'},\cdots, \mu_j^{k_j'-1},\cdots,\mu_r^{k_r'})$ for $1\le j\le r$
and $\nu+a=(\nu_1^{k_1''},\cdots,\nu_s^{k_s''},1^a)$ for $a\ge 1$.
Since we have $\GL(n,\Q)$-isomorphisms
$$
W(\mu,\nu) \;\wti{\otimes}\; H\cong W(\mu,\nu+1)
$$
and
$$
U_{\mu_j}^{\tree}\otimes H \cong (U_{\mu_j}^{\tree}\;\wti{\otimes}\; H ) \oplus V_{1^{1+\mu_j}}\cong (U_{\mu_j}^{\tree}\;\wti{\otimes}\; H ) \oplus \wti{S}^{1+\mu_j} (U_1^{\wheel}),
$$
we have
\begin{gather}\label{WiandWOi}
\begin{split}
W(\mu,\nu)\otimes H
&\cong (W(\mu,\nu)\;\wti{\otimes}\; H) \oplus \left(\bigoplus_{j=1}^r W(\mu-\mu_j,\nu)\;\wti{\otimes} \; \wti{S}^{1+\mu_j} (U_1^{\wheel})\right)\\
&\cong W(\mu, \nu+1)\oplus \bigoplus_{j=1}^r W(\mu-\mu_{j},\nu+1^{1+\mu_{j}}).
\end{split}
\end{gather}
Therefore, for each $(\mu,\nu)\in P^O_{i-1}$, we have
$$
W(\mu,\nu) \otimes H \subset \bigoplus_{(\xi,\eta)\in P_i\setminus P^O_i} W(\xi,\eta).
$$
Moreover, we have
\begin{gather}\label{WiWOiinclu}
\bigoplus_{(\mu,\nu)\in P^O_{i-1}}W(\mu,\nu) \otimes H \subset \bigoplus_{(\xi,\eta)\in P_i\setminus P^O_i} W(\xi,\eta)
\end{gather}
since for distinct pairs $(\mu,\nu)\neq (\mu',\nu')$, the pairs $(\mu, \nu+1),(\mu', \nu'+1), (\mu-\mu_{j},\nu+1^{1+\mu_{j}}),(\mu'-\mu'_{j},\nu'+1^{1+\mu'_{j}})$ for $1\le j\le r$ are distinct.
Let $(\xi,\eta)\in P_i\setminus P^O_i$. If $\eta$ has only one part of size $1$, then we have $(\mu,\nu)\in P^O_{i-1}$ such that $(\mu,\nu+1)=(\xi,\eta)$.
Otherwise, we have $(\mu,\nu)\in P^O_{i-1}$ such that $(\mu-\mu_j,\nu+1^{1+\mu_j})=(\xi,\eta)$.
Therefore, by the decomposition \eqref{WiandWOi}, we obtain
$$
\bigoplus_{(\mu,\nu)\in P^O_{i-1}}W(\mu,\nu) \otimes H \supset \bigoplus_{(\xi,\eta)\in P_i\setminus P^O_i} W(\xi,\eta).
$$
Therefore, by using \eqref{WiWOiinclu}, we obtain \eqref{WiWOiisom}.
\end{proof}
By Theorem \ref{Johnsonpart} and Proposition \ref{AlbaneseIAandIO2}, we obtain the following proposition, which partially ensures Conjecture \ref{conjectureAlbaneseIO}.
\begin{proposition}\label{IOnWO}
For $n\ge 3i$, we have an injective $\GL(n,\Q)$-homomorphism
$$W^O_i \oplus (W^O_{i-1} \otimes H)\hookrightarrow H^A_i(\IO_n,\Q) \oplus (H^A_{i-1}(\IO_n,\Q)\otimes H).$$
\end{proposition}
\begin{proof}
Let $n\ge 3i$.
By Proposition \ref{AlbaneseIAandIO2}, we have
$$H^A_i(\IA_n,\Q)\xrightarrow{\cong} H^A_i(\IO_n,\Q) \oplus (H^A_{i-1}(\IO_n,\Q)\otimes H).$$
By Theorem \ref{Johnsonpart}, $H^A_i(\IA_n,\Q)$ contains a subrepresentation which is isomorphic to $W_i$.
Since we have
$$W^O_i \oplus (W^O_{i-1}\otimes H)\cong W_i$$
by Lemma \ref{WiWoi}, we have an injective $\GL(n,\Q)$-homomorphism
$$W^O_i \oplus (W^O_{i-1}\otimes H)\hookrightarrow H^A_i(\IO_n,\Q) \oplus (H^A_{i-1}(\IO_n,\Q)\otimes H).$$
\end{proof}
Recall that Conjecture \ref{conjectureAlbaneseIO} states that we stably have $H^A_*(\IO_n,\Q)\cong W^O_*$.
Then we obtain the following relation between the conjectures about the structures of $H^A_*(\IA_n,\Q)$ and $H^A_*(\IO_n,\Q)$.
\begin{proposition}\label{AlbaneseIAandIO}
The followings are equivalent.
\begin{itemize}
\item For any $i$, we have a $\GL(n,\Q)$-isomorphism $H^A_i(\IA_n,\Q)\cong W_i$ for sufficiently large $n$ with respect to $i$ (cf. Conjecture \ref{conjectureAlbanese}).
\item Conjecture \ref{conjectureAlbaneseIO}.
\end{itemize}
\end{proposition}
\begin{proof}
If Conjecture \ref{conjectureAlbaneseIO} holds, then Conjecture \ref{conjectureAlbanese} holds by Proposition \ref{AlbaneseIAandIO2} and Lemma \ref{WiWoi}.
Suppose that Conjecture \ref{conjectureAlbanese} holds.
We will show that Conjecture \ref{conjectureAlbaneseIO} also holds by induction on the homological degree $i$.
Suppose that we have $W^O_i\cong H^A_i(\IO_n,\Q)$ for sufficiently large $n$ with respect to $i$.
For sufficiently large $n$ with respect to $i+1$, by using Lemma \ref{WiWoi} and Proposition \ref{AlbaneseIAandIO2}, we have
$$
W^O_{i+1}\oplus (W^O_{i}\otimes H)\cong W_{i+1} \cong H^A_{i+1}(\IA_n,\Q)\cong H^A_{i+1}(\IO_n,\Q) \oplus (H^A_i(\IO_n,\Q)\otimes H).
$$
Therefore, since we have $H^A_i(\IO_n,\Q)\cong W^O_{i}$ by the hypothesis of the induction, we have $H^A_{i+1}(\IO_n,\Q)\cong W^O_{i+1}$, which completes the proof.
\end{proof}
\begin{remark}
Let $n\ge 3i$.
Since we have $W_i\cong \bigoplus_{p+q=i} W^O_p\wti{\otimes} \bigwedge^q H$ by the definitions of $W_*$ and $W^O_*$, by Lemma \ref{WiWoi}, we have
$$
W^O_i \oplus (W^O_{i-1}\otimes H)\cong
\bigoplus_{p+q=i} W^O_{p}\wti{\otimes} \bigwedge^q H.
$$
Therefore, if Conjecture \ref{conjectureAlbaneseIO} holds, then we stably have
$$
H^A_*(\IO_n,\Q)\otimes H^A_*(F_n,\Q)\cong H^A_*(\IO_n,\Q)\wti{\otimes} H^A_*(F_n^{\ab},\Q).
$$
\end{remark}
\section{The third Albanese homology of $\IO_n$}\label{ThirdhomologyIO}
In this section, we compute $H^A_3(\IO_n,\Q)$ and prove that Conjecture \ref{conjectureAlbaneseIO} holds for $i=3$.
Hain \cite{Hain} and Sakasai \cite{Sakasai} computed the Albanese cohomology of the Torelli groups of closed surfaces of degree $2$ and $3$, respectively.
Pettet \cite{Pettet} computed $H_A^2(\IA_n,\Q)$ by adapting Hain's and Sakasai's methods.
Here we apply their method to $H^A_3(\IO_n,\Q)$ as follows.
We have a $\GL(n,\Q)$-isomorphism
$$H_A^3(\IO_n,\Q)\cong H^A_3(\IO_n,\Q)^*.$$
Suppose that we have subrepresentations $S\subset H^A_3(\IO_n,\Q)$ and $T\subset \ker \tau_O^*$, where $\tau_O^*: H^3(U^O,\Q)\to H^3(\IO_n,\Q)$ is induced by the Johnson homomorphism $\tau^O$.
Then, we have $S^*\oplus T\subset \im \tau_O^*\oplus \ker \tau_O^*\cong H^3(U^O,\Q)$.
If we can show that $H^3(U^O,\Q)\cong S^*\oplus T$ by counting multiplicities of irreducible components, then we obtain $H_A^3(\IO_n,\Q)\cong S^*$ and $H^A_3(\IO_n,\Q)\cong S$.
\subsection{The third Albanese homology of $\IO_n$}
For $n\ge 9$, we have
\begin{gather*}
\begin{split}
W^O_3&=W(3,0)\oplus W(0,3)\oplus W(1,2)\oplus W(21,0)\oplus W(1^3,0)\\
&=(V_{1^4,1})
\oplus
(V_{1^3,0})
\oplus
(V_{2^2, 1}\oplus V_{2 1^2, 1}\oplus V_{1^4, 1}) \\
&
\oplus
(V_{2^2 1, 2}\oplus V_{2^2 1, 1^2}\oplus V_{2 1^3, 2}\oplus V_{2 1^3, 1^2}\oplus V_{1^5, 2}\oplus V_{1^5, 1^2}) \\
&\oplus
(V_{3^2, 1^3}\oplus V_{3 2 1, 2 1}\oplus V_{3 1^3, 3}\oplus V_{2^3, 3}\oplus V_{2^2 1^2, 2 1}\oplus V_{2^2 1^2, 1^3}\oplus V_{2 1^4, 2 1}\oplus V_{1^6, 1^3}).
\end{split}
\end{gather*}
We will prove the following theorem in the rest of this section.
\begin{theorem}\label{thirdAlbaneseIO}
Let $n\ge 9$.
$H^A_3(\IO_n,\Q)$ is decomposed into $19$ irreducible $\GL(n,\Q)$-representations:
\begin{gather*}
\begin{split}
H^A_3(\IO_n,\Q)&\cong W^O_3\\
&\cong
V_{3^2, 1^3}
\oplus V_{3 2 1, 2 1}
\oplus V_{3 1^3, 3}
\oplus V_{2^3, 3}
\oplus V_{2^2 1^2, 2 1}
\oplus V_{2^2 1^2, 1^3}
\oplus V_{2 1^4, 2 1}
\oplus V_{1^6, 1^3}\\
&
\oplus V_{2^2 1, 2}
\oplus V_{2^2 1, 1^2}
\oplus V_{2 1^3, 2}
\oplus V_{2 1^3, 1^2}
\oplus V_{1^5, 2}
\oplus V_{1^5, 1^2}\\
&
\oplus V_{2^2, 1}
\oplus V_{2 1^2, 1}
\oplus V_{1^4, 1}^{\oplus 2}
\oplus V_{1^3,0}.
\end{split}
\end{gather*}
\end{theorem}
\subsection{Irreducible decomposition of $H_3(U^O,\Q)$}
We begin with the computation of an irreducible decomposition of $H_3(U^O,\Q)$ as $\GL(n,\Q)$-representations.
We can check the following lemma directly by hand and by using SageMath.
\begin{lemma}
Let $n\ge 9$.
$H_3(U^O,\Q)$ is decomposed into the following $36$ irreducible $\GL(n,\Q)$-representations:
\begin{gather*}
\begin{split}
H_3(U^O,\Q)
&= \bigwedge^3 (V_{1^2, 1})\\
&\cong V_{3^2, 1^3}
\oplus V_{3 2 1, 2 1}
\oplus V_{3 1^3, 3}
\oplus V_{2^3, 3}
\oplus V_{2^2 1^2, 2 1}
\oplus V_{2^2 1^2, 1^3}
\oplus V_{2 1^4, 2 1}
\oplus V_{1^6, 1^3}\\
&
\oplus V_{3 2, 2}
\oplus V_{3 2, 1^2}
\oplus V_{3 1^2, 2}
\oplus V_{3 1^2, 1^2}
\oplus V_{2^2 1, 2}^{\oplus 2}
\oplus V_{2^2 1, 1^2}^{\oplus 2}
\oplus V_{2 1^3, 2}^{\oplus 2}
\oplus V_{2 1^3, 1^2}^{\oplus 2}\\
&
\oplus V_{1^5, 2}
\oplus V_{1^5, 1^2}
\oplus V_{3 1, 1}
\oplus V_{2^2, 1}^{\oplus 3}
\oplus V_{2 1^2, 1}^{\oplus 3}
\oplus V_{1^4, 1}^{\oplus 3}
\oplus V_{3,0}
\oplus V_{2 1,0}
\oplus V_{1^3,0}^{\oplus 2}.
\end{split}
\end{gather*}
\end{lemma}
\subsection{Upper bound of $H^A_3(\IO_n,\Q)$}
Let $\tau_O^*: H^i(U^O,\Q)\to H^i(\IO_n,\Q)$ denote the map induced by the Johnson homomorphism $\tau^O: \IO_n\to U^O$ on cohomology.
Let $R^O_i=\ker \tau_O^*$.
Pettet \cite{Pettet} computed $R^O_2$. We will study $R^O_3$ by using $R^O_2$.
\begin{lemma}[Pettet \cite{Pettet}]\label{PettetkerIO}
Let $n\ge 3$.
We have
$$R^O_2\cong V_{1, 2 1}.$$
\end{lemma}
For $a,b,c\in [n]$,
let
$$e_{a}^{b,c}:=e_a\otimes (e_b^* \wedge e_c^*)\in U^*.$$
\begin{lemma}\label{PettetIO}
For $n\ge 3$, the subrepresentation $R^O_2\subset H^2(U^O,\Q)$ is generated by
$$\beta=\sum_{j=1}^n e_{j}^{1,2}\wedge e_{n}^{j,1}\in H^2(U^O,\Q)\cong \bigwedge^2 (U^O)^*.$$
\end{lemma}
\begin{proof}
We can check that $\beta\in H^2(U^O,\Q)\cong \bigwedge^2 (U^O)^*$ and that $\beta$ generates an irreducible representation which is isomorphic to $V_{1,21}$.
We have
$$H^2(U^O,\Q)\cong \bigwedge^2 (V_{1,1^2})\cong V_{1^2,2^2}\oplus V_{2,21^2}\oplus V_{1^2,1^4}\oplus V_{1,21}\oplus V_{1,1^3}\oplus V_{0,1^2}.$$
Since the multiplicity of $V_{1,21}$ in $H^2(U^O,\Q)$ is $1$, by Lemma \ref{PettetIO},
it follows that $\beta$ generates $R^O_2\subset H^2(U^O,\Q)$.
\end{proof}
Let
\begin{gather*}
\cup : H^1(U^O,\Q)\otimes R^O_2\to H^3(U^O,\Q)
\end{gather*}
denote the restriction of the cup product.
Then we have $\im \cup \subset R^O_3$.
In what follows, we compute $\im \cup$.
We can compute the tensor product
$H^1(U^O,\Q)\otimes R^O_2$ directly by hand and by using SageMath.
\begin{lemma}
Let $n\ge 6$.
We have an irreducible decomposition
\begin{gather*}
\begin{split}
H^1(U^O,\Q)\otimes R^O_2&\cong V_{1, 1^2}\otimes V_{1, 2 1}\\
& \cong V_{2, 3 2}
\oplus V_{1^2, 3 2}
\oplus V_{2, 3 1^2}
\oplus V_{1^2, 3 1^2}
\oplus V_{2, 2^2 1}
\oplus V_{1^2, 2^2 1}
\oplus V_{2, 2 1^3}
\oplus V_{1^2, 2 1^3}\\
&
\oplus V_{1, 3 1}^{\oplus 2}
\oplus V_{1, 2^2}^{\oplus 2}
\oplus V_{1, 2 1^2}^{\oplus 3}
\oplus V_{1, 1^4}
\oplus V_{0, 3}
\oplus V_{0, 2 1}^{\oplus 2}
\oplus V_{0, 1^3}.
\end{split}
\end{gather*}
\end{lemma}
In terms of $\GL(n,\Q)$-representations, we can identify the cup product map $\cup$ with
\begin{gather*}
\wedge: V_{1, 1^2} \otimes V_{1, 2 1}\to \bigwedge^3 V_{1, 1^2}.
\end{gather*}
\begin{proposition}\label{kerIO}
For $n\ge 6$, $\im \cup$ contains a $\GL(n,\Q)$-subrepresentation consisting of the following $17$ irreducible representations:
\begin{gather*}
\begin{split}
\im\cup &\supset V_{2, 3 2}
\oplus V_{1^2, 3 2}
\oplus V_{2, 3 1^2}
\oplus V_{1^2, 3 1^2}
\oplus V_{2, 2^2 1}
\oplus V_{1^2, 2^2 1}
\oplus V_{2, 2 1^3}
\oplus V_{1^2, 2 1^3}\\
&\quad\quad\quad
\oplus V_{1, 3 1}
\oplus V_{1, 2^2}^{\oplus 2}
\oplus V_{1, 2 1^2}^{\oplus 2}
\oplus V_{1, 1^4}
\oplus V_{0, 3}
\oplus V_{0, 2 1}
\oplus V_{0, 1^3}.
\end{split}
\end{gather*}
\end{proposition}
\begin{proof}
Let $n\ge 6$.
For any distinct elements $a,b,c\in [n]$, define
$$\beta^O_{a,b,c}:=
\sum_{j=1}^n e_{a}^{b,c}
\wedge
e_{j}^{1,2}\wedge e_{n}^{j,1}
\in \im \cup$$
and
$$\beta^O_{a,b}:=
\sum_{j=1}^n
\left(e_{b}^{a,b}- \frac{1}{n-1}\sum_{k=1}^n e_{k}^{a,k}\right)
\wedge
e_{j}^{1,2}\wedge e_{n}^{j,1}
\in \im \cup.$$
We can use $\beta^O_{5,3,4}$ to detect $8$ irreducible components of size $7$ as follows.
Let
$\iota^*: \bigwedge^3 (U^O)^* \hookrightarrow \bigwedge^3(H\otimes \bigwedge^2 H^*)\hookrightarrow (H \otimes (H^*)^{\otimes 2})^{\otimes 3}$
denote the canonical inclusion defined in a way similar to $\iota_{3}$ in Section \ref{subseccontraction}.
Define a contraction map
\begin{gather*}
\begin{split}
\phi: (H \otimes (H^*)^{\otimes 2})^{\otimes 3} &\to H^{\otimes 2} \otimes (H^*)^{\otimes 5},\\
\bigotimes_{j=1}^3 (c_j\otimes a_j^*\otimes b_j^*)&\mapsto a_3^*(c_2) (c_1\otimes c_3)\otimes (a_1^*\otimes b_1^* \otimes a_2^*\otimes b_2^* \otimes b_3^*).
\end{split}
\end{gather*}
Define projection maps
\begin{gather*}
\begin{split}
\phi_1: (H^*)^{\otimes 5}&\to
(\bigwedge^2 H^*)^{\otimes 2} \otimes H^*,\quad
\bigotimes_{i=1}^5 x_i^*\mapsto (x_1^*\wedge x_2^*)\otimes (x_3^*\wedge x_4^*)\otimes x_5^*,\\
\phi_2: (H^*)^{\otimes 5}&\to
(\bigwedge^3 H^*)\otimes (H^*)^{\otimes 2}, \quad
\bigotimes_{i=1}^5 x_i^*\mapsto (x_1^*\wedge x_3^*\wedge x_4^*)\otimes x_2^*\otimes x_5^*,\\
\phi_3: (H^*)^{\otimes 5}&\to
(\bigwedge^3 H^*)\otimes (\bigwedge^2 H^*),\quad
\bigotimes_{i=1}^5 x_i^*\mapsto (x_1^*\wedge x_3^*\wedge x_4^*)\otimes (x_2^*\wedge x_5^*),\\
\phi_4: (H^*)^{\otimes 5}&\to
(\bigwedge^4 H^*) \otimes H^*,\quad
\bigotimes_{i=1}^5 x_i^*\mapsto (x_1^*\wedge x_2^*\wedge x_3^*\wedge x_4^*)\otimes x_5^*.
\end{split}
\end{gather*}
Then we have
\begin{gather*}
\begin{split}
&(\id-P_{5,n})(\id-E_{4,2})(\id-E_{3,1})
(\id_{H^{\otimes 2}}\otimes \phi_1)\phi\iota^*(\beta^O_{5,3,4})\\
&\quad =4(n-1) (e_5\otimes e_n- e_n\otimes e_5) \otimes (e_1^*\wedge e_2^*) \otimes (e_1^*\wedge e_2^*) \otimes e_1^*\in V_{1^2,32},\\
&(E_{5,n}-\id)(\id-E_{4,2})(\id-E_{3,1})
(\id_{H^{\otimes 2}}\otimes \phi_1)\phi\iota^*(\beta^O_{5,3,4})\\
&\quad =4(n-3) (e_5\otimes e_5 \otimes (e_1^*\wedge e_2^*) \otimes (e_1^*\wedge e_2^*) \otimes e_1^*)\in V_{2,32},\\
&(\id-P_{5,n})(\id-E_{4,1})
(\id_{H^{\otimes 2}}\otimes \phi_2)\phi\iota^*(\beta^O_{5,3,4})\\
&\quad =2(n+1) (e_5\otimes e_n- e_n\otimes e_5) \otimes (e_1^*\wedge e_2^*\wedge e_3^*) \otimes e_1^*\otimes e_1^* \in V_{1^2, 3 1^2},\\
&(E_{5,n}-\id)(\id-E_{4,1})
(\id_{H^{\otimes 2}}\otimes \phi_2)\phi\iota^*(\beta^O_{5,3,4})\\
&\quad =2(n-1) e_5\otimes e_5 \otimes (e_1^*\wedge e_2^*\wedge e_3^*) \otimes e_1^*\otimes e_1^* \in V_{2, 3 1^2},\\
&(\id-P_{5,n})(\id-E_{4,2})
(\id_{H^{\otimes 2}}\otimes \phi_3)\phi\iota^*(\beta^O_{5,3,4})\\
&\quad =-2(n-1) (e_5\otimes e_n- e_n\otimes e_5) \otimes (e_1^*\wedge e_2^*\wedge e_3^*) \otimes (e_1^*\wedge e_2^*) \in V_{1^2, 2^2 1},\\
&(E_{5,n}-\id)(\id-E_{4,2})
(\id_{H^{\otimes 2}}\otimes \phi_3)\phi\iota^*(\beta^O_{5,3,4})\\
&\quad =-2(n+1) e_5\otimes e_5 \otimes (e_1^*\wedge e_2^*\wedge e_3^*) \otimes (e_1^*\wedge e_2^*) \in V_{2, 2^2 1},\\
&(\id-P_{5,n})
(\id_{H^{\otimes 2}}\otimes \phi_4)\phi\iota^*(\beta^O_{5,3,4})\\
&\quad =4(n-2) (e_5\otimes e_n- e_n\otimes e_5) \otimes (e_1^*\wedge e_2^*\wedge e_3^*\wedge e_4^*) \otimes e_1^* \in V_{1^2, 2 1^3},\\
&(E_{5,n}-\id)
(\id_{H^{\otimes 2}}\otimes \phi_4)\phi\iota^*(\beta^O_{5,3,4})\\
&\quad =4(n-2) e_5\otimes e_5 \otimes (e_1^*\wedge e_2^*\wedge e_3^*\wedge e_4^*) \otimes e_1^*\in V_{2, 2 1^3}.
\end{split}
\end{gather*}
We can use $\beta^O_{1,n,3}$ to detect $3$ irreducible components of size $3$ as follows.
Define contraction maps
\begin{gather*}
\begin{split}
\varphi_1: (H \otimes (H^*)^{\otimes 2})^{\otimes 3} &\to (H^*)^{\otimes 3},\quad
\bigotimes_{j=1}^3 (c_j\otimes a_j^*\otimes b_j^*)\mapsto a_2^*(c_1) a_3^*(c_2) a_1^*(c_3) b_1^*\otimes b_2^* \otimes b_3^*,\\
\varphi_2: (H \otimes (H^*)^{\otimes 2})^{\otimes 3} &\to (H^*)^{\otimes 3},\quad
\bigotimes_{j=1}^3 (c_j\otimes a_j^*\otimes b_j^*)\mapsto b_3^*(c_1) a_3^*(c_2) a_1^*(c_3) b_1^*\otimes a_2^* \otimes b_2^*.
\end{split}
\end{gather*}
Then we have
$$(\id-E_{2,1})(\id-E_{3,1}) \varphi_1 \iota^*(\beta^O_{1,n,3})
=3(n-1) e_1^*\otimes e_1^*\otimes e_1^*\in V_{0,3}.$$
Considering the image under the projection $(H^*)^{\otimes 3}\twoheadrightarrow \bigwedge^3 H^*$, we have
$$\varphi_1\iota^* (\beta^O_{1,n,3})= -3(n-1) e_1^*\wedge e_2^* \wedge e_3^*\in V_{0,1^3}.$$
Considering the image under the projection $(H^*)^{\otimes 3} \to \bigwedge^2 H^* \otimes H^*$ defined by
$a^*\otimes b^*\otimes c^* \mapsto (b^*\wedge c^*) \otimes a^*$,
we have
$$(\id-E_{3,1})\varphi_2 \iota^* (\beta^O_{1,n,3}) =2(n-2) (e_1^*\wedge e_2^*) \otimes e_1^*\in V_{0,2 1}.$$
We can use $\beta^O_{1,3,4}$ and $\beta^O_{3,1}$ to detect $6$ irreducible components of size $5$ as follows.
Define contraction maps
\begin{gather*}
\begin{split}
&\psi_1: (H \otimes (H^*)^{\otimes 2})^{\otimes 3} \to H\otimes (H^*)^{\otimes 4},\\
&\quad\bigotimes_{j=1}^3 (c_j\otimes a_j^*\otimes b_j^*)\mapsto a_2^*(c_1) a_3^*(c_2) c_3\otimes (a_1^*\otimes b_1^*\otimes b_2^* \otimes b_3^*),\\
&\psi_2: (H \otimes (H^*)^{\otimes 2})^{\otimes 3} \to H\otimes (H^*)^{\otimes 4},\\
&\bigotimes_{j=1}^3 (c_j\otimes a_j^*\otimes b_j^*)\mapsto a_3^*(c_2) b_3^*(c_1) c_3\otimes (a_1^*\otimes b_1^*\otimes a_2^* \otimes b_2^*).
\end{split}
\end{gather*}
Considering the image under the projection $(H^*)^{\otimes 4}\to \bigwedge^2 H^*\otimes (H^*)^{\otimes 2}$ defined by $a^*\otimes b^*\otimes c^* \otimes d^* \mapsto (a^*\wedge b^*)\otimes c^*\otimes d^*$, we obtain
\begin{gather*}
\begin{split}
(\id-E_{4,2})(\id-E_{2,1})(\id-E_{3,1}) \psi_1 \iota^*(\beta^O_{1,3,4})
=2(n-1) e_n\otimes (e_1^*\wedge e_2^*) \otimes e_1^*\otimes e_1^*\in V_{1, 3 1}.
\end{split}
\end{gather*}
Considering the image under the projection $(H^*)^{\otimes 4}\to \bigwedge^4 H^*$ defined by $a^*\otimes b^*\otimes c^* \otimes d^* \mapsto a^*\wedge b^* \wedge c^* \wedge d^*$, we obtain
\begin{gather*}
\begin{split}
\psi_1 \iota^*(\beta^O_{1,3,4})=-2(n+1) e_n\otimes (e_1^*\wedge e_2^*) \otimes e_1^*\otimes e_1^*\in V_{1, 1^4}.
\end{split}
\end{gather*}
Considering the image under the projection $(H^*)^{\otimes 4}\to (\bigwedge^2 H^*)\otimes (\bigwedge^2 H^*)$ defined by $a^*\otimes b^*\otimes c^* \otimes d^* \mapsto (a^*\wedge b^*) \otimes (c^* \wedge d^*)$, we have
\begin{gather*}
\begin{split}
&(\id- E_{4,2})(\id- E_{3,1})
(\psi_1\iota^*(\beta^O_{1,3,4}), \psi_2\iota^*(\beta^O_{1,3,4}))\\
&\quad =(-2(n+1) ,8(n-1) ) \cdot e_n\otimes (e_1^*\wedge e_2^*)\otimes (e_1^* \wedge e_2^*),\\
&(\id-E_{3,2})
(\psi_1\iota^*(\beta^O_{3,1}), \psi_2\iota^*(\beta^O_{3,1}))\\
&\quad =(2\frac{n^2-3}{n-1} ,-8\frac{n^2- 3n +3}{n-1} )\cdot e_n\otimes (e_1^*\wedge e_2^*)\otimes (e_1^* \wedge e_2^*).
\end{split}
\end{gather*}
Therefore, we can see that $\im\cup$ contains $V_{1, 2^2}$ with multiplicity $2$.
Let $\psi_1'$ denote the composition of $\psi_1$ with the projection $(H^*)^{\otimes 4}\to (\bigwedge^3 H^*)\otimes H^*$ defined by $a^*\otimes b^*\otimes c^* \otimes d^* \mapsto (a^*\wedge b^* \wedge c^*) \otimes d^*$ and $\psi_1''$ the composition with the projection defined by $a^*\otimes b^*\otimes c^* \otimes d^* \mapsto (d^*\wedge a^* \wedge b^*) \otimes c^*$, we have
\begin{gather*}
\begin{split}
(\id-E_{4,1})
(\psi_1'\iota^*(\beta^O_{1,3,4}), \psi_1''\iota^*(\beta^O_{1,3,4}))
=( 2(n-2),2)\cdot e_n\otimes (e_1^*\wedge e_2^*\wedge e_3^*)\otimes e_1^*,\\
(\psi_1'\iota^*(\beta^O_{3,1}), \psi_1''\iota^*(\beta^O_{3,1}))
=(2\frac{n^2-5n-5}{n-1},2\frac{n-2}{n-1})\cdot e_n\otimes (e_1^*\wedge e_2^*\wedge e_3^*)\otimes e_1^*.
\end{split}
\end{gather*}
Therefore, we can see that $\im\cup$ contains $V_{1, 2 1^2}$ with multiplicity $2$.
This completes the proof.
\end{proof}
\subsection{Proof of Theorem \ref{thirdAlbaneseIO}}
Here we complete the proof of Theorem \ref{thirdAlbaneseIO}.
Let $n\ge 9$.
We obtained an irreducible decomposition of $H_3(U,\Q)$ into $36$ irreducibles, and $17$ of them are not contained in $H^A_3(\IO_n,\Q)$.
Therefore, it suffices to check that $H^A_3(\IO_n,\Q)$ contains a subrepresentation which is isomorphic to $W^O_3$, which is a direct sum of $19$ irreducibles.
By Proposition \ref{IOnWO}, we have an injective $\GL(n,\Q)$-homomorphism
$$W^O_3 \oplus (W^O_2\otimes H)\hookrightarrow H^A_3(\IO_n,\Q)\oplus (H^A_2(\IO_n,\Q)\otimes H).$$
Since we have $H^A_2(\IO_n,\Q)\cong W^O_2$ by Pettet, we have $W^O_3\hookrightarrow H^A_3(\IO_n,\Q)$, which completes the proof.
\section{The third Albanese homology of $\IA_n$}\label{Thirdhomology}
In this section, we compute $H^A_3(\IA_n,\Q)$ and prove that Conjecture \ref{conjectureAlbanese} holds for $i=3$
by using the same method as we used to compute $H^A_3(\IO_n,\Q)$ in Section \ref{ThirdhomologyIO}.
\subsection{The third Albanese homology of $\IA_n$}
By Theorem \ref{Johnsonpart}, $H^A_3(\IA_n,\Q)$ contains $W_3$, which consists of the following $34$ irreducible representations:
\begin{gather*}
\begin{split}
&W(3,0)=V_{1^4,1}, \quad
W(0, 3)=V_{1^3},\\
&W(21, 0)=V_{2^2 1, 2}\oplus V_{2^2 1, 1^2}\oplus V_{2 1^3, 2}\oplus V_{2 1^3, 1^2}\oplus V_{1^5, 2} \oplus V_{1^5, 1^2},\\
&W(2, 1)= V_{2 1^2, 1} \oplus V_{1^4, 1},\quad
W(1, 2)= V_{2^2, 1} \oplus V_{2 1^2, 1}\oplus V_{1^4, 1},\\
&W(0, 21)= V_{2 1} \oplus V_{1^3},\\
&W(1^3, 0)= V_{3^2, 1^3}\oplus V_{3 2 1, 2 1}\oplus V_{3 1^3, 3}\oplus V_{2^3, 3}\oplus V_{2^2 1^2, 2 1}\oplus V_{2^2 1^2, 1^3}\oplus V_{2 1^4, 2 1}\oplus V_{1^6, 1^3},\\
&W(1^2, 1)= V_{3 2, 1^2}\oplus V_{3 1^2, 2}\oplus V_{2^2 1, 2}\oplus V_{2^2 1, 1^2}\oplus V_{2 1^3, 2}\oplus V_{2 1^3, 1^2}\oplus V_{1^5, 1^2},\\
&W(1, 1^2)= V_{2^2, 1} \oplus V_{2 1^2, 1} \oplus V_{1^4, 1},\quad
W(0, 1^3)= V_{1^3}.
\end{split}
\end{gather*}
In the rest of this section, we prove the following theorem.
\begin{theorem}\label{thirdAlbanese}
Let $n\ge 9$.
$H^A_3(\IA_n,\Q)$ is decomposed into $34$ irreducible $\GL(n,\Q)$-representations:
\begin{gather*}
\begin{split}
H^A_3(\IA_n,\Q)&\cong W_3\\
&\cong
V_{3^2, 1^3}
\oplus V_{3 2 1, 2 1}
\oplus V_{3 1^3, 3}
\oplus V_{2^3, 3}
\oplus V_{2^2 1^2, 2 1}
\oplus V_{2^2 1^2, 1^3}
\oplus V_{2 1^4, 2 1}
\oplus V_{1^6, 1^3}\\
&
\oplus V_{3 2, 1^2}
\oplus V_{3 1^2, 2}
\oplus V_{2^2 1, 2}^{\oplus 2}
\oplus V_{2^2 1, 1^2}^{\oplus 2}
\oplus V_{2 1^3, 2}^{\oplus 2}
\oplus V_{2 1^3, 1^2}^{\oplus2}
\oplus V_{1^5, 2}
\oplus V_{1^5, 1^2}^{\oplus 2}\\
&
\oplus V_{2^2, 1}^{\oplus 2}
\oplus V_{2 1^2, 1}^{\oplus 3}
\oplus V_{1^4, 1}^{\oplus 4}
\oplus V_{2 1,0}
\oplus V_{1^3,0}^{\oplus 3}.
\end{split}
\end{gather*}
\end{theorem}
\subsection{Irreducible decomposition of $H_3(U,\Q)$}
We begin with the computation of an irreducible decomposition of $H_3(U,\Q)$ as $\GL(n,\Q)$-representations.
We can check the following lemma directly by hand and by using SageMath.
\begin{lemma}\label{H3U}
Let $n\ge 9$.
$H_3(U,\Q)$ is decomposed into the following $61$ irreducible $\GL(n,\Q)$-representations:
\begin{gather*}
\begin{split}
H_3(U,\Q)
&= \bigwedge^3 (V_{1^2, 1}\oplus V_{1,0})\\
&\cong V_{3^2, 1^3}
\oplus V_{3 2 1, 2 1}
\oplus V_{3 1^3, 3}
\oplus V_{2^3, 3}
\oplus V_{2^2 1^2, 2 1}
\oplus V_{2^2 1^2, 1^3}
\oplus V_{2 1^4, 2 1}
\oplus V_{1^6, 1^3}\\
&
\oplus V_{3 2, 2}
\oplus V_{3 2, 1^2}^{\oplus 2}
\oplus V_{3 1^2, 2}^{\oplus 2}
\oplus V_{3 1^2, 1^2}
\oplus V_{2^2 1, 2}^{\oplus 3}
\oplus V_{2^2 1, 1^2}^{\oplus 3}
\oplus V_{2 1^3, 2}^{\oplus 3}
\oplus V_{2 1^3, 1^2}^{\oplus 3}\\
&
\oplus V_{1^5, 2}
\oplus V_{1^5, 1^2}^{\oplus 2}
\oplus V_{3 1, 1}^{\oplus 2}
\oplus V_{2^2, 1}^{\oplus 6}
\oplus V_{2 1^2, 1}^{\oplus 7}
\oplus V_{1^4, 1}^{\oplus 6}
\oplus V_{3,0}
\oplus V_{2 1,0}^{\oplus 4}
\oplus V_{1^3,0}^{\oplus 6}.
\end{split}
\end{gather*}
\end{lemma}
\subsection{Upper bound of $H^A_3(\IA_n,\Q)$}
Let $\tau^*: H^i(U,\Q) \to H^i(\IA_n,\Q)$ denote the map induced by the Johnson homomorphism $\tau: \IA_n\to U$ on cohomology.
Let $R_i=\ker \tau^*$.
Here, we compute $R_3$.
By Pettet \cite{Pettet}, we have an exact sequence of $\GL(n,\Z)$-representations
\begin{gather}\label{pettetexact}
0\to \Hom(\opegr^2(\IA_n),\Q)\xrightarrow{[\;,\;]^*} H^2(U,\Q) \xrightarrow{\tau^*} H^2(\IA_n,\Q),
\end{gather}
where $\opegr^2(\IA_n)$ is the degree $2$ part of the graded Lie algebra associated to the lower central series of $\IA_n$.
Here $[\;,\;]^*$ is induced by the surjection
$$[\;,\;]: \bigwedge^2 U \twoheadrightarrow \opegr^2(\IA_n)$$
which sends $\overline{x}\wedge \overline{y}\in \bigwedge^2 U$ to $\overline{[x,y]}\in \opegr^2(\IA_n)$.
Pettet obtained an irreducible decomposition of $R_2$.
\begin{lemma}[Pettet \cite{Pettet}]\label{Pettetker2}
Let $n\ge 3$.
We have
$$R_2\cong V_{1, 2 1}\oplus V_{0, 1^2}.$$
\end{lemma}
Since we have the following commutative diagram
\begin{gather*}
\xymatrix{
H^2(\IA_n,\Q)
&
H^2(\IO_n,\Q)\ar[l]_-{\pi^*}
\\
H^2(U,\Q)\ar[u]^-{\tau^*}
&
H^2(U^O,\Q)\ar[u]_-{\tau_O^*}\ar@{_{(}->}[l]_-{\pr^*},
}
\end{gather*}
we obtain
\begin{gather}\label{kerIOkertau}
R^O_2=\ker \tau^*_O\subset R_2=\ker \tau^*.
\end{gather}
Therefore, we obtain a generator of $V_{1, 2 1}\subset R_2$.
\begin{lemma}\label{generatorV121}
The subrepresentation $V_{1,21}\subset R_2$ is generated by
$$\beta=\sum_{j=1}^n e_{j}^{1,2}\wedge e_{n}^{j,1}\in H^2(U,\Q)\cong \bigwedge^2 U^*.$$
\end{lemma}
We use the exact sequence \eqref{pettetexact} to find a generator of $V_{0,1^2}\subset R_2$.
\begin{lemma}\label{generatorV011}
The subrepresentation $V_{0,1^2}\subset R_2$ is generated by
\begin{gather*}
\begin{split}
\gamma=
\sum_{j,k =1}^n e_{j}^{1,2}\wedge e_{k}^{j,k}
+\sum_{j,k =1}^n & e_{j}^{1,k}\wedge e_{k}^{j,2}\in H^2(U,\Q)\cong \bigwedge^2 U^*.
\end{split}
\end{gather*}
\end{lemma}
\begin{proof}
We use the basis for $H_2(U,\Q)\cong \bigwedge^2 U$ induced by the basis $\{e_{a,b}^{c}\mid 1\le a,b,c\le n,\; a< b\}$
for $U$.
The \emph{second Johnson homomorphism} gives us an inclusion map
$$
\tau^{(2)}:\opegr^2(\IA_n)\hookrightarrow \Hom(H, (\bigwedge^2 H\otimes H)/\bigwedge^3 H)\cong H^*\otimes (\bigwedge^2 H\otimes H)/\bigwedge^3 H.
$$
(See \cite[Section 2.3]{Pettet} for the definition of the second Johnson homomorphism.)
We have $\opegr^2(\IA_n)\cong V_{21,1}\oplus V_{1^2,0}$, and $\Hom(H, (\bigwedge^2 H\otimes H)/\bigwedge^3 H)\cong V_{21,1}\oplus V_{1^2,0}\oplus V_{2,0}$.
In what follows, we identify elements of $\opegr^2(\IA_n)$ and the images of them under $\tau^{(2)}$.
The subrepresentation of $\opegr^2(\IA_n)$ that is isomorphic to $V_{1^2,0}$ has the following basis
$$\{x_{p,q}=\sum_{j=1}^n e_j^*\otimes (\overline{(e_p\wedge e_q)\otimes e_j})\mid 1\le p<q\le n\}.$$
Let $x_{1,2}^*\in \Hom(\opegr^2(\IA_n),\Q)$ denote the dual basis vector which sends $x_{1,2}$ to $1$ and the other basis vectors to $0$.
Then $x_{1,2}^*$ is a generator of the subrepresentation of $\Hom(\opegr^2(\IA_n),\Q)$ that is isomorphic to $V_{0,1^2}$.
Since we have $R_2=\im [\;,\;]^*$ by \eqref{pettetexact}, in order to show that $\gamma$ generates the subrepresentation of $R_2$ which is isomorphic to $V_{0,1^2}$, it suffices to check that
$$\gamma=(n+1) [\;,\;]^*(x_{1,2}^*).$$
We can check that for distinct elements $j,k\in [n]\setminus\{1,2\}$,
\begin{gather*}
\begin{split}
x_{1,2}^*( [e_{1,k}^{j}, e_{j,2}^{k}]) &=1/(n+1),\quad
x_{1,2}^*( [e_{1,2}^{j}, e_{j,k}^{k}]) =1/(n+1),\\
x_{1,2}^*( [e_{1,2}^{j}, e_{j,1}^{1}]) &=2/(n+1),\quad
x_{1,2}^*( [e_{1,2}^{j}, e_{j,2}^{2}]) =2/(n+1),\\
x_{1,2}^*( [e_{1,2}^{2}, e_{2,j}^{j}]) &=1/(n+1),\quad
x_{1,2}^*( [e_{1,2}^{1}, e_{1,j}^{j}]) =1/(n+1),\\
x_{1,2}^*( [e_{1,j}^{j}, e_{j,2}^{j}]) &=1/(n+1),\quad
x_{1,2}^*( [e_{1,2}^{2}, e_{2,1}^{1}]) =3/(n+1),\\
\end{split}
\end{gather*}
and that
\begin{gather*}
\begin{split}
[\;,\;]^* (x_{1,2}^*) (x)=0
\end{split}
\end{gather*}
for any other basis vectors $x$ for $H_2(U,\Q)\cong \bigwedge^2 U$.
Therefore, we have
$$[\;,\;]^* (x_{1,2}^*)=\frac{1}{n+1}\gamma.$$
\end{proof}
Let
\begin{gather*}
\cup : H^1(U,\Q)\otimes R_2\to H^3(U,\Q)
\end{gather*}
denote the restriction of the cup product.
Then we have $\im \cup \subset R_3$.
In what follows, we compute $\im \cup$.
We can compute the tensor product $H^1(U,\Q)\otimes R_2$ directly by hand and by using SageMath.
\begin{lemma}
Let $n\ge 6$.
We have an irreducible decomposition
\begin{gather*}
\begin{split}
H^1(U,\Q)\otimes R_2
& \cong (V_{1, 1^2} \oplus V_{0,1})\otimes (V_{1, 2 1}\oplus V_{0, 1^2})\\
& \cong V_{2, 3 2}
\oplus V_{1^2, 3 2}
\oplus V_{2, 3 1^2}
\oplus V_{1^2, 3 1^2}
\oplus V_{2, 2^2 1}
\oplus V_{1^2, 2^2 1}
\oplus V_{2, 2 1^3}
\oplus V_{1^2, 2 1^3}\\
&
\oplus V_{1, 3 1}^{\oplus 3}
\oplus V_{1, 2^2}^{\oplus 4}
\oplus V_{1, 2 1^2}^{\oplus 5}
\oplus V_{1, 1^4}^{\oplus 2}
\oplus V_{0, 3}
\oplus V_{0, 2 1}^{\oplus 5}
\oplus V_{0, 1^3}^{\oplus 3}.
\end{split}
\end{gather*}
\end{lemma}
In terms of $\GL(n,\Q)$-representations, we can identify the cup product map $\cup$ with
\begin{gather*}
\wedge: (V_{1, 1^2} \oplus V_{0, 1})\otimes (V_{1, 2 1}\oplus V_{0, 1^2})\to \bigwedge^3 (V_{1, 1^2}\oplus V_{0, 1}).
\end{gather*}
\begin{proposition}\label{imagecup}
For $n\ge 6$, $\im \cup$ contains a $\GL(n,\Q)$-subrepresentation consisting of the following $27$ irreducible representations:
\begin{gather*}
\begin{split}
\im\cup\supset & V_{2, 3 2}
\oplus V_{1^2, 3 2}
\oplus V_{2, 3 1^2}
\oplus V_{1^2, 3 1^2}
\oplus V_{2, 2^2 1}
\oplus V_{1^2, 2^2 1}
\oplus V_{2, 2 1^3}
\oplus V_{1^2, 2 1^3}\\
&\quad\quad\quad
\oplus V_{1, 3 1}^{\oplus 2}
\oplus V_{1, 2^2}^{\oplus 4}
\oplus V_{1, 2 1^2}^{\oplus 4}
\oplus V_{1, 1^4}^{\oplus 2}
\oplus V_{0, 3}
\oplus V_{0, 2 1}^{\oplus 3}
\oplus V_{0, 1^3}^{\oplus 3}.
\end{split}
\end{gather*}
\end{proposition}
\begin{proof}
By Proposition \ref{kerIO} and \eqref{kerIOkertau}, the $8$ irreducible components of size $7$ and the irreducible component which is isomorphic to $V_{0,3}$ are contained in $\im\cup$.
By Lemmas \ref{generatorV121} and \ref{generatorV011}, we have the following elements in $\im\cup$:
\begin{gather*}
\beta_{a,b,c}= e_{a}^{b,c} \wedge \beta,\quad
\gamma_{a,b,c}=e_{a}^{b,c} \wedge \gamma.
\end{gather*}
Let $\iota^*: \bigwedge^3 U^*\hookrightarrow (H\otimes (H^*)^{\otimes 2})^{\otimes 3}$ denote the canonical inclusion.
We will check that $V_{0, 2 1}^{\oplus 3}\oplus V_{0, 1^3}^{\oplus 3}$ is contained in $\im\cup$.
We use the following contraction maps:
\begin{gather*}
\begin{split}
\varphi_2: (H \otimes (H^*)^{\otimes 2})^{\otimes 3} &\to (H^*)^{\otimes 3},\quad
\bigotimes_{j=1}^3 (c_j\otimes a_j^*\otimes b_j^*)\mapsto b_3^*(c_1) a_3^*(c_2) a_1^*(c_3) b_1^*\otimes a_2^* \otimes b_2^*,\\
\varphi_3: (H \otimes (H^*)^{\otimes 2})^{\otimes 3} &\to (H^*)^{\otimes 3},\quad
\bigotimes_{j=1}^3 (c_j\otimes a_j^*\otimes b_j^*)\mapsto a_2^*(c_1) a_3^*(c_2) b_3^*(c_3) a_1^*\otimes b_1^* \otimes b_2^*,\\
\varphi_4: (H \otimes (H^*)^{\otimes 2})^{\otimes 3} &\to (H^*)^{\otimes 3},\quad
\bigotimes_{j=1}^3 (c_j\otimes a_j^*\otimes b_j^*)\mapsto b_1^*(c_1) a_3^*(c_2) b_3^*(c_3) a_1^*\otimes a_2^* \otimes b_2^*.
\end{split}
\end{gather*}
Considering the image under the projection $(H^*)^{\otimes 3} \to \bigwedge^3 H^*$, we have
\begin{gather*}
\begin{split}
&(\varphi_2 \iota^* (\beta_{1,n,3}),\varphi_3 \iota^*(\beta_{1,n,3}), \varphi_4 \iota^*(\beta_{1,n,3}))\\
&\quad=(2(n-1),0,0)\cdot e_1^*\wedge e_2^* \wedge e_3^*,\\
&(\id-E_{4,1})(\varphi_2 \iota^* (\gamma_{1,3,4}),\varphi_3 \iota^*(\gamma_{1,3,4}), \varphi_4 \iota^*(\gamma_{1,3,4}))\\
&\quad=(2(n^2-2n-1),2(n^2+n),2(n+1))\cdot e_1^*\wedge e_2^* \wedge e_3^*,\\
&(\id-E_{4,3})(\varphi_2 \iota^* (\gamma_{3,4,3}),\varphi_3 \iota^*(\gamma_{3,4,3}), \varphi_4 \iota^*(\gamma_{3,4,3}))\\
&\quad=(-2(n-1),0,2(n^2-1))\cdot e_1^*\wedge e_2^* \wedge e_3^*.
\end{split}
\end{gather*}
Therefore, we can see that $\im\cup$ contains $V_{0,1^3}$ with multiplicity $3$.
Considering the image under the projection $(H^*)^{\otimes 3} \to \bigwedge^2 H^* \otimes H^*$ defined by $a^*\otimes b^*\otimes c^* \mapsto (a^*\wedge b^*) \otimes c^*$ for $\varphi_3$, and defined by $a^*\otimes b^*\otimes c^* \mapsto (b^*\wedge c^*) \otimes a^*$ for $\varphi_2,\varphi_4$, we have
\begin{gather*}
\begin{split}
&(\id-E_{3,1}) (\varphi_2 \iota^* (\beta_{1,n,3}),\varphi_3 \iota^*(\beta_{1,n,3}), \varphi_4 \iota^*(\beta_{1,n,3}))\\
&\quad=(2(n-2),0,0)\cdot(e_1^*\wedge e_2^*) \otimes e_1^*,\\
&(\id-E_{4,2})(\id-E_{3,1})(\id-E_{2,1})(\varphi_2 \iota^* (\gamma_{1,3,4}),\varphi_3 \iota^*(\gamma_{1,3,4}), \varphi_4 \iota^*(\gamma_{1,3,4}))\\
&\quad=(2(n^2+n-4),2(n^2+n),2(n+1))\cdot (e_1^*\wedge e_2^*) \otimes e_1^*,\\
&(\id-E_{4,1})(\varphi_2 \iota^* (\gamma_{3,4,3}),\varphi_3 \iota^*(\gamma_{3,4,3}), \varphi_4 \iota^*(\gamma_{3,4,3}))\\
&\quad=(-2(n-4),6n,2(n^2-1))\cdot (e_1^*\wedge e_2^*) \otimes e_1^*.
\end{split}
\end{gather*}
Therefore, we can see that $\im\cup$ contains $V_{0,2 1}$ with multiplicity $3$.
Lastly, we will check that $12$ irreducible components of size $5$ are contained in $\im\cup$.
We use the following contraction maps
\begin{gather*}
\begin{split}
\psi_1: (H \otimes (H^*)^{\otimes 2})^{\otimes 3} &\to H\otimes (H^*)^{\otimes 4},\\
\bigotimes_{j=1}^3 (c_j\otimes a_j^*\otimes b_j^*)&\mapsto a_2^*(c_1) a_3^*(c_2) c_3\otimes (a_1^*\otimes b_1^*\otimes b_2^* \otimes b_3^*),\\
\psi_2: (H \otimes (H^*)^{\otimes 2})^{\otimes 3} &\to H\otimes (H^*)^{\otimes 4}, \\
\bigotimes_{j=1}^3 (c_j\otimes a_j^*\otimes b_j^*)&\mapsto a_3^*(c_2) b_3^*(c_1) c_3\otimes (a_1^*\otimes b_1^*\otimes a_2^* \otimes b_2^*),\\
\psi_3: (H \otimes (H^*)^{\otimes 2})^{\otimes 3} &\to H\otimes (H^*)^{\otimes 4}, \\
\bigotimes_{j=1}^3 (c_j\otimes a_j^*\otimes b_j^*)&\mapsto a_3^*(c_2) b_3^*(c_3) c_1\otimes (a_1^*\otimes b_1^*\otimes a_2^* \otimes b_2^*),\\
\psi_4: (H \otimes (H^*)^{\otimes 2})^{\otimes 3} &\to H\otimes (H^*)^{\otimes 4}, \\
\bigotimes_{j=1}^3 (c_j\otimes a_j^*\otimes b_j^*)&\mapsto b_1^*(c_1) a_3^*(c_2) c_3\otimes (a_1^*\otimes a_2^*\otimes b_2^* \otimes b_3^*).\\
\end{split}
\end{gather*}
Considering the image under the projection $(H^*)^{\otimes 4}\to \bigwedge^2 H^*\otimes (H^*)^{\otimes 2}$ defined by $a^*\otimes b^*\otimes c^* \otimes d^* \mapsto (a^*\wedge b^*)\otimes c^*\otimes d^*$ for $\psi_1$, and defined by $a^*\otimes b^*\otimes c^* \otimes d^* \mapsto (b^*\wedge c^*)\otimes a^*\otimes d^*$ for $\psi_4$, we have
\begin{gather*}
\begin{split}
&(\id-E_{4,2})(\id-E_{3,1})(\id-E_{2,1})(\psi_1\iota^*(\beta_{1,3,4}), \psi_4\iota^*(\beta_{1,3,4}))\\
&\quad =(2(n-1),0)\cdot e_n\otimes (e_1^*\wedge e_2^*) \otimes e_1^*\otimes e_1^*,\\
&(\id-E_{4,1})(\psi_1\iota^*(\beta_{3,4,3}), \psi_4\iota^*(\beta_{3,4,3}))\\
&\quad =(2,2(n-1))\cdot e_n\otimes (e_1^*\wedge e_2^*) \otimes e_1^*\otimes e_1^*.
\end{split}
\end{gather*}
Therefore, we can see that $\im\cup$ contains $V_{1, 3 1}$ with multiplicity $2$.
Considering the image under the projection $(H^*)^{\otimes 4}\to \bigwedge^4 H^*$ defined by $a^*\otimes b^*\otimes c^* \otimes d^* \mapsto a^*\wedge b^* \wedge c^* \wedge d^*$, we have
\begin{gather*}
\begin{split}
(\psi_1\iota^* (\beta_{1,3,4}), \psi_4\iota^*(\beta_{1,3,4})) &=(-2(n+1),0)\cdot e_n\otimes (e_1^*\wedge e_2^*\wedge e_3^* \wedge e_4^*),\\
(E_{n,3}-\id)(\psi_1\iota^*(\gamma_{3,4,3}), \psi_4\iota^*(\gamma_{3,4,3}))&=(8(n+1),4(n+1))\cdot e_n\otimes (e_1^*\wedge e_2^*\wedge e_3^*\wedge e_4^*).
\end{split}
\end{gather*}
Therefore, we can see that $\im\cup$ contains $V_{1, 1^4}$ with multiplicity $2$.
Considering the image under the projection $(H^*)^{\otimes 4}\to (\bigwedge^2 H^*)\otimes (\bigwedge^2 H^*)$ defined by $a^*\otimes b^*\otimes c^* \otimes d^* \mapsto (a^*\wedge b^*) \otimes (c^* \wedge d^*)$ for $\psi_1, \psi_2, \psi_3$, and defined by $(b^*\wedge c^*) \otimes (a^* \wedge d^*)$ for $\psi_4$, we have
\begin{gather*}
\begin{split}
&(\id-E_{4,2})(\id-E_{3,1})
(\psi_1\iota^*(\beta_{1,3,4}), \psi_2\iota^*(\beta_{1,3,4}),\psi_3\iota^*(\beta_{1,3,4}),\psi_4\iota^*(\beta_{1,3,4}))\\
&\quad =(-2(n+1),8(n-1),0,0)\cdot e_n\otimes (e_1^*\wedge e_2^*)\otimes (e_1^* \wedge e_2^*),\\
&(\id-E_{3,2})(E_{n,2}-\id)
(\psi_1\iota^*(\beta_{2,3,n}), \psi_2\iota^*(\beta_{2,3,n}),\psi_3\iota^*(\beta_{2,3,n}),\psi_4\iota^*(\beta_{2,3,n}))\\
&\quad =(-2(n-1),8,0,0)\cdot e_n\otimes (e_1^*\wedge e_2^*)\otimes (e_1^* \wedge e_2^*),
\\
&(\id-E_{4,2})
(\psi_1\iota^*(\beta_{3,4,3}), \psi_2\iota^*(\beta_{3,4,3}),\psi_3\iota^*(\beta_{3,4,3}),\psi_4\iota^*(\beta_{3,4,3}))\\
&\quad =(-2,0,4,-2(n-1))\cdot e_n\otimes (e_1^*\wedge e_2^*)\otimes (e_1^* \wedge e_2^*),\\
&(\id-E_{4,2})(\id-E_{3,1})(E_{n,3}-\id)
(\psi_1\iota^*(\gamma_{3,4,3}), \psi_2\iota^*(\gamma_{3,4,3}),\psi_3\iota^*(\gamma_{3,4,3}),\psi_4\iota^*(\gamma_{3,4,3}))\\
&\quad =(-4(n-2),-8(n-4),-4(n^2-1),4(n+1))\cdot e_n\otimes (e_1^*\wedge e_2^*)\otimes (e_1^* \wedge e_2^*).
\end{split}
\end{gather*}
Therefore, we can see that $\im\cup$ contains $V_{1, 2^2}$ with multiplicity $4$.
Let $\psi_1''$ denote the composition of $\psi_1$ with the projection $(H^*)^{\otimes 4}\to (\bigwedge^3 H^*)\otimes H^*$ defined by $a^*\otimes b^*\otimes c^* \otimes d^* \mapsto (a^*\wedge b^* \wedge d^*) \otimes c^*$.
Considering the image under the projection $(H^*)^{\otimes 4}\to (\bigwedge^3 H^*)\otimes H^*$ defined by $a^*\otimes b^*\otimes c^* \otimes d^* \mapsto (a^*\wedge b^* \wedge c^*) \otimes d^*$ for $\psi_1,\psi_3,\psi_4$, we have
\begin{gather*}
\begin{split}
&(\id-E_{4,1})
(\psi_1\iota^*(\beta_{1,3,4}), \psi_1''\iota^*(\beta_{1,3,4}),\psi_3\iota^*(\beta_{1,3,4}),\psi_4\iota^*(\beta_{1,3,4}))\\
&\quad =(2(n-2),2,0,0)\cdot e_n\otimes (e_1^*\wedge e_2^*\wedge e_3^*)\otimes e_1^*,\\
&(\id-E_{4,2})(\id-E_{2,1})
(\psi_1\iota^*(\beta_{1,3,4}), \psi_1''\iota^*(\beta_{1,3,4}),\psi_3\iota^*(\beta_{1,3,4}),\psi_4\iota^*(\beta_{1,3,4}))\\
&\quad =(-2(n-1),-2(n-1),0,0)\cdot e_n\otimes (e_1^*\wedge e_2^*\wedge e_3^*)\otimes e_1^*,\\
&(\id-E_{4,3})
(\psi_1\iota^*(\beta_{3,4,3}), \psi_1''\iota^*(\beta_{3,4,3}),\psi_3\iota^*(\beta_{3,4,3}),\psi_4\iota^*(\beta_{3,4,3}))\\
&\quad =(2,0,-2,2(n-1))\cdot e_n\otimes (e_1^*\wedge e_2^*\wedge e_3^*)\otimes e_1^*,\\
&(\id-E_{4,1})(E_{n,3}-\id)
(\psi_1\iota^*(\gamma_{3,4,3}), \psi_1''\iota^*(\gamma_{3,4,3}),\psi_3\iota^*(\gamma_{3,4,3}),\psi_4\iota^*(\gamma_{3,4,3}))\\
&\quad =(4,8n-4,2(n+1)^2,2(n+1))\cdot e_n\otimes (e_1^*\wedge e_2^*\wedge e_3^*)\otimes e_1^*.
\end{split}
\end{gather*}
Therefore, we can see that $\im\cup$ contains $V_{1, 2 1^2}$ with multiplicity $4$.
This completes the proof.
\end{proof}
\subsection{Proof of Theorem \ref{thirdAlbanese}}
Here we complete the proof of Theorem \ref{thirdAlbanese}.
By Lemma \ref{H3U}, we obtain an irreducible decomposition of $H_3(U,\Q)$, which consists of $61$ irreducibles.
By Proposition \ref{imagecup}, we obtain $27$ irreducible components that are not contained in $H^A_3(\IA_n,\Q)$.
By Theorem \ref{Johnsonpart}, we have $34$ irreducible components that are included in $H^A_3(\IA_n,\Q)$.
Therefore, we obtain
$$
H^A_3(\IA_n,\Q)\cong W_3,
$$
which completes the proof of Theorem \ref{thirdAlbanese}.
\begin{remark}\label{quadratic3}
By the above proof, we have
$$
H^3(U,\Q)/\im\cup\xrightarrow{\cong} H_A^3(\IA_n,\Q).
$$
Since the image of the cup product map coincides with the degree $3$ part of the ideal $\langle R_2\rangle\subset H^*(U,\Q)$,
Conjecture \ref{quadratic} holds for $*=3$.
\end{remark}
\section{Cohomology of $\Aut(F_n)$ with twisted coefficients}\label{KV}
For an algebraic $\GL(n,\Q)$-representation $V$, let $H_A^*(\IA_n,V)=H_A^*(\IA_n,\Q)\otimes V$.
In this section, we study the relation between $H_A^*(\IA_n,V)$ and $H^*(\Aut(F_n),V)$.
\subsection{Wheeled PROPs and wheeled operads}
Here, we recall the notions of PROPs and operads, and wheeled versions of PROPs and operads.
See \cite{CFP, Kawazumi--Vespa, LodayVallette, MMS, Markl} for precise definitions.
A \emph{PROP} is a symmetric monoidal category $P=(P,\otimes,0, S)$ with non-negative integers as objects and $m\otimes n=m+n$ for any $m,n\in \N$.
We consider PROPs enriched over the category of graded $\Q$-vector spaces.
A \emph{wheeled PROP} \cite{MMS} is a PROP $P$ equipped with contraction maps (or partial trace maps)
$$\xi^i_j: P(m,n)\to P(m-1,n-1),$$
which can be viewed as connecting the $i^{\text{th}}$ input and the $j^{\text{th}}$ output, satisfying compatibility and unitality axioms.
A \emph{non-unital wheeled PROP} (or \emph{TRAP} in the sense of \cite{CFP}) is a wheeled PROP without identity morphisms and unitality axioms.
An \emph{operad} in the category of graded $\Q$-vector spaces is a collection $\calP=\{\calP(n)\}_{n\ge 0}$ of graded right $\Q[\gpS_n]$-modules equipped with operadic compositions, which are graded $\Q$-linear maps
$$\gamma: \calP(n)\otimes \calP(k_1)\otimes \cdots\otimes \calP(k_n)\to\calP(k_1+\cdots+k_n),$$
and a unit map
$$\eta: \Q\to \calP(1)$$
satisfying associativity, equivariance and unitality axioms.
A \emph{non-unital operad} is an operad without unit.
For an operad $\calP$, a \emph{right $\calP$-module} is a graded $\gpS$-module $M=\{M(n)\}_{n\ge 0}$, which is a collection of graded $\gpS_n$-modules $M(n)$,
equipped with right $\calP$-actions, which are graded $\Q$-linear maps
$$\alpha: M(l)\otimes \calP(m_1)\otimes \cdots\otimes \calP(m_l)\to M(m_1+\cdots+m_l),$$
satisfying the operadic form of the standard axioms for a right module over an algebra.
For a non-unital operad, we do not assume the unitality axioms.
A \emph{wheeled operad} $\calP=\{\calP(n,m)\}_{(n,m)\in \N\times \{0,1\}}$ consists of
\begin{enumerate}[(i)]
\item the operadic part: an operad $\calP_0=\{\calP(n,1)\}_{n\ge 0}$,\label{operadicpart}
\item the wheeled part: a right $\calP_0$-module $\calP_w=\{\calP(n,0)\}_{n\ge 0}$,\label{wheeledpart}
\item contraction maps $\xi_i: \calP_0(n)\to \calP_w(n-1)$ for $1\le i\le n$ satisfying compatibility with the structures \eqref{operadicpart} and \eqref{wheeledpart}.
\end{enumerate}
A \emph{non-unital wheeled operad} $\calP$ consists of a non-unital operad $\calP_0$, the wheeled part and the contraction maps as above.
The forgetful functor from the category of wheeled operads (resp. non-unital wheeled operads) to the category of operads (resp. non-unital operads) has a left adjoint denoted by $(-)^{\circlearrowright}$, which is called the \emph{wheeled completion}.
For any wheeled operad (resp. non-unital wheeled operad) $\calP$, there is a wheeled PROP (resp. non-unital wheeled PROP) $\calC_{\calP}$ which is freely generated by $\calP$.
We have
\begin{gather}\label{freePROP}
\calC_{\calP}(m,n)=\bigoplus_{\substack{J\subset [m]\\ f:J\twoheadrightarrow [n]}}\bigoplus_{\substack{1\le k\le |[m]\setminus J|\\ (X_1,\cdots,X_k)\in P([m]\setminus J,k)}}
\left(\bigotimes_{i=1}^{n}\calP_0(|f^{-1}(i)|) \right)\otimes \left(\bigotimes_{i=1}^{k}\calP_w(|X_i|)\right),
\end{gather}
where $P([m]\setminus J,k)$ denotes the set of partitions $X_1\sqcup\cdots\sqcup X_k=[m]\setminus J$ such that $\min(X_1)<\cdots<\min(X_k)$, $X_1,\cdots,X_k\neq \emptyset$.
(See \cite[Proposition 2.3]{Kawazumi--Vespa} for details.)
\subsection{Stable cohomology of $\Aut(F_n)$ with twisted coefficients}
Here, we recall the conjectural structure of the stable cohomology of $\Aut(F_n)$ with twisted coefficients given by Kawazumi--Vespa \cite{Kawazumi--Vespa}.
For $p,q\ge 0$, let $H^{p,q}=H^{\otimes p}\otimes (H^*)^{\otimes q}$.
In \cite{Kawazumi--Vespa}, Kawazumi and Vespa have studied the structure of the stable cohomology $H^*(\Aut(F_n),H^{p,q})$ for $p,q\ge 0$.
They defined a wheeled PROP $\calH$ such that
$$\calH(p,q)= \lim_{n\in \N} H^*(\Aut(F_n), H^{p,q}).$$
They also defined a wheeled PROP $\calE$ such that
$$\calE(p,q)=\bigoplus_{j\in \N} \Ext^{*-j}_{\calF(\mathbf{gr};\Q)}(\mathfrak{a}^{\otimes q}\otimes \bigwedge^j \mathfrak{a} , \mathfrak{a}^{\otimes p})$$
is the direct sum of $\Ext$-groups in the category $\calF(\mathbf{gr};\Q)$ of functors from the category $\mathbf{gr}$ of finitely generated free groups to the category of $\Q$-vector spaces, where $\mathfrak{a}\in \calF(\mathbf{gr};\Q)$ is the abelianization functor.
Let $\calP_0=\bigoplus_{k\ge 1} \calP_0(k)$ denote the operadic suspension of the operad $\calC om$ of non-unital commutative algebras. That is, $\calP_0$ is an operad such that $ \calP_0(0)=0$ and $\calP_0(k)=\sgn_k[k-1]$ for $k\ge 1$, where $\sgn_k[k-1]$ is the sign representation of $\gpS_k$ placed in cohomological dimension $k-1$.
Let $\calP_0^{\circlearrowright}$ denote the wheeled completion of $\calP_0$ and $\calC_{\calP_0^{\circlearrowright}}$ the wheeled PROP freely generated by the wheeled operad $\calP_0^{\circlearrowright}$.
Then they constructed a wheeled PROP isomorphism $\calC_{\calP_0^{\circlearrowright}} \xto{\cong} \calE $.
They constructed a morphism of wheeled PROPs $\varphi:\calH\to \calE$ and proposed the following conjecture.
\begin{conjecture}[Kawazumi--Vespa {\cite[Conjecture 6]{Kawazumi--Vespa}}]\label{conjectureKVorigin}
The morphism of wheeled PROP
$$\varphi: \calH\to \calE$$
is an isomorphism.
\end{conjecture}
Conjecture \ref{conjectureKVorigin} is equivalent to the following conjecture.
\begin{conjecture}[Kawazumi--Vespa]\label{conjectureKV}
Let $i,p,q$ be non-negative integers.
Then, for sufficiently large $n$, we have an isomorphism of $\Q[\gpS_{p}\times \gpS_{q}]$-modules
$$
H^{i}(\Aut(F_n), H^{p,q})=
\begin{cases}
\calC_{\calP_0^{\circlearrowright}}(p,q)& (i=p-q)\\
0 & (i\neq p-q).
\end{cases}
$$
\end{conjecture}
\subsection{The structure of $H_A^*(\IA_n,\Q)$}
We defined the traceless part $W_*$ of the graded-symmetric algebra $S^*(U_*)$ of $U_*$ in Section \ref{Generalpart}.
Here, we reconstruct $W_*$ by using the operad $\calC om$.
Let $\calO=\bigoplus_{k\ge 2}\calP_0(k)$ denote the non-unital suboperad of $\calP_0$.
We have a non-unital wheeled sub-PROP $\calC_{\calO^{\circlearrowright}}$ of $\calC_{\calP_0^{\circlearrowright}}$ associated to the non-unital wheeled operad $\calO^{\circlearrowright}$.
Then we have
$\calO^{\circlearrowright}_{0}=\{\calO^{\circlearrowright}(n,1)\}_{n\ge 2}$ and $\calO^{\circlearrowright}_{w}=\{\calO^{\circlearrowright}(n,0)\}_{n\ge 1}$.
We can reconstruct $W_*$ by using the non-unital wheeled PROP $\calC_{\calO^{\circlearrowright}}$.
\begin{proposition}\label{Wiprop}
Let $i$ be a non-negative integer. Then, for sufficiently large $n$, we have a $\GL(n,\Q)$-isomorphism
\begin{gather*}
W_i\cong \bigoplus_{a-b=i}T_{a,b}\otimes_{\Q[\gpS_a\times \gpS_b]} \calC_{\calO^{\circlearrowright}}(a,b).
\end{gather*}
Here the direct sum is finite.
\end{proposition}
\begin{proof}
Since $T_{b+i,b}$ is the traceless part of $H^{b+i,b}$ and we have $W_i=\wti{S}^* (U_*)_i$, it suffices to show that
$$
S^* (U_*)_i\cong \bigoplus_{b\ge 0}H^{b+i,b} \otimes_{\Q[\gpS_{b+i}\times \gpS_b]} \calC_{\calO^{\circlearrowright}}(b+i,b).
$$
By \eqref{freePROP}, we have
$$
\calC_{\calO^{\circlearrowright}}(b+i,b)
=\bigoplus_{\substack{J\subset [b+i]\\ f:J\twoheadrightarrow [b]}}\bigoplus_{\substack{1\le k\le |[b+i]\setminus J|\\ (X_1,\cdots,X_k)\in P([b+i]\setminus J,k)}}
\left(\bigotimes_{j=1}^{b}\calO^{\circlearrowright}_0(|f^{-1}(j)|) \right) \otimes \left(\bigotimes_{j=1}^{k}\calO^{\circlearrowright}_w(|X_j|)\right).
$$
Since we have $\calO^{\circlearrowright}_{0}=\{\calO^{\circlearrowright}(n,1)\}_{n\ge 2}$, we have only to consider $f$ such that $|f^{-1}(j)|\ge 2$ for each $j\in [b]$. Therefore, we have
\begin{gather*}
\begin{split}
&\calC_{\calO^{\circlearrowright}}(b+i,b)\\
&=\bigoplus_{\substack{(\mu,\nu)\vdash i \\ l(\mu)=b}}
\operatorname{Ind}_
{\prod_{j=1}^{r}(\gpS_{\mu_j+1}\wr \gpS_{k'_j})\times \prod_{j=1}^{s}(\gpS_{\nu_j}\wr \gpS_{k''_j})}
^{\gpS_{b+i}\times \gpS_{b}}
\left(\bigotimes_{j=1}^{r} \calO(\mu_j+1)^{\otimes k'_j} \right)
\otimes
\left(\bigotimes_{j=1}^{s} \calO_w^{\circlearrowright}(\nu_j)^{\otimes k''_j} \right),
\end{split}
\end{gather*}
where we write $\mu=(\mu_1^{k'_1},\cdots,\mu_r^{k'_r})$ and $\nu=(\nu_1^{k''_1},\cdots,\nu_s^{k''_s})$, and where we consider $\prod_{j=1}^{r}(\gpS_{\mu_j+1}\wr \gpS_{k'_j})\times \prod_{j=1}^{s}(\gpS_{\nu_j}\wr \gpS_{k''_j})$ as a subgroup of $\gpS_{b+i}\times \{1\}\subset \gpS_{b+i}\times \gpS_{b}$.
Let $\gpS(\mu)=\prod_{j=1}^{r}(\gpS_{\mu_j+1}\wr \gpS_{k'_j})$, $\gpS(\nu)=\prod_{j=1}^{s}(\gpS_{\nu_j}\wr \gpS_{k''_j})$ and $\gpS(\mu,\nu)=\gpS(\mu)\times \gpS(\nu)$.
Since we have $\calO(\mu_j+1)=\sgn_{\mu_j+1}[\mu_j]$ and $\calO_w^{\circlearrowright}(\nu_j)=\sgn_{\nu_j}[\nu_j-1]$, we have
\begin{gather*}
\begin{split}
&\bigoplus_{b\ge 0}H^{b+i,b} \otimes_{\Q[\gpS_{b+i}\times \gpS_b]} \calC_{\calO^{\circlearrowright}}(b+i,b)\\
&\cong
\bigoplus_{b\ge 0}\bigoplus_{\substack{(\mu,\nu)\vdash i \\ l(\mu)=b}}
H^{b+i,b} \otimes_{\Q[\gpS_{b+i}\times \gpS_b]}
\operatorname{Ind}_{\gpS(\mu,\nu)}^{\gpS_{b+i}\times \gpS_{b}}
\left(\bigotimes_{j=1}^{r} \calO(\mu_j+1)^{\otimes k'_j} \right)
\otimes
\left(\bigotimes_{j=1}^{s} \calO_w^{\circlearrowright}(\nu_j)^{\otimes k''_j} \right)\\
&\cong
\bigoplus_{b\ge 0}\bigoplus_{\substack{(\mu,\nu)\vdash i \\ l(\mu)=b}}
H^{b+i,b} \otimes_{\Q[\gpS(\mu,\nu)]}
\left(\bigotimes_{j=1}^{r} \calO(\mu_j+1)^{\otimes k'_j} \right)
\otimes
\left(\bigotimes_{j=1}^{s} \calO_w^{\circlearrowright}(\nu_j)^{\otimes k''_j} \right)\\
&\cong
\bigoplus_{b\ge 0}\bigoplus_{\substack{(\mu,\nu)\vdash i \\ l(\mu)=b}}
\bigotimes_{j=1}^{r} \left(H^{k'_j(\mu_j+1), k'_j} \otimes_{\Q[\gpS_{\mu_j+1}\wr \gpS_{k'_j}]} \calO(\mu_j+1)^{\otimes k'_j}\right)\\
&\quad \quad \quad \quad \quad \otimes
\bigotimes_{j=1}^{s} \left(H^{k''_j \nu_j, 0} \otimes_{\Q[\gpS_{\nu_j}\wr \gpS_{k''_j}]} \calO_w^{\circlearrowright}(\nu_j)^{\otimes k''_j}\right)
\\
&\cong
\bigoplus_{b\ge 0}\bigoplus_{\substack{(\mu,\nu)\vdash i \\ l(\mu)=b}}
\left(\bigotimes_{j=1}^r S^{k_j'}\left(U_{\ti{\mu}_j}^{\tree}\right) \otimes\;
\bigotimes_{j=1}^s S^{k_j''}\left(U_{\ti{\nu}_j}^{\wheel}\right)\right)\\
&\cong
S^* (U_*)_i.
\end{split}
\end{gather*}
This completes the proof.
\end{proof}
By Proposition \ref{Wiprop}, for sufficiently large $n$, we have a $\GL(n,\Q)$-isomorphism
\begin{gather}\label{W^*PROP}
W_i^*\cong \bigoplus_{a-b=i}T_{b,a}\otimes_{\Q[\gpS_a\times \gpS_b]} \calC_{\calO^{\circlearrowright}}(a,b).
\end{gather}
Then we have the following relation between $W_i^*$ and the wheeled PROP $\calC_{\calP_0^{\circlearrowright}}$.
\begin{lemma}\label{lemmawheeledPROP}
Let $i,p,q$ be non-negative integers.
Then, for sufficiently large $n$, we have an isomorphism of $\Q[\gpS_{p}\times \gpS_{q}]$-modules
$$
(W_i^* \otimes H^{p,q})^{\GL(n,\Z)}
\cong
\begin{cases}
\calC_{\calP_0^{\circlearrowright}}(p,q)& (i=p-q)\\
0 & (i\neq p-q).
\end{cases}
$$
\end{lemma}
\begin{proof}
We have $H^{p,q}\cong \bigoplus_{c=0}^{\min(p,q)}T_{p-c,q-c}^{\oplus \binom{p}{c} \binom{q}{c} c!}$.
Therefore, by \eqref{W^*PROP}, we stably have isomorphisms of $\Q[\gpS_{p}\times \gpS_{q}]$-modules
\begin{gather*}
\begin{split}
&((W_*)^* \otimes H^{p,q})^{\GL(n,\Z)}\\
&\cong \left(\left(\bigoplus_{a,b}T_{b,a}\otimes_{\Q[\gpS_a\times \gpS_b]}\calC_{\calO^{\circlearrowright}}(a,b)\right)\otimes \left(\bigoplus_{c=0}^{\min(p,q)}T_{p-c,q-c}^{\oplus \binom{p}{c} \binom{q}{c} c!}\right)\right)^{\GL(n,\Z)}\\
&\cong \bigoplus_{a,b}\bigoplus_{c=0}^{\min(p,q)} \left(T_{p-c,q-c}^{\oplus \binom{p}{c} \binom{q}{c} c!}\otimes T_{b,a}\right)^{\GL(n,\Z)} \otimes_{\Q[\gpS_a\times \gpS_b]}\calC_{\calO^{\circlearrowright}}(a,b) \\
&\cong \bigoplus_{c=0}^{\min(p,q)}\left(T_{p-c,q-c}^{\oplus \binom{p}{c} \binom{q}{c} c!}\otimes T_{q-c,p-c}\right)^{\GL(n,\Z)} \otimes_{\Q[\gpS_{p-c}\times \gpS_{q-c}]}\calC_{\calO^{\circlearrowright}}(p-c,q-c) \\
&\cong \bigoplus_{c=0}^{\min(p,q)}\left(T_{p-c,q-c}\otimes T_{q-c,p-c}\right)^{\GL(n,\Z)} \otimes_{\Q[\gpS_{p-c}\times \gpS_{q-c}]}\calC_{\calO^{\circlearrowright}}(p-c,q-c) ^{\oplus \binom{p}{c} \binom{q}{c} c!}\\
&\cong \bigoplus_{c=0}^{\min(p,q)} \Q[\gpS_{p-c}\times \gpS_{q-c}] \otimes_{\Q[\gpS_{p-c}\times \gpS_{q-c}]}\calC_{\calO^{\circlearrowright}}(p-c,q-c) ^{\oplus \binom{p}{c} \binom{q}{c} c!}\\
&\cong \bigoplus_{c=0}^{\min(p,q)}\calC_{\calO^{\circlearrowright}}(p-c,q-c)^{\oplus \binom{p}{c} \binom{q}{c} c!}\\
&\cong \calC_{\calP_0^{\circlearrowright}}(p,q).
\end{split}
\end{gather*}
\end{proof}
\subsection{Relation between $H_A^*(\IA_n, V)$ and $H^*(\Aut(F_n), V)$}
We make the following conjecture about the Albanese cohomology of $\IA_n$ and the cohomology of $\Aut(F_n)$ with twisted coefficients.
\begin{conjecture}\label{cohomologyAut}
Let $i$ be a non-negative integer and $\ul\lambda$ a bipartition.
Then, for sufficiently large $n$, we have a linear isomorphism
$$
H^i(\Aut(F_n),V_{\ul\lambda})\cong H_A^i(\IA_n,V_{\ul\lambda})^{\GL(n,\Z)}.
$$
\end{conjecture}
We can check that Conjecture \ref{cohomologyAut} holds for $i\le 3$ and $\ul\lambda=(\lambda^+,0), (0,\lambda^-)$.
Conjecture \ref{cohomologyAut} is equivalent to the following conjecture since $H^{p,q}$ is decomposed into the direct sum of $V_{\ul\lambda}$'s.
\begin{conjecture}\label{cohomologyAutH}
Let $i,p,q$ be non-negative integers.
Then, for sufficiently large $n$, we have an isomorphism of $\Q[\gpS_{p}\times \gpS_{q}]$-modules
$$
H^i(\Aut(F_n),H^{p,q})\cong H_A^i(\IA_n,H^{p,q})^{\GL(n,\Z)}.
$$
\end{conjecture}
We have the following relation between conjectures about the structure of $H_A^*(\IA_n,\Q)$ and $H^*(\Aut(F_n),V)$.
\begin{proposition}\label{AlbaneseandAut}
Let $i$ be a non-negative integer.
If two of the followings hold, then so does the third:
\begin{enumerate}
\item We have a $\GL(n,\Q)$-isomorphism $H^A_i(\IA_n,\Q)\cong W_i$ for sufficiently large $n$ (cf. Conjecture \ref{conjectureAlbanese}).
\item Conjecture \ref{conjectureKV} holds for cohomological degree $i$.
\item Conjecture \ref{cohomologyAut} holds for cohomological degree $i$.
\end{enumerate}
\end{proposition}
\begin{proof}
Since $W_i^*$ and $H^i_A(\IA_n,\Q)$ are algebraic $\GL(n,\Q)$-representations, (1) is equivalent to the following statement:
for any $p,q$, for sufficiently large $n$, we have
$$(H^i_A(\IA_n,\Q)\otimes H^{p,q})^{\GL(n,\Z)}\cong (W_i^* \otimes H^{p,q})^{\GL(n,\Z)}.$$
We have the following loop of possible isomorphisms for sufficiently large $n$
\begin{gather*}
\begin{split}
H^i_A(\IA_n,H^{p,q})^{\GL(n,\Z)}
&\cong (H^i_A(\IA_n,\Q)\otimes H^{p,q})^{\GL(n,\Z)}\\
&\underset{(1)}{\cong} (W_i^* \otimes H^{p,q})^{\GL(n,\Z)}\\
&\underset{\text{Lemma \ref{lemmawheeledPROP}}}{\cong}
\begin{cases}
\calC_{\calP_0^{\circlearrowright}}(p,q)& (i=p-q)\\
0 & (i\neq p-q)
\end{cases}\\
&\underset{(2)}{\cong} H^i(\Aut(F_n),H^{p,q})\\
&\underset{(3)}{\cong} H^i_A(\IA_n,H^{p,q})^{\GL(n,\Z)},
\end{split}
\end{gather*}
which completes the proof.
\end{proof}
It is well known that $\Aut(F_{2g})$ includes the mapping class group $\calM_{g,1}$ of a surface of genus $g$ with one boundary component as a subgroup.
For the cohomology of $\calM_{g,1}$ with twisted coefficients, we stably have the following isomorphism
\begin{equation}\label{mcglie}
H^*(\calM_{g,1},H^{\otimes p})\cong (H^*(\Gr\mathfrak{u}_{g,1},\Q)\otimes H^{\otimes p})^{\Sp(2g,\Q)}
\end{equation}
(see \cite[Theorem 16.3]{Hainsurvey}, and see Section \ref{secLiecohom} for the definition of $\Gr \mathfrak{u}_{g,1}$).
We also have the variants of \eqref{mcglie} for the mapping class groups $\calM_{g}$ of a closed surface of genus $g$ and $\calM_{g}^{1}$ of a surface of genus $g$ with one marked point, respectively, as Garoufalidis--Getzler \cite{GG} first claimed.
A natural analogy of the isomorphism \eqref{mcglie} to $\Aut(F_n)$ is the following.
\begin{conjecture}\label{cohomologyAutHlie}
Let $i,p,q$ be non-negative integers.
For sufficiently large $n$, we have an isomorphism of $\Q[\gpS_{p}\times \gpS_{q}]$-modules
$$
H^i(\Aut(F_n),H^{p,q})\cong (H^i(\Gr \IA_n \otimes \Q,\Q)\otimes H^{p,q})^{\GL(n,\Z)},
$$
where $\Gr \IA_n$ is the graded Lie algebra of $\IA_n$ associated to the Andreadakis filtration of $\Aut(F_n)$.
\end{conjecture}
Based on Conjectures \ref{cohomologyAutH} and \ref{cohomologyAutHlie}, we make the following conjecture.
\begin{conjecture}\label{IAalbandGRIA}
We stably have an isomorphism of graded $\GL(n,\Q)$-representations
$$H_A^*(\IA_n,\Q)\cong H^*(\Gr \IA_n \otimes \Q,\Q).$$
\end{conjecture}
If $\Gr \IA_n\otimes \Q$ is stably quadratically presented and stably Koszul, then we stably have a surjective morphism of graded $\GL(n,\Q)$-representations $H^*(\Gr \IA_n \otimes \Q,\Q)\twoheadrightarrow H_A^*(\IA_n,\Q)$. See Section \ref{conjTorellialb} for the cases of the Torelli groups.
\section{Algebraic $\Sp(2g,\Q)$-representations}\label{Sprep}
In this section, we recall representation theory of $\Sp(2g,\Q)$ and introduce the notion of traceless tensor products of $\Sp(2g,\Q)$-representations by adapting definitions in Section \ref{Preliminary}.
\subsection{Irreducible $\Sp(2g,\Q)$-representations}
Here, we fix a symplectic basis $\{a_i,b_i\mid 1\le i\le g\}$ for $H_1(\Sigma_g,\Q)$, and let $H=H_1(\Sigma_g,\Q)$, where $\Sigma_g$ is a closed surface of genus $g$.
Let $Q: H\otimes H\to \Q$ denote the \emph{symplectic form} such that $Q(a_i,b_i)=-Q(b_i,a_i)=1$ for each $1\le i\le g$.
For distinct elements $k, l\in [p]$, the \emph{contraction map}
$$
c^{\Sp}_{k,l}: H^{\otimes p}\to H^{\otimes p-2}
$$
is defined in a way similar to that of $\GL(n,\Q)$-representations by using the symplectic form $Q$.
We can define the \emph{traceless part} $T_{p}$ of $H^{\otimes p}$ as $\Sp(2g,\Q)$-representations by
$$
T_{p}=\bigcap_{1\le k<l\le p} \ker c^{\Sp}_{k,l}\subset H^{\otimes p}.
$$
For a partition $\lambda\vdash p$, let
$$V^{\Sp}_{\lambda}=T_{p}\cap V_{\lambda}\subset H^{\otimes p}.$$
If $\lambda$ has at most $g$ parts, then $V^{\Sp}_{\lambda}$ is an irreducible $\Sp(2g,\Q)$-representation corresponding to $\lambda$, and otherwise, we have $V^{\Sp}_{\lambda}=0$.
The irreducible representation $V^{\Sp}_{\lambda}$ can also be constructed as the image of the Young symmetrizer $c_{\lambda}: T_{p}\to T_{p}$, and it follows that $V^{\Sp}_{\lambda}$ is generated by $(a_1\wedge \cdots \wedge a_{\mu_1})\otimes \cdots \otimes (a_1\wedge \cdots \wedge a_{\mu_l})$, where $\mu=(\mu_1,\cdots, \mu_l)$ is the conjugate of $\lambda$.
See \cite{FH, Lindell} for more details.
We have the following irreducible decomposition of the tensor product of two irreducible $\Sp(2g,\Q)$-representations $V^{\Sp}_{\lambda}$ and $V^{\Sp}_{\mu}$
$$
V^{\Sp}_{\lambda}\otimes V^{\Sp}_{\mu}=\bigoplus_{\nu} (V^{\Sp}_{\nu})^{\oplus (N^{\Sp})_{\lambda \mu}^{\nu}},\quad
(N^{\Sp})_{\lambda\mu}^{\nu}=\sum_{\zeta,\sigma,\tau}N_{\zeta\sigma}^{\lambda} \; N_{\zeta\tau}^{\mu}\; N_{\sigma\tau}^{\nu},
$$
where the $N$'s denote the Littlewood--Richardson coefficients (see \cite[Section 25.3]{FH}).
We call an $\Sp(2g,\Q)$-representation $V$ \emph{algebraic} if after choosing a basis for $V$, the $(\dim V)^2$ coordinate functions of the action $\Sp(2g,\Q)\to \GL(V)$ are rational functions of the $(2g)^2$ variables.
\subsection{Traceless tensor products of algebraic $\Sp(2g,\Q)$-representations}
The \emph{traceless tensor products} of algebraic $\Sp(2g,\Q)$-representations can be defined in a way similar to those of $\GL(n,\Q)$-representations in Section \ref{Preliminary}.
Let $\lambda \vdash p$ and $\mu\vdash q$.
The \emph{traceless tensor product}
$V^{\Sp}_{\lambda}\wti{\otimes} V^{\Sp}_{\mu}$ of $V^{\Sp}_{\lambda}$ and $V^{\Sp}_{\mu}$ is
$$V^{\Sp}_{\lambda}\wti{\otimes} V^{\Sp}_{\mu}=(V^{\Sp}_{\lambda}\otimes V^{\Sp}_{\mu})\cap T_{p+q}\subset H^{\otimes (p+q)}.$$
In other words, $V^{\Sp}_{\lambda}\wti{\otimes} V^{\Sp}_{\mu}$ is a subrepresentation of $V^{\Sp}_{\lambda}\otimes V^{\Sp}_{\mu}$ which vanishes under any contraction maps.
For $g\ge l(\lambda)+l(\mu)$, we have
$$V^{\Sp}_{\lambda}\wti{\otimes} V^{\Sp}_{\mu}\cong \bigoplus_{|\nu|= p+q} (V^{\Sp}_{\nu})^{\oplus (N^{\Sp})_{\lambda \mu}^{\nu}}\subset
\bigoplus_{\nu} (V^{\Sp}_{\nu})^{\oplus (N^{\Sp})_{\lambda \mu}^{\nu}}
\cong V^{\Sp}_{\lambda}\otimes V^{\Sp}_{\mu}.$$
Let $M$ be an algebraic $\Sp(2g,\Q)$-representation. For each partition $\lambda$, define a vector space $$M_{\lambda}=\Hom_{\Sp(2g,\Q)}(V^{\Sp}_{\lambda},M).$$
Since the category of algebraic $\Sp(2g,\Q)$-representations is semisimple, we have a natural isomorphism
$$
\iota_M: M\xrightarrow{\cong} \bigoplus_{\lambda}V^{\Sp}_{\lambda}\otimes M_{\lambda}.
$$
For two algebraic $\Sp(2g,\Q)$-representations $M$ and $N$, we have an isomorphism
$$
\iota_M\otimes \iota_N: M\otimes N \xrightarrow{\cong} \left(\bigoplus_{\lambda}V^{\Sp}_{\lambda}\otimes M_{\lambda}\right)
\otimes
\left(\bigoplus_{\mu}V^{\Sp}_{\mu}\otimes N_{\mu}\right)
\cong
\bigoplus_{\lambda,\mu}(V^{\Sp}_{\lambda}\otimes V^{\Sp}_{\mu})\otimes (M_{\lambda}\otimes N_{\mu}).
$$
The \emph{traceless tensor product} $M \wti{\otimes} N$ of $M$ and $N$ is defined by
$$
M \wti{\otimes} N=(\iota_{M}\otimes \iota_{N})^{-1} \left(\bigoplus_{\lambda,\mu}(V^{\Sp}_{\lambda}\wti{\otimes} V^{\Sp}_{\mu})\otimes (M_{\lambda}\otimes N_{\mu})\right)\subset M\otimes N.
$$
The \emph{traceless part} $\wti{T}^*M$ (resp. $\wti{\bigwedge}^* M$, $\wti{\Sym}^* M$) of the tensor algebra $T^*M$ (resp. the exterior algebra $\bigwedge^* M$, the symmetric algebra $\Sym^* M$) is defined in the same way as in Section \ref{Preliminary}.
Let $M_*=\bigoplus_{i\ge 1} M_i$ be a graded algebraic $\Sp(2g,\Q)$-representation.
We can also define the \emph{traceless part} $\wti{S}^*(M_*)$ of the graded-symmetric algebra $S^*(M_*)$ as the image of $\wti{T}^*M_*$ under the projection $T^*M_*\twoheadrightarrow S^*(M_*)$.
We have the following relation between the traceless tensor products of $\Sp(2g,\Q)$-representations and those of $\GL(2g,\Q)$-representations.
\begin{lemma}\label{GLSPtl}
Let $M$ and $N$ be algebraic $\GL(2g,\Q)$-representations, which can be considered as algebraic $\Sp(2g,\Q)$-representations by restriction.
Let $M\wti{\otimes}^{\GL} N$ (resp. $M\wti{\otimes}^{\Sp} N$) denote the traceless tensor product of $M$ and $N$ as $\GL(2g,\Q)$-representations (resp. as $\Sp(2g,\Q)$-representations).
Then we have
\begin{equation}\label{tracelessSpGL}
M\wti{\otimes}^{\Sp} N \subset M\wti{\otimes}^{\GL} N.
\end{equation}
\end{lemma}
\begin{proof}
It suffices to prove \eqref{tracelessSpGL} for $M=V_{\ul\lambda}\subset H^{p,q}$ and $N=V_{\ul\mu}\subset H^{r,s}$, where $\ul\lambda$ and $\ul\mu$ are bipartitions.
By the definitions of the traceless tensor products, we have
$$
V_{\ul\lambda}\wti{\otimes}^{\GL} V_{\ul\mu}=(V_{\ul\lambda}\otimes V_{\ul\mu})\cap T_{p+r,q+s}
$$
and
$$
V_{\ul\lambda}\wti{\otimes}^{\Sp} V_{\ul\mu}= (V_{\ul\lambda}\otimes V_{\ul\mu})\cap \bigcap_{(k,l)\in J} \ker c^{\Sp}_{k,l},
$$
where $J$ consists of elements $(k,l)\in[p+q+r+s]^2$ such that $(k,l)\notin \{1,\cdots,p\}^2\cup \{p+1,\cdots,p+q\}^2\cup \{p+q+1,\cdots,p+q+r\}^2\cup \{p+q+r+1,\cdots,p+q+r+s\}^2$.
Since we have $\bigcap_{(k,l)\in J} \ker c^{\Sp}_{k,l} \subset T_{p+r,q+s}$, it follows that
$V_{\ul\lambda}\wti{\otimes}^{\Sp} V_{\ul\mu} \subset V_{\ul\lambda}\wti{\otimes}^{\GL} V_{\ul\mu}$.
\end{proof}
\section{On the Albanese cohomology of the Torelli groups}\label{problems}
Let $\I_{g}$ (resp. $\I_{g,1}$, $\I_{g}^{1}$) denote the Torelli group of an oriented closed surface of genus $g$ (resp. with one boundary component, with one marked point).
Here we adapt our arguments on $H^A_*(\IA_n,\Q)$ to $H^A_*(\I_{g},\Q)$, $H^A_*(\I_{g,1},\Q)$ and $H^A_*(\I_{g}^{1},\Q)$, which are algebraic $\Sp(2g,\Q)$-representations.
Note that the Albanese homology of the Torelli group is isomorphic to the Albanese cohomology of the Torelli group since the algebraic $\Sp(2g,\Q)$-representations are self-dual.
The Albanese cohomology of $\I_{g}$ of degree $\le 3$ has been determined by Johnson \cite{Johnson}, Hain \cite{Hain}, Sakasai \cite{Sakasai} and Kupers--Randal-Williams \cite{KRW}.
\subsection{Lindell's result about the Albanese homology of $\I_{g,1}$}\label{secLindell}
Lindell \cite{Lindell} detected some subquotient $\Sp(2g,\Q)$-representations of the Albanese homology of $\I_{g,1}$.
\begin{theorem}[{Lindell \cite[Theorem 1.5]{Lindell}}]
For a pair of partitions $(\lambda,\mu)\vdash i$ such that $\lambda=(\lambda_1^{k_1}>\cdots >\lambda_m^{k_m}>0)$, $\mu=(\mu_1^{l_1}>\cdots>\mu_{m+2}^{l_{m+2}}>0)$, $\mu_j=\lambda_j+2$,
for $g\ge i+2l(\lambda)+l(\mu)$,
the subrepresentation $W^{\I_{g,1}}_i(\lambda,\mu) \subset \bigotimes_{j=1}^{m+2}\bigwedge^{k_j+l_j}V^{\Sp}_{1^{\mu_j}}$
spanned by all irreducible subrepresentations of weight $i+2l(\lambda)$ is a subquotient $\Sp(2g,\Q)$-representation of $H^A_i(\I_{g,1},\Q)$.
\end{theorem}
We expect that one can adapt our argument of Theorem \ref{Johnsonpart} to the above result of Lindell to show that the direct sum $\overline{W}^{\I_{g,1}}_i$ of $W^{\I_{g,1}}_i(\lambda,\mu)$ is a subquotient representation of $H^A_i(\I_{g,1},\Q)$.
In Section \ref{conjTorellialb}, we will propose a conjectural structure of $H^A_*(\I_{g,1},\Q)$.
\subsection{Structures of the cohomology of Lie algebras associated to the Torelli groups}\label{secLiecohom}
Let $\mathfrak{t}_{g}$ denote the Malcev Lie algebra of $\I_{g}$, and $\mathfrak{u}_{g}$ the Lie algebra of the prounipotent radical of the relative Malcev completion of the mapping class group $\calM_{g}$ with respect to the short exact sequence $1\to \I_{g}\to \calM_{g}\to \Sp(2g,\Z)\to 1$. (See \cite{Hain} and \cite{KRW21} for details.)
Let $\Gr \mathfrak{t}_{g}$ (resp. $\Gr \mathfrak{u}_{g}$) denote the graded Lie algebra of $\mathfrak{t}_{g}$ (resp. $\mathfrak{u}_{g}$) associated to the lower central series.
The associated Lie algebras $\Gr \mathfrak{t}_{g,1}$ and $\Gr \mathfrak{u}_{g,1}$ of $\I_{g,1}$, and $\Gr \mathfrak{t}_{g}^{1}$ and $\Gr \mathfrak{u}_{g}^{1}$ of $\I_{g}^{1}$ are defined in a similar way.
For $g\ge 3$, we have central extensions
\begin{equation}\label{centralextension}
\Q[2]\to \Gr \mathfrak{t}_{g} \to \Gr \mathfrak{u}_{g}, \;\Q[2]\to \Gr \mathfrak{t}_{g,1} \to \Gr \mathfrak{u}_{g,1},\;\Q[2]\to \Gr \mathfrak{t}_{g}^{1} \to \Gr \mathfrak{u}_{g}^{1},
\end{equation}
\begin{equation}\label{extension}
\Q[2]\to \Gr \mathfrak{t}_{g,1} \to \Gr \mathfrak{t}_{g}^{1},
\end{equation}
where $\Q[2]$ is the graded Lie algebra concentrated in degree $2$, and an extension
\begin{equation}\label{puu}
\Gr \mathfrak{p}_{g}^{1}\to \Gr\mathfrak{u}_{g}^{1}\to \Gr\mathfrak{u}_{g},
\end{equation}
where $\mathfrak{p}_{g}^{1}$ is the Malcev Lie algebra of the fundamental group of a closed surface of genus $g$, given by \cite{Hain} (see also \cite[Lemma 3.2]{KRW21}).
Hain \cite{Hain} proved that $\Gr \mathfrak{t}_{g},\Gr \mathfrak{u}_{g},\Gr \mathfrak{t}_{g,1},\Gr \mathfrak{u}_{g,1} ,\Gr \mathfrak{t}_{g}^{1}$ and $\Gr \mathfrak{u}_{g}^{1}$ are quadratically presented for $g\ge 6$.
Kupers--Randal-Williams \cite{KRW21} proved that these graded Lie algebras are Koszul in a stable range.
In what follows, we study the structures of the cohomology of Lie algebras $\Gr\mathfrak{t}_{g}, \Gr\mathfrak{u}_{g}, \Gr\mathfrak{t}_{g,1}, \Gr\mathfrak{u}_{g,1}, \Gr\mathfrak{t}_{g}^{1}$ and $\Gr \mathfrak{u}_{g}^{1}$ by using computation of characters by Garoufalidis--Getzler \cite{GG}.
Consider a graded algebraic $\Sp(2g,\Q)$-representation $Y_*=\bigoplus_{i\ge 1}Y_i$, $Y_i=\bigwedge^{i+2}H$.
Also consider quotients $Y'_* = Y_* / (\Q[2])$, $X_*=Y_*/ (H[1])$ and $X'_*=X_*/ (\Q[2])$, where $\Q[2]\subset Y_{2}=\bigwedge^{4} H$ is the trivial $\Sp(2g,\Q)$-subrepresentation, and where $H[1]\subset Y_1= \bigwedge^{3}H$.
We also consider an extension $Z_*=Y_*\oplus (\Q[2])$, and let $Z'_*=Z_*/(\Q[2])= Y_*$.
Then we obtain the following structures of the cohomology of six Lie algebras.
\begin{proposition}\label{Liealgebracohomology}
We stably have isomorphisms of graded $\Sp(2g,\Q)$-representations
\begin{gather*}
\begin{split}
H^* (\Gr \mathfrak{u}_{g},\Q)\cong \wti{S}^*(X_*),& \quad H^* (\Gr \mathfrak{t}_{g},\Q)\cong \wti{S}^*(X'_*),\\
H^* (\Gr \mathfrak{u}_{g,1},\Q)\cong \wti{S}^*(Y_*),& \quad H^* (\Gr \mathfrak{t}_{g,1},\Q)\cong \wti{S}^*(Y'_*),\\
H^* (\Gr \mathfrak{u}_{g}^{1},\Q)\cong \wti{S}^*(Z_*),& \quad H^* (\Gr \mathfrak{t}_{g}^{1},\Q)\cong \wti{S}^*(Z'_*),
\end{split}
\end{gather*}
where stably means that for each cohomological degree $i$, we have isomorphisms for $g\ge 3i$.
\end{proposition}
We will review the computation of Garoufalidis--Getzler \cite[Theorem 1.1]{GG}.
Let $A=\bigwedge^*(V^{\Sp}_{1^3})/(V^{\Sp}_{2^2})$ be the quadratic algebra, that is, the quotient of the exterior algebra $\bigwedge^*(V^{\Sp}_{1^3})$ by the ideal generated by $V^{\Sp}_{2^2}\subset \bigwedge^2(V^{\Sp}_{1^3})$.
Let $A^1=\bigwedge^*(V^{\Sp}_{1^3}\oplus V^{\Sp}_{1})/(V^{\Sp}_{2^2}\oplus V^{\Sp}_{1^2})$ be the quadratic algebra defined similarly.
Then $A$ (resp. $A^1$) is the quadratic dual of the universal enveloping algebra of $\mathfrak{u}_{g}$ (resp. $\mathfrak{u}_{g}^{1}$).
\newcommand\ch{\mathrm{ch}_t}
\newcommand\Exp{\mathrm{Exp}}
Let $\Lambda$ denote the ring of symmetric functions.
Let $h_n$ denote the complete symmetric function, $e_n$ the elementary symmetric function, $p_n$ the power sum symmetric function, $s_{\lambda}$ the Schur function, $s_{\langle \lambda \rangle}$ the symplectic Schur function.
Let $\omega: \Lambda\to \Lambda,\; p_n \mapsto -p_n$ denote an algebra involution, which satisfies $\omega(h_n)=(-1)^n e_n$.
We have a linear automorphism of $\Lambda$
\begin{gather*}
\begin{split}
D:\Lambda\to \Lambda,\quad s_{\lambda}\mapsto s_{\langle \lambda \rangle},
\end{split}
\end{gather*}
and an operation
$$\Exp:\Lambda[[t]]\to \hat{\Lambda}[[t]],\quad f\mapsto \sum_{q=0}^{\infty}h_q\circ f,$$
where $h_q\circ f$ denotes the plethysm and $\hat{\Lambda}[[t]]$ is the completion of $\Lambda[[t]]$ with respect to the augmentation ideal.
For an algebraic $\Sp(2g,\Q)$-representation $V=\bigoplus_{\lambda} (V^{\Sp}_{\lambda})^{\oplus c(\lambda)}$, the \emph{character} $\mathrm{ch}(V)$ of $V$ is defined by $\mathrm{ch}(V)=\sum_{\lambda} c(\lambda)s_{\langle \lambda \rangle}\in \Lambda$.
The \emph{character} $\ch(M_*)$ of a graded algebraic $\Sp(2g,\Q)$-representation $M_*$ is defined by $\ch(M_*)=\sum_{q=0}^{\infty} (-t)^q \mathrm{ch}(M_q)\in \Lambda[[t]]$.
Let
$$L(t)=\sum_{q=1}^{\infty} \left(\sum_{r=0}^{\lfloor q+2/2\rfloor}h_{q+2-2r}\right)t^q\in \Lambda[[t]].$$
\begin{theorem}[Garoufalidis--Getzler {\cite[Theorem 1.1]{GG}}]
The characters $\ch(A)$ of $A$ and $\ch(A^1)$ of $A^1$ in $\Lambda[[t]]$ are
\begin{gather*}
\begin{split}
\ch(A)&= D\omega \Exp \left(-h_1 t+ L(t)
\right),\quad
\ch(A^1)= D\omega \Exp\left(h_0 t^2 +
L(t)
\right).
\end{split}
\end{gather*}
\end{theorem}
\begin{remark}
The above formula for $\ch(A^1)$ has one more copies of $h_0 t^2$ in the $\Exp(-)$ than the original one given in \cite[Theorem 1.1]{GG}.
By their proof, we have a stable isomorphism of algebras
$$
\C\langle \text{T-graphs} \rangle/ (\mathrm{IH}^1)\to (A^1\otimes T(H))^{\Sp},
$$
where the left-hand side is the quotient of the algebra of trivalent graphs with ordered legs modulo the $\mathrm{IH}^1$-relation, and where $T(H)=\bigoplus_{q=0}^{\infty}H^{\otimes q}$ is the tensor algebra.
Here, the $\mathrm{IH}^1$-relation is as follows: if a graph $G$ has a part of shape $I$ at most two of whose four endpoints are connected in $G$, then $G$ is identified with another graph which is obtained from $G$ by replacing the part of shape $I$ with a graph of shape $H$.
Therefore, in degree $2$, the theta-shaped graph, which they wrote as $e_{2,0}$, and the dumbbell-shaped graph, which has two loops connected to one edge, are not equivalent.
Hence, we need one more $h_0 t^2$ in the $\Exp(-)$ of $\ch(A^1)$.
\end{remark}
\begin{remark}\label{chA^1andchA}
Alternatively, we can compute the character $\ch(A^1)$ by using the character $\ch(A)$ and the Hochschild--Serre spectral sequence for the extension \eqref{puu} for $g\ge 3$.
Since the action of $\Gr \mathfrak{u}_{g}$ on $H^*(\Gr\mathfrak{p}_{g}^{1},\Q)=\Q[0]\oplus H[1]\oplus \Q[2]$ is trivial,
we have an isomorphism of graded $\Sp(2g,\Q)$-representations
$$
H^*(\Gr \mathfrak{u}_{g}^{1},\Q)\cong H^*(\Gr \mathfrak{u}_{g},\Q)\otimes H^*(\Gr\mathfrak{p}_{g}^{1},\Q).
$$
Therefore, we have
$$
\ch(A^1)= \ch(A) (1-h_1t +t^2).
$$
\end{remark}
\begin{proof}[Proof of Proposition \ref{Liealgebracohomology}]
We can check that for any graded $\Sp(2g,\Q)$-representation $M_*$, we have
$$
\ch(\wti{S}^*(M_*))= D \Exp(D^{-1} \ch(M_*)).
$$
The characters of $X_*, Y_*$ and $Z_*$ are
\begin{gather*}
\begin{split}
\ch(Y_*)&=D\sum_{q=1}^{\infty} \left(\sum_{r=0}^{\lfloor q+2/2\rfloor}e_{q+2-2r}\right)(-t)^q=D \omega \left(L(t)\right),\\
\ch(X_*)&=D \omega \left(-h_1 t + L(t)\right),\\
\ch(Z_*)&=D \omega \left(h_0 t^2 + L(t)\right).
\end{split}
\end{gather*}
It follows that
\begin{gather*}
\begin{split}
\ch(\wti{S}^*(X_*))
&=D \Exp(D^{-1} \ch(X_*))\\
&=D \Exp\left(\omega \left(-h_1 t + L(t)\right)\right)\\
&=D \omega \Exp\left(-h_1 t + L(t)\right)\\
&=\ch(A).
\end{split}
\end{gather*}
We have an isomorphism of graded $\Sp(2g,\Q)$-representations
$$H^* (\Gr \mathfrak{u}_{g},\Q)\cong A$$
for $g\ge 3*$, since $\Gr \mathfrak{u}_{g}$ is quadratically presented for $g\ge 6$, and Koszul for $g\ge 3*$.
Therefore, we have $H^* (\Gr \mathfrak{u}_{g},\Q)\cong \wti{S}^*(X_*)$. The case of $\Gr \mathfrak{u}_{g}^{1}$ is similar.
For the other four graded Lie algebras, we use the Hochschild--Serre spectral sequences for extensions \eqref{centralextension} and \eqref{extension}.
In what follows, we only consider the case of $\Gr \mathfrak{t}_{g}$.
We can check the other cases in a similar way.
For the extension $\Gr \mathfrak{t}_{g}$ of $\Gr \mathfrak{u}_{g}$, since the action of $\Gr \mathfrak{u}_{g}$ on $H^*(\Q[2],\Q)=H^0(\Q[2],\Q)\oplus H^1(\Q[2],\Q)=\Q[0]\oplus \Q[2]$ is trivial, we have
$$
H^*(\Gr \mathfrak{t}_{g},\Q)\cong H^*(\Gr \mathfrak{u}_{g},\Q)/(H^*(\Gr \mathfrak{u}_{g},\Q)[2]),
$$
where $H^*(\Gr \mathfrak{u}_{g},\Q)[2]$ denotes the degree-shift by $2$.
Therefore, we have
\begin{gather*}
\begin{split}
\ch(H^*(\Gr \mathfrak{t}_{g},\Q))
&=\ch(H^*(\Gr \mathfrak{u}_{g},\Q)) (1-t^2)\\
&=\left( D \omega \Exp\left(-h_1 t+
L(t)
\right)\right) \Exp(-t^2)\\
&= D\omega \Exp\left(-h_1 t -h_0 t^2 +
L(t)
\right)\\
&=\ch(\wti{S}^*(X'_*)).
\end{split}
\end{gather*}
Therefore, we have $H^*(\Gr \mathfrak{t}_{g},\Q)\cong \wti{S}^*(X'_*)$, which completes the proof.
\end{proof}
\subsection{Conjectural structures of the Albanese cohomology of the Torelli groups}\label{conjTorellialb}
Here we study the structures of the Albanese cohomology of $\I_{g}$, $\I_{g,1}$ and $\I_{g}^{1}$.
\begin{proposition}\label{Torellisurj}
We stably have surjective morphisms of graded $\Sp(2g,\Q)$-representations
\begin{gather*}
H^*(\Gr \mathfrak{t}_{g},\Q)\twoheadrightarrow H_A^*(\I_{g},\Q),\quad H^*(\Gr \mathfrak{t}_{g,1},\Q)\twoheadrightarrow H_A^*(\I_{g,1},\Q),\\
H^*(\Gr \mathfrak{t}_{g}^{1},\Q)\twoheadrightarrow H_A^*(\I_{g}^{1},\Q).
\end{gather*}
\end{proposition}
\begin{proof}
Let $A'$ denote the quadratic algebra $A'=\bigwedge^*(V^{\Sp}_{1^3})/(V^{\Sp}_{2^2}\oplus V^{\Sp}_{0})$.
Since $\Gr \mathfrak{t}_{g}$ is quadratically presented for $g\ge 6$ \cite{Hain} and stably Koszul \cite{KRW21}, in a way similar to the argument of \cite{GG}, we have an isomorphism of graded $\Sp(2g,\Q)$-representations
$$
H^*(\Gr \mathfrak{t}_{g},\Q)\cong A' \cong H^*(\I_{g}/\Gamma_{3}\I_{g},\Q),
$$
where $\Gamma_{3}\I_{g}$ is the third term of the lower central series of $\I_{g}$.
The natural projection $\I_{g}\twoheadrightarrow \I_{g}/\Gamma_{3}\I_{g}$ induces a surjective morphism of graded $\Sp(2g,\Q)$-representations
$$
H^*(\I_{g}/\Gamma_{3}\I_{g},\Q)\twoheadrightarrow H_A^*(\I_{g},\Q).
$$
Therefore, we have a surjective morphism of graded $\Sp(2g,\Q)$-representations
$$
H^*(\Gr \mathfrak{t}_{g},\Q)\twoheadrightarrow H_A^*(\I_{g},\Q).
$$
Similar arguments hold for $\I_{g,1}$ and $\I_{g}^{1}$.
\end{proof}
By Proposition \ref{Torellisurj}, the Albanese cohomology of $\I_{g}, \I_{g,1}$ and $\I_{g}^{1}$ are quotient $\Sp(2g,\Q)$-representations of the cohomology of $\Gr \mathfrak{t}_{g}$, $\Gr \mathfrak{t}_{g,1}$ and $\Gr \mathfrak{t}_{g}^{1}$, respectively.
In what follows, we propose conjectural structures of the Albanese cohomology of $\I_{g}, \I_{g,1}$ and $\I_{g}^{1}$.
Consider the quotients $X''_*= X_* / (\bigoplus_{i\ge 1}\Q[4i-2])$, $Y''_*= Y_* / (\bigoplus_{i\ge 1}\Q[4i-2])$ and $Z''_*=Z_* / (\bigoplus_{i\ge 1}\Q[4i-2])$, where $\Q[4i-2]\subset\bigwedge^{4i} H$ is the trivial $\Sp(2g,\Q)$-subrepresentation.
\begin{conjecture}\label{Torellialb}
We stably have graded $\Sp(2g,\Q)$-isomorphisms
$$
H_A^*(\I_{g},\Q)\cong \wti{S}^*(X''_*), \quad
H_A^*(\I_{g,1},\Q)\cong \wti{S}^*(Y''_*),\quad
H_A^*(\I_{g}^{1},\Q)\cong \wti{S}^*(Z''_*).
$$
\end{conjecture}
We stably have $H_A^*(\I_{g},\Q)\cong \wti{S}^*(X''_*)$ in degree $\le 3$ by \cite{Hain, Sakasai, KRW}.
By the definition of $\wti{S}^*(Y''_*)$, we can check that the direct sum $\overline{W}^{\I_{g,1}}_i$, which we observed in Section \ref{secLindell}, is included in $\wti{S}^*(Y''_*)_i.$
Here, we will recall the result of Kupers--Randal-Williams \cite{KRW} and study the relation with Conjecture \ref{Torellialb}.
In \cite[Theorem 4.1 and Sections 6.2 and 8]{KRW}, they constructed an algebra homomorphism $\Phi:W\to H^*(\I_{g,1},\Q)$, where $W$ is an algebra whose character $\ch(W)$ is
$$
\ch(W)=D \omega \left(
\left(\prod_{4i>2} (1-t^{4i-2})\right)
\Exp \left(
\frac{\frac{1}{1-t^2}(\sum_{q=0}^{\infty}h_qt^q)- h_0(1+t^2)-h_1t-h_2t^2}{t^2}
\right)
\right).
$$
We can easily check that
\begin{equation}\label{KRWandtraceless}
\ch(W)=\ch(\wti{S}^*(Y''_*))
\end{equation}
since we have
$$
\ch(Y''_*)=D \omega \left(L(t)- \sum_{q=1}^{\infty}t^{4q-2}\right)
$$
and
$$
\ch(W)=D\omega \Exp\left(L(t)- \sum_{q=1}^{\infty}t^{4q-2}\right).
$$
In \cite{KRW}, they proved that for $N\ge 0$, if $H^*(\I_{g,1},\Q)$ is stably finite-dimensional for $*<N$, then $\Phi$ is an isomorphism for $*\le N$ and is injective for $*=N+1$.
Therefore, $H^i(\I_{g,1},\Q)$ contains an $\Sp(2g,\Z)$-subrepresentation which is isomorphic to $\wti{S}^*(Y''_*)_i$ for $i\le 3$.
In \cite[Sections 7 and 8.1]{KRW}, they also considered the cases for $\I_{g}$ and $\I_{g}^{1}$.
We can also check the variants of \eqref{KRWandtraceless} for these two cases by using Remark \ref{chA^1andchA}.
\begin{remark}
Note that in \cite{KRW}, they used a different definition of $\ch(W)=\sum_{q\ge 0}t^q \mathrm{ch}(W_q)$ and a different involution $\omega: p_n\mapsto (-1)^n p_n$ from ours.
\end{remark}
\begin{remark}\label{remarkKRW}
In \cite[Remark 8.2]{KRW}, they claimed that $H_A^3(\I_{g},\Q)$ has one fewer copies of $V^{\Sp}_{2^3 1^3}$ than the \emph{algebraic part} ${H^3(\I_{g},\Q)}^{\text{alg}}$ of $H^3(\I_{g},\Q)$, which is the union of algebraic subrepresentations of $H^3(\I_{g},\Q)$.
However, their computation of the characters of the third cohomology of $\I_{g}^{1}$ and $\I_{g}$ seems incorrect, and indeed it is possible that we have $H^3(\I_g,\Q)^{\text{alg}}=H_A^3(\I_g,\Q)$ for sufficiently large $g$.
\end{remark}
Kawazumi--Morita \cite{Kawazumi-Morita} studied the $\Sp$-invariant stable continuous cohomology $H_{c}^*(\lim_{g\to \infty} \I_{g,1},\Q)^{\Sp}$.
Their conjecture \cite[Conjecture 13.8]{Kawazumi-Morita}, which first appeared in \cite[Conjecture 3.4]{Morita1999}, is the following.
\begin{conjecture}[Kawazumi--Morita]\label{conjKM}
We stably have isomorphisms of graded algebras
$$H^*(\I_{g},\Q)^{\Sp(2g,\Z)}\cong \Q[e_2,e_4,\cdots],$$
where $e_{2i}$ is the Mumford--Morita--Miller class of degree $4i$.
\end{conjecture}
Furthermore, we make the following conjecture, which is closely related to, but different from, the above conjecture.
\begin{conjecture}\label{Torellialbsp}
We stably have isomorphisms of graded algebras
$$H_A^*(\I_{g},\Q)^{\Sp(2g,\Z)}\cong H_A^*(\I_{g,1},\Q)^{\Sp(2g,\Z)} \cong \Q[y_1,y_2,\cdots],$$
$$H_A^*(\I_{g}^{1},\Q)^{\Sp(2g,\Z)}\cong \Q[z,y_1,y_2,\cdots],$$
where $\deg y_i=4i$ and $\deg z=2$.
\end{conjecture}
\begin{proposition}
If Conjecture \ref{Torellialb} holds, then Conjecture \ref{Torellialbsp} holds.
\end{proposition}
\begin{proof}
We have a coalgebra structure on $\wti{S}^*(X''_*)$ induced by the coalgebra structure of $S^*(X''_*)$ defined in Section \ref{Preliminary}.
Since algebraic $\Sp(2g,\Q)$-representations are self-dual, we have an algebra structure on $\wti{S}^*(X''_*)$.
Therefore, we obtain an algebra structure on $\wti{S}^*(X''_*)^{\Sp(2g,\Z)}$.
For a graded algebraic $\Sp(2g,\Q)$-representation $M_*$,
we have
$$\wti{S}^*(M_*)^{\Sp(2g,\Z)}\cong S^*((M_*)^{\Sp(2g,\Z)}).$$
Since we stably have
$$(X''_*)^{\Sp(2g,\Z)}=(Y''_*)^{\Sp(2g,\Z)}=\bigoplus_{j\ge 1}\Q[4j],\quad (Z''_*)^{\Sp(2g,\Z)}=\Q[2]\oplus(\bigoplus_{j\ge 1}\Q[4j]),$$
we stably have isomorphisms of graded algebras
$$
\wti{S}^*(X''_*)^{\Sp(2g,\Z)}\cong \wti{S}^*(Y''_*)^{\Sp(2g,\Z)}\cong \Q[y_1,y_2,\cdots],\quad \wti{S}^*(Z''_*)^{\Sp(2g,\Z)}\cong \Q[z,y_1,y_2,\cdots],
$$
where $\deg y_i=4i$, and $\deg z=2$.
Therefore, if Conjecture \ref{Torellialb} holds, then Conjecture \ref{Torellialbsp} holds.
\end{proof}
\subsection{Relation between $H^A_*(\I_{g},\Q)$, $H^A_*(\I_{g,1},\Q)$ and $H^A_*(\I_{g}^{1},\Q)$}
Let $g\ge 2$.
Let $\Sigma_g$ (resp. $\Sigma_{g,1}$, $\Sigma_{g}^{1}$) be a closed surface of genus $g$ (resp. with one boundary component, with one marked point).
Let $\calM_{g,1}$ (resp. $\calM_{g}^{1}$) denote the mapping class group of $\Sigma_{g,1}$ (resp. $\Sigma_{g}^{1}$).
We have an exact sequence of groups with $\calM_{g}^{1}$-actions
\begin{equation}\label{exactmarkedpoint}
1\to \pi_1(\Sigma_g)\to \I_{g}^{1}\to \I_{g}\to 1
\end{equation}
and an exact sequence of groups with $\calM_{g,1}$-actions
$$
1\to \pi_1(U\Sigma_g)\to \I_{g,1}\to \I_{g}\to 1,
$$
where $U\Sigma_g$ denotes the unit tangent bundle of $\Sigma_g$.
We have $H_*(\pi_1(\Sigma_g),\Q)\cong H_*(\Sigma_g,\Q)$ and $H_1(U\Sigma_g,\Q)\cong H_1(\Sigma_g,\Q)$.
By using Lemma \ref{cospectralsequence3} and Proposition \ref{spectralsequenceaction}, we obtain the following proposition.
\begin{proposition}\label{torelliinj}
(1) We have a graded $\Sp(2g,\Q)$-isomorphism
$$
H^A_*(\I_{g}^{1},\Q) \xrightarrow{\cong} H^A_*(\I_{g},\Q)\otimes H^A_*(\pi_1(\Sigma_g),\Q),
$$
where we have $H^A_*(\pi_1(\Sigma_g),\Q)\cong \Q[0]\oplus H[1]\oplus \Q[2]$.
(2) We have an injective graded $\Sp(2g,\Q)$-homomorphism
$$
H^A_*(\I_{g,1},\Q) \hookrightarrow H^A_*(\I_{g},\Q) \otimes H^A_*(\pi_1(U\Sigma_g),\Q),
$$
where we have
\begin{gather}\label{homologyofunittangentbundle}
H^A_i(\pi_1(U\Sigma_g),\Q)=\Q[0]\oplus H[1].
\end{gather}
\end{proposition}
\begin{proof}
In a way similar to the proof of Proposition \ref{AlbaneseIAandIO2}, for each $i\ge 0$, we obtain injective $\Sp(2g,\Q)$-homomorphisms
\begin{gather}\label{injtorellimark}
H^A_i(\I_{g}^{1},\Q) \hookrightarrow \bigoplus_{p+q=i}H^A_p(\I_{g},\Q)\otimes H^A_q(\pi_1(\Sigma_g),\Q),
\end{gather}
$$
H^A_i(\I_{g,1},\Q) \hookrightarrow \bigoplus_{p+q=i}H^A_p(\I_{g},\Q)\otimes H^A_q(\pi_1(U\Sigma_g),\Q).
$$
(1) We have $H^A_*(\pi_1(\Sigma_g),\Q)\cong \Q[0]\oplus H[1]\oplus \Q[2]$ since $H_*(\pi_1(\Sigma_g),\Q)\cong H_*(\Sigma_g,\Q)\cong \Q[0]\oplus H[1]\oplus \Q[2]$ and $H_*(\pi_1(\Sigma_g)^{\ab},\Q)\cong \bigwedge^* H$.
Consider the cohomological Hochschild--Serre spectral sequence for the exact sequence \eqref{exactmarkedpoint}.
We can easily check that $\I_{g}$ acts trivially on $H^*(\pi_1(\Sigma_g),\Q)$ and that the differentials $d_2^{0,1}$, $d_2^{0,2}$ and $d_3^{0,2}$ are zero maps.
Therefore, by Lemma \ref{cospectralsequence3}, the injective morphism \eqref{injtorellimark} is an isomorphism.
(2) It suffices to prove \eqref{homologyofunittangentbundle}.
By using the Hochschild--Serre spectral sequence for the exact sequence
$$1\to \Z\to \pi_1(U\Sigma_g)\to \pi_1(\Sigma_g)\to 1,$$
we have
\begin{gather*}
H_i(\pi_1(U\Sigma_g),\Q)=\Q[0]\oplus H[1]\oplus H[2]\oplus \Q[3].
\end{gather*}
We also have
$$
H_i(\pi_1(U\Sigma_g)^{\ab},\Q)=H_i(H_1(\Sigma_g,\Q),\Q)=\bigwedge^i H.
$$
Since the Johnson homomorphism is an $\Sp(2g,\Q)$-homomorphism, we obtain \eqref{homologyofunittangentbundle}, which completes the proof.
\end{proof}
\begin{remark}
The composition
$$s:\Sigma_{g,1}\xrightarrow{\text{section}} U\Sigma_{g,1}\hookrightarrow U\Sigma_g$$ induces an $\Sp(2g,\Q)$-homomorphism
$$s_*=H^A_i(\pi_1(s),\Q): H^A_i(\pi_1(\Sigma_{g,1}),\Q)\to H^A_i(\pi_1(U\Sigma_g),\Q),$$
which is an isomorphism by the equation \eqref{homologyofunittangentbundle}.
\end{remark}
\begin{remark}
The Albanese cohomology of the Torelli groups stably coincide with the algebraic parts of the cohomology of them in degree $\le 2$.
The case of $\I_{g}$ follows from \cite{Hain} and \cite{KRW}.
The case of $\I_{g}^{1}$ follows from \cite{KRW} and Proposition \ref{torelliinj}.
The case of $\I_{g,1}$ follows from \cite{KRW} and \cite{Lindell} since we have $\overline{W}^{\I_{g,1}}_2=\wti{S}^*(Y''_*)_2$.
As we mentioned in Remark \ref{remarkKRW}, we stably have $H_A^3(\I_{g},\Q)= H^3(\I_{g},\Q)^{\text{alg}}$ if $H^2(\I_{g},\Q)$ is stably finite-dimensional \cite{Sakasai, KRW}.
The same holds for $\I_{g}^{1}$ by Proposition \ref{torelliinj} and \cite{KRW}.
\end{remark}
\subsection{Albanese homology of $\IA_{2g}$ and $\I_{g,1}$}
We have an injective group homomorphism $\iota: \I_{g,1}\hookrightarrow \IA_{2g}$, which induces an injective homomorphism
$$\iota_*:H_i(H_1(\I_{g,1}),\Q)\to H_i(H_1(\IA_{2g}),\Q).$$
Let $\iota_*^A$ denote the restriction
$$
\iota_*^A: H^A_i(\I_{g,1},\Q)\to H^A_i(\IA_{2g},\Q)
$$
of $\iota_*$ to $H^A_i(\I_{g,1},\Q)$ and $H^A_i(\IA_{2g},\Q)$, which is also injective.
\begin{remark}
Recall Conjectures \ref{conjectureAlbanese} and \ref{Torellialb} for the structures of $H^A_*(\IA_{2g},\Q)$ and $H^A_*(\I_{g,1},\Q)$.
By Lemma \ref{GLSPtl}, we have
\begin{equation}\label{UY}
\wti{S}^*(Y''_*)\subset \wti{S}^*(U_*)=W_*
\end{equation}
since we have for $i\ge 1$
$$U_i=\Hom(H, \bigwedge^{i+1}H)\cong H^*\otimes \bigwedge^{i+1}H \cong H\otimes \bigwedge^{i+1}H\supset \bigwedge^{i+2}H\supset Y''_i$$ as $\Sp(2g,\Q)$-representations.
The inclusion \eqref{UY} conjecturally describes the injective $\Sp(2g,\Q)$-homomorphism
$\iota_*^A: H^A_i(\I_{g,1},\Q)\to H^A_i(\IA_{2g},\Q)$, where we consider $ H^A_i(\IA_{2g},\Q)$ as an $\Sp(2g,\Q)$-representation.
\end{remark}
We make the following conjecture about the image of $\iota_*^A$.
\begin{conjecture}\label{torelligroupandIA}
For $g\ge 3i$,
the image $\iota_* (H^A_i(\I_{g,1},\Q))$ generates $H^A_i(\IA_{2g},\Q)$ as $\GL(2g,\Q)$-representations.
\end{conjecture}
We can easily check that Conjecture \ref{torelligroupandIA} holds for $i=1$.
Conjecture \ref{torelligroupandIA} also holds for $i=2$, which can be verified by the abelian cycles $(\rho_1)^2\in H^A_2(\I_{4,1},\Q)$ and $\rho_2\in H^A_2(\I_{3,1},\Q)$ given in \cite{Lindell} and the irreducible decomposition of $H^A_2(\IA_{2g},\Q)$ as $\GL(2g,\Q)$-representations \cite{Pettet}.
|
\section{Introduction}
\label{sec:introduction}
Particle swarm optimization (PSO) is a metaheuristic optimization approach that imitates the dynamics of biological systems such as the swarm of birds. Kennedy and
Eberhart \cite{kennedy1995particle} published the first seminal paper on PSO. As a result, the variety of research articles ascribed to the development of particle swarm optimization and swarm intelligence grown massively. The PSO algorithm is simple to implement and has a low memory requirements. Consequently, it has been used in a multitude of complex applications that involve optimization, control, machine learning, and so on.
PSO is widely used in the design, sizing, control and maximum power point tracking (MPPT) of renewable energy systems; such as photovoltaic (PV) systems \cite{harrag2019pso,eltamaly2020performance,shaqarin2021modified}, wind turbines \cite{aguilar2020multi,kamarzarrin2020intelligent,sushmitha2021novel} and Hybrid PV-wind systems \cite{ghorbani2018optimizing,saad2021implementation,el2022sizing}. The authors in \cite{yifei2018research,wu2021motion,zhang2022pso} implemented PSO in the control of robotics for various applications. PSO is also popular in unmanned vehicles in performing path planning \cite{guo2020global,tavoosi2020optimized} and path tracking \cite{al2015path,amer2018path,jiang2022model}.
PSO has been implemented widley in the sizing, design,
modeling, and control of various typres of refrigeration system, such as reducing power consumption of multiple chiller systems \cite{beghi2012pso}, optimizing cascade refrigeration cycles \cite{ghorbani2014optimization}, standing wave thermoacoustic refrigerators \cite{rahman2019single} and vapor compression refrigeration cycles \cite{kong2021global}.
Nevertheless, while PSO is efficient in optimizing multidimensional complexities \cite{huang2019memetic}, its drawbacks involve premature convergence and stagnation to local optima \cite{jiao2008elite,chen2010simplified,liu2016topology,pahnehkolaei2022analytical,ramirez2022pso,he2022semi}, as well as a slow convergence rate \cite{jiao2008elite,chen2010simplified,he2022semi,liu2018particle,ramirez2022pso}. According to Jiao \emph{et al.} and Chen \cite{jiao2008elite,chen2010simplified}, the drawbacks of PSO originates from its own structure. The social model readily falls into local optima, practically, each particle in PSO follows rather dynamically the path of the global best position. This global best could be influenced by a local minimum, which leads all particles to a position with poor fitness. Whereas, the cognitive model has the drawback of slow convergence especially in the final phases of the evolving iterations when tackling various complexities.
This motivates the particles' classifications in order to treat each category with different updating strategy to achieve better convergence rates and to enhance global explorations capabilities \cite{angeline1998using,parrott2006locating,chen2010simplified,zheng2018fault}.
The authors in \cite{angeline1998using,jiao2008elite,yang2015improved,alshammari2020elitist,yang2021quantum} implemented the particle elitism approach to speed up the convergence of PSO. Elitism is a process in which particles with poor fitness values are replaced with particles with the best fitness value (elite particles) after a certain number of iterations, resulting in the production of a new swarm with a better particle's average fitness. The elitism process in nature requires a preliminary step which is the particle classification, in order to distinguish poor and elite particles. This process will indeed speed up the convergence but on the other hand, it will lessen the diversity of the particles and may increase the probability of falling into a local optimum.
Beneficial to boost particle swarm diversity and mitigate the risk of falling into local optimum. References \cite{higashi2003particle,jiao2008elite,zhang2019differential,wang2021exergoeconomic,lu2022comprehensive} proposed the concept of mutation in PSO algorithm to improve the convergence accuracy and speed. In the literature there are mainly two mutation's types implemented in the PSO algorithm. The first one is the global best mutation as proposed by \cite{jiao2008elite,lu2022comprehensive}, in which the particles' position are mutated indirectly in response to the change of global best. The second type is the direct position mutation as reported by \cite{wang2021exergoeconomic}, which is better emulating the mutation process inspired by genetic algorithms (GA). The mutation process will enhance the diversity of the swarm which results in better exploration capabilities but it may slow down the convergence as reported by \cite{wang2021exergoeconomic}. This can be explained by the fact that mutation will indeed be useful to poor or moderate particles but it may also deteriorate the fitness of good particle.
In this work, the basic PSO will be highlighted along with several PSO variants that involve the three key elements affecting the convergence speed and global exploration capabilities; particle's classification, elitism and mutation. The proposed PSO method, particle swarm optimization with targeted position-mutated elitism (PSO-TPME), will benefits from these key features in order to enhance both convergence speed and the global exploration capabilities, by introducing an alternative classification technique, elitism and targeted position mutation in the PSO algorithm. The proposed algorithm will be tested on multidimensional benchmark functions with various complexities.
\section{Materials and Methods}
\subsection{Particel swarm optimization (PSO)}
PSO's method generates a swarm of particles at random positions to represent possible solutions to an optimization task throughout the parameter space. The particle locations are hence iterated with the target of achieving a global optimum of a fitness value. The algorithm then examines each particle's position and stores the best solution for each particle, which is called personal best ($P_b$). Moreover, during every iteration ($It$), PSO records the best solution throughout the swarm, which is called global best ($G_b$). For every subsequent iteration, the particles' position ($x$) and velocity ($v$) are determined as a function of the swarm's best position (social component), the particle's best personal position (the cognitive component), and its prior velocity (memory component). In general, PSO has several versions, linearly decreasing weight particle swarm optimization is one of the basic versions of PSO, known as LDW-PSO, that reads;
\begin{equation}
\label{eq::pso_v}
v_{ij}^{k+1}=wv_{ij}^{k}+c_{1}r_{1}({P_b}_{ij}-x_{ij}^{k})+c_{2}r_{2}({G_b}_{j}-x_{ij}^{k})
\end{equation}
\begin{equation}
\label{eq::pso_x}
x_{ij}^{k+1}=x_{ij}^{k}+v_{ij}^{k+1}
\end{equation}
\begin{equation}
\label{eq::pso_ldw}
w=w_{max}-It\times\frac{(w_{max}-w_{min} ) }{It_{max}}
\end{equation}
The subscript $_i$ is ranging from 1 to $N$ number of particles and the subscript $_j$ is ranging from 1 to $n$ dimensions. The factor $w$ is known as the inertia weight, $w_{max}$ and $w_{min}$ are the maximum and the minimum inertia weight, respectively, and the product $wv$ represents the particle's momentum. The acceleration factors are $c_1$ and $c_2$, while $r_1$ and $r_2$ are the output of random generators ranging from 0 to 1.
\subsection{PSO with classification}
Chen \cite{chen2010simplified} proposed PSO-M, a study on particle classification that improves the convergence rate and convergence accuracy of PSO. The classification is based on observing the particles' fitness value at each iteration, identifying the particles' fitness mean ($aver$) and also the best and worst fitness values, ($f_{max}$) and ($f_{min}$), respectively. Then, two averages are calculated, $aver1$ and $aver2$, between $f_{max}$ and $aver$ and between $f_{min}$ and $aver$, respectively. Hence, the fitness space ($f_{min}$ -- $f_{max}$) is divided into three categories. Considering maximization problem, the classification will be as follows; particles with fitness values in the range ($aver1$ -- $f_{max}$) are updated using the cognitive PSO component, particles with fitness values in the range ($f_{min}$ -- $aver2$) are updated using the social PSO component, and the remaining particles are updated using the basic PSO model. One drawback of this classification is that all particles are classified starting from the initialization and can even last after the convergence, that is, no classification termination criteria, as seen in Fig. \ref{fig::pso-m}.
\begin{figure}[H]
\includegraphics[width=10.5 cm]{fig/shaqa1.pdf}
\caption{Particles' evolution and classification with evolving iterations using PSO-M.\label{fig::pso-m}}
\end{figure}
\unskip
\subsection{PSO with mutation}
Influenced by genetic algorithms (GA), Jiao \emph{et al.} \cite{jiao2008elite} proposed the concept of elite PSO with mutation (EPSOM) to improve the convergence accuracy and speed. The global best was mutated to boost particle swarm diversity and mitigate the risk of falling into local optimum. The mutation is performed as follows;
\begin{equation}
\label{eq::pso_EPSOM}
{G_b}^{\prime}=G_b(1+0.5\eta)
\end{equation}
where $\eta$ is a randomly generated number ranging from 0 to 1.
Another recent study by L{\"u} \emph{et al.} \cite{lu2022comprehensive} that relies on the global best mutation in a similar manner as in \eqref{eq::pso_EPSOM}, proposed an adaptive weighted and mutation particle swarm optimization (AWMPSO) to enhance global search capabilities of the PSO. In which the mutation probability of the global best is now adaptive, where the mutation probability of the global best depend on the population fitness's variance. Apart from the significant improvement of this approach on the enhanced exploration ability and the convergence speed and accuracy, this approach still has limitations due to the fact that the mutation is implemented on the global best as seen in \eqref{eq::pso_EPSOM}. Hence, the particles' positions are mutated indirectly through the global best mutation. According to \eqref{eq::pso_EPSOM}, the change in the global best is limited and can vary gradually with the evolving iterations. Furthermore, the mutation is not targeted, since the mutation of the global best affect all particles. In this case, the mutation will indeed be useful to poor or moderate particles but it may also deteriorate the fitness of good particle.
Wang \emph{et al.} \cite{wang2021exergoeconomic} proposed a new method that relies on the position mutation (M-PSO).
The particles' position mutation process is activated conditionally as an intermediate step just before the evaluation of the personal best and the global of the PSO algorithm. The condition requires that a randomly generated number to be less than an adaptively generated threshold value ($TH$). The threshold value was defined as:
\begin{equation}
\label{eq::pso_threshold}
TH=\left(1-\frac{i-1}{It_{max}-1}\right)^{\frac{1}{mu}}
\end{equation}
where $mu$ is the mutation factor. Wang \emph{et al.} \cite{wang2021exergoeconomic} reported that increasing mutation factor can enhance the convergence accuracy but it reduces the convergence speed. As seen in \eqref{eq::pso_threshold}, the threshold value is updated by the evolving iterations, not the particles' fitness, which can be mainly considered as a termination criterion. The threshold value is crucial parameter in M-PSO approach, not only because it is dictating the activation of the mutation process, but because it also decides the upper and the lower bounds of the mutated position. In M-PSO approach, there is no particle classifications, hence, the mutation is performed on all the particles. That is, M-PSO does not use targeted mutation which can contribute negatively on the movement of the good particles and consequently affect the convergence speed as reported by Wang \emph{et al.} \cite{wang2021exergoeconomic}.
\subsection{Proposed PSO (PSO-TPME)}
The initial concept of the proposed PSO, is automated-termination, adaptive particles' classification with elitism based on particles' fitness values ($f$). The classification is performed as follows; the mean ($m$) of the fitness values of all particles is calculated at each iteration. Then, a fixed percentage ($p$) around the mean is calculated to generate lower and upper bounds. Now the particles are divided into three categories: good, fair, and bad. Hence, considering a maximization problem, particles with fitness higher than the upper bound (good particles) can decrease their velocity to improve exploitation in the local domain via relying on their personal best (PSO cognitive component) instead of the global best (PSO social component). The particles with fitness that is located within the lower and upper bounds (fair particles), those have relatively average fitness can continue both exploration and exploitation while using the basic PSO algorithm. Particles with fitness that is less than the lower bound (bad particles) can initially increase their velocities to enhance exploration in the global search domain, via relaying on the global best instead of its personal best. If the bad particles after a number of iterations ($N_{e}$) are still classified as bad particles. Then the elitism process is activated to speed up the convergence rate. The elitism process is basically intended to cope with the so called “hopeless particles”, those given the chance for exploring the search space and failed to level up to better category. Now the elitism simply locates the hopeless particles in the position of the particle with the maximum fitness ($f_{max}$).
This process speeds up the convergence rate significantly with proper choice of $N_{e}$ as shown in the Fig. \ref{fig::proposed-pso}.
\begin{figure}[H]
\includegraphics[width=10.5 cm]{fig/shaqa2.pdf}
\caption{Particles' evolution with evolving iterations using the proposed classification with elitism. \label{fig::proposed-pso}}
\end{figure}
Conducting PSO using the earlier approach will drastically reduce the diversity of the particle swarm during the preliminary stages of evolving iterations. As a result, the probability of entrapment in a region of the local optimum is high. Adding a mutation to the particle's position of the maximum fitness $(x_{j}(f_{max}))$ will boost the diversification of the elite particle and reduce the possibility of falling into a local optimum. Hence, the mutation is now targeting bad particles only, and the mutation is performed on the particle's position directly instead of indirect mutation of the position using the global best as proposed by Jiao \emph{et al.} \cite{jiao2008elite}. The details of the proposed PSO algorithm considering a maximization problem are in \eqref{eq::pso_proposed}, in which the elite particle's positions $(x_{j}(f_{max}))$ are mutated by $(2a\eta+(1-a))$, where $\eta$ is a randomly generated number ranging from 0 to 1 and $a$ is a presetting parameter that defines the mutation range. The basic idea is that the elite position $(x_{j}(f_{max}))$ is mutated in the range $(x_{j}(f_{max})(1\pm a))$, in which the mean is unity multiplied by $x_{j}(f_{max})$ which gives higher probability to $x_{j}(f_{max})$, that is, exploitation of the elite particle's position without neglecting the chances of exploring new particles' positions. The aforementioned range can be increased or decreased via varying $a$ for higher or lower dimension functions, respectively.
This classification is called automated-termination classification because, after some iterations, all the particles will fall into the middle category since, on one hand, the particles' fitness values will eventually be close and, on the other hand, the particles' mean fitness is gradually increasing which will expand the bounds of the middle category. Hence, the classification will stop automatically as depicted in Fig. \ref{fig::proposed-pso}. This classification is also considered adaptive classification because of particles' mean variation at each iteration. The particles' mean will change, therefore the upper and lower bound of the middle category will dynamically vary, as the calculation of these bounds depends only on a fixed percentage around the particles' mean. This type of particles' classification is motivated by its implantation simplicity, low memory requirements, and automated-termination criteria based on the particles convergence. The latter is very crucial since elitism with mutation takes part in the proposed PSO. Now, the automated termination criteria will stop the classification and the elitism with mutation as well, without manual or other termination criteria being involved, which otherwise may require extra processing.
\begin{equation}
\label{eq::pso_proposed}
\begin{cases}
v_{ij}^{k+1}=wv_{ij}^{k}+c_{1}r_{1}({P_b}_{ij}-x_{ij}^{k})& \text{if } f_{ij}^{k}> (1+p)m\\
x_{ij}^{k+1}=x_{ij}^{k}+v_{ij}^{k+1},& \\
\noindent\rule{7.5cm}{0.4pt}\\
v_{ij}^{k+1}=wv_{ij}^{k}+c_{1}r_{1}({P_b}_{ij}-x_{ij}^{k})+ c_{2}r_{2}({G_b}_{j}-x_{ij}^{k})& \text{if }(1-p)m\leq f_{ij}^{k}\leq(1+p)m\\
x_{ij}^{k+1}=x_{ij}^{k}+v_{ij}^{k+1},& \\
\noindent\rule{7.5cm}{0.4pt}\\
v_{ij}^{k+1}=wv_{ij}^{k}+c_{2}r_{2}({G_b}_{j}-x_{ij}^{k}) &\text{if } f_{ij}^{k}< (1-p)m \,\, \& \,\, It<N_e\\
x_{ij}^{k+1}=x_{ij}^{k}+v_{ij}^{k+1},& \\
\hdashrule{7.6cm}{0.4pt}{4pt}\\
x_{ij}^{k+1}=x_{j}(f_{max})(2a\eta+(1-a)),& \text{if } f_{ij}^{k}< (1-p)m \,\, \& \,\, It\geq N_e
\end{cases}
\end{equation}
\subsection{Benchmark problems}
A group of recognized benchmark multi-dimensional functions, which are extensively adopted in the optimization field, were employed to assess the performance of EPSOM, LDW-PSO, PSO-M, M-PSO, and the suggested PSO algorithm in terms of convergence accuracy and convergence speed. The benchmark functions are used herein as minimization problems, each of which offers a distinct level of complexity to the tested algorithm to be assessed. Function complexity such as; unimodality or multimodality, symmetric or asymmetric and separable or inseparable in its variables. The benchmark multi-dimensional functions are:
Rosenbrock function is an unimodal function that is extensively used for local exploration, which was first used in optimization assessment of Genetic Algorithms (GA) by De Jong \cite{de1975analysis}. According to Shang and Qiu \cite{shang2006note}, the n-dimensional Rosenbrock function ($n>4$) can be a bimodal function, that makes it even a more complex minimization problem, this complexity also originates from the function's asymmetry and variables inseparability. The global minimum value of Rosenbrock function is zero, which is located at $(1,1,...)$. The multi-dimensional Rosenbrock function reads as:
\begin{equation}
\label{eq::f_Rosenbrock}
f_{1}(x)=\sum_{i=1}^{n}100(x_{i+1}^{2}-x_{i})^{2}+(1-x_{i})^{2}
\end{equation}
Rastrigin function is a multimodal function that is employed for the performance assessment of evolutionary algorithms \cite{varIslandNum07}. Although it is extremely multimodal, the positions of the minima are evenly dispersed, the function is symmetric and separable. The global minimum value of Rastrigin function is zero that is located at $(0,0,...)$. Rastrigin function is defined as:
\begin{equation}
\label{eq::f_Rastrigrin}
f_2(x)=\sum_{i=1}^{n}(x_{i}^{2}-10cos(2\pi x_{i}))+10
\end{equation}
Griewank function is also a multimodal and symmetric function that is widely used for global optimization. The global minimum value of Griewank function is zero that is located at $(0,0,...)$. Following Locatelli \cite{locatelli2003note}, the function contains a huge number of local minima, which increases exponentially with the number of dimensions. According to Jumonji \emph{et al.} \cite{varIslandNum07}, Griewank function is inseparable in its variables and is defined as follows:
\begin{equation}
\label{eq::f_Griewank}
f_3(x)=\sum_{i=1}^{n}\frac{x_{i}^{2}}{4000} - \prod_{i=1}^{n}cos\left(\frac{x_{i}}{\sqrt{i}}\right)+1
\end{equation}
\section{Results}
Beneficial to evaluate the efficiency of the proposed PSO algorithm on large-scale problems, the benchmark functions, Griewank, Rastrigrin, and Rosenbrock, are set to have 30 dimensions.
To assess the performance of the proposed PSO algorithm in comparison to
EPSOM, LDW-PSO, PSO-M and M-PSO, the parameters of all the tested algorithms are identically selected for consistency.
The search and initialization space for all the functions are [-100 - 100]. The number of particles is set to 40, and a maximum iteration of 2000. Furthermore, $w$ is declining linearly from $w_{max} = 0.9$ to $w_{min} =0.1$, c1 is 1.4962, and c2 is 1.4962. Regarding the PSO-M, the mutation factor $mu$ is set to 0.05.
The proposed PSO method includes three more presetting parameters: one is the classification percentage around the fitness mean, denoted by p, and the other is the elitism with position mutation process initiation iteration, denoted by Ne, the last one is the mutation range, that is defined by $a$. In these simulations, these parameters are selected as $p=0.02$, $N_e=3$, and $a=0.5$. Consequently, the particles with fitness in the range of $\pm 2\%$ of mean particles' fitness value are classified in the middle category (``fair particles''), the elitism process starts after the third iteration, and the mutation range is $\pm50\%$ of $x_{j}(f_{max})$.
Twenty independent simulations were carried out on the three previously aforementioned functions for each minimization algorithm, which is beneficial to minimizing the statistical errors of the optimization performance of the previously mentioned algorithms. The outcomes of each algorithm were averaged across 20 simulations. The averaged fitness performance of PSO variants on 30-dimensional benchmark functions is depicted in Fig. \ref{fig::benchmark}. The optimization results show that the proposed PSO excels EPSOM, LDW-PSO, PSO-M and M-PSO in terms of convergence speed and global exploration capabilities, on all tested benchmark functions. Another important result from the figure, is that all the mutation based approaches have better global exploration capabilities, since their convergence accuracy is better than other PSO approaches, as seen from the optimization performance of Griewank, Rastringrin and Rosenbrock function.
\begin{figure}[ht ]
\centering
\begin{subfigure}[t]{0.49\textwidth}
\centering
\includegraphics[width=\textwidth]{fig/shaqa3a.pdf}
\caption{Griewank}
\label{fig::Griewank}
\end{subfigure}
\hfill
\begin{subfigure}[t]{0.49\textwidth}
\centering
\includegraphics[width=\textwidth]{fig/shaqa3a.pdf}
\caption{Rastrigrin }
\label{fig::Rastrigrin}
\end{subfigure}
\hfill
\newline
\newline
\begin{subfigure}[t]{0.49\textwidth}
\centering
\includegraphics[width=\textwidth]{fig/shaqa3a.pdf}
\caption{Rosenbrock }
\label{fig::Rosenbrock}
\end{subfigure}
\hfill
\begin{subfigure}[t]{0.49\textwidth}
\centering
\includegraphics[width=\textwidth]{fig/shaqa3d.pdf}
\caption{Zoom on proposed PSO }
\label{fig::proposed_pso}
\end{subfigure}
\caption{Fitness performance of PSO variants on multi-dimensional benchmark functions. Figures (a-c) depict comparison of EPSOM, LDW-PSO, PSO-M and M-PSO with the proposed PSO on a 30-dimensional functions (Griewank, Rastringrin and Rosenbrock). Figure (d) shows a zoomed-in plot of the performance of the proposed PSO on the three functions}
\label{fig::benchmark}
\end{figure}
Figure \ref{fig::proposed_pso} shows a zoomed-in plot of the minimization performance of the proposed PSO on the 30-dimensional Griewank, Rastrigrin, and Rosenbrock function. The figure undeniably shows the gigantic improvement of the elitism with targeted position mutation on the proposed PSO after the iteration $N_e=3$. The bad particles are now exploiting the particle's position with maximum fitness with high probability of exploring new particles' positions as a consequence of position mutation.
It can be seen from Fig. \ref{fig::benchmark} that the proposed PSO attained the global minimum ($10^{-15}$) for the 30-dimensional Griewank function in 11 iterations, whereas the other techniques needed 1900, 501, 732 and 597 iterations to reach considerably greater local minima by orders of magnitude, for EPSOM, LDW-PSO, PSO-M and M-PSO, respectively. The suggested PSO attained the global minimum ($10^{-12}$) for the 30-dimensional Rastrigrin function in 11 iterations, whereas the other techniques required 1713, 607, 716 and 919 iterations to reach significantly greater local minima by orders of magnitude, for EPSOM, LDW-PSO, PSO-M and M-PSO, respectively. In terms of the optimization results of the Rosenbrock function utilizing the suggested PSO, the proposed technique required 6 iterations to attain a minimum that outperformed the other approaches, considering that the comparative approaches required 1850, 552, 835 and 980 iterations, for EPSOM, LDW-PSO, PSO-M and M-PSO, respectively. For all tested function, the convergence rate for the proposed PSO is faster by orders of magnitude compared with all tested variants.
\begin{figure}[H]
\includegraphics[width=12 cm]{fig/griewank_bar.pdf}
\caption{Fitness performance of PSO variants on 30, 60 and 90 dimensional Griewank function after 10 and 2000 iterations. \label{fig::Griewank-30-90}}
\end{figure}
\begin{figure}[H]
\includegraphics[width=12 cm]{fig/rastrig_bar.pdf}
\caption{Fitness performance of PSO variants on 30, 60 and 90 dimensional Rastrig function after 10 and 2000 iterations.. \label{fig::Rastrig-30-90}}
\end{figure}
\begin{figure}[H]
\includegraphics[width=12 cm]{fig/rosenbrock_bar.pdf}
\caption{Fitness performance of PSO variants on 30, 60 and 90 dimensional Rosenbrock function after 10 and 2000 iterations.. \label{fig::Rosenbrock-30-90}}
\end{figure}
Figures \ref{fig::Griewank-30-90}, \ref{fig::Rastrig-30-90}, and \ref{fig::Rosenbrock-30-90} show the optimization results for the PSO-TPME and the previously described PSO variants. The optimal fitness value in the figures is the average optimal one of the solutions in 20 trials. To evaluate the early and late exploration capabilities of the PSO variations, the optimum fitness is estimated after 10 and 2000 iterations, respectively. The optimization was carried out on the previously specified benchmark functions with dimensions of 30, 60, and 90 while keeping the same presetting settings for all PSO variations, including the number of particles, constant. The figures undeniably reveal that the PSO-TPME's early exploration performance outperforms the overall (early and late) exploration performance of the investigated PSO variants by orders of magnitude. This is also proven for all previously described benchmark functions for large dimensional problems of 30, 60, and 60 dimensions. This clearly shows that PSO-TPME has remarkably fast and accurate convergence characteristics, which are supported by benchmark functions with various levels of complexity and a large number of dimensions.
\section{Discussion}
Starting point are five popular variants of particle swarm optimization.
The proposed new PSO variant (PSO-TPME)
is shown to dramatically improve convergence speed and global exploration capabilities.
This variant comprises the three major factors affecting convergence speed and global exploration capabilities: particles' classification, elitism, and mutation, as well as the original PSO's cognitive and social models. This variation introduced an alternative classification approach, elitism, and targeted position mutation, all of which were integrated into the basic PSO algorithm. The introduced particle classification process is simple to apply, requires low memory, is adaptive, and provides automated termination criteria based on convergence. These qualities of the proposed classification technique permitted the implementation of targeted elitism and mutation, in terms of targeting just the poor particles, terminating the elitism and mutation process automatically in the event of convergence, and applying different updating models (social and/or cognitive) based on the particle's category.
A set of benchmark multi-dimensional functions widely used in the optimization problems were used to compare the performance of the proposed PSO-TPME to EPSOM, LDW-PSO, PSO-M and M-PSO, in terms of convergence accuracy and convergence speed. The 30, 60, and 90-dimensional Griewank, Rastrigrin, and Rosenbrock functions are employed. Each of them provides a different level of complexity, such as unimodality or multimodality, symmetry or asymmetry, and separability or inseparability. For each benchmark function, many minimization simulations were performed, repeated, and averaged to reduce statistical errors. The simulations revealed that PSO-TPME surpasses the aforementioned variants by orders of magnitude in terms of convergence rate and accuracy.
\vspace{6pt}
\authorcontributions{Conceptualization, T. Shaqarin and B. R. Noack; methodology, T. Shaqarin; software, T. Shaqarin; validation, T. Shaqarin and B. R. Noack; formal analysis, T. Shaqarin; investigation, T. Shaqarin.; resources, T. Shaqarin; data curation, T. Shaqarin; writing---original draft preparation, T. Shaqarin and B. R. Noack; writing---review and editing, T. Shaqarin and B. R. Noack; visualization, T. Shaqarin; supervision, T. Shaqarin and B. R. Noack; project administration, B. R. Noack; funding acquisition, B. R. Noack. All authors have read and agreed to the published version of the manuscript.}
\funding{This work is supported
by the National Science Foundation of China (NSFC) through grants 12172109 and 12172111
and by the Natural Science and Engineering grant 2022A1515011492
of Guangdong province, China.}
\dataavailability{Not applicable}
\conflictsofinterest{ The authors declare no conflict of interest.}
\begin{adjustwidth}{-\extralength}{0cm}
\reftitle{References}
\section{Introduction}
\label{sec:introduction}
Particle swarm optimization (PSO) is a metaheuristic optimization approach that imitates the dynamics of biological systems such as the swarm of birds. Kennedy and
Eberhart \cite{kennedy1995particle} published the first seminal paper on PSO. As a result, the variety of research articles ascribed to the development of particle swarm optimization and swarm intelligence grown massively. The PSO algorithm is simple to implement and has a low memory requirements. Consequently, it has been used in a multitude of complex applications that involve optimization, control, machine learning, and so on.
PSO is widely used in the design, sizing, control and maximum power point tracking (MPPT) of renewable energy systems; such as photovoltaic (PV) systems \cite{harrag2019pso,eltamaly2020performance,shaqarin2021modified}, wind turbines \cite{aguilar2020multi,kamarzarrin2020intelligent,sushmitha2021novel} and Hybrid PV-wind systems \cite{ghorbani2018optimizing,saad2021implementation,el2022sizing}. The authors in \cite{yifei2018research,wu2021motion,zhang2022pso} implemented PSO in the control of robotics for various applications. PSO is also popular in unmanned vehicles in performing path planning \cite{guo2020global,tavoosi2020optimized} and path tracking \cite{al2015path,amer2018path,jiang2022model}.
PSO has been implemented widley in the sizing, design,
modeling, and control of various typres of refrigeration system, such as reducing power consumption of multiple chiller systems \cite{beghi2012pso}, optimizing cascade refrigeration cycles \cite{ghorbani2014optimization}, standing wave thermoacoustic refrigerators \cite{rahman2019single} and vapor compression refrigeration cycles \cite{kong2021global}.
Nevertheless, while PSO is efficient in optimizing multidimensional complexities \cite{huang2019memetic}, its drawbacks involve premature convergence and stagnation to local optima \cite{jiao2008elite,chen2010simplified,liu2016topology,pahnehkolaei2022analytical,ramirez2022pso,he2022semi}, as well as a slow convergence rate \cite{jiao2008elite,chen2010simplified,he2022semi,liu2018particle,ramirez2022pso}. According to Jiao \emph{et al.} and Chen \cite{jiao2008elite,chen2010simplified}, the drawbacks of PSO originates from its own structure. The social model readily falls into local optima, practically, each particle in PSO follows rather dynamically the path of the global best position. This global best could be influenced by a local minimum, which leads all particles to a position with poor fitness. Whereas, the cognitive model has the drawback of slow convergence especially in the final phases of the evolving iterations when tackling various complexities.
This motivates the particles' classifications in order to treat each category with different updating strategy to achieve better convergence rates and to enhance global explorations capabilities \cite{angeline1998using,parrott2006locating,chen2010simplified,zheng2018fault}.
The authors in \cite{angeline1998using,jiao2008elite,yang2015improved,alshammari2020elitist,yang2021quantum} implemented the particle elitism approach to speed up the convergence of PSO. Elitism is a process in which particles with poor fitness values are replaced with particles with the best fitness value (elite particles) after a certain number of iterations, resulting in the production of a new swarm with a better particle's average fitness. The elitism process in nature requires a preliminary step which is the particle classification, in order to distinguish poor and elite particles. This process will indeed speed up the convergence but on the other hand, it will lessen the diversity of the particles and may increase the probability of falling into a local optimum.
Beneficial to boost particle swarm diversity and mitigate the risk of falling into local optimum. References \cite{higashi2003particle,jiao2008elite,zhang2019differential,wang2021exergoeconomic,lu2022comprehensive} proposed the concept of mutation in PSO algorithm to improve the convergence accuracy and speed. In the literature there are mainly two mutation's types implemented in the PSO algorithm. The first one is the global best mutation as proposed by \cite{jiao2008elite,lu2022comprehensive}, in which the particles' position are mutated indirectly in response to the change of global best. The second type is the direct position mutation as reported by \cite{wang2021exergoeconomic}, which is better emulating the mutation process inspired by genetic algorithms (GA). The mutation process will enhance the diversity of the swarm which results in better exploration capabilities but it may slow down the convergence as reported by \cite{wang2021exergoeconomic}. This can be explained by the fact that mutation will indeed be useful to poor or moderate particles but it may also deteriorate the fitness of good particle.
In this work, the basic PSO will be highlighted along with several PSO variants that involve the three key elements affecting the convergence speed and global exploration capabilities; particle's classification, elitism and mutation. The proposed PSO method, particle swarm optimization with targeted position-mutated elitism (PSO-TPME), will benefits from these key features in order to enhance both convergence speed and the global exploration capabilities, by introducing an alternative classification technique, elitism and targeted position mutation in the PSO algorithm. The proposed algorithm will be tested on multidimensional benchmark functions with various complexities.
\section{Materials and Methods}
\subsection{Particel swarm optimization (PSO)}
PSO's method generates a swarm of particles at random positions to represent possible solutions to an optimization task throughout the parameter space. The particle locations are hence iterated with the target of achieving a global optimum of a fitness value. The algorithm then examines each particle's position and stores the best solution for each particle, which is called personal best ($P_b$). Moreover, during every iteration ($It$), PSO records the best solution throughout the swarm, which is called global best ($G_b$). For every subsequent iteration, the particles' position ($x$) and velocity ($v$) are determined as a function of the swarm's best position (social component), the particle's best personal position (the cognitive component), and its prior velocity (memory component). In general, PSO has several versions, linearly decreasing weight particle swarm optimization is one of the basic versions of PSO, known as LDW-PSO, that reads;
\begin{equation}
\label{eq::pso_v}
v_{ij}^{k+1}=wv_{ij}^{k}+c_{1}r_{1}({P_b}_{ij}-x_{ij}^{k})+c_{2}r_{2}({G_b}_{j}-x_{ij}^{k})
\end{equation}
\begin{equation}
\label{eq::pso_x}
x_{ij}^{k+1}=x_{ij}^{k}+v_{ij}^{k+1}
\end{equation}
\begin{equation}
\label{eq::pso_ldw}
w=w_{max}-It\times\frac{(w_{max}-w_{min} ) }{It_{max}}
\end{equation}
The subscript $_i$ is ranging from 1 to $N$ number of particles and the subscript $_j$ is ranging from 1 to $n$ dimensions. The factor $w$ is known as the inertia weight, $w_{max}$ and $w_{min}$ are the maximum and the minimum inertia weight, respectively, and the product $wv$ represents the particle's momentum. The acceleration factors are $c_1$ and $c_2$, while $r_1$ and $r_2$ are the output of random generators ranging from 0 to 1.
\subsection{PSO with classification}
Chen \cite{chen2010simplified} proposed PSO-M, a study on particle classification that improves the convergence rate and convergence accuracy of PSO. The classification is based on observing the particles' fitness value at each iteration, identifying the particles' fitness mean ($aver$) and also the best and worst fitness values, ($f_{max}$) and ($f_{min}$), respectively. Then, two averages are calculated, $aver1$ and $aver2$, between $f_{max}$ and $aver$ and between $f_{min}$ and $aver$, respectively. Hence, the fitness space ($f_{min}$ -- $f_{max}$) is divided into three categories. Considering maximization problem, the classification will be as follows; particles with fitness values in the range ($aver1$ -- $f_{max}$) are updated using the cognitive PSO component, particles with fitness values in the range ($f_{min}$ -- $aver2$) are updated using the social PSO component, and the remaining particles are updated using the basic PSO model. One drawback of this classification is that all particles are classified starting from the initialization and can even last after the convergence, that is, no classification termination criteria, as seen in Fig. \ref{fig::pso-m}.
\begin{figure}[H]
\includegraphics[width=10.5 cm]{fig/shaqa1.pdf}
\caption{Particles' evolution and classification with evolving iterations using PSO-M.\label{fig::pso-m}}
\end{figure}
\unskip
\subsection{PSO with mutation}
Influenced by genetic algorithms (GA), Jiao \emph{et al.} \cite{jiao2008elite} proposed the concept of elite PSO with mutation (EPSOM) to improve the convergence accuracy and speed. The global best was mutated to boost particle swarm diversity and mitigate the risk of falling into local optimum. The mutation is performed as follows;
\begin{equation}
\label{eq::pso_EPSOM}
{G_b}^{\prime}=G_b(1+0.5\eta)
\end{equation}
where $\eta$ is a randomly generated number ranging from 0 to 1.
Another recent study by L{\"u} \emph{et al.} \cite{lu2022comprehensive} that relies on the global best mutation in a similar manner as in \eqref{eq::pso_EPSOM}, proposed an adaptive weighted and mutation particle swarm optimization (AWMPSO) to enhance global search capabilities of the PSO. In which the mutation probability of the global best is now adaptive, where the mutation probability of the global best depend on the population fitness's variance. Apart from the significant improvement of this approach on the enhanced exploration ability and the convergence speed and accuracy, this approach still has limitations due to the fact that the mutation is implemented on the global best as seen in \eqref{eq::pso_EPSOM}. Hence, the particles' positions are mutated indirectly through the global best mutation. According to \eqref{eq::pso_EPSOM}, the change in the global best is limited and can vary gradually with the evolving iterations. Furthermore, the mutation is not targeted, since the mutation of the global best affect all particles. In this case, the mutation will indeed be useful to poor or moderate particles but it may also deteriorate the fitness of good particle.
Wang \emph{et al.} \cite{wang2021exergoeconomic} proposed a new method that relies on the position mutation (M-PSO).
The particles' position mutation process is activated conditionally as an intermediate step just before the evaluation of the personal best and the global of the PSO algorithm. The condition requires that a randomly generated number to be less than an adaptively generated threshold value ($TH$). The threshold value was defined as:
\begin{equation}
\label{eq::pso_threshold}
TH=\left(1-\frac{i-1}{It_{max}-1}\right)^{\frac{1}{mu}}
\end{equation}
where $mu$ is the mutation factor. Wang \emph{et al.} \cite{wang2021exergoeconomic} reported that increasing mutation factor can enhance the convergence accuracy but it reduces the convergence speed. As seen in \eqref{eq::pso_threshold}, the threshold value is updated by the evolving iterations, not the particles' fitness, which can be mainly considered as a termination criterion. The threshold value is crucial parameter in M-PSO approach, not only because it is dictating the activation of the mutation process, but because it also decides the upper and the lower bounds of the mutated position. In M-PSO approach, there is no particle classifications, hence, the mutation is performed on all the particles. That is, M-PSO does not use targeted mutation which can contribute negatively on the movement of the good particles and consequently affect the convergence speed as reported by Wang \emph{et al.} \cite{wang2021exergoeconomic}.
\subsection{Proposed PSO (PSO-TPME)}
The initial concept of the proposed PSO, is automated-termination, adaptive particles' classification with elitism based on particles' fitness values ($f$). The classification is performed as follows; the mean ($m$) of the fitness values of all particles is calculated at each iteration. Then, a fixed percentage ($p$) around the mean is calculated to generate lower and upper bounds. Now the particles are divided into three categories: good, fair, and bad. Hence, considering a maximization problem, particles with fitness higher than the upper bound (good particles) can decrease their velocity to improve exploitation in the local domain via relying on their personal best (PSO cognitive component) instead of the global best (PSO social component). The particles with fitness that is located within the lower and upper bounds (fair particles), those have relatively average fitness can continue both exploration and exploitation while using the basic PSO algorithm. Particles with fitness that is less than the lower bound (bad particles) can initially increase their velocities to enhance exploration in the global search domain, via relaying on the global best instead of its personal best. If the bad particles after a number of iterations ($N_{e}$) are still classified as bad particles. Then the elitism process is activated to speed up the convergence rate. The elitism process is basically intended to cope with the so called “hopeless particles”, those given the chance for exploring the search space and failed to level up to better category. Now the elitism simply locates the hopeless particles in the position of the particle with the maximum fitness ($f_{max}$).
This process speeds up the convergence rate significantly with proper choice of $N_{e}$ as shown in the Fig. \ref{fig::proposed-pso}.
\begin{figure}[H]
\includegraphics[width=10.5 cm]{fig/shaqa2.pdf}
\caption{Particles' evolution with evolving iterations using the proposed classification with elitism. \label{fig::proposed-pso}}
\end{figure}
Conducting PSO using the earlier approach will drastically reduce the diversity of the particle swarm during the preliminary stages of evolving iterations. As a result, the probability of entrapment in a region of the local optimum is high. Adding a mutation to the particle's position of the maximum fitness $(x_{j}(f_{max}))$ will boost the diversification of the elite particle and reduce the possibility of falling into a local optimum. Hence, the mutation is now targeting bad particles only, and the mutation is performed on the particle's position directly instead of indirect mutation of the position using the global best as proposed by Jiao \emph{et al.} \cite{jiao2008elite}. The details of the proposed PSO algorithm considering a maximization problem are in \eqref{eq::pso_proposed}, in which the elite particle's positions $(x_{j}(f_{max}))$ are mutated by $(2a\eta+(1-a))$, where $\eta$ is a randomly generated number ranging from 0 to 1 and $a$ is a presetting parameter that defines the mutation range. The basic idea is that the elite position $(x_{j}(f_{max}))$ is mutated in the range $(x_{j}(f_{max})(1\pm a))$, in which the mean is unity multiplied by $x_{j}(f_{max})$ which gives higher probability to $x_{j}(f_{max})$, that is, exploitation of the elite particle's position without neglecting the chances of exploring new particles' positions. The aforementioned range can be increased or decreased via varying $a$ for higher or lower dimension functions, respectively.
This classification is called automated-termination classification because, after some iterations, all the particles will fall into the middle category since, on one hand, the particles' fitness values will eventually be close and, on the other hand, the particles' mean fitness is gradually increasing which will expand the bounds of the middle category. Hence, the classification will stop automatically as depicted in Fig. \ref{fig::proposed-pso}. This classification is also considered adaptive classification because of particles' mean variation at each iteration. The particles' mean will change, therefore the upper and lower bound of the middle category will dynamically vary, as the calculation of these bounds depends only on a fixed percentage around the particles' mean. This type of particles' classification is motivated by its implantation simplicity, low memory requirements, and automated-termination criteria based on the particles convergence. The latter is very crucial since elitism with mutation takes part in the proposed PSO. Now, the automated termination criteria will stop the classification and the elitism with mutation as well, without manual or other termination criteria being involved, which otherwise may require extra processing.
\begin{equation}
\label{eq::pso_proposed}
\begin{cases}
v_{ij}^{k+1}=wv_{ij}^{k}+c_{1}r_{1}({P_b}_{ij}-x_{ij}^{k})& \text{if } f_{ij}^{k}> (1+p)m\\
x_{ij}^{k+1}=x_{ij}^{k}+v_{ij}^{k+1},& \\
\noindent\rule{7.5cm}{0.4pt}\\
v_{ij}^{k+1}=wv_{ij}^{k}+c_{1}r_{1}({P_b}_{ij}-x_{ij}^{k})+ c_{2}r_{2}({G_b}_{j}-x_{ij}^{k})& \text{if }(1-p)m\leq f_{ij}^{k}\leq(1+p)m\\
x_{ij}^{k+1}=x_{ij}^{k}+v_{ij}^{k+1},& \\
\noindent\rule{7.5cm}{0.4pt}\\
v_{ij}^{k+1}=wv_{ij}^{k}+c_{2}r_{2}({G_b}_{j}-x_{ij}^{k}) &\text{if } f_{ij}^{k}< (1-p)m \,\, \& \,\, It<N_e\\
x_{ij}^{k+1}=x_{ij}^{k}+v_{ij}^{k+1},& \\
\hdashrule{7.6cm}{0.4pt}{4pt}\\
x_{ij}^{k+1}=x_{j}(f_{max})(2a\eta+(1-a)),& \text{if } f_{ij}^{k}< (1-p)m \,\, \& \,\, It\geq N_e
\end{cases}
\end{equation}
\subsection{Benchmark problems}
A group of recognized benchmark multi-dimensional functions, which are extensively adopted in the optimization field, were employed to assess the performance of EPSOM, LDW-PSO, PSO-M, M-PSO, and the suggested PSO algorithm in terms of convergence accuracy and convergence speed. The benchmark functions are used herein as minimization problems, each of which offers a distinct level of complexity to the tested algorithm to be assessed. Function complexity such as; unimodality or multimodality, symmetric or asymmetric and separable or inseparable in its variables. The benchmark multi-dimensional functions are:
Rosenbrock function is an unimodal function that is extensively used for local exploration, which was first used in optimization assessment of Genetic Algorithms (GA) by De Jong \cite{de1975analysis}. According to Shang and Qiu \cite{shang2006note}, the n-dimensional Rosenbrock function ($n>4$) can be a bimodal function, that makes it even a more complex minimization problem, this complexity also originates from the function's asymmetry and variables inseparability. The global minimum value of Rosenbrock function is zero, which is located at $(1,1,...)$. The multi-dimensional Rosenbrock function reads as:
\begin{equation}
\label{eq::f_Rosenbrock}
f_{1}(x)=\sum_{i=1}^{n}100(x_{i+1}^{2}-x_{i})^{2}+(1-x_{i})^{2}
\end{equation}
Rastrigin function is a multimodal function that is employed for the performance assessment of evolutionary algorithms \cite{varIslandNum07}. Although it is extremely multimodal, the positions of the minima are evenly dispersed, the function is symmetric and separable. The global minimum value of Rastrigin function is zero that is located at $(0,0,...)$. Rastrigin function is defined as:
\begin{equation}
\label{eq::f_Rastrigrin}
f_2(x)=\sum_{i=1}^{n}(x_{i}^{2}-10cos(2\pi x_{i}))+10
\end{equation}
Griewank function is also a multimodal and symmetric function that is widely used for global optimization. The global minimum value of Griewank function is zero that is located at $(0,0,...)$. Following Locatelli \cite{locatelli2003note}, the function contains a huge number of local minima, which increases exponentially with the number of dimensions. According to Jumonji \emph{et al.} \cite{varIslandNum07}, Griewank function is inseparable in its variables and is defined as follows:
\begin{equation}
\label{eq::f_Griewank}
f_3(x)=\sum_{i=1}^{n}\frac{x_{i}^{2}}{4000} - \prod_{i=1}^{n}cos\left(\frac{x_{i}}{\sqrt{i}}\right)+1
\end{equation}
\section{Results}
Beneficial to evaluate the efficiency of the proposed PSO algorithm on large-scale problems, the benchmark functions, Griewank, Rastrigrin, and Rosenbrock, are set to have 30 dimensions.
To assess the performance of the proposed PSO algorithm in comparison to
EPSOM, LDW-PSO, PSO-M and M-PSO, the parameters of all the tested algorithms are identically selected for consistency.
The search and initialization space for all the functions are [-100 - 100]. The number of particles is set to 40, and a maximum iteration of 2000. Furthermore, $w$ is declining linearly from $w_{max} = 0.9$ to $w_{min} =0.1$, c1 is 1.4962, and c2 is 1.4962. Regarding the PSO-M, the mutation factor $mu$ is set to 0.05.
The proposed PSO method includes three more presetting parameters: one is the classification percentage around the fitness mean, denoted by p, and the other is the elitism with position mutation process initiation iteration, denoted by Ne, the last one is the mutation range, that is defined by $a$. In these simulations, these parameters are selected as $p=0.02$, $N_e=3$, and $a=0.5$. Consequently, the particles with fitness in the range of $\pm 2\%$ of mean particles' fitness value are classified in the middle category (``fair particles''), the elitism process starts after the third iteration, and the mutation range is $\pm50\%$ of $x_{j}(f_{max})$.
Twenty independent simulations were carried out on the three previously aforementioned functions for each minimization algorithm, which is beneficial to minimizing the statistical errors of the optimization performance of the previously mentioned algorithms. The outcomes of each algorithm were averaged across 20 simulations. The averaged fitness performance of PSO variants on 30-dimensional benchmark functions is depicted in Fig. \ref{fig::benchmark}. The optimization results show that the proposed PSO excels EPSOM, LDW-PSO, PSO-M and M-PSO in terms of convergence speed and global exploration capabilities, on all tested benchmark functions. Another important result from the figure, is that all the mutation based approaches have better global exploration capabilities, since their convergence accuracy is better than other PSO approaches, as seen from the optimization performance of Griewank, Rastringrin and Rosenbrock function.
\begin{figure}[ht ]
\centering
\begin{subfigure}[t]{0.49\textwidth}
\centering
\includegraphics[width=\textwidth]{fig/shaqa3a.pdf}
\caption{Griewank}
\label{fig::Griewank}
\end{subfigure}
\hfill
\begin{subfigure}[t]{0.49\textwidth}
\centering
\includegraphics[width=\textwidth]{fig/shaqa3a.pdf}
\caption{Rastrigrin }
\label{fig::Rastrigrin}
\end{subfigure}
\hfill
\newline
\newline
\begin{subfigure}[t]{0.49\textwidth}
\centering
\includegraphics[width=\textwidth]{fig/shaqa3a.pdf}
\caption{Rosenbrock }
\label{fig::Rosenbrock}
\end{subfigure}
\hfill
\begin{subfigure}[t]{0.49\textwidth}
\centering
\includegraphics[width=\textwidth]{fig/shaqa3d.pdf}
\caption{Zoom on proposed PSO }
\label{fig::proposed_pso}
\end{subfigure}
\caption{Fitness performance of PSO variants on multi-dimensional benchmark functions. Figures (a-c) depict comparison of EPSOM, LDW-PSO, PSO-M and M-PSO with the proposed PSO on a 30-dimensional functions (Griewank, Rastringrin and Rosenbrock). Figure (d) shows a zoomed-in plot of the performance of the proposed PSO on the three functions}
\label{fig::benchmark}
\end{figure}
Figure \ref{fig::proposed_pso} shows a zoomed-in plot of the minimization performance of the proposed PSO on the 30-dimensional Griewank, Rastrigrin, and Rosenbrock function. The figure undeniably shows the gigantic improvement of the elitism with targeted position mutation on the proposed PSO after the iteration $N_e=3$. The bad particles are now exploiting the particle's position with maximum fitness with high probability of exploring new particles' positions as a consequence of position mutation.
It can be seen from Fig. \ref{fig::benchmark} that the proposed PSO attained the global minimum ($10^{-15}$) for the 30-dimensional Griewank function in 11 iterations, whereas the other techniques needed 1900, 501, 732 and 597 iterations to reach considerably greater local minima by orders of magnitude, for EPSOM, LDW-PSO, PSO-M and M-PSO, respectively. The suggested PSO attained the global minimum ($10^{-12}$) for the 30-dimensional Rastrigrin function in 11 iterations, whereas the other techniques required 1713, 607, 716 and 919 iterations to reach significantly greater local minima by orders of magnitude, for EPSOM, LDW-PSO, PSO-M and M-PSO, respectively. In terms of the optimization results of the Rosenbrock function utilizing the suggested PSO, the proposed technique required 6 iterations to attain a minimum that outperformed the other approaches, considering that the comparative approaches required 1850, 552, 835 and 980 iterations, for EPSOM, LDW-PSO, PSO-M and M-PSO, respectively. For all tested function, the convergence rate for the proposed PSO is faster by orders of magnitude compared with all tested variants.
\begin{figure}[H]
\includegraphics[width=12 cm]{fig/griewank_bar.pdf}
\caption{Fitness performance of PSO variants on 30, 60 and 90 dimensional Griewank function after 10 and 2000 iterations. \label{fig::Griewank-30-90}}
\end{figure}
\begin{figure}[H]
\includegraphics[width=12 cm]{fig/rastrig_bar.pdf}
\caption{Fitness performance of PSO variants on 30, 60 and 90 dimensional Rastrig function after 10 and 2000 iterations.. \label{fig::Rastrig-30-90}}
\end{figure}
\begin{figure}[H]
\includegraphics[width=12 cm]{fig/rosenbrock_bar.pdf}
\caption{Fitness performance of PSO variants on 30, 60 and 90 dimensional Rosenbrock function after 10 and 2000 iterations.. \label{fig::Rosenbrock-30-90}}
\end{figure}
Figures \ref{fig::Griewank-30-90}, \ref{fig::Rastrig-30-90}, and \ref{fig::Rosenbrock-30-90} show the optimization results for the PSO-TPME and the previously described PSO variants. The optimal fitness value in the figures is the average optimal one of the solutions in 20 trials. To evaluate the early and late exploration capabilities of the PSO variations, the optimum fitness is estimated after 10 and 2000 iterations, respectively. The optimization was carried out on the previously specified benchmark functions with dimensions of 30, 60, and 90 while keeping the same presetting settings for all PSO variations, including the number of particles, constant. The figures undeniably reveal that the PSO-TPME's early exploration performance outperforms the overall (early and late) exploration performance of the investigated PSO variants by orders of magnitude. This is also proven for all previously described benchmark functions for large dimensional problems of 30, 60, and 60 dimensions. This clearly shows that PSO-TPME has remarkably fast and accurate convergence characteristics, which are supported by benchmark functions with various levels of complexity and a large number of dimensions.
\section{Discussion}
Starting point are five popular variants of particle swarm optimization.
The proposed new PSO variant (PSO-TPME)
is shown to dramatically improve convergence speed and global exploration capabilities.
This variant comprises the three major factors affecting convergence speed and global exploration capabilities: particles' classification, elitism, and mutation, as well as the original PSO's cognitive and social models. This variation introduced an alternative classification approach, elitism, and targeted position mutation, all of which were integrated into the basic PSO algorithm. The introduced particle classification process is simple to apply, requires low memory, is adaptive, and provides automated termination criteria based on convergence. These qualities of the proposed classification technique permitted the implementation of targeted elitism and mutation, in terms of targeting just the poor particles, terminating the elitism and mutation process automatically in the event of convergence, and applying different updating models (social and/or cognitive) based on the particle's category.
A set of benchmark multi-dimensional functions widely used in the optimization problems were used to compare the performance of the proposed PSO-TPME to EPSOM, LDW-PSO, PSO-M and M-PSO, in terms of convergence accuracy and convergence speed. The 30, 60, and 90-dimensional Griewank, Rastrigrin, and Rosenbrock functions are employed. Each of them provides a different level of complexity, such as unimodality or multimodality, symmetry or asymmetry, and separability or inseparability. For each benchmark function, many minimization simulations were performed, repeated, and averaged to reduce statistical errors. The simulations revealed that PSO-TPME surpasses the aforementioned variants by orders of magnitude in terms of convergence rate and accuracy.
\vspace{6pt}
\authorcontributions{Conceptualization, T. Shaqarin and B. R. Noack; methodology, T. Shaqarin; software, T. Shaqarin; validation, T. Shaqarin and B. R. Noack; formal analysis, T. Shaqarin; investigation, T. Shaqarin.; resources, T. Shaqarin; data curation, T. Shaqarin; writing---original draft preparation, T. Shaqarin and B. R. Noack; writing---review and editing, T. Shaqarin and B. R. Noack; visualization, T. Shaqarin; supervision, T. Shaqarin and B. R. Noack; project administration, B. R. Noack; funding acquisition, B. R. Noack. All authors have read and agreed to the published version of the manuscript.}
\funding{This work is supported
by the National Science Foundation of China (NSFC) through grants 12172109 and 12172111
and by the Natural Science and Engineering grant 2022A1515011492
of Guangdong province, China.}
\dataavailability{Not applicable}
\conflictsofinterest{ The authors declare no conflict of interest.}
\begin{adjustwidth}{-\extralength}{0cm}
\reftitle{References}
|
\section{Introduction}
The quantum ring is in many respect the drosophila of quantum physics. It often provides a simple description of a range of phenomena which are related to the topology of states due to the periodicity of the ring. Prominent examples are states with persistent currents and the role of magnetic flux which penetrates the ring and thereby inducing angular momentum to the system. In the presence of interactions between particles strongly correlated situations can also be addressed successfully using for instance the Bethe ansatz.
The basic premise in this paper is a simple one. We will discuss the properties of two gauge coupled particles in a ring, where each particle is subject to a gauge potential whose strength depends on the position of the other particle in the ring. The motivation for studying this problem is two-fold: firstly we are interested in what kind of ground states we get as a function of interaction strength. We can in particular expect a non-trivial dependence on center of mass momentum due to the gauge potential present. This question and situation is also closely related to the work by Aglietti et al. \cite{aglietti_1996} where they studied among other things the linear case with short range interactions. Secondly, a gauge potential which depends on the position of the other particle allows us to draw parallels with density dependent gauge potentials in the many particle mean field limit \cite{edmonds2013a} which are encountered in Chern Simons theory in the context of flux attachment \cite{valenti2020}. This is further emphasised by the recent experimental realisation and emulation of a one-dimensional topological gauge theory in a Raman-coupled Bose-Einstein condensate \cite{frolian-2022} together with a comprehensive theoretical investigation of the mappings required to connect the experimental platform with the chiral BF theory \cite{chisholm-2022}.
\section{The two-body ground state \label{sec:system}}
We envisage two particles with coordinates $x_1=R\theta_1$ and $x_2=R\theta_2$ being trapped in a ring with radius $R$ and angular coordinates $\{\theta_1,\theta_2\}=[-\pi,\pi]$, see Fig. \ref{figexp}. The two particles interact via a gauge potential in the azimuthal $\theta$-direction that is of the form $A(x_1,x_2)=\kappa\delta(x_1-x_2)/\hbar$, where $\kappa$ controls the strength of the gauge potential, and in addition we allow the $\delta(x_1-x_2)$ function to have a non-zero width, i.e. the interaction can be long range. The two-body Schr\"odinger equation for this situation is given by
\begin{eqnarray}
i\hbar\partial_t\Psi(x_1,x_2)&=&\frac{\hbar^2}{2m}\big[(-i\partial_{x_1}+A(x_1,x_2))^2+\nonumber\\&&(-i\partial_{x_2}+A(x_1,x_2))^2\big]\Psi(x_1,x_2).
\label{sch1}
\end{eqnarray}
We assume the gauge potential $A(x_1,x_2)$ and $\delta(x_1-x_2)$ are even functions with respect to $x_1-x_2$. This in turn breaks Galilean invariance \cite{bak-1994}. We can therefore expect chiral dynamics to appear \cite{aglietti_1996,valenti2020,valiente-a-2021,valiente-b-2021}.
It is helpful to separate variables and introduce the relative coordinate $x=x_1-x_2$ and center of mass coordinate $s=(x_1+x_2)/2$. Choosing our unit of length to be the radius $R$ of the ring and time in unit of $2mR^2/\hbar$, we obtain the transformed Schr\"odinger equation
\begin{eqnarray}
&&i\partial_t\Psi(x,s)=\nonumber\\&& [-2\partial_{x}^2-\frac{1}{2}\partial^2_s-2i\kappa\delta(x)\partial_s+ 2\kappa^2\delta(x)^2]\Psi(x,s).
\label{sch2}
\end{eqnarray}
We write the stationary solution of Eq. (\ref{sch2}) in the form
\begin{equation}
\Psi(x,s)=e^{-i\varepsilon t} e^{ips} \varphi(x),
\end{equation}
which results in the time independent problem
\begin{equation}
[-\partial^2_x+(\frac{p}{2}+\kappa\delta(x))^2]\varphi(x)=\frac{\varepsilon}{2}\varphi(x),
\label{sch3}
\end{equation}
where $p$ is the center of mass momentum. From Eq. (\ref{sch3}) we see that the effective potential
\begin{equation}
V_{eff}(x)=\big(\frac{p}{2}+\kappa\delta(x)\big)^2
\label{poteff}
\end{equation}
now depends on the center of mass momentum $p$ and the parameters of the gauge potential. The shape of $\delta(x)$ and the strength of $\kappa$ is fixed, and given by the physical system we happen to consider. The corresponding ground state we then find by choosing the momentum $p$ such that we obtain the lowest possible energy $\varepsilon$. From the potential in Eq. (\ref{poteff}) we can already say something about the possible ground states we can expect to see. Because of the quadratic dependence and the fact that the signs of $p$ and $\kappa$ can be different, the resulting potential can acquire the shape of a single well or a double well. This immediately tells us that there might be two kinds of solutions for the ground state, which we will show is indeed the case.
In order to calculate explicitly what the ground state is together with its corresponding wave function we need to define the form of the gauge potential and $\delta(x)$. We will choose a localised symmetric and periodic function of the form
\begin{equation}
\delta(x)=Q\cos^{2q}(x/2),
\label{del}
\end{equation}
where $q=1,2,3,...$ and $Q=q!/(2\sqrt{\pi}\Gamma[q+\frac{1}{2}])$ is a normalisation constant such that $\int_{-\pi}^\pi \delta(x)=1$. We note that for $q\rightarrow \infty$ we obtain the short range limit with the gauge potential proportional to the Dirac delta function. In this limit we see that the energy is given by $\varepsilon_{\ell,p}=(\ell^2+p^2)/2$ where $\ell$ is a non-zero integer and with even and odd eigenstates
\begin{equation}
\varphi_p^\ell(x)=\left\{\begin{array}{lc}\sin(\ell\frac{|x|}{2}) & \\\sin(\ell\frac{x}{2}) & \end{array}\right.
\end{equation}
The ground state is then given by
$\varphi_{p=0}^{\ell=1}(x)$ with center of mass momentum $p=0$. For a long range gauge potential $\delta (x)$ with finite $q$ we will see that the situation is different.
In Fig. \ref{energy} we show a plot of the energy as a function of $\kappa$ for different momenta $p$, and for a varying degree of long range interaction, {\it i.e.} for different values of $q$. With a long range gauge potential the ground state is found to have a non-zero centre of mass momentum $p$ provided that the interaction strength $\kappa$ is strong enough. A sufficiently long-range gauge potential is needed in order to have non-zero centre of mass momentum where we in particular note that for the analytically tractable gauge potential described by the short range Dirac delta function the ground state will always have zero momentum. In addition, the ground state wave function can take two forms, which we refer to as correlated and anti-correlated states, which represent the physical situation where the particles are most likely to be found close to each other (correlated) or separated (anti-correlated), see Fig. \ref{correlated}. The correlated and anti-correlated states can be expected from looking at the effective potential $V_{eff}(x)$ in Eq. (\ref{poteff}) which is a quartic function of $x$ and consequently can have a single or two minima depending on the parameter $\kappa$ and center of mass momentum $p$. The ground state, even if it is localised as a function of the relative distance between the particles, carries no information about where in the ring the two particles can be found. In other words, there is an equal probability to measure particle 1 anywhere in the ring, and particle 2 consequently close by or separated depending on whether the state is the correlated or anti-correlated one. This is illustrated in Fig. \ref{correlated} for $q=1$, where the probability density $|\varphi(\theta_1,\theta_2)|^2$ is shown as a function of the two coordinates $\theta_1$ and $\theta_2$.
\begin{figure}
\includegraphics[width=8.5cm]{exp-fig2.pdf}
\caption{The tightly confined ring with radius $R$ traps two particles with coordinates $\theta_1$ and $\theta_2$. The interaction between the two particles is mediated by a gauge potential $A(\theta_1-\theta_2)$ which is a function of the distance between the particles.}
\label{figexp}
\end{figure}
\begin{figure}
\includegraphics[width=8.5cm]{fig-energy-summary-v2.pdf}
\caption{The ground state energy as a function of $\kappa$ and for different values of the quantised centre of mass momentum $p$. Three examples of the long-range interaction are illustrated in (a). The corresponding spectra are shown in (b) for $q=1$, (c) for $q=4$, and (d) for $q=32$. With decreasing range of the interaction between the particles the system approaches the zero momentum ground state.}
\label{energy}
\end{figure}
\begin{figure}
\includegraphics[width=8.5cm]{gs-ac-vs-co.pdf}
\caption{An example of the correlated and anti-correlated ground states for two different values of the interaction strength $\kappa=3.8$ and $\kappa=6.3$ with centre of mass momentum $p=-2$. The upper panel shows the ground state probability density as a function of the relative distance. The lower panel shows the corresponding ground state as a function of the two coordinates $\theta_1$ and $\theta_2$ for the two different $\kappa$-values. Yellow indicates high probability and blue low probability.}
\label{correlated}
\end{figure}
\section{The role of measurements}
From Fig. \ref{correlated} we note that if the position of one particle is measured, then there is an equal probability to find this particle anywhere in the ring. On the other hand, once the first particle is measured, the second particle is most likely to be found close to the first measured particle in the case of a correlated ground state, and separated from it for the anti-correlated state. If we assume a perfect measurement of the position of the first particle, such that it is removed from the system once measured, the resulting wave function for the other particle will be given by the ground state $\Psi(\theta_1^{(0)},\theta_2)$ (see Fig. \ref{correlated}) where $\theta_1^{(0)}$ is the position of the measured particle. After the measurement the remaining particle is no longer in its ground state. Consequently the resulting dynamics is nontrivial where the shape of the wave function and its localised nature can be quickly lost, see Fig. \ref{measure}a. For an imperfect measurement of the first particle, the resulting wave function for the remaining particle is given by
\begin{equation}
\Psi(\theta_1^{(0)},\theta_2)=\int_{-\pi}^{\pi}d\theta_1 G(\theta_1-\theta_1^{(0)})\Psi(\theta_1,\theta_2),
\end{equation}
where $G(\theta_1-\theta_1^{(0)})$ captures the uncertainty of the measurement and is a distribution which obeys the periodicity of the ring, and with a non-zero width. With increasing uncertainty in position we observe that the wave function for the remaining particle retains its localised shape, and at the same time rotates around the ring due to the non-zero angular momentum of the ground state. This is illustrated in Fig. \ref{measure} where the effect of different uncertainties in position are compared, and where we consider the situation with a non-zero center of mass angular momentum in the ground state. In Fig. \ref{measure} we have chosen a distribution of the form $G((\theta-\theta_1^{(0)})/2))={n!/}{(2\sqrt{\pi}\Gamma[n+\frac{1}{2}]}\cos^{2n}((\theta-\theta_1^{(0)})/2)$ which is normalised to one such that the width is a function of $n$. Similar to the choice of gauge potential in Eq. (\ref{sch1}) the distribution approaches the Dirac delta function in the limit $n$ going to infinity.
For the broadest choice of distribution with $n=1$ in Fig. \ref{measure} the wave function for the now single particle dynamics retains its localised shape for several roundtrips. This may seem counterintuitive at first, since one would expect a localised initial state to expand and eventually interfere with itself in the ring giving rise to complicated dynamics. However, it is possible to construct special solutions to the single particle Schr\"odinger equation for a ring, that are localised non-dispersive solutions with a non-zero angular momentum, {\it i.e.} they rotate. Such solutions have been found by Qin \cite{qin2019} and are of the form
\begin{equation}
\Phi(\theta)=C_0\cos(m\theta-\ell t)e^{i(\ell\theta-\frac{1}{2}(m^2+\ell^2)t)},
\label{scripta}
\end{equation}
where $m$ and $\ell$ are integers. From Eq. (\ref{scripta}) we notice that $\Phi(\theta)$ is a travelling localised solution with velocity $\ell/m$. In addition, because of the linearity of the single-particle Schr\"odinger equation, we can always construct superpositions of different states such that we have a non-zero background for instance. This is indeed the type of solution we find after measuring one particle with sufficiently large uncertainty, see Fig. \ref{measure}, if we choose $m=\ell=1$ in Eq. (\ref{scripta}). We therefore conclude that when extracting information about the two-particle ground state by measuring the position of one particle with sufficiently large uncertainty, the ground state is projected onto a single particle wave function which is localised, shape preserving, and rotating in the ring.
The non-dispersive nature of the wave function for the remaining particle after measuring the other particle, leads us naturally to the question of uncertainty relations for the positions of the two particles. We have seen that in order to obtain a non-dispersive wave packet we need an uncertainty in our measurement of the particle 1 position. We can indeed calculate the Robertson-Schr\"odinger uncertainty relation for the positions of particle 1 and particle 2, however, we cannot use the angular coordinate as our position operator with eigenvalues spanning $[-\pi,\pi]$ because of the discontinuous nature which leads to ill-defined expectation values of position and corresponding uncertainties. Instead we define the operator
\begin{equation}
\hat Q_i=\sum_n e^{i\theta_n}\hat D(R_n)
\label{oper}
\end{equation}
which does not suffer from any discontinuities and is periodic around the ring, and where the operator $\hat D(R_n)$ is a projection operator representing a measurement of a particle in an angular region $R_n$ with eigenvalues $0$ or $1$. With the definition of $\hat Q_i$ we can calculate the corresponding uncertainty relation with respect to $\hat Q_1$ and $\hat Q_2$ with
\begin{equation}
\Delta Q_1^2 \Delta Q_2^2 \ge |\frac{1}{2}\langle\{\hat Q_1,\hat Q_2\}\rangle-\langle \hat Q_1\rangle \langle \hat Q_2\rangle |^2+\frac{1}{2i} \langle [\hat Q_1,\hat Q_2]\rangle |^2.
\end{equation}
The uncertainty relation will depend on the quantum state that the two particles are prepared in. In Fig. \ref{unc} we see how the uncertainty $\Delta Q_1 \Delta Q_2$ changes drastically as a function of the interaction strength $\kappa$. Two special values $\kappa=\pi$ and $\kappa=2\pi$ can be identified. At $\kappa=\pi$ the ground state changes between the centre of mass momentum $p=0$ and $p=-2$, with a corresponding change in uncertainty $\Delta Q_1 \Delta Q_2$ which has a maximum at $\kappa=\pi$. For $\kappa=2\pi$ the uncertainty relation is zero with the centre of mass momentum $p=-2$. We can understand the reason why these two points are special if we look at the effective potential in Eq. (\ref{poteff}). For $\kappa=\pi$ the $V_{eff}(x)$ provides the same confinement for both $p=0$ and $p=-2$, when we rely on the rotational symmetry of ring with $V_{eff}(x)=\cos^4(x/2)$ and $V_{eff}(x)=\sin^4(x/2)$ respectively.
\begin{figure}
\includegraphics[width=7.5cm]{time-evo.pdf}
\caption{Measuring particle 1 with a non-zero uncertainty results in particle 2 propagating around the circle. (a) For a sufficiently large uncertainty in measuring particle 1 with $n=1$, the remaining particle 2 is found in a rotating state with non-zero angular momentum where it retains its shape without any significant spreading. (b) For an almost perfect measurement with a small uncertainty in position of particle 1 with $n=50$, the probability density of particle 2 no longer retains it shape.}
\label{measure}
\end{figure}
\begin{figure}
\includegraphics[width=7.5cm]{uncertainty-pos.pdf}
\caption{The uncertainty $\Delta Q_1 \Delta Q_2$ for operators defined by Eq. (\ref{oper}) allows us to quantify the correlation in position for the two particles. We note two special points, $\kappa=\pi$ and $\kappa=2\pi$ which correspond to specific symmetric shapes of the effective potential $V_{eff}(x)$ in Eq. (\ref{poteff}). The corresponding ground state has non-zero centre of mass angular momentum $p$ for $\kappa>\pi$.}
\label{unc}
\end{figure}
\section{Conclusions}
The two-body problem in a ring where the interaction is mediated by a gauge potential which in turn depends on the distance between the particles, provides some surprising results. Rotating ground states in combination with a flux penetrating the ring is not uncommon, and has been studied a lot. However, the distance dependent gauge potential gives rise to rotating ground states which are correlated, and, in combination with measuring the position of one of the particles, can result in non-dispersive rotating states for the remaining particle. It is certainly tempting to speculate whether the gauge potential studied in this work could be realised experimentally. Density dependent gauge potentials for a Bose-Einstein condensate in the mean field limit has been studied \cite{edmonds2013a,valenti2020} and also experimentally realised \cite{frolian-2022}, although these works were based on a short range interaction between the atoms. An optical realisation of the two-body problem together with a long-range gauge potential is not inconceivable. Recent advances in the control of light propagation in photonic lattices allows for emulating synthetic nonlinearities which can also be long-range \cite{mukherjee2018,duncan2020}. This, together with a mapping between single particle physics in 2D and interacting 2-particle dynamics in 1D lattices \cite{mukherjee2016} may well provide a route towards an experimental realisation of the phenomena discussed here.
\section{Acknowledgements}
The authors acknowledge helpful discussions with E. Andersson, M. Edmonds and M. Valiente. G.V.-R. acknowledges support from EPSRC CM-CDT Grant No. EP/L015110/1.
|
\section{Introduction}
In the era of big data, the demand for high-speed communication is significantly increasing. Various data-hungry applications, such as virtual and augmented reality, high-resolution mobile video streaming, and delay-sensitive online gaming, come with significant traffic demands and incentivize existing cellular network to seek larger bandwidths by communicating at higher frequencies. Millimeter wave (mmWave) band, spanning from 30 to 300 GHz, is a promising technology to support such high demand.
There are three fundamental challenges which can hinder fully utilizing of the mmWave system: \textbf{(I)} \textbf{Sample complexity.} The propagation loss is severe due to high atmospheric attenuation, which increases at higher frequencies. To overcome this, beamforming with a large antenna array is leveraged to form a directional beam and reduce the channel loss, which could provide a higher throughput for a certain direction. Beam alignment between transmitter and receiver is therefore needed before data transmission \cite{hashemi2018efficient}. Usually, time-consuming exhaustive searches are performed and many samples are required to find the optimal beam direction. \textbf{(II)} \textbf{Time-varying complicated function.} Signals reach the receiver via multiple paths, including one line-of-sight (LOS) path and several non-line-of-sight (NLOS) paths. To this end, the received signal strength is a non-linear non-convex function with respect to beamforming vectors, and the Channel State Information (CSI) for multi paths is difficult to obtain and estimate. In practical environments and mobile scenarios, the mmWave channel becomes time-varying and estimating the channel gain becomes more challenging, as existing paths may quickly disappear and new paths may appear \cite{zhang2020beam}. \textbf{(III)} \textbf{Interference Constraints.} Although the beam is directional, in heterogeneous environments with multiple transmitters, users in neighboring cells still have high interference if they use the same frequency \cite{bayraktar2021efficient}, particularly users who are located close to the cell's edge \cite{wang2019interference}. Therefore, some beam candidates cannot be used for data transmission. In dynamic environments, it is more difficult to check their eligibility with time-varying channels.
In the presence of these challenges, we pose the following question: \textit{In a non-stationary multi-path environment, can we learn to find the optimal interference-constrained beam alignment configuration in a sample-efficient manner? }
We cast this problem as a sequential decision-making problem, where the objective is to maximize the received signal strength, under a time-varying constraint on the interference at other users' terminals. We use the kernelized multi-armed bandits (i.e. Gaussian Process bandit) \cite{chowdhury2017kernelized} to model this problem, where each sample point represents a beamforming vector on an array of fixed-phase antennas. As different beamforming vector leads to various beam directions and interference levels, the received signal and the interference change accordingly. We aim at designing a sequential query point selection (i.e., beamforming vector selection) strategy that maximizes the reward (i.e., received signal strength) in a time-varying channel with a small violation in the soft interference constraint.
Our constrained kernelized bandit model addresses the above three challenges in a unified way. Since the reward (received signal) function is continuous, it can be uniformly approximated by a function in the reproducing kernel Hilbert space (RKHS) \cite{micchelli2006universal} (under a proper choice of the kernel). To utilize this representation power of RKHS, we further assume that the reward function is within a RKHS induced by a kernel. With this assumption, the complicated multi-path channel in challenge \textbf{(II)} could be represented by one function within the RKHS. Such kernel-based modeling is also used in WLAN \cite{kushki2007kernel} and wireless sensor networks \cite{honeine2009functional}. As the channel is time-varying, the reward function varies from time to time within the RKHS. Further, since similar beamforming vectors lead to similar beam and received signal strength, this assumption automatically utilizes the beam correlation information \cite{wu2019fast} as RKHS is kernel-based and correlation-embedded. Therefore, we significantly reduce the search space, compared to the exhaustive search in challenge \textbf{(I)}.
Moreover, we model the interference-based beam eligibility in challenge \textbf{(III)} as a constraint function. When the received signal at each non-target user is less than a threshold, the constraint is satisfied and the beam is eligible. As the channel is time-varying, this constraint also changes with time. Finally, we develop the constrained kernelized bandit based on the primal-dual method and Gaussian Process agnostic setting. The proposed algorithm periodically restarts to overcome the non-stationarity in the environment. We further provide theoretical bounds on the performance of reward and constraint violations for any kernel.
In summary, our major contributions are as follows:
\textbf{1) Algorithm Design:} Using the online learning framework, we propose a novel constrained kernelized bandit algorithm with restart for beam alignment in time-varying environments. In particular, we first leverage the inherent correlation and representation power of kernelized bandits, where the reward function supports general multi-path scenarios and various channel models. Second, we model the interference as a constrained bandit via the primal-dual method. Third, we propose a restart schedule to handle the time-varying environments.
\textbf{(2) Theoretical Results:} We provide theoretical guarantees on the cumulative regret and constraint violations, where the regret is the loss compared with the optimal algorithm. In particular, our proofs overcome technical challenges posed by time-varying environments. We further provide sublinear bounds for a general non-stationary constrained kernelized bandit framework, which is a missing part of the state-of-art kernelized bandit. Additionally, the proposed algorithm is performed without prior knowledge about total channel variation. If this knowledge is provided, we show that the algorithm can further improve performance and both regret and constraint violations bounds become tighter.
\section{Related Work}
\subsection{Beam Alignment}
To reduce the beamforming overhead, there is a large amount of work on digital and analog beamforming \cite{roh2014millimeter} and channel selection \cite{combes2014dynamic}. The authors in \cite{hashemi2018efficient} exploit the inherent correlation in beamforming and leverage this contextual information to reduce the search space for beam alignment. However, its assumption of unimodal function with respect to beam directions only holds in single path situations and fails in multi-path scenarios. Wu et. al. \cite{wu2019fast} utilize the prior knowledge of the channel fluctuation to accommodate reward uncertainty. Specifically, they assume that the variance of the channel fluctuation is known and as a result, less exploration is needed and the beam alignment is accelerated. The authors in \cite{zhang2020beam} leverage stationary stochastic bandits to sense the change of the environment in dynamic beamforming. In their model, actions (arms) are designed based on the difference (offset) of the indices of the optimal beams in two adjacent time slots, which measures the rate of change of the environments. They further assume that the reward of each arm is from a fixed distribution depending on the arm but not on the time slot (therefore, there exists a best arm that captures the best rate of changes), which limits its generalization to model dynamic environments. In \cite{gupta2020beam}, non-stationary multi-armed bandits are leveraged for time-varying channels in beam alignment, where they use a sliding window-based algorithm and weight penalty-based algorithm. However, in their model, arms are independent of each other and prior knowledge of the number of breakpoints (when the reward distribution changes) is required, which means it can only handle abruptly change scenarios rather than slowly-changing scenarios and the correlation between beams is not utilized. In contrast to previous works, we focus on the interference-constrained beam selection in a general time-varying environment, where changes are time-dependent and it includes both abruptly changes and slowly changes. The proposed algorithm can be performed without any prior knowledge about changes.
\subsection{Non-stationary bandit}
Multi-armed bandit (MAB) is a general framework in sequential decision-making, where the agent needs to select a query point at each time slot to maximize the cumulative reward \cite{robbins1952some}. The unknown reward function is usually a black-box function defined over a large domain space. In real-world scenarios, the reward function is often not fixed and varies over time. For example, in stochastic linear bandit (the black-box function is linear and query points are non-orthogonal), three common techniques are leveraged to tackle time-varying rewards: (i) periodically restarting the learning process \cite{zhao2020simple}, (ii) regression based on the data within a sliding window \cite{cheung2019learning}, (iii) putting a time-dependent weight across all data \cite{russac2019weighted}. Recently, kernelized bandits (i.e. Gaussian process bandits) have become popular, as they generalize traditional MAB and linear bandit, by allowing the reward function to be non-linear and non-convex \cite{chowdhury2017kernelized}. Similarly, to tackle non-stationarity, there are mainly three methods: restart \cite{zhou2021no}, sliding window \cite{zhou2021no} and weight penalty \cite{deng2022weighted}. This problem becomes more challenging in practical applications where there are unknown soft constraints \cite{zhou2022kernelized}. In this paper, we generalize previous non-stationary results to the case with a general unknown time-varying constraint function. We further show that the restart method works with constraint bandits and cast the interference-constrained beam alignment problem as a constrained bandit model in time-varying environments.
\section{Problem Statement}
We consider a millimeter wave (mmWave) point-to-point communication system, where the transmitter (BS) is equipped with phased array antennas and the receiver (UE) uses a single antenna. Before data transmission, beam alignment is needed to achieve the array gains and high throughput. Due to the high power consumption in digital beamforming, we focus on an analog beamforming structure that relies on a single radio-frequency (RF) chain and one analog-to-digital converter (ADC) with less power consumption. In practical dynamic environments, the mmWave channel varies fast and the change becomes faster in mobile scenarios, where either the transmitter or the receiver is moving.
Let $x_t \in \mathbb C^{M}$ denote the beamforming weight vector at time $t$ with $M$ antennas. We assume that $x_t \in X$ is in the predefined codebook, where the number of beams $|X|$ is finite. By controlling $x_t$, we have various beams with different directions and widths. The transmitted pilot signal is $s$ for all time slots.
Since the receiver has the omni-directional beam, the received signal at the receiver is the weighted combination of the message $s$ across all antennas at the transmitter. For user equipment (UE) A, we have the noise-free received signal strength (RSS) as
\begin{align*}
y_t = |H_t x_t s | =: f_t(x_t),
\end{align*}
where $H_t= \sum_{l=1}^L H_t^l$ denotes multipath time-varying channel gain for UE A with $L$ paths, which is a location-dependent unknown function of time $t$. We assume that UE A observes a noisy signal strength with an additive Gaussian noise $n_t$, {\em without any estimates} of the channel gain $H_t$. Therefore, we have the observation at time $t$ as $r_t= f_t(x_t) + n_t$.
Besides UE A, we further consider a group of UEs $\mathcal J$. As UE A is the target the beam wants to focus on, UEs in $\mathcal J$ do not want to suffer from interference. We formulate the constraint of interference as follows.
For UE $j \in \mathcal J$, we have multipath time-varying channel $H_{t,j}$. The noise-free received signal strength is $y_{t,j} = |H_{t,j} x_t s|$, which is required to be less than a threshold $\xi_j$. This constraint aims at reducing interference \cite{wang2019interference} and achieving a large SINR for all UEs in $\mathcal J$. We define the constraint for UE $j$ as $c_{t,j} = y_{t,j} -\xi_j \leq 0 , \forall j \in \mathcal J$. Combining $|\mathcal J|$ constraints through defining the maximum cost as a fixed function
\begin{align*}
g_t(x_t) = \max_{j \in \mathcal J} \{c_{t,j} \}.
\end{align*}
We further assume that the observation is noisy with Gaussian noise $\epsilon_t$, then, we have the interference constraint as follows
\begin{align} \label{equ: constraint}
c_t = g_t(x_t) + \epsilon_t \leq 0.
\end{align}
In summary, we want to control the beamforming vector $x_t$, to find the beam which achieves largest RSS $f_t(x_t)$ for UE A while making RSS for UEs in $\mathcal J$ less than a threshold, i.e., constraint $g_t(x_t) \leq 0$. Both $f_t$ and $g_t$ are time-varying unknown functions and the observations $r_t$ and $c_t$ are noisy such that $\mathbb{E}[r_t] = f_t(x_t)$ and $\mathbb{E}[c_t] = g_t(x_t)$. In heterogeneous environments with multiple transmitters, this setting is common as $\mathcal J$ includes UEs in the same cell in which A resides and UEs in the neighboring cells.
With different beamforming vectors $x_t$, the transmitter can turn the beam in various directions and widths. Our goal is to find the best beam setting $x_t$ to maximize the received energy, with time-varying interference constraints and non-stationary channel conditions.
Let $T$ denote the time period for beam alignment before downlink data transmission. We formulate this beam alignment into an online constrained stochastic optimization problem. Here, the algorithm picks beamforming weight sequence $\{x_t \}_{t=1}^T$ to maximize the expected received signal strength $ \mathbb{E} [r_t]$ subject to a constraint on the violation of interference constraint $ \mathbb{E} [c_t] \leq 0$. We thus have an optimization problem with a constraint at time $t \in [1,T]$ as follows:
\begin{align} \label{equ: objetive1}
&\max_{ x_t } f_t(x_t) \textit{\space s.t. \space} g_t(x_t) \leq 0.
\end{align}
At every time $t$, we want to use the past observations $\{(r_1,c_1),\ldots,(r_{t-1},c_{t-1})\}$ to estimate the channel gains for each beam and pick an appropriate beamforming vector $x_t$ that maximizes the above optimization problem. In other words, we want to determine a learning policy $\pi_t$, which takes as input $\{(r_1,c_1),\ldots,(r_{t-1},c_{t-1})\}$ and outputs $x_t$, without knowing time-varying functions $f_t$ and $g_t$.
\section{Constrained Non-stationary Gaussian Process Bandit Model}
\subsection{Preliminaries}
\textbf{Regularity Assumptions}: As similar beamforming vectors will produce similar beams, the beamforming vector $x_t$ is highly correlated. We use the Reproducing Kernel Hilbert Space (RKHS) induced by a kernel to model this correlation. This formulation is different from the traditional multi-armed bandit, where each beamforming vector is modeled as orthogonal arms and the correlation information between them can not be modeled.
We assume that $f_t$ is a fixed function in a RKHS with a bounded norm. The RKHS, denoted by $\mathbb H_k(X)$, is completely specified by its kernel function $k(\cdot, \cdot)$, with an inner product $\left< \cdot, \cdot \right>_{\mathbb H_k}$ satisfying the reproducing property: $f_t(x) = \left <f_t, k(x, \cdot) \right >_{\mathbb H_k}$ for all $f_t \in \mathbb H_k(X)$. Similar argument holds for constraint $g_t$ with kernel $\tilde k$, and $g_t \in \mathbb H_{\tilde k}(X)$.
\begin{assumption}[Boundedness]
We assume that $f_t$ at each time $t$ is bounded by $\|f_t\|_{\mathbb H_k} \leq B$ and $k(x,x) \leq 1$ for a fixed constant $B$. Similarly, we assume that $||g||_{\mathbb H_{\tilde k}} \leq G$ and $\tilde k(x,x) \leq 1$ with a constant $G$.
\end{assumption}
Different from the restrictive assumption on unimodal reward function in \cite{hashemi2018efficient}, our assumption supports both single-path and multi-path channel and various channel models. This is because an arbitrary continuous function can be approximated by an element in this RKHS under the supremum norm\cite{micchelli2006universal}. Moreover, it holds for practically relevant kernels. One concrete example is Squared Exponential kernel, defined as $k_{SE}(x,x') = \text{exp}(-s^2/2l^2)$
where scale parameter $l>0$ and $s=\|x-x'\|_2$ specifies distance between two points. In the following assumption, we assume that there exists one beam satisfies the constraint in \eqref{equ: constraint}.
\begin{assumption}[Slater Condition]
\label{assump: slater}
There exists a constant $\tau >0$ such that for any $t$, there exists $\pi^o_t$ such that $\mathbb{E}_{\pi^o_t} g_t(x) \leq - \tau$
\end{assumption}
This is a mild assumption since it only requires the existence of a policy at time $t$ such that the constraint is less than a strictly negative value. From interference perspective, it is satisfied if one beamforming vector $x_t$ has $g_t(x_t) \leq -\tau$.
\textbf{Time-varying Budget}: As the channel condition under mobility is time-varying, we assume that the total variation between $f_t$ and $f_{t+1}$ satisfies the following budget, which includes both abruptly-changing and slowly-changing environments. As the channel for UEs in $\mathcal J$ is also non-stationary, a similar budget holds for the constraint $g_t$ as well.
\begin{assumption}[Varying Budget]
We assume that the variations in reward and constraint functions are bounded, i.e. $\sum_{t=1}^{T-1} \|f_{t+1}-f_t\|_{\mathbb H_k} \leq B_f$ and $\sum_{t=1}^{T-1} \|g_{t+1}-g_t\|_{\mathbb H_{\tilde k}} \leq B_g$.
\end{assumption}
The variation budget will show up in the upper bounds of regret and constraint violation. In the next subsection, we develop Algorithm \ref{alg} without prior knowledge of this budget. In Corollary \ref{cor: bound} of Section V, we show that the algorithm will have a better performance guarantee if we know this budget.
\textbf{Gaussian Process agnostic setting}: We recall the surrogate model in standard GP-UCB algorithm (Kernelized bandit) \cite{chowdhury2017kernelized}. Gaussian process (GP) and Gaussian likelihood models are used to design this algorithm only. $GP(0,k(\cdot, \cdot ))$, a Gaussian process with zero mean and covariance $k$, is the prior for the reward function $f_t$. The noise $n_t$ is drawn independently from $\mathcal N(0,\lambda)$. Conditioned on the history $\mathcal H_t$, it has the posterior distribution of $f_t$ as $GP \left(\mu_t(\cdot),\sigma_t^2(\cdot) \right)$, where the posterior mean and variance are defined as follows.
\begin{align}
\mu_t(x) &= k_t(x)^T (K_t + \lambda I )^{-1} r_{1:t}. \label{equ: mean}\\
\sigma^2_t(x) &= k(x,x) -k_t(x)^T (K_t + \lambda I )^{-1} k_t(x). \label{equ: var}
\end{align}
where $r_{1:t}\in \Re^t$ is the reward vector $[r_1,\ldots,r_t]^T$. For set of sampling points $A_t=\{x_1, \ldots, x_t\}$, the kernel matrix is $K_t = [k(x,x')]_{x,x' \in A_t} \in \Re^{t \times t}$ for kernel function $k$ and the vector $k_t(x)=[k(x_1,x), \ldots, k(x_t,x)]^T \in \Re^t$.
Similarly, for constraint $g_t$, we have an associated posterior mean $\tilde \mu_t$ and posterior variance $\tilde \sigma^2_t$, where $r_{1:t}$ is replaced by $c_{1:t}$ and kernel $k$ is replaced by $\tilde k$.
The GP prior and Gaussian likelihood are only used for algorithm design and do not affect the setting of reward function $f_t \in \mathbb H_k(X)$, constraint function $g_t \in \mathbb H_{\tilde k}(X)$, and sub-Gaussian noise $n_t$, $\epsilon_t$. We further define the maximum information gain \cite{srinivas2009gaussian} as follows.
\begin{definition} For a given kernel $k(x,x')$, the maximum information gain at time $t$ is
$\gamma_t := \max_{A\subset X: |A|=t} I(y_A;f_A) = \max_{A\subset X: |A|=t} \frac{1}{2} \log \det(I_t + \lambda^{-1} K_A)$, where $K_A= [k(x,x')]_{x,x'\in A}$ and $I_t$ is $t \times t$ identity matrix.
\end{definition}
In the definition, $I(y_A;f_A)$ denotes the mutual information between $f_A=[f(x)]_{x\in A}$ and $y_A = f_A + n_A$, which quantifies the reduction in uncertainty about $f$ after observing $y_A$ at points $A$. We have $\gamma_t = O(d \log t)$ for linear kernel, and $\gamma_t = O( (\log t)^{d+1})$ for Squared Exponential kernel \cite{srinivas2009gaussian}.
\subsection{Algorithm}
\begin{algorithm}[t]
\SetAlgoLined
\SetKwInOut{Input}{Input}\SetKwInOut{Initialization}{Initialization}
\Input{Kernel $k(\cdot, \cdot), \tilde k(\cdot, \cdot), \gamma_t, \lambda,\delta$, restart interval $W$, $\rho = \frac{4B}{\tau}$, $\eta=\frac{\rho}{G \sqrt{T}}$ },
\For{$t\geq 1$}{
\If{t mod W = 1}{
reset to the initialization state, $t_0= t$}
Set $ \beta_{t-1} = B+ \frac{1}{\sqrt{\lambda}} R \sqrt{ 2\log(\frac{1}{\delta}) + 2 \gamma_{t-t_0}}$, $ \tilde \beta_{t-1} = G+ \frac{1}{\sqrt{\lambda}} R \sqrt{ 2\log(\frac{1}{\delta}) + 2 \tilde \gamma_{t-t_0}}$ \;
Let $ \hat f_t(x)=Proj_{[-B,B]} \mu_{t-1} (x) + \beta_{t-1} \sigma_{t-1} (x)$, and $\hat g_t(x)= Proj_{[-G,G]} \tilde \mu_{t-1} (x) - \tilde \beta_{t-1} \tilde \sigma_{t-1} (x)$\;
Define acquisition: $\hat z_{\phi_t}(x) = \hat f_t(x) - \phi_t \textit{\space} \hat g_t(x)$\;
Choose beamform vector $x_t = \arg \max_{x \in X} \hat z_{\phi_t}(x)$, Observe received signal $r_t = f_t(x_t) + n_t$, observe interference constraint $c_t = g_t(x_t) + \epsilon_t$\;
Update $\mu_t(x)$, $\sigma_t(x)$ and $\tilde \mu_t(x)$, $\tilde \sigma_t(x)$ in \eqref{equ: mean} and \eqref{equ: var} with data $(x_t, r_t, c_t)$ from $t_0$ to $t$\;
Update dual $\phi_{t+1}=Proj_{[0,\rho]} [\phi_t + \eta \hat g_t(x_t) ]$.
}
\caption{Restart GP-UCB with Constraints} {\label{alg}}
\end{algorithm}
We devise here a learning policy $\pi_t$ that employs restarting for dealing with learning in time-varying environments and a primal-dual method for solving the constrained optimization. The restart schedule is shown in lines 1 to 3 in Algorithm \ref{alg}. After $W$ time slots, we will discard previous estimates and restart to build a new estimate. The actual value of $W$ will be discussed in the next section.
Second, we construct an optimistic estimate on received signal $f_t$ and interference constraint $g_t$ based on Upper Confidence Bound (UCB) bandit. Specifically, the UCB-type exploration combines mean and variance $\mu_{t-1} (x) + \beta_{t-1} \sigma_{t-1} (x)$ for $f_t(x)$, and $ \tilde \mu_{t-1} (x) - \tilde \beta_{t-1} \tilde \sigma_{t-1} (x)$ for $g_t(x)$ towards negative constraint in line 6. These estimates will be truncated according to their bounds $B$ and $G$ respectively.
Third, we employ the primal-dual optimization to solve the constrained optimization problem. Let the baseline problem at time $t$ be given by $\max_{\pi_t} \{ \mathbb{E}_{\pi_t} f_t(x): \mathbb{E}_{\pi_t} g_t(x) \leq 0 \}$. Then the associated Lagrangian is $L(\pi_t, \phi_t) = \mathbb{E}_{\pi_t} [f_t(x)] - \phi_t \mathbb{E}_{\pi_t} [g_t(x)] $ and the dual problem is $D(\phi_t)= \max_{\pi_t} L(\pi_t, \phi_t) $. If we approximate $ \mathbb{E}_{\pi_t} [f_t(x)]$ with $\hat f_t(x)$ and $\mathbb{E}_{\pi_t} [g_t(x)] $ with $\hat g_t(x)$, then acquisition $\hat z_{\phi_t}(x) = \hat f_t(x) - \phi_t \hat g_t(x)$\ is close to $ L(\pi_t, \phi_t)$. Therefore, we can get the proximate optimal solution to $D(\phi_t)$ as $x_t = \arg \max_{x \in X} \hat z_{\phi_t}(x)$, as shown in line 7 and 8 in Algorithm \ref{alg}.
Fourth, we update the posterior mean and variance via standard Gaussian Process regression in \eqref{equ: mean} and \eqref{equ: var}, which works for both $f_t$ and $g_t$ with kernel $k$ and $\tilde k$ respectively.
Finally, we design a dual variable update towards minimizing $D(\phi_t)$. As the gradient of $\hat z_{\phi_t}(x)$ (approximating $D(\phi_t)$) with respect to $\phi_t$ is $-\hat g_t(x)$, we take a projected gradient descent with step size $\eta$. The projected upper bound is selected to be $\rho \geq \frac{4B}{\tau}$, which utilizes the information that the optimal dual $\phi^*$ is within range $[0, \frac{2B}{\tau}]$. The final dual update becomes $\phi_{t+1}=Proj_{[0,\rho]} [\phi_t + \eta \hat g_t(x_t) ]$.
Except for using the restart strategy \cite{zhou2021no, zhao2020simple} to leverage the time-varying environment, other forgetting methods will also work within our framework, such as the sliding window \cite{zhou2021no, cheung2019learning} and the exponentially increasing weights \cite{deng2022weighted, russac2019weighted}.
\section{Performance Analysis}
In this section, we assess the performance of Algorithm~\ref{alg} and provide theoretical bounds for both signal strength and interference constraint.
In the online and non-stationary setting, it is difficult to directly solve the problem defined in \eqref{equ: objetive1} by choosing the best policy at time $t$. This is because both the reward and constraint function are time-varying and the noisy observation is revealed only after a policy is executed. In addition, since the constraint function $g_t$ is unknown, the constraint $g_t(x_t)\leq 0$ may not be satisfied in every time $t$. Instead, we aim to satisfy the long-term constraint $\sum_{t=1}^T g_t(x_t)\leq 0$ over a given period $T$ \cite{zhou2022kernelized}. We define the \emph{dynamic regret} $R(T)$ as the difference of total reward between our policy $\{x_t \}_{t=1}^T$ and the best policy $\{\pi_t^* \}_{t=1}^T$. We also define the \emph{constraint violation} $V(T)$ as the cumulative violation of constraint over period $T$. We will show that the proposed algorithm achieves both small $R(T)$ and $V(T)$.
\begin{align*}
R(T) &= \sum_{t=1}^T \mathbb{E}_{\pi^*_t} f_t(x) - \sum_{t=1}^T f_t(x_t). \\
V(T) &= \left[ \sum_{t=1}^T g_t(x_t) \right]_{+}.
\end{align*}
where $[\cdot]_{+}:= \max \{ \cdot, 0\}$. $\pi^*_t$ is defined as the best policy at time $t$ which maximizes $\mathbb{E}_{\pi_t} f_t(x) = \int_{x \in X} f_t(x) \pi_t(x) dx$ while satisfying the constraint $\mathbb{E}_{\pi_t} g_t(x) = \int_{x \in X} g_t(x) \pi_t(x) dx $ $\leq 0$. We highlight that the optimal policy $\pi^*_t$ is time-dependent and may change over time, as $f_t$ and $g_t$ change over time.
In the following theorem, we obtain upper bounds on the regret of the received signal strength $R(T)$ and the interference constraint violation $V(T)$, both of which are on the order of $T^{\frac{3}{4}}$. Combining the kernel of the reward function $f_t$ and the constraint function $g_t$, we further define combined maximum information gain $\hat \gamma_T = \max\{ \gamma_T, \tilde \gamma_T \} $ and combined variation budget $B_{\Delta}= \max \{B_g, B_f \}$. We first state the result without any prior knowledge of the combined variation budget $B_{\Delta}$.
\begin{theorem} \label{thm: bound}
If the restart period $W= \hat \gamma_T^{\frac{1}{4}} T^{\frac{1}{2}}$, for any $\rho \geq \frac{4B}{\tau}$, the regret $R(T)$ and constraint violation $V(T)$ in Algorithm~ \ref{alg} at time $T$ are bounded by:
\begin{align*}
R(T) &\leq O \left(\rho G \sqrt{T} + \rho \hat \gamma_T^{\frac{7}{8}} B_{\Delta} T^{\frac{3}{4}}\right).\\
V(T) &\leq O \left(\left(1+\frac{1}{\rho}\right) \hat \gamma_T^{\frac{7}{8}} B_{\Delta} T^{\frac{3}{4}} + G\sqrt{T} \right).
\end{align*}
\end{theorem}
\begin{proof}
The complete proof is provided in Section \ref{sec: proof}.
\end{proof}
If the combined variation budget $B_{\Delta}$ is known, the order of $B_{\Delta}$ in the upper bounds can be reduced from $1$ to $\frac{1}{4}$, with a different value of restart period $W$.
\begin{corollary} \label{cor: bound}
If restart period $W= \hat \gamma_T^{\frac{1}{4}} T^{\frac{1}{2}} B_{\Delta}^{-\frac{1}{2}}$, we have tighter upper bounds for both regret and constraint violation.
\begin{align*}
R(T) &\leq O \left(\rho G \sqrt{T} + \rho \hat \gamma_T^{\frac{7}{8}} B_{\Delta}^{\frac{1}{4}} T^{\frac{3}{4}}\right).\\
V(T) &\leq O \left( \left(1+\frac{1}{\rho}\right) \hat \gamma_T^{\frac{7}{8}} B_{\Delta}^{\frac{1}{4}} T^{\frac{3}{4}} + G\sqrt{T} \right).
\end{align*}
\end{corollary}
\begin{remark}
Our dynamic regret bounds match the order of the regret in the nonstationary Gaussian Process bandits without any constraints \cite{deng2022weighted,zhou2021no,zhao2021non}. It also generalizes the kernelized bandits with constraints \cite{zhou2022kernelized} in stationary environments to the time-varying case.
\end{remark}
\section{Numerical Results}
\begin{figure*}
\centering
\begin{subfigure}{.33\textwidth}
\centering
\includegraphics[width=6cm, height=4cm]{beam_figures/beam2.jpg}
\caption{Channel with 10 NLOS paths}
\end{subfigure}%
\begin{subfigure}{.33\textwidth}
\centering
\includegraphics[width=6cm, height=4cm]{beam_figures/regret_abruptly_change.jpg}
\caption{Time-average Regret, Abruptly-change}
\end{subfigure}%
\begin{subfigure}{.33\textwidth}
\centering
\includegraphics[width=6cm, height=4cm]{beam_figures/violation_abruptly_change.jpg}
\caption{Time-average Violation, Abruptly-change}
\end{subfigure}%
\caption{Time-average Performance of two algorithms under abruptly change at time 100 and 300}
\label{fig: simulation1}
\end{figure*}
\begin{figure*}
\centering
\begin{subfigure}{.5\textwidth}
\centering
\includegraphics[width=6cm, height=4cm]{beam_figures/regret_slowly_change.jpg}
\caption{Time-average Regret, Slowly change}
\end{subfigure}%
\begin{subfigure}{.5\textwidth}
\centering
\includegraphics[width=6cm, height=4cm]{beam_figures/violation_slowly_change.jpg}
\caption{Time-average Violation, Slowly change}
\end{subfigure}%
\caption{Time-average Performance of two algorithms under slowly change scenarios}
\label{fig: simulation2}
\end{figure*}
We compare the performance of the proposed algorithm with GP-UCB algorithm with Constraints (i.e. CKB-UCB algorithm in \cite{zhou2022kernelized}). We perform the comparison under both abruptly-changing environments and the slowly-varying scenarios. We use the Phased Array System Toolbox in Matlab to simulate the beamforming vector $x_t$ and channel $H_t$. As shown in Figure \ref{fig: simulation1} (a), we assume the transmitter has 4 antennas in the uniform linear array. The channel consists of 10 NLOS path and the carrier frequency is 60GHz. We evaluate 100 beam candidates and use Squared Exponential kernel with scale parameter $l=1$ to capture the correlation between $x_t$. The received signal strength function $f$ and interference constraint function $g$ are achieved through Monte Carlo simulation, where path gains change due to moving of UEs.
The first experiment is conducted in the abruptly-changing environments, where channel changes happen at time slot $100$ and $300$. As shown in Figure \ref{fig: simulation1}, GP-UCB has a significant increase in the time-average regret because of changes in channel gains. Our proposed R-GP-UCB overcomes it whenever the variation budget $B_{\Delta}$ is known or not. The time-average interference violations increases at time $100$, which means the constraint is violated. After some time slots, it keeps decreasing, which indicates that the adaptively chosen beamforming vector $x_t$ satisfies the constraint $g_t(x_t)\leq 0$ on average. The second experiment corresponds to a slowly-varying scenario, where all UEs keep moving at a random direction at each time slot. The received signal $f_t$ and the constraint $g_t$ are simulated per time slot and keep changing.
\if 0
\begin{figure*}
\centering
\begin{subfigure}{.25\textwidth}
\centering
\includegraphics[width=4.6cm, height=3cm]{new_figures/regret_abruptly_change.jpg}
\caption{Time-average Regret, Abruptly-change}
\end{subfigure}%
\begin{subfigure}{.25\textwidth}
\centering
\includegraphics[width=4.6cm, height=3cm]{new_figures/violation_abruptly_change.jpg}
\caption{Time-average Violation, Abruptly-change}
\end{subfigure}%
\begin{subfigure}{.25\textwidth}
\centering
\includegraphics[width=4.6cm, height=3cm]{new_figures/regret_slowly_change.jpg}
\caption{Time-average Regret, Slowly change}
\end{subfigure}%
\begin{subfigure}{.25\textwidth}
\centering
\includegraphics[width=4.6cm, height=3cm]{new_figures/violation_slowly_change.jpg}
\caption{Time-average Violation, Slowly change}
\end{subfigure}%
\caption{Time-average Performance of algorithms under abruptly-changing environments and slowly-varying scenarios.}
\label{fig: simulation}
\end{figure*}
\fi
\section{Proofs of Theorems} \label{sec: proof}
Our main results are obtained via novel technical contributions. In particular, a direct combination of techniques from constrained bandits~\cite{zhou2022kernelized} and non-stationary bandits~\cite{zhou2021no} would fail. This is because the standard `time-average' trick \cite{ding2021provably} does not hold when the unknown functions are time-varying. To this end, we introduce a novel upper bound on the constraint violation \emph{per time slot}. This new per-time-slot bound can be either positive or negative, while previous time-average bound is always positive. This technique could also be of independent interest for constrained reinforcement learning. Specifically, we state a proof of Theorem \ref{thm: bound} and Corollary~\ref{cor: bound} respectively. The key idea is to construct a decomposition in Lemma \ref{lemma: no_xi_bound_t} via dual variable update and concentration inequality. This decomposition yields a bound on $R(T)$ by choosing $\phi=0$ and a bound on $V(T)$ by choosing $\phi=\rho$. The novel upper bound on the constraint violation per time slot is Lemma \ref{lem: new gt}.
\subsection{Proof of the Regret Bound $R(T)$}
In this subsection, we focus on establishing the regret bound. We first state the concentration inequality for non-stationary UCB algorithms, which bounds the gap between estimator $\mu_{t-1}(x)$ and true reward value $f_t(x)$. In comparison to the stationary case, the non-stationary UCB algorithm introduces an extra term $\Delta f_t$. A similar result holds for the constraint function $g_t$, where kernel $k$ is replaced by kernel $\tilde k$.
\begin{lemma} {\label{lemma: fbound}}
We have the following bound for any $x$:
\begin{align*}
&|\mu_{t-1} (x) - f_t(x)| \leq \Delta f_t + \beta_t \sigma_{t-1}(x), \\
\textit{where }& \Delta f_t := 1/\lambda \sqrt{2 (1+\lambda) W \gamma_W} \sum_{s=t_0}^{t-1} ||f_s - f_{s+1} ||_{\mathbb H_k}.
\end{align*}
Similarly, for $g_t$ we have $|\tilde \mu_{t-1} (x) - g_t(x)| \leq \Delta g_t + \tilde \beta_t \tilde \sigma_{t-1}(x).$ and $ \Delta g_t := 1/\lambda \sqrt{2 (1+\lambda) W \tilde \gamma_W} \sum_{s=t_0}^{t-1} ||g_s - g_{s+1} ||_{\mathbb H_{\tilde k}}.$
\end{lemma}
\begin{proof}
This lemma is the same as Lemma 1 in \cite{zhou2021no}.
\end{proof}
Leverage the maximizing action at the acquisition function $\hat z_{\phi_t} (x)$, we have the following result.
\begin{lemma} \label{lemma: Epi_ft}
The estimator $\hat f_t(x_t)$ is bounded as
\begin{align*}
\mathbb{E}_{\pi^*_t} f_t(x) - \hat f_t(x_t) \leq -\phi_t \hat g_t(x_t) + \phi_t \Delta g_t + \Delta f_t.
\end{align*}
\end{lemma}
\begin{proof}
As $x_t = \arg \max_{x \in X} \hat z_{\phi_t}(x)$, from the definition of $\hat z_{\phi_t}(x)$, we have $ \mathbb{E}_{\pi^*_t} \hat f_t(x) - \phi_t \mathbb{E}_{\pi^*_t} \hat g_t(x) \leq \hat f_t(x_t) - \phi_t \hat g_t(x_t).$
From Lemma \ref{lemma: fbound} and $\mathbb{E}_{\pi^*_t} g_t(x) \leq 0$, we have
\begin{align*}
\mathbb{E}_{\pi^*_t} f_t(x) &\leq \mathbb{E}_{\pi^*_t} \hat f_t(x) + \Delta f_t,\\
\mathbb{E}_{\pi^*_t} \hat g_t(x) &\leq \mathbb{E}_{\pi^*_t} g_t(x) + \Delta g_t \leq \Delta g_t.
\end{align*}
Combining above three inequalities, we have
\begin{align*}
\mathbb{E}_{\pi^*_t} f_t(x) &\leq \hat f_t(x_t) - \phi_t \hat g_t(x_t) + \phi_t \mathbb{E}_{\pi^*_t} \hat g_t(x) + \Delta f_t\\
&\leq \hat f_t(x_t) - \phi_t \hat g_t(x_t) + \phi_t \Delta g_t +\Delta f_t.
\end{align*}
This concludes the above results.
\end{proof}
We obtain the following lemma on the dual variable $\phi_t$.
\begin{lemma} \label{lemma:no_xi_phigt}
The estimator $\hat g_t(x_t)$ is bounded as
\begin{align*}
(\phi-\phi_t) \hat g_t(x_t) \leq \eta G^2+ \frac{1}{2\eta}(\phi_t -\phi)^2 - \frac{1}{2\eta}(\phi_{t+1} - \phi)^2.
\end{align*}
\end{lemma}
\begin{proof}
From the dual update, we have
\begin{align*}
(\phi_{t+1} - \phi)^2 &\leq (\phi_t + \eta \hat g_t(x_t) - \phi)^2 \\
&\leq (\phi_t - \phi)^2 + 2 \eta \hat g_t(x_t) (\phi_t - \phi) + \eta^2 \hat g_t^2(x_t).
\end{align*}
We prove above result as $\eta >0$ and $\hat g_t(x_t) \leq G$.
\end{proof}
In the following, we establish an important bound on $\mathbb{E}_{\pi^*_t} f_t(x) - f_t(x_t) + \phi g_t(x_t)$, which is the sum of instantaneous regret of $f_t$ and instantaneous violation of $g_t$ weighted by a general dual parameter $\phi$. Both the regret bound $R(T)$ and constraint violation $V(T)$ are developed from this lemma.
\begin{lemma} \label{lemma: no_xi_bound_t}
For any $\phi \in [0, \rho]$, we have
\begin{align*}
& \mathbb{E}_{\pi^*_t} f_t(x) - f_t(x_t) + \phi g_t(x_t) \leq \delta (x_t, \phi), \\
\textit{where \space} &\delta (x_t, \phi)= \rho \Delta g_t + 2 \Delta f_t + 2 \beta_t \sigma_{t-1} (x_t) + \phi \Delta g_t \\
+2\phi & \tilde \beta_t \tilde \sigma_{t-1}(x_t) + \eta G^2 + \frac{1}{2 \eta} (\phi_t - \phi)^2 - \frac{1}{2 \eta} (\phi_{t+1} - \phi)^2.
\end{align*}
\end{lemma}
\begin{proof}
From Lemma \ref{lemma: fbound}, Lemma \ref{lemma: Epi_ft} and $\phi_t \leq \rho$, we have
\begin{align*}
\mathbb{E}_{\pi^*_t} f_t(x) - f_t(x_t) &= \mathbb{E}_{\pi^*_t} f_t(x) - \hat f_t(x_t) + \hat f_t(x_t) - f_t(x_t) \\
\leq -\phi_t & \hat g_t(x_t) + \rho \Delta g_t + 2\Delta f_t + 2\beta_t \sigma_{t-1}(x_t).
\end{align*}
As $\phi g_t(x_t) = \phi ( g_t(x_t) - \hat g_t(x_t) )+ \phi_t \hat g_t(x_t) + ( \phi \hat g_t(x_t) - \phi_t \hat g_t(x_t) )$, use Lemma \ref{lemma: fbound} for first bracket, and Lemma \ref{lemma:no_xi_phigt} for last bracket, we have
\begin{align*}
\phi g_t(x_t) \leq & \phi \Delta g_t + \phi 2 \tilde \beta_t \tilde \sigma_{t-1}(x_t) + \phi_t \hat g_t(x_t) \\
&+ \eta G^2+ \frac{1}{2\eta}(\phi_t -\phi)^2 - \frac{1}{2\eta}(\phi_{t+1} - \phi)^2.
\end{align*}
We conclude by combining above two inequalities.
\end{proof}
Finally, by choosing $\phi=0$, we can separate the instantaneous regret of $f_t$ from the above decomposition. Then, by summarizing the instantaneous regret of $f_t$ over time $t$, we achieve the bound on $R(T)$. Two forms of bounds are proved by setting restart period $W$ when $B_{\Delta}$ is known or not.
\begin{lemma} \label{lemma: regret}
The regret is bounded as
\begin{align*}
R(T) &= O (\rho G \sqrt{T} + \rho \hat \gamma_T^{\frac{7}{8}} B_{\Delta} T^{\frac{3}{4}}).
\end{align*}
\end{lemma}
\begin{proof}
Use the the definition on policy $\tilde \pi_t$, $\mathbb{E}_{\tilde \pi_t}f_t(x) = f_t(x_t)$ and Lemma \ref{lemma: no_xi_bound_t} with $\phi= 0$, we have the instantaneous regret is bounded as
\begin{align*}
&\mathbb{E}_{\pi_t^*} f_t(x) - \mathbb{E}_{\tilde \pi_t}f_t(x) \\
&\leq \rho \Delta g_t + 2 \Delta f_t + 2 \beta_t \sigma_{t-1} (x_t) + \eta G^2 + \frac{1}{2 \eta} \phi_t^2 - \frac{1}{2 \eta} \phi_{t+1}^2.
\end{align*}
As $\phi_0 = 0$, summarize the above inequalities over time $t$,
\begin{align*}
R(T) &= \sum_{t=1}^T \mathbb{E}_{\pi_t^*} f_t(x) - f_t(x_t) \\
& \leq \sum_{t=1}^{T} \rho \Delta g_t + \sum_{t=1}^{T} 2 \Delta f_t + \sum_{t=1}^{T} 2 \beta_t \sigma_{t-1} (x_t) + \eta G^2 T. \\
\end{align*}
Let $\hat \gamma_T = \max\{ \gamma_T, \tilde \gamma_T \} $, $B_{\Delta}= \max \{B_g, B_f \}$, $\hat \beta_T = \max\{ \beta_T, \tilde \beta_T \} = O(\hat \gamma_T^{\frac{1}{2}})$, $W= \hat \gamma_T^{\frac{1}{4}} T^{\frac{1}{2}}$, $\eta=\frac{\rho}{G\sqrt{T}}$, we have
\begin{align*}
R(T) &\leq \eta G^2 T + (\rho+4) \hat \gamma_T^{\frac{7}{8}} B_{\Delta} T^{\frac{3}{4}} \\
&\leq O (\rho G \sqrt{T} + \rho \hat \gamma_T^{\frac{7}{8}} B_{\Delta} T^{\frac{3}{4}}).
\end{align*}
If $W= \hat \gamma_T^{\frac{1}{4}} T^{\frac{1}{2}} B_{\Delta}^{-\frac{1}{2}}$, we have a tighter bound $R(T)\leq O \left(\rho G \sqrt{T} + \rho \hat \gamma_T^{\frac{7}{8}} B_{\Delta}^{\frac{1}{4}} T^{\frac{3}{4}}\right)$ \cite{zhou2021no}.
\end{proof}
\subsection{Proof of the Constraint Violation Bound $V(T)$}
In this subsection, we focus on establishing the upper bound of constraint violation $V(T)$. The first lemma is an extension of Lemma \ref{lemma: no_xi_bound_t} by choosing $\phi= \rho$, where $ \rho \geq \frac{4B}{\tau}$ is defined as the upper bound in truncating $\phi_t$.
\begin{lemma} \label{lemma: no_xi_delta}
We construct a decomposition as
\begin{align*}
&\mathbb{E}_{\pi_t^*} f_t(x) - \mathbb{E}_{\tilde \pi_t}f_t(x) + \rho \mathbb{E}_{\tilde \pi_t}g_t(x) \leq \delta (x_t, \rho), \\
\textit{where \space} &\delta (x_t, \rho)= \rho \Delta g_t + 2 \Delta f_t + 2 \beta_t \sigma_{t-1} (x_t) + \rho \Delta g_t \\
+ 2\rho \tilde \beta_t &\tilde \sigma_{t-1}(x_t) + \eta G^2 + \frac{1}{2 \eta} (\phi_t - \rho)^2 - \frac{1}{2 \eta} (\phi_{t+1} - \rho)^2.
\end{align*}
\end{lemma}
\begin{proof}
Use the definition on policy $\tilde \pi_t$, $\mathbb{E}_{\tilde \pi_t}f_t(x) = f_t(x_t)$ and $\mathbb{E}_{\tilde \pi_t}g_t(x) = g_t(x_t) = - \tilde \tau$, and Lemma \ref{lemma: no_xi_bound_t} with $\phi= \rho$.
\end{proof}
The following Lemma generalizes Lemma 9 in \cite{ding2021provably} and Theorem 42 in \cite{efroni2020exploration}. We build a new upper bound for $g_t(x_t)$ for all time $t$, rather than time averaged $\frac{1}{T} \sum_t g_t(x_t)$. We note that $\delta(x_t, \rho)$ may be negative, therefore we further generalize the result from positive $g_t(x_t)$ only to the case where $g_t(x_t)$ can be either positive or negative.
\begin{lemma} \label{lem: new gt}
If $\rho \geq 2 \phi^*_t$, for $g_t(x_t) \in [-G, G]$ we have
\begin{align*}
g_t(x_t) = \mathbb{E}_{\tilde \pi_t}g_t(x) \leq \frac{2\delta (x_t, \rho)} {\rho}.
\end{align*}
\end{lemma}
\begin{proof}
Consider the optimization problem $\max_{\pi_t} \mathbb{E}_{\pi_t} f_t(x) $ $ \textit{\space s.t.\space} \mathbb{E}_{\pi_t} g_t(x) \leq 0 $.
Define the associated value function
\begin{align*}
v(\tau) = \max_{\pi_t \in \Delta } \{\mathbb{E}_{\pi_t} f_t(x) | \mathbb{E}_{\pi_t} g_t(x) \leq -\tau \}.
\end{align*}
By definition we have $v(0) = \mathbb{E}_{\pi_t^*} f_t(x)$. We break down the following analysis into four steps.
Step 1): As $\phi^*_t$ is the optimal solution to the dual problem, following Theorem 3.59 in \cite{beck2017first}, we have $- \phi^*_t \in \partial v(0) $, which means $v(\tilde \tau ) - v(0) \leq - \phi^*_t \tilde \tau$.
Step 2): We discuss the following two cases.
If $- \tilde \tau > 0$, we have the same result as Lemma 9 in \cite{ding2021provably},
\begin{align*}
\mathbb{E}_{\tilde \pi_t}f_t(x) \leq \mathbb{E}_{\pi_t^*}f_t(x) = v(0) \leq v(\tilde \tau).
\end{align*}
If $- \tilde \tau < 0$, from the definition on policy $\tilde \pi_t$, $\mathbb{E}_{\tilde \pi_t}f_t(x) = f_t(x_t)$ and $\mathbb{E}_{\tilde \pi_t}g_t(x) $$= g_t(x_t) $$= - \tilde \tau$, and the above definition of $v(\tau)$, we have $\mathbb{E}_{\tilde \pi_t}f_t(x) \leq v(\tilde \tau)$.
Step 3); Combining above two steps, we have
\begin{align*}
\mathbb{E}_{\pi_t^*}f_t(x) - \phi^*_t \tilde \tau = v(0) - \phi^*_t \tilde \tau \geq v(\tilde \tau) \geq \mathbb{E}_{\tilde \pi_t}f_t(x).
\end{align*}
Step 4): This yields
\begin{align*}
(\rho - \phi^*_t ) (- \tilde \tau ) &= \tilde \tau \phi^*_t + \rho (- \tilde \tau ) \\
&\leq \mathbb{E}_{\pi_t^*}f_t(x) - \mathbb{E}_{\tilde \pi_t}f_t(x) + \rho (- \tilde \tau ) \leq \delta(x_t, \rho).
\end{align*}
where the last line uses the result in step 3) and Lemma \ref{lemma: no_xi_delta}.
As $\rho \geq 2 \phi^*_t$ and $\mathbb{E}_{\tilde \pi_t}g_t(x) = g_t(x_t) = - \tilde \tau$, we have
\begin{align*}
\mathbb{E}_{\tilde \pi_t}g_t(x) \leq \frac{\delta(x_t, \rho)}{\rho - \phi^*_t} \leq \frac{2 \delta(x_t, \rho)}{\rho}.
\end{align*}
\end{proof}
As the optimal dual $\phi^*$ is within range $[0, \frac{2B}{\tau}]$, the above condition $\rho \geq 2 \phi^*_t$ is satisfied automatically when $\rho \geq \frac{4B}{\tau}$.
\begin{lemma}
The constraint violation is bounded as
\begin{align*}
V(T) \leq O ((1+\frac{1}{\rho}) \hat \gamma_T^{\frac{7}{8}} B_{\Delta} T^{\frac{3}{4}} + \frac{G^2 T^{\frac{1}{2}}}{\rho} + \rho T^{\frac{1}{2}} ).
\end{align*}
\end{lemma}
\begin{proof}
We consider the constraint violation
\begin{align*}
V(T) &\leq \frac{2}{\rho} \sum_{t=1}^{T} \delta(x_t, \rho)\\
&\leq \sum_{t=1}^{T} \Delta g_t + \sum_{t=1}^{T} \Delta f_t / \rho + \sum_{t=1}^{T} \beta_t \sigma_{t-1}(x_t)/\rho \\
&+ \sum_{t=1}^{T} \tilde \beta_t \tilde \sigma_{t-1}(x_t) + \eta G^2 T/\rho + \frac{1}{\eta} \rho.
\end{align*}
where $ \sum_{t=1}^{T} \frac{1}{2\eta} [(\phi_t -\rho)^2 -(\phi_{t+1} - \rho)^2] \leq \frac{1}{2\eta} (2\rho \phi_T ) \leq \frac{1}{\eta} \rho^2$.
Let $\hat \gamma_T = \max\{ \gamma_T, \tilde \gamma_T \} $, $B_{\Delta}= \max \{B_g, B_f \}$, $\hat \beta_T = \max\{ \beta_T, \tilde \beta_T \} = O(\hat \gamma_T^{\frac{1}{2}})$, $W= \hat \gamma_T^{\frac{1}{4}} T^{\frac{1}{2}}$, $\eta=\frac{\rho}{G \sqrt{T}}$, we have,
\begin{align*}
V(T) \leq O \left(\left(1+\frac{1}{\rho}\right) \hat \gamma_T^{\frac{7}{8}} B_{\Delta} T^{\frac{3}{4}} + G\sqrt{T} \right).
\end{align*}
If $W= \hat \gamma_T^{\frac{1}{4}} T^{\frac{1}{2}} B_{\Delta}^{-\frac{1}{2}}$ \cite{zhou2021no}, we have a tighter bound $V(T) \leq O \left(\left(1+\frac{1}{\rho}\right) \hat \gamma_T^{\frac{7}{8}} B_{\Delta}^{\frac{1}{4}} T^{\frac{3}{4}} + G\sqrt{T} \right)$.
\end{proof}
\section{Conclusion}
In this paper, we formulate the mmWave beam alignment problem in the time-varying multipath environment as a non-stationary kernelized bandit learning problem with constraints. The inherent correlation among the beams at successive time steps is captured by a kernel. A primal-dual method is employed to tackle the constrained learning problem. Through periodic restarts, the proposed algorithm can adaptively adjust the beam to explore the environment and find the optimal beam with a high probability. Theoretical analysis demonstrates that both the received signal and the interference constraint converge to the optimal solution in the limit, and thus, this algorithm is asymptotically optimal.
For future work, it would be interesting to change the fixed restart period to an adaptive period through change detection \cite{liu2018change} -- thereby extending the algorithm in \cite{wei2021non} to our soft-constrained setting. It is unclear whether the Gaussian Process bandit can achieve the regret bound in \cite{wei2021non} and how to incorporate constraints with two stationary tests in this algorithm.
\bibliographystyle{IEEEtran}
|
\section{Introduction}
Solar PV is rapidly becoming a significant source of power generation. Fluctuations in solar power generation due to short-term events (like moving clouds) can have large impacts in areas with high solar PV penetration. Images captured by ground-based fish-eye cameras contain a wealth of information about the sky, but this information is challenging to extract and use for reliable predictions. In the past five years, using emerging deep learning models to “read” the sky and make forecasts of PV power generation (or solar irradiance) has shown promising performance \cite{Sun2018,Zhang2018,Sun2019,Nie2020,Feng2020,Paletta2021,Paletta2021eclipse,Feng2022}.
However, two major challenges have been identified in this fast growing area. First, prior work is hard to compare as the models are developed using different datasets with different specifications. There is a lack of standardized datasets for benchmarking deep-learning-based solar forecasting models. Secondly, deep learning models are data hungry. To make deep learning models generalize well, it often requires massive and diversified training data. Several different parties have been contributing to addressing the data accessibility issues. The first type of party is comprised of national labs and research organizations which have multi-year efforts in data collection and publication of archived datasets to the public. For example, Solar Radiation Research Laboratory (SRRL) \cite{stoffel1981nrel} from NREL developed a Baseline Measurement System (BMS), which open sources multi-years of 10-min
high resolution sky images from two different sky cameras together with 1-min radiation and meteorological measurements in Golden, Colorado. However, the low temporal resolution of the image data can hardly satisfy the need of short-term solar forecasting due to the variation and volatility of the clouds. Another example is the National Surface Radiation (SURFRAD) Budget Network developed by National Oceanic and Atmospheric Administration (NOAA) \cite{augustine2000surfrad}. It provides an archived dataset of sky images and radiation and meteorological sensor measurement data from multiple sites across United States for public use, but the sky images are usually logged in low-resolution (e.g., 288$\times$352) and low temporal frequency (e.g., 1 hour). The second type of party is research groups sharing the solar forecasting datasets used in their publications. One of the most comprehensive datasets for solar forecasting was compiled by \citet{Pedro2019}, which includes 3-years of high-resolution sky images (1536$\times$1536) and irradiance measurements in 1-min frequency collected at Folsom, California, together with overlapping data from satellite imagery and Numerical Weather Prediction forecasts, as well as the features extracted from the imagery and irradiance data. Other efforts include \textit{SkyCam} by \citet{Ntavelis2021} which contains 1-year of sky images (600$\times$600) collected from three different locations in Switzerland together with the overlapping irradiance measurements both logged in 10-second frequency, and \textit{Girasol} by \citet{terren2021girasol} which provides high temporal frequency sky images from both visible and infrared cameras and irradiance measurements data for 244 days, while the visible images only have one intensity channel and the infrared images are of low resolution. The datasets released by \citet{dissawa2021sky} and \citet{bassous2021development} both provide sky images and PV power output data, but the sizes are pretty small as they only include a few days/months of data. Finally, a third type of party is researchers developing open-source tools for easy access of publicly available datasets, most of which are from national labs or research organizations as described previously. Such efforts include \citet{yang2018solardata}'s \textit{SolarData} and \citet{Feng2019Opensolar}'s \textit{OpenSolar}.
Despite the various efforts we mentioned above, there are limited publicly available datasets that are compiled with high quality data and are suitable for deep-learning-based or computer-vision-based short-term solar forecasting research. To fill these gaps, we introduce SKIPP'D --- a \textbf{SK}y \textbf{I}mages and \textbf{P}hotovoltaic \textbf{P}ower Generation \textbf{D}ataset, collected and compiled by the Environmental Assessment and Optimization (EAO) Group at Stanford University. The dataset contains the following two levels of data which distinguishes it from most of the existing open-sourced datasets and makes it especially suitable for deep-learning-based solar forecasting research:
\begin{enumerate}
\item Benchmark dataset: 3 years of processed sky images (64$\times$64) and concurrent PV power generation data with a 1-min interval that are ready-to-use for deep learning model development;
\item Raw dataset: Overlapping high resolution sky video footage (2048$\times$2048) recorded at 20 frames per second, and sky image frames (2048$\times$2048) and history PV power generation data logged with a 1-min frequency that suit various research purposes.
\end{enumerate}
In addition, we provide a code base containing data processing scripts and
baseline model implementations for researchers to quickly reproduce our previous work and accelerate solar forecasting research. We hope that this dataset will facilitate the research of image-based solar forecasting and contribute to a standardized benchmark for evaluating and comparing different solar forecasting models. Besides, we also encourage the users to explore on solar forecasting related areas with this dataset, such as sky image segmentation and cloud movement forecasting.
\section{Data Sources}
\label{sec:data_sources}
Our research group started the data collection from March 2017 at Stanford University's campus, located in the center of the San Francisco Peninsula, in California. According to the Köppen climate classification system, Stanford has a warm-summer Mediterranean climate, abbreviated Csb (C=temperate climate s=dry summer b=warm summer) on climate maps \cite{kottek2006}. In terms of cloud coverage, Stanford is featured by long summers with mostly clear skies and short winters with partly cloudy skies. Two major categories of data are collected and logged: sky images and PV power generation, which are detailed in Section \ref{subsec:sky_images} and \ref{subsec:pv_power_generation}, respectively. Over the past five years, our lab has collected over two terabytes of data, which have enabled multiple published solar forecasting studies \cite{Sun2018,Sun2019,Sun2019_dissertation,Venugopal2019,Venugopal2019thesis,Nie2020,Nie2021}.
In this release, we open-source the data from March 2017 to December 2019 \footnote{The dataset suffers from some interruptions due to the water intrusion, wiring and/or electrical failure of the camera, as well as daylight-saving adjustment failure of the camera in 2017 and 2018, which is back to normal for 2019 and beyond.}. Here, we provide two levels of data to suit the different needs of researchers: (1) A processed dataset consists of 1-min down-sampled sky images (64$\times$64) and PV power generation pairs, which is intended for fast reproducing our previous work and accelerating the development and benchmarking of deep-learning-based solar forecasting models; (2) A raw dataset consisting of high resolution sky images (2048$\times$2048) and PV power generation data, as well as the source sky video footage, which is intended for customizing data extraction and exploring other related areas of solar forecasting such as cloud segmentation and cloud movement forecasting. The specifications of the data are summarized in Table \ref{table:specifications_table} and a full description of the data files can be found in Appendix \ref{appendix:data_repo}.
\begin{table}[h!]
\begin{center}
\begin{small}
\caption{Specifications Table}
\label{table:specifications_table}
\begin{tabular}{>{\raggedright}p{0.25\linewidth}>{\raggedright\arraybackslash}p{0.7\linewidth}}
\hline \hline
\noalign{\vskip 1mm}
Subject area & Solar forecasting; Computer vision; Deep learning\\
\noalign{\vskip 1mm}
More specific subject area & PV power generation prediction; Sun tracking; Cloud detection; Cloud movement prediction \\
\noalign{\vskip 1mm}
Data collection period & March 2017 to December 2019 \\
\noalign{\vskip 1mm}
Type of data & 1. Processed (benchmark) data: 1-min 64$\times$64 sky images (\textit{.npy}) and PV power generation (\textit{.npy}) pairs, partitioned into model development set (training+validation) and test set, and further structured and stored as \textit{.hdf5} format.\\
\noalign{\vskip 1mm}
& 2. Raw data: 2048$\times$2048 sky videos recorded at 20 frames per second (\textit{.mp4}), 1-min 2048$\times$2048 sky images (\textit{.jpg}) and PV power generation (\textit{.csv}) \\
\noalign{\vskip 1mm}
How data was acquired & The sky videos/images are acquired by the camera installed on top of the Green Earth Sciences Building (37.427$^{\circ}$, -122.174$^{\circ}$) at Stanford University. The PV power generation data are from PV panel approximately 125 meters away from the camera on the roof of the Jen-Hsun Huang Engineering Center at Stanford University, which are logged by Stanford Utility and shared to us. \\
\noalign{\vskip 1mm}
Data accessibility & The processed (benchmark) data is available at \url{https://purl.stanford.edu/dj417rh1007} and the raw data is deposit separately by each year given its large size. The 2017 raw data is available at \url{https://purl.stanford.edu/sm043zf7254} and the links to 2018 and 2019 data can be found in the "Related items" elsewhere on the same web page. \\
\noalign{\vskip 1mm}
GitHub repository & Code base of data processing and baseline model are available at the GitHub repository \url{https://github.com/yuhao-nie/Stanford-solar-forecasting-dataset}.\\
\noalign{\vskip 1mm}
\hline \hline
\end{tabular}
\end{small}
\end{center}
\end{table}
In future releases, we will open source the data from 2020 and beyond of the Stanford dataset and include two additional data sources \footnote{The updated information will be released on our dataset GitHub repository: \url{https://github.com/yuhao-nie/Stanford-solar-forecasting-dataset}}: sky images and PV power generation data from a solar farm in Oregon collected by our research group and sky images from cameras set up by NREL which correspond to solar irradiance data collected by them. The solar farm in Oregon is a 3.08 MW-DC ground mounted solar array located outside of Sheridan, a rural community. Sheridan is located in the Willamette Valley which, like Stanford, has a warm-summer Mediterranean climate. However, unlike Stanford, the winters are long and typically characterized by cloudy skies and periods of rain. Our team set up a fish-eye camera (Hikvision DS-2CD6365GOE-IVS) at this location at the end of 2021 to start collecting data. In addition to sky images from Oregon, our group started collecting sky images in 2021 from NREL's Solar Radiation Research Laboratory in Golden, Colorado via their website \footnote{ NREL Solar Radiation Laboratory Baseline Management System website: \url{https://midcdmz.nrel.gov/apps/sitehome.pl?site=BMS}}, which provides a live view of the sky image every 60 seconds. Unfortunately, NREL is currently only storing images every 10 minutes, so our team is collecting and storing the minutely images in order to have a dataset that is useful to the short-term solar forecasting community. These images can be paired with NREL's minutely irradiance data which is available via their website.
\subsection{Sky Images}
\label{subsec:sky_images}
The sky images are frames from videos recorded during daytime (6:00 AM $\sim$ 8:00 PM \footnote{Data were recorded based on the local time zone, which is either Pacific Standard Time (PST) or Pacific Daylight Time (PDT). In US, PDT starts on the second Sunday in March and ends on the first Sunday in November. }) by a 6-megapixel 360-degree fish-eye camera (Hikvision DS-2CD6362F-IV2\footnote{The camera model Hikvision DS-2CD6362F-IV is discontinued and is replaced by a new model Hikvision DS-2CD6365GOE-IVS. We replace the old model with the new model on April 29, 2022 due to aging.}) located on top of the Green Earth Sciences Building (37.427$^{\circ}$, -122.174$^{\circ}$) at Stanford University and oriented towards 14° south by west. Compared with other high-end commercial sky imaging systems, this off-the-shelf network camera is more accessible and affordable for sky monitoring. The camera holds constant camera aperture, white balance and dynamic range and captures video with a resolution of 2048$\times$2048 pixels at 20 frames per second (fps). The images (\textit{.jpg}) are extracted from the video at 1-min sampling frequency and are down-sampled to a resolution of 64$\times$64 pixels, which is found to be acceptable for PV output forecast while retaining reasonable model training time \cite{Sun2018}. Figure \ref{fig:equipment_photo} gives examples of sky images in different weather conditions, and shows the locations of the camera and PV panels used in this collection.
\begin{figure}[h!]
\includegraphics[width=1.0\textwidth]{sky_camera_and_panel_photos_update.png}
\caption{Photos of Sky Images and Research Equipment (A. Sky image captured on a clear day at 12:18:20 pm, January 25, 2019. B. Sky image of a cloudy day captured at 12:32:10 pm May 27, 2019. C. Fish-eye camera used for sky imaging. D. Studied PV panels. E. Locations of the camera and studied solar panels). Adapted from \citet{Sun2018}, used with permission.}
\label{fig:equipment_photo}
\end{figure}
\subsection{PV Power Generation}
\label{subsec:pv_power_generation}
The PV output data are collected from solar panel arrays approximately 125 meters away from the camera, situated on the top of the Jen-Hsun Huang Engineering Center at Stanford University, with and elevation angle of 22.5$^{\circ}$ and an azimuth angle of 195$^{\circ}$. The PV panels are manufactured with poly-crystalline technology and the system is rated at 30.1 kW-DC. The PV output generation data are logged with 1-min frequency and are minutely averaged. The forward average is applied, e.g., value at 8:00:00 am representing the average PV generation from 8:00:00 to 8:00:59 am.
\section{Data Processing}
\label{sec:data_processing}
To support the flexibility of research, we also open source high-resolution, high-frequency raw data, and the users can customize their own data processing pipeline and process the data based on their needs. Here, we provide a reference by going over the data processing steps we used to generate the processed (benchmark) data. The processing steps were largely used in our previous published work except some minor modifications \footnote{This dataset have provided the minutely average raw PV data, so users do not need to take rolling average during data processing to get the minutely average data. This is the case in previous published work \cite{Sun2018,Sun2019} as we used the instantaneous raw PV data.}. We also provide the code base of data processing for users' reference and the descriptions of the code files can be found in Appendix \ref{appendix:sample_code}.
The data processing basically includes the following four major steps. More details on the data processing steps can be found in the PhD dissertation by \citet{Sun2019_dissertation}.
\begin{enumerate}
\item Obtain raw high-resolution image frames (2048$\times$2048) by snapshotting the video footage at a designated frequency. While 1-min sampling frequency was used in the dataset, it is freely adjustable.
\item Process raw PV power generation history, which includes the following two sub-steps:
\begin{enumerate}
\item Interpolate PV data to every 10 seconds in preparation for matching with images in Step 3 with irregular time stamps, e.g., 08:20:10 (raw PV data are logged regularly as 08:00:00, 08:01:00, 08:02:00, etc.)
\item Filter out the PV data that are abnormally recorded (e.g., data logger repeatedly logs one value for a certain time period), negative (e.g., night time) or have missing records larger than 1 hour.
\end{enumerate}
\item Process raw high resolution images and pair the processed images with the concurrent processed PV generation data. The image processing includes the following two sub-steps:
\begin{enumerate}
\item Down-sample the high resolution image frames into low resolution (64$\times$64) for sake of saving training time. Down-sampling rate is adjustable.
\item Filter out erroneously repeating images caused by the occasional abnormal behavior of OpenCV video decoder FFmpeg.
\end{enumerate}
\end{enumerate}
We further partition the processed dataset into development set (including data for training and validating the model) and test set. The test set includes 10 sunny days and 10 cloudy days selected manually across 2017 to 2019; the rest of the data goes into the development set. The number of samples contained in the model development set and the test set are 349,372 and 14,003, respectively, roughly a 96\%:4\% split. It should be noted that we have updated the test days from our previous publications given that missing data points were observed in certain days of the old test set. For comparison with the results from our previous publications, we encourage the users to re-organize the data by themselves. We hope this processed dataset can be used as a standardized benchmark for model training, evaluating and comparison in the solar forecasting community.
\section{Benchmark Dataset for Image-based Solar Forecasting Using Deep Learning}
The benchmark dataset ($\mathscr{D}$) contains the model development set ($\mathscr{D}_d$) and test set ($\mathscr{D}_t$) obtained from the data processing steps described in \ref{sec:data_processing}. The samples of the benchmark dataset are organized as aligned pairs of sky images ($\mathcal{I}$) and PV power generation ($\mathcal{P}$), i.e., $\mathscr{D} = \{(\mathcal{I}_i, \mathcal{P}_i) \mid i\in \mathbb{Z}: 1\leq i\leq N\}$, where $N=363,375$ is the total number of samples in the benchmark dataset. Figure \ref{fig:combined_pv_distribution_test_set_pv_profiles} shows the distribution of the PV power generation data for the development set and test set and the PV power generation profiles of the 20 days in the test set. The statistics of the 20 test days are listed in Table \ref{table:list_testdays}.
\begin{figure}[h!]
\includegraphics[width=1.0\textwidth]{Figures/combined_pv_distribution_test_set_PV_output_profile.pdf}
\caption{The PV power generation data distribution of the benchmark dataset: A. development set PV data distribution; B. test set PV data distribution; and C. the PV power generation profiles of the 10 sunny days and 10 cloudy days used in the test set: upper panel shows the sunny days, and the lower panel is for the cloudy days.}
\label{fig:combined_pv_distribution_test_set_pv_profiles}
\end{figure}
\begin{table}[h!]
\begin{center}
\begin{small}
\caption{Statistics of the 10 sunny and 10 cloudy days used in the test set}
\label{table:list_testdays}
\begin{tabular}{p{0.1\linewidth}p{0.1\linewidth}p{0.1\linewidth}p{0.1\linewidth}p{0.1\linewidth}}
\hline \hline
\noalign{\vskip 1mm}
Date & Index & Mean (kW) & Max (kW) & Std (kW) \\
\noalign{\vskip 1mm}
\hline
\noalign{\vskip 1mm}
2017-09-15 & Sunny\_1 & 15.23 & 24.35 & 7.83 \\
\noalign{\vskip 1mm}
2017-10-06 & Sunny\_2 & 14.65 & 22.44 & 7.03 \\
\noalign{\vskip 1mm}
2017-10-22 & Sunny\_3 & 15.17 & 22.86 & 6.97 \\
\noalign{\vskip 1mm}
2018-02-16 & Sunny\_4 & 15.28 & 22.89 & 6.86 \\
\noalign{\vskip 1mm}
2018-06-12 & Sunny\_5 & 14.69 & 23.45 & 7.60 \\
\noalign{\vskip 1mm}
2018-06-23 & Sunny\_6 & 14.30 & 22.48 & 7.32 \\
\noalign{\vskip 1mm}
2019-01-25 & Sunny\_7 & 14.08 & 21.07 & 6.26 \\
\noalign{\vskip 1mm}
2019-06-23 & Sunny\_8 & 13.31 & 22.45 & 7.80 \\
\noalign{\vskip 1mm}
2019-07-14 & Sunny\_9 & 13.72 & 23.27 & 7.98 \\
\noalign{\vskip 1mm}
2019-10-14 & Sunny\_10 & 13.56 & 21.22 & 6.67 \\
\noalign{\vskip 1mm} \hline \noalign{\vskip 1mm}
2017-06-24 & Cloudy\_1 & 12.39 & 28.95 & 8.30 \\
\noalign{\vskip 1mm}
2017-09-20 & Cloudy\_2 & 7.55 & 29.57 & 6.88 \\
\noalign{\vskip 1mm}
2017-10-11 & Cloudy\_3 & 10.64 & 20.72 & 6.04 \\
\noalign{\vskip 1mm}
2018-01-25 & Cloudy\_4 & 12.39 & 27.77 & 8.08 \\
\noalign{\vskip 1mm}
2018-03-09 & Cloudy\_5 & 12.45 & 25.60 & 7.07 \\
\noalign{\vskip 1mm}
2018-10-04 & Cloudy\_6 & 11.83 & 27.82 & 6.76 \\
\noalign{\vskip 1mm}
2019-05-27 & Cloudy\_7 & 8.62 & 29.22 & 7.39 \\
\noalign{\vskip 1mm}
2019-06-28 & Cloudy\_8 & 13.25 & 24.70 & 7.68 \\
\noalign{\vskip 1mm}
2019-08-10 & Cloudy\_9 & 11.14 & 29.28 & 7.48 \\
\noalign{\vskip 1mm}
2019-10-19 & Cloudy\_10 & 7.71 & 24.28 & 6.19 \\
\noalign{\vskip 1mm}
\hline \hline
\end{tabular}
\end{small}
\end{center}
\end{table}
\section{Sample Uses of the Benchmark Dataset}
In this section, we demonstrate two use cases of the benchmark dataset based on our published works. Our group has developed a specialized convolutional neural network (CNN) model named SUNSET (Stanford University Neural Network for Solar Electricity Trend) for PV power generation prediction. Two specific prediction tasks were investigated based on SUNSET, including (1) PV power generation nowcast \cite{Sun2018}, i.e., given a sky image, predicting the contemporaneous PV output; and (2) PV power generation forecast \cite{Sun2019}, given sky images and PV output for the past 15 minutes on 1-minute resolution, predicting PV output 15 minutes ahead into the future. Figure \ref{fig:model_arch} shows the model architectures for the nowcast and forecast tasks. The details of these two models can be found in the corresponding published papers, and we demonstrate the use cases based on the setups described in these papers. We implemented these two deep learning models using TensorFlow 2.x, which is an update from the TensorFlow 1.x code base used in our previous publications. The new code base is included along with the dataset as described in Appendix \ref{appendix:sample_code}.
The performance of each model is evaluated by the following metrics: mean absolute error (MAE), root mean squared error (RMSE), and additionally, forecast skill (FS) for evaluating the SUNSET forecast model, which is computed based on the RMSE and is relative to the persistence model. The detailed method for calculating the FS can be found in \cite{Sun2019}. The codes for model evaluation are included in the model implementation codes (see Appendix \ref{appendix:sample_code}). It should be noted that the goal here is to demonstrate the value of the data by providing some sample use cases, rather than evaluating specific methodologies. Therefore, our analysis on the sample results will mostly be high-level.
\begin{figure}[h!]
\includegraphics[width=1.0\textwidth]{Figures/model_architecture.pdf}
\caption{The model architectures for PV power generation nowcast and forecast (differences between the two model architectures are highlighted in bold font). Adapted from \citet{Nie2021}, used with permission.}
\label{fig:model_arch}
\end{figure}
\subsection{PV Power Generation Nowcast}
The PV power generation nowcast task is essentially learning a mapping ($f_N$) from sky images to the simultaneous PV power generation. An analog one can think of is the computer vision task estimating the age of people based on their facial images.
\begin{equation}
f_N:\mathcal{I}_i\mapsto \mathcal{P}_i, \mathrm{where}\ \{\mathcal{I}_i, \mathcal{P}_i\} \in \mathscr{D}
\end{equation}
We developed the nowcast model based on $\mathscr{D}_d$ and evaluated the model based on $\mathscr{D}_t$. During the model development phase, ten-fold cross-validation is employed, and during the test phase, the prediction is represented by the ensemble mean of the predictions from the 10 submodels. Table \ref{tab:performance_metrics} shows the performance of the SUNSET nowcast model on the test set evaluated by RMSE and MAE. Figure \ref{fig:sunset_prediction_each_day} shows the predictions of the SUNSET nowcast model on each of the test days compared with the ground truth.
The results show that the SUNSET nowcast model can effectively extract the information in the sky images and correlate it with the local PV panel generation. It can well approximate the sun angle equations in the sunny days with clear sky conditions and reasonably estimate the states of PV power generation under different cloudy conditions. The potential use of the nowcast model is to serve as an alternative to the traditional sensor measurement of solar irradiance or PV panel power output, which is generally expensive. A similar study by \citet{Jiang2020} has also examined the potential of using an end-to-end CNN model to estimate the state of solar irradiance.
\subsection{PV Power Generation Forecast}
The PV power generation forecast task can be mathematically described as learning a mapping ($f_F$) from historical sky image and PV power generation sequences to the future PV power generation.
\begin{equation}
f_F:(\mathcal{I},\mathcal{P})_{t_i-H:\delta:t_i} \mapsto \mathcal{P}_{t_i+T}, \mathrm{where}\ \{(\mathcal{I},\mathcal{P})_{t_i-H:\delta:t_i}, \mathcal{P}_{t_i+T}\} \in \tilde{\mathscr{D}}
\end{equation}
Here, we define forecast dataset $\tilde{\mathscr{D}}$ with $\tilde{\mathscr{D}}\subseteq {\mathscr{D}}$ and $\tilde{\mathscr{D}} = \{[(\mathcal{I},\mathcal{P})_{t_i-H:\delta:t_i}, \mathcal{P}_{t_i+T}] \mid i\in \mathbb{Z}: 1\leq i\leq M\}$, where $H$ is the length of historical terms, $\delta$ is the interval between historical terms, $T$ is the forecast horizon, and $M$ is the total number of samples in $\tilde{\mathscr{D}}$. To build the forecast dataset $\tilde{\mathscr{D}}$ for demonstration, we follow the parameters used in the baseline of \cite{Sun2019}, namely, $H=T=15$ min, $\delta=1$ min, and a sampling frequency of 2 min (i.e., $t_{i+1}-t_i = 2$) to obtain valid samples from $\mathscr{D}$, which leads to 161,928 samples in total for the forecast dataset. Following the definition by \citet{Yang2019guideline,Yang2020} to formalize the description of a solar forecasting task, ours can be described as \{$S^{1min}$, $R^{1min}$, $L^{15min}$, $U^{2min}$\}\footnote{For training and validation of the forecast model, we used a forecast submission update rate of 2 min ($U^{2min}$) to speed up the model development while retaining a good model performance based on the findings by \citet{Sun2019} [Note that the same term is called sampling frequency in the work by Sun \textit{et al}.]. For model testing, we used a forecast submission update rate of 1 min ($U^{1min}$).}, where $S$ is forecast span, $R$ forecast resolution, and $L$ is forecast lead time and $U$ is forecast submission update rate. A graphic illustration of these temporal parameters can be found in \cite{Yang2019operationalforecast}. For consistent comparisons with each other's model, we encourage the users to clearly state their forecasting setups.
The forecast dataset $\tilde{\mathscr{D}}$ is further separated into model development set $\tilde{\mathscr{D}}_d$ and test set $\tilde{\mathscr{D}_t}$ based on the same partition as the benchmark development set $\mathscr{D}_d$ and test sets $\mathscr{D}_t$. The processing codes we used are also open-sourced (see Appendix \ref{appendix:sample_code}) and users can either modify these parameters in our processing code based on their model input and output configurations or develop their own processing codes to build the forecast dataset. We trained the forecast model with 10-fold cross-validation, and during the test phase, the prediction is represented by the ensemble
mean of the predictions from the 10 submodels. Table \ref{tab:performance_metrics} shows the performance of the SUNSET forecast model on the test set evaluated by RMSE, MAE, and FS. Figure \ref{fig:sunset_prediction_each_day} shows the predictions of the SUNSET forecast model on each of the test days compared with the ground truth.
\begin{table}[h!]
\begin{center}
\begin{small}
\caption{The performance of SUNSET nowcast and forecast models evaluated by common error metrics}
\label{tab:performance_metrics}
\begin{tabular}{p{0.16\linewidth}p{0.12\linewidth}p{0.12\linewidth}p{0.12\linewidth}p{0.15\linewidth}}
\hline \hline
\noalign{\vskip 1mm}
Model & Test Set & RMSE (kW) & MAE (kW) & Forecast Skill (\%)\\
\noalign{\vskip 1mm}
\hline
\noalign{\vskip 1mm}
& Sunny days & 0.80 & 0.66 & -- \\
\noalign{\vskip 1mm}
SUNSET Nowcast & Cloudy days & 3.34 & 2.34 & -- \\
\noalign{\vskip 1mm}
& Overall & 2.43 & 1.50 & -- \\
\noalign{\vskip 1mm} \hline \noalign{\vskip 1mm}
& Sunny days & 0.61 & 0.50 & - 45.80 \\
\noalign{\vskip 1mm}
SUNSET Forecast & Cloudy days & 4.27 & 2.95 & 17.03\\
\noalign{\vskip 1mm}
& Overall & 3.03 & 1.71 & 16.44\\
\noalign{\vskip 1mm}
\hline \hline
\end{tabular}
\end{small}
\end{center}
\end{table}
The results show that the SUNSET forecast model can well predict the 15-min ahead future power generation on the sunny days but it struggles somehow on the cloudy days. In cloudy conditions, SUNSET tends to avoid large fluctuations by predicting conservatively towards the average. It helps the model in capturing the general trend, however, it usually fails in predicting the right magnitudes of the peaks and dips, which leads to one of the major prediction errors. Another type of error is associated with temporal lags in prediction. The model has a larger tendency of following the trend of the past observations than actively anticipating future events. These two aspects of errors direct to the following future research directions: (1) generating probabilistic prediction rather than point prediction to deal with the uncertainty in the sudden changes of PV power generation; (2) developing models for better prediction of the cloud movement to deal with the systematic temporal lags in forecasting. Compared with the persistence model, SUNSET outperforms it by 16.4\% overall in FS on all of the test days and by 17\% on cloudy days, although it under-performs the persistence model by 46\% on sunny days. To this end, using different types of models for different sky conditions could boost the accuracy of the forecast \cite{Nie2020}.
\begin{figure}[h!]
\includegraphics[width=1.0\textwidth]{Figures/sunset_prediction_each_day.pdf}
\caption{SUNSET nowcast and forecast predictions on each of the test days. The first and second columns represent the nowcast prediction, and the third and fourth columns represent the forecast prediction. The test days’ indices and the error metrics are shown on the right and left of each panel respectively.}
\label{fig:sunset_prediction_each_day}
\end{figure}
\section{Conclusion}
We introduced a curated dataset named SKIPP'D with the goal of providing a standardized benchmark for the solar forecasting community to evaluate and compare different solar forecasting models as well as to facilitate the research of image-based solar forecasting using deep learning and other related areas such as sky image segmentation, cloud type classification and cloud movement forecasting. Two levels of data are provided in this dataset including a processed benchmark dataset containing 1-min down-sampled sky images and PV output pairs and a raw dataset containing high-resolution sky videos, images and PV power generation data. We have also detailed the data processing steps used to obtain the benchmark dataset and demonstrated two use cases based on the benchmark dataset for users' reference and future studies.
\section{Acknowledgement}
The authors thank Jacques de Chalendar from Stanford University who helps us access the PV power generation history data. The authors would also like to acknowledge the Stanford Research Computing Center for providing the computational resources to conduct the experiments in this study. The authors are also grateful to Amy Hodge from Science and Engineering Resource Group at Stanford Libraries for facilitating the datasets depositing.
\begin{appendices}
\section{Data repository}
\label{appendix:data_repo}
The benchmark data is available at \url{https://purl.stanford.edu/dj417rh1007} and the raw data is deposit by year given its large size. The 2017 raw data is available at \url{https://purl.stanford.edu/sm043zf7254} and the links to 2018 and 2019 data can be found in the "Related items" elsewhere on the same web page. All datasets are licensed under CC-BY-4.0. Table \ref{tab:list_avai_files} shows the list of all data files included in this dataset. Although every effort was made to ensure the quality of the data, no guarantees are implied by the authors of the dataset.
\begin{table}[h!]
\begin{center}
\begin{small}
\caption{List of available files in the data repository}
\label{tab:list_avai_files}
\begin{tabular}{>{\raggedright}p{0.35\linewidth}>{\raggedright}p{0.13\linewidth}>{\raggedright}p{0.12\linewidth}>{\raggedright\arraybackslash}p{0.30\linewidth}}
\hline\hline
\noalign{\vskip 1mm}
File & Type & Size & Description \\
\noalign{\vskip 1mm}
\hline
\noalign{\vskip 1mm}
\texttt{2017\_2019\_images\_pv\_processed.hdf5} & Benchmark data & 4.16 GB & A file-directory like structure consisting of two groups: \texttt{"trainval"} and \texttt{"test"}, for storing model development set and test set, respectively, with each group containing two datasets: \texttt{"images\_log"} and \texttt{"pv\_log"}, which stores the processed images stored as 8-bit RGB (256 color levels) data and PV generation data in the unit of kW from all three years stored in Python NumPy array format. \\
\noalign{\vskip 1mm}
\texttt{times\_trainval.npy} & Benchmark data & 10.8 MB & Python NumPy array of time stamps stored in Python \textit{datetime} format corresponding to development set in \textit{.hdf5} file. \\
\noalign{\vskip 1mm}
\texttt{times\_test.npy} & Benchmark data & 434 KB & Python NumPy array of time stamps stored in Python \textit{datetime} format corresponding to test set in \textit{.hdf5} file. \\
\noalign{\vskip 1mm} \hline \noalign{\vskip 1mm}
\texttt{\{Year\}\_\{Month\}\_videos.tar} & Raw data & 2017: 500 GB; 2018: 640 GB; 2019: 449 GB & Tar archives with daytime 2048 $\times$ 2048 sky videos (\textit{.mp4}) recorded at 20 frames per second for each month from 2017/03 to 2019/12. \\
\noalign{\vskip 1mm}
\texttt{\{Year\}\_\{Month\}\_images\_raw.tar} & Raw data & 2017: 28.2 GB; 2018: 50.1 GB; 2019: 55.3 GB & Tar archives with daytime 2048 $\times$ 2048 sky images (\textit{.jpg}) captured at 1-min intervals for each month from 2017/03 to 2019/12.\\
\noalign{\vskip 1mm}
\texttt{\{Year\}\_pv\_raw.csv} & Raw data & 2017: 16.7 MB; 2018: 16.6 MB; 2019: 13.7 MB & One-min PV generation data for the year 2017, 2018 and 2019. The unit of PV generation data is kW.\\
\noalign{\vskip 1mm}
\hline\hline
\end{tabular}
\end{small}
\end{center}
\end{table}
\section{Code Base}
\label{appendix:sample_code}
As part of the data release, we include the data processing and baseline model implementation code written in Python 3.6, which can be found on the Github Repository \url{https://github.com/yuhao-nie/Stanford-solar-forecasting-dataset}. All code files are licensed under the MIT license. Table \ref{tab:list_code_files} shows the list of all the code files included along with this dataset. Users can either use the reference codes we provided here or customize their own data processing pipeline.
\begin{table}[h!]
\begin{center}
\begin{small}
\caption{List of available code files}
\label{tab:list_code_files}
\begin{tabular}{>{\raggedright}p{0.35\linewidth}>{\raggedright}p{0.18\linewidth}>{\raggedright\arraybackslash}p{0.36\linewidth}}
\hline\hline
\noalign{\vskip 1mm}
File & Type & Description \\
\noalign{\vskip 1mm}
\hline
\noalign{\vskip 1mm}
\texttt{data\_preprocess\_snapshot\_only.ipynb} & Data processing code & Jupyter Notebook used to capture images from the video stream at designated frequency. \\
\noalign{\vskip 1mm}
\texttt{data\_preprocess\_pv.ipynb} & Data processing code & Jupyter Notebook used to process the raw PV power generation history. \\
\noalign{\vskip 1mm}
\texttt{data\_preprocess\_nowcast.ipynb} & Data processing code & Jupyter Notebook used to down-sample the image frames, filter out the invalid frames and match images with the concurrent PV data, and partition model development and testing sets. \\
\noalign{\vskip 1mm}
\texttt{data\_preprocess\_forecast.ipynb} & Data processing code & Jupyter Notebook used to generate valid samples for the forecast task. \\
\noalign{\vskip 1mm} \hline \noalign{\vskip 1mm}
\texttt{SUNSET\_nowcast.ipynb} & Model code & Jupyter Notebook used to implement the SUNSET nowcast model to correlate PV output to contemporaneous images of the sky, including model training, validation and testing. \\
\noalign{\vskip 1mm}
\texttt{SUNSET\_forecast.ipynb} & Model code & Jupyter Notebook used to implement the SUNSET forecast model to predict 15-min ahead minutely-averaged PV output, including model training, validation and testing. \\
\noalign{\vskip 1mm} \hline \noalign{\vskip 1mm}
\texttt{Relative\_op\_func.py} & Helper function code & Helper functions for calculating theoretical PV power output under clear sky condition and the clear sky index. \\
\noalign{\vskip 1mm}
\hline\hline
\end{tabular}
\end{small}
\end{center}
\end{table}
\end{appendices}
\clearpage
|
\section{INTRODUCTION}
Humans have an excellent subconscious ability to recognize the materials around us throughout daily life. As we interact with our environment we leverage our vision and prior experiences to estimate the material properties of objects we come into contact with \cite{buckingham2009living}. As we reach out to pick up a coffee mug, we form an idea of what that object is likely to weigh and how its surface will feel. This knowledge directly informs the way we position our hands as we approach the mug, allowing us to plan for an appropriate grasp force, maintain contact with, and move the mug to wherever we desire. If the mug is composed of a fragile material like glass, our grasp strategy will likely change to support the object from the handle, or the thickest part. These steps constitute the Sense, Plan, Act (SPA) pipeline \cite{oddi2020integrating} for object manipulation. However for some materials, such as fruits or seafood, which are subject to irreversible deformations through contact, the sense step must be done with minimal object contact in a nondestructive manner.
Prior work on quantifying object material properties for robot applications contributed techniques based on human sensory capabilities, including touch and vision. Specifically in prior work involving direct contact with objects (presented in detail in Section \ref{sec:prior}), much attention has been given to visual sensing or texture estimation via an elastomeric sensor.
\begin{figure}[t]
\centering
\includegraphics[width=\linewidth]{images/cross_setup.png}
\caption{Data collection setup using integrated spectral and visual perception.}
\label{cross_collection_setup}
\vspace{-2.5em}
\end{figure}
In this research, we present the design of a two fingered gripper$^{2}$ capable of collecting images and spectral data in real-time as the robot approaches an object to be grasped. This allows the robot to collect data and infer object material type before contact is made. Our research relies on the corpus of prior work in Near-Infrared (NIR) spectroscopy \cite{pasquini2018near, bec2019advances}, which has been demonstrated as a reliable means to estimate the material properties and composition of an object through reflected light in the ultraviolet ($\lambda \approx 300\ \text{nanometers}$) to the near-infrared ($\lambda \approx 1200\ \text{nanometers} $) spectra. Instead of representing light with three discrete values as is commonly done with red, blue, green (RBG) image channels, the integrated spectrometer represents light as a continuous curve, sampled at 2048 discrete values -- allowing for the observation and quantification of changes in the spectral response of an object. We classify incoming spectral readings with an SVM and leverage recursive estimation to increase confidence in the class label as more data is acquired.\par
The contributions of this paper are as follows.
\begin{itemize}
\item We introduce a novel design for a two fingered gripper with an integrated NIR spectrometer and endoscopic camera to collect VNIR spectral readings and macro surface images from grasped items.
\item We develop a method based on a nonlinear Support Vector Machine (SVM) to achieve material inference between visually similar items and continually update class estimates with a discrete Bayes filter.
\end{itemize}
The paper is organized as follows. Section~II provides an overview of the prior work in robot material sensing through visual and haptic approaches. To provide rationale for the spectro-visual gripper, we offer a brief discussion on the capabilities and underlying science of visible-NIR spectroscopy in Section~III. Section~IV is dedicated to presenting the details of the gripper design. SVM-based classification method is presented in Section~V. Section~VI discusses the validation of the model and experimental results on the classification of organic and inorganic materials with machine learning. Finally, Section~VII discusses the results of our research and future opportunities for spectral sensing.
\section{RELATED WORK}
\label{sec:prior}
\subsection{Material Identification}
Sensing modalities for classifying materials falls into two categories: contact and contact-free sensing. Computer vision constitutes the majority of work in contact-free material sensing. \cite{schwartz2019recognizing} hypothesized that the subjective labels of material appearance, such as fuzzy, shiny, smooth, rough, from human labeled regions could be used in a Convolutional Neural Network (CNN) to segment images intro broad material regions with reasonable success. Similarly, others have utilized a CNN \cite{bell2015material} to classify patches by material type as an input to a fully connected random field to contextualize the material type to the surrounding environment. These image based techniques require tedious and time-consuming hand segmentation and essential ground truth information. For example, plastics, metals, and ceramics can all look similar when painted and illuminated with specular reflection \cite{fang2019toward}.\par
In contact sensing, surface textures and shapes are exploited to determine the material type. For instance, a 3D printed finger was devised for use by humanoid robots to collect accelerometer data as the finger was moved across the surface of various material types \cite{sinapov2011vibrotactile}. Using a hierarchical model leveraging the frequency-domain signal from accelerometer, an SVM achieves an 80.0\% accuracy in recognizing surface textures. This framework has also been shown to be extensible to new material types and hence, it can categorize various materials based on similarities in texture and friction coefficients. While a novel approach to material classification, the exploratory behaviors are slow and can take upwards of 30 seconds to complete before the classification can begin and require direct contact. Related work in haptic sensing \cite{takamuku2007haptic}, and its fusion with visual data \cite{strese2016multimodal} has demonstrated promising results on a variety of everyday objects.\par
Elastomeric sensors measure surface topography and contact forces through deformation of a contact gel imaged by a small, high-resolution camera. The GelSight sensor is commonly used to acquire high-resolution texture models for fabrics and other coarse surfaces \cite{li2013sensing}, \cite{wang2016robot}. Force feedback from the gel deformation and CNNs have been used to learn manipulation models for a variety of material types \cite{abad2020visuotactile}. While these sensors provide rich surface information, it is computationally heavier to do material classification due to high-dimensional data. In contrast, spectral data contains and order of magnitude less data but still achieves high classification accuracy.
\subsection{Spectroscopy}
Previous research in spectral material identification is centered on commercial, handheld spectrometers fitted to a humanoid robot to scan household objects and differentiate between metal, plastic, wood, paper, and fabric \cite{erickson2019classification}. With a neural network architecture this model resulted in a classification accuracy of 79.1\% and was shown to generalize well to previously unseen objects \cite{erickson2020multimodal}. The approach was further extended to determine object penetrability for tool construction from multiple objects \cite{nair2019autonomous}. Agriculture researchers also developed a specialized gripper with a spectral probe and force feedback to determine the quality and ripeness of mango fruits through simultaneous spectral sampling and force feedback\cite{cortes2017integration}. Their combination of accelerometer and spectral data resulted in the creation of a regression model which could accurately predict the ripeness of a mango. However, their gripper was specifically designed to fit mangoes and did not generalize to other applications.\par
Our work is differentiated from the spectroscopy solution presented in \cite{erickson2019classification} and \cite{erickson2020multimodal} since these works regard spectral readings as a static measurement to be acquired at a fixed position from the object and over a single time step. Our work integrates spectral probes directly into the gripper finger, providing an avenue to both sense and grasp in one continuous motion, instead of scanning, and grasping separately. This combination of perception and manipulation reduces the total time needed to plan interactions with items. Moreover, we leverage the fast acquisition time of our spectrometer to continually improve our material classification as the gripper fingers close around the object. In contrast to existing work in haptic perception, our methodology does not require any form of contact and allows material perception on objects which might deform under contact.
\section{BACKGROUND ON SPECTROSCOPY}
NIR spectroscopy is a technique which involves measuring the electromagnetic radiation emitted by an object when illuminated in the range of 750 to 2500 nm. Chemically, NIR spectroscopy occurs due to the anharmoic vibrational modes caused by the presence of heavy elements such as Carbon, Nitrogen, Oxygen bonding to a Hydrogen atom or bonds between these molecule types \cite{pasquini2018near}. As electromagnetic energy is imparted on a target substance, the bonds react to the energy in the NIR range and causes overtones in the bond vibrations. All materials exhibit some form of NIR reflectance and absorption, similar to how materials reflect red, blue, and green light in varying proportions, which our retinas and their cone cells process into color rich environmental information. For both organic and inorganic materials composed of these aforementioned bonds, particularly in long chains or rings, these substances exhibit markedly unique responses in the amount of non-visible NIR radiation they emit. By measuring the response profiles of material samples, future acquisitions can be compared to this reference spectral library to determine material class \cite{kokaly2017usgs}.\par
In analytical spectroscopy a full spectrum light source, marked by even electromagnetic emittance across the spectrum, is used to illuminate a surface. A diffraction grating, akin to a prism, separates the light into component wavelength ranges which measures incident photons using either a Silicon or Indium Gallium Arsenide (InGaAs) detector array - depending on the wavelength being measured. NIR spectroscopy has found widespread adoption in the laboratory and research realms. In agriculture, processing quality checks regularly rely on NIR to estimate sugar, fat, and overall quality of foodstuffs \cite{kawasaki2008near},\cite{shah2020towards}, \cite{guermazi2014investigation}.
\section{METHODS \& MATERIALS}
The gripper design process has been driven by a set of design specifications which include: (1) Handle objects of size 0-8.5 cm in diameter; (2) Collect continual spectral data at a rate of 10 Hz in the wavelength range 400 - 1100 nm; (3) Acquire texture images from a range from 1 - 8.5cm.
\subsection{Spectrometer Specifications}
We utilize a StellarNet BLUE-Wave miniature spectrometer: a compact, comparatively less expensive device has been shown to perform well against more expensive laboratory devices and is well utilized in the literature \cite{pourdarbani2020non}, \cite{jenkins2012molecularly}. Our system design utilizes a seven strand fiber optic cable connecting the device to a cylindrical probe and collects readings from 350 - 1150 nm. A single central fiber is used to measure reflectance and the other six fibers connect to a Quartz Tungsten Halogen (QTH) lamp and provide the requisite full spectrum illumination. This QTH light source is necessary to ensure uniform operation of the spectral sensor across a variety of lighting environments. The device is calibrated with a white reference standard to account for a perfect pure white light reflection, and a probe covering to establish a dark signal baseline. The Signal to Noise ratio (SNR) is 1000:1, and the signal quality can be further improved by increasing integration time (time to acquire reflectance information) and signal sample averaging. The device was sampled at a rate of 10Hz and the data is transmitted to a desktop computer. Our fiber optic cable has a bend radius of 19.8 cm, which we are careful to avoid exceeding as it could cause internal damage to the cable, or result in signal attenuation from internal refraction.
\subsection{Gripper Design}
Using a Robotiq 2F-85 parallel plate gripper, we designed custom finger pads to extend the base mechanism's capabilities to collect integrated spectral grasping setup. Each finger measures (64 mm x 30 mm x 27 mm) with a contact pad (35 mm x 22 mm x 3 mm), with 23.1 square centimeters of intended contact space. The two finger pads, pictured in Fig \ref{gripper_design}, are 3D printed with continuous carbon fiber reinforcement to minimize flexing at the mounting point of the finger to the parallelogram drive mechanism. The fingers have angled circular slots to allow for the insertion and adjustments of probes with a friction fit collar clamp. The spectrometer probe was positioned so 1 cm separation remains when the robot grasps an object. The other finger is fitted with an endoscope camera providing high resolution images from the perspective of the finger pad. It also contains a brightness-adjustable Light Emitting Diode (LED) light ring to provide proper illumination. Both devices are inserted at a $45^{\circ}$ angle relative to grasping surface to ensure good coverage of grasped materials while minimizing the width of the gripper.\par
\begin{figure}[t]
\vspace{0.5em}
\centering
\includegraphics[width=\linewidth]{images/vast_annotated_iros.png}
\caption{Gripper with 3D printed finger pads, an NIR spectrometer probe and endoscope attachments rendered with AutoCAD.}
\label{gripper_design}
\vspace{-1.0em}
\end{figure}
To ensure a gentler grasp and protect the sensors, the fingers contain inserts inspired by the DIGIT tactile sensor made of Solaris silicon gel \cite{lambeta2020digit}. This material was selected for its wide operational temperature range of $-100^{\circ}$ and $204^{\circ}$ C and resilience when grasping rough textured objects. Moreover, its rated tensile strength exceeds the force capabilities of the Robotiq gripper. Notably, the gel is also optically clear in the operating range of the BLUEWAVE spectrometer and verified by a hyperspectral camera (Headwall Photonics) to not significantly impede the transmission of any visible or NIR light as shown in Fig. \ref{gel_effect}.
\begin{figure}[t]
\centering
\includegraphics[width=\linewidth]{images/gelpad_effect.png}
\caption{Spectral reflectance curves collected with and without the presence of finger gelpad showing uniformly diminished reflectance due to minor subsurface scattering}
\label{gel_effect}
\vspace{-1.5em}
\end{figure}
\subsection{Data Collection}
\begin{figure*}[t]
\centering
\vspace{0.5em}
\includegraphics[width=\textwidth]{images/cross_fruit_collection.png}
\caption{Grasping procedure for collecting spectral and image data with a robotic manipulator through defined series of waypoints and end effector positions.}
\vspace{-1.65em}
\label{collection_procedure}
\end{figure*}
Our experimental data was acquired using a UR3e collaborative robot arm controlled by the Robot Operating System (ROS) \cite{quigley2009ros}. The robot has four predefined positions defined in the Cartesian space: HOME, PRE-GRASP, GRASP, and RELEASE. These positions are shown in the sample data collection in Fig. \ref{collection_procedure}. Each position consisted of an $[x,y,z]$ coordinate and quaternion representing the end effector pose. To transition between positions, we use an inverse kinematics solver \cite{wampler1986manipulator} that respects the joint limits and 3D mesh of the robot model. Objects were placed at the center of a white table, surrounded by a white background to minimize ambient reflections into the spectrometer. An RGB camera was mounted to the robot to capture mages of the full table scene. Fig. \ref{cross_collection_setup} shows the complete collection environment. The gripping force threshold was set at 2.5\% (5.9 N) of the maximum possible force (235 N) to avoid damaging the fruits. Objects were lifted to induce small variations into the spectral signal by flexing the fiber optic cable.\par
For the initial demonstration of the system capabilities, we designed a visually challenging experiment for the spectro-visual gripper. We selected 16 varieties of fresh fruit \textit{\{kiwi, banana, green grape, lemon, mango, avocado, plum, orange, red apple, pear, strawberry, red grape, black grape, green apple, peach\}}. For each real item of fruit, we acquired a corresponding fake item. These items are designed to look visually indistinguishable from their real counterparts and share similar surface textures.\par
For each sample acquisition, illustrated in Fig. \ref{collection_procedure}, the object is placed on the table in front of the robot. The robot takes a single image using the full scene camera. The robot then transitions from HOME to PRE-GRASP where it is directly above the object. The arm then lowers to place its gripper fingers on either side of the object to the GRASP position. The endoscope is triggered and takes a texture picture of the object to be grasped. As the gripper fingers close, the spectral data acquisition commences. Once the fingers detect force feedback exceeding the threshold, the arm lifts the object back to PRE-GRASP position, holds for one second and then lowers to release the item, ending spectral data collection. This procedure is repeated 5 times for each object, with the object rotated $20^{\circ}$ between collections.\par
In Fig. \ref{collection_images} both the fake and real kiwi posses similar light brown surface hair. The fake items are composed of a variety of plastics and other inorganic substances contrasted with the organic structure of the real fruits. The real fruits are composed primarily of water and carbohydrates, whose molecular structure differs significantly from plastics and polystyrene counterparts \cite{zhang2019hyperspectral}. As a result, we create a 32 class problem containing each of the real and fake varieties.
\section{MODELING}
Our main goal is to classify objects using spectroscopy and show that this technique outperforms vision-based methods in a real world setting with visually similar items. To this end, we first deploy a state-of-the art visual encoder and train it on the dataset we collected within the scope of this research. Later, we discuss our method for using spectral information that can achieve better results with simpler models. In general, the problem can be formulated as a multi-class classification:
\begin{align}
\hat{x} = \textit{argmax} (p_{\theta}(x|z))
\end{align}
where $\hat{x}$ is the predicted class, $\theta$ is the model parameters, and $z$ is the observation (e.g. visual image or reading from spectrometer). In the case of real-world experiments, we use recursive estimation to update the belief over the material classes. This way, we can predict the true class using the history of observations as opposed to doing single time predictions during the whole grasping procedure.
\subsection{Vision-based Classification}
As a classification baseline, we leverage a CNN to perform whole image classification with the scenes collected from the full-scene camera and endoscope. We capture full scene images to provide an analogous visual to how humans would classify a fruit: by using the whole object and its shape, size, and color. The endoscope provides a macro look at the fruits' textures and surface coloration that might not be visible from the scene camera's location. Within the same table environment we collected 100 images from orbital rotations around the fruit centered on the collection table. We also rotated the fruit within the open gripper and captured 100 macro texture images of each fruit with the endoscope.\par
To increase the robustness of our visual model to noise, we augment our existing dataset with the following transformations: random crops, random affine transformations, random horizontal flips, random color equalization, and random sharpeni\cite{shorten2019survey}. We leverage a pre-trained ResNet-50 architecture \cite{he2016deep} on the ImageNet \cite{deng2009imagenet} with the last fully connected layer altered to classify the 32 classes in our decision problem. Our model is trained in PyTorch \cite{paszke2019pytorch} with the Adam optimizer \cite{kingma2014adam} with parameters of $\beta_{1} = 0.9$, $\beta_{2} = 0.999$ and a learning rate of 0.0001. The model is trained for 50 epochs with a decaying learning rate every 15 epochs. This same architecture was used to classify both endoscope and full-scene images.
\begin{figure}[b]
\vspace{-1.5em}
\begin{subfigure}{0.10\textwidth}
\includegraphics[width=\linewidth]{images/kiwi_fake_01.png}
\caption{Fake kiwi texture} \label{fake_endo_1}
\end{subfigure}%
\hspace*{\fill}
\begin{subfigure}{0.10\textwidth}
\includegraphics[width=\linewidth]{images/kiwi_real_02.png}
\caption{Real kiwi texture} \label{real_endo_1}
\end{subfigure}
\hspace*{\fill}
\begin{subfigure}{0.10\textwidth}
\includegraphics[width=\linewidth]{images/kiwi_fake_01_1.png}
\caption{Full fake fruit} \label{fake_scene_1}
\end{subfigure}
\hspace*{\fill}
\begin{subfigure}{0.10\textwidth}
\includegraphics[width=\linewidth]{images/kiwi_real_02_1.png}
\caption{Full real kiwi} \label{real_scene_1}
\end{subfigure}%
\caption{Images collected by system during grasping. Note the similar size, shape, color, and textures of the two fruits.} \label{collection_images}
\end{figure}
\subsection{Spectroscopy}
The continuous spectral curve for each sample acquisition consisted of 2048 discrete samples, as limited by the diffraction gratings on the spectrometer detector. For each collection iteration, $\approx65$ spectral samples were collected from the start of the PRE-GRASP phase to the completion of the RELEASE phase. Scan averaging helped minimize the noise in the data in addition to a $5^{th}$ degree Savitzky-Golay filter. After removing a few erroneous data entries, the collected data was stacked into a matrix with dimensionality $10443\ \times \ 2048$. Knowing the high dimensionality of data would slow inference time for incoming signals, we reduce the dimensionality of the data using Non-Negative Matrix Factorization (NMF)~\cite{dhillon2005generalized} to learn a series of basis vectors $H$. This matrix yields a transformation of the original dataset into an $n$-dimensional array, whose length is a selected hyperparameter. We selected NMF over Principal Component Analysis (PCA) and Singular Value Decomposition (SVD) as our matrix decomposition technique since it is guaranteed to yield strictly positive factors, which is desirable as spectral signals are also completely positive.\par
We train four different model types: logistic, linear kernel Support Vector Machine (SVM), Radial Basis Function (RBF) nonlinear SVM, and Multi-Layer Perceptron (MLP). We utilized 5-fold cross validation with grid-search hyperparamter selection to identify appropriate regularization and kernel constraints for each model while using 80\% of the data for training while maintaining class balance. After selecting the hyperparameters which maximize the average performance across k-fold training on the validation data, we train a final iteration of models on the entire training data and evaluated them using the held-out $20\%$ of data.
\begin{figure}[t]
\centering
\includegraphics[width=\linewidth]{images/real_vs_synthetic_big.png}
\caption{Real vs. synthetic spectral profiles for green apples types. These curves demonstrate the mean profile of all the spectral signals in each class.}
\label{real_vs_synthetic}
\vspace{-1.5em}
\end{figure}
\subsection{Recursive Estimation}
As the spectral-finger nears the target object, the spectral reading changes until it reaches a stable position in the GRASP position. When the gripper is empty, the signature is identified as the reflectance of overhead LED lighting entering the sensor. This signature is consistent despite variations in the end effector pose. When the robot begins a grasping procedure, we assume a uniform prior distribution across all classes. We hold the Markov assumption, and formulate a recursive estimation model for incoming spectral signals. While we can do point estimate at every single timestep, recursive estimation allows us to use the whole history observations and overcome any possible noise in a particular timestep. We use a discrete Bayes filter (or Histogram filter)~\cite{thrun2002probabilistic} to maintain a belief over the possible materials. Let $x_t$ be the material type, $z_t$ be the measurements, and $bel(x_t)$ the belief at time step $t$ which is represented as a vector. Then, we do observation updates as follows:
\begin{align}
bel(x_t) = \eta p(z_t|x_t)bel(x_{t-1})
\end{align}
where $\eta$ is the normalization factor and $p(z_t|x_t)$ is the observation likelihood probability function. Note that the Bayes filters usually have a prediction step consisting of the the motion model but we skip this step as the state of our problem (material type) does not change during the prediction. Our observation model is modeled using machine learning methods that are described above.
When the gripper first approaches the object, the ambient lighting and the color in the visible spectrum are the first parts of the spectral curve exhibit notable response. At this point, the model might initially misclassify two similarly colored objects. As the gripper closes, the amplitude of the NIR segment becomes the curve's most prominent feature. This observation is confirmed by the calibration documents provided by the optical gratings manufacturer, as the silicon detector is less effective in the upper range of the NIR spectrum than the visible light range. However, proximity to the sensor appears to counteract this intrinsic sensitivity.
This update rule enables the robot gripper to gain increasing confidence in the material before contact. Once a threshold $\kappa$ confidence level is exceeded or $n$ samples have been taken, the object is assigned a label.
\begin{figure}[t]
\centering
\includegraphics[width=\linewidth]{images/train_hist_final.png}
\caption{Training history for average model performance for each number of NMF components}
\label{train_hist}
\vspace{-1.5em}
\end{figure}
Fig. \ref{real_vs_synthetic} shows the spectral data acquired for two visually indistinguishable green apples. The nearly identical spectral curves in $\lambda \rightarrow (350, 675)\ \text{nm}$ show similar visible light patterns, indicating their visible color is nearly identical. However, the NIR range $(>700\ \text{nm})$ shows a large intensity spike not perceptible to the human eye. This same NIR region could be compared with existing databases of spectral signals for more precise material composition analysis and similarity analysis to other cataloged materials \cite{kokaly2017usgs}.
\section{RESULTS}
The overall performance metrics are reported in Table \ref{res_table}. The RBF SVM maintains strong performance even when working with limited components from the NMF. Similarly the MLP also performs well with approximately the same number of components. This observation reinforces that the spectral classification problem is a nonlinear model, but is ultimately well explained through the introduction of nonlinearities in MLP layer connections and the kernel transformation by the RBF.\par
The endoscope classifier achieved an accuracy of 0.67 on 1920 test images. The full scene classifier performed worse with an accuracy of 0.59 over 2669 test images. Despite the success of ResNet in general image classification problems where there are significant inter-class differences, this task highlights the limitations of solely using visual sensing.\par
In Fig. \ref{train_hist} we observe how NMF performs as a dimensionality reduction technique on spectrometer data. For the RBF SVM, 10 components is maximally efficient and reduces our input data by $99.5\%$. Although the number of input components is fewer than the number of classes, the small input size indicates there is sufficient variations in intensity between the components to have separability in the classes. The small input size also has noticeable effects on the inference time to process new samples. Our trained ResNet model is 93.3 megabytes, compared with 45.8 kilobytes for the SVM, and is approximately two orders of magnitude slower to process incoming data than the RBF SVM. Table \ref{time_table} shows the mean and standard deviations of the model inference times evaluated over the test datasets. Moreover, the SVM does not require a GPU to run at realtime processing speeds, thus decreasing the computing cost.\par
\begin{table}[t]
\vspace{0.5em}
\caption{Model results for spectral and image models.}
\label{res_table}
\centering
\begin{tabular}{||c|c|c|c|c||}
\hline
Model & NMF & Train Acc & Test Acc & Test F-1\\ [0.5ex]
\hline\hline
\multirow{2}{*}{} & \multicolumn{4}{c||}{Spectral}\\
\hline
Logistic & 18 & 86.23 & 82.72 & 80.02\\
\hline
Linear SVM & 17 & 77.38 & 89.13 & 90.06\\
\hline
RBF SVM & 10 & 95.85 & \textbf{96.41} & \textbf{95.44}\\
\hline
MLP & 10 & 89.50 & 91.48 & 88.35\\
\hline
\multirow{2}{*}{} & \multicolumn{4}{c||}{Vision}\\
\hline
Full-Scene & - & 81.00 & 59.00 & 53.82\\
\hline
Endoscope & - & 89.00 & 67.00 & 65.92\\
\hline
\end{tabular}
\vspace{-1.75em}
\end{table}
Specifically with respect to the hyperparameter ranges for the MLP, we selected for both the number of layers and the number of their constituent neurons. There are many deeper networks with general success in machine learning; however, these models exhibit the same size and complexity problems as ResNet. Similarly, there are a wide variety of kernel methods for nonlinear SVMs which might provide additional performance improvements.
\begin{table}[t]
\vspace{0.5em}
\caption{Model inference times for visual and spectral models on Intel i7 processor with GTX 1070 GPU.}
\label{time_table}
\centering
\begin{tabular}{||c || c | c||}
\hline
Model & $\mu_{\text{inference}}$ (s) & $\sigma_{\text{inference}}$ (s)\\ [0.5ex]
\hline\hline
RBF SVM & 0.00019 & 0.00036\\
\hline
ResNet (GPU) & 0.01928 & 0.00159\\
\hline
ResNet (CPU) & 0.70733 & 0.06923\\
\hline
\end{tabular}
\vspace{-2.0em}
\end{table}
Our results are comparable to prior spectral-based model for the classification of household materials \cite{erickson2019classification}, although our recursive model adds additional estimation capabilities and functions on a greater class set size (32 versus 5). In comparison to accuracy of the visual methods using ResNet, the SVM with spectral data exceed the best performing endoscope model by 29.4\%. Each class in the decision problem is classified with an accuracy $\geq88\%$; moreover, for the misclassified examples, the error is associated with the distance from the object as discussed in Section~V. Utilizing recursive estimation, were were able to further increase the accuracy to 100\% using only three consecutive spectral samples for each object type.
\section{CONCLUSIONS}
In this work, we presented a novel gripper design to incorporate spectral sensing in a compact and integrated form. We demonstrated this system as a means to acquire a meaningful chemical profile via spectroscopy. With inspiration from elastomeric sensing, we designed a robust gripper capable of material sensing beyond the capabilities of humans without the need to contact the object directly. We evaluated our design on an assortment of 16 pairs of real and fake fruits, demonstrating the gripper was able to acquire visible-NIR spectral readings leading to successful item classification without the need for direct contact with the object. Compared with prior work in tactile sensing, our design and methodology allows for contact-free material determination. With recursive estimation, our model provides increased confidence in material class and can account for sensor noise while converging with enough time for the grasp to be aborted or changed.\par
We envision miniaturizing this technology to fit entirely within the fingerpads on a custom Printed Circuit Board (PCB) in future iterations of this gripper design. The sensor we utilized only provides a small look into the NIR, as the consensus for NIR range extends out to 2500 nm. Expanding the sensing abilities spectrometer by switching to an InGaAs detector will allow for easier differentiation between broad material categories, visibly transparent materials, and beneath surface coatings \cite{petersen2021non}.\par
As the gripper already contains an endoscope there is potential for multi-modal sensing with spectral data with either high-resolution texture imagery or other forms of haptic feedback.
Moreover, there are well defined databases of spectral material signatures with high degrees of specificity. Incorporating those databases into a trained model for grasped material identification will be useful for robots manipulating unknown objects or objects composed of heterogeneous materials.\par
\section*{ACKNOWLEDGMENTS}
The authors are grateful to Iris Wang and Stephanie Hanson for their help in the data collection, Hillel Hochsztein for his CAD and machining knowledge, and Charles DiMarzio for his expertise in spectroscopy.
\bibliographystyle{IEEEtran}
\section{INTRODUCTION}
Humans have an excellent subconscious ability to recognize the materials around us throughout daily life. As we interact with our environment we leverage our vision and prior experiences to estimate the material properties of objects we come into contact with \cite{buckingham2009living}. As we reach out to pick up a coffee mug, we form an idea of what that object is likely to weigh and how its surface will feel. This knowledge directly informs the way we position our hands as we approach the mug, allowing us to plan for an appropriate grasp force, maintain contact with, and move the mug to wherever we desire. If the mug is composed of a fragile material like glass, our grasp strategy will likely change to support the object from the handle, or the thickest part. These steps constitute the Sense, Plan, Act (SPA) pipeline \cite{oddi2020integrating} for object manipulation. However for some materials, such as fruits or seafood, which are subject to irreversible deformations through contact, the sense step must be done with minimal object contact in a nondestructive manner.
Prior work on quantifying object material properties for robot applications contributed techniques based on human sensory capabilities, including touch and vision. Specifically in prior work involving direct contact with objects (presented in detail in Section \ref{sec:prior}), much attention has been given to visual sensing or texture estimation via an elastomeric sensor.
\begin{figure}[t]
\centering
\includegraphics[width=\linewidth]{images/cross_setup.png}
\caption{Data collection setup using integrated spectral and visual perception.}
\label{cross_collection_setup}
\vspace{-2.5em}
\end{figure}
In this research, we present the design of a two fingered gripper$^{2}$ capable of collecting images and spectral data in real-time as the robot approaches an object to be grasped. This allows the robot to collect data and infer object material type before contact is made. Our research relies on the corpus of prior work in Near-Infrared (NIR) spectroscopy \cite{pasquini2018near, bec2019advances}, which has been demonstrated as a reliable means to estimate the material properties and composition of an object through reflected light in the ultraviolet ($\lambda \approx 300\ \text{nanometers}$) to the near-infrared ($\lambda \approx 1200\ \text{nanometers} $) spectra. Instead of representing light with three discrete values as is commonly done with red, blue, green (RBG) image channels, the integrated spectrometer represents light as a continuous curve, sampled at 2048 discrete values -- allowing for the observation and quantification of changes in the spectral response of an object. We classify incoming spectral readings with an SVM and leverage recursive estimation to increase confidence in the class label as more data is acquired.\par
The contributions of this paper are as follows.
\begin{itemize}
\item We introduce a novel design for a two fingered gripper with an integrated NIR spectrometer and endoscopic camera to collect VNIR spectral readings and macro surface images from grasped items.
\item We develop a method based on a nonlinear Support Vector Machine (SVM) to achieve material inference between visually similar items and continually update class estimates with a discrete Bayes filter.
\end{itemize}
The paper is organized as follows. Section~II provides an overview of the prior work in robot material sensing through visual and haptic approaches. To provide rationale for the spectro-visual gripper, we offer a brief discussion on the capabilities and underlying science of visible-NIR spectroscopy in Section~III. Section~IV is dedicated to presenting the details of the gripper design. SVM-based classification method is presented in Section~V. Section~VI discusses the validation of the model and experimental results on the classification of organic and inorganic materials with machine learning. Finally, Section~VII discusses the results of our research and future opportunities for spectral sensing.
\section{RELATED WORK}
\label{sec:prior}
\subsection{Material Identification}
Sensing modalities for classifying materials falls into two categories: contact and contact-free sensing. Computer vision constitutes the majority of work in contact-free material sensing. \cite{schwartz2019recognizing} hypothesized that the subjective labels of material appearance, such as fuzzy, shiny, smooth, rough, from human labeled regions could be used in a Convolutional Neural Network (CNN) to segment images intro broad material regions with reasonable success. Similarly, others have utilized a CNN \cite{bell2015material} to classify patches by material type as an input to a fully connected random field to contextualize the material type to the surrounding environment. These image based techniques require tedious and time-consuming hand segmentation and essential ground truth information. For example, plastics, metals, and ceramics can all look similar when painted and illuminated with specular reflection \cite{fang2019toward}.\par
In contact sensing, surface textures and shapes are exploited to determine the material type. For instance, a 3D printed finger was devised for use by humanoid robots to collect accelerometer data as the finger was moved across the surface of various material types \cite{sinapov2011vibrotactile}. Using a hierarchical model leveraging the frequency-domain signal from accelerometer, an SVM achieves an 80.0\% accuracy in recognizing surface textures. This framework has also been shown to be extensible to new material types and hence, it can categorize various materials based on similarities in texture and friction coefficients. While a novel approach to material classification, the exploratory behaviors are slow and can take upwards of 30 seconds to complete before the classification can begin and require direct contact. Related work in haptic sensing \cite{takamuku2007haptic}, and its fusion with visual data \cite{strese2016multimodal} has demonstrated promising results on a variety of everyday objects.\par
Elastomeric sensors measure surface topography and contact forces through deformation of a contact gel imaged by a small, high-resolution camera. The GelSight sensor is commonly used to acquire high-resolution texture models for fabrics and other coarse surfaces \cite{li2013sensing}, \cite{wang2016robot}. Force feedback from the gel deformation and CNNs have been used to learn manipulation models for a variety of material types \cite{abad2020visuotactile}. While these sensors provide rich surface information, it is computationally heavier to do material classification due to high-dimensional data. In contrast, spectral data contains and order of magnitude less data but still achieves high classification accuracy.
\subsection{Spectroscopy}
Previous research in spectral material identification is centered on commercial, handheld spectrometers fitted to a humanoid robot to scan household objects and differentiate between metal, plastic, wood, paper, and fabric \cite{erickson2019classification}. With a neural network architecture this model resulted in a classification accuracy of 79.1\% and was shown to generalize well to previously unseen objects \cite{erickson2020multimodal}. The approach was further extended to determine object penetrability for tool construction from multiple objects \cite{nair2019autonomous}. Agriculture researchers also developed a specialized gripper with a spectral probe and force feedback to determine the quality and ripeness of mango fruits through simultaneous spectral sampling and force feedback\cite{cortes2017integration}. Their combination of accelerometer and spectral data resulted in the creation of a regression model which could accurately predict the ripeness of a mango. However, their gripper was specifically designed to fit mangoes and did not generalize to other applications.\par
Our work is differentiated from the spectroscopy solution presented in \cite{erickson2019classification} and \cite{erickson2020multimodal} since these works regard spectral readings as a static measurement to be acquired at a fixed position from the object and over a single time step. Our work integrates spectral probes directly into the gripper finger, providing an avenue to both sense and grasp in one continuous motion, instead of scanning, and grasping separately. This combination of perception and manipulation reduces the total time needed to plan interactions with items. Moreover, we leverage the fast acquisition time of our spectrometer to continually improve our material classification as the gripper fingers close around the object. In contrast to existing work in haptic perception, our methodology does not require any form of contact and allows material perception on objects which might deform under contact.
\section{BACKGROUND ON SPECTROSCOPY}
NIR spectroscopy is a technique which involves measuring the electromagnetic radiation emitted by an object when illuminated in the range of 750 to 2500 nm. Chemically, NIR spectroscopy occurs due to the anharmoic vibrational modes caused by the presence of heavy elements such as Carbon, Nitrogen, Oxygen bonding to a Hydrogen atom or bonds between these molecule types \cite{pasquini2018near}. As electromagnetic energy is imparted on a target substance, the bonds react to the energy in the NIR range and causes overtones in the bond vibrations. All materials exhibit some form of NIR reflectance and absorption, similar to how materials reflect red, blue, and green light in varying proportions, which our retinas and their cone cells process into color rich environmental information. For both organic and inorganic materials composed of these aforementioned bonds, particularly in long chains or rings, these substances exhibit markedly unique responses in the amount of non-visible NIR radiation they emit. By measuring the response profiles of material samples, future acquisitions can be compared to this reference spectral library to determine material class \cite{kokaly2017usgs}.\par
In analytical spectroscopy a full spectrum light source, marked by even electromagnetic emittance across the spectrum, is used to illuminate a surface. A diffraction grating, akin to a prism, separates the light into component wavelength ranges which measures incident photons using either a Silicon or Indium Gallium Arsenide (InGaAs) detector array - depending on the wavelength being measured. NIR spectroscopy has found widespread adoption in the laboratory and research realms. In agriculture, processing quality checks regularly rely on NIR to estimate sugar, fat, and overall quality of foodstuffs \cite{kawasaki2008near},\cite{shah2020towards}, \cite{guermazi2014investigation}.
\section{METHODS \& MATERIALS}
The gripper design process has been driven by a set of design specifications which include: (1) Handle objects of size 0-8.5 cm in diameter; (2) Collect continual spectral data at a rate of 10 Hz in the wavelength range 400 - 1100 nm; (3) Acquire texture images from a range from 1 - 8.5cm.
\subsection{Spectrometer Specifications}
We utilize a StellarNet BLUE-Wave miniature spectrometer: a compact, comparatively less expensive device has been shown to perform well against more expensive laboratory devices and is well utilized in the literature \cite{pourdarbani2020non}, \cite{jenkins2012molecularly}. Our system design utilizes a seven strand fiber optic cable connecting the device to a cylindrical probe and collects readings from 350 - 1150 nm. A single central fiber is used to measure reflectance and the other six fibers connect to a Quartz Tungsten Halogen (QTH) lamp and provide the requisite full spectrum illumination. This QTH light source is necessary to ensure uniform operation of the spectral sensor across a variety of lighting environments. The device is calibrated with a white reference standard to account for a perfect pure white light reflection, and a probe covering to establish a dark signal baseline. The Signal to Noise ratio (SNR) is 1000:1, and the signal quality can be further improved by increasing integration time (time to acquire reflectance information) and signal sample averaging. The device was sampled at a rate of 10Hz and the data is transmitted to a desktop computer. Our fiber optic cable has a bend radius of 19.8 cm, which we are careful to avoid exceeding as it could cause internal damage to the cable, or result in signal attenuation from internal refraction.
\subsection{Gripper Design}
Using a Robotiq 2F-85 parallel plate gripper, we designed custom finger pads to extend the base mechanism's capabilities to collect integrated spectral grasping setup. Each finger measures (64 mm x 30 mm x 27 mm) with a contact pad (35 mm x 22 mm x 3 mm), with 23.1 square centimeters of intended contact space. The two finger pads, pictured in Fig \ref{gripper_design}, are 3D printed with continuous carbon fiber reinforcement to minimize flexing at the mounting point of the finger to the parallelogram drive mechanism. The fingers have angled circular slots to allow for the insertion and adjustments of probes with a friction fit collar clamp. The spectrometer probe was positioned so 1 cm separation remains when the robot grasps an object. The other finger is fitted with an endoscope camera providing high resolution images from the perspective of the finger pad. It also contains a brightness-adjustable Light Emitting Diode (LED) light ring to provide proper illumination. Both devices are inserted at a $45^{\circ}$ angle relative to grasping surface to ensure good coverage of grasped materials while minimizing the width of the gripper.\par
\begin{figure}[t]
\vspace{0.5em}
\centering
\includegraphics[width=\linewidth]{images/vast_annotated_iros.png}
\caption{Gripper with 3D printed finger pads, an NIR spectrometer probe and endoscope attachments rendered with AutoCAD.}
\label{gripper_design}
\vspace{-1.0em}
\end{figure}
To ensure a gentler grasp and protect the sensors, the fingers contain inserts inspired by the DIGIT tactile sensor made of Solaris silicon gel \cite{lambeta2020digit}. This material was selected for its wide operational temperature range of $-100^{\circ}$ and $204^{\circ}$ C and resilience when grasping rough textured objects. Moreover, its rated tensile strength exceeds the force capabilities of the Robotiq gripper. Notably, the gel is also optically clear in the operating range of the BLUEWAVE spectrometer and verified by a hyperspectral camera (Headwall Photonics) to not significantly impede the transmission of any visible or NIR light as shown in Fig. \ref{gel_effect}.
\begin{figure}[t]
\centering
\includegraphics[width=\linewidth]{images/gelpad_effect.png}
\caption{Spectral reflectance curves collected with and without the presence of finger gelpad showing uniformly diminished reflectance due to minor subsurface scattering}
\label{gel_effect}
\vspace{-1.5em}
\end{figure}
\subsection{Data Collection}
\begin{figure*}[t]
\centering
\vspace{0.5em}
\includegraphics[width=\textwidth]{images/cross_fruit_collection.png}
\caption{Grasping procedure for collecting spectral and image data with a robotic manipulator through defined series of waypoints and end effector positions.}
\vspace{-1.65em}
\label{collection_procedure}
\end{figure*}
Our experimental data was acquired using a UR3e collaborative robot arm controlled by the Robot Operating System (ROS) \cite{quigley2009ros}. The robot has four predefined positions defined in the Cartesian space: HOME, PRE-GRASP, GRASP, and RELEASE. These positions are shown in the sample data collection in Fig. \ref{collection_procedure}. Each position consisted of an $[x,y,z]$ coordinate and quaternion representing the end effector pose. To transition between positions, we use an inverse kinematics solver \cite{wampler1986manipulator} that respects the joint limits and 3D mesh of the robot model. Objects were placed at the center of a white table, surrounded by a white background to minimize ambient reflections into the spectrometer. An RGB camera was mounted to the robot to capture mages of the full table scene. Fig. \ref{cross_collection_setup} shows the complete collection environment. The gripping force threshold was set at 2.5\% (5.9 N) of the maximum possible force (235 N) to avoid damaging the fruits. Objects were lifted to induce small variations into the spectral signal by flexing the fiber optic cable.\par
For the initial demonstration of the system capabilities, we designed a visually challenging experiment for the spectro-visual gripper. We selected 16 varieties of fresh fruit \textit{\{kiwi, banana, green grape, lemon, mango, avocado, plum, orange, red apple, pear, strawberry, red grape, black grape, green apple, peach\}}. For each real item of fruit, we acquired a corresponding fake item. These items are designed to look visually indistinguishable from their real counterparts and share similar surface textures.\par
For each sample acquisition, illustrated in Fig. \ref{collection_procedure}, the object is placed on the table in front of the robot. The robot takes a single image using the full scene camera. The robot then transitions from HOME to PRE-GRASP where it is directly above the object. The arm then lowers to place its gripper fingers on either side of the object to the GRASP position. The endoscope is triggered and takes a texture picture of the object to be grasped. As the gripper fingers close, the spectral data acquisition commences. Once the fingers detect force feedback exceeding the threshold, the arm lifts the object back to PRE-GRASP position, holds for one second and then lowers to release the item, ending spectral data collection. This procedure is repeated 5 times for each object, with the object rotated $20^{\circ}$ between collections.\par
In Fig. \ref{collection_images} both the fake and real kiwi posses similar light brown surface hair. The fake items are composed of a variety of plastics and other inorganic substances contrasted with the organic structure of the real fruits. The real fruits are composed primarily of water and carbohydrates, whose molecular structure differs significantly from plastics and polystyrene counterparts \cite{zhang2019hyperspectral}. As a result, we create a 32 class problem containing each of the real and fake varieties.
\section{MODELING}
Our main goal is to classify objects using spectroscopy and show that this technique outperforms vision-based methods in a real world setting with visually similar items. To this end, we first deploy a state-of-the art visual encoder and train it on the dataset we collected within the scope of this research. Later, we discuss our method for using spectral information that can achieve better results with simpler models. In general, the problem can be formulated as a multi-class classification:
\begin{align}
\hat{x} = \textit{argmax} (p_{\theta}(x|z))
\end{align}
where $\hat{x}$ is the predicted class, $\theta$ is the model parameters, and $z$ is the observation (e.g. visual image or reading from spectrometer). In the case of real-world experiments, we use recursive estimation to update the belief over the material classes. This way, we can predict the true class using the history of observations as opposed to doing single time predictions during the whole grasping procedure.
\subsection{Vision-based Classification}
As a classification baseline, we leverage a CNN to perform whole image classification with the scenes collected from the full-scene camera and endoscope. We capture full scene images to provide an analogous visual to how humans would classify a fruit: by using the whole object and its shape, size, and color. The endoscope provides a macro look at the fruits' textures and surface coloration that might not be visible from the scene camera's location. Within the same table environment we collected 100 images from orbital rotations around the fruit centered on the collection table. We also rotated the fruit within the open gripper and captured 100 macro texture images of each fruit with the endoscope.\par
To increase the robustness of our visual model to noise, we augment our existing dataset with the following transformations: random crops, random affine transformations, random horizontal flips, random color equalization, and random sharpeni\cite{shorten2019survey}. We leverage a pre-trained ResNet-50 architecture \cite{he2016deep} on the ImageNet \cite{deng2009imagenet} with the last fully connected layer altered to classify the 32 classes in our decision problem. Our model is trained in PyTorch \cite{paszke2019pytorch} with the Adam optimizer \cite{kingma2014adam} with parameters of $\beta_{1} = 0.9$, $\beta_{2} = 0.999$ and a learning rate of 0.0001. The model is trained for 50 epochs with a decaying learning rate every 15 epochs. This same architecture was used to classify both endoscope and full-scene images.
\begin{figure}[b]
\vspace{-1.5em}
\begin{subfigure}{0.10\textwidth}
\includegraphics[width=\linewidth]{images/kiwi_fake_01.png}
\caption{Fake kiwi texture} \label{fake_endo_1}
\end{subfigure}%
\hspace*{\fill}
\begin{subfigure}{0.10\textwidth}
\includegraphics[width=\linewidth]{images/kiwi_real_02.png}
\caption{Real kiwi texture} \label{real_endo_1}
\end{subfigure}
\hspace*{\fill}
\begin{subfigure}{0.10\textwidth}
\includegraphics[width=\linewidth]{images/kiwi_fake_01_1.png}
\caption{Full fake fruit} \label{fake_scene_1}
\end{subfigure}
\hspace*{\fill}
\begin{subfigure}{0.10\textwidth}
\includegraphics[width=\linewidth]{images/kiwi_real_02_1.png}
\caption{Full real kiwi} \label{real_scene_1}
\end{subfigure}%
\caption{Images collected by system during grasping. Note the similar size, shape, color, and textures of the two fruits.} \label{collection_images}
\end{figure}
\subsection{Spectroscopy}
The continuous spectral curve for each sample acquisition consisted of 2048 discrete samples, as limited by the diffraction gratings on the spectrometer detector. For each collection iteration, $\approx65$ spectral samples were collected from the start of the PRE-GRASP phase to the completion of the RELEASE phase. Scan averaging helped minimize the noise in the data in addition to a $5^{th}$ degree Savitzky-Golay filter. After removing a few erroneous data entries, the collected data was stacked into a matrix with dimensionality $10443\ \times \ 2048$. Knowing the high dimensionality of data would slow inference time for incoming signals, we reduce the dimensionality of the data using Non-Negative Matrix Factorization (NMF)~\cite{dhillon2005generalized} to learn a series of basis vectors $H$. This matrix yields a transformation of the original dataset into an $n$-dimensional array, whose length is a selected hyperparameter. We selected NMF over Principal Component Analysis (PCA) and Singular Value Decomposition (SVD) as our matrix decomposition technique since it is guaranteed to yield strictly positive factors, which is desirable as spectral signals are also completely positive.\par
We train four different model types: logistic, linear kernel Support Vector Machine (SVM), Radial Basis Function (RBF) nonlinear SVM, and Multi-Layer Perceptron (MLP). We utilized 5-fold cross validation with grid-search hyperparamter selection to identify appropriate regularization and kernel constraints for each model while using 80\% of the data for training while maintaining class balance. After selecting the hyperparameters which maximize the average performance across k-fold training on the validation data, we train a final iteration of models on the entire training data and evaluated them using the held-out $20\%$ of data.
\begin{figure}[t]
\centering
\includegraphics[width=\linewidth]{images/real_vs_synthetic_big.png}
\caption{Real vs. synthetic spectral profiles for green apples types. These curves demonstrate the mean profile of all the spectral signals in each class.}
\label{real_vs_synthetic}
\vspace{-1.5em}
\end{figure}
\subsection{Recursive Estimation}
As the spectral-finger nears the target object, the spectral reading changes until it reaches a stable position in the GRASP position. When the gripper is empty, the signature is identified as the reflectance of overhead LED lighting entering the sensor. This signature is consistent despite variations in the end effector pose. When the robot begins a grasping procedure, we assume a uniform prior distribution across all classes. We hold the Markov assumption, and formulate a recursive estimation model for incoming spectral signals. While we can do point estimate at every single timestep, recursive estimation allows us to use the whole history observations and overcome any possible noise in a particular timestep. We use a discrete Bayes filter (or Histogram filter)~\cite{thrun2002probabilistic} to maintain a belief over the possible materials. Let $x_t$ be the material type, $z_t$ be the measurements, and $bel(x_t)$ the belief at time step $t$ which is represented as a vector. Then, we do observation updates as follows:
\begin{align}
bel(x_t) = \eta p(z_t|x_t)bel(x_{t-1})
\end{align}
where $\eta$ is the normalization factor and $p(z_t|x_t)$ is the observation likelihood probability function. Note that the Bayes filters usually have a prediction step consisting of the the motion model but we skip this step as the state of our problem (material type) does not change during the prediction. Our observation model is modeled using machine learning methods that are described above.
When the gripper first approaches the object, the ambient lighting and the color in the visible spectrum are the first parts of the spectral curve exhibit notable response. At this point, the model might initially misclassify two similarly colored objects. As the gripper closes, the amplitude of the NIR segment becomes the curve's most prominent feature. This observation is confirmed by the calibration documents provided by the optical gratings manufacturer, as the silicon detector is less effective in the upper range of the NIR spectrum than the visible light range. However, proximity to the sensor appears to counteract this intrinsic sensitivity.
This update rule enables the robot gripper to gain increasing confidence in the material before contact. Once a threshold $\kappa$ confidence level is exceeded or $n$ samples have been taken, the object is assigned a label.
\begin{figure}[t]
\centering
\includegraphics[width=\linewidth]{images/train_hist_final.png}
\caption{Training history for average model performance for each number of NMF components}
\label{train_hist}
\vspace{-1.5em}
\end{figure}
Fig. \ref{real_vs_synthetic} shows the spectral data acquired for two visually indistinguishable green apples. The nearly identical spectral curves in $\lambda \rightarrow (350, 675)\ \text{nm}$ show similar visible light patterns, indicating their visible color is nearly identical. However, the NIR range $(>700\ \text{nm})$ shows a large intensity spike not perceptible to the human eye. This same NIR region could be compared with existing databases of spectral signals for more precise material composition analysis and similarity analysis to other cataloged materials \cite{kokaly2017usgs}.
\section{RESULTS}
The overall performance metrics are reported in Table \ref{res_table}. The RBF SVM maintains strong performance even when working with limited components from the NMF. Similarly the MLP also performs well with approximately the same number of components. This observation reinforces that the spectral classification problem is a nonlinear model, but is ultimately well explained through the introduction of nonlinearities in MLP layer connections and the kernel transformation by the RBF.\par
The endoscope classifier achieved an accuracy of 0.67 on 1920 test images. The full scene classifier performed worse with an accuracy of 0.59 over 2669 test images. Despite the success of ResNet in general image classification problems where there are significant inter-class differences, this task highlights the limitations of solely using visual sensing.\par
In Fig. \ref{train_hist} we observe how NMF performs as a dimensionality reduction technique on spectrometer data. For the RBF SVM, 10 components is maximally efficient and reduces our input data by $99.5\%$. Although the number of input components is fewer than the number of classes, the small input size indicates there is sufficient variations in intensity between the components to have separability in the classes. The small input size also has noticeable effects on the inference time to process new samples. Our trained ResNet model is 93.3 megabytes, compared with 45.8 kilobytes for the SVM, and is approximately two orders of magnitude slower to process incoming data than the RBF SVM. Table \ref{time_table} shows the mean and standard deviations of the model inference times evaluated over the test datasets. Moreover, the SVM does not require a GPU to run at realtime processing speeds, thus decreasing the computing cost.\par
\begin{table}[t]
\vspace{0.5em}
\caption{Model results for spectral and image models.}
\label{res_table}
\centering
\begin{tabular}{||c|c|c|c|c||}
\hline
Model & NMF & Train Acc & Test Acc & Test F-1\\ [0.5ex]
\hline\hline
\multirow{2}{*}{} & \multicolumn{4}{c||}{Spectral}\\
\hline
Logistic & 18 & 86.23 & 82.72 & 80.02\\
\hline
Linear SVM & 17 & 77.38 & 89.13 & 90.06\\
\hline
RBF SVM & 10 & 95.85 & \textbf{96.41} & \textbf{95.44}\\
\hline
MLP & 10 & 89.50 & 91.48 & 88.35\\
\hline
\multirow{2}{*}{} & \multicolumn{4}{c||}{Vision}\\
\hline
Full-Scene & - & 81.00 & 59.00 & 53.82\\
\hline
Endoscope & - & 89.00 & 67.00 & 65.92\\
\hline
\end{tabular}
\vspace{-1.75em}
\end{table}
Specifically with respect to the hyperparameter ranges for the MLP, we selected for both the number of layers and the number of their constituent neurons. There are many deeper networks with general success in machine learning; however, these models exhibit the same size and complexity problems as ResNet. Similarly, there are a wide variety of kernel methods for nonlinear SVMs which might provide additional performance improvements.
\begin{table}[t]
\vspace{0.5em}
\caption{Model inference times for visual and spectral models on Intel i7 processor with GTX 1070 GPU.}
\label{time_table}
\centering
\begin{tabular}{||c || c | c||}
\hline
Model & $\mu_{\text{inference}}$ (s) & $\sigma_{\text{inference}}$ (s)\\ [0.5ex]
\hline\hline
RBF SVM & 0.00019 & 0.00036\\
\hline
ResNet (GPU) & 0.01928 & 0.00159\\
\hline
ResNet (CPU) & 0.70733 & 0.06923\\
\hline
\end{tabular}
\vspace{-2.0em}
\end{table}
Our results are comparable to prior spectral-based model for the classification of household materials \cite{erickson2019classification}, although our recursive model adds additional estimation capabilities and functions on a greater class set size (32 versus 5). In comparison to accuracy of the visual methods using ResNet, the SVM with spectral data exceed the best performing endoscope model by 29.4\%. Each class in the decision problem is classified with an accuracy $\geq88\%$; moreover, for the misclassified examples, the error is associated with the distance from the object as discussed in Section~V. Utilizing recursive estimation, were were able to further increase the accuracy to 100\% using only three consecutive spectral samples for each object type.
\section{CONCLUSIONS}
In this work, we presented a novel gripper design to incorporate spectral sensing in a compact and integrated form. We demonstrated this system as a means to acquire a meaningful chemical profile via spectroscopy. With inspiration from elastomeric sensing, we designed a robust gripper capable of material sensing beyond the capabilities of humans without the need to contact the object directly. We evaluated our design on an assortment of 16 pairs of real and fake fruits, demonstrating the gripper was able to acquire visible-NIR spectral readings leading to successful item classification without the need for direct contact with the object. Compared with prior work in tactile sensing, our design and methodology allows for contact-free material determination. With recursive estimation, our model provides increased confidence in material class and can account for sensor noise while converging with enough time for the grasp to be aborted or changed.\par
We envision miniaturizing this technology to fit entirely within the fingerpads on a custom Printed Circuit Board (PCB) in future iterations of this gripper design. The sensor we utilized only provides a small look into the NIR, as the consensus for NIR range extends out to 2500 nm. Expanding the sensing abilities spectrometer by switching to an InGaAs detector will allow for easier differentiation between broad material categories, visibly transparent materials, and beneath surface coatings \cite{petersen2021non}.\par
As the gripper already contains an endoscope there is potential for multi-modal sensing with spectral data with either high-resolution texture imagery or other forms of haptic feedback.
Moreover, there are well defined databases of spectral material signatures with high degrees of specificity. Incorporating those databases into a trained model for grasped material identification will be useful for robots manipulating unknown objects or objects composed of heterogeneous materials.\par
\section*{ACKNOWLEDGMENTS}
The authors are grateful to Iris Wang and Stephanie Hanson for their help in the data collection, Hillel Hochsztein for his CAD and machining knowledge, and Charles DiMarzio for his expertise in spectroscopy.
\bibliographystyle{IEEEtran}
|
\section{Introduction}
Let $C$ be a (smooth, projective) curve of genus $g$, and let $G$ be a finite group of automorphisms of $C$. The group $G$ acts on the Jacobian $J$ of $C$. There are two rather different possibilities for the quotient $J/G$ \cite{K-L}: either it has canonical singularities and Kodaira dimension $0$, or it is uniruled. The aim of this note is to show that the latter case is rather exceptional -- in fact, it does not occur for $g\geq 21$. This bound is rough, and can certainly be lowered. On the other hand we give examples of uniruled $J/G$ for $g\leq 4$.
When $g=3$ this is an essential ingredient in our proof that the cycle $[C]-[(-1)^*C]$ on $J$ is torsion modulo algebraic equivalence \cite{B-S}; in fact this note grew out of the observation that already in genus 3, the case where $J/G$ is uniruled is quite rare.
\section{$J/G$ canonical}
Let $C$ be a curve of genus $g$ and $J$ its Jacobian. Let $G$ be a subgroup of $\Aut(C)$, hence also of $\Aut(J)$. By \cite[Theorem 2]{K-L}, there are two possibilities:
$\bullet$ Either $J/G$ has canonical singularities, and Kodaira dimension $0$;
$\bullet$ or $J/G$ is uniruled.
\begin{prop}
Assume $g\geq 21$. The quotient variety $J/G$ has canonical singularities, and Kodaira dimension $0$.
\end{prop}
\pr
We first observe that the fixed locus $\operatorname{Fix}(\sigma )\subset J$ of any element $\sigma \neq 1$ of $G$
has codimension $\geq 2$. Indeed the dimension of $\operatorname{Fix}(\sigma )$ is the multiplicity of the eigenvalue $1$ for the action of $\sigma $ on $H^0(C,K_C)$, that is, the genus of $C/\lr{\sigma }$, which is $\leq g-2$ as soon as $g\geq 4$ by the Hurwitz formula.
Let $\sigma $ be an element of order $r$ in $G$, and let $p\in J$ be a fixed point of $\sigma $. The action of $\sigma $ on the tangent space $T_p(J)$ is isomorphic to the action on $T_0(J)=H^{0,1}(C)$.
Let $\zeta =e^{\frac{2\pi i}{r} }$; we write the eigenvalues of $\sigma $ acting on $H^{0,1}(C)$ in the form $\zeta ^{a_1},\ldots , \zeta ^{a_g}$, with $0\leq a_i<r$. By Reid's criterion \cite[Theorem 3.1]{R}, $J/G$ has canonical singularities if and only if $\sum a_i\geq r$ for all $\sigma $ in $G$.
The eigenvalues of $\sigma $ acting on $H^1(C,\C)$ are $\zeta ^{a_1},\ldots , \zeta ^{a_g}; {\zeta }^{-a_1},\ldots , {\zeta} ^{-a_g}$.
Thus $\Tr \sigma ^*_{|H^1(C,\C)}=\allowbreak 2\sum \cos \dfrac{2\pi a_i}{r} \,\cdot $ By the Lefschetz formula, this trace is equal to $2-f$, where $f$ is the number of fixed points of $\sigma $; in particular, it is $\leq 2$. Using $\cos x\geq 1-\dfrac{x^2}{2} $, we find
\[1\geq \sum \cos \dfrac{2\pi a_i}{r}\geq g-\dfrac{ 2\pi ^2}{r^2} \sum a_i^2\ ,\]
hence $\displaystyle\ (\sum a_i)^2\geq \sum a_i^2 \geq \dfrac{g-1}{2 \pi ^2}\, r^2$. Thus if
$g\geq 1+2\pi ^2=20.739\ldots $, we get $\sum a_i>r$.\qed
\medskip
\noindent\emph{Remark}$.-$ The proposition does not extend to the case of an arbitrary abelian variety: indeed we give below examples where $J/G$ is uniruled; then if $A$ is any abelian variety, the quotient of $J\times A$ by $G$ acting trivially on $A$
is again uniruled.
\section{$J/G$ uniruled}
We will now give examples of (low genus) curves $C$ such that $J/G$ is uniruled.
The genus 2 case is quite particular (and probably well known). We put $\rho :=e^{\frac{2\pi i}{3} }$.
\begin{prop}
If $g(C)=2$, $J/G$ has Kodaira dimension $0$ if and only if $G=\lr{\sigma }$ and $\sigma $ is the hyperelliptic involution, or an automorphism of order $3$ with eigenvalues $(\rho ,\rho ^2)$ on $H^0(C,K_C)$, or
an automorphism of order $6$ with eigenvalues $(-\rho ,-\rho ^2)$ on $H^0(C,K_C)$.
\end{prop}
\pr Let $\sigma $ be an element of order $r$ in $G$, and let $\zeta $ be a primitive $r$-th root of unity.
The eigenvalues of $\sigma $ acting on $H^0(C,K_C)$ are $\zeta^{a} ,\zeta ^{b}$, with $0\leq a,b<r$. Suppose that $J/G$ has canonical singularities. By Reid's criterion we must have $a+b\geq r$; replacing $\zeta $ by $\zeta ^{-1}$ gives $2r-a-b\geq r$, hence $a+b=r$. Since $\sigma $ has order $r$, $\sigma ^k$ acts non-trivially on $H^0(C,K_C)$ for $0<k<r$; therefore $a$ and $r$ are coprime. Replacing $\zeta $ by $\zeta ^{a}$ we may assume that the eigenvalues of $\sigma $ are $\zeta $ and $\zeta ^{-1}$.
Put $\zeta =e^{i\alpha }$; the trace of $\sigma $ acting on $H^1(C,\Z)$ is $2(\zeta +\zeta ^{-1})=4 \cos \alpha $, and it is an integer. This implies $\cos \alpha =0$ or $\pm \dfrac{1}{2}$, hence $\alpha \in \Z\cdot \dfrac{2\pi }{6} $ and $r\in\{2,3,6\} $. If $r=2$ we must have $\zeta =\zeta ^{-1}=-1$, hence $\sigma $ is the hyperelliptic involution; if $r=3$ or $6$ we have $\{\zeta ,\zeta ^{-1}\}=\{\rho ,\rho ^2\} $ or $\{-\rho ,-\rho ^2\} $.
Thus $G$ contains elements of order $3$ and $6$, and at most one element of order $2$.
Since the order of $\Aut(C)$ is not divisible by $9$
\cite[11.7]{B-L}, $G$ is isomorphic to either $\Z/3$, or a central extension of $\Z/3$ by $\Z/2$ -- that is, $\Z/6$. This proves the Proposition.
\qed
\medskip
The last two cases are realized by the curves $C$ of the form $y^2=x^6+kx^3+1$, with the automorphisms $\sigma _1:(x,y)\mapsto (\rho x, y)$ and $\sigma _2:(x,y)\mapsto (\rho x,-y)$. The surfaces $S_i:=J/\lr{\sigma _i}$ are (singular) K3 surfaces, each depending on one parameter. The surface $S_1$ is studied in detail in \cite{B-V}: it has 9 singular points of type $A_2$. The surface $S_2$ is the quotient of $S_1$ by the involution induced by $(-1)_J$; it has one singular point of type $A_5$ (the image of $0\in J$), 4 points of type $A_2$ corresponding to pairs of singular points of $S_1$, and $5$ points of type $A_1$ corresponding to triples of points of order 2 of $J$.
\bigskip
It is more subtle to give examples with $g\geq 3$. By Reid's criterion, we must exhibit an automorphism $\sigma $ of $C$, of order $r$, such that the eigenvalues of $\sigma $ acting on $H^0(C,K_C)$ are of the form $\zeta ^{a_1},\ldots ,\zeta ^{a_g}$, with $\zeta $ a primitive $r$-th root of unity, $a_i\geq 0$ and $\sum a_i<r$. In the following tables we give the curve $C$ (in affine coordinates), the order $r$ of $\sigma $ and $\zeta $, the expression of $\sigma $, a basis of eigenvectors for $\sigma $ acting on $H^0(C,K_C)$, the exponents $a_1,\ldots ,a_g$; in the last column we check the inequality $\sum a_i<g$, which implies that $J/\lr{\sigma }$ is uniruled.
\medskip
\begin{center}
\framebox{$g=3$}
\end{center}
\medskip
{\renewcommand{\arraystretch}{2}
\[\begin{array}{|c|c|c|c|c|c|}
\hline
\text{curve} & r & \sigma(x,y)= & \text{basis of } H^0(K_C) & a_1,\ldots ,a_3 & \sum a_i\\
\hline\rule[-0.5cm]{0cm}{2pt}
y^2=x^8-1& 8 & (\zeta x, y)& \dfrac{dx}{y}, \dfrac{xdx}{y}, \dfrac{x^2dx}{y}& 1,2,3 & 6<8\\
\hline\rule[-0.5cm]{0cm}{2pt}
y^2=x(x^7-1) & 14 & (\zeta ^2x,\zeta y)& \dfrac{dx}{y}, \dfrac{xdx}{y}, \dfrac{x^2dx}{y}& 1,3,5 & 9<14\\
\hline\rule[-0.5cm]{0cm}{2pt}
y^3=x(x^3-1) & 9 & (\zeta ^3x,\zeta y)& \dfrac{dx}{y^2}, \dfrac{xdx}{y^2}, \dfrac{dx}{y}& 1,4,2 & 7<9\\
\hline\rule[-0.5cm]{0cm}{2pt}
y^3=x^4-1 & 12 & (\zeta ^{-3}x,\zeta^{-4} y)& \dfrac{dx}{y^2}, \dfrac{xdx}{y^2}, \dfrac{dx}{y}& 5,2, 1 & 8<12\\
\hline
\end{array} \]
\medskip
The fact that $J/\lr{\sigma }$ is uniruled for the third curve $C$ is an important ingredient of the proof in \cite{B-S} that the Ceresa cycle $[C]-[(-1)^*C]$ in $J$ is torsion modulo algebraic equivalence. The same property for the fourth curve is observed in \cite{L-S}.
\bigskip
\begin{center}
\framebox{$g=4$}
\end{center}
\medskip
{\renewcommand{\arraystretch}{2}
\[\begin{array}{|c|c|c|c|c|c|}
\hline
\text{curve} & r & \sigma(x,y)= & \text{basis of } H^0(K_C) & a_1,\ldots ,a_4 & \sum a_i\\
\hline\rule[-0.5cm]{0cm}{2pt}
y^2=x(x^9-1)& 18 & (\zeta^2 x, \zeta y)& \dfrac{dx}{y}, \dfrac{xdx}{y}, \dfrac{x^2dx}{y}, \dfrac{x^3dx}{y}& 1,3,5,7 & 16<18\\
\hline\rule[-0.5cm]{0cm}{2pt}
y^3=x^5-1 & 15 & (\zeta ^{-3}x,\zeta ^{-5} y)& \dfrac{dx}{y^2}, \dfrac{xdx}{y^2}, \dfrac{x^2dx}{y^2}, \dfrac{dx}{y}& 7,4,1,2 & 14<15\\
\hline
\end{array} \]
\bigskip
In genus 5 there is no example:
\begin{prop}
Assume $g=5$. The quotient variety $J/G$ has canonical singularities, and Kodaira dimension $0$.
\end{prop}
\pr The paper \cite{K-K} contains the list of possible automorphisms of genus 5 curves, and gives for each automorphism of order $r$ its eigenvalues $e^{\frac{2\pi i a_1}{r} },\ldots ,e^{\frac{2\pi i a_5}{r} }$ on $H^0(K)$, with $0\leq a_i<5$. We want to prove $\sum a_i\geq r$.
We first observe that
if an eigenvalue and its inverse appear in the list, we have $\sum a_i\geq r$; this eliminates all cases with $r\leq 10$. For $r\geq 11$ the numbers
$a_1,\ldots ,a_5$ are always distinct and nonzero; therefore $\sum a_i\geq 1+2+\cdots +5\allowbreak = 15$. The remaining cases are $r=20$ and $22$; one checks immediately that for all $k$ coprime to $r$ we have $\sum b_i\geq r$, where $b_i\equiv ka_i\pmod{r}$ and $0<b_i<r$. This proves the Proposition.\qed
\medskip
I know no example in genus $\geq 6$, and I suspect there are none.
\bigskip
|
\section{Introduction} \label{sec:motivation}
Many black-box optimization problems contain feature relationships known \textit{a priori} based on domain knowledge, such as hierarchies or constraints~\citep{nanfack2022constraint}.
For example, hierarchical structures arise in neural architecture search \citep{elsken2019neural,ying2019bench}, where hyperparameters such as kernel size are only relevant if a convolutional layer is selected.
Explicit constraints can also arise, e.g.,\ matching kernel size and stride to input channel size and padding.
In many cases, Bayesian optimization can incorporate known hierarchies and/or constraints, given that a suitable surrogate model is selected.
To this end, \citet{fromont2006integrating} and \citet{nijssen2007mining} impose a variable hierarchy by constraining the splitting order of decision trees, i.e.,\ certain attributes must be selected before others.
Tree-based models, such as random forests or gradient-boosted trees, remain popular in many applications, as they inherit the innate ability of simple decision trees to seamlessly handle categorical and discrete input spaces.
Moreover, they are highly parallelizable and scalable to high-dimensional data.
Despite these modelling advantages, the deployment of tree-based models in Bayesian optimization has been limited by challenges pertaining to (i) quantifying prediction uncertainty and (ii) optimizing acquisition functions defined by their discontinuous response surfaces \citep{shahriari2016BO}.
Early works, e.g.,\ the popular SMAC algorithm \citep{hutter2011SequentialModel}, addressed (i) using empirical variance within a tree ensemble and (ii) via local and/or random search methods.
Moreover, recent works~\citep{misic2017OptimizationEnsembles,mistry2018MixedIntegerEmbedded,thebelt2021entmoot,thebelt2020global} propose mixed-integer formulations for tree ensembles, enabling optimization over their mean functions.
\textbf{Contributions.} We present a mixed-integer second-order cone optimization formulation for tree kernel Gaussian processes in Section~\ref{sec:tree_kernel_inference} and
show that that the \textit{tree agreement ratio}, i.e.,\ the hyperparameter introduced by the tree ensemble kernel, sufficiently represents the model uncertainty in Section~\ref{sec:uncertainty_metric}.
Section~\ref{sec:local_vs_global} shows that solving the mixed-integer second-order cone optimization problem considerably outperforms sampling-based strategies in Bayesian optimization. Our approach of using tree ensemble kernels as a Gaussian process prior is particularly useful for applications combining mixed-variable spaces and known input constraints.
We provide a Python implementation of the proposed algorithm and benchmark problems at: \hyperlink{https://github.com/cog-imperial/tree_kernel_gp}{github.com/cog-imperial/tree\_kernel\_gp}.
\section{Related work} \label{sec:related_work}
Bayesian optimization (BO) solves \citep{frazier2018Tutorial, shahriari2016BO, greenhill2020bayesian}:
$\mathbf{x}_f^* \in \text{arg min}_{\mathbf{x}} \; f(\mathbf{x}),$
where $f$ is an expensive-to-evaluate black-box function that can be queried at inputs $\mathbf{x} \in \mathbb{R}$ to derive the optimal solution $\mathbf{x}_f^*$.
BO iteratively updates a surrogate model of $f$ and optimizes a corresponding acquisition function that balances exploitation and exploration.
Minimizing the acquisition function produces a new query $\mathbf{x}^*$ which is evaluated and added to the set of observations.
BO has become increasingly popular in various real-world applications, such as in\ chemical engineering \citep{thebelt2022maximizing,pistikopoulos2021process}.
Gaussian processes (GPs) \citep{rasmussen2006GP} are a common choice of BO surrogate due to their flexibility, e.g.,\ domain-specific knowledge can be built into the GP prior via mean and kernel functions, and reliable uncertainty quantification to identify unexplored search areas.
Open-source tools like BoTorch \citep{balandat2020botorch} implement BO with GP surrogates and offer a wide selection of kernels mainly suited for continuous search spaces.
Prior works have developed GPs with modified kernels to integrate discrete features \citep{ru2020bayesian, garrido2020dealing, deshwal2021bayesian, hase2021gryffin, buathong2020kernels} and considered conditional feature spaces \citep{levesque2017bayesian, jenatton2017bayesian, ma2020additive, han2021high}.
Besides GPs, tree ensemble-based surrogates show excellent performance for black-box optimization with mixed-variable settings, i.e.,\ with combinations of continuous, integer and/or categorical variables, and for structured search spaces, e.g.,\ hierarchical and conditional feature spaces \citep{hutter2011SequentialModel}.
Black-box optimization tools using tree ensembles, e.g.,\ \texttt{SMAC} \citep{hutter2011SequentialModel} and Scikit-Optimize (\texttt{SKOPT}) \citep{head2018ScikitOptimize}, are useful for applications such as neural architecture search (NAS) and algorithm tuning.
\citet{shahriari2016BO} mention challenges in deploying tree ensembles for BO: (i) quantifying uncertainty for exploration purposes, and (ii) optimizing over the non-differentiable discrete acquisition function to determine the next query point.
\texttt{SMAC} identifies uncertain search space regions using empirical variables across tree predictions of the random forest and optimizes the acquisition function by combining local and random search.
\citet{bergstra2011algorithms} proposes the Tree Parzen Estimator (TPE) to handle categorical variables and conditional structures by modeling individual input dimensions with a kernel density estimator.
However, the TPE approach ignores dependencies between dimensions.
For gradient-boosted tree ensembles, \texttt{SKOPT} derives uncertainty with quantile regression to fit two models for the 16th and 84th percentiles and averages the predictions to estimate the standard deviation.
For random forests, \texttt{SKOPT} uses an uncertainty strategy similar to \texttt{SMAC}.
In general, \texttt{SKOPT} relies on random sampling to optimize the acquisition function.
\citet{misic2017OptimizationEnsembles} proposed a mixed-integer optimization formulation for
tree ensemble mean functions that has been used in several applications \citep{mistry2018MixedIntegerEmbedded, thebelt2021entmoot, thebelt2022multi}.
These formulations can be easily generated using the OMLT python package \citep{ceccon2022omlt}.
Besides improving the solution to an acquisition function, mixed-integer formulations also allow explicit consideration of input constraints to incorporate domain-knowledge.
Some software tools, e.g.,\ BoTorch, support linear equality and inequality constraints of continuous variables at the acquisition function optimization step, while tree ensemble-based algorithms do not support input constraints.
\citet{papalexopoulos2021constrained} use ReLU neural networks as surrogate models and deploy a mixed-integer linear formulation to optimize the acquisition function.
The approach relies on random initialization and stochasticity in the model training to allow for exploration.
\citet{daxberger2019mixed} handles mixed-variable search spaces by using a Bayesian linear regressor that uses an integer solver to search the discrete subspace.
The authors introduce features capturing the discrete parts of the search space by using a BOCS model \citep{baptista2018bayesian, deshwal2020scalable_lit_rev} while continuous parts are handled with random Fourier features \citep{rahimi2007random}.
Our work is most similar to \citet{papalexopoulos2021constrained} and \citet{daxberger2019mixed}, except that we naturally support categorical features. Additionally, we automatically inherit the uncertainty handling of the random forest kernel into our approach.
Genetic Algorithms (\texttt{GA}) are another class of algorithms, which deploy evolution-based selection heuristics to minimize black-box functions \citep{jin2005Evolutionary}.
While there is no feasibility guarantee for input constraints, \texttt{GA} implementations like pymoo \citep{pymoo} support constrained optimization by minimizing constraint violation.
Section~\ref{sec:numerical_studies} compares our BO approach, which uses the kernel interpretation of tree ensembles as a Gaussian process prior, to: \texttt{SMAC} and the random forest and gradient-boosted tree versions of \texttt{SKOPT}, i.e.,\ \texttt{SKOPT-RF}, and \texttt{SKOPT-GBRT}.
The \citet{daxberger2019mixed} implementation is not publicly-available and the code to run the \citet{papalexopoulos2021constrained} method is only partially-released.
Therefore, we exclude both algorithms from the numerical comparison.
We also compare against the default upper-confidence bound BO implementation of BoTorch (\texttt{UCB-MATERN}) and the default \texttt{GA} algorithm of pymoo to include black-box algorithms that partially support constrained optimization.
\section{Technical background on prior work} \label{sec:tree_kernel_inference}
\subsection{Tree ensemble kernel as a Gaussian process prior} \label{sec:tree_ensemble_kernel}
Exploring the search space requires quantifying the uncertainty of the underlying surrogate model.
We use the kernel interpretation of tree ensembles based on random partitions \cite{davies2014random, zafari2019evaluating}. The tree kernel captures correlation between two input data points $(\mathbf{x},\mathbf{x'}) \in \mathbb{R}^n$:
\begin{equation}
\label{eq:tree_kernel}
k_{\text{Tree}}(\mathbf{x}, \mathbf{x'}) =
\sigma_0^2 \; |\mathcal{T}|^{-1} \;
\mathbf{z}(\mathbf{x})^\intercal \mathbf{z}(\mathbf{x'})
\end{equation}
To derive the tree kernel, we first train a gradient boosted tree ensemble $\mathcal{T}$ on data set $\mathbf{X} \in \mathbb{R}^{m \times n}$ with $n$ denoting the dimensionality of the search space and $m$ the size of the data set.
Every tree $t$ in the tree ensemble $\mathcal{T}$ maps inputs $\mathbf{x}\in \mathbb{R}^n$ onto a leaf $l$ by sequentially evaluating splitting conditions.
Each leaf $l$ defines a subspace $\mathcal{X}_l \in \mathbb{R}^n$ restricted by active splits $s \in \mathbf{splits}(t)$.
Two inputs $(\mathbf{x},\mathbf{x'})$ are fully correlated in tree $t$ if both end up in the leaf subspace $\mathcal{X}_{t,l}$ and uncorrelated otherwise.
The Eq.~\eqref{eq:tree_kernel} vector $\mathbf{z}(\mathbf{x})$ consists of binary elements $z_{t,l}$ indicating if leaf $l \in \mathcal{L}_t$ is active for input $\mathbf{x}$, with $\mathcal{L}_t$ denoting the set of all leaves in tree $t$.
The inner product $\mathbf{z}(\mathbf{x})^\intercal \mathbf{z}(\mathbf{x'})$, normalized by the total number of trees $|\mathcal{T}|$, gives the ratio of trees in the ensemble for which $\mathbf{x}$ and $\mathbf{x'}$ fall into the same leaf.
We modify the kernel by adding a trainable signal variance $\sigma_0^2$ \citep{lee2015face}.
\citet{davies2014random} prove that the tree kernel is a suitable GP prior.
The resulting (non-stationary and supervised) tree kernel describes a prior over piece-wise constant functions when used in a GP.
\subsection{Posterior distribution} \label{sec:posterior_distribution}
We approximate $f$ as a Gaussian process with zero mean and kernel $k_\text{Tree}$:
$
f(\mathbf{x}) \sim \mathcal{GP}(0, k_{\text{Tree}})
$.
Since $k_\text{Tree}$ is a valid Mercer kernel, the mean $M(\mathbf{x})$ and variance $V(\mathbf{x})$ of the GP at
$\mathbf{x} \in \mathbb{R}^n$ are \cite{rasmussen2006GP}:
\begin{subequations}
\label{eq:gp_infer}
\begin{align}
M(\mathbf{x}) &= K_{\mathbf{x},\mathbf{X}} \; (K_{\mathbf{X},
\mathbf{X}})^{-1} \; \mathbf{y}, \label{eq:a_mean} \\
V(\mathbf{x}) &= K_{\mathbf{x},\mathbf{x}} - K_{\mathbf{x},\mathbf{X}} \;
(K_{\mathbf{X},\mathbf{X}})^{-1} \; K_{\mathbf{x},
\mathbf{X}}^{\intercal} \label{eq:b_var}
\end{align}
\end{subequations}
The Gram matrix $K_{\mathbf{X},\mathbf{X}} \in \mathbb{R}^{m \times m}$
has entries describing pairwise correlations computed
based on the kernel function in Eq.~\eqref{eq:tree_kernel} .
The entries of vector $K_{\mathbf{x},\mathbf{X}} \in \mathbb{R}^{m}$ contain correlations
between the input $\mathbf{x}$ and sampled data points, defined as
$\left[ k_\text{Tree}(\mathbf{x}, \mathbf{x}_1), k_\text{Tree}(\mathbf{x}, \mathbf{x}_2),
\dotsc, k_\text{Tree}(\mathbf{x}, \mathbf{x}_m)\right]$ with vectors $\mathbf{x}_i$
referring to rows in data set $\mathbf{X}$.
Target values $\mathbf{y} \in \mathbb{R}^m$ are the corresponding observations for $\mathbf{X}$.
Eq.~\eqref{eq:gp_infer} describes the noise-free case of the GP mean and variance.
To fit a GP based on the tree kernel function, we usually require a noise term, i.e.,\ a diagonal
matrix $\sigma_y^2 I$ that is added to $K_{\mathbf{X},\mathbf{X}}$.
We set hyperparameters $\sigma_y^2$ and $\sigma_0^2$ by maximizing the log marginal likelihood.
\citet{lee2015face} compute the Eq.~\eqref{eq:a_mean} inverse of the Gram matrix $K_{\mathbf{X},\mathbf{X}}$ efficiently by exploiting the property that the rank of $K_{\mathbf{X},\mathbf{X}}$ is at most the number of leaves over trees.
\begin{figure}
\centering
\subfigure[$M(\mathbf{x})$]{\label{fig:treed_gp_branin_mean}
\includegraphics[width=0.323\linewidth]{figures/mean_branin.pdf}}
\subfigure[$V(\mathbf{x})$]{\label{fig:treed_gp_branin_var}
\includegraphics[width=0.323\linewidth]{figures/var_branin.pdf}}
\subfigure[$LCB(\mathbf{x})$]{\label{fig:treed_gp_branin_acq}
\includegraphics[width=0.323\linewidth]{figures/acq_branin.pdf}}
\caption{Tree kernel GP trained on 200 random points of the Branin function for the intervals
$\mathbf{x} \in (\left[ -5.0, 10.0 \right], \left[ 0.0, 15.0 \right])^{\intercal}$.
Function values increase with the colour brightness, and contour lines of the Branin function are shown in white.}
\label{fig:treed_gp_branin}
\end{figure}
Fig.~\ref{fig:treed_gp_branin} visualizes the Eq.~\eqref{eq:gp_infer} $M(\mathbf{x})$,
$V(\mathbf{x})$ and the lower-confidence bound (LCB) \citep{cox1992statistical} response surface.
Fig.~\ref{fig:treed_gp_branin_mean} shows that the tree kernel-based GP mean gives a good piecewise-constant approximation of the Branin function.
Fig.~\ref{fig:treed_gp_branin_var} shows that variance peaks reveal areas where data are
sparse, reliably identifying uncertainty in the
underlying surrogate model.
Finally, Fig.~\ref{fig:treed_gp_branin_acq} shows how an acquisition function such as the LCB can effectively manage the exploitation-exploration trade-off.
\subsection{Global optimization of tree ensembles}
\citet{misic2017OptimizationEnsembles} proposes a mixed-integer linear optimization formulation that ensures that binary variables $z_{t,l}$ follow the logic of the tree ensemble:
\begin{subequations}
\label{eq:tree_constr}
\begin{flalign}
\sum\limits_{l\in{\mathcal{L}_{t}}} z_{t,l} &= 1,
&\forall t\in \mathcal{T},
&\label{eq:tree_a}\\
\sum\limits_{l\in\mathbf{left}(s)}\; z_{t,l} &\leq
\sum\limits_{j \in \mathbf{C}(s)} \nu_{\text{V}(s),j},
&\forall t \in \mathcal{T}, \forall s \in \mathbf{splits}(t),
&\label{eq:tree_b}\\
\sum\limits_{l\in\mathbf{right}(s)} z_{t,l} &\leq
1 - \sum\limits_{j \in \mathbf{C}(s)} \nu_{\text{V}(s),j},
&\forall t \in \mathcal{T}, \forall s \in \mathbf{splits}(t),
&\label{eq:tree_c} \\
\sum\limits_{j=1}^{K_i} \nu_{i,j} &= 1,
&\forall i \in \mathcal{C}, \label{eq:tree_d} \\
\nu_{i,j} &\leq \nu_{i,j+1},
&\forall i \in \mathcal{N}, \forall j \in \left [ K_i - 1 \right ],
&\label{eq:tree_e} \\
\nu_{i,j} &\in \{ 0,1 \},
&\forall i \in \left [ n \right ], \forall j \in \left [ K_i \right ],
&\label{eq:tree_f} \\
z_{t,l} &\geq 0,
&\forall t\in{\mathcal{T}}, \forall l\in{\mathcal{L}_{t}}
&\label{eq:tree_g}
\end{flalign}
\end{subequations}
Eq.~\eqref{eq:tree_a} guarantees exactly one active leaf $l$ in leaf set $\mathcal{L}_t$ for tree $t$.
Eqs.~\eqref{eq:tree_b}--\eqref{eq:tree_c} ensure that binary variables $z_{t,l}$ are only active if all previous splits $\nu_{\text{V}(s),j}$ are active.
At any node in a given tree, $\mathbf{left}(s)$ and $\mathbf{right}(s)$ contain all leaves following the left and right branches, respectively.
The mapping $\text{V}(s)$ gives the splitting feature at node $s \in \mathbf{splits}(t)$ in tree $t$.
Tree ensembles can handle continuous, integer and categorical data.
Continuous splits $s$ are defined by $x_{\text{V}(s)} \leq v_{\text{V}(s),j}$ conditions, where $v_{\text{V}(s),j}$ is the learned splitting threshold.
Therefore, $\mathbf{C}(s)$ only contains a single index $j$ representing the threshold $v_{\text{V}(s),j}$.
Categorical splits $s$ are characterized by (subsets of) categories available for feature $\text{V}(s)$ and define a splitting condition based on the inclusion of $x_{\text{V}(s)}$ in the category subset at split $s$.
For categorical splits, $\mathbf{C}(s)$ includes the category indices comprising the category subset at split $s$.
Eq.~\eqref{eq:tree_d} ensures that only one category is active per categorical variable $i \in \mathcal{C}$.
Continuous splitting thresholds of all trees in the ensemble are ordered according to $v_{i,1} < v_{i,2} < ... < v_{i,K_i}$ with $K_i$ denoting the index for the last split of continuous feature $i \in \mathcal{N}$.
To enforce this order, Eq.~\eqref{eq:tree_e} ensures that binary variables $\nu_{i,j}$, corresponding to the split thresholds $v_{i,j}$, are activated sequentially.
The model comprising Eq.~\eqref{eq:tree_constr} has no direct dependency on $\mathbf{x}$ and is fully specified by binary variables indicating the active splits and leaves of the tree model.
However, to allow users to include equality and inequality constraints on the input vector $\mathbf{x}$, we bound the continuous variables based on the active splits by adding linking constraints \citep{mistry2018MixedIntegerEmbedded}:
\begin{subequations}
\label{eq:linking_constr}
\begin{flalign}
x_{i} &\geq v^L_{i} + \sum\limits_{j=1}^{K_{i}} \left (v_{i,j} - v_{i,j-1} \right )
\left ( 1 - \nu_{i,j} \right ), & &\forall i \in \mathcal{N},\\
x_{i} &\leq v^U_{i} + \sum\limits_{j=1}^{K_{i}} \left (v_{i,j} - v_{i,j+1} \right )
\nu_{i,j}, & &\forall i \in \mathcal{N},\\
x_{i} &\in \left [ v_{i}^{L},v_{i}^{U} \right ], & &\forall i \in \mathcal{N},\\
x_{i} &= \{j \in \left[K_i\right] \; | \; \nu_{i,j} = 1\},
& &\forall i \in \mathcal{C} \label{eq:cat_map}
\end{flalign}
\end{subequations}
For categorical variables, Eq.~\eqref{eq:cat_map} maps the indices of active categories onto $x_i$ for $i \in \mathcal{C}$. These optimization formulations are implemented in open-source software ENTMOOT \cite{thebelt2021entmoot} and OMLT \cite{ceccon2022omlt}.
\section{Tree ensemble kernels for Bayesian optimization} \label{sec:constrained_bayesian_optimization}
The formulation details in Section \ref{sec:tree_kernel_inference} are insufficient to use the tree ensemble kernel in a Bayesian optimization framework.
While Eqs.~\eqref{eq:tree_constr} and \eqref{eq:linking_constr} allow optimization over the mean of an associated
acquisition function \cite{misic2017OptimizationEnsembles}, Bayesian optimization also requires quantifying model uncertainty for exploration.
This section proposes a mixed-integer second-order cone optimization formulation to capture the standard deviation of a GP with a tree kernel prior. Combining this optimization formulation with the already-developed mixed-integer formulation of the mean function, we derive the lower confidence bound (LCB) of the tree kernel-based GP. The advantage of deriving a mixed-integer second-order cone optimization formulation of the LCB acquisition function is that we can globally optimize the acquisition function. Additionally, we can easily incorporate explicit input constraints that capture domain knowledge and/or known search space relationships.
Our optimization problem, which includes the LCB acquisition function, is:
\allowdisplaybreaks{
\begin{subequations}
\begin{align}
\label{eq:acq_func}
\mathbf{x}_\text{lb}^*, \mathbf{x}_\text{ub}^*, \mathbf{x}_\text{cat}^* \in
&\underset{\mathbf{x}, \mathbf{z}, \mathbf{\nu}} {\text{arg min}} \;
\mu(\mathbf{x}) - \kappa \sigma(\mathbf{x}), \\
\text{s.t.} \; &h(\mathbf{x}) = 0, \\
&g(\mathbf{x}) \leq 0,
\end{align}
\end{subequations}}
with $\mu(\mathbf{x})$ and $\sigma(\mathbf{x})$ denoting the surrogate model's mean prediction and
standard deviation, respectively.
Functions $h(\mathbf{x})$ and $g(\mathbf{x})$ are known constraints and handled similarly to \cite{Boukouvala2014,Tran2019}. In our implementation, the constraints can be linear, quadratic, or polynomial.
Hyperparameter $\kappa$ controls the exploitation-exploration trade-off to determine the next black-box function query area.
The solution to Eq.~\eqref{eq:acq_func} is defined by $\mathbf{x}_\text{lb}^*$ and $\mathbf{x}_\text{ub}^*$ for
non-categorical variables $i \in \mathcal{N}$, i.e.,\ continuous and integer features, and $\mathbf{x}_\text{cat}^*$, a set of valid category subsets for categorical variables $i \in \mathcal{C}$.
Two vectors ($\mathbf{x}_\text{lb}^*$ and $\mathbf{x}_\text{ub}^*$) define the non-categorical variables because the trees are piecewise-constant over intervals; the vectors define the lower and upper bounds of these intervals.
Next, we formalize the mean and variance of the tree kernel-based GP. Eqs.~\eqref{eq:kernel_constr} and
\eqref{eq:gp_infer} are equivalent.
\begin{subequations}
\label{eq:kernel_constr}
\begin{align}
\mu(\mathbf{x}) = M(\mathbf{x}) &= K_{\mathbf{x},\mathbf{X}} \; (K_{\mathbf{X},
\mathbf{X}})^{-1} \; \mathbf{y}, & \label{eq:kernel_a} \\
\sigma^2 =
V(\mathbf{x}) &= K_{\mathbf{x},\mathbf{x}} - K_{\mathbf{x},\mathbf{X}} \;
(K_{\mathbf{X},\mathbf{X}})^{-1} \; K_{\mathbf{x},
\mathbf{X}}^{\intercal} &
&\label{eq:kernel_c}
\end{align}
\end{subequations}
The Gram matrix $K_{\mathbf{X},\mathbf{X}}$ and target vector $\mathbf{y}$ are constants in the optimization model as these quantities only depend on the data set $\mathbf{X}$.
The value $K_{\mathbf{x},\mathbf{x}}$ is directly related to signal variance hyperparameter $\sigma_0$ since there is full leaf overlap for two identical inputs:
%
\begin{equation}
K_{\mathbf{x},\mathbf{x}} = \sigma_0^2 \label{eq:kernel_d}
\end{equation}
%
The vector $K_{\mathbf{x},\mathbf{X}}$ describes the kernel output of $\mathbf{x}$ with individual data points $\mathbf{x}_i$.
We pre-compute a constant matrix $A \in \mathbb{R}^{m \times |\mathcal{L}|}$ after the gradient-boosted tree is trained but before solving the acquisition function. The entries of $A$ are equal to $1$ for all active leaves $l$ of data point $i$ and $0$ otherwise.
Given matrix $A$, Eq.~\eqref{eq:kernel_f} captures the kernel output by summing over binary variables $z_{t,l}$ that are active for data point $i$.
\begin{subequations}
\label{eq:kernel_constr_2}
\begin{align}
K_{\mathbf{x},\mathbf{X}} &= \left[ k_\text{Tree}(\mathbf{x}, \mathbf{x}_1),
k_\text{Tree}(\mathbf{x}, \mathbf{x}_2), \dotsc, k_\text{Tree}(\mathbf{x},
\mathbf{x}_m)\right], &
&\label{eq:kernel_e} \\
k_\text{Tree}(\mathbf{x}, \mathbf{x}_i) &= \sigma_0^2 \; |\mathcal{T}|^{-1}
\sum\limits_{t\in{\mathcal{T}}}\sum\limits_{l\in \mathcal{L}_t} A_{i,l} z_{t,l},
& \forall i \in \left[m\right]
&\label{eq:kernel_f}
\end{align}
\end{subequations}
Note that the largest possible value for each $k_\text{Tree}(\mathbf{x}, \mathbf{x}_i)$ is $\sigma_0^2$ (if the corresponding entries of matrix $A$ are all equal to 1 and there is full leaf overlap) and the smallest possible value for each $k_\text{Tree}(\mathbf{x}, \mathbf{x}_i)$ is 0 (if there is no leaf overlap). In general, values of each element of vector $K_{\mathbf{x},\mathbf{X}}$ will range between 0 and $\sigma_0^2$: higher values in the elements of $K_{\mathbf{x},\mathbf{X}}$ indicate a higher degree of overlap between the next query location $\mathbf{x}$ and data point $\mathbf{x}_i$ in the set $\mathbf{X}$.
Without considering additional tree model constraints $h$ and $g$, the resulting acquisition function is a mixed-integer quadratic optimization problem. The optimization problem is \emph{mixed-integer} because of binary variables $\boldsymbol{\nu}$ and \emph{quadratic}
because of Eq.~\eqref{eq:kernel_c}. The quadratic Eq.~\eqref{eq:kernel_c} components are $\sigma^2$ and the terms $k_\text{Tree}^2(\mathbf{x}, \mathbf{x}_i)$ arising from the inner product of $K_{\mathbf{x},\mathbf{X}}$ with itself.
We only require one direction of the Eq.~\eqref{eq:kernel_c} equality ($\leq$) and re-write Eq.~\eqref{eq:kernel_c} as a second-order cone constraint. Solver Gurobi~9 \citep{gurobi9} automatically finds that Eq.~\eqref{eq:kernel_c} (with $\leq$ rather than $=$) can be represented as a second-order cone and makes the appropriate algorithm modifications, as described by \cite{hijazi2014outer,vielma2017extended}.
The acquisition function, with Objective \eqref{eq:acq_func} and Constraints
\eqref{eq:tree_a}--\eqref{eq:kernel_f}, is a mixed-integer second-order cone program which can be solved with off-the-shelf optimization solvers.
A valid solution to the proposed model is a set of active leaves $\mathcal{L}^*$ and the intersection of all leaf subspaces $\left[ \mathbf{x}_\text{lb}^*, \mathbf{x}_\text{ub}^* \right], \mathbf{x}_\text{cat}^*$.
To derive the next black-box function query point $\mathbf{x}^*$, we propose some heuristics.
The acquisition function value is constant for $\boldsymbol{x} \in \left[ \mathbf{x}_\text{lb}^*, \mathbf{x}_\text{ub}^* \right], \mathbf{x}_\text{cat}^*$, i.e.,\ all contained points are equivalent from the perspective of the tree kernel-GP.
For the continuous and integer features, we observe that tree models tend to learn split thresholds close to training data points. We propose the center of $\left[ \mathbf{x}_\text{lb}^*, \mathbf{x}_\text{ub}^* \right]$ as the next query point $\mathbf{x}^*$ for continuous and integer features:
\begin{equation}
\label{eq:leaf_center_unconstr}
x_{\text{mid},i}^* = \frac{1}{2} \left( x_{lb,i}^* + x_{ub,i}^* \right), \forall i \in \mathcal{N}
\end{equation}
For integer features with a fractional mid-point between the upper and lower bound, we randomly select its floor or ceiling. For categorical features, we sample from the subset of available categories:
\begin{equation}
\label{eq:leaf_center_unconstr_rnd}
x_{\text{mid},i}^* = \mathrm{uniform}(\mathbf{x}_\text{cat}^*), \forall i \in \mathcal{C}
\end{equation}
For the unconstrained case, we use $x_{\text{mid},i}^*$ as the next query point $\mathbf{x}^*$.
When additional input constraints $h(\mathbf{x})$ and/or $g(\mathbf{x})$ are given, we know that at least one point in $\left[ \mathbf{x}_\text{lb}^*, \mathbf{x}_\text{ub}^* \right], \mathbf{x}_\text{cat}^*$ is feasible even if the heuristic $x_{\text{mid},i}^*$ is infeasible.
To repair the solution, we project $x_{\text{mid},i}^*$ onto the feasible space as follows:
\begin{subequations}
\label{eq:feas_center}
\begin{align}
\mathbf{x}^* \in &\underset{\mathbf{x} \in \left[ \mathbf{x}_\text{lb}^*, \mathbf{x}_\text{ub}^* \right], \mathbf{x}_\text{cat}^*}{\text{arg min}} \;
\sum\limits_{i \in \mathcal{N}} \left( x_{\text{mid},i}^* - x_i \right)^2 -
\sum\limits_{i \in \mathcal{C}} \sum\limits_{j \in x_{\text{mid},i}^*} \nu_{i,j}, & &\\
\text{s.t.} \; &h(\mathbf{x}) = 0, & &\\
&g(\mathbf{x}) \leq 0 & &
\end{align}
\end{subequations}
Eq.~\eqref{eq:feas_center} projects $x_{\text{mid},i}^*$ onto the feasible set defined by $h(\mathbf{x})$ and $g(\mathbf{x})$.
The time complexity of solving Eq.~\eqref{eq:feas_center}, and that of solving Eqs
.~\eqref{eq:tree_constr}--\eqref{eq:kernel_constr} for the search space $\left[ \mathbf{x}_\text{lb}^*, \mathbf{x}_\text{ub}^* \right], \mathbf{x}_\text{cat}^*$, are both NP-hard.
However, we found that Gurobi~9 often solves both problems to $\epsilon$-global optimality for moderately-sized tree models in less time compared to random sampling.
\textbf{Hyperparameters.}
We train the kernel hyperparameters (signal variance $\sigma_0^2$ and noise $\sigma_y^2$) by maximizing the log marginal likelihood.
Additional hyperparameters are introduced by the gradient-boosted tree ensemble, i.e.,\ maximum tree depth and number of trees, and through $\kappa$ in the LCB.
For the Section~\ref{sec:numerical_studies} numerical studies, we fix $\kappa$ and the gradient-boosting hyperparameters and only increase maximum tree depth and number of trees for the high-dimensional VAE-NAS benchmark to capture more complicated interactions.
The appendix reports specific values for all hyperparameters.
\textbf{Limitations.}
The method suffers from standard BO challenges where the tree kernel may not be a good prior for the underlying black-box function, e.g.,\ purely continuous feature spaces.
More limitations arise from solving an NP-hard problem to global optimality when working with large data sets in high-dimensional search spaces.
For cases where solving the NP-hard problem is too difficult but BO is still applicable, Gurobi~9 can typically develop good feasible solutions as a heuristic.
\section{Numerical studies} \label{sec:numerical_studies}
This section empirically evaluates the performance of tree kernel-based GPs using a wide variety of synthetic and real-world benchmark problems.
We show (i) the ability of tree kernels to capture uncertainty of the underlying tree ensemble, (ii) the advantage of using global vs. local strategies for optimizing the acquisition function, and (iii) the proposed algorithm's superior performance in cases with constrained search spaces and mixed variable types.
\texttt{LEAF-GP} denotes the Section~\ref{sec:constrained_bayesian_optimization} proposed algorithm, and Section~\ref{sec:related_work} outlines the baseline of methods we compare against.
For each run, we visualize the median and confidence intervals representing the first and third quartiles based on 20 individual runs with varying random seeds.
Further technical details can be found in the appendix.
\subsection{Uncertainty metric} \label{sec:uncertainty_metric}
\begin{figure}[ht]
\centering
\subfigure[Relative Model Error]{\label{fig:unc_rastrigin_err}
\includegraphics[height=4.4cm]{figures/unc_rastrigin_err.pdf}}
\subfigure[Prediction Mean]{\label{fig:unc_rastrigin_mean}
\includegraphics[height=4.4cm]{figures/unc_rastrigin_mean.pdf}}
\caption{The relative prediction error (Eq.~\ref{eq:model_error}) and model prediction mean for various values of the maximum tree agreement ratio $R$ for benchmark problem Rastrigin (10D). Plot shows the median line and confidence intervals (first and third quartiles) from 20 random seeds. Section~\ref{sec:uncertainty_metric} provides more details.}
\label{fig:unc_rastrigin}
\end{figure}
The tree kernel-based GP uses the leaf overlap measure to quantify correlation between two inputs.
In BO, such measures help identify unexplored areas, where correlation to existing training data is low and we may expect inaccurate model predictions.
To empirically test the tree kernel's capability of identifying uncertainty in the underlying tree ensemble, we employ the optimization formulation:
\begin{subequations}
\label{eq:unc_study}
\begin{flalign}
\mathbf{x}_\text{lb}^*, \mathbf{x}_\text{ub}^*, \mathbf{x}_\text{cat}^* \in
&\underset{\mathbf{x}, \mathbf{z}, \mathbf{\nu}} {\text{arg min}} \;
\mu(\mathbf{x}), \label{eq:unc_study_a} \\
\text{s.t.} \; &\text{Eq.~\eqref{eq:tree_constr},
Eq.~\eqref{eq:linking_constr},
Eq.~\eqref{eq:kernel_constr},
Eq.~\eqref{eq:kernel_d}, Eq.~\eqref{eq:kernel_constr_2}}, \\
&{|\mathcal{T}|}^{-1} \sum\limits_{t\in{\mathcal{T}}}\sum\limits_{l\in \mathcal{L}_t} A_{i,l} z_{t,l}
\leq R, \; \forall i \in \left[m\right] \label{eq:unc_study_c}
\end{flalign}
\end{subequations}
Eq.~\eqref{eq:unc_study_a} minimizes over the mean prediction of the tree kernel-based GP with Eq.~\eqref{eq:unc_study_c} restricting the ratio of tree agreement for the black-box query point $\mathbf{x}^*$ defined as the center of the optimal area $\mathbf{x}_\text{lb}^*, \mathbf{x}_\text{ub}^*, \mathbf{x}_\text{cat}^*$, as in Eq.~\eqref{eq:leaf_center_unconstr}.
A solution to problem Eq.~\eqref{eq:unc_study} guarantees a maximum leaf overlap of $R$ between $\mathbf{x}^*$ and all available data points $\mathbf{X}$.
Here, we evaluate values of $R \in \left[ 0.35, 1.0\right]$ with increments of $0.05$ and compute the model error according to:
\begin{equation}
\label{eq:model_error}
\epsilon_\text{error} = \left| \frac{\mu(\mathbf{x}^*) - f_\text{true}(\mathbf{x}^*)}{\mu(\mathbf{x}^*)} \right|
\end{equation}
Fig.~\ref{fig:unc_rastrigin} shows results for the Rastrigin \citep{simulationlib} benchmark function.
For smaller values of $R$, the Eq.~\eqref{eq:unc_study} optimization problem becomes more restrictive, leading to larger objective values for solution $\mathbf{x}^*$.
Fig.~\ref{fig:unc_rastrigin_err} shows that a growing leaf overlap, i.e.,\ larger $R$, reduces the model error as defined in Eq.~\eqref{eq:model_error}.
This suggests that the kernel works as intended and that low kernel correlation can reveal search space areas with high model uncertainty.
The appendix provides results for additional benchmarks.
\subsection{Local vs. global acquisition function optimization} \label{sec:local_vs_global}
\begin{figure}[ht]
\centering
\subfigure[Hartmann (6D)]{\label{fig:hartmann6d}
\includegraphics[height=5.1cm]{figures/hartmann6d.pdf}}
\subfigure[Styblinski-Tang (10D)]{\label{fig:styblinski_tang}
\includegraphics[height=5.1cm]{figures/styblinski_tang.pdf}}
\caption{Black-box optimization progress of \texttt{LEAF-GP} vs.\ baseline. Plot shows the median line and confidence intervals (first and third quartiles) from 20 random seeds. Section~\ref{sec:local_vs_global} provides more details}
\label{fig:basic_test}
\end{figure}
This section (i) compares \texttt{LEAF-GP} to other state-of-the-art algorithms for common benchmarks and (ii) shows the advantage of global vs.\ local strategies for optimizing the acquisition function.
We introduce a variation of the proposed algorithm, \texttt{LEAF-GP-RND}, which optimizes the same acquisition function using random sampling (compared to optimization or our proposed formulation using Gurobi 9 in \texttt{LEAF-GP}).
Fig.~\ref{fig:basic_test} shows results for Hartmann (6D) \citep{simulationlib} and Styblinski-Tang (10D) \citep{simulationlib}.
We do not expect tree model-based approaches to perform particularly well since both benchmark functions are continuous.
However, the benchmarks show that all approaches perform similarly for Hartmann (6D), with \texttt{UCB-MATERN} improving the black-box objective at the highest rate.
For Styblinski-Tang (10D), \texttt{LEAF-GP} significantly outperforms other algorithms. Although \texttt{LEAF-GP} is not specialized to this setting, we observe that it performs roughly on-par with the state-of-the-art on these continuous, unconstrained optimization problems.
While sampling-based \texttt{LEAF-GP-RND} and optimization-based \texttt{LEAF-GP} perform similarly on the smaller Hartmann (6D), \texttt{LEAF-GP} is particularly strong on the higher-dimensional Styblinski-Tang (10D) benchmark function, and two additional benchmarks provided in the appendix.
Moreover, \texttt{LEAF-GP-RND} does not support explicit input constraints and in fact performs poorly for BO with known constraints.
For the following constrained benchmarks, we remove \texttt{LEAF-GP-RND} from the comparison.
The appendix contains additional details and results.
\subsection{Constrained spaces} \label{sec:constr_space}
\begin{figure}[ht]
\centering
\subfigure[G1 (13D, 9IC)]{\label{fig:g1}
\includegraphics[height=5.1cm]{figures/g1.pdf}}
\subfigure[G3 (5D, 1EC)]{\label{fig:g3}
\includegraphics[height=5.1cm]{figures/g3.pdf}}
\subfigure[G4 (5D, 6IC)]{\label{fig:g4}
\includegraphics[height=5.1cm]{figures/g4.pdf}}
\subfigure[Alkylation (7D, 14IC)]{\label{fig:alkylation}
\includegraphics[height=5.1cm]{figures/alkylation.pdf}}
\caption{Feasible black-box optimization progress of \texttt{LEAF-GP} vs.\ baseline. Plot shows the median line and confidence intervals (first and third quartiles) from 20 random seeds. Confidence intervals are neglected for methods that cannot improve the initial training data.
Figure subtitles give the function name and number of: dimensions (D), equality constraints (EC), and inequality constraints (IC).
Section~\ref{sec:constr_space} provides more details.}
\label{fig:constr_test}
\end{figure}
This section presents numerical benchmarks with known input constraints.
The acquisition function optimization strategy of \texttt{LEAF-GP} allows explicit consideration of input constraints, i.e.,\ logical and convex/non-convex $n$-th degree polynomial equality and inequality constraints for mixed variable spaces.
The \texttt{UCB-MATERN} implementation of BoTorch supports only linear equality and inequality constraints during acquisition function optimization.
The \texttt{GA} pymoo algorithm has an interface for callable constraint functions to be considered when creating new generations of candidate points.
When a method does not support the specific input constraints, we instead penalize the objective:
\begin{equation}
\label{eq:penalty}
f_\text{penalty} = \lambda \left( \text{max}(g(\mathbf{x}), 0)^2 + h(\mathbf{x})^2 \right),
\end{equation}
where $g(\mathbf{x}) \leq 0$ and $h(\mathbf{x}) = 0$ are inequality and equality constraints, respectively.
This penalty strategy allows methods that do not support explicit constraints to still produce feasible points given enough iterations.
Eq.~\eqref{eq:penalty} introduces the hyperparameter $\lambda$ which weights the penalty; we test values $\lambda \in \{1, 10, 100 \}$ and only plot the best run for all methods that rely on constraint penalization.
To initialize every method with feasible points, we draw random samples from a uniform distribution within the bounds that define the search space and, for infeasible samples, we compute the closest feasible point using a projection strategy as in Eq.~\eqref{eq:feas_center}.
For constrained benchmarks, we introduce \texttt{FEAS-RANDOM}, which simply projects random samples onto the set of feasible points that satisfy $h(\mathbf{x})$ and $g(\mathbf{x})$.
Fig.\ \ref{fig:constr_test} shows feasible solutions to four different continuous benchmark problems, G1, G3, G4 \citep{constr_simulationlib}, and Alkylation \citep{sauer1964computer}.
The G1 benchmark has linear inequality constraints only, which are supported by \texttt{UCB-MATERN} and \texttt{LEAF-GP}.
Fig.~\ref{fig:g1} shows \texttt{LEAF-GP} making quick progress at the beginning with \texttt{UCB-MATERN} catching up with more iterations.
G3 and G4 have different combinations of nonlinear constraints, and \texttt{LEAF-GP} significantly outperforms competing methods and random feasible sampling.
The Alkylation benchmark determines optimal operating conditions for a simplified alkylation process and includes complicated nonlinear constraints representing economic, physical and performance limits.
Again, \texttt{LEAF-GP} outperforms other methods, which often struggle to find feasible solutions.
More details regarding the presented benchmark problems are given in the appendix.
\subsection{Mixed-variable spaces} \label{sec:mixed_vars}
\begin{figure}[ht]
\centering
\subfigure[Pressure Vessel (4D, 3IC)]{\label{fig:pressure_vessel}
\includegraphics[height=5.1cm]{figures/pressure_vessel.pdf}}
\subfigure[VAE-NAS (32D)]{\label{fig:vae_small}
\includegraphics[height=5.1cm]{figures/vae_small.pdf}}
\caption{Feasible black-box optimization comparing \texttt{LEAF-GP} vs.\ baseline. Plot shows median line and confidence intervals (first and third quartiles) from 20 random seeds.
Figure subtitles give the number of dimensions (D) and inequality constraints (IC).
Section~\ref{sec:mixed_vars} provides details.}
\label{fig:mixed_var_test}
\end{figure}
We now consider search spaces that comprise mixtures of continuous, integer, and categorical variables for constrained problems.
Tree model-based algorithms naturally support categorical variables by replacing continuous splits with categorical splits.
For all methods that do not support categorical features, we use one-hot encoding.
The category with the highest corresponding auxiliary variable value is chosen for the subsequent query point.
On the Pressure Vessel (4D) \citep{coello2002constraint} benchmark, which comprises two continuous features, two integer features, and three inequality constraints,
Fig.~\ref{fig:pressure_vessel} shows that \texttt{LEAF-GP} outperforms other black-box optimization methods.
The VAE-NAS (32D) is a high-dimensional benchmark problem adapted from \citet{daxberger2019mixed} with 1 continuous, 20 integer, and 11 categorical variables. It describes properties of different layers and training hyperparameters for a variational autoencoder (VAE) \citep{kingma2013auto} trained on MNIST \citep{deng2012mnist}.
The problem's search space is hierarchical, as different layers, i.e.,\ convolutional, deconvolutional, and fully-connected layers, can be activated.
Properties describing a layer are only relevant if the layer is active.
For this problem, we introduce two types of constraints to guide \texttt{LEAF-GP}: (i) constraints that allow for feasible network designs and (ii) constraints that ensure that hierarchies are respected.
Towards the former, we include constraints to ensure the output size of each convolutional layer is a positive integer.
For deconvolutional layers we need additional constraints to ensure that the VAE output maps back to original image size of $1 \times 28 \times 28$.
In addition to padding, stride, and filter size in convolutional and deconvolutional layers, we include the number of different layer types as a hyperparameter.
Section~\ref{app:vae_nas} gives a comprehensive summary of the benchmark problem and relevant constraints used to guarantee architecture feasibility.
In general, tree models are particularly good at capturing hierarchical search space structures.
To enforce hierarchical relationships during the acquisition function optimization step, we introduce indicator constraints that force layer properties to take predefined default values if the layer is inactive.
This ensures that the optimizer avoids leaves that infer splitting conditions from feature properties of inactive layers, thus effectively reducing the search space size.
We define the black box objective as the test data loss, i.e.,\ average reconstruction loss and KL divergence for test data points, after training each VAE for 32 epochs.
For infeasible neural architectures, we return the maximum final loss observed.
Fig.~\ref{fig:vae_small} summarizes the results of this study and shows that tree model-based algorithms generally outperform \texttt{UCB-MATERN}.
While \texttt{SMAC} does not fully support the above constraints to guarantee feasible architectures, the method allows for conditional input relationships that still capture the hierarchical structure of the underlying search space.
This explains \texttt{SMAC}'s excellent performance compared to other algorithms and \texttt{FEAS-RND}.
Utilizing both architecture and hierarchical search space constraints, \texttt{LEAF-GP} finds the best VAE design with the lowest test loss.
Further details about this benchmark are given in the appendix.
\pagebreak
\section{Conclusion}
We present a framework for black-box optimization based on tree kernel Gaussian processes that simultaneously allows (i) reliable uncertainty quantification of mixed feature spaces and (ii) incorporation of explicit input constraints. Although these two needs have been considered separately, we are able to address both simultaneously through a mixed-integer second-order cone formulation of the acquisition function.
The numerical studies show that the proposed strategy performs competitively with state-of-the-art algorithms for unconstrained problems and significantly outperforms existing methods for constrained benchmarks, especially those with mixed feature spaces.
We use optimization constraints together with the acquisition functions to incorporate domain knowledge and leverage hierarchical search space structures, e.g.,\ for neural architecture search.
\section{Acknowledgements}
This work was supported by BASF SE, Ludwigshafen am Rhein, EPSRC Research Fellowships to R.M. (EP/P016871/1) and CT (EP/T001577/1), and an Imperial College Research Fellowship to CT.
\clearpage
|
\section{Introduction}\label{sec:intro}
This article concerns the computation of stochastic arbitrage opportunities with market index options. To set the scene, consider a simple one-period model in which there is a single risky underlying asset, to be thought of as a market index, and a collection of options (derivative securities) written on the underlying asset. The payoff of each option after one period is determined by the value of the underlying asset. An investor takes a unit position in the underlying asset and considers augmenting this position with a portfolio of options called a \emph{layover portfolio}, which may in general contain both long and short positions in options. We say that a layover portfolio is a \emph{first-order stochastic arbitrage opportunity} if (i) it provides a positive option premium, i.e.\ its price is negative, and (ii) the payoff distribution of the layover portfolio combined with a unit investment in the underlying asset first-order stochastically dominates the payoff distribution of the unit investment in the underlying asset. We define a \emph{second-order stochastic arbitrage opportunity} in the same way, but with second-order stochastic dominance replacing first-order stochastic dominance.
An algorithm for computing the second-order stochastic arbitrage opportunity with maximum premium whenever such an opportunity exists has recently been provided in \citet{PostLongarela21}. The algorithm is a linear program. The objective function to be maximized is the negative of the price of a candidate layover portfolio, with bid and ask prices applied to short and long positions in different options. The constraints in the linear program require positions in options to be bounded by the quantities available for sale or purchase at each bid or ask price, and require the payoff distribution of the layover portfolio combined with a unit position in the underlying asset to second-order stochastically dominate the unit position in the underlying asset. If the maximum value of the objective function is positive, then the corresponding layover portfolio is the maximum premium second-order stochastic arbitrage opportunity. If the maximum value of the objective function is zero (which is always feasible with zero portfolio weights) then no second-order stochastic arbitrage opportunity exists.
We make two primary methodological contributions concerning the computation of stochastic arbitrage opportunities. First, we show that the linear program developed in \citet{PostLongarela21} may be reformulated in a way which reduces the number of inequalities and equalities by an order of magnitude, leading to a concomitant reduction in runtime. This is achieved using an efficient linear formulation of second-order stochastic dominance given in \citet{Luedtke08}. Second, we provide a mixed integer-linear program for computing the first-order stochastic arbitrage opportunity with maximum premium. This is achieved using a formulation of first-order stochastic dominance given in \citet{Luedtke08} in which linear inequality and equality constraints are combined with binary constraints on certain auxiliary choice variables.
A secondary methodological contribution concerns the case where the options to be traded are vanilla put and call options with strikes confined to some range, and the layover portfolio is constrained to have zero payoff outside this range. We show that the zero payoff condition can be imposed by augmenting our linear or mixed integer-linear program with four additional linear equality constraints, and explain how the size of the augmented linear and mixed integer-linear programs may be reduced by suitably dispensing with points in the support of the distribution of the underlying asset which are outside the range of strikes. The number of inequality and equality constraints used to enforce stochastic dominance is of the same order of magnitude as the number of points in the support of the distribution of the underlying asset, while the number of choice variables is of the same order of magnitude as the square of the number of points, so a substantial improvement in computational efficiency can be achieved in this fashion.
We report the results of a substantive empirical application to monthly Standard \& Poors 500 index (SPX) options. For one day in each month from January 2004 to November 2021 we compute the layover portfolios of vanilla put and call options expiring in one month which solve our linear and mixed integer-linear programs. We confine attention to strikes between 10\% below and 5\% above the current index value, and require the layover portfolios to deliver zero payoff outside this range. We use two specifications of the distribution of SPX returns. One is symmetric and the other is skewed. In both specifications, following \citet{PostLongarela21}, the location of the return distribution is calibrated to the prevailing London Inter-Bank Offered Rate (LIBOR) plus a fixed market risk premium, and the scale is calibrated to the prevailing Chicago Board Options Exchange (CBOE) Volatility Index (VIX) minus a fixed volatility premium. The distribution of returns after normalizing by location and scale is assumed to be standard normal in our symmetric specification and to be a skewed generalized t-distribution in our skewed specification.
Using our symmetric specification of the SPX return distribution, our linear and mixed integer-linear programs identify numerous stochastic arbitrage opportunities. However, this leads to them selecting layover portfolios with very poor realized performance. The problem is that the symmetric specification understates the probability of moderately positive SPX returns and overstates the probability of moderately negative SPX returns. This leads to our programs selecting layover portfolios delivering positive payoff when the SPX return is moderately negative and negative payoff when the SPX return is moderately positive. These portfolios perform well under the symmetric specification but poorly in reality. Our skewed specification of the SPX return distribution produces very different results. With this specification our linear and mixed integer-linear programs identify very few stochastic arbitrage opportunities, and lead to the selection of portfolios which perform very similarly to the market portfolio. We learn from this analysis that skew plays a vital role in the determination of SPX option prices, and that neglecting to model skew can lead to the spurious identification of stochastic arbitrage opportunities. Moreover, we learn that the prices of SPX options with moderate moneyness are broadly consistent with our skewed specification of the SPX return distribution.
Our article is connected to an extensive literature on the so-called pricing kernel puzzle and associated mispricing of options. This literature originated with \citet{AitSahaliaLo00}, \citet{Jackwerth00} and \citet{RosenbergEngle02}, wherein estimates of the pricing kernel (ratio of Arrow security prices to state probabilities) implied by SPX options were reported to be nonmonotone (i.e., not nonincreasing). More recent articles reporting similar evidence include \citet{BakshiMadanPanayotov10}, \citet{ChaudhuriSchroder15}, \citet{BeareSchmidt16} and \citet{CuesdeanuJackwerth18}. On the other hand, articles including \citet{ChabiYoGarciaRenault08}, \citet{ChristoffersenHestonJacobs13}, \citet{SongXiu16} and \citet{LinnShiveShumway18} argue that findings of pricing kernel nonmonotonicity may be a spurious outcome of failing to properly condition on relevant information in the construction of state probabilities. Pricing kernel monotonicity is an important property because it is intimately related to the existence of stochastic arbitrage opportunities. It is shown in \citet{Dybvig88} and \citet{Beare11} that, in a stylized model with a complete and frictionless options market, pricing kernel nonmonotonicity is equivalent to the existence of a first-order stochastic arbitrage opportunity. Relatedly, it is shown in \citet{PostLongarela21} that, in a model permitting bid-ask spreads and an incomplete options market, the nonexistence of a monotone pricing kernel respecting bid-ask spreads is equivalent to the existence of a second-order stochastic arbitrage opportunity. See \citet{Beare22} and \citet{Perrakis22} for further discussion of the link between pricing kernel monotonicity and the existence of stochastic arbitrage opportunities.
The contributions in \citet{PostLongarela21}, including the linear program whose computational efficiency we improve upon here, build upon a long literature dealing with stochastic dominance pricing bounds for options. The essential concern in this literature is with obtaining bounds on option prices implied by the absence of some version of a stochastic arbitrage opportunity. Fundamental early contributions providing bounds on individual option prices include \citet{PerrakisRyan84}, \citet{Levy85} and \citet{Ritchken85}. In \citet{ConstantinidesJackwerthPerrakis09} a system of linear equalities is constructed from all option bid and ask prices which admits a feasible solution if and only if there exists a monotone pricing kernel respecting bid-ask spreads. Frequent instances of infeasibility are documented with monthly SPX call options, motivating the pursuit of profitable option trading strategies in \citet{ConstantinidesCzerwonkoJackwerthPerrakis11,ConstantinidesCzerwonkoPerrakis20}. Infeasibility of the system of linear inequalities in \citet{ConstantinidesJackwerthPerrakis09} is shown in \citet{PostLongarela21} to be a necessary and sufficient condition for the existence of a second-order stochastic arbitrage opportunity. For a comprehensive discussion of the literature on stochastic dominance pricing bounds with numerous additional references, see \citet{Perrakis19}.
\section{Portfolio choice problem}\label{sec:problem}
We take the perspective of an investor holding one unit of the underlying asset. At a fixed future time (say, one month hence) this unit is sold and delivers the investor a nonnegative random payoff taking values in a finite set of points $x_1<\cdots<x_n$. The probabilities with which the random payoff takes each of these values are denoted $\mu_1,\dots,\mu_n$. There are $m$ options written on the underlying asset, each of which delivers a nonnegative payoff after one month determined by the payoff delivered by the underlying asset. We denote the payoff delivered by one unit of the $i$th of the $m$ options when the underlying asset payoff is $x$ by $\theta_{i}(x)$, and we define $\theta_{ij}=\theta_i(x_j)$. For instance, if the $i$th option is a call option with strike $s_i$, then $\theta_{ij}=\max\{0,x_j-s_i\}$. The investor may take a long position in the $i$th option at price $p_i>0$ per unit, or a short position at price $q_i\geq0$ per unit, where $p_i\geq q_i$.
We use boldface notation for vectors and matrices, and uppercase notation for matrices. Write $\mathbf{\Theta}$ for the $m\times n$ matrix with entries $\theta_{ij}$, write $\boldsymbol{\mu}$ and $\mathbf{x}$ for the $n\times1$ vectors with entries $\mu_j$ and $x_j$ respectively, and write $\mathbf{p}$ and $\mathbf{q}$ for the $m\times1$ vectors with entries $p_i$ and $q_i$ respectively.
A layover portfolio is represented by two $m\times1$ nonnegative vectors $\boldsymbol{\alpha},\boldsymbol{\beta}$ indicating the respective long and short positions taken by the investor in each option. The price of such a portfolio is $\mathbf{p}^\top\boldsymbol{\alpha}-\mathbf{q}^\top\boldsymbol{\beta}$. We call the negative of the price of a layover portfolio its premium. We suppose that long and short positions are constrained to belong to a polytope
\begin{align*}
\mathcal P&=\{(\boldsymbol{\alpha},\boldsymbol{\beta})\in\mathbb R_+^m\times\mathbb R_+^m:\mathbf{A}\boldsymbol{\alpha}+\mathbf{B}\boldsymbol{\beta}\leq\mathbf{c}\},
\end{align*}
where $\mathbf{A}$ and $\mathbf{B}$ are $\ell\times m$ matrices and $\mathbf{c}$ is an $\ell\times1$ vector, for some $\ell$. For instance, if $\mathbf{v}$ is an $m\times1$ vector whose entries are the maximum long positions that can be taken in each option, and $\mathbf{w}$ is an $m\times1$ vector whose entries are the maximum short positions that can be taken in each option, then we can constrain the investor to respect these limits by setting
\begin{equation}\label{eq:positionlimits}
\mathbf{A}=\begin{bmatrix} \mathbf{I}_m\cr\mathbf{0}_{m\times m}\end{bmatrix},\,\mathbf{B}=\begin{bmatrix}\mathbf{0}_{m\times m}\cr\mathbf{I}_m\end{bmatrix},\,\mathbf{c}=\begin{bmatrix}\mathbf{v}\cr\mathbf{w}\end{bmatrix},
\end{equation}
where $\mathbf{I}_m$ is an $m\times m$ identity matrix and $\mathbf{0}_{m\times m}$ is an $m\times m$ zero matrix.
Let $x$ be the random payoff of underlying risky asset. We suppose that the investor chooses a layover portfolio $(\boldsymbol{\alpha},\boldsymbol{\beta})$ to solve the following optimization problem:
\begin{align*}
\text{maximize}\quad&-\mathbf{p}^\top\boldsymbol{\alpha}+\mathbf{q}^\top\boldsymbol{\beta}\\
\text{subject to}\quad&x+\sum_{i=1}^m\alpha_i\theta_i(x)-\sum_{i=1}^m\beta_i\theta_i(x)\gtrsim x,\\
&(\boldsymbol{\alpha},\boldsymbol{\beta})\in\mathcal P.
\end{align*}
Here, $\gtrsim$ denotes either first- or second-order stochastic dominance. In the latter case our optimization problem is the same as in \citet{PostLongarela21}.
The options to be traded in our empirical application are put and call options. In a departure from previous studies, we require the layover portfolio to deliver zero payoff when the underlying asset falls outside the range of strikes at which options are traded. This means that if a stochastic arbitrage opportunity is identified then there does not exist a pricing kernel respecting bid-ask spreads which is monotone over the range of strikes. From a practical perspective, it may be a reasonable restriction for an investor to impose if they feel unable to reliably specify probabilities for states falling outside the range of strikes, or if they wish to insulate their position in options from extreme movements in the underlying asset.
In order to enforce our requirement that the layover portfolio deliver zero payoff outside the range of strikes, we augment $\mathbf{A}$, $\mathbf{B}$ and $\mathbf{c}$ in \eqref{eq:positionlimits} with 8 additional rows. For $i=1,\dots,m$, let $s_i$ denote the strike of the $i$th option and let $d_i=0$ if the $i$th option is a put or $d_i=1$ if the $i$th option is a call. Order the options such that $s_1\leq\cdots\leq s_m$. (Each strike is repeated once in the empirically common case where both a put and a call are listed at each strike.) Let $\mathbf{a}_{2m+1}$, $\mathbf{a}_{2m+3}$, $\mathbf{a}_{2m+5}$ and $\mathbf{a}_{2m+7}$ be $1\times m$ vectors with $i$th entries equal to $d_is_i$, $d_i$, $(1-d_i)s_i$ and $1-d_i$ respectively. We specify the polytope $\mathcal P$ by setting
\begin{equation}\label{eq:positionlimitsaug}
\mathbf{A}=\begin{bmatrix} \mathbf{I}_m\cr\mathbf{0}_{m\times m}\cr\mathbf{a}_{2m+1}\cr-\mathbf{a}_{2m+1}\cr\mathbf{a}_{2m+3}\cr-\mathbf{a}_{2m+3}\cr\mathbf{a}_{2m+5}\cr-\mathbf{a}_{2m+5}\cr\mathbf{a}_{2m+7}\cr-\mathbf{a}_{2m+7}\end{bmatrix},\,\mathbf{B}=\begin{bmatrix}\mathbf{0}_{m\times m}\cr\mathbf{I}_m\cr-\mathbf{a}_{2m+1}\cr\mathbf{a}_{2m+1}\cr-\mathbf{a}_{2m+3}\cr\mathbf{a}_{2m+3}\cr-\mathbf{a}_{2m+5}\cr\mathbf{a}_{2m+5}\cr-\mathbf{a}_{2m+7}\cr\mathbf{a}_{2m+7}\end{bmatrix},\,\mathbf{c}=\begin{bmatrix}\mathbf{v}\cr\mathbf{w}\cr0\cr0\cr0\cr0\cr0\cr0\cr0\cr0\end{bmatrix}.
\end{equation}
The 8 inequality constraints corresponding to the 8 final rows of $\mathbf{A}$, $\mathbf{B}$ and $\mathbf{c}$ consist of 4 negative pairings and may thus be rewritten as 4 equality constraints.
The 4 final rows of $\mathbf{A}$, $\mathbf{B}$ and $\mathbf{c}$ enforce the restriction that the layover portfolio deliver zero payoff below the range of strikes, and the 4 rows immediately above enforce the restriction that the layover portfolio deliver zero payoff above the range of strikes. To see why observe that, since all options are puts or calls, the payoff function of any layover portfolio is continuous and piecewise linear, with kinks permitted only at strikes. It therefore delivers zero payoff below the range of strikes if and only if the payoff function is zero at $s_1$ and has zero left-derivative at $s_1$. This is the case precisely when
\begin{align*}
\sum_{i=1}^m(1-d_i)(\alpha_i-\beta_i)(s_i-s_1)&=0,\\\sum_{i=1}^m(1-d_i)(\alpha_i-\beta_i)&=0,
\end{align*}
which may be equivalently rewritten as
\begin{equation*}
\mathbf{a}_{2m+5}\boldsymbol{\alpha}-\mathbf{a}_{2m+5}\boldsymbol{\beta}=0,\quad\mathbf{a}_{2m+7}\boldsymbol{\alpha}-\mathbf{a}_{2m+7}\boldsymbol{\beta}=0.
\end{equation*}
These 2 equalities are equivalent to the 4 inequalities corresponding to the final 4 rows of $\mathbf{A}$, $\mathbf{B}$ and $\mathbf{c}$. A symmetric argument shows that the 4 rows immediately above enforce the requirement that the layover portfolio delivers zero payoff above the range of strikes.
When $\mathbf{A}$, $\mathbf{B}$ and $\mathbf{c}$ are specified to force the layover portfolio to deliver zero payoff outside the range of strikes, as is the case in \eqref{eq:positionlimitsaug}, there is no need to assign probabilities to payoff values that lie outside the range of strikes. This is because, in this case, the first- or second-order stochastic dominance constraint holds \emph{unconditionally} if and only if it holds \emph{conditionally} on $x$ falling within the range of strikes. We therefore need only specify payoff values $x_1,\dots,x_n$ lying within the range of strikes, and assign to them probabilities $\mu_1,\dots,\mu_n$ which are conditional on the random payoff $x$ falling within the range of strikes. Note that conditional state probabilities are obtained simply by scaling the unconditional probabilities of states within the range of strikes such that they sum to one. Large improvements in computational efficiency can be achieved by restricting the payoff values to fall within the range of strikes, because, as we will see in Section \ref{sec:sd}, our optimization problem is solved using a linear or mixed-integer linear program with $n^2+n+2m$ choice variables. We therefore do not want to choose an unnecessarily large number of payoff values. The inclusion of numerous additional values lying outside the range of strikes does not affect the solution to our optimization problem in principle but can lead to it being slow or practically infeasible to compute.
\section{Stochastic dominance constraints}\label{sec:sd}
In order to solve the portfolio choice problem posed in Section \ref{sec:problem} we need to formulate the stochastic dominance constraint in a way that is amenable to available optimization routines. We will discuss second- and first-order stochastic dominance in turn.
\subsection{Second-order stochastic dominance}\label{sec:sd2}
Let $\mathbf{1}_n$ denote the $n\times1$ vector with each entry equal to one, and let $\mathbf{T}$ denote the $n\times n$ strictly lower triangular matrix with $(j,k)$th entry equal to $x_j-x_k$ for $j>k$. We adopt a linear formulation of second-order stochastic dominance given in \citet{Luedtke08}. Theorem 3.3 therein, and the subsequent discussion, implies that a layover portfolio $(\boldsymbol{\alpha},\boldsymbol{\beta})\in\mathcal P$ satisfies the second-order stochastic dominance constraint
\begin{align}\label{eq:sdconstraint}
x+\sum_{i=1}^m\alpha_i\theta_i(x)-\sum_{i=1}^m\beta_i\theta_i(x)\gtrsim x
\end{align}
if and only if there exists an $n\times n$ nonnegative matrix $\boldsymbol{\Psi}$ and an $n\times1$ nonnegative vector $\boldsymbol{\xi}$ such that
\begin{align}
\boldsymbol{\Psi}\mathbf{1}_n&=\mathbf{1}_n,\label{eq:Lconstraint1}\\
\boldsymbol{\xi}-\boldsymbol{\Psi}^\top\boldsymbol{\mu}&=\mathbf{0}_n,\label{eq:Lconstraint2}\\
\mathbf{T}\boldsymbol{\xi}&\leq\mathbf{T}\boldsymbol{\mu},\label{eq:Lconstraint3}\\
\boldsymbol{\Psi}\mathbf{x}-\boldsymbol{\Theta}^\top(\boldsymbol{\alpha}-\boldsymbol{\beta})&\leq\mathbf{x}.\label{eq:Lconstraint4}
\end{align}
It is therefore possible to solve the portfolio choice problem posed in Section \ref{sec:problem} using the following linear program, which we refer to as LP.
\begin{LP}
Choose two $m\times1$ nonnegative vectors $\boldsymbol{\alpha},\boldsymbol{\beta}$, an $n\times1$ nonnegative vector $\boldsymbol{\xi}$, and an $n\times n$ nonnegative matrix $\boldsymbol{\Psi}$ to maximize $-\mathbf{p}^\top\boldsymbol{\alpha}+\mathbf{q}^\top\boldsymbol{\beta}$ subject to the constraints \eqref{eq:Lconstraint1}, \eqref{eq:Lconstraint2}, \eqref{eq:Lconstraint3}, \eqref{eq:Lconstraint4} and
\begin{align}\label{eq:PLconstraint3}
\mathbf{A}\boldsymbol{\alpha}+\mathbf{B}\boldsymbol{\beta}\leq\mathbf{c}.
\end{align}
\end{LP}
LP contains a total of $4n+\ell$ scalar equality and inequality constraints (not including nonnegativity constraints on variables) and $n^2+n+2m$ choice variables, including the $2m$ portfolio weights in $\boldsymbol{\alpha}$ and $\boldsymbol{\beta}$ we seek to compute plus an additional $n^2+n$ auxilliary choice variables in $\boldsymbol{\Psi}$ and $\boldsymbol{\xi}$. The auxilliary choice variables do not enter the objective function in LP but influence the choice of $\boldsymbol{\alpha}$ and $\boldsymbol{\beta}$ through the constraints. We could reduce the number of scalar equality and inequality constraints in LP from $4n+\ell$ to $3n+\ell$ by dropping the auxiliary choice variable $\boldsymbol{\xi}$ and replacing \eqref{eq:Lconstraint2} and \eqref{eq:Lconstraint3} with
\begin{align}\label{eq:combinedconstraint}
\mathbf{T}\boldsymbol{\Psi}^\top\boldsymbol{\mu}&\leq\mathbf{T}\boldsymbol{\mu}.
\end{align}
However, as discussed in \citet{Luedtke08}, it is computationally advantageous to use the formulation in LP because \eqref{eq:Lconstraint2} and \eqref{eq:Lconstraint3} together contain at most $n^2+n(n-1)/2+n$ nonzero coefficients, compared to at most $n^2(n-1)/2$ nonzero coefficients in \eqref{eq:combinedconstraint}, an order of magnitude greater.
The solution for $\boldsymbol{\alpha}$ and $\boldsymbol{\beta}$ obtained using LP is identical to the solution obtained using the linear program proposed in \citet{PostLongarela21}. However, the formulation of the latter program is different to LP, and involves a total of $n^2+n+\ell$ scalar equality and inequality constraints, compared to only $4n+\ell$ in LP. We discuss the difference between the two linear programs more fully in the Appendix. Using option price data for the final date used in our empirical application -- November 17, 2021 -- we found that the linear program in \citet{PostLongarela21} requires a Gurobi input file of size approximately 240 MB and a runtime of 7 seconds, compared to 5 MB and 0.7 seconds for LP. Further details are provided in the Appendix. A tenfold gap in runtime may be significant in an automated trading environment where the aim is to identify and execute stochastic arbitrage opportunities as they arise in real time.
\subsection{First-order stochastic dominance}
We now turn to solving the portfolio choice problem posed in Section \ref{sec:problem} when the symbol $\gtrsim$ appearing in the stochastic dominance constraint \eqref{eq:sdconstraint} is understood to denote first-order stochastic dominance. While second-order stochastic dominance constraints may be formulated in terms of linear inequalities and are therefore convenient to implement in a linear program, first-order stochastic dominance constraints do not generally admit such a formulation. They may instead be formulated in terms of a combination of linear inequalities and binary constraints. Such a formulation was introduced in \citet{Kuosmanen04} and subsequently improved in \citet{Luedtke08}. Theorem 4.1 in the latter article, and the subsequent discussion, implies that any given $(\boldsymbol{\alpha},\boldsymbol{\beta})\in\mathcal{P}$ satisfies the first-order stochastic dominance constraint \eqref{eq:sdconstraint} if and only if there exists an $n\times n$ binary matrix $\boldsymbol{\Psi}$ and an $n\times1$ nonnegative vector $\boldsymbol{\xi}$ satisfying \eqref{eq:Lconstraint1}, \eqref{eq:Lconstraint2}, \eqref{eq:Lconstraint4} and
\begin{align}\label{eq:SA1constraint3}
\mathbf{S}\boldsymbol{\xi}&\leq\mathbf{S}\boldsymbol{\mu},
\end{align}
where $\mathbf{S}$ is the $n\times n$ strictly lower triangular matrix with all entries below the diagonal equal to one. This leads us to propose the following mixed integer-linear program for solving our portfolio choice problem.
\begin{MILP}
Choose two $m\times1$ nonnegative vectors $\boldsymbol{\alpha},\boldsymbol{\beta}$, an $n\times1$ nonnegative vector $\boldsymbol{\xi}$, and an $n\times n$ binary matrix $\boldsymbol{\Psi}$ to maximize $-\mathbf{p}^\top\boldsymbol{\alpha}+\mathbf{q}^\top\boldsymbol{\beta}$ subject to the constraints \eqref{eq:Lconstraint1}, \eqref{eq:Lconstraint2}, \eqref{eq:Lconstraint4}, \eqref{eq:PLconstraint3} and \eqref{eq:SA1constraint3}.
\end{MILP}
The presence of binary constraints on the $n^2$ auxiliary choice variables in $\boldsymbol{\Psi}$ makes MILP far more difficult to solve than LP. While Gurobi can rapidly and reliably solve LP using the dual simplex method, it resorts to a complicated branch-and-bound algorithm for solving MILP. We found in our empirical application that, while Gurobi sometimes arrives at a solution to MILP very quickly, it often continues searching for a solution for hours. This limits the usefulness of MILP in practical applications, as first-order stochastic arbitrage opportunities may vanish in less time than they take to compute. In the empirical implementation reported in Section \ref{sec:empirical} we limited the runtime to four hours for each optimization; if Gurobi has not settled on an optimal solution in that time, we take the best feasible solution found to be our portfolio. We assisted Gurobi by supplying it with the feasible starting values $\boldsymbol{\alpha}=\mathbf{0}_m$, $\boldsymbol{\beta}=\mathbf{0}_m$, $\boldsymbol{\xi}=\boldsymbol{\mu}$, $\boldsymbol{\Psi}=\mathbf{I}_n$.
Figure \ref{fig:runtime} illustrates Gurobi's search for an optimal solution to MILP using our options data for our most recent date of November 17, 2021, and our symmetric specification of state probabilities and unit market depth constraint (see Sections \ref{sec:physical} and \ref{sec:marketdepth}). At this date we choose positions in a total of $m=255$ distinct option contracts, and our specification of the distribution of the SPX at expiry has a total of $n=140$ atoms within the range of strikes. Gurobi did not terminate at an optimal solution within ten hours of runtime. (We extended the maximum runtime from four to ten hours for this illustration.) The best feasible solution found after ten hours generated a premium equal to 1.85\% of the unit investment in the SPX and is displayed as a horizontal dotted line. This is not much less than the maximum premium of 2.07\% we computed under the weaker second-order stochastic dominance constraint using LP, so the best feasible solution after ten hours is at least close to being optimal. The solid line in Figure \ref{fig:runtime} plots the premium generated by the best feasible solution identified by Gurobi as a function of runtime. We see that the best feasible solution identified by Gurobi has a premium which is reasonably close to 1.85\% within 20 minutes, and very close to 1.85\% within 200 minutes. The first stochastic arbitrage opportunity identified by Gurobi, not visible in Figure \ref{fig:runtime}, occurs at 13 seconds and has a premium of 0.75\%. At 17 seconds Gurobi identifies a better stochastic arbitrage opportunity with a premium of 1.24\%.
\begin{figure
\caption{Best feasible solution to MILP by runtime}\label{fig:runtime}
\vspace*{-.3cm}
\begin{center}
\begin{tikzpicture}[scale=3.5]
\tikzstyle{vertex}=[font=\small,circle,draw,fill=yellow!20]
\tikzstyle{edge} = [font=\scriptsize,draw,thick,-]
\draw[black, thick] (0,0) -- (0,1);
\draw[black, thick, ->] (0,0) -- ({(4/5)*2.1},0);
\draw (0,0.3pt) -- (0,-1pt)
node[anchor=north,font=\scriptsize] {$0$};
\draw ({8/25},0.3pt) -- ({8/25},-1pt)
node[anchor=north,font=\scriptsize] {$40$};
\draw ({16/25},0.3pt) -- ({16/25},-1pt)
node[anchor=north,font=\scriptsize] {$80$};
\draw ({24/25},0.3pt) -- ({24/25},-1pt)
node[anchor=north,font=\scriptsize] {$120$};
\draw ({32/25},0.3pt) -- ({32/25},-1pt)
node[anchor=north,font=\scriptsize] {$160$};
\draw ({40/25},0.3pt) -- ({40/25},-1pt)
node[anchor=north,font=\scriptsize] {$200$};
\draw (0.3pt,0) -- (-0.8pt,0);
\draw (0.3pt,{1/4}) -- (-0.8pt,{1/4});
\draw (0.3pt,{2/4}) -- (-0.8pt,{2/4});
\draw (0.3pt,{3/4}) -- (-0.8pt,{3/4});
\draw (0.3pt,{4/4}) -- (-0.8pt,{4/4});
\node[left,font=\scriptsize] at (0,0) {$0$};
\node[left,font=\scriptsize] at (0,{1/4}) {$.5$};
\node[left,font=\scriptsize] at (0,{2/4}) {$1$};
\node[left,font=\scriptsize] at (0,{3/4}) {$1.5$};
\node[left,font=\scriptsize] at (0,{4/4}) {$2$};
\draw[red] plot file {CostByRuntime2col.txt};
\draw[blue,dotted] (0,{.01853/.02}) -- ({8/5},{.01853/.02});
\node[font=\small] at ({4/5},-.25) {Runtime (m)};
\node[rotate=90,font=\small] at (-.25,.5) {Premium (\%)};
\end{tikzpicture}
\end{center}
\vspace*{-.3cm}
{\small \emph{Notes:} Computations were performed using Gurobi Optimizer 9.0.2 on a machine with 32 2.1 GHz processors and 16 GB of memory. The computed maximum premium (as a percentage of the unit investment in the SPX) after 10 hours of runtime, shown as the dotted line, is 1.85\%.}
\end{figure}
\section{Empirical implementation}\label{sec:empirical}
\subsection{Data}
The SPX options data for our empirical implementation were purchased from the CBOE DataShop and span the 215 months from January 2004 to November 2021. In each of those months prior to January 2015 (following December 2014) we confine our attention to put and call options with the standard classification codes SPX, SPT, SPQ, SPZ, SXB, SXM, SXY, SXZ, SZP and with 29 (28) days to maturity. These options are all traded on the same day in a given month and expire on the third Saturday (Friday) of the following month. Two exceptions are November 2015, when the selected options have 29 days to maturity and expire on the third Saturday of the following month, and March 2019, when the selected options have 28 days to maturity and expire on the third Thursday of the following month. We exclude options which have strikes below 90\% or above 105\% of the current SPX. The range of included strikes is the same as the range considered in \citet{ConstantinidesJackwerthPerrakis09} and is classified as medium moneyness in Table 1 in \citet{PostLongarela21}. For each option we observe the best bid and ask prices quoted at 2:45pm Central Time (30 minutes before closing) and the associated bid and ask sizes (i.e., volumes). Table \ref{table:datasummary} provides summary statistics for the numbers of strikes and the quote sizes for 36 month subperiods.
\begin{table}
\centering
{\small
\begin{threeparttable}
\caption{Median strike quantities and quote sizes}\label{table:datasummary}
\begin{tabular}{ccccccc}
\toprule
&&\multicolumn{5}{c}{Median quote size}\\\cmidrule{3-7}
&&\multicolumn{2}{c}{Call}&&\multicolumn{2}{c}{Put}\\\cmidrule{3-4}\cmidrule{6-7}
Years&Med.\ strikes&Bid&Ask&&Bid&Ask\\
\midrule
2004--06&33&50&50&&50&50\\
2007--09&38&54&54&&53&53\\
2010--12&38&200&172&&185&177\\
2013--15&59&114&112&&103&103\\
2016--18&73&51&54&&190&186\\
2019--21&97&120&100&&222&195\\
\bottomrule
\end{tabular}
\begin{tablenotes}
\item \emph{Notes:} The table shows the median number of strikes at which options are written, and the median quote size at each best bid and ask price, for each 36 month period from 2004 to 2021 (35 months in 2019--21). Only options with strikes between 10\% below and 5\% above the current SPX are included.
\end{tablenotes}
\end{threeparttable}
}
\end{table}
At each date on which portfolios are chosen we use the LIBOR as the risk-free rate and use at-the-money put-call parity to impute a forward price for delivery of one unit of the SPX at the time of expiry. Excess returns for the market portfolio are calculated under the assumption that this portfolio is purchased at the discounted forward rate and liquidated at the expiry date. Excess returns for portfolios including options are calculated under the assumption that option premia are invested at the risk-free rate and liquidated at the expiry date. Our method of imputing forward prices does not affect the performance of the market portfolio relative to the performance of the market portfolio enhanced with the selected layover portfolio, because both include a single unit of the SPX.
We do not filter our data to exclude options violating no-arbitrage conditions, with one exception. The option prices quoted on August 20, 2004, include a put and a call at our lowest strike which present a large pure arbitrage opportunity. With our weakest market depth constraint (see Section \ref{sec:marketdepth}), retaining this pair of options in our dataset leads to our linear and mixed integer-linear programs selecting a portfolio which generates an enormous return of over 30\% (not annualized) when options expire on September 19, 2004. This single return distorts the overall picture emerging from our analysis. We therefore exclude this pair of options.
As in \citet{PostLongarela21}, we require short and long positions in options to be taken at the respective bid and ask prices but do not otherwise account for transaction costs in our analysis. There are two justifications for this. First, the inclusion of transaction costs would only strengthen our finding that LP and MILP do not in fact identify stochastic arbitrage opportunities with profitable realized performance. Second, as documented by \citet{MuravyevPearson20}, the bid-ask spread may actually overstate the effective cost of trading options for algorithmic traders who can time transactions so as to trade within the spread.
\subsection{Specification of state probabilities}\label{sec:physical}
We use two different specifications for the state probabilities in our analysis. The first, which we call our symmetric specification, is the same as in \citet{PostLongarela21} but with a higher market risk premium, and uses a lognormal distribution to model the state probabilities for the SPX at the time of option expiry. Rather than use a binomial tree to approximate the lognormal distribution, we obtain probabilities at all multiples of 5 basis points within the range of strikes directly from the lognormal probability density function, normalizing the density function values at these points to sum to one. At each date on which options are traded, the location parameter for the lognormal distribution is set equal to the logarithm of the current SPX plus the LIBOR plus an annualized market risk premium of 6\%, and the scale parameter is set equal to the VIX (divided by 100) minus an annualized volatility risk premium of 2\%, with both parameters adjusted to match the number of trading days until option expiry.
Our second specification for the state probabilities, which we call our skewed specification, differs from the first in that it introduces a degree of skew in the return distribution. Whereas in our first specification the distribution of the logarithm of the SPX at expiry normalized by location and scale is standard normal and therefore symmetric, in our second specification its distribution is the skewed generalized t-distribution proposed in \citet{Theodossiou98}. We set the parameters of the skewed generalized t-distribution equal to 1.25 (shape), 5 (degrees of freedom) and -0.2 (asymmetry). We discuss the choice of the parameters for our second specification further in Section \ref{sec:results}.
We explore the robustness of our results to the choice of the market risk premium in Section \ref{sec:premium}. Our baseline results use a market risk premium of 6\%, compared to 4\% in \citet{PostLongarela21}. It is argued in \citet[Online Appendix 17.5, p.\ 10]{LutolfCarrollPirnes09} that a market risk premium of between 5\% and 7\% is reasonable for US equities. We report a summary of results obtained using market premia of 4\% and 8\% to complement our baseline results using 6\%. The general conclusions drawn from our results are robust to these variations.
We investigated the use of a third specification of state probabilities in which, instead of modeling the SPX returns normalized by location and scale with a standard normal or skewed generalized t-distribution, we fit a nonparametric kernel density estimator to the normalized returns. The results we obtained with this nonparametric specification were very similar to the results we obtained with the skewed generalized t-distribution, so we have not reported them.
\subsection{Market depth constraint}\label{sec:marketdepth}
The quoted bid and ask sizes for each option are used to determine $\mathbf{v}$ and $\mathbf{w}$, the vectors of maximum long and short positions, which may be described as providing market depth constraints. How this is done depends on the size of the assumed unit investment in the SPX. Following \citet{PostLongarela21} we consider four sizes of the unit investment: $S=1,10,100,1000$. The entries of $\mathbf{v}$ and $\mathbf{w}$ are set equal to $1/S$ times the quoted ask and bid sizes respectively. Since the multiplier of SPX options is \$100 per index point, defining $\mathbf{v}$ and $\mathbf{w}$ in this way means that a unit investment in the SPX corresponds to an investment of $\$100S$ times the SPX. The average of the SPX over the 215 dates at which option portfolios are chosen is 1900. We may therefore consider the four sizes $S=1,10,100,1000$ as corresponding roughly to market investments of \$190,000, \$1.9 million, \$19 million and \$190 million respectively. As discussed in \citet{PostLongarela21}, the market depth constraints are on the one hand permissive because the investor is assumed to be able to buy or sell all options listed at the best ask or bid price before other traders may intervene, but are on the other hand restrictive because the investor is unable to buy or sell options listed above the best ask price or below the best bid price.
\subsection{Computation}
Given the speed with which we are able to solve LP using Gurobi, our empirical analysis of second-order stochastic arbitrage does not pose a significant computational challenge. The analysis of first-order stochastic arbitrage poses a much greater challenge. With portfolio selection at 215 dates and with four market depth constraints and two specifications of the state probabilities, we need to solve MILP a total of 1720 times. We allow Gurobi a maximum of four hours runtime for each optimization, making for a total maximum runtime of 6880 hours, or around 287 days. We were able to complete these computations within a couple of days using Artemis, the high performance computing cluster at the University of Sydney. We first used the Gurobi MATLAB interface to create the 1720 Gurobi input files with a personal computer. We then sent these files to Artemis, where they were progressively distributed across a large number of linked machines to be solved with Gurobi. We then retrieved the 1720 Gurobi output files from Artemis and completed our analysis with MATLAB on a personal computer.
\subsection{Results}\label{sec:results}
We report the outcome of our analysis of the portfolios selected using LP, i.e.\ the portfolios chosen subject to a second-order stochastic dominance constraint, and using our symmetric specification of state probabilities, in the top half of Table \ref{table:symresults}. The first row shows that the percentage of months in which LP identifies a stochastic arbitrage opportunity with a premium of at least 0.1\% of the market investment is high: 68\% of months with $S=1$, declining to 33\% of months with $S=1000$. It is natural to see a decline as we increase $S$ because tightening the market depth constraint reduces the value of tradable options as a proportion of the market investment. The next four rows of Table \ref{table:symresults} break down the positions taken in options into puts and calls bought and written. We see that the layover portfolios tend to be net short in calls and net long in puts. The next two rows display the average Delta (sensitivity of Black-Scholes price to movements in the underlying asset) and Vega (sensitivity to volatility) for the layover portfolios, normalized by the size of the market investment. The average Deltas are negative, consistent with being net short in calls and net long in puts, and the average Vegas are positive. Both shrink as we tighten the market depth constraint, as expected.
\begin{table*}
\centering
{\small
\begin{threeparttable}
\caption{Characteristics of portfolios selected with LP and MILP using symmetric specification}\label{table:symresults}
\begin{tabular}{r|llccccc}
\toprule
\multicolumn{4}{c}{}&\multicolumn{4}{c}{Enhanced portfolio}\\\cmidrule{5-8}
\multicolumn{3}{c}{}& SPX & $S=1$ & $S=10$ & $S=100$ & $S=1000$\\
\midrule
\multirow{24}{*}{LP}&Percentage of monthly premia exceeding&&& 68.4 & 61.4 & 51.2 & 33.5 \\
&$\quad$0.1pct of market investment&&&&&&\\
&Value of options as a percentage of&Calls bought&& 2.5 & 1.8 & 1.4 & 0.9 \\
&$\quad$market investment (average)&Calls written&& 4.7 & 3.9 & 3.0 & 1.8 \\
&&Puts bought&& 3.4 & 2.8 & 2.5 & 1.6 \\
&&Puts written&& 2.4 & 1.7 & 1.7 & 1.1 \\
&Layover portfolio Greeks (average$/S$)&Delta&& -0.40 & -0.37 & -0.30 & -0.18 \\
&&Vega&& 102.3 & 98.2 & 91.2 & 69.9 \\
&Median model-implied moments of&Mean&8.27& 14.84 & 14.62 & 14.34 & 14.15 \\
&$\quad$excess returns&Std.\ dev.&14.20& 13.55 & 13.44 & 13.35 & 13.57 \\
&&Skew&0.13& 0.27 & 0.28 & 0.28 & 0.27 \\
&&Sortino&0.81& 1.90 & 1.96 & 2.07 & 1.72 \\
&&CER-2&6.70& 13.15 & 13.19 & 13.02 & 12.62 \\
&&CER-3&5.74& 12.26 & 12.48 & 12.36 & 11.83 \\
&&CER-4&4.83& 11.69 & 11.72 & 11.64 & 11.07 \\
&Realized moments of excess returns&Mean&10.06& 2.21 & 2.87 & 4.74 & 7.55 \\
&&Std.\ dev.&17.79& 17.73 & 17.67 & 17.52 & 17.40 \\
&&Skew&-1.56& -0.97 & -1.00 & -1.10 & -1.27 \\
&&Sortino&0.73& 0.17 & 0.22 & 0.36 & 0.58 \\
&&CER-2&7.85& 0.26 & 0.93 & 2.81 & 5.60 \\
&&CER-3&5.74& -1.59 & -0.92 & 0.94 & 3.69 \\
&&CER-4&3.43& -3.56 & -2.91 & -1.06 & 1.62 \\
&Stochastic dominance p-values&First-order&& 0.001 & 0.002 & 0.009 & 0.011 \\
&&Second-order&& 0.009 & 0.013 & 0.037 & 0.055 \\
\midrule
\multirow{24}{*}{MILP}&Percentage of monthly premia exceeding&&& 40.0 & 36.3 & 28.4 & 13.0 \\
&$\quad$0.1pct of market investment&&&&&&\\
&Value of options as a percentage of&Calls bought&& 2.0 & 1.5 & 1.1 & 0.3 \\
&$\quad$market investment (average)&Calls written&& 3.1 & 2.6 & 2.0 & 0.7 \\
&&Puts bought&& 2.1 & 1.8 & 1.4 & 0.6 \\
&&Puts written&& 1.6 & 1.2 & 1.0 & 0.4 \\
&Layover portfolio Greeks (average$/S$)&Delta&& -0.22 & -0.21 & -0.16 & -0.08 \\
&&Vega&& 69.3 & 67.3 & 59.2 & 31.7 \\
&Median model-implied moments of&Mean&8.27& 10.60 & 10.40 & 10.11 & 9.84 \\
&$\quad$excess returns&Std.\ dev.&14.20& 13.74 & 13.89 & 14.15 & 14.15 \\
&&Skew&0.13& 0.15 & 0.15 & 0.15 & 0.14 \\
&&Sortino&0.81& 1.07 & 1.06 & 1.05 & 1.05 \\
&&CER-2&6.70& 7.71 & 7.74 & 7.65 & 7.58 \\
&&CER-3&5.74& 6.93 & 6.95 & 6.93 & 6.89 \\
&&CER-4&4.83& 6.16 & 6.16 & 6.15 & 6.10 \\
&Realized moments of excess returns&Mean&10.06& 6.40 & 5.67 & 7.69 & 9.54 \\
&&Std.\ dev.&17.79& 18.10 & 18.09 & 17.80 & 17.66 \\
&&Skew&-1.56& -1.16 & -1.13 & -1.26 & -1.40 \\
&&Sortino&0.73& 0.47 & 0.42 & 0.57 & 0.70 \\
&&CER-2&7.85& 4.20 & 3.49 & 5.57 & 7.43 \\
&&CER-3&5.74& 2.18 & 1.49 & 3.58 & 5.40 \\
&&CER-4&3.43& 0.02 & -0.65 & 1.43 & 3.21 \\
&Stochastic dominance p-values&First-order&& 0.069 & 0.023 & 0.104 & 0.172 \\
&&Second-order&& 0.090 & 0.041 & 0.124 & 0.209 \\
\bottomrule
\end{tabular}
\begin{tablenotes}
\item \emph{Notes:} The table summarizes characteristics of portfolios chosen in 215 months from 2004–21 and held for 28 or 29 days. The portfolios considered are the market portfolio (SPX) and option-enhanced portfolios selected using LP or MILP with one of four market depth constraints ($S=1,10,100,100$) and our symmetric specification of state probabilities.
\end{tablenotes}
\end{threeparttable}
}
\end{table*}
The next seven rows of Table \ref{table:symresults} report medians of the model-implied moments of the excess returns of the market portfolio and of the market portfolio enhanced with the layover portfolios. These moments describe the behavior of excess returns predicted on the basis of our symmetric specification of state probabilities. To calculate the moments, on each date at which portfolios are formed we simulate 10,000 realizations of the SPX at expiry by sampling from the lognormal distribution, and compute the sample moments of the excess returns which eventuate at these realizations. The computed moments are very favorable for the enhanced portfolio. The median of the model-implied mean excess returns, in annualized percentage points, is 8.27\% for the market portfolio and above 14\% for the enhanced portfolio under all market depth constraints, and the median of the model-implied standard deviations of excess returns is slightly higher for the market portfolio than for the enhanced portfolio. This reflects the fact that the layover portfolio solving LP is guaranteed to satisfy our second-order stochastic dominance constraint under our symmetric specification of state probabilities. The enhanced portfolio also dominates the market portfolio in terms of model-implied Sortino ratios and certainty equivalent rates based on power utility with a relative risk aversion coefficient of 2, 3 and 4 (low, medium and high risk aversion).
The next seven rows of Table \ref{table:symresults} report sample moments of the realized excess returns of the market portfolio and of the market portfolio enhanced with the layover portfolios. These realized moments are very different to the model-implied moments reported in the previous seven rows, and reveal very poor realized performance of the enhanced portfolios. Focusing first on the market portfolio, we see that the mean excess return is 10.06\%, outperforming the median model-implied mean of 8.27\%. Excess returns have a large negative skew of -1.56, inconsistent with our symmetric specification of state probabilities. The enhanced portfolio with $S=1$ has a realized mean excess return of only 2.21\%, despite the median model-implied mean excess return being above 14\%. The Sortino ratio and certainty equivalent rates indicate very poor performance of the enhanced portfolio with $S=1$. For larger choices of $S$ we see qualitatively similar performance of the enhanced portfolio, although with $S=1000$ performance is somewhat closer to the market portfolio due to the limited availability of options.
The final two rows of Table \ref{table:symresults} report the outcome of statistical tests of stochastic dominance. The null hypothesis is first- or second-order stochastic dominance of the enhanced portfolio excess return over the market portfolio excess return. The hypothesis is rejected at the 5\% significance level for all market depth constraints and for both first- and second-order stochastic dominance, except for the strongest market depth constraint with second-order stochastic dominance, where we have a borderline significant p-value of 0.055. Our test statistics are uniformly weighted Cram\'{e}r-von Mises statistics as in \citet{LintonSongWhang10}, with p-values obtained by using the bootstrap to simulate the distribution of the test statistic at the least favorable case under the null, i.e.\ equality of distributions. We implemented the bootstrap by resampling 12 month blocks of pairs of excess returns so as to account for serial dependence and dependence between portfolios. Similar results were obtained using block sizes of 3-12 months. We conclude from these tests that our pursuit of stochastic arbitrage has failed.
\begin{figure*}
\caption{Layover portfolio payoffs using symmetric specification}
\vspace*{-.3cm}
\begin{center}
\begin{tikzpicture}[scale=3.5]
\draw[black, thick,<->] (0,-.6) -- (0,.6);
\draw[black, thick,<->] (-.1,-.5) -- (1.5,-.5);
\draw ({(.9-.875)*1.5/(1.075-.875)},{-.5cm+0.3pt}) -- ({(.9-.875)*1.5/(1.075-.875)},{-.5cm-1pt})
node[anchor=north,font=\scriptsize] {$.9$};
\draw ({(.95-.875)*1.5/(1.075-.875)},{-.5cm+0.3pt}) -- ({(.95-.875)*1.5/(1.075-.875)},{-.5cm-1pt})
node[anchor=north,font=\scriptsize] {$.95$};
\draw ({(1-.875)*1.5/(1.075-.875)},{-.5cm+0.3pt}) -- ({(1-.875)*1.5/(1.075-.875)},{-.5cm-1pt})
node[anchor=north,font=\scriptsize] {$1$};
\draw ({(1.05-.875)*1.5/(1.075-.875)},{-.5cm+0.3pt}) -- ({(1.05-.875)*1.5/(1.075-.875)},{-.5cm-1pt})
node[anchor=north,font=\scriptsize] {$1.05$};
\draw (0.3pt,{-.1*.6/.14}) -- (-0.8pt,{-.1*.6/.14});
\draw (0.3pt,{-.05*.6/.14}) -- (-0.8pt,{-.05*.6/.14});
\draw (0.3pt,0) -- (-0.8pt,0);
\draw (0.3pt,{.05*.6/.14}) -- (-0.8pt,{.05*.6/.14});
\draw (0.3pt,{.1*.6/.14}) -- (-0.8pt,{.1*.6/.14});
\node[left,font=\scriptsize] at (0,{-.1*.6/.14}) {$-.1$};
\node[left,font=\scriptsize] at (0,{-.05*.6/.14}) {$-.05$};
\node[left,font=\scriptsize] at (0,0) {$0$};
\node[left,font=\scriptsize] at (0,{.05*.6/.14}) {$.05$};
\node[left,font=\scriptsize] at (0,{.1*.6/.14}) {$.1$};
\begin{scope}[xscale={1.5/(1.075-.875)},yscale={.6/.14},xshift={-.875cm},yshift=0]
\draw[red,thick] plot file {payoff50SA2_sym06.txt};
\draw[blue,dashed] plot file {payoff25SA2_sym06.txt};
\draw[blue,dashed] plot file {payoff75SA2_sym06.txt};
\end{scope}
\draw[thick,only marks,olive] plot[mark=*,mark size=.15pt] file {realizedpayoffSA2_sym06.txt};
\node[font=\small] at ({2/3},-.725) {SPX at expiry};
\node[rotate=90,font=\small] at (-.275,0) {LP layover portfolio payoff};
\end{tikzpicture}
\hspace*{1cm}
\begin{tikzpicture}[scale=3.5]
\draw[black, thick,<->] (0,-.6) -- (0,.6);
\draw[black, thick,<->] (-.1,-.5) -- (1.5,-.5);
\draw ({(.9-.875)*1.5/(1.075-.875)},{-.5cm+0.3pt}) -- ({(.9-.875)*1.5/(1.075-.875)},{-.5cm-1pt})
node[anchor=north,font=\scriptsize] {$.9$};
\draw ({(.95-.875)*1.5/(1.075-.875)},{-.5cm+0.3pt}) -- ({(.95-.875)*1.5/(1.075-.875)},{-.5cm-1pt})
node[anchor=north,font=\scriptsize] {$.95$};
\draw ({(1-.875)*1.5/(1.075-.875)},{-.5cm+0.3pt}) -- ({(1-.875)*1.5/(1.075-.875)},{-.5cm-1pt})
node[anchor=north,font=\scriptsize] {$1$};
\draw ({(1.05-.875)*1.5/(1.075-.875)},{-.5cm+0.3pt}) -- ({(1.05-.875)*1.5/(1.075-.875)},{-.5cm-1pt})
node[anchor=north,font=\scriptsize] {$1.05$};
\draw (0.3pt,{-.1*.6/.14}) -- (-0.8pt,{-.1*.6/.14});
\draw (0.3pt,{-.05*.6/.14}) -- (-0.8pt,{-.05*.6/.14});
\draw (0.3pt,0) -- (-0.8pt,0);
\draw (0.3pt,{.05*.6/.14}) -- (-0.8pt,{.05*.6/.14});
\draw (0.3pt,{.1*.6/.14}) -- (-0.8pt,{.1*.6/.14});
\node[left,font=\scriptsize] at (0,{-.1*.6/.14}) {$-.1$};
\node[left,font=\scriptsize] at (0,{-.05*.6/.14}) {$-.05$};
\node[left,font=\scriptsize] at (0,0) {$0$};
\node[left,font=\scriptsize] at (0,{.05*.6/.14}) {$.05$};
\node[left,font=\scriptsize] at (0,{.1*.6/.14}) {$.1$};
\begin{scope}[xscale={1.5/(1.075-.875)},yscale={.6/.14},xshift={-.875cm},yshift=0]
\draw[red,thick] plot file {payoff50SA1_sym06.txt};
\draw[blue,dashed] plot file {payoff25SA1_sym06.txt};
\draw[blue,dashed] plot file {payoff75SA1_sym06.txt};
\end{scope}
\draw[thick,only marks,olive] plot[mark=*,mark size=.15pt] file {realizedpayoffSA1_sym06.txt};
\node[font=\small] at ({2/3},-.725) {SPX at expiry};
\node[rotate=90,font=\small] at (-.275,0) {MILP layover portfolio payoff};
\end{tikzpicture}
\end{center}
\vspace*{-.3cm}
{\small \emph{Notes:} The left and right panels show the payoffs of the layover portfolios selected using LP and MILP with the unit market depth constraint ($S = 1$) and our symmetric specification of state probabilities. One unit on the axes corresponds to the current value of the SPX. The pointwise median of the 215 one month ahead payoff functions is shown as a solid line, and the pointwise first and third quartiles are shown as dashed lines. The realized payoffs are shown as solid dots.}\label{fig:sympayoffs}
\end{figure*}
When statistical tests cannot reject the null hypothesis of stochastic dominance it may be relevant to test the null hypothesis of non-dominance within some region of returns using the statistics proposed by \citet{Davidson09}, so as to avoid false classifications of dominance. These tests of the null of non-dominance cannot lead to rejection unless the relevant empirical distributions satisfy strict dominance within the region of interest. In all tests of the null of dominance applied in this study, we do not observe strict dominance of the enhanced portfolio excess returns over the market portfolio excess returns within the range of strikes, so we know that tests of the null of non-dominance within this region cannot reject. This is consistent with the analysis of monthly options data in \citet{PostLongarela21}, where all tests of the null of non-dominance yield p-values of 1.00.
The bottom half of Table \ref{table:symresults} reports results analogous to those in the top half, but for the case where portfolios are selected using MILP, so that first-order stochastic arbitrage opportunities are sought. The stronger stochastic dominance constraint imposed in MILP results in the enhanced portfolios performing more similarly to the market portfolio than they do when selected with LP. Nevertheless, the general conclusions we draw from the bottom half of Table \ref{table:symresults} are the same as those we draw from the top half: MILP frequently identifies stochastic arbitrage opportunities which are expected to wildly outperform the market portfolio, but which in fact perform much more poorly than the market portfolio.
Figure \ref{fig:sympayoffs} displays the payoffs of the layover portfolios selected by LP and MILP (left and right panels) using our symmetric specification of state probabilities, focusing on the unit market depth constraint ($S=1$). In each panel, the solid line plots the pointwise median of the payoff functions of the 215 selected layover portfolios, and the dashed lines plot the first and third quartiles. Dots show the payoffs which are realized. There are two key things to observe. The first is that the selected layover portfolios exhibit a strong tendency to deliver positive payoffs when the SPX return is negative and negative payoffs when the SPX return is positive. Since the layover portfolios are constrained to deliver zero payoff when the SPX falls by more than 10\% or rises by more than 5\%, this gives the layover portfolio payoff functions a distinctive N shape. The second thing to observe is that the preponderance of SPX returns are positive, leading the preponderance of layover portfolio payoffs to be nonpositive. Our results in Table \ref{table:symresults} indicate that the option premia collected are not sufficient to offset the many negative layover portfolio payoffs, leading to poor performance of the enhanced portfolios.
LP and MILP have a single user-specified input: the state probabilities. If state probabilities are poorly chosen, LP and MILP may select portfolios which perform poorly. To assess our specification of state probabilities we applied the approach discussed in \citet{DieboldGuntherTay98}, which involves assessing the uniformity of probability integral transforms (PITs). For each date $t$ at which options expire we computed the PIT $F_t(x_{t})$, where $x_t$ is the value of the SPX at date $t$, and $F_t$ is the lognormal cumulative distribution function used to predict $x_t$ when options are selected one month prior. Figure \ref{fig:PIT} displays the proportion of PITs belonging to each decile of the unit interval. If state probabilities are correctly specified then the PITs should be distributed uniformly over the unit interval, so that the proportion of PITs belonging to each decile is close to 0.1 if the PITs are uniform. Clearly, this is not the case. The proportions are well above 0.1 at higher deciles (excluding the tenth decile) and well below 0.1 at lower deciles (and also the tenth decile). This indicates that our specification of state probabilities assigns too much probability to negative SPX returns and not enough to moderately positive SPX returns. Under the null hypothesis of correctly specified state probabilities, each proportion should fall within the bands around 0.1 indicated with dashed lines with probability 0.95. Four out of ten proportions fall outside the bands.
\begin{figure}
\caption{PITs using symmetric specification}\label{fig:PIT}
\vspace*{-.3cm}
\begin{center}
\begin{tikzpicture}[scale=3.5]
\draw[black, thick,->] (0,0) -- (0,1.1);
\draw[black, thick] (0,0) -- (1,0);
\draw (0,0.3pt) -- (0,-1pt)
node[anchor=north,font=\scriptsize] {$0$};
\draw (.2,0.3pt) -- (.2,-1pt)
node[anchor=north,font=\scriptsize] {$.2$};
\draw (.4,0.3pt) -- (.4,-1pt)
node[anchor=north,font=\scriptsize] {$.4$};
\draw (.6,0.3pt) -- (.6,-1pt)
node[anchor=north,font=\scriptsize] {$.6$};
\draw (.8,0.3pt) -- (.8,-1pt)
node[anchor=north,font=\scriptsize] {$.8$};
\draw (1,0.3pt) -- (1,-1pt)
node[anchor=north,font=\scriptsize] {$1$};
\draw (0.3pt,0) -- (-0.8pt,0);
\draw (0.3pt,{1/4}) -- (-0.8pt,{1/4});
\draw (0.3pt,{2/4}) -- (-0.8pt,{2/4});
\draw (0.3pt,{3/4}) -- (-0.8pt,{3/4});
\draw (0.3pt,{4/4}) -- (-0.8pt,{4/4});
\node[left,font=\scriptsize] at (0,0) {$0$};
\node[left,font=\scriptsize] at (0,{1/4}) {$.05$};
\node[left,font=\scriptsize] at (0,{2/4}) {$.1$};
\node[left,font=\scriptsize] at (0,{3/4}) {$.15$};
\node[left,font=\scriptsize] at (0,{4/4}) {$.2$};
\draw[fill=blue!30] (0,0) rectangle (.1,{.0884/.2});
\draw[fill=blue!30] (.1,0) rectangle (.2,{.0605/.2});
\draw[fill=blue!30] (.2,0) rectangle (.3,{.0744/.2});
\draw[fill=blue!30] (.3,0) rectangle (.4,{.0605/.2});
\draw[fill=blue!30] (.4,0) rectangle (.5,{.0791/.2});
\draw[fill=blue!30] (.5,0) rectangle (.6,{.1442/.2});
\draw[fill=blue!30] (.6,0) rectangle (.7,{.1767/.2});
\draw[fill=blue!30] (.7,0) rectangle (.8,{.2000/.2});
\draw[fill=blue!30] (.8,0) rectangle (.9,{.1023/.2});
\draw[fill=blue!30] (.9,0) rectangle (1,{.0140/.2});
\draw[dashed] (0,{1.4/2}) -- (1,{1.4/2});
\draw[dashed] (0,{.6/2}) -- (1,{.6/2});
\end{tikzpicture}
\end{center}
\vspace*{-.3cm}
{\small \emph{Notes:} The figure shows the proportion of probability integral transforms belonging to each tenth of the unit interval under our symmetric specification of state probabilities. Proportions should fall between the dashed lines with probability 0.95 if state probabilities are correctly calibrated.}
\end{figure}
To investigate the nature of our misspecification of state probabilities we return to the comparison of model-implied and realized moments of SPX excess returns in Table \ref{table:symresults}. The first thing we notice is that the model-implied mean excess return is nearly two percentage points lower than the realized mean excess return. This raises the possibility that our assumed market risk premium of 6\% is too low, and that this is responsible for the nonuniformity of PITs in Figure \ref{fig:PIT}. In fact, we found that increasing the assumed market risk premium to 8\% has little effect on the selected layover portfolios, and does not remedy the nonuniformity of PITs in Figure \ref{fig:PIT}. We discuss the robustness of our results to the choice of market risk premium further in Section \ref{sec:premium}. The model-implied standard deviation of SPX excess returns is shown in Table \ref{table:symresults} to be about 14\%, compared to the realized standard deviation of about 18\%. The model-implied standard deviation can be raised by 2\% by eliminating the assumed volatility risk premium, but we found that this also did little to improve the nonuniformity of PITs in Figure \ref{fig:PIT}.
\begin{figure
\caption{Distribution of normalized SPX returns}\label{fig:PDFs}
\vspace*{-.3cm}
\begin{center}
\begin{tikzpicture}[scale=3.5]
\draw[black, thick,->] (0,0) -- (0,1.1);
\draw[black, thick] (0,0) -- (1.5,0);
\draw (0,0.3pt) -- (0,-1pt)
node[anchor=north,font=\scriptsize] {$-3$};
\draw (0.3,0.3pt) -- (0.3,-1pt)
node[anchor=north,font=\scriptsize] {$-2$};
\draw (0.6,0.3pt) -- (0.6,-1pt)
node[anchor=north,font=\scriptsize] {$-1$};
\draw (0.9,0.3pt) -- (0.9,-1pt)
node[anchor=north,font=\scriptsize] {$0$};
\draw (1.2,0.3pt) -- (1.2,-1pt)
node[anchor=north,font=\scriptsize] {$1$};
\draw (1.5,0.3pt) -- (1.5,-1pt)
node[anchor=north,font=\scriptsize] {$2$};
\draw (0.3pt,0) -- (-0.8pt,0);
\draw (0.3pt,{1/4}) -- (-0.8pt,{1/4});
\draw (0.3pt,{2/4}) -- (-0.8pt,{2/4});
\draw (0.3pt,{3/4}) -- (-0.8pt,{3/4});
\draw (0.3pt,{4/4}) -- (-0.8pt,{4/4});
\node[left,font=\scriptsize] at (0,0) {$0$};
\node[left,font=\scriptsize] at (0,{1/4}) {$.1$};
\node[left,font=\scriptsize] at (0,{2/4}) {$.2$};
\node[left,font=\scriptsize] at (0,{3/4}) {$.3$};
\node[left,font=\scriptsize] at (0,{4/4}) {$.4$};
\draw[fill=blue!30] (0,0) rectangle (.15,{0.0140/.4});
\draw[fill=blue!30] (.15,0) rectangle (.3,{0.0093/.4});
\draw[fill=blue!30] (.3,0) rectangle (.45,{0.0279/.4});
\draw[fill=blue!30] (.45,0) rectangle (.6,{0.0605/.4});
\draw[fill=blue!30] (.6,0) rectangle (.75,{0.0977/.4});
\draw[fill=blue!30] (.75,0) rectangle (.9,{0.1395/.4});
\draw[fill=blue!30] (.9,0) rectangle (1.05,{0.3163/.4});
\draw[fill=blue!30] (1.05,0) rectangle (1.2,{0.2419/.4});
\draw[fill=blue!30] (1.2,0) rectangle (1.35,{0.0651/.4});
\draw[fill=blue!30] (1.35,0) rectangle (1.5,{0.0140/.4});
\draw[red,thick] plot file {normpdf.txt};
\draw[blue,thick,dashed] plot file {sgtpdf.txt};
\end{tikzpicture}
\end{center}
\vspace*{-.3cm}
{\small \emph{Notes:} The figure shows a histogram of SPX returns normalized by model-implied location and scale. Overlaid on this are the probability density functions for the standard normal distribution (solid) and skewed generalized t-distribution (dashed), suitably scaled.}
\end{figure}
The median model-implied skew of the SPX excess returns shown in Table \ref{table:symresults} is close to zero at 0.13, compared to a realized skew of -1.56. The model-implied skew would be exactly zero if we computed it using a logarithmic approximation to excess returns, due to the symmetry of the normal distribution. Our symmetric specification of state probabilities implies that the SPX returns (calculated with a logarithmic approximation) normalized by location and scale should be standard normal. In Figure \ref{fig:PDFs} we display a histogram of the realized SPX returns normalized by model-implied location and scale, with the standard normal probability density function overlaid (solid line). It is apparent that the standard normal distribution provides a very poor approximation to the distribution of SPX returns, due to the strong negative skew of the latter. In particular, the standard normal distribution assigns far too little probability to small positive returns. This observation motivates our second specification of state probabilities using the skewed generalized t-distribution proposed in \citet{Theodossiou98}. Tables 1-4 in that article show the skew generated by a wide range of values of the three parameters (shape, degrees of freedom and asymmetry) of the skewed generalized t-distribution. We see there that setting the parameters equal to 1.25, 5 and -0.2 generates a skew of -1.52, very close to the realized skew of -1.56 for our market excess returns. The dashed line in Figure \ref{fig:PDFs} plots the probability density function for this parametrization of the skewed generalized t-distribution. We see that it more accurately captures the shape of the distribution of normalized SPX returns than does the standard normal distribution, and in particular it does a much better job of predicting the frequency of small positive returns. We combine this parametrization of the skewed generalized t-distribution with an assumed market risk premium of 6\% and volatility risk premium of 2\% to obtain the second specification of state probabilities used as inputs to LP and MILP.
\begin{figure}
\caption{PITs using skewed specification}\label{fig:PITskew}
\vspace*{-.3cm}
\begin{center}
\begin{tikzpicture}[scale=3.5]
\draw[black, thick,->] (0,0) -- (0,1.1);
\draw[black, thick] (0,0) -- (1,0);
\draw (0,0.3pt) -- (0,-1pt)
node[anchor=north,font=\scriptsize] {$0$};
\draw (.2,0.3pt) -- (.2,-1pt)
node[anchor=north,font=\scriptsize] {$.2$};
\draw (.4,0.3pt) -- (.4,-1pt)
node[anchor=north,font=\scriptsize] {$.4$};
\draw (.6,0.3pt) -- (.6,-1pt)
node[anchor=north,font=\scriptsize] {$.6$};
\draw (.8,0.3pt) -- (.8,-1pt)
node[anchor=north,font=\scriptsize] {$.8$};
\draw (1,0.3pt) -- (1,-1pt)
node[anchor=north,font=\scriptsize] {$1$};
\draw (0.3pt,0) -- (-0.8pt,0);
\draw (0.3pt,{1/4}) -- (-0.8pt,{1/4});
\draw (0.3pt,{2/4}) -- (-0.8pt,{2/4});
\draw (0.3pt,{3/4}) -- (-0.8pt,{3/4});
\draw (0.3pt,{4/4}) -- (-0.8pt,{4/4});
\node[left,font=\scriptsize] at (0,0) {$0$};
\node[left,font=\scriptsize] at (0,{1/4}) {$.05$};
\node[left,font=\scriptsize] at (0,{2/4}) {$.1$};
\node[left,font=\scriptsize] at (0,{3/4}) {$.15$};
\node[left,font=\scriptsize] at (0,{4/4}) {$.2$};
\draw[fill=blue!30] (0,0) rectangle (.1,{.1163/.2});
\draw[fill=blue!30] (.1,0) rectangle (.2,{.1070/.2});
\draw[fill=blue!30] (.2,0) rectangle (.3,{.0605/.2});
\draw[fill=blue!30] (.3,0) rectangle (.4,{.0605/.2});
\draw[fill=blue!30] (.4,0) rectangle (.5,{.0884/.2});
\draw[fill=blue!30] (.5,0) rectangle (.6,{.0744/.2});
\draw[fill=blue!30] (.6,0) rectangle (.7,{.1256/.2});
\draw[fill=blue!30] (.7,0) rectangle (.8,{.1023/.2});
\draw[fill=blue!30] (.8,0) rectangle (.9,{.1767/.2});
\draw[fill=blue!30] (.9,0) rectangle (1,{.0884/.2});
\draw[dashed] (0,{1.4/2}) -- (1,{1.4/2});
\draw[dashed] (0,{.6/2}) -- (1,{.6/2});
\end{tikzpicture}
\end{center}
\vspace*{-.3cm}
{\small \emph{Notes:} The figure shows the proportion of probability integral transforms belonging to each tenth of the unit interval under our skewed specification of state probabilities. Proportions should fall between the dashed lines with probability 0.95 if state probabilities are correctly calibrated.}
\end{figure}
\begin{figure*}
\caption{Layover portfolio payoffs using skewed specification}\label{fig:skewpayoffs}
\vspace*{-.3cm}
\begin{center}
\begin{tikzpicture}[scale=3.5]
\draw[black, thick,<->] (0,-.6) -- (0,.6);
\draw[black, thick,<->] (-.1,-.5) -- (1.5,-.5);
\draw ({(.9-.875)*1.5/(1.075-.875)},{-.5cm+0.3pt}) -- ({(.9-.875)*1.5/(1.075-.875)},{-.5cm-1pt})
node[anchor=north,font=\scriptsize] {$.9$};
\draw ({(.95-.875)*1.5/(1.075-.875)},{-.5cm+0.3pt}) -- ({(.95-.875)*1.5/(1.075-.875)},{-.5cm-1pt})
node[anchor=north,font=\scriptsize] {$.95$};
\draw ({(1-.875)*1.5/(1.075-.875)},{-.5cm+0.3pt}) -- ({(1-.875)*1.5/(1.075-.875)},{-.5cm-1pt})
node[anchor=north,font=\scriptsize] {$1$};
\draw ({(1.05-.875)*1.5/(1.075-.875)},{-.5cm+0.3pt}) -- ({(1.05-.875)*1.5/(1.075-.875)},{-.5cm-1pt})
node[anchor=north,font=\scriptsize] {$1.05$};
\draw (0.3pt,{-.1*.6/.14}) -- (-0.8pt,{-.1*.6/.14});
\draw (0.3pt,{-.05*.6/.14}) -- (-0.8pt,{-.05*.6/.14});
\draw (0.3pt,0) -- (-0.8pt,0);
\draw (0.3pt,{.05*.6/.14}) -- (-0.8pt,{.05*.6/.14});
\draw (0.3pt,{.1*.6/.14}) -- (-0.8pt,{.1*.6/.14});
\node[left,font=\scriptsize] at (0,{-.1*.6/.14}) {$-.1$};
\node[left,font=\scriptsize] at (0,{-.05*.6/.14}) {$-.05$};
\node[left,font=\scriptsize] at (0,0) {$0$};
\node[left,font=\scriptsize] at (0,{.05*.6/.14}) {$.05$};
\node[left,font=\scriptsize] at (0,{.1*.6/.14}) {$.1$};
\begin{scope}[xscale={1.5/(1.075-.875)},yscale={.6/.14},xshift={-.875cm},yshift=0]
\draw[red,thick] plot file {payoff50SA2_skw06.txt};
\draw[blue,dashed] plot file {payoff25SA2_skw06.txt};
\draw[blue,dashed] plot file {payoff75SA2_skw06.txt};
\end{scope}
\draw[thick,only marks,olive] plot[mark=*,mark size=.15pt] file {realizedpayoffSA2_skw06.txt};
\node[font=\small] at ({2/3},-.725) {SPX at expiry};
\node[rotate=90,font=\small] at (-.275,0) {LP layover portfolio payoff};
\end{tikzpicture}
\hspace*{1cm}
\begin{tikzpicture}[scale=3.5]
\draw[black, thick,<->] (0,-.6) -- (0,.6);
\draw[black, thick,<->] (-.1,-.5) -- (1.5,-.5);
\draw ({(.9-.875)*1.5/(1.075-.875)},{-.5cm+0.3pt}) -- ({(.9-.875)*1.5/(1.075-.875)},{-.5cm-1pt})
node[anchor=north,font=\scriptsize] {$.9$};
\draw ({(.95-.875)*1.5/(1.075-.875)},{-.5cm+0.3pt}) -- ({(.95-.875)*1.5/(1.075-.875)},{-.5cm-1pt})
node[anchor=north,font=\scriptsize] {$.95$};
\draw ({(1-.875)*1.5/(1.075-.875)},{-.5cm+0.3pt}) -- ({(1-.875)*1.5/(1.075-.875)},{-.5cm-1pt})
node[anchor=north,font=\scriptsize] {$1$};
\draw ({(1.05-.875)*1.5/(1.075-.875)},{-.5cm+0.3pt}) -- ({(1.05-.875)*1.5/(1.075-.875)},{-.5cm-1pt})
node[anchor=north,font=\scriptsize] {$1.05$};
\draw (0.3pt,{-.1*.6/.14}) -- (-0.8pt,{-.1*.6/.14});
\draw (0.3pt,{-.05*.6/.14}) -- (-0.8pt,{-.05*.6/.14});
\draw (0.3pt,0) -- (-0.8pt,0);
\draw (0.3pt,{.05*.6/.14}) -- (-0.8pt,{.05*.6/.14});
\draw (0.3pt,{.1*.6/.14}) -- (-0.8pt,{.1*.6/.14});
\node[left,font=\scriptsize] at (0,{-.1*.6/.14}) {$-.1$};
\node[left,font=\scriptsize] at (0,{-.05*.6/.14}) {$-.05$};
\node[left,font=\scriptsize] at (0,0) {$0$};
\node[left,font=\scriptsize] at (0,{.05*.6/.14}) {$.05$};
\node[left,font=\scriptsize] at (0,{.1*.6/.14}) {$.1$};
\begin{scope}[xscale={1.5/(1.075-.875)},yscale={.6/.14},xshift={-.875cm},yshift=0]
\draw[red,thick] plot file {payoff50SA1_skw06.txt};
\draw[blue,dashed] plot file {payoff25SA1_skw06.txt};
\draw[blue,dashed] plot file {payoff75SA1_skw06.txt};
\end{scope}
\draw[thick,only marks,olive] plot[mark=*,mark size=.15pt] file {realizedpayoffSA1_skw06.txt};
\node[font=\small] at ({2/3},-.725) {SPX at expiry};
\node[rotate=90,font=\small] at (-.275,0) {MILP layover portfolio payoff};
\end{tikzpicture}
\end{center}
\vspace*{-.3cm}
{\small \emph{Notes:} The left and right panels show the payoffs of the layover portfolios selected using LP and MILP with the unit market depth constraint ($S = 1$) and our skewed specification of state probabilities. One unit on the axes corresponds to the current value of the SPX. The pointwise median of the 215 one month ahead payoff functions is shown as a solid line, and the pointwise first and third quartiles are shown as dashed lines, but all three lines are mostly flat at zero. The realized payoffs are shown as solid dots.}
\end{figure*}
Figure \ref{fig:PITskew} displays the proportion of PITs belonging to each decile of the unit interval using our skewed specification of state probabilities. Ideally we would like to see all of these proportions equal to 0.1. While this is not the case, the proportions overall more closely resemble uniformity than those shown for the symmetric specification in Figure \ref{fig:PIT}. One out of ten proportions falls outside the 95\% bands around 0.1. This reflects the mismatch between the skewed probability density function and the histogram bar between 0.5 and 1 in Figure \ref{fig:PDFs}. Increasing the market risk premium from 6\% to 8\% has the effect of reducing the offending proportion in Figure \ref{fig:PITskew} so that it falls just outside the upper 95\% band.
Table \ref{table:skewresults} shows how the results reported in Table \ref{table:symresults} change when we replace the symmetric specification of state probabilities with the skewed specification. The change is dramatic. With LP, the percentage of months in which a second-order stochastic arbitrage opportunity is detected with premium exceeding 0.1\% of the market investment drops roughly fivefold using the skewed specification, varying from 13\% with the weakest market depth constraint to 5\% with the strongest. It is therefore unsurprising that the performance of the enhanced portfolio is similar to the performance of the market portfolio. With the weakest market depth constraint the realized mean excess return for the enhanced portfolio is 1.4 annualized percentage points lower than for the market portfolio. The discrepancy diminishes as we tighten the market depth constraint. It diminishes further if we increase the assumed market risk premium to 8\%, as we discuss in Section \ref{sec:premium}. The realized Sortino ratios and certainty equivalent rates paint a similar picture of the relative performance of the market and enhanced portfolios. Our statistical tests of stochastic dominance cannot reject the null hypotheses that the excess returns for our enhanced portfolio first- or second-order stochastically dominate those for the market portfolio. This is because the two excess return distributions are similar. Note that equality of distributions should be understood to be a special case of stochastic dominance.
\begin{table*}
\centering
{\small
\begin{threeparttable}
\caption{Characteristics of portfolios selected with LP and MILP using skewed specification}\label{table:skewresults}
\begin{tabular}{r|llccccc}
\toprule
\multicolumn{4}{c}{}&\multicolumn{4}{c}{Enhanced portfolio}\\\cmidrule{5-8}
\multicolumn{3}{c}{}& SPX & $S=1$ & $S=10$ & $S=100$ & $S=1000$\\
\midrule
\multirow{24}{*}{LP}&Percentage of monthly premia exceeding&&& 13.5 & 10.7 & 8.4 & 5.1 \\
&$\quad$0.1pct of market investment&&&&&&\\
&Value of options as a percentage of&Calls bought&& 1.5 & 0.9 & 0.6 & 0.3 \\
&$\quad$market investment (average)&Calls written&& 1.6 & 1.1 & 0.7 & 0.4 \\
&&Puts bought&& 0.6 & 0.4 & 0.3 & 0.3 \\
&&Puts written&& 0.7 & 0.3 & 0.3 & 0.2 \\
&Layover portfolio Greeks (average$/S$)&Delta&& -0.06 & -0.05 & -0.04 & -0.03 \\
&&Vega&& -6.4 & -4.3 & -1.6 & -1.7 \\
&Median model-implied moments of&Mean&8.04& 8.38 & 8.38 & 8.38 & 8.36 \\
&$\quad$excess returns&Std.\ dev.&13.61& 13.61 & 13.61 & 13.61 & 13.46 \\
&&Skew&-1.00& -1.00 & -1.00 & -1.00 & -1.01 \\
&&Sortino&0.71& 0.80 & 0.79 & 0.78 & 0.78 \\
&&CER-2&6.49& 6.95 & 6.93 & 6.86 & 6.86 \\
&&CER-3&5.50& 6.03 & 5.97 & 5.95 & 5.93 \\
&&CER-4&4.53& 5.07 & 5.07 & 5.00 & 5.00 \\
&Realized moments of excess returns&Mean&10.06& 8.62 & 8.99 & 9.01 & 9.41 \\
&&Std.\ dev.&17.79& 17.61 & 17.60 & 17.64 & 17.63 \\
&&Skew&-1.56& -1.47 & -1.49 & -1.48 & -1.51 \\
&&Sortino&0.73& 0.63 & 0.66 & 0.66 & 0.69 \\
&&CER-2&7.85& 6.53 & 6.89 & 6.89 & 7.28 \\
&&CER-3&5.74& 4.50 & 4.86 & 4.85 & 5.24 \\
&&CER-4&3.43& 2.30 & 2.64 & 2.63 & 3.00 \\
&Stochastic dominance p-values&First-order&& 0.086 & 0.099 & 0.114 & 0.070 \\
&&Second-order&& 0.102 & 0.144 & 0.083 & 0.088 \\
\midrule
\multirow{24}{*}{MILP}&Percentage of monthly premia exceeding&&& 1.9 & 2.3 & 1.4 & 0.0 \\
&$\quad$0.1pct of market investment&&&&&&\\
&Value of options as a percentage of&Calls bought&& 0.5 & 0.1 & 0.1 & 0.0 \\
&$\quad$market investment (average)&Calls written&& 0.4 & 0.1 & 0.1 & 0.0 \\
&&Puts bought&& 0.2 & 0.1 & 0.1 & 0.0 \\
&&Puts written&& 0.5 & 0.1 & 0.0 & 0.0 \\
&Layover portfolio Greeks (average$/S$)&Delta&& -0.00 & -0.01 & -0.00 & -0.00 \\
&&Vega&& -1.3 & -1.4 & -1.2 & -0.0 \\
&Median model-implied moments of&Mean&8.04& 8.08 & 8.08 & 8.08 & 8.08 \\
&$\quad$excess returns&Std.\ dev.&13.61& 13.61 & 13.61 & 13.68 & 13.61 \\
&&Skew&-1.00& -1.00 & -1.01 & -1.00 & -1.00 \\
&&Sortino&0.71& 0.72 & 0.72 & 0.72 & 0.72 \\
&&CER-2&6.49& 6.51 & 6.51 & 6.51 & 6.51 \\
&&CER-3&5.50& 5.50 & 5.54 & 5.54 & 5.50 \\
&&CER-4&4.53& 4.54 & 4.57 & 4.57 & 4.54 \\
&Realized moments of excess returns&Mean&10.06& 10.27 & 10.10 & 10.00 & 10.06 \\
&&Std.\ dev.&17.79& 17.74 & 17.73 & 17.77 & 17.79 \\
&&Skew&-1.56& -1.53 & -1.53 & -1.56 & -1.56 \\
&&Sortino&0.73& 0.75 & 0.74 & 0.73 & 0.73 \\
&&CER-2&7.85& 8.09 & 7.92 & 7.79 & 7.85 \\
&&CER-3&5.74& 5.99 & 5.83 & 5.69 & 5.74 \\
&&CER-4&3.43& 3.71 & 3.55 & 3.38 & 3.43 \\
&Stochastic dominance p-values&First-order&& 0.801 & 0.559 & 0.274 & 0.564 \\
&&Second-order&& 0.815 & 0.825 & 0.368 & 0.525 \\
\bottomrule
\end{tabular}
\begin{tablenotes}
\item \emph{Notes:} The table summarizes characteristics of portfolios chosen in 215 months from 2004–21 and held for 28 or 29 days. The portfolios considered are the market portfolio (SPX) and option-enhanced portfolios selected using LP or MILP with one of four market depth constraints ($S=1,10,100,100$) and our skewed specification of state probabilities.
\end{tablenotes}
\end{threeparttable}
}
\end{table*}
The results in Table \ref{table:skewresults} concerning the portfolios selected with MILP reveal that almost no significant first-order stochastic arbitrage opportunities are detected with this program. Out of the 215 months in our sample, MILP detects a first-order stochastic arbitrage opportunity with premium exceeding 0.1\% of the market investment in just four months with $S=1$, in five months with $S=10$, in three months with $S=100$, and never with $S=1000$. (Note that the number of such first-order stochastic arbitrage opportunities should be nonincreasing in $S$, so Gurobi must have failed to identify the correct solution to MILP in at least one month with $S=1$.) Since almost no significant first-order stochastic arbitrage opportunities are identified, the model-implied and realized moments of the excess returns of the market and enhanced portfolios are extremely similar, and tests of stochastic dominance cannot distinguish between the two.
Figure \ref{fig:skewpayoffs} displays the payoffs of the layover portfolios selected by LP and MILP using our skewed specification of state probabilities and unit market depth constraint, and may be compared to those for the symmetric specification in Figure \ref{fig:sympayoffs}. For MILP, the pointwise median and first and third quartiles of the selected payoff functions are now all flat at zero, and only two of the 215 realized payoffs (dots) are visually distinguishable from zero. For LP, the pointwise median of the selected payoff functions is flat at zero, and the first and third quartiles are flat at zero except for small deviations over a narrow region, with the first quartile never exceeding zero and the third quartile never falling below zero. We see that a substantial proportion of positive realized payoffs using LP occur when the SPX return is small and positive, which was not the case in Figure \ref{fig:sympayoffs}. This can be attributed to our skewed specification assigning a much higher probability to such returns than our symmetric specification.
Figure \ref{fig:timeline} shows the dates at which stochastic arbitrage opportunities with premium exceeding 0.1\% of the market investment are detected using LP with our skewed specification of state probabilities. The set of such dates diminishes as we tighten the market depth constraint. We see that stochastic arbitrage opportunities are mostly detected towards the end of our sample, from 2019 and beyond, and also near the start of our sample with the most relaxed market depth constraint. There is a notable absence of stochastic arbitrage opportunities detected in the middle of our sample, including the financial crisis period. We do not discern any particular correspondence between the timing of stochastic arbitrage detections and real-world events. The period at the end of our sample with relatively abundant detections of stochastic arbitrage does not seem to be attributable to the coronavirus pandemic as it includes the year 2019. A partial explanation for this period may be that, with options written at a greater range of strikes toward the end of our sample (see Table \ref{table:datasummary}), there are more chances for our algorithms to identify stochastic arbitrage opportunities. Another explanation may be that our skewed specification of state probabilities provides a poorer approximation to the distribution of SPX returns in the final years of our sample.
\subsection{Robustness to market risk premium}\label{sec:premium}
Our state probabilities used as inputs to LP and MILP depend on the choice of the market risk premium. The results reported in Section \ref{sec:results} are based on an assumed market risk premium of 6\%. In Table \ref{table:premiumresults} we show how the key results of our analysis are affected when the assumed market risk premium is lowered to 4\% \citep[as in][]{PostLongarela21} or increased to 8\%. For brevity we report the results of our sensitivity analysis only for the case of the unit market depth constraint.
\begin{figure}[b!]
\caption{Timeline of stochastic arbitrage opportunities}\label{fig:timeline}
\vspace*{-.3cm}
\begin{center}
\begin{tikzpicture}[scale=3.5]
\draw[black, thick,-] (0,0) -- (0,1);
\draw[black, thick,->] (0,0) -- (1.8,0);
\draw (0.3pt,.25) -- (-0.8pt,.25);
\draw (0.3pt,.5) -- (-0.8pt,.5);
\draw (0.3pt,.75) -- (-0.8pt,.75);
\draw (0.3pt,1) -- (-0.8pt,1);
\node[left,font=\scriptsize] at (0,.25) {$1$};
\node[left,font=\scriptsize] at (0,.5) {$10$};
\node[left,font=\scriptsize] at (0,.75) {$100$};
\node[left,font=\scriptsize] at (0,1) {$1000$};
\draw (0,0.3pt) -- (0,-0.8pt);
\draw ({(3*365+1)*1.8/6575},0.3pt) -- ({(3*365+1)*1.8/6575},-0.8pt);
\draw ({(6*365+2)*1.8/6575},0.3pt) -- ({(6*365+2)*1.8/6575},-0.8pt);
\draw ({(9*365+3)*1.8/6575},0.3pt) -- ({(9*365+3)*1.8/6575},-0.8pt);
\draw ({(12*365+3)*1.8/6575},0.3pt) -- ({(12*365+3)*1.8/6575},-0.8pt);
\draw ({(15*365+4)*1.8/6575},0.3pt) -- ({(15*365+4)*1.8/6575},-0.8pt);
\node[below,font=\scriptsize] at (0,0) {$2004$};
\node[below,font=\scriptsize] at ({(3*365+1)*1.8/6575},0) {$2007$};
\node[below,font=\scriptsize] at ({(6*365+2)*1.8/6575},0) {$2010$};
\node[below,font=\scriptsize] at ({(9*365+3)*1.8/6575},0) {$2013$};
\node[below,font=\scriptsize] at ({(12*365+3)*1.8/6575},0) {$2016$};
\node[below,font=\scriptsize] at ({(15*365+4)*1.8/6575},0) {$2019$};
\draw[thick,only marks,olive] plot[mark=*,mark size=.15pt] file {anomaliesS1.txt};
\draw[thick,only marks,olive] plot[mark=*,mark size=.15pt] file {anomaliesS10.txt};
\draw[thick,only marks,olive] plot[mark=*,mark size=.15pt] file {anomaliesS100.txt};
\draw[thick,only marks,olive] plot[mark=*,mark size=.15pt] file {anomaliesS1000.txt};
\node[font=\small] at (.9,-.175) {Year};
\node[font=\small] at (-.25,.5) {$S$};
\end{tikzpicture}
\end{center}
\vspace*{-.3cm}
{\small \emph{Notes:} The figure shows the dates at which stochastic arbitrage opportunities with premium exceeding 0.1\% of the market investment are detected using LP with our skewed specification of state probabilities, varying according to the market depth constraint with $S=1,10,100,1000$.}
\end{figure}
\begin{table*}[h]
\centering
{\small
\begin{threeparttable}
\caption{Sensitivity of key characteristics of selected portfolios to market risk premium}\label{table:premiumresults}
\begin{tabular}{r|c|llcccc}
\toprule
\multicolumn{5}{c}{}&\multicolumn{3}{c}{Enhanced portfolio by}\\
\multicolumn{5}{c}{}&\multicolumn{3}{c}{market risk premium}\\\cmidrule{6-8}
\multicolumn{4}{c}{}& SPX & 4\% & 6\% & 8\%\\
\midrule
\multirow{12}{*}{\STAB{\rotatebox[origin=c]{90}{Symmetric specification}}}&\multirow{7}{*}{LP}&Pctg.\ premia $>$ 0.1\% mkt. investment&&& 74.9 & 68.4 & 60.9 \\
&&Realized moments of excess returns&Mean&10.06& 2.35 & 2.21 & 3.16 \\
&&&Std.\ dev.&17.79& 17.77 & 17.73 & 17.73 \\
&&&Skew&-1.56& -0.95 & -0.97 & -1.03 \\
&&Stochastic dominance p-values&First-order&& 0.002 & 0.001 & 0.002 \\
&&&Second-order&& 0.012 & 0.009 & 0.014 \\
\cmidrule{2-8}
&\multirow{7}{*}{MILP}&Pctg.\ premia $>$ 0.1\% mkt. investment&&& 47.0 & 40.0 & 33.5 \\
&&Realized moments of excess returns&Mean&10.06& 5.41 & 6.40 & 6.09 \\
&&&Std.\ dev.&17.79& 17.96 & 18.10 & 18.01 \\
&&&Skew&-1.56& -1.11 & -1.16 & -1.19 \\
&&Stochastic dominance p-values&First-order&& 0.021 & 0.069 & 0.089 \\
&&&Second-order&& 0.048 & 0.090 & 0.086 \\
\midrule
\multirow{12}{*}{\STAB{\rotatebox[origin=c]{90}{Skewed specification}}}&\multirow{7}{*}{LP}&Pctg.\ premia $>$ 0.1\% mkt. investment&&& 27.9 & 13.5 & 6.5 \\
&&Realized moments of excess returns&Mean&10.06& 7.63 & 8.62 & 9.03 \\
&&&Std.\ dev.&17.79& 17.62 & 17.61 & 17.64 \\
&&&Skew&-1.56& -1.42 & -1.47 & -1.49 \\
&&Stochastic dominance p-values&First-order&& 0.040 & 0.086 & 0.100 \\
&&&Second-order&& 0.047 & 0.102 & 0.158 \\
\cmidrule{2-8}
&\multirow{7}{*}{MILP}&Pctg.\ premia $>$ 0.1\% mkt. investment&&& 2.8 & 1.9 & 0.5 \\
&&Realized moments of excess returns&Mean&10.06& 10.27 & 10.27 & 10.15 \\
&&&Std.\ dev.&17.79& 17.72 & 17.74 & 17.77 \\
&&&Skew&-1.56& -1.52 & -1.53 & -1.56 \\
&&Stochastic dominance p-values&First-order&& 0.886 & 0.801 & 0.695 \\
&&&Second-order&& 0.836 & 0.815 & 0.850 \\
\bottomrule
\end{tabular}
\begin{tablenotes}
\item \emph{Notes:} The table shows how key results reported in Tables \ref{table:symresults} and \ref{table:skewresults} for the unit market depth constraint ($S=1$) vary when the assumed market risk premium of 6\% is lowered to 4\% or raised to 8\%.
\end{tablenotes}
\end{threeparttable}
}
\end{table*}
The most interesting results in Table \ref{table:premiumresults} are those for the skewed specification with LP. We see that the percentage of months in which the selected portfolio has an option premium exceeding 0.1\% of the unit market investment is decreasing in the assumed market risk premium, falling from 27.9\% with a 4\% market risk premium to 13.5\% with a 6\% market risk premium, and falling further to only 6.5\% with an 8\% market risk premium. At the same time, the realized mean excess return of the selected portfolios is increasing in the market premium, rising from 7.63\% with a 4\% market risk premium to 9.03\% with an 8\% market risk premium. The realized standard deviation of excess returns remains approximately constant as we vary the market risk premium. We thus find that increasing the assumed market risk premium in our skewed specification from 4\% to 6\% to 8\% results in LP selecting portfolios which deviate from the market portfolio in fewer months while also delivering improved realized performance. The realized excess mean return for the market portfolio is 10.06\%, which is slightly higher than the enhanced portfolio mean excess return of 9.03\% with the 8\% market risk premium. The picture which emerges is thus one in which the pricing of options is broadly efficient when viewed through the lens of our skewed specification of state probabilities with a large market risk premium. Consistent with this thesis, we have found that the histogram of PITs in Figure \ref{fig:PITskew} more closely resembles uniformity when the market risk premium is increased from 6\% to 8\%.
\section{Concluding remarks}
We draw two main lessons from the empirical study reported in Section \ref{sec:empirical}. The first is that naively attempting to pursue stochastic arbitrage opportunities with LP or MILP when state probabilities are poorly specified can lead to very poor investment decisions. Layover portfolios selected using these programs are not guaranteed to generate stochastic arbitrage unless the state probabilities are well specified and take into account all relevant information embodied in the prevailing prices of options. A simple assessment of the uniformity of PITs shows that the symmetric specification of state probabilities used in our empirical implementation certainly does not satisfy this requirement, and consequently it leads to the selection of portfolios which perform very poorly.
The second main lesson we draw from our empirical implementation is that the skew of SPX returns plays a vital role in explaining the prices of SPX options. The overwhelming majority of the stochastic arbitrage opportunities we detected with our symmetric specification of state probabilities vanished when we switched to our skewed specification of state probabilities. The stochastic arbitrage opportunities which we did detect with our skewed specification did not generate realized profit and so may be attributed to residual misspecification of the state probabilities. Our results are consistent with the efficient pricing of monthly SPX options with moderate moneyness.
It is important to note that our analysis is confined to the prices of options with moderate moneyness, and in particular limits call options to be no more than 5\% out-of-the-money. Further out-of-the-money call options are included in the analysis in \citet{ConstantinidesCzerwonkoJackwerthPerrakis11,ConstantinidesCzerwonkoPerrakis20}, and it is emphasized there that out-of-the-money call options play an important role in the dominant portfolios and appear to be overpriced. Our results are not inconsistent with this observation. It seems plausible that pricing may be more efficient for options with moderate moneyness than it is for options that are further in- or out-of-the-money. The analysis in \citet{PostLongarela21} also includes a wider range of strikes than in the analysis presented here, but it is reported that the results therein identifying profitable stochastic arbitrage opportunities with the unit market depth constraint may not be robust to variations in the specification of state probabilities, while the results with tighter market depth constraints are robust but do not identify profitable stochastic arbitrage opportunities.
We see two natural directions in which the research presented here may be further developed. One is more audacious and the other more humble. The more audacious direction would involve the pursuit of improvements to our skewed specification of state probabilities, with the aim of using LP to transform them into stochastic arbitrage opportunities. Given the importance of skew in explaining option prices, it may be fruitful to investigate models of time-varying skew, such as the autoregressive model in \citet{HarveySiddique99}. The more humble direction may be to trust in the efficiency of option prices (in some range of strikes) and seek to develop methods for using them to improve our understanding of state probabilities, similar to what is done in \citet{BeareDossani18}. For instance, we might try to choose state probabilities to maximize entropy subject to the nonexistence of stochastic arbitrage opportunities. Future research may explore these possibilities.
\section*{Acknowledgements}
The authors thank Xinyi Luo and Zhongxi Zheng for able research assistance, especially Zhongxi for doing the lion's share of coding and providing vital advice on numerous occasions. The authors thank James Luedtke for his advice on mixed integer-linear programming, and Thierry Post and Stylianos Perrakis for helpful comments on an earlier draft. The authors acknowledge the Sydney Informatics Hub and the University of Sydney’s high performance computing cluster, Artemis, for providing computing resources that have contributed to the results reported herein. Beare acknowledges financial support from the National University of Singapore through the Isaac Manasseh Meyer Fellowship. Seo acknowledges financial support from the Singapore Ministry of Education under its Academic Research Fund Tier 1 (Project ID: R-122-000-297-115). The authors thank Larry Schmidt for many helpful contributions. This article grew out of an unpublished manuscript by Beare and Schmidt circulated in 2014 under the title ``Empirical implications of the pricing kernel puzzle for the return on contingent claims'' and is intended to supersede that manuscript.
\setcounter{equation}{0}
\renewcommand\theequation{A.\arabic{equation}}
\section*{Appendix}\label{sec:appx}
As discussed in Section \ref{sec:sd2}, the linear program LP differs from the linear program proposed in \citet{PostLongarela21} while providing an identical solution for the layover portfolio. The formulation of the latter linear program relies on the fact that a layover portfolio $(\boldsymbol{\alpha},\boldsymbol{\beta})\in\mathcal P$ satisfies the second-order stochastic dominance constraint \eqref{eq:sdconstraint} if and only if there exists an $n\times n$ nonnegative matrix $\boldsymbol{\Psi}$ such that
\begin{align}
\boldsymbol{\Psi}\boldsymbol{\mu}&\leq\mathbf{T}\boldsymbol{\mu},\label{eq:PLconstraint1}\\
-\boldsymbol{\Psi}^\top-\boldsymbol{\Theta}^\top(\boldsymbol{\alpha}-\boldsymbol{\beta})\mathbf{1}_n^\top&\leq\mathbf{x}\mathbf{1}_n^\top-\mathbf{1}_n\mathbf{x}^\top.\label{eq:PLconstraint2}
\end{align}
This fact is a consequence of results established in \citet{DentchevaRuszczynski03} and \citet{Kuosmanen04}; see also closely related results in \citet{RockafellarUryasev00} and \citet{Post03}, and the discussion following Lemma 2.1 in \citet{Luedtke08}. It justifies using the following linear program proposed in \citet{PostLongarela21} to compute the optimal layover portfolio.
\begin{LP*}
Choose two $m\times1$ nonnegative vectors $\boldsymbol{\alpha},\boldsymbol{\beta}$ and an $n\times n$ nonnegative matrix $\boldsymbol{\Psi}$ to maximize $-\mathbf{p}^\top\boldsymbol{\alpha}+\mathbf{q}^\top\boldsymbol{\beta}$ subject to the constraints \eqref{eq:PLconstraint1}, \eqref{eq:PLconstraint2}, and \eqref{eq:PLconstraint3}.
\end{LP*}
While LP and LP* provide identical solutions for $\boldsymbol{\alpha}$ and $\boldsymbol{\beta}$, the former program is computationally advantageous. The reason is that both sides of the inequality in \eqref{eq:PLconstraint2} are $n\times n$ matrices, meaning that this inequality is comprised of $n^2$ scalar inequalities. Constraints \eqref{eq:PLconstraint1} and \eqref{eq:PLconstraint2} in LP* therefore comprise a total of $n^2+n$ scalar inequalities, an order of magnitude greater than the $4n$ scalar equalities and inequalities comprising constraints \eqref{eq:Lconstraint1}, \eqref{eq:Lconstraint2}, \eqref{eq:Lconstraint3} and \eqref{eq:Lconstraint4} in LP.
We found in our empirical application that the gap in computational efficiency between LP and LP* is large. Table \ref{table:SA2runtime} reports the computational efficiency of the two programs when applied to the option data for the final date in our sample at which portfolios are selected -- November 17, 2021 -- and using the symmetric specification of state probabilities and unit market depth constraint. As in the computations reported in Figure \ref{fig:runtime}, we choose positions in a total of $m=255$ distinct option contracts, and our specification of the distribution of the SPX at expiry has a total of $n=140$ atoms within the range of strikes. With these settings we have 20254 scalar inequality and equality constraints in LP* compared to only 1074 scalar inequality and equality constraints in LP, not including the nonnegativity constraints on choice variables. We used Gurobi Optimizer 9.0.2 to solve the two linear programs using the dual simplex method. Gurobi input files were created using the Gurobi MATLAB interface. The input files were of size 241.8 MB for LP* and of size 4.7 MB for LP. Gurobi took 7.15 seconds to solve LP*, compared to only 0.71 seconds for LP. We observed similar large gaps in efficiency at other dates in our sample, although the gap is larger toward the end of the sample due to the fact that growth in the SPX over time necessitates the use of more atoms spread at 5 basis point increments to cover the range of strikes. See \citet{Luedtke08} for more extensive results documenting the gains in computational efficiency achieved by imposing second-order stochastic dominance using constraints \eqref{eq:Lconstraint1}, \eqref{eq:Lconstraint2}, \eqref{eq:Lconstraint3} and \eqref{eq:Lconstraint4} rather than constraints \eqref{eq:PLconstraint1} and \eqref{eq:PLconstraint2}.
\begin{table}
\centering
{\small
\begin{threeparttable}
\caption{Computational efficiency of LP and LP*}\label{table:SA2runtime}
\begin{tabular}{lrrr}
\toprule
&Ineq.\ \& eq.&Input file (MB)&Runtime (s)\\
\midrule
LP&1074&4.7&0.71\\
LP*&20254&241.8&7.15\\
\bottomrule
\end{tabular}
\begin{tablenotes}
\item \emph{Notes:} Computations were performed using Gurobi Optimizer 9.0.2 on a machine with 24 2.6 GHz processors and 16 GB of memory. The computed maximum premium, as a percentage of the unit investment in the SPX, was 2.07\% with both LP and LP*.
\end{tablenotes}
\end{threeparttable}
}
\end{table}
\bibliographystyle{nonumber}
|
\section*{Acknowledgments}
Edoardo Cetin and Oya Celiktutan would like to acknowledge the support from the Engineering and Physical Sciences Research Council [EP/R513064/1] and LISI Project [EP/V010875/1]. Philip J. Ball would like to thank the Willowgrove Foundation for support and funding. Furthermore, support from Toyota Motor Corporation contributed towards funding the utilized computational resources.
\section{Introduction}
\label{sec:intro}
One of the core challenges in real world Reinforcement Learning (RL) is achieving stable training with sample-efficient algorithms \citep{challenges-rl}. Combining these properties with the ability to reason from visual observations has great implications for the application of RL to the real world \citep{qt-opt, rl_real_world_ingredients}. Recent works utilizing \textit{temporal-difference} (TD-) learning have made great progress advancing sample-efficiency \citep{ddpg, td3, sac, learningpessimism}. However, stability has remained a key issue for these off-policy algorithms \citep{suttonTDlearning, unstable_off, deadly_triad, RL_stability_practical}, making their general applicability limited as compared to their on-policy counterparts \citep{ppo, ppg}. At the same time, using pixel observations has been another orthogonal source of instabilities, with several successful approaches relying on pre-training instead of end-to-end learning \citep{deepspatial-ae, actionable-repr}. In fact, alternative optimization objectives, large amounts of simulation data, and symbolic observations have been common factors in most contemporary large-scale RL milestones \citep{alphazero, alphastar, OpenAI5}.
In this work, we provide novel insights behind why applying successful off-policy RL algorithms designed for proprioceptive tasks to pixel-based environments is generally underwhelming \citep{slac, sacae}. In particular, we provide evidence that three key elements strongly correlate with the occurrence of detrimental instabilities: \textit{i)} \emph{Exclusive} reliance on the \emph{TD-loss}. \textit{ii)} Unregularized end-to-end learning with a \textit{convolutional encoder}. \textit{iii) Low-magnitude sparse rewards}. Using this framework, we are able to motivate the effectiveness of auxiliary losses \citep{curl, spr-atari, sacae} and many domain-specific practices \citep{rainbowDQN, rad} by explaining how they address elements of this new \textit{visual deadly triad}.
\begin{figure}[t]
\centering
\includegraphics[width=0.999\linewidth]{figs/main_exp_curves/main_perf_plot.pdf}
\vspace{-7mm}
\caption{\small{{Performance of agents in DMC (\textbf{left}) and Atari 100k (\textbf{right}) benchmarks from 10 seeds. A-LIX outperforms previous methods without using image augmentations or auxiliary losses.}}}
\vspace{-5mm}
\label{fig:mainperfplot}
\end{figure}%
We focus our analysis on the popular DeepMind Control suite (DMC) \citep{dmc}, where the introduction of random shift augmentations has played a key role in recent advances \citep{rad, drq, drqv2}. In this domain, we observe that the presence of the \textit{visual deadly triad} results in the TD-loss gradients through the convolutional encoder's feature maps having high spatial frequencies. We find these gradients are \textit{spatially inconsistent} and result in degenerate optimization landscapes when backpropagated to the encoder's parameters. Furthermore, repeatedly updating the convolutional encoder with these gradients consistently leads to early convergence to degenerate feature representations causing the critic to fit high-variance erroneous targets, a phenomenon we name \textit{catastrophic self-overfitting}. As a way of identifying the direct implications of the visual deadly triad in the gradient signal, we propose a new measure called the \textit{Normalized Discontinuity (ND)} score and show how its value precisely correlates with agent performance. Thus, we explain the effectiveness of shift augmentations by recognizing that they regularize the gradient signal by providing an \textit{implicit} spatial smoothing effect.
Based on our analysis, we propose \textbf{A}daptive \textbf{L}ocal S\textbf{I}gnal Mi\textbf{X}ing (A-LIX) a novel method to prevent catastrophic self-overfitting with two key components: \textit{i)} A new {parameterized} layer (LIX) that \textit{explicitly} enforces smooth feature map gradients. \textit{ii)} A dual objective that ensures learning stability by adapting the LIX parameters based on the estimated \textit{ND} scores. We show that integrating A-LIX with existing off-policy algorithms achieves state-of-the-art performance in both DeepMind Control and Atari 100k benchmarks without requiring image augmentations or auxiliary losses and significantly fewer heuristics. We open-source our code to facilitate reproducibility and future extensions\footnote{https://github.com/Aladoro/Stabilizing-Off-Policy-RL}.
\begin{table}[t]
\centering
\caption{\small{Practices from recent pixel-based TD-learning methods to mitigate elements of the visual deadly triad. $^\dagger$DrQ uses 10-step returns on Atari. *CURL uses 20-step returns on Atari.}}
\vskip 0.1in
\label{tab:deadlytriad}
\adjustbox{max width=\linewidth}{
\begin{tabular}{@{}lccc@{}}
\toprule
\multicolumn{1}{c}{\multirow{2}{*}{\textbf{Algorithm}}} & \multicolumn{3}{c}{\textbf{Visual Deadly Triad Mitigation}} \\ \cmidrule(l){2-4}
\multicolumn{1}{c}{} & TD-Loss & CNN Overfit & \multicolumn{1}{l}{Low-Density Reward} \\ \midrule
DrQ/RAD & - & Shift/Jitter Augmentations & 10-step returns$^\dagger$ \\
DrQ-v2 & - & Shift Augmentations & 3-step returns \\
SAC-AE & VAE Loss & - & - \\
SPR & Model-Based Loss & Shift/Jitter Augmentations & 10-step returns \\
DER & - & Non-Overlapping Strides & 20-step returns \\
CURL & Contrastive Loss& Shift Augmentations & 20-step returns* \\
\bottomrule
\end{tabular}}
\vspace{-4mm}
\end{table}
Our main contribution can be summarized as follows:
\begin{itemize}
\itemsep0em
\item We conjecture the existence of a \textbf{\emph{visual deadly triad}} as a principal source of instability in reinforcement learning from pixel observations and provide clear empirical evidence validating our hypothesis.
\item We show these instabilities affect the gradient signal causing \textbf{\emph{catastrophic self-overfitting}}, a phenomenon that can severely harm TD-learning. As a result, we design the \textbf{\emph{normalized discontinuity score}} to explicitly anticipate its occurrence.
\item We propose \textbf{\emph{A-LIX}}, a new method that adaptively regularizes convolutional features to prevent catastrophic self-overfitting, achieving state-of-the-art results on two popular pixel-based RL benchmarks.
\end{itemize}
\section{Background}
\label{sec:background}
We consider problem settings described by Markov Decision Processes (MDPs) \cite{mdp}, defined as the tuple $(S, A, P, p_0, r, \gamma)$. This comprises a state space $S$, an action space $A$, transitions dynamics given by $P$ and $p_0$, and a reward function $r$. The RL objective is then for an agent to recover an optimal policy $\pi^*$, yielding a distribution of trajectories $p_\pi(\tau)$ that maximizes its expected sum of discounted future rewards, $\pi^*=\argmax_\pi\E_{p_\pi(\tau)}\left[ \sum^{\infty}_{t = 0}\gamma^t r (s_t, a_t) \right]$. In off-policy RL, this objective is usually approached by learning a \textit{critic} function to evaluate the effectiveness of the agent's behavior. A common choice for the critic is to parameterize the policy's Q-function $Q^\pi: S \times A \rightarrow \mathbb{R}$, that quantifies the agent's performance after performing a particular action: $Q^\pi(s, a) = \E_{p_\pi(\tau|s_0{=}s, a_0{=}a)}\left[ \sum^{\infty}_{t = 0}\gamma^t r (s_t, a_t)\right]$. Most off-policy algorithms entail storing trajectories in a buffer $D$, and learning parameterized Q-functions by iteratively minimizing a squared temporal difference (TD-) loss:
\begin{equation}\label{q_fn_obj}
\begin{split}
J_Q(\phi)=\E_{(s, a, s', r) \sim D}\left[(Q^\pi_\phi(s, a) - y)^2\right],\\
y= r + \gamma\mathbb{E}_{a\sim \pi(s')}\left[\hat{Q}_{\phi'}^\pi(s', a)\right].
\end{split}
\end{equation}
Here, the TD-targets $y$ are computed from a 1-step bootstrap operation with a slowly-changing \emph{target Q-function} $\hat{Q}_{\phi'}^\pi$.
In continuous action spaces, we also learn a separate parameterized policy to exploit the information in the critic. This practically results in alternating TD-learning with maximizing the Q-function's expected return predictions, following the policy gradient theorem \citep{pg-thm}.
\section{Instabilities in TD-Learning from Pixels}
\label{sec:analysis}
\begin{figure}[t]
\centering
\includegraphics[width=0.8\linewidth]{figs/analysis_plots/aug_turn_off.pdf}
\vspace{-4mm}
\caption{\small{{Returns of agents over 5 seeds. Solid lines represent median performance, faded lines represent individual runs. The vertical dashed line shows when augmentations are turned off.}}}
\vspace{-4mm}
\label{fig:turnoffaug}
\end{figure}%
Unlike proprioceptive observations, off-policy RL from pixel observations commonly requires additional domain-specific practices to ensure stability. In this section, we provide a novel analysis of this phenomenon by focusing on the DeepMind Control Suite \citep{dmc}. In this benchmark, the introduction of random shift data augmentations has been a core component of recent advances in pixel-based off-policy RL \citep{rad, drqv2}, allowing us to isolate and reproduce stable and unstable training regimes. Our analysis suggests the existence of specific elements that cause instabilities and strives to explain their implications on learning dynamics. We validate our findings via thorough empirical experimentation showing numerous results corroborating our hypotheses. Based on our discoveries, in Section~\ref{sec:method} we provide a new interpretation of random shifts and propose a new improved method to isolate and counteract instabilities.
\subsection{Why Do Augmentations Help?}
\begin{figure}[t]
\centering
\centering
\includegraphics[width=0.999\linewidth]{figs/analysis_plots/qvals_overfit.pdf}
\vspace{-5mm}
\vspace{-2mm}
\caption{\small{Evidence of overfitting when augmentations are not used. On the \textbf{left}, shaded lines are individual estimates, the solid line represents the median Q-value. On the \textbf{right}, the Q-values Pearson correlation with target values and Monte-Carlo returns ($R_{MC}$).}}
\label{fig:qvals_pearson}
\vspace{-4mm}
\end{figure}%
The underlying mechanism behind the effectiveness of random shifts is not immediately clear. While this augmentation may appear to assist generalization by encoding an invariance \cite{shorten2019augsurvey}, we note that all the environments from DMC employ a camera that is fixed relative to the agent's position. Hence, robustness to shifts does not appear to introduce any useful inductive bias about the underlying tasks. Moreover, prior work successfully learned effective controllers without augmentations~\citep{dreamer,sacae}, suggesting that shift generalization might not be the primary benefit of this method. We analyze the effect of random shifts by training a DrQ-v2 agent \citep{drqv2} on Cheetah Run but turning off augmentations after an initial 500,000 time-steps learning phase. As shown in Fig.\ \ref{fig:turnoffaug}, while training without any shift augmentation fails to make consistent progress, turning off augmentations after the initial learning phase actually appears to slightly improve the performance of DrQ-v2. This result is a clear indication that augmentations are not needed for asymptotic performance, and are most helpful to counteract instabilities present in the \emph{earlier stages of learning}, which we now focus on analyzing (see App.~\ref{sec:behaviorcloning}-\ref{sec:turnoffaug} for complementary experiments validating these claims).
\subsection{Identifying a New Deadly Triad}
\begin{figure}[t]
\centering
\includegraphics[width=0.999\linewidth]{figs/analysis_plots/zero-vs-nonzero.pdf}
\vspace{-5mm}
\caption{\small{{TD-loss of offline fixed transitions during training, separated based on having non-zero reward.}}}
\vspace{-4mm}
\label{fig:mses}
\end{figure}%
To reduce confounding factors and to disentangle the origin of these instabilities, we design an offline RL experiment \cite{offlinerl_survey}. This experiment isolates three distinct elements affecting off-policy RL: exploration, policy evaluation, and policy improvement. First, we gather a set of 15,000 transitions with pixel observations using a random policy in Cheetah Run. This allows us to ground exploration and analyze learning from fixed data resembling the early stages of online training (when augmentations appear most helpful). We then isolate policy evaluation by training both critic and encoder using SARSA \cite{sarsa} until convergence on this fixed data. Finally, we run policy improvement, training an actor to maximize the expected discounted return as predicted by the converged critic (see App.\ \ref{sec:offlinedescrip} for details). Interestingly, we find that \textit{turning on} augmentations exclusively during exploration or policy improvement has no apparent effect on stability and final performance.
Hence, we focus on the effects that augmentations have on TD-learning and analyze applying augmentations {only during policy evaluation}.
\begin{table}[H]
\centering
\vspace{-4mm}
\caption{\small{Performance and training statistics of different agent types in the offline experiments from 15,000 random transitions.}}
\vskip 0.1in
\setlength{\tabcolsep}{3pt}
\label{tab:offline}
\adjustbox{max width=\linewidth}{
\begin{tabular}[b]{lccc}
\toprule
\textbf{Agent} & \textbf{Final TD-Loss} & \textbf{Final Policy Loss} & \textbf{Return}\\ \midrule
Augmented & $0.021$ & $-0.99$ & $86.5 \pm 11.3$\\
Non-Augmented & $0.002$ & $-1.05$& $9.2 \pm 12.1$\\
\cmidrule(lr){1-4}
Proprioceptive & $0.012$ & $-1.14$ & $79.1 \pm 7.7$\\
Frozen CNN (random) & $0.023$ & $-0.95$ & $43.6 \pm 20.2$\\
Frozen CNN (pre-trained) & $0.012$ & $-0.99$ & $77.6 \pm 18.5$\\
\cmidrule(lr){1-4}
Non-Augmented (norm $r$) & $18.616$ & $3.86$ & $38.6\pm 16.5$\\
Non-Augmented (10-step returns) & $0.003$ & $-1.24$& $36.5 \pm 20.3$\\
\bottomrule
\end{tabular}}
\vspace{-5mm}
\end{table}
As shown in Table \ref{tab:offline}, applying augmentations during policy evaluation enables us to learn policies that achieve a return of 86.5, despite the best trajectory in the offline data achieving only 10.8. In contrast, without augmentations we consistently recover near 0 returns, resembling the failures observed in the online experiments. On the left of Fig.\ \ref{fig:qvals_pearson} we show the evolution of the predicted Q-values for both agents on a fixed batch of offline data. In particular, when performing policy evaluation without augmentations, these predictions display extremely high variance across different state-action pairs. In Table~\ref{tab:offline} we further show that the non-augmented agent displays {significantly} lower loss, despite having higher average Q-values than the augmented agent \citep{schaul2021returnbased}. We argue this is a clear indication of the occurrence of \emph{overfitting}. We corroborate our claim by analyzing the evolution of the Pearson bi-variate correlation between the estimated Q-values and target Q-values on the right of Fig.\ \ref{fig:qvals_pearson}. These results show that the non-augmented agent displays near-perfect correlation with its own target Q-values throughout training, indicating that it immediately \emph{learns to fit its own noisy, randomly-initialized predictions}. We also record the correlation with the actual discounted Monte-Carlo returns, which represent the \textit{true targets} the Q-values should ideally approximate during policy evaluation. For these results, we observe that the relationship between applying augmentations and the recorded correlation is reversed, with the non-augmented agent displaying significantly lower correlation. This dichotomy appears to indicate that fitting the noisy targets severely affects learning the \textit{useful} training signal from the collected transitions regarding the experienced rewards. We confirm this phenomenon by splitting the data into non-zero and zero reward transitions, where the only learning signal propagated in the TD-loss is from the initially random target values. In Fig.\ \ref{fig:mses} we illustrate that the non-augmented agents initially experience much higher TD-errors on zero reward transitions, confirming that they focus on fitting uninformative components of the TD-objective.
In Table~\ref{tab:offline} we provide the results of additional experiments that indicate that TD-learning is not the \textit{only} cause for the observed instabilities.
First, we confirm that the observed overfitting appears to be exclusive to performing \textit{end-to-end} TD-learning with convolutional neural network (CNN) encoders. Concretely, we run the same offline experiment without \textit{training an encoder} in three different settings. First, we consider performing policy evaluation directly from non-augmented \textit{proprioceptive} observations with a fully-connected critic network. Moreover, we also consider \textit{freezing} the encoder weights either to their initial \textit{random values} or to \textit{pre-trained} values from the augmented agent experiments. In all three cases, we attain largely superior performance, almost matching the augmented agent's performance for both the proprioceptive and pre-trained experiments. In addition, we also find that the observed overfitting phenomenon is diminished when simply increasing the magnitude of the reward signal in the TD-loss. We test this through two additional experiments which consider \textit{normalizing} the collected rewards before policy evaluation and incorporating \textit{large n-step returns}~\cite{suttonTDlearning}. As reported, both modifications considerably improve the non-augmented agent's performance. However, we note that both practices introduce further unwanted variance in the optimization, failing to yield the same improvements as augmentations (see App.~\ref{sec:nstep}).
Taken together, our results appear to strongly indicate that instabilities in off-policy RL from pixel observation come from three key conditions, which we refer to as the \emph{visual deadly triad}: i) Exclusive {reliance on the TD-loss}; ii) Unregularized learning with an {expressive convolutional encoder}; iii) Initial {low-magnitude sparse rewards}. Further evidence arises when considering the ubiquity of particular practices employed in pixel-based off-policy RL. In particular, as summarized in Table \ref{tab:deadlytriad}, most popular prior algorithms feature design choices that appear to counteract at least two elements of this triad, either directly or implicitly. Furthermore, we show these instabilities result in the non-augmented critics {focusing on learning their own noisy predictions}, rather than the actual experienced returns. We observe this ultimately leads to convergence to erroneous and high-variance Q-value predictions, a phenomenon we name \textit{catastrophic self-overfitting}.
\subsection{Anticipating Catastrophic Self-Overfitting}
\label{sec:anticipating}
\begin{figure}[t]
\centering
\includegraphics[width=0.9\linewidth]{figs/analysis_plots/feature_maps.pdf}
\vspace{-2mm}
\caption{\small{{Feature maps in the final layer of both augmented (\textbf{top}) and non-augmented (\textbf{bottom}) agent encoders. Non-augmented agents manifest inconsistent, high-frequency feature maps.}}}
\label{fig:feature_maps}
\vspace{-4mm}
\end{figure}%
We now attempt to unravel the links that connect the \textit{visual deadly triad} with \textit{catastrophic self-overfitting}. We start by observing that catastrophic self-overfitting comes with a significant reduction of the critic's sensitivity to changes in action inputs, implying that the erroneous high-variance Q-value predictions arise primarily due to changes in the observations (see App.~\ref{sec:actvalsurf} for action-value surface plots). Hence, we focus on analyzing the feature representations of the pixel observations, computed by the convolutional encoder, $z\in \R^{C\times H \times W}$. In particular, we wish to quantify the \emph{sensitivity} of feature representations to small perturbations in the input observations. To measure this, we evaluate the Jacobians of the encoder across a fixed batch of offline data for the augmented and non-augmented agents. We then calculate the Frobenius norm of each agent's Jacobians, giving us a measure of how quickly the encoder feature representations are changing locally around an input (see App.~\ref{sec:jacobiananalysis} for details). Our results show a stark difference, with the feature representations of the non-augmented agents being on average \textbf{2.85} times more sensitive. This suggests that overfitting is driven by the CNN encoder's \textit{representations} learning \textit{high-frequency} information about the input observations and, thus, breaking useful inductive biases about this class of models \citep{cnnspectralbias}.
\begin{figure}[t]
\centering
\includegraphics[width=0.999\linewidth]{figs/analysis_plots/encoder-loss-surface_5000.pdf}
\vspace{-6mm}
\caption{\small{Critic loss surface plots of augmented (\textbf{left}) and non-augmented (\textbf{right}) agents after 5,000 steps of offline training.}}
\label{fig:encoder_loss_surf}
\vspace{-4mm}
\end{figure}%
In App.~\ref{sec:specnorm} we demonstrate that lower sensitivity to random noise, while desirable for optimization \cite{rosca2020a}, is actually a \textit{byproduct} of a stable feature representations, and not its defining factor. Furthermore, observing the actual feature maps of different observations in Fig.~\ref{fig:feature_maps}, we see that augmentations make the encoder produce features that are \emph{spatially consistent}, aligned with common understandings of how natural representations should appear \cite{mindThePad, allenzhu2021feature}. In contrast, the non-augmented agents display high-frequency and \textit{discontinuous} feature maps that do not reflect the spatial properties of their inputs. Hence, our evidence suggests that catastrophic self-overfitting specifically follows from the same learning process that produces highly-sensitive and discontinuous encoder feature maps. Therefore, we turn our focus to analyzing the \textit{gradients} backpropagated to the encoder's features maps and observe one key property: the gradients of the output feature maps \textit{consistently reflect the same spatial properties} of their resulting features. In particular, the \textit{gradients of the feature maps} appear \emph{spatially consistent} for the augmented agent, and \textit{discontinuous} for the non-augmented agent. This optimization property reflects intuitive understandings of backpropagation since discontinuous gradients should push the encoder's weights to encode discontinuous representations. To provide further complementary evidence that discontinuous gradients are the direct cause of catastrophic self-overfitting, we analyze the normalized loss surfaces \textit{when backpropagating these discontinuous gradients} to the encoder's parameters (following \citet{visualloss}). In Fig.\ \ref{fig:encoder_loss_surf}, we see that gradient discontinuities in the non-augmented agent yield extreme peaks in its encoder's loss surface, clearly suggestive of overfitting \citep{sharpLossBadGeneralization} \footnote{Instead, the loss surface with respect to the fully-connected weights is smoother (App.\ \ref{sec:mlpsurface}).}.
To quantify the level of discontinuity in the features and their gradients, we propose a new metric that encodes the aggregated immediate spatial `unevenness' of each feature location within its relative feature map. In particular, we define $D(z)\in \mathbb{R}^{C\times H\times W}$ as the expected squared local discontinuity of z in any spatial direction, i.e.:
\begin{equation}
D(z)_{ijc} \approx \E_{v\sim S^1}\left[\left(\frac{\partial z_{ijc}}{\partial v}\right)^2\right],
\end{equation}
practically estimated via sampling. We then normalize each value in $D(z)$ by its squared input and average over all the feature positions. We name this metric the \textit{normalized discontinuity (ND)} score:
\begin{equation}
\begin{split}
\textit{ND}(z) = \frac{1}{C\times H\times W}\sum_{c=1}^C\sum_{j=1}^H\sum_{i=1}^W \frac{D(z)_{ijc}}{z_{ijc}^2}.
\end{split}
\end{equation}
Intuitively, this score reflects how locally discontinuous $z$ is expected to be at any spatial location.
In Fig.~\ref{fig:ndscore}, we show how the $ND$ score of $\nabla z$ evolves during training in the offline and an online setting for both augmented and non-augmented agents. We see that augmented agents experience considerably less discontinuous gradients through their features, and that recordings of lower $ND$ scores also appear to be highly correlated with performance improvements. We additionally show an accumulated $ND$ score, using an exponential moving average of $\nabla z$ in each spatial position to calculate this metric. Interestingly, we observe that the $ND$ score over accumulated gradients is almost identical to the instantaneous $ND$ score, showing that similar gradient discontinuities are propagated \emph{persistently} through training in each position of the feature map. This property confirms that the discontinuities are not smoothed by the stochastic sampling of different consecutive training batches, in which case we would expect to observe lower accumulated $ND$ scores. Thus, it suggests that self-overfitting emerges in the non-augmented agents due to repeated gradient steps towards \emph{persistent} feature map discontinuities.
\begin{figure}[t]
\centering
\includegraphics[width=0.999\linewidth]{figs/analysis_plots/nd_score.pdf}
\vspace{-7mm}
\caption{\small{{Instantaneous (\textcolor{red}{red} and \textcolor{blue}{blue}) and accumulated (\textcolor{orange}{orange} and \textcolor{purple}{purple}) $ND$ scores for the features gradients from offline (\textbf{left}) and online (\textbf{right}) training in Cheetah Run.}}
\vspace{-4mm}
\label{fig:ndscore}
\end{figure}%
\section{Counteracting Gradient Discontinuities}
\label{sec:method}
\subsection{Gradient Smoothing and Random Shifts}
\label{sec:rand_shifts}
As analyzed in Section~\ref{sec:analysis}, catastrophic self-overfitting occurs when the gradients in the convolution layers are locally discontinuous.
As a result, we argue that the efficacy of random shifts arises from their downstream effect on feature gradient computation, which counteracts these discontinuities during backpropagation. In particular, while random shifts do not act directly on the latent representation or their respective gradients, they do affect \textit{how} the latent representations are computed. This has an impact on how \emph{persistent} discontinuous components of the gradient are backpropagated to the encoder's parameters during learning. From the approximate shift invariance of convolutional layers, we can view a convolutional encoder as computing each of the feature vectors $\left[z_{1ij}, ..., z_{Cij}\right]^T$ with the same parameterized function, $V_\phi$, that takes as input a subset of each observation $O\in{\R^{C'\times H' \times W'}}$. This subset corresponds to a local neighborhood around some reference input coordinates $i', j'$. Thus, the only factor differentiating features in the same feature map (e.g., $z_{cij}$ and $z_{ckl}$) is some implicit function $f(i, j)=i', j'$ translating each of the output features coordinate into the relative reference input coordinate,
i.e. $z_{cij}= V_\phi(O, i', j')_c$ (determined by kernel sizes, strides...). Therefore, random shifts are approximately equivalent to further translating each reference coordinate by adding some uniform random variables $\delta'_x, \delta'_y$:
\vspace{-4mm}
\begin{equation*}
\begin{split}
& z_{cij}\approx V_\phi(O, i'+\delta'_x, j'+\delta'_y)_c, \\
\mathrm{where}\quad &\delta'_x, \delta'_y\sim U[-s', s'], \quad f(i, j)=i', j'.
\end{split}
\end{equation*}
\vspace{-4mm}
Due to the employed strides from the convolutional architectures used in DrQ-v2~\citep{drqv2}, the difference in reference coordinates of adjacent features in a feature map is less than the maximum allowable shift employed in the augmentations, i.e., $(i+1)'-i', (j+1)'-j'< s'$ (where $s'$ is the maximum allowable shift). Consequently, shift augmentations effectively turn the deterministic computation graph of each feature $z_{cij}$ into a random variable, whose sample space comprises the computation graphs of all nearby features within its feature map. Hence, applying different random shifts to samples in a minibatch makes the gradient of each feature $\nabla z_{cij}$ backpropagate to a random computation graph, sampled from a set that extends the set of non-augmented computation graphs for all features in a local neighborhood of coordinates $i, j$.
Therefore, aggregating the parameter gradients produced with different $\delta'_x, \delta'_y$, provides a \emph{smoothing effect} on how each discontinuous component of $\nabla z$ affects learning, and prevents {persistent} discontinuities from accumulating. Hence, random shifts break the second condition of the visual deadly triad, by providing effective \emph{implicit} regularization of the convolutional encoder's learning process. At the same time, this minimally disrupts the information content of the resultant features, since discarded observation borders almost exclusively comprise background textures that are irrelevant for performing the task. This interpretation of random shifts aligns with the analysis in Section~\ref{sec:analysis}, showing that implicitly smoothing over the backpropagated gradient maps consistently prevents catastrophic self-overfitting.
\subsection{Local Signal Mixing}
We extrapolate our hypotheses about catastrophic self-overfitting and random shifts by proposing a technique that aims to enforce gradient smoothing regularization \emph{explicitly}. We propose \textbf{L}ocal S\textbf{I}gnal Mi\textbf{X}ing, or \textbf{LIX}, a new layer specifically designed to prevent catastrophic self-overfitting in convolutional reinforcement learning architectures. LIX acts on the features produced by the convolutional encoder, $z\in \R^{C\times H \times W}$, by randomly mixing each component $z_{cij}$ with its neighbors belonging to the same feature map. Hence, LIX outputs a new latent representation with the same dimensionality $\hat{z}\in \R^{C\times H \times W}$, whose computation graph minimally disrupts the information content of each feature $z_{cij}$ while smoothing discontinuous components of the gradient signal during backpropagation.
LIX is a regularization layer that acts as a simple random smoothing operation, reducing the expected magnitude of gradient discontinuities by preventing higher frequency signals to persist. In the forward pass, LIX produces a new latent representation where for each of the $C$ feature maps, $\hat{z}_{cij}$ is computed as a randomly weighted average of its spatial neighbors around coordinates $i, j$. We further \emph{parameterize} this stochastic operation using some maximum range radius $S$, and consequently sample two uniform \textit{continuous} random variables $\delta_x, \delta_y \sim U[-S, S]$, representing shifts in the $x$ and $y$ coordinates respectively. Correspondingly, we define $\tilde{i}=i+\delta_x$ and $\tilde{j}=j+\delta_y$ and perform the weighted averaging as a bilinear interpolation with weights determined by the random shifts:
\vspace{-4mm}
\begin{footnotesize}
\begin{equation*}
\begin{split}
\hat{z}_{cij} = &
z_{c\floor{\tilde{i}}\floor{\tilde{j}}} (\ceil{\tilde{i}} - \tilde{i})(\ceil{\tilde{j}} - \tilde{j}) +
z_{c\floor{\tilde{i}}\ceil{\tilde{j}}} (\ceil{\tilde{i}} - \tilde{i})(\tilde{j} - \floor{\tilde{j}}) \\
+ & z_{c\ceil{i}\floor{\tilde{j}}} (\tilde{i} - \floor{\tilde{i}})(\ceil{\tilde{j}} - \tilde{j}) +
z_{c\ceil{i}\ceil{\tilde{j}}} (\tilde{i} - \floor{\tilde{i}})(\tilde{j} - \floor{\tilde{j}}).
\end{split}
\end{equation*}
\vspace{-4mm}
\end{footnotesize}
Since nearby features in a convolutional feature map are computed with very similar receptive fields, the mixing effect of LIX should have a trivial effect on the information the encoder can convey in its latent representations. In addition, LIX should have a direct regularization effect on the gradients by acting on the feature maps themselves. In particular, since LIX computes each output feature from a weighted average of its neighbors, backpropagation will split each gradient $\nabla \hat{z}_{cij}$, to a random local combination of features within the same feature map, $\{\nabla z_{c\floor{\tilde{i}}\floor{\tilde{j}}},\nabla z_{c\floor{\tilde{i}}\ceil{\tilde{j}}},\nabla z_{c\ceil{i}\floor{\tilde{j}}},\nabla z_{c\ceil{i}\ceil{\tilde{j}}}\}$. Thus, LIX should mostly preserve the consistent component of $\nabla z$, while randomly smoothing its discontinuous component
There are multiple key differences between the regularization from LIX and random shifts. LIX provides a local smoothing effect over the gradients explicitly and exactly, without having to deal with the implications of padding and strided convolutions breaking shift-invariance assumptions. Moreover, LIX smooths the gradient signal not only across different inputs but also within each feature map. In addition, by applying its operation solely at the feature level, the encoder can still learn to entirely circumvent LIX's smoothing effect on the information encoded in the latent representations, given enough capacity. This means that LIX does not forcibly preclude any input information from affecting the computation. Consequently, LIX also does not have to enforce learning invariances which might not necessarily reflect useful inductive biases about the distribution of observations. In contrast, random shifts need to exploit the particular uninformativeness of the observations borders to avoid disrupting the features' information content.
\subsection{A-LIX}
\label{sec:alix}
LIX introduces a single key parameter: the range radius $S$ used for sampling $\delta_x$ and $\delta_y$. Intuitively, this value should reflect how much we expect gradients to be locally consistent for a given architecture and task.
Therefore, we argue that the value of $S$ should ideally decrease throughout training as the useful learning signal from the TD-loss becomes stronger. This is consistent with the results illustrated in Figure~\ref{fig:turnoffaug}, showing that turning off random shift augmentations after the TD-targets become informative can improve learning. Hence, we propose an adaptive strategy to learn $S$ throughout training. Utilizing the \textit{normalized discontinuity ($ND$)} score in Section~\ref{sec:anticipating}, we set up a dual optimization objective to ensure a minimum value of local smoothness in the representation gradients, $\overline{ND}$. However, computing the $ND$ score of the gradient signal involves a ratio between potentially very small values. As a result, estimation of these values from a batch of gradient samples can lead to outliers having an extreme impact on this average measure, translating into large erroneous updates of $S$. To overcome this, we propose using a slightly modified version of the $ND$ score with increased robustness to outliers (see App.~\ref{sec:adaptive_dual_objective} for further details):
\begin{equation}
\label{eq:mod-nd}
\widetilde{ND}(\nabla \hat{z}) = \sum_{c=1}^C\sum_{j=1}^H\sum_{i=1}^W \log\left(1 + \frac{D(\nabla \hat{z})_{cij}}{\nabla \hat{z}_{ijc}^2}\right).
\end{equation}
In practice, we set up a dual optimization objective similar to the automatic temperature adjustment from \citet{sac-alg}. This entails alternating the optimization of the TD-learning objectives described in Section~\ref{sec:background} with minimizing a dual objective loss:
\begin{equation}
\label{eq:dual-obj}
\argmin_{S} -S\times \E_{\hat{z}}\left[\widetilde{ND}(\nabla \hat{z}) - \overline{ND}\right],
\end{equation}
approximating dual gradient descent \citep{convex}. Hence, we call this new layer \textbf{A}daptive \textbf{LIX} (A-LIX). In Fig.~\ref{fig:adaptive_both} we show that A-LIX effectively anneals $S$ as the agent escapes its unstable regimes, in line with our intuition.
\begin{figure}[t]
\centering
\includegraphics[width=0.99\linewidth]{figs/alix_param_plots/cr_qr_alix_param.pdf}
\vspace{-4mm}
\caption{\small{{A-LIX's $S$ parameter evolution during training in Cheetah Run (\textbf{left}) and Quadruped Run (\textbf{right}). As the critic targets become more informative, $S$ falls, improving data efficiency and asymptotic performance.}}}
\vspace{-4mm}
\label{fig:adaptive_both}
\end{figure}%
\section{Performance Evaluation}
We evaluate the effectiveness of A-LIX in pixel-based reinforcement learning tasks in two popular and distinct domains featuring a diverse set of continuous and discrete control problems. We integrate A-LIX with existing popular algorithms and compare against current state-of-the-art model-free baselines. We provide further details of our integration and full hyperparameters in App.~\ref{sec:app_hyper}.
We also extend this section by providing more granular evaluation metrics in App.~\ref{app:full_res}. Furthermore, we provide ablation studies analyzing different components of A-LIX in App.~\ref{sec:app_abl}.
\subsection{DeepMind Control Evaluation}
We first evaluate the effectiveness of A-LIX for pixel-based RL on continuous control tasks from the DeepMind Control Suite (DMC) \citep{dmc}. Concretely, we integrate A-LIX with the training procedure and network architecture from DrQ-v2 \citep{drqv2}, but \emph{without using image augmentations}. To show the generality of our method we \emph{do not modify} any of the environment-specific hyperparameters from DrQ-v2 and simply add our A-LIX layer after each encoder nonlinearity. For simplicity, we optimize a shared $S$ for all the A-LIX layers with the dual objective in Eq.~\ref{eq:dual-obj}.
Hence, this introduces a {single additional parameter} and negligible computational overhead. We compare A-LIX to DrQ-v2, which represents the current state-of-the-art on this benchmark. We also compare against three further baselines: the original DrQ \citep{drq}, which foregoes n-step returns and includes an entropy bonus; CURL \citep{curl}, which includes an auxiliary contrastive objective; an extension of SAC \citep{sac-alg} with the encoder from \citet{sacae}. These last three baselines have been performant on a prior DMC benchmark that considers fewer tasks with high action repeats, as described by~\citet{planet}. Instead, we evaluate on the more challenging `Medium' and `Hard' benchmarks from \citet{drqv2}, comprising 15 tasks with low action repeats.
\begin{figure}[t]
\centering
\includegraphics[width=0.999\columnwidth]{figs/main_exp_curves/dmc_full_results_plot.pdf}
\vspace{-8mm}
\caption{\small{{Average performance in 10 seeds for DMC Medium (\textbf{left}) and Hard tasks (\textbf{right}). Shaded regions represent $\pm1$ SE.}}}
\vspace{-6mm}
\label{fig:mean_perf_dmc}
\end{figure}%
\textbf{Results.} We summarize the results in Figure~\ref{fig:mean_perf_dmc}, showing the mean performance curves for both medium and hard benchmark tasks. We provide further details and the full list of results across all 15 environments in App.~\ref{app:dmc_full_res}. Overall, A-LIX surpasses all prior methods with clear margins, both in terms of efficiency and final performanc. This is particularly notable in the more complex `Hard' tasks. As highlighted in prior work \citep{learningpessimism}, DrQ-v2 appears to yield inconsistent results on some of the harder exploration tasks with sparse rewards. This likely indicates that the gradient regularization induced by random shifts (described in Section~\ref{sec:rand_shifts}) is unable to consistently prevent catastrophic self-overfitting in scenarios where the initial learning signal from TD-learning is particularly low. Finally, DrQ, CURL, and SAC fail to make consistent meaningful progress on this harder benchmark. This performance gap corroborates the third component of the visual deadly triad, showing how lower magnitude rewards due to harder exploration and lower action-repeats further destabilize TD-learning based algorithms, and explains the gains seen in DrQ-v2 when incorporating n-step returns. We believe these results emphasize the challenge of overcoming the visual deadly triad in continuous control problems and the particular effectiveness of A-LIX to counteract its direct implications.
\subsection{Atari 100k Evaluation}
\begin{table}[t]
\vspace{-3mm}
\caption{Results summary for the Atari 100k benchmark.
The reported performance of A-LIX is from 10 seeds.}
\label{tab:atari_perf}
\tabcolsep=0.04cm
\begin{center}
\adjustbox{max width=0.98\columnwidth}{
\begin{tabular}{@{}lccccccc@{}}
\toprule
\textit{\textbf{Metrics}} & SimPLe & DER & OTRainbow & CURL & DrQ & SPR & \textbf{A-LIX} \\ \midrule
\textit{\textbf{Norm. Mean}} & 0.443 & 0.285 & 0.264 & 0.381 & 0.357 & 0.704 & \textbf{0.753} \\
\textit{\textbf{Norm. Median}} & 0.144 & 0.161 & 0.204 & 0.175 & 0.268 & \textbf{0.415} & 0.411 \\ \midrule
\textit{\textbf{\# SOTA}} & 7 & 1 & 1 & 1 & 1 & 4 & \textbf{11} \\
\textit{\textbf{\# Super}} & 2 & 2 & 1 & 2 & 2 & \textbf{7} & \textbf{7} \\
\textit{\textbf{Average Rank}} & 3.92 & 5.00 & 5.21 & 3.92 & 4.85 & 2.88 & \textbf{2.21} \\ \bottomrule
\end{tabular}}
\end{center}
\vspace{-5mm}
\end{table}
We perform a second set of experiments in an entirely different setting, discrete control. We make use of the popular Atari Learning Environment (ALE) \citep{atariALE} and consider the 100k evaluation benchmark from \citet{simple}. In particular, this benchmark comprises evaluating performance for 26 tasks after only two hours of play-time (100k interaction steps), following the evaluation protocol in \citet{machadoALEprotocol}.
We integrate A-LIX with Data-Efficient Rainbow (DER) \citep{der-rainbow}, a simple extension to Rainbow \citep{rainbowDQN} with improved data-efficiency. We would like to note that our integration has key differences to DER, designed to highlight the generality of our method in tackling the visual deadly triad. In particular, we reduce the n-step returns to 3 (from 20), and we maintain the \emph{same} encoder architecture as in DrQ-v2. To speak to the latter point, this means we do not require the highly regularized encoders with large convolutional filters and strides, used ubiquitously in off-policy learning for Atari environments. Instead, to stabilize learning we simply apply our A-LIX layer after the final encoder nonlinearity. We compare against three algorithms that, like A-LIX, do not employ data-augmentation: Data-Efficient Rainbow (DER); Overtrained Rainbow (OTRainbow) \citep{otrainbow}; and Simulated Policy Learning (SimPLe) \citep{simple} (model-based).
Moreover, we also compare with additional state-of-the-art off-policy baselines that make use of data augmentations: the aforementioned CURL and DrQ; and Self-Predictive Representations (SPR) \citep{spr-atari}, the current state-of-the-art TD-learning based algorithm on this benchmark. SPR combines data augmentation with numerous additional algorithmic design choices, such as an auxiliary self-supervised loss for learning a latent dynamics model
\begin{figure*}[t]
\centering
\begin{subfigure}[t]{0.49\linewidth}
\begin{overpic}[width=0.99\linewidth]{figs/rliable_plots/DMC/DMC_main.pdf}
\end{overpic}
\vspace{-2mm}
\caption{\small{DeepMind Control: Medium and Hard Tasks}}
\label{fig:dmcmainrliable}
\end{subfigure}
\begin{subfigure}[t]{0.49\linewidth}
\includegraphics[width=0.95\linewidth]{figs/rliable_plots/Atari_100k/Atari_100k_main.pdf}
\vspace{-2mm}
\caption{\small{Atari 100k}}
\label{fig:atarimainrliable}
\end{subfigure}
\caption{\small{{\emph{Probability of improvement} and \emph{performance profiles} obtained from the recorded results in DMC (\textbf{left}) and Atari 100k (\textbf{right}). A-LIX displays statistically significantly improvements and stochastically dominates most prior algorithms.}}}
\vspace{-4mm}
\label{fig:rliable_res}
\end{figure*}%
\textbf{Results.} We summarize the results in Table~\ref{tab:atari_perf}, showing the mean and median human-normalized scores together with the number of environments where each algorithm either achieves state-of-the-art or super-human performance. We include the full per-environment results in App.~\ref{app:atari_full_res}. Remarkably, A-LIX obtains a substantially higher human-normalized mean performance than all other considered algorithms. While the recorded normalized median performance is slightly inferior to SPR, we argue that such difference is not particularly significant since this metric depends on the performance obtained in just two environments. Moreover, A-LIX achieves super-human performance in 7 games (the same as SPR), and state-of-the-art performance in 11 games, considerably more than all other algorithms. These results corroborate how tuned architectures, data augmentation, and auxiliary losses used on ALE mostly serve the purpose of counteracting the direct implications of the visual deadly triad and show that A-LIX enables us to learn powerful models without relying on these design choices.
\subsection{Statistical Significance}
To validate the significance of our improvements, we statistically analyze our results using the \textit{Rliable} tools and practices from \citet{agarwal2021deep}. We summarize some of our key findings in Fig.~\ref{fig:rliable_res}, showing the \textit{probability of improvements} of A-LIX over prior methods (computed with the Mann-Whitney U statistic \citep{mannwhitneyUstat}) and the relative normalized \textit{performance profiles} \citep{perf-profile}. The ranges correspond to 95\% \textit{stratified bootstrap confidence intervals} \citep{bootstrap-cis}. In both DMC and Atari benchmarks, we find that our improvements are statistically significant (lower confidence intervals $>$0.5) and observe `stochastic dominance' of our algorithm against almost all considered baselines \citep{stoch-dom}.
We provide further results and details of the employed statistical analysis in App.~\ref{app:dmc_full_res} and App.~\ref{app:rliableinfo} respectively.
\section{Related Work}
\label{sec:related}
Previous works have characterized several optimization issues related to performing RL via TD-learning \citep{gradient-TD-Baird, gradient-TD-Baird-2}. In this work, we instead focus on the \textit{empirical analysis} of modern TD-learning algorithms, specific to the pixel-based RL setting.
We also observe links with recent work studying \textit{observational overfitting} \citep{Song2020Observational}. Our work differs by focusing on memorization effects particular to the combination of CNNs and TD-learning. There are also connections with existing feature-level augmentation work, such as Dropout \citep{dropout} and DropBlock \citep{dropblock}. In particular, the latter also applies structured transformations directly to the feature maps and introduces a heuristic to adjust this transformation over training, validating our findings on the utility of adaptivity. Outside RL, there is a rich body of work on implicit regularization and memorization in CNNs \cite{sharpLossBadGeneralization, exploringgeneralization, memorizationCNNs, badglobalminimaexist, randomlabels}. \citet{cnnspectralbias} show that higher frequency data manifolds cause CNNs to learn higher spectral frequency terms, aligning with our analysis of higher frequency representations. \citet{coherentgrads} show generalization arises when similar examples induce similar gradients during learning (i.e., coherence). Their work supports our findings since inconsistent feature gradients are a manifestation of non-coherence, explaining their poor generalization. Finally, our dual objective falls under automatic tuning methods in RL (AutoRL) \cite{parkerholder2022automated}. These approaches have been applied very successfully to manage non-stationary trade-offs, such as exploration and exploitation \cite{rp1} and optimism \cite{moskovitz2021tactical, learningpessimism}. Finally, we note links with recent work concerning implicit regularization in TD-learning \citep{kumar2021implicit}. However, while \citet{kumar2021implicit} observe an implicit `underfitting' phenomenon in later training stages, we analyze an opposed `overfitting' phenomenon occurring during the first training steps, which we find to be specific to learning from visual inputs.
\section{Conclusion}
\label{sec:conclusion}
In this work, we provide a novel analysis demonstrating that instabilities in pixel-based off-policy RL come specifically from performing TD-learning with a convolutional encoder in the presence of a sparse reward signal. We show this \emph{visual deadly triad} affects the encoder's gradients, causing the critic to \textit{catastrophically self-overfit} to its own noisy predictions. Therefore, we propose \textbf{A}daptive \textbf{L}ocal S\textbf{I}gnal Mi\textbf{X}ing (A-LIX), a powerful regularization layer to explicitly counteract this phenomenon. Applying A-LIX enables us to outperform prior state-of-the-art algorithms on popular benchmarks without relying on image augmentations, auxiliary losses, or other notable design choices.
\section{Electronic Submission}
\label{submission}
Submission to ICML 2022 will be entirely electronic, via a web site
(not email). Information about the submission process and \LaTeX\ templates
are available on the conference web site at:
\begin{center}
\textbf{\texttt{http://icml.cc/}}
\end{center}
The guidelines below will be enforced for initial submissions and
camera-ready copies. Here is a brief summary:
\begin{itemize}
\item Submissions must be in PDF\@.
\item \textbf{New to this year}: If your paper has appendices, submit the appendix together with the main body and the references \textbf{as a single file}. Reviewers will not look for appendices as a separate PDF file. So if you submit such an extra file, reviewers will very likely miss it.
\item Page limit: The main body of the paper has to be fitted to 8 pages, excluding references and appendices; the space for the latter two is not limited. For the final version of the paper, authors can add one extra page to the main body.
\item \textbf{Do not include author information or acknowledgements} in your
initial submission.
\item Your paper should be in \textbf{10 point Times font}.
\item Make sure your PDF file only uses Type-1 fonts.
\item Place figure captions \emph{under} the figure (and omit titles from inside
the graphic file itself). Place table captions \emph{over} the table.
\item References must include page numbers whenever possible and be as complete
as possible. Place multiple citations in chronological order.
\item Do not alter the style template; in particular, do not compress the paper
format by reducing the vertical spaces.
\item Keep your abstract brief and self-contained, one paragraph and roughly
4--6 sentences. Gross violations will require correction at the
camera-ready phase. The title should have content words capitalized.
\end{itemize}
\subsection{Submitting Papers}
\textbf{Paper Deadline:} The deadline for paper submission that is
advertised on the conference website is strict. If your full,
anonymized, submission does not reach us on time, it will not be
considered for publication.
\textbf{Anonymous Submission:} ICML uses double-blind review: no identifying
author information may appear on the title page or in the paper
itself. \cref{author info} gives further details.
\textbf{Simultaneous Submission:} ICML will not accept any paper which,
at the time of submission, is under review for another conference or
has already been published. This policy also applies to papers that
overlap substantially in technical content with conference papers
under review or previously published. ICML submissions must not be
submitted to other conferences and journals during ICML's review
period.
Informal publications, such as technical
reports or papers in workshop proceedings which do not appear in
print, do not fall under these restrictions.
\medskip
Authors must provide their manuscripts in \textbf{PDF} format.
Furthermore, please make sure that files contain only embedded Type-1 fonts
(e.g.,~using the program \texttt{pdffonts} in linux or using
File/DocumentProperties/Fonts in Acrobat). Other fonts (like Type-3)
might come from graphics files imported into the document.
Authors using \textbf{Word} must convert their document to PDF\@. Most
of the latest versions of Word have the facility to do this
automatically. Submissions will not be accepted in Word format or any
format other than PDF\@. Really. We're not joking. Don't send Word.
Those who use \textbf{\LaTeX} should avoid including Type-3 fonts.
Those using \texttt{latex} and \texttt{dvips} may need the following
two commands:
{\footnotesize
\begin{verbatim}
dvips -Ppdf -tletter -G0 -o paper.ps paper.dvi
ps2pdf paper.ps
\end{verbatim}}
It is a zero following the ``-G'', which tells dvips to use
the config.pdf file. Newer \TeX\ distributions don't always need this
option.
Using \texttt{pdflatex} rather than \texttt{latex}, often gives better
results. This program avoids the Type-3 font problem, and supports more
advanced features in the \texttt{microtype} package.
\textbf{Graphics files} should be a reasonable size, and included from
an appropriate format. Use vector formats (.eps/.pdf) for plots,
lossless bitmap formats (.png) for raster graphics with sharp lines, and
jpeg for photo-like images.
The style file uses the \texttt{hyperref} package to make clickable
links in documents. If this causes problems for you, add
\texttt{nohyperref} as one of the options to the \texttt{icml2022}
usepackage statement.
\subsection{Submitting Final Camera-Ready Copy}
The final versions of papers accepted for publication should follow the
same format and naming convention as initial submissions, except that
author information (names and affiliations) should be given. See
\cref{final author} for formatting instructions.
The footnote, ``Preliminary work. Under review by the International
Conference on Machine Learning (ICML). Do not distribute.'' must be
modified to ``\textit{Proceedings of the
$\mathit{39}^{th}$ International Conference on Machine Learning},
Baltimore, Maryland, USA, PMLR 162, 2022.
Copyright 2022 by the author(s).''
For those using the \textbf{\LaTeX} style file, this change (and others) is
handled automatically by simply changing
$\mathtt{\backslash usepackage\{icml2022\}}$ to
$$\mathtt{\backslash usepackage[accepted]\{icml2022\}}$$
Authors using \textbf{Word} must edit the
footnote on the first page of the document themselves.
Camera-ready copies should have the title of the paper as running head
on each page except the first one. The running title consists of a
single line centered above a horizontal rule which is $1$~point thick.
The running head should be centered, bold and in $9$~point type. The
rule should be $10$~points above the main text. For those using the
\textbf{\LaTeX} style file, the original title is automatically set as running
head using the \texttt{fancyhdr} package which is included in the ICML
2022 style file package. In case that the original title exceeds the
size restrictions, a shorter form can be supplied by using
\verb|\icmltitlerunning{...}|
just before $\mathtt{\backslash begin\{document\}}$.
Authors using \textbf{Word} must edit the header of the document themselves.
\section{Format of the Paper}
All submissions must follow the specified format.
\subsection{Dimensions}
The text of the paper should be formatted in two columns, with an
overall width of 6.75~inches, height of 9.0~inches, and 0.25~inches
between the columns. The left margin should be 0.75~inches and the top
margin 1.0~inch (2.54~cm). The right and bottom margins will depend on
whether you print on US letter or A4 paper, but all final versions
must be produced for US letter size.
Do not write anything on the margins.
The paper body should be set in 10~point type with a vertical spacing
of 11~points. Please use Times typeface throughout the text.
\subsection{Title}
The paper title should be set in 14~point bold type and centered
between two horizontal rules that are 1~point thick, with 1.0~inch
between the top rule and the top edge of the page. Capitalize the
first letter of content words and put the rest of the title in lower
case.
\subsection{Author Information for Submission}
\label{author info}
ICML uses double-blind review, so author information must not appear. If
you are using \LaTeX\/ and the \texttt{icml2022.sty} file, use
\verb+\icmlauthor{...}+ to specify authors and \verb+\icmlaffiliation{...}+ to specify affiliations. (Read the TeX code used to produce this document for an example usage.) The author information
will not be printed unless \texttt{accepted} is passed as an argument to the
style file.
Submissions that include the author information will not
be reviewed.
\subsubsection{Self-Citations}
If you are citing published papers for which you are an author, refer
to yourself in the third person. In particular, do not use phrases
that reveal your identity (e.g., ``in previous work \cite{langley00}, we
have shown \ldots'').
Do not anonymize citations in the reference section. The only exception are manuscripts that are
not yet published (e.g., under submission). If you choose to refer to
such unpublished manuscripts \cite{anonymous}, anonymized copies have
to be submitted
as Supplementary Material via CMT\@. However, keep in mind that an ICML
paper should be self contained and should contain sufficient detail
for the reviewers to evaluate the work. In particular, reviewers are
not required to look at the Supplementary Material when writing their
review (they are not required to look at more than the first $8$ pages of the submitted document).
\subsubsection{Camera-Ready Author Information}
\label{final author}
If a paper is accepted, a final camera-ready copy must be prepared.
For camera-ready papers, author information should start 0.3~inches below the
bottom rule surrounding the title. The authors' names should appear in 10~point
bold type, in a row, separated by white space, and centered. Author names should
not be broken across lines. Unbolded superscripted numbers, starting 1, should
be used to refer to affiliations.
Affiliations should be numbered in the order of appearance. A single footnote
block of text should be used to list all the affiliations. (Academic
affiliations should list Department, University, City, State/Region, Country.
Similarly for industrial affiliations.)
Each distinct affiliations should be listed once. If an author has multiple
affiliations, multiple superscripts should be placed after the name, separated
by thin spaces. If the authors would like to highlight equal contribution by
multiple first authors, those authors should have an asterisk placed after their
name in superscript, and the term ``\textsuperscript{*}Equal contribution"
should be placed in the footnote block ahead of the list of affiliations. A
list of corresponding authors and their emails (in the format Full Name
\textless{}email@domain.com\textgreater{}) can follow the list of affiliations.
Ideally only one or two names should be listed.
A sample file with author names is included in the ICML2022 style file
package. Turn on the \texttt{[accepted]} option to the stylefile to
see the names rendered. All of the guidelines above are implemented
by the \LaTeX\ style file.
\subsection{Abstract}
The paper abstract should begin in the left column, 0.4~inches below the final
address. The heading `Abstract' should be centered, bold, and in 11~point type.
The abstract body should use 10~point type, with a vertical spacing of
11~points, and should be indented 0.25~inches more than normal on left-hand and
right-hand margins. Insert 0.4~inches of blank space after the body. Keep your
abstract brief and self-contained, limiting it to one paragraph and roughly 4--6
sentences. Gross violations will require correction at the camera-ready phase.
\subsection{Partitioning the Text}
You should organize your paper into sections and paragraphs to help
readers place a structure on the material and understand its
contributions.
\subsubsection{Sections and Subsections}
Section headings should be numbered, flush left, and set in 11~pt bold
type with the content words capitalized. Leave 0.25~inches of space
before the heading and 0.15~inches after the heading.
Similarly, subsection headings should be numbered, flush left, and set
in 10~pt bold type with the content words capitalized. Leave
0.2~inches of space before the heading and 0.13~inches afterward.
Finally, subsubsection headings should be numbered, flush left, and
set in 10~pt small caps with the content words capitalized. Leave
0.18~inches of space before the heading and 0.1~inches after the
heading.
Please use no more than three levels of headings.
\subsubsection{Paragraphs and Footnotes}
Within each section or subsection, you should further partition the
paper into paragraphs. Do not indent the first line of a given
paragraph, but insert a blank line between succeeding ones.
You can use footnotes\footnote{Footnotes
should be complete sentences.} to provide readers with additional
information about a topic without interrupting the flow of the paper.
Indicate footnotes with a number in the text where the point is most
relevant. Place the footnote in 9~point type at the bottom of the
column in which it appears. Precede the first footnote in a column
with a horizontal rule of 0.8~inches.\footnote{Multiple footnotes can
appear in each column, in the same order as they appear in the text,
but spread them across columns and pages if possible.}
\begin{figure}[ht]
\vskip 0.2in
\begin{center}
\centerline{\includegraphics[width=\columnwidth]{icml_numpapers}}
\caption{Historical locations and number of accepted papers for International
Machine Learning Conferences (ICML 1993 -- ICML 2008) and International
Workshops on Machine Learning (ML 1988 -- ML 1992). At the time this figure was
produced, the number of accepted papers for ICML 2008 was unknown and instead
estimated.}
\label{icml-historical}
\end{center}
\vskip -0.2in
\end{figure}
\subsection{Figures}
You may want to include figures in the paper to illustrate
your approach and results. Such artwork should be centered,
legible, and separated from the text. Lines should be dark and at
least 0.5~points thick for purposes of reproduction, and text should
not appear on a gray background.
Label all distinct components of each figure. If the figure takes the
form of a graph, then give a name for each axis and include a legend
that briefly describes each curve. Do not include a title inside the
figure; instead, the caption should serve this function.
Number figures sequentially, placing the figure number and caption
\emph{after} the graphics, with at least 0.1~inches of space before
the caption and 0.1~inches after it, as in
\cref{icml-historical}. The figure caption should be set in
9~point type and centered unless it runs two or more lines, in which
case it should be flush left. You may float figures to the top or
bottom of a column, and you may set wide figures across both columns
(use the environment \texttt{figure*} in \LaTeX). Always place
two-column figures at the top or bottom of the page.
\subsection{Algorithms}
If you are using \LaTeX, please use the ``algorithm'' and ``algorithmic''
environments to format pseudocode. These require
the corresponding stylefiles, algorithm.sty and
algorithmic.sty, which are supplied with this package.
\cref{alg:example} shows an example.
\begin{algorithm}[tb]
\caption{Bubble Sort}
\label{alg:example}
\begin{algorithmic}
\STATE {\bfseries Input:} data $x_i$, size $m$
\REPEAT
\STATE Initialize $noChange = true$.
\FOR{$i=1$ {\bfseries to} $m-1$}
\IF{$x_i > x_{i+1}$}
\STATE Swap $x_i$ and $x_{i+1}$
\STATE $noChange = false$
\ENDIF
\ENDFOR
\UNTIL{$noChange$ is $true$}
\end{algorithmic}
\end{algorithm}
\subsection{Tables}
You may also want to include tables that summarize material. Like
figures, these should be centered, legible, and numbered consecutively.
However, place the title \emph{above} the table with at least
0.1~inches of space before the title and the same after it, as in
\cref{sample-table}. The table title should be set in 9~point
type and centered unless it runs two or more lines, in which case it
should be flush left.
\begin{table}[t]
\caption{Classification accuracies for naive Bayes and flexible
Bayes on various data sets.}
\label{sample-table}
\vskip 0.15in
\begin{center}
\begin{small}
\begin{sc}
\begin{tabular}{lcccr}
\toprule
Data set & Naive & Flexible & Better? \\
\midrule
Breast & 95.9$\pm$ 0.2& 96.7$\pm$ 0.2& $\surd$ \\
Cleveland & 83.3$\pm$ 0.6& 80.0$\pm$ 0.6& $\times$\\
Glass2 & 61.9$\pm$ 1.4& 83.8$\pm$ 0.7& $\surd$ \\
Credit & 74.8$\pm$ 0.5& 78.3$\pm$ 0.6& \\
Horse & 73.3$\pm$ 0.9& 69.7$\pm$ 1.0& $\times$\\
Meta & 67.1$\pm$ 0.6& 76.5$\pm$ 0.5& $\surd$ \\
Pima & 75.1$\pm$ 0.6& 73.9$\pm$ 0.5& \\
Vehicle & 44.9$\pm$ 0.6& 61.5$\pm$ 0.4& $\surd$ \\
\bottomrule
\end{tabular}
\end{sc}
\end{small}
\end{center}
\vskip -0.1in
\end{table}
Tables contain textual material, whereas figures contain graphical material.
Specify the contents of each row and column in the table's topmost
row. Again, you may float tables to a column's top or bottom, and set
wide tables across both columns. Place two-column tables at the
top or bottom of the page.
\subsection{Theorems and such}
The preferred way is to number definitions, propositions, lemmas, etc. consecutively, within sections, as shown below.
\begin{definition}
\label{def:inj}
A function $f:X \to Y$ is injective if for any $x,y\in X$ different, $f(x)\ne f(y)$.
\end{definition}
Using \cref{def:inj} we immediate get the following result:
\begin{proposition}
If $f$ is injective mapping a set $X$ to another set $Y$,
the cardinality of $Y$ is at least as large as that of $X$
\end{proposition}
\begin{proof}
Left as an exercise to the reader.
\end{proof}
\cref{lem:usefullemma} stated next will prove to be useful.
\begin{lemma}
\label{lem:usefullemma}
For any $f:X \to Y$ and $g:Y\to Z$ injective functions, $f \circ g$ is injective.
\end{lemma}
\begin{theorem}
\label{thm:bigtheorem}
If $f:X\to Y$ is bijective, the cardinality of $X$ and $Y$ are the same.
\end{theorem}
An easy corollary of \cref{thm:bigtheorem} is the following:
\begin{corollary}
If $f:X\to Y$ is bijective,
the cardinality of $X$ is at least as large as that of $Y$.
\end{corollary}
\begin{assumption}
The set $X$ is finite.
\label{ass:xfinite}
\end{assumption}
\begin{remark}
According to some, it is only the finite case (cf. \cref{ass:xfinite}) that is interesting.
\end{remark}
\subsection{Citations and References}
Please use APA reference format regardless of your formatter
or word processor. If you rely on the \LaTeX\/ bibliographic
facility, use \texttt{natbib.sty} and \texttt{icml2022.bst}
included in the style-file package to obtain this format.
Citations within the text should include the authors' last names and
year. If the authors' names are included in the sentence, place only
the year in parentheses, for example when referencing Arthur Samuel's
pioneering work \yrcite{Samuel59}. Otherwise place the entire
reference in parentheses with the authors and year separated by a
comma \cite{Samuel59}. List multiple references separated by
semicolons \cite{kearns89,Samuel59,mitchell80}. Use the `et~al.'
construct only for citations with three or more authors or after
listing all authors to a publication in an earlier reference \cite{MachineLearningI}.
Authors should cite their own work in the third person
in the initial version of their paper submitted for blind review.
Please refer to \cref{author info} for detailed instructions on how to
cite your own papers.
Use an unnumbered first-level section heading for the references, and use a
hanging indent style, with the first line of the reference flush against the
left margin and subsequent lines indented by 10 points. The references at the
end of this document give examples for journal articles \cite{Samuel59},
conference publications \cite{langley00}, book chapters \cite{Newell81}, books
\cite{DudaHart2nd}, edited volumes \cite{MachineLearningI}, technical reports
\cite{mitchell80}, and dissertations \cite{kearns89}.
Alphabetize references by the surnames of the first authors, with
single author entries preceding multiple author entries. Order
references for the same authors by year of publication, with the
earliest first. Make sure that each reference includes all relevant
information (e.g., page numbers).
Please put some effort into making references complete, presentable, and
consistent, e.g. use the actual current name of authors.
If using bibtex, please protect capital letters of names and
abbreviations in titles, for example, use \{B\}ayesian or \{L\}ipschitz
in your .bib file.
\section*{Accessibility}
Authors are kindly asked to make their submissions as accessible as possible for everyone including people with disabilities and sensory or neurological differences.
Tips of how to achieve this and what to pay attention to will be provided on the conference website \url{http://icml.cc/}.
\section*{Software and Data}
If a paper is accepted, we strongly encourage the publication of software and data with the
camera-ready version of the paper whenever appropriate. This can be
done by including a URL in the camera-ready copy. However, \textbf{do not}
include URLs that reveal your institution or identity in your
submission for review. Instead, provide an anonymous URL or upload
the material as ``Supplementary Material'' into the CMT reviewing
system. Note that reviewers are not required to look at this material
when writing their review.
\section*{Acknowledgements}
\textbf{Do not} include acknowledgements in the initial version of
the paper submitted for blind review.
If a paper is accepted, the final camera-ready version can (and
probably should) include acknowledgements. In this case, please
place such acknowledgements in an unnumbered section at the
end of the paper. Typically, this will include thanks to reviewers
who gave useful comments, to colleagues who contributed to the ideas,
and to funding agencies and corporate sponsors that provided financial
support.
\nocite{langley00}
\section{Detailed Results}
\label{app:full_res}
\subsection{DMC Medium and Hard Tasks}
\label{app:dmc_full_res}
In Table \ref{tab:dmc_perf}, we show the performance in each of the evaluated 15 DMC environments by reporting the mean and standard deviations over the cumulative returns obtained midway and at the end of training for the medium and hard benchmark tasks, respectively. A-LIX attains state-of-the-art performance in the majority of the tasks at \emph{both} reported checkpoints, while still closely matching DrQ-v2's performance on the remaining tasks. On the other hand, DrQ-v2 struggles to consistently solve some of the harder exploration tasks such as Cartpole Swingup Sparse and Humanoid Run, as shown by the high standard deviations. Interestingly, unlike in the simpler DMC benchmark from \citet{planet} with higher action repeat, CURL appears have a slight edge over DrQ. In particular, the self-supervised signal from CURL appears to aid precisely in the sparse reward environments where DrQ-v2 struggles. Hence, this appears to suggest that including an additional self-supervised signal to the TD-loss, lessens the hindering effects of a lower-magnitude reward signal. We interpret this result as additional evidence showing how addressing any individual component of the deadly triad helps counteracting the catastrophic self-overfitting phenomenon.
We also test the significance of our results by performing a Wilcoxon signed-rank test \citep{wilcoxon} between A-LIX and DrQ-v2. We perform a paired rank test across both seeds and tasks, allowing us to obtain an $p$-value that takes into account both population size and relative performance gains across all tasks. The choice of Wilcoxon signed-rank test also does not presume normality in the distributions of performance which we believe is a more appropriate assumption than for instance a paired $t$-test \citep{studentttest}, despite a potential loss of statistical power. To ensure correct population pairing, A-LIX and DrQ-v2 seeds were identical, resulting in the same initially collected data and network initialization. Performing this test over all 15 tasks and 5 seeds, we achieve a $p$-value of $\mathbf{0.0057}$ at 50\% total frames (1.5M and 15M for Medium and Hard respectively) and $\mathbf{0.0053}$ at 100\% total frames (3.0M and 30M for Medium and Hard Respectively), much lower than the typical rejection criteria of $p>0.05$. We therefore believe this shows clear evidence that our results in DMC are \emph{strongly statistically significant}.
\begin{table}[H]
\caption{Full results for the DeepMind Control Suite benchmark. Each displayed return is averaged over 10 random seeds and from 10 evaluation runs collected at each experience checkpoint.} \label{tab:dmc_perf}
\vspace{-3mm}
\vskip 0.15in
\tabcolsep=0.05cm
\begin{center}
\adjustbox{max width=0.98\linewidth}{
\begin{tabular}{@{}lcccccccccc@{}}
\toprule
\textbf{} & \multicolumn{5}{c}{1.5M frames} & \multicolumn{5}{c}{3.0M frames} \\ \cmidrule(lr){2-6} \cmidrule(lr){7-11}
\textit{Medium tasks} & SAC & CURL & DrQ & DrQv2 & \textbf{A-LIX (Ours)} & SAC & CURL & DrQ & DrQv2 & \textbf{A-LIX (Ours)} \\ \midrule
\textit{Acrobot Swingup} & 8±9 & 6±5 & 24±27 & 256±47 & \textbf{270±99} & 12±11 & 6±5 & 28±25 & \textbf{442±64} & 402±100 \\
\textit{Cartpole Swingup Sparse} & 118±233 & 479±329 & 318±389 & 485±396 & \textbf{718±250} & 185±295 & 499±349 & 316±389 & 505±412 & \textbf{742±250} \\
\textit{Cheetah Run} & 9±8 & 507±114 & 788±59 & 792±29 & \textbf{806±78} & 7±8 & 590±95 & 835±45 & \textbf{873±60} & {864±78} \\
\textit{Finger Turn Easy} & 190±137 & 297±150 & 199±132 & \textbf{854±73} & 546±101 & 200±155 & 309±176 & 216±158 & \textbf{934±54} & {901±109} \\
\textit{Finger Turn Hard} & 79±73 & 174±106 & 100±63 & 491±182 & \textbf{587±109} & 100±78 & 146±95 & 86±70 & 902±77 & \textbf{906±101} \\
\textit{Hopper Hop} & 0±0 & 184±127 & 268±91 & 198±102 & \textbf{287±48} & 0±0 & 224±135 & 285±96 & 240±123 & \textbf{372±48} \\
\textit{Quadruped Run} & 68±72 & 164±91 & 129±97 & 419±204 & \textbf{528±107} & 63±45 & 175±104 & 130±59 & 523±271 & \textbf{759±107} \\
\textit{Quadruped Walk} & 75±65 & 134±53 & 144±149 & 591±256 & \textbf{776±37} & 48±32 & 168±49 & 142±67 & 920±36 & \textbf{900±37} \\
\textit{Reach Duplo} & 1±1 & 8±10 & 8±12 & \textbf{220±7} & 212±3 & 2±3 & 7±10 & 9±9 & \textbf{228±2} & 221±3 \\
\textit{Reacher Easy} & 52±64 & 707±142 & 600±201 & \textbf{971±4} & 887±19 & 115±98 & 667±182 & 612±181 & 940±50 & \textbf{966±19} \\
\textit{Reacher Hard} & 3±2 & 463±196 & 320±233 & \textbf{727±172} & 720±83 & 10±23 & 678±350 & 397±273 & \textbf{935±49} & 855±83 \\
\textit{Walker Run} & 26±4 & 379±234 & 474±148 & 571±276 & \textbf{691±10} & 25±3 & 447±224 & 547±143 & 616±297 & \textbf{756±10} \\ \midrule
\textit{\textbf{Average score}} & 52.28 & 291.73 & 281.03 & 547.96 & \textbf{585.67} & 63.80 & 326.45 & 300.27 & 671.40 & \textbf{720.30} \\ \midrule
& \multicolumn{5}{c}{15.0M frames} & \multicolumn{5}{c}{30.0M frames} \\ \cmidrule(lr){2-6} \cmidrule(lr){7-11}
\textit{Hard tasks} & SAC & CURL & DrQ & DrQv2 & \textbf{A-LIX (Ours)} & SAC & CURL & DrQ & DrQv2 & \textbf{A-LIX (Ours)} \\ \midrule
\textit{Humanoid Walk} & 7±3 & 5±3 & 3±2 & 243±162 & \textbf{476±79} & 4±3 & 4±3 & 5±3 & 675±86 & \textbf{754±79} \\
\textit{Humanoid Stand} & 5±3 & 6±3 & 4±3 & 167±159 & \textbf{519±94} & 6±3 & 6±2 & 6±2 & 588±63 & \textbf{781±94} \\
\textit{Humanoid Run} & 5±3 & 6±2 & 5±3 & 22±30 & \textbf{122±59} & 3±3 & 4±3 & 4±2 & 170±122 & \textbf{242±59} \\ \midrule
\textit{\textbf{Average score}} & 5.64 & 5.74 & 4.02 & 144.16 & \textbf{372.78} & 4.30 & 4.89 & 4.90 & 477.74 & \textbf{592.48} \\ \bottomrule
\end{tabular}
}
\end{center}
\end{table}
We now compare our results using the \textit{Rliable} framework introduced in \citet{agarwal2021deep} (see App.~\ref{app:rliableinfo} for a detailed explanation about the metrics introduced).
\begin{figure}[H]
\centering
\begin{overpic}[width=0.6\linewidth]{figs/rliable_plots/DMC/DMC_performance_profiles.pdf}
\put (32,20) {\textcolor{red}{\textit{}}}
\end{overpic}
\vspace{-4mm}
\caption{\small{Performance profiles at 50\% (\textbf{left}) and 100\% (\textbf{right}) of the total steps in Medium and Hard DMC Tasks.}}
\vspace{-5mm}
\label{fig:dmcperformanceprofiles}
\end{figure}%
We plot performance profiles in Fig.~\ref{fig:dmcperformanceprofiles} at both 50\% and 100\% the total training steps in DMC, which aim to represent sample efficiency and asymptotic performance respectively. We see that in almost all cases, A-LIX improves upon DrQ-v2.
\begin{figure}[H]
\centering
\vspace{-2mm}
\begin{subfigure}[t]{0.27\linewidth}
\begin{overpic}[width=0.99\linewidth,trim={0 0 10mm 0}]{figs/rliable_plots/DMC/DMC_ranking.pdf}
\put (32,55) {\textcolor{red}{\textit{}}}
\end{overpic}
\vspace{-2mm}
\caption{\small{Overall ranking statistics at 50\% (\textbf{top}) and 100\% (\textbf{bottom}) of the total steps in Medium and Hard DMC Tasks.}}
\label{fig:dmcranking}
\end{subfigure}
\hspace{10mm}
\begin{subfigure}[t]{0.5\linewidth}
\begin{overpic}[width=0.99\linewidth]{figs/rliable_plots/DMC/DMC_50p_aggregates.pdf}
\put (32,25) {\textcolor{red}{\textit{}}}
\end{overpic}
\vspace{-2mm}
\caption{\small{Aggregate IQM (\textbf{left}) and Optimality Gap (\textbf{right}) metrics at 50\% of the total steps in Medium and Hard DMC Tasks.}}
\label{fig:dmc50p_aggregate}
\end{subfigure}
\vspace{-5mm}
\end{figure}%
We plot ranking statistics in Fig.~\ref{fig:dmcperformanceprofiles} at both 50\% and 100\% the total training steps in DMC. We see that A-LIX clearly appears most in the 1st ranked column, and rarely appears in lower ranked (i.e., $>3$), suggesting strong performance across all environments in DMC Medium and Hard. We also provide a further aggregated statistics plot in Fig.~\ref{fig:dmc50p_aggregate} (this time at 50\% the total steps), which shows A-LIX is particularly sample-efficient and consistent (i.e., low error bars) across all environments.
\begin{figure}[H]
\centering
\begin{subfigure}[t]{0.3\linewidth}
\begin{overpic}[width=0.99\linewidth]{figs/rliable_plots/DMC/DMC_50p_probability_of_improvement.pdf}
\put (32,25) {\textcolor{red}{\textit{}}}
\end{overpic}
\vspace{-6mm}
\caption{\small{50\% total steps.}}
\end{subfigure}
\hspace{15mm}
\begin{subfigure}[t]{0.3\linewidth}
\begin{overpic}[width=0.99\linewidth]{figs/rliable_plots/DMC/DMC_100p_probability_of_improvement.pdf}
\put (32,25) {\textcolor{red}{\textit{}}}
\end{overpic}
\vspace{-6mm}
\caption{\small{100\% total steps.}}
\end{subfigure}
\vspace{-2mm}
\caption{\small{Probability of Improvement statitistics at both 50\% (\textbf{left}) and 100\% (\textbf{right}) of the total timesteps in Medium and Hard DMC Tasks.}}
\vspace{-5mm}
\label{fig:dmc_pimprove}
\end{figure}%
In Fig.~\ref{fig:dmc_pimprove} we observe that A-LIX likely improves over prior work, and note that whilst the improvement probability over DrQ-v2 may seem slightly low at $\sim$60\%, we note that this value is in line with statistics in prior works that achieve significant gains (as seen in \citet{agarwal2021deep}), and furthermore it does not take into account absolute performance values, and instead only compares relative values, which explains why the gains of A-LIX appear larger when evaluated under IQM and OG. Furthermore, the lower CI for 50\% total steps does not fall below 0.5, which means improvements are indeed statistically significant.
\subsection{Atari 100k}
In Table \ref{tab:full_atari_res}, we show the final average performance for all the evaluated algorithms in each of the twenty-six tasks in the Atari 100k benchmark. A-LIX outperforms SPR, the previous state-of-the-art off-policy algorithm on this benchmark, on 16 out of 26 tasks. Moreover, it attains comparatively similar performance on most of the remaining tasks despite using no augmentation, auxiliary losses, or model-based elements.
\label{app:atari_full_res}
\begin{table}[H]
\caption{Full results for the Atari 100k benchmark, following the evaluation protocol from \citet{machadoALEprotocol}. We report the results collected from 10 random seeds.} \label{tab:figarparam}
\label{tab:full_atari_res}
\begin{center}
\adjustbox{max width=0.98\linewidth}{
\begin{tabular}{@{}lccccccccc@{}}
\toprule
\textit{\textbf{Tasks}} & Random & Human & SimPLe & DER & OTRainbow & CURL & DrQ & SPR & \textbf{A-LIX (Ours)} \\ \midrule
\textit{Alien} & 227.80 & 7127.70 & 616.9 & 739.9 & 824.7 & 558.2 & 771.2 & 801.5 & \textbf{902} \\
\textit{Amidar} & 5.80 & 1719.50 & 88 & \textbf{188.6} & 82.8 & 142.1 & 102.8 & 176.3 & 174.27 \\
\textit{Assault} & 222.40 & 742.00 & 527.2 & 431.2 & 351.9 & 600.6 & 452.4 & 571 & \textbf{660.53} \\
\textit{Asterix} & 210.00 & 8503.30 & \textbf{1128.3} & 470.8 & 628.5 & 734.5 & 603.5 & 977.8 & 809.5 \\
\textit{Bank Heist} & 14.20 & 753.10 & 34.2 & 51 & 182.1 & 131.6 & 168.9 & 380.9 & \textbf{639.4} \\
\textit{Battle Zone} & 2360.00 & 37187.50 & 5184.4 & 10124.6 & 4060.6 & 14870 & 12954 & \textbf{16651} & 14470 \\
\textit{Boxing} & 0.10 & 12.10 & 9.1 & 0.2 & 2.5 & 1.2 & 6 & \textbf{35.8} & 21.5 \\
\textit{Breakout} & 1.70 & 30.50 & 16.4 & 1.9 & 9.8 & 4.9 & 16.1 & 17.1 & \textbf{23.52} \\
\textit{Chopper Command} & 811.00 & 7387.80 & \textbf{1246.9} & 861.8 & 1033.3 & 1058.5 & 780.3 & 974.8 & 747 \\
\textit{Crazy Climber} & 10780.50 & 35829.40 & \textbf{62583.6} & 16185.3 & 21327.8 & 12146.5 & 20516.5 & 42923.6 & 53166 \\
\textit{Demon Attack} & 152.10 & 1971.00 & 208.1 & 508 & 711.8 & 817.6 & \textbf{1113.4} & 545.2 & 888.15 \\
\textit{Freeway} & 0.00 & 29.60 & 20.3 & 27.9 & 25 & 26.7 & 9.8 & 24.4 & \textbf{31.04} \\
\textit{Frostbite} & 65.20 & 4334.70 & 254.7 & 866.8 & 231.6 & 1181.3 & 331.1 & 1821.5 & \textbf{1845.7} \\
\textit{Gopher} & 257.60 & 2412.50 & 771 & 349.5 & \textbf{778} & 669.3 & 636.3 & 715.2 & 500.6 \\
\textit{Hero} & 1027.00 & 30826.40 & 2656.6 & 6857 & 6458.8 & 6279.3 & 3736.3 & 7019.2 & \textbf{7185.85} \\
\textit{Jamesbond} & 29.00 & 302.80 & 125.3 & 301.6 & 112.3 & 471 & 236 & \textbf{365.4} & 341.5 \\
\textit{Kangaroo} & 52.00 & 3035.00 & 323.1 & 779.3 & 605.4 & 872.5 & 940.6 & 3276.4 & \textbf{6507} \\
\textit{Krull} & 1598.00 & 2665.50 & 4539.9 & 2851.5 & 3277.9 & 4229.6 & 4018.1 & 3688.9 & \textbf{4884.04} \\
\textit{Kung Fu Master} & 258.50 & 22736.30 & \textbf{17257.2} & 14346.1 & 5722.2 & 14307.8 & 9111 & 13192.7 & 16316 \\
\textit{Ms Pacman} & 307.30 & 6951.60 & \textbf{1480} & 1204.1 & 941.9 & 1465.5 & 960.5 & 1313.2 & 1258.4 \\
\textit{Pong} & -20.70 & 14.60 & \textbf{12.8} & -19.3 & 1.3 & -16.5 & -8.5 & -5.9 & 6.03 \\
\textit{Private Eye} & 24.90 & 69571.30 & 58.3 & 97.8 & 100 & \textbf{218.4} & -13.6 & 124 & 100 \\
\textit{Qbert} & 163.90 & 13455.00 & 1288.8 & 1152.9 & 509.3 & 1042.4 & 854.4 & 669.1 & \textbf{2974} \\
\textit{Road Runner} & 11.50 & 7845.00 & 5640.6 & 9600 & 2696.7 & 5661 & 8895.1 & 14220.5 & \textbf{17471} \\
\textit{Seaquest} & 68.40 & 42054.70 & \textbf{683.3} & 354.1 & 286.9 & 384.5 & 301.2 & 583.1 & 654.6 \\
\textit{Up N Down} & 533.40 & 11693.20 & 3350.3 & 2877.4 & 2847.6 & 2955.2 & 3180.8 & \textbf{28138.5} & 5011.7 \\ \midrule
\textit{\textbf{Human Norm. Mean}} & 0.000 & 1.000 & 0.443 & 0.285 & 0.264 & 0.381 & 0.357 & 0.704 & \textbf{0.753} \\
\textit{\textbf{Human Norm. Median}} & 0.000 & 1.000 & 0.144 & 0.161 & 0.204 & 0.175 & 0.268 & \textbf{0.415} & 0.411 \\ \midrule
\textit{\textbf{\# SOTA}} & N/A & N/A & 7 & 1 & 1 & 1 & 1 & 4 & \textbf{11} \\
\textit{\textbf{\# Super}} & N/A & N/A & 2 & 2 & 1 & 2 & 2 & \textbf{7} & \textbf{7} \\
\textit{\textbf{Average Rank}} & N/A & N/A & 3.92 & 5.00 & 5.21 & 3.92 & 4.85 & 2.88 & \textbf{2.21} \\ \bottomrule
\end{tabular}
}
\end{center}
\vspace{-3mm}
\end{table}
We now present additional evaluations under the \textit{Rliable} framework, continuing on from the analysis in Fig.~\ref{fig:atarimainrliable}.
\begin{figure}[H]
\vspace{-1mm}
\centering
\begin{overpic}[width=0.6\linewidth]{figs/rliable_plots/Atari_100k/Atari_100k_performance_profiles.pdf}
\end{overpic}
\vspace{-4mm}
\caption{\small{Performance profiles with linear (\textbf{left}) and logarithmic (\textbf{right}) scaling in Atari 100k.}}
\vspace{-5mm}
\label{fig:atari100kperformanceprofile}
\end{figure}%
In Fig.~\ref{fig:atari100kperformanceprofile} A-LIX performs noticeably better than previous work, and performs at least as well as SPR over all settings of normalized scores.
\begin{figure}[H]
\centering
\begin{subfigure}[t]{0.33\linewidth}
\begin{overpic}[width=0.99\linewidth]{figs/rliable_plots/Atari_100k/Atari_100k_ranking.pdf}
\end{overpic}
\vspace{-6mm}
\caption{\small{Ranking statistics.}}
\label{fig:atari100k_ranking}
\end{subfigure}
\hspace{15mm}
\begin{subfigure}[t]{0.33\linewidth}
\begin{overpic}[width=0.99\linewidth]{figs/rliable_plots/Atari_100k/Atari_100k_probability_of_improvement.pdf}
\end{overpic}
\vspace{-6mm}
\caption{\small{Probability of improvement statistics.}}
\label{fig:atari100k_pimprove}
\end{subfigure}
\vspace{-2mm}
\caption{\small{Bootstrapped ranking statistics (\textbf{left}) and probability of improvement plots (\textbf{right}) on Atari 100k.}}
\vspace{-5mm}
\end{figure}%
In Fig.~\ref{fig:atari100k_ranking} A-LIX constitutes the majority of the algorithms ranked in 1st, and shows far fewer instances of being ranked in lower positions (i.e., $>4$). In Fig.~\ref{fig:atari100k_pimprove} we observe A-LIX likely improves upon prior work. Similar to Fig.~\ref{fig:dmc_pimprove}, while the $\sim$60\% improvement value over SPR may seem low, this is justified due to shortcomings in this metric, such as not taking into account actual performance values, and instead relative improvements. Furthermore, the lower CI does not fall below 0.5, which means improvements due to A-LIX are statistically significant.
\subsection{Rliable: A Primer}
\label{app:rliableinfo}
In addition to providing traditional methods of evaluation (e.g., performance tables, significance testing), we use robust metrics and evaluation strategies introduced in \textit{Rliable} \cite{agarwal2021deep}. Rliable advocates for computing aggregate performance statistics not just across many seeds, but also across the many tasks within a benchmark suite.
We give details on how these metrics achieve reliable performance evaluation in RL, denoting number of seeds as $N$ and number of tasks as $M$. We follow \citet{agarwal2021deep} as closely as possible; please refer to their paper for further details.
\subsubsection{Seed and Task aggregation}
In order to aggregate performances across different tasks in the same benchmark suite, we must first normalize each benchmark to the same range. In Atari, this is usually done by normalizing scores with respect to those achieved by humans, and in DMC this is done with respect to the maximum achievable score (i.e., $1,000$). We refer to this normalized score as $\tau$.
\subsubsection{IQM and OG}
Interquartile Mean (IQM) takes the middle 50\% of the runs across seeds and benchmarks (i.e., $[NM/2]$) and then calculates its mean score, improving outlier robustness whilst maintaining statistical efficiency. Optimality Gap (OG) calculates the proportion of performances ($NM$) that fail to meet a minimum threshold $\gamma$, with the assumption that improvements beyond $\gamma$ are not important. In both cases, stratified bootstrap sampling is used to calculate confidence intervals (CIs).
\subsubsection{Performance Profiles}
Performance profiles are a form of empirical CDF, but with stratified bootstrap sampling to produce confidence bands that account for the underlying variability of the score. We can also establish `stochastic dominance' by observing whether one method's performance profile is consistently above another's for all normalized performance values $\tau$.
\subsubsection{Ranking}
Ranking shows the proportion of times a given algorithm ranks in a given position across \emph{all} tasks, with distributions produced using stratified bootstrap sampling having $200,000$ repetitions.
\subsubsection{Probability of Improvement}
Probability of improvement is calculated by calculating the Mann-Whitney U-statistic \cite{mannwhitneyUstat} across all $M$ tasks. The distribution is then plotted as a boxplot, and if the lower CI $>$ 0.5, the improvement is \emph{statistically significant}.
\newpage
\section{Experiments Description}
\subsection{Offline Experiments}
\label{sec:offlinedescrip}
We follow the original training hyperparameters of DrQ-v2, and run policy evaluation and policy improvement until we saw convergence in the TD-loss, which would occur at similar points in all agents (i.e., between 10-20k and 5-10k steps of SGD in policy evaluation and policy iteration respectively). For the proprioceptive experiments, we keep everything consistent, except the input to the critic and actor MLP layers are now the proprioceptive states from the DMC simulator, not the latent representation $z$ from the encoder. That is to say we do not modify the MLP architectures nor their learning rates in the interests of a fair comparison. Furthermore, for any given seed of the offline experiment, we also instantiate all networks in the agents identically and train on the same random offline data, with minibatches presented in the same order.
We also note that a similar algorithm is described in \citet{brandfonbrener2021offline}, but in the context of minimizing extrapolation errors.
Now we present some additional analysis to provide further context to our offline experiments. First, we see that the proprioceptive statistics mirror those of the augmented agent, further illustrating the crucial role of CNN regularization for successful TD-learning from pixels:
\begin{figure}[H]
\vspace{-4mm}
\centering
\includegraphics[width=0.6\linewidth]{figs/appendix_plots/offline_prop_stats.pdf}
\vspace{-3mm}
\caption{\small{Q values and Pearson Correlation of the offline Proprioceptive agent on an offline fixed batch.}}
\vspace{-5mm}
\end{figure}%
Secondly, we observe that the exact same self-overfit also manifests in the online setting by plotting the Pearson correlation values over the initial stages of training in 5 seeds, confirming that phenomena of our offline analysis applies to the online RL problem:
\begin{figure}[H]
\vspace{-4mm}
\centering
\includegraphics[width=0.6\linewidth]{figs/appendix_plots/self-overfit-online.pdf}
\vspace{-6mm}
\caption{\small{Pearson Correlation of augmented and non-augmented online agents in Cheetah Run and Quadruped Walk across 5 seeds. Shaded lines represent individual runs, and solid lines represent the median. We see that augmented agents do not immediately overfit to their target networks, and become correlated only after useful signal is learned.}}
\vspace{-3mm}
\end{figure}%
\subsection{Jacobian Analysis}
\label{sec:jacobiananalysis}
In order to measure local sensitivity, we linearize the encoder around its input using a Taylor series expansion. Consider an $N$-dimensional input $\mathbf{x}\in\mathbb{R}^{N}$ and perturbation $\boldsymbol{\epsilon}\in\mathbb{R}^N$, an $M$-dimensional output $\mathbf{y}\in\mathbb{R}^M$, and a function $\mathbf{F}: \mathbb{R}^N \rightarrow \mathbb{R}^M$. Now, performing a Taylor series expansion around $\tilde{\mathbf{x}}$:
\begin{align}
\mathbf{F}(\tilde{\mathbf{x}} + \boldsymbol{\epsilon}) &= \mathbf{F}(\tilde{\mathbf{x}}) + \boldsymbol{\epsilon} \mathbf{F}(\mathbf{x})\nabla^T|_{\mathbf{x}=\tilde{\mathbf{x}}} + \frac{\boldsymbol{\epsilon}^2}{2}\nabla\mathbf{F}(\mathbf{x})\nabla^T|_{\mathbf{x}=\tilde{\mathbf{x}}} + \dots \\
&\approx \mathbf{F}(\mathbf{\tilde{\mathbf{x}}}) + \mathbf{J}(\tilde{\mathbf{x}})\boldsymbol{\epsilon}\\
&= \tilde{\mathbf{y}}
\end{align}
where we make the approximation in the second line by dropping the second order/Hessian and higher terms under the assumption the perturbation vector $\boldsymbol{\epsilon}$ is small. This allows us to write $\mathbf{F}$ in the form of a local linear system: ${\mathbf{y}} = \mathbf{F}(\mathbf{\mathbf{x}}) + \mathbf{J}(\mathbf{x})\boldsymbol{\epsilon}$. It is straightforward to see that if the entries of the Jacobian matrix $\mathbf{J}$ are larger, then small perturbations $\boldsymbol{\epsilon}$ will cause larger changes in the output ${\mathbf{y}}$. To measure the magnitude of the Jacobian entries, we take the Frobenius norm:
\begin{align}
||\mathbf{J}(\mathbf{x})||_F = \sum_n \sum_m \left(\frac{\partial \mathbf{F}_m({\mathbf{x}})}{\partial \mathbf{x}_n}\right)^2
\end{align}
where $\mathbf{x}_n$ is the `$n$'th entry of $\mathbf{x}$ and $\mathbf{F}_m$ is the `$m$'th entry of the codomain of $\mathbf{F}$. The calculation of the Jacobian is trivial through the use of an automatic differentiation framework.
In our analysis we calculate the Jacobians of both agents on of a fixed batch of 128 frame stacked images taken from the offline training dataset, and compare the corresponding ratios of their Frobenius norms, and take this average ratio over the batch across 4 seeds.
\section{Additional Analysis}
\subsection{Adaptive ND Dual Objective Optimization}
\label{sec:adaptive_dual_objective}
The alternative $ND$ score with increased outlier robustness, $\widetilde{ND}$, proposed in Section~\ref{sec:alix} is inspired by recordings of signal-to-noise ratio measurements. In particular, by passing the individual normalized $D(z)$ terms through a $\log(1+x)$ smoothing function we downweight the effect that large individual outliers might have on this aggregated metric. We would like to remark that since we set up the optimization of $S$ with a dual objective, changes in the actual target value relating to some appropriate smoothness constraint are mostly irrelevant when considering the optimization's dynamics. Therefore, we argue that tuning $S$ with the actual $ND$ should not considerably diverge from tuning $S$ based on a re-scaled appropriate target for $\widetilde{ND}$.
We provide further plots comparing agent performance and respective adaptive parameter $S$ during training:
\begin{figure}[H]
\vspace{-3mm}
\centering
\includegraphics[width=0.9\linewidth]{figs/alix_param_plots/cheetah_run_alix_param.pdf}
\vspace{-6mm}
\caption{\small{{Performance of agents across 4 different seeds of the Cheetah Run environment and their adaptive scalar parameter $S$. We observe that initially, $S$ is high until agents learn useful behaviors, whereupon it drops to maintain ND due to presence of useful signal in the feature gradients.}}}
\vspace{-3mm}
\label{fig:adaptive_cheetah_run}
\end{figure}%
\begin{figure}[H]
\vspace{-3mm}
\centering
\includegraphics[width=0.9\linewidth]{figs/alix_param_plots/quadruped_run_alix_param.pdf}
\vspace{-6mm}
\caption{\small{{Performance of agents across 4 different seeds of the Quadruped Run environment and their adaptive scalar parameter $S$. We observe that as meaningful behaviors are learned in agents towards the end of training, $S$ falls accordingly, whereupon it drops to maintain ND due to presence of useful signal in the feature gradients.}}}
\vspace{-3mm}
\label{fig:adaptive_quadruped_run}
\end{figure}%
We see the same effect in these two contrasting environments; in Cheetah Run, where learning is more stable due to more predictable initializations and fewer degrees of freedom, we see the A-LIX parameter $S$ drop almost immediately as the TD-targets quickly become more accurate. In the less stable Quadruped Run, we also notice this annealing effect, however this occurs later on in training, when the agent can consistently recover from poor initializations.
\subsection{N-Step Returns}
\label{sec:nstep}
Large n-step rewards have become an important part of many algorithms that use TD-learning from visual observations.
As motivated in Section \ref{sec:analysis}, large n-step rewards can help towards mitigating self-overfitting by densifying the reward and downweighting the contribution of the inaccurate target critic, especially early in training; indeed as shown in \cite{drqv2}, using 1-step learning has a significant negative impact on performance. However, it is known that there is a bias-variance trade-off with multi-step approaches~\citep{nstepBias}, and furthermore, almost all approaches using this method do not apply off-policy bias correction when sampling from a replay buffer. While we motivate the use of n-step returns as a way to mitigate self-overfitting through incurring fewer 0 reward tuples (especially common in sparse reward environments early in training), we believe there is evidence to show that this introduces bias when n is sufficiently large, despite prior work suggesting this is not the case~\citep{nstepStudy}.
\begin{figure}[H]
\vspace{-2mm}
\centering
\includegraphics[width=0.6\linewidth]{figs/appendix_plots/nstep.pdf}
\vspace{-3mm}
\caption{\small{{Returns of agents over 5 seeds. Solid lines represent median performance, faded lines represent individual runs.}}}
\vspace{-3mm}
\label{fig:nstep}
\end{figure}%
We show in Fig.~\ref{fig:nstep} that 10-step (as is commonly done in algorithms used to solve Atari) returns can mitigate failure seeds as predicted under the visual deadly triad framework (indeed in Cheetah Run there are no seeds that completely flat-line when 10-step returns are used). However, we also see evidence that applying 10-step returns can have negative impacts on convergence and asymptotic performance in Cheetah Run when the deadly triad is sufficiently managed, such as using augmentations; in Quadruped Run we see moderate benefit initially, but note that asymptotically the 10-step and 3-step agents converge to the same performance. We also provide further evidence in App.~\ref{sec:alixablations}, where applying 10-step returns to an A-LIX agent generally has a laregely negative impact on performance. Finally, we note that trying 20-step returns, as is done in some algorithms that solve Atari~\cite{curl}, caused significant performance reductions in DMC. In conclusion, this provides evidence that we should consider using lower values of `n' in multi-step returns, and achieve this through addressing other elements of the deadly triad.
\newpage
\section{Implementation Details}
In Tables \ref{tab:alix_drq_hyper} and \ref{tab:alix_atari_hyper} we provide the full list of hyperparameters used in our implementations for DMC and Atari 100k, respectively. We show significant differences from standard practices in \textbf{bold}. In particular, A-LIX uses \textit{the same encoder architecture and n-step returns} for both benchmarks, highlighting its lower reliance to environment-specific heuristics. Moreover, unlike prior state-of-the-art algorithms it \textit{does not employ any data augmentation or auxiliary loss function}. These factors show the effectiveness of our adaptive method in counteracting instabilities from the visual deadly triad without any additional help, highlighting its applicability.
\label{sec:app_hyper}
\vfill
\begin{table}[H]
\caption{Full hyperparameters list used for the DeepMind Control A-LIX experiments. \textbf{Bolded} values represent significant differences from canonical implementations.} \label{tab:alix_drq_hyper}
\vskip 0.15in
\begin{center}
\begin{tabular}{@{}ll@{}}
\toprule
\multicolumn{2}{c}{DDPG-integration hyperparameters (following \citep{drqv2})} \\ \midrule
Replay data buffer size & $1000000$ ($100000$ for \textit{Quadruped Run}) \\
Batch size & $256$ ($512$ for \textit{Walker Run}) \\
Minimum data before training & $4000$ \\
Random exploration steps & $2000$ \\
Optimizer & \textit{Adam} \citep{adam} \\
Policy/critic learning rate & \begin{tabular}[c]{@{}l@{}}medium: $0.0001$\\ hard: $0.00008$\end{tabular} \\
Policy/critic $\beta_1$ & $0.9$ \\
Critic UTD ratio & $0.5$ \\
Policy UTD ratio & $0.5$ \\
Discount $\gamma$ & $0.99$ \\
Polyak coefficient $\rho$ & $0.99$ \\
\textit{N}-step returns & $3$ ($1$ for \textit{Walker Run}) \\
Hidden dimensionality & $1024$ \\
Feature dimensionality & \begin{tabular}[c]{@{}l@{}}medium: $50$ \\ hard: $100$\end{tabular} \\
Nonlinearity & ReLU \\
Exploration stddev. clip & $0.3$ \\
Exploration stddev. schedule & \begin{tabular}[c]{@{}l@{}}medium: linear: $1 \rightarrow 0.1$ in $500000$ steps\\ hard: linear: $1 \rightarrow 0.1$ in $2000000$ steps\end{tabular} \\
\textbf{Augmentations} & \textbf{OFF} \\ \midrule
\multicolumn{2}{c}{A-LIX-specific hyperparameters} \\ \midrule
\textbf{Initial maximum sampling shift $S$} & $1.0$ \\
\textbf{Normalized discontinuity targets $\overline{ND}$} & $0.635$ \\
\textbf{Maximum sampling shift learning rate} & \textbf{$0.003$} \\
\textbf{Maximum sampling shift $\beta_1$} & $0.5$ \\ \bottomrule
\end{tabular}
\end{center}
\end{table}
\vfill
\newpage
\begin{table}[H]
\vspace{30mm}
\caption{Full hyperparameters list used for the Atari 100k A-LIX experiments. \textbf{Bolded} values represent significant differences from canonical implementations.} \label{tab:alix_atari_hyper}
\vskip 0.15in
\begin{center}
\begin{tabular}{@{}ll@{}}
\toprule
\multicolumn{2}{c}{DER-integration hyperparameters} \\ \midrule
Gray-scaling & True \\
Down-sampling & $84\times 84$ \\
Frames stacked & $4$ \\
Action repetitions & $4$ \\
Reward clipping & $[-1, 1]$ \\
Max episode frames & $108000$ \\
Replay data buffer size & $100000$ \\
Replay period every & $1$ \\
Batch size & $32$ \\
Minimum data before training & $1600$ \\
Random exploration steps & $1600$ \\
Optimizer & \textit{Adam} \citep{adam} \\
Critic learning rate & $0.0001$ \\
Critic $\beta_1$ & $0.9$ \\
Critic $\epsilon$ & $0.000015$ \\
Max gradient norm & $10$ \\
Critic UTD ratio & $2$ \\
Discount $\gamma$ & $0.99$ \\
Target update period & $1$ \\
\textbf{\textit{N}-step returns} & $\mathbf{3}$ \\
\textbf{Feature maps} & $\mathbf{32, 32, 32}$ \\
\textbf{Filter sizes} & $\mathbf{3\times 3, 3\times 3, 3\times 3}$ \\
\textbf{Strides} & $\mathbf{2,1,1}$ \\
Hidden dimensionality & $256$ \\
Feature dimensionality & $50$ \\
Nonlinearity & ReLU \\
Exploration noisy nets parameter & $0.1$ \\
\textbf{Augmentations} & \textbf{OFF} \\ \midrule
\multicolumn{2}{c}{A-LIX-specific hyperparameters} \\ \midrule
\textbf{Initial maximum sampling shift $S$} & $1.0$ \\
\textbf{Normalized discontinuity targets $\overline{ND}$} & $0.75$ \\
\textbf{Maximum sampling shift learning rate} & \textbf{$0.0001$} \\
\textbf{Maximum sampling shift $\beta_1$} & $0.5$ \\ \bottomrule
\end{tabular}
\end{center}
\end{table}
\newpage
\section{Additional Ablations}
\label{sec:app_abl}
\subsection{Smoothness Regularization through Spectral Normalization}
\label{sec:specnorm}
To distinguish between general smoothness contraints in convolutional features, and the smoothness that arises as a result spatial consistency, we apply spectral normalization~\citep{spectralNorm} to the final convolutional layer in the encoder to represent the former class of constraints. Spectral normalization operates on the parameters of a network and constrains its outputs to be 1-Lipschitz and has shown benefits in prior work~\citep{specnormDQN}, but does not explicitly enforce a \emph{spatial regularization} in the features. We train agents without augmentations using spectral normalization.
\begin{figure}[H]
\vspace{-2mm}
\centering
\includegraphics[width=0.6\linewidth]{figs/appendix_plots/spectral_norm.pdf}
\vspace{-6mm}
\caption{\small{{Returns of agents over 5 seeds. Solid lines represent median performance, faded lines represent individual runs.}}}
\vspace{-4mm}
\label{fig:specnorm}
\end{figure}%
We see that whilst there is clear improvement above the original non-augmented agents in some cases, the performance is still lower than agents that use spatial consistency regularization, such as random shift augmentations.
\subsection{Is Gradient Smoothing All We Need?}
\label{sec:agauss}
Following the argument in Section \ref{sec:rand_shifts}, we can view augmentations as a gradient smoothing regularizer. This naturally leads us to ask the following: can we replace the stochastic shifting mechanism with a fixed smoothing mechanism? To test this, we instead apply a Gaussian smoothing kernel to the feature gradients in the CNN, and utilize our $ND$ score to vary the width of the kernel adaptively through training; we call this method A-Gauss (\textbf{A}daptive \textbf{Gauss}ian Feature Gradient Kernel).
\begin{figure}[H]
\vspace{-2mm}
\centering
\includegraphics[width=0.6\linewidth]{figs/appendix_plots/a-gauss_full.pdf}
\vspace{-6mm}
\caption{\small{{Returns of agents over 5 seeds. Solid lines represent median performance, faded lines represent individual runs.}}}
\vspace{-4mm}
\end{figure}%
We see that while there is improvement over non-augmented agents, overall performance is still lower than even simple non-adaptive augmentation. We believe this is due to the Gaussian kernel having too significant an effect on the information contained in the feature gradients during backpropagation, causing information to be lost. We believe this explains the effectiveness of shift-augmentations in reinforcement learning, which is that they effectively balance the information contained in the gradients, as well as ensuring their smoothness to reduce overfitting.
\subsection{Ablations to A-LIX}
\label{sec:alixablations}
We now provide a set of ablations on both DMC and Atari, assessing the impact of individual components in A-LIX.
\begin{figure}[H]
\vspace{-2mm}
\centering
\hfill
\begin{subfigure}[t]{0.5\linewidth}
\centering
\includegraphics[width=0.999\linewidth]{figs/appendix_plots/ablations/dmc_ablations.pdf}
\vspace{-5mm}
\caption{\small{{DMC Control ablations in Cheetah Run (\textbf{left}) and Quadruped Run (\textbf{right}) evaluated over 4 seeds.}}}
\vspace{15pt}
\label{fig:dmc_ablations}
\end{subfigure}
\hspace{10mm}
\begin{subfigure}[t]{0.4\linewidth}
\centering
\includegraphics[width=0.999\linewidth]{figs/appendix_plots/ablations/atari_ablations.pdf}
\vspace{-5mm}
\caption{\small{{Atari 100k ablations evaluated over 4 seeds in 4 different Atari 100k tasks.}}}
\vspace{-2mm}
\label{fig:atari100k_ablations}
\end{subfigure}
\vspace{-6mm}
\caption{\small{An ablation study of A-LIX, showing the contribution of its individual components to ultimate performance in DMC and Atari 100k.}}
\vspace{-3mm}
\end{figure}%
In Fig.~\ref{fig:dmc_ablations} we choose the following ablations for DMC:
\vspace{-3mm}
\begin{itemize}
\itemsep0em
\item A-LIX
\item Adaptive Random Shifts (where the magnitude of the random shift image augmentation is adjusted using the dual ND objective)
\item LIX
\item Random Shifts (i.e., DrQ-v2)
\end{itemize}
\vspace{-3mm}
While we see a slight asymptotic performance improvement in Cheetah Run by using LIX layers instead of random shifts, we notice significant differences in the less stable Quadruped Run environment. Concretely, we see much greater stability in both LIX approaches compared with image augmentation approaches, with the former having no failure seeds. Furthermore, we observe stronger asymptotic performance with the inclusion of the adaptive dual objective for both approaches. As motivated in Fig.~\ref{fig:adaptive_quadruped_run}, this is likely a result of reducing the shift parameter as the signal in the target values increases.
In Fig.~\ref{fig:atari100k_ablations}, we choose the following ablations for Atari 100k on a subset of environments that represent a diverse set of tasks and performances with baseline algorithms:
\vspace{-3mm}
\begin{itemize}
\itemsep0em
\item A-LIX
\item Adaptive Random Shifts (as before)
\item LIX
\item A-LIX with 10-step returns
\item Random Shifts
\end{itemize}
\vspace{-3mm}
We see that A-LIX performs consistently strongly across the environments tested, always placing in the top 2 with regards to Human Normalized Score. We also notice that generally, LIX layer methods outperform random shift methods apart from in Crazy Climber, where the opposite is true. We believe this may be due to random shift augmentations actually reflecting the inductive biases concerning generalization in this environment, and believe this merits further investigation. Finally, we observe that using 10-step returns instead of 3 generally harms performance with A-LIX, with justification given in App.~\ref{sec:nstep}.
\section{Additional Offline Experiment Analysis}
\subsection{Behavior Cloning without Augmentations}
\label{sec:behaviorcloning}
\begin{figure}[H]
\vspace{-2mm}
\centering
\includegraphics[width=0.4\linewidth]{figs/appendix_plots/BC.pdf}
\vspace{-5mm}
\caption{\small{{Returns of agents over 5 seeds. Solid lines represent median performance, faded lines represent individual runs. The grey dotted horizontal line represents mean expert performance.}}}
\vspace{-5mm}
\label{fig:BC}
\end{figure}%
To illustrate that test time shift invariance is not required, we show that it is possible to learn a policy through supervised learning. To do this, we generate a pixel-based dataset of 500,000 timesteps under an expert policy in Cheetah Run, and jointly train a CNN encoder and policy using behavior cloning/supervised learning by minimizing the loss $\mathcal{L} = (a - \pi(o))^2$ until convergence, where $o$ follows the stacked frame image inputs of \cite{dqn}. We see that the pixel-based policy performs as well as the behavior agent, despite using both higher dimensional data and fewer than half the samples compared to existing expert offline RL benchmarks from \emph{proprioceptive} states \cite{d4rl}.
This provides clear evidence that shift invariance is not required at test time, and motivates us to find an alternative explanation for why random shift augmentations help the learning process in TD-learning. An alternative perspective is that when the learning signal is strong, as is the case for supervised learning (and later stages during online learning when target values are more accurate), the natural bias of CNNs to learn lower order representations acts as an implicit regularizer \cite{cnnspectralbias} that results in test-time generalization.
\subsection{Turning Off Augmentations}
\label{sec:turnoffaug}
We present more evidence showing that augmentations benefit learning the most at the beginning of training. In Fig.~\ref{fig:turnoffaug2} we show the effect of turning off augmentations at 200,000 steps in Cheetah Run, and at 500,000 in Quadruped Walk. In both instances, we see large improvements over not augmenting at all, and both nearly converge to the same value as DrQ-v2, showing further evidence that stability initially in learning is vital. We posit that turning off augmentations here did not yield similar benefits to Fig.~\ref{fig:turnoffaug} due to the fact that there is still high-frequency information in the targets (consider that the augmentations in Cheetah Run are switched off significantly earlier) that cause a marginal amount of self-overfitting, reducing the rate of learning due to feature space degeneration.
\begin{figure}[H]
\vspace{-2mm}
\centering
\includegraphics[width=0.6\linewidth]{figs/appendix_plots/aug_turn_off2.pdf}
\vspace{-6mm}
\caption{\small{{Returns of agents over 5 seeds. Solid lines represent median performance, faded lines represent individual runs. The grey dashed line shows when augmentations are turned off.}}}
\vspace{-3mm}
\label{fig:turnoffaug2}
\end{figure}%
\subsection{Action-Value Surfaces}
\label{sec:actvalsurf}
Here we show the action-value surfaces of the offline agents' critics at various tuples sampled from the data. This provides us with an intuition over the loss landscape that the policies will be optimizing during the policy improvement, as accordingly the policy under the deterministic policy gradient~\citep{dpg} updates its own weights towards maximizing the action-values defined by the critic through the chain rule:
\begin{align}
\nabla_{\phi} J_\pi &\approx \mathbb{E}_{s\sim E}\left[ \nabla_a Q_\theta(s,a)|_{a = f_\phi(s)} \nabla_{\phi} f_\phi(s) \right]
\end{align}
where $\phi$ and $\theta$ are policy and critic weights respectively. We hypothesize that self-overfitting reduces the sensitivity of the critic to actions, discarding important information regarding the causal link between actions and expected returns. To evaluate this, we sample state-action pairs from our replay buffer, and then visualize the action-value surface by sampling two random \emph{orthogonal} direction vectors from the action space $A$. We then normalize the direction vectors to have a 2-norm of 1, and then multiply each direction vector by scalars $\alpha, \beta \in [-2,2]$ respectively. We then plot the action-value surface as a result of adding the random vectors multiplied by their respective scalars onto the action sampled from offline dataset, giving us a 3-D surface. We clip actions to $a \in [-1,1]^{|A|}$ as actions are squashed to this range in the policy through a truncated normal distribution.
\begin{figure}[H]
\vspace{-1mm}
\centering
\begin{subfigure}[t]{0.43\linewidth}
\centering
\includegraphics[width=0.999\linewidth]{figs/appendix_plots/action_value_loss_surfaces/act-val-loss-surf-0.pdf}
\vspace{-5mm}
\caption{\small{{Random Sampled State-Action Pair 1}}}
\end{subfigure}
\hspace{6mm}
\begin{subfigure}[t]{0.43\linewidth}
\centering
\includegraphics[width=0.999\linewidth]{figs/appendix_plots/action_value_loss_surfaces/act-val-loss-surf-1.pdf}
\vspace{-5mm}
\caption{\small{{Random Sampled State-Action Pair 2}}}
\end{subfigure}
\begin{subfigure}[t]{0.43\linewidth}
\centering
\includegraphics[width=0.999\linewidth]{figs/appendix_plots/action_value_loss_surfaces/act-val-loss-surf-2.pdf}
\vspace{-5mm}
\caption{\small{{Random Sampled State-Action Pair 4}}}
\vspace{-2mm}
\end{subfigure}
\hspace{6mm}
\begin{subfigure}[t]{0.43\linewidth}
\centering
\includegraphics[width=0.999\linewidth]{figs/appendix_plots/action_value_loss_surfaces/act-val-loss-surf-3.pdf}
\vspace{-5mm}
\caption{\small{{Random Sampled State-Action Pair 4}}}
\vspace{-2mm}
\end{subfigure}
\vspace{-1mm}
\caption{\small{Action-Value loss surface plotted with respect two orthogonal random directions sampled from the action space (i.e., $d_{{r}} \in A$ and $d_1 \perp d_2$).}}
\vspace{-3mm}
\end{figure}%
We see that the critics learned by the augmented agents are more sensitive to changes in action. We believe this is due to the non-augmented agents overfitting to the observations, thus ignoring the lower-dimensional action inputs. To validate this, we sampled 128 random state-action tuples from the offline buffer, and calculated the average variance across the loss surfaces. We see a significant difference, with the augmented agent having an average loss surface variance of \textbf{0.0129}, whereas the non-augmented agent has an average loss surface variance of \textbf{0.0044}, suggestive of lower sensitivity.
\subsection{Evidence of Critic MLP Overfitting from High-Frequency Features}
\label{sec:checkerboard}
We provide further evidence that measuring high-frequency features through the ND score is vital to understanding overfit by showing how overfitting is able to occur in the fully-connected critic layers, which are usually stable under proprioceptive observations (see Table \ref{tab:offline}). To do this, we construct a pattern containing high frequency checkerboard noise $c \in \mathbb{R}^{H\times W}$, and produce as many patterns as there are channels $C$ in the final layer. To ensure consistency across each individual feature map, we normalize each checkerboard pattern by the maximum value in its respective feature map, and then divide by the width of the checkerboard. We then add this pattern multiplied by a scalar $\alpha$ onto each feature map.
\begin{figure}[H]
\vspace{-3mm}
\centering
\begin{subfigure}[b]{0.4\linewidth}
\centering
\includegraphics[width=0.999\linewidth]{figs/appendix_plots/checkerboards_vis.pdf}
\vspace{-6mm}
\caption{\small{{Example checkerboard artefacts.}}}
\end{subfigure}
\hspace{7mm}
\begin{subfigure}[b]{0.4\linewidth}
\centering
\vspace{-1mm}
\includegraphics[width=0.58\linewidth]{figs/appendix_plots/checkerboard_plot.pdf}
\vspace{-2mm}
\caption{\small{{Sensitivity of agents to checkerboard artifact weight}}}
\end{subfigure}
\vspace{-4mm}
\caption{\small{Effect of checkerboard artifacts on feature maps and resultant loss sensitivity. We see the non-augmented agent is significantly more sensitive to this high-frequency noise.}}
\vspace{-5mm}
\end{figure}
As we see, the loss is significantly more sensitive to high-frequency perturbations in the non-augmented agent, justifying its reliance on high-frequency patterns in the feature maps to enable self-overfitting.
\subsection{Additional Loss Surfaces}
\label{sec:mlpsurface}
Here we show the loss surfaces of the offline agents under policy evaluation with at 1,000, 5,000, and 10,000 training steps. We also show the surfaces respect to only the MLP layers, again following the normalization approach of~\citet{visualloss}.
\begin{figure}[H]
\vspace{-2mm}
\centering
\begin{subfigure}[t]{0.33\linewidth}
\centering
\includegraphics[width=0.999\linewidth]{figs/appendix_plots/loss_surfaces/encoder-loss-surface_1000.pdf}
\vspace{-5mm}
\caption{\small{{1,000 SGD Steps}}}
\vspace{-2mm}
\end{subfigure}
\hfill
\begin{subfigure}[t]{0.33\linewidth}
\centering
\includegraphics[width=0.999\linewidth]{figs/appendix_plots/loss_surfaces/encoder-loss-surface_5000.pdf}
\vspace{-5mm}
\caption{\small{{5,000 SGD Steps}}}
\vspace{-2mm}
\end{subfigure}
\hfill
\begin{subfigure}[t]{0.33\linewidth}
\centering
\includegraphics[width=0.999\linewidth]{figs/appendix_plots/loss_surfaces/encoder-loss-surface_10000.pdf}
\vspace{-5mm}
\caption{\small{{10,000 SGD Steps}}}
\vspace{-2mm}
\end{subfigure}
\caption{\small{Loss surface plotted with respect to \emph{Encoder} parameters at various stages of training.}}
\vspace{-3mm}
\end{figure}%
\begin{figure}[H]
\vspace{-2mm}
\centering
\begin{subfigure}[t]{0.33\linewidth}
\centering
\includegraphics[width=0.999\linewidth]{figs/appendix_plots/loss_surfaces/critic-loss-surface_1000.pdf}
\vspace{-5mm}
\caption{\small{{1,000 SGD Steps}}}
\vspace{-2mm}
\end{subfigure}
\hfill
\begin{subfigure}[t]{0.33\linewidth}
\centering
\includegraphics[width=0.999\linewidth]{figs/appendix_plots/loss_surfaces/critic-loss-surface_5000.pdf}
\vspace{-5mm}
\caption{\small{{5,000 SGD Steps}}}
\vspace{-2mm}
\end{subfigure}
\hfill
\begin{subfigure}[t]{0.33\linewidth}
\centering
\includegraphics[width=0.999\linewidth]{figs/appendix_plots/loss_surfaces/critic-loss-surface_10000.pdf}
\vspace{-5mm}
\caption{\small{{10,000 SGD Steps}}}
\vspace{-2mm}
\end{subfigure}
\caption{\small{Loss surface plotted with respect to \emph{Critic MLP} parameters at various stages of training.}}
\vspace{-5mm}
\end{figure}%
As we see, the loss surface with respect to the MLP parameters is significantly less sharp, lending further evidence that self-overfitting is predominately a result of the flexibility of the CNN layers to learn high-frequency features. |
\section{INTRODUCTION}
Convex optimization has been widely studied as a pretty effective method in research fields involving optimization and decision-making, such as automatic control systems \cite{ran1996}, communication networks \cite{luo2003}, and machine learning \cite{qiu2016}.
Early convex optimization works were based on fixed cost functions and static constraints.
However, in practice, optimization costs and constraints of many problems are possible to be time-varying and a priori unknown \cite{ss2011}. This motivated online convex optimization (OCO) which requires the decision maker to choose an action at each instant based on previous information.
A widely used performance criterion of OCO is regret, that is, the gap between the cumulative loss of the selected action and that of the best ideal action made when knowing the global information beforehand. If regret is sublinear, the time average loss of the selected action is progressively not greater than that of the ideal action. Another performance indicator is fit, which measures the degree of violation of static/time-varying inequality constraints. For more details, a recent survey can be referenced \cite{li2022sur}.
The OCO framework was introduced by \cite{zink2003}, where the projection-based online gradient descent algorithm was analyzed. Based on static constraints, the algorithm was proved to achieve $\mathcal{O}(\sqrt{T})$ static regret bound for time-varying convex cost functions with bounded subgradients.
With the increase of data scale and problem complexity in recent years, distributed online convex optimization has also been widely studied in recent years \cite{zhou2018}. In the continuous-time setting, the saddle-point algorithm proposed in \cite{lee2016} under constant constraints is shown to achieve sublinear bounds on the network disagreement and the regret achieved by the strategy. The authors of \cite{pater2020} generalized this result to the problem of time-varying constraints.
In the discrete-time setting, \cite{yuan2018, lxx2021} used distributed primal-dual algorithms to solve online convex optimization with static independent and coupled inequality constraints. In order to solve the time-varying coupling constraints, the authors of \cite{yi2020} proposed a novel distributed online primal dual dynamic mirror descent algorithm to realize sublinear dynamic regret and constraint violation.
A gradient-free distributed bandit online algorithm was proposed in \cite{yi20212}, which is applicable to scenarios where it is difficult to obtain the gradient information of the cost functions.
In the presence of aggregate variables in local cost functions, an online distributed gradient tracking algorithm was developed in \cite{li20212} based on true or stochastic gradients.
In actual physical systems, the implementation of optimization strategies must take into account the complicated dynamics of each agent. Along this line, only a few works have investigated online convex optimization with physical systems in recent years.
For continuous-time multi-agent systems with high-order integrators, the authors of \cite{deng2016} used PI control idea and gradient descent to solve the distributed OCO problem. The authors of \cite{non2020} considered the online convex optimization problem of linear systems, but did not consider any constraints. The online convex optimization problem of linear time-invariant (LTI) system was studied in \cite{non2021} based on the behavioral system theory, where a proposed data-driven algorithm that does not rely on the model achieves sublinear convergence. However, the above two papers for linear systems only provide centralized algorithms. The distributed setup for online optimization algorithm with linear systems is yet to be studied.
The main contributions of this paper are as follows.
\begin{itemize}
\item Compared with the centralized OCO algorithms for linear systems with no constrains \cite{non2020,non2021}, this paper studies the distributed online optimization of heterogeneous multi-agent systems with time-varying coupled inequality constraints for the first time. Agents only rely on the information of themselves and their neighbors to make decisions and achieve constant regret bound and $\mathcal{O}(\sqrt{T})$ fit bound. In comparison, most existing algorithms \cite{yi2020,li2022} about distributed online optimization with coupled inequality constraints only achieve inferior sublinear regret bounds.
\item Compared with current continuous-time online optimization algorithms \cite{deng2016, lee2016, pater2020}, this paper introduces an event-triggered mechanism to reduce the communication overhead. In the case of discrete communication, the constant regret bound and $\mathcal{O}(\sqrt{T})$ fit bound are still achieved.
\end{itemize}
The rest of the paper is organized as follows. Preliminaries are given in Section \ref{pre}. In Section \ref{pro}, the heterogeneous multi-agent system under investigation is described mathematically, the online convex optimization problem is defined and some useful lemmas are given. Following that, the control laws with continuous and event-triggered communication are proposed, respectively, and the constant regret bound and sublinear fit bound are established in Section \ref{mai}. Then, a simulation example is provided to verify the effectiveness of the algorithm in Section \ref{sim}. Finally, the conclusion is discussed in Section \ref{res}.
\section{PRELIMINARIES}\label{pre}
\subsection{Notations}
Let $\mathbb{R}$, $\mathbb{R}^n$, $\mathbb{R}_+^n$, $\mathbb{R}^{m\times n}$ be the sets of real numbers, real vectors of dimension $n$, non-negative real vectors of dimension $n$, and real matrices of dimension $m\times n$, respectively.
The $n\times n$ identity matrix is denoted by $I_n$. The $n\times 1$ all-one and all-zero column vectors are denoted by $\boldsymbol1_n$ and $\boldsymbol0_n$, respectively.
For a matrix $A\in\mathbb{R}^{m \times n}$, $A^\top $ is its transpose and $diag(A_1,\dots,A_n)$ denotes a block diagonal matrix with diagonal blocks of $A_1$, $\dots$, $A_n$.
For a vector $x$, $\|x\|_1$ is its $1$-norm, $\|x\|$ is its $2$-norm, and $col(x_1,\dots,x_n)$ is a column vector by stacking vectors $x_1,\dots,x_n$. $A\otimes B$ represents the Kronecker product of matrices $A$ and $B$.
Let $P_\mathcal{S}(x)$ be the Euclidean projection of a vector $x\in \mathbb{R}^n$ onto the set $\mathcal{S} \subseteq \mathbb{R}^n$, i.e.,
$P_\mathcal{S}(x)=argmin_{y\in\mathcal{S}}\|x-y\|^2$. For simplicity, let $[\cdot]_+$ denote $P_{\mathbb{R}_+^n}(\cdot)$. Define the set-valued sign function $\mathrm{sgn}(\cdot)$ as follows:
\begin{align*}
\sign{x}:=\partial\|x\|_1=
\begin{cases}
-1,&\mathrm{if}\ x<0,\\
[-1,1],&\mathrm{if}\ x=0,\\
1,&\mathrm{if}\ x>0.
\end{cases}
\end{align*}
\subsection{Graph Theory}
For a system with $N$ agents, its communication network is modeled by an undirected graph $\mathcal{G} = (\mathcal{V}, \mathcal{E})$, where $\mathcal{V} = \{v_1, \dots, v_N\}$ is a node set and $\mathcal{E} \in \mathcal{V} \times \mathcal{V}$ is an edge set. If information exchange can occur between $v_j$ and $v_i$, then $(v_j,v_i) \in \mathcal{E}$ with $a_{ij}=1$ denoting its weight. $\mathcal{A}= [a_{ij}]\in \mathbb{R}^{N \times N}$ is the adjacency matrix. If there exists a path from any node to any other node in $\mathcal{V}$, then $\mathcal{G}$ is called connected
\section{PROBLEM FORMULATION}\label{pro}
Consider a multi-agent system consisting of $N$ heterogeneous agents indexed by $i=1, \dots, N$, and the $i$th agent has following linear dynamics:
\begin{align}
\begin{split}
{\dot x}_i&=A_i x_i + B_i u_i,\\
y_i&=C_i x_i,\label{eqsys}
\end{split}
\end{align}
where $x_i\in\mathbb{R}^{n_i}$, $u_i\in\mathbb{R}^{m_i}$ and $y_i\in\mathbb{R}^{p_i}$ are the state, input and output variables, respectively. $A_i\in\mathbb{R}^{n_i \times n_i}$, $B_i\in\mathbb{R}^{n_i \times m_i}$ and $C_i\in\mathbb{R}^{p_i \times n_i}$ are the state, input and output matrices, respectively.
Each agent $i$ has an output set $\mathcal{Y}_i\subseteq\mathbb{R}^{p_i}$ such that the output variable $y_i\in\mathcal{Y}_i$. $f_i(t,\cdot): \mathbb{R}^{p_i}\to \mathbb{R}$ and $g_i(t,\cdot): \mathbb{R}^{p_i}\to \mathbb{R}^{q}$ are the private cost and constraint functions for agent $i$.
Denote $p:=\sum_{i=1}^{N}p_i$, $\mathcal{Y}:=\mathcal{Y}_1\times\dots \times \mathcal{Y}_N \subseteq \mathbb{R}^{p}$, $y:=col(y_1,\dots, y_N)\in\mathbb{R}^p$, and $f(t,y):=\sum_{i=1}^{N}f_{i}(t, y_i)$.
The objective of this paper is to design a controller $u_i(t)$ for each agent by using only local interaction and information such that all agents cooperatively minimize the sum of the cost functions over a period of time $[0,T]$ with time-varying coupled inequality constraints:
\begin{align}
\begin{split}
\min_{y \in \mathcal{Y}} \int_{0}^{T}f(t,y)\,dt ,\\
s.t. \sum_{i=1}^{N}g_{i}(t, y_i)\le \boldsymbol0.\label{question2}
\end{split}
\end{align}
Let $y^*=(y_1^*,\dots,y_N^*)\in \mathcal{Y}$ denote the optimal solution for problem (\ref{question2}) when the time-varying cost and constraint functions are known in advance.
In order to evaluate the cost performance of such output trajectories, we define two performance indicators: network regret and network fit. According to the previous definition, $y^*$ is the optimal output when the agents know all the information of network in the period of $[0, T]$. But in reality, agents can only make decisions based on their own and neighbors' current and previous information. Regret is described as the gap between the cumulative action $\int_{0}^{T} f(t,y(t))\,dt$ incurred by $y(t)$ and the cost incurred by the optimal output $y^*$, i.e.,
\begin{align}
\mathcal{R}^T:=\int_{0}^{T} \Big(f(t,y(t))-f(t,y^*)\Big)\,dt\label{regert}.
\end{align}
In order to evaluate the fitness of output trajectories $y(t)$ to the constraints (or in other words, the degree of violation of the constraints), we define fit as the projection of the cumulative constraints onto the nonnegative orthant:
\begin{align}
\mathcal{F}^T:=\left\|\,\left[\int_{0}^{T} \sum_{i=1}^{N}g_{i}(t, y_i) \,dt\right]_+\right\|.\label{fit}
\end{align}
This definition implicitly allows strictly feasible decisions to compensate for violations of constraints at certain times. This is reasonable when the variables can be stored or preserved, such as the average power constraints \cite{pater2017}.
By $g_i(t,\cdot): \mathbb{R}^{p_i}\to \mathbb{R}^{q}$, one can define $g_{i,j}(t,\cdot): \mathbb{R}^{p_i}\to \mathbb{R}$ as the $j$th component of $g_i(t,\cdot)$, i.e., $g_i(t,\cdot) = col\left(g_{i,1}(t,\cdot), \dots, g_{i,q}(t,\cdot)\right)$. Further, define $F_j^T:=\int_{0}^{T} \sum_{i=1}^{N}g_{i,j}(t, y_i)\,dt, j=1,\dots,q$ as the $j$th component of the constraint integral. It can be easily deduced that
\begin{align}
\mathcal{F}^T=\sqrt{\sum_{j=1}^q\left[F_j^T\right]_+^2}.\notag
\end{align}
\begin{assumption} \label{asp1}
The communication network $\mathcal{G}$ is undirected and connected.
\end{assumption}
\begin{assumption} \label{asp2}
Each set $\mathcal{Y}_i$ is convex and compact. For $t\in [0,T]$, functions $f_i(t,y_i)$ and $g_i(t,y_i)$ are convex, integrable and bounded on $\mathcal{Y}_i$, i.e., there exist constants $K_f>0$ and $K_g>0$ such that $|f_i(t,y_i)|\le K_f$ and $\|g_i(t,y_i)\|\le K_g$.
\end{assumption}
\begin{assumption}
The set of feasible outputs $\mathcal{Y}^\dagger:=\{y: y\in\mathcal{Y}, \sum_{i=1}^{N}g_{i}(t, y_i)\le 0, t\in[0,T]\}$ is non-empty.
\end{assumption}
\begin{definition} [\cite{zhang1995}]
Let $\mathcal{S} \subseteq \mathbb{R}^n$ be a closed convex set. Then, for any $x \in \mathcal{S}$ and $v\in\mathbb{R}^n$, the projection of $v$ over set $\mathcal{S}$ at the point $x$ can be defined as
\begin{align}
\Pi_\mathcal{S} [x,v] = \lim\limits_{\xi\to0^+} \frac{P_\mathcal{S}(x+\xi v)-x}{\xi}.\notag
\end{align}
\end{definition}
\begin{lemma} [\cite{pater2017}]
Let $\mathcal{S} \subseteq \mathbb{R}^n$ be a convex set and let $x, y\in \mathcal{S}$, then
\begin{align}
(x-y)^\top \Pi_{\mathcal{S}}(x,v)\le (x-y)^\top v, \forall v\in \mathcal{S}.\label{eqle2}
\end{align}
\end{lemma}
\begin{assumption} \label{asp4}
$(A_i,B_i)$ is controllable, and
\begin{align}
rank(C_iB_i)=p_i, i=1,\dots,N.\notag
\end{align}
\end{assumption}
\begin{lemma} [\cite{yu2021}]\label{lemma3}
Under Assumption \ref{asp4}, the matrix equations
\begin{subequations}\label{eqle3}
\begin{align}
C_iB_iK_{\alpha_i}&=C_iA_i,\label{eqle31}\\
C_iB_iK_{\beta_i}&=I_{p_i},\label{eqle32}
\end{align}
\end{subequations}
have solutions $K_{\alpha_i}$, $K_{\beta_i}$.
\end{lemma}
\begin{remark}
Assumption \ref{asp2} is reasonable since the output variables in practice, such as voltage, often have a certain range. The cost functions and constraint functions are not required to be differentiable, which can be dealt with by using subgradients. The controllability in Assumption \ref{asp4} is quite standard in dealing with the problem for linear systems.
\end{remark}
\section{MAIN RESULTS}\label{mai}
\subsection{Continuous Communication}
For agent $i$, to solve the online optimization problem (\ref{question2}), we can construct the time-varying Lagrangian
\begin{align}
\mathcal{H}_i(t,y_i,\mu_i)=f_i(t,y_i)+\mu_i^\top g_i(t,y_i) - K_\mu h_i,\label{la}
\end{align}
where $\mu_i\in\mathbb{R}_+^{q}$ is the local Lagrange multiplier for agent $i$, $K_\mu>0$ is the preset parameter and $h_i:= \sum_{j=1}^N a_{ij}\left\|\mu_i-\mu_j\right\|_1$ is a metric of $\mu_i$'s disagreement \cite{liang2018}.
Notice that $f_i(t,\cdot)$, $g_i(t,\cdot)$ are convex and $\mu_i \ge \boldsymbol 0_q$,
hence the Lagrangian is convex with respect to $y_i$. Let us
denote by $\mathcal{H}_i^{y_i}(t,y_i,\mu_i)$ a subgradient of $\mathcal{H}_i$ with respect to $y_i$, i.e.,
\begin{align}
\mathcal{H}_i^{y_i}(t,y_i,\mu_i)\in \partial f_i(t,y_i)+\mu_i^\top \partial g_i(t,y_i).\label{lax}
\end{align}
The Lagrangian is concave with respect to $\mu_i$ and its subgradient is given by
\begin{align}
\mathcal{H}_i^{\mu_i}(t,y_i,\mu_i)&\in g_i(t,y_i) - K_\mu\sum_{j=1}^N a_{ij}\sign{\mu_i-\mu_j}.\label{lamu}
\end{align}
For simplicity, define
\begin{align}
\mathcal{H}(t,y,\mu):= f(t,y)+\mu^\top g(t,y) - K_\mu h(\mu),\label{lag}
\end{align}
where $y=col(y_1,\dots, y_N)$, $\mu=col(\mu_1, \dots, \mu_N)$, $f(t,y)=\sum_{i=1}^{N}f_{i}(t, y_i)$, $g(t,y)=col(g_1(t,y_1), \dots, g_N(t,y_N))$, and $h(\mu)= \sum_{i=1}^N\sum_{j=1}^Na_{ij}\left\|\mu_i-\mu_j\right\|_1$. It can be easily verified that $\mathcal{H}(t,y,\mu)=\sum_{i=1}^{N}\mathcal{H}_i(t,y_i,\mu_i)$.
A controller following modified Arrow-Hurwicz algorithm for the $i$th agent is proposed as
\begin{subequations}\label{eqpi1}
\begin{align}
u_i&=-K_{\alpha_i} x_i+K_{\beta_i} \left(\Pi_{\mathcal{Y}_i}[y_i, -\varepsilon\mathcal{H}_i^{y_i}(t,y_i,\mu_i)]\right),\label{eqpi1a}\\
\dot{\mu_i}&=\Pi_{\mathbb{R}_+^q}[\mu_i,\varepsilon\mathcal{H}_i^{\mu_i}(t,y_i,\mu_i)], \label{eqpi1b}
\end{align}
\end{subequations}
where $\varepsilon>0$ is the step size, $K_{\alpha_i},K_{\beta_i}$ are feedback matrices that are the solutions of (\ref{eqle3}), and the initial value $\mu_i(0){=}\boldsymbol{0}$.
Substituting the controller (\ref{eqpi1}) into the system (\ref{eqsys}), the system dynamics of the $i$th agent is
\begin{subequations}\label{eqpi2}
\begin{align}
\dot x_i&{=}(A_i{-}B_i K_{\alpha_i})x_i{+}B_iK_{\beta_i}\left(\Pi_{\mathcal{Y}_i}[y_i, -\varepsilon\mathcal{H}_i^{y_i}(t,y_i,\mu_i)]\right),\label{eqpi2a}\\
\dot{\mu_i}&{=}\Pi_{\mathbb{R}_+^q}[\mu_i,\varepsilon\mathcal{H}_i^{\mu_i}(t,y_i,\mu_i)] ,\label{eqpi2b}\\
y_i&{=}C_ix_i.\label{eqpi2c}
\end{align}
\end{subequations}
For the subsequent analysis, consider the following energy function with any $\tilde{y}\in\mathcal{Y}$ and $\tilde{\mu}\in\mathbb{R}_+^{Nq}$ :
\begin{align}
V_{(\tilde{y}, \tilde{\mu})}(y,\mu)= \frac{1}{2}\|y-\tilde{y}\|^2 + \frac{1}{2}\|\mu-\tilde{\mu}\|^2.\label{v1}
\end{align}
The following lemma establishes the relationship between above energy function and time-varying Larangian (\ref{la}) along the dynamics (\ref{eqpi2}).
\begin{lemma}\label{lemma4}
If Assumptions \ref{asp1}-\ref{asp4} hold and $\tilde{\mu}:= \boldsymbol1_N \otimes \gamma, \forall \gamma\in \mathbb{R}_+^q$, then for any $T\ge0$ the trajectories of linear multi-agent system (\ref{eqsys}) with control protocol (\ref{eqpi1}) satisfy
\begin{align}
\int_{0}^{T} \Big( \mathcal{H}(t,y,\tilde{\mu})-\mathcal{H}(t,\tilde{y},\mu) \Big) \,dt\le\frac{V_{(\tilde{y}, \tilde{\mu})}(y(0), \boldsymbol{0})}{\varepsilon}.\label{l3}
\end{align}
\end{lemma}
\begin{proof}
Calculating the time derivative of the energy function (\ref{v1}) together with (\ref{eqpi2}) yields
\begin{align}
\dot{V}_{(\tilde{y}, \tilde{\mu})}
{=}
&(\mu-\tilde{\mu})^\top \dot{\mu} + (y-\tilde{y})^\top \dot{y}\notag\\
=
&\sum_{i=1}^{N} (\mu_i\!-\!\tilde{\mu}_i)\!^{\top} \Pi_{\mathbb{R}_+^q}\big[\mu_i,\!\varepsilon\mathcal{H}_i^{\mu_i}(t,y_i,\mu_i)\big] \notag\\
& \!+\! \sum_{i=1}^{N} \!(y_i{-}\tilde{y}_i)\!^\top \Pi_{\mathcal{Y}_i}\!\big[y_i,\! \!-\varepsilon\mathcal{H}_i^{y_i}\!(t,y_i,\mu_i)\big] \notag\\
\le
& \sum_{i=1}^{N} (\mu_i-\tilde{\mu}_i)^\top \Big(\varepsilon\mathcal{H}_i^{\mu_i}(t,y_i,\mu_i)\!\Big) \notag\\
& + \sum_{i=1}^{N} (y_i-\tilde{y}_i)^\top \Big(-\varepsilon\mathcal{H}_i^{y_i} (t,y_i,\mu_i)\Big) \notag\\
\le
& \varepsilon \sum_{i=1}^{N} \Big(\mathcal{H}_i(t,y_i,\mu_i) - \mathcal{H}_i(t,y_i,\tilde{\mu}_i)\Big) \notag\\
& + \varepsilon \sum_{i=1}^{N} \Big(\mathcal{H}_i (t,\tilde{y}_i,\mu_i) - \mathcal{H}_i (t,y_i,\mu_i)\Big) \notag\\
=
&\varepsilon \Big(\mathcal{H}(t,\tilde{y},\mu) - \mathcal{H}(t,y,\tilde{\mu})\Big),\label{v11}
\end{align}
where the second equation holds in view of (\ref{eqle3}) and (\ref{eqpi2}), the first inequality holds because of (\ref{eqle2}), and the last inequality holds since the Lagrangian (\ref{la}) is convex with respect to $y_i$ and concave with respect to $\mu_i$.
Integrating (\ref{v11}) from $0$ to $T$ on both sides leads to that
\begin{align}
&\int_{0}^{T} \Big( \mathcal{H}(t,y,\tilde{\mu})-\mathcal{H}(t,\tilde{y},\mu)\Big) \,dt\notag\\
\le&-\frac{1}{\varepsilon}\int_{0}^{T} \dot{V}_{(\tilde{y}, \tilde{\mu})} (y(t), \mu(t)) \,dt\notag\\
=&-\frac{1}{\varepsilon}\Big(V_{(\tilde{y}, \tilde{\mu})}(y(T), \mu(T)) - V_{(\tilde{y}, \tilde{\mu})}(y(0), \mu(0))\Big).
\end{align}
Because the energy function (\ref{v1}) is always nonnegative and $\mu(0)=\boldsymbol{0}$, the conclusion (\ref{l3}) can be obtained.
\end{proof}
We now state the main results about the regret and fit bounds of continuous communication controller (\ref{eqpi1}).
\begin{theorem}\label{th1}
Suppose that Assumptions \ref{asp1}-\ref{asp4} hold. Then for any $T\ge0$ and $\varepsilon>0$ in control protocol (\ref{eqpi1}), by choosing $K_\mu \ge NK_g$, it holds for the regret that
\begin{align}
\mathcal{R}^T\le \frac{\|y(0)\!-\!y^*\|^2}{2\varepsilon}.
\end{align}
\end{theorem}
\begin{proof}
By choosing $\tilde{y}=y^*$ and $\tilde{\mu}=\boldsymbol{0}_{Nq}$ in Lemma \ref{lemma4}, one has
\begin{align}
\int_{0}^{T} \Big(\mathcal{H}(t,y,\boldsymbol{0}_{Nq}) - \mathcal{H}(t,y^*,\mu)\Big)dt\le\frac{V_{(y^*, \boldsymbol{0}_{Nq})}(y(0), \boldsymbol{0})}{\varepsilon}.\label{th1a}
\end{align}
According to (\ref{regert}) and (\ref{lag}), it can be obtained that
\begin{align}
\mathcal{R}^T{=}
&\int_{0}^{T} \!\!\left(\mathcal{H}(t,y,\boldsymbol{0}_{Nq}) {-} \mathcal{H}(t,y^*,\mu)\right)dt
{+}\int_{0}^{T} \!\mu^\top g(t,y^*)\, dt\notag\\
&-\int_{0}^{T} K_\mu h(\mu)\, dt.\label{th1b}
\end{align}
Consider the second term of the right-hand side of (\ref{th1b}). Let $\phi(\mu):=\mu^\top g(t,y^*)$ for simplicity. Then, by introducing an intermediate variable $\bar{\mu}:=\frac{1}{N}\sum_{i=1}^{N}\mu_i$ and the relationship $\sum_{i=1}^{N} g_{i}(t, y_i^*) \le \boldsymbol0$, one has that
\begin{align}
\phi(\mu)\le(\mu-\boldsymbol{1}_N\otimes \bar{\mu})^\top g(t,y^*).
\end{align}
Further, one can obtain that
\begin{align}
\phi(\mu)^2&\le\big((\mu-1_N\otimes \bar{\mu})^\top g(t,y^*)\big)^2\notag\\
&\le NK_g^2\left\|\mu-1_N\otimes \bar{\mu}\right\|^2\notag\\
&= NK_g^2 \sum_{i=1}^{N} \Big\|\mu_i-\frac{1}{N}\sum_{j=1}^{N}\mu_j\Big\|^2\notag\\
&\le K_g^2 \sum_{i=1}^{N} \sum_{j=1}^{N} \left\|\mu_i-\mu_j\right\|^2\notag\\
&\le K_g^2 \sum_{i=1}^{N} \sum_{j=1}^{N} \left\|\mu_i-\mu_j\right\|_1^2.
\end{align}
Since $\mathcal{G}$ is connected, there always exists a path connecting nodes $i_0$ and $j_0$ for any $i_0,j_0\in\mathcal{V}$, i.e.,
\begin{align}
h(\mu)^2=\left(\sum_{i=1}^N\sum_{j=1}^Na_{ij}\left\|\mu_i-\mu_j\right\|_1\right)^2\ge \left\|\mu_{i_0}-\mu_{j_0}\right\|_1^2.
\end{align}
Then for $K_\mu \ge NK_g$, one has that
$\phi(\mu)^2\le K_\mu^2 h(\mu)^2$,
i.e.,
\begin{align}
\phi(\mu)-K_\mu h(\mu)\le 0.\label{th1c}
\end{align}
Substituting (\ref{th1a}) and (\ref{th1c}) into (\ref{th1b}) completes the proof.
\end{proof}
\begin{theorem}\label{th2}
Suppose that Assumptions \ref{asp1}-\ref{asp4} hold. Then for any $T\ge0$ and $\varepsilon>0$ in control protocol (\ref{eqpi1}), by choosing $K_\mu \ge NK_g$, it holds for the fit that
\begin{align}
\mathcal{F}^T\le \frac{\sqrt{N}\|y(0)-y^*\|}{\varepsilon} + 2N\sqrt{\frac{K_f}{\varepsilon}}\sqrt{T}.
\end{align}
\end{theorem}
\begin{proof}
By Lemma \ref{lemma4} with $\tilde{y}=y^*$ and $\tilde{\mu}= \boldsymbol{1}_N \otimes \gamma$, where $\gamma=col(\gamma_1,\dots,\gamma_q)\in\mathbb{R}^q$ is a parameter to be determined later, one has that
\begin{align}
&\int_{0}^{T} \Big(\mathcal{H}(t,y,\boldsymbol{1}_N\otimes \gamma) - \mathcal{H}(t,y^*,\mu)\Big) \,dt\notag\\
=
&\int_{0}^{T} \bigg(f(t,y){+}\gamma^\top \sum_{i=1}^{N}g_i(t,y_i){-}f(t,y^*){-}\mu^\top g(t,y^*) \notag\\
&+K_\mu h(\mu) \bigg) dt \notag\\
\le
& \frac{V_{(\tilde{y}, \tilde{\mu})}(y(0), \boldsymbol{0})}{\varepsilon}.\label{th2a}
\end{align}
Invoking Assumption \ref{asp2} yields
\begin{align}
\int_{0}^{T} \big(f(t,y^*)-f(t,y) \big)\,dt \le 2NK_fT.\label{th2b}
\end{align}
Substituting (\ref{th1c}) and (\ref{th2b}) into (\ref{th2a}), one has that
\begin{align}
\int_{0}^{T} \gamma^\top \sum_{i=1}^{N}g_i(t,y_i)\,dt \le& \frac{V_{(\tilde{y}, \tilde{\mu})}(y(0), \boldsymbol{0})}{\varepsilon} + 2NK_fT.\notag
\end{align}
By choosing
\begin{align}
\gamma_j=\left\{
\begin{aligned}
& 0, &F_j^T\le 0 \\
& \frac{\varepsilon}{N}F_j^T, &F_j^T>0
\end{aligned}
\right.,j=1,\dots,q,\notag
\end{align}
it can be concluded that
\begin{align}
\frac{\varepsilon}{N}\|\mathcal{F}^T\|^2\le &\frac{\|y(0)-y^*\|^2 + \frac{\varepsilon^2}{N}\|\mathcal{F}^T\|^2}{2\varepsilon} + 2NK_fT.\notag
\end{align}
It can be further obtained by transposition that
\begin{align}
\mathcal{F}^T \le& \frac{\sqrt{N}\|y(0)-y^*\|_2}{\varepsilon} + 2N\sqrt{\frac{K_f}{\varepsilon}}\sqrt{T}.
\end{align}
\end{proof}
\begin{remark}\label{remark2}
Theorems \ref{th1} and \ref{th2} mean that $\mathcal{R}^T=\mathcal{O}(1)$ and $\mathcal{F}^T = \mathcal{O}(\sqrt{T})$ under continuous communication.
In comparison, explicit bounds on both the regret and fit with a sublinear growth are obtained in \cite{yi2020,li2022} for single-integrator multi-agent systems, i.e., $\mathcal{R}^T=\mathcal{O}(T^{\max\{\kappa,1-\kappa\}})$, $\mathcal{F}^T = \mathcal{O}(T^{\max\{\kappa,1-\kappa\}})$ in \cite{yi2020} and $\mathcal{R}^T= \mathcal{O}(T^{\max\{\kappa,1-\kappa\}})$, $\mathcal{F}^T = \mathcal{O}(T^{\max\{\frac{1}{2}+\frac{\kappa}{2},1-\frac{\kappa}{2}\}})$ in \cite{li2022} for $\kappa\in(0,1)$. Theorem \ref{th1} achieves stricter regret bound than \cite{yi2020,li2022} under more complex system dynamics.
\end{remark}
\subsection{Event-triggered Communication}
The above continuous-time control law, which requires each agent to know the real-time Lagrange multipliers of neighbors, may cause excessive communication overhead.
In this section, an event-triggered protocol is proposed to avoid continuous communication.
For agent $i$, suppose that $t_i^l$ is its $l$th communication instant and $\{t_i^1, \dots, t_i^l, \dots\}$ is its communication instant sequence. Define $\hat{\mu}_i(t)\!:=\! \mu_i(t_i^l), ~\forall t\!\in\! [t_i^l,t_i^{l+1})$ as the available information of its neighbors and $e_i\!:=\!\hat \mu_i(t)-\mu_i(t)$ as the measurement error. It can be known that $e_i=0$ at any instant $t_i^l$.
An event-triggered control law is proposed as
\begin{subequations}\label{eqpi4}
\begin{align}
u_i&=-K_{\alpha_i} x_i+K_{\beta_i} \left(\Pi_{\mathcal{Y}_i}[y_i, -\varepsilon\mathcal{H}_i^{y_i}(t,y_i,\mu_i)]\right),\label{eqpi4a}\\
\dot{\mu_i}&=\Pi_{\mathbb{R}_+^q}[\mu_i,\varepsilon g_i(t,y_i)-2\varepsilon K_\mu \sum_{j=1}^N a_{ij}\sign{\hat\mu_i-\hat\mu_j}], \label{eqpi4b}
\end{align}
\end{subequations}
where $\varepsilon>0$ is the step size, $K_{\alpha_i},K_{\beta_i}$ are feedback matrices that are solutions of (\ref{eqle3}), $a_{ij}$ is the weight corresponding to the edge $(j,i)$, and the initial value $\mu_i(0)=\boldsymbol{0}$. Note that $0$ is chosen for the sign function in (\ref{eqpi4b}) when its argument is zero.
Substituting controller (\ref{eqpi4}) into (\ref{eqsys}), the system dynamics of the $i$th agent becomes
\begin{subequations}\label{eqpi5}
\begin{align}
\dot x_i&=(A_i{-}B_i K_{\alpha_i})x_i+B_iK_{\beta_i}\left(\Pi_{\mathcal{Y}_i}[y_i, -\varepsilon\mathcal{H}_i^{y_i}(t,y_i,\mu_i)]\right),\label{eqpi5a}\\
\dot{\mu_i}&=\Pi_{\mathbb{R}_+^q}[\mu_i, \varepsilon g_i(t,y_i) {-}2\varepsilon K_\mu \!\sum_{j=1}^N a_{ij}\sign{\hat\mu_i-\hat\mu_j}], \label{eqpi5b}\\
y_i&=C_ix_i.\label{eqpi5c}
\end{align}
\end{subequations}
The communication instant is chosen as
\begin{align}
t_i^{l+1}\!:=\!\inf_{t>t_i^l}\!\Big\{t\Big|\|e_i(t)\|{\ge}\frac{1}{6N\!\sqrt{q}}\!\sum_{j=1}^N \!a_{ij} \!\|\hat\mu_i{-}\hat\mu_j\|_{\!1} {+} \frac{\sigma e^{-\iota t}}{3N^{\!2}\!K_{\!\mu}\!\sqrt{q}}\Big\},\label{tau2}
\end{align}
where $\sigma$ and $\iota$ are prespecified positive real numbers.
The following lemma is a modification of Lemma \ref{lemma4} under event-triggered communication.
\begin{lemma}\label{lemma6}
If Assumptions \ref{asp1}-\ref{asp4} hold and $\tilde{\mu}= \boldsymbol1_N \otimes \gamma, \forall \gamma\in \mathbb{R}_+^q$, then for any $T\ge0$ the trajectories of linear multi-agent system (\ref{eqsys}) with control protocol (\ref{eqpi5}) satisfy
\begin{align}
\int_{0}^{T} \Big(\mathcal{H}(t,y,\tilde{\mu}){-}\mathcal{H}(t,\tilde{y},\mu)\!\Big)dt{\le}\frac{V_{(\tilde{y}, \tilde{\mu})}(y(0), \boldsymbol{0})}{\varepsilon} {+} \frac{\sigma}{\iota}.
\end{align}
\end{lemma}
\begin{proof}
Similar to (\ref{v11}), one can obtain that
\begin{align}
\dot{V}_{(\tilde{y}, \tilde{\mu})}
=
&(\mu-\tilde{\mu})^\top \dot{\mu} + (y-\tilde{y})^\top \dot{y}\notag\\
=
&\!\sum_{i=1}^{N} \!(\mu_i{-}\tilde{\mu}_i\!)\!^\top \!\Pi_{\mathbb{R}_+^q}\!\Big[\mu_i,\varepsilon g_i(t,y_i) {-}2\varepsilon K\!_\mu\! \sum_{j=1}^N \!a_{i\!j}\sign{\hat\mu_i{-}\hat\mu_j}\!\Big] \notag\\
& \!+\! \sum_{i=1}^{N} (y_i\!-\!\tilde{y}_i\!)\!^\top \Pi_{\mathcal{Y}_i}\big[y_i, \!-\varepsilon\mathcal{H}_i^{y_i}(t,\!y_i,\!\mu_i)\big] \notag\\
\le
& \underbrace{\varepsilon \sum_{i=1}^{N} (\mu_i{-}\tilde{\mu}_i\!)\!^\top\! \mathcal{H}_i^{\mu_i}(t,\!y_i,\!\mu_i)
{-}\varepsilon \!\sum_{i=1}^{N} (y_i\!-\!\tilde{y}_i\!)\!^\top\! \mathcal{H}_i^{y_i}(t,\!y_i,\!\mu_i)}_{S_{1}}\notag\\
& \underbrace{ -2\varepsilon K_\mu \sum_{i=1}^{N} \!(\mu_i{-}\tilde{\mu}_i\!)\!^\top \sum_{j=1}^N a_{ij}\sign{\hat\mu_i-\hat\mu_j} }_{S_{2}} \notag\\
&+ \underbrace{ \varepsilon K_\mu \sum_{i=1}^{N} \!(\mu_i{-}\tilde{\mu}_i\!)\!^\top \sum_{j=1}^N a_{ij}\sign{\mu_i-\mu_j} }_{S_{3}}. \label{vb1}
\end{align}
Since the Lagrangian (\ref{la}) is convex with respect to $y_i$ and concave with respect to $\mu_i$, one has that
\begin{align}
S_{1} \le & \varepsilon \sum_{i=1}^{N} \Big(\mathcal{H}_i (t,\tilde{y}_i,\mu_i) - \mathcal{H}_i (t,y_i,\mu_i)\Big)\notag\\ &+\varepsilon \sum_{i=1}^{N} \Big(\mathcal{H}_i(t,y_i,\mu_i) - \mathcal{H}_i(t,y_i,\tilde{\mu}_i)\Big) \notag\\
= &\varepsilon \Big(\mathcal{H}(t,\tilde{y},\mu) - \mathcal{H}(t,y,\tilde{\mu})\Big).\label{vb2}
\end{align}
Since $\tilde{\mu}= \boldsymbol1_N \otimes \gamma, \forall \gamma\in \mathbb{R}_+^q$ and graph $\mathcal{G}$ is undirected, it follows that
\begin{align}
S_{2}=
&-2\varepsilon K_\mu \sum_{i=1}^{N} \sum_{j=1}^N a_{ij}\mu_i^\top\sign{\hat\mu_i-\hat\mu_j}\notag\\
=
&-\varepsilon K_\mu \sum_{i=1}^{N} \sum_{j=1}^N a_{ij}\mu_i^\top\sign{\hat\mu_i-\hat\mu_j}\notag\\
&- \varepsilon K_\mu \sum_{j=1}^{N} \sum_{i=1}^N a_{ji}\mu_j^\top\sign{\hat\mu_j-\hat\mu_i} \notag\\
=
&-\varepsilon K_\mu \sum_{i=1}^{N} \sum_{j=1}^N a_{ij}(\mu_i-\mu_j)^\top \sign{\hat\mu_i-\hat\mu_j}\notag\\
=
&-\varepsilon K_\mu \sum_{i=1}^{N} \sum_{j=1}^N a_{ij} (\hat\mu_i-\hat\mu_j-e_i+e_j)^\top \sign{\hat\mu_i-\hat\mu_j}\notag\\
\le
& \!-\!\varepsilon K_\mu \!\sum_{i=1}^{N}\!\sum_{j=1}^N a_{ij} \|\hat\mu_i{-}\hat\mu_j\|_1 \!+\! \varepsilon K_\mu\!\sqrt{q} \sum_{i=1}^{N} \!\sum_{j=1}^N \|e_i{-}e_j\|, \label{vb3}
\end{align}
where the last inequality holds since the relationship $\|v\|_1\le\sqrt{q}\|v\|, \forall v\in\mathbb{R}^q$.
Similarly, one has that
\begin{align}
S_{3}
=
&\varepsilon K_\mu \sum_{i=1}^{N} \!\mu_i^\top \sum_{j=1}^N a_{ij}\sign{\mu_i-\mu_j}\notag\\
=
&\frac{\varepsilon K_\mu}{2} \sum_{i=1}^{N} \sum_{j=1}^N a_{ij}\|\mu_i-\mu_j\|_1\notag\\
=
&\frac{\varepsilon K_\mu}{2} \sum_{i=1}^{N} \sum_{j=1}^N a_{ij}\|\hat\mu_i-\hat\mu_j-e_i+e_j\|_1\notag\\
\le
&\frac{\varepsilon K_\mu}{2} \sum_{i=1}^{N} \sum_{j=1}^N a_{ij}\|\hat\mu_i{-}\hat\mu_j\|_1 + \frac{\varepsilon K_\mu\sqrt{q}}{2} \sum_{i=1}^{N} \sum_{j=1}^N \|e_i{-}e_j\|.\label{vb4}
\end{align}
For the second item in (\ref{vb3}) and (\ref{vb4}), one can calculate that
\begin{align}
&\sum_{i=1}^{N} \sum_{j=1}^N \|e_i-e_j\|\notag\\
\le& \sum_{i=1}^{N} \sum_{j=1}^N \|e_i\| + \sum_{i=1}^{N} \sum_{j=1}^N \|e_j\|\notag\\
\le &2N\sum_{i=1}^{N} \|e_i\|\notag\\
\le &\frac{1}{3\sqrt{q}}\sum_{i=1}^{N} \sum_{j=1}^N a_{ij} \|\hat\mu_i-\hat\mu_j\|_1 + \frac{2\sigma e^{-\iota t}}{3K_\mu\sqrt{q}} ,
\end{align}
where the last inequality holds due to the trigger condition (\ref{tau2}).
Summarizing the above-discussed analysis, $\dot{V}_{(\tilde{y}, \tilde{\mu})}$ in (\ref{vb1}) is calculated as
\begin{align}
\dot{V}_{(\tilde{y}, \tilde{\mu})}
\le
&S_{1}+S_{2}+S_{3}\notag\\
\le
& \varepsilon \Big(\mathcal{H}(t,\tilde{y},\mu) - \mathcal{H}(t,y,\tilde{\mu})\Big) + \varepsilon\sigma e^{-\iota t}.\notag
\end{align}
By integrating it from $0$ to $T$ on both sides and omitting negative terms, it can be obtained that
\begin{align}
\int_{0}^{T} \Big( \mathcal{H}(t,y,\tilde{\mu}){-}\mathcal{H}(t,\tilde{y},\mu)\Big) dt {\le} \frac{V_{(\tilde{y}, \tilde{\mu})}(y(0), \boldsymbol{0})}{\varepsilon} {+} \frac{\sigma}{\iota}.
\end{align}
\end{proof}
We now state the main results about the regret and fit bounds of event-triggered communication controller (\ref{eqpi5}).
\begin{theorem}\label{th3}
Suppose that Assumptions \ref{asp1}-\ref{asp4} hold. Then for any $T\ge0$ and $\varepsilon>0$ in control protocol (\ref{eqpi4}), by choosing $K_\mu \ge NK_g$, the following regret bound holds:
\begin{align}
\mathcal{R}^T\le \frac{\|y(0)\!-\!y^*\|^2}{2\varepsilon} +\frac{\sigma}{\iota}.
\end{align}
\end{theorem}
\begin{theorem}\label{th4}
Suppose that Assumptions \ref{asp1}-\ref{asp4} hold. Then for any $T\ge0$ and $\varepsilon>0$ in control protocol (\ref{eqpi4}), by choosing $K_\mu \ge NK_g$, the following fit bound holds:
\begin{align}
\mathcal{F}^T\le \frac{\sqrt{N}\|y(0)-y^*\|}{\varepsilon} + \sqrt{\frac{2N\sigma}{\varepsilon\iota}} + 2N\sqrt{\frac{K_f}{\varepsilon}}\sqrt{T}.
\end{align}
\end{theorem}
The proofs of Theorems \ref{th3} and \ref{th4} are similar to that of Theorems \ref{th1} and \ref{th2}, except that Lemma \ref{lemma6} is used instead of Lemma \ref{lemma4}. They are thus omitted here.
\begin{remark}\label{remark3}
Theorems \ref{th3} and \ref{th4} mean that $\mathcal{R}^T=\mathcal{O}(1)$ and $\mathcal{F}^T = \mathcal{O}(\sqrt{T})$ still hold even under event-triggered communication. The bounds of regret and fit are determined by the communication frequency. Generally speaking, decreasing $\sigma$ and increasing $\iota$ will achieve smaller bounds on regret and fit, but meanwhile increase the communication frequency, which results in a tradeoff between them.
\end{remark}
\begin{theorem}\label{th5}
Under the event triggering condition (\ref{tau2}), system (\ref{eqpi5}) does not exhibit the Zeno behavior..
\end{theorem}
\begin{proof}
In the trigger interval $[t_i^l,t_i^{l+1})$ for agent $i$, combining the definition of $e_i$ with (\ref{eqpi4b}), one can write the upper right-hand Dini derivative as
\begin{align}
D^+ e_i(t){=} - \!\Pi_{\mathbb{R}_+^q}[\mu_i, \varepsilon g_i(t,y_i) {-}2\varepsilon K_\mu \sum_{j=1}^N a_{ij}\sign{\hat\mu_i{-}\hat\mu_j}].\label{zeno1}
\end{align}
It is obvious that $e_i(t_i^l)=0$. Then, for $t\in (t_i^l,t_i^{l+1})$, the solution of (\ref{zeno1}) is
\begin{align}
e_i(t){=} \!\int_{t_i^l}^{t} \!- \!\Pi_{\mathbb{R}_+^q}[\mu_i, \varepsilon g_i(t,y_i) {-}2\varepsilon K_\mu \sum_{j=1}^N a_{ij}\sign{\hat\mu_i{-}\hat\mu_j}] \,d\tau. \label{zeno2}
\end{align}
From Assumption \ref{asp2} and the inequality $\|\Pi_{\mathcal{S}}[x,v]\|\le\|v\|$ (cf. Remark 2.1 in \cite{zhang1995}), it can be obtained that the norm of the integral term in (\ref{zeno2}) is bounded, and let the upper bound of its norm be $\delta$. It then follows from (\ref{zeno2}) that
\begin{align}
\|e_i(t)\| \le \delta(t-t_i^l).
\end{align}
Hence, condition (\ref{tau2}) will definitely not be triggered before the following condition holds:
\begin{align}
\delta(t-t_i^l)=\frac{1}{6N\sqrt{q}}\sum_{j=1}^N a_{ij} \|\hat\mu_i-\hat\mu_j\|_1 {+} \frac{\sigma e^{-\iota t}}{3N^2K_\mu\sqrt{q}} .\label{zeno3}
\end{align}
It is easy to obtain that the right-hand side of (\ref{zeno3}) is positive for any finite time $t$, which further implies that $t-t_i^l>0$. Hence, the value $t_i^{l+1}-t_i^l$ is strictly positive for finite $t$,
which implies that no Zeno behavior is exhibited.
\end{proof}
\section{SIMULATION}\label{sim}
Consider a heterogeneous multi-agent system composed of $5$ agents described by (\ref{eqsys}), where
$x_i\in\begin{cases}
\mathbb{R}^2 &i=1,2,3\\\mathbb{R}^3 &i=4,5
\end{cases}$,
$y_i=\begin{cases}
(y_{i,a},y_{i,b})\in\mathbb{R}^2 &i=1,2,3\\(y_{i,a},y_{i,b},y_{i,c})\in\mathbb{R}^3 &i=4,5
\end{cases}$,
$A_{1,2}$ $=$ $[1,0;0,2]$, $A_{3}$ $=$ $[0,2;-1,1]$, $A_{4,5}$ $=$ $[2,1,0;0,1,1;1,0,2]$, $B_{1,2}$ $=$ $[0,1;1,3]$, $B_{3}$ $=$ $[2,1;1,0]$, $B_{4,5}$ $=$ $[1,0,0;0,1,0;0,0,1]$, $C_{1,2}$ $=$ $[2,0;0,1]$, $C_{3}$ $=$ $[2,1;-1,0]$, $C_{4,5}$ $=$ $[3,0,0;0,1,0;0,1,2]$.
\begin{figure}[htbp]
\centering
\includegraphics[width=0.28\textwidth]{pic/network.png}
\caption{Communication network among five agents.}
\label{pic1}
\end{figure}
\begin{figure}[htbp]
\centering
\includegraphics[width=0.45\textwidth]{pic/rf.png}
\caption{ Evolution of $\mathcal{R}^T$ and $\mathcal{F}^T/T$ with continuous communication.}
\label{pic3}
\end{figure}
The local objective functions are time-varying quadratic functions as follows:
\begin{align*}
f_1(t,y_1)=&(y_{1,a}{-}\cos{t}{-}1)^2{+}(y_{1,b}{-}\cos{1.5t}{-}1.5)^2;\\
f_2(t,y_2)=&2(y_{2,a}{-}\cos{t}{-}1)^2{+}3(y_{2,b}{-}\cos{1.7t}{-}1)^2;\\
f_3(t,y_3)=&2(y_{3,a}{-}\cos{t}{-}1)^2{+}(y_{3,b}{-}\cos{2t}{-}1)^2;\\
f_4(t,y_4)=&0.5(y_{4,a}{-}\cos{t}{-}2)^2{+}(y_{4,b}{-}\cos{1.2t}{-}1)^2\\
&{+}(y_{4,c}{-}\cos{1.5t}{-}2)^2;\\
f_5(t,y_5)=&2(y_{5,a}{-}\cos{t}{-}1)^2{+}3(y_{5,b}{-}\cos{1.5t}{-}1)^2\\
&{+}(y_{5,c}{-}\cos{2t}{-}1.5)^2.
\end{align*}
The feasible set of output variables $\mathcal{Y}\in[-1,5]^{12}$. The constraints are defined by a time-varying function
\begin{align*}
g_1(t,y_1)=&(0.5\sin{10t}{+}1.5)y_{1,a}{+}(0.5\sin{15t}{+}1.5)y_{1,b}{-}1;\\
g_1(t,y_2)=&(0.3\sin{10t}{+}1.7)y_{2,a}{+}(0.1\sin{25t}{+}1.9)y_{2,b}{-}3;\\
g_1(t,y_3)=&(0.6\sin{20t}{+}1.4)y_{3,a}{+}(0.5\sin{15t}{+}1.5)y_{3,b}{-}4;\\
g_1(t,y_4)=&(0.5\sin{20t}{+}1.5)y_{4,a}{+}(0.4\sin{25t}{+}1.6)y_{4,b}\\
&{+}(0.4\sin{25t}{+}1.6)y_{4,c}{-}2;\\
g_1(t,y_5)=&(0.5\sin{10t}{+}1.5)y_{5,a}{+}(0.6\sin{15t}{+}1.4)y_{5,b}\\
&{+}(0.6\sin{15t}{+}1.4)y_{5,c}{-}5;
\end{align*}
The above constraint selection ensures that $\boldsymbol{0}$ must be a strictly feasible solution for all $t\in[0,T]$.
The clairvoyant optimal output can be computed by solving the problem
\begin{align}
\begin{split}
y^* \!:= \mathop{\arg\min}_{y \in \mathcal{Y}} \int_{0}^{T} \sum_{i=1}^{N}f_i(t,y_i)\,dt ,\\
s.t. \sum_{i=1}^{N}g_{i}(t, y_i)\le \boldsymbol0.\label{question4}
\end{split}
\end{align}
The communication network among these agents is depicted in Fig. \ref{pic1}.
It can be verified that Assumptions \ref{asp1}$-$\ref{asp4} hold.
For the numerical example, the selection of feedback matrices is based on (\ref{eqle3}), where $K_{\alpha_{1,2}}$ $=$ $[-3,2;1,0]$, $K_{\alpha_{3}}$ $=$ $[-1,1;2,0]$, $K_{\alpha_{4,5}}$ $=$ $[2,1,0;0,1,1;1,0,2]$, $K_{\beta_{1,2}}$ $=$ $[-1.5,1;0.5,0]$, $K_{\beta_{3}}$ $=$ $[1,2;-2,-5]$, $K_{\beta_{4,5}}$ $=$ $[0.333,0,0;0,1,0;0,-0.5,0.5]$. The initial values $x_i(0)$ are randomly selected in $[-5, 5]$ and $\mu(0)=\boldsymbol{0}$.
\begin{figure}[tbp]
\centering
\includegraphics[width=0.45\textwidth]{pic/rf2.png}
\caption{Evolution of $\mathcal{R}^T$ and $\mathcal{F}^T/T$ with event-triggered communication.}
\label{pic4}
\end{figure}
\begin{figure}[tbp]
\centering
\includegraphics[width=0.4\textwidth]{pic/tr1.png}
\caption{ Triggering instants of five agents.}
\label{pic5}
\end{figure}
Fig. \ref{pic3} illustrates that the continuous-time control law achieves constant regret bound and sublinear fit bound. The results are in accordance with those established in Theorems \ref{th1}-\ref{th2}. Likewise, the similar results can be observed in Fig. \ref{pic4} under event-triggered communication. Fig. \ref{pic5} shows the communication moments of five agents with event-triggered control laws, from which one can observe that the communication among five agents is discrete and exhibits no Zeno behavior.
\section{CONCLUSION}\label{res}
In this paper, we studied distributed online convex optimization for heterogeneous linear multi-agent systems with time-varying cost functions and time-varying coupling inequality constraints. A distributed controller was proposed based on the saddle-point method, showing the constant regret bound and sublinear fit bound. In order to avoid continuous communication and reduce the communication cost, an event-triggered communication scheme with no Zeno behavior was developed, which also achieves constant regret bound and sublinear fit bound.
\begin{comment}
\section{CONCLUSIONS AND FUTURE WORKS}
\subsection{Conclusions}
This is a repeat.
\subsection{Future Works}
This is a repeat.
\section{ACKNOWLEDGMENTS}
The authors gratefully acknowledge the contribution of National Research Organization and reviewers' comments.
\end{comment}
\bibliographystyle{ieeetr}
|
\section{Introduction}
\label{sec:intro}
The significant astrophysical and cosmological evidence for the existence of dark matter combined with the lack of understanding of its particle nature is among the most pressing problems in fundamental particle physics~\cite{Schumann:2019eaa}. Dark matter is expected to consist of one or more new, beyond the Standard Model (SM) particles, whose observed interaction with the SM to date is limited to gravitational attraction. Liquid xenon (LXe) time projection chambers (TPCs) are ubiquitous in the field of rare event searches and currently provide the most stringent limits on the scattering cross-section of dark matter in the form of weakly interacting massive particle (WIMPs)~\cite{XENON:2018voc,LUX:2016ggv,PandaX-4T:2021bab}. With the current generation of experiments coming online, they will probe a large fraction of the remaining parameter space for dark matter masses of $\mathcal{O}(\SI{100}{\giga\electronvolt})$~\cite{XENON:2020kmp,LUX-ZEPLIN:2018poe,PandaX:2018wtu}.
However, due to the lack of any confirmed detection to date of well-motivated candidates such as WIMPs or axions~\cite{Graham:2015ouw}, alternative dark matter models have received recent theoretical and experimental interest~\cite{Kolb2018}. A new generation of experiments is aiming to explore lower mass WIMP dark matter between \SI{1}{\mega\electronvolt} and \SI{10}{\giga\electronvolt}~\cite{Essig2020}. The need to detect smaller energy deposits becomes an experimental challenge for interactions of dark matter through elastic scattering with nuclei or electrons. In this case the maximum energy that can be transferred to the detector is the kinetic energy of the dark matter particle. Other interaction mechanisms of dark matter with the SM have been studied, which could produce higher energy deposits, e.g., in the MeV energy range~\cite{Dror:2019dib,Pospelov:2008qx,PhysRevLett.109.251302}. Detectors searching for neutrinoless double beta decay (\ensuremath{0\nu\beta\beta}) are well optimized for this energy range and have demonstrated some of the lowest background rates for any detector technology, along with well understood background models~\cite{Dolinski:2019nrj,EXO-200:2015nta,EXO-200:2015edf}. This makes such detectors well suited to perform searches for dark matter interactions depositing energy in the MeV range, in addition to their primary focus of searching for \ensuremath{0\nu\beta\beta}.
As a specific example of a dark matter model producing such events, the EXO-200 data is analyzed to search for charged-current absorption of fermionic dark matter~\cite{Dror:2019dib} by \ensuremath{\isotope[136]{Xe}}{} nuclei, for which the energy deposited in the detector depends on the mass of the dark matter particle, which can be much greater than its kinetic energy. This direct detection process results in a unique detector signature with energies of $\mathcal{O}(\SI{}{\mega\electronvolt})$, which may have evaded detection in previous direct detection experiments. In this work we present a search for excess events in the $1-\SI{8}{\mega\electronvolt}$ energy range in the complete EXO-200 data set.
\section{The EXO-200 Experiment}
\label{sec:exo}
Between 2011 and 2018, the EXO-200 collaboration searched for the \ensuremath{0\nu\beta\beta}{} of \ensuremath{\isotope[136]{Xe}}{} with a total exposure of \SI{234.1}{\kilo\gram\year}, setting a lower limit on the \ensuremath{0\nu\beta\beta}{} half-life at $T_{1/2} > \SI{3.5e25}{\year}$ at \SI{90}{\percent} CL~\cite{EXO-200:2019rkq}. After finishing the first run of the experiment in February 2014 (Phase I) the detector underwent an upgrade before the second run started in May 2016 (Phase II) with lower noise front-end electronics and an increase in the electric field from \SI{380}{\volt\per\centi\meter} to \SI{567}{\volt\per\centi\meter}. These upgrades led to an improved energy resolution and lower energy threshold in Phase II. This work also uses the same complete EXO-200 dataset, combining Phase I and II.
The detector consisted of a cylindrical time projection chamber (TPC) filled with liquid xenon (LXe) enriched to \SI{80.6}{\percent} in \isotope[136]{Xe}, with \SI{19.1}{\percent} \isotope[134]{Xe} and the remaining fraction comprised of various other isotopes. The TPC was split into two identical drift regions sharing a common cathode, which along with the surrounding field rings provided an electric field for drifting electrons. Each TPC half had a radius of \SI{\sim 18}{\centi\meter} and a drift length of \SI{\sim 20}{\centi\meter}. The TPC was enclosed by a radio-pure thin-walled copper vessel, submerged in a heat transfer cryofluid (HFE-7000~\cite{HFE}), which provided \SI{\sim 50}{\centi\meter} of passive shielding, and was maintained inside a vacuum-insulated copper cryostat. Another \SI{\sim 25}{\centi\meter} of lead around the cryostat provided additional shielding against external radiation. The detector was located inside a clean room at the Waste Isolation Pilot Plant (WIPP) in Carlsbad, New Mexico, under an overburden of $1624^{+22}_{-21}$ meters water equivalent~\cite{EXO-200:2015edf}. An active muon veto system consisted of plastic scintillator panels surrounding the clean room on four sides, which allowed prompt identification of \SI{>96}{\percent} (\SI{>94}{\percent}) of the cosmic ray muons passing through the setup in Phase I (II)~\cite{phd_mitchell}. Rejecting events coincident with these muons allows suppression of cosmogenic backgrounds~\cite{EXO-200:2015edf}. A more detailed description of the detector design and performance can be found in~\cite{Auger:2012gs,EXO-200:2021srn}.
In either drift region, the ionization and scintillation quanta produced by an interaction were collected by a crossed-wire plane at each anode, and by an array of large area avalanche photo-diodes (LAAPDs) behind the wire planes, respectively. The total energy of an event was determined by combining the light and charge signals defining a ``rotated'' energy variable, significantly improving the energy resolution relative to either signal channel alone~\cite{EXO-200:2003bso}. In addition, the combination of light and charge signals provided 3D position reconstruction with a x-y-position resolution of \SI{2.6}{\milli\meter} and a z-position resolution of \SI{0.42}{\milli\meter}~\cite{EXO-200:2013xfn}. The z-direction is defined along the electron drift direction, while the x/y directions lie in the plane parallel to the anode. More details about the analysis and event reconstruction can be found in~\cite{EXO:2017poz,EXO-200:2019rkq}.
\section{Event Signature and Monte-Carlo}
\label{sec:mc}
The charged-current absorption of a fermionic dark matter particle $\chi$ by a xenon nucleus will induce a $\ensuremath{\beta}^-$-decay if the dark matter mass can bridge the gap between the masses of the initial and final nuclei and the mass of the outgoing electron (kinematic threshold). In addition, the daughter nucleus will essentially always be produced in an excited state for the isotopes of interest here due to angular momentum selection rules. The event rate for this process is given by~\cite{Dror:2019dib,Dror2020}
\begin{align}
R = & \frac{\rho_\chi}{2m_\chi} \sum_{j,k} N_{T,j} \cdot n_j \cdot \mathcal{F}_k(Z+1,E_{e,k}) \nonumber \\
& \times \frac{|\vec{p}_{e,k}|}{16\pi m_\chi M^2_{A_j,Z_j}} \overline{|\mathcal{M}_k|^2}
\end{align}
summing over all possible excited states $k$, where \ensuremath{m_\chi}{} is the dark matter mass, $\rho_\chi$ is the local dark matter density, $N_{T,j}$ is the number of targets of a given isotope $j$, $n_j$ is the number of neutrons per target, $\mathcal{F}_k$ is the Fermi function, $\vec{p}_{e,k}$ is the momentum of the outgoing \ensuremath{\beta}{}, $M^2_{A_j,Z_j}$ the mass of nucleus \isotope[A][Z]{X}, and $\overline{|\mathcal{M}_{k}|^2}$ is the spin averaged nucleon level matrix element. The details of the derivation of the rate, the Fermi function and an expression for the matrix element can be found in~\cite{Dror:2019dib,Dror2020}. Because of the higher kinematic thresholds~\cite{Sergeenkov1981} and smaller isotopic fraction, absorption of fermionic dark matter by \isotope[134]{Xe} is negligible relative to absorption on \isotope[136]{Xe}, in EXO-200. The main channel considered is therefore $\chi + \isotope[136][54]{Xe} \rightarrow \isotope[136][55]{Cs}^* + e^-$, in which the cesium nucleus is produced in an $J^P=1^+$ excited state, where $J$ is the total angular momentum and $P$ is the parity of the state. In the absence of a detection, such data can constrain the interaction cross-section of this charged-current absorption process, or equivalently, the effective energy scale, $\Lambda$, for a beyond the SM operator that could mediate the dark matter interaction
\begin{equation}
\frac{1}{\Lambda^2} \equiv \frac{g_R^2}{4 M_{W_R}^2}
\end{equation}
where $g_R$ is the $SU(2)_R$ coupling constant of the theory, $M_{W_R} = \frac{1}{2} g_R u$ is the mass of the mediator (similar to the W-boson as the mediator of charged-current interactions via the weak nuclear force), with $u$ being the vacuum expectation value of the scalar field $\phi$ through which the dark matter particle $\chi$ interacts with the SM via a Yukawa type coupling.
\begin{figure}
\centering
\includegraphics[width=\columnwidth]{figures/phase2_electrons.pdf}
\caption{Monte Carlo simulation of the EXO-200 detector response to electrons at energies of \SI{2}{\mega\electronvolt}, \SI{4.5}{\mega\electronvolt} and \SI{7}{\mega\electronvolt} in Phase II. The simulated distribution of the maximum reconstructed ionization energy in an event is shown, where the non-Gaussian shape comes from the increased emission of bremsstrahlung for the higher energy \ensuremath{\beta}{}s.}
\label{fig:electrons}
\end{figure}
A major challenge in modeling these signals in EXO-200 comes from the fact that little data exists on the nuclear level structure of \isotope[136]{Cs}, with no sufficiently fast decaying states currently measured between the lowest lying $1^+$ excited states at \SI{590}{\kilo\electronvolt} and its $5^+$ ground state~\cite{Mccutchan:2018jsr}. Assuming the dark matter absorption preferentially populates the lowest-lying $1^+$ state at \SI{590}{\kilo\electronvolt}, there are only four known states to which the nucleus can decay: three excited states ($J^P = 9^-, 8^-,4^+$), and the ground state ($J^P=5^+$)~\cite{Mccutchan:2018jsr}. In all cases, the decays are highly forbidden and order-of-magnitude Weisskopf estimates for the \SI{590}{\kilo\electronvolt} state give a predicted half-life of $\gg \SI{1}{\second}$.
In this case, the relaxation would appear as a secondary, uncorrelated event in the EXO-200 data, with similar signatures for excitations to higher energy nuclear levels of \isotope[136]{Cs}. However, if unknown intermediate levels of appropriate angular momentum and parity exist, then this half-life could be much shorter, allowing a dark matter absorption event to have a characteristic signature including both the primary \ensuremath{\beta}{} as well as one or more coincident \ensuremath{\gamma}{}s. Since neither the decay time nor energy of these \ensuremath{\gamma}{}s is currently known, we perform the analysis assuming that the only event signature is the outgoing \ensuremath{\beta}{}. However, as described in Sec.~\ref{sec:results}, we also consider the case that one or more coincident \ensuremath{\gamma}{}s of unknown energy are emitted, and present results that are insensitive to the presence of such \ensuremath{\gamma}{}s.
We note that the level structure of \isotope[136]{Cs} is under active investigation, with data suggesting the existence of new intermediate levels that may be relevant for such dark matter interactions~\cite{Rebeiro:2016pvi}. In addition, recent shell model calculations predict a decay scheme in which the lowest-lying $1^+$ state relaxes through levels that include an isomeric state with a lifetime of $\mathcal{O}(\SI{100}{\micro\second})$~\cite{Haselschwardt:2020ffr}, which could enable a time-coincidence analysis to separate charged-current absorption events from backgrounds. However, since the existence of these intermediate states has not been conclusively confirmed, we proceed as described above and leave their inclusion in dark matter analyses to future work.
The detector response to ionizing radiation is modeled by a detailed Monte Carlo (MC) simulation based on Geant4~\cite{GEANT4:2002zbu}. The details of the MC simulation and reconstruction can be found in~\cite{EXO-200:2013xfn,EXO-200:2019rkq}. The absorption event signature of a fermionic dark matter particle is modeled via a single \ensuremath{\beta}{} with a kinetic energy equal to the dark matter mass $m_\chi$ minus the kinematic threshold energy~\cite{Dror:2019dib}. The transferred kinetic energy of the dark matter particle results in a $\mathcal{O}(\SI{}{\kilo\electronvolt})$ nuclear recoil of the \ensuremath{\isotope[136]{Xe}}{} atom which falls below the energy threshold and is therefore ignored. The maximum reconstructed ionization energy spectrum of \ensuremath{\beta}{}s at various energies in Phase II is shown in Figure \ref{fig:electrons}. The more energetic the emitted \ensuremath{\beta}{}, the more bremsstrahlung it emits, leading to a non-Gaussian low energy tail.
\section{Analysis}
\label{sec:analysis}
The energy region considered here can be divided into two regions based on the relevant backgrounds. In the low energy portion below \SI{3}{\mega\electronvolt}, the dominant background sources are \ensuremath{2\nu\beta\beta}{} events and \ensuremath{\gamma}{}s from the \isotope[238]{U} and \isotope[232]{Th} decay chains. Above \SI{3}{\mega\electronvolt} the main backgrounds arise from de-excitation \ensuremath{\gamma}{}s from cosmogenically produced isotopes.
To separate the \ensuremath{\beta}{} arising from dark matter interactions from backgrounds, one can exploit the fact that single MeV-scale \ensuremath{\beta}{}s typically deposit most of their energy at a single location (i.e., in the most energetic reconstructed charge cluster), in contrast to \ensuremath{\gamma}-backgrounds that predominantly Compton-scatter and therefore, on average, have less fractional energy contained in the most energetic cluster. An additional energy variable, defined as the energy of the most energetic charge deposit in an event, captures this topology difference. Therefore, in combination with the total event energy, the energy of the maximum reconstructed charge cluster is used as a second dimension in the likelihood fits discussed in Sec.~\ref{sec:results}.
Events within the fiducial volume are required to lie within a hexagon in the x-y plane with an apothem of \SI{162}{\milli\meter}. They are further required to be more than \SI{10}{\milli\meter} away from the cylindrical polytetrafluoroethylene (PTFE) scintillation light reflector, as well as the cathode and the wire planes. This fiducial volume contains \SI{3.31e26}{} atoms of \ensuremath{\isotope[136]{Xe}}{}, with an equivalent mass of \SI{74.7}{\kilo\gram}. The uncertainty in the fiducial mass is discussed in Section \ref{sec:systematics}. The \ensuremath{\isotope[136]{Xe}}{} exposure of the entire dataset after data quality cuts and accounting for live time loss due to vetoing events coincident with the muon veto is \SI{234.1}{\kilo\gram\year} with \SI{117.4}{\kilo\gram\year} (\SI{116.7}{\kilo\gram\year}) in Phase I (II).
Compared to previous \ensuremath{0\nu\beta\beta} analyses from EXO-200~\cite{Auger:2012gs,EXO-200:2019rkq} this analysis
\begin{itemize}
\item extends the energy range up to \SI{8}{\mega\electronvolt}
\item combines all events into a single dataset irrespective of the number of interaction sites
\item adds a second analysis variable capturing the energy of the most energetic charge deposit in an event.
\end{itemize}
The energy response of the detector is typically calibrated with external \ensuremath{\gamma}{}-sources placed on the outside of the detector near the cathode, using the full absorption peaks resulting from the decays of \isotope[60]{Co} and daughters of \isotope[226]{Ra} and \isotope[228]{Th}. At the end of the EXO-200 livetime a composite americium beryllium (AmBe) neutron source was used to produce radiogenically activated \isotope[137]{Xe}, whose \ensuremath{\beta}{}-decay spectral shape was previously studied~\cite{EXO-200:2020wmu}. In addition, the AmBe source calibration provided a high statistics dataset of various other neutron activated by-products whose de-excitation gammas can be used for an energy calibration up to \SI{\sim 8}{\mega\electronvolt} in Phase II only. In addition to the primary \ensuremath{\gamma}{} emitted at \SI{4430}{\kilo\electronvolt} ($\isotope[9]{Be} (\alpha,n\ensuremath{\gamma}) \isotope[12]{C}$), this dataset includes full absorption peaks at \SI{1346}{\kilo\electronvolt} ($\isotope[64]{Cu} (e,\ensuremath{\gamma}) \isotope[64]{Ni}$), \SI{2223}{\kilo\electronvolt} ($\isotope[1]{H} (n,\ensuremath{\gamma}) \isotope[2]{H}$), \SI{4025}{\kilo\electronvolt} ($\isotope[136]{Xe} (n,\ensuremath{\gamma}) \isotope[137]{Xe}$), and \SI{7916}{\kilo\electronvolt} ($\isotope[63]{Cu} (n,\ensuremath{\gamma}) \isotope[64]{Cu}$). The energy spectrum resulting from the AmBe source and the corresponding energy calibration results are shown in Figure \ref{fig:energy_calibration}. The lower bound of the energy range considered for this analysis follows previous EXO-200 \ensuremath{0\nu\beta\beta} analyses~\cite{EXO-200:2019rkq}, whereas the upper bound is limited by the highest available energy calibration peak at \SI{7916}{\kilo\electronvolt}.
\begin{figure}
\centering
\includegraphics[width=\columnwidth]{figures/energy_calibration.pdf}
\caption{(top) AmBe calibration source energy spectrum in Phase II, demonstrating linear energy response of the EXO-200 detector throughout the energy range of interest. (bottom) Residuals between the measured and known energies $\Delta E$.Calibration errors at the photo-peaks are less than \SI{20}{\kilo\electronvolt}, resulting in an systematic error on the energy scale of \SI{<0.5}{\percent}.}
\label{fig:energy_calibration}
\end{figure}
While the analysis is limited to below \SI{8}{\mega\electronvolt} to ensure the energy calibration is well-understood, the EXO-200 detector is sensitive to higher energy deposits. The low background data contains 18 (41) events above \SI{8}{\mega\electronvolt} in Phase I (II) passing all event selection cuts, but which are not accounted for by any of the components in the EXO-200 background model~\cite{EXO-200:2015edf,EXO-200:2015nta}. No events above \SI{8}{\mega\electronvolt} are present in the veto-tagged data containing only events that were collected between \SI{10}{\micro\second} and \SI{5}{\milli\second} after any of the 29 muon veto panel triggers. This suggests that these events in the low-background data could arise, e.g., from long-lived cosmogenic activation products, or unaccounted for radiogenic processes not present in the veto-coincident data. The possible effect of such a small, unknown background on the results of this analysis will be discussed in Sec.~\ref{sec:systematics}.
To maximize the signal efficiency for \ensuremath{\beta}{} events in this energy range, this analysis does not require all ionization signals in an event to be fully reconstructed. Relative to the selection cuts used in \ensuremath{0\nu\beta\beta} searches, this recovers events with multiple bremsstrahlung photons, for which there is a substantial probability that at least one low-energy cluster is detected for which the $x$ and $y$ position can't be fully reconstructed. With all selection criteria included, the Monte Carlo simulation is used to estimate a signal reconstruction efficiency of $\epsilon > \SI{99.7}{\percent}$ for both data taking phases. Possible systematic errors on this efficiency will be discussed in Sec.~\ref{sec:systematics}.
MC events from all background and signal components, passing all quality cuts, are used to construct individual two-dimensional probability density functions (PDFs) that depend on the total rotated energy and the maximum charge cluster energy of an event. The components entering the background model are the same as in~\cite{EXO-200:2019rkq}, whereas the \ensuremath{0\nu\beta\beta}{} signal is replaced by a monoenergetic \ensuremath{\beta}{} PDF (one for every \SI{50}{\kilo\electronvolt} step within the analysis energy window), which is shown in Figure~\ref{fig:electrons}. The search was performed by minimizing a binned negative log likelihood (NLL) function when fitting the combined signal and background model PDFs to the data. Systematic errors are added to the fit as nuisance parameters that follow a normal distribution, with a width corresponding to the size of the systematic error estimated in stand-alone studies (see Sec.~\ref{sec:systematics}).
Toy datasets are generated from a background-only fit to the low-background data. These toy datasets are fit with the full background plus signal model, and the upper limit on the number of signal counts for each signal PDF at the \SI{90}{\percent} CL is determined from a profile likelihood. The sensitivity is obtained by calculating the median of an ensemble of 1000 upper limits.
\section{Systematics}
\label{sec:systematics}
The assessment of systematic errors follows the same general approach as in~\cite{EXO-200:2019rkq} and includes an
\begin{enumerate}
\item uncertainty in the signal-specific detection efficiency caused by discrepancies in the shape of data and MC PDFs
\item uncertainty in the activity of radon in the LXe as determined in stand-alone studies via measurement of time-correlated decays
\item uncertainty in the overall event detection efficiency due to possible errors in the estimated event reconstruction and selection efficiencies
\end{enumerate}
\begin{figure}
\centering
\includegraphics[width=\columnwidth]{figures/shape_error.pdf}
\caption{Energy dependence of the parameters $a$ (solid) and $b$ (dashed) in equation \ref{eq:shape_error} for quantifying the systematic error from spectral shape disagreements, which are parameterized by $a(E)=a_1\cdot E + a_2$ and $b(E)=b_1\cdot e^{- b_2\cdot E} + b_3$, respectively.}
\label{fig:shape_error}
\end{figure}
The first systematic error arises from shape disagreements between data and MC PDFs and is propagated to the fit as a Gaussian constraint on the normalization of the signal PDF, as was done in~\cite{EXO-200:2019rkq}. We performed a fit to the veto-tagged datasets in Phase I and II and treated the bin-by-bin ratio between the data and the best-fit model in each fit dimension as a possible error, reweighting the shape when building the PDFs for the likelihood fit to the low-background data to correct for the spectral distortions. Toy datasets were generated from these modified background model PDFs with the signal PDF present and were fit against the original unweighted PDFs. The bias in the number of fitted signal counts as a function of injected number of signal counts is used to construct a conditional Gaussian constraint for the signal-only PDF normalization that has the following functional form
\begin{equation}
\sigma/N = \sqrt{(a\cdot N)^2+ b^2 }/N \label{eq:shape_error}
\end{equation}
It consists of a component proportional to the number of signal counts $N$ with a proportionality factor $a$ and a signal-independent component $b$. The signal-independent component quantifies shape errors in the background model that lead to a fixed bias in the number of signal counts, while the signal-dependent term quantifies a relative error that would be expected to scale with the signal size. The energy dependence of the parameters $a$ and $b$ were found to be approximately described by linear and exponential functions, respectively, and is shown in Figure~\ref{fig:shape_error}. For Phase II an average between the bias from the spectral shape error in the muon veto-coincident data and the AmBe calibration data was used. The second uncertainty, quantifying possible error on the Rn activity in the LXe, was estimated in~\cite{EXO-200:2015edf} to be \SI{10}{\percent}. For the last item this analysis assumes the same systematic error for the overall signal efficiency of \SI{3.0}{\percent} (\SI{2.9}{\percent}) for Phase I (II) as was used in ~\cite{EXO-200:2019rkq}. This systematic error may provide a slightly conservative estimate for the reconstruction efficiencies since \ensuremath{\beta}{}-like events above \SI{3}{\mega\electronvolt} are easier to identify with smaller reconstruction errors due to their higher signal-to-noise.
As mentioned, the observed events above \SI{8}{\mega\electronvolt} suggest that a small background component not included in the existing EXO-200 background model could be present. If such backgrounds arise from e.g., Compton scattering of high energy $\gamma$s, this background component may also extend into the energy region below \SI{8}{\mega\electronvolt} that is considered in this analysis. We estimated the effect that such an unknown background might have on our results by including an additional freely floating flat background PDF into the fit model and reevaluating the sensitivity. The relative difference in the sensitivity with and without this additional background is taken as a systematic error due to the possible incompleteness of the background model, and was calculated to be \SI{\sim 0.1}{\percent}.
The signature of charged-current absorption events is similar to a solar neutrino interaction with the detector, where in the case of the charged-current interaction ($\nu + \isotope[136][]{Xe} \rightarrow \isotope[136][]{Cs}^* + e^-$) \isotope[136]{Cs} might also be produced in an excited state. In contrast, an elastic scattering process will only result in a single \ensuremath{\beta}{} in the final state. The solar neutrino background from both processes is estimated to produce $\ll1$ event throughout the livetime of the experiment within the entire energy region for this analysis~\cite{Haselschwardt:2020ffr} and can therefore be safely ignored.
Lastly, the systematic error on the energy scale is evaluated by taking the maximum spread in the calibrated energy for various possible calibration functions that interpolate between the measured photo-peaks of known energy (e.g. interpolating functions consisting of 1st or 2nd order polynomials, with or without a constant offset). The uncertainty in our energy calibration was estimated to be \SI{\sim 2}{\percent} (\SI{\sim 0.5}{\percent}) in Phase I (II). The larger error in Phase I arises from the lack of AmBe calibration data, which provides known energy peaks constraining the calibration functions to the \SI{8}{\mega\electronvolt} upper energy threshold. This systematic is propagated as a Gaussian constraint on the \ensuremath{\gamma}-scale, which is a freely floating parameter in the likelihood fit that scales the energy of all PDFs representing interactions of \ensuremath{\gamma}{} events via a common multiplicative factor. This floating \ensuremath{\gamma}-scale can compensate for possible differences between calibrations and low-background data, but the best fit value was found to be consistent with unity within less than \SI{0.2}{\percent}. An additional \ensuremath{\beta}-scale is introduced into the fit that allows the energy scale of PDFs arising from \ensuremath{\beta}{}-like events to float independently from \ensuremath{\gamma}-like PDFs, which allows the fit to correct possible differences in the energy response between \ensuremath{\beta}{}s and \ensuremath{\gamma}{}s in the detector. However, this parameter was similarly found to be consistent with unity to within less than \SI{1}{\percent}, in good agreement with previous studies~\cite{EXO-200:2019bbx}. Table~\ref{tab:systematics} shows a summary of the systematic errors considered for this analysis.
\begin{table}
\centering
\begin{tabular}{>{\raggedright\arraybackslash}p{3cm}>{\centering\arraybackslash}p{2.5cm}>{\centering\arraybackslash}p{2.5cm}}
\hline \hline
Constraint \hspace{125pt} & Phase I & Phase II \\
\hline
Shape error & Fig.~\ref{fig:shape_error} & Fig.~\ref{fig:shape_error} \\
\isotope[222]{Rn} & 10\% & 10\% \\
Normalization & 3.0\% & 2.9\% \\
Background model & 0.1\% & 0.1\% \\
Energy scale & 2\% & $<0.5$\% \\
\hline \hline
\end{tabular}
\caption{Summary of estimated systematic errors for this analysis in the Phase I and II data sets.}
\label{tab:systematics}
\end{table}
\section{Results}
\label{sec:results}
\begin{figure}
\centering
\includegraphics[width=\columnwidth]{figures/limit_combined2.pdf}
\caption{The top panel of the plot shows the upper limit (solid orange) on the number of dark matter event as a function of energy at \SI{90}{\percent} CL. The median sensitivity (dashed blue) and the \SI{\pm 1}{\sigma} (dark blue) and \SI{\pm 2}{\sigma} (light blue) percentiles around the median are also shown. The bottom panel shows the local significance of our observation against the no-signal hypothesis. Taking into account the ``look-elsewhere" effect we report no statistically significant evidence for dark matter.}
\label{fig:limit_combined}
\end{figure}
\begin{figure}
\centering
\includegraphics[width=\columnwidth]{figures/fermionic_darkmatter_sens2.pdf}
\caption{Limit on the absorption cross-section of fermionic dark matter by \ensuremath{\isotope[136]{Xe}}{} nuclei at the \SI{90}{\percent} CL. We show our main 2D fit result in addition to a de-excitation \ensuremath{\gamma}{} agnostic 1D fit result (see text for more details). The grey region is excluded by direct constraint from searches at the LHC~\cite{Belyaev:2018pqr}.}
\label{fig:fermionic_dm_sens}
\end{figure}
Following~\cite{EXO-200:2019rkq}, the likelihood fits are initially performed independently in each data taking phase, minimizing a binned NLL function and then profiling over the signal PDF at a given energy. Hence, the combined NLL at a given energy is simply the sum of both NLLs and the efficiency and livetime corrected profile likelihood curves can be added to obtain the combined upper limit at \SI{90}{\percent} CL.
The combined median \SI{90}{\percent} CL sensitivity is similarly determined by combining the profile likelihoods of 1000 toy datasets from each phase. The combined \SI{90}{\percent} upper limit and sensitivity are shown in Fig.~\ref{fig:limit_combined}, together with the \SI{68}{\percent} and \SI{95}{\percent} percentiles around the median sensitivity. We calculate the local $p$-value as the fraction of toy datasets under the no-signal hypothesis whose \ensuremath{\Delta\mathrm{NLL}\xspace}{} is at least as large as the one obtained from the data fit. We estimate the ``look-elsewhere" effect~\cite{Bayer:2020pva} by noting that we perform approximately 30 independent searches for a signal within the energy range (assuming signal PDFs as independent if their peaks are separated by at least $2\sigma$ in rotated energy). The global $p$-value for each such search is then given by $p_\mathrm{global} \approx 30 \times p_\mathrm{local}$. We therefore find no statistically significant evidence for dark matter in our data. Overall, the observed limit lies within the $\pm 2 \sigma$ distribution around the median sensitivity over most of the mass range. In the region between \SI{5}{\mega\electronvolt} and \SI{7}{\mega\electronvolt}, the limit is slightly stronger than the expected $\pm 2 \sigma$ region. This could arise from either a statistical under-fluctuation in the backgrounds at these energies, or, possibly, a small overestimate of the background in this region relative to that assumed in the toy Monte Carlo studies.
Figure \ref{fig:fermionic_dm_sens} shows the \SI{90}{\percent} CL exclusion limit on the interaction cross-section as a function dark matter mass \ensuremath{m_\chi}{}. In addition to the primary result using a two-dimensional likelihood fit consisting of the rotated energy and the maximum charge energy in an event, we also performed the fits using only the latter variable. These 1D fits have reduced sensitivity to a signal but provide an analysis that does not strongly depend on the presence of additional de-excitation \ensuremath{\gamma}{}s, since the primary \ensuremath{\beta}{} cluster will contain the largest energy for nearly all events over the mass range considered, resulting in only marginal differences in the signal PDF shape. We also include limits from constraints on these models from collider experiments at the Large Hadron Collider (LHC) at CERN~\cite{Belyaev:2018pqr}, demonstrating that relative to collider searches low-background detectors can perform competitive searches for certain dark matter models.
\begin{figure*}
\centering
\includegraphics[width=\textwidth]{figures/fit_res_counts.pdf}
\caption{Rotated energy spectrum of the low-background data and the best fit (blue) to the data with a background-only model in Phase I (a) and Phase II (c). The resulting residual number of counts between data and the best from Phase I and Phase II is shown in panel (b) and (d), respectively. No significant disagreement is seen between the data and background-only model. The average electron-recoil background rate above \SI{4}{\mega\electronvolt} is \SI{4.0e-4}{\cts\per\kilo\gram\per\year\per\kilo\electronvolt} in Phase I and \SI{6.8e-4}{\cts\per\kilo\gram\per\year\per\kilo\electronvolt} in Phase II with a total exposure of \SI{117.4}{\kilo\gram\year} and \SI{116.7}{\kilo\gram\year}, respectively.}
\label{fig:fit}
\end{figure*}
In Fig.~\ref{fig:fit} we provide the rotated energy spectrum of the low-background data from \SI{1}{\mega\electronvolt} to \SI{8}{\mega\electronvolt}, along with the best fit to the data with a background-only model, and the bin-wise residual counts for Phase I and Phase II. The excellent spectral shape agreement and linear detector response to both \ensuremath{\beta}-like and \ensuremath{\gamma}-like events are a result of more than ten years of work to build, run, and understand the EXO-200 detector and its response. These spectra, published here for the first time, may also constrain other physics beyond the SM that is outside the scope of the present work.
This analysis represents the first search for the absorption of MeV fermionic dark matter in a liquid xenon detector via a charged-current interaction, with a total \ensuremath{\isotope[136]{Xe}}{} exposure of \SI{234.1}{\kilo\gram\year}. As no statistically significant evidence was observed, we exclude new parameter space for these models at the \SI{90}{\percent} CL for dark matter masses between \SI{2.6}{\mega\electronvolt} and \SI{11.6}{\mega\electronvolt}. These results are complementary to searches for neutral-current absorption of fermionic dark matter reported in~\cite{PandaX:2022osq,Arnquist:2022uxq} and charged-current absorption of light fermionic dark matter in~\cite{PandaX:2022xon}. Furthermore, a detailed understanding of the detector response is demonstrated. The low backgrounds achievable with the liquid xenon technology can enable future rare event searches such as \ensuremath{0\nu\beta\beta}, direct detection of WIMP dark matter, or other novel dark matter interaction mechanisms~\cite{nEXO:2021ujk,Avasthi:2021lgy,DARWIN:2016hyl}.
\section*{Acknowledgements}
EXO-200 is supported by the DOE and NSF in the U.S., the NSERC in Canada, the SNF in Switzerland, the IBS in Korea, the DFG in Germany, and CAS and ISTCP in China. The EXO-200 data analysis and simulation use resources of the National Energy Research Scientific Computing Center (NERSC). We gratefully acknowledge the KARMEN collaboration for supplying the cosmic-ray veto detectors, as well as the WIPP for their hospitality.
|
\section{Introduction}
\label{sec:intro}
Hackathons are time-bounded events during which individuals form -- often ad-hoc -- teams and engage in intensive collaboration to complete a project that is of interest to them~\cite{pe2019designing}. They have become a popular form of intense collaboration with the largest collegiate hackathon league alone reporting that their events attract more than 65,000 participants each year\footnote{\url{https://mlh.io/about}}.
The success of hackathons can at least partially be attributed to them being perceived to foster learning~\cite{porras2019code,fowler2016informal,nandi2016hackathons} and community engagement~\cite{nolte2020support,huppenkothen2018hack,taylor2018strategies,moller2014community} and tackle civic, environmental and public health issues~\cite{hope2019hackathons,taylor2018strategies,baccarne2014urban} which led to them consequently being adopted in various domains including
(higher) education~\cite{porras2019code,gama2018hackathon,kienzler2017learning},
(online) communities~\cite{huppenkothen2018hack,taylor2018everybody,busby2016closing,craddock2016brainhack},
entrepreneurship~\cite{cobham2017appfest2,nolte2019touched},
corporations~\cite{pe2019designing,nolte2018you,komssi2015hackathons,rosell2014unleashing}, and others.
Most hackathon projects focus on creating a prototype that can be presented at the end of an event~\cite{medina2020what}. This prototype often takes the form of a piece of software. The creation of software code can, in fact, be considered as one of the main motivations for organizers to run a hackathon event. Scientific and open source communities, in particular, organize such events with the aim of expanding their code base~\cite{pe2019understanding,stoltzfus2017community}.
It thus appears surprising that the evolution of the code used and developed during a hackathon has not been studied yet, as revealed by a review of existing literature.
In this work, which is an extension of our previous work~\cite{imam2021secret}, we study the evolution of the code used and created by the hackathon team members by focusing on their origin and subsequent reuse. Similar to the previous work, we focus exclusively on the code blobs~\footnote{A blob is a byte string representing a single version of a file, see \url{https://git-scm.com/book/en/v2/Git-Internals-Git-Objects} for more details} in this study, which is taken as an abstraction for the code itself. It is also worth mentioning that when we talk about code reuse in the context of our study, we are referring to the \textit{exact copying} of a code blob so that the SHA1 value remains the same, i.e. identical code segments with no changes in comments, layouts, and whitespaces.
First, we study from where the code blobs \textit{originate}: While teams will certainly develop original code during a hackathon, it can be expected that they will also utilize existing (open source) code as well as code that they might have created themselves prior to the event.
Second, to understand the impact of hackathon code, i.e. code created during a hackathon event by the hackathon team in the hackathon project repository, we aim to study whether and how the code blobs \textit{propagate} after the event has ended. There are studies on project continuation after an event has ended~\cite{nolte2020what,nolte2018you}. These studies, however, mainly focus on the continuation of a hackathon project in a corporate context~\cite{nolte2018you} and on antecedents of continuous development activity in the same repository that was utilized during the hackathon~\cite{nolte2020what}. The question of where code blobs that has been developed during a hackathon potentially gets reused outside of the context of the original hackathon project has not been sufficiently addressed.
Moreover, we aim to understand what factors might influence the reuse of hackathon code blobs, which can be useful for hackathon organizers and participants to foster the impact of the hackathon projects they organize/participate in. These factors would also be of interest to the open source community in general in order to effectively tap into the potential of hackathons as a source of new software code creation.
To address the above-mentioned goals, we conducted an archival analysis of the source code utilized and developed in the context of 22,183 hackathon projects that were listed in the hackathon database {\sc Devpost}\xspace\footnote{https://devpost.com/}. To track the origin of the code blobs that were used and developed by each hackathon project and study its reuse after an event has ended we used the open source database {\sc World of Code}\xspace~\cite{ma2019world, ma2020world} which allows us to track code (blob) usage between repositories. Overall, we looked at over 8.5M blobs, over 3M of which were code blobs, as identified with the help of the {\sc GitHub}\xspace \textit{linguist}~\footnote{\url{https://github.com/github/linguist}} tool. In order to further test the validity of the findings of the data-driven study, we conducted surveys of 178 hackathon participants whose code was reused, 120 hackathon participants whose code was not reused, and 118 OSS developers who reused some code first used in a hackathon.
Our findings indicate that around 9.14\% of the code blobs in hackathon projects are created during an event (8\% if we consider the lines of code), which is significant considering the time and team member constraints. Teams tend to reuse a lot of existing code blobs, primarily in the form of packages/frameworks. Many of the projects we studied focus on front-end technologies -- JavaScript in particular -- which appears reasonable because teams often have to present prototypes at the end of an event, which lends itself to UI design. Most (45.6\% overall) of the hackathon participants indicated (through surveys) that they wrote the code themselves during the hackathon and a number of them also indicated they found the code from the web or wrote it together with another participant.
Approximately a third of code blobs created during events get reused in other projects, both by the number of blobs and the lines of code, with most being reused in small projects. Most developers who reused some hackathon code (blobs) rated (through the survey) the code to be easy to use. The characteristics of the blobs that were reused, in terms of size (lines of code) and whether the code is \textit{template code} (see \cref{sec:rq} for definition) or not, were found to be significantly different from those of the code blobs that were not reused. In most cases, the hackathon code creators did little to foster the reuse of their code and were not aware if it was being reused or not. Moreover, though they expressed satisfaction with the project, they had little intention of continuing to work on it.
The number of associated technologies and the number of participants in a project were found to increase the code blobs' reuse probability, and so did including an Open Source license in the project repository.
In summary, we make the following contributions in the paper: we present an account of code (blob) reuse both by hackathon projects and of the code (blobs) generated during hackathons based on a large-scale study of 22,183 hackathon projects and 1,368,419 projects that reused the hackathon code blobs. We tracked the origins of the code blobs used in hackathon projects, in terms of when it was created and by whom, and also its reuse after an event. We gained further insight into the evolution of the code (blobs) by conducting a series of surveys and also identified a number of project characteristics that can affect hackathon code blob reuse.
The replication package for our study is available at~\cite{repPackage}, and the processed dataset containing the SHA1 hash values for the final list of blobs under consideration, the ID of the hackathon (in {\sc Devpost}\xspace) the blob is associated with, the {\sc GitHub}\xspace project/repository name (in \texttt{owner/repository} format), and the various attributes of the blobs we identified, viz., when the blob was first created and by whom, whether the blob was reused afterwards, and if so, in what type of project, and if the blob is a ``template code'' blob or not, is available at \datadoi\cite{ahmed_samir_imam_mahmoud_2022_6578708}.
\section{Research Questions}
\label{sec:rq}
As mentioned in~\cref{sec:intro}, the goal of this study is to understand the evolution of hackathon code blobs and identify factors that affect code blob reuse for these projects.
\vspace{10pt}
\noindent Our \textbf{first research question} thus addresses the origin of hackathon code blobs:
\RQ{1}{Where does the code blobs used in hackathon projects originate from?}
Delving deeper into this question, we aim to understand how much of the code blobs used in a hackathon project was actually created \textit{before} the event and reused in the project, how much of the code blobs were developed \textit{during} the hackathon, and, since the projects sometimes continue even after the official end date of the hackathon, how much of the code blobs were created \textit{after} the event. This leads us to the sub-question:
\RQ{1a}{When were the code blobs created?}
We also aim to understand how much of the code blobs in a hackathon project repository are created by one of the participants, how frequently they reused code blobs created by someone they worked with earlier, and how much of code was created by someone else, leading us to the sub-question:
\RQ{1b}{Who were the original creators of the code blobs?}
A related question that can lead to a deeper understanding of the hackathon projects and the code is related to the source of the code blobs - was it written by the project participants during the hackathon, did they reuse code blobs from some other projects/from online communities like StackOverflow, or did the code blobs have a different origin? This leads us to the following sub-question:
\RQ{1c}{Where did the code blobs originate from?}
We also wanted to examine what are the programming languages predominantly used in various hackathon projects and the distribution of languages in the code created before, during, and after the projects:
\RQ{1d}{What are the languages of hackathon code created before, during, and after the event?}
In addition, to quantify ``how much'' code in various hackathon projects was created before, during, or after the hackathon, we also want to measure the sizes of the code blobs, leading us to the sub-question:
\RQ{1e}{What are the sizes of code blobs created before, during, and after the hackathons?}
Finally, we focused on the fact that a lot of developers often use some boilerplate code to initialize their repositories and a good chunk of code in many repositories is actually created by various automated tools, scripts, or are part of some libraries or frameworks. The code blobs related to to such code is generally different from code written/reused by developers because these code blobs are meant to be used ``as-is'', in contrast to some code blob a developer in a project might want to reuse ``as-is'' by their conscious decision. We call such code (blobs) ``template code'', which we define as: \textit{``ready-to-use'' code that is generally intended to be used ``as-is'', e.g. code (blobs) that is part of a library/framework, or is a commonly used boilerplate code, e.g. boilerplate code (blobs) used while initializing a project or blobs representing contents of placeholder files.}
We decided to differentiate such ``template code'' from code written/reused by human developers because ``template code'' is developed with the intention of being used ``as-is'' while non-template code is not, leading us to the sub-question:
\RQ{1f}{What fraction of code blobs created before, during, or after the hackathons can be categorized as template code?}
\vspace{10pt}
Our \textbf{second research question} focuses on the aspect of hackathon code (blob) reuse. As noted in~\cref{sec:intro}, existing studies do not address the question of whether and where hackathon code blobs get reused after an event has ended. However, knowing the answer to this question would be crucial for understanding the impact of hackathons on the larger open source community. Some might perceive hackathons as one-off events where people gather and create some code that is never used again, while in fact they might have an impact on the wider scene of software development and create something of value that transcends individual events. This leads us to also ask the following second research question:
\RQ{2}{What happens to hackathon code (blobs) after the event?}
To address this question, we started by looking at what fraction of the hackathon code blobs get reused and the characteristics of the reused code blobs in terms of size, purpose (whether it is a template code or not), programming language the code was written in, and ease-of-use (based on responses from developers who reused the code blobs). We focused on these factors because previous studies (see \cref{sec:lit:reuse}) suggested that these are important characteristics of the code blobs that gets reused. So our first sub-question is:
\RQ{2a}{How much hackathon code (blobs) gets reused and what are the distributions for size, purpose, language, and ease-of-use of the reused code blobs?}
We also wanted to know if the characteristics of the reused code blobs, as mentioned in the last sub-question, differ significantly from that of the code blobs which didn't get reused, leading to the second sub-question:
\RQ{2b}{Are the characteristics of the reused hackathon code blobs significantly different from those of the blobs that do not get reused?}
In terms of assessing the impact of the code blobs that were reused, arguably, some code blob that is reused in a large project reaches and ultimately impacts more people, and thus can be perceived to have more impact on and be more useful to the software development community overall, than code blobs reused in a small project, so we wanted to explore how frequently the hackathon code blobs get reused in small/medium/large OSS projects:
\RQ{2c}{What are the sizes of the projects that reuse hackathon code blobs?}
Next, we wanted to explore if the hackathon project members who created the code somehow foster code reuse, examining if they themselves reused the code (blobs) or shared the code afterwards:
\RQ{2d}{How commonly do the hackathon code owners foster code (blob) reuse by actively reusing/sharing the code/using a license in the repository that allows code reuse?}
We also wanted to examine if the hackathon code owners are aware that some of the code they created during a hackathon might be getting reused and if they feel that their code is useful for others, which ties to the aspects of transparency and perception of the participants:
\RQ{2e}{Are the hackathon code authors aware of code reuse/feel their code might be useful to others?}
Finally, though not a form of direct code reuse, we wanted to know if the ideas developed in the hackathon projects are ever reused because this is another form of continuation of the hackathon project which is often hard to capture from purely data-driven studies:
\RQ{2f}{Do the ideas that arose from a hackathon project get reused?}
\vspace{10pt}
Our \textbf{third research question} focuses on understanding how different characteristics of a hackathon project can influence the probability of hackathon code (blob) reuse.~\footnote{Here we are interested in discovering if the independent variables are able to statistically explain the dependent variable, not causal inference.} While code reuse in Open Source Software is a topic of much interest, there are only a few studies covering this topic. Moreover, existing studies, e.g.~\cite{haefliger2008code,kawamitsu2014identifying,feitosa2020code,von2005knowledge} only focus on between 10 and a few hundred projects. For this study, we examined 22,183 hackathon projects, which makes it reasonable to assume that insights from this study -- despite them being drawn from hackathon projects only and being focused on reuse at the blob level (i.e. exact copy-paste of code) -- would add to the existing knowledge about code reuse in general. Thus, we present this question as:
\RQ{3}{How do certain project characteristics influence hackathon code (blob) reuse?}
Related to this research question, we formed the following hypotheses that focus on aspects that can reasonably be expected to foster code (blob) reuse:\\
\noindent\textbf{H1 Familiarity:} Projects that are attempted by larger teams will have a higher chance of their code being reused, simply because more people are familiar with the code. Moreover, hackathon events that are co-located offer participants more possibilities for interaction which can contribute to a better understanding of each other's code, higher code quality, and consequently foster code reuse.\\
\noindent\textbf{H2 Prolificness:} Code from projects involving many different technologies is more likely to be reused, since: (a) they tend to have more general-purpose code than more focused projects, which affects code reuse as discussed by Mockus~\cite{mockus2007large}, and (b) they have a cross-language appeal, opening more possibility for reuse. Similarly, projects with more amount of code created before and during the event (we can not use the code created after the event, for preventing data leakage) should have a higher chance of code reuse by virtue of simply having more code.\\
\noindent\textbf{H3 Composition:} The project composition, i.e. how many blobs in a project are actually code blobs, and how many are non-code blobs, e.g., data, documentation, or others could be another factor that might influence code (blob) reuse. This relationship is likely to be non-linear though, e.g., since we are considering code reuse, a higher percentage of code in the project should increase the probability of reuse, but only up to a certain point, since code from a repository containing only code and no documentation is not very likely to be reused.\\
\noindent\textbf{H4 Permission:} Last but not least, we also focus on if the code (blob) is actually shared with an Open Source License which allows it to be reused because, if the hackathon project repository is not licensed to be reused, the chance of that code (blob) being used elsewhere should be very low.
\section{Background}
\label{sec:lit}
In this section we will situate our work in the context of prior research on hackathon code (\cref{sec:lit:hack}) before discussing existing studies on code reuse (\cref{sec:lit:reuse}).
\subsection{Research on hackathon code}
\label{sec:lit:hack}
The rise in popularity of hackathon events has led to an increased interest to study them~\cite{falk202010}. Current research however mainly focuses on the event itself studying how to attract participants~\cite{taylor2018everybody,hou2017hacking}, how to engage diverse audiences~\cite{paganini2020engaging,hope2019hackathons,filippova2017diversity}, how to integrate newcomers~\cite{nolte2020support}, how teams self-organize~\cite{trainer2016hackathon} and how to run hackathons in specific contexts~\cite{moller2014community,pe2019designing,porras2019code}. These studies acknowledge the project that teams work on as an important aspect. The question of where the software code that teams utilize for their project comes from and where it potentially gets reused after an event has not been a strong focus though.
There are also studies that focus on the continuation of software projects after an event has ended~\cite{lapp20072006,cobham2017appfest2,nolte2018you,ciaghi2016hacking}. These studies however mainly discuss how activities of a team during, before, and after a hackathon can foster project continuation~\cite{nolte2018you}, how hackathon projects fit to existing projects~\cite{lapp20072006}, and the influence of involving stakeholders when planning a hackathon project on its continuation~\cite{cobham2017appfest2,ciaghi2016hacking}. They do not specifically focus on the code that is being developed as part of a hackathon project.
Few studies have also considered the code that teams develop during a hackathon~\cite{nolte2020what,busby2016closing}. These studies however mainly focus on code availability after an event~\cite{busby2016closing} or on how activity before and after an event within the same repository that a team utilized during the hackathon can affect reuse~\cite{nolte2020what}. The question of whether and to what extend teams utilize existing code and whether and where the code that they develop during a hackathon gets reused aside from this specific repository has not been addressed.
\subsection{Code reuse}
\label{sec:lit:reuse}
Code reuse has been a topic of interest and is generally perceived to foster developer effectiveness, efficiency, and reduce development costs~\cite{sojer2010code,haefliger2008code,feitosa2020code}. Existing work so far mainly focuses on the relationship between certain developer traits~\cite{haefliger2008code,sojer2010code,von2005knowledge} and team and project characteristics such as team size, developer experience, and project size and code reuse~\cite{abdalkareem2017code}. Moreover, the aforementioned findings are mainly based on surveys among developers, thus covering their perception rather than actual reuse behavior. In contrast, we aim to study actual code reuse behavior.
There is also existing work that focuses on studying the reuse of the code itself. These, however, are often small scale studies of a few projects~\cite{kawamitsu2014identifying,xu2020reinventing} focusing on aspects such as automatically tracking reuse between two projects~\cite{kawamitsu2014identifying} and identifying reasons why developers might choose reuse over re-implementation~\cite{xu2020reinventing}. In contrast, our aim is to study how the code created during a hackathon evolves i.e. where it comes from and whether and where it gets reused.
Large scale studies on code reuse have been scarce. The few existing studies often focus on code dependencies~\cite{german2007using} or on technical dept induced based on reuse~\cite{feitosa2020code} which are both not a strong focus for us because our aim is rather to study where hackathon code gets reused. There are studies that discuss the reuse of code on a larger scale~\cite{mockus2007large} and showed that it is mainly code from large established open source projects that get reused, while we aim to study reuse of code that has been developed by a small group of people during a short-term intensive coding event.
This work is an extension of our previous work~\cite{imam2021secret,imam2021tracking} where we conducted a study on the evolution of hackathon-related code, specifically, how much the hackathon teams rely on pre-existing code and how much new code they develop during a hackathon. Moreover, we also focused on understanding if and where that code (blob) gets reused and which project-related aspects predicate code (blob) reuse. However, it did not differentiate between template code that is intended to be reused ``as-is'' and code that was written by developers with no such intention. Moreover, it only looked at the number of blobs when considering ``how much'' code was reused, not accounting for the sizes of the code blobs, and also did not investigate the effect of having an Open Source license in the hackathon repository on code (blob) reuse. It did not consider the perception of individuals that created and reused hackathon code either. This study, therefore, makes a novel contribution by providing a more in-depth examination of the creation and reuse of hackathon-related code blobs through additional quantitative and qualitative analysis.
\section{Methodology}
\label{sec:method}
In this section, we describe the methodology followed in this study. As mentioned in \cref{sec:intro}, we conducted a data-driven study using the {\sc Devpost}\xspace and the {\sc World of Code}\xspace platforms and also a series of three surveys for addressing our research questions.
\subsection{Data-Driven Study:}
The data-driven study we conducted involved studying actual hackathon projects using the {\sc Devpost}\xspace and {\sc World of Code}\xspace platforms. This study was used for answering \textit{RQs 1a, 1b, 1d, 1e, 2e, and 3} completely and also for partially answering \textit{RQs 2a and 2b}.
\subsubsection{Data Sources}
While hackathon events have risen in popularity in the recent past, many of them remain ad-hoc events, and thus data about those events is not stored in an organized fashion.
However, {\sc Devpost}\xspace is a popular hackathon database that is used by corporations, universities, civic engagement groups and others to advertise events and attract participants. It contains data about hackathons including hackathon locations, dates, prizes and information about teams and their projects including the project's {\sc GitHub}\xspace repositories. Organizers curate the information about hackathons and participants indicate which hackathons they participated in, which teams they were part of and which projects they worked on. {\sc Devpost}\xspace does not conduct accuracy checks.
However, {\sc Devpost}\xspace does not contain all the information required for answering our research questions. We thus leveraged the {\sc World of Code}\xspace dataset for gathering additional information about projects, authors, and code blobs. {\sc World of Code}\xspace is a prototype of an updatable and expandable infrastructure to support research and tools that rely on version control data from the entirety of open source projects that use Git.
It contains information about OSS projects, developers (authors), commits, code blobs, file names, and more. {\sc World of Code}\xspace provides maps of the relationships between these entities, which is useful in gathering all relevant information required for this study.
We used version S of the dataset for the analysis described in this paper which contains repositories identified until Aug 28, 2020.
~\footnote{For further details, please check:\url{https://bitbucket.org/swsc/overview/src/master/}}
\subsubsection{Data Collection and Cleaning}
Here we describe how we collected the data required for answering our research questions, along with the details of all the filtering we introduced. An overview of the approach is shown in~\cref{fig:DataCollection}, which also highlights the different data sources and what data was used for answering each research question.
\begin{figure}[!t]
\centering
\includegraphics[width=\linewidth]{DataCollection.png}
\caption{\textbf{Data Collection Workflow: Highlighting the different data sources used and the process of gathering the required information from them, and the data used in answering our research questions}}
\label{fig:DataCollection}
\end{figure}
\paragraph{Selecting appropriate hackathon projects for the study}
We started by collecting information about 60,479 hackathon projects from {\sc Devpost}\xspace. Since the project ID used in {\sc Devpost}\xspace is different from the project names in {\sc World of Code}\xspace, in order to link these hackathon projects to the corresponding projects in {\sc World of Code}\xspace, we looked at the corresponding {\sc GitHub}\xspace URLs, which could be easily mapped to the project names used in {\sc World of Code}\xspace, where the project names are stored as \\\texttt{GitHubUserName\_RepoName}. After filtering out the projects without a {\sc GitHub}\xspace URL, we ended up with 23,522 projects. While trying to match these projects with the corresponding ones in {\sc World of Code}\xspace, we were not able to match 1,339 projects, which might have been deleted or had their names changed afterward. Thus, we ended up with 22,183 projects for further analysis.
\paragraph{Characteristics of the chosen hackathon projects}
\begin{figure}[!t]
\centering
\includegraphics[width=\linewidth]{topics.png}
\caption{\textbf{Common technologies associated with the chosen hackathon projects}}
\label{fig:topics}
\end{figure}
\begin{figure}[!t]
\centering
\includegraphics[width=\linewidth]{teamsize-prj.png}
\caption{\textbf{Distribution of team sizes for the hackathon projects}}
\label{fig:teamsize}
\end{figure}
\begin{figure}[!t]
\centering
\includegraphics[width=\linewidth]{year-prj.png}
\caption{\textbf{Distribution of when the hackathons under consideration took place}}
\label{fig:year}
\end{figure}
To understand the characteristics of the chosen hackathon projects, we decided to look at the various technologies associated with the hackathons, the distributions of team sizes for the hackathon teams, and when the hackathons took place, which are shown in ~\cref{fig:topics},~\cref{fig:teamsize}, and ~\cref{fig:year} respectively. We can see that JavaScript, Python, Java are among the more popular technologies used in the hackathons under consideration. Most of the hackathons tend to have up to 4 members and majority of the hackathons under consideration took place in 2016 and 2017.
\paragraph{Gathering the contents (blobs) of the project}
Our first step was to identify all code blobs used in the hackathon projects. {\sc World of Code}\xspace does not have a direct map between projects and blobs, so we started by collecting commits for all hackathon projects (repositories) using the project-to-commit (\textit{p2c}) map in {\sc World of Code}\xspace (in the {\sc World of Code}\xspace terminology, projects essentially refer to repositories), which covers all commits for each hackathon project.
For the 22,183 hackathon projects, we collected 1,659,435 commits generated in the hackathon repository.
Then, we gathered all the blobs associated with these commits using the commit-to-blob (\textit{c2b}) map in {\sc World of Code}\xspace, which yielded 8,501,735 blobs, which are all the blobs associated with the hackathon projects under consideration.
\paragraph{Filtering to only select code blobs}
The hackathon project repositories, like most other OSS project repositories, have more than just code in them --- they also contain images, data, documentation, etc. Since our aim in this project is the identification of the reuse of ``code", we decided to filter the blobs to only have the ones related to ``code". In order to achieve that, we looked at the filenames for each of the blobs in the project (since blobs only store the contents of a file, not the file name) using the blob-to-filename (\textit{b2f}) maps in {\sc World of Code}\xspace. After that, we used the \textit{linguist} tool from {\sc GitHub}\xspace to find out the file types. The \textit{linguist} tool classifies files into types ``data, programming, markup, prose'', with files of type ``programming'' being what we are focusing on in this study. Additionally, we marked all the files that are not classified by the tool as files of type ``Other'', with the presumption that they do not contain any code. Therefore, we focused only on the blobs whose corresponding files are classified as ``programming'' files by the \textit{linguist} tool, which reduced the number of blobs under consideration to 3,079,487.
\paragraph{Gathering data required to identify the origins of hackathon code (blobs)}
\label{sss:rq1}
To address our first research question, we needed information about the first commits associated with each of the 3,079,487 blobs under consideration. Fortunately, it is possible to get information about the first commit that introduced each blob using {\sc World of Code}\xspace. We extracted the \textit{author} of that first commit, along with the \textit{timestamp}, which would be useful in identifying when the blob was first created. We have the end date for each of the hackathon events from {\sc Devpost}\xspace, however, it does not include any information about the start date of the hackathon. We consider the start of a hackathon 72 hours before the end date. This assumption appears reasonable since hackathons are commonly hosted over a period of 48 which are often distributed over three days~\cite{Nolte2020HowTO,cobham2017appfest2}. We also conducted a manual investigation of 73 randomly selected hackathons and found that only 2 projects (2.7\%) were longer than 3 days, which empirically suggested that our assumption would be valid for most of the hackathons under consideration.
Under this assumption, we have the start and end dates of each of the hackathon events, and we used that information to identify if a blob used in a hackathon project was created before, during, or after the hackathon event.
We can identify the first commit that introduced the hackathon blobs under consideration, the \textit{author} of that commit, and all of the developers who have been a part of the hackathon project~\footnote{We used the approach outlined by~\cite{fry2020idres} for author ID disambiguation to merge all of the different IDs belonging to one developer together, which is a common occurrence, as discussed in~\cite{Dey2020RepresentationOD}} using {\sc World of Code}\xspace. With this data, we can determine if the blob was first created by a member of the hackathon team or someone else. In order to dig further and understand if the blob was created in another project a member of the hackathon project participated in, we used {\sc World of Code}\xspace to identify the project associated with the first commit for each blob under consideration, identified all developers of that project, and checked if any of them are members of the team that created the hackathon project under consideration. This lets us identify if the blob was created by (a) a developer who is a participant of the hackathon project (thus, they are creating the code/reusing what they had created earlier), (b) a developer who was part of a project one of the participants of the hackathon project also contributed to (which might suggest that they are familiar with the code, which might have influenced the reuse of that code (blob) in the hackathon project), or (c) someone else who has not contributed to any of the projects the hackathon project developers previously contributed to (which would suggest a lack of direct familiarity with the code from the hackathon participants' perspective).
\paragraph{Code Size Calculation}\label{sss:loc}
In order to quantify ``how much'' code in various hackathon projects was created before, during, or after the hackathon, we focused on calculating the file size. Measuring file size is straightforward and, arguably, reflects the amount of effort that went into creating a file. One of the most common ways to measure file size is to calculate the number of lines of code (LOC) in the file. However, simply counting the lines is often not enough since code files often contain blank lines and comments along with the actual code, and, arguably, they do not represent the same amount of coding effort. Therefore, in order to get a more accurate estimate of the file sizes, which would, in turn, represent the effort that went into creating the code, we decided to only measure the actual lines of ``code'' and exclude the blanks and commented lines from consideration.
While there are several tools that can be used to get such information, one of the common tools is \textit{cloc}~\footnote{\url{https://github.com/AlDanial/cloc}} which is an open-source command-line tool that can measure the lines of code for several programming languages. The cloc tool uses the file name to be able to determine the target programming language and then will use that as input to calculate the file statistics (code, comment, and blank lines). The cloc tool can also work by specifying the language directly instead of the file name. The tool reads the blob content and calculates how many code lines, commented lines, and blank lines are in the file.
We started by identifying the file names for each blob hash using \textit{b2f} map in {\sc World of Code}\xspace. We noticed that the \textit{cloc} tool was not able to identify the language directly from file names for all of the collected blobs, thus we decided to use the {\sc GitHub}\xspace Linguist tool to get the language of each blob based on the collected file names. We also collected the content of each blob using {\sc World of Code}\xspace and using the collected data, we were able to run the \textit{cloc} tool with the language and file content as input to identify code size for each blob.
\paragraph{Template Code Detection}\label{sss:template}
We decided to differentiate between code that is provided as a part of a library/framework/boilerplate template/generated by a tool with the intention of being reused ``as-is'' and code that is written by a developer without such intention because we expect them to have very different characteristics in terms of where they originate from, where they are reused, and also how much actual ``effort" goes into adding this code into a project. However, since we are not limiting our analysis to any one specific language, there is no general way to differentiate between the two with absolute certainty. Therefore, we decided to use a set of three heuristics, formulated by trial-and-error, for detecting template code blobs, described below:
\noindent\textbf{Rule 1: Depth} - The filename associated with the blob has a depth of 3 or more relative to the parent directory of the project.\\
\noindent \textit{Example:} A file located at \texttt{work/opt/tmp.py} is located at a depth of 3 (the file is located in the \texttt{opt} directory which is inside the \texttt{work} directory relative to the parent directory of the project).\\
\noindent \textit{Rationale:} Based on manual empirical observation of 100 different template files selected randomly from various hackathon projects in different languages, only 3 were found to be located at a depth of 2 and 0 at a depth of 1 (the parent directory of the project).
\noindent\textbf{Rule 2: Similar filename} - If a blob is associated with $n$ filenames in total and $u$ unique filenames, then we expect ratio $u/n$ to be less than or equal to $0.33$ (if an example blob has these file names associated with it: $[A, A, A, B, B]$, we would have $n = 5$ and $u = 2$).\\
\noindent \textit{Example:} Using the \textit{b2f} (blob to filename) map of {\sc World of Code}\xspace, an example blob was found to be associated with 15 filenames (relative to different projects where the blob was used), and only 2 unique filenames. The ratio of $u/n$ in this case was $0.1333$, so this rule would mark that blob as template code.\\
\noindent \textit{Rationale:} The template files are often reused in various projects \textit{as-is} with the same filename (since they are often a part of some standard library/framework), so we would expect the value of $n$ to be relatively large (because of reuse) and the value of $u$ to be relatively small (because code is reused \textit{as-is}). Based on a manual empirical observation of 100 different template files selected randomly from various hackathon projects in different languages, all of them satisfied the condition $u/n <= 0.33$.
\noindent\textbf{Rule 3: Keywords} - Have one of these keywords in the filename path - \texttt{plugins, frameworks, site-packages, node\_modules, vendor}.\\
\noindent \textit{Example:} One of the filename associated with the blob\\ \texttt{1ff93087f56aeeacece3a3ae4ccf0ba7dff6b8a9} is\\ \texttt{venv/lib/python2.7/site-packages/django/contrib/auth/\_\_init\_\_.pyc}. Since the filename contains the keyword \texttt{site-packages}, it would be marked as a template file according to this rule.\\
\noindent \textit{Rationale:} Based on a manual empirical observation of 100 different template files selected randomly from various hackathon projects in different languages, 83 were found to contain the above-mentioned keywords in at least one of the filenames associated with the blob. This rule addresses the reuse of blobs related to modules/libraries/package files, which fits our definition of ``template code''.
We used these three heuristic rules for detecting template code, which were formulated by trial-and-error, and a different set of 100 code blobs were selected randomly in each case. Finally, \textbf{all code blobs that satisfied at least 2 of the 3 rules mentioned above were marked as template code for our analysis.}
In order to check the effectiveness of our proposed heuristics in detecting template code, we manually checked 100 randomly selected blobs marked as ``template code'' by our overall heuristics (different from the template code blobs used for formulating the three heuristics rules) and 100 more randomly selected blobs marked to be non-template code by examining the filenames, the blob contents, and the first commits that introduced each blob to discern whether it actually is template code or not. The confusion matrix related to the evaluation is presented in~\cref{t:heuristics}. The associated values of precision, recall (sensitivity), specificity, accuracy, and F1-score are $0.96, 0.79, 0.95, 0.85,$ and $0.86$ respectively. We found that our heuristics are effectively tagging blobs associated with widely used package files, however, it has the problem of wrongly tagging some non-template code blobs as template ones particularly in large projects because the filename might not be that uncommon and they tend to have a sufficiently deep directory structure.
We tested a few other ideas than the ones described above, e.g., identifying ``common modules'' by the number of occurrences with the assumption that ``template code'' blobs are more common than the rest but they didn't affect the overall accuracy of our heuristics too much.
\begin{table}[!ht]
\caption{Confusion Matrix showing the effectiveness of our heuristics in identifying template code.}
\label{t:heuristics}
\resizebox{0.8\textwidth}{!}{%
\begin{tabular}{lrr}
& True Positive & True Negative \\
Predicted Positive & 96 & 4 \\
Predicted Negative & 26 & 74
\end{tabular}%
}
\end{table}
\paragraph{Gathering data to identify hackathon code blob reuse}
\label{sss:rq2}
Our second research question focuses on the reuse of \textit{hackathon code}, which, per our definition (see ~\cref{sec:intro}), refers to the blobs created during the hackathon event by one of the members of the hackathon team. Therefore, to address this question, we utilized the results of our earlier analysis in order to focus only on the code blobs which satisfy the following two conditions: (a) The blob was first introduced during the hackathon event and (b) the blob was created by one of the hackathon project developers. After identifying 581,579 blobs that met these conditions, we collected all commits containing these blobs from {\sc World of Code}\xspace using the blob-to-commit (\textit{b2c}) map, and we collected the projects where these commits are used using the commit-to-project (\textit{c2p}) map. {\sc World of Code}\xspace has the option of returning only the most central repositories associated to each commit, excluding the forked ones (based on the work published in~\cite{forkrepo}), and we used that feature to focus only on the repositories that first introduced these blobs, and excluded the ones that were forked off of that repository later, since most forks are created just to submit a pull request and counting such forks would lead to double-counting of code blob reuse.
In addition to understanding how the blobs get reused, we also wanted to understand if they are reused in very small projects, or if larger projects also reuse these blobs. So, we needed a way to classify the projects into different categories. We focused on two different project characteristics for the purpose of such classification: the number of developers who contributed to that project, and the number of \textit{stars} it has on {\sc GitHub}\xspace, a measure available from a database (MongoDB) associated with {\sc World of Code}\xspace.
Both the number of developers and \textit{stars} are quintessential measures of project size and popularity and were found to have a low correlation (Spearman Correlation: 0.26), so we decided to use both measures.
Instead of manually classifying the projects using these variables using arbitrary thresholds, we decided to use \textit{Hartemink's pairwise mutual information based discretization method}~\cite{hartemink2001principled}, which was applied to a dataset with log-transformed values of the number of stars and developers for projects, to classify them into three categories: Small, Medium, and Large. We found different thresholds for the number of developers and \textit{stars} (for no. of developers, $>2 \rightarrow$ Medium projects and $>6 \rightarrow$ Large; for stars, $>1 \rightarrow$ Medium and $>14 \rightarrow$ Large), and classified a project as ``Large" if it is classified as such by either the number of developers or the number of \textit{stars}, and used a similar approach for classifying them as ``Medium''. The remaining projects were classified as ``Small''. Overall, we identified 1,368,419 projects that reused at least one of the 581,579 blobs, and using our classification, 1,220,114 (89.2\%) projects were classified as ``Small'', 116,177 (8.5\%) as ``Medium'', and 32,128 (2.3\%) as ``Large''.
\paragraph{Discovering the Licenses associated with the hackathon projects}
One of the main factors that could affect code blob reuse is the license associated with the hackathon project (H4 for RQ3 as presented in ~\cref{sec:rq}). In order to assess the validity of that claim, we had to collect and identify the type of license associated with the hackathon projects.
Although {\sc World of Code}\xspace provides a tremendous amount of information about open source projects, it doesn't include the license details for projects. In order to be able to collect the license details, we used {\sc GitHub}\xspace REST API to generate calls for collecting license information for the projects under consideration. We used the list of hackathon projects as input and called the license REST API in {\sc GitHub}\xspace on each of them. We found that, unsurprisingly, some projects don't have a license at all and some other projects got deleted, merged or renamed. We handled such cases and marked projects with no license as \textit{'NOLICENSE'} and projects which are we could not find in {\sc GitHub}\xspace as \textit{'NOTFOUND'}.
We ran the license collection on 27,419 projects. We have more projects to consider here since this was done in the second phase of the study and the number of projects associated with the hackathon blobs increased within that time. 5,910 of the projects were not found in {\sc GitHub}\xspace, and 17,742 projects were found to not have a license. The license type used most frequently is "MIT License" with 2,301 projects, followed by "Apache License 2.0" license with 441 projects.
\paragraph{Collecting Data for identifying the factors that affect\\ hackathon code blob reuse}
\label{sss:rq3-data}
\begin{table}[t]
\caption{Description of variables used for addressing RQ3. For the Binary variable, no. of TRUE/FALSE cases are shown}
\label{t:variables}
\resizebox{\textwidth}{!}{%
\begin{tabular}{@{}llp{3.2cm}p{1.5cm}rr@{}}
\toprule
\multirow{2}{*}{\textbf{Hypothesis}} & \multirow{2}{*}{\textbf{Variable}} & \textbf{Variable} & \multirow{2}{*}{\textbf{Source}} & \textbf{Value Range} & \multirow{2}{*}{\textbf{Median}} \\
& & \textbf{Description} & & \textbf{(min-max)} & \\\midrule
& no.Participant & Number of Participants in the hackathon. & {\sc Devpost}\xspace & 2 - 10 & 3 \\
\multirow{-2}{*}{H1: Familiarity} & is.colocated & hackathon is held in single or multi location. & {\sc Devpost}\xspace & \multicolumn{2}{p{3cm}}{\cellcolor[HTML]{FFFC9E}TRUE: 12,445 (97\%) FALSE:436 (3\%)} \\\hline
& no.Technology & Number of different technologies the hackathon is related to & {\sc Devpost}\xspace & 1 - 40 & 5 \\
& Before & Number of blobs in the hackathon project repo that were created before the event. & {\sc World of Code}\xspace & 0 - 205,666 & 4 \\
\multirow{-3}{*}{H2: Prolificness} & During & Number of blobs in the hackathon project repo that were created during the event. & {\sc World of Code}\xspace & 1 - 3,288 & 23 \\\hline
& pctCode & Fraction of the blobs in the project repo that are classified as ``programming''. & {\sc World of Code}\xspace and {\sc GitHub}\xspace & 0 - 1 & 0.40 \\
& pctMarkup & Fraction of the blobs in the project repo that are classified as ``Markup''. & {\sc World of Code}\xspace and {\sc GitHub}\xspace & 0 - 0.96 & 0.02 \\
& pctData & Fraction of the blobs in the project repo that are classified as ``Data''. & {\sc World of Code}\xspace and {\sc GitHub}\xspace & 0 - 0.999 & 0.12 \\
\multirow{-4}{*}{H3: Composition} & pctProse & Fraction of the blobs in the project repo that are classified as ``Prose''. & {\sc World of Code}\xspace and {\sc GitHub}\xspace & 0 - 0.999 & 0.03 \\ \hline
H4: Permission & LicenseType & Type of License used in hackathon project. & {\sc World of Code}\xspace and {\sc GitHub}\xspace & \multicolumn{2}{p{3cm}}{\cellcolor[HTML]{FFFC9E}NOLICENSE :10,045 (77\%), OSSLICENSE: 1,882 (15\%), Other: 1,081 (8\%)} \\
\bottomrule
\end{tabular}%
}
\end{table}
In addition to tracking hackathon code blob reuse (RQ2), we also aimed to study factors that can affect this phenomenon. For this purpose, we collected various characteristics of the hackathon projects, both from {\sc Devpost}\xspace and {\sc World of Code}\xspace, and extracted the variables of interest, per the hypotheses presented in \cref{sec:rq}.
The data we collected for RQ2 was for the blobs, so, in order to find out if code blobs from a project were reused, we investigated how many blobs from a project was reused, and calculated the ratio of the number of reused code blobs and the total number of code blobs in the project. This revealed that almost 60\% of projects had none of their code blobs reused. So, we decided to pursue a binary classification problem for predicting if a project has at least one code blob reused or not instead of doing regression analysis.
For the purpose of our analysis, we excluded hackathon projects with a single member, since a hackathon project ``team'' with a single participant does not really make a lot of sense, and also the projects that were not related to any existing technology, since these likely were non-technical events. By looking for code blob reuse, we also automatically filtered out any project that had no code blobs in its repository. Moreover, projects for which we had missing values for any of the variables of interest (as shown in \cref{t:variables}) were also removed. After these filterings, we were left with 13,008 hackathon projects.
For the variables related to \textbf{H3}, the composition of the repository, we have 5 categories, 4 of which are dictated by the {\sc GitHub}\xspace \textit{linguist} tool: \\\textit{Code(programming), Markup, Data}, and \textit{Prose}, and a category \textit{Other} for all file types not classified by the tool. We looked at what percentage of the blobs in the projects belonged to which type. Since they all sum up to 100\%, 4 of these variables are sufficient to describe the fifth variable. In order to remove the resulting redundancy, we decided to remove the entry for type \textit{Other}, since its effect is sufficiently described by the remaining variables.
As for the license variable associated with \textbf{H4}, not all licenses used by the hackathon projects are Open Source licenses allowing the code to be shared and used by others and the projects without a license are, by default, assumed to be not licensed for reuse, i.e. under exclusive copyright. In order to capture that, we categorized the variables into three categories - projects without a license were put into the ``NOLICENSE'' category, projects with any of the standard OSS license that allow code-sharing (with some restrictions in some cases, e.g. the ``copyleft'' clause for GNU GPL) were put in the ``OSSLICENSE'' category, and projects with non-standard licenses that allow code sharing under very specific conditions or explicit copyright notices were put in the ``Other'' category.
The description of all the variables along their sources and values are presented in \cref{t:variables}.
\paragraph{Analysis Method for Identifying project characteristics that affect code blob reuse}
\label{sss:rq3-analysis}
As we noted in the hypotheses presented in \cref{sec:rq}, we are expecting some of the project characteristics to have a linear effect on hackathon code blob reuse, while some should have a more complex non-linear effect. The goal of our analysis is not to make the best predictive model that gives the optimum predictive accuracy, instead, we are trying to find out which of the predictors have a significant effect by creating an explanatory model. As noted by Shmueli~\cite{shmueli2010explain}, these two are very different tasks.
In order to achieve our goal of having linear and non-linear predictors in the same model and be able to infer the significance of each of them, we decided to use Generalized Additive Models (GAM). Specifically, we used the implementation of GAM from the \texttt{mgcv} package in \textit{R}.
\subsection{Surveys}
\label{sec:method:survey}
In addition to the data-driven study described above, we also conducted a survey study to validate our findings and further investigate where the code blobs used in a hackathon originates from (RQ 1.c) and aspects of what happens to the code blob that was created during an event after it had ended (RQ 2). In order to answer these research questions we focused on three separate scenarios:
\begin{enumerate}
\item The perception of individuals who had created a code blob during a hackathon that was reused after the event,
\item The perception of individuals who had created at least a code blob during a hackathon, and none of the blobs they created in that hackathon was reused after the event,
\item The perception of individuals who reused a code blob that was created during a hackathon.
\end{enumerate}
These scenarios are useful because they allow us to compare the perceptions of individuals who created code that got reused with those whose code did not, and also assess the perception of individuals about code blobs they reused which was originally created during a hackathon. The survey instrument focuses on commits that contain specific blobs that fit the three aforementioned scenarios.
\subsubsection{Survey design}
We developed two separate survey instruments to cover the three scenarios. The first focuses on code blobs that was created during a hackathon thus covering the first two scenarios. The second focuses on code blobs that was originally developed during a hackathon and subsequently reused thus covering the third scenario. In the following we will outline the content of both survey instruments (Tables~\ref{tab:app:instruments:survey1} and~\ref{tab:app:instruments:survey2} in appendix~\ref{sec:app:instruments} provides an overview).
Although the same survey instrument was used for potential participants from scenarios 1 and 2, for ease of reference, we refer to them as survey 1 and survey 2, and the survey sent out to potential participants in scenario 3 as survey 3.
All of the surveys started by asking participants about whether they authored the commit we had attributed to them or not. The aim of this question was to ensure that the respective participant was knowledgeable about the code contained in the blob the survey focused on.
The second question in the surveys focused on the source of the code contained in a blob (RQ 1.c). We provided a list of options that participants could choose from which included options like ``\textit{From other GitHub repositories}'', ``\textit{From the web (e.g. on Stackoverflow or forums)}'' and ``\textit{It was generated by a tool}''. Participants could select multiple sources since it is possible that the code contained in a blob is based on different sources. Participants could also provide an alternative source using a text field. The first two surveys also included options related to the hackathon the code was created in including ``\textit{I wrote it during the hackathon}'', ``\textit{I reused code that I had written before the hackathon}'' and ``\textit{My team members wrote it during the hackathon}''.
The first two surveys continued with questions examining whether and where participants use their own code after an event and how they foster code reuse (RQ 2.d). Possible answer options included common reuse settings such as ``\textit{another hackathon}'', ``\textit{school as part of a class, project or thesis}'' or ``\textit{In another open source project in my free time}''. In addition, participants could state that they did not reuse the code after an event or mention other possible scenarios. Regarding the question of how participants fostered reuse, we included typical approaches such as ``\textit{sending it to friends or colleagues}'', ``\textit{sharing it online (e.g. Stackoverflow, Medium, Social media)}'' as well as the option to state a different approach.
We also asked participants in the first two surveys for whom they thought the code they created would be useful and whether they are aware if anyone used their code after the event (RQ 2.d). Possible answer options regarding their perception of the usefulness of the code included ``\textit{No one}'', ``\textit{For our hackathon project or team}'' and ``\textit{For many people outside of the hackathon project or team}''. Possible options related to their awareness about who might have reused their code included ``\textit{my hackathon team members}'', ``\textit{my friends or colleagues}'' and ``\textit{someone else used it in an open-source project}''. For both questions, participants could again state other possible options using a text field.
In addition to asking about a specific blob, we also included questions regarding the perception of the participant about the hackathon project during which they developed to code in the blob in the first surveys. We specifically focused on their perception of the usefulness of the project and their intentions to continue working on it (RQ 2.a and RQ 2.b). For both aspects, we relied on established scales~\cite{reinig2003toward,bhattacherjee2001understanding} which and have been successfully applied in research related to hackathons in the past~\cite{filippova2017diversity,nolte2020support}.
In addition to the code that was developed participants might also have reused the idea their project was based on in a different context (RQ 2.f). The first surveys thus also included a simple \textit{yes/no/not sure} question related to this aspect.
Regarding the third survey, we also included a question that focused on how easy they found the using the code contained in the blob we identified (RQ 2.a). For this, we adapted an established scale by Davis~\cite{davis1989perceived}.
Finally, all surveys also included common demographic questions, including the age of the participant, their gender, their perception about their minority status, and their experience contributing to open-source projects. We utilized this simple way of assessing perceived minority since minority perception of an individual can be based on many different aspects like race, gender, expertise, background, and others. Table \ref{tab:demographics} shows summary for the participants demographics.
\begin{table}[!h]
\caption{Surveys demographics summary}
\label{tab:demographics}
\resizebox{\textwidth}{!}{%
\begin{tabular}{cccccc}
\hline
& & \textbf{\begin{tabular}[c]{@{}c@{}}Survey 1\\ Percentage \\ \%\end{tabular}} & \textbf{\begin{tabular}[c]{@{}c@{}}Survey 2\\ Percentage \\ \%\end{tabular}} & \textbf{\begin{tabular}[c]{@{}c@{}}Survey 3\\ Percentage \\ \%\end{tabular}} & \textbf{\begin{tabular}[c]{@{}c@{}}Combined \\ Percentage \\ \%\end{tabular}} \\ \hline
\multirow{4}{*}{\textbf{Gender}} & Male & 83.5 & 79.3 & 85.3 & 82.8 \\ \cline{2-6}
& Female & 11.9 & 19.0 & 10.3 & 13.5 \\ \cline{2-6}
& Prefer not to say & 4 & 1.7 & 4.3 & 3.4 \\ \cline{2-6}
& Non-binary & 0.6 & 0 & 0 & 0.2 \\ \hline
\multirow{6}{*}{\textbf{Age Group}} & 18 to 24 & 49.7 & 61.0 & 41.4 & 50.6 \\ \cline{2-6}
& 25 to 34 & 40.7 & 35.6 & 42.2 & 39.7 \\ \cline{2-6}
& 35 to 44 & 6.8 & 2.5 & 6.9 & 5.6 \\ \cline{2-6}
& 45 to 54 & 0 & 0 & 5.2 & 1.5 \\ \cline{2-6}
& 55 to 64 & 0 & 0.8 & 0 & 0.2 \\ \cline{2-6}
& Prefer not to say & 2.8 & 0 & 4.3 & 2.4 \\ \hline
\multirow{5}{*}{\textbf{Experience}} & 1 & 18.4 & 25.0 & 14.1 & 19.0 \\ \cline{2-6}
& 2 & 23.4 & 22.7 & 21.7 & 22.7 \\ \cline{2-6}
& 3 & 12.8 & 17.0 & 20.7 & 16.2 \\ \cline{2-6}
& 4 & 14.2 & 11.4 & 15.2 & 13.7 \\ \cline{2-6}
& 5+ & 31.2 & 23.9 & 28.3 & 28.3 \\ \hline
\multirow{3}{*}{\textbf{Minority}} & Yes & 30.2 & 41.1 & 25.5 & 32.0 \\ \cline{2-6}
& No & 64.5 & 56.2 & 70.9 & 64.0 \\ \cline{2-6}
& Rather not say & 5.2 & 2.7 & 3.6 & 4.1 \\ \hline
\end{tabular}
}
\end{table}
\subsubsection{Procedure}\label{ss:survey-proc}
We selected 5,000 individuals to contact for each of the previously discussed scenarios. For each of them, we followed the following procedure - We first selected blobs appropriate for the respective scenario and that contained more than 15 lines of code. We then identified the commits that they were contained in and removed all blobs which could not be reached in {\sc GitHub}\xspace. We proceeded to remove duplicates, sorted the commits by date, and selected the 5,000 most recent ones per scenario. Finally, we ensured that no individual would receive an invitation for more than one survey.
Before sending the surveys we piloted them with 3 individuals to ensure that they are understandable and to remove potential misspellings and other mistakes. We then sent individual invitations to the selected participants. Out of the 15,000 invitations 3,254 could not be delivered (1,036 for survey 1, 1,083 for survey 2, and 1,135 for survey 3). We received a total of 1,479 responses (558 for survey 1, 335 for survey 2, and 586 for survey 3) which amounts to a total response rate of 9.86\%. We subsequently removed incomplete responses and responses that lacked appropriateness (e.g. if someone stated that they did not contribute the commit we had attributed to them). We arrived at a total of 416 complete and useful responses (178 for survey 1, 120 for survey 2, and 118 for survey 3) thus having an effective response rate of 2.77\%.
In addition to this cleaning process, we also assessed the internal consistency of the three scales we utilized using Cronbach's alpha~\cite{tavakol2011making}. The respective values were at 0.865 for perceived usefulness, 0.841 for continuation intentions, and 0.934 for perceived ease of use which makes all scales suitable for further analysis.
The analysis was mainly based on comparing findings from the surveys related to code blobs that were reused after a hackathon (survey 1) and code blobs that were not (survey 2). We particularly compared code origins (RQ 1.c), reuse behavior by code creators (RQ 2.c), code sharing behavior (RQ 2.d), awareness about code reuse, and perceptions about the usefulness of the code (RQ 2.e). In addition, we also compared satisfaction perceptions and continuation intentions on a project level (RQ 2.a and RQ 2.b) as well as reuse of the ideas that arose from the hackathon projects (RQ 2.f). All comparisons were done on a descriptive level.
Finally, contributing to RQ 2.a, we also analyzed the perception of participants related to how easy they found using the code based on survey 3.
\section{Results}
\label{sec:results}
Here we will discuss our findings in relation to our research questions.
\subsection{Origins of hackathon code blobs (RQ1)}
\label{sec:results:rq1}
\begin{figure}[!t]
\centering
\includegraphics[width=\linewidth]{RQ1.png}%
\caption{\textbf{Plot of Who created how much of the Hackathon Code and When \\(RQ 1.a and RQ 1.b)}}
\label{fig:rq1}
\end{figure}
As mentioned in \cref{sec:rq}, our first research question focuses on several aspects related to the \textit{origin} of the hackathon code. We draw insights from both the data-driven study on hackathon projects as well as the surveys to address this research question.
\subsubsection{When are code blobs used in hackathon projects created (RQ 1.a) and who are the original authors (RQ 1.b) of the code blob?}
In terms of ``when'', we examined if the first creation of the code blob under consideration was \textit{Before, During}, or \textit{After} the corresponding hackathon event. In terms of ``who'', we checked if the first creator of the code blob was one of the members of the hackathon project (\textit{Project Member}) or someone who was a contributor to a project in which one of the members of the hackathon project contributed to as well (\textit{Co-Contributor}), or someone else (\textit{Other Author}).
The result of the analysis is presented in \cref{fig:rq1}, showing that, overall, 85.56\% of the code blobs used in the hackathon projects was created before an event. Most of these reused blobs were part of a framework/library/package used in the hackathon project, which aligns with the findings of~\cite{mockus2007large}. Around 9.14\% of the blobs were created during events, since participants need to be efficient during an event owing to the time limit~\cite{nolte2018you} which fosters reuse as previously discussed in the context of OSS~\cite{haefliger2008code}. We also found that 5.3\% of the blobs were created after an event, suggesting that most teams do not add a lot of new content to their hackathon project repositories after the event. This finding is in line with prior work on hackathon project continuation~\cite{nolte2020what}.
\hypobox{\textbf{RQ1.a}: 85.56\% of the code (in terms of the no. of blobs) in the hackathon project repositories is created before the hackathons, with around 9.14\% of the code blobs being created during the events (which is significant considering the limited duration of the hackathons).}
Figure \ref{fig:rq1} shows that, overall, the original creators of most of the code blobs (69.54\%) in the hackathon project repositories are someone who is not a part of the team. They are mostly the original creators of some project/package/framework used by the hackathon team. Around one-third (29.47\%) of the code blobs were created by the project members, and the reuse of code blobs from co-contributors in other projects is very limited (0.99\%). This aspect has not been extensively studied in the context of work on hackathons yet.
\hypobox{\textbf{RQ1.b}: The members of the hackathon teams created around 29.47\% of the code blobs, while 69.54\% of the code blobs are created by developers outside the team (mostly authors of some project/package/framework used by the team).}
\subsubsection{Where did the code come from? (RQ 1.c)}
\begin{table}[!h]
\caption{Code Origin Response from surveys of hackathon participants whose code was reused (Survey 1) and whose code wasn't reused (Survey 2)}
\label{tab:CodeOriginSurveys}
\resizebox{\textwidth}{!}{%
\begin{tabular}{@{}cccccc@{}}
\toprule
\begin{tabular}[c]{@{}c@{}}I wrote it \\ during \\ the hackathon\end{tabular} & \begin{tabular}[c]{@{}c@{}}Team members \\ wrote it \\ during \\ the hackathon\end{tabular} & \begin{tabular}[c]{@{}c@{}}From \\ the web\end{tabular} & Others & \begin{tabular}[c]{@{}c@{}}Count\\ Survey1\end{tabular} & \begin{tabular}[c]{@{}c@{}}Count\\ Survey2\end{tabular} \\ \midrule
\xmark&\xmark&\xmark&\xmark&0&0\\
\xmark&\xmark&\xmark&\cmark&22&8\\
\xmark&\xmark&\cmark&\xmark&6&0\\
\xmark&\xmark&\cmark&\cmark&0&0\\
\xmark&\cmark&\xmark&\xmark&7&6\\
\xmark&\cmark&\xmark&\cmark&0&0\\
\xmark&\cmark&\cmark&\xmark&2&0\\
\xmark&\cmark&\cmark&\cmark&2&1\\
\cmark&\xmark&\xmark&\xmark&76&60\\
\cmark&\xmark&\xmark&\cmark&6&5\\
\cmark&\xmark&\cmark&\xmark&20&12\\
\cmark&\xmark&\cmark&\cmark&4&7\\
\cmark&\cmark&\xmark&\xmark&15&11\\
\cmark&\cmark&\xmark&\cmark&3&3\\
\cmark&\cmark&\cmark&\xmark&6&4\\
\cmark&\cmark&\cmark&\cmark&9&2\\
\bottomrule
\end{tabular}
}
\end{table}
Our research question RQ 1.c focuses on the origin of code contained in the blobs under consideration in order to understand how the hackathon teams generated the code written during the hackathon. This question can only be answered by directly asking the participants, thus one of the survey questions was targeting that topic by asking about the source of the code committed during the hackathon in the hackathon repository.
By analyzing the 178 and 120 responses of that question from survey scenarios 1 and 2 respectively (since they were the hackathon participants who created the code), we found that most participants chose that they wrote the code during the hackathon, team members wrote the code during the hackathon, and/or they got the code from the web. Other options, like \textit{I reused code that I had written before the hackathon, My team members reused code they had written before the hackathon, It was generated by a tool, From other GitHub repositories} were chosen rarely. Table \ref{tab:CodeOriginSurveys} contains a summary of code origin responses from surveys of hackathon participants whose code was reused (Survey 1) and whose code wasn't reused (Survey 2). Since only 3 options were chosen most frequently, we combined all other responses in one group called ``Others'' which include all non commonly chosen options plus the free text option where participants can write something not listed in the options.
The most frequently chosen option was that they wrote the code themselves (76 (42.7\%) and 60 (50\%) exclusively for Survey 1 and 2 respectively). A number of participants combined 2 options and choose that they wrote the code during the hackathon along with getting the code from the web (20 and 12 for Survey 1 and 2 respectively), which is a common practice during hackathons. Similarly, some participants choose that they write the code during the hackathon along with team members wrote it during the hackathon which indicates teamwork and collaboration during such hackathon events. Some participants provided extra information in the free text option, specifically, 9 and 5 participants utilized the free text field in survey 1 and survey 2 respectively. Participants indicated that some code files were generated by a bot (Microsoft Bot Framework Workshop), setup files for a Flask project, a dataset for fake news competition, code file provided by the hackathon organizers, or they used/adapted examples they discovered through Google search.
\hypobox{\textbf{RQ1.c}: Most (45.6\% overall) of the hackathon participants indicated (through surveys) that they wrote the code contained in the blobs under consideration themselves during the hackathon and a number of them also indicated they found the code from the web or wrote it together with another hackathon team member.}
\subsubsection{Programming languages distribution for hackathon code with different origin (RQ 1.d)}
\begin{figure}[!ht]
\centering
\includegraphics[width=\linewidth]{rq1Time.png}%
\caption{\textbf{Top 5 languages for blobs created before, during, and after hackathons}}
\label{fig:rq1-time}
\end{figure}
\begin{figure}[!ht]
\centering
\includegraphics[width=\linewidth]{rq1Author.png}%
\caption{\textbf{Top 5 languages for blobs created by project members, co-contributors, and others}}
\label{fig:rq1-author}
\end{figure}
Looking at top languages for the blobs created at different times (\cref{fig:rq1-time}), identified by the {\sc GitHub}\xspace \textit{linguist} tool, we found that most of the code reused by hackathon projects (created before) is JavaScript, and other top languages together indicate that most of the reused code by hackathon projects are related to web development frameworks. JavaScript is also the most common language worked on during the hackathons we studied, followed by Java, Python, Swift, and C\#/Smalltalk, indicating that most hackathon projects work on developing web/mobile apps. C++ was the most common language for code developed after the event, followed by Swift and JavaScript, showing a slight shift in the type of work done after the event, favoring Machine Learning applications.
Looking at the top languages for the code created by different authors, as shown in \cref{fig:rq1-author}, we can see that, once again, most of the code created by developers not part of the hackathon team is JavaScript, which is similar to the code created before the event (\cref{fig:rq1-time}). This is not surprising, since they have a great deal of overlap (\cref{fig:rq1}). Most of the code created by project members indicates a leaning towards web/mobile app development, and most of the C++ and Python code was found to be related to Machine Learning frameworks.
We noticed that JavaScript is, by far, the most widely used language in terms of blob count. Most of the JavaScript blobs were, in fact, related to some framework and were developed by people not part of the hackathon team. One possible reason for that could be that developing web applications or designing front-end UIs is a common hackathon activity and hackathon participants often reuse standard frameworks for developing their UIs.
\hypobox{\textbf{RQ1.d}: JavaScript is the most commonly used language for code created before or during the hackathon, followed by Java and Python and the same trend is seen when looking at who created the code. Code written in the C-family of languages is also quite common and is the most commonly used language after the hackathons. }
\subsubsection{Size distribution of hackathon code blobs (RQ 1.e)}
\begin{figure}
\centering
\begin{subfigure}{.5\textwidth}
\centering
\includegraphics[width=\textwidth]{LOCTimingFlag.png}
\caption{Different Creation Time}
\label{fig:loc-timingflag}
\end{subfigure}%
\begin{subfigure}{.5\textwidth}
\centering
\includegraphics[width=\textwidth]{LOCAuthorFlag.png}
\caption{Different Author}
\label{fig:loc-authorflag}
\end{subfigure}%
\caption{\textbf{Distribution of Lines of Code for code blobs created at different times (a) and by different authors (b)}}
\label{fig:loc}
\end{figure}
\begin{table}[!h]
\caption{\textbf{Descriptive statistics of code sizes (LOC) for blobs created at different times and by different authors}}
\label{t:sigdif-RQ1}
\resizebox{\textwidth}{!}{%
\begin{tabular}{@{}lccccc@{}}
\toprule
Type & Origin & Minimum LOC & Mean LOC & Median LOC & Maximum LOC \\ \midrule
\multirow{3}{*}{Timing} & Before & 0 & 241.59 & 32 & 297,827 \\ \cmidrule(l){2-6}
& During & 0 & 208.67 & 43 & 3,665,363 \\ \cmidrule(l){2-6}
& After & 0 & 772.62 & 159 & 359,982 \\ \midrule
\multirow{3}{*}{Author} & Project Member & 0 & 565.97 & 95 & 3,665,363 \\ \cmidrule(l){2-6}
& Co-Contributer & 0 & 362.35 & 75 & 67,233 \\ \cmidrule(l){2-6}
& Other Author & 0 & 142.34 & 22 & 297,827 \\ \bottomrule
\end{tabular}%
}
\end{table}
As mentioned in section~\ref{sss:loc}, we analyzed the sizes of the hackathon code blobs by measuring the LOC (lines of code). The distributions of code sizes are shown in \cref{fig:loc}, with \cref{fig:loc-timingflag} showing the code size distributions for blobs created before, during, and after a hackathon event and \cref{fig:loc-authorflag} showing the distributions for blobs created by project members, co-contributors, and others.
The first thing we checked was if the distributions are significantly different from one another. Therefore, we conducted pairwise Mann-Whitney U tests on blobs created before, during, and after the hackathon and also on code created by project members, co-contributors, and others. The results clearly indicated that the sizes of blobs created at different times and by different authors are indeed significantly different, with the p-Values for each test being $<1e-100$.
The descriptive statistics for sizes of blobs created at different times and by different authors is presented in \cref{t:sigdif-RQ1}. It goes to show that project members tend to create more lines of code on average than the rest. Although we saw a number of large outliers in the code created during the hackathons, on average, the sizes of code blobs added after the hackathons also seem to be larger. It is worth noting, however, that we only looked at the lines of code and not, for example, the complexity of the code. For example, it could very well be the case that the code created by project members is larger because they are not optimized very well due to the time constraints of the hackathons.
One curious oddity we noticed is that the minimum LOC for blobs in every category is 0 and we further investigated those blobs. Upon examination, we found 1,150 unique blobs among the ones under study that were identified as code blobs but had 0 lines of code. However, almost all of these blobs were found to contain some commented code which led us to believe that these blobs might have been used sometime during development, e.g. for testing a feature or debugging, and were later commented out because e.g. the team didn't implement the feature or finished the debugging task.
Overall, we found the total size of code blobs created before, during, and after the hackathon to be $1,125,735,653$, $110,921,111$, and $203,786,274$ respectively. Therefore, considering the total lines of code, 78\% of code used in the hackathon projects were created before the hackathons, 8\% during the hackathons, and 14\% after the hackathons. Similarly, a total of $871,575,852$ (60.5\%) lines of code were created by the hackathon project members, $19,147,025$ (1.3\%) lines of code were created by the co-contributors, and $549,720,161$ (38.2\%) lines of code were created by other developers.
\hypobox{\textbf{RQ1.e}: Around 8\% of code is created during the hackathons in terms of the total lines of code, but around 60.5\% of the total lines of code are created by the project members. The distributions of code sizes for blobs created at different times are significantly different from one another and so are the sizes of blobs created by different authors. The sizes of blobs created after the hackathons tend to be larger on average, and project members also seem to create larger blobs than the others.}
\subsubsection{Identifying template code (RQ 1.f)}
\begin{figure}[!ht]
\centering
\includegraphics[width=\linewidth]{template.png}%
\caption{\textbf{Plot of the distribution of Template Code depending on Who created the code and When}}
\label{fig:rq1-template}
\end{figure}
Using the method described in section~\ref{sss:template} we analyzed 2,684,870 code blobs used in hackathon projects to check if they were template code blobs or not. Our heuristics rely on a blob-to-filename (\textit{b2f}) map in order to determine that and the mapping was missing for a number of blobs leading us to exclude them from our analysis. Overall, we found that 800,294 (29.8\%) blobs were identified as template code by our method.
The distribution of template code used in the hackathon projects depending on who created the code blob (a project member, a co-contributor, or other developers) and when was the code blob first added to the hackathon repository (before, during, or after the hackathon event) is shown in \cref{fig:rq1-template}.
The three subplots refer to the timing and the X-axis values in each subplot refer to the author of the code.
The percentage numbers show how much of the code is template code (or not) for each author-timing combination.
We notice that most of the code (in terms of blob count) hackathon project members write before, during, and after the event are non-template code and, conversely, most of the code created by the ``other'' developers used in the hackathon projects is actually template code. Overall, most of the code blobs added to the hackathon projects before the events is template code while the code blobs added during or after the event is mostly non-template code. This shift is even more drastic if we look at the code created by the co-contributors - while the code created by them is almost evenly divided between template and non-template code before the event, most of the code created by them that is added to the hackathon projects during or after the hackathon event are non-template code. This goes to show that the hackathon participants tend to use templates created by other developers in their projects quite often but they themselves create a very small amount of template code, which aligns with our experience about how hackathon events unfold. It is also interesting that hackathon teams do not reuse a lot of non-template code - one might assume that during the hackathons teams might try to use existing code written by other developers working on a similar problem but that doesn't seem to be true in most cases.
\hypobox{\textbf{RQ1.f}: Most of the code (blobs) created by project members is non-template code while most of the code (blobs) created by developers outside of the team tends to be template code. This trend is consistent for code blobs added to the projects before, during, or after the corresponding hackathon events.}
\subsection{Hackathon code blob reuse (RQ2)}
\label{sec:results:rq2}
As discussed in \cref{sec:rq} and section \ref{sss:rq2}, our goal while looking for hackathon code blob reuse is to understand the reuse of code blobs that were first created during a hackathon event.
\subsubsection{Comparing the characteristics of code blobs that were reused (RQ 2.a) and code blobs that weren't (RQ 2.b)}
By following the procedure outlined in Section \ref{sss:rq2}, we found that 167,781 (28.8\%) of the 581,579 hackathon code blobs got reused in other projects.
\begin{figure}[!h]
\centering
\includegraphics[width=0.8\linewidth]{SizeDistributionCodeUsage.png}%
\caption{\textbf{Size distribution of reused and not reused code blobs}}
\label{fig:sizeDist-Reused}
\end{figure}
A quick analysis into whether the shared blob is a template code blob or not revealed that, in fact, 159,286(95.5\%) of the blobs that were reused later on were not ``template'' code. In contrast, around 29.8\% of the blobs used in hackathon projects were template code. A reason for this apparent discrepancy could be that hackathon projects do not typically create template code. As also shown in \cref{fig:rq1-template}, only around 2.1\% of the code blobs we consider for RQ2 are template code. Given that figure, around 4.5\% of the blobs among the ones reused does seem to indicate that template blobs have a higher propensity of being reused. Moreover, only 7,842 (1.9\%) blobs among the 413,798 that were not reused later on were found to be template code blobs, which seems to further support the assertion.
\begin{table}[ht]
\centering
\caption{Logistic Regression model for statistically explaining code blob reuse by whether a blob is template or not}\label{t:reuse-template}
\resizebox{\textwidth}{!}{%
\begin{tabular}{rrrr}
\hline
& Estimate & Std. Error & p-Value \\
\hline
(Intercept) & -0.9355 & 0.0030 & $<2e-16$ \\
Template-\textbf{YES} & 1.0155 & 0.0159 & $<2e-16$ \\
\hline
\end{tabular}
}
\end{table}
We decided to test this assertion by using a logistic regression model where we used if a code blob was reused or not as a binary response variable and if a code blob is template code or not as a binary predictor variable. The result of which, as shown in \cref{t:reuse-template}, verifies that that template code has a higher probability of being reused.
\begin{table}[!ht]
\caption{Descriptive Statistics for Code sizes (LOC) for Hackathon blobs that were later reused and blobs that were not reused}
\label{t:rq2-loc}
\resizebox{\textwidth}{!}{%
\begin{tabular}{@{}cccll@{}}
\toprule
Type & Minimum LOC & Mean LOC & Median LOC & Maximum LOC \\ \midrule
Reused & 0 & 185.92 & 33 & 771,207 \\ \hline
Not-reused & 0 & 187.55 & 40 & 3,665,363\\\bottomrule
\end{tabular}%
}
\end{table}
Considering the total size of the blobs, the reused blobs contained a total of $31,662,234$ lines of code, which is around 29\% of the total $108,975,835$ lines of code contained in the 581,579 blobs under consideration. The size distribution for the relevant blobs that were later reused and the ones which were not reused is shown in \cref{fig:sizeDist-Reused} and the descriptive statistics for them is available in \cref{t:rq2-loc}. The blobs that were not reused were found to be, on average, larger than the ones that were reused. A Mann-Whitney U test revealed that the distribution of code sizes of blobs that were reused and blobs that were not is also significantly different (p-Value $<1e-100$).
\begin{figure}[!h]
\centering
\includegraphics[width=0.8\linewidth]{Sat-Int-boxplot.png}%
\caption{\textbf{Boxplot for Satisfactions and Intentions scale questions}}
\label{fig:satInt}
\end{figure}
Another aspect we wanted to understand is if the hackathon participants' satisfaction with the hackathon event and intention of continuing the project in the future is different depending on whether the code got reused or not. The reason we investigated these two aspects is that we thought this might have an effect on the quality of code they developed and might, consequently, affect the probability of the code being reused later on.
These aspects were investigated through the surveys we sent out. We had the participants rate five questions related to their satisfaction with the hackathon event and four questions related to their future intentions about continuing the project work on a 5-point Likert scale (full list of questions are available at \cref{tab:app:instruments:survey1} in Appendix). As discussed in \cref{ss:survey-proc}, we calculated the Cronbach’s alpha for the responses and found them to be consistent. Finally, we converted their Likert scale-based responses to numerical values and calculated the mean of responses for each participant for the questions related to satisfaction and the questions related to intention for continuation.
The resultant distribution of responses from the participants of surveys 1 and 2 is shown in \cref{fig:satInt}, with the values in the Y-axis indicating the participants' satisfaction with the hackathon (5: Very Satisfied, 1: Not at all Satisfied) and if they planned on continuing the project (5: Very likely to continue, 1: Very unlikely to continue). We noticed from \cref{fig:satInt} that while most participants were satisfied with the hackathon events they were also unlikely to continue working on the projects. Although it looked like participants from survey 1 were, overall, more satisfied with the event and were more likely to continue working on the project compared to the participants of survey 2, the difference was found to be not statistically significant using a Mann-Whitney U test.
\begin{figure}[!h]
\centering
\includegraphics[width=\linewidth]{Survey3EaseOfUse.png}%
\caption{\textbf{Ease of Use of hackathon code that was reused (N=118)}}
\label{fig:Sur3-EOU}
\end{figure}
Finally, we also wanted to get a sense of how easy it is to reuse these hackathon code blobs. This can only be done credibly if we ask someone who was not part of the original team and later reused the code. For obvious reasons, we can't test this for code that wasn't reused later on. We had a series of questions in the survey that we sent out to developers who reused some hackathon code asking them to rate its ease-of-use on a 5-point Likert scale. The result, as shown in \cref{fig:Sur3-EOU}, shows that most of the participants rated the code to be easy to use across different dimensions.
\hypobox{\textbf{RQ2.a and 2.b}: Around 28.8\% and 29\% of the hackathon code got reused in other projects in terms of the number of blobs and the total line of code respectively. The characteristics of the blobs that were reused in terms of size (LOC) and whether the code (blob) is template code or not were found to be significantly different from those that were not reused, with template code having a higher chance of being reused than non-template code. By analyzing the responses from the participants of survey 1, whose code was reused, and participants of survey 2, whose code wasn't, we found no significant difference between their satisfaction with the hackathon event or future intentions of continuing to work on the project. Participants of survey 3, who reused some hackathon code, indicated the code was easy-to-use in most cases.}
\subsubsection{Projects that reuse hackathon code (RQ 2.c)}
We further classified the projects that reused these code blobs into \textit{Small, Medium}, and \textit{Large}, as discussed in Section \ref{sss:rq2}. To recap, 89.2\% of the projects that reused the hackathon code blobs were classified as \textit{Small}, 8.5\% were \textit{Medium}, and 2.3\% were classified as \textit{Large} projects. By investigating the blobs reused by these projects we found that, unsurprisingly, there are a number of instances where a blob was reused in projects of different categories. However, such cases were found to be quite rare, in fact, only 8.85\% of reused blobs got reused in more than one project. By looking at the size of the projects a blob was reused in, we found that over half (57.73\%) of the blobs are only reused in other \textit{Small} projects, around one-third (32.85\%) are reused in \textit{Medium} projects, and less than a tenth (9.42\%) are reused in \textit{Large} projects.
\begin{figure}[!t]
\centering
\includegraphics[width=\linewidth]{rq2Usage.png}%
\caption{\textbf{Top 5 Languages for the reused code blobs in different projects}}
\label{fig:rq2-lang}
\end{figure}
The top-5 languages for the blobs reused by various projects are shown in \cref{fig:rq2-lang}. As we can see JavaScript still remains the most common, and Python, C/C++, C\#/Smalltalk, Java were among the top ones as well. While most reused blobs are related to web/mobile apps/frameworks, we also found the relatively uncommon Gherkin being the second most common language for \textit{Medium} projects, and the \textit{Small} projects reused a lot of blobs related to D/DTrace/Makefile.
\begin{figure}[!t]
\centering
\includegraphics[width=\linewidth]{RQ2-time.png}%
\caption{\textbf{Weekly hackathon code blob reuse in projects of different categories over the period of 2 Years}}
\label{fig:rq2-time}
\end{figure}
We were interested in exploring the temporal dynamics of code blob reuse as well. Therefore, we looked at the reuse of hackathon code blobs over time for the duration of two years (104.3 weeks) after the corresponding hackathon event ended. The result of that analysis is shown in \cref{fig:rq2-time}, which shows the \textit{weekly} hackathon code blob reuse for 2 years after the end of the corresponding hackathon event, with the fraction of the total number of hackathon code blobs (581,579) reused per week on the Y-axis.
As we can see from this plot, while overall 28.8\% of the hackathon code blobs were reused, over the span of a single week, no more than 0.8\% of the blobs got reused. This finding is in line with prior work on hackathon project continuation (e.g. Nolte et al.~\cite{nolte2020what} found that continuation activity drops quickly within one week after a hackathon before reaching a stable state) within the same repository that the team used during the hackathons. A clear trend of the code blob reuse dropping and then saturating after some time is visible, which is significant because it indicates that the \textit{code created in the hackathon events continue to bear some value even after 2 years} have passed after the event. For code blob reuse in \textit{Small} projects, the knee point comes after around 10-15 weeks, while for the \textit{Medium} and \textit{Large} projects, it comes much earlier, in around a month. It is also a bit surprising to see code blob reuse peaking so soon after the event, but this could be due to the participants of the event putting/influencing people they know to put the code blobs they think are valuable to some other project where they think it might be of use. It might also be because, the chances of a code file being modified increases with time, which results in the SHA1 value being changes, effectively giving rise to a new blob. This distinction has not been studied in prior work on hackathon code.
\hypobox{\textbf{RQ2.c}: Out of the reused hackathon code blobs 57.73\% were used in \textit{Small} projects, 32.85\% in \textit{Medium} projects, and 9.42\% in \textit{Large} projects. Most of the reused blobs were related to web/mobile apps/frameworks. The temporal dynamics of code blob reuse show a clear trend of it reducing over time, and then saturating to a stable value.}
\subsubsection{Do the hackathon code creators foster reuse? (RQ 2.d)}
\begin{figure}
\centering
\includegraphics[width=0.75\linewidth]{RQ2f.png}%
\caption{\textbf{If the code creators reused the code contained in this file after the hackathon}}
\label{fig:rq2d2}
\end{figure}
\begin{figure}[!ht]
\centering
\includegraphics[width=0.75\linewidth]{RQ2d.png}%
\caption{\textbf{If/where did the code creators share the code contained in this file after the hackathon}}
\label{fig:rq2d}
\end{figure}
In order to investigate whether the hackathon project members who created a piece of code took any steps to foster its reuse, we focused on two specific aspects - if they themselves reused the code (blob) elsewhere and if they took any steps for sharing the code~\footnote{Although the participants did share their code on GitHub during the hackathons (that is how we found the code), that is not the focus here. We asked the developers: ``What if anything did you do to share the code contained in this file \textbf{after} the hackathon?'' (see ~\cref{sec:app:instruments} for further details) and based on the result from the pilot study, the intent of the question should be clear to the participants that we are not talking about sharing the code in {\sc GitHub}\xspace but focusing on if they did something extra after the event rather than just having the repository publicly available.
}. We gathered the responses from survey scenarios 1 and 2 where these two questions were asked to the participants.
Looking at whether the code creators reused the code (blob) themselves (\cref{fig:rq2d2}), we notice that most of the participants did not reuse the code or do not recall whether or not they reused the code though more participants from survey 2 (whose code was not reused as per our collected data) chose the former option. We did notice that a few participants said they reused the code at a different hackathon/at work/at school/in another project and more participants from survey 1 (whose code was reused as per our analysis) indicated that they reused the code. It is worth noting however that some participants from the survey indicated that they reused the code but our analysis indicated that their code wasn't reused. The reason for this discrepancy could be that the code was modified and reused or was not shared openly in GitHub, both of which our analysis does not cover. This aspect is discussed in further detail in \cref{s:limitation}.
In terms of whether the participants shared the code (blob) with others or not (\cref{fig:rq2d}), we see a clear majority of them said they did not share the code though the number is a bit higher for participants of survey 2. Some participants, however, indicated that they shared it with friends/colleagues or online, most of whom were participants from survey 1.
\begin{table}[ht]
\centering
\caption{Logistic Regression model for statistically explaining code blob reuse by if the authors foster code blob reuse by reusing/sharing the code }\label{t:reuse-authorfoster}
\resizebox{\textwidth}{!}{%
\begin{tabular}{rrrr|rrrr}
\multicolumn{4}{c|}{Code authors reusing the code themselves} & \multicolumn{4}{c}{Code authors sharing the code} \\ \hline
& Estimate & Std. Error & p-Value & & Estimate & Std. Error & p-Value \\ \hline
\cellcolor[HTML]{FE0000}Did not reuse & \cellcolor[HTML]{FE0000}-0.06 & \cellcolor[HTML]{FE0000}0.06 & \cellcolor[HTML]{FE0000}0.07 & shared:NO & -0.31 & 0.04 & 2.7e-9 \\
\cellcolor[HTML]{FE0000}Do not recall & \cellcolor[HTML]{FE0000}-0.16 & \cellcolor[HTML]{FE0000}0.06 & \cellcolor[HTML]{FE0000}0.95 & & & & \\ \hline
\end{tabular}%
}
\end{table}
In order to get a more definitive picture of whether or not the authors' actions on fostering code reuse has a significant impact on the code blobs being reused, we ran two separate logistic regression models in order to control for the other variables. For ease of interpretation, we grouped the answers for whether the authors reused the code themselves into 3 groups - ``Reused'', ``Did not reuse'', and ``Do not recall'', and the answers for if they shared the code after the hackathon into two groups - ``shared:YES'' and ``shared:NO'' by congregating the appropriate responses.
The results, as shown in~\cref{t:reuse-authorfoster}, highlight that whether the authors' reused the code themselves does not have a significant effect on actual code blob reuse (the ``Reused'' category was the reference category for this situation so it was removed from the results~\footnote{This might need some clarification for the readers not familiar with the underlying statistics. For a categorical variable with multiple categories, most solvers make dummy variables under the hood, choosing one of the categories, usually the first one, as a reference category. The question of the significance is therefore effectively transformed from ``Is there a significant effect of this independent variable on this dependent variable?'' to ``Is there a significant effect of instances belonging to this category compared to instances belonging to the reference category on the dependent variable?''. For binary variables this would be practically identical to the original question, but for variables with more levels/categories, it needs some pondering to properly interpret the result. An example: Imagine the case where you are measuring the amount of sugar in three colors of apples: red, green, and yellow. Let’s say red is the reference level, so you have two dummy variables: one for green and one for yellow. The question then becomes: ``Is there an effect of green apples relative to red apples on sugar? And how about yellow apples relative to red?''\label{fn:stat} }), but whether they shared the code after or not does. This is an important insight, showing the importance of getting the code out to others for fostering the reuse of code.
\hypobox{\textbf{RQ2.d}: Although most participants of surveys 1 and 2 indicated they did not share or reuse the code, participants from survey 1, whose code we found was reused, did reuse/share the code more often than participants of survey 2. Moreover, the authors' sharing of the code after the hackathon seem to have a significant effect on whether the code blob was reused or not.}
\subsubsection{Are the hackathon code creators aware of their code being reused/feel that their code might be useful to others? (RQ 2.e)}
\begin{figure}[!ht]
\centering
\includegraphics[width=0.75\linewidth]{RQ2e.png}%
\caption{\textbf{Awareness of others reusing the code}}
\label{fig:rq2e-a}
\end{figure}
\begin{figure}
\centering
\includegraphics[width=0.75\linewidth]{RQ2e_b.png}%
\caption{\textbf{For whom would the code be useful?}}
\label{fig:rq2e-b}
\end{figure}
When we asked the participants of surveys 1 and 2 about whether they are aware that their code is being reused or not, most of them indicated (\cref{fig:rq2e-a}) that they are not aware of it, with more participants from the survey 2 choosing this option. Very few (around 15\%) participants from survey 1, whose code was reused as per our analysis, indicated they know about the reuse, and even fewer (around 5\%) participants from survey 2 chose this option. The reason why we did not capture the reuse indicated by the participants of survey 2 could be the same as what we discussed for the last question.
When asked who the participants think their code might be useful for (\cref{fig:rq2e-b}), most participants said it would only be useful for their project/team. The percentage values in \cref{fig:rq2e-b} sum up to over 100\% because this was a multiple-answer question. Here we notice a very clear distinction between the responses from participants of surveys 1 and 2. Respondents of survey 2 chose that the code would only be useful for them or their team/project much more often than those of survey 1. In contrast, participants from survey 1 chose that the code would be useful for other people as well more often than participants from survey 2, though they also expressed uncertainty about the usefulness of the code or thought it won't be of use for anyone more often. However, the overall result leads us to believe that there is something about the nature of some pieces of code that makes them more likely to be useful for others and, consequently, be reused more often, and at least some of the respondents, whether consciously or subconsciously, are aware of that.
\begin{table}[ht]
\centering
\caption{Logistic Regression model for statistically explaining code blob reuse by the authors' awareness of reuse and feeling about the usefulness of the code}\label{t:reuse-authoraware}
\resizebox{\textwidth}{!}{%
\begin{tabular}{llll|rrrr}
\multicolumn{4}{p{5cm}|}{Code authors' awareness of code reuse} & \multicolumn{4}{p{5cm}}{Who the authors think the code might be useful for} \\ \hline
\multicolumn{1}{r}{} & \multicolumn{1}{r}{Estimate} & \multicolumn{1}{r}{Std. Error} & \multicolumn{1}{r|}{p-Value} & & Estimate & Std. Error & p-Value \\ \hline
\rowcolor[HTML]{FE0000}
aware:YES & 0.04 & 0.12 & 0.27 & \cellcolor[HTML]{FE0000}MeOnly & \cellcolor[HTML]{FE0000}-0.17 & \cellcolor[HTML]{FE0000}0.09 & \cellcolor[HTML]{FE0000}0.07 \\
& & & & OurTeam & -0.17 & 0.07 & 0.01 \\
& & & & SmallGroupOutside & 0.15 & 0.06 & 0.02 \\
& & & & \cellcolor[HTML]{FE0000}ManyOutsiders & \cellcolor[HTML]{FE0000}0.16 & \cellcolor[HTML]{FE0000}0.09 & \cellcolor[HTML]{FE0000}0.08 \\
& & & & \cellcolor[HTML]{FE0000}NotSure & \cellcolor[HTML]{FE0000}0.14 & \cellcolor[HTML]{FE0000}0.10 & \cellcolor[HTML]{FE0000}0.16 \\
& & & & \cellcolor[HTML]{FE0000}Other & \cellcolor[HTML]{FE0000}0.30 & \cellcolor[HTML]{FE0000}0.12 & \cellcolor[HTML]{FE0000}0.12 \\ \hline
\end{tabular}%
}
\end{table}
In order to gauge the significance of the effects of these two variables on code reuse, we once again ran two separate logistic regression models in order to control for the other variables. Similar to what we did for \textbf{RQ2.d}, we grouped the answers for if the authors are aware of reuse into two groups: ``aware:Yes'' and ``aware:NO'' by congregating the relevant responses. However, we decided to keep the original categories for who the authors think the code might be useful for because we believed aggregating responses in this case would lead to a significant loss of information.
The results, as shown in~\cref{t:reuse-authoraware}, showed that the authors' awareness is not significantly associated with code blob reuse, which is not too surprising. For the question of usefulness of the code, the interpretation is slightly less straightforward, as explained in footnote ~\ref{fn:stat}. It effectively shows that participants who chose that their code would be useful for a few outsiders (small group of people outside of the hackathon project/team) and those who chose that their code would only be useful for their team had significant difference in getting their code blobs reused compared to those who chose that their code would not be useful for anyone with the former having a higher chance of being reused and the latter having a lower chance, while for rest of the participants there was no significant difference.
\hypobox{\textbf{RQ2.e}: Most participants of hackathons were not aware of their code being reused and most felt that their code is useful only for their team/project. However, participants from survey 1 more often indicated that they know of their code being reused and more commonly felt that their code might be useful to others. The authors' awareness of code reuse did not have a significant impact on actual code blob reuse, and participants who chose that their code would be useful for a few outsiders and those who chose that their code would only be useful for their team had significant difference in getting their code blobs reused compared to those who chose that their code would not be useful for anyone, while for rest of the participants there was no significant difference.}
\subsubsection{Do the ideas in hackathon projects get reused? (RQ 2.f)}
\begin{table}[!ht]
\caption{\textbf{Survey 1 and 2 responses for if the participants reused the ideas that arose from the hackathon} }
\label{tab:rq2f}
\resizebox{\textwidth}{!}{%
\begin{tabular}{|c|cc|cc|}
\hline
\multirow{2}{*}{} & \multicolumn{2}{c|}{Survey 1} & \multicolumn{2}{c|}{Survey 2} \\ \cline{2-5}
& \multicolumn{1}{c|}{Count} & \begin{tabular}[c]{@{}c@{}}Percentage\end{tabular} & \multicolumn{1}{c|}{Count} & \begin{tabular}[c]{@{}c@{}}Percentage\end{tabular} \\ \hline
Yes & \multicolumn{1}{c|}{57} & 32.2\% & \multicolumn{1}{c|}{34} & 28.6\% \\ \hline
No & \multicolumn{1}{c|}{80} & 45.2\% & \multicolumn{1}{c|}{60} & 50.4\% \\ \hline
Not Sure & \multicolumn{1}{c|}{40} & 22.6\% & \multicolumn{1}{c|}{25} & 21\% \\ \hline
\end{tabular}
}
\end{table}
We also decided to examine whether or not the ideas that arose from a particular hackathon were reused or not in an effort to understand the legacy/continued effect a hackathon might have. The result, as presented in~\cref{tab:rq2f}, indicates that around a third of the participants from survey 1 and slightly fewer participants from survey 2 recall an instance where they reused the ideas. Once again, we notice that more participants from survey 2 indicate they do not recall such an instance, so there could be something in the nature of the project/code the participants wrote that somehow makes a hackathon more/less likely to be useful in the future.
\hypobox{\textbf{RQ2.f}: Around a third of the participants from survey 1 recalled an instance when they reused some ideas from the hackathon and, overall, they recalled such an instance more often than participants from survey 2.}
\subsection{Characteristics affecting code blob reuse (RQ3)}
\label{sec:results:rq3}
Our third and final Research Question was about identifying what project characteristics affect (i.e., can be used to explain) code blob reuse and we formed four hypotheses about what factors might be affecting it, which were presented in \cref{sec:rq}. Using the procedure outlined in Section \ref{sss:rq3-data}, we gathered the variables of interest related to the hypotheses, as presented in \cref{t:variables}. As discussed in Section \ref{sss:rq3-analysis}, we decided to use Generalized Additive Models (GAM) to identify the variables that have a significant impact on code blob reuse.
Since we presumed the variables related to \textbf{H1}, \textbf{H2}, and \textbf{H4} would have a linear effect on the probability of code blob reuse for a project, we kept them as linear terms in the model. The variables related to \textbf{H3} were presumed to have a non-linear effect, so they were used as non-linear terms in the model. The formula we used for invoking the GAM model was:\\
\textit{
Y $\sim$ no.Participant + is.colocated + no.Technology + Before + During + LicenseType + s(pctProse) + s(pctData) + s(pctCode) + s(pctMarkup)}
\begin{table}[t]
\caption{Effect of Project Characteristics on Hackathon Code Reuse - Results from the Generalized Additive Model.\\
\textbf{Part A.} showing the results for the \textit{linear} terms, with the associated Estimate, Standard Error, and p-Values.\\
\textbf{Part B.} shows the results for the \textit{non-linear} terms, with the Effective Degrees of Freedom -- ``edf'' -- a measure of the degree of non-linearity, the p-Values, and the partial effects of each variable on the response ( 0: No Effect, Positive Values: Positive effects, Negative Values: Negative Effects).\\
The ``pctData'' variable, found to be ``not significant'', is shown in RED, and the corresponding effect plot is omitted}
\label{t:rq3}
\resizebox{\linewidth}{!}{%
\begin{tabular}{@{}p{4cm}llc@{}}
\toprule
\textbf{A. Linear Variables (Hypothesis)} & \textbf{Estimate} & \textbf{Std. Error} & \textbf{p-value} \\ \midrule
no.Participant (H1) & 0.2040 & 0.0181 & $<$ 0.0001 \\
is.colocated-\textbf{TRUE} (H1) & 0.2448 & 0.1018 & 0.0162 \\
no.Technology (H2) & 0.0258 & 0.0059 & $<$ 0.0001 \\
Before (H2) & 0.0001 & 0.0000 & $<$ 0.0001 \\
During (H2) & 0.0028 & 0.0004 & $<$ 0.0001 \\
LicenseType-\textbf{OSSLICENSE} (H4) & 0.1248 & 0.0522 & 0.0168 \\
\cellcolor[HTML]{FF8888}LicenseType-\textbf{Other} (H4) & \cellcolor[HTML]{FF8888}-0.0652 & \cellcolor[HTML]{FF8888}0.0666 & \cellcolor[HTML]{FF8888}0.3273 \\\midrule\midrule
\textbf{B. Non-Linear Variables (Hypothesis) } & \textbf{edf} & \textbf{p-value} & \textbf{Partial Effect Plot} \\\midrule
pctProse (H3) & 3.698 & 0.0438 & \includegraphics[width=3.5cm]{prose.png} \\\hline
\cellcolor[HTML]{FF8888}pctData (H3) & \cellcolor[HTML]{FF8888}3.716 & \cellcolor[HTML]{FF8888}0.2761 & \cellcolor[HTML]{FF8888} \\\hline
pctCode (H3) & 3.547 & 0.0351 & \includegraphics[width=3.5cm]{code.png} \\\hline
pctMarkup (H3) & 6.779 & $<$0.0001 & \includegraphics[width=3.5cm]{markup.png} \\ \bottomrule
\end{tabular}%
}
\end{table}
The result of the analysis is presented in \cref{t:rq3}, which shows that all of the variables related to hypotheses \textbf{H1} and \textbf{H2}, which we assumed would affect code blob reuse, were indeed significant. The effect direction, communicated by the signs of the estimates for the corresponding variables match the rationale we presented in \cref{sec:rq}. These findings are partially in line with prior work on hackathon project continuation in that complex projects for which hackathon participants have prepared prior to the hackathon showed increased continuation activity~\cite{nolte2020what}. In that study, the team size was however negatively related to project continuation while for the study in this paper we found the reverse to be true for code blob reuse. One possible explanation for this discrepancy can be related to larger teams having more opportunities and wider networks to spread the news about their project~\cite{nolte2018you}.
In terms of the usage permission (\textbf{H4}), we found that hackathon projects with an OSS license had a higher chance of having their code blobs reused and the effect was found to be statistically significant as well. However, the effect of a hackathon project having a license of type ``Other'' was statistically insignificant. Regression models do not show the results for all levels for categorical variables like \textit{LicenseType}, but we verified that the effect of a hackathon project not having a license (\textit{NOLICENSE}) was also statistically insignificant by varying the level order of the \textit{LicenseType} variable in another regression model.
As for the variables related to \textbf{H3}, the ``pctData'' (see \cref{t:variables} for definition) variable was found to be not significant, but the other three variables were. Since the effects of these variables were non-linear in the model, we decided to observe their partial effect plots, which shows the relationship between the two plotted variables (an outcome and an explanatory variable) while adjusting for interference from other explanatory variables~\cite{pplot}. As demonstrated by the partial effect plots, and the effective degrees of freedom associated with each of these variables, each of them actually have a non-linear effect on the response variable.
Let's take a closer look at the effects of the three significant variables related to \textbf{H3}. For ``pctProse'', which refers mostly to documentation files (e.g. Markdown, Text, etc.), we see that having some documentation is good, however, projects which have around half its total content as documentations are not likely to have their code blobs reused. However, rather surprisingly, we see that projects with almost all of their content as documentation are more likely to have their code blobs reused. On closer inspection, we found that these are quite large projects with a lot of data stored in their corresponding repositories in the form of text or other files (An example of such a project is \url{https://github.com/sreejank/PoliClass}). Therefore, though most of them have a good amount of code, by volume, it appears that it is almost all made up of files of type ``Prose'', which causes this predictor to show positive values for projects very high amount of ``Prose'' files. Such projects however are common in particular in civic and scientific hackathons where participants often develop projects that are related to utilizing specific datasets (e.g.~\cite{nolte2020support,trainer2016hackathon,busby2016closing}). Our finding thus can potentially point to a specific use case that is beneficial for code blob reuse after an event has ended.
On closer inspection of the variable ``pctCode'', we realized that it refers to how much of the total content in a repository is of type ``code'', not the absolute number of code blobs, therefore, having a more balanced repository with a good mix of other types of files signal that it is of higher quality, thus increasing the chance of code blob reuse. This is somewhat expected since for code blobs to be reused it is beneficial to have accompanying documentation as well as use cases (data). As we can observe, projects with over 60\% of their content related to code take a big hit when it comes to their code blobs getting reused. This finding can potentially be due to hackathon teams only having a finite amount of time during an event to actually develop code and the more the code they develop the more likely it is that they do not have time to ``polish" it for reuse.
The behavior of the ``pctMarkup'' variable is more complex than the rest (it also has a higher \textit{edf} value), so it is hard to summarize the interaction without a detailed inspection on a larger dataset, however, it looks like having up to around 60\% markup content (e.g. HTML, CSS, LaTeX, etc.) can lead to a higher propensity of code blob reuse.
\hypobox{\textbf{Characteristics affecting Code Reuse (RQ3):} The hypotheses presented in \cref{sec:rq} were found to hold. All of the variables related to \textbf{H1} and \textbf{H2} were significant and had effects as anticipated. Examining \textbf{H4} revealed that having an OSS license associated with the hackathon project increased the chance of code blob reuse. The effect of the variables related to \textbf{H3} were more complex, which led to additional insights about hackathon code blob reuse.}
\section{Discussion}
\label{sec:impl}
Our study reveals the origin story of the code blobs used in hackathon projects in terms of where the code blobs came from, who were the original creators, when it was first created, what are its characteristics in terms of size and programming language, and whether it can be considered a ``template code" or not.
Before discussing the results and their implications in further detail, we would like to re-emphasize the scope of our study. As mentioned earlier, we are looking at the reuse of code blobs, i.e., when code files are used ``as-is'' without any modifications. This essentially means any type of ``copy-modify-reuse'' scenarios are excluded from our consideration. However, the reuse of code blobs can also be a result of a few different scenarios and an understanding of such scenarios might be useful in better defining the context of our findings. First of all, reusing may be done at the level of complete, ``ready-to-reuse'' components, which would include the ``template code'' we described here.
The ``template code'' components are generally meant to be reused and such reuse is captured by our study. However, the best practice in reusing a lot of other reusable components usually is to copy the code only in the compilation / deployment directory, not in the source code repository. Therefore, such cases (where the best practices were followed) not captured by the study (both in code reused in hackathons, and in code reused from hackathons which happen to produce ``ready-to-use'' components). But not everybody follows good practices, and repositories can be found with, for example, all dependencies copied to the repository, in which case, our study should capture those.
The second code reuse scenario is when the code that is generally not a ``ready-to-use'' component is copied from one repository and reused in another one, which is not uncommon for OSS development. In this case, our study captures the instances where the code is copied and reused without any modification (even when the file names are different). However, cases where only snippets of code were reused or where the code is reused with any modification would not captured by our study.
We found that of all of the code in the hackathon repositories we investigated, only 9.14\% were created during the hackathon by the number of blobs. The number drops to 8\% if we look at the number of lines of code created. However, it is worth noting that, typically, widely-used frameworks like Django, Rails, jQuery, etc have decades of development history and a large number of contributors. Thus, around 9.14\% of the blobs or 8\% of the lines of code being created during the short duration of hackathon events (72 hours per our assumption) by teams of around 2-3 members (up to a maximum of 10 members --- see \cref{t:variables}), is indeed significant and it highlights the importance of hackathons in generating new code.
The importance of contributions of the hackathon project members in creating/contributing code to the hackathon project repositories was also established by our analysis.
If we consider the code blobs created during and after the hackathon event, as shown by the combined picture in \cref{fig:rq1}, which are the main contributions of the hackathons in terms of code creation, we see that most of that code blobs (97\% for those created during the event, and 93\% for those created after the event) were actually created by the project members. Moreover, we also find that the project members often reuse the code (blobs) they had written earlier in their projects, 15.67\% of all the code blobs belongs to this category. This finding is in line with prior work on hackathon projects in that teams often prepare their projects e.g. by setting up a repository~\cite{nolte2020what} and/or making (detailed) plans on what they want to achieve during an event~\cite{nolte2018you}. If we look at the total lines of code, we see that around 60.5\% of the lines of code in the hackathon repositories were actually contributed to by the project members. Overall, this analysis highlights the effort the hackathon project members put into their projects.
However, in spite of all the effort that goes into developing code for the hackathon projects, hackathons are mostly perceived as one-off events. As we observed from the responses of our surveys, most of the participants of surveys 1 and 2, who were participants in some hackathon in the past as well, indicated that they have little intention of continuing to work on the project even though they were generally satisfied with it (\cref{fig:satInt}). Although a few of the participants later reused the code (\cref{fig:rq2d}) or the ideas from the hackathon (\cref{tab:rq2f}) or even shared some of the code they had created with others/online (\cref{fig:rq2d2}), majority of them did not. All of this seems to indicate that most of the participants do consider hackathons as one-off events and take a ``do it once and forget about it'' approach.
But what about the evidence? Well, the data seem to suggest that around 29\% of the code created during the hackathons, both by the number of blobs and the lines of code, do get shared and around one-tenth of it gets shared in relatively large OSS projects. A number of participants also indicate that they think their code might be useful for others besides their own project (\cref{fig:rq2e-b}). Thus, the evidence seems to indicate that some of the hackathon events can and do have a lasting impact (as we can see from \cref{fig:rq2-time}, reuse of some of the hackathon blobs continue to happen even after 2 years). It is also worth noting that most of the hackathon participants whose code got reused indicated that they were not aware of the reuse (\cref{fig:rq2e-a}), likely for the obvious reason that reuse of open source code is notoriously hard to track without access to a specialized tool like {\sc World of Code}\xspace. Would the participants have felt otherwise about the impact of the work they did during the hackathons if they become aware that their work might be reused? Unfortunately, we do have an answer to that question yet, but it might be worth investigating in the future.
However, the question we do have an answer to is what factors might be affecting code blob reuse and this finding does have some implications for the hackathon project organizers and the participants alike. They can serve as valuable guidance for scientific and other communities that aim to organize hackathons for expanding their existing code base. Organizers could suggest participating teams attempt projects that do not require developing a large amount of code and rather focus on a specific use case e.g. related to an existing data set. Moreover, they should suggest teams also spend time on not only developing code but also providing additional materials and documentation, and also for the teams to reuse code from their existing projects rather than attempting to develop a lot of original code. This approach can in turn improve efficiency and foster code reuse after an event has ended. The importance of adding an Open Source license was also demonstrated by our analysis, so it might be useful for the participants to add a license to their repository where possible or for the organizers to encourage such a practice.
With respect to research, our findings provide an initial account of how code (with a particular emphasis on code blobs) gets reused and created during a hackathon as well as whether and where it gets reused afterwards. Moreover, they indicate that hackathon code indeed gets reused and that hackathons can thus be more than one-off coding events.
\section{Limitations and Threats to Validity}
\label{s:limitation}
For our study, we tracked the code generation and usage on a blob level - represented in {\sc World of Code}\xspace by the SHA1 hash value of each blob - which means that we focused only on exact code reuse since any changes in the file contents would lead to a change in the blob SHA1 value that we used to identify each blob. However, it is quite common to make minor changes in a code file while using it in a different context, and that aspect is not captured in our study, nor can we capture the reuse of code snippets.
The {\sc Devpost}\xspace dataset does not include the start date of the hackathon events but it is essential information needed to answer our research questions. We assumed the duration of the hackathons to be 72 hours based on existing literature and a manual investigation of 73 randomly selected hackathons 71 of which lasted up to 3 days. However, that might not have been the case for all of the events we studied which may affect the results of RQ1 and RQ3.
We relied on the {\sc GitHub}\xspace Linguist tool to categorize files and we only focused on files with type ``Programming", however, the categorization is not infallible, e.g. the type ``Markup" contains HTML and CSS files which could be considered code instead of documentation.
Our license collection and analysis is conducted based on the whole project license used in {\sc GitHub}\xspace. However, license information can be included in the files themselves which can be different from the project license, which would mean it would be perfectly clear in certain cases that the file can be reused, even if there is no LICENSE file. Such cases were not captured in our analysis.
We conducted our analysis solely based on the publicly available data. This might sometimes create an issue in the result in terms of the fact that a blob might first be introduced in a private repository and later reused in a hackathon project. However, due to our limitation, we could count this blob as first being created in the hackathon project, which would impact our final results.
While analyzing the results, we used the number of lines of code (LOC) as a measure of code size, which is one of the commonly used measures. However, there might be other ways of measuring code size which we did not consider. Our method of detecting whether a code is ``template code'' i.e. part of some standard library/framework/boilerplate code is based on three simple heuristics. Although we tested the proposed rules with a small-scale ad-hoc test, it is very likely that the proposed method is not entirely accurate and we might have misclassified a number of blobs as a result.
There are also inherent limitations related to the surveys we conducted in addition to the quantitative analysis. First the responses we received reflect a somewhat special sample of participants (those willing to fill a survey) and may differ from the opinions of other participants and may thus be systematically biased. Second, the survey questions are mostly subjective and may have been understood differently from what we have intended. Third, we relied on large parts of the survey on participants selecting options from a list that we compiled. While we made a founded selection of options and provided the possibility to add other options, there might still be other options that the participants thought of but did not mention. Fourth, there is a time difference between the participation of individuals in hackathons or individuals reusing code and taking our survey. We attempted to mitigate this effect by focusing on the most recent hackathons and commits but perceptions still might have changed e.g. between the time a hackathon took place and a participant of that hackathon taking the survey. Fifth, there might be other aspects that affect code reuse that was not in the focus of our survey. Sixth, in selecting the participants we had to focus on individual hackathons, and more precisely, on individual commits. It could be possible that a developer whose one blob was reused after a hackathon might be someone whose code doesn't usually get reused, or vice-versa.
Finally, in our study we only considered hackathon projects, thus, our findings may not be generalizable to other types of software projects and repositories. Furthermore, our results are solely based on an observational study, not causal analysis, and the results should be interpreted as such.
\section{Conclusion and Future Work}
In this study, we investigated the origins of hackathon code (with a particular emphasis on code blobs) and its reuse after an event. We found that most hackathon projects reuse existing code (blobs) and that code (blobs) created during the events also gets reused by other OSS projects later on. Our study also revealed a number of project characteristics that might affect code blob reuse. The majority of the participants from the surveys we conducted indicated that they mostly view hackathons as one-off events and do not do much to foster reuse of the code they created. However, some of them felt that their code might be useful for other people beyond their own project members.
In summary, our findings agree with most earlier studies and indicate that most of the participants do see hackathons as one-off events. At the same time, it shows some of the hackathon code blobs do get reused, sometimes even after 2 years after the event, reiterating the actual impact of hackathon events, simultaneously providing an account of code blob reuse in Open Source Software.
There are several ways to extend this research, e.g. considering code clones/ snippets while looking for code reuse (e.g. by looking at the associated CTAG tokens - a dataset available in {\sc World of Code}\xspace), identifying other factors that affect code reuse, including code quality~\cite{dey2018usageQuality,Dey2020qualityEMSE,dey2020modeling}, project popularity~\cite{dey2019patterns}, the developers' mastery on the project topics~\cite{dey2021representation}, the supply chain of a particular software~\cite{dey2018dependency,amreen2019methodology} etc., and if copying code might have any effect on a developer's pull request being accepted~\cite{dey2020effect}. Looking deeper into the code created during the hackathons, it might also be interesting to see to what extent the teams use bots~\cite{dey2020botdetection,dey2020botse} which might aid in the understanding of hackathon code reuse as well.
We hope that further studies will explore these and other related topics, and give us a clearer understanding of the impact of hackathons and code reuse.
\begin{acknowledgements}
The work was supported, in part, by Science Foundation Ireland grant 13/RC/2094\_P2 and by NSF awards 1633437, 1901102, and 1925615.
\end{acknowledgements}
\bibliographystyle{spbasic}
|
\section{Introduction}
\label{Sec-1}
Multiple hypothesis testing has been a popular topic in statistical research; it has wide applications in many scientific areas, such as biology, medicine, genetics, neuroscience, and finance. Consider a multiple testing problem where we need to test $p$ hypotheses simultaneously; denote by $p_0$ and $p_1$ the number of true null and false null hypotheses respectively. The testing outcomes can be summarized in Table \ref{Table-1},
\begin{table}[h]
\caption{Summary of possible outcomes from multiple hypothesis testing}
\begin{center}
\begin{tabular}{l|cc|c} \hline
& Not rejected & Rejected & Total \\ \hline
True Null & $U$ & $V$ & $p_0$ \\
False Null & $T$ & $S$ & $p_1$ \\ \hline
Total & $p - R$ & $R$ & $p$ \\ \hline
\end{tabular}
\end{center}
\label{Table-1}
\end{table}
where $V$ and $R$ denote the number of hypotheses that are wrongly rejected (i.e., the number of type I errors made) and rejected (i.e., the number of rejections made) out of the $p$ hypotheses, respectively.
Conventional methods propose to control the familywise error rate (FWER): $\text{FWER} = P(V > 0)$ \citep{bonferroni1936teoria, vsidak1967rectangular, holm1979simple, simes1986improved, holland1987improved, hochberg1988sharper, rom1990sequentially}, or the generalized familywise error rate (gFWER): $\text{gFWER} = P(V > k), \text{ for } k \ge 1$ \citep{dudoit2004multiple, pollard2004choice, lehmann2012generalizations}. These methods control the probability of zero or a limited number of false positives, therefore they are usually conservative, especially when the number of hypotheses $p$ is large. We observe that large $p$ is common in practice. For example, in a genome-wide association study, hundreds of thousands or even millions of single nucleotide polymorphisms (SNPs) of each subject and the associated disease status are measured. It is of interest to find which SNPs are associated with the disease status. A common approach is to conduct a hypothesis test for each SNP; this results in a huge number of hypothesis tests.
When $p$ is large, FDP and its statistical characteristics have been introduced. False discovery rate (FDR) has been the most popularly studied; it was introduced by \citet{benjamini1995controlling} and was proven to be a reasonable criterion; in particular,
\begin{equation*}
\mathrm{FDP} = \frac{V}{R}, \qquad \mathrm{FDR} = E(\mathrm{FDP}),
\end{equation*}
where $\mathrm{FDP} = \mathrm{FDR} = 0$ if $R = 0$. A list of FDR research can be found in \citet{benjamini1995controlling}, \citet{benjamini2001control}, \citet{storey2002direct}, \citet{storey2003statistical}, \citet{storey2004strong}, \citet{ferreira2006benjamini}, \citet{clarke2009robustness}, and the references therein. We observe that most of these methods are founded on the assumption that the test statistics are independent or satisfy some restrictive dependence structure.
Because of the complicated nature of the practical data, the resultant test statistics may follow any arbitrary dependence structure. The effects of dependence on FDR have been studied extensively, e.g., by \citet{benjamini2001control}, \citet{finner2002multiple}, \citet{owen2005variance}, \citet{sarkar2006false}, \citet{efron2007correlation}, among others. Recently, new methods for the control and/or estimation of FDR have been proposed to allow complex and general dependence structure or even incorporate it in the testing procedure. Examples include the local index of significance (LIS) testing procedure for dependence modeled by a hidden Markov model \citep{sun2009large}, the pointwise and clusterwise analysis for spatial dependence \citep{sun2015false}, and the principal factor approximation (PFA) method for arbitrary dependence \citep{fan2012estimating, fan2017estimation, fan2019farmtest}. In particular, \citet{fan2012estimating} studied FDP and FDR under arbitrary dependence with a two step procedure. They first proposed a PFA method to reduce arbitrary dependence to weak dependence; and then established theoretically the strong consistency of the FDP and FDR. Therefore, their method is valid for test statistics under arbitrary dependence; under weak dependence, both FDP and FDR converge to the same asymptotic limit.
In addition to FDR, another popular multiple testing criterion is called false discovery exceedance (FDX, also referred to as TPPFP in the literature), which is defined as the tail probability of the event that FDP exceeds a threshold $q \in (0, 1)$:
\begin{equation*}
\text{FDX} = P(\mathrm{FDP} > q).
\end{equation*}
Compared to FDR that is only a single-value summary, FDX has the potential to fully describe the uncertainty and/or distribution of FDP as the threshold value $q$ varies. However, it has not been fully characterized how the dependence among the test statistics would impact FDX as opposed to FDR in the literature. In particular, some works on FDX assume independence among tests \citep{genovese2004stochastic, guo2007generalized, ge2012control}; more importantly, most works focus on developing procedures that control FDX as a single-value characteristic of FDP other than investigating how dependence affects the uncertainty and/or distribution of FDP \citep{korn2004controlling, van2004augmentation, lehmann2005generalizations, genovese2006exceedance, delattre2015new, hemerik2019permutation, dohler2020controlling, basu2021empirical}. Thus, these works still lack the valuable information about how FDP varies from study to study.
As far as we are aware, most of the above works have focused on proposing the estimates of FDP and/or its related statistical characteristic
. On the one hand, studying these estimates is sufficient to ensure that the corresponding FDP and/or its statistical characteristics are under control. On the other hand, we observe that the asymptotic uncertainty of the FDP may rely heavily on the dependence structure of the corresponding test statistics; and it is of great practical value to quantify this variability, as it can serve as an indicator of the quality of the FDP estimate and benefit the research of the FDR and FDX methods. More specifically, with the FDP variance estimate available, one can conclude more confidently how well the FDP is controlled when controlling its corresponding mean at a given level. It may also benefit the development on the methods for estimating and controlling FDX. The research on the uncertainty of FDP has high potential impact, but it is still limited in the community. For example, \citet{ge2012control} and \citet{delattre2011false} derived the asymptotic distribution of FDP under independence and Gaussian equi-correlation dependence, respectively; \citet{delattre2016empirical} established the asymptotic distribution of $\mathrm{FDP}$ under some assumptions on the dependence structure of the test statistics and that the expected values of the test statistics in the alternatives are equivalent.
In this paper, our focus is to provide a rigorous theoretical investigation of the asymptotic uncertainty of FDP in the framework that the test statistics are weakly dependent. In particular, we derive the theoretical expansion of the FDP: it is a linear combination of the tests, based on which we obtain its asymptotic variance. We also examine how this variance varies under different dependence structures among the test statistics both theoretically and numerically. One interesting observation is that the FDP based on weakly dependent test statistics converges to the same limit as that based on independent test statistics \citep{fan2012estimating}; however, the asymptotic variance of the former is almost always significantly greater than the latter both theoretically and numerically. With these observations, we recommend that in a multiple testing performed by an FDP procedure, we may report both the mean and the variance estimates of FDP to enrich the study outcome. Finally, with a real GWAS dataset, we demonstrate how our findings may impact real studies.
\section{Asymptotic Limit of FDP Under Weak Dependence}
\label{Sec-2}
Consider a genome-wide association study with $n$ subjects; for each subject, its disease status and $p$ SNPs are measured. The data can be represented by $\mathbf{Y} = (Y_1, \ldots, Y_n)^T$ and a $n\times p$ matrix $\mathbf{X} = (X_{ij})_{i=1,\ldots,n; j=1,\ldots,p}$, where $Y_i$ denotes the disease status of subject $i$, and the $i$th row of $\mathbf{X}$ collects its associated SNPs. When $Y_i$'s are measured in a continuous scale, the association between the $j$th SNP and the disease status can be modelled by the marginal linear regression model:
\begin{equation}
Y_{i} = \alpha_j + \beta_jX_{ij} + \epsilon_{ij}, \quad i=1,\ldots,n, \label{linear.model}
\end{equation}
where $\alpha_j$ and $\beta_j$ are regression parameters and $\epsilon_{ij}$ are random errors. The estimates $\hat \beta_j,\ j=1,\ldots,p$ and the corresponding test statistics $Z_j,\ j=1, \ldots, p$ for
\begin{equation} \label{hypotheses.1}
H_{0j}: \beta_{j}=0 \quad \text{versus} \quad H_{1j}:\beta_{j} \neq 0,\quad j=1,\dots,p,
\end{equation}
can be derived with a standard least squares procedure. Proposition 1 in \citet{fan2012estimating} verified that $\hat \beta_j,\ j=1,\ldots,p$ are correlated and derived their joint distribution, under appropriate regularity conditions. As a consequence, the test statistics $Z_j,\ j=1,\ldots,p$ are also correlated. In particular, they derived that conditioning on $\mathbf{X}$,
\begin{equation}\label{test.distribution}
(Z_{1},\ldots,Z_{p})^{T} \sim N((\mu_{1},\ldots,\mu_{p})^{T},\boldsymbol{\Sigma}),
\end{equation}
where $(\mu_1,\ldots, \mu_p)^T$ and $\boldsymbol{\Sigma} = (\sigma_{ij})_{i,j=1,\ldots,p}$ are appropriate population mean and variance matrix for $(Z_1,\ldots,Z_p)^T$. Furthermore, the testing problem \eqref{hypotheses.1} becomes equivalent to
\begin{equation} \label{hypotheses.2}
H_{0j}: \mu_{j}=0 \quad \text{versus} \quad H_{1j}: \mu_{j} \neq 0,\quad j=1,\ldots,p.
\end{equation}
Therefore, we shall work on the multiple testing problem under the setup (\ref{test.distribution}) and (\ref{hypotheses.2}) hereafter. Let $\mathcal{H}_0 = \{j: H_{0j} \text{ is true}\}$ and $\mathcal{H}_1 = \{j: H_{0j} \text{ is false}\}$ respectively be the sets of indices for the true nulls and the true alternatives, and let $p_0$ and $p_1$ denote their cardinalities. For a given threshold $t\in (0,1)$, the $j$th test is given by $t_j = \mathrm{1}(|Z_j| > |z_{t/2}|)$, where $t_j = 1$ indicates that the null hypothesis is rejected, and $t_j = 0$ otherwise; here $z_{t/2}$ denotes the $(t/2)$th quantile of a standard normal distribution. Define $V(t)=\sum_{j \in \mathcal{H}_0} t_j$, $S(t)=\sum_{j \in \mathcal{H}_1} t_j$, and $R(t)=\sum_{j =1}^p t_j$; they are respectively the number of false discoveries, correct discoveries, and the total number of discoveries. As a consequence, we have $\mathrm{FDP}(t) = V(t) / R(t)$.
\citet{fan2012estimating} studied the estimation of $\mathrm{FDP}(t)$ under an arbitrary dependence structure of $\boldsymbol{\Sigma}$. One milestone finding is that if $\boldsymbol{\Sigma}$ follows the weak dependence structure:
\begin{equation} \label{weak.dependence}
\sum_{i,j}|\sigma_{ij}| = O\left(p^{2-\delta}\right) \text{ for some } \delta>0,
\end{equation}
then,
\begin{equation} \label{asymptotic.limit}
\lim_{p\to\infty} \left[\mathrm{FDP}(t) -\frac{p_0 t}{\sum_{i=1}^{p}\left\{\Phi(z_{t/2}+\mu_{i}) + \Phi(z_{t/2}-\mu_{i})\right\}}\right] = 0,
\end{equation}
almost surely, where $\Phi(\cdot)$ denotes the cumulative distribution function of a standard normal distribution. This indicates that under the aforementioned weak dependence assumption, $\mathrm{FDP}(t)$ converges to a limit not depending on the covariance structure of the test statistics. It is noteworthy that this limit holds not only for $\mathrm{FDP}(t)$, but also for $\mathrm{FDR}(t)$.
We observe that this conclusion does not hold for the asymptotic variance of $\mathrm{FDP}(t)$; the asymptotic variance of $\mathrm{FDP}(t)$ varies under different covariance structures among the test statistics even when they are weakly dependent. In this article, we shall derive the asymptotic variance of $\mathrm{FDP}(t)$ theoretically and study how it varies under different dependence structures of the test statistics numerically.
\section{Asymptotic Variance of FDP}
\label{Sec-3}
In this section, we study the asymptotic variance of $\mathrm{FDP}(t)$ in the framework of Section \ref{Sec-2}. We first establish the asymptotic expansion of $\mathrm{FDP}(t)$, and its asymptotic variance under a weak dependence structure. Then, we show that with mild conditions, this asymptotic variance under dependence is higher than that under independence. This implies that under weak dependence, although the asymptotic mean of $\mathrm{FDP}(t)$ remains the same, its asymptotic variance can be inflated. For space limitations and presentational continuity, we have relegated the technical details in the supplementary materials.
\subsection{Asymptotic expansion and variance of FDP}
\label{Sec-3.1}
We first derive the asymptotic expansion of the FDP in the framework of weak dependence. We introduce the following notation. For any $t\in[0,1]$, we denote $\xi_j = \Phi(z_{t/2} + \mu_j) + \Phi(z_{t/2} -\mu_j)$ and $\bar\xi = \frac{1}{p_1}\sum_{j\in \mathcal{H}_1} \xi_j$. Consider the function
\begin{equation*}
H(\mu) = \phi(|z_{t/2}| + \mu)(|z_{t/2}| + \mu) + \phi(|z_{t/2}| - \mu)(|z_{t/2}| - \mu);
\end{equation*}
there exists a unique root, denoted by $\mu_t$, of this function for $\mu\in (|z_{t/2}|, |z_{t/2}|+1)$. Let $C_t^{\max} = \sup_{\mu \in (-\mu_t, \mu_t)} H(\mu)$.
\begin{theorem} \label{Thm-1}
Suppose $(Z_{1},\ldots,Z_{p})^{T} \sim N((\mu_{1},\ldots,\mu_{p})^{T},\boldsymbol{\Sigma})$ with unit variances, i.e., $\sigma_{jj}=1\text{ for } j=1,\ldots,p$. Assume that $(Z_{1},\dots,Z_{p})^T$ are weakly dependent as defined in (\ref{weak.dependence}), that $\limsup_{p\to \infty} p_0t/(p_1\bar \xi) < 1$, and that as $p$ is sufficiently large, for a universal constant $C>0$,
\begin{align}
&\sum_{i\neq j; i,j\in \mathcal{H}_0} \sigma_{ij}^2 \geq \frac{C_t^{\max}}{\phi(z_{t/2})|z_{t/2}|} \sum_{i\in \mathcal{H}_1, j\in \mathcal{H}_0, \mu_i\in[-\mu_t, \mu_t]} \sigma_{ij}^2, \label{Cond-1} \\
&\sum_{i\neq j; i,j\in \mathcal{H}_0} \sigma_{ij}^2 + p \geq C \sum_{i\neq j; i, j\in \mathcal{H}_1} \sigma_{ij}^2, \label{Cond-2}\\
&\sum_{i\neq j} \sigma_{ij}^4 = o\left(\sum_{i\neq j; i,j\in \mathcal{H}_0} \sigma_{ij}^2 + p_0\right). \label{Cond-3}
\end{align}
We have the following asymptotic expansion of $\mathrm{FDP}(t)$:
\begin{equation} \label{asymptotic.expansion}
\mathrm{FDP}(t) = \frac{E(\bar V)}{E(\bar R)} + m(\bar{V},\bar{R}) +r(\bar V, \bar R),
\end{equation}
where $\bar V = V(t)/p$, $\bar R = R(t)/p$,
\begin{equation*}
m(\bar{V},\bar{R}) = \frac{\bar{V}}{E(\bar{R})} - \frac{E(\bar{V})}{\{E(\bar{R})\}^2} \bar{R},
\end{equation*}
and the remainder term $r(\bar V, \bar R)$ satisfies that $E\{r^2(\bar V, \bar R)\} = o[\mathrm{Var}\{m(\bar{V},\bar{R})\}]$.
\end{theorem}
\begin{remark}
Theorem \ref{Thm-1} establishes the asymptotic expansion of $\mathrm{FDP}(t)$. It decomposes $\mathrm{FDP}(t)$ into three parts: the asymptotic mean $E(\bar{V})/E(\bar{R})$, the stochastic term $m(\bar{V},\bar{R})$ that has mean zero, and an asymptotically negligible remainder term $r(\bar V, \bar R)$. The asymptotic mean $E(\bar{V})/E(\bar{R})$ is a constant, which reinforces the conclusion given by \eqref{asymptotic.limit}; the stochastic term $m(\bar{V},\bar{R})$ is a linear combination of the tests $t_j,\ j=1\ldots, p$, which gives the asymptotic variance of $\mathrm{FDP}(t)$.
\end{remark}
\begin{remark}
With the weak dependence assumption (\ref{weak.dependence}), other technical conditions in Theorem \ref{Thm-1}, i.e., Conditions \eqref{Cond-1}--\eqref{Cond-3}, are mild, if $\boldsymbol{\Sigma}$ does not behave too extremely; the intuition is as follows. The number of summed terms on the left hand side of \eqref{Cond-1} is about $p_0^2$; in contrast, that on the right side is about $p_0p_1$. If $p_0 \gg p_1$, the number of summed terms on the left hand side of \eqref{Cond-1} is much more than that on the right. Therefore, this condition is satisfied unless the magnitudes of $\sigma_{ij}$ for $i\in \mathcal{H}_0,\ j\in \mathcal{H}_1$ are generally much bigger than those for $i,j\in \mathcal{H}_0$. Similar arguments are applicable for Condition \eqref{Cond-2}. For Condition \eqref{Cond-3}, the summation on the left hand side is over the fourth order of $\sigma_{ij}$, whereas that on the right is over the second order; therefore, it is easily satisfied when most of $\sigma_{ij}$ approach $0$ when $p\to \infty$.
\end{remark}
\begin{remark}
The development for Theorem \ref{Thm-1} is theoretically challenging. The expansion (\ref{asymptotic.expansion}) can be observed from a standard Taylor expansion; however, the derivation for $E\{r^2(\bar V, \bar R)\} = o[\mathrm{Var}\{m(\bar{V},\bar{R})\}]$ is technically involved. More specifically, two features jointly introduce challenges in our developments: (1) the leading component of $E\{r^2(\bar V, \bar R)\}$ is the summation of fourth moments of all the tests; we observe that to compare its asymptotic properties with $\mathrm{Var}\{m(\bar{V},\bar{R})\}$, a fourth order Taylor expansion of each moment term is further needed; (2) the dependence structure of the tests significantly complicates our study of the asymptotic upper bound of $E\{r^2(\bar V, \bar R)\}$ and the lower bound of $\mathrm{Var}\{m(\bar{V},\bar{R})\}$.
\end{remark}
Following the above asymptotic expansion of $\mathrm{FDP}(t)$ in Theorem \ref{Thm-1}, Corollary \ref{Corrollary-asym-var} below presents its asymptotic variance.
\begin{corollary} \label{Corrollary-asym-var}
With all the conditions in Theorem \ref{Thm-1} effective, we have
\begin{equation} \label{asymptotic.variance}
\lim_{p\to\infty}\dfrac{\mathrm{Var}\left\{\mathrm{FDP}(t)\right\}}{V_1(t) + V_2(t)} = 1,
\end{equation}
where
\begin{align}
V_1(t) ={} & \dfrac{p_1^2 \bar{\xi}^2}{(p_0 t + p_1\bar{\xi})^4} \times p_0t(1-t) + \dfrac{p_0^2 t^2}{(p_0 t + p_1\bar{\xi})^4} \times p_1\bar{\xi}(1 - \bar{\xi}), \label{V.1}\\
V_2(t) ={} & \dfrac{2p_1^2 \bar{\xi}^2}{(p_0 t + p_1\bar{\xi})^4} \sum_{\substack{i<j \\ i,j\in\mathcal{H}_0}} \mathrm{Cov}(t_i,t_j) - \dfrac{2p_0p_1t\bar{\xi}}{(p_0 t + p_1\bar{\xi})^4} \sum_{\substack{i \in \mathcal{H}_0 \\ j \in \mathcal{H}_1}} \mathrm{Cov}(t_i, t_j) \notag \\
&+ \dfrac{2p_0^2 t^2}{(p_0 t + p_1\bar{\xi})^4} \sum_{\substack{i<j \\ i,j\in\mathcal{H}_1}} \mathrm{Cov}(t_i,t_j), \label{V.2}
\end{align}
with
\begin{align}
\mathrm{Cov}(t_i,t_j)
= {} & \int_{|z_i| > |z_{t/2}|} \int_{|z_j| > |z_{t/2}|} \phi(z_i, z_j; \mu_i,\mu_j, 1, 1, \sigma_{ij}) dz_i dz_j \notag \\
& - [\Phi(z_{t/2}+\mu_i) + \Phi(z_{t/2}-\mu_i)][\Phi(z_{t/2}+\mu_j) + \Phi(z_{t/2}-\mu_j)], \label{covariance.t}
\end{align}
in which $\phi(z_i, z_j; \mu_i,\mu_j, \sigma_i^2, \sigma_j^2, \sigma_{ij})$ is the probability density function of the bivariate normal distribution with mean $(\mu_i,\mu_j)^T$ and covariance matrix $\left(\begin{matrix} \sigma_i^2 & \sigma_{ij}\\ \sigma_{ij} & \sigma_j^2 \end{matrix}\right)$.
\end{corollary}
Corollary \ref{Corrollary-asym-var} provides an explicit formula for the asymptotic variance of FDP under weak dependence. In the special case that the test statistics are independent, $V_2(t) = 0$ and the asymptotic variance of FDP is reduced to $V_1(t)$. Therefore, the ``additional variance" of FDP due to the dependence among the test statistics is introduced by $V_2(t)$. However, the sign of $V_2(t)$ is not conclusive based on \eqref{V.2}. This leads to an interesting question: under which scenario, $V_2(t)>0$, and therefore the $\mathrm{FDP}$ is inflated by the variance among test statistics? To answer this question, we need to investigate the signs of the covariances between pairs of tests, i.e., $\mathrm{Cov}(t_i,t_j)$, which are included in the formula of $V_2(t)$. We answer this question in the subsequent subsections.
\subsection{Signs of the covariance between any pair of tests}
\label{Sec-3.2}
From our development in the subsection above, we explained that the asymptotic variance of $\mathrm{FDP}(t)$ depends on $V_2(t)$; and in turn depends on $\mathrm{Cov}(t_i,t_j)$. In this subsection, we study how the signs of $\mathrm{Cov}(t_i,t_j)$ are affected by the dependence among the test statistics. Interestingly, we observe that the signs of $\mathrm{Cov}(t_i,t_j)$ are almost certainly determined by the memberships of tests $i$ and $j$ in $\mathcal{H}_0$ and $\mathcal{H}_1$. We have the following theorem.
\begin{theorem} \label{Thm-2}
Suppose $(Z_{1},\ldots,Z_{p})^{T} \sim N((\mu_{1},\ldots,\mu_{p})^{T},\boldsymbol{\Sigma})$ with unit variances, i.e., $\sigma_{jj}=1\text{ for } j=1,\ldots,p$. Assume $\sigma_{ij} \ne 0$ for the index pair $(i, j), i \ne j$. Then we have:
\begin{itemize}[noitemsep]
\item[$(a)$] for $i ,j\in\mathcal{H}_0$, $\mathrm{Cov}(t_i, t_j) > 0$;
\item[$(b)$] for $i \in\mathcal{H}_0$, $j \in\mathcal{H}_1$, $\mathrm{Cov}(t_i, t_j) < 0$ if $|\mu_j| > 2|z_{t/2}|$ and $t < 2\{1-\Phi^{-1}(\sqrt{\log(3)/2})\}$;
\item[$(c)$] for $i ,j\in\mathcal{H}_1$, $\mathrm{Cov}(t_i, t_j) > 0$ if $|\sigma_{ij}| \le |\mu|_{\min}/(|\mu|_{\max} + z_{t/2})$ and $\mathrm{sign}(\sigma_{ij}) = \mathrm{sign}(\mu_i \mu_j)$, where $|\mu|_{\min} = \min(|\mu_i|, |\mu_j|)$ and $|\mu|_{\max} = \max(|\mu_i|, |\mu_j|)$.
\end{itemize}
\end{theorem}
The motivation of the above theorem is to understand how the variance of FDP is affected by the dependence structure among the test statistics; however, these results on their own are interesting, and have theoretical and/or practical value. The theorem implies that the sign of the covariance of any $(t_i, t_j), i\neq j$ pair is almost certainly determined by the membership of tests $i$ and $j$ in $\mathcal{H}_0$ and $\mathcal{H}_1$, and relies little on the sign of $\sigma_{ij}$; it holds for the dependence types of both weakly dependent and strongly dependent test statistics. We expect that this theorem may benefit other multiple testing related research, when it is in need to quantify the dependence of $t_i$ and $t_j$. Next, we give some discussion on the implications of Part (a)--(c). In the discussion below, we assume that $Z_i$ and $Z_j$ are dependent, if not stated otherwise.
Part (a) states that $t_i$ and $t_j$ are positively correlated provided that both corresponding tests belong to $\mathcal{H}_0$. The intuition is that both tests are two-sided tests and the corresponding test statistics have zero expectations. Therefore, $|Z_i|$ and $|Z_j|$ are positively correlated, which further leads to the positive correlation between $t_i$ and $t_j$.
Part (b) indicates that when one test, say $i$, belongs to $\mathcal{H}_0$, and the other test, say $j$, belongs to $\mathcal{H}_1$, then $t_i$ and $t_j$ are negatively correlated given that $t$ is a reasonable threshold, i.e., $t < 2\{1-\Phi^{-1}(\sqrt{\log(3)/2})\}\approx 0.46$ and that the signal of $j$ is not too weak, i.e., $|\mu_j| > 2|z_{t/2}|$. Note that both conditions are typically satisfied in practical problems. The intuition of this conclusion is as follows. Let $Z_j^* = Z_j - \mu_j$; then if we consider $Z_j^*$ as the test statistic, its corresponding test belongs to $\mathcal{H}_0$; its correlations with the other test statistics remain unchanged. The corresponding test $t_j$ in the notation of $Z_j^*$ has the form:
\begin{eqnarray*}
t_j = \mathrm{1}(|Z_j| > |z_{t/2}|) = \mathrm{1}\{Z^*_j \in (-\infty, -|z_{t/2}| - \mu_j) \cup (|z_{t/2}| - \mu_j, \infty)\},
\end{eqnarray*}
where we assume that $\mu_j>0$ for presentational convenience;
this leads to $$1-t_j = \mathrm{1}\left\{Z^*_j \in (-|z_{t/2}| - \mu_j, |z_{t/2}| - \mu_j)\right\},$$ and implies that the acceptance region for the test based on $Z_j^*$ is contained by the rejection region of $t_i$ given that the signal $\mu_j > 2|z_{t/2}|$. From our conclusion in Part (a), $1-t_j$ is positively correlated with $t_i$, and therefore $t_j$ and $t_i$ are negatively correlated.
Part (c) gives sufficient conditions under which $t_i$ and $t_j$ are positively correlated when $i,j\in \mathcal{H}_1$. This is the only case where $\sigma_{ij}$ affects the sign of the correlation between the corresponding tests. These conditions are also intuitively met in real applications. In particular, the first condition $|\sigma_{ij}| \le |\mu|_{\min}/(|\mu|_{\max} + z_{t/2})$ essentially requires that the magnitude of $\sigma_{ij}$ does not exceed a ratio of the minimum to the maximum signals. One special practical scenario is that if the two signals are reasonably strong and in the similar scale, this ratio is close to 1; thus this condition is met. The second condition $\mathrm{sign}(\sigma_{ij}) = \mathrm{sign}(\mu_i \mu_j)$ needs that the sign of $\sigma_{ij}$ coincides with the signs of the corresponding signals: the test statistics are positively correlated if the signals are of the same signs; and they are negatively correlated otherwise. More specifically, consider the GWAS example, Part (c) implies that the tests for the significance of the $i$th and $j$th SNPs are positively correlated if their individual effects on the disease status are both positive or negative.
\subsection{Inflation of the FDP variance under dependence}
\label{Sec-3.3}
In Section \ref{Sec-3.1}, we discussed that $V_2(t)$ attributes to the FDP variance difference among varied dependence structures of the test statistics. The signs of its components are further discussed in Section \ref{Sec-3.2}. From these discussion, we conclude that the variance of FDP is inflated given that Parts (a)--(c) in Theorem \ref{Thm-2} all hold. We summarize this result in the following theorem.
\begin{theorem} \label{Thm-3}
Suppose $(Z_{1},\ldots,Z_{p})^{T} \sim N((\mu_{1},\ldots,\mu_{p})^{T},\boldsymbol{\Sigma})$ with $\sigma_{jj}=1\text{ for } j=1,\ldots,p$. For any $i,j\in \mathcal{H}_1, i\neq j$, assume that $|\mu_i| \ge 2|z_{t/2}| > 2\sqrt{\log(3)/2}$, $|\sigma_{ij}| \le |\mu|_{\min}/(|\mu|_{\max} + z_{t/2})$, and $\mathrm{sign}(\sigma_{ij}) = \mathrm{sign}(\mu_i \mu_j)$, where $|\mu|_{\min} = \min(|\mu_i|, |\mu_j|)$ and $|\mu|_{\max} = \max(|\mu_i|, |\mu_j|)$. Then, $V_2(t)>0$.
\end{theorem}
Theorem \ref{Thm-3} implies that the variance of FDP is inflated if the test statistics satisfy the given assumptions on their dependence structure. On the one hand, as we have discussed in Section \ref{Sec-3.2}, these are mild conditions for practical data. On the other hand, they are only one set of sufficient conditions that lead to the inflation of the FDP variance.
In our numerical studies, we experiment with some settings that violate the conditions in Theorem \ref{Thm-3}, and still observe the inflation of the variance of FDP; please refer to Section \ref{Sec-6} for details. Such scenarios are not theoretically justified, but may often be practically observed.
\section{Estimation of the Asymptotic Variance of FDP}
\label{Sec-5}
In Section \ref{Sec-3.1}, we have established the asymptotic variance of FDP in the framework of weak dependence. We observe that this variance depends on the parameters $(\mu_1, \ldots, \mu_p)^T$ and $\boldsymbol{\Sigma}$. We need to estimate them so that we can quantify this variance to make it practically applicable. Throughout, we assume that $\boldsymbol{\Sigma}$ is known or can be estimated from other resources (see Section \ref{Sec-2}) and estimate only $(\mu_1,\ldots, \mu_p)^T$.
One direct approach is to estimate $(\mu_1, \ldots, \mu_p)^T$ by their corresponding test statistics $(Z_1, \ldots, Z_p)^T$. However, in practical data, we often have $p_0 \gg p_1$; this implies that most $\mu_j$'s are zeros. Estimating these ``zeros" using the corresponding observed $Z_j$'s tends to diminish the efficiency of the method, as they can be viewed as noise. In our numerical studies, we consider the following estimation approach.
\begin{itemize}
\item[(1)] Find an estimate $\hat \pi_0$ for $\pi_0 = p_0/p$, which is the proportion of the number of tests that belong to $\mathcal{H}_0$ over the total number of tests.
Estimation methods for $\pi_0$ are available in the literature. For example, \citet{storey2003statistical} proposed $\hat\pi_0(\lambda) = \sum_{i=1}^p 1(P_i > \lambda)/\{m (1 - \lambda)\}$ with an $\lambda\in (0,1)$; the basic idea of this estimator is to pretend that $p$-values greater than $\lambda$ are from $\mathcal{H}_0$. In this framework, smoothed and bootstrap estimators of $\pi_0$ are proposed by \citet{storey2003statistical} and \citet{storey2004strong}, respectively. Additionally, \citet{langaas2005estimating} proposed a nonparametric maximum likelihood estimator of $\pi_0$. More recently, \citet{wang2010slim} proposed a ``SLIM" estimator of $\pi_0$; their estimator accounted for the dependence among the test statistics. We shall adopt these estimators in our numerical studies and compare their performance in the estimation of the FDP variance.
\item[(2)] Estimate $p_1$ by $\hat p_1 = p(1-\hat \pi_0)$. We then collect the hypotheses with the top $\hat p_1$ statistic values to form $\widehat{\mathcal{H}}_1$, and the rest are assigned to $\widehat{\mathcal{H}}_0$.
\item[(3)] Set $\hat \mu_j = 0$ for $j\in \widehat{\mathcal{H}}_0$; and set $\hat \mu_j = Z_j$ for $j\in \widehat{\mathcal{H}}_1$; and use them to estimate the variance of $\mathrm{FDP}(t)$ based on Corollary \ref{Corrollary-asym-var}.
\end{itemize}
\section{Simulation Studies}
\label{Sec-6}
We conduct simulation studies to validate our developments in Sections \ref{Sec-3} and \ref{Sec-5}. In Section \ref{Sec-6.1}, we use various numerical examples to illustrate how the asymptotic variances of FDP are different for varied dependence structures among the test statistics. In Section \ref{Sec-6.3}, we illustrate how the choice of the methods for estimating $\hat \pi_0$ reviewed in Section \ref{Sec-5} affects the estimation for the variance of FDP.
\subsection{Variance of FDP under varied dependence structures}
\label{Sec-6.1}
Throughout, we generate $(Z_1,\ldots,Z_p)^T \sim N((\mu_1,\ldots,\mu_p)^T, \boldsymbol{\Sigma})$ with $p = 2000$. We examined three choices of $p_1$: 50, 100, and 200, where the indices of tests in $\mathcal{H}_1$ are randomly sampled from $\{1,\ldots,p\}$; for $j\in \mathcal{H}_1$, we set $\mu_j = 2z_{t/2}$. We considered three possible values of $t$: 0.005, 0.02, and 0.05. The choice of $\boldsymbol{\Sigma}$ determines the dependence structure among the test statistics. We use similar methods as \citet{fan2012estimating} to generate it; the details are given below.
\begin{itemize}
\item[(1)] We generate a random sample $\mathbf{X}_1, \ldots, \mathbf{X}_{400}$, which are iid copies of $\mathbf{X} = (X_1, \ldots, X_p)^T$. We consider seven models for the joint distribution of $\mathbf{X}$.
\begin{itemize}
\item \textbf{[M1]} $X_1,\ldots, X_p$ are generated as iid $N(0,1)$ random variables.
\item \textbf{[M2]} Let $\mathbf{X} \sim N_{p}(0, \mathbf\Lambda)$, where $\mathbf\Lambda$ has diagonal elements $1$ and off-diagonal elements $1/2$.
\item \textbf{[M3]} Let $\{X_{k}\}_{k=1}^{1900}$ be iid $N(0,1)$ random variables, and $X_{k} = \sum_{l=1}^{10}X_{l}(-1)^{l+1}/5 + \sqrt{1-\dfrac{10}{25}}\varepsilon_{k}$ for $k=1901,\dots,2000,$
with $\{\varepsilon_{k}\}_{k=1901}^{2000}$ being $N(0,1)$ random variables.
\item \textbf{[M4]} Let $\{X_{k}\}_{k=1}^{2000}$ be iid Cauchy random variables with location parameter $0$ and scale parameter $1$.
\item \textbf{[M5]} Let $X_{j} = \rho_{j}^{(1)}W^{(1)}+\rho_{j}^{(2)}W^{(2)}+\rho_{j}^{(3)}W^{(3)}+H_{j}$, where $W^{(1)} \sim N(-2,1)$, $W^{(2)} \sim N(1,1)$, $W^{(3)} \sim N(4,1)$, $\rho_{j}^{(1)}$, $\rho_{j}^{(2)}$, $\rho_{j}^{(3)} \sim U(-1,1)$, $H_{j}\sim N(0,1)$; and all these random variables are independent.
\item \textbf{[M6]} Let $X_{j} = \rho_{j}^{(1)}W^{(1)}+\rho_{j}^{(2)}W^{(2)}+H_{j}$, where $W^{(1)}, W^{(2)}\sim N(0,1)$, $\rho_{j}^{(1)}, \rho_{j}^{(2)} \sim U(-1,1)$, $H_{j} \sim N(0,1)$, and all these random variables are independent.
\item \textbf{[M7]} Let $X_{j} = \mathrm{sin}\left(\rho_{j}^{(1)}W^{(1)}\right)+\mathrm{sign}\left(\rho_{j}^{(2)}\right)\exp\left(|\rho_{j}^{(2)}|W^{(2)}\right)+H_{j}$, where $W^{(1)}, W^{(2)}\sim N(0,1)$, $\rho_{j}^{(1)}, \rho_{j}^{(2)}\sim U(-1,1)$, and $H_{j}\sim N(0,1)$, and all these random variables are independent.
\end{itemize}
\item[(2)] We compute $\boldsymbol{\Sigma}^{\text{initial}}$ as the sample correlation matrix based on $\mathbf{X}_1, \ldots, \mathbf{X}_{400}$. Note that for some scenarios above, the components of $\mathbf{X}$ are strongly dependen
.
\item[(3)] We adopt the PFA method in \citet{fan2012estimating} to generate a weakly dependent $\boldsymbol{\Sigma}$ based on $\boldsymbol{\Sigma}^{\text{initial}}$. When applying the PFA method, we used the criterion $p^{-2}\sum_{1\le i,j \le p}|\sigma_{ij}| < 0.05$ numerically.
\end{itemize}
With these setups, for \textbf{M1}, the test statistics are independent, whereas for the other models, the test statistics are weakly dependent with varied dependence structures. For each aforementioned $p_1$, $t$, and model combination, we conduct $\mathrm{FDP}$ analysis, and evaluate the corresponding sample standard deviation of $\mathrm{FDP}$s over 1000 repetitions (named ``Emp" in Table \ref{Table-2}); we also compute the corresponding asymptotic standard deviation of $\mathrm{FDP}$ given in Corollary \ref{Corrollary-asym-var} with $\boldsymbol{\mu}$ and $\boldsymbol{\Sigma}$ being replaced with their simulated values (named ``Asym" in Table \ref{Table-2}). The results are summarized in Table \ref{Table-2}.
\begin{table}
\centering
\caption{Comparison for the standard deviation ($\times 100$) of FDPs}
\begin{tabular}{cccccccccc}
\hline\hline
$t$ & $p_1$ & Method & \textbf{M1} & \textbf{M2} & \textbf{M3} & \textbf{M4} & \textbf{M5} & \textbf{M6} & \textbf{M7}\\ \hline
& 50 & Asym & 4.37 & 6.11 & 5.13 & 6.91 & 6.11 & 6.12 & 6.15 \\
&& Emp & 4.43 & 6.08 & 5.16 & 6.60 & 5.73 &6.20 & 5.90\\
0.005 & 100 & Asym & 2.57 & 3.57 & 3.01 & 4.03 & 3.57 & 3.57 & 3.59 \\
&& Emp & 2.65 & 3.56 & 2.94 & 3.85 & 3.68 & 3.66 & 3.52 \\
& 200 & Asym & 1.37 & 1.88 & 1.59 & 2.12 & 1.88 & 1.89 & 1.89 \\
&& Emp & 1.33 & 1.83 & 1.60 & 2.06 & 1.86 & 1.79 & 1.95 \\ \hline
& 50 & Asym & 3.92 & 6.74 & 5.23 & 7.12 & 6.75 & 6.75 & 6.80 \\
&& Emp & 3.90 & 6.64 & 5.35 & 7.30 & 6.91 & 6.90 & 6.84\\
0.02 & 100 & Asym & 3.23 & 5.50 & 4.28 & 5.81 & 5.51 & 5.51 & 5.55 \\
&& Emp & 3.20 & 5.50 & 4.44 & 5.66 & 5.39 & 5.58 & 5.35\\
& 200 & Asym & 2.15 & 3.61 & 2.82 & 3.80 & 3.61 & 3.61 & 3.64 \\
&& Emp & 2.14 & 3.61 & 2.84 & 3.70 & 3.44 & 3.51 & 3.40\\ \hline
& 50 & Asym & 2.25 & 4.33 & 3.25 & 4.42 & 4.34 & 4.34 & 4.37 \\
&& Emp & 2.27 & 4.54 & 3.25 & 4.47 & 4.58 & 4.45 & 4.54\\
0.05 & 100 & Asym & 2.53 & 4.87 & 3.65 & 4.97 & 4.88 & 4.88 & 4.92 \\
&& Emp & 2.54 & 4.70 & 3.60 & 5.04 & 4.80 & 4.92 & 5.02\\
& 200 & Asym & 2.23 & 4.24 & 3.19 & 4.32 & 4.24 & 4.24 & 4.27 \\
&& Emp & 2.25 & 4.25 & 3.22 & 4.30 & 4.09 & 4.17 & 4.22\\ \hline
\end{tabular} \label{Table-2}
\end{table}
From this table, we observe that for all cases, the asymptotic standard deviation is very close to the sample standard deviation of $\mathrm{FDP}$s over 1000 repetitions. This validates our conclusion in Corollary \ref{Corrollary-asym-var}, and indicates that this asymptotic variance well approximates its corresponding true value in practice. Furthermore, for all the $p_1$ and $t$ combinations, the standard deviations of the FDP from \textbf{M1} are significantly smaller than those from the other models. This implies that the variances of FDP are inflated when dependence is present among the test statistics. Note that for these examples, the conditions in Theorem \ref{Thm-3} are not necessarily guaranteed; this reinforces our discussion in Section \ref{Sec-3.3} and demonstrates that the inflation of the FDP variance may occur in wide real applications. Among \textbf{M2}--\textbf{M6}, we observe that \textbf{M3} leads to the smallest inflation; this could be because that this model is close to the independent case, as the majority of $X_k$'s are independent, i.e., for $k=1,\ldots,1900$.
\subsection{Estimation of the asymptotic variance for FDP}
\label{Sec-6.3}
In this subsection, we assess the performance of the method in Section \ref{Sec-5} in estimating the asymptotic variance of FDP. As we observe in Section \ref{Sec-5}, our method relies on $\pi_0$, whose estimation methods are available in the literature. We incorporate these methods into our method and compare their performance. In particular, we consider: (1) the smoothed estimate by \citet{storey2003statistical}, named as ``Smoothed"; (2) the bootstrap estimate by \citet{storey2004strong}, named as ``Bootstrap"; (3) the nonparametric maximum likelihood estimate by \citet{langaas2005estimating}, named as ``Langaas"; and (4) the SLIM estimate by \citet{wang2010slim}, named as ``SLIM". We include the asymptotic standard deviation of FDP based on the true values of the parameters, i.e, $\boldsymbol{\mu}$ and $\boldsymbol{\Sigma}$, for each case as a reference, named as ``True".
We adopt the methods in Section \ref{Sec-6.1} to generate test statistics, and apply the aforementioned methods to estimate the asymptotic variances of FDPs. We only present the results for Model \textbf{M4} in Section \ref{Sec-6.1}; the results for the other models show similar patterns, and are omitted due to space limitation. The means and standard deviations of the estimated asymptotic standard deviations of FDPs over 1000 replicates are displayed in Table \ref{Table-3}. From this table, we observe that the Langaas and SLIM methods perform reasonably well in the estimation of the asymptotic standard deviation of FDPs; in particular, these methods result in estimates close to the true asymptotic standard deviation based on our Corollary \ref{Corrollary-asym-var} and lead to smaller standard deviations. We observe that this is because in the estimation of $\pi_0$, these methods are more robust to the dependence among the test statistics, whereas the Smoothed and Bootstrap methods can work well only when the test statistics are independent. We provide the average estimated number of identified alternative hypotheses, i.e., $p_1 = p (1-\pi_0)$ and the corresponding standard deviations over 1000 replicates in Table \ref{Table-4}; from this table, we observe that the performance in the estimation of $p_1$ is in the order of
\begin{eqnarray*}
\mbox{Bootstrap} < \mbox{Smoothed} < \mbox{Langaas} < \mbox{SLIM},
\end{eqnarray*}
which is consistent with our observation in Table \ref{Table-3}.
\begin{table}
\centering
\caption{Mean ($\times 1000$) and standard deviation ($\times 1000$, in parenthesis) of the estimated asymptotic standard deviation of FDPs over 1000 replicates.}
\begin{tabular}{ccccccc}
\hline\hline
$t$ & $p_1$ & True & Smoothed & Bootstrap & Langaas & SLIM \\ \hline
& 50 & 6.91 & 3.46 (3.12) & 5.83 (2.70) & 6.00 (1.02) & 7.31 (1.52) \\
0.005 & 100 & 4.03 & 3.13 (2.82) & 4.01 (1.43) & 3.68 (0.42) & 4.23 (0.60) \\
& 200 & 2.12 & 2.65 (2.45) & 2.06 (0.37) & 2.02 (0.14) & 2.18 (0.16) \\ \hline
& 50 & 7.12 & 3.57 (2.92) & 5.81 (1.79) & 6.70 (0.62) & 6.97 (0.43) \\
0.02 & 100 & 5.81 & 3.56 (2.48) & 5.39 (1.02) & 5.45 (0.54) & 5.90 (0.40) \\
& 200 & 3.80 & 3.46 (1.84) & 3.63 (0.57) & 3.64 (0.29) & 3.92 (0.22) \\ \hline
& 50 & 4.42 & 2.87 (2.35) & 4.24 (1.50) & 4.74 (0.40) & 4.32 (0.69) \\
0.05 & 100 & 4.97 & 3.04 (2.13) & 4.71 (0.49) & 4.91 (0.16) & 4.95 (0.09) \\
& 200 & 4.32 & 3.51 (1.52) & 4.16 (0.37) & 4.23 (0.27) & 4.41 (0.12) \\ \hline
\end{tabular} \label{Table-3}
\end{table}
\begin{table}
\centering
\caption{Mean and standard deviation (in parenthesis) of the estimated number of alternative hypotheses over 1000 replicates.}
\begin{tabular}{cccccc}
\hline\hline
$t$ & $p_1$ & Smoothed & Bootstrap & Langaas & SLIM \\ \hline
& 50 & 103 (122) & 107 (80) & 90 (53) & 55 (20) \\
0.005 & 100 & 136 (135) & 153 (86) & 138 (51) & 102 (21) \\
& 200 & 214 (152) & 251 (77) & 239 (49) & 202 (20) \\ \hline
& 50 & 103 (122) & 110 (89) & 90 (55) & 55 (21) \\
0.02 & 100 & 133 (136) & 152 (85) & 137 (51) & 103 (21) \\
& 200 & 205 (154) & 251 (80) & 237 (50) & 202 (20) \\ \hline
& 50 & 94 (117) & 108 (85) & 90 (58) & 53 (21) \\
0.05 & 100 & 129 (135) & 150 (84) & 136 (54) & 100 (20) \\
& 200 & 207 (147) & 252 (80) & 234 (56) & 197 (20) \\ \hline
\end{tabular} \label{Table-4}
\end{table}
\section{Real Data Analysis}
We apply our method to a genome-wide association study (GWAS); more specifically, an eQTL mapping study. The data are formed of 210 subjects from the International Hapmap Project, including three groups: (1) 90 subjects from Asian formed of 45 Japanese from Tokyo, 45 Han Chinese from Beijing, named ``Grp1"; (2) 60 Utah residents with ancestry from northern and western Europe, named ``Grp2"; and (3) 60 Nigerian from Ibadan, named ``Grp3". More details of the data can be found from the web link: \url{ftp://ftp.sanger.ac.uk/pub/genevar/}; see also \citet{bradic2011penalized}. We adopt the existing methods to construct test statistics for testing the association between the expression level of the gene CCT8 and the SNP genotypes for each group of the subjects \citep{bradic2011penalized, fan2012estimating}.
The SNP genotypes have three possibilities: $\text{SNP} = 0$ means no polymorphism, $\text{SNP} = 1$ indicates one nucleotide has polymorphism, and $\text{SNP} = 2$ implies both nucleotides have polymorphisms. Adopting the strategy in \citet{bradic2011penalized}, we transform the SNP data into two dummy variables, namely $(d_1, d_2)$:
\begin{itemize}
\item $(d_1, d_2) = (0, 0)$ for $\text{SNP} = 0$;
\item $(d_1, d_2) = (1, 0)$ for $\text{SNP} = 1$;
\item $(d_1, d_2) = (0, 1)$ for $\text{SNP} = 2$.
\end{itemize}
For subject $i$, denote by $Y_i$ and $(d_{1,i,j}, d_{2,i,j})$ the logarithm-transformed value of the expression level of gene CCT8 and the aforementioned dummy variables of the $j$th SNP. We consider two sets of marginal linear regression models:
\begin{eqnarray*}
\mbox{Set 1:} \qquad Y_i &=& \alpha_{1,j} + \beta_{1,j} d_{1,i,j} + \epsilon_{1,i,j}, \quad \mbox{for } j = 1,\ldots, p; \\
\mbox{Set 2:} \qquad Y_i &=& \alpha_{2,j} + \beta_{2,j} d_{2,i,j} + \epsilon_{2,i,j}, \quad \mbox{for } j = 1,\ldots, p.
\end{eqnarray*}
Here we impute the missing SNP data by 0, and exclude the SNPs that are identical to each other for all the subjects.
For each group of the data, we combine aformentioned two sets of models, and follow the procedure in \citet{fan2012estimating} to generate the test statistics; this leads to $2p$ test statistics. In detail, we use the procedure described in Section \ref{Sec-2} to establish an initial set of test statistics and their corresponding covariance matrix. We then use the dependence-adjusted procedure in \citet{fan2012estimating} to remove the top ten principal factors from the covariance matrix, and take a standardization step to generate a new set of test statistics of unit marginal variances; this helps reduce the dependence among the test statistics.
With the resultant test statistics for each group, we estimate the asymptotic limits and standard deviations of $\mathrm{FDP}(t)$ based on the following setups:
\begin{itemize}
\item For each group of test statistics, we consider two thresholds of $p$-value, which are chosen such that the estimates of the $\mathrm{FDP}(t)$ limits are reasonable values.
\item The asymptotic limits are estimated from \eqref{asymptotic.limit}, denoted by $\widehat{\text{FDP}}(t)$.
\item The asymptotic standard deviations are computed based on the methods in Section \ref{Sec-5}. As we have observed in Section \ref{Sec-6.3} that the standard deviation estimates based on the $\pi_0$ estimates from the ``Langaas" and ``SLIM" methods outperform the others; therefore, we present only the results from these methods. Furthermore, to assess how dependence may affect the estimation of these standard deviation estimates, we report these estimates based on the assumptions that the test statistics are independent and dependent, respectively. Therefore, for each group of subjects, we have four estimates, respectively denoted by $S_{\widehat{\text{FDP}}(t)}^{\text{Langaas}}$, $S_{\widehat{\text{FDP}}(t), \text{Ind}}^{\text{Langaas}}$, $S_{\widehat{\text{FDP}}(t)}^{\text{SLIM}}$, and $S_{\widehat{\text{FDP}}(t), \text{Ind}}^{\text{SLIM}}$.
\end{itemize}
We summarize our estimation results in Table \ref{Table-5}. From this table, we observe that under different assumptions of whether the dependence is present among the test statistics
significantly affect the asymptotic standard deviation of $\mathrm{FDP}(t)$. The ratios $S_{\widehat{\text{FDP}}(t)}^{\text{Langaas}}/S_{\widehat{\text{FDP}}(t), \text{Ind}}^{\text{Langaas}}$ and $S_{\widehat{\text{FDP}}(t)}^{\text{SLIM}}/S_{\widehat{\text{FDP}}(t), \text{Ind}}^{\text{SLIM}}$ range from 4 to 7 folds. Moreover, the ratios of the FDP standard deviation estimates to its limit values $\widehat{\text{FDP}}(t)$ are between 0.25 and 0.82 and thus the uncertainty of FDP is nonnegligible. These observations reinforce the statement that in an FDP related inference, it may not be sufficient to consider only the limit value of FDP (or equivalently, FDR); we suggest that it is important to correctly account for the dependence; otherwise, it might be over optimistic in the conclusion of how well the FDP is controlled. For example, when $t = 0.005$ in Grp1, the 95 percentile (say, two standard deviations above the mean) of the $\mathrm{FDP}(t)$ is estimated as $0.315 + 0.153 \times 2 = 0.621$ under dependence; in contrast, if we assume that the test statistics are independent, the corresponding estimate is $0.315 + 0.031 \times 2= 0.377$. Therefore, ignoring the dependence leads to an over optimistic belief of how well the upper bound of FDP is controlled; such a nonignorable difference may significantly change the statistical interpretation of the results in practice.
\begin{table}
\centering
\caption{Estimation results for the GWAS study.}
\begin{tabular}{cccccccccc}
\hline\hline
Population & \#SNP & $t$ & $\widehat{\text{FDP}}(t)$ & $S_{\widehat{\text{FDP}}(t)}^{\text{Langaas}}$ & $S_{\widehat{\text{FDP}}(t), \text{Ind}}^{\text{Langaas}}$ & $S_{\widehat{\text{FDP}}(t)}^{\text{SLIM}}$ & $S_{\widehat{\text{FDP}}(t),\text{Ind}}^{\text{SLIM}}$\\
\hline
Grp1 & 73 & 0.005 & 0.315 & 0.153 & 0.031 & 0.259 & 0.052\\
& 105 & 0.01 & 0.377 & 0.166 & 0.031 & 0.244 & 0.045\\ \hline
Grp2 & 166 & 0.01 & 0.199 & 0.107 & 0.018 & 0.148 & 0.025\\
& 199 & 0.02 & 0.441 & 0.125 & 0.019 & 0.167 & 0.025\\ \hline
Grp3 & 89 & 0.002 & 0.147 & 0.069 & 0.017 & 0.092 & 0.022\\
& 135 & 0.005 & 0.371 & 0.092 & 0.019 & 0.124 & 0.025\\
\hline
\end{tabular} \label{Table-5}
\end{table}
\section{Discussion}
In this article, we have established the theoretical results for the asymptotic variance of $\mathrm{FDP}$ in the framework that the test statistics are weakly dependent. We observe that with mild conditions, the asymptotic variance of $\mathrm{FDP}$ under dependence is usually greater than that under independence; this is also demonstrated by our numerical studies: even under weak dependence, the variances of the FDPs can be numerically much larger than those under independence. It is thus crucial for us to take into account the dependence in the estimation of the variance of the FDP and report it together with its mean. Furthermore, we have observed in the real data example that the standard deviation estimate of $\mathrm{FDP}$ under the dependence assumption is significantly different from (usually greater than) that under the independence assumption. In practice, we suggest that we presumably include the dependence in the estimation, unless there is a strong evidence of otherwise. This will be helpful for us to better understand how well the FDP is controlled, and avoid over optimistic conclusions.
In this article, we have studied the asymptotic uncertainty of FDP in the same framework as \citet{fan2012estimating}. Under the assumption that the test statistics are weakly dependent, we obtain the asymptotic expansion of $\mathrm{FDP}(t)$ and establish the explicit formula for computing the asymptotic variance of $\mathrm{FDP}(t)$. Within this framework, we observe many interesting open problems that can be studied in the future. We list several as examples; there are many others.
First, our proposed method for estimating the variance of $\mathrm{FDP}(t)$ in Section \ref{Sec-5} relies on the estimation of $\pi_0$; there, we adopted existing methods in the literature. From simulation studies in Section \ref{Sec-6.3}, we observe that the performance of the variance estimate for $\mathrm{FDP}(t)$ relies heavily on that of $\pi_0$; although the Langaas and SLIM methods perform reasonably well, we believe that they are not yet optimal, as none of these $\pi_0$ estimation methods have sufficiently accounted for the dependence among the test statistics. Therefore, we expect that establishing improved $\pi_0$ estimation methods that can better accommodate the dependence among the test statistics would be of particular interest, and can be incorporated into our estimation method in Section \ref{Sec-5}.
Second, we have imposed some weak dependence assumptions in our development; this may limit the method in some applications. Practically, one possible solution is not to use the original test statistics, but
the dependence-adjusted ones, as they are more powerful and often weakly dependent \citep{friguet2011estimation, fan2012estimating}; yet there is no theoretical guarantees. Therefore, it is challenging, but would be of interest to study the asymptotic variance of $\mathrm{FDP}(t)$ under arbitrary dependence.
Third, we assume that the test statistics are normally distributed in this article. It would be of great both practical and theoretical value to generalize our study to accommodate multiple testing problems where the test statistics follow other popular distributions, e.g., $t$, $F$, and chi-square distributions. We refer to \citet{zhuo2020test} as an example of the recent works on dependent $t$-tests and leave the relevant investigation to our future work.
\begin{center}
{SUPPLEMENTARY MATERIALS}
\end{center}
The supplementary materials contain
technical details for the theorems in Section \ref{Sec-3}.
\bibliographystyle{asa}
\section{Notation and Review of Technical Results in the Main Article} \label{sec-notation-review}
We need the following notation in our development. Throughout, we use ``$\lesssim$" (``$\gtrsim$") to denote smaller (greater) than up to a universal constant. For any $t\in[0,1]$, we denote $\xi_j = \Phi(z_{t/2} + \mu_j) + \Phi(z_{t/2} -\mu_j)$ and $\bar\xi = \frac{1}{p_1}\sum_{j\in \mathcal{H}_1} \xi_j$. Consider the function
\begin{equation*}
H(\mu) = \phi(|z_{t/2}| + \mu)(|z_{t/2}| + \mu) + \phi(|z_{t/2}| - \mu)(|z_{t/2}| - \mu);
\end{equation*}
there exists a unique root, denoted by $\mu_t$, of this function for $\mu\in (|z_{t/2}|, |z_{t/2}|+1)$. Let $C_t^{\max} = \sup_{\mu \in (-\mu_t, \mu_t)} H(\mu)$.
Furthermore, recall that in the main article, the $i$th test is given by $t_i = \mathrm{1}(|Z_i| > |z_{t/2}|) = \mathrm{1}(P_i < t)$.
Let
\begin{eqnarray*}f_{\{t_1, \dots, t_k\}}^{(i_1, \dots, i_k)}(a, t) = \dfrac{\partial^{\sum_{j = 1}^{k}i_j} f_{\{t_1, \ldots, t_k\}}( \rho_1, \ldots, \rho_k; a, t)}{\partial (\rho_1)^{i_1} \ldots \partial(\rho_k)^{i_k}}\Big|_{\rho_j = 0, j=1,\ldots, k},
\end{eqnarray*}
where
$$ f_{\{t_1, \ldots, t_k\}}( \rho_1, \ldots, \rho_k; a, t) = \Phi \left(\dfrac{z_{t/2} - \mu_a - \rho_1x_{t_1} - \ldots - \rho_kx_{t_k}}{\sqrt{1 - \rho_1^2 - \ldots -\rho_k^2}}\right).$$
Let $\xi_i = E(t_i)$ for $i\in \mathcal{H}_1$; clearly we have $\xi_i = \Phi(z_{t/2} + \mu_i) + \Phi(z_{t/2} - \mu_i)$. Denote $\bar \xi = \frac{1}{p_1} \sum_{i=1}^{p_1} \xi_i$. Then the converged limit of $\mbox{FDP}(t)$ on the right hand side of (6) in the main article can be written to be $\frac{p_0t}{p_0t + p_1 \bar \xi}$.
The following theorem is Theorem 1 in Section 3.1 of the main article; it establishes the asymptotic expansion of the $\mathrm{FDP}(t)$ in the framework of the weak dependence.
\begin{theorem} \label{Thm-1}
Suppose $(Z_{1},\ldots,Z_{p})^{T} \sim N((\mu_{1},\ldots,\mu_{p})^{T},\boldsymbol{\Sigma})$ with unit variances, i.e., $\sigma_{jj}=1\text{ for } j=1,\ldots,p$. Assume that $(Z_{1},\dots,Z_{p})^T$ are weakly dependent as defined in (5) in the main article, that $\limsup_{p\to \infty} p_0t/(p_1\bar \xi) < 1$, and that as $p$ is sufficiently large, for a universal constant $C>0$,
\begin{align}
&\sum_{i\neq j; i,j\in \mathcal{H}_0} \sigma_{ij}^2 \geq \frac{C_t^{\max}}{\phi(z_{t/2})|z_{t/2}|} \sum_{i\in \mathcal{H}_1, j\in \mathcal{H}_0, \mu_i\in[-\mu_t, \mu_t]} \sigma_{ij}^2, \label{Cond-1} \\
&\sum_{i\neq j; i,j\in \mathcal{H}_0} \sigma_{ij}^2 + p \geq C \sum_{i\neq j; i, j\in \mathcal{H}_1} \sigma_{ij}^2, \label{Cond-2}\\
&\sum_{i\neq j} \sigma_{ij}^4 = o\left(\sum_{i\neq j; i,j\in \mathcal{H}_0} \sigma_{ij}^2 + p_0\right). \label{Cond-3}
\end{align}
We have the following asymptotic expansion of $\mathrm{FDP}(t)$:
\begin{equation} \label{asymptotic.expansion}
\mathrm{FDP}(t) = \frac{E(\bar V)}{E(\bar R)} + m(\bar{V},\bar{R}) +r(\bar V, \bar R),
\end{equation}
where $\bar V = V(t)/p$, $\bar R = R(t)/p$,
\begin{equation*}
m(\bar{V},\bar{R}) = \frac{\bar{V}}{E(\bar{R})} - \frac{E(\bar{V})}{\{E(\bar{R})\}^2} \bar{R},
\end{equation*}
and the remainder term $r(\bar V, \bar R)$ satisfies that $E\{r^2(\bar V, \bar R)\} = o[\mathrm{Var}\{m(\bar{V},\bar{R})\}]$.
\end{theorem}
A direct outcome of this theorem is the following Corollary, which establishes the explicit formula for the asymptotic variance of $\mathrm{FDP}(t)$. It is presented as Corollary 1 in the main article.
\begin{corollary} \label{Corrollary-asym-var}
With all the conditions in Theorem \ref{Thm-1} effective, we have
\begin{equation} \label{asymptotic.variance}
\lim_{p\to\infty}\dfrac{\mathrm{Var}\left\{\mathrm{FDP}(t)\right\}}{V_1(t) + V_2(t)} = 1,
\end{equation}
where
\begin{align}
V_1(t) ={} & \dfrac{p_1^2 \bar{\xi}^2}{(p_0 t + p_1\bar{\xi})^4} \times p_0t(1-t) + \dfrac{p_0^2 t^2}{(p_0 t + p_1\bar{\xi})^4} \times p_1\bar{\xi}(1 - \bar{\xi}), \label{V.1}\\
V_2(t) ={} & \dfrac{2p_1^2 \bar{\xi}^2}{(p_0 t + p_1\bar{\xi})^4} \sum_{\substack{i<j \\ i,j\in\mathcal{H}_0}} \mathrm{Cov}(t_i,t_j) - \dfrac{2p_0p_1t\bar{\xi}}{(p_0 t + p_1\bar{\xi})^4} \sum_{\substack{i \in \mathcal{H}_0 \\ j \in \mathcal{H}_1}} \mathrm{Cov}(t_i, t_j) \notag \\
&+ \dfrac{2p_0^2 t^2}{(p_0 t + p_1\bar{\xi})^4} \sum_{\substack{i<j \\ i,j\in\mathcal{H}_1}} \mathrm{Cov}(t_i,t_j), \label{V.2}
\end{align}
with
\begin{align}
\mathrm{Cov}(t_i,t_j)
= {} & \int_{|z_i| > |z_{t/2}|} \int_{|z_j| > |z_{t/2}|} \phi(z_i, z_j; \mu_i,\mu_j, 1, 1, \sigma_{ij}) dz_i dz_j \notag \\
& - [\Phi(z_{t/2}+\mu_i) + \Phi(z_{t/2}-\mu_i)][\Phi(z_{t/2}+\mu_j) + \Phi(z_{t/2}-\mu_j)], \label{covariance.t}
\end{align}
in which $\phi(z_i, z_j; \mu_i,\mu_j, \sigma_i^2, \sigma_j^2, \sigma_{ij})$ is the probability density function of the bivariate normal distribution with mean $(\mu_i,\mu_j)^T$ and covariance matrix $\left(\begin{matrix} \sigma_i^2 & \sigma_{ij}\\ \sigma_{ij} & \sigma_j^2 \end{matrix}\right)$.
\end{corollary}
The following theorem, which is Theorem 2 in the main article, discusses how the signs of the $\mathrm{Cov}(t_i,t_j)$ is affected by the dependence structure among the test statistics.
\begin{theorem} \label{Thm-2}
Suppose $(Z_{1},\ldots,Z_{p})^{T} \sim N((\mu_{1},\ldots,\mu_{p})^{T},\boldsymbol{\Sigma})$ with unit variances, i.e., $\sigma_{jj}=1\text{ for } j=1,\ldots,p$. Assume $\sigma_{ij} \ne 0$ for the index pair $(i, j), i \ne j$. Then we have:
\begin{itemize}[noitemsep]
\item[$(a)$] for $i ,j\in\mathcal{H}_0$, $\mathrm{Cov}(t_i, t_j) > 0$;
\item[$(b)$] for $i \in\mathcal{H}_0$, $j \in\mathcal{H}_1$, $\mathrm{Cov}(t_i, t_j) < 0$ if $|\mu_j| > 2|z_{t/2}|$ and $t < 2\{1-\Phi^{-1}(\sqrt{\log(3)/2})\}$;
\item[$(c)$] for $i ,j\in\mathcal{H}_1$, $\mathrm{Cov}(t_i, t_j) > 0$ if $|\sigma_{ij}| \le |\mu|_{\min}/(|\mu|_{\max} + z_{t/2})$ and $\mathrm{sign}(\sigma_{ij}) = \mathrm{sign}(\mu_i \mu_j)$, where $|\mu|_{\min} = \min(|\mu_i|, |\mu_j|)$ and $|\mu|_{\max} = \max(|\mu_i|, |\mu_j|)$.
\end{itemize}
\end{theorem}
These results immediately result in the theorem blow, which gives one set of sufficient conditions that lead to the inflation of the FDP variance; it is Theorem 3 in the main article.
\begin{theorem} \label{Thm-3}
Suppose $(Z_{1},\ldots,Z_{p})^{T} \sim N((\mu_{1},\ldots,\mu_{p})^{T},\boldsymbol{\Sigma})$ with $\sigma_{jj}=1\text{ for } j=1,\ldots,p$. For any $i,j\in \mathcal{H}_1, i\neq j$, assume that $|\mu_i| \ge 2|z_{t/2}| > 2\sqrt{\log(3)/2}$, $|\sigma_{ij}| \le |\mu|_{\min}/(|\mu|_{\max} + z_{t/2})$, and $\mathrm{sign}(\sigma_{ij}) = \mathrm{sign}(\mu_i \mu_j)$, where $|\mu|_{\min} = \min(|\mu_i|, |\mu_j|)$ and $|\mu|_{\max} = \max(|\mu_i|, |\mu_j|)$. Then, $V_2(t)>0$.
\end{theorem}
\section{Lemmas} \label{sec-lemmas}
We first establish the following lemmas; they play fundamental roles in our proofs of the theoretical results given above. In particular, Lemmas \ref{lem-3}--\ref{lem-7} are to support our proof for Theorem \ref{Thm-1}; Lemma \ref{lem-1} is used for Theorem \ref{Thm-2}.
\begin{lemma}\label{lem-3}
The partial derivatives $f_{t_1, t_2, t_3}^{i_1, i_2, i_3}(a,t)$ can be written to be
$$ f_{t_1, t_2, t_3}^{i_1, i_2, i_3}(a,t) = C^{a}_{t/2}(i_1 + i_2 + i_3)g_{i_1}(x_{t_1})g_{i_2}(x_{t_2})g_{i_3}(x_{t_3}),$$
where
\begin{eqnarray*}
&g_0(x) = 1, \qquad g_1(x) = x, \qquad g_2(x) = x^2 - 1, \qquad g_3(x) = x^3-3x,&\\ & g_4(x) = x^4 - 6x^2 + 3, \qquad g_5(x) = x^5 - 10x^3 + 15x& \\
&g_6(x) = x^6 - 15x^4 + 45x^2 - 15, \qquad g_7(x) = x^7 - 21x^5 + 105x^3 - 105x&\\
&g_8(x) = x^8 - 28x^6 + 210x^4 -420x^2 + 105,&
\end{eqnarray*}
$C^{a}_{t/2}(0) = \Phi(z_{t/2} - \mu_a)$, and $C^{a}_{t/2}(i) = -\phi(z_{t/2}-\mu_a) g_{i-1}(z_{t/2} - \mu_a)$ for $i\geq 1$. Furthermore, for $X\sim N(0,1)$,
\begin{eqnarray*}
E\{g_i(X)\} = 0, && \mbox{ for } i=1,\ldots, 8,\\
\mbox{and } \quad E\{ g_{i_1}(X) g_{i_2}(X)\} = 0, && \mbox{ for any }i_1, i_2\in \{0, \ldots, 8 \} , i_1 \neq i_2;
\end{eqnarray*}
and for $\mu_a = 0$,
\begin{eqnarray}
C^{a}_{1-t/2}(i) = \begin{cases}
C^{a}_{t/2}(i), &\text{ if i is odd}\\
-C^{a}_{t/2}(i), &\text{ if i is even}.\\
\end{cases} \label{eq-lem3-0}
\end{eqnarray}
\end{lemma}
\begin{proof}
The proof is based on straightforward but tedious evaluations on the partial derivatives of $f_{\{t_1, \ldots, t_k\}}(\rho_1, \ldots, \rho_k; a,t)$ with respect to $\rho_1,\ldots, \rho_k$; the details are omitted.
\end{proof}
\begin{lemma}\label{lem-4}
Recall the definition: $t_i = \mathrm{1}(|Z_i| > |z_{t/2}|) = \mathrm{1}(P_i < t)$; we have
\begin{itemize}
\item[(P1). ] when $i\neq j$, and $i,j\in \mathcal{H}_1$, \begin{eqnarray*}
&&E(t_it_j) - E(t_i) E(t_j) \\&=& \left\{C^i_{t/2}(1)-C^i_{1-t/2}(1)\right\}\left\{C^j_{t/2}(1)-C^j_{1-t/2}(1)\right\}\sigma_{ij}\\
&&+ \frac{1}{2}\left\{C^i_{t/2}(2)-C^i_{1-t/2}(2)\right\}\left\{C^j_{t/2}(2)-C^j_{1-t/2}(2)\right\}\sigma_{ij}^2\\
&&+\frac{E\{g_3^2(X_1)\}}{(3!)^2} \left\{C_{t/2}^i(3) - C_{1-t/2}^i(3)\right\}\left\{C_{t/2}^j(3) - C_{1-t/2}^j(3)\right\}\sigma_{ij}^3+O(\sigma_{ij}^4);
\end{eqnarray*}
\item[(P2).] when $i\in \mathcal{H}_1, j\in \mathcal{H}_0$, for any $t$, there exists a unique root $\mu_t \in (|z_{t/2}|, |z_{t/2}|+1)$ of $C_{t/2}^j(2) - C_{1-t/2}^j(2) = 0$ in $\mu_j$, such that when $\mu_j \leq \mu_t$,
\begin{eqnarray*}
&& O(\sigma_{ij}^4)< E(t_it_j) - E(t_i) E(t_j) = -\sigma_{ij}^2 \phi(z_{t/2})z_{t/2} \left\{ C_{t/2}^j(2) - C_{1-t/2}^j(2) \right\} + O(\sigma_{ij}^4) \\
&\leq & \phi(z_{t/2})|z_{t/2}| C_t^{\max} \sigma_{ij}^2 + O(\sigma_{ij}^4),
\end{eqnarray*}
where
\begin{eqnarray*}
C_t^{\max} = \sup_{\mu\in (-\mu_t, \mu_t)} \left\{\phi(|z_{t/2}|+ \mu)(|z_{t/2}| + \mu) + \phi(|z_{t/2}| - \mu)(|z_{t/2}| - \mu)\right\};
\end{eqnarray*}
and when $|\mu_j|\geq \mu_t$,
\begin{eqnarray*}
E(t_it_j) - E(t_i) E(t_j) < O(\sigma_{ij}^4).
\end{eqnarray*}
\item[(P3).] when $i\neq j$, and $i,j\in \mathcal{H}_0$,
\begin{eqnarray*}
E(t_it_j) - E(t_i) E(t_j) = 2 \phi^2(z_{t/2})z_{t/2}^2 \sigma_{ij}^2 + O(\sigma_{ij}^4).
\end{eqnarray*}
\end{itemize}
\end{lemma}
\begin{proof}
Note that we can write
\begin{eqnarray*}
E(t_it_j) - E(t_i) E(t_j) = \sum_{a_1, a_2 \in \{1, -1\}}a_1a_2 h_{i,j}(a_1, a_2), \label{eq-lem4-1}
\end{eqnarray*}
where
\begin{eqnarray*}
h_{i,j}(a_1, a_2) = P(Z_i<a_1 z_{t/2}, Z_j < a_2 z_{t/2}) - P(Z_i<a_1 z_{t/2})P(Z_j<a_1 z_{t/2}). \label{eq-lem4-2}
\end{eqnarray*}
We derive $h_{i,j}(a_1, a_2)$ for $a_1 = a_2 = 1$; the derivations for other values of $a_1$ and $a_2$ are similar. Let $X_1, X_2, X_3$ be i.i.d. standard normal random variables, we can write
\begin{eqnarray*}Z_i = \mu_i + \sqrt{|\sigma_{ij}|} X_1 + \sqrt{1-|\sigma_{ij}|}X_2 &&\\
Z_j = \mu_j + \sqrt{|\sigma_{ij}|} X_1 + \sqrt{1-|\sigma_{ij}|}X_3 &&\mbox{if } \sigma_{ij}\geq 0,
\end{eqnarray*}
and
\begin{eqnarray*}
Z_j = \mu_j - \sqrt{|\sigma_{ij}|} X_1 + \sqrt{1-|\sigma_{ij}|}X_3 \quad \mbox{if } \sigma_{ij}<0.
\end{eqnarray*}
Hereafer, we assume that $\sigma_{ij}\geq0$; the case for $\sigma_{ij}<0$ can be derived the same.
The first term of $h_{i,j}(a_1, a_2)$ is given by
\begin{equation}
\begin{split}
& P(Z_i < z_{t/2}, Z_{j} < z_{t/2}) \\
= & \int \Phi \left(\dfrac{z_{t/2} - \mu_i - \sqrt{\sigma_{ij}}x_{1}}{\sqrt{1 - \sigma_{ij}}}\right)\Phi \left(\dfrac{z_{t/2} - \mu_j - \sqrt{\sigma_{ij}}x_{1}}{\sqrt{1 - \sigma_{ij}}}\right)\phi(x_1)dx_1.\\
\end{split} \label{eq-lem4-3}
\end{equation}
Note that by definition $\Phi \left(\dfrac{z_{t/2} - \mu_a - \sqrt{\sigma_{ij}}x_{1}}{\sqrt{1 - \sigma_{ij}}}\right) = f_{\{1\}}(\sqrt{\sigma_{ij}}; a, t)$; applying Taylor expansion and Lemma \ref{lem-3}, we immediately have
\begin{eqnarray}
\Phi \left(\dfrac{z_{t/2} - \mu_a - \sqrt{\sigma_{ij}}x_{1}}{\sqrt{1 - \sigma_{ij}}}\right) = \sum_{i_1 \leq 7} C^a_{t/2}(i_1)g_{i_1}(x_1)(\sqrt{\sigma_{ij}})^{i_1}/(i_1!) + R(\sigma_{ij}), \label{eq-lem4-4}
\end{eqnarray}
where $R(\sigma_{ij})$ is the Lagrange residual term in the Taylor's expansion, satisfying $|R(\sigma_{ij})| \lesssim |f(x_1)| \sigma_{ij}^4$ up to a univeral constant not depending on $x_1$, with $f(x_1)$ being a finite order polynomial function of $x_1$. Combining \eqref{eq-lem4-3} and \eqref{eq-lem4-4} leads to
\begin{equation}
\begin{split}
& P(Z_i < z_{t/2}, Z_{j} < z_{t/2}) \\
= &\sum_{i_1 + i_2 \leq 7} C^i_{t/2}(i_1)C^j_{t/2}(i_2)(\sqrt{\sigma_{ij}})^{i_1 + i_2}E(g_{i_1}(X_1)g_{i_2}(X_1))/(i_1!i_2!) + O(\sigma_{ij}^4) \\
= &\sum_{i_1 = 0}^3 C^i_{t/2}(i_1)C^j_{t/2}(i_1)\sigma_{ij}^{i_1}E(g_{i_1}^2(X_1))/(i_1!)^2 + O(\sigma_{ij}^4), \label{eq-lem4-5}\\
\end{split}
\end{equation}
where the second ``=" is because $E(g_{i_1}(X_1)g_{i_2}(X_1)) = 0$ for $i_1\neq i_2$ based on Lemma \ref{lem-3}; $X_1$ is a standard normal random variable. Furthermore, it is straightforward to check that for $i_1 = 0$,
\begin{eqnarray*}
C^i_{t/2}(i_1)C^j_{t/2}(i_1)\sigma_{ij}^{i_1}E(g_{i_1}^2(X_1))/(i_1!)^2 = P(Z_i < z_{t/2})P(Z_{j} < z_{t/2}),
\end{eqnarray*}
which together with \eqref{eq-lem4-5} leads to
\begin{eqnarray*}
h_{i,j}(1,1) &=& P(Z_i< z_{t/2}, Z_j < z_{t/2}) - P(Z_i< z_{t/2})P(Z_j< z_{t/2})\\
&=& \sum_{i_1 = 1}^3 C^i_{t/2}(i_1)C^j_{t/2}(i_1)\sigma_{ij}^{i_1}E(g_{i_1}^2(X_1))/(i_1!)^2 + O(\sigma_{ij}^4).
\end{eqnarray*}
Similarly, we can derive $h_{i,j}(1,-1)$, $h_{i,j}(-1,1)$, and $h_{i,j}(-1,-1)$. As consequence, we have
\begin{equation*}
\begin{split}
&E(t_it_j) - E(t_i) E(t_j)= \sum_{a_1, a_2 \in \{1, -1\}}a_1a_2 h_{i,j}(a_1, a_2)\\
= & \sum_{i_1 = 1}^3 C^i_{t/2}(i_1)C^j_{t/2}(i_1)\sigma_{ij}^{i_1}E\{g_{i_1}^2(X_1)\}/(i_1!)^2\\
- & \sum_{i_1 = 1}^3 C^i_{1-t/2}(i_1)C^j_{t/2}(i_1)\sigma_{ij}^{i_1}E\{g_{i_1}^2(X_1)\}/(i_1!)^2\\
- &\sum_{i_1 = 1}^3 C^i_{t/2}(i_1)C^j_{1-t/2}(i_1)\sigma_{ij}^{i_1}E\{g_{i_1}^2(X_1)\}/(i_1!)^2\\
+ &\sum_{i_1 = 1}^3 C^i_{1-t/2}(i_1)C^j_{1-t/2}(i_1)\sigma_{ij}^{i_1}E\{g_{i_1}^2(X_1)\}/(i_1!)^2 + O(\sigma_{ij}^4)\\
= & \sum_{i_1 = 1}^3 \frac{\sigma_{ij}^{i_1} E\{g_{i_1}^2(X_1)\}}{(i_1!)^2} \left\{C^i_{t/2}(i_1)-C^i_{1-t/2}(i_1)\right\}\left\{C^j_{t/2}(i_1)-C^j_{1-t/2}(i_1)\right\}+O(\sigma_{ij}^4).
\end{split}
\end{equation*}
We are able to check:
\begin{itemize}
\item when $\mu_i = 0$, for $i_1 = 1$ or $3$,
\begin{eqnarray*}
C^i_{t/2}(i_1)-C^i_{1-t/2}(i_1) = 0,
\end{eqnarray*}
and for $i_1 = 2$
\begin{eqnarray*}
C^i_{t/2}(i_1)-C^i_{1-t/2}(i_1) = -2 \phi(z_{t/2}) z_{t/2};
\end{eqnarray*}
\item when $\mu_i \neq 0$, for $i_1 = 1$,
\begin{eqnarray*}
C^i_{t/2}(i_1)-C^i_{1-t/2}(i_1) = -\phi(|z_{t/2}|+\mu_i) + \phi(|z_{t/2}|-\mu_i);
\end{eqnarray*}
for $i_1 = 2$,
\begin{eqnarray*}
C^i_{t/2}(2)-C^i_{1-t/2}(2) &=& -\phi(z_{t/2}- \mu_i)(z_{t/2} - \mu_i) - \phi(z_{t/2} + \mu_i)(z_{t/2} + \mu_i) \\
&=& \phi(|z_{t/2}|+ \mu_i)(|z_{t/2}| + \mu_i) + \phi(|z_{t/2}| - \mu_i)(|z_{t/2}| - \mu_i).
\end{eqnarray*}
We can verify that for any given $t\in (0,1)$, there exists a unique $\mu_t \in (z_{t/2}, z_{t/2}+1)$, which is the root of $C^i_{t/2}(2)-C^i_{1-t/2}(2)=0$ for $\mu_i \in (|z_{t/2}|, |z_{t/2}|+1)$, and $C^i_{t/2}(2)-C^i_{1-t/2}(2) >0 $ if and only if $\mu_i \in (-\mu_t, \mu_t)$. This follows from the following facts and that $\phi(|z_{t/2}|+ \mu_i)(|z_{t/2}| + \mu_i) + \phi(|z_{t/2}| - \mu_i)(|z_{t/2}| - \mu_i)$ as a function of $\mu_i$ is symmetric about $0$.
\begin{itemize}
\item[(1)] When $\mu_i \in [-|z_{t/2}|, |z_{t/2}|]$, we have both $|z_{t/2}| + \mu_i>0$ and $|z_{t/2}| - \mu_i>0$; therefore $C^i_{t/2}(2)-C^i_{1-t/2}(2)>0$.
\item[(2)] When $\mu_i \geq |z_{t/2}|+1$, we have
\begin{eqnarray*}
C^i_{t/2}(2)-C^i_{1-t/2}(2) = \phi(u_1)(u_1) - \phi(u_2)(u_2) < 0,
\end{eqnarray*}
where $u_1 = \mu_i + |z_{t/2}|$, $u_2 = \mu_i - |z_{t/2}|$, and $u_1 > u_2 > 1$; and we can verify $\phi(u)u$ is straightly decreasing when $u> 1$.
\item[(3)] When $\mu_i \in (|z_{t/2}|, |z_{t/2}|+1)$, we have
\begin{eqnarray*}
&&\frac{\partial \left\{ C^i_{t/2}(2)-C^i_{1-t/2}(2) \right\}}{\partial \mu_i} \\
&=& \phi(|z_{t/2}|+\mu_i) \left\{ 1 - (|z_{t/2}|+\mu_i)^2 \right\}-\phi(|z_{t/2}|-\mu_i) \left\{ 1 - (|z_{t/2}|-\mu_i)^2 \right\}\\
&\leq & \phi(|z_{t/2}|+\mu_i)\left\{ (|z_{t/2}|-\mu_i)^2 - (|z_{t/2}|+\mu_i)^2\right\}\\
&=& -4\phi(|z_{t/2}|+\mu_i)|z_{t/2}|\mu_i <0,
\end{eqnarray*}
where ``$\leq$" is based on the facts that when $\mu_i \in (|z_{t/2}|, |z_{t/2}|+1)$, $1 - (|z_{t/2}-\mu_i)^2>0$ and $\phi(|z_{t/2}|+\mu_i)< \phi(|z_{t/2}|-\mu_i)$.
\end{itemize}
Furthermore, set
\begin{eqnarray*}
C_t^{\max} = \sup_{\mu\in (-\mu_t, \mu_t)} \left\{\phi(|z_{t/2}|+ \mu)(|z_{t/2}| + \mu) + \phi(|z_{t/2}| - \mu)(|z_{t/2}| - \mu)\right\},
\end{eqnarray*}
then we have $C^i_{t/2}(2)-C^i_{1-t/2}(2) \leq C_t^{\max}$.
and for $i_1 = 3$,
\begin{eqnarray*}
&&C^i_{t/2}(3)-C^i_{1-t/2}(3) \\ &=& - \phi(z_{t/2}-\mu_i)\left\{ (z_{t/2}-\mu_i)^2 - 1\right\} + \phi(z_{t/2}+\mu_i)\left\{ (z_{t/2}+\mu_i)^2 -1 \right\}\\
&=& - \phi(|z_{t/2}|+\mu_i)\left\{ (|z_{t/2}|+\mu_i)^2 - 1\right\} + \phi(|z_{t/2}|-\mu_i)\left\{ (|z_{t/2}|-\mu_i)^2 -1 \right\}
\end{eqnarray*}
\end{itemize}
We can conclude:
\begin{itemize}
\item when $\mu_i \neq 0$ and $\mu_j \neq 0$,
\begin{eqnarray*}
&&E(t_it_j) - E(t_i) E(t_j) \\&=& \left\{C^i_{t/2}(1)-C^i_{1-t/2}(1)\right\}\left\{C^j_{t/2}(1)-C^j_{1-t/2}(1)\right\}\sigma_{ij}\\
&&+ \frac{1}{2}\left\{C^i_{t/2}(2)-C^i_{1-t/2}(2)\right\}\left\{C^j_{t/2}(2)-C^j_{1-t/2}(2)\right\}\sigma_{ij}^2\\
&&+\frac{E\{g_3^2(X_1)\}}{(3!)^2} \left\{C_{t/2}^i(3) - C_{1-t/2}^i(3)\right\}\left\{C_{t/2}^j(3) - C_{1-t/2}^j(3)\right\}\sigma_{ij}^3+O(\sigma_{ij}^4);
\end{eqnarray*}
which verifies (P1).
\item when $\mu_i \neq 0$ but $\mu_j = 0$,
\begin{eqnarray*}
&& E(t_it_j) - E(t_i) E(t_j) = -\sigma_{ij}^2 \phi(z_{t/2})z_{t/2} \left\{ C_{t/2}^j(2) - C_{1-t/2}^j(2) \right\} + O(\sigma_{ij}^4) \\
&\leq & \phi(z_{t/2})|z_{t/2}| C_t^{\max} \sigma_{ij}^2 + O(\sigma_{ij}^4),
\end{eqnarray*}
when $\mu_i \in [-\mu_t, \mu_t]$, and
\begin{eqnarray*}
E(t_it_j) - E(t_i) E(t_j)< O(\sigma_{ij}^4),
\end{eqnarray*}
otherwise. Therefore, (P2) is proved.
\item when $\mu_i = 0$ and $\mu_j = 0$,
\begin{eqnarray*}
E(t_it_j) - E(t_i) E(t_j) = 2 \phi^2(z_{t/2})z_{t/2}^2 \sigma_{ij}^2 + O(\sigma_{ij}^4),
\end{eqnarray*}
which is our (P3) and we complete the proof of this lemma.
\end{itemize}
\end{proof}
\begin{lemma}\label{lem-6}
Recall the definition: $t_i = \mathrm{1}(|Z_i| > |z_{t/2}|) = \mathrm{1}(P_i < t)$; we have
\begin{equation*}
\begin{split}
&\sum_{i\neq j\neq k \neq l} \Big\{E(t_i t_j t_k t_l) - E(t_i t_j t_k)E(t_l) - E(t_i t_j t_l)E(t_k) - E(t_i t_k t_l)E(t_j) - E(t_j t_k t_l)E(t_i)\\
+ &E(t_i t_j)E(t_k)E(t_l) + E(t_i t_k)E(t_j)E(t_l) + E(t_i t_l)E(t_j)E(t_k) + E(t_j t_k)E(t_i)E(t_l)\\
+ &E(t_j t_l)E(t_i)E(t_k) + E(t_k t_l)E(t_i)E(t_j) -3E(t_i)E(t_j)E(t_k)E(t_l)\Big\}\\
= & 3\left[\sum_{i\neq j; i,j\in \mathcal{H}_1}\left\{C_{t/2}^i(1) - C_{1-t/2}^i(1)\right\}\left\{C_{t/2}^j(1) - C_{1-t/2}^j(1)\right\}\sigma_{ij}\right]^2 \\ &+ 3\left[\sum_{i\neq j; i,j\in \mathcal{H}_1}\left\{C_{t/2}^i(1) - C_{1-t/2}^i(1)\right\}\left\{C_{t/2}^j(1) - C_{1-t/2}^j(1)\right\}\sigma_{ij}\right]\\
&\times \left[\sum_{i\neq j}\left\{C_{t/2}^i(2) - C_{1-t/2}^i(2)\right\}\left\{C_{t/2}^j(2) - C_{1-t/2}^j(2)\right\}\sigma_{ij}^2\right] \\
& + O\left( \sum_{i\in \mathcal{H}_1}\left( \sum_{j\neq i, j\in\mathcal{H}_1} |\sigma_{ij}|\right)^3 \right) + O\left( \sum_{i\neq j} |\sigma_{ij}| \sum_{k\neq i, k\in \mathcal{H}_1} |\sigma_{ik}|\sum_{l\neq j, l\in \mathcal{H}_1}|\sigma_{jl}| \right)+ O\left( p^2 \sum_{i\neq j}\sigma_{ij}^4\right). \\
\end{split}
\end{equation*}
\end{lemma}
\begin{proof}
We can write
\begin{equation}
\begin{split}
&E(t_i t_j t_k t_l) - E(t_i t_j t_k)E(t_l) - E(t_i t_j t_l)E(t_k) - E(t_i t_k t_l)E(t_j) - E(t_j t_k t_l)E(t_i)\\
+ &E(t_i t_j)E(t_k)E(t_l) + E(t_i t_k)E(t_j)E(t_l) + E(t_i t_l)E(t_j)E(t_k) + E(t_j t_k)E(t_i)E(t_l)\\
+ &E(t_j t_l)E(t_i)E(t_k) + E(t_k t_l)E(t_i)E(t_j) -3E(t_i)E(t_j)E(t_k)E(t_l)\\
= & \sum_{a_1, a_2, a_3, a_4 = \{1, -1\}}a_1 a_2 a_3 a_4 h_{i, j, k, l; t}(a_1, a_2, a_3, a_4),
\end{split} \label{eq-lem6-1}
\end{equation}
where $h_{i, j, k, l}(a_1, a_2, a_3, a_4) = P(Z_i < a_1 z_{t/2}, Z_j < a_2 z_{t/2}, Z_k < a_3 z_{t/2}, Z_l < a_4 z_{t/2}) - P(Z_i < a_1 z_{t/2}, Z_j < a_2 z_{t/2}, Z_k < a_3 z_{t/2})P(Z_l < a_4 z_{t/2}) - P(Z_i < a_1 z_{t/2}, Z_j < a_2 z_{t/2}, Z_l < a_4 z_{t/2})P(Z_k < a_3 z_{t/2}) - P(Z_i < a_1 z_{t/2}, Z_k < a_3 z_{t/2}, Z_l < a_4 z_{t/2})P(Z_j < a_2 z_{t/2}) - P(Z_j < a_2 z_{t/2}, Z_k < a_3 z_{t/2}, Z_l < a_4 z_{t/2})P(Z_i < a_1 z_{t/2}) + P(Z_i < a_1 z_{t/2}, Z_j < a_2 z_{t/2})P(Z_k < a_3 z_{t/2})P(Z_l < a_4 z_{t/2}) + P(Z_i < a_1 z_{t/2}, Z_k < a_3 z_{t/2})P(Z_j < a_2 z_{t/2})P(Z_l < a_4 z_{t/2}) + P(Z_i < a_1 z_{t/2}, Z_l < a_4 z_{t/2})P(Z_j < a_2 z_{t/2})P(Z_k < a_3 z_{t/2}) + P(Z_j < a_2 z_{t/2}, Z_k < a_3 z_{t/2})P(Z_i < a_1 z_{t/2})P(Z_l < a_4 z_{t/2}) + P(Z_j < a_2 z_{t/2}, Z_l < a_4 z_{t/2})P(Z_i < a_1 z_{t/2})P(Z_k < a_3 z_{t/2}) + P(Z_k < a_3 z_{t/2}, Z_l < a_4 z_{t/2})P(Z_i < a_1 z_{t/2})P(Z_j < a_2 z_{t/2}) - 3P(Z_i < a_1 z_{t/2})P(Z_j < a_2 z_{t/2})P(Z_k < a_3 z_{t/2})P(Z_l < a_4 z_{t/2})$.
Next, we consider the terms in $h_{i,j,k,l}(1,1,1,1)$; those for other values of $a_1,\ldots, a_4$ can be similarly derived. Without loss of generality, we assume $\sigma_{ij}\geq0$ for $i=1,\ldots, p; j=1, \ldots, p$. Note that $h_{i,j,k,l}(1,1,1,1)$ contains 16 terms with the last three terms identical, and its first term is given by
\begin{equation}
\begin{split}
& P(Z_i < z_{t/2}, Z_j < z_{t/2}, Z_k < z_{t/2}, Z_l < z_{t/2})\\
= & \int \Phi \left(\dfrac{z_{t/2} - \mu_i - \sqrt{\sigma_{ij}}x_{1} - \sqrt{\sigma_{ik}}x_{2} - \sqrt{\sigma_{il}}x_{3}}{\sqrt{1 - \sigma_{ij} - \sigma_{ik} - \sigma_{il}}}\right)\Phi\left (\dfrac{z_{t/2} - \mu_j - \sqrt{\sigma_{ij}}x_{1} - \sqrt{\sigma_{jk}}x_{4} - \sqrt{\sigma_{jl}}x_{5}}{\sqrt{1 - \sigma_{ij} - \sigma_{jk} - \sigma_{jl}}}\right)\\
&\Phi \left(\dfrac{z_{t/2} - \mu_k - \sqrt{\sigma_{ik}}x_{2} - \sqrt{\sigma_{jk}}x_{4} - \sqrt{\sigma_{kl}}x_{6}}{\sqrt{1 - \sigma_{ik} - \sigma_{jk} - \sigma_{kl}}}\right)\Phi\left (\dfrac{z_{t/2} - \mu_l - \sqrt{\sigma_{il}}x_{3} - \sqrt{\sigma_{jl}}x_{5} - \sqrt{\sigma_{kl}}x_{6}}{\sqrt{1 - \sigma_{il} - \sigma_{jl} - \sigma_{kl}}}\right)\\
&\phi(x_1)\phi(x_2)\phi(x_3)\phi(x_4)\phi(x_5) \phi(x_6)dx_1 dx_2 dx_3 dx_4 dx_5 dx_6.\\
\end{split} \label{eq-lem6-2}
\end{equation}
Applying Taylor expansion and Lemma \ref{lem-3}, we have
\begin{equation*}
\begin{split}
&\Phi \left(\dfrac{z_{t/2} - \mu_i - \sqrt{\sigma_{ij}}x_{1} - \sqrt{\sigma_{ik}}x_{2} - \sqrt{\sigma_{il}}x_{3}}{\sqrt{1 - \sigma_{ij} - \sigma_{ik} - \sigma_{il}}}\right)\\
= & \sum_{i_1 + i_2 + i_3 \leq 7}C^{i}_{t/2}(i_1 + i_2 + i_3)g_{i_1}(x_1)g_{i_2}(x_2)g_{i_3}(x_3)(\sqrt{\sigma_{ij}})^{i_1}(\sqrt{\sigma_{ik}})^{i_2}(\sqrt{\sigma_{il}})^{i_3}/(i_1 + i_2 + i_3)! + R(\vec{\rho}),
\end{split}
\end{equation*}
where $R(\vec{\rho})$ is the Lagrange residual term in the Taylor's expansion, and $|R(\vec{\rho})| \lesssim |f(x_1, x_2, x_3)|(|\sigma_{ij}|^4 + |\sigma_{ik}|^4 + |\sigma_{il}|^4)$ up to a universal constant not depending on $x_1, x_2, x_3$, where
$f(x_1, x_2, x_3)$ is a finite order polynomial function of $\{x_1, x_2, x_3\}$. Similarly, we can apply Taylor expansion to other $\Phi(\cdot)$ terms in \eqref{eq-lem6-2}; we obtain
\begin{equation}\label{eq-lem6-3}
\begin{split}
& P(Z_i < z_{t/2}, Z_j < z_{t/2}, Z_k < z_{t/2}, Z_l < z_{t/2})\\
= & \int \sum_{\sum_{j = 1}^{12} i_j \leq 7}C^{i}_{t/2}(i_1 + i_2 + i_3)C^{j}_{t/2}(i_7 + i_4 + i_5)C^{k}_{t/2}(i_8 + i_{10} + i_6)C^{l}_{t/2}(i_{9} + i_{11} + i_{12})\\
& g_{i_1}(x_1) g_{i_7}(x_1)g_{i_2}(x_2)g_{i_8}(x_2)g_{i_3}(x_3)g_{i_{9}}(x_3)g_{i_{4}}(x_4)g_{i_{10}}(x_4)g_{i_{5}}(x_5)g_{i_{11}}(x_5)g_{i_{6}}(x_6)g_{i_{12}}(x_6)\\
&(\sqrt{\sigma_{ij}})^{i_1 + i_7}(\sqrt{\sigma_{ik}})^{i_2 + i_8}(\sqrt{\sigma_{il}})^{i_3 + i_9}(\sqrt{\sigma_{jk}})^{i_4 + i_{10}}(\sqrt{\sigma_{jl}})^{i_5 + i_{11}}(\sqrt{\sigma_{kl}})^{i_6 + i_{12}}\\
&/((i_1 + i_2 + i_3)!(i_7 + i_4 + i_5)!(i_8 + i_{10} + i_6)!(i_{9} + i_{11} + i_{12})!)\\
&\phi(x_1)\phi(x_2)\phi(x_3)\phi(x_4)\phi(x_5)\phi(x_6)dx_1 dx_2 dx_3 dx_4 dx_5 dx_6\\
&+ O\left(|\sigma_{ij}|^4 + |\sigma_{ik}|^4 +|\sigma_{il}|^4 + |\sigma_{jk}|^4 + |\sigma_{jl}|^4 + |\sigma_{kl}|^4\right).
\end{split}
\end{equation}
Applying Lemma \ref{lem-3}, \eqref{eq-lem6-3} can be further simplified to be
\begin{eqnarray}
&&P(Z_i < z_{t/2}, Z_j < z_{t/2}, Z_k < z_{t/2}, Z_l < z_{t/2}) \nonumber \\
&=& \sum_{\sum_{j=1}^6 i_j \in \{0, 1, 2, 3\} } C^{i}_{t/2}(i_1 + i_2 + i_3)C^{j}_{t/2}(i_1 + i_4 + i_5)C^{k}_{t/2}(i_2 + i_4 + i_6)C^{l}_{t/2}(i_3 + i_5 + i_6) \nonumber \\
&& \hspace{0.4in} \times \frac{\prod_{j=1}^6 E\left\{g_{i_j}^2(X_1)\right\} \sigma_{ij}^{i_1} \sigma_{ik}^{i_2}\sigma_{il}^{i_3}\sigma_{jk}^{i_4}\sigma_{jl}^{i_5} \sigma_{kl}^{i_6}}{(i_1 + i_2 + i_3)!(i_1 + i_4 + i_5)!(i_2 + i_5 + i_6)!(i_3 + i_5 + i_6)!} \nonumber \\
&&+ O\left(|\sigma_{ij}|^4 + |\sigma_{ik}|^4 +|\sigma_{il}|^4 + |\sigma_{jk}|^4 + |\sigma_{jl}|^4 + |\sigma_{kl}|^4\right). \label{eq-lem6-4}
\end{eqnarray}
where $X_1$ is a standard normal random variable. Recall that \eqref{eq-lem6-4} is the first term of $h_{i,j,k,l}(1,1,1,1)$; we next discuss how each subitem under the summation of the main part on the right hand side of \eqref{eq-lem6-4} associates with other terms contributes in the evaluation of \eqref{eq-lem6-1}. In particular, we shall discuss the possible values of $i_1, \ldots, i_6$; clearly if one of them is zero, its corresponding ``$\sigma$" term in \eqref{eq-lem6-4} does not appear in the expression.
\begin{itemize}
\item[(A1)] If the subscripts of the set of $\sigma$'s whose corresponding powers are nonzero contain and only contain three letters, and therefore one letter does not appear in these subscripts, the subitem in \eqref{eq-lem6-4} is identical to the corresponding subitem in one and only one of the second to fifth item in $h_{i,j,k,l}(1,1,1,1)$, whose coefficients are all ``$-$". As a consequence, they cancel each other.
For example $i_3 = i_5 = i_6 = 0$ but at least two of $\{i_1, i_2, i_4\}$ are nonzero, so that the set of $\sigma$ whose corresponding powers are nonzero is from $\{\sigma_{ij}, \sigma_{ik}, \sigma_{jk}\}$, and $\{i,j,k\}$ all appear in the subscript but $l$ does not. The subitem in \eqref{eq-lem6-4} is given by
\begin{eqnarray*}
&&C^{i}_{t/2}(i_1 + i_2 )C^{j}_{t/2}(i_1 + i_4 )C^{k}_{t/2}(i_2 + i_4 ) C^{l}_{t/2}(0) \nonumber \\
&& \hspace{0.4in} \times \frac{E\left\{g_{i_1}^2(X_1)\right\}E\left\{g_{i_2}^2(X_1)\right\} E\left\{g_{i_4}^2(X_1)\right\} \sigma_{ij}^{i_1} \sigma_{ik}^{i_2}\sigma_{jk}^{i_4}}{(i_1 + i_2 )!(i_1 + i_4 )!(i_2 + i_4)!},
\end{eqnarray*}
which is identical and only identical to a corresponding subitem in the Taylor expansion for the second item in $h_{i,j,k,l}(1,1,1,1)$ by noting that $C^{l}_{t/2}(0) = P(Z_l< z_{t/2})$; in particular, similarly to the development of \eqref{eq-lem6-4}, we are able to derive:
\begin{eqnarray}
&&P(Z_i < z_{t/2}, Z_j < z_{t/2}, Z_k < z_{t/2}) \nonumber \\
&=& \sum_{i_1 + i_2 + i_4 \in \{0, 1, 2, 3\} } C^{i}_{t/2}(i_1 + i_2 )C^{j}_{t/2}(i_1 + i_4 )C^{k}_{t/2}(i_2 + i_4 ) \nonumber \\
&& \hspace{0.4in} \times \frac{E\left\{g_{i_1}^2(X_1)\right\}E\left\{g_{i_2}^2(X_1)\right\} E\left\{g_{i_4}^2(X_1)\right\} \sigma_{ij}^{i_1} \sigma_{ik}^{i_2}\sigma_{jk}^{i_4}}{(i_1 + i_2 )!(i_1 + i_4 )!(i_2 + i_4)!} \nonumber \\
&&+ O\left(|\sigma_{ij}|^4 + |\sigma_{ik}|^4 +|\sigma_{jk}|^4\right). \label{eq-lem6-5}
\end{eqnarray}
\item[(A2)] If the subscripts of the set $\sigma$'s whose corresponding powers are nonzero contain only two letter in their subscripts, indicating that one and one and only of $i_j, j=1,\ldots, 6$ is nonzero, we can find two of the second to fifth terms and one of the sixth to thirteenth terms in $h_{i,j,k,l}(1,1,1,1)$ contain the same corresponding subitem in \eqref{eq-lem6-4}. Note that the coefficients of the second to fifth terms in $h_{i,j,k,l}(1,1,1,1)$ are ``-", while those of the sixth to thirteenth terms in $h_{i,j,k,l}(1,1,1,1)$ are "$+$", therefore they are cancelled.
For example, if we have only $i_1>0$, The subitem in \eqref{eq-lem6-4} is given by
\begin{eqnarray*}
C^{k}_{t/2}(0) C^{l}_{t/2}(0) C^{i}_{t/2}(i_1)C^{j}_{t/2}(i_1) \frac{E\left\{g_{i_1}^2(X_1)\right\} \sigma_{ij}^{i_1}}{(i_1!)^2},
\end{eqnarray*}
which is identical to the corresponding terms in $P(Z_i< z_{t/2}, Z_j<z_{t/2}, Z_k<Z_{t/2})P(Z_l<z_{t/2})$ by observing its Taylor expansion given by \eqref{eq-lem6-5}, $P(Z_i< z_{t/2}, Z_j<z_{t/2}, Z_l<Z_{t/2})P(Z_k<z_{t/2})$ (details are omitted), and $P(Z_i< z_{t/2}, Z_j<z_{t/2})P(Z_k<z_{t/2})P(Z_l<Z_{t/2})P(Z_k<z_{t/2})$, since
\begin{eqnarray*}
&&P(Z_i < z_{t/2}, Z_j < z_{t/2}) = \sum_{i_1 =0 }^3 \frac{C^{i}_{t/2}(i_1 )C^{j}_{t/2}(i_1 )E\left\{g_{i_1}^2(X_1)\right\} \sigma_{ij}^{i_1} }{(i_1!)^2} + O\left(|\sigma_{ij}|^4\right). \label{eq-lem6-6}
\end{eqnarray*}
\item[(A3)] If $i_j = 0$ for $j=1,\ldots, 6$, it can be checked that all the terms in $h_{i,j,k,l}(1,1,1,1)$ contain the subitem $C^{k}_{t/2}(0) C^{l}_{t/2}(0) C^{i}_{t/2}(0)C^{j}_{t/2}(0)$, where seven have the coefficient ``$+$", and the other seven have the coefficient ``$-$", therefore they cancel each other.
\end{itemize}
We observe that all the subitems in the second to the sixteenth items in $h_{i,j,k,l}(1,1,1,1)$ have been considered and therefore cancelled in Cases (A1)--(A3). Only the subitems with the set of $\sigma$'s whose corresponding powers are nonzeros contain all four letters in their subscripts. We consider the following possibilities.
\begin{itemize}
\item[(B1)] Only two $i_j$'s are nonzero; therefore only two $\sigma$'s appear in the subitem in \eqref{eq-lem6-4}. The corresponding $\sigma$ components in it have three possibilities: $\sigma_{ij}^{i_1}\sigma_{kl}^{i_6}$, $\sigma_{ik}^{i_2}\sigma_{jl}^{i_5}$, and $\sigma_{il}^{i_3} \sigma_{jk}^{i_4}$. These three cases can be considered similarly; as an example, we consider that it is $\sigma_{ij}^{i_1} \sigma_{kl}^{i_6}$, with $i_1>0$ and $i_6>0$. Furthermore since $0< i_1+i_6 \leq 3$, we must have ``$i_1 = 1, i_6 = 1$" or ``$i_1 = 1, i_6 = 2$" or ``$i_1 = 2, i_6 = 1$".
\begin{itemize}
\item If $i_1 = 1$ and $i_6 = 1$, the subitem in \eqref{eq-lem6-4} is give by
\begin{eqnarray*} C^{i}_{t/2}(1)C^{j}_{t/2}(1)C^{k}_{t/2}(1)C^{l}_{t/2}(1)\sigma_{ij} \sigma_{kl}, \end{eqnarray*}
and we can check that the corresponding subitem in $h_{i,j,k,l}(a_1, a_2, a_3, a_4)$ is given by
\begin{eqnarray*} &&\left\{C^{i}_{t/2}(1)\right\}^{\frac{1+a_1}{2}}\left\{C^{i}_{1-t/2}(1)\right\}^{\frac{1-a_1}{2}}\left\{C^{j}_{t/2}(1)\right\}^{\frac{1+a_2}{2}}\left\{C^{j}_{1-t/2}(1)\right\}^{\frac{1-a_2}{2}}\\
\times && \left\{C^{k}_{t/2}(1)\right\}^{\frac{1+a_3}{2}}\left\{C^{k}_{1-t/2}(1)\right\}^{\frac{1-a_3}{2}}\left\{C^{l}_{t/2}(1)\right\}^{\frac{1+a_4}{2}}\left\{C^{l}_{1-t/2}(1)\right\}^{\frac{1-a_4}{2}}\sigma_{ij} \sigma_{kl}. \end{eqnarray*}
Using the fact that $C_{t/2}^{a}(1) = C_{1-t/2}^{a}(1)$ when $\mu_a = 0$ given by \eqref{eq-lem3-0}, we can check that when one of $\{\mu_i, \mu_j, \mu_k, \mu_l\}$ is equal to 0, all these subtems will cancel each other across $h_{i,j,k,l}(a_1, a_2, a_3, a_4)$ when evaluating \eqref{eq-lem6-1}. Therefore this subitem is remained only when $\{\mu_i, \mu_j, \mu_k, \mu_l\}$ are all nonzero, and their contribution in \eqref{eq-lem6-1} is given by
\begin{eqnarray*}
\left\{C_{t/2}^i(1) - C_{1-t/2}^i(1)\right\}\left\{C_{t/2}^j(1) - C_{1-t/2}^j(1)\right\}\\\times \left\{C_{t/2}^k(1) - C_{1-t/2}^k(1)\right\}\left\{C_{t/2}^l(1) - C_{1-t/2}^l(1)\right\} \sigma_{ij}\sigma_{kl}.
\end{eqnarray*}
\item If $i_1=1$, $i_6 =2$, the subitem in \eqref{eq-lem6-4} is given by \begin{eqnarray*} \frac{1}{2}C^{i}_{t/2}(1)C^{j}_{t/2}(1)C^{k}_{t/2}(2)C^{l}_{t/2}(2)\sigma_{ij} \sigma_{kl}^2, \end{eqnarray*}
and the corresponding subitem in $h_{i,j,k,l}(a_1, a_2, a_3, a_4)$ is given by
\begin{eqnarray*} &&\left\{C^{i}_{t/2}(1)\right\}^{\frac{1+a_1}{2}}\left\{C^{i}_{1-t/2}(1)\right\}^{\frac{1-a_1}{2}}\left\{C^{j}_{t/2}(1)\right\}^{\frac{1+a_2}{2}}\left\{C^{j}_{1-t/2}(1)\right\}^{\frac{1-a_2}{2}}\\
\times && \left\{C^{k}_{t/2}(2)\right\}^{\frac{1+a_3}{2}}\left\{C^{k}_{1-t/2}(2)\right\}^{\frac{1-a_3}{2}}\left\{C^{l}_{t/2}(2)\right\}^{\frac{1+a_4}{2}}\left\{C^{l}_{1-t/2}(2)\right\}^{\frac{1-a_4}{2}}\sigma_{ij} \sigma_{kl}^2. \end{eqnarray*}
When $\mu_i = 0$ or $\mu_j = 0$, all these subitems will cancel each other across $h_{i,j,k,l}(a_1, a_2, a_3, a_4)$ when evaluating \eqref{eq-lem6-1}. Therefore this subitem is remained only when $\mu_i \neq 0$ and $\mu_j \neq 0$, and their contribution in \eqref{eq-lem6-1} is given by
\begin{eqnarray*}
\frac{1}{2}\left\{C_{t/2}^i(1) - C_{1-t/2}^i(1)\right\}\left\{C_{t/2}^j(1) - C_{1-t/2}^j(1)\right\}\\\times \left\{C_{t/2}^k(2) - C_{1-t/2}^k(2)\right\}\left\{C_{t/2}^l(2) - C_{1-t/2}^l(2)\right\} \sigma_{ij}\sigma_{kl}^2.
\end{eqnarray*}
\item If $i_1 = 2$ and $i_6 = 1$, we can similarly conclude that the corresponding subitem in $h_{i,j,k,l}(a_1, a_2, a_3, a_4)$ can be remained only when $\mu_k \neq 0$ and $\mu_l \neq 0$, and their contribution in \eqref{eq-lem6-1} is given by
\begin{eqnarray*}
\frac{1}{2}\left\{C_{t/2}^i(2) - C_{1-t/2}^i(2)\right\}\left\{C_{t/2}^j(2) - C_{1-t/2}^j(2)\right\}\\\times \left\{C_{t/2}^k(1) - C_{1-t/2}^k(1)\right\}\left\{C_{t/2}^l(1) - C_{1-t/2}^l(1)\right\} \sigma_{ij}^2\sigma_{kl}.
\end{eqnarray*}
\end{itemize}
In summary, for subitems considered in (B1), when summed over $i,j,k,l$ for $i\neq j\neq k \neq l$, they are equal to
\begin{eqnarray*}
3\left[\sum_{i\neq j; i,j\in \mathcal{H}_1}\left\{C_{t/2}^i(1) - C_{1-t/2}^i(1)\right\}\left\{C_{t/2}^j(1) - C_{1-t/2}^j(1)\right\}\sigma_{ij}\right]^2 \\ + 3\left[\sum_{i\neq j; i,j\in \mathcal{H}_1}\left\{C_{t/2}^i(1) - C_{1-t/2}^i(1)\right\}\left\{C_{t/2}^j(1) - C_{1-t/2}^j(1)\right\}\sigma_{ij}\right]\\
\times \left[\sum_{i\neq j}\left\{C_{t/2}^i(2) - C_{1-t/2}^i(2)\right\}\left\{C_{t/2}^j(2) - C_{1-t/2}^j(2)\right\}\sigma_{ij}^2\right].
\end{eqnarray*}
\item[(B2)] There are three $i_j$'s are nonzero, and therefore each is equal to 1. Note that the corresponding subscripts of $\sigma$ have six letters; and each of $i,j,k,l$ must appear at least once. There are two possibilities
\begin{itemize}
\item One letter appears three times, but each of the other letters appear once. For example, letter $i$ appears three times, but $j,k,l$ appear once, namely $i_1 = i_2 = i_3 = 1$, which corresponds to the subitem in \eqref{eq-lem6-4}:
\begin{eqnarray*}
C_{t/2}^i(3) C_{t/2}^j(1) C_{t/2}^k(1) C_{t/2}^l(1)\frac{\sigma_{ij} \sigma_{ik}\sigma_{il}}{3!}.
\end{eqnarray*}
Using similar arguments as those in (B1), we can conclude that this subitem is remained in $h_{i,j,k,l}(a_1, a_2, a_3, a_4)$ only when $\mu_i, \mu_j, \mu_k, \mu_l$ are all nonzero, and they are in the order of $O(\sigma_{ij}\sigma_{ik}\sigma_{il})$.
\item Two letters appear twice, but each of the other two letters appear once. For example, letter $i$ and $j$ appear twice, but $k,l$ appear once, namely $i_1 = i_2 = i_5 = 1$, which corresponds to the subitem in \eqref{eq-lem6-4}:
\begin{eqnarray*}
C_{t/2}^i(2) C_{t/2}^j(2) C_{t/2}^k(1) C_{t/2}^l(1)\frac{\sigma_{ij} \sigma_{ik}\sigma_{jl}}{2!2!}.
\end{eqnarray*}
Using similar arguments as those in (B1), we can conclude that this subitem is remained in $h_{i,j,k,l}(a_1, a_2, a_3, a_4)$ only when $\mu_k \neq 0$ and $\mu_l \neq 0$, and they are in the order of $O(\sigma_{ij} \sigma_{ik}\sigma_{jl})$.
\end{itemize}
In summary, the subitems considered in (B2), when summed over $i,j,k,l$ for $i\neq j\neq k\neq l$, they are in the order of
\begin{eqnarray*}
O\left( \sum_{i\in \mathcal{H}_1}\left( \sum_{j\neq i, j\in\mathcal{H}_1} |\sigma_{ij}|\right)^3 \right) + O\left( \sum_{i\neq j} |\sigma_{ij}| \sum_{k\neq i, k\in \mathcal{H}_1} |\sigma_{ik}|\sum_{l\neq j, l\in \mathcal{H}_1}|\sigma_{jl}| \right).
\end{eqnarray*}
\end{itemize}
\end{proof}
\begin{lemma}\label{lem-5}
Recall the definition: $t_i = \mathrm{1}(|Z_i| > |z_{t/2}|) = \mathrm{1}(P_i < t)$; we have
\begin{equation*}
\begin{split}
&\sum_{i\neq j\neq k}\Big|E(t_i t_j t_k) - E(t_i t_j)E(t_k) - E(t_i t_k)E(t_j) - E(t_j t_k)E(t_i) + 2E(t_i)E(t_j)E(t_k)\Big|\\
= & O\left(\sum_{i=1}^p \left(\sum_{j\neq i, j\in \mathcal{H}_1} |\sigma_{ij}|\right)^2 \right) + O\left(\sum_{i\in \mathcal{H}_1}\left( \sum_{j\neq i} |\sigma_{ij}|\right) \left( \sum_{k\neq i, k\in \mathcal{H}_1}|\sigma_{ik}|\right) \right) \\ &+ O\left(\sum_{i\neq j\neq k} |\sigma_{ij}\sigma_{ik} \sigma_{kl}| \right) + O\left (p \sum_{i\neq j} \sigma_{ij}^4 \right). \\
\end{split}
\end{equation*}
\end{lemma}
\begin{proof}
The proof of this lemma is similar to but simpler than that of Lemma \ref{lem-6}. The details are thus omitted.
\end{proof}
\begin{lemma}\label{lem-7}
Let
\begin{eqnarray*}
m(\bar{V},\bar{R}) = \frac{\bar{V}}{E(\bar{R})} - \frac{E(\bar{V})}{[E(\bar{R})]^2} \bar{R}.
\end{eqnarray*}
Assume $\limsup_{p\to \infty} p_0t/(p_1\bar \xi) < 1$, and as $p$ is sufficiently large,
\begin{eqnarray}
&& \sum_{i,j}|\sigma_{ij}| = O\left(p^{2-\delta}\right), \label{eq-lem7-assum-0}\\
&&\sum_{i\neq j; i,j\in \mathcal{H}_0} \sigma_{ij}^2 \geq \frac{C_t^{\max}}{\phi(z_{t/2})|z_{t/2}|} \sum_{i\in \mathcal{H}_1, j\in \mathcal{H}_0, \mu_i\in[-\mu_t, \mu_t]} \sigma_{ij}^2, \label{eq-lem7-assum-1-added} \\
&&\sum_{i\neq j; i,j\in \mathcal{H}_0} \sigma_{ij}^2 + p \gtrsim \sum_{i\neq j; i, j\in \mathcal{H}_1} \sigma_{ij}^2 \label{eq-lem7-assum-1-added-2}\\
&& \sum_{i\neq j} \sigma_{ij}^4 = o\left(\sum_{i\neq j; i,j\in \mathcal{H}_0} \sigma_{ij}^2 + p_0\right), \label{eq-lem7-assum-3}
\end{eqnarray}
where $\mu_t$ and $C_t^{\max}$ are defined in Lemma \ref{lem-4}.
We have
\begin{eqnarray}
E\left[\{R-E(R)\}^4\right] &=& o\left(p^4\mbox{Var}(m(\bar V, \bar R)\right) \label{eq-lem7-0-1}\\
E\left[\{V-E(V)\}^4\right] &=& o\left(p^4\mbox{Var}(m(\bar V, \bar R)\right). \label{eq-lem7-0-2}
\end{eqnarray}
\end{lemma}
\begin{proof}
We consider $\mbox{Var}\left(m(\bar{V},\bar{R})\right) $ first. Recall that $R = V + S$; therefore $\bar R = \bar V + \bar S$ with $\bar R = R/p$, $\bar V = V/p$ and $\bar S = S/p$, and
\begin{eqnarray*}
m(\bar{V},\bar{R}) &=& \frac{E(\bar S)}{\{E(\bar R)\}^2} \bar V - \frac{E(\bar V)}{\{E(\bar R)\}^2} \bar S\\
&=& A \left( \frac{\bar V}{E(\bar V)} - \frac{\bar S}{E(\bar S)} \right),
\end{eqnarray*}
where $A = E(\bar S) E(\bar V)/\{E(\bar R)\}^2$. We shall derive
\begin{eqnarray}
\mbox{Var}\left\{m(\bar{V},\bar{R})\right\} \gtrsim \frac{\sum_{i\neq j; i,j\in \mathcal{H}_0} \sigma_{ij}^2 + p_0 + \mbox{Var}(S)}{p^2}. \label{eq-lem7-1}
\end{eqnarray}
To this end,
consider
\begin{eqnarray}
\frac{1}{A^2}\mbox{Var}\left(m(\bar{V},\bar{R})\right) &=& \mbox{Var}(\bar V/E(\bar V)) + \mbox{Var}(\bar S/E(\bar S)) - 2\mbox{Cov}(\bar V/E(\bar V), \bar S/E(\bar S)), \label{eq-lem7-1-added-6}
\end{eqnarray}
and based on Lemma \ref{lem-4},
\begin{eqnarray}
&&\mbox{Cov}(\bar V/E(\bar V), \bar S/E(\bar S)) = \frac{1}{E(V) E(S)} \sum_{i\in \mathcal{H}_1, j\in \mathcal{H}_0} \left\{ E(t_it_j) - E(t_i)E(t_j) \right\} \nonumber\\
&\leq& \frac{\phi( z_{t/2})|z_{t/2}| C_t^{\max}}{p_0 p_1 t \bar \xi} \sum_{i\in \mathcal{H}_1, j\in \mathcal{H}_0; \mu_i \in[-\mu_t, \mu_t]} \sigma_{ij}^2 + \frac{1}{p_0 p_1 t \bar \xi} O\left(\sum_{i\in \mathcal{H}_1, j\in \mathcal{H}_0} \sigma_{ij}^4\right). \label{eq-lem7-1-added-7}
\end{eqnarray}
Combining \eqref{eq-lem7-1-added-6} with \eqref{eq-lem7-1-added-7}, and applying Lemma \ref{lem-4}, we have
\begin{eqnarray*}
\frac{1}{A^2}\mbox{Var}\left(m(\bar{V},\bar{R})\right) &\geq& \frac{2\phi^2(z_{t/2})z_{t/2}^2 \sum_{i\neq j; i,j\in \mathcal{H}_0} \sigma_{ij}^2 + p_0t(1-t) + O\left( \sum_{i\neq j, i,j\in \mathcal{H}_0} \sigma_{ij}^4\right)}{p_0^2 t^2}\\
&&-\frac{p_0 t}{p_1 \bar \xi}\frac{2 \phi(z_{t/2}) |z_{t/2}|C_t^{\max}}{p_0^2 t^2} \sum_{i\in \mathcal{H}_1, j\in \mathcal{H}_0; \mu_i \in [-\mu_t, \mu_t]} \sigma_{ij}^2 - \frac{O\left(\sum_{i\in \mathcal{H}_1, j\in \mathcal{H}_0} \sigma_{ij}^4\right)}{p_0p_1t\bar \xi} \\&&+ \mbox{Var}(S/E(S))\\
&\gtrsim& \frac{\sum_{i\neq j; i,j\in \mathcal{H}_0} \sigma_{ij}^2 + p_0}{p_0^2} + \mbox{Var}(S/E(S)),
\end{eqnarray*}
where ``$\gtrsim$" is based on assumptions \eqref{eq-lem7-assum-1-added} and \eqref{eq-lem7-assum-3}; this verifies \eqref{eq-lem7-1}.
We next consider $E[\{R-E(R)\}^4]$:
\begin{equation}\label{eq-lem7-2}
\begin{split}
&E[\{R-E(R)\}^4] = E(R^4) - 4E(R^3)E(R) + 6E(R^2)E^2(R) - 3E^4(R)\\
= & E\left\{\left(\sum_{i=1}^p t_i\right)^4\right\} - 4E\left\{\left(\sum_{i=1}^p t_i\right)^3\right\}E\left(\sum_{i=1}^p t_i\right) \\ &+ 6E\left\{\left(\sum_{i=1}^p t_i\right)^2\right\}E^2\left(\sum_{i=1}^p t_i\right) - 3E^4\left(\sum_{i=1}^p t_i\right)\\
= & E\left(\sum_{i, j, k, l = 1}^p t_i t_j t_k t_l\right) - 4E\left(\sum_{i, j, k = 1}^pt_it_jt_k\right)E\left(\sum_{l=1}^pt_l\right) \\ &+ 6E\left(\sum_{i, j = 1}^p t_it_j\right)E\left(\sum_{k=1}^pt_k\right)E\left(\sum_{l=1}^pt_l\right)\\
& - 3E\left(\sum_{i= 1}^p t_i\right)E\left(\sum_{j= 1}^p t_j\right)E\left(\sum_{k= 1}^p t_k\right)E\left(\sum_{l= 1}^p t_l\right).
\end{split}
\end{equation}
We need to consider the following possibilities:
\begin{itemize}
\item[(C1)] Based on Lemma \ref{lem-5}, the collection of terms in (\ref{eq-lem7-2}) where $\{i, j, k, l\}$ are all different is given by
\begin{equation}
\begin{split}
& \sum_{i\neq j\neq k \neq l}\Big\{E(t_i t_j t_k t_l) - E(t_i t_j t_k)E(t_l) - E(t_i t_j t_l)E(t_k) - E(t_i t_k t_l)E(t_j) - E(t_j t_k t_l)E(t_i)\\
+ &E(t_i t_j)E(t_k)E(t_l) + E(t_i t_k)E(t_j)E(t_l) + E(t_i t_l)E(t_j)E(t_k) + E(t_j t_k)E(t_i)E(t_l)\\
+ &E(t_j t_l)E(t_i)E(t_k) + E(t_k t_l)E(t_i)E(t_j) -3E(t_i)E(t_j)E(t_k)E(t_l)\Big\}\\
= &3\left[\sum_{i\neq j; i,j\in \mathcal{H}_1}\left\{C_{t/2}^i(1) - C_{1-t/2}^i(1)\right\}\left\{C_{t/2}^j(1) - C_{1-t/2}^j(1)\right\}\sigma_{ij}\right]^2 \\ & + 3\left[\sum_{i\neq j; i,j\in \mathcal{H}_1}\left\{C_{t/2}^i(1) - C_{1-t/2}^i(1)\right\}\left\{C_{t/2}^j(1) - C_{1-t/2}^j(1)\right\}\sigma_{ij}\right]\\
& \times \left[\sum_{i\neq j}\left\{C_{t/2}^i(2) - C_{1-t/2}^i(2)\right\}\left\{C_{t/2}^j(2) - C_{1-t/2}^j(2)\right\}\sigma_{ij}^2\right] \\
&+ O\left( \sum_{i\in \mathcal{H}_1}\left( \sum_{j\neq i, j\in\mathcal{H}_1} |\sigma_{ij}|\right)^3 \right) + O\left( \sum_{i\neq j} |\sigma_{ij}| \sum_{k\neq i, k\in \mathcal{H}_1} |\sigma_{ik}|\sum_{l\neq j, l\in \mathcal{H}_1}|\sigma_{jl}| \right)+ O\left( p^2 \sum_{i\neq j}\sigma_{ij}^4\right)\\
&\equiv 3\mathcal{I}_1 + 3\mathcal{I}_2 + \mathcal{I}_3 + \mathcal{I}_4 + \mathcal{I}_5.
\end{split} \label{eq-lem7-3}
\end{equation}
We consider the above $\mathcal{I}$ terms one by one. We consider $\mathcal{I}_1+\mathcal{I}_2$ first. Note that
\begin{eqnarray*}
\mathcal{I}_1 = \mathcal{I}_{1,1} \cdot \mathcal{I}_{1,1} \\
\mathcal{I}_2 = \mathcal{I}_{1,1} \cdot \mathcal{I}_{2,2},
\end{eqnarray*}
with
\begin{eqnarray*}
\mathcal{I}_{1,1} &=& \sum_{i\neq j; i,j\in \mathcal{H}_1}\left\{C_{t/2}^i(1) - C_{1-t/2}^i(1)\right\}\left\{C_{t/2}^j(1) - C_{1-t/2}^j(1)\right\}\sigma_{ij}\\
\mathcal{I}_{2,2} &=& \sum_{i\neq j}\left\{C_{t/2}^i(2) - C_{1-t/2}^i(2)\right\}\left\{C_{t/2}^j(2) - C_{1-t/2}^j(2)\right\}\sigma_{ij}^2.
\end{eqnarray*}
As a consequence
\begin{eqnarray}
\mathcal{I}_1 + \mathcal{I}_2 = \mathcal{I}_{1,1}(\mathcal{I}_{1,1} + \mathcal{I}_{2,2}), \label{eq-lem7-4-added}
\end{eqnarray}
and
we need to verify
\begin{eqnarray}
\mathcal{I}_1 + \mathcal{I}_2 = o\left(p^4\mbox{Var}(\bar V, \bar R) \right) \label{eq-lem7-4}
\end{eqnarray}
Based on the assumption \eqref{eq-lem7-assum-0}, we immediately have
\begin{eqnarray}
\mathcal{I}_{1,1} = o(p^2), \label{eq-lem7-5}
\end{eqnarray}
and we have the following decomposition for $\mathcal{I}_{2,2} + \mathcal{I}_{1,1}$:
\begin{eqnarray}
\mathcal{I}_{2,2} + \mathcal{I}_{1,1} &=& \left\{\mathcal{I}_{1,1} +\frac{1}{2}\mathcal{I}_{2,2} + \mathcal{I}_{2,3} + p_0t(1-t) + \sum_{i=1}^{p_1} \xi_i (1-\xi_i)\right\} \nonumber \\&& + \left\{\frac{1}{2}\mathcal{I}_{2,2} -\mathcal{I}_{2,3} - p_0t(1-t) - \sum_{i=1}^{p_1} \xi_i (1-\xi_i)\right\}, \label{eq-lem7-6}
\end{eqnarray}
where
\begin{eqnarray*}
\mathcal{I}_{2,3} = \frac{E\{g_3^2(X_1)\}}{(3!)^2}\sum_{i \neq j} \left\{C_{t/2}^i(3) - C_{1-t/2}^i(3)\right\}\left\{C_{t/2}^j(3) - C_{1-t/2}^j(3)\right\}\sigma_{ij}^3. \label{eq-lem7-7}
\end{eqnarray*}
Furthermore, with Lemmas \ref{lem-3} and \ref{lem-4}, we are able to check
\begin{eqnarray}
\mbox{Var}(R) &=& \sum_{i\neq j} \{E(t_it_j) - E(t_i)E(t_j)\} + \sum_{i=1}^p \left[E(t_i^2) - \{E(t_i)\}^2\right] \nonumber \\
&=& \mathcal{I}_{1,1} +\frac{1}{2}\mathcal{I}_{2,2} + \mathcal{I}_{2,3} + p_0t(1-t) + \sum_{i=1}^{p_1} \xi_i (1-\xi_i) + O\left(\sum_{i\neq j} \sigma_{ij}^4 \right), \label{eq-lem7-8}
\end{eqnarray}
and
\begin{eqnarray}
&&\mbox{Var}(V) + 2 \mbox{Cov}(V, S) \nonumber \\&=& \sum_{i\neq j; i,j\in \mathcal{H}_0} \{E(t_it_j) - E(t_i)E(t_j)\} \nonumber \\&& + \sum_{i\in \mathcal{H}_1, j\in \mathcal{H}_0} \{E(t_it_j) - E(t_i)E(t_j)\} + \sum_{i=1}^{p_0} \left[E(t_i^2) - \{E(t_i)\}^2\right]\nonumber \\
&=& \frac{1}{2}\mathcal{I}_{2,2} + p_0t(1-t) \nonumber \\ && - \frac{1}{2}\sum_{i\neq j; i,j\in \mathcal{H}_1} \left\{C_{t/2}^i(2) - C_{1-t/2}^i(2)\right\}\left\{C_{t/2}^j(2) - C_{1-t/2}^j(2)\right\}\sigma_{ij}^2 \nonumber \\
&& + O\left(\sum_{i\neq j}\sigma_{ij}^4 \right)\label{eq-lem7-9}
\end{eqnarray}
Combining \eqref{eq-lem7-6}, \eqref{eq-lem7-8}, and \eqref{eq-lem7-9} leads to
\begin{eqnarray}
\mathcal{I}_{2,2} + \mathcal{I}_{1,1} &=& \mbox{Var}(R) + \mbox{Var}(V) + 2 \mbox{Cov}(V,S) - 2p_0t(1-t) - \sum_{i=1}^{p_1} \xi_i (1-\xi_i)\nonumber\\&&
- I_{2,3} + \frac{1}{2} \sum_{i\neq j; i,j\in \mathcal{H}_1} \left\{C_{t/2}^i(2) - C_{1-t/2}^i(2)\right\}\left\{C_{t/2}^j(2) - C_{1-t/2}^j(2)\right\}\sigma_{ij}^2\nonumber\\
&& + O\left(\sum_{i\neq j}\sigma_{ij}^4 \right)\nonumber\\
&=& 2\mbox{Var}(V) + 4\mbox{Cov}(V, S) + \mbox{Var}(S) - 2p_0t(1-t) - \sum_{i=1}^{p_1} \xi_i (1-\xi_i)\nonumber\\&&
- I_{2,3} + \frac{1}{2} \sum_{i\neq j; i,j\in \mathcal{H}_1} \left\{C_{t/2}^i(2) - C_{1-t/2}^i(2)\right\}\left\{C_{t/2}^j(2) - C_{1-t/2}^j(2)\right\}\sigma_{ij}^2\nonumber \\
&& + O\left(\sum_{i\neq j}\sigma_{ij}^4 \right). \label{eq-lem7-10}
\end{eqnarray}
Based on \eqref{eq-lem7-1} and Cauchy-Schwartz inequality, we conclude
\begin{equation}
2\mbox{Var}(V) + 4\mbox{Cov}(V, S) + \mbox{Var}(S) - 2p_0t(1-t) - \sum_{i=1}^{p_1} \xi_i (1-\xi_i) = O\left(p^2\mbox{Var}(m(\bar V, \bar R)\right); \label{eq-lem7-11}
\end{equation}
and based on the assumptions \eqref{eq-lem7-assum-1-added-2} and \eqref{eq-lem7-assum-3}, we have
\begin{equation}
\frac{1}{2} \sum_{i\neq j; i,j\in \mathcal{H}_1} \left\{C_{t/2}^i(2) - C_{1-t/2}^i(2)\right\}\left\{C_{t/2}^j(2) - C_{1-t/2}^j(2)\right\}\sigma_{ij}^2
+ O\left(\sum_{i\neq j}\sigma_{ij}^4 \right) = O\left(p^2\mbox{Var}(m(\bar V, \bar R)\right) \label{eq-lem7-12}
\end{equation}
Combining \eqref{eq-lem7-10} \eqref{eq-lem7-11} and \eqref{eq-lem7-12}, we have
\begin{eqnarray*}
\mathcal{I}_{2,2} + \mathcal{I}_{1,1} &=& -\mathcal{I}_{2,3} + O\left(p^2\mbox{Var}(m(\bar V, \bar R)\right),
\end{eqnarray*}
which together with \eqref{eq-lem7-5} leads to
\begin{eqnarray}
\mathcal{I}_{1,1}(\mathcal{I}_{2,2} + \mathcal{I}_{1,1}) = -\mathcal{I}_{1,1}\mathcal{I}_{2,3} + o\left(p^4\mbox{Var}(m(\bar V, \bar R)\right). \label{eq-lem7-13}
\end{eqnarray}
For $\mathcal{I}_{1,1}\mathcal{I}_{2,3}$:
\begin{eqnarray*}
|\mathcal{I}_{1,1}\mathcal{I}_{2,3}| \lesssim \sum_{i\neq j; i,j\in \mathcal{H}_1}|\sigma_{i,j}|\sum_{k\neq l}|\sigma_{k,l}|^3 \lesssim p^2 \sum_{i\neq j} \sigma_{ij}^4 = o\left(p^4\mbox{Var}(m(\bar V, \bar R)\right),
\end{eqnarray*}
which together with \eqref{eq-lem7-13} and \eqref{eq-lem7-4-added} verifies \eqref{eq-lem7-4}.
We proceed to consider $\mathcal{I}_3$.
\begin{eqnarray}
\sum_{i\neq j\neq k\neq l; i,j,k,l\in \mathcal{H}_1}|\sigma_{ij}||\sigma_{ik}||\sigma_{il}|&\leq& \sum_{k\ne l, k,l\in \mathcal{H}_1}\left(\sum_{i\neq j, i,j\in \mathcal{H}_1} \sigma_{ij}^2\right)^{1/2}\left(\sum_{i\neq j\neq k\neq l; i,j\in \mathcal{H}_1}\sigma_{ik}^2 \sigma_{il}^2\right)^{1/2}\nonumber\\
&=& \left(\sum_{i\neq j; i,j\in \mathcal{H}_1} \sigma_{ij}^2\right)^{1/2} \sum_{k\neq l; k,l\in \mathcal{H}_1}\left\{(p_1-3) \sum_{i\neq k\neq l; i\in \mathcal{H}_1}(\sigma_{ik}^2 \sigma_{il}^2)\right\}^{1/2}\nonumber \\
&\leq& p_1(p_1-3)^{1/2}\left(\sum_{i\neq j; i,j\in \mathcal{H}_1} \sigma_{ij}^2\right)^{1/2} \left\{ \sum_{k\neq l\neq i; i,k,l\in \mathcal{H}_1} (\sigma_{ik}^2 \sigma_{il}^2) \right\}^{1/2}\nonumber \\
&\lesssim & p_1^{3/2}\left(\sum_{i\neq j; i,j\in \mathcal{H}_1} \sigma_{ij}^2\right)^{1/2} \left( p_1\sum_{i\neq k; i,k\in \mathcal{H}_1} \sigma_{ik}^4 + p\sum_{i\neq l; i,l\in \mathcal{H}_1} \sigma_{il}^4 \right)^{1/2}\nonumber\\
&=& p_1^2 \left(\sum_{i\neq j; i,j\in \mathcal{H}_1} \sigma_{ij}^2\right)^{1/2} \left(2\sum_{i\neq j; i,j\in \mathcal{H}_1}\sigma_{ij}^4\right)^{1/2}, \label{eq-lem7-14-added-1}
\end{eqnarray}
where the first ``$\leq$" is because of the Cauchy–Schwarz inequality, the second ``$\leq$" is derived from the Jensen's inequality by noting that $\sqrt{x}$ is a concave function, the ``$\lesssim$" is based on $\sigma_{ik}^2\sigma_{il}^2 \lesssim \sigma_{ik}^4 + \sigma_{il}^4$. The far right hand side of \eqref{eq-lem7-14-added-1}
is in the order of $o\left(p^4\mbox{Var}(m(\bar V, \bar R)\right)$ based on \eqref{eq-lem7-1} and the assumptions \eqref{eq-lem7-assum-1-added-2} and \eqref{eq-lem7-assum-3}; this implies
\begin{eqnarray}
\mathcal{I}_3 = O\left( \sum_{i\in \mathcal{H}_1}\left( \sum_{j\neq i, j\in\mathcal{H}_1} |\sigma_{ij}|\right)^3 \right) = o\left(p^4\mbox{Var}(m(\bar V, \bar R)\right). \label{eq-lem7-14}
\end{eqnarray}
Similarly to the development of \eqref{eq-lem7-14-added-1}, we can obtain
\begin{eqnarray}
\mathcal{I}_4 = O\left( \sum_{i\neq j} |\sigma_{ij}| \sum_{k\neq i, k\in \mathcal{H}_1} |\sigma_{ik}|\sum_{l\neq j, l\in \mathcal{H}_1}|\sigma_{jl}| \right) = o\left(p^4\mbox{Var}(m(\bar V, \bar R)\right). \label{eq-lem7-15}
\end{eqnarray}
Last,
\begin{eqnarray}
\mathcal{I}_5 = O\left( p^2 \sum_{i\neq j}\sigma_{ij}^4\right) = o\left(p^4\mbox{Var}(m(\bar V, \bar R)\right) \label{eq-lem7-16}
\end{eqnarray}
is implied by \eqref{eq-lem7-1} and the assumption \eqref{eq-lem7-assum-3}.
Combining \eqref{eq-lem7-4}, \eqref{eq-lem7-14}, \eqref{eq-lem7-15}, and \eqref{eq-lem7-16}, we conclude that the collection of terms in \eqref{eq-lem7-2} where $\{i,j,k,l\}$ are all different is in the order of $o\left(p^4\mbox{Var}(m(\bar V, \bar R)\right)$.
\item[(C2)] If one and only one pair in $\{i, j, k, l\}$ are equal to each other, as an example, we consider $i\neq j \neq k=l$, the collection of terms in (\ref{eq-lem7-2}) is given by
\begin{equation}
\begin{split}
& \sum_{i\neq j\neq k}\Big\{E(t_it_j t_k) - E(t_it_k)E(t_j) - E(t_jt_k)E(t_i) - 2E(t_i t_j t_k)E(t_k)
+ E(t_i)E(t_j)E(t_k) \\& + 2E(t_i t_k)E(t_j)E(t_k) + 2E(t_j t_k)E(t_i)E(t_k) + E(t_i t_j)E^2(t_k) -3E^2(t_k)E(t_i)E(t_j)\Big\}\\
= & \sum_{i\neq j \neq k} \Big[\big\{E(t_i t_j t_k) - E(t_i t_k)E(t_j) - E(t_j t_k)E(t_i) - E(t_i t_j)E(t_k) \\ & \hspace{0.6in} + 2E(t_i)E(t_j)E(t_k)\big\}\{1 - 2E(t_k)\}\Big] \\ &+ \sum_{i\neq j \neq k}\big\{E(t_k) - E^2(t_k)\big\}\big\{E(t_i t_j) - E(t_i)E(t_j)\big\}\\
=& O\left(\sum_{i=1}^p \left(\sum_{j\neq i, j\in \mathcal{H}_1} |\sigma_{ij}|\right)^2 \right) + O\left(\sum_{i\in \mathcal{H}_1}\left( \sum_{j\neq i} |\sigma_{ij}|\right) \left( \sum_{k\neq i, k\in \mathcal{H}_1}|\sigma_{ik}|\right) \right) \\ &+ O\left(\sum_{i\neq j\neq k} |\sigma_{ij}\sigma_{ik} \sigma_{kl}| \right) + O\left (p \sum_{i\neq j} \sigma_{ij}^4 \right) + O\left(p \sum_{i\neq j}\sigma_{ij}^2\right) + O\left(p \sum_{i\neq j; i,j \in \mathcal{H}_1} |\sigma_{ij}|\right)\\
=& \mathcal{I}_6 + \mathcal{I}_7 + \mathcal{I}_8 + \mathcal{I}_9 + \mathcal{I}_{10} + \mathcal{I}_{11},
\end{split} \label{eq-lem7-17}
\end{equation}
where to achieve the second ``$=$", we have applied Lemmas \ref{lem-4} and \ref{lem-5}. Next, we consider these ``$\mathcal{I}$" terms one by one.
For $\mathcal{I}_6$, since $|\sigma_{ij}|<1$, therefore by noting \eqref{eq-lem7-1} and the assumption \eqref{eq-lem7-assum-0}, we have
\begin{eqnarray}
\mathcal{I}_6 = O\left(\sum_{i=1}^p \left(\sum_{j\neq i, j\in \mathcal{H}_1} |\sigma_{ij}|\right)^2 \right)\lesssim p_1 \sum_{j\neq i, j\in \mathcal{H}_1}|\sigma_{ij}| = p_1O(p^{2-\delta})= o\left(p^4\mbox{Var}(m(\bar V, \bar R)\right);
\end{eqnarray}
and similarly
\begin{eqnarray}
\mathcal{I}_7 = O\left(\sum_{i\in \mathcal{H}_1}\left( \sum_{j\neq i} |\sigma_{ij}|\right) \left( \sum_{k\neq i, k\in \mathcal{H}_1}|\sigma_{ik}|\right) \right) \lesssim p \sum_{i\neq k; i,k \in \mathcal{H}_1} |\sigma_{ik}| = o\left(p^4\mbox{Var}(m(\bar V, \bar R)\right).
\end{eqnarray}
For $\mathcal{I}_8$, since $|\sigma_{ij}|<1$, we have
\begin{eqnarray}
\mathcal{I}_8 = O\left(\sum_{i\neq j\neq k} |\sigma_{ij}\sigma_{ik} \sigma_{kl}| \right) \lesssim p \sum_{i\neq j} |\sigma_{ij}| = o\left(p^4\mbox{Var}(m(\bar V, \bar R)\right).
\end{eqnarray}
For $\mathcal{I}_9$ and $\mathcal{I}_{10}$, clearly
\begin{eqnarray}
\mathcal{I}_9 \lesssim \mathcal{I}_{10} = o\left(p^4\mbox{Var}(m(\bar V, \bar R))\right);
\end{eqnarray}
and
\begin{eqnarray}
\mathcal{I}_{11} = O\left(p \sum_{i\neq j; i,j \in \mathcal{H}_1} |\sigma_{ij}|\right) = o\left(p^4\mbox{Var}(m(\bar V, \bar R))\right) \label{eq-lem7-18}
\end{eqnarray}
is obtained based on the assumption \eqref{eq-lem7-assum-0}.
Combining \eqref{eq-lem7-17}--\eqref{eq-lem7-18}, we conclude that the collection of terms in \eqref{eq-lem7-2} where one and only one pair in $\{i,j,k,l\}$ are equal to each other is in the order of $o\left(p^4\mbox{Var}(m(\bar V, \bar R)\right)$.
\item[(C3)] The collection of terms in \eqref{eq-lem7-2} where two pairs in
$\{i, j, k, l\}$ are equal to each other carries only $O(p^2)$ terms; then based on \eqref{eq-lem7-1}, we conclude that this collection of terms is in the order of $o\left(p^4\mbox{Var}(m(\bar V, \bar R)\right)$.
\item[(C4)] The collection of terms in \eqref{eq-lem7-2} where at least three of $\{i, j, k, l\}$ are mutually equal to each other also carries $O(p^2)$ terms, therefore this collection of terms is in the order of $o\left(p^4\mbox{Var}(m(\bar V, \bar R)\right)$.
\end{itemize}
In summary, the discussion of (C1)--(C4) implies
\begin{eqnarray*}
E[\{R-E(R)\}^4] = o\left(p^4\mbox{Var}(m(\bar V, \bar R))\right),
\end{eqnarray*}
which complete the proof for \eqref{eq-lem7-0-1}.
The proof for \eqref{eq-lem7-0-2} is similar but simpler. In particular, similar developments in Lemmas \ref{lem-6} and \ref{lem-7} can be applied to derive the rates of convergence for the terms in $E(V-E(V))^4$.
But we observe that
since $V$ is the summation of $t_i$ over $i\in \mathcal{H}_0$, the corresponding terms involving $\mathcal{H}_1$ in both Lemmas will not appear, which simplifies the developments. Here we skip the details for this development to avoid lengthy presentations.
\end{proof}
\begin{lemma} \label{lem-1}
Suppose $(Z_{1},\ldots,Z_{p})^{T} \sim N((\mu_{1},\ldots,\mu_{p})^{T},\boldsymbol{\Sigma})$ with unit variances, i.e., $\sigma_{jj}=1\text{ for } j=1,\ldots,p$. For any pair of indices $(i, j)$ with $i \ne j$,
\begin{align*}
\frac{\partial\mathrm{Cov}(t_i, t_j)}{\partial\sigma_{ij}} = \frac{1}{2\pi\sqrt{1-\sigma_{ij}^2}} & \left[ \exp \left\{-\frac{\mu_{i-}^2 + \mu_{j-}^2 - 2\sigma_{ij}\mu_{i-}\mu_{j-}}{2(1-\sigma_{ij}^2)} \right\} + \exp \left\{-\frac{\mu_{i+}^2 + \mu_{j+}^2 - 2\sigma_{ij}\mu_{i+}\mu_{j+}}{2(1-\sigma_{ij}^2)} \right\} \right. \\
& \left. - \exp \left\{-\frac{\mu_{i-}^2 + \mu_{j+}^2 - 2\sigma_{ij}\mu_{i-}\mu_{j+}} {2(1-\sigma_{ij}^2)} \right\} - \exp \left\{-\frac{\mu_{i+}^2 + \mu_{j-}^2 - 2\sigma_{ij} \mu_{i+}\mu_{j-}} {2(1-\sigma_{ij}^2)} \right\} \right],
\end{align*}
where $\mu_{i-} = \mu_i + z_{t/2}$ and $\mu_{i+} = \mu_i - z_{t/2}$ for $i = 1,\ldots,p$.
\end{lemma}
\begin{proof}
Let $R = (-\infty, z_{t/2}) \cup (-z_{t/2}, \infty)$ and $R-\mu_i = (-\infty, z_{t/2}-\mu_i) \cup (-z_{t/2}-\mu_i, \infty)$, then
\begin{align*}
& P(|Z_i| > |z_{t/2}|, |Z_j| > |z_{t/2}|) \\
= {} & \int_{R} \phi(z_i - \mu_i) \int_{R} \frac{1}{\sqrt{1 - \sigma_{ij}^2}} \phi \left\{\frac{(z_j - \mu_j) - \sigma_{ij}(z_i - \mu_i)}{\sqrt{1 - \sigma_{ij}^2}} \right\} dz_j dz_i \\
= {} & \int_{R} \phi(z_i - \mu_i) \left[ \Phi \left\{\frac{- \mu_{j+} - \sigma_{ij}(z_i - \mu_i)}{\sqrt{1 - \sigma_{ij}^2}} \right\} + \Phi \left\{\frac{\mu_{j-} + \sigma_{ij}(z_i - \mu_i)}{\sqrt{1 - \sigma_{ij}^2}} \right\} \right] dz_i \\
= {} & \int_{R-\mu_i} \phi(z_i) \left[ 1 - \Phi \left(\frac{ \mu_{j+} + \sigma_{ij}z_i}{\sqrt{1 - \sigma_{ij}^2}} \right) + \Phi \left(\frac{\mu_{j-} + \sigma_{ij}z_i}{\sqrt{1 - \sigma_{ij}^2}} \right) \right] dz_i
\end{align*}
where the first equality holds because the conditional distribution of $Z_j$ given $Z_i = z_i$ is $N[\mu_j + \sigma_{ij} (z_i - \mu_i), 1-\sigma_{ij}^2]$. Then,
\begin{align*}
\frac{\partial \mathrm{Cov}(t_i, t_j)}{\partial \sigma_{ij}} = {} & \frac{\partial P(|Z_i| > |z_{t/2}|, |Z_j| > |z_{t/2}|)}{\partial \sigma_{ij}}\\
= {} & - (1-\sigma_{ij}^2)^{-3/2} \int_{R-\mu_i} \phi(z_i) \phi\left(\frac{\mu_{j+} + \sigma_{ij}z_i}{\sqrt{1 - \sigma_{ij}^2}} \right) (\mu_{j+} \sigma_{ij} + z_i) dz_i \notag\\
& + (1-\sigma_{ij}^2)^{-3/2} \int_{R - \mu_i} \phi(z_i) \phi\left(\frac{\mu_{j-} + \sigma_{ij}z_i}{\sqrt{1 - \sigma_{ij}^2}} \right) (\mu_{j-} \sigma_{ij} + z_i) dz_i \\
= {} & - \frac{1}{2 \pi} (1-\sigma_{ij}^2)^{-3/2} \int_{R - \mu_i} \exp\left\{-\frac{z_{i}^{2} + 2 \sigma_{ij} z_{i} \mu_{j+} + \mu_{j+}^{2}}{2(1-\sigma_{ij}^{2})} \right\} (\mu_{j+} \sigma_{ij} + z_i) dz_i \\
& + \frac{1}{2 \pi} (1-\sigma_{ij}^2)^{-3/2} \int_{R - \mu_i} \exp\left\{-\frac{z_{i}^{2} + 2 \sigma_{ij} z_{i} \mu_{j-} + \mu_{j-}^{2}}{2(1-\sigma_{ij}^{2})} \right\} (\mu_{j-} \sigma_{ij} + z_i) dz_i\\
= {} & \frac{1}{2 \pi \sqrt{1-\sigma_{ij}^2}} \left[ \exp\left\{-\frac{\mu_{i+}^2 + \mu_{j+}^2 - 2 \sigma_{ij} \mu_{i+}\mu_{j+}}{2(1-\sigma_{ij}^{2})}\right\} - \exp\left\{-\frac{\mu_{i-}^2 + \mu_{j+}^2 - 2 \sigma_{ij} \mu_{i-}\mu_{j+}}{2(1-\sigma_{ij}^{2})}\right\} \right. \\
& \left. - \exp\left\{-\frac{\mu_{i+}^2 + \mu_{j-}^2 - 2 \sigma_{ij} \mu_{i+}\mu_{j-}}{2(1-\sigma_{ij}^{2})}\right\} + \exp\left\{-\frac{\mu_{i-}^2 + \mu_{j-}^2 - 2 \sigma_{ij} \mu_{i-}\mu_{j-}}{2(1-\sigma_{ij}^{2})}\right\}\right].
\end{align*}
\end{proof}
\section{Proof of Theorem \ref{Thm-1} and Corollary \ref{Corrollary-asym-var}} \label{sec-proof-thm-1}
Define $\bar{V} = V(t)/p$ and $\bar{R} = R(t)/p$, then $\mathrm{FDP}(t) = \bar{V}/\bar{R}$. Let $H(v,r)= v/r$ be a function of $(v,r)$ and apply Taylor expansion on this function at $(E(\bar V), E(\bar R))$ and plugging in $v = \bar V$, $r = \bar R \vee c$ to the expansion, where $\bar R\vee c = \max\{\bar R, c\}$ and $c$ is a sufficiently small constant with $0<c<0.5E(\bar R)$; we have
\begin{eqnarray*}
\frac{\bar V}{\bar R\vee c} = \frac{E(\bar{V})}{E(\bar{R})} + \frac{\bar{V} - E(\bar{V})}{E(\bar{R})} - \frac{E(\bar{V})}{\{E(\bar{R})\}^2}\Big\{\bar{R}\vee c - E(\bar{R})\Big\} + r^*(\bar{V}, \bar{R}), \label{eq-thm1-1}
\end{eqnarray*}
where $r^*(\bar V, \bar R)$ is the remainder term in the Taylor expansion. Since $E(\bar R) > c$ and $\bar R\vee c\geq c$, and in an arbitrary order of the partial derivatives of the function $H(v,r)$, only $r$ can appear in the denominator, therefore, we can verify
\begin{eqnarray}
|r^*(\bar V, \bar R)| \lesssim \left\{\bar V - E(\bar V)\right\}^2 + \left\{\bar R \vee c - E(\bar R)\right\}^2. \label{eq-thm1-2}
\end{eqnarray}
Therefore, we can have
\begin{eqnarray}
\mbox{FDP}(t) = E(\bar V)/E(\bar R) + m(\bar{V},\bar{R}) + \mathcal{J} +r^*(\bar V, \bar R), \label{eq-thm1-3}
\end{eqnarray}
where
\begin{eqnarray*}
m(\bar{V},\bar{R}) &=& \frac{\bar{V}}{E(\bar{R})} - \frac{E(\bar{V})}{\{E(\bar{R})\}^2} \bar{R} \label{eq-thm1-4}\\
\mathcal{J} &=& \frac{\bar V}{\bar R} - \frac{\bar V}{\bar R \vee c}. \label{eq-thm1-5}
\end{eqnarray*}
Define $r(\bar V, \bar R) = r^*(\bar V, \bar R) + \mathcal{J}$. To complete the proof of the theorem, it suffices to show that both $E(\mathcal{J}^2)$ and $E\{r^{*2}(\bar V, \bar R)\}$ can be dominated by $\mbox{Var}\{m(\bar{V},\bar{R})\}$. We consider $E\{r^{*2}(\bar V, \bar R)\}$ first. Based on \eqref{eq-thm1-1}, we have
\begin{eqnarray*}
|r^*(\bar V, \bar R)| &\lesssim& \left\{\bar V - E(\bar V)\right\}^2 + \left\{\bar R \vee c - \bar R\right\}^2 + \left\{ \bar R - E(\bar R)\right\}^2\\
&=&\left\{\bar V - E(\bar V)\right\}^2 + \left\{ c - \bar R\right\}^2\mathrm{1}(\bar R < c) + \left\{ \bar R - E(\bar R)\right\}^2\\
&\leq & \left\{\bar V - E(\bar V)\right\}^2 + c^2\mathrm{1}(\bar R < c) + \left\{ \bar R - E(\bar R)\right\}^2, \label{eq-thm1-6}
\end{eqnarray*}
which leads to
\begin{eqnarray}
E\left\{r^{*2}(\bar V, \bar R)\right\}
&\lesssim& E\left\{\bar V - E(\bar V)\right\}^4 + c^4P(\bar R < c) + E\left\{ \bar R - E(\bar R)\right\}^4 \nonumber \\
&\leq & E\left\{\bar V - E(\bar V)\right\}^4 + 2 E\left\{ \bar R - E(\bar R)\right\}^4, \label{eq-thm1-7}
\end{eqnarray}
since based on the definition of $c\in (0, 0.5 E(\bar R))$, we have
\begin{eqnarray*}
P(\bar R<c) \leq P(|\bar R - E(\bar R)|> c) \leq \frac{E\left\{\bar R - E(\bar R)\right\}^4}{c^4}. \label{eq-thm1-8}
\end{eqnarray*}
Combining \eqref{eq-thm1-7} with Lemma \ref{lem-7}, we conclude
\begin{eqnarray}
E\{r^{*2}(\bar V, \bar R)\} = o\left(\mbox{Var}\{m(\bar{V},\bar{R})\}\right). \label{eq-thm1-9}
\end{eqnarray}
Next, we consider $E(\mathcal{J}^2)$; in particular
\begin{eqnarray*}
\mathcal{J} = \frac{\bar V}{\bar R} - \frac{\bar V}{\bar R \vee c} = \frac{\bar V}{\bar R}\cdot \frac{\bar R\vee c - \bar R}{\bar R \vee c} = \frac{\bar V}{\bar R} \cdot \frac{c-\bar R}{c}\cdot \mathrm{1}(\bar R<c).
\end{eqnarray*}
By noting $\bar V/\bar R\in (0,1)$ and $(c-\bar R)/c \in (0,1)$ when $\bar R<c$, we have
\begin{eqnarray}
E(\mathcal{J}^2) \leq E\{\mathrm{1}(\bar R<c)\} \leq \frac{E\left\{\bar R - E(\bar R)\right\}^4}{c^4} = o\left(\mbox{Var}\{m(\bar{V},\bar{R}))\right). \label{eq-thm1-10}
\end{eqnarray}
Combining \eqref{eq-thm1-9}, \eqref{eq-thm1-10} with \eqref{eq-thm1-3}, we complete the proof of Theorem \ref{Thm-1}.
We proceed to show Corollary \ref{Corrollary-asym-var}. From (\ref{eq-thm1-3}), we have that
\begin{eqnarray*}
\mbox{Var} \left\{ \mbox{FDP}(t) \right\} &=& \mbox{Var} \left\{ m(\bar{V},\bar{R}) + \mathcal{J} + r^*(\bar V, \bar R) \right\} \\
&=& \mbox{Var} \left\{ m(\bar{V},\bar{R}) \right\} + \mbox{Var} \left\{ \mathcal{J} \right\} + \mbox{Var} \left\{r^*(\bar V, \bar R) \right\}\\
&& + 2 \mbox{Cov} \left\{ m(\bar{V},\bar{R}), \mathcal{J} \right\} + 2 \mbox{Cov} \left\{ m(\bar{V},\bar{R}), r^*(\bar V, \bar R) \right\}+ 2 \mbox{Cov} \left\{ \mathcal{J}, r^*(\bar V, \bar R) \right\},
\end{eqnarray*}
which together with \eqref{eq-thm1-9}, \eqref{eq-thm1-10}, and Cauchy-Schwarz inequality immediately leads to
\begin{equation*}
\lim_{p \to \infty} \frac{\mbox{Var} \left\{ \mbox{FDP}(t) \right\}}{\mbox{Var} \left\{ m(\bar{V},\bar{R}) \right\}} = 1.
\end{equation*}
With straightforward evaluation, we can check that the denominator above is identical to $V_1(t) + V_2(t)$. We complete the proof of Corollary \ref{Corrollary-asym-var}.
\section{Proof of Theorem \ref{Thm-2}} \label{sec-proof-thm-2}
\subsubsection*{Part (a)}
When $\mu_i = \mu_j = 0$, according to Lemma \ref{lem-1},
\[ \frac{\partial \mathrm{Cov}(t_i, t_j)}{\partial \sigma_{ij}} = \frac{1}{\pi \sqrt{1-\sigma_{ij}^2}} \left\{\exp\left(-\frac{z_{t/2}^{2}}{1+\sigma_{ij}} \right) - \exp\left(-\frac{z_{t/2}^{2}}{1-\sigma_{ij}} \right) \right\}. \]
Thus, $\partial \mathrm{Cov}(t_i, t_j)/\partial \sigma_{ij} > 0$ if $\sigma_{ij} > 0$ and $\partial \mathrm{Cov}(t_i, t_j)/\partial \sigma_{ij} < 0$ if $\sigma_{ij} < 0$. In addition, $\mathrm{Cov}(t_i, t_j) = 0$ when $\sigma_{ij} = 0$. Then $\mathrm{Cov}(t_i, t_j) > 0$ for $\sigma_{ij} \ne 0$.
\subsubsection*{Part (b)}
When $\mu_i = 0$ and $\mu_j \ne 0$, based on Lemma \ref{lem-1}, $\partial \mathrm{Cov}(t_i, t_j)/\partial \sigma_{ij}$ is an odd function of $\sigma_{ij}$ and an even function of $\mu_j$. As $\mathrm{Cov}(t_i, t_j) = 0$ when $\sigma_{ij} = 0$, it suffices to show that $\partial \mathrm{Cov}(t_i, t_j)/\partial \sigma_{ij} < 0$ when $\sigma_{ij} > 0$ and $\mu_j > 0$.
According to Lemma \ref{lem-1}, up to positive multiplicative factors,
\begin{align}
\frac{\partial\mathrm{Cov}(t_i, t_j)}{\partial\sigma_{ij}} \propto {} & \exp \left\{-\frac{\mu_{j-}^2 - 2\sigma_{ij}z_{t/2}\mu_{j-}}{2(1-\sigma_{ij}^2)} \right\} + \exp \left\{-\frac{\mu_{j+}^2 + 2\sigma_{ij}z_{t/2}\mu_{j+}}{2(1-\sigma_{ij}^2)} \right\} \notag \\
& - \exp \left\{-\frac{\mu_{j+}^2 - 2\sigma_{ij}z_{t/2}\mu_{j+}} {2(1-\sigma_{ij}^2)} \right\} - \exp \left\{-\frac{\mu_{j-}^2 + 2\sigma_{ij}z_{t/2}\mu_{j-}} {2(1-\sigma_{ij}^2)} \right\} \notag \\
\propto {} & \exp \left\{-\frac{(1-\sigma_{ij})z_{t/2}\mu_j-\sigma_{ij}z_{t/2}^2}{1-\sigma_{ij}^2} \right\} + \exp \left\{-\frac{-(1-\sigma_{ij})z_{t/2}\mu_j-\sigma_{ij}z_{t/2}^2}{1-\sigma_{ij}^2} \right\} \notag \\
& - \exp \left\{-\frac{-(1+\sigma_{ij})z_{t/2}\mu_j+\sigma_{ij}z_{t/2}^2} {1-\sigma_{ij}^2} \right\} - \exp \left\{-\frac{(1+\sigma_{ij})z_{t/2}\mu_j+\sigma_{ij}z_{t/2}^2} {1-\sigma_{ij}^2} \right\} \notag \\
\le {} & \exp \left\{-\frac{2z_{t/2}\mu_j-\sigma_{ij}z_{t/2}\mu_j}{2(1-\sigma_{ij}^2)} \right\} + \exp \left\{-\frac{-2z_{t/2}\mu_j+3\sigma_{ij}z_{t/2}\mu_j}{2(1-\sigma_{ij}^2)} \right\} \notag \\
& - \exp \left\{-\frac{-2z_{t/2}\mu_j-3\sigma_{ij}z_{t/2}\mu_j} {2(1-\sigma_{ij}^2)} \right\} - \exp \left\{-\frac{2z_{t/2}\mu_j+\sigma_{ij}z_{t/2}\mu_j} {2(1-\sigma_{ij}^2)} \right\}, \label{eq-thm2-1}
\end{align}
where the last inequality holds as $\mu_j > 2 |z_{t/2}|$. Let
\[a = \exp[-\sigma_{ij}z_{t/2}\mu_j/\{2(1-\sigma_{ij}^2)\}] \quad\text{and}\quad b = \exp\{-z_{t/2}\mu_j/(1-\sigma_{ij}^2)\},\]
then the expression in (\ref{eq-thm2-1}) becomes
\begin{align*}
a^{-1}b + a^3 b^{-1} - a^{-3}b^{-1} - ab &= a^{-3} b^{-1} (a^2 b^2 + a^6 - a^4 b^2 - 1) \\
&= a^{-3} b^{-1} (a^2 - 1) (a^4 + a^2 + 1 - a^2 b^2).
\end{align*}
Since $a > 1$, $\partial\mathrm{Cov}(t_i, t_j)/\partial\sigma_{ij} < 0$ is implied by $a^4 + a^2 + 1 - a^2 b^2 < 0$, which is further implied by $3a^2 < b^2$. It is straightforward to show that $t < 2\{1-\Phi^{-1}(\sqrt{\log(3)/2})\}$ and $\mu_j > 2 |z_{t/2}|$ are sufficient conditions for $3a^2 < b^2$.
\subsubsection*{Part (c)}
As $\mathrm{sign}(\sigma_{ij}) = \mathrm{sign}(\mu_i \mu_j)$, we can assume $\mu_i > 0$, $\mu_j > 0$, and $\sigma_{ij} > 0$ in the proof, because for the other possible cases, we can add a negative sign to $Z_i$ and/or $Z_j$, which does not actually change $\mathrm{Cov}(t_i, t_j)$ and thus does not affect the conclusion. Similar to Part (b), It suffices to show that $\partial \mathrm{Cov}(t_i, t_j)/\partial \sigma_{ij} > 0$ when $\mu_i > 0$, $\mu_j > 0$, and $\sigma_{ij} > 0$. Further, we assume $\mu_i < \mu_j$ without loss of generality.
According to Lemma \ref{lem-1}, up to a positive multiplicative factor,
\begin{align}
\frac{\partial\mathrm{Cov}(t_i, t_j)}{\partial\sigma_{ij}} \propto {} & \exp\left(\frac{z_{t/2}^2 \sigma_{ij}}{1-\sigma_{ij}^2}\right) \left[ \exp \left\{-\frac{z_{t/2}(\mu_i+\mu_j)(1-\sigma_{ij})}{1-\sigma_{ij}^2} \right\} + \exp \left\{\frac{z_{t/2}(\mu_i+\mu_j)(1-\sigma_{ij})}{1-\sigma_{ij}^2} \right\} \right] \notag \\
& - \exp\left(-\frac{z_{t/2}^2 \sigma_{ij}}{1-\sigma_{ij}^2}\right) \left[ \exp \left\{-\frac{z_{t/2}(\mu_i-\mu_j)(1+\sigma_{ij})}{1-\sigma_{ij}^2} \right\} + \exp \left\{\frac{z_{t/2}(\mu_i-\mu_j)(1+\sigma_{ij})}{1-\sigma_{ij}^2} \right\} \right] \label{eq-thm2-2}
\end{align}
Introducing the following notation
\[a = \exp\left(\frac{z_{t/2}^2 \sigma_{ij}}{1-\sigma_{ij}^2}\right), \ x = \exp \left\{-\frac{z_{t/2}(\mu_i+\mu_j)(1-\sigma_{ij})}{1-\sigma_{ij}^2} \right\}, \ y = \exp \left\{\frac{z_{t/2}(\mu_i-\mu_j)(1+\sigma_{ij})}{1-\sigma_{ij}^2} \right\},\]
where $a > 1$, $x > 1$, and $y > 1$. Then, the expression in (\ref{eq-thm2-2}) becomes $a(x + x^{-1}) - a^{-1}(y + y^{-1})$.
Next, we show that $a x > a^{-1} y$ implies that $a(x + x^{-1}) > a^{-1}(y + y^{-1})$. When $x > y$, it is easy to see that $a(x + x^{-1}) > a^{-1}(y + y^{-1})$. When $x \le y$ and $a x > a^{-1} y$, $a(x + x^{-1}) > a^{-1} y + a y^{-1} \ge a^{-1}(y + y^{-1})$.
Therefore, a sufficient condition for $\partial \mathrm{Cov}(t_i, t_j)/\partial \sigma_{ij} > 0$ is $a x > a^{-1} y$, which is equivalent to $\sigma_{ij} < \mu_i/(\mu_j + z_{t/2})$.
\end{document} |
\section{Introduction}
AlphaZero \cite{SHS+18} and its extension MuZero \cite{SAH+20} are computer programs developed by Google’s subsidiary DeepMind. They use machine-learning techniques to play at a superhuman level in chess, go, and a few other games. AlphaZero achieved this level of play solely with reinforcement learning from self-play, with no human data, no handcrafted evaluation functions, and no domain knowledge except the game rules. In comments on playing chess, the play style of AlphaZero is called ``alien'': it sometimes wins by making moves that would seem unthinkable to a human chess player.
The purpose of this paper is to adapt the methods and techniques used in AlphaZero for solving search problems such as, for example, the Boolean satisfiability problem (in its search version). Reinforcement learning has been applied to combinatorial optimization \cite{MSI+21,VSP+20}, but with using expert knowledge and handcrafted heuristics, which differs these applications from AlphaZero's approach.
To design an AlphaZero-inspired solver for a search problem $\Pi$, we first need to represent $\Pi$ as a one-player combinatorial game, where the player starts from an initial position and tries to reach a winning position by making moves from one position to another. That is, we need to define what we mean by positions, winning positions, and possible moves.
We think of any instance of $\Pi$ as a possible position in the game. For example, if $\Pi$ is $\mathtt{SAT}$, then any formula in CNF (a set of clauses) is viewed as a position. Certain instances of $\Pi$ are thought as ``easy'' instances, assuming that we already have an efficient solver for such instances. An easy instance plays the role of a winning position. In the case of $\mathtt{SAT}$, a set of easy instances could contain formulas with the empty clause, formulas where each clause contains a pure literal, formulas in $2$-CNF, etc. By a possible move we mean a transition from an instance $x$ to an instance $x'$ such that the following holds:
\begin{itemize}
\item $x$ has a solution if and only if $x'$ has a solution;
\item a solution to $x$ can be computed from a solution to $x'$.
\end{itemize}
The resolution rule gives examples of possible moves: $x'$ is obtained from $x$ by choosing two clauses and adding their resolvent to $x$. Another example is the pure literal elimination rule: $x'$ is obtained from $x$ by removing all clauses that contain pure literals.
Thus, we define the ``game rules'' for $\Pi$ by specifying two components:
\begin{itemize}
\item a set of easy instances and a solver for this restriction of $\Pi$;
\item for each non-easy instance of $\Pi$, a set of possible moves from this instance.
\end{itemize}
We call such a specification a \emph{setup} for solving $\Pi$. Section~\ref{sec:setup} gives a formal definition of setups in terms of \emph{easy-instance solvers} and \emph{self-reductions}. Section~\ref{sec:sat} gives examples of setups for $\mathtt{SAT}$.
Suppose we have chosen a setup for solving $\Pi$. A solver for $\Pi$ based on a given setup is described in Section~\ref{sec:solver}. This solver uses adapted versions of two key algorithms of AlphaZero: a \emph{reinforcement-learning algorithm} and a \emph{parameter-adjustment} algorithm. The former one uses Monte Carlo tree search to find a sequence of moves from an input instance of $\Pi$ to an easy instance. This algorithm has many parameters that are adjusted with help of the latter algorithm. The parameter-adjustment algorithm trains a deep neural network to find better values of the parameters; the choice of architecture of this network depends on how we represent instances of $\Pi$.
The solver described in Section~\ref{sec:solver} can also be applied to another task called \emph{per-instance algorithm selection} \cite{HHL21,KHN+19}, In this task, we wish to design a ``meta-solver'' that solves a search problem $\Pi$ by automatically choosing (on a per-instance basis) a solver from a ``portfolio'' of solvers for $\Pi$, see Section~\ref{sec:end} for details.
\section{Setups for Solving Search Problems}
\label{sec:setup}
\paragraph{Search problems.}
A \emph{search problem} is one of the standard types of computational problems. It is common to represent a search problem by a binary relation $R \subseteq X \times Y$ where $X$ is a set of \emph{instances} and $Y$ is a set of \emph{solutions}. If $(x,y) \in R$ then $y$ is called a \emph{solution to} $x$.
The \emph{satisfiability problem} (in its search version) is an example of a search problem, see Section~\ref{sec:sat} for details. The corresponding set $X$ of instances consists of Boolean formulas in CNF. The set $Y$ of solutions consists of assignments of truth values to variables. An instance $x \in X$ has a solution $y \in Y$ if $y$ is a satisfying assignment of $x$. There are many ways to encode instances and solutions of the satisfiability problem; no particular encoding is specified in our example.
\paragraph{Solvers.}
Let $\Pi$ be a search problem. A \emph{solver} for $\Pi$ is an algorithm $\mathcal{S}$ that either finds a solution, or reports that there is no solution, or may give up saying ``don't know''. That is, on every instance $x \in X$,
\begin{itemize}
\item if $x$ has a solution, then $\mathcal{S}$ returns some solution to $x$ or says ``don't know'';
\item if $x$ has no solution, then $\mathcal{S}$ says ``no solution'' or says ``don't know''.
\end{itemize}
Solvers may have parameters, additional input, and additional output. For example, in Section~\ref{sec:solver}, we describe a solver that takes as input not only an instance $x$ but also additional data $\theta$ with information about previous traces; the solver outputs an answer for $x$ and updates $\theta$.
\paragraph{Easy instances.}
We assume that the set of instances of $\Pi$ has a designated subset $E \subseteq X$ whose elements are called \emph{easy} instances. The assumption behind $E$ is that it is ``easy''to determine whether an instance $x \in E$ has a solution and, moreover, if a solution exists, it is ``easy'' to find it. To formalize this assumption, we equip $\Pi$ with an algorithm denoted by $\mathcal{E}$ and called an \emph{easy-instance solver}. On every instance $x \in X$, this algorithm determines whether $x$ is an easy instance and, if so, the algorithm finds a solution to $x$ or reports that $x$ has no solution:
$$
\mathcal{E}(x) = \left\{
\begin{array}{ll}
\mbox{``not easy''} & \mbox{if $x \notin E$} \\
\mbox{``no solution''} & \mbox{if $x \in E$ and $x$ has no solution} \\
\mbox{some solution to $x$} & \mbox{if $x \in E$ and $x$ has a solution}
\end{array}
\right.
$$
Section~\ref{sec:sat} gives examples of the set $E$ for the satisfiability problem. For example, $E$ can be the set of formulas $\phi$ such that $\phi$ is the empty set (this formula is satisfiable) or $\phi$ contains the empty clause (this formula is unsatisfiable).
\paragraph{Self-reductions and moves.}
We define a \emph{self-reduction} of $\Pi$ to be a pair $r=(f_r,g_r)$, where $f_r$ and $g_r$ are computable functions such that for every instance $x \in X$,
\begin{itemize}
\item $f_r(x)$ is a finite set of instances;
\item if $x$ has a solution, then each instance in $f_r(x)$ has a solution;
\item for every instance $x' \in f_r(x)$ and for every solution $y \in Y$, if $y$ is a solution to $x'$, then $g_r(x, x',y)$ is a solution to $x$.
\end{itemize}
If $x' \in f_r(x)$, then we say that the self-reduction $r$ offers a \emph{move} from $x$ to $x'$. Thus, for each instance, $f_r$ defines the set of all moves from this instance. We call $f_r$ the \emph{move function} of the self-reduction $r$. For a move from $x$ to $x'$, the function $g_r$ computes a solution to $x$ from a solution to $x'$ (if any). We call $g_r$ the \emph{solution function} of $r$.
Examples of self-reductions of the satisfiability problem are given in Section~\ref{sec:sat}. Here we just mention two of them. The first example is a self-reduction $r=(f_r,g_r)$ where the move function $f_r$ is in fact the \emph{pure literal elimination} rule. This move function maps a CNF formula $\phi$ to a one-element set $\{\phi'\}$ where $\phi'$ is a CNF formula obtained from $\phi$ by successively removing all clauses containing pure literals. Another example is a self-reduction $r=(f_r,g_r)$ that uses the \emph{resolution rule}. For every CNF formula $\phi$, the set $f_r(\phi)$ consists of all CNF formulas obtained from $\phi$ by choosing two clauses and adding their resolvent to $\phi$. In both examples, the solution functions $g_r$ are defined in the obvious way, see Section~\ref{sec:sat} for details.
\paragraph{Paths.}
Let $\mathcal{R}$ be a finite set of self-reductions of $\Pi$. Let $x$ and $x'$ be instances of $\Pi$. By a \emph{path} from $x$ to $x'$ we mean a sequence
$$
x_0, r_1, x_1, r_2, x_2, \ldots, x_{n-1}, r_n, x_n
$$
where $x_0=x$, $x_n=x'$, and $r_i$ is a self-reduction from $\mathcal{R}$ that offers a move from $x_{i-1}$ to $x_i$ for all $i=1, \ldots, n$. Clearly, given such a path, we have the following:
\begin{itemize}
\item if $x$ has a solution, then $x'$ also has a solution;
\item if $y$ is a solution to $x'$, then $x$ has a solution that can be computed from $y$ by successively computing solutions to $x_{n-1}, \ldots, x_1, x_0$.
\end{itemize}
\paragraph{Setups for solving.}
An easy-instance solver $\mathcal{E}$ and a finite set $\mathcal{R}$ of self-reductions of $\Pi$ suggest the following approach to solving $\Pi$:
\begin{enumerate}
\item Try to find a path from an input instance $x$ to an easy instance $x'$.
\item If such a path is found, either return a solution to $x$ (computed from a solution to $x'$) or return ``no solution'' (in the event that $x'$ has no solution). Otherwise, return ``don't know''.
\end{enumerate}
The key step here is a search for a path and its success depends on the choice of $\mathcal{E}$ and $\mathcal{R}$. We call the pair $(\mathcal{E}, \mathcal{R})$ a \emph{setup} for solving $\Pi$. Such a setup allows us to think of $\Pi$ as a one-player combinatorial game, where the player tries to find a sequence of moves from an initial position to a winning position. From this point of view, a setup for solving $\Pi$ defines the rules of this game.
Note that, in general, a setup $(\mathcal{E}, \mathcal{R})$ is not required to be ``complete'' in the following sense: for every instance $x$, there must be a path from $x$ to an easy instance. Section~\ref{sec:sat} shows examples of different setups for solving the satisfiability problem, including a setup where only satisfiable formulas have paths to easy instances. Solvers based on ``incomplete'' setups output ``don't know'' on instances that do not have paths to easy instances.
\section{Examples for the Satisfiability Problem}
\label{sec:sat}
There are many possible setups for solving the satisfiability problem that make sense in our context. In this section, we give three setups for the purpose of illustration.
\paragraph{Satisfiability.}
Although the satisfiability problem is very well known and described in numerous books and articles \cite{BHM+21}, we give the basic definitions here to avoid ambiguity (notation and terminology slightly vary in the literature).
Let $V=\{v_1, v_2, \ldots\}$ be a set of \emph{variables}. A \emph{literal} is a variable from $V$ or its negation; each of them is the \emph{complement} of the other. The complement of a literal $a$ is denoted by $\neg a$. A \emph{clause} is a finite set of literals that contains no pair of complements (a clause is thought of as the disjunction of its literals). A \emph{formula} is a finite set of clauses (a formula is thought of as the conjunction of its clauses). An \emph{assignment} is usually defined as a function from a finite set of variables to $\{0,1\}$, but it is convenient for us to use an equivalent definition: an \emph{assignment} is a finite set of literals without any pair of complements (this set is thought of as the conjunction of its literals). An assignment $\alpha$ \emph{satisfies} a clause $C$ if the intersection $\alpha \cap C$ is not empty. An assignment $\alpha$ \emph{satisfies} a formula $\phi$ if $\alpha$ satisfies every clause of $\phi$; we also call $\alpha$ a \emph{satisfying assignment} for $\phi$.
The definitions above allow the empty clause and the empty formula. No assignment satisfies the empty clause and, thus, every formula with the empty clause is unsatisfiable. The formula consisting of only the empty clause is denoted by $\bot$. The empty formula (``no constraints at all'') is denoted by $\top$. By definition, $\top$ is satisfied by the empty assignment.
It is common to denote the following decision problem by $\mathtt{SAT}$: given a formula $\phi$, does it have a satisfying assignment? Slightly abusing this notation, we write $\mathtt{SAT}$ to refer to the satisfiability problem in its search version: given a formula $\phi$, find a satisfying assignment or return ``no solution''. In terms of Section~\ref{sec:setup}, this search version is defined as follows. The set $X$ of instances consists of all formulas over $V$. The set $Y$ of solutions consists of all possible assignments, i.e., all finite subsets of literals over $V$ without any pair of complements. An assignment $\alpha \in Y$ is a solution to an instance $\phi \in X$ if and only if $\alpha$ satisfies $\phi$.
\paragraph{Example 1: Setup based on resolutions.}
There are only two easy instances: $\top$ and $\bot$. Thus, an empty-instance solver $\mathcal{E}$ is trivial. A set $\mathcal{R}$ of self-reductions consists of the following three self-reductions commonly used in $\mathtt{SAT}$ solving:
\begin{itemize}
\item \textit{Resolution rule.} Let $\phi$ be a formula with clauses $C_1$ and $C_2$ such that $C_1$ contains a literal $a$ and $C_2$ contains its complement $\neg a$. If the set $C_1 \cup C_2 - \{a, \neg a\}$ contains no pair of complements, then we call this set the \emph{resolvent} of $C_1$ and $C_2$. If $\phi'$ is the formula obtained from $\phi$ by adding this resolvent, we say that $\phi'$ is obtained from $\phi$ by the \emph{resolution rule}. The \emph{resolution self-reduction} is a pair $r=(f_r,g_r)$ where the move function is defined by
$$
f_r(\phi) = \{\phi' \ | \ \mbox{$\phi'$ is obtained from $\phi$ by the resolution rule}\}
$$
and the solution function $g_r$ is defined as follows: for all formulas $\phi$, if $\alpha$ is a solution to a formula $\phi' \in f_r(\phi)$ then $g_r(\phi,\phi',\alpha)$ is $\alpha$.
\item \textit{Subsumption rule.} If a clause $C_1$ is a proper subset of a clause $C_2$, we say that $C_1$ is \emph{subsumed} by $C_2$ and we call the clause $C_2$ \emph{unnecessary}. The \emph{subsumption self-reduction} is the following self-reduction $r=(f_r,g_r)$. The move function $f_r$ maps a formula $\phi$ to a one-element set $\{\phi'\}$ where the formula $\phi'$ is obtained from $\phi$ by removing all unnecessary clauses. The solution function $g_r$ is obvious: $g_r(\phi,\phi',\alpha) = \alpha$ for all $\phi$, $\phi'$, and $\alpha$.
\item \textit{Pure literal elimination.} A literal $a$ in $\phi$ is called a \emph{pure} literal if no clause of $\phi$ contains $\neg a$. The \emph{pure literal self-reduction} $r=(f_r,g_r)$ is defined as follows. The move function $f_r$ maps a formula $\phi$ to a one-element set $\{\phi'\}$ where $\phi'$ is obtained from $\phi$ by successively removing all clauses containing pure literals until $\phi'$ has no pure literals. If $\alpha$ is a satisfying assignment for $\phi'$, then $g_r(\phi,\phi',\alpha)$ is the extension of $\alpha$ that assigns ``true'' to all pure literals in $\phi$.
\end{itemize}
This setup $(\mathcal{E},\mathcal{R})$ is ``complete'': for every formula $\phi$, there is a path from $\phi$ to either $\top$ or $\bot$, see for example \cite{BN21}.
\paragraph{Example 2: Setup based on resolutions and the extension rule.}
The setup described above can be extended by adding a self-reduction based on the \emph{extension rule} \cite{Tse68}. Let $\phi$ be a formula and let $v$ be a variable not appearing in $\phi$: no clause of $\phi$ contains $v$ or $\neg v$. Let $a$ and $b$ be literals such that their underlying variables appear in $\phi$. The extension rule adds clauses
$$
\{a, \neg v\}, \ \{b, \neg v\}, \ \{\neg a, \neg b, v\}
$$
to $\phi$. In the corresponding self-reduction $r=(f_r,g_r)$, the move function $f_r$ is defined by
$$
f_r(\phi) = \{\phi' \ | \ \mbox{$\phi'$ is obtained from $\phi$ by the extension rule}\}
$$
and the solution function $g_r$ is the same as in the resolution self-reduction: $g_r(\phi,\phi',\alpha)$ is $\alpha$.
The extension rule makes resolution proof systems much stronger, but there are no good heuristics for choosing extension literals $a$ and $b$. This problem of using the extension rule in practical $\mathtt{SAT}$ solvers is discussed in \cite[section 7.8]{BN21}, where the authors note that ``if this could be done well, the gains would be enormous'' and ``the main bottleneck appears to be that we have no good heuristics for how to choose extension formulas''.
\paragraph{Example 3: Setup based on flipping.}
A variable is called a \emph{positive} literal; its negation is called a \emph{negative} literal. We define an easy instance to be a formula in which every clause has at least one positive literal. Obviously, such a formula is satisfied by the set of these positive literals. An algorithm $\mathcal{E}$ determines whether an instance $\phi$ is an easy instance and if so, $\mathcal{E}(\phi)$ is the corresponding set of positive literals. The \emph{flipping rule} transforms a formula $\phi$ taking the following two steps:
\begin{enumerate}
\item Choose a clause $C \in \phi$ in which all literals are negative (if $\phi$ is not an easy instance, such a clause exists).
\item Choose a literal $\neg v_i \in C$ and ``flip'' all of its occurrences in $\phi$, i.e., replace $\neg v_i$ with $v_i$ everywhere in $\phi$.
\end{enumerate}
We can define $\mathcal{R}$ to be a set of one or more self-reductions based on the \emph{flipping} rule. The move function in a such a self-reduction maps $\phi$ into a set of formulas obtained from $\phi$ by applying the flipping rule. Note that the setup $(\mathcal{E},\mathcal{R})$ is not ``complete''. If $\phi$ is satisfiable, then there is a path from $\phi$ to an easy instance. Otherwise, $\phi$ has no path to any easy instance (all easy instances are satisfiable).
\section{Solvers Based on Setups}
\label{sec:solver}
Let $(\mathcal{E},\mathcal{R})$ be a setup for solving a search problem $\Pi$. We describe a solver for $\Pi$ based on this setup. This solver, denoted by $\mathcal{S}$, tries to find a path from an input instance $x$ to an easy instance and, if such a path is found, $\mathcal{S}$ outputs an answer for $x$. The solver has parameters whose values change from run to run, and $\mathcal{S}$ updates these values itself. The key point is that $\mathcal{S}$ uses machine-learning techniques for both tasks, namely, for a path search and for updating values of the parameters. Roughly, $\mathcal{S}$ uses a reinforcement-learning algorithm $\mathcal{A}_1$ to search for a path and it uses a parameter-adjustment algorithm $\mathcal{A}_2$ to search for ``better'' values of the parameters. We first describe a bird's eye view of $\mathcal{S}$ and then give more details.
\paragraph{Input and output.}
The input to $\mathcal{S}$ has two parts: and instance $x \in X$ and a binary string $\theta \in \{0,1\}^*$ called a \emph{parameter string}. This string encodes values of the parameters of $\mathcal{S}$ and information about the solver's previous traces. We assume that $\theta$ is stored in a data store outside $\mathcal{S}$. We also assume that $\theta$ is initialized before the first run of $\mathcal{S}$ and it is updated after each next run. Thus, the output of $\mathcal{S}$ on $x$ and $\theta$ is an answer for $x$ (either a solution to $x$, or ``no solution'', or ``don't know'') and the updated parameter string $\theta'$.
\paragraph{Solver $\mathcal{S}$.}
On input $x$ and $\theta$, the solver $\mathcal{S}$ works as follows:
\begin{enumerate}
\item Run $\mathcal{A}_1$. This algorithm produces a path
\begin{equation}
\label{eq:path}
x_0, r_1, x_1, r_2, x_2, \ldots, x_{n-1}, r_n, x_n
\end{equation}
where $x_0=x$. Note that $x_n$ is not necessarily an easy instance. In the course of producing this path, $\mathcal{A}_1$ generates other paths and measures the ``quality'' of the moves occurring in these paths: one move is better than another if it is expected to have a better chance of leading to an easy instance. Information about the quality of the moves is stored as \emph{quality data} $\delta$. The output of $\mathcal{A}_1$ is path (\ref{eq:path}) and $\delta$.
\item Return an answer for $x$:
\begin{enumerate}
\item If $\mathcal{E}(x_n)$ is ``not easy'', then return ``don't know''.
\item If $\mathcal{E}(x_n)$ is ``no solution'', then return ``no solution''.
\item If $\mathcal{E}(x_n)$ is a solution to $x_n$, work backwards from $x_n$ and use the solution functions $g_r$ from $\mathcal{R}$ to find successively solutions to $x_{n-1}, \ldots, x_0$. Finally, return the solution to $x_0$.
\end{enumerate}
\item Run $\mathcal{A}_2$. This algorithm takes $\delta$ and merges it with similar quality data collected in the previous runs of $\mathcal{S}$. The result of merge is used for training and updating parameters $\theta$ to new parameters $\theta'$.
\item Return the updated parameter string $\theta'$ for storing.
\end{enumerate}
\paragraph{Reinforcement-learning algorithm $\mathcal{A}_1$.}
This algorithm is a Monte Carlo tree search algorithm adapted for search problems. More exactly, $\mathcal{A}_1$ is a version of the Adaptive Multistage Sampling algorithm (AMS) described in \cite{CFH+05}. The algorithm $\mathcal{A}_1$ cannot apply AMS as a black-box algorithm because the input to AMS is not given explicitly. Instead, $\mathcal{A}_1$ supplies the input data in a ``just-in-time'' manner as follows.
\begin{itemize}
\item \textit{Initialization of rewards.}
In each recursive call, AMS initializes rewards of moves. Given an instance $x$, the \emph{reward} of a move is a measure for the belief that this move is on a bounded-length path from $x$ to an easy instance. The reward is maximum if the move is on such a path to an easy instance. The algorithm $\mathcal{A}_1$ needs a belief estimation algorithm that computes initial reward values for moves. This estimation is implemented by a deep neural network $N$ that uses parameters given in $\theta$. The initial rewards are improved by training this network.
\item \textit{Sampling algorithm.}
The algorithm $\mathcal{A}_1$ provides a \emph{sampling algorithm} for AMS. On an instance $x$, this algorithm uses the parameters in $\theta$ to sample the moves from $f_r(x)$ for each self-reduction $r \in \mathcal{R}$. The sampling algorithm can be implemented using the same deep neural network $N$, or it can be a different neural network that shares weights with $N$. The distributions for self-reductions are improved by training $N$, which means that the improved distributions assign higher probabilities to moves with higher accumulated rewards.
\item \textit{Output.}
According to the description of AMS in \cite{CFH+05}, this algorithm returns a path that has the maximum accumulated reward. In addition to this optimal path, $\mathcal{A}_1$ collect the following quality data $\delta$ and returns it for training:
\begin{itemize}
\item for every instance $x$ and every self-reduction $r$ explored in the run, the accumulated probability distribution on $f_r(x)$;
\item for every instance $x$ explored in the run, the accumulated quality of $x$ (``value'' of $x$ in the AMS terminology).
\end{itemize}
\end{itemize}
\paragraph{Parameter-adjustment algorithm $\mathcal{A}_2$.}
After taking the quality data $\delta$ and merging it with similar datasets, $\mathcal{A}_2$ trains the deep neural network $N$ to adjust the parameters $\theta$. Note that the choice of architecture of $N$ is dictated by instance representation. For example, convolutional neural networks can be used in the case of finite dimensional tensor representation. If instances are represented by binary strings of variable length, recurrent neural networks can be used. In the case of $\mathtt{SAT}$, it is natural to represent instances by graphs and, therefore, $N$ can be implemented as a graph neural network. In particular an extension of the network constructed in \cite{SLB+19} could be used. Also note that the architecture of $N$ determines what instance features can be discovered from training.
What datasets can be used for the initial training of $N$? It is more or less common to train a neural network using randomly shuffled data. Certain sets of instances (for example, industrial instances of $\mathtt{SAT}$) expose self-similarity: large instances have the same properties as smaller ones. In such cases, it makes sense to train $N$ using \emph{curriculum learning} \cite{NPL+20} where the training starts from samples of small size and moves to larger ones.
\section{Concluding Remark}
\label{sec:end}
In this paper, we described how to adapt AlphaZero's techniques for designing a solver for a search problem. This adaptation can also be used for another task called \emph{per-instance algorithm selection} \cite{HHL21,KHN+19}. In this task, we are given a search problem $\Pi$ and a ``portfolio'' of solvers for $\Pi$. We wish to design a ``meta-solver'' that automatically chooses a solver from the portfolio on a per-instance basis and, thereby, it achieves better performance than any single solver from the portfolio.
Suppose all solvers in the portfolio are of the following type. Such a solver takes as input an instance $x$ of $\Pi$ and produces another instance $x'$ such that (1) $x'$ has a solution if and only if $x$ has a solution and (2) a solution to $x$ can be computed from a solution to $x'$. If $x'$ is an easy instance then the solver returns an answer, otherwise the solver returns $x'$ and says``don't know''. Many $\mathtt{SAT}$ solvers are of this type, for example, iterative solvers like resolution-based solvers with a limited number of iterations. The portfolio with such solvers can be viewed as a self-reduction where the move function maps an input instance $x$ to the set of all instances $x'$ produced by the solvers. Thus, we can use the solver described in Section~\ref{sec:solver} as a meta-solver for $\Pi$.
|
\section{Programming Techniques}\label{sec:programming_techniques}
\wtnote{needs updates}
The bulk of the postprocessing is taking the outer products among the subcircuit outputs.
This is essentially computing the matrix-matrix multiplications.
We use the state-of-the-art computing kernels from the Intel Math Kernel Library (MKL)~\cite{wang2014intel} compiled in $C$ for the best performance on Intel CPUs.
In addition, the Qiskit quantum package generates QPU data in Python,
which introduces extra data transfer overhead to utilize the MKL kernels.
We use Cython~\cite{behnel2010cython} to wrap the MKL routines with a Python interface to directly operate on Python data types.
The wrapper significantly reduces the data transfer overhead.
Furthermore, the matrices span a wide range of sizes and densities,
which significantly affect the MKL kernel performances.
Therefore, we wrapped and benchmarked the performances of dense-dense (\textit{cblas\_sgemm} routine),
sparse-dense/dense-sparse (\textit{mkl\_sparse\_s\_mm} routine),
and sparse-sparse (\textit{mkl\_sparse\_s\_spmmd} routine) MKL matrix multiplication routines
for different combinations of densities and sizes.
We constructed a KD Tree using the benchmark results for fast selections of routines based on the input matrices characteristics.
The benchmarking is an optional but useful step to enhance the compute runtime.
Via these programming techniques,
we reduce the compute graph contraction runtime to generally less than half of the ScaleQC runtime.
Our benchmarking shows that the cut location process becomes the bottleneck but is nonetheless very fast.
\section*{Acknowledgements}
We thank Johnnie Gray, Stojche Nakov, Naorin Hossain, Fran\c{c}ois Pellegrini and George Bosilca for helpful discussions and feedback.
Funding acknowledgements:
This work is partly funded by EPiQC, an NSF Expedition in Computing, under grants CCF-1730082/1730449.
This work is partly based upon work supported by the U.S. Department of Energy, Office of Science, National Quantum Information Science Research Centers, Co-design Center for Quantum Advantage (C2QA) under contract number DE-SC0012704.
This material is based upon work supported by (while Martonosi was serving at) the National Science Foundation.
\subsection{Benchmarks}\label{sec:benchmarks}
We used the following circuits as benchmarks:
\begin{enumerate}
\item $BV$: Bernstein-Vazirani circuit~\cite{bernstein1997quantum} solves the hidden substring problem.
Has $1$ solution state.
\item $Regular$: Quantum Approximate Optimization Algorithm solves the maximum independent set problem for random $3$-regular graphs~\cite{saleem2020approaches}.
With the proper hyperparameters, this circuit produces $1$ solution state.
However, the full QAOA training process to solve the hyperparameters is beyond the scope of this paper.
We use random hyperparameters with the same circuit structure.
\item $Erdos$: The same algorithm as $Regular$ but for random Erdos-Renyi graphs.
\item $Supremacy$: Random quantum circuits adapted from~\cite{boixo2018characterizing}.
Deeper versions of the circuit was used by Google to demonstrate quantum advantage~\cite{arute2019quantum}.
Our paper uses depth $(1+8+1)$ at various sizes.
As it does not have well-defined solution states,
we run $mn/\log_2{M}$ recursions to produce more samples.
\item $AQFT$: Approximate Quantum Fourier Transform~\cite{barenco1996approximate} that is expected to outperform the standard QFT circuit under noise.
\end{enumerate}
All of our benchmarks are examples of circuits and routines that are expected to demonstrate quantum advantage over classical computing on the Quantum backend.
ScaleQC aims to demonstrate the middle ground where the overall runtime is slower than Quantum but still beyond the classical reach,
while the quantum and classical computing resources requirements are much lower.
\section{States Merging}\label{sec:states_merging}
\begin{algorithm}[t]
\DontPrintSemicolon
\SetAlgoLined
\caption{States Assignment\;
\textbf{Goal}: Reduce memory overhead.}\label{alg:states_assignment}
\KwIn{
$r$, $bin$, $M$, $n_{1\ldots n_C}$\tcp*[l]{Refer Algorithm~\ref{alg:framework}}}
\uIf{$r=0$}{\label{curr_num_bins_start}
Initialize each quantum state in its own bin for $l_i\gets2^{n_i}$ bins in subcircuit $i$, $i\in\{1,\ldots,n_C\}$\;
}
\uElse{
Locate the subcircuit states contained in $bin$, $l_i\gets\#states_i$\;
}\label{curr_num_bins_end}
Copy $l'_i\gets l_i$\;
Initialize the total number of bins required $l\gets\prod_i{l'_i}$\;\label{target_num_bins_start}
\While{$l>M$}{
Pick the subcircuit $i$ with the largest $l'_i$\;
$l'_i\gets \lceil l'_i/2\rceil$\;
$l\gets\prod_i{l'_i}$\;
}\label{target_num_bins_end}
\For{$i\in\{1,\ldots,n_C\}$}{\label{assign_states_begin}
Initialize $l'_i$ empty bins\;
\For{$j=1,\ldots,l_i$}{
$k\gets j\%l'_i$\;
Append the $j$th state of subcircuit $i$ to bin $k$ of subcircuit $i$\;
}
}\label{assign_states_end}
\Return{Updated subcircuit bin assignment}
\end{algorithm}
\begin{figure}[t]
\centering
\includegraphics[width=.6\linewidth]{figures/states_merging.pdf}
\caption{States merging locates solution states for a $100$-qubit circuit,
with $M=2^{20}$.
Each box represents a bin.
The boxed numbers represent the number of quantum states in the bin.
Each bracket represents a recursion.
The numbers on the brackets indicate the number of bins for the recursion.
The red box represents a solution state found.}
\label{fig:states_merging}
\end{figure}
Quantum algorithms can be loosely characterized as two groups based on the type of their output.
The first type produces concentrated outputs, where a few solution states have much higher probability amplitudes than the others.
The solution states should only occupy a very small part of the entire state space,
which is the very reason that it is useful for the quantum algorithms to find them efficiently.
This paper mainly focuses on demonstrating circuits of this type.
The second type of algorithms produces a certain probability distribution,
where the probability amplitudes are much more distributed among the states.
We argue that large size circuits of this type are not practical,
since their probability distributions most likely require exponentially many shots to converge even with a large and reliable QPU.
In addition, it is impossible to store or analyze the entire state space.
As a result, they are usually limited at medium sizes.
ScaleQC is able to produce the full state output for this type of circuits.
One major bottleneck of quantum circuit cutting is that the length of the probability output of a $n$-qubit quantum circuit is $2^n$.
Hence, full state reconstruction for large circuits quickly increases both the memory requirements and runtime.
As an alternative, states merging offers a scalable way to only locate the solution states for large circuits.
The states merging method makes use of the fact that the individual probabilities of the non-solution states are not of interest.
Hence, instead of keeping track of the individual probability for each quantum state,
the states merging method merges multiple states into one bin and keeps track of their sum of probabilities.
The bins containing the solution states hence have much higher probabilities than the other bins and can be easily identified.
The \textit{while} loop in the ScaleQC framework in Algorithm~\ref{alg:framework} shows the complete process.
Each recursion of the procedure first assigns the quantum states still under analysis into various bins.
Algorithm~\ref{alg:states_assignment} shows the assignment process.
Lines~\ref{curr_num_bins_start}-\ref{curr_num_bins_end} first calculate the current number of bins for each subcircuit.
The first recursion starts with each quantum state in its own separate bin,
hence each subcircuit has $l_i=2^{n_i}$ bins,
where $n_i$ is the number of data qubits in the subcircuit $i$.
Subsequent recursions seek to expand a particular selected $bin$,
hence each subcircuit has the number of subcircuit states belonging to the selected $bin$.
Next, lines~\ref{target_num_bins_start}-\ref{target_num_bins_end} calculate the target number of bins to use for the next recursion.
We shrink the subcircuit with the most number of bins by $2$.
The shrinking steps repeat until the total number of bins required satisfies the given memory limit $M$.
Finally, lines~\ref{assign_states_begin}-\ref{assign_states_end} evenly assign the quantum states under analysis into the number of bins calculated for the next recursion.
The max number of bins $M$ enables a key trade-off for the states merging procedure.
The states merging procedure is equivalent to a full state reconstruction if the max number of bins allowed $M$ is larger than the size of the full state $2^n$.
In this case, the states merging procedure simply locates all the solution states in one recursion.
Any $M$ smaller than $2^n$ essentially provides a trade-off of the size of the vectors to compute during each iteration versus the number of iterations required to locate all the solution states.
For the extreme case where the non-solution states have $0$ probability,
the states merging procedure is guaranteed to
find all the solutions in at most $mn/\log_2{M}$ recursions for a $n$-qubit circuit.
Where $m$ is the number of solution states.
Figure~\ref{fig:states_merging} visualizes an example for a $100$-qubit circuit,
assuming $M=2^{20}$ bins,
which is negligible as compared to the $2^{100}$ full states.
Each recursion expands a bin for finer details of the quantum states contained.
A max depth of $\frac{100}{20}=5$ produces leaf bins with just $1$ state.
A solution state is found when a leaf bin with just $1$ state and high probbaility is computed.
The entire states merging process hence creates a search tree with
a depth of $n/\log_2{M}$ and width of $m$,
representing total $mn/\log_2{M}$ recursions.
The procedure finds solutions more quickly if multiple solution states happen to be assigned into the same bin,
which reduces the width of the search tree at some depth.
Having larger $M$ shortens the search tree but has diminishing returns,
as doubling $M$ only increases the denominator by $1$.
Furthermore, larger $M$ means slower post-processing for each recursion.
As a result, it is usually favored to use smaller $M$ even if larger $M$ fits in the memory.
In addition, larger quantum circuits (larger $n$) and more solution states (larger $m$)
only increase the number of states merging recursions linearly.
The method hence easily scales to large quantum circuits with more solution states.
\textbf{Comparison with classical arbitrary state simulation methods:}
The state-of-the-art simulation work~\cite{liu2021closing} only simulates an arbitrary subset of quantum states for large circuits
to avoid the exponential number of quantum states.
Our method easily achieves the same functionality
if we just select an arbitrary subset of quantum states to run for a single recursion without merging into bins.
However, such arbitrary selection methods will have virtually $0$ chance to include any solution states in the sampled subset.
To find any solution states, such methods will need to run almost $2^n$ times and thus do not scale.
Instead, the states merging method strictly outperforms the existing methods via its iterative searches.
\cite{tang2021cutqc} proposed a Dynamic Definition search method that is similar in spirit with states merging.
The method iteratively fixes the state of the individual qubits to search for the solution states.
However, this method forces quantum states without common qubit states (such as $\ket{01}$ and $\ket{10}$) to be in different bins,
thus can only be located in separate recursions.
States merging is hence more efficient as it allows any solution states to be located simultaneously.
\section{Experiment Results}\label{sec:results}
\input{text/Runtime_Results.tex}
\input{text/Resources_Estimations.tex}
\input{text/Compare_Classical.tex}
\section{Background}
This section introduces the quantum circuit cutting theory,
its use cases and identifies its key challenges.
\input{text/CC_Theory}
\input{text/CC_Use_Cases}
\input{text/CC_Challenges}
\section{Optimal Sampling}\label{sec:optimal_sampling}
Optimal sampling is the first amplitude-aware sampling in any quantum circuit evaluations works, classical or quantum.
Furthermore, this paper establishes the optimality of the algorithm.
On the other hand,
the state-of-the-art classical simulation work~\cite{liu2021closing} uses sampling that is
(1) applied in a quite different context,
(2) merely random,
(3) without any error bounds guarantees, and
(4) narrowly applies to random circuits such as Supremacy and will not work for all other benchmarks used in our paper.
While ScaleQC can perform exact reconstructions of the input quantum circuit by computing all the subcircuit entries,
some subcircuit entries affect the output accuracy much more significantly than the others.
As a result, by intelligently selecting and only computing the most contributing subcircuit entries,
optimal sampling retains the closest approximation while performing the least amount of computation possible.
Section~\ref{sec:arbitrary_prob} first introduces the sampling framework for any arbitrary sampling probability,
and derives the dependence of approximation errors on the sampling probability.
Section~\ref{sec:optimal_prob} then shows how to choose the optimal sampling probability to minimize the approximation errors with a sub-linear computation cost.
\input{text/Arbitrary_Sampling}
\subsection{Sampling with Optimal Probability}\label{sec:optimal_prob}
Optimal sampling probability aims to intelligently select the important terms more often.
Lemma~\ref{lemma:optimal_sampling} shows the optimal sampling probabilities in terms of minimizing the expected approximation error $\epsilon$ for a given number of samples $c$.
\begin{lemma}
Define $\widetilde{P}$ according to Algorithm~\ref{alg:arbitrary_sampling} as an approximation to $P$,
then the optimal probability distribution that minimizes this expected approximation error is
\begin{equation}
q_k=\frac{\prod_{i=1}^{n_C}|p_{i,k}|}{\sum_{k'=1}^{4^K}\prod_{i=1}^{n_C}|p_{i,k'}|}\label{eq:optimal_probability}
\end{equation}
It follows that the optimal expected approximation error decreases linearly with number of samples
\begin{equation}
\mathbb{E}[\epsilon]_{\text{optimal}}=\frac{1}{c}\left(\sum_{k=1}^{4^K}\prod_{i=1}^{n_C}|p_{i,k}|\right)^2-\frac{1}{c}|P|^2\label{eq:optimal_error}
\end{equation}
\label{lemma:optimal_sampling}
\end{lemma}
The proof closely follows from the matrix product proofs in~\cite{drineas2006fast}.
Optimal sampling guarantees the best possible $\epsilon$ for a given number of samples.
Since optimal sampling chooses the edge bases with replacement,
selecting $c$ samples usually requires to compute much fewer than $c$ distinct edge bases.
This is especially beneficial if the optimal probabilities concentrate on just a few edge bases.
In fact, this demonstrates the advantage of optimal sampling over exact computation in its ability to intelligently select the edge bases that matter the most.
Equation~\ref{eq:optimal_error} shows that the error decreases linearly with the number of samples $c$.
However, since the actual amount of computation required only depends on the number of distinct samples,
optimal sampling in fact provides a sub-linear computation complexity to reduce the approximation errors.
An intuitive understanding of the optimal sampling method is that
a particular subcircuit output contributes more to the quantum state probability if its output has larger magnitudes.
Optimal sampling hence seeks to only compute the subcircuit entries with higher magnitudes.
Optimal sampling significantly reduces the amount of computation,
and offers an optional trade-off versus the exact computation.
\subsection{Sampling with Arbitrary Probability}\label{sec:arbitrary_prob}
\begin{algorithm}[t]
\DontPrintSemicolon
\SetAlgoLined
\caption{ARBITRARY SAMPLING}\label{alg:arbitrary_sampling}
\KwIn{Number of samples $c$.
Sampling probability $\{q_k\}_{k=1}^{4^K}$ such that $\sum_{k=1}^{4^K}q_k=1$.}
Initialize a counter $\lambda_k=0$, $\forall k\in\{1,\ldots,4^K\}$\;
\For{$t=1\to c$}{
Pick $k_t\in\{1,\ldots,4^K\}$ with probability $P[k_t=k]=q_k$ independently and with replacement\;
$\lambda_{k_t}\gets\lambda_{k_t}+1$\;
}
$\widetilde{P}\equiv\sum_{k}\lambda_{k}\otimes_{i=1}^{n_C}p_{i,k}/cq_{k}$\;
\end{algorithm}
The actual computation of the compute graph contraction process is in fact matrix multiplications.
Every column of the leading matrix and every row of the trailing matrix are constructed from the subcircuit entries.
As such, approximating the result is similar with the Monte Carlo approximations of matrix products~\cite{drineas2006fast}.
Instead of computing the exact result by considering every leading column and its corresponding trailing row,
we can sample an important subset of the matrix elements to include in the computations to trade accuracy with runtime.
Specifically, we aim to minimize the approximation error, defined as
\begin{equation}
\epsilon\equiv\left|P-\widetilde{P}\right|^2\label{eq:approximation_error}
\end{equation}
where $P$ is the ground truth of the quantum circuit and $\widetilde{P}$ is its approximation.
Algorithm~\ref{alg:arbitrary_sampling} shows a sampling algorithm with arbitrary sampling probabilities,
which samples a total of $c$ edge bases.
Following similar proofs from~\cite{drineas2006fast},
Lemma~\ref{lemma:arbitrary_sampling} shows the expectation and approximation error guarantees.
\begin{lemma}\label{lemma:arbitrary_sampling}
For any valid probability distributions, define $\widetilde{P}$ according to Algorithm~\ref{alg:arbitrary_sampling} as an approximation to $P$.
The expectation of any quantum state $\forall j\in\{1,\ldots,2^n\}$
and the expectation of the overall approximation error are
\begin{eqnarray}
\mathbb{E}[\widetilde{P}_j]&=&P_j\label{eq:arbitrary_expectation}\\
\mathbb{E}[\epsilon]&=&\frac{1}{c}\sum_{k=1}^{4^K}\frac{1}{q_k}\prod_{i=1}^{n_C}|p_{i,k}|^2-\frac{1}{c}|P|^2\label{eq:arbitrary_error}
\end{eqnarray}
\end{lemma}
Equation~\ref{eq:arbitrary_expectation} shows that the expectation of the result is independent of the choice of the sampling probabilities.
In fact, Algorithm~\ref{alg:arbitrary_sampling} always converges to the exact values even for uniform sampling.
However, Equation~\ref{eq:arbitrary_error} shows that the expectation of the approximation errors depends on the sampling probabilities.
Note that the number of samples $c$ is allowed to exceed $4^K$.
Sampling the same summation term more than once just equates to multiply it by its frequency.
Since the compute graph contraction process does not compute $\widetilde{P}$ term by term,
this does not add extra compute overhead.
In fact, our experiments using optimal sampling show that in many cases,
the vast majority of the terms do not matter and are never picked,
even when $c$ is large.
\subsection{Quantum and Classical Resources Tradeoff}
\wtnote{Sweep the max load factor for an example benchmark}
\subsection{Uniform Sampling}
\begin{algorithm}[ht]
\SetAlgoVlined
Initialize $\widetilde{P}=0\in\mathbb{R}^{2^n}$.\\
Choose $c\in\mathbb{Z}^+$ such that $1\leq c\leq4^K$.\\
Choose $\{p_k\}_{k=1}^{4^K}$ such that $p_k=\frac{1}{4^K}$.\\
\For{$t=1$ to $c$}{
Pick $k_t\in\{1,\ldots,4^K\}$ with probability $P[k_t=k]=p_k$ independently and with replacement.\\
Use QPUs to evaluate $C_{i,k_t}$, $\forall i\in\{1,\ldots,n_C\}$.\\
Compute $\otimes_{i=1}^{n_C}C_{i,k_t}/cp_{k_t}$ and add to $\widetilde{P}$.
}
Return $\widetilde{P}$.
\caption{UNIFORM SAMPLING (US)}
\label{alg:uniform_sampling}
\end{algorithm}
Algorithm~\ref{alg:uniform_sampling} uniformly samples the summation terms. Uniform sampling is the easiest to implement and does not require any prior knowledge on the exact entries of the output of the subcircuits. This carries two benefits: (1) there is no need to compute the individual $p_k$ for the summation terms, which can be difficult due to the large number of $k$; and (2) the QPUs only need to evaluate the subcircuit variations that get picked, instead of having to evaluate everything.
Substituting uniform probabilities into Equation~\ref{eq:GR_error} gives the approximation error of uniform sampling.
\begin{equation}
\mathbb{E}\left[|P-\widetilde{P}|^2\right]_{\text{uniform}}=\frac{4^K}{c}\sum_{k=1}^{4^K}\prod_{i=1}^{n_C}|C_{i,k}|^2-\frac{1}{c}|P|^2\label{eq:uniform_error}
\end{equation}
\subsection{Runtime and Accuracy Trade-offs of Approximate Outputs}
\begin{figure}[t]
\centering
\includegraphics[width=\linewidth]{figures/compare_states_merging.pdf}
\caption{Accuracy and runtime comparisons for a $24$-qubit benchmark circuit with $0$ degree of connection.
Every data point is the average of $5$ random trials.
Cut\_S and Cut\_SM use the same samples for each trial.
Cut\_SM runs to completion with $2^{10}$ bins per recursion.
Given enough recursions, states merging does not degrade the output accuracy.
States merging runs slower for medium sized benchmarks but will scale to arbitrary sized circuits.
The computation cost of optimal sampling is sub-linear with respect to accuracy.}
\label{fig:compare_states_merging}
\end{figure}
\begin{figure}[t]
\centering
\includegraphics[width=\linewidth]{figures/compare_sampling.pdf}
\caption{Accuracy and runtime comparisons for a $24$-qubit benchmark circuit with $0.5$ degree of connection.
The example has $5$ cuts hence $4^5$ edge bases without sampling.
Cut\_SM automatically chooses the $2$ most important edge bases.
Cut\_SM and Cut\_M are both capped at $2^{10}$ bins per recursion.
Optimal sampling trades large runtime improvement for negligible accuracy loss.
}
\label{fig:compare_sampling}
\end{figure}
While NISQ QPU noise is the bottleneck for producing accurate results nowadays,
we anticipate ScaleQC applications to become much more useful with medium sized noise resilient QPUs.
Thus, we focus on the non-QPU sources of approximations and inaccuracies
from both optimal sampling and states merging.
Furthermore, the possible values of the approximation error depends on the ground truth $P$ itself,
hence approximation errors across different circuits do not directly compare.
As a result, each experiment only compares the error for a single benchmark circuit.
In addition, as Section~\ref{sec:compute_graph_contraction} mentions,
while ScaleQC produces accurate outputs,
the results are usually in a different qubit order due to the compute graph contraction orders.
For practical purposes,
ScaleQC helps locate a very small subset of solution states and can easily convert the qubit orders for the solution states found.
However, doing so for all $2^n$ states can be slow.
Hence the experiments use $24$-qubit benchmark circuits.
Figure~\ref{fig:compare_states_merging} compares Cut\_S and Cut\_SM for various number of samples.
For this experiment only, we append $5$ $Hadamard$ gates to arbitrary qubits in the $BV$ benchmark in order to arbitrarily encode more solution states.
This temporary modification more clearly demonstrates the effect of optimal sampling.
Cut\_SM combines states merging in addition to Cut\_S.
Given enough number of recursions,
Cut\_SM achieves similar accuracy as Cut\_S.
Although Cut\_SM is slower than Cut\_S for medium sized circuits,
it works for arbitrary sized benchmarks because it circumvents the memory requirements via merging.
The computation cost of optimal sampling is only sub-linear with respect to approximation errors.
The approximation errors decrease polynomial for Cut\_S as the number of samples increases.
Meanwhile, the runtime of Cut\_S does not increase as much.
Using more samples simply re-picks the most important ones more often.
Since the runtime only depends on the number of distinct samples,
more samples decrease the errors while maintaining the runtime.
Figure~\ref{fig:compare_sampling} compares Cut\_M and Cut\_SM for various number of recursions.
The errors decrease rapidly as more recursions are used.
The exact number of recursions is not directly controlled,
as states merging also terminates when all the solution states are found.
Hence the number of recursions in the figure appears irregular.
For each of the $1$, $10$, $20$, $50$ and $100$ max number of recursions,
we repeat $5$ trials.
Cut\_M computes all $4^5$ edge bases and is able to produce nearly the exact output after around $30$ recursions.
Cut\_SM further combines optimal sampling with $2^{10}$ samples and produces quite similar accuracy.
Experiment shows that out of the $2^{10}$ total samples picked by Cut\_SM,
only $2$ are distinct.
Thus, Cut\_SM is able to ignore a lot of the edge bases that do not affect the output
and only computes the ones that matter.
As a result, optimal sampling trades large runtime improvement for little accuracy loss.
\section{Conclusion}
This paper overcomes the classical runtime and memory scalability challenges for hybrid computation
via novel post-processing algorithms and develops the corresponding cuts searching algorithm.
By distributing large quantum workloads to quantum and classical processors,
we demonstrate up to $1000$-qubit quantum circuits running on both QPUs and GPUs,
which is significantly beyond the reach of either platform alone and previous hybrid workflows.
As ScaleQC bridges the classical and the quantum technologies and paves the way for hybrid computations,
its future developments naturally benefit from advancements on both sides.
\subsection{Essential Sampling}
\begin{algorithm}[ht]
\SetAlgoVlined
Initialize $\widetilde{P}=0\in\mathbb{R}^{2^n}$.\\
Relabel $j\in\{1,\ldots,n_C\}$, where $C_j$ has a manageable number of distinct elements, as $C_1$.\\
Use QPUs to evaluate $C_{1,k}$, $\forall k$.\\
Choose $c\in\mathbb{Z}^+$ such that $1\leq c\leq4^K$.\\
Choose $\{p_k\}_{k=1}^{4^K}$ such that $p_k=\frac{|C_{1,k}|}{\sum_{k'}|C_{1,k'}|}$.\\
\For{$t=1$ to $c$}{
Pick $k_t\in\{1,\ldots,4^K\}$ with probability $P[k_t=k]=p_k$ independently and with replacement.\\
Use QPUs to evaluate $C_{i,k_t}$, $i\in\{2,\ldots,n_C\}$.\\
Compute $\otimes_{i=1}^{n_C}C_{i,k_t}/cp_{k_t}$ and add to $\widetilde{P}$.
}
Return $\widetilde{P}$.
\caption{ESSENTIAL SAMPLING (ES)}
\label{alg:essential_sampling}
\end{algorithm}
Uniform sampling is easy to implement but may have poor approximation errors. Optimal sampling has the minimum approximation errors, but needs to satisfy the implementation prerequisites. Algorithm~\ref{alg:essential_sampling} provides a balanced trade-off. Essential sampling samples the summation terms based on the output of one of the ``narrow'' subcircuits. A ``narrow'' subcircuit has a manageable number of distinct elements so that a non-uniform sampling distribution can be efficiently computed.
Substituting the probabilities into Equation~\ref{eq:GR_error} gives the expected approximation error of essential sampling.
\begin{eqnarray*}
\mathbb{E}\left[|P-\widetilde{P}|^2\right]_{\text{essential}}&=&\frac{1}{c}\sum_{k=1}^{4^K}\frac{\sum_{k'}|C_{1,k'}|}{|C_{1,k}|}\prod_{i=1}^{n_C}|C_{i,k}|^2-\frac{1}{c}|P|^2\\
&=&\frac{1}{c}\sum_{k,k'=1}^{4^K}\frac{|C_{1,k'}|}{|C_{1,k}|}\prod_{i=1}^{n_C}|C_{i,k}|^2-\frac{1}{c}|P|^2
\end{eqnarray*}
Compared to uniform sampling, ES guarantees a lower approximation error. Since ES intentionally picks a subcircuit with a manageable number of distinct elements, the corresponding sampling probabilities can be efficiently computed. In addition, the QPUs only need to fully evaluate one subcircuit and evaluate the rest on the fly only if picked. Therefore, ES uses information of one subcircuit to automatically extract the essential variations of other subcircuits.
\section{Framework Overview}
\begin{algorithm}[t]
\DontPrintSemicolon
\SetAlgoLined
\caption{ScaleQC Framework}\label{alg:framework}
\KwIn{Quantum circuit $C$.
Max load factor $\alpha$.
Max number of probability bins allowed per recursion $M$.
Max number of recursions $R$.}
Initialize an empty list $L$\;
Recursion counter $r\gets0$\;
Find cuts for $C$ to satisfy the max load $\alpha$ and produce the compute graph $G$. \tcp*[l]{Section~\ref{sec:locate_cuts}}
$n_i\gets$ number of data qubits in subcircuit $i\in\{1,\ldots,n_C\}$\;
\While{$r<R$}{
\uIf{$r>0$ \textbf{and} $bin$ is None}{
BREAK\tcp*[l]{All solution(s) are found}
}
Compute the bin assignments for each subcircuit \tcp*[l]{Algorithm~\ref{alg:states_assignment}[$r$,$bin$,$M$,$n_{1\ldots n_C}$], Section~\ref{sec:states_merging}}
\textbf{QPU} : Run the subcircuits to produce the merged probability bins for the subcircuit $\{p_{i,k}\}$\;
Contract the compute graph $G$ to reconstruct the probability sums for the bins \tcp*[l]{Section~\ref{sec:compute_graph_contraction}}
Append the $R$ largest bins not yet fully expanded to $L$\;
Sort and truncate $L$ to keep the largest $R$ bins\;
Pop $bin$ from $L$\;
$r\gets r+1$\;
}
\end{algorithm}
Algorithm~\ref{alg:framework} outlines the overall framework of ScaleQC.
The input to the framework includes the quantum circuit itself
and a list of hyperparameters:
\begin{enumerate}
\item Max QPU load factor $\alpha$: The maximum fraction of the two-qubit gates each QPU can handle.
For example, $\alpha=0.5$ for a quantum circuit with $100$ two-qubit gates means ScaleQC needs to cut into subcircuits with at most $50$ two-qubit gates.
\item Max per-recursion bins $M$: The maximum number of probability bins each states merging recursion computes.
\item Max recursions $R$: maximum number of states merging recursions to run.
\end{enumerate}
The framework is mainly built around an iterative procedure called the states merging to locate the solution states for the input quantum circuit
(the $while$ loop in ALgorithm~\ref{alg:framework}).
Section~\ref{sec:states_merging} discusses the iterative procedure in detail.
On a high level, ScaleQC recursively evaluates the subcircuits with QPUs and searches the solution states with classical computing until all solution states are found,
or the user-defined max recursion depth $R$ is reached first.
States merging narrows down to a range of possible states containing the solutions when the max recursion depth is reached first.
While one can easily use a lot of cuts to separate a large circuit to satisfy the size constraints,
the scalability and efficiency of the post-processing largely rely on the strategic choice of the cutting points.
Section~\ref{sec:locate_cuts} discusses the MIP solver used to find high quality cuts for any input quantum circuits.
Applying the cuts to the input quantum circuit then produces a compute graph abstraction for post-processing.
Quantum and classical platforms then use the compute graph generated from the cuts to reconstruct the original quantum circuit output.
Section~\ref{sec:compute_graph_contraction} establishes the classical post-processing of circuit cutting as tensor network contractions,
and hence introduces a compute graph contraction method running on GPUs for an efficient classical post-processing.
\section{Related Work}\label{sec:related_work}
Many quantum compiler works exist to improve the performance of standalone QPUs to evaluate quantum circuits~\cite{nannicini2021optimal,tan2020optimality,murali2019noise,ding2020systematic,murali2020software}.
Quantum error correction is the key to build reliable QPUs~\cite{fowler2012surface,bravyi2012subsystem,javadi2017optimized,yoder2017surface,litinski2019game}.
QAOA uses classical computing to tune quantum circuit hyper-parameters to solve optimization problems~\cite{farhi2014quantum,tomesh2021coreset}.
However, they still rely entirely on QPUs to compute the quantum circuits.
Prior circuit cutting implementations~\cite{tang2021cutqc,tang2022cutting} rely on parallelization techniques for faster compute
while performing direct reconstruction of Equation~\ref{eq:CutQC} with high overhead.
The various post-processing algorithms proposed in this paper go beyond what is possible from such techniques
and reduce the overhead itself.
\subsection{Backends}\label{sec:backends}
The following three backends are involved in the experiments:
\begin{enumerate}
\item Quantum: Direct evaluation of quantum circuits on a powerful enough QPU without circuit cutting;
\item Cut: The standard ScaleQC framework in full state;\label{backend:cut}
\item Cut\_M: Cut with states merging.
This is equivalent to full state evaluation when states merging runs to completion.
We run the max number of $mn/\log_2{M}$ recursions to guarantee completion.\label{backend:cut_m}
\end{enumerate}
Large circuits tend to have larger subcircuits as well,
but the Noisy Intermediate Scale Quantum (NISQ) devices nowadays are still too small and noisy for any meaningful experiments at even medium sizes.
Hence we use random numbers as the subcircuit output.
Although it does not produce any useful circuit outputs,
it does not affect the post-processing runtime results of the experiments.
We expect more reliable QPUs to enable a full implementation of the ScaleQC framework.
We use a single compute node with $64$ CPUs equipped with a single Nvidia A$100$ GPU
for all the cuts finding and classical post-processing.
\section{Introduction}
Quantum Computing (QC) has been proposed as a promising counterpart to classical computing, but QPUs face demanding hardware requirements to operate at useful scales.
Many quantum algorithms offer runtime advantages over the best known classical algorithms, such as unstructured database search~\cite{grover1996fast} and integer factorization~\cite{shor1999polynomial}.
To solve a problem, researchers develop a quantum algorithm that is represented as a $n$ qubit quantum circuit.
A QPU then executes the circuit and samples its probability output to find the ``solution'' states,
indicated by their much higher quantum state amplitudes than the non-solution states.
In order to even run the circuit at all, the QPU must have at least $n$ qubits.
Furthermore, the QPU's qubits must be accurate and robust enough to support the quantum workload without accumulating too much noise to produce quality solutions.
However, these two requirements put a heavy toll on the hardware.
As an example, the famous Shor's integer factorization algorithm is expected to take millions of physical qubits in order to construct enough number of high quality logical qubits to run problems at practical scales~\cite{suchara2013comparing}.
Instead, the recent introduction of the quantum circuit cutting theory~\cite{peng2020simulating} and its early demonstrations~\cite{tang2021cutqc, tang2022cutting}
hint at the potential to combine multiple less capable QPUs and classical post-processing into a hybrid architecture.
Circuit cutting techniques divide a large quantum circuit into several smaller subcircuits,
which can be executed in parallel on multiple QPUs with lower qubit quantity and quality requirements.
Classical post-processing is then used to reconstruct the output from these small subcircuit outputs.
This hybrid architecture is analogues to the classical parallel computing where a large workload is distributed among many computing nodes,
which afford to be much less powerful,
but at the expense of some communication cost to reconstruct the results.
Dividing a large quantum circuit into many smaller subcircuits introduces obvious advantages over relying on either quantum or classical platforms alone.
The most important advantage comes from that the subcircuits usually have fewer quantum gates, potentially also have fewer qubits.
This puts a much lower qubit quality requirement for QPUs to produce accurate results, as the shallower and less complicated subcircuits incur much less crosstalk~\cite{mundada2019suppression}, decoherence~\cite{klimov2018fluctuations}, gate errors~\cite{arute2019quantum} and control difficulties~\cite{abdelhafez2020universal}.
In addition, having fewer qubits directly reduces the strict size limit on QPUs.
Specifically, \cite{tang2021cutqc} demonstrates that certain algorithms can be run with fewer than half the number of qubits.
Furthermore, since QPUs operate much faster than the classical simulations of quantum circuits, such hybrid architecture offers significant runtime speedup.
Overall, quantum circuit cutting techniques combine less powerful QPUs and classical computing to expand the computational reach for both.
Despite the obvious advantages, two key challenges remain to make quantum circuit cutting practical.
First, the classical post-processing overhead grows quickly with the number of cuts and bottlenecks the end-to-end workflow, preventing its application to hard-to-cut circuits.
Second, the memory overhead to store and compute the state space of quantum circuits still doubles with every additional qubit, preventing its application to large circuits.
This paper overcomes the fundamental runtime and memory scalability difficulties of quantum circuit cutting and makes the hybrid architecture practical.
Via an iterative search framework called states merging,
ScaleQC offers the ability to locate solution states for arbitrarily large quantum circuits,
hence bypassing the classical memory limitations.
Via an automatic cut solver,
ScaleQC finds high quality cuts suitable for post-processing and generalizes to different benchmarks.
Via the compute graph contraction algorithm,
ScaleQC reduces the runtime overhead to enable the applications to complicated circuits.
To evaluate the performance,
we ran several realistic quantum benchmark algorithms such as QAOA~\cite{saleem2020approaches},
AQFT~\cite{barenco1996approximate},
Maximum Independent Set~\cite{saleem2020approaches},
Supremacy~\cite{arute2019quantum} and BV~\cite{bernstein1997quantum}.
We demonstrated running quantum circuits of up to $1000$ qubits.
Our contributions include the following:
\begin{enumerate}
\item \textbf{Reduce Memory}: Developed a states merging method to efficiently locate arbitrary solution states for large quantum circuits, thus overcoming the classical memory scalability obstacles.
\item \textbf{Reduce Runtime}: Developed a Mixed Integer Programming (MIP) solver that automatically finds cuts for large quantum circuits to allow easier classical post-processing,
while constrained by user-specified available QPU resources.
\item \textbf{Reduce Runtime}: Developed a compute graph contraction algorithm to significantly reduce the classical runtime overhead.
\end{enumerate}
\subsection{Circuit Cutting Use Cases}
Several theory proposals~\cite{bravyi2016trading, peng2020simulating} first introduce the possibility of quantum circuit cutting.
Many small-scale demonstrations exist for chemical molecule simulations~\cite{eddins2021doubling} and variational quantum solvers~\cite{yuan2021quantum}.
In addition, several quantum computing industry leaders such as IBM and Xanadu~\cite{Xanadu} are actively developing quantum circuit cutting products.
These efforts either apply the hybrid architecture to real-world problems,
or aim at incorporating it into the existing quantum hardware and software stack.
However, none of the current efforts addresses the scalability obstacles.
\section{Locate Cutting Points}\label{sec:locate_cuts}
\begin{figure*}[!t]
\centering
\begin{subfigure}{0.5\textwidth}
\centering
\includegraphics[width=\textwidth]{figures/circuit.pdf}
\caption{Quantum circuit.
Each horizontal line is an input qubit.
Time goes from left to right.
The indices on the two-qubit $CX$ gates map across the subfigures.}
\label{fig:circuit}
\end{subfigure}
\begin{subfigure}{0.4\textwidth}
\centering
\includegraphics[width=\textwidth]{figures/dag.pdf}
\caption{DAG representation of~\ref{fig:circuit} without the single-qubit gates.
The green vertices indicate the input qubits.
The red vertices indicate the output qubits.
The blue vertices indicate the two-qubit quantum gates.
The directed edges indicate the time flow of the qubit lines.
Qubits in the initial states (green) go through the quantum gates (blue) and measured as output (red).}
\label{fig:dag}
\end{subfigure}
\newline
\begin{subfigure}{0.4\textwidth}
\centering
\includegraphics[width=\textwidth]{figures/cut_dag.pdf}
\caption{We only consider the blue quantum gates from~\ref{fig:dag} for the DAG partition problem.
The red edges indicate the cuts found by our solver, subject to $\alpha=0.4$ max load constraint, i.e. $3$ two-qubit gates.}
\label{fig:cut_dag}
\end{subfigure}
\begin{subfigure}{0.4\textwidth}
\centering
\includegraphics[width=\textwidth]{figures/compute_graph.pdf}
\caption{Compute graph abstraction.
The cut (red) edges among the subcircuits are the indices to be contracted.
The output qubit (black) edges are the output indices.}
\label{fig:compute_graph}
\end{subfigure}
\caption{QAOA benchmark circuit solving the maximum independent set problem for a random Erdos-Renyi graph with $5$ qubits.}
\label{fig:compute_graph_example}
\end{figure*}
With the overall framework in mind,
this section discusses the first step in circuit cutting -- determine the cutting points.
Figure~\ref{fig:circuit} shows an example QAOA quantum circuit solving the maximum independent set problem for a random Erdos-Renyi graph with $5$ qubits.
Quantum circuits can also be represented as directed acyclic graphs (DAG),
where the vertices are the gates and the edges are the qubit lines connecting the gates.
Hence, locating the cutting points is equivalent to partitioning the quantum gates into certain number of subcircuits.
Note that DAG partition problems only concern with the connection among the vertices,
but the single qubit gates do not affecct such connections.
As a result, the single qubit gates are ignored during cuts finding,
and are simply attributed to the same subcircuit as their closest two-qubit gate neighbor.
Figure~\ref{fig:dag} shows its corresponding DAG representation after removing the single-qubit gates.
The input (green) and output (red) qubit vertices are illustrated for a clearer correspondence with Figure~\ref{fig:circuit}.
However, there is no reason to partition any I/O vertices solely by themselves.
Therefore, the I/O vertices are also safely ignored during cuts finding.
\subsection{MIP Model}
Figure~\ref{fig:cut_dag} shows the DAG graph to partition,
which only includes the two-qubit quantum gates.
We adapt from~\cite{tang2021cutqc} to encode the DAG for our MIP solver.
We denote the $n_C$ subcircuits as $\left\{C_1,\ldots,C_{n_C}\right\}$,
all the qubit lines as edges in $E$,
and all the quantum gates as vertices in $V$.
Furthermore, we define the edge and vertex variables as
\begin{eqnarray*}
x_{e,c}&\equiv&
\begin{cases}
1 & \text{if edge $e$ is cut by subcircuit $c$}\\
0 & \text{otherwise}
\end{cases}\\
y_{v,c}&\equiv&
\begin{cases}
1 & \text{if vertex $v$ is in subcircuit $c$}\\
0 & \text{otherwise}
\end{cases}\\
&&\forall{e}\in{E},\forall{v}\in{V},\forall{c}\in{\{1\ldots n_C\}}
\end{eqnarray*}
The numbers of incoming and outgoing cut edges to a subcircuit are modeled as
\begin{eqnarray*}
I_c&=&\sum_{e\in E}x_{e, c} \times y_{e[1], c}\\
O_c&=&\sum_{e\in E}x_{e, c} \times y_{e[0], c}
\end{eqnarray*}
The number of quantum gates in each subcircuit is modeled as
\begin{equation*}
S_c = \sum_{v\in V}y_{v, c}
\end{equation*}
\subsection{MIP Constraints and Objective}
Figure~\ref{fig:compute_graph} shows the subcircuit abstraction obtained after applying some cuts to the DAG.
We call this abstraction the compute graph,
where each subcircuit is a vertex and the edges are the cuts selected.
Each subcircuit is also connected with some output qubit vertices.
We limit the max subcircuit size based on the load factor $\alpha$ and demand that
\begin{equation}
S_c\leq\alpha|V|,\forall{c}\in{C}\label{MIP:load_constraint}
\end{equation}
In addition, the MIP model contains the corresponding constraints to help define the edge and vertex variables.
Our efficient post-processsing algorithms escape the seemingly exponential cost suggested by Equation~\ref{eq:CutQC},
but they also make the exact post-processing cost of quantum circuit cutting much nuanced and depend on many factors.
We defer the detailed discussions of post-processing the compute graph to Section~\ref{sec:compute_graph_contraction},
specifically its cost in Section~\ref{sec:contraction_cost}.
Let us accept for now that the computation complexity is closely related with the compute graph degree,
which serves as an indirect measure of the computation overhead.
The compute graph degree is just the max number of cuts on any subcircuit,
which is simply the sum of the incoming and outgoing cut edges.
Therefore, our MIP solver seeks to minimize
\begin{equation}
L\equiv \max_{c\in{\{1\ldots n_C\}}}{\{I_c+O_c\}}\label{MIP:objective}
\end{equation}
Furthermore, the number of subcircuits $n_C$ to partition into cannot be captured as part of the optimization model.
Instead, we run our solver for up to $n$ subcircuits for a $n$-qubit benchmark to obtain several possible solutions.
Results from Section~\ref{sec:compute_graph_contraction} then allow us to predict the exact post-processing cost for each.
The cutting solution with the lowest computation cost is eventually selected.
Overall, the cut search problem is transformed as an integer programming model.
However, this constrained graph partition problem is conjectured to have no efficient solutions in polynomial time~\cite{andreev2006balanced}.
Instead, we utilized the commercial solver Gurobi~\cite{gurobi} to implement our model.
We limit the runtime to $30$ seconds for each candidate $n_C$
for an approximate solution if an optimal solution is not found within the time.
\subsection{Circuit Cutting Challenges}\label{sec:challenges}
The key challenges of applying quantum circuit cutting at useful scales lie with the classical post-processing.
Equation~\ref{eq:CutQC} clearly shows the two challenges as the following:
\begin{enumerate}
\item The length of the full output of a $n$-qubit circuit is $2^n$.
Large quantum circuits quickly bottleneck the classical memory as well as the runtime.
\item The classical post-processing scales exponentially with the number of cuts required $K$ and hence bottlenecks the runtime.
\end{enumerate}
This paper develops the states merging technique to bypass the memory challenge altogether while reducing the classical overhead.
In addition, this paper proposes compute graph contraction to significantly reduce the runtime overhead.
\section{Methodology}
This section introduces the various backends, benchmarks, and metrics.
\input{text/Backends}
\input{text/Benchmarks}
\input{text/Metrics}
\section{Compute Graph Contraction}\label{sec:compute_graph_contraction}
This section introduces compute graph contraction for an efficient post-processing.
According to Equation~\ref{eq:CutQC},
the final reconstruction of the output of the uncut circuit requires permutating the $\{I,X,Y,Z\}$ indices for the $K$ cut edges,
taking the outer products among the subcircuits, and sum over all the $4^K$ terms.
The naive computation of Equation~\ref{eq:CutQC} quickly becomes the bottleneck for complicated circuits
as it incurs many redundant computations.
This is because subcircuits in general do not connect with all the edges
and hence remain unchanged across many different edge bases.
In addition, it is preferrable to group many outer products as matrix products,
as GPUs usually compute matrix products much faster than the explicit iterations over the rows and columns.
Compute graph contraction hence seeks to eliminate the redundant computations and exploit the more efficient compute kernels.
\subsection{Relation with Tensor Network Contraction}
\begin{figure}[t]
\centering
\begin{subfigure}{0.3\textwidth}
\centering
\includegraphics[width=\textwidth]{figures/tensor_contraction.pdf}
\caption{Contracting a pair of tensors means taking the sum over their common index (indices).}
\label{fig:tensor_contraction}
\end{subfigure}
\begin{subfigure}{0.4\textwidth}
\centering
\includegraphics[width=\textwidth]{figures/subcircuit_contraction.pdf}
\caption{Contracting a pair of subcircuits is equivalent to tensor contraction.
Each cut edge has a dimension of $4$,
each output qubit has a dimension of $2$.}
\label{fig:subcircuit_contraction}
\end{subfigure}
\caption{Contracting two subcircuits is equivalent to a pair of tensor contraction.}
\label{fig:graph_to_tensor}
\end{figure}
\begin{figure}[t]
\centering
\begin{subfigure}{0.35\textwidth}
\centering
\includegraphics[width=\textwidth]{figures/contraction_step_1.pdf}
\caption{Contracting subcircuits $1,2$.
Subcircuit $1$ tensor has dimensions of $\{4,4,4,2^1\}$.
Subcircuit $2$ tensor has dimensions of $\{4,4,2^0\}$.
Subcircuit $3$ tensor has dimensions of $\{4,4,4,2^4\}$.}
\label{fig:contraction_step_1}
\end{subfigure}
\begin{subfigure}{0.4\textwidth}
\centering
\includegraphics[width=\textwidth]{figures/contraction_step_2.pdf}
\caption{Contracting subcircuit $3$ with the already contracted subcircuits $1,2$.}
\label{fig:contraction_step_2}
\end{subfigure}
\begin{subfigure}{0.4\textwidth}
\centering
\includegraphics[width=\textwidth]{figures/contraction_step_3.pdf}
\caption{Contraction process finishes.
The output is a single tensor of dimension $\{2^5\}$,
as expected from a $5$-qubit input circuit.}
\label{fig:contraction_step_3}
\end{subfigure}
\caption{Contracting the compute graph example from Figure~\ref{fig:compute_graph}.
The output qubits are abbreviated as the number of qubits in each tensor for brevity.
The dashed edges are the contraction edges in each step.
The sub-figures show the best contraction order obtained from Section~\ref{sec:determine_contraction_order}.}
\label{fig:compute_graph_contraction_example}
\end{figure}
Post-processing the compute graph is in fact equivalent to tensor network contractions,
which have been widely used in classical simulations of quantum systems~\cite{vidal2003efficient,vidal2004efficient,schollwock2011density,verstraete2004matrix}.
Figure~\ref{fig:graph_to_tensor} establishes the equivalence of a pairwise tensor contraction with a compute graph contraction containing two subcircuits.
Figure~\ref{fig:tensor_contraction} shows contracting a pair of tensors,
which are simply multi-dimensional matrices.
It hence represents contracting
a tensor $A$ of shape $\dim(i)$-by-$\dim(j)$ with
a tensor $B$ of shape $\dim(j)$-by-$\dim(k)$
to produce a tensor $C$ of shape $\dim(i)$-by-$\dim(k)$,
where $\dim(\cdot)$ is the dimension of an index.
By examining the definition of the resulting tensor $C$,
it is easy to verify that a pairwise tensor contraction is simply the matrix product $C=AB$.
Figure~\ref{fig:subcircuit_contraction} shows a hypothetical example of contracting a compute graph with two subcircuits.
Each subrcircuit is a tensor,
the cut edges are the common indices to be contracted,
and the output qubits are the output indices.
Each cut edge has a dimension of $4$ because of the $\{I,X,Y,Z\}$ labels to permutate.
Each output qubit has a dimension of $2$ because of the $\ket{0},\ket{1}$ bases.
Explicitly writing out the output indices based off Equation~\ref{eq:CutQC} clearly shows that
the compute graph contraction is exactly a tensor contraction.
Figure~\ref{fig:compute_graph_contraction_example} shows the contraction process for the compute graph in Figure~\ref{fig:compute_graph} as tensor contractions.
Each subcircuit has different number of cuts and number of qubits,
hence different dimensions of tensors at the beginning.
Each step contracts two vertices in the compute graph.
The contraction process finishes when all the vertices are contracted into a single vertex.
The final output of compute graph contraction is a single tensor
of dimension $\{2^n\}$ for a $n$-qubit circuit when using full state reconstruction.
Furthermore, when we apply states merging to large circuits beyond classical memory,
the beginning tensors have their last dimensions as however many bins each subcircuit has.
The final output of compute graph contraction is instead a single tensor of dimension $\{M\}$.
\subsection{Memory Requirement and Compute Cost}\label{sec:contraction_cost}
The memory requirement of the post-processing comes from two parts.
First, we need to store the input subcircuit tensors.
The tensor of subcircuit $i$ has $4^{\#cuts_i}\times 2^{\#qubits}$ ($4^{\#cuts_i}\times\#bins_i$) floats
when employing full state (states merging).
Second, we need to store all the intermediate tensor products during the contraction.
The compute cost of the post-processing can be captured by the floating point multiplications required in all the contraction steps.
The number of multiplications of a pair of contraction is simply the product of all the dimensions involved.
For example, Figure~\ref{fig:tensor_contraction} requires $\dim(i)\times\dim(j)\times\dim(k)$ multiplications.
Similarly, Figure~\ref{fig:subcircuit_contraction} requires $2^1\times 4^{\#cuts}\times 2^1$ multiplications.
Now we can easily predict the memory and compute overhead of a compute graph without actually performing the computations.
The input subcircuit tensors for the example contraction step in Figrue~\ref{fig:contraction_step_1} require total
$4^3\times 2^1 + 4^2\times 2^0 + 4^3\times 2^4 = 1168$ float numbers
and $(4^2\times2^1)\times(4^1)\times(4^1\times2^0)=512$ multiplications.
The contraction step in Figure~\ref{fig:contraction_step_2} requires $4^3\times2^4+4^3\times2^1=1152$ float numbers
and $2^4\times4^3\times2^1=2048$ multiplications.
In contrast, the naive computation of Figure~\ref{fig:contraction_step_1} based on Equation~\ref{eq:CutQC} requires
$4^4\times(2^1\times2^0+2^1\times2^4)=8704$ multiplications, a $3.4\times$ extra overhead.
It is now clear that both the memory and compute cost of compute graph contraction are positively correlated with the number of cuts on each subcircuit during every contraction step.
This explains our MIP solver objective choice in Equation~\ref{MIP:objective}.
In order to keep the post-processing runtimes reasonable,
we limit the compute graph degree to be $15$.
\subsection{Two Level Index Slicing}
\begin{figure}[t]
\centering
\includegraphics[width=\linewidth]{figures/slicing.pdf}
\caption{Slicing one cut edge to express the compute graph as a summation of smaller compute graphs.}
\label{fig:slicing}
\end{figure}
It is possible that complicated compute graphs with many cuts require input subcircuit tensors too large to fit in the memory.
Hence we implement an index slicing strategy prior to their contraction to reduce the input tensor sizes.
Index slicing is to explicitly write out certain indices and express the full tensor network as a summation of smaller tensor networks.
In the context of compute graph, it is to explicitly write out certain cut edges.
For example, slicing one edge in Figure~\ref{fig:slicing} reduces the input subcircuit tensor sizes to
$4^2\times2^1+4^2\times2^0+4^2\times2^4=304$ float numbers but produces $4$ smaller compute graphs to contract.
Our heuristics keep slicing the index that reduces the overall tensor sizes the most,
until the overall sizes fit in the memory specified.
The heuristics hence produce a set of smaller compute graphs that we explicitly iterate over.
In addition, the intermediate tensor products during contractions may also exceed memory.
We further applied the index slicing algorithm from the CoTenGra software~\cite{gray2021hyper} to each sub compute graph generated from the first level of slicing.
\subsection{Determine Contraction Order}\label{sec:determine_contraction_order}
In tensor network contractions, different contraction orders significantly affect the overhead,
sometimes even introduce orders of magnitude differences.
In circuit cutting,
the contraction order of the subcircuits only affects the reconstruction up to a permutation of the qubit order,
and has no effect on the quantum state probability accuracy.
However, finding the optimal contraction order for general compute graphs is hard.
In fact, it is an active area of research and of broader interest across many disciplines~\cite{robertson1991graph,markov2008simulating,orus2014practical}.
We used the CoTenGra software~\cite{gray2021hyper} to compile the contraction order for each sub compute graph.
\subsection{Metrics}
There are two key metrics this paper looks at, namely runtime and quantum resources.
\textbf{Runtime, faster is better}:
For Quantum, it is the end-to-end runtime on a standalone QPU, which is the best runtime possible.
The Cut and Cut\_M backends are slower.
The ScaleQC runtime is the end-to-end runtime except time spent on QPUs in Algorithm~\ref{alg:framework}.
The NISQ QPUs nowadays are small, slow and too noisy for any practical purposes.
As we expect the practical ScaleQC applications to be used with medium sized reliable QPUs in the near future,
it is irrelevant to profile the NISQ QPU runtime now.
Furthermore, multiple small QPUs can be used in parallel to reduce the runtime.
In addition, the runtime advantage of QPUs over CPUs will be even more significant for larger circuits.
We expect the framework to offer more significant advantages over classical methods as larger and more reliable QPUs become available.
\textbf{Quantum Area, smaller is better}:
The quantum resources requirement is loosely defined as the product of the circuit width and depth,
called the `quantum area'.
Classical simulations require $0$ quantum area as it does not use QPUs at all.
For Quantum, it is simply the product of the number of qubits and the circuit depth of the input quantum circuit.
For the various ScaleQC backends, it is defined for the largest subcircuit produced from cutting.
The rationale is that QPUs must be able to support the workloads with a certain quantum area at high accuracy to produce accurate results.
While many hardware and software factors affect the QPUs' ability to support quantum workloads,
a smaller quantum area generally puts less burden on the quantum resources.
\section{Compute Graph Contraction}\label{sec:compute_graph_contraction}
\begin{figure}[t]
\centering
\begin{subfigure}[b]{0.4\textwidth}
\centering
\includegraphics[width=\textwidth]{figures/contraction_step_1.pdf}
\caption{Contracting subcircuits $2,3$.}
\label{fig:contraction_step_1}
\end{subfigure}
\hfill
\begin{subfigure}[b]{0.35\textwidth}
\centering
\includegraphics[width=\textwidth]{figures/contraction_step_2.pdf}
\caption{Contracting subcircuit $1$ with $2,3$.}
\label{fig:contraction_step_2}
\end{subfigure}
\hfill
\begin{subfigure}[b]{0.35\textwidth}
\centering
\includegraphics[width=\textwidth]{figures/contraction_step_3.pdf}
\caption{Contracting subcircuit $4$ with $1,2,3$.}
\label{fig:contraction_step_3}
\end{subfigure}
\caption{The figure shows the compute graph generated from cutting a $25$-qubit random benchmark circuit (Section~\ref{sec:benchmarks}) into $12$-qubit subcircuits and roughly half the circuit size.
Some of the edges have the same origin and destination subcircuits,
represented by a slash on the edges.
Each subcircuit also has different number of qubits,
hence different lengths of output vectors.
The subfigures show the best contraction order of $3,2,1,4$.
The dashed edges are the contraction edges in each step.
The double edges are the relevant edges in each step.
The solid edges are the irrelevant edges in each step.
The last contraction merges all the subcircuits into a single node (not shown) and concludes the compute graph computation.}
\label{fig:compute_graph_contraction_example}
\end{figure}
\begin{algorithm}[t]
\caption{Compute Graph Contraction}\label{alg:compute_graph_contraction}
\textbf{INPUT}
Compute graph $G$.
Contraction order $L$.
\begin{algorithmic}[1]
\State $i\gets1$
\While{$i<\#G.nodes$}
\State Initialize an empty \textit{data\_buffer}, \textit{next\_data\_buffer}
\State \textit{leading\_subcircuit} $\gets L[i]$
\State \textit{contracted\_subcircuits} $\gets L[:i]$
\State \multiline{%
\textit{contraction\_edges} $\gets$ edges connecting the \textit{leading\_subcircuit} and the \textit{contracted\_subcircuits}}
\State \multiline{%
\textit{leading\_edges} $\gets$ edges connecting only the \textit{leading\_subcircuit}}
\State \multiline{%
\textit{trailing\_edges} $\gets$ edges connecting only the \textit{contracted\_subcircuits}}
\For{$e\in\{I,X,Y,Z\}^{\#\textrm{\textit{leading\_edges}}+\#\textrm{\textit{trailing\_edges}}}$}
\State $e_l\gets e[:\#\textrm{\textit{leading\_edges}}]$
\State $e_t\gets e[\#\textrm{\textit{leading edges}}:]$
\State \multiline{%
Assign the leading edge bases $e_l$ to the \textit{leading edges}}
\State \multiline{%
Assign the trailing edge bases $e_t$ to the \textit{trailing edges}}
\State \multiline{%
Initialize the \textit{leading matrix} as a zero matrix of shape $(2^{G.sizes[L[i]]},4^{\#\textrm{contraction edges}})$}
\State \multiline{%
Initialize the \textit{trailing matrix} as a zero matrix of shape $(4^{\#\textrm{contraction edges}},2^{\sum G.sizes[L[:i]]})$}
\State $j\gets0$
\For{$[e_c]\in\{I,X,Y,Z\}^{\#\textrm{contraction edges}}$}
\State \multiline{%
Assign the contraction edge bases $[e_c]$ to the \textit{contraction edges}}
\State \multiline{%
\textit{leading matrix}$[:,j]\gets$ leading subcircuit entry}
\If{$i=1$}
\State \multiline{%
\textit{trailing matrix}$[j,:]\gets$ subcircuit $L[0]$ entry}
\Else
\State \textit{trailing matrix}$[j,:]\gets$\textit{data buffer}$[[e_r],[e_c]]$
\EndIf
\State $j\gets j+1$
\EndFor
\State \textit{contracted}$\gets$\textit{leading}$\times$\textit{trailing} \Comment{Section~\ref{sec:programming_techniques}}
\State \textit{next data buffer}$[[e_r],[e_c]]\gets$\textit{contracted}
\EndFor
\State \textit{data buffer} $\gets$ \textit{next data buffer}
\State $i\gets i+1$
\EndWhile
\end{algorithmic}
\end{algorithm}
This section introduces compute graph contraction for an efficient postprocessing.
The final reconstruction of the probability output of the uncut circuit requires taking the outer products among the subcircuits and sum over
either all (without sampling) or the most important (with optimal sampling in Algorithm~\ref{alg:arbitrary_sampling}) edge bases.
While a naive computation of Equation~\ref{eq:CutQC} can simply iterate over all the $4^K$ different edge bases,
the reconstruction quickly becomes the bottleneck for complicated circuits
as it incurs many repetitive vector multiplications.
This is because subcircuits in general do not connect with all the edges
and hence remain unchanged across many different edge bases.
Computing the overall output of a compute graph shares a similar flavor with tensor network contractions,
which have been widely used in classical simulations of quantum systems~\cite{vidal2003efficient,vidal2004efficient,schollwock2011density,verstraete2004matrix}.
Algorithm~\ref{alg:compute_graph_contraction} shows the complete compute graph contraction algorithm.
Figure~\ref{fig:compute_graph_contraction_example} shows an example compute graph with $4$ subcircuits and $10$ edges.
Subcircuit $1$ in the compute graph only has $4^5$ different entries as it only attaches to $5$ edges.
As a result, the same subcircuit $1$ entry exactly appears in $4^5$ summation terms, as there are a total of $10$ edges in the compute graph.
Compute graph contraction takes advantage of this fact and eliminates the redundant computations.
On a high level, compute graph contraction merges two subcircuits (nodes) into a single node in every step,
eventually merging the entire graph.
Since ``contracting'' two subcircuits only concerns the common edges in between them,
the order of the contraction and the sizes of the individual subcircuits greatly affect the overall overhead.
Compute graph contraction chooses an order that minimizes the number of floating point numeric operations.
The naive computation of Figure~\ref{fig:compute_graph_contraction_example} computes as:
\begin{equation}
\begin{split}
\sum_{e_{1-10}\in\{I,X,Y,Z\}^{10}}&p_1(e_{1-5})\otimes p_2(e_{1,6-9})\\
&\otimes p_3(e_{2,3,6,7,10})\otimes p_4(e_{4,5,8,9,10})\label{eq:naive_compute}
\end{split}
\end{equation}
where $p_1(e_{1-5})$ represents the output of subcircuit $1$ with the edges $1,2,3,4,5$ in some certain bases and so on.
This reconstruction computes $4^{10}$ summation terms,
each requires $2^7+2^{14}+2^{25}$ floating point multiplications and $2^{25}$ floating point additions.
There are altogether roughly $10^{13.8}$ numeric operations.
Instead, Figure~\ref{fig:contraction_step_1} shows that first contracting the subcircuits $2$ and $3$ together transforms Equation~\ref{eq:naive_compute} into
\begin{equation}
\begin{split}
\sum_{e_{1,2,3,4,5,8,9,10}}&p_4(e_{4,5,8,9,10})\otimes p_1(e_{1,2,3,4,5})\\
&\otimes\sum_{e_{6,7}}p_2(e_{1,6,7,8,9})\otimes p_3(e_{2,3,6,7,10})\label{eq:contract_step_1}
\end{split}
\end{equation}
Equation~\ref{eq:contract_step_1} first computes the $4^6$ different summations between $p_2$ and $p_3$.
Each summation term is a matrix product between
the leading matrix from subcircuit $2$ of shape $(2^1,4^2)$
and the trailing matrix from subcircuit $3$ of shape $(4^2,2^7)$.
Figure~\ref{fig:contraction_step_2} shows that further contracting the subcircuit $1$ into the contracted subcircuits gives
\begin{equation}
\begin{split}
\sum_{e_{4,5,8,9,10}}&p_4(e_{4,5,8,9,10})\otimes\sum_{e_{1,2,3}}p_1(e_{1,2,3,4,5})\\
&\otimes\sum_{e_{6,7}}p_2(e_{1,6,7,8,9})\otimes p_3(e_{2,3,6,7,10})\label{eq:contract_step_2}
\end{split}
\end{equation}
Equation~\ref{eq:contract_step_2} then computes the $4^5$ different summations between $p_1$ and the previously merged $p_{2,3}$.
Each summation term is a matrix product between
the leading matrix from subcircuit $1$ of shape $(2^6,4^3)$
and the trailing matrix from subcircuits $2,3$ of shape $(4^3,2^8)$.
Figure~\ref{fig:contraction_step_3} shows that the last step eventually contracts $p_4$ with the previously contracted $p_{1,2,3}$.
This is a single matrix product between
the leading matrix from subcircuit $4$ of shape $(2^{11},4^5)$
and the trailing matrix from subcircuits $1,2,3$ of shape $(4^5,2^{14})$.
The entire process hence requires
\begin{equation*}
\begin{split}
&(4^2-1)\times 2^{8}\times 4^6+\\
&(4^3-1)\times 2^{14}\times 4^5+\\
&(4^5-1)\times 2^{25}\times 4^0
\end{split}
\end{equation*}
additions and a similar number of multiplications, altogether roughly $10^{10.9}$ numeric operations.
Compute graph contraction for this particular example hence provides about $1000X$ compute overhead reduction.
The contraction order $3,2,1,4$ in fact minimizes the overhead for this example.
The contraction order of the subcircuits only affects the reconstruction up to a permutation of the qubit order,
and has no effect on the quantum state probability accuracy.
However, finding the optimal contraction order for general compute graphs is hard.
In fact, it is an active area of research and of broader interest across many disciplines~\cite{robertson1991graph,markov2008simulating,orus2014practical,gray2021hyper}.
In practice, quantum circuit cutting mostly incurs only several subcircuits.
This allows an exhaustive search over all the contraction orders to calculate the exact number of floating point operations required for each.
The experiments in this paper show that this searching process takes a negligible amount of time.
\subsection{Resources Estimations}
\begin{figure}[t]
\centering
\includegraphics[width=.7\linewidth]{figures/states_merging_resources.pdf}
\caption{Quantum areas comparisons for the same experiments in Figure~\ref{fig:states_merging_runtime}.
The numbers in the legends indicate the average quantum area of Cut\_M as a percentage over Quantum.
Cut\_M requires QPUs to support at most $83\%$ of the quantum area at the expense of the classical runtimes in Figure~\ref{fig:states_merging_runtime}.}
\label{fig:quantum_area}
\end{figure}
\begin{figure}[t]
\centering
\includegraphics[width=.7\linewidth]{figures/states_merging_resources_bv.pdf}
\caption{Quantum areas comparisons for the same experiments in Figure~\ref{fig:states_merging_runtime_bv}.
Cut\_M requires QPUs to support about $25\%$ of the quantum area at the expense of the runtimes in Figure~\ref{fig:states_merging_runtime_bv}.}
\label{fig:quantum_area_bv}
\end{figure}
ScaleQC also requires much less powerful QPUs than Quantum since it just needs to support the smaller subcircuits.
Figure~\ref{fig:quantum_area} plots the quantum areas of Cut\_M as the percentage of Quantum for the same experiments in Figure~\ref{fig:states_merging_runtime}.
Figure~\ref{fig:quantum_area_bv} similarly plots the quantum areas of the large BV benchmarks in Figure~\ref{fig:states_merging_runtime_bv}.
Quantum simply requires the area of the input benchmark circuit.
Cut\_M requires QPUs to support the quantum area of the largest subcircuit from cutting.
With $\alpha=0.5$($0.8$), Cut\_M requires QPUs to support at most about $57\%$($83\%$) of the quantum area to run the various benchmarks,
at the expense of the postprocessing runtimes in Figures~\ref{fig:states_merging_runtime}~and~\ref{fig:states_merging_runtime_bv}.
Lower quantum area requirements translate to the ability to tolerate smaller and noisier NISQ devices.
Furthermore, in the fault tolerant regime,
lower quantum areas translate to a looser requirement on the logical qubit error rate.
Depending on different quantum error correction solutions,
this implies much reduced physical qubit counts and error threshold requirements.
In addition, compiling and decoding the smaller subcircuits are also much easier than larger circuits,
which put much less burden on the quantum software development~\cite{tan2020optimality}.
\subsection{Circuit Cutting Theory}
\begin{figure}[t]
\centering
\begin{subfigure}{0.4\textwidth}
\centering
\includegraphics[width=\textwidth]{figures/simple_circuit.pdf}
\caption{The red cross indicates the cutting point.
Subcircuit $1$ is shaded blue and subcircuit $2$ is shaded orange.}
\label{fig:simple_circuit}
\end{subfigure}
\begin{subfigure}{0.4\textwidth}
\centering
\includegraphics[width=\textwidth]{figures/simple_cutting.pdf}
\caption{The black arrow between the subcircuits shows the ``path'' undertaken by the qubit line being cut.
The one cut needs to permutate each of the $\{I,X,Y,Z\}$ bases.
Subcircuit $1$ needs to be measured in each basis and
subcircuit $2$ needs to be initialized in each basis.
The two subcircuits can now be executed independently on $3$-qubit QPUs.}
\label{fig:simple_cutting}
\end{subfigure}
\caption{Example of cutting a $5$-qubit quantum circuit with $1$ cut that divides it into two smaller subcircuits.}
\label{fig:simple_cutting_example}
\end{figure}
While we refer the readers to~\cite{peng2020simulating} for a detailed derivation and proof of the physics theory,
we provide an intuitive understanding of the cutting process in order to identify its key challenges.
Circuit cutting cuts between quantum gates and decomposes the qubit states into their Pauli bases.
With a proper selection of the cutting points, a large quantum circuit can be divided into smaller isolated subcircuits.
Figure~\ref{fig:simple_circuit} shows an example $5$-qubit quantum circuit.
Without cutting, this circuit requires a QPU with at least $5$ good enough qubits to execute all the quantum gates before too many errors accumulate.
Circuit cutting makes $1$ cut and divides this quantum circuit into two smaller subcircuits,
each with both fewer qubits and fewer gates.
Figure~\ref{fig:simple_cutting} shows that each subcircuit needs to be measured and initialized in different bases according to the permutations of all the cuts.
Now multiple less powerful 3-qubit QPUs can run these independent subcircuits in parallel.
The quantum interactions among the subcircuits are substituted by classical post-processing,
which are analogues to the communication cost paid in classical parallel computing.
In general, a $n$ qubit quantum circuit undergoes $K$ cuts to divide into $n_C$ completely separated subcircuits $C=\left\{C_1,\ldots,C_{n_C}\right\}$.
A complete reconstruction of the quantum interactions requires each cut to permute each of the $\{I,X,Y,Z\}$ bases, for a total of $4^K$ assignments.
Depending on the basis assigned to the cuts connecting each subcircuit, it is initialized and measured slightly differently to produce a distinct entry.
We use $p_i(k)$ to represent the output of subcircuit $i$ in the $k$th cuts assignment, where $i\in\{1,\ldots,n_C\}$ and $k\in\{1,\ldots,4^K\}$.
The physics theory~\cite{peng2020simulating} dictates that the output of the original circuit is given by
\begin{equation}
P=\sum_{k=1}^{4^K}\otimes_{i=1}^{n_C}p_i(k)\in\mathbb{R}^{2^n}\label{eq:CutQC}
\end{equation}
where $\otimes$ is the outer product between two subcircuit output vectors.
Note that each subcircuit only has a different entry when at least one cut connecting it in the compute graph changes basis.
This means that many of the $p_i(k)$ repeat in the various summation terms.
\subsection{Compare Against Classical Simulation}
\begin{figure}[t]
\centering
\includegraphics[width=\linewidth]{figures/comparison.pdf}
\caption{Compare against~\cite{liu2021closing}.
We estimate~\cite{liu2021closing} requires $42\times10^6\times\frac{2^6}{32^6}\times100\times5\approx 1250$ cores and $300$ seconds for our benchmark.
Each recursion of ScaleQC produces $1$ million more states at minimal extra runtime cost.
However,~\cite{liu2021closing} requires the same time for each $1$ million more states.}
\label{fig:comparison}
\end{figure}
\begin{figure}[t]
\centering
\includegraphics[width=.8\linewidth]{figures/recursion_runtime.pdf}
\caption{Running the $Supremacy$ benchmark for varying number of recursions.
Max load $\alpha=0.5$, max bins $M=2^{20}$.
Since each states merging recursion is fast,
adding more recursions do not increase the runtime too much.}
\label{fig:recursion_runtime}
\end{figure}
There are lots of purely classical simulation works~\cite{wu2019full,chen201864,haner20175,pednault2019leveraging}.
The state-of-the-art tensor network based method~\cite{liu2021closing} slices a deeper $100$-qubit $Supremacy$ circuit into $32^6$ ``subtasks''
to fit onto almost $42$ million cores on the Sunway supercomputer.
As a comparison, our shallower benchmark will be sliced into $2^6$ such ``subtasks'' by the same metric.
Figure~\ref{fig:comparison} shows a qualitative comparison for the most related benchmark circuit.
To maintain their $300$ seconds runtime, we estimate~\cite{liu2021closing} to require $42\times10^6\times\frac{2^6}{32^6}\approx2.5$ cores for $1$ million samples at $<1\%$ fidelity,
or $2.5\times5\times100=1250$ cores for $5$ million samples at the same perfect postprocessing fidelity as ScaleQC shows in Figure~\ref{fig:states_merging_runtime}.
We can easily modify the states merging framework to instead produce $1$ million arbitrary states in each recursion.
Figure~\ref{fig:recursion_runtime} runs various $Supremacy$ benchmarks for $10,50,100$ recursions.
Specifically, $5$ recursions of the $100$-qubit $Supremacy$ benchmark takes about $50$ seconds in Figure~\ref{fig:states_merging_runtime}.
Meanwhile, $100$ recursions of the same benchmark only takes about $160$ seconds in Figure~\ref{fig:recursion_runtime}.
The little runtime increase for more recursions shows that the majority of the runtime is the one-time initial cut searching.
Furthermore, the cut searching allows our method to generalize to any benchmarks.
In contrast,~\cite{liu2021closing} manually pre-determines the slicing strategy specifically but only for the $Supremacy$ benchmark.
It also needs to spend the same runtime for every $1$ million more samples calculated.
Deeper and more complicated benchmarks are going to require more than a single GPU.
ScaleQC relies on the continued developments of HPC techniques to port to scalable parallel computing backends.
\subsection{Runtime}
\begin{figure}[t]
\centering
\includegraphics[width=\linewidth]{figures/full_state_runtime.pdf}
\caption{Full state runtimes.
Max load $\alpha=0.4$.
Each data point is the average of $5$ trials.
(Left Panel) The runtimes of $20$-$30$ qubits benchmarks.
The error bars represent the standard deviations.
(Right Panel) The runtime breakdown for the $AQFT$ benchmark.
The majority of the runtime is from the cut searching.}
\label{fig:full_state_runtime}
\end{figure}
When the size of the Hilbert space of the quantum circuits is still within the memory limit,
it is possible to perform full state evaluation.
This cutoff depends on the particular classical backend available to the users.
We use $30$ qubits as the cutoff in this paper, which is roughly $10^9$ states.
However, since each qubit doubles the memory requirement,
there is little value in pushing this cutoff point to the extreme.
Figure~\ref{fig:full_state_runtime} plots the benchmark circuits $20\to30$ qubits,
subject to a max load of $\alpha=0.4$.
We observe that the majority of the runtime is spent on searching the cuts.
For example, the runtime breakdown of the $AQFT$ benchmarks shows that nearly all of the postprocessing runtime comes from the cut searching.
This pre-processing overhead can be significant for medium sized benchmarks due to their short overall runtime.
As a result, it might not be worth the overhead to use circuit cutting for medium circuits.
Admittedly, classical simulators operate relatively fast and are usually adequate for such small benchmarks.
As a reference, the widely used Qiskit~\cite{Qiskit} simulator takes about $30\to50$ seconds to run the $30$-qubit benchmarks on the same classical backend.
ScaleQC is able to produce comparable runtime even for the small benchmarks where classical simulation excels.
While finding the optimal cut solution can be difficult for large circuits,
our experiments capped the solver runtime to produce high quality solutions.
The cut searching step can hence be viewed as a nearly constant pre-processsing overhead for large benchmarks.
In fact, ScaleQC has more significant runtime advantages for larger circuits,
where the cut searching overhead no longer bottlenecks the framework.
Furthermore, ScaleQC with states merging becomes necessary to deal with the exponentially increasing state space.
\begin{figure}[t]
\centering
\includegraphics[width=.7\linewidth]{figures/states_merging_runtime.pdf}
\caption{States merging for large circuits.
Max load $\alpha=0.8$ for $Regular$ and $Erdos$, $\alpha=0.5$ for the rest.
Max bins $M=2^{20}$.
Each data point is the average of up to $5$ trials.
Cut\_M runs $n/\log_2{M}$ recursions (i.e. $5$ for the $100$-qubit benchmarks) to find at least one solution.
Cut\_M scales well and is able to run circuits significantly beyond the classical simulation limit.}
\label{fig:states_merging_runtime}
\end{figure}
Figure~\ref{fig:states_merging_runtime} plots the runtime scalability for large benchmarks,
subject to a max load of $\alpha=0.8$ for the two QAOA benchmarks and $\alpha=0.5$ for the rest.
We set $M=2^{20}$ bins.
Each experiment runs $n/\log_2{M}$ recursions to find at least one solution.
The runtime will be the same to reconstruct $Mn/\log_2{M}$ states for the $Supremacy$ benchmark,
which is about $7$ million states for the $144$($12\times 12$)-qubit circuit.
Instead, states merging obtains more information about the entire state space under the same time.
Figure~\ref{fig:states_merging_runtime_bv} plots the runtime scalability for the BV benchmark up to $1000$ qubits,
subject to a max load of $\alpha=0.5$ and $M=2^{20}$ bins.
Each experiment runs to completion to find the unique hidden string solution state.
The various benchmarks scale well as circuits get larger.
The $Erdos$ benchmark appears to be the hardest and no solutions were found above $80$ qubits for the maximum of $15$ compute graph degree.
\begin{figure}[t]
\centering
\includegraphics[width=.7\linewidth]{figures/states_merging_runtime_bv.pdf}
\caption{States merging for large BV circuits.
Max load $\alpha=0.5$.
Max bins $M=2^{20}$.
Each data point is the average of $5$ trials.
Cut\_M runs $n/\log_2{M}$ recursions (i.e. $50$ for the $1000$-qubit benchmark) to find the unique solution.}
\label{fig:states_merging_runtime_bv}
\end{figure}
\subsection{Summary of Experiments}\label{sec:experiments_summary}
Table~\ref{table:experiments} summarizes the four sets of experiments to evaluate the ScaleQC framework.
The first set of experiments use medium benchmarks where a full state circuit output still fits in the memory.
This cutoff depends on the particular classical backend available to the users,
we use $30$ qubits as the cutoff in this paper.
However, since each qubit doubles the memory requirement,
there is little value in pushing this cutoff point to the extreme.
Classical and Cut produce the full state solution states with $P_{full}$.
We compare the full-state runtime of the two.
The second set of experiments use large benchmarks whose full state space no longer fits in the memory.
ScaleQC with states merging becomes necessary in this regime.
We cannot analyze the accuracy in this regime as neither QPUs or CPUs nowadays can quickly produce reliable large subcircuits outputs.
We hence compare the runtime of Cut\_M and the extrapolated runtime of Classical to demonstrate the scalability of ScaleQC.
The third set of experiments use the same large benchmarks to study the quantum resources requirements.
We compare the quantum area requirements of Quantum and Cut\_M to demonstrate the quantum resources advantages of ScaleQC.
The fourth set of experiments use medium benchmarks and aims at demonstrating the effectiveness of optimal sampling and states merging.
We compare Cut\_S, Cut\_M and Cut\_SM for runtime versus accuracy trade-offs.
\section{Appendix}
\subsection{Proof of Lemma~\ref{lemma:arbitrary_sampling}}\label{sec:lemma_arbitrary}
\begin{proof}
The exact quantum state probability of state $j$ is given by:
\begin{equation*}
P_j=\sum_{k=1}^{4^K}\left(\otimes_{i=1}^{n_C}p_{i,k}\right)_j
\end{equation*}
For a particular $j$, $\forall t=1,\ldots,c$, define
\begin{equation*}
X_t=\left(\frac{\otimes_{i=1}^{n_C} p_{i,k_t}}{cq_{k_t}}\right)_j
\end{equation*}
Thus,
\begin{eqnarray*}
\mathbb{E}[X_t]&=&\sum_{k=1}^{4^K}q_{k}\left(\frac{\otimes_{i=1}^{n_C} p_{i,k}}{cq_k}\right)_j\\
&=&\frac{1}{c}\sum_{k=1}^{4^K}\left(\otimes_{i=1}^{n_C} p_{i,k}\right)_j
\end{eqnarray*}
And
\begin{eqnarray*}
\mathbb{E}[X_t^2]&=&\sum_{k=1}^{4^K}q_{k}\left(\frac{\otimes_{i=1}^{n_C} p_{i,k}}{cq_k}\right)_j^2\\
&=&\frac{1}{c^2}\sum_{k=1}^{4^K}\frac{\left(\otimes_{i=1}^{n_C} p_{i,k}\right)_j^2}{q_k}
\end{eqnarray*}
Hence by construction, Equation~\ref{eq:arbitrary_expectation} follows:
\begin{eqnarray*}
\mathbb{E}[\widetilde{P}_j]&=&\sum_{t=1}^c\mathbb{E}[X_t]\\
&=&\sum_{k=1}^{4^K}\left(\otimes_{i=1}^{n_C} p_{i,k}\right)_j\\
&=&P_j
\end{eqnarray*}
Since we are taking $c$ independent random variables,
\begin{eqnarray*}
\text{Var}[\widetilde{P}_j]&=&\sum_{t=1}^c\text{Var}[X_t]\\
\text{Var}[X_t]&=&\mathbb{E}[X_t^2]-\mathbb{E}[X_t]^2\\
&=&\frac{1}{c^2}\sum_{k=1}^{4^K}\frac{\left(\otimes_{i=1}^{n_C} p_{i,k}\right)_j^2}{q_k}-\frac{1}{c^2}P_j^2\\
\end{eqnarray*}
Hence Equation~\ref{eq:arbitrary_variance} follows.
Note that the expectation of the approximation error is given by
\begin{eqnarray*}
\mathbb{E}[\epsilon]&=&\sum_{j=1}^{2^n}\mathbb{E}\left[(P_j-\widetilde{P}_j)^2\right]\\
&=&\sum_{j=1}^{2^n}\text{Var}\left[(P_j-\widetilde{P}_j)\right]+\mathbb{E}\left[(P_j-\widetilde{P}_j)\right]^2\\
&=&\sum_{j=1}^{2^n}\text{Var}\left[\widetilde{P}_j\right]
\end{eqnarray*}
Substituting Equation~\ref{eq:arbitrary_variance} gives:
\begin{eqnarray*}
\mathbb{E}[\epsilon]&=&\sum_{j=1}^{2^n}\left[\frac{1}{c}\sum_{k=1}^{4^K}\frac{\left(\otimes_{i=1}^{n_C} C_{i,k}\right)_j^2}{p_k}-\frac{1}{c}P_j^2\right]\\
&=&\frac{1}{c}\sum_{k=1}^{4^K}\frac{|\otimes_{i=1}^{n_C} C_{i,k}|^2}{p_k}-\frac{1}{c}|P|^2\\
&=&\frac{1}{c}\sum_{k=1}^{4^K}\frac{1}{p_k}\prod_{i=1}^{n_C}|C_{i,k}|^2-\frac{1}{c}|P|^2
\end{eqnarray*}
Hence Equation~\ref{eq:arbitrary_error} follows.
\end{proof}
\subsection{Proof of Lemma~\ref{lemma:optimal_sampling}}\label{sec:lemma_optimal}
\begin{proof}
Define
\begin{equation}
f(q_1,\ldots,q_{4^K})=\sum_{k=1}^{4^K}\frac{1}{q_k}\prod_{i=1}^{n_C}|p_{i,k}|^2\label{eq:probability_function}
\end{equation}
Note that minimizing Equation~\ref{eq:probability_function} (subject to that the $q_k$s form a valid probability distribution) is the same as minimizing Equation~\ref{eq:arbitrary_error}.
Introduce the Lagrange multiplier method:
\begin{eqnarray*}
\nabla f(q_1,\ldots,q_{4^K})&=&-\lambda\nabla\left[\sum_{k=1}^{4^K}q_k-1\right]\\
\frac{\partial f}{\partial q_k}&=&-\lambda\\
-\frac{1}{q_k^2}\prod_{i=1}^{n_C}|p_{i,k}|^2&=&-\lambda\\
q_k&=&\frac{\prod_{i=1}^{n_C}|p_{i,k}|}{\sqrt{\lambda}}
\end{eqnarray*}
Solve for $\lambda$:
\begin{eqnarray*}
\sum_{k=1}^{4^K}\frac{\prod_{i=1}^{n_C}|p_{i,k}|}{\sqrt{\lambda}}&=&1\\
\sqrt{\lambda}&=&\sum_{k=1}^{4^K}\prod_{i=1}^{n_C}|p_{i,k}|
\end{eqnarray*}
Therefore Equation~\ref{eq:optimal_probability} follows.
Substituting Equation~\ref{eq:optimal_probability} into Equation~\ref{eq:arbitrary_error} hence gives the minimum expected approximation error in Equation~\ref{eq:optimal_error}.
\end{proof} |
\section{Introduction}
Modern background cosmology is based on diverse hypotheses and the assumption that the species of fluids are baryonic matter, photons, neutrinos and the elusive and mysterious dark matter (DM) and dark energy (DE). The DE component is reduced to the cosmological constant ($\Lambda$) in the standard cosmological model, giving the well-known $\Lambda$CDM model. The achievements of this model are fundamental to understanding the DM and $\Lambda$, describing the late time acceleration observed by Supernovas of the Ia type (SnIa) \cite{Riess:1998} and confirmed by the Cosmic Microwave Background radiation (CMB) \cite{Planck:2018}. Additionally, the success of describing the structure formation with the (cold) DM addition is exceptional. Despite all of these achievements, exist several cracks in its physical and mathematical structure, like the impossibility of quantifying the quantum vacuum fluctuations when we interpret the $\Lambda$ in this way \cite{Weinberg, Zeldovich}. In similarity, the problem of why the Universe is accelerating at $z\simeq0.7$ and not before or after \cite{Carroll:2000}.
Additionally to this, we have the problem of the Hubble constant, where the value does not coincide when it is measured with local (see SH0ES \cite{Riess:2019cxk}) and early observations (see Planck \cite{Planck:2018}). Thus, a possible alternative to resolve this tension in the Hubble constant is some forms of DE that extend the $\Lambda$CDM model (see \cite{DiValentino:2021izs} for a compilation). However, still exists the possibility that this might be related to a misunderstanding of the distance ladder measurements (i.e., a need for a better agreement between the SNIa absolute magnitude and the Cepheid-based distance ladder) instead of an {\it exotic late-time physics} \cite{Efstathiou:2021ocp}.
The community is searching for extensions to the $\Lambda$CDM model to resolve some of the previously mentioned problems. The approaches to face the problems are divided into two main branches: i) assume a fluid with the capability to accelerate the Universe or ii) modify General Relativity (GR) in order to obtain the Universe acceleration without the addition of an extra fluid \cite{Motta:2021hvl}. Thus, this paper advocated to persecute the second point by adding a mathematical formalism known as {\it fractional calculus} which consists of a generalization of the classical integer order calculus, derivatives and integrals of arbitrary real or complex order are defined. These fractional operators are not local and can more efficiently model some real-world phenomena, significantly when the dynamics are affected by constraints inherent in the system. In many cases, the results of the fractional mathematical model are more general and precise than those obtained by the classical calculation. For example, it is coined fractional dynamics as a field of study in physics and mechanics investigating the behaviour of objects and systems that are characterized by power-law nonlocality, power-law long-term memory or fractal properties by using integrations and differentiation of non-integer orders, i.e., by methods in the fractional calculus (see the review \cite{Tarasov2013}).
There are several definitions of fractional derivatives and fractional integrals, such as those of Riemann-Liouville, Caputo, Riesz, Hadamard, Marchand, and Griinwald-Letnikov, among other more recent ones (see \cite{book1:2006}, and \cite{book2:1999} and references therein). Even though these operators are already well studied, some of the usual features related to function differentiation fail, such as Leibniz's rule, the chain rule, and the semi-group property \cite{book1:2006,book2:1999}. Fractional calculus is a field with multiple applications and a great deal of research activity. Fractional quantum mechanics has been employed as a tool within quantum field theory and gravity for fractional spacetime \cite{Calcagni:2009kc,Calcagni:2010bj} and the fractional quantum field theory at positive temperature \cite{LimEab+2019+237+256,Lim:2006hp} and other applications of quantum cosmology \cite{VargasMoniz:2020hve,Moniz:2020emn,Rasouli:2021lgy,Jalalzadeh:2021gtq}. Recently, the community is exploring the possibility of using the fractional calculus to tackle problems associated with cosmology \cite{ Shchigolev:2021lbm,Shchigolev:2015rei,Shchigolev:2010vh,Shchigolev:2012rp,Shchigolev:2013jq,Jalalzadeh:2022uhl}, specifically in \cite{Shchigolev:2015rei,Shchigolev:2021lbm} the authors found $\alpha=0.926$ (where $\alpha$ is the order of the Riemann-Liouville fractional integral). In \cite{Shchigolev:2010vh, Shchigolev:2012rp, Shchigolev:2013jq} were obtained several exact solutions associated with cosmological models, which differs significantly from the corresponding standard model, as a consequence of the fractional order of action functional and, possibly, the fractal nature of space-time \cite{Calcagni:2009kc, Calcagni:2010bj}.
In \cite{Jalalzadeh:2022uhl} the authors explore the interval $1<\alpha <2$, using Riesz's fractional derivative, which is used to express the Wheeler-DeWitt equation for a closed de Sitter geometry to obtain the non-boundary and tunnelling wavefunctions. Another example is in \cite{Barrientos:2020kfp} where the authors explore the possibility of avoiding DM and DE components and replace with the mathematical structure of fractional calculus. Another approach is calculating the value of the $\Lambda$ (due to the well-known ultraviolet divergence in the standard quantum field theory); however, it is also needed to restructure the theory using the fractional calculus \cite{Calcagni_2021}. In \cite{Giusti:2020rul, Torres:2020xkw} explore Modified Newtonian Dynamics Theories (MOND) and quantum cosmology, using the fractional approach \cite{Barrientos:2020kfp}.
We think the fractional calculus could provide a competitive description to the standard model on a large scale due to the property of nonlocality and the memory its operators' store.
Under this assumption, we obtain a modified Friedmann equation which depends on the fractional parameter, i.e. the order of fractional derivatives. We use Cosmic Chronometers, Type Ia Supernovae observations, and a joint analysis to constrain the cosmological and fractional parameters. We will show that the term containing the fractional parameter act as a $\Lambda$, unveiling that nature can be fractional, and consequently, non-fractional GR is only an approach to the actual mathematical structure of nature. Additionally, we present a dynamical system and stability analysis to explore the phase-space under the assumption of different $\alpha$ parameters. Finally, we introduce relevant variables for the model and solve the Friedman restriction locally around the equilibrium points, obtaining a reduced phase plane. Finally, we classify these equilibrium points and provide a range on the fractional parameter to obtain a late-term physical accelerated power-law solution for the scale factor.
The paper is organized as follows: In Sec. \ref{MF} we present the mathematical formalism of fractional calculus. In Sec. \ref{sec:cosmology} we show the cosmology based on this theory and how the fractional term could act as a $\Lambda$. In Sec. \ref{sec:constraints} we show the data and methodology we will use to constrain the theory's free parameters. In Sec. \ref{Results} we present the results obtained through the different observations and the joint analysis. In Sec. \ref{DS} we present a dynamical system and stability analysis of the fractional model. Finally, in Sec. \ref{SD} we give a summary and final discussions. We will henceforth use units in which $\hbar=c=k_{B}=1$ unless we mention otherwise.
\section{Mathematical Formalism for Fractional Calculus} \label{MF}
Currently, several definitions of fractional derivatives \cite{Uch:2013} like the Riemann-Liouville derivative (RLD), the Caputo derivative (CD), among others are used. These derivatives are defined by Cauchy's formula for the integral multiple of integer order $\mu>0$, in the form
\begin{equation}
{ }_{c} I_{x}^{\mu} f(x)=\Gamma(\mu)^{-1} \int_{c}^{x} f(t)(x-t)^{\mu-1} d t \label{EQ1}.
\end{equation}
In this case, the RLD with $\alpha \geq 0$ for $f(x)$ is defined through the expression
\begin{eqnarray}
D_{x}^{\alpha} f(x) &\equiv & \frac{d^n}{dx^n}I_{x}^{n-\alpha} f(x)\nonumber\\ &=& \Gamma(n-\alpha)^{-1} \frac{d^{n}}{d x^{n}} \int_{c}^{x} \frac{f(t)}{(x-t)^{\alpha-n+1}} d t, \label{EQ2}
\end{eqnarray}
where $n=[\alpha]+1$ being $\alpha \in (n-1,n)$. Notice that when $\alpha\to1$ we recover the traditional derivative. The right RLD is defined following the same paths of \eqref{EQ2} on the interval $[c, d]$, having the equation
\begin{equation}
{ }_{x} D_{d}^{\alpha} f(x)=\Gamma(n-\alpha)^{-1}\left(-\frac{d}{d x}\right)^{n} \int_{x}^{d} \frac{f(t)}{(t-x)^{\alpha-n+1}} d t.
\end{equation}
We emphasize that the RLD fractional integral of order $\alpha$ is given by ${ }_{c} I_{x}^{\alpha} f(x)$ defined in \eqref{EQ1} and has a memory kernel. Similarly, the Caputo left derivative is defined as ${ }^{C} D_{x}^{\alpha} f(x) \equiv { }_{c} I_{x}^{n-\alpha} D_{x}^{n} f(x)$.
In fractional calculus, we have now the following relation (see \cite{Uch:2013}) for the case of more than one derivatives
\begin{equation}
D_{x}^{\alpha} \left[D_{x}^{\beta} f(x)\right]=D_{x}^{\alpha+\beta} f(x)-\sum_{j=1}^{n} D_{x}^{\beta-j} f(c+) \frac{(x-c)^{-\alpha-j}}{\Gamma(1-\alpha-j)},
\end{equation}
or in other words $D_{x}^{\alpha} D_{x}^{\beta} f(x) \neq D_{x}^{\alpha+\beta} f(x)$, if only not all derivatives $D_{x}^{\beta-j} f(c+)$ at the beginning of the interval are equal to zero.
Additionally, the fractional derivative of the Leibniz rule \cite{Uch:2013} reads as
\begin{equation}
D_{x}^{\alpha}[f(x) g(x)]=\sum_{k=0}^{\infty} \frac{\Gamma(\alpha+1)}{k ! \Gamma(\alpha-k+1)} D_{x}^{\alpha-k} f(x) D_{x}^{k} g(x),
\end{equation}
having the usual rule when $\alpha=n$.
Finally, we need to mention that in \cite{ Roberts:2009ix} and \cite{Shchigolev:2010vh}, the Riemann curvature tensor and the Einstein tensor are defined as usual, but now with dependence on the $\alpha$ fractional parameter. In this vein, it is possible to write down the fractional analogous for the Einstein field equation through the expression
\begin{equation}
G_{\mu \nu}(\alpha)=8 \pi G T_{\mu \nu}(\alpha),
\end{equation}
where $G_{\mu \nu}(\alpha)$ is the Einstein tensor in fractional calculus, and $G$ is the Newton gravitational constant. In this case, modifications to several astrophysical and cosmological events can be studied. For example, a fractional theory of gravitation for fractional space-time is developed in \cite{Vacaru:2010wn,Vacaru:2010fb,Vacaru:2010wj}). Non-holonomic deformations to cosmology lead to new classes of cosmological models studied in \cite{Vacaru:2010fb,Shchigolev:2021lbm}.
\section{Background Fractional Cosmology} \label{sec:cosmology}
To construct the Lagrangian dynamics, one uses the Fractional Action-Like Variational Approach developed in \cite{El-Nabulsi:2005oyu, El-Nabulsi:2008oqn, El-Nabulsi:2007wgc} and \cite{El-Nabulsi:2007lla}; one of the possible versions of \cite{ Roberts:2009ix}.
The background cosmology is based on the Friedmann-Lema\^{i}tre-Robertson-Walker (FLRW) metric which is written in the form $ds^2=-dt^2+a(t)^2(dr^2+r^2d\Omega^2)$ in where it is considered a flat Universe ($k=0$) based on Planck observations \cite{Planck:2018}, $a(t)$ is the scale factor and $d\Omega^2\equiv d\theta^2+\sin^2\theta d\varphi^2$ is the solid angle. For this case, the fractional effective action can be written in the form
\begin{eqnarray}
S_{eff}&=&\Gamma(\alpha)^{-1}\int_0^t\Big[\frac{3}{8\pi G}\Big(a^2\ddot{a}+a\dot{a}^2-a^2\dot{a}\Big)+a^3\mathcal{L}_{\text{m}}\Big]\times\nonumber\\&&(t-\tau)^{\alpha-1}d\tau, \label{LFC}
\end{eqnarray}
where $\Gamma(\alpha)$ is the traditional Gamma function, $\mathcal{L}_{\text{m}}$ is the matter Lagrangian, $\alpha$ is the fractional constant parameter, $t$ and $\tau$ are the physical and proper time respectively and where the $\Lambda$ is not considered (see \cite{Shchigolev:2010vh}). The minimization of matter Lagrangian generate to the energy momentum tensor for perfect fluid given by $T_{\mu\nu}=pg_{\mu\nu}+(\rho+p)u_{\mu}u_{\nu}$, where $p$, $\rho$ and $u_{\mu}$ are pressure, energy density and four-velocity respectively, related by the equation of state (EoS) as $p=w\rho$.
Thus, the minimization of the fractional action \eqref{LFC} generates the Friedmann equation, written in the form
\begin{equation}
H^2+\frac{(1-\alpha)}{t}H=\frac{8\pi G}{3}\sum_i\rho_i, \label{FriedmannFrac}
\end{equation}
in where the sum is over all the species, in this case matter and radiation and $H\equiv\dot{a}/a$.
Notice that we are considering that does not exist a $\Lambda$ and thus, the additional curvature-like term of the previous equation should generate the late accelerated expansion. In the same way, the continuity equation is given by
\begin{equation}
\sum_i\left[\dot{\rho}_i+3\left(H+\frac{1-\alpha}{3t}\right)(\rho_i+p_i)\right]=0.\label{CE}
\end{equation}
Notice that when $\alpha=1$ in Eq. \eqref{FriedmannFrac} and \eqref{CE}, the standard cosmology is recovered without $\Lambda$.
Using the equation of state $p_i=w_i\rho_i$, where $w_i \neq -1$ are constants,
\begin{align}
& \sum_i (1+w_i)\rho_i \left[\frac{\dot{\rho}_i}{ (1+w_i) \rho_i} + 3\frac{\dot{a}}{a}+ \frac{1-\alpha}{t} \right]\nonumber\\
& = \sum_i (1+w_i)\rho_i \mathrm{d}\left[ \ln \left( {\rho_i}^{ 1/(1+w_i)} a^3 t^{1-\alpha}\right)\right].
\end{align}
Assuming separated conservation equations for each species considered in the cosmology
we have the following equation in differential form,
\begin{align}
\mathrm{d}\left[ \ln \left( {\rho_i}^{ 1/(1+w_i)} a^3 t^{1-\alpha}\right)\right] =0. \label{CE2}
\end{align}
Setting $a(t_U)=1$, where $t_U$ is the age of the Universe, and denoting by $\rho_{0i}$ the current value of energy density of the $i$-th species, and integrating eq. \eqref{CE2}, we have for each of the species the energy densities
\begin{equation}
\rho_{i}(t)= \rho_{0i} a(t)^{-3 (1+w_i)} \left(t/t_U\right)^{(\alpha-1)(1+w_i)}. \label{EQ16}
\end{equation}
Then, substituting \eqref{EQ16} in \eqref{FriedmannFrac}, we obtain
\begin{align}
& H^2+\frac{(1-\alpha)}{t}H \nonumber \\
& =\frac{8\pi G}{3}\sum_i \rho_{0i} a^{-3 (1+w_i)}\left(\frac{t}{t_U}\right)^{(\alpha-1)(1+w_i)}. \label{EH}
\end{align}
To compare with the standard model we impose that the universe components are matter ($\rho_{1}=\rho_{\text{m}}, w_{\text{m}}=0$) and radiation ($\rho_{2}=\rho_{\text{r}}, w_{\text{r}}=1/3$), which in our modified scenario evolve as
\begin{align}
& \rho_{\text{m}}=\rho_{0\text{m}}a^{-3} \left(\frac{t}{t_U}\right)^{\alpha-1}, \;
\rho_{\text{r}}=\rho_{0\text{r}}a^{-4} \left(\frac{t}{t_U}\right)^{\frac{4}{3}(\alpha-1)},
\end{align} respectively, where $\rho_{0\text{m}}$, $\rho_{0\text{r}}$, $a_0=1$ are the current values of the energy densities and the scale factor.
For $\alpha=1$, the standard calculus is recovered, we have the standard evolution for CDM and radiation, $\rho_{\text{m}}=\rho_{0\text{m}}a^{-3}$, $\rho_{\text{r}}=\rho_{0\text{r}}a^{-4}$ and \eqref{EH} becomes the standard Friedman equation in term of redshift, $E(z)^2 =\Omega_{0\text{m}}(z+1)^{3}
+\Omega_{0\text{r}}(z+1)^{4}$.
However, when $\alpha\neq 1$, Eq. \eqref{EH} becomes
\begin{align}
& E(z)^2+ (1-\alpha) \frac{F(z)}{ t_U H_0}E(z) \nonumber \\
& =\Omega_{0\text{m}}(z+1)^{3} F(z)^{(1-\alpha)}
+\Omega_{0\text{r}}(z+1)^{4} F(z)^{\frac{4}{3}(1-\alpha)}, \nonumber\\ \label{EH2}
\end{align}
where we have defined $\Omega_{0\text{m}}= 8\pi G\rho_{0\text{m}}/3 H_0^2$,
$\Omega_{0\text{r}}= 8\pi G\rho_{0\text{r}}/3 H_0^2$, $E(z) \equiv H(z)/H_0$ and $F(z)=t_U/t(z)$. Note that $F(0)=1$ due to $t(0)=t_U$, is the age of the universe.
Using the chain rule, we obtain a differential equation for $F(z)$ given by
\begin{equation}
F'(z)= \frac{dt}{dz}\frac{dF}{dt}= \frac{F^2(z)}{t_U H_0 (z+1)E(z)} \label{eqF}.
\end{equation}
When we solve \eqref{EH2} for $E(z)$, there are two branches dictated by the sign $\pm$. The branch $-$ leads to $E\leq 0$ and the branch $+$ leads to $E \geq 0$. Therefore, since we are interested in an expanding universe we choose the positive branch. That is,
\begin{align}
E(z)= -f F(z) &\nonumber\\
+ F(z)^{-\alpha } \Bigg\{ & f^2 F(z)^{2 (\alpha +1)} \nonumber \\
& +\Omega_{0\text{m}} (z+1)^3
F(z)^{\alpha +1} \nonumber \\
& +\Omega_{0\text{r}} (z+1)^4 F(z)^{\frac{2 (\alpha +2)}{3}}\Bigg\}^{1/2}, \label{FriedmannFinal1}
\end{align}
where $f\equiv(1-\alpha)/(2 t_UH_0)$ is going to be the \textit{fractional constant} that will act as the cosmological constant.
Friedmann constraint gives us $f=(\Omega_{0\text{m}}+\Omega_{0\text{r}}-1)/2$, such that for $\alpha <1$, $\Omega_{0\text{m}}+\Omega_{0\text{r}}>1$, for $\alpha >1$, $\Omega_{0\text{m}}+\Omega_{0\text{r}}<1$, and notice that we choose the positive branch in order to have $E(z)>0$ and where $\Omega_{0\text{r}}=2.469\times10^{-5}h^{-2}(1+0.2271N_{eff})$, where $N_{eff}=2.99\pm0.17$ \cite{Planck:2018}.
The condition $\Omega_{0\text{m}}+\Omega_{0\text{r}0}>1$, can be produced in a closed FLRW universe. GR explains that mass and energy bend the curvature of space-time and is used to determine what curvature the Universe has by using a value called the density parameter, represented with $\Omega$ (total fractional energy density including all species). The density parameter is the average density of the Universe divided by the critical energy density, that is, the mass energy needed for a universe to be flat.
If $\Omega=1$, the Universe is flat, if $\Omega>1$, there is positive curvature (closed Universe).
If $\Omega< 1$, there is negative curvature (open Universe).
One can experimentally calculate this $\Omega$ to determine the curvature two ways. One is to count up all the mass-energy in the universe and take its average density then divide that average by the critical energy density. Data from Wilkinson Microwave Anisotropy Probe (WMAP) as well as the Planck spacecraft give values for the three constituents of all the mass-energy in the universe – normal mass (baryonic matter and dark matter), relativistic particles (photons and neutrinos), and dark energy or the cosmological constant: $\Omega_{\text{mass}} \approx 0.315\pm 0.018 $, $\Omega_{\text{relativistic}} \approx 9.24 \times 10^{-5}$, $\Omega_\Lambda\approx 0.6817\pm 0.0018$, with $\Omega_{\text{total}} = \Omega_{\text{mass}} + \Omega_{\text{relativistic}} + \Omega_{\Lambda} = 1.00 \pm 0.02$. The actual value for critical density value is measured as $\rho_{\text{critical}} = 9.47\times 10^{-27} kg \; m^{-3}.$
In equation \eqref{FriedmannFrac}, the term $\frac{(1-\alpha)}{t}H$ contributes as a positive term for $\alpha<1$ or a negative term for $\alpha>1$.
Substituting \eqref{FriedmannFinal1} in \eqref{eqF}, we obtain a differential equation
\begin{align}
F'(z) = &\frac{2 f F(z)^{\alpha +2}}{(\alpha -1) (z+1)} \times
\Bigg\{f F(z)^{\alpha +1} \nonumber \\
-\Bigg[ & f^2 F(z)^{2 \alpha
+2} \nonumber \\
& +\Omega_{0\text{m}} (z+1)^3 F(z)^{\alpha +1} \nonumber \\
& +\Omega_{0\text{r}} (z+1)^4 F(z)^{\frac{2 (\alpha +2)}{3}}\Bigg]^{1/2}\Bigg\}^{-1}, \label{F'(z)}
\end{align}
That has to be solved numerically.
Then, we numerically calculate \eqref{FriedmannFinal1} plugging back the numerical results for $F(z)$.
Moreover, the deceleration parameter $q(z)$ can be written as
\begin{align}
q(z)= -1 +(1+z) \frac{d \ln E(z)}{d z}. \label{q(z)}
\end{align}
Hence, substituting \eqref{FriedmannFinal1} in \eqref{q(z)}, using \eqref{eqF} to replace $F'(z)$, and using \eqref{FriedmannFinal1} to eliminate the radical we obtain a closed form for $q(z)$ as given by Eq. \eqref{DecelerationFinal}, which quantifies if the Universe is in an accelerated stage and under which conditions.
Finally, the cosmographic parameter known as the {\it jerk}, which quantifies if the model has a tendency to the $\Lambda$ or its another kind of dark energy can be written as
\begin{eqnarray}
j=q(2q+1)+(1+z)\frac{dq}{dz}, \label{Jerk}
\end{eqnarray}
where $q$ is given by Eq. \eqref{DecelerationFinal}.
\section{Methodology and dataset} \label{sec:constraints}
A Bayesian Markov Chain Monte Carlo (MCMC) analysis is performed to constrain the phase-space parameter ${\bm\Theta}=\{h, \Omega_{0m}, \alpha\}$ of the fractional cosmology using observational Hubble data OHD, SnIa dataset and joint analysis. Under the \texttt{emcee} Python package environment \cite{Foreman:2013}, after the auto-correlation time criterion warranty the convergence of the chains, a set of 4000 chains with 250 steps each is performed to establish the parameter bounds. Additionally, the configuration for the priors are Uniform distributions allowing vary the parameters in the range $h\in[0.2, 1]$, $\Omega_{0m}\in[0,1]$ and $\alpha \in[1,3]$.
Hence the figure-of-merit for the joint analysis is built through the a Gaussian log-likelihood given as $-2\ln(\mathcal{L}_{\rm data})\varpropto \chi^2_{\rm data}$ and
\begin{equation} \label{eq:chi2_joint}
\chi^2_{\rm Joint} = \chi_{\rm CC}^2 + \chi_{\rm SNIa}^2 \,,
\end{equation}
where each terms refer to the $\chi^2$-function for each dataset. Now, a description of each data is given in the rest of the Section.
\subsection{Cosmic chronometers}
Up to now, a set of 31 points obtained by differential age tools, namely cosmic chronometers (CC), represents the measurements of the Hubble parameter, which is cosmological independent \cite{Magana:2017nfs}.
In this sense, this sample is useful to bound alternative models to $\Lambda$CDM. Thus, the figure-of-merit function to minimize is given by
\begin{equation} \label{eq:chiOHD}
\chi^2_{{\rm CC}}=\sum_{i=1}^{31}\left(\frac{H_{th}(z_i)-H_{obs}(z_i)}{\sigma^i_{obs}}\right)^2,
\end{equation}
where the sum runs over the whole sample, and $H_{th}-H_{obs}$ is the difference between the theoretical and observational Hubble parameter at the redshift $z_i$ and $\sigma_{obs}$ is the uncertainty of $H_{obs}$.
\subsection{Type Ia Supernovae }
In Ref. \cite{Scolnic:2018} it is provide 1048 luminosity modulus measurements, known as Pantheon sample, from Type Ia Supernovae which cover a region $0.01<z<2.3$. Due to in this sample the measurements are correlated, it is convenient to build the chi square function as
\begin{equation}\label{eq:chi2SnIa}
\chi_{\rm SnIa}^{2}=a +\log \left( \frac{e}{2\pi} \right)-\frac{b^{2}}{e},
\end{equation}
where
\begin{eqnarray}
a &=& \Delta\boldsymbol{\tilde{\mu}}^{T}\cdot\mathbf{Cov_{P}^{-1}}\cdot\Delta\boldsymbol{\tilde{\mu}}, \nonumber\\
b &=& \Delta\boldsymbol{\tilde{\mu}}^{T}\cdot\mathbf{Cov_{P}^{-1}}\cdot\Delta\mathbf{1}, \\
e &=& \Delta\mathbf{1}^{T}\cdot\mathbf{Cov_{P}^{-1}}\cdot\Delta\mathbf{1}, \nonumber
\end{eqnarray}
and $\Delta\boldsymbol{\tilde{\mu}}$ is the vector of residuals between the theoretical distance modulus and the observed one, $\Delta\mathbf{1}=(1,1,\dots,1)^T$, $\mathbf{Cov_{P}}$ is the covariance matrix formed by adding the systematic and statistic uncertainties, i.e. $\mathbf{Cov_{P}}=\mathbf{Cov_{P,sys}}+\mathbf{Cov_{P,stat}}$. The super-index $T$ on the above expressions denotes the transpose of the vectors.
The theoretical distance modulus is estimated by
\begin{equation}
m_{th}=\mathcal{M}+5\log_{10}\left[\frac{d_L(z)}{10\, pc}\right],
\end{equation}
where $\mathcal{M}$ is a nuisance parameter which has been marginalized by Eq. \eqref{eq:chi2SnIa}. The luminosity distance, denoted as $d_L(z)$, is computed through
\begin{equation}\label{eq:dL}
d_L(z)=(1+z)c\int_0^z\frac{dz^{\prime}}{H(z^{\prime})},
\end{equation}
being $c$ the speed of light.
\section{Results} \label{Results}
Table \ref{tab:bestfits} presents the cosmological constraints of fractional cosmology for CC and SNIa, samples
and the joint analysis, respectively. Each best-fit parameter value includes uncertainty at 68\% confidence level (CL).
\begin{table}
\centering
\begin{tabular}{|lcccc|}
\hline
Sample & $\chi^2_{\rm min}$ & $h$ & $\Omega_{0m}$ & $\alpha$ \\
\hline
CC & $16.14$ & $0.629^{+0.027}_{-0.027}$ & $0.399^{+0.093}_{-0.122}$ & $2.281^{+0.492}_{-0.433}$ \\ [0.9ex]
SNIa & $54.83$ & $0.599^{+0.275}_{-0.269}$ & $0.160^{+0.050}_{-0.072}$ & $2.771^{+0.161}_{-0.214}$ \\ [0.9ex]
Joint & $78.69$ & $0.692^{+0.019}_{-0.018}$ & $0.228^{+0.035}_{-0.040}$ & $2.839^{+0.117}_{-0.193}$ \\ [0.9ex]
\hline
\end{tabular}
\caption{Best-fit values and their $68\%$ CL uncertainties for fractional cosmology with CC, SNIa and a Joint analysis.}
\label{tab:bestfits}
\end{table}
Figure \ref{fig:contours} shows the 1D marginalized posterior distributions for each data and
joint analysis and also the 2D phase space distribution
at 68\% ($1\sigma$), 99.7\% ($3\sigma$) CL. According to the $\chi^2$ value, the model is in good agreement with the data. Furthermore, the characteristic parameter of the fractional cosmology, $\alpha$, is estimated for each dataset, and in particular, we have $\alpha=2.893^{+0.117}_{-0.193}$ for the joint analysis, allowing an accelerated Universe. Notice that we recover traditional calculus when $\alpha=1$; however, in the region $0<\alpha<1$, obtaining an accelerated physical Universe at late stages is not feasible. For this $\alpha$-range, we can obtain an accelerated power-law solution corresponding to negative values for the age of the Universe; thus, the corresponding solution is nonphysical. Hence, one way to avoid this affliction is under the introduction of $\Lambda$, which will act as a cosmological constant. However, we are in a loop because the idea explains the Universe's acceleration through the $\alpha$ term, which contributes to the fractional calculus theory. The other way is to consider $\alpha>2$, and then we get an accelerated physical Universe at late stages.
\begin{figure*}
\centering
\includegraphics[width=0.6\textwidth]{contour1_fract.pdf}
\caption{2D likelihood contours at 68\% and 99.7\% CL, alongside the corresponding 1D posterior distribution of the free parameters, in fractional cosmology.}
\label{fig:contours}
\end{figure*}
\begin{figure*}
\centering
\includegraphics[width=0.32\textwidth]{plot_Hz_fract_cc0_joint.pdf}
\includegraphics[width=0.32\textwidth]{plot_qz_fract_cc0_joint.pdf}
\includegraphics[width=0.32\textwidth]{plot_jz_fract_cc0_joint.pdf}
\caption{Left to right: reconstruction of the $H(z)$,
$q(z)$,
and $j(z)$,
in fractional cosmology represent the results of $\Lambda$CDM cosmology with $h=0.6766$ and
$\Omega_{\text{m}0}=0.3111$
\cite{Planck:2018}.}
\label{fig:Hz_and_qz}
\end{figure*}
On the other hand, the age of the Universe is estimated for each dataset, $t_U/{\rm Gyrs} = 33.633^{+14.745}_{-15.095}$ (CC), $33.837^{+27.833}_{-10.788}$ (SNIa) and $33.617^{+3.411}_{-4.511}$ (joint). For the Joint value, we obtain around $2.4$ times larger than the age of the Universe expected under the standard paradigm, which is also in disagreement with the value obtained with globular clusters, $t_U=13.5^{+0.16}_{-0.14}\pm 0.23$ \cite{Valcin:2021}. The term $(1-\alpha)H/t$, which acts as an extra source of mass leading to a closed Universe, could be the origin of this older Universe. In closed scenarios, the Universe becomes older than the standard prediction \cite{DiValentino:2020srs}.
Regarding the cosmographic parameters at $z=0$ we have $q_0=-0.315^{+0.030}_{-0.028}$ and $j_0=0.040^{+0.032}_{-0.053}$ using the joint analysis. Furthermore, the redshift transition between acceleration and deceleration stages of $z_T=2.388^{+0.610}_{-0.510}$ is estimated. From Figure \ref{fig:Hz_and_qz}, the $z_T$, $q_0$ and $j_0$ values for fractional cosmology are deviated more than $3\sigma$ to the value obtained by $\Lambda$CDM. In contrast to $\Lambda$CDM, the reconstruction of a jerk for the alternative cosmology suggests an effective dynamical equation of state for the Universe for late times.
\begin{figure}
\centering
\includegraphics[width=0.45\textwidth]{plot_H0diag_fract_cc0_joint.pdf}
\caption{$\mathbf{\mathbb{H}}0(z)$ diagnostic for fractional cosmology and its comparison against $\Lambda$CDM model.}
\label{fig:H0diagnostic}
\end{figure}
Figure \ref{fig:H0diagnostic} displays the reconstruction of the $\mathbf{\mathbb{H}}0(z)$ diagnostic \cite{H0diagnostic:2021} for the fractional cosmology and its error band at $3\sigma$ CL. Although the path (solid line) for the fractional cosmology is consistent within $3\sigma$ with the CMB Planck value \cite{Planck:2018} for $z\lesssim1.5$, we can observe that it presents a trend to the $H_{0}$ value obtained by SH0ES \cite{Riess:2019} for present time. Nevertheless, the $H_0$ value for $1.5<z<2.5$ is lower than the Planck value, suggesting a tension in this value.
\section{Dynamical Systems and Stability Analysis} \label{DS}
Defining the dimensionless age parameter $A=t H$, the re-scaled (dimensionless) energy density $\mu_i= t^2 \rho_i$ where $\rho_i$ is defined in \eqref{EQ16}, and the logarithmic time $\tau=\ln t$ such that for any function $g$ we have $dg/d\tau= t dg/dt$. For the new variables we have a restriction
\begin{equation}
A^2+ (1-\alpha)A=\frac{8\pi G}{3}\sum_i \mu_i, \label{FriedmannFrac2}
\end{equation}
and evolution equations for each species
\begin{equation}
\frac{d\mu_{i}}{d\tau}= \mu_{i} \left(1+ \alpha +(\alpha -1) w_{i} -3 A (w_{i}+1)\right). \label{Matter-cons}
\end{equation}
Equation \eqref{FriedmannFrac2} becomes
\begin{equation}
\left(A+ \sqrt{\frac{\Lambda }{3}}\right)^2=\frac{8\pi G}{3} \sum_i \mu_{i} + \frac{\Lambda}{3},\label{EQ43}
\end{equation}
where $ \frac{\Lambda}{3}= \frac{(1-\alpha)^2}{4}$.
Notice that, for $\alpha=1$ we obtain $\Lambda=0$, an then we have the standard cosmology with only radiation and CDM.
To compare with the standard model we impose that the universe components are two ($n=2$), CDM ($\mu_{1}=\mu_{\text{m}}, w_1=w_{\text{m}}=0$) and radiation ($\mu_{2}=\mu_{\text{r}}, w_2=w_{\text{r}}=1/3$), which in our modified scenario evolve according to
\begingroup\makeatletter\def\f@size{9}\check@mathfonts
\begin{align}
& \frac{d\mu_{\text{m}}}{d \tau}= \mu_{\text{m}} (\alpha -3 A+1), \label{SYST1}\\
& \frac{d\mu_{\text{r}}}{d \tau}= \frac{2 \mu_{\text{r}} (2 \alpha -6 A +1)}{3}, \label{SYST2}\\
& \frac{d A}{d\tau}= \frac{8 \pi G (3 (\alpha -3 A+1) \mu_{\text{m}} +2 (2 \alpha -6 A+1) \mu_{\text{r}})}{9 (1-\alpha +2 A)},\label{SYST3}
\end{align}
\endgroup
subject to \eqref{EQ43}.
Now, we present a reduced phase space which is determined by a coupled system $d\mathbf{X}/d\tau = \mathbf{F}(\mathbf{X})$ subject to a constraint
$G(\mathbf{X}) = \mathbf{0}$ ($\mathbf{X}$ constitute the reduced phase space variables). Of central importance
to the investigation of the dynamical system are the equilibrium points which are determined by
the equations $\mathbf{F}(\mathbf{X}) = \mathbf{0}, \mathbf{G}(\mathbf{X}) = \mathbf{0}$. We calculate the gradient $\nabla\mathbf{G}(\mathbf{X})$,
that is used to locally solve the constraint to linear order.
Defining the dimensionless variables
\begin{equation}
x_{1}= \frac{8\pi G \mu_{\text{m}} }{3 \left(A+ \frac{1-\alpha}{2}\right)^2}, \quad x_{2}= \frac{8\pi G \mu_{\text{r}} }{3 \left(A+ \frac{1-\alpha}{2}\right)^2}, \label{eq32}
\end{equation}
that evolve as
\begingroup\makeatletter\def\f@size{8}\check@mathfonts
\begin{align}
& \frac{d x_1}{d\tau}=\frac{1}{3} x_{1} \big\{3 \alpha +3 A (3 x_{1}+4 x_{2}-3)-3 (\alpha +1) x_{1} -4 \alpha
x_{2}-2 x_{2}+3\big\}, \label{syst1}\\
& \frac{d x_2}{d\tau}= A x_{2} (3 x_{1}+4 x_{2}-4)-(\alpha +1) x_{1}
x_{2} -\frac{2}{3} (2 \alpha +1) (x_{2}-1) x_{2}, \label{syst2}\\
& \frac{d A}{d\tau}= -\frac{1}{12} (1-\alpha +2 A) \left\{9 A x_{1}+2
x_{2} (-2 \alpha +6 A-1)-3 (\alpha +1) x_{1}\right\}, \label{syst3}
\end{align}
\endgroup
subject to the restriction
\begin{equation}
G(x_{1}, x_{2}, A):= A^2 + (1-\alpha )A-\frac{1}{4} (1-\alpha +2 A)^2 (x_{1}+x_{2})=0. \label{syt4}
\end{equation}
As a plausible physical conditions we assume $0 \leq \Omega_{{\text{m}}}:=\frac{x_1 (\alpha -2 A-1)^2}{4 A^2}\leq 1, x_2\geq 0, A \geq 0$.
The physical parameter region we have considered is $1\leq\alpha\leq3$.
\begin{table*}[ht]
\resizebox{\textwidth}{!}{
\begin{tabular}{|c|c|c|c|c|c|}
\hline
Label & $(x_1, x_2, A)$ & Existence & Eigenvalues & Stability & $\nabla G(x_{1}, x_{2}, A) |_P$ \\\hline
$P_1$& $\left(0, 0, 0\right)$ & $1\leq \alpha \leq 3$ & $\left\{0,\alpha +1,\frac{2}{3} (2 \alpha +1)\right\}$ & Source & $\left(-\frac{1}{4} (\alpha -1)^2,-\frac{1}{4} (\alpha -1)^2,1-\alpha \right)$ \\\hline
$P_2$& $\left(0, -\frac{(2 \alpha +1) (4 \alpha -7)}{(\alpha -4)^2}, \frac{1}{6} (2 \alpha
+1)\right)$ & $1\leq \alpha \leq \frac{7}{4}$&$\left\{0,\frac{1}{2},-\frac{(2 \alpha +1) (4 \alpha -7)}{3 (\alpha -4)}\right\}$ & Saddle & $\left(-\frac{1}{36} (\alpha -4)^2,-\frac{1}{36} (\alpha -4)^2,-\frac{3 (\alpha -1)^2}{\alpha -4}\right)$ \\\hline
$P_3$ & $\left(\frac{8 \left(-\alpha ^2+\alpha +2\right)}{(\alpha -5)^2}, 0, \frac{\alpha
+1}{3}\right)$ & $1\leq \alpha <\frac{5}{2}$ & $\left\{0,-\frac{2}{3},-\frac{2 (\alpha -2) (\alpha +1)}{\alpha -5}\right\}$ & Sink & $\left(-\frac{1}{36} (\alpha -5)^2,-\frac{1}{36} (\alpha -5)^2,-\frac{3 (\alpha -1)^2}{\alpha -5}\right)$ \\\hline
$P_4$ & $(0,0,\alpha -1)$ & $1 \leq \alpha \leq 3$ & $\left\{0,2(2- \alpha),\frac{2}{3} (7-4 \alpha )\right\}$& Source for $\alpha <\frac{7}{4}$ & \\
&&&& Saddle for $\frac{7}{4}<\alpha <2$ & \\
&&&& Sink for $\alpha >2$ &$\left(-\frac{1}{4} (\alpha -1)^2,-\frac{1}{4} (\alpha -1)^2,\alpha -1\right)$ \\ \hline
\end{tabular}}
\caption{\label{Tab1} Equilibrium points of system \eqref{syst1}, \eqref{syst2} and \eqref{syst3}. The physical parameter region is $1\leq\alpha \leq 3$. The existence condition is $0 \leq \frac{x_1 (\alpha -2 A-1)^2}{4 A^2}\leq 1, x_2\geq 0, A \geq 0$.}
\end{table*}
Below in Tab. \ref{Tab1} the equilibrium points of system \eqref{syst1}, \eqref{syst2} and \eqref{syst3} which satisfy the restriction \eqref{syt4} are given. We will
follow \cite{Hewitt:1992sk, Nilsson:1995ah, Goliath:1998mx} and solve the restriction locally around the equilibrium points. This
formulation will enable us to achieve a good understanding of the global structure of
the reduced phase space.
One eigenvalue is always zero due to the restriction \eqref{syt4}.
The expression $G(x_{1}, x_{2}, A)=0$ defines a singular surface,
with the gradient
\begingroup\makeatletter\def\f@size{9}\check@mathfonts
\begin{align}
\nabla G(x_{1}, x_{2}, A) & = \Bigg(-\frac{1}{4} (\alpha -2 A-1)^2, -\frac{1}{4} (\alpha -2 A-1)^2, \nonumber \\
& \;\;\;\;\; (-\alpha +2 A+1)
(1-x_{1}-x_{2})\Bigg).
\end{align}
\endgroup
Notice that the gradient is different from zero at each point $P_i$ if $\alpha \notin \{1, 4, 5\}$. Therefore we can solve locally the restriction for each point $P_1$, $P_2$ and $P_3$, say for $x_2\geq 0$.
Hence,
\begin{equation}
\label{Eq:42}
x_2= \frac{4 A (-\alpha +A+1)}{(\alpha -2 A-1)^2}-x_1.
\end{equation}
Therefore, we study the flow of the two-dimensional dynamical system
\begin{eqnarray}
\frac{d x_1}{d\tau}&& = \frac{1}{3} x_1 \Bigg[\frac{8 (3-2 A) A^2}{(\alpha -2 A-1)^2}+\frac{24 A}{\alpha -2 A-1} \nonumber \\ && -3 A x_1+7
A+\alpha (x_1+3)-x_1+3\Bigg], \label{reducedx1}
\end{eqnarray}
\begin{eqnarray}
\frac{d A}{d\tau} &&= -\frac{1}{12} (-\alpha +2 A+1) \nonumber\\
&& \times \Bigg[\frac{8 A (-2 \alpha +6 A-1)
(-\alpha +A+1)}{(\alpha -2 A-1)^2} \nonumber \\
&& +x_1 (\alpha -3 A-1)\Bigg], \label{reducedA}
\end{eqnarray}
\begin{figure*}
\centering
\includegraphics[scale=0.9]{Plot1.pdf}
\caption{Phase flow of the reduced system \eqref{reducedx1} and \eqref{reducedA}. The shadowed region corresponds to $0\leq x_2\leq 1$.}
\label{fig:DS1}
\end{figure*}
\begin{table*}[ht]
\begin{tabular}{|c|c|c|c|c|c|c|}
\hline
Label & $ \Omega_{\text{m}}$ & $ \Omega_{\text{r}}$ & $H$ & q & Solution & $a(t)= \left(t/t_U\right)^{A}$ \\\hline
$P_1$& Indeterminate & Indeterminate & $0$ & Indeterminate & Static universe & $a(t)=\text{constant}$ \\\hline
$P_2$& $0$ & $\frac{9}{2 \alpha +1}-2$ & $\frac{2 \alpha +1}{6 t}$ & $-1+\frac{6}{2 \alpha +1}$ & Powerlaw (decelerated) & $a(t)= \left(t/t_U\right)^{ (2 \alpha
+1)/6}$ \\\hline
$P_3$ & $-\frac{2 (\alpha -2)}{\alpha +1}$ & $0$ & $\frac{\alpha +1}{3 t}$ & $-\frac{\alpha -2}{\alpha +1}$& Powerlaw (decelerated) & $a(t)= \left(t/t_U\right)^{\frac{1+\alpha}{3}}$\\\hline
$P_4$ & $0$ & $0$ & $\frac{\alpha -1}{t}$ & $-\frac{\alpha -2}{\alpha -1}$ & Powerlaw (accelerated if $\alpha<1$ or $\alpha>2$) & \\
&&&& & Powerlaw (decelerated if $1<\alpha <2$) & $a(t)= \left(t/t_U\right)^{\alpha-1}$ \\\hline
\end{tabular}
\caption{\label{Tab2} Equilibrium points of system \eqref{syst1}, \eqref{syst2} and \eqref{syst3}. The physical parameter region is $1\leq\alpha \leq3$.
}
\end{table*}
\begin{figure*}
\centering
\includegraphics[scale=0.9]{Plot2.pdf}
\caption{Phase flow of the reduced system \eqref{Preducedx1} and \eqref{PreducedA}. The shadowed region corresponds to $0\leq x_2\leq 1$.}
\label{fig:DS2}
\end{figure*}
defined on the phase plane
\begin{eqnarray}
& \Bigg\{(x_1, A)\in \mathbb{R}^2: 0\leq x_1 \leq 1, \; A \geq 0, \nonumber \\
& 0\leq \frac{4 A (-\alpha +A+1)}{(\alpha -2 A-1)^2}-x_1\leq 1 \Bigg\}.
\end{eqnarray}
The equilibrium points of the reduced system are presented in Table \ref{Tab1}, where we omit the zero eigenvalues.
Generically, evaluated at a fixed point $P$ we have
\begin{align}
& \rho_{\text{m}}(t)= \frac{3 x_1 (-\alpha +2 A+1)^2}{32 \pi G t^2}, \\
& \rho_{\text{r}}(t)=\frac{3 x_2 (-\alpha +2 A+1)^2}{32 \pi G t^2},\\
& H(t)= \frac{A}{t}.
\end{align}
Therefore, we have two physical observables defined as the fractional energy densities
\begin{align}
\Omega_{\text{m}}= \frac{x_1 (\alpha -2 A-1)^2}{4 A^2}, \quad \Omega_{\text{r}}=\frac{x_2 (\alpha -2 A-1)^2}{4 A^2},
\end{align}
and the deceleration parameter, which can be written as
\begin{align}
q: & = -1 - \frac{\dot{H}}{H^2}= -1 -\frac{t \dot{A}}{A^2}+\frac{1}{A}\nonumber \\
& = -1+ \frac{(\alpha -1) (3 (\alpha +1) x_1+4 \alpha x_2+2 x_2)}{12 A^2} \nonumber\\
& +\frac{-5 \alpha (3 x_1+4 x_2)+3 x_1+8 x_2+12}{12 A}+\frac{3 x_1}{2}+2
x_2.
\end{align}
Replacing \eqref{Eq:42}, we acquire
\begin{align}
q & = \frac{4 \alpha ^2-5 \alpha +6 A^2-13 \alpha A+13 A+1}{6 A^2-3 \alpha A+3 A} \nonumber \\
& -\frac{x_1 (-\alpha +2 A+1) (-\alpha +3 A+1)}{12 A^2}.
\end{align}
Now that we locally solved the constraint to linear order, the eigenvalues and eigenvectors
of the remaining locally unconstrained system are then listed.
\begin{enumerate}
\item The eigensystem of $P_1$ (eigenvalues in first row; eigenvectors second row) is
$\left(
\begin{array}{cc}
\alpha +1 & \frac{2}{3} (2 \alpha +1) \\
\left\{-\frac{4}{\alpha -1},1\right\} & \{0,1\} \\
\end{array}
\right)$.
\item The eigensystem of $P_2$ is
$\left(
\begin{array}{cc}
\frac{1}{2} & -\frac{(2 \alpha +1) (4 \alpha -7)}{3 (\alpha -4)} \\
\left\{-\frac{4 \left(16 \alpha ^2-17 \alpha -26\right)}{(\alpha -4)^2},1\right\} & \{0,1\} \\
\end{array}
\right)$.
\item The eigensystem of $P_3$ is
$\left(
\begin{array}{cc}
-\frac{2}{3} & -\frac{2 (\alpha -2) (\alpha +1)}{\alpha -5} \\
\left\{-\frac{12 (\alpha -2) (\alpha +1) (3 \alpha -7)}{(\alpha -5)^3},1\right\} & \left\{-\frac{108 (\alpha -1)^2}{(\alpha -5)^3},1\right\} \\
\end{array}
\right)$.
\item The eigensystem of $P_4$ is
$\left(
\begin{array}{cc}
4-2 \alpha & \frac{2}{3} (7-4 \alpha ) \\
\left\{\frac{4}{\alpha -1},1\right\} & \{0,1\} \\
\end{array}
\right)$.
\end{enumerate}
In Fig. \ref{fig:DS1} a phase flow of the reduced system \eqref{reducedx1} and \eqref{reducedA} is presented. The physical part of the phase-plane, $x_2\geq 0$ is represented by a shadowed region in the phase-planes. It is confirmed that on the interval $1\leq \alpha\leq 3$, $P_1$ is a source, $P_2$ is a saddle (it is nonphysical for $\alpha>\frac{7}{4}$) and $P_3$ is a sink (it is nonphysical for $\alpha>\frac{5}{2}$). $P_3$ satisfies $a(t)= \left(t/t_U\right)^{\frac{1+\alpha}{3}}$, which is physical for $1\leq \alpha <\frac{5}{2}$. Evaluating the fractional energy densities $\Omega_{\text{m}}$, $\Omega_{\text{r}}$ of matter and radiation, and the Hubble parameter, we have $\Omega_{\text{m}}= -\frac{2 (\alpha -2)}{\alpha +1}$, $\Omega_{\text{r}}=0$, $H=\frac{\alpha +1}{3 t}$ and $q=-\frac{\alpha -2}{\alpha +1}$. It is a powerlaw (decelerated) late-time attractor for $\alpha<2$. Moreover, for $\alpha>1$ the more interesting solution is $P_4$ that, as is presented in Figure \ref{fig:DS1}, it is the physical attractor for $\alpha>2$.
Moreover, the point $P_4$ satisfies $a(t)= \left(t/t_U\right)^{\alpha-1}$. It can be a source for $\alpha <\frac{7}{4}$, or a saddle for $\frac{7}{4}<\alpha <2$ or a sink for $\alpha >2$. This point does not exists in GR (for which $\alpha=1$). The cosmological observables are $\Omega_{\text{m}}=0$, $\Omega_{\text{r}}=0$, $H=\frac{\alpha -1}{t}$ and $q=-\frac{\alpha -2}{\alpha -1}$. This solution is accelerated powerlaw if $\alpha<1$ or $\alpha>2$, or decelerated powerlaw if $1<\alpha <2$.
In table \ref{Tab2} are presented the asymptotic values of the cosmological parameter for the equilibrium points of system \eqref{syst1}, \eqref{syst2} and \eqref{syst3}, and the asymptotic expression of the scale factor. The physical parameter region is $1\leq\alpha \leq3$.
On the other hand, the previous system is not compact for $A$, so to have a compact phase space, we define $U= {A}/(1+A)$.
We obtain the dynamical system
\begin{eqnarray}
\frac{dx_1}{d\tau} = \frac{1}{3} x_1 &&\Bigg[\frac{8 (5 U-3) U^2}{(U-1) (\alpha (U-1)+U+1)^2} \nonumber \\
&&-\frac{24 U}{\alpha
(U-1)+U+1} \nonumber \\
&& +\frac{2 U (x_1-2)+x_1-3}{U-1}
+\alpha (x_1+3)\Bigg], \label{Preducedx1}
\\
\frac{dU}{d\tau}= \frac{1}{12} && \Bigg[\frac{8 (5
U-3) U^2}{\alpha (U-1)+U+1}+\alpha ^2 (U-1)^2 x_1 \nonumber \\
&& +\alpha (U-1) (U (3 x_1-16)+2 x_1) \nonumber \\
&& +U (2 U
(x_1-20)+3 x_1+8)+x_1\Bigg],\label{PreducedA}
\end{eqnarray}
defined on
\begin{eqnarray}
&& \Bigg\{(x_1, U)\in [0,1]\times[0,1], \nonumber\\
&& 0\leq \frac{4 U (\alpha (U-1)+1)}{(\alpha (U-1)+U+1)^2}-x_{1}\leq 1\Bigg\}.
\end{eqnarray}
In Fig. \ref{fig:DS2} a phase flow of the reduced system \eqref{Preducedx1} and \eqref{PreducedA} is presented. Additionally to $P_1$, $P_2$, $P_3$ and $P_4$, there appear two points at infinity. The point $Q_1: (x_1, U)= (1,1)$ that is a saddle and the point $Q_2: (x_1, U)= (0,1)$ that is a local source.
For the analysis of the unstable manifold of $P_2$, we consider the quantities $u, v$ defined in Appendix \ref{app2}, eqs. \eqref{B1} and \eqref{B2}, respectively, and defines the graph $(u, g(u))$ in \eqref{B3} which satisfies the differential equation \eqref{ODE}.
The cosmological solution associated to the unstable manifold of $P_2$ determines a curve in the physical space $(t^2 \rho_{\text{m}}, t^2 \rho_{\text{r}}, t H)$ given by
\begin{align}
& t^2 \rho_{\text{m}}(t)= -\frac{(\alpha (16 \alpha -17)-26) u (-\alpha +6 u+6 g(u)+4)^2}{24 \pi (\alpha -4)^2 G},\\
& t^2 \rho_{\text{r}}(t)= \frac{(-4 \alpha +6 u+6 g(u)+7) (2 \alpha +6 u+6 g(u)+1)}{96 \pi G} \nonumber \\
& +\frac{(\alpha (16 \alpha -17)-26) u
(-\alpha +6 u+6 g(u)+4)^2}{24 \pi (\alpha -4)^2 G},\\
& t H(t) = \frac{\alpha }{3}+u+g(u)+\frac{1}{6}.
\end{align}
Removing the scaling factor $t^2$, we have the evolution of the energy densities
\begin{align}
& \Omega_{\text{m}}= \frac{8 \pi G \rho_{\text{m}}}{3 H^2} \nonumber \\
& = -\frac{4 (\alpha (16 \alpha -17)-26) u (-\alpha +6 g(u)+6 u+4)^2}{3 (\alpha -4)^2 (2 \alpha +6 g(u)+6
u+1)^2},
\\
& \Omega_{\text{r}}= \frac{8 \pi G \rho_{\text{r}}}{3 H^2} \nonumber \\
& = \frac{4 (\alpha (16 \alpha -17)-26) u (-\alpha +6 g(u)+6 u+4)^2}{3 (\alpha -4)^2 (2 \alpha +6 g(u)+6 u+1)^2} \nonumber \\
& + \frac{(-4 \alpha +6 g(u)+6 u+7)
}{3 (2 \alpha +6 g(u)+6 u+1)}.
\end{align}
\begin{figure}
\centering
\includegraphics[scale=0.9]{Plot3.pdf}
\caption{Evolution of $\Omega_{\text{m}}$, $\Omega_{\text{r}}$ and $t H$ vs $u$ for different values of $\alpha$, as the flow moves along the unstable manifold connecting the saddle point $P_2$ with the sink $P_3$. For $\alpha>7/4$ point $P_2$ becomes nonphysical leading to negative $\Omega_{\text{r}}$, as well as $P_3$ which for $\alpha>5/2$ leads to negative $\Omega_{\text{m}}$. $P_3$ becomes unstable for $\alpha>2$ emerging the late-time accelerated powerlaw solution $P_4$ for $\alpha>2$. }
\label{Fig3}
\end{figure}
In figure \ref{Fig3} is presented the evolution of $\Omega_{\text{m}}$, $\Omega_{\text{r}}$ and $t H$ vs $u$ for the values $\alpha\in \{1.0, 2.839, 3.0\}$. Observe that as $\alpha\approx 1$, at $P_3$, $\Omega_{\text{r}}\sim 0$, $\Omega_{\text{m}}\sim 1/3$ and the missing fractional energy density is $\Omega_{X}\sim 2/3$, in complete analogy with the $\Lambda$CDM model. For $\alpha>7/4$ point $P_2$ becomes nonphysical leading to negative $\Omega_{\text{r}}$, as well as $P_3$ which for $\alpha>5/2$ leads to negative $\Omega_{\text{m}}$. $P_3$ becomes unstable for $\alpha>2$ emerging the late-time accelerated powerlaw solution $P_4$ for $\alpha>2$.
\begin{table*}[ht]
\begin{tabular}{|c|c|c|}
\hline
$(x_1, x_2,A)$ & Eigenvalues & Solution \\\hline
$ \left(0, 0, 0\right)$ & $\{0., 3.839, 4.452\}$ & $\rho_{\text{m}}(t)\to 0, \rho_{\text{r}}(t)\to 0,H(t)\to 0$ \\\hline
$\left(0, 0.66134, 0.259333\right)$ & $\left\{0,\frac{1}{2},-0.820502\right\}$ & $ \text{$\rho $m}(t)\to 0, \text{$\rho $r}(t)\to -\frac{0.0964524}{G t^2}, H(t)\to \frac{1.113}{t}$ (nonphysical)\\\hline
$\left(-5.51773, 0., 1.27967\right)$ & $\left\{0,-\frac{2}{3},2.98095\right\}$ & $\rho_{\text{m}}(t)\to -\frac{0.0854376}{G t^2}, \rho_{\text{r}}(t)\to 0.,H(t)\to \frac{1.27967}{t}$ (nonphysical)\\\hline
$({0., 0., 1.839})$ & $\{0., -1.678, -2.904\}$ & $\rho_{\text{m}}(t)\to 0., \rho_{\text{r}}(t)\to 0., H(t)\to \frac{1.839}{t}$ \\\hline
\end{tabular}
\caption{\label{Tab3} Cosmological solutions represented by equilibrium points for the best-fit value $\alpha=2.839$. }
\end{table*}
For the best fit value $\alpha= 2.839$, the late-time attractor is $P_4$, and the equilibrium points corresponds to the cosmological solutions summarized in table \ref{Tab3}.
\section{Summary and Discussions} \label{SD}
We study the recent proposition of fractional cosmology to elucidate if the theory is capable of reproducing the observed dynamics of the Universe, in specific, if it is capable of predicting the Universe's acceleration and giving some clues about the fundamental nature of the dark energy. We implement constraints through cosmic chronometers, Type Ia Supernovae and joint analysis and summarized our results in Fig. \ref{fig:contours} and Table \ref{tab:bestfits}. The fractional parameter prefers $\alpha=2.839^{+0.117}_{-0.193}$ for a joint analysis which suggests a solid presence of fractional calculus in the dynamical equations of cosmology; however, it generates crucial differences as it is possible to observe from Figs \ref{fig:Hz_and_qz}. Of course, we expect this behaviour to have an accelerated Universe at late times. From one side, the term $(1-\alpha)H/t$ acts like an extra source of mass, closing the Universe and not allowing the observed dynamics, in particular, the Universe acceleration at late times if $\alpha<2$, but, for $\alpha>2$, we can have an accelerated power-law solution. Furthermore, from Figs. \ref{fig:Hz_and_qz} it is possible to notice that the fractional constant $f$ can act like the object that causes the Universe acceleration. It is possible to observe from $H(z)$ and $q(z)$ essential differences when we compare with the standard model, mainly at high redshifts. In addition, the jerk parameter also shows that the causative of the Universe acceleration is not a cosmological constant because, at $z=0$, the fractional parameter does not converge to $j=1$; this coincides with recent studies that suggest that it is not a $\Lambda$ the cause of the Universe acceleration \cite{Zhao:2017cud}.
Moreover, the Universe's age obtained under this scenario is $t_U=33.617^{+3.411}_{-4.511}$ Gyrs based on our Joint analysis, around $2.4$ times larger than the age of the Universe expected under the standard paradigm. However, this value does not contradict the minimum bound expected for the universe age imposed by globular clusters, and, as far as we know, the maximum bound does not exist and is model-dependent. Finally, we observe a trend of $H_{0}$ to the value obtained by SH0ES \cite{Riess:2019} at current times, and in agreement with Planck's value \cite{Planck:2018} for $z\lesssim1.5$. However, a discrepancy between both values in the region $1.5<z<2.5$ holds, such that $H_0$ tension is not fully resolved.
Additionally, we have presented a dynamical systems and stability analysis in order to explore the phase-space under the assumption of different $\alpha$ parameters. This formulation enabled us to achieve a good understanding of the global structure of the reduced phase space. One late-time attractor have $a(t)= \left(t/t_U\right)^{\frac{1+\alpha}{3}}$, which is physical for $1\leq \alpha <\frac{5}{2}$. Evaluating the fractional energy densities $\Omega_{\text{m}}$, $\Omega_{\text{r}}$ of matter and radiation, and the Hubble parameter, we identify $P_3$ with a powerlaw (decelerated) late-time attractor for $\alpha<2$.
Moreover, for $\alpha>1$ exists an additional point not present in GR with $a(t)= \left(t/t_U\right)^{\alpha-1}$ which can be a source for $\alpha <\frac{7}{4}$ or a saddle for $\frac{7}{4}<\alpha <2$, or a sink for $\alpha >2$. Evaluating the fractional energy densities $\Omega_{\text{m}}$, $\Omega_{\text{r}}$ of matter and radiation, and the Hubble parameter, we identify $P_4$ with an accelerated power-law if $\alpha<1$ or $\alpha>2$, or decelerated power-law if $1<\alpha <2$. Moreover, the new approach of fractional calculus opens new windows to affront calculations that traditional calculus can not resolve. For example, the problem of determining the energy density value for the cosmological constant can be attached to this approach or even applied to the standard model field to make its calculations efficient. As we demonstrate in this research, fractional calculus contributes with a constant that acts as the causative of the Universe's acceleration without the need to add no natural term into the field equations. Indeed, if we had written the Einstein Field equations in the fractional setup, the Friedmann equations naturally contained a constant term, predicting the existence of a late time Universe in acceleration contrary to the standard approach. Moreover, as it is possible to observe, the model presents differences in comparison with the standard model at high redshifts being the smoking gun, to differentiate among the theories.
From a mathematical perspective, it is expected that many physical phenomena and systems are better described by fractional differential equations rather than the equivalent integer-order equations. For example, since the set of integers is a set of measure zero, and the real numbers are a set of measure one, nature prefers non-integer dimensions and parameters. Therefore, we recommend that the community study other approaches like this presented in the paper in order to understand the Universe's acceleration with another mathematical background. For example, in fractional calculus, the mathematical richness generates the $\Lambda$-like term originated in the corrections due to the fractional index $\alpha$ of the fractional derivative, which could resolve the energy density problem. In future studies, it is possible to aboard the fractional Einstein equation using linear perturbations theory to understand acoustic peaks of the CMB, the power spectrum and inflation. However, this will be presented elsewhere.
\newpage
\begin{appendix}
\begin{widetext}
\section{Deceleration parameter as a closed formula of $z$.}
Here we compute the deceleration parameter, using Eq. \eqref{q(z)}, which yields
\begingroup\makeatletter\def\f@size{8}\check@mathfonts
\begin{align}
&q(z)=-1 + \frac{(z+1)}{E(z)} \Bigg\{\frac{2 f^2 F(z)^2}{(\alpha -1) (z+1) E(z)} \nonumber \\
& +\frac{(E(z)+f F(z)) \Big(-\frac{12 f^3
F(z)^{\frac{4 \alpha }{3}+\frac{11}{3}}}{(\alpha -1) (z+1) E(z)}+\frac{6 f \Omega_{0\text{m}} (z+1)^2
F(z)^{\frac{\alpha +8}{3}}}{E(z)}+\frac{8 f \Omega_{0\text{r}} (z+1)^3 F(z)^3}{E(z)}+9
\Omega_{0\text{m}} (z+1)^2 F(z)^{\frac{\alpha +5}{3}}+12 \Omega_{0\text{r}} (z+1)^3 F(z)^2\Big)}{6 \left(f^2
F(z)^{\frac{4 (\alpha +2)}{3}}+\Omega_{0\text{m}} (z+1)^3 F(z)^{\frac{\alpha +5}{3}}+\Omega_{0\text{r}} (z+1)^4
F(z)^2\right)}\Bigg\}, \label{DecelerationFinal}
\end{align}
\endgroup
where $E(z)$ function is given by \eqref{FriedmannFinal1}.
\section{Unstable manifold of $P_2$}
\label{app2}
To find the unstable manifold of $P_2$ we define
\begin{align}
u & = -\frac{(\alpha -4)^2 x_{1}}{64 \alpha ^2-68 \alpha -104}, \label{B1}\\
v & = -\frac{\alpha }{3}+A+\frac{3 (94-37 \alpha )
x_{1}}{64 (\alpha (16 \alpha -17)-26)}+\frac{x_{1}}{64}-\frac{1}{6}, \label{B2}
\end{align}
The unstable manifold of $P_2$ is locally given by the graph
\begin{equation}
\left\{(u,v): v=g(u), g(0)=g'(0)=0\right\}. \label{B3}
\end{equation}
Where $g$ satisfies the differential equation
\begin{small}
\begin{align}
\frac{1}{3} \Bigg[ & -\frac{486 u (g(u)+3 u) (2 g(u)+2 u+1)}{(\alpha -4)^2} -\frac{9 u (2 g(u)+2 u+1) (37 g(u)+111
u-9)}{\alpha -4} +\frac{972 u (g(u)+u) (2 g(u)+2 u+1)^2}{(-\alpha +6 g(u)+6 u+4)^2} \nonumber \\
& +\frac{81 (-2 g(u)+6 u-1)
(g(u)+u) (2 g(u)+2 u+1)}{\alpha -6 g(u)-6 u-4} +8 \alpha (2 u (g(u)+u)-g(u)) -12 (8 u+5) g(u)^2 \nonumber \\
& -2 (8 u (24 u+1)+11)
g(u) -4 (72 u+13) u^2\Bigg] - u g'(u) \Bigg[ -\frac{36 (\alpha -1)^2 (g(u)+u)}{(-\alpha +6 g(u)+6
u+4)^2} +\frac{4 (\alpha (16 \alpha -17)-26) u g(u)}{(\alpha -4)^2}\nonumber \\
&+g(u) +\frac{(2 u+1) \left((\alpha -4)^2+4
(\alpha (16 \alpha -17)-26) u\right)}{2(\alpha -4)^2}\Bigg]=0.\label{ODE}
\end{align}
\end{small}
\end{widetext}
\end{appendix}
\begin{acknowledgements}
M.A.G.-A. acknowledges support from c\'atedra Marcos Moshinsky and Universidad Iberoamericana for support with the SNI grant. G.F.A. acknowledges support from DINVP and Universidad Iberoamericana. A.H.A. thank to the support from Luis Aguilar, Alejandro de Le\'on, Carlos Flores, and Jair Garc\'ia of the Laboratorio
Nacional de Visualizaci\'on Cient\'ifica Avanzada. G.L. was funded by Vicerrectoría de Investigación y Desarrollo Tecnológico (Vridt) at UCN and through Concurso De Pasantías De Investigación Año 2022, Resolución Vridt N°040/2022 under the Project ``The Hubble constant tension: some ways to
alleviate it.'' J.M. acknowledges the support from ANID REDES 190147.
\end{acknowledgements}
|
\section{}
\subsection{}
\subsubsection{}
\section{Energy Dynamics of a Stationary System}
In this work, we derive the standard equation for relative permeability on the basis of conservation of energy. We consider the multiphase extension of Darcy's law
in the form,
\begin{equation}
\bar{\mathbf{q}}_i = - \frac{k^r_i \mathbf{\mathsf{K}}}{\mu_i} \cdot \nabla \bar{p}
\label{eq:Darcy}
\end{equation}
where $\mathbf{\mathsf{K}}$ is the permeability tensor, $\bar{p}$ is the average pressure, $\mu_i$ is the dynamic viscosity for fluid $i$, $\bar{\mathbf{q}}_i$ is the associated volumetric flow rate and $k^r_i$ is the relative permeability. In the results that follow we will derive
Eq. \ref{eq:Darcy} from first principles, providing scale
consistent definitions for all quantities in the process. In particular
we will show that the average pressure $\bar{p}$ must be the volume-averaged total pressure, including contributions due to both fluids.
Eq. \ref{eq:Darcy} can be considered
as a linear phenomenological equation to predict the flow rate based on the thermodynamic driving force $-\nabla \bar{p}$, with the coefficient tensor
${k^{r}_i \mathbf{\mathsf{K}}}/{\mu_i}$ relating to the rate of energy dissipation in the system.
Efforts to derive the conventional relative permeability form based on volume-averaging
theory have been largely unsuccessful, instead leading to cross-coupling forms
\cite{whitaker1986flowb,rose1988,flekkoy1999}. These forms are intuitive from the perspective of tangential stress boundary continuity in the picture of connected pathways with adjacently flowing liquid phases. However, significant experimental challenges are introduced based on cross-coupling, since more information is needed to disambiguate the additional two
coefficients needed to form the approximation. Since multiphase flow experiments are expensive to perform, the standard two-phase Darcy form is attractive based on the fact that all necessary coefficients can be inferred from a single experiment. In this paper we demonstrate that cross-coupling forms can be avoided based on on an appropriate choice of the thermodynamic driving force. We directly derive Eq. \ref{eq:Darcy} based on the conservation of energy in a stationary system. A set of three constraints are derived to establish meaning of stationary conditions within this context. Ultimately, these reflect the fact that the rate of work done on the system must balance with the dissipated heat for a stationary process. Critically, we do not assume that the system is ergodic at the Darcy scale in our derivation \cite{mcclure2020capillary,mcclure2021thermodynamics}.
Consistent with the non-equilibrium theory developed by Onsager, the result will be determined from a flux-force product that is obtained under stationary conditions \cite{PhysRev.37.405}. The derivation is developed as a scale-dependent relationship, without assuming that a representative elementary volume (REV) exists. The existence of a REV has been called into question due to the significant length scale heterogeneity that is typical for geologic materials as well as due to the accompanying scaling behavior for fluid cluster sizes \cite{PhysRevE.88.033002}.
Based on our approach, relative permeability coefficients may be obtained for any system
based on the measured rate of dissipation. If a REV exists, this corresponds to situations where these coefficients become scale invariant. Stationary conditions are enforced by requiring that there is no net energy input into the region when considered over a particular timescale, which can be considered as a particular quasi-ergodic requirement. We consider a system with constant spatial domain $\Omega \in \Re ^3$, which has a boundary $\Gamma$ that encloses a volume $V$. While from the mathematical perspective the subsequent theoretical development is valid for arbitrary $\Omega$, it is nevertheless useful to consider this entity as being physically significant, e.g. to represent a physical sample used in a relative permeability experiment. For the situation where $\Omega$
corresponds to a physical sample, the approach can be considered as an explicit
framework for averaging. Since an integral over $\Omega$ is a definite integral,
\begin{equation}
\int_{\Omega} f dV = \sum_i \int_{\Omega_i} f dV
\label{eq:subset}
\end{equation}
where $\Omega_i \cap \Omega_j = 0$ for $j\neq i$ are non-intersecting subsets of $\Omega$. The union of $\Omega_i$ forms $\Omega$, i.e. the subsets represent a spatial decomposition of the system. For immiscible flow through porous media, three subsets are sufficient: $\Omega_w$ corresponds to the part of space occupied by the wetting fluid, $\Omega_n$ to the non-wetting fluid and $\Omega_s$ to the solid, such that $\Omega = \Omega_s \cup \Omega_w \cup \Omega_n$. It is important to note that the structure of any subset will not be independent from the others. Measures of the system behavior that are dependent on the structure of subsets must obey additional constraints that do apply to the global system. It is not trivial to formulate the geometric constraints, since any subset $\Omega_i$ can undergo discontinuous transformations \cite{geometric_state_euler_2020}. It is therefore advantageous to begin from a global perspective, where no discontinuous transitions are possible, and only later segregate averaged terms based on the spatial structure of the system. Furthermore, averaging in both time and space provides a mechanism to smooth discontinuities that arise due to geometric evolution. This is necessary based on the fact that recent experiments demonstrate that topological structure of fluids can change during steady-state flow \cite{spurin2019intermittent}. We now consider the development of a scale-dependent expression based on integration in both time and space, consistent with previous developments \cite{mcclure2021thermodynamics,mcclure2020capillary}.
We begin from basic conservation principles for mass, momentum and energy. Furthermore,
we rely on the following principle of scale consistency: the basic meaning for additive (i.e. extensive) quantities must not be altered based on scale transformation. Quantities such as mass, momentum, and energy have precise definitions and are always integrable. Scale transformations that alter the meaning of these fundamental quantities should be considered to be invalid. Furthermore, forces must also be additive to maintain scale consistency with respect to Newton's second law of motion. This imposes a constraint on how to define the stress tensor across scales based on integration. Provided that scale consistency is observed, the transport coefficients will properly encode the rate of dissipation; the particular values for transport coefficients may depend on the scale of observation.
Consider a thermodynamic system of $\mathcal{N}$ components such that the internal energy of the microscopic thermodynamic system is given at equilibrium by $U(S,N_k)$,
where $S$ is the entropy and $N_k$ is the number of molecules for component
$k=1,\ldots,\mathcal{N}$. The Gibb's equation is determined from Euler's homogeneous function
theorem \cite{JONGSCHAAP20015},
\begin{equation}
U = TS + \mu_k N_k \;.
\label{eq:Gibbs}
\end{equation}
The intensive thermodynamic conjugate variables are defined as
\begin{equation}
T = \Big(\frac{\partial U}{\partial S}\Big)_{N_k}\;, \quad
{\mu}_k = \Big(\frac{\partial U}{\partial N_k}\Big)_{S,N_j \neq i}\;.
\end{equation}
In a spatially heterogeneous system, the chemical potentials $\mu_k$ can vary
within the system, for example due to the surface excess potential at interfaces.
In many situations, spatial heterogeneity can be treated based on the Gibbs adsorption isotherm,
leading to the forms derived in reference \cite{mcclure2020capillary}.
The microscopic contribution to equilibrium internal energy is due to the rate of energy
accumulation based on internal stresses, e.g. due to capillary stresses
\cite{PhysRevE.102.033113}. Non-equilibrium effects also arise, and the
energy dynamics due to these effects can include both reversible and irreversible contributions based on the interplay of viscous and capillary forces. For example, a Haines jump will produce a burst in viscous energy dissipation that is accompanied by a reversible increase in surface energy. To disambiguate the reversible and irreversible contributions, the energy dynamics must be considered from a more detailed level, incorporating the thermodynamic description.
In statistical approaches, ergodicity is often assumed to hold explicitly
at large length scales, since the system will then have attractive statistical properties \cite{PhysRevE.95.023116}. We do not make this assumption here.
Instead, we obtain a larger scale representation by directly integrating the
system dynamics in both time and space, assuming ergodicity will hold
only at sufficiently small length scales. As in previous development \cite{mcclure2021thermodynamics}, we introduce the ergodic volume $\mathcal{V}$ as the region of space where local equilibrium can be assumed. At any scale larger than $\mathcal{V}$, we do not assume that an ensemble average is equivalent to a temporal or spatial average.
Due the fact that the mean-squared distance associated with mass diffusion scales linearly with time, mixing will occur rapidly for sufficiently small $\mathcal{V}$, but can occur very slowly based on the volume of the larger system, $V > \mathcal{V}$.
The effect at larger scales is clear from considering the timescale for fast pore-scale events such as Haines jumps, because that these events move mass faster than the energy micro-states can mix based on the diffusive timescale \cite{mcclure2020capillary}.
At the small scale of $\mathcal{V}$ we assert that any deviation from equilibrium are locally linear such that quasi-ergodic conditions apply. We can therefore define quantities on a per-unit-volume basis using $\mathcal{V}$ to define the size of a local reference volume. For example, the mass density for component $k$ and total mass density are given by
\begin{equation}
\rho_k = \frac{m_k N_k}{\mathcal{V}}\;, \quad \rho = \sum_k \rho_k
\end{equation}
where $m_k$ is the mass for a molecule of type $k$, and $N_k$ is the number of molecules
contained within a spherical reference volume of size $\mathcal{V}$. The number of
molecules $N_k$ may vary in both space and time, but $\mathcal{V}$ is independent of
both time and space.
Away from equilibrium, the system must obey the general expression for conservation of energy,
which is derived from standard conservation principles,
\begin{equation}
\frac{\partial }{\partial t} \frac{U}{\mathcal{V}}
+ \nabla \cdot \Big(\frac{\mathbf{u} U}{\mathcal{V}} \Big)
-\bm{\sigma} : \nabla \mathbf{u} - \nabla \cdot \mathbf{q}_h - {q}_s = 0\;,
\label{eq:energy-i}
\end{equation}
where $\mathbf{u}$ is the rate of mass flux, $\bm{\sigma}$ is the stress tensor, and
$\mathbf{q}_h$ is the heat flux. For immiscible fluid flow, we assume that there are no significant contributions due to chemical reactions, so that body sources for heat can be ignored, ${q}_s=0$. The constant reference volume $\mathcal{V}$ corresponds to a sufficiently small region where the ergodic hypothesis is assumed to hold. This means that deviations from equilibrium should be locally linear across $\mathcal{V}$.
The stress tensor $\bm{\sigma}$ can be decomposed into the mean and deviatoric components,
\begin{equation}
{\bm{\sigma}} = -{p} \bm I + {\bm{\tau}} \;,
\end{equation}
where $p$ is the pressure and $\bm{\tau}$ is the deviatoric stress tensor.
Eq. \ref{eq:energy-i} can be rearranged to find the form
\begin{eqnarray}
\frac{\partial }{\partial t} \frac{U}{\mathcal{V}}
+\nabla \cdot \Big[\mathbf{u} \Big( \frac{U}{\mathcal{V}}+ p \Big)- \mathbf{q}_h\Big]
-\mathbf{u} \cdot \nabla p
-\bm{\tau} : \nabla \mathbf{u} = 0
\label{eq:energy-ii}
\end{eqnarray}
Let $\Lambda$ be a time interval with duration $\lambda$. Conservation of energy for the region as a whole is
given by the integral of \ref{eq:energy-ii},
\begin{eqnarray}
\int_{\Lambda}\int_{\Omega} \Bigg(
\frac{\partial }{\partial t} \frac{U}{\mathcal{V}}
+\nabla \cdot &&\Big[\mathbf{u} \Big( \frac{U}{\mathcal{V}} + p \Big)- \mathbf{q}_h\Big]
- \nonumber \\ && \mathbf{u} \cdot \nabla p
-\bm{\tau} : \nabla \mathbf{u} \Bigg) dV dt = 0
\label{eq:energy-iii}
\end{eqnarray}
To guide the averaging strategy used for Eq. \ref{eq:energy-iii}, we first identify
extensive properties of the system and define averages for each quantity.
Scale-consistent definitions are established to average the non-equilibrium dynamics over a larger region of time and space based upon the time-and-space averaging operator,
\begin{equation}
\big<f\big > \equiv \frac{1}{\lambda \mathcal{V} }\int_{\Lambda} \int_\Omega fdVdt\;.
\end{equation}
Note that this definition is distinct from an ensemble average, since it
is fully deterministic and accounts for the complete path of the system over
the regions of space $\Omega$ and time $\Lambda$.
The extensive thermodynamic quantities from Eq. \ref{eq:Gibbs} are $U$, $S$ and $N_k$.
Since these quantities are additive,
\begin{equation}
\bar{U} \equiv \big< U\big>\;, \quad
\bar{S} \equiv \big< S\big>\;, \quad
\bar{N_k} \equiv \big< N_k\big>\;.
\end{equation}
The intensive thermodynamic quantities are then defined
\begin{equation}
\bar{T} \equiv \frac{\big< T S\big>}{\bar{S}}\;, \quad
\bar{\mu_k} \equiv \frac{\big< \mu_k N_k\big>}{\bar{N_k}}\;.
\end{equation}
The total mass and total momentum are also additive, and are necessarily
defined as
\begin{eqnarray}
\bar{M} &=& \big< m_k N_k \big>
\label{eq:mass-total}
\\
\bar{\mathbf{j}}_M &=& \big< m_k N_k \mathbf{u} \big>
\label{eq:mass-flux-total}
\end{eqnarray}
where $m_k$ is the mass of molecule of type $k$.
The average velocity corresponds to the rate of mass flux, which is given by the ratio
\begin{equation}
\bar{\mathbf{u}} = \frac{\bar{\mathbf{j}}_M}{\bar{M}} \;.
\label{eq:mass-flux-average}
\end{equation}
Since volume is an additive measure, the definition of volume fraction for any entity
must be scale consistent. Note that while the domain $\Omega$ is independent of time, the sub-region occupied by either fluid $\Omega_i$ for $i\in \{w,n\}$ may be time dependent.
The time-averaged saturation and porosity are given by
\begin{equation}
\bar{s}_i = \frac{1}{\bar{\phi} \lambda V} \int_{\Lambda}\int_{\Omega_i} \;dV dt \;, \quad
\bar{\phi} = \sum_{i\in\{w,n\}} \frac{1}{\lambda V} \int_{\Lambda}\int_{\Omega_i} \;dV dt \;.
\end{equation}
Finally, noting that forces are additive, the average pressure should be obtained
as an integral of the microscopic pressure field. If some sub-region of $\Omega$ is
occupied by solid, then the pressure should be weighted based on the
porosity $\bar{\phi}$ to correspond with the region of space occupied by fluids.
The average pressure is therefore given by
\begin{eqnarray}
\bar{p} = \frac{1}{\bar{\phi} \lambda V} \int_{\Lambda} \int_{\Omega} p \; dV dt \;,
\label{eq:pressure-definition}
\end{eqnarray}
where $V$ is the volume of $\Omega$.
Based on these definitions, we now proceed to express Eq. \ref{eq:energy-iii} in terms
of these quantities. A simplified form will be obtained when the energy dynamics are
stationary over the timescale associated with $\Lambda$. First we consider the energy
inputs and outputs, which are boundary fluxes of heat, work and internal energy.
These fluxes are easily identified by applying the Gauss divergence theorem,
\begin{equation}
\int_{\Omega}
\nabla \cdot \Big[\mathbf{u}\Big( \frac{U}{\mathcal{V}} + p\Big)
- \mathbf{q}_h \Big]dV =
\int_{\Gamma}
\Big[\mathbf{u} \Big( \frac{U}{\mathcal{V}} + p \Big) - \mathbf{q}_h \Big]\cdot \bm{dA} \;,
\label{eq:energy-input}
\end{equation}
where the vector-valued surface element $\bm{dA}$ is a normal vector that points outward from the
boundary surface $\Gamma$.
For a stationary process the energy inputs must be zero, since otherwise there will be a net accumulation of energy within the system. The first constraint on stationary conditions is therefore
associated with the energy inputs,
\begin{equation}
\int_{\Lambda} \int_{\Gamma}
\Big[\mathbf{u} \Big( \frac{U}{\mathcal{V}} + p \Big) - \mathbf{q}_h \Big]\cdot \bm{dA} dt = 0\;.
\label{eq:stationary-constraint-i}
\end{equation}
The time interval $\Lambda$ must be sufficiently large that any fluctuations to the energy
inputs will cancel.
The internal work due to the pressure gradient can be formally averaged to obtain
an averaged expression in terms of $\bar{\mathbf{u}}$ and $\bar{p}$,
\begin{eqnarray}
\int_{\Lambda}\int_{\Omega} \mathbf{u} \cdot \nabla p \;dV dt
&=& \int_{\Lambda}\int_{\Omega} \big(\bar{\mathbf{u}} + \mathbf{u}^\prime \big) \cdot \nabla p\;dV dt \; \nonumber \\
&=& \bar{\mathbf{u}} \cdot \nabla \int_{\Lambda}\int_{\Omega} p \; dV dt
+ \int_{\Lambda}\int_{\Omega} \mathbf{u}^\prime \cdot \nabla p \; dV dt \; \nonumber \\
&=& \lambda V \; \bar{\mathbf{u}} \cdot \nabla \big( \bar{\phi} \bar p \big)
+ \int_{\Lambda}\int_{\Omega} \mathbf{u}^\prime \cdot \nabla p \; dV dt.
\label{eq:energy-iv-lhs-average-i}
\end{eqnarray}
The velocity deviation is defined as $\mathbf{u}^\prime = {\mathbf{u}} - \bar{\mathbf{u}}$,
which will vary in time and space based on the pore structure and any dynamic changes
to the flow field \cite{PhysRevE.102.033113}.
The internal energy dynamics are averaged as previously described
\cite{mcclure2020capillary,mcclure2021thermodynamics},
\begin{eqnarray}
\frac{1}{\lambda \mathcal{V}} \int_{\Lambda}\int_{\Omega} \frac{\partial U}{\partial t} dV dt
&=& \bar{T} \frac{\partial \bar{S} }{\partial t}
+ \bar{\mu_k} \frac{\partial \bar{N}_k }{\partial t}
\nonumber \\ &&
-\Big< S \frac{\partial T^\prime}{\partial t} \Big>
-\Big< N_k \frac{\partial \mu_k^\prime}{\partial t} \Big> \;.
\label{eq:thermodynamics}
\end{eqnarray}
Deviation terms are defined based on the difference between the local value for intensive thermodynamic
properties with their time-and-space averaged values,
\begin{equation}
T^\prime = T - \bar{T}\;, \quad
\mu_k^\prime = \mu_k - \bar{\mu}_k\;.
\label{eq:intensive-deviation}
\end{equation}
Stationary conditions further require that there be no change to extensive thermodynamic state variables,
\begin{equation}
\frac{\partial \bar{S} }{\partial t} = 0\;, \quad
\frac{\partial \bar{N}_k }{\partial t} = 0\;.
\label{eq:stationary-constraint-ii}
\end{equation}
Note that the average entropy $\bar{S}$ should be constant within the sample
based on this constraint. The implication is that any entropy produced due to irreversible events is removed based on the heat flux $\nabla \cdot \mathbf{q}_h$.
This is captured based on the first constraint stated in Eq. \ref{eq:stationary-constraint-i}.
Combining Eqs. \ref{eq:energy-iv-lhs-average-i} and \ref{eq:thermodynamics},
along with the constraints for stationary dynamics given in Eqs. \ref{eq:stationary-constraint-i}
and \ref{eq:stationary-constraint-ii} and rearranging terms, we can obtain
a form where the viscous energy dissipation is linked to a flux-force product,
\begin{eqnarray}
-\bar{\mathbf{u}} \cdot \nabla \big( \bar{\phi} \bar{p} \big)
= \frac{1}{\lambda V}\int_{\Lambda}\int_{\Omega}
\bm{\tau} : \nabla \mathbf{u}\;
dV dt
\label{eq:energy-v}
\end{eqnarray}
This form is obtained only in the situation where the work due to the fluctuation
terms cancels
\begin{eqnarray}
\frac{1}{\lambda V}\int_{\Lambda}\int_{\Omega}
\Bigg(
\mathbf{u}^\prime\cdot \nabla p
+ \frac{S}{\mathcal{V}} \frac{\partial T^\prime}{\partial t}
+ \frac{N_k}{\mathcal{V}}\frac{\partial \mu_k^\prime}{\partial t}
\Bigg) dV dt = 0 \;.
\label{eq:fluctuation}
\end{eqnarray}
This equation implies that there must be no net work done due to fluctuations in the pressure and chemical potential when considered over the time interval $\Lambda$. Eq. \ref{eq:fluctuation}
can be considered as an alternative expression for Onsager's assumption of molecular reversibility
effectively stating a criterion for detailed balance in the system based purely on classical thermodynamic concepts.
The advantage of this form is that it is straightforward to study from the perspective of either mesoscopic or continuum scale simulation techniques. Fluctuations associated with heterogeneity related to intensive thermodynamic properties are in equilibrium when no net work is performed due to their effects. Note that this is a less scrict criterion as compared to detailed balance, which would imply statistical indistinguishability. Based on these results, conditions for the validity of Onsager theory
can be established based for systems that may be non-ergodic when considered at the timescale
where measurements are taken. An alternative interpretation is that the finite time interval
$\Lambda$ can also be considered to define the length of time needed for the system to behave
as an ergodic system, which can be evaluated quantitatively based on
Eqs. \ref{eq:stationary-constraint-i}, \ref{eq:stationary-constraint-ii} and \ref{eq:fluctuation}. In the Results section we will evaluate Eq. \ref{eq:fluctuation} directly based on simulations of immiscible displacement through porous media.
\subsection{Darcy's Law (Single phase)}
The previous result can be immediately applied to derive Darcy's law. The right-hand side of Eq. \ref{eq:energy-v} accounts for the heat generated due to viscous dissipation. Considering a Newtonian fluid with constant viscosity $\mu$,
\begin{equation}
\int_{\Lambda}\int_{\Omega}
\bm{\tau} : \nabla \mathbf{u}\; dV dt =
\mu \int_{\Lambda} \int_{\Omega}
\mathbf{E} : \nabla \mathbf{u}\; dV dt
\label{eq:Darcy-viscosity}
\end{equation}
where the strain rate tensor is
$\mathbf{E} = \frac{1}{2}\big[ \nabla\mathbf{u}
+ \big(\nabla\mathbf{u} \big)^T \big]$. Note that $\mu$
can only be taken outside of the integral if it is constant
over the region of space and time specified by $\Omega$ and $\Lambda$.
This assumption will fail in a system with compositional heterogeneity,
and also in situations where the stress depends non-linearly on the
strain rate tensor.
To derive Darcy's law, we use the fact that the
positive heat is generated due to viscous dissipation, leading to an inequality
\begin{eqnarray}
-\bar{\mathbf{u}} \cdot \frac{\nabla \big( \bar{\phi} \bar{p} \big)}{\mu}
\ge 0
\label{eq:darcy-i}
\end{eqnarray}
As the driving force $\nabla ( \bar{\phi} \bar{p}) $ goes to zero
the corresponding flux $\bar{\mathbf{u}}$ will go to zero also;
any stationary fluctuations must obey Eq. \ref{eq:fluctuation}
due to conservation of energy in the system. This tells us the timescale
required to homogenize the system dynamics. For sufficiently small driving
forces, causality leads us to approximate the flux based on a linear expansion in terms of the driving force
\begin{eqnarray}
\bar{\mathbf{u}} = -\frac{\mathbf{\mathsf{L}}}{\mu} \cdot
\nabla \big( \bar{\phi} \bar{p} \big)
\label{eq:darcy-ii}
\end{eqnarray}
where the tensor $\mathbf{\mathsf{L}}$ contains linear
phenomenological coefficients, consistent both with the approach of Onsager
as well as results obtained using volume-averaging techniques \cite{Whitaker_Darcy_1986}. The phenomenological coefficient tensor is related
to the absolute permeability tensor for the material,
\cite{doi:10.1021/es049728w,GRAY20061745}
\begin{equation}
\mathbf{\mathsf{K}} = \bar{\phi}^2 \mathbf{\mathsf{L}} \;.
\end{equation}
For a system with homogeneous porosity, Darcy's law is obtained in the standard
form
\begin{equation}
\bar{\mathbf{q}} = -\frac{\mathbf{\mathsf{K}}}{\mu} \cdot
\nabla \bar{p} \;,
\label{eq:darcy-standard}
\end{equation}
where the flux $\bar{\mathbf{q}} = \bar{\phi}\bar{\mathbf{u}}$.
For a Stokes flow, the velocity field depends only on the geometry, and $\mathbf{\mathsf{K}}$ is directly determined
from this based on the right-hand side of Eq. \ref{eq:Darcy-viscosity}.
Since the Stokes solution does not depend on time, there is no advantage to
time-and-space averaging to derive the single phase Darcy's law.
We expect that a single fluid flow will satisfy macroscopic ergodic
requirements. However, this breaks down in immiscible displacement,
due to slow fluctuations that are caused by pore-scale events \cite{rucker2021,mcclure2020capillary}.
While the form of Eqs. \ref{eq:energy-v} and
\ref{eq:fluctuation} remains valid for two-fluid systems, the viscosity cannot be treated as in Eq. \ref{eq:Darcy-viscosity}, and the permeability
will consequently depend on the spatial arrangement of fluids.
Even in cases where the viscosity varies in space and time, this does not present a significant difficulty to derive Eq. \ref{eq:darcy-ii}; an
inequality as given in Eq. \ref{eq:darcy-i} can still be obtained
since $\mu>0$. However, the effective permeability will depend on
both the spatial and temporal structure of the fluid flow field, and
the thermodynamic driving forces must be considered carefully.
\subsection{Multiphase extension of Darcy's law}
The standard conceptual model for the relative permeability considers the situation where two
fluids flow simultaneously through a porous medium through separate flow pathways.
Emerging models also consider the situation where fluid pathways rearrange dynamically.
Our model accounts for both possibilities, since any dynamics will be captured explicitly
based on the time average. To account for the flow rate of each fluid component,
it is necessary to represent the mass flux separately for each fluid.
To obtain Eq. \ref{eq:Darcy}, flow behavior must be associated with each fluid, which is
accomplished by applying a subset operation to sub-divide the integrals given in Eqs.
\ref{eq:mass-total} -- \ref{eq:mass-flux-average}. The sub-setting operation is applied to affiliate the mass and momentum with a particular phase based on the location of the Gibb's dividing surface within the microscopic system \cite{adamson97}.
Since the flow rate is determined based on an integral over the spatial region
$\Omega$, Eq. \ref{eq:mass-flux-total} be decomposed into components associated with the part of space
occupied by water $\Omega_w$ and the part of space occupied by the non-wetting fluid $\Omega_n$
\begin{eqnarray}
\bar{M} \bar{\mathbf{u}} &=& \bar{M}_w \bar{\mathbf{u}}_w + \bar{M}_n \bar{\mathbf{u}}_n \\
\bar{M}_i &=& \frac{1}{\lambda} \int_{\Lambda}\int_{\Omega_i} \rho \;dV dt \\
\bar{M}_i \bar{\mathbf{u}}_i &=& \frac{1}{\lambda} \int_{\Lambda}\int_{\Omega_i} \rho \mathbf{u} \;dV dt
\end{eqnarray}
Defining the mass fraction as $\bar{\omega}_i = \bar{M}_i / \bar{M} $ and
inserting these definitions into Eq. \ref{eq:energy-v}, we obtain
\begin{equation}
-\big[{ \bar{\omega}_w \bar{\mathbf{u}}_w + \bar{\omega}_n \bar{\mathbf{u}}_n } \big]
\cdot \nabla \big(\bar{\phi} \bar{p}\big)
= \frac{1}{\lambda V} \int_{\Lambda}\int_{\Omega}
\bm{\tau} : \nabla \mathbf{u}\;dV dt \;.
\label{eq:energy-vi}
\end{equation}
Since the right-hand side is positive,
\begin{equation}
-\big[{ \bar{\omega}_w \bar{\mathbf{u}}_w + \bar{\omega}_n \bar{\mathbf{u}}_n } \big]
\cdot \nabla \big(\bar{\phi} \bar{p}\big)
\ge 0 \;.
\label{eq:2phase-inequality}
\end{equation}
Note that because the two
fluxes ${\omega}_i \bar{\mathbf{u}}_i$ have the same driving force, they cannot be treated independently.
Nevertheless, since the driving force causes a corresponding response for each flux,
\begin{equation}
{\omega}_i \bar{\mathbf{u}}_i
= - \frac{ \mathbf{\mathsf{L}}_i}{\mu_i} \cdot
\nabla \big( \bar{\phi} \bar{p} \big) \;,
\label{eq:darcy-iii}
\end{equation}
where $ \mathbf{\mathsf{L}}_i$ is a phenomenological coefficient tensor for fluid
$i\in\{w,n\}$. The choice to normalize the coefficient based on the
viscosity $\mu_i$ is strictly conventional, i.e. to be consistent with the
expectation that $ \mathbf{\mathsf{k}}_i \rightarrow \mathbf{\mathsf{K}}$ as ${\omega}_i \rightarrow 1$. Note that $ \mathbf{\mathsf{L}}_i$ is not necessarily symmetric and positive definite,
since the constraint due to Eq. \ref{eq:2phase-inequality} applies only to their sum,
\begin{equation}
\sum_{i=w,n}
\mathbf{\mathsf{L}}_i \big[ \nabla \big( \bar{\phi} \bar{p} \big)\big]^2\ge 0 \;.
\label{eq:effperm-constraint}
\end{equation}
If the fluids are perfectly immiscible and incompressible
then the mass fraction will simply track the fluid volume fraction based on the saturation
$\bar{s}_i$ and porosity $\bar{\phi}$,
\begin{equation}
\bar{s}_i \approx \omega_i \;, \quad
\bar{\mathbf{q}}_i \approx \bar{\phi} \bar{s}_i \bar{\mathbf{u}}_i
\end{equation}
where $\bar{\mathbf{q}}_i$ is the Darcy flux for fluid $i$.
This expression is written as an approximation to account for compressible fluids since the mass flux does not necessarily coincide with the volumetric rate. The conventional relative permeability is defined such that
\begin{equation}
\mathbf{\mathsf{L}}_i = k^r_i \mathbf{\mathsf{K}} \;,
\end{equation}
which will be satisfied in an isotropic material with constant porosity,
in which case Eq. \ref{eq:Darcy} can be recovered.
To obtain the conventional relative permeability relationship, the driving force must be the total pressure gradient and not the pressure gradient within a particular fluid.
Many previous theoretical efforts have developed cross-coupling forms to describe
two-fluid flow in porous media \cite{whitaker1986flowb}. These forms present a significant
practical challenge, since additional coefficients are needed to close the resulting
system of equations. An advantage of Eq. \ref{eq:Darcy} is that there fewer unknown coefficients are required and standard
experimental approaches can be applied to make inferences about the transport behavior.
We show that cross-coupling coefficients are unnecessary if the driving force is chosen
as described above, contingent on the average pressure taking the definition given in
Eq. \ref{eq:pressure-definition}. We note that a cross-coupling form will be obtained if the pressure gradients
are expanded as sums over each fluid using Eq. \ref{eq:subset}
\begin{equation}
\nabla \big(\bar{\phi} \bar p\big)
= \nabla \big(\bar{\phi} \bar{s}_w \bar{p}_w\big)+ \nabla \big(\bar{\phi} \bar{s}_n \bar{p}_n\big) \;.
\label{eq:force-X-couple}
\end{equation}
At a basic level cross-coupling forms are a consequence of a choice to separately represent the driving
forces based on the pressures for each fluid.
Defining the driving forces according to Eq. \ref{eq:force-X-couple} will lead to
cross-coupling forms. In this case, the total pressure gradient includes contributions from both fluids, each weighted by their respective volume fraction.
\begin{figure*
\centering
\includegraphics[width=1.0\linewidth]{Fig1-relperm.png}
\caption{
Simulation results showing the instantaneously measured relative permeability coefficients
as a function of simulation time based on water flooding in an oil-wet flow condition (drainage).
(a) fluctuations are observed across all flow conditions due the transient response of the volumetric flow rate in response to pore-scale events; (b) the connected pathway Euler characteristic is demonstrated to vary significantly during flow at fixed saturation, indicating that structural changes to fluid connected pathways are relatively common. }
\label{fig:relperm}
\end{figure*}
\section{Model Validation}
Steady-state simulations of immiscible fluid flow were performed using lattice Boltzmann method based on the color simulator in the LBPM software package \cite{mcclure2021lbpm}. A Bentheimer sandstone
was used as the basis for simulations, collected at $1.66$ $\mu$m resolution \cite{Dalton_2019}.
Simulations were initialized from a $1.494\mbox{ mm}\times1.494\mbox{ mm}\times2.656\mbox{ mm}$ sub-region of the original image with porosity $0.235$ and permeability $1850$ mD, for which steady-state fluid configurations had been generated previously \cite{Li_2020}. This was done to ensure that the maximum number of simulation timesteps were performed at steady state. Simulations were performed for both oil-wet and water-wet conditions to verify that the derived fluctuation criterion were met under a variety of flow conditions. Each simulation required approximately 10 hours of walltime using $72$ NVIDIA V100 GPU, and were performed using the Summit supercomputer. The capillary number for the displacement was $1\times 10^{-5}$.
Instantaneously measured values for the relative permeability are reported in Figure \ref{fig:relperm}a. The instantaneous relative permeability can be considered as a time average where $\Lambda$ takes the value of a single simulation timestep, and the measured values fluctuate due to non-ergodicity.
In this case, non-ergodicity is a consequence of the fact that the timescale required
for thermal information to propagate across $\Omega$ (i.e. thermal mixing) is longer than the timescale for $\Lambda$. The fluctuations can be removed if the energy dynamics are homogenized over a longer timescale. The flow behavior associated with Figure
\ref{fig:relperm} corresponds to a water-flooding process in a moderately oil-wet system, which can be considered as a drainage process, since water is the non-wetting fluid. Due to the contribution of Haines jumps during drainage, fluctuations to the fluid pressure signal are somewhat larger as compared to an imbibition process. Steady-state simulations are performed for four different saturation values, each showing the contribution of fluctuations with a clear plateau to indicate that stationary dynamics should be obtained if a sufficiently long timescale is considered.
\begin{figure*
\centering
\includegraphics[width=1.0\linewidth]{Fig2-Euler-oilwet.png}
\includegraphics[width=1.0\linewidth]{Fig2-Euler-waterwet.png}
\caption{Euler characteristic for the connected pathway extracted from the water and
oil regions based on simulation cases shown in Figure \ref{fig:relperm}. The density
corresponds to the residence time associated with a particular connectivity state in the system. The dashed
line corresponds to the time-average value of the Euler characteristic. Transitions between these states will cause corresponding fluctuations to the energy modes.
}
\label{fig:intermittent}
\end{figure*}
The effects of intermittent connectivity can be assessed based on the Euler characteristic, which can be used to ascertain the topology of fluids within the system. The Euler characteristic for each fluid region $i$ is
\begin{equation}
\chi_{i} = \mathbb{N}_{i} - \mathbb{L}_{i} + \mathbb{C}_{i}\;,
\end{equation}
where $\mathbb{N}_{i}$ is the number of connected components,
$\mathbb{L}_{i}$ is the number of loops, and $\mathbb{C}_{i}$ is the number of cavities.
As long as there are no free solid particles such that a single connected solid structure
is formed along the grain contacts, cavities within fluid $n$ will be due to the connected components of fluid $w$, and vice versa. Figure \ref{fig:relperm}b shows that there are significant changes to connected pathway Euler characteristic for both fluids, which are most notable as the volume fraction for water increases and displaces oil from the primary flow pathways within the system. For each
flow condition the fluid saturation is constant due to the periodic boundary condition used in the
simulation protocol (see \cite{mcclure2021lbpm} for a detailed description of the numerical implementation). This evidence suggests that intermittent connectivity is common during typical flow experiments, even those performed at low capillary numbers.
\begin{figure*
\centering
\includegraphics[width=1.0\linewidth]{Fig3-stationary-vs-nonstationary.png}
\caption{
Contribution of all energy fluctuation terms for stationary and non-stationary displacements.
For the stationary case (left), the net contribution due to work based on the sum of all fluctuations is
effectively zero. For the non-stationary case (right), the net work due to velocity deviation
is significant compared with the rate of dissipation in the system.
}
\label{fig:fluctuations}
\end{figure*}
Previous studies have demonstrated that fluid flow through permeable media can occur at intermittent flow pathways, where fluids can be periodically disconnected and reconnected through the snap-off and reconnection events \cite{reynolds2017pnas,spurin2019intermittent}. The continuous rearrangement of fluid interfaces at steady-state leads to a fluctuating rate of energy dissipation. In this study, we demonstrate that the fluctuations based on the internal energy dynamics of the system in a stationary process will be averaged out and the net energy contribution to the system cancels due to the conservation of energy. The range of connectivity states explored within
each of the eight simulation cases is presented in Figure \ref{fig:intermittent}. The density
corresponds to the fraction of time that the system spends in each connectivity state. In
many cases, multiple peaks are observed, suggesting that the fluid
connectivity is frequently toggling between several different states and that particular
fluid structures are often unstable with respect to small disruptions in the flow behavior.
By constructing the relative permeability based on averaging in both time and space, these various contributions can be incorporated into a single measurement based on the residence time that the system spends in each particular connectivity state.
The role of capillary events and intermittent connectivity can be further considered based on their impact on non-equilibrium fluctuations.
Based on the arguments presented previously, stationary conditions should ensure satisfaction of the constraints given by Eqs.~\ref{eq:stationary-constraint-i} and \ref{eq:stationary-constraint-ii}. Because the simulation domain is fully periodic, there is no net change in the energy due to boundary fluxes, and Eq.~\ref{eq:stationary-constraint-i}
will be satisfied. Since the lattice Boltzmann method is isothermal, the energy fluctuation due to temperature heterogeneity is identically zero,
\begin{equation}
\Big< S \frac{\partial T^\prime}{\partial t} \Big> = 0\;.
\end{equation}
Subject to this restriction, for immiscible fluid flow through porous media, the stationary constraint given in Eq.~\ref{eq:fluctuation} can be expressed in the alternative form (see McClure et al. for complete details \cite{mcclure2020capillary})
\begin{equation}
\Big<\mathbf{u}^\prime\cdot \nabla p + {\frac{A_s}{V} \left( \frac{\partial \gamma_s^\prime }{\partial t} - h_s \frac{\partial \Pi_s^\prime }{\partial t} \right) } - \phi_w \frac{\partial p_w^\prime }{\partial t} - \phi_n \frac{\partial p_n^\prime }{\partial t} \Big> = 0
\label{eq:2phase-darcy-fluctuation}
\end{equation}
where $p_i$ is fluid pressure for $i \in \{w, n\} $, $\gamma_s$ is fluid-solid surface energy along the solid material, and $\Pi_s $ is disjoining pressure, $\phi_i$ is fluid volume fraction for $i \in \{w, n\} $, $A_s$ is surface area for the solid material, and $h_s$ is the film thickness along the solid material. This form is obtained when the internal energy is presumed to depend on an alternate set of extensive
variables based on position of the Gibbs dividing surface in the system. The two representations are necessarily equivalent.
Within the simulation, the wetting energy and fluid pressures are computed directly and are are numerically integrated to obtain averages. Time derivatives for time-and-space averaged quantities are determined as described in Appendix B.
\begin{figure*
\centering
\includegraphics[width=1.0\linewidth]{Fig4-pressure-fluctuation.png}
\caption{
Normalized work due to fluctuations associated with the water pressure.
Net contributions are expected to be more significant in situations where both the pressure and the water volume fraction are changing with time.
}
\label{fig:fluctuations-pw}
\end{figure*}
Defining relative permeability as a stationary process leads to the fluctuation constraint stated in Eq. \ref{eq:2phase-darcy-fluctuation}. If this expression does not hold, then the flow process cannot be considered to be stationary. This distinction is illustrated in Figure \ref{fig:fluctuations-pn},
which shows each contribution to energy fluctuations for $\lambda=100,000$ simulation timesteps. The energy scale is normalized based on the dissipated heat, which is given by Eq. \ref{eq:darcy-i}.
As with typical multiphase flow experiments, the energy associated with the system dynamics is comparable to the overall rate of dissipation in the system. However, the net contribution of
of these effects can be effectively removed in a stationary system, due to cancellation of the contributions over a sufficiently long timescale. A non-stationary result is obtained when
particular aspects of the dynamics occur at a slow timescale, such that net work is performed by
a particular mechanism is non-zero over the time averaging window $\lambda$. In this context the integral in Eq. \ref{eq:2phase-darcy-fluctuation} provides a quantitative assessment of the extent to which a particular process can be considered to be stationary. If the net work done by fluctuation terms
is significant compared to the rate of dissipation in the system, the underlying process should not be considered to be stationary. A relative permeability coefficient determined based on a non-stationary process may be inaccurate due to the fact that it is uncertain whether energy stored in the fluctuation terms will contribute to mass transfer or if this energy will ultimately be dissipated.
Based on simulation data, we can accurately characterize the essential contributions to the
fluctuating energy dynamics. Figures \ref{fig:fluctuations-pw} and \ref{fig:fluctuations-pn} show the distribution of energy fluctuations for the water and oil fluid pressures.
We can observe that pressure fluctuations may be non-Gaussian, multi-modal and asymmetric. At infinitely large timescales, the fluctuations should approach a Gaussian distribution. However, this is not necessarily the case for typical experimental timescales, and significant fluctuations are observed at the timescale to take pressure measurements \cite{mcphee2015core}. For the timescale considered here, non-Gaussian distributions are most likely caused by the pore-scale displacement events associated with transitions between different connectivity states. These fluctuations are the expressions of internal energy exchanges, where capillary energy is converted into kinetic energy, with frequent jumps and topology changes due to the coalescence and snap-off events between fluid clusters. Due to the significant difference in energy fluctuation distributions across the whole system, the changes of energy fluctuation distributions depend on the wetting condition and fluid saturation. The structure of fluctuations is very sensitive to the saturation condition, since the frequency of pore-scale events depends on the pore occupancy. Even though the distributions are not Gaussian, the net contribution to the system energy dynamics is
approximately $4$--$6$ orders of magnitude smaller than the overall rate of energy
dissipation. For the simulations considered here, only very small variations occur for the fluid volume fractions. This is significant because volume is the extensive variable
linked with pressure in the thermodynamic representation. As shown in Appendix A,
the net contribution for an energy fluctuation will be close to zero if the extensive variable is nearly constant with time. However, the more the extensive variable is fluctuating, the greater the fluctuation can contribute to the energy dynamics. This is significant because fluctuations to the fluid volume fraction are much more significant
in an experimental setting \cite{rucker2021}. Experimental evaluation of these terms should therefore be treated as an important priority for further validation of the theory.
\begin{figure*
\centering
\includegraphics[width=1.0\linewidth]{Fig5-pressure-fluctuation.png}
\caption{
Normalized work due to fluctuations associated with the oil pressure.
Net contributions are expected to be more significant in situations where both the pressure and the oil volume fraction are changing with time.
}
\label{fig:fluctuations-pn}
\end{figure*}
\begin{figure*
\centering
\includegraphics[width=1.0\linewidth]{Fig6-wetting-fluctuation.png}
\caption{ Normalized work due to fluctuations associated with solid surface wetting energy. Net contributions will become important when the solid surface area is
changing with time.
}
\label{fig:fluctuations-wetting}
\end{figure*}
Figure \ref{fig:fluctuations-wetting} shows the normalized work associated with fluctuations
in the surface wetting energy. The mechanisms that cause these fluctuations are due to
film swelling and movement of the contact line. The total surface wetting
energy is constructed as an integral that includes surface excess energy due to interactions
that occur over the fluid-solid surface, which has area $A_s$
\cite{mcclure2021lbpm}. Again referring to the calculation in Appendix A, this contribution will
be zero if the solid surface area is constant. Note that this does not mean that energy does not
accumulate at the surface due to the redistribution of fluids; the average surface
tension $\bar{\gamma}_s$ will be altered in such a scenario, such that the associated energy is
accounted for based on $\bar{\gamma}_s A_s$. Surface wetting fluctuation terms will contribute
when $A_s$ is not constant over $\Lambda$.
\begin{figure*
\centering
\includegraphics[width=1.0\linewidth]{Fig7-velocity-fluctuation.png}
\caption{ Normalized work due to mechanical fluctuations in the velocity and pressure.
Net contributions are expected to become important when there are more frequent pore-scale displacement events.
}
\label{fig:fluctuations-velocity}
\end{figure*}
For the simulations considered here, mechanical fluctuations due to $\mathbf{u}^\prime\cdot \nabla p$
are the most significant contribution to the energy dynamics, which are due to pore-scale events.
The distribution for these contributions are depicted in Figure \ref{fig:fluctuations-velocity}.
This term may be understood based on the work of
Berg et al. \cite{PhysRevE.102.033113}. Considering the situation
where the fluids are incompressible, the volume integral can be
treated as a surface integral over the fluid-fluid meniscus $\Gamma_{wn}$
(see Appendix B)
\begin{eqnarray}
\int_{\Lambda} \int_{\Omega}
\nabla \cdot \big(p \mathbf{u}^\prime\big) \; dV dt
&=&
\int_{\Lambda} \int_{\Gamma_{wn}}
\big(p_w - p_n\big) \mathbf{u}^\prime \cdot \mathbf{dA} dt\;.
\label{eq:B-ii}
\end{eqnarray}
In other words, the term accounts for the energy dynamics due to mechanical work performed during rearrangements of the fluid-fluid interfaces. A pore-scale event such as a Haines jump will cause both the local fluid pressure and the flow velocity to fluctuate. If the fluid volume fractions are constant, the timescale for these
surface contributions will tend to be the dominant factor for obtaining stationary
conditions. Since the fluid volume fraction changes based on interface movement,
this term will also contribute significantly in any situation
where fluid volume fractions change.
\section{Conclusions}
In this work we have shown that the standard expression for relative permeability can be derived
from conservation of energy using averaging in both time and space and assuming that the dynamics are stationary. In conventional homogenization
theories, it is generally assumed that the contribution of capillary fluctuations will be negligible at large length scales based on the ergodic hypothesis.
Our approach explicitly considers the timescale needed to obtain stationary conditions for
a particular system, meaning that relative permeability coefficients can be obtained that accurately represent the rate of energy dissipation.
We mathematically define a stationary process as one for which there can be no net
change to extensive measures of the system state when considered over the timescale of the average.
Furthermore, there can be no accumulation of energy based on the rate of work and heat exchange
at the boundary of the system. Due energy conservation, energy fluctuations defined based on classical thermodynamics must also cancel, which is required to observe detailed balance in the macroscopic system. Subject to these constraints, a flux-force form is obtained that can be used to derive the
conventional relative permeability relationship. This derivation shows that the thermodynamic
driving force should be the total pressure (potential) gradient, which is a simple average
over the considered region of time and space. We further show that if the spatial region is
segregated into sub-regions associated with the wetting and non-wetting fluids, cross-coupling forms
become necessary. Previous derivations that have arrived at cross-coupling forms as the general
approximate form for momentum transport are a consequence of this spatial subdivision. Compared with
cross-coupling forms, fewer unknowns are required by the conventional relative permeability, representing a significant practical advantage in terms of measurement. We conclude that there is no
disadvantage to using the conventional relative permeability; provided that the driving force
is appropriately identified the relative permeability coefficients will accurately predict the rate
of energy dissipation in the system.
Results derived in this work do not assume that the flow behavior is ergodic at large length scales.
Instead, ergodicity is assumed at small length scales, and a fluctuation criterion is established
to evaluate the proper scale of a time average. For a stationary process, the contribution of fluctuations can be entirely removed provided that a sufficiently long averaging timescale is used. Using simulation data performed at low capillary number ($\mathsf{Ca}\sim1\times10^5$) for multiple different saturation and
wetting condition, we show that individual fluctuations are not necessarily symmetric or
Gaussian. However, it is sufficient for the sum of the fluctuations to cancel, since this implies
that the associated thermodynamic modes do not perform net work on the system over the timescale
for the average. This timescale is physically linked to the effect of dynamic connectivity, which is assessed based on the Euler characteristic for the connected pathway for each fluid. Our analysis suggests that
typical multiphase flows permute through a variety of connectivity states, each of which
is likely to be unstable. The time average can be thought of as accounting for residence time that
the system spends in each particular connectivity state. Since the Euler characteristic is an observable extensive measure of the system state, we assert that this topological measure should
be included when making a determination as to whether or not flow behavior meets the stationary requirements derived in this work. An important area for future work are
experimental studies that consider how fluctuations to the fluid volume fraction
impact the the internal energy dynamics.
\section*{Acknowledgements}
This research used resources of the Oak Ridge Leadership Computing Facility at the Oak Ridge National Laboratory, which is supported by the Office of Science of the U.S. Department of Energy under Contract No. DE-AC05-00OR22725.
R. T. A. acknowledges Australian Research Council Future Fellowship (FT210100165). The authors would like to thank Signe Kjellstrup, Dick Bedeaux and Dag Chun Stadnes for useful discussions.
|
\section{Introduction}
Consider a finite simple graph $G$ and a finite set of colours $C$. A vertex colouring $f:V(G)\to C$ is \textit{complete} if for any pair $c_1,c_2$ of distinct colours in $C$ one can find a pair $v_1,v_2$ of adjacent vertices in $G$ such that $f(v_i)=c_i$, $i=1,2$. Obviously, if $f$ is proper (adjacent vertices receive distinct colours) and $|C|$ is minimum possible (\textit{i.e.}, $|C|=\chi(G)$, the chromatic number of $G$), then $f$ is necessarily complete.
The \textit{achromatic number} of $G$, in symbols $\achr(G)$, is the \textit{maximum} number of colours in a proper complete vertex colouring of $G$. This invariant was introduced by Harary, Hedetniemi, and Prins in~\cite{HaHePr}. The problem of determining the achromatic number is NP-complete even for trees, see Cairnie and Edwards~\cite{CaE}. So, it is not surprising that exact results concerning the achromatic number are quite rare. A comprehensive bibliography for the achromatic number is maintained by Edwards~\cite{E}.
Some attention was paid to the achromatic number of graphs created by graph operations. Hell and Miller in \cite{HeM} analysed $\achr(G_1\times G_2)$ where $G_1\times G_2$ is the categorical product of graphs $G_1$ and $G_2$ (in the paper we use the notation taken from the monograph Imrich and Klav\v zar~\cite{IK}).
The Cartesian product $G_1\square G_2$ of graphs $G_1$ and $G_2$ is the graph with $V(G_1\square G_2)=V(G_1)\times V(G_2)$, in which $(x_1,y_1)$ is joined by an edge to $(x_2,y_2)$ if and only if either $x_1=x_2$ and $\{y_1,y_2\}\in E(G_2)$ or $\{x_1,x_2\}\in E(G_1)$ and $y_1=y_2$.
A motivation for the study of $\achr(K_p\square K_q)$ comes from the observation by Chiang and Fu~\cite{ChiF1} stating that the assumption $\achr(G_1)=p$ and $\achr(G_2)=q$ implies $\achr(G_1\square G_2)\ge\achr(K_p\square K_q)$.
Evidently, since the graphs $K_p\square K_q$ and $K_q\square K_p$ are isomorphic to each other, when looking for $\achr(K_p\square K_q)$ we may suppose without loss of generality that $p\le q$.
Let $p,q$ be integers. In the paper we work with \textit{integer intervals} that are denoted as follows:
\begin{equation*}
[p,q]=\{z\in\mathbb Z:p\le z\le q\},\qquad[p,\infty)=\{z\in\mathbb Z:p\le z\}.
\end{equation*}
For a finite set $A$ and $k\in[0,|A|]$ the set $\binom Ak$ consists of all $k$-element subsets of $A$.
The element in the $i$th row and the $j$th column of a matrix $M$ is presented as $(M)_{i,j}$. The submatrix of $M$ corresponding to the $i$th row of $M$ is denoted by $R_i(M)$.
The value of $\achr(K_p\square K_q)$ is known for each pair $(p,q)$ satisfying $1\le p\le6$ and $p\le q$. Besides the trivial case $p=1$ ($K_1\square K_q$ is isomorphic to $K_q$, hence $\achr(K_1\square K_q)=q$), the case $p\in\{2,3,4\}$ was settled by Hor\v n\'ak and Puntig\'an~\cite{HoPu} (for $p\in\{2,3\}$ the result was rediscovered in~\cite{ChiF1}), the case $p=5$ by Hor\v n\'ak and P\v cola~\cite{HoPc1}, \cite{HoPc2}, and the case $p=6$ by Hor\v n\'ak~\cite{Ho3}, \cite{Ho1}, \cite{Ho2}. The achromatic number of $K_p\square K_q$, where $r$ is an odd order of a finite projective plane, was determined in Chiang and Fu~\cite{ChiF2} (for $r=3$ see already Bouchet~\cite{B}). Some values of $\achr(K_p\square K_q)$ with $p\le6$ will be used in Section~\ref{asan}. They are summarised here:
\begin{theorem}\label{known}
$1.$ If $q\in[3,\infty)$, then $\achr(K_2\square K_q)=q+1$.
$2.$ If $q\in[4,\infty)$, then $\achr(K_3\square K_q)=\left\lfloor\frac{3q}2\right\rfloor$.
$3.$ If $q\in[25,\infty)$, then $\achr(K_4\square K_q)=\left\lfloor\frac{5q}3\right\rfloor$.
$4.$ If $q\in[43,\infty)$, then $\achr(K_5\square K_q)=\left\lfloor\frac{9q}5\right\rfloor$.
$5.$ If $q\in[41,\infty)$ and $q\equiv1\pmod2$, then $\achr(K_6\square K_q)=2q+3$.
$6.$ If $q\in[42,\infty)$ and $q\equiv0\pmod2$, then $\achr(K_6\square K_q)=2q+4$.
\end{theorem}
What follows is (up to the notation) a natural and somehow standard (\textit{cf.}~\cite{HoPu}) approach to dealing with a proper complete vertex colouring of the Cartesian product of two complete graphs.
Suppose that $p,q\in[1,\infty)$, $V(K_s)=[1,s]$ for $s\in\{p\}\cup\{q\}$, $C$ is a finite set and $f:V(K_p\square K_q)\to C$ is a proper complete vertex colouring. Let $M(f)$ be the $p\times q$ matrix with $(M(f))_{i,j}=f(i,j)$. The fact that $f$ is proper means that each row of $M(f)$ consists of $q$ distinct colours of $C$, and similarly each column of $M(f)$ consists of $p$ distinct colours of $C$. Because of the completeness of $f$ for any $\{c_1,c_2\}\in\binom C2$ there is a line (a row or a column) of $M(f)$ that contains both $c_1$ and $c_2$. Let $\cM(p,q,C)$ be the set of all $p\times q$ matrices $M$ with elements from $C$ such that $M$ has all above properties of the matrix $M(f)$.
Conversely, let $M\in\cM(p,q,C)$. It is obvious to see that the colouring $f_M:V(K_p\square K_q)\to C$ defined by $f_M(i,j)=(M)_{i,j}$ is a proper complete vertex colouring of the graph $K_p\square K_q$. Thus, we have just proved
\begin{proposition}\label{mat}
If $p,q\in[1,\infty)$ and $C$ is a finite set, then the following statements are equivalent:
$1.$ There is a proper complete vertex colouring of the graph $K_p\square K_q$ using as colours elements of $C$.
$2.$ $\cM(p,q,C)\ne\emptyset$.
\end{proposition}
We shall need a subset $\cM^*(p,q,C)$ of $\cM(p,q,C)$ consisting of matrices $M$, which satisfy the additional condition that for any $\{c_1,c_2\}\in\binom C2$ there is a row (not merely a line) of $M$ with both $c_1,c_2$.
Let $r\in[2,\infty)$. A \textit{finite projective plane of order $r$} is a pair $(P,\cL)$, where $P$ is a finite set of elements called \textit{points}, and $\cL$ is a set of subsets of $P$ called \textit{lines}, such that the following axioms are fulfilled:
\vskip1mm
$A_1.$ If $p_1,p_2\in P$, $p_1\ne p_2$, there is exactly one line $L(p_1,p_2)\in\cL$ such that $\{p_1,p_2\}\subseteq L(p_1,p_2)$.
$A_2.$ If $L_1,L_2\in\cL$, $L_1\ne L_2$, then $P_1\cap P_2\ne\emptyset$.
$A_3.$ There are four distinct points $\tilde p_1,\tilde p_2,\tilde p_3,\tilde p_4\in P$ determining six distinct lines, \textit{i.e.,} $|\bigcup_{\{i,j\}\in\binom{[1,4]}{2}}\{L(\tilde p_i,\tilde p_j)\}|=6$.
$A_4.$ There is $\tilde L\in\cL$ such that $|\tilde L|=r+1$.
\vskip1mm
\noindent It is well known that points and lines of a finite projective plane $(P,\cL)$ of order $r$ have the following basic properties:
\vskip1mm
$B_1.$ If $L_1,L_2\in\cL$, $L_1\ne L_2$, then $|L_1\cap L_2|=1$.
$B_2.$ If $L\in\cL$, then $|L|=r+1$.
$B_3.$ If $p\in P$, then $|\{L\in\cL:p\in L\}|=r+1$.
$B_4.$ $|P|=r^2+r+1$.
$B_5.$ $|\cL|=r^2+r+1$.
\vskip1mm
Given $r\in[2,\infty)$, to determine whether there exists a finite projective plane of order $r$ (\textit{i.e.}, whether $r$ is a \textit{finite projective plane order}), is in general a notoriously hard problem of finite combinatorics. All positive results available so far are restricted to $r=q^e$, where $q$ is a prime number and $e\in[1,\infty)$.
\section{Some auxiliary results}
The following lemma is well known, \textit{cf.}~\cite{HoPu}. We include its proof here for a better readability of the paper.
\begin{lemma}\label{opt}
If $p\in[1,\infty)$, $q\in[p,\infty)$, $C$ is a set of size $a=\achr(K_p\square K_q)$, $M\in\cM(p,q,C)$ and $l$ is the smallest of frequencies of elements in $M$, then the following hold:
$1.$ $l\le p$;
$2.$ $l\le\left\lfloor\frac{pq}{a}\right\rfloor$;
$3.$ $a\le l(p+q-l-1)+1$.
\end{lemma}
\begin{proof}
1. The vertex colouring $f_M$ is proper, hence each element of $C$ appears in any row of $M$ at most once.
2. The set of colour classes of $f_M$ is a partition of the set $V(K_p\square K_q)$ of cardinality $pq$ so that $pq\le al$ and $l\le\left\lfloor\frac{pq}{a}\right\rfloor$.
3. Let $\gamma\in C$ be a colour of $f_M$ of frequency $l$. A matrix created from $M$ by permuting the rows and the columns of $M$ evidently belongs to $\cM(p,q,C)$. Therefore, we may suppose without loss of generality that $(M)_{i,i}=\gamma$ for every $i\in[1,l]$. The completeness of $f_M$ means that the neighbourhood $N$ of the colour class $\{(i,i):i\in[1,l]\}$ corresponding to $\gamma$ contains a vertex of each colour in $C\setminus\{\gamma\}$. Since $|N|=ql+(p-l)l-l\le|C|-1$, we have $a=|C|\le l(p+q-l-1)+1$.
\end{proof}
\begin{lemma}\label{+1}
If $p\in[3,\infty)$, $q\in[2p-1,\infty)$, $a=\achr(K_p\square K_q)$, $C$ is an $a$-element colour set, $\cM^*(p,q,C)\ne\emptyset$, and $d\notin C$ for a colour $d$, then $\cM^*(p,q+1,C\cup\{d\})\ne\emptyset$ and
$\achr(K_p\square K_{q+1})\ge\achr(K_p\square K_q)+1$.
\end{lemma}
\begin{proof}
For $M\in\cM(p,q,C)$ we consider the block matrix $M^+=(MJ_p(d))$, in which $J_p(d)$ is the $p\times 1$ matrix with all elements equal to $d$.
For each $i\in[1,p]$ we define recurrently an $i\times(q+1)$ matrix $M_i^+$. First, we put $M_1^+=M^+$. For $i\in[2,p]$, if the matrix $M_{i-1}^+$ is already defined, we construct a matrix $M_i^+$ from the block matrix $M_i=\begin{pmatrix}
M_{i-1}^+\\R_i(M^+)\end{pmatrix}$ by interchanging elements $(M_i)_{i,q+1}=d$ and $(M_i)_{i,j}$ for a suitable $j\in[1,q]$ in such a way that lines of $M_i^+$ contain pairwise distinct elements (so that $f_{M_i^+}$ is a proper vertex colouring of $K_i\square K_{q+1}$).
To see that this is doable realise that there are two reasons why an integer from $[1,q]$ cannot be chosen as $j$. The first one is that the $j$th column of $M_{i-1}^+$ contains $d$, and the second one is that $(M_i)_{i,j}$ is an element of the $(q+1)$th column of $M_{i-1}^+$. Therefore, the total number of integers from $[1,q]$, which are not a valid choice for $j$, is $2(i-1)$, and $M_i^+$ can be created in a required way, since $q-2(i-1)\ge q-2(p-1)=q+2-2p\ge1$.
Thus $f_{M_p^+}$ is a proper vertex colouring of $K_p\square K_{q+1}$. As $M\in\cM^*(p,q,C)$, having in mind the construction of $M_p^+$ and the fact that the colour $d$ is present in all $p$ rows of the matrix $M_p^+$, it is clear that the colouring $f_{M_p^+}$ is complete, too. Therefore, $M_p^+\in\cM^*(p,q+1,C\cup\{d\})\ne\emptyset$ and $\achr(K_p\square K_{q+1})\ge|C\cup\{d\}|=a+1=\achr(K_p\square K_q)+1$.
\end{proof}
\begin{lemma}\label{fppl}
If $r$ is a finite projective plane order and $s\in[r+1,\infty)$, then
$1.$ there exists a colour set $C$ of size $(r^2+r+1)s$ such that $\cM^*(r^2+r+1,$ $(r+1)s,C)\ne\emptyset$;
$2.$ $\achr(K_{r^2+r+1}\square K_{(r+1)s})\ge(r^2+r+1)s$.
\end{lemma}
\begin{proof}
1. Let $(P,\cL)$ be a finite projective plane of order $r$ with $P=\{p_k:k\in[1,r^2+r+1]\}$ and $\cL=\{L_k:k\in[1,r^2+r+1]\}$ (see the properties $B_4$, $B_5$). Consider an $(r^2+r+1)\times(r+1)$ matrix $M$ with elements from $P$ such that, for each $i\in[1,r^2+r+1]$, $L_i$ is equal to the set $\{(M)_{i,j}:j\in[1,r+1]\}$ of elements in the $i$th row of $M$.
Given $k\in[1,r^2+r+1]$ and $l\in[1,r+1]$, replace the $l$th copy of $p_k$ in $M$ with $p_k^l$ (by $B_3$, $p_k$ appears in $r+1$ distinct lines of $\cL$, and so in $r+1$ distinct rows of $M$); we suppose that the ordering of copies of $p_k$ in $M$ is ``inherited'' from the lexicographical ordering of pairs $(i,j)\in[1,r^2+r+1]\times[1,r+1]$ with $(M)_{i,j}=p_k$. Denote by $M'$ the $(r^2+r+1)\times(r+1)$ matrix obtained from $M$ if each point of $P$ in $M$ is replaced in the above way with $p_k^l$, where $(k,l)\in[1,r^2+r+1]\times[1,r+1]$.
For $z\in\mathbb Z$ let$(z)_s$ be the unique $t\in[1,s]$ satisfying $t\equiv z\pmod s$. Further, let $M_k^s$ be the $(r+1)\times s$ matrix with elements from $\{p_k\}\times[1,s]$ defined by $(M_k^s)_{i,j}=(p_k,(i+j-1)_s)$, \textit{i.e.},
\[
M_k^s=
\begin{pmatrix}
(p_k,1) &(p_k,2) &\dots &(p_k,s-1) &(p_k,s)\\
(p_k,2) &(p_k,3) &\dots &(p_k,s) &(p_k,1)\\
\vdots &\vdots &\ddots &\vdots &\vdots\\
(p_k,r) &(p_k,r+1) &\dots &(p_k,r-2) &(p_k,r-1)\\
(p_k,r+1) &(p_k,r+2) &\dots &(p_k,r-1) &(p_k,r)
\end{pmatrix}
\]
Finally, let $M_s$ be the $(r^2+r+1)\times(r+1)s$ matrix obtained from $M'$ if each $p_k^l$ with $(k,l)\in[1,r^2+r+1]\times[1,r+1]$ is replaced with the $1\times s$ block matrix equal to the $l$th row submatrix of $M_k^s$.
Let us show that $M_s\in\cM^*(r^2+r+1,(r+1)s,C)$ where the set of colours $C=\{(p_k,t):k\in[1,r^2+r+1],t\in[1,s]\}$ is of size $(r^2+r+1)s$. First, the $i$th row of $M_s$, $i\in[1,r^2+r+1]$, consists of $(r+1)s$ distinct elements of $C$ (corresponding to $r+1$ points of $L_i$, see $B_2$). Next, the assumption $s\ge r$ guarantees that each column of $M_s$ consists of $r^2+r+1$ distinct elements of $C$ (even if there is a column of $M'$ containing, for some $k\in[1,r^2+r+1]$, all $p_k^l$ with $l\in[1,r+1]$). So, $M_s$ represents a proper vertex colouring.
If $k,l\in[1,r^2+r+1]$, $k\ne l$, by the axiom $A_1$ there is a unique $i\in[1,r^2+r+1]$ such that $\{p_k,p_l\}\subseteq L_i$. Therefore, for any $t,u\in[1,s]$, both $(p_k,t)$ and $(p_l,u)$ belong to the $i$th row of $M_s$. If $k\in[1,r^2+r+1]$ and $t,u\in[1,s]$, $t\ne u$, both $(p_k,t)$ and $(p_k,u)$ appear in $r+1$ rows of $M_s$ (corresponding to $r+1$ rows of $M$ containing $p_k$). Thus $M_s$ represents a complete vertex colouring, too; moreover, $M_s\in\cM^*(r^2+r+1,(r+1)s,C)\ne\emptyset$.
2. Since $\cM(r^2+r+1,(r+1)s,C)\supseteq\cM^*(r^2+r+1,(r+1)s,C)\ne\emptyset$ (see Lemma~\ref{fppl}.1), using Proposition~\ref{mat} we obtain $\achr(K_{r^2+r+1}\square K_{(r+1)s})\ge|C|=(r^2+r+1)s$.
\end{proof}
Note that the structure of the matrix $M$ from the proof of Lemma~\ref{fppl} (that depends on the projective plane order $r$) is ``largely'' various, but it determines the structure of matrices $M'$ and $M_s$ in a unique way. For example, in the case $r=2$ and $s=3$ we have
\[
M=
\begin{pmatrix}
p_1 &p_2 &p_3\\
p_3 &p_4 &p_5\\
p_5 &p_6 &p_1\\
p_4 &p_1 &p_7\\
p_7 &p_3 &p_6\\
p_5 &p_7 &p_2\\
p_2 &p_6 &p_4
\end{pmatrix}
,\quad
M'=
\begin{pmatrix}
p_1^1 &p_2^1 &p_3^1\\
p_3^2 &p_4^1 &p_5^1\\
p_5^2 &p_6^1 &p_1^2\\
p_4^2 &p_1^3 &p_7^1\\
p_7^2 &p_3^3 &p_6^2\\
p_5^3 &p_7^3 &p_2^2\\
p_2^3 &p_6^3 &p_4^3
\end{pmatrix}
,
\]
and then the matrix $M_3$ is
\begin{equation*}
\begin{pmatrix}
(p_1,1) &(p_1,2) &(p_1,3) &(p_2,1) &(p_2,2) &(p_2,3) &(p_3,1) &(p_3,2) &(p_3,3)\\
(p_3,2) &(p_3,3) &(p_3,1) &(p_4,1) &(p_4,2) &(p_4,3) &(p_5,1) &(p_5,2) &(p_5,3)\\
(p_5,2) &(p_5,3) &(p_5,1) &(p_6,1) &(p_6,2) &(p_6,3) &(p_1,2) &(p_1,3) &(p_1,1)\\
(p_4,2) &(p_4,3) &(p_4,1) &(p_1,3) &(p_1,1) &(p_1,2) &(p_7,1) &(p_7,2) &(p_7,3)\\
(p_7,2) &(p_7,3) &(p_7,1) &(p_3,3) &(p_3,1) &(p_3,2) &(p_6,2) &(p_6,3) &(p_6,1)\\
(p_5,3) &(p_5,1) &(p_5,2) &(p_7,3) &(p_7,1) &(p_7,2) &(p_2,2) &(p_2,3) &(p_2,1)\\
(p_2,3) &(p_2,1) &(p_2,2) &(p_6,3) &(p_6,1) &(p_6,2) &(p_4,3) &(p_4,1) &(p_4,2)
\end{pmatrix}
.
\end{equation*}
\section{Main theorem}
\begin{theorem}\label{main}
If $r$ is a finite projective plane order, $s\in[r^3+1,\infty)$ and $t\in[0,r]$, then
\[
(r^2+r+1)s+t\le\achr(K_{r^2+r+1}\square K_{(r+1)s+t})\le(r^2+r+1)s+rt.
\]
\end{theorem}
\begin{proof}
Denote $a_{s,t}=\achr(K_{r^2+r+1}\square K_{(r+1)s+t})$ for $t\in[0,r]$. Since $s\ge r^3+1\ge r+1$, from Lemma~\ref{fppl} we know there is a colour set $C_{s,0}^*$ of size $(r^2+r+1)s$ such that $\cM^*(r^2+r+1,(r+1)s,C_{s,0}^*)\ne\emptyset$ and
\begin{equation}\label{lb0}
a_{s,0}\ge(r^2+r+1)s.
\end{equation}
If $t\in[0,r-1]$, it is an easy exercise to prove the inequality $(r+1)s+t\ge2(r^2+r+1)-1$. Therefore, using (\ref{lb0}) and Lemma~\ref{+1}, by induction on $t$ we see that for any $t\in[0,r]$ there exists a colour set $C_{s,t}^*$ of size $(r^2+r+1)s+t$ with $\cM^*(r^2+r+1,(r+1)s+t,C_{s,t}^*)\ne\emptyset$, which implies
\begin{equation}\label{lbq}
a_{s,t}\ge(r^2+r+1)s+t.
\end{equation}
Now let $C_{s,t}$ be an $a_{s,t}$-element set. By Proposition~\ref{mat} there exists a matrix $M_{s,t}\in\cM(r^2+r+1,(r+1)s+t,C_{s,t})$. If $l_{s,t}$ is the minimum frequency of an element of $C_{s,t}$ in $M_{s,t}$, from Lemma~\ref{opt}.2 and (\ref{lbq}) it follows that
\begin{align}
l_{s,t}&\le\left\lfloor\frac{(r^2+r+1)[(r+1)s+t]}{a_{s,t}}\right\rfloor\le\left\lfloor\frac{(r^2+r+1)[(r+1)s+t}{(r^2+r+1)s}\right\rfloor\nonumber\\
&=r+1.\label{r+1}
\end{align}
In the case $l_{s,t}=r+1$ each colour class of the colouring $f_{M_{s,t}}$ is of cardinality at least $r+1$, hence, by (\ref{lbq}),
\[
|V(K_{r^2+r+1}\square K_{(r+1)s+t})|=(r^2+r+1)[(r+1)s+t]\ge(r+1)a_{s,t},
\]
so that
\begin{equation}\label{ub1}
a_{s,t}\le(r^2+r+1)s+\left\lfloor\frac{(r^2+r+1)t}{r+1}\right\rfloor=(r^2+r+1)s+rt.
\end{equation}
On the other hand, if $l_{s,t}\le r$ (see (\ref{r+1})), Lemma~\ref{opt}.3 yields
\begin{align}
a_{s,t}&\le l_{s,t}[r^2+r+1+(r+1)s+t-l_{s,t}-1]+1\nonumber\\
&\le r[r^2+r+1+(r+1)s+t-r-1]+1\nonumber\\
&=r[r^2+(r+1)s+t]+1\label{ub2}
\end{align}
(since $r\ge2$, the polynomial $x[r^2+r+1+(r+1)s+t-x-1]+1$ in variable $x$ is increasing for $x\le r$), and from (\ref{ub2}) we obtain
\begin{equation}\label{ub3}
a_{s,t}\le r^3+r(r+1)s+rt+1\le s+r(r+1)s+rt=(r^2+r+1)s+rt.
\end{equation}
From (\ref{ub1}) and (\ref{ub3}) we see that
\begin{equation}\label{ubq}
a_{s,t}\le(r^2+r+1)s+rt
\end{equation}
independently from the value of $l_{s,t}$, and so, by (\ref{lbq}) and (\ref{ubq}),
for any $t\in[0,r]$ (including $t=k$) we have $(r^2+r+1)s+t\le a_{s,t}\le(r^2+r+1)s+rt$.
\end{proof}
\begin{corollary}
If $r$ is a finite projective plane order and $s\in[r^3+1,\infty)$, then
\[
\achr(K_{r^2+r+1}\square K_{(r+1)s})=(r^2+r+1)s.
\]
\end{corollary}
\begin{proof}
Take $k=0$ in Theorem~\ref{main}.
\end{proof}
\section{Asymptotic analysis}\label{asan}
\begin{theorem}\label{as}
If $r$ is a finite projective plane order, then
\[
\lim_{q\to\infty}\frac{\achr(K_{r^2+r+1}\square K_q)}{q}=\frac{r^2+r+1}{r+1}.
\]
\end{theorem}
\begin{proof}
Denote for simplicity $a(p,q)=\achr(K_p\square K_q)$. We have $a(p,q)=a\left(p,(r+1)\left\lfloor\frac q{r+1}\right\rfloor)+k\right)$, where $k=q-(r+1)\left\lfloor\frac q{r+1}\right\rfloor\in[0,r]$. If $s=\left\lfloor\frac q{r+1}\right\rfloor\ge r^3+1$, then, by Theorem~\ref{main},
\begin{align}\label{bds}
\frac{(r^2+r+1)\left\lfloor\frac q{r+1}\right\rfloor}{q}&\le\frac{(r^2+r+1)\left\lfloor\frac q{r+1}\right\rfloor+k}{q}\nonumber\\
&\le\frac{a\left(r^2+r+1,(r+1)\left\lfloor\frac q{r+1}\right\rfloor+k\right)}{q}\nonumber\\
&=\frac{a(r^2+r+1,q)}{q}\le\frac{(r^2+r+1)\left\lfloor\frac q{r+1}\right\rfloor+rk}{q}\nonumber\\
&\le\frac{(r^2+r+1)\left\lfloor\frac q{r+1}\right\rfloor+r^2}{q}.
\end{align}
Now, having in mind that $\lim_{q\to\infty}\frac{\left\lfloor\frac q{r+1}\right\rfloor}{q}=\frac1{r+1}$ and $\lim_{q\to\infty}\frac{r^2}{q}=0$, from (\ref{bds}) we obtain $\lim_{q\to\infty}\frac{a(r^2+r+1,q)}{q}=\frac{r^2+r+1}{r+1}$.
\end{proof}
From the known results for $\achr(K_p\square K_q)$ with $p\le6$, see~\cite{HoPu} ($p\le4$), \cite{HoPc1} ($p=5$) and \cite{Ho1}, \cite{Ho2} ($p=6$), we can easily deduce the existence and the value of the limit $l_p=\lim_{q\to\infty}\frac{\achr(K_p\square K_q)}{q}$. Namely, we have $l_1=1=l_2$, $l_3=\frac32$, $l_4=\frac53$, $l_5=\frac95$ and $l_6=2$. These facts together with Theorem~\ref{as} motivate us to formulate
\begin{conjecture}\label{cj}
If $p\in[1,\infty)$, then $\lim_{q\to\infty}\frac{\achr(K_p\square K_q)}{q}$ does exist and is a rational number.
\end{conjecture}
\vskip2mm
\noindent{\Large{\bf Acknowledgement}}
\vskip1mm
\noindent This work was supported by the Slovak Research and Development Agency under the contract APVV-19-0153 and by the grant VEGA 1/0574/21.
|
\subsection{Ensembling}
Models have traditionally been combined via ensembling \cite{ensembling1,ensembling2, ensembling3}, whereby each model operates as an independent entity and only the results are synthesised (e.g. by majority prediction). This requires all models to be running concurrently, which is computationally expensive. Moreover, it does not actually aggregate each model's distinct capabilities, since decision making occurs separately. Hence, it is not suitable for adapting to customised tasks, especially when the learned behaviours of the parent models differ significantly.
\subsection{Distillation}
Distillation \cite{distillation1, distillation2, distillation3} is a technique that results in a single model, which is achieved by transferring knowledge from a larger teacher network (typically more expensive to train) to a smaller student network. However, distillation is often just as computationally expensive as training the student network from scratch, and often requires additional hyper-parameter tuning for the transfer process to be effective. It also requires sharing of training data between the teacher and student networks, which is often impractical in real-world scenarios. Another approach to distillation \cite{distillation_gan} proposes using a Generative Adversarial Network (GAN) \cite{gan} so that the student network is forced to mimic the teacher network. Yet, this still does not reduce the computational burden, nor does it provide a principled way to unify the ``intelligence" of different models.
\subsection{Network Fusion}
Network fusion methods have also been proposed, allowing for two parent models to be merged into a new child model, without the need for retraining. One such method involves using Elastic Weight Consolidation to construct an assignment problem based on the Hessian matrices of the two parent networks \cite{network_fusion1, network_fusion2, network_fusion3}. Whilst this does yield a combined model, it does not perform empirically better than naive averaging. Additionally, this method only works when all the weights of the parent networks are already very similar (e.g. by sharing a large portion of training history), since it relies on local Stochastic Gradient Descent (SGD). Thus, it is not generic enough for real-world applications, which likely require fusion of two parent models that have been built independently.
More recently, alignment-based methods have been considered, which match neurons between the parent networks before attempting to fuse them. ``Neural matching" is performed under a Bayesian non-parametric framework, with a specific focus on federated learning \cite{alignment1, alignment2}. In this framework, the number of parameters required grows with the size of the data, so it is infeasible for fusing large models. Nevertheless, since it is designed mainly for federated learning, it is not directly usable in general applications. More recently, others have used OT theory to fuse neural network models \cite{model_fusion_via_ot}, although this has not yet been applied to RL.
\subsection{Proof of Concept: Image Classification Task}
\subsubsection{Experimental Setup}
To validate the theoretical concept behind the proposed OT fusion method, we first test it on a image classification task before extending to robotics tasks in RL. The task is constructed using the MNIST handwritten digits dataset \cite{mnist}. We independently train two parent models to be binary classifiers on the MNIST dataset. The first model classifies 0s versus all other digits, while the second model classifies 1s versus all other digits. Hence, we modify two distinct training datasets, where the class labels in each correspond to either ``yes" for the digit to be identified or ``no" for all other digits.
There are originally 60,000 images in the training dataset. However, since the original MNIST classification problem is to identify each digit from 0 to 9, we need to rebalance the dataset in order to achieve good training outcomes for the binary classifiers. Otherwise, the models will be biased towards the class ``no", since the majority of training examples are not the digit to be identified. We use a random undersampler to rebalance the dataset so that the majority class (i.e. ``no") will have twice as many samples as the minority class (i.e. ``yes").
Each parent model will have ``fully-connected" layers according to the neural network architecture shown in \autoref{tab:nn_architecture}. Both models will be trained for 10 epochs on batch sizes of 128 with a 10\% validation split. Evaluating on the testing dataset of 10,000 examples (with the labels similarly modified), we get the test accuracy and test loss of each model shown in \autoref{tab:classification_parent_accuracy}.
\begin{table}[H]
\centering
\caption{Evaluation results for trained parent models.}
\label{tab:classification_parent_accuracy}
\begin{tabular}{@{}ccc@{}}
\toprule
Model & Test accuracy (\%) & \multicolumn{1}{l}{Test loss (\%)} \\ \midrule
0s & 98.1 & 10.7 \\
1s & 99.0 & 8.32 \\ \bottomrule
\end{tabular}%
\end{table}
We now reformulate the problem domain so that neither one of the parent models are able to perform well without retraining. The new task that we aim to solve is classifying both 0s and 1s versus all other digits. We fuse the parent models by applying the OT technique explained in \autoref{sec:ot_fusion}.
\subsubsection{Results}
Without additional retraining, the fused model is immediately able to classify some digits correctly but not all. An example subset of the fused model's predictions is shown in \autoref{fig:class_predictions}.
\begin{figure}[H]
\centering
\includegraphics[width=0.85\linewidth]{Figures/class_predictions.png}
\caption{Example predictions of fused model without retraining, showing false negatives in red.}
\label{fig:class_predictions}
\end{figure}
The fused model performs significantly better after retraining, correctly classifying most examples. This is evident from the confusion matrix in \autoref{fig:confusion_matrix}, showing that the fused model mainly predicts true positives and true negatives.
\begin{figure}[H]
\centering
\begin{tabular}{l|l|c|c|c}
\multicolumn{2}{c}{}&\multicolumn{2}{c}{Predicted label}&\\
\cline{3-4}
\multicolumn{2}{c|}{}&Yes&No&\multicolumn{1}{c}{}\\
\cline{2-4}
\multirow{2}{*}{True label}& Yes & $0.99$ & $0.01$ \\
\cline{2-4}
& No & $0.07$ & $0.93$ \\
\cline{2-4}
\end{tabular}
\caption{Normalised confusion matrix for fused model after retraining, as evaluated on testing dataset of 10,000 examples.}
\label{fig:confusion_matrix}
\end{figure}
To evaluate the effectiveness of the fused model, we compare it with retraining the parent models as well as training a new model from scratch. The training accuracy and validation accuracy for each of these models over 10 training epochs are shown in \autoref{fig:class_accuracy}. It is evident that the fused model reaches high consistent performance much faster than the other models, surpassing a training accuracy of 95\% and a validation accuracy of 90\% after only 2 epochs. In contrast, it takes at least 4 epochs for the next best model to converge to similar performance.
\begin{figure*}[t!]
\centering
\subfloat[Reacher]{
\includegraphics[width=0.2\linewidth]{Figures/reacher.png}}
\qquad
\subfloat[Walker2d]{\includegraphics[width=0.2\linewidth]{Figures/RL/Walker/walker.png}}
\qquad
\subfloat[HalfCheetah]{\includegraphics[width=0.2\linewidth]{Figures/RL/Cheetah/cheetah.png}}
\qquad
\subfloat[FetchReach]{\includegraphics[width=0.2\linewidth]{Figures/RL/FetchReach/fetch_reach.png}}
\caption{Simulation environments of RL tasks we are using in this work.}
\label{fig:rl_environments}
\end{figure*}
\begin{figure}[H]
\centering
\subfloat[Training accuracy.]{
\includegraphics[width=0.85\linewidth]{Figures/Classification/training_acc.png}}
\quad
\subfloat[Validation accuracy.]{\includegraphics[width=0.85\linewidth]{Figures/Classification/validation_acc.png}}
\caption{Accuracy metrics over 10 retraining epochs.}
\label{fig:class_accuracy}
\end{figure}
\begin{table}[H]
\centering
\caption{Evaluation results after 10 retraining epochs.}
\label{tab:class_retraining_eval}
\begin{tabular}{@{}ccc@{}}
\toprule
Model & Final test accuracy (\%) & Final test loss (\%) \\ \midrule
New & 97.5 & 9.75 \\
Fused & 98.3 & 7.96 \\
Original 0s & 97.9 & 9.04 \\
Original 1s & 97.9 & 10.1 \\ \bottomrule
\end{tabular}%
\end{table}
Moreover, the final performance of the fused model remains visibly higher than the other models after all 10 epochs have finished. From \autoref{tab:class_retraining_eval}, we can see that the fused model exhibits the highest final test accuracy as well as the lowest final test loss, as evaluated on the testing dataset of 10,000 examples.
\subsection{Experimental Setup: RL Tasks}
\begin{table*}[t!]
\centering
\caption{Mean episode rewards for each trained parent policy over 10 evaluation episodes.}
\label{tab:parent_policies_eval}
\resizebox{0.75\textwidth}{!}{%
\begin{tabular}{@{}ccccc@{}}
\toprule
Parent Policy & Reacher Task & Walker2d Task & HalfCheetah Task & FetchReach Task \\ \midrule
First & 20.10 $\pm$ 6.80 & 660.80 $\pm$ 420.96 & 2258.43 $\pm$ 642.28 & -2.69 $\pm$ 0.19 \\
Second & 19.57 $\pm$ 10.06 & 728.28 $\pm$ 340.60 & 2013.14 $\pm$ 8.02 & -1.48 $\pm$ 0.07 \\ \bottomrule
\end{tabular}%
}
\end{table*}
To test the effectiveness of the OT technique for policy fusion, we construct four separate RL robotics tasks using OpenAI Gym \cite{openai}: Reacher, Walker2d, HalfCheetah and FetchReach. The first three tasks are simulated using PyBullet \cite{pybullet} while the last task is simulated using Mujoco \cite{mujoco}. Example renders are shown in \autoref{fig:rl_environments}. For each task, the policy of the robotic agent is represented as a Multilayer Perceptron (MLP) with 2 hidden layers of 64 nodes each. The size of the input and output layers differ across the tasks according to \autoref{tab:nn_architecture}, since the environments have varying observation and action spaces. All policies will be trained using the PPO algorithm.
To test each task, we will first independently train two robotic agents on different configurations of the task. Both agents will be trained for 500,000 timesteps. The mean episode rewards, as evaluated on 10 separate and randomly generated environments, are included in \autoref{tab:parent_policies_eval}. These agents will act as the ``parents" of the Renaissance agent, which we will generate via the OT policy fusion method. Then, we will refine the Renaissance agent on a new domain, and compare its performance against retraining the parent agents and training a brand new agent over the same time period. To provide an additional benchmark for OT, we will also compare it against naive averaging as an alternative method of fusing policy weights.
\subsection{Generalising over Changes in the Environment}\label{sec:2d_reacher}
\subsubsection{Experimental Setup}
The learned behaviour of a robotic agent is highly sensitive to changes in the environment, particularly when such changes impact how rewards are earned. To demonstrate that the OT fusion technique is able to generalise the knowledge of two agents trained in differing environment configurations, we construct a simple RL task using the Gym environment Reacher. This task involves a two-link robotic arm as the agent, which operates within a two-dimensional workspace. The goal is for the end-effector to reach to a randomly located target position, with the agent gaining 0.1 rewards for each timestep that it does so. The input layer of the agent's policy network takes in the angular positions and velocities of the robotic arm, and the output layer defines the motor torque of the central joint and the elbow joint.
The first policy learns to reach to targets randomly located in the first quadrant of the workspace, while the second policy learns to reach to targets randomly located in the second quadrant of the workspace. We now reformulate the problem scope to targets that are placed randomly anywhere within the first and second quadrants. Since the required kinematics of the two-link robotic arm reaching to targets in each quadrant differ significantly, the parent policies have limited capabilities in this new domain. We fuse the parent policies using the OT technique to produce an initialisation of weights for the Renaissance agent.
\subsubsection{Results}
After retraining on the new domain for 500,000 timesteps, the fused agent exhibits consistent performance. Renders of the fused agent over a random evaluation episode are shown in \autoref{fig:new_fused_visualisation}.
\begin{figure}[H]
\centering
\includegraphics[width=0.8\linewidth]{Figures/RL/retraining_visualisation.png}
\caption{Renders of fused agent after retraining on new Reacher task.}
\label{fig:new_fused_visualisation}
\end{figure}
The mean episode rewards for the fused agent, compared with the other benchmark agents, are shown in \autoref{fig:rl_retraining}. It is evident that the fused agent achieves high consistent performance much faster than the rest, surpassing 15 rewards per episode after 200,000 timesteps. In contrast, it takes approximately 350,000 timesteps for the next best agent to converge to similar performance. Upon completion of the retraining period, we can see from \autoref{tab:rl_retraining_eval} that the fused agent exhibits the highest mean reward as well as the lowest standard deviation, as tested over 10 random evaluation episodes.
\begin{figure}[H]
\centering
\includegraphics[width=\linewidth]{Figures/RL/retraining.png}
\caption{Retraining curves for Reacher environment.}
\label{fig:rl_retraining}
\end{figure}
\begin{table*}[t!]
\centering
\caption{Mean episode rewards over 10 evaluation episodes.}
\label{tab:rl_retraining_eval}
\resizebox{0.75\textwidth}{!}{%
\begin{tabular}{@{}ccccc@{}}
\toprule
Policy & Reacher Task & Walker2d Task & HalfCheetah Task & FetchReach Task \\ \midrule
New Agent & 16.64 $\pm$ 9.51 & 972.02 $\pm$ 5.88 & 2244.47 $\pm$ 898.70 & -5.38 $\pm$ 4.03 \\
\textbf{Fused Agent} & \textbf{17.05 $\pm$ 7.37} & \textbf{1520.59 $\pm$ 232.58} & \textbf{2810.22 $\pm$ 29.93} & \textbf{-5.05 $\pm$ 3.4} \\
Original Agent 1 & 15.17 $\pm$ 8.03 & 1000.34 $\pm$ 24.44 & 2750.57 $\pm$ 52.82 & -7.13 $\pm$ 3.73 \\
Original Agent 2 & 16.59 $\pm$ 7.92 & 822.42 $\pm$ 345.61 & 2500.23 $\pm$ 444.02 & -5.95 $\pm$ 3.69 \\
Naive Averaging & 15.09 $\pm$ 8.08 & 580.29 $\pm$ 420.92 & 1853.18 $\pm$ 1312.92 & -8.03 $\pm$ 3.47 \\ \bottomrule
\end{tabular}%
}
\end{table*}
\subsection{Generalising over Changes in Robot Kinematics}
\subsubsection{Experimental Setup}
Agents with different robot kinematics will learn different behaviours to reach the desired goal, even if the environment is the same. To demonstrate that the Renaissance agent generalises over different robot kinematics, we construct two RL tasks using the Gym environments Walker2d and HalfCheetah.
\subsubsection{Walker2d}
The Walker2d task involves a bipedal robot as the agent, which operates within a 2D plane (i.e. can only move forwards or backwards). The goal is for the agent to walk forward as fast as possible, with the agent gaining rewards as a function of the current forward velocity, plus a constant bonus for not falling over. The input layer of the agent's policy network takes in the angular positions and velocities of the joints, and the output layer defines the signals to move the torso-connected foot and the left foot.
The first agent is trained with a more powerful torso-connected foot (coefficient = 40) compared to its left foot (coefficient = 10), while the second agent is trained with a more powerful left foot (coefficient = 25) compared to its torso-connected foot (coefficient = 20). We now fuse the parent policies and reformulate the target domain to learning the Walker2d task on an agent with equally powerful torso-connected and left feet (coefficient = 30).
After retraining on the new domain for 500,000 timesteps, the fused agent is able to walk forward in a natural-looking manner. Renders of the agent over a random evaluation episode are shown in \autoref{fig:retrained_walker}.
\begin{figure}[H]
\centering
\includegraphics[width=\linewidth]{Figures/RL/Walker/retrained_visualisation.png}
\caption{Renders of fused agent after retraining on new Walker2d task.}
\label{fig:retrained_walker}
\end{figure}
The mean episode rewards for the fused agent, compared with the other benchmark agents, are shown in \autoref{fig:rl_retraining_walker}. We can see that the fused agent is the only one that achieves high consistent performance, surpassing 1000 rewards per episode by the end of the retraining period. From \autoref{tab:rl_retraining_eval}, it is evident that the fused agent exhibits the highest minimum, maximum and mean reward, as tested over 10 random evaluation episodes.
\begin{figure}[H]
\centering
\includegraphics[width=\linewidth]{Figures/RL/Walker/walker_retraining_curves.png}
\caption{Retraining curves for Walker2d environment.}
\label{fig:rl_retraining_walker}
\end{figure}
\subsubsection{HalfCheetah}
We further demonstrate the ability of OT policy fusion to generalise over different robot kinematics by extending to a more complex agent. The HalfCheetah task involves a quadruped robot as the agent, which also moves only forwards or backwards within a 2D plane. Similar to the Walker2d task, the goal is for the agent to run forward as fast as possible. The agent's policy network determines how much torque to apply on its thighs, shins and feet.
We train the first parent policy on an agent with greater thigh and shin power, but reduced foot power. This results in more rigid foot joints. We then train the second parent policy on an agent with the opposite kinematics, resulting in more rigid thigh and shin joints. Similar to the Walker2d task, we now fuse the policies and change the target domain to learning the HalfCheetah task on an agent with neutral power for all joints. This should allow the agent to learn joint movements that are less rigid.
After retraining on the new domain for 500,000 timesteps, the fused agent is able to run forward without any of the joint rigidity displayed by the parent agents. Renders of the agent over a random evaluation episode are shown in \autoref{fig:retrained_cheetah}.
\begin{figure}[H]
\centering
\includegraphics[width=\linewidth]{Figures/RL/Cheetah/retrained_visualisation.png}
\caption{Renders of fused agent after retraining on new Cheetah task.}
\label{fig:retrained_cheetah}
\end{figure}
The mean episode rewards for the fused agent, compared with the other benchmark agents, are shown in \autoref{fig:rl_retraining_cheetah}. It is evident that the fused agent learns much faster than the new agent, and overtakes the parent agents by the end of the retraining period. From \autoref{tab:rl_retraining_eval}, we can further observe that the fused agent exhibits the highest mean reward and lowest standard deviation, as tested over 10 random evaluation episodes.
\begin{figure}[H]
\centering
\includegraphics[width=\linewidth]{Figures/RL/Cheetah/cheetah_retraining_curves.png}
\caption{Retraining curves for HalfCheetah environment.}
\label{fig:rl_retraining_cheetah}
\end{figure}
Additionally, the retrained parent agents still exhibit very similar kinematics to what they learned from their original training domain. In contrast, both the fused agent and the new agent display the desired kinematics of the new domain, which has less joint rigidity. This demonstrates how the OT fusion technique is useful for consolidating the common knowledge of parent models which have been over-optimised to a previous task.
\subsection{Evaluating on Robotic Arm Task}
\subsubsection{Experimental Setup}
The ``Fetch" Gym environments are based on the 7-DoF Fetch Robotics arm. This provides a more complex agent, observation and action space compared to the Reacher task shown in \autoref{sec:2d_reacher}. We extend that task by using the Gym environment FetchReach.
The FetchReach task involves the Fetch arm as the agent, which operates within a 3D space. The goal is for the agent to move its end-effector to target positions randomly located above a workspace. Rewards are binary: at each timestep, the agent obtains a reward of 0 if its end-effector is at the target position, and -1 otherwise. The agent's policy network takes in the Cartesian positions and linear velocities of the arm links and gripper as observations, and outputs the desired movements in Cartesian coordinates as actions.
In the previous 2-link Reacher task, we set the target locations to be within the first or second quadrants of the workspace. However, since the Fetch robot stands above the workspace and moves in 3D, these existing problem formulations are not different enough to ensure that the parent policies will learn distinct behaviours. Instead, the first policy learns to move the end-effector to target positions located over the bottom left of the workspace, while the second policy learns for the top right of the workspace. We now fuse the policies and change the problem scope to target positions that are located randomly anywhere over the workspace, excluding the corners.
\begin{figure}[H]
\centering
\includegraphics[width=0.9\linewidth]{Figures/RL/FetchReach/retrained_visualisation.png}
\caption{Renders of fused agent after retraining on new FetchReach task.}
\label{fig:retrained_fetch_reach}
\end{figure}
\subsubsection{Results}
After retraining on the new domain for 200,000 timesteps, the fused agent is able to quickly and consistently move its end-effector to target positions located anywhere over the central area of the workspace. Renders of the agent over a random evaluation episode are shown in \autoref{fig:retrained_fetch_reach}.
The mean episode rewards for the fused agent, compared with the other benchmark agents, are shown in \autoref{fig:rl_retraining_fetch_reach}. It is evident that the fused agent achieves high consistent performance much faster than the rest, surpassing -2.5 rewards per episode by 25,000 timesteps. In contrast, it takes approximately 100,000 timesteps for the next best agent to converge to similar performance. From \autoref{tab:rl_retraining_eval}, we can see that the fused agent achieves the highest mean reward as well as the lowest standard deviation, as tested over 10 random evaluation episodes.
\begin{figure}[H]
\centering
\includegraphics[width=\linewidth]{Figures/RL/FetchReach/fetch_reach_retraining_curves.png}
\caption{Retraining curves for FetchReach environment.}
\label{fig:rl_retraining_fetch_reach}
\end{figure}
\subsection{Policy Networks in RL}
In RL, an agent is informed by a policy $\pi: \mathcal{A} \times \mathcal{S} \to [0,1]$ that determines what actions $\mathcal{A}$ to perform given the current states $\mathcal{S}$. A policy $\pi_\theta^\mathcal{E}$, trained in domain $\mathcal{E}$, can be represented as a neural network parameterized by $\theta$. When training a policy, an RL algorithm such as Proximal Policy Optimisation (PPO) \cite{ppo} or Deep Deterministic Policy Gradient (DDPG) \cite{ddpg} is used to update the weights of the neural network so that the cumulative reward is maximised over time. Depending on the task configuration during training, these learned weights will differ between agents. However, for policy networks that have the same input features, similar weight vectors at each individual layer may represent common learned patterns. Therefore, we wish to find an efficient way to consolidate the common patterns while diminishing any over-optimised patterns, so that we can generate a Renaissance agent that is capable of leveraging prior knowledge for new domains.
For two policy networks, $\pi_{\theta_1}^{\mathcal{E}_1}, \pi_{\theta_2}^{\mathcal{E}_2}$, trained independently in domains, $\mathcal{E}_1, \mathcal{E}_2$, respectively, our objective is to determine the best fusion operation $c: \Pi^{\mathcal{E}_1} \times \Pi^{\mathcal{E}_2} \to \Pi^{\mathcal{E}_*}$ for the policies $\pi^\mathcal{E} \in \Pi^\mathcal{E}$ and new domain ${\mathcal{E}_*}$ such that empirically $r(\pi_{\theta_*}^{\mathcal{E}_*}) > r(\pi_{\theta_1}^{\mathcal{E}_*}), r(\pi_{\theta_2}^{\mathcal{E}_*})$, where $r(\pi^\mathcal{E})$ is the reward when policy $\pi$ is deployed in domain $\mathcal{E}$. For instance, naive policy averaging $c(\pi_{\theta_1}^{\mathcal{E}_1},\pi_{\theta_2}^{\mathcal{E}_2}) = (\pi_{\theta_1}^{\mathcal{E}_1}+\pi_{\theta_2}^{\mathcal{E}_2})/2$ is a simple fusion operation. However, it is ineffective since it does not find the optimal alignment between the parameter vectors of the policies. In this paper, we propose that OT theory is apt for finding an alignment map between the weights of two policy networks. This enables us to match the weights that are most likely to represent common patterns.
\subsection{Optimal Transport Theory}
\subsubsection{Monge-Kantorovich Problem}
OT theory has previously been applied to mapping problems in order to allow robots to operate in new environments \cite{Tompkins2020rss}. However, in this work, we utilise OT for policy fusion so that robotic agents can consolidate learned behaviours for new domains, including new environments as well as new kinematics. Typically, OT is used to transform a single source distribution $\mathcal{S}$ to a target distribution $\mathcal{T}$ \cite{ot}. When applied to the incoming weight vectors of a policy network, OT represents them as distributions of Dirac ``masses" \cite{ot_masses}. The ``distance" between any two distributions is then quantified by the least costly way of transporting each mass from $\mathcal{S}$ to $\mathcal{T}$.
According to the Monge-Kantorovich Problem \cite{monge_kant}, for the datasets $\bm{\mu}^{(\mathcal{S})}$ and $\bm{\mu}^{(\mathcal{T})}$ of size $N^{\mathcal{S}}$ and size $N^{\mathcal{T}}$ on independent metric spaces $\Omega^{(\mathcal{S})}$ and $\Omega^{(\mathcal{T})}$, there exists an optimal probabilistic coupling $P_* \in \mathbb{R}^{N^{(\mathcal{S})}\times N^{(\mathcal{T})}}$ between the two datasets. This optimal coupling always exists for a distance function $D: \Omega^{(\mathcal{S})}\times \Omega^{(\mathcal{T})}\rightarrow [0,\infty)$, and is defined by,
\begin{equation}\label{eqn:ot_map}
P_* = \small{\mathop{\text{arginf}}_{P\in\Gamma}}\int_{\Omega^{(\mathcal{S})}\times \Omega^{(\mathcal{T})}} D(\bm{\mu}^{(\mathcal{S})},\bm{\mu}^{(\mathcal{T})})\text{d}P(\bm{\mu}^{(\mathcal{S})},\bm{\mu}^{(\mathcal{T})}).
\end{equation}
\subsubsection{Earth Mover's Distance}
The minimum cost of transporting each mass from $\mathcal{S}$ to $\mathcal{T}$ is based on the Wasserstein metric, also known as the Earth Mover's Distance \cite{emd},
\begin{equation}
\text{EMD}(\mathcal{S}, \mathcal{T}) = \frac{\Sigma_{i=1}^{m}\Sigma_{j=1}^{n} P_{*_{i,j}}d_{i,j}}{\Sigma_{i=1}^{m}\Sigma_{j=1}^{n} P_*{_{i,j}}},
\end{equation}
where $P_*$ is the optimal coupling and $d_{i,j}$ is the ground distance between distributions $\mathcal{S}_i$ and $\mathcal{T}_j$. We can formulate OT as an alignment problem by considering ``similarity" as inversely proportional to the Earth Mover's Distance. By computing the optimal coupling $P_*$ between two sets of weight vectors (each representing neurons from a different policy network), we are able to match the second set as the source distribution $\mathcal{S}$ to the first set as the target distribution $\mathcal{T}$ by taking the dot product,
\begin{equation}\label{eqn:ot_alignment}
\mathcal{S}_{\text{aligned}} = P_* \cdot \mathcal{T}.
\end{equation}
\subsection{Neural Matching and Weights Fusion}\label{sec:ot_fusion}
In order to fuse two parent policies parameterised by neural networks, we first align their neurons layer-wise so that the associated weight vectors are matched. Given that the input layers of each model receive the exact same format of input vectors, we begin neural matching from the incoming weights to the first hidden layer. As we do not know explicitly what each neuron has been trained to identify, we can pair them together based only on the ``similarity" of the incoming weights.
A one-to-one similarity is computed by minimising the Earth Mover's Distance between the weight vectors in one model and the weight vectors in the other model as probability distributions. Hence, the optimal coupling $P_*$ represents the alignment matrix for re-positioning the weight vectors in the second model (i.e. the source distribution $\mathcal{S}$) according to the weight vectors in the first model (i.e. the target distribution $\mathcal{T}$). Taking the dot product of $P_*$ and $\mathcal{T}$ yields the aligned $\mathcal{S}$.
To perform neural matching in the subsequent layer, we must start with rearranging the elements of each weight vector to correspond with the new positions of the neurons in the previous layer (after alignment). For the current layer, we then compute the OT map as before and align the weight vectors in the second model to the weight vectors in the first model. Algorithm \autoref{alg:align_neurons} outlines this process. Once every layer has been aligned, we then fuse the matched weights across the two policies by averaging the values. This keeps the weights with similar matches close to the same value, while changing those that are dissimilar and therefore unlikely to represent common patterns. Thus, we build the fused policy layer-by-layer, as shown in \autoref{fig:ot_technique}.
\begin{algorithm}[H]
\caption{\emph{align\_neurons}}
\label{alg:align_neurons}
\begin{algorithmic}
\STATE {\bfseries Input:} weights of $N$-layer parent policies
\FOR{$i=2$ {\bfseries to} $N$}
\STATE{$\mathcal{S} \leftarrow$ incoming weights to $i$-th layer of second policy}
\STATE{$\mathcal{T} \leftarrow$ incoming weights to $i$-th layer of first policy}
\IF{$i > 2$}
\STATE{Rearrange $\mathcal{S}$ to match positions of previous layer alignment}
\ENDIF
\STATE{Compute OT map $P_*$, according to \autoref{eqn:ot_map}}
\STATE{Align source weights to target weights using $P_*$, according to \autoref{eqn:ot_alignment}}
\ENDFOR
\STATE {\bfseries Output:} aligned weights of $N$-layer parent policies
\end{algorithmic}
\end{algorithm}
\begin{figure}[H]
\centering
\includegraphics[width=\linewidth]{Figures/ot_technique.png}
\caption{Our approach considers the incoming weight vectors of each independently trained policy $\pi_{\theta_1}^{\mathcal{E}_1}$ and $\pi_{\theta_2}^{\mathcal{E}_2}$. The weight vectors are considered as source $\mathcal{S}$ and target $\mathcal{T}$ distributions for OT. The result at each layer is taken as the weight vector for the fused policy.}
\label{fig:ot_technique}
\end{figure}
\section{INTRODUCTION}
\input{intro}
\section{RELATED WORK}
\input{background_v2}
\section{OPTIMAL TRANSPORT POLICY FUSION}
\input{ot_fusion}
\section{EXPERIMENTS}
\input{experiments}
\section{CONCLUSION}
\input{conclusion}
\addtolength{\textheight}{-12cm}
\section*{ACKNOWLEDGMENT}
We thank Anthony Tompkins for early discussions and ideas, especially on Optimal Transport theory.
|
\section{Introduction}
\subsection{Background}
A state-space model is composed of an unobserved Markov process $X_0, \ldots,
X_T$ and observed data $Y_0, \ldots, Y_T$. Given $X_0, \ldots, X_T$, the data
$Y_0, \ldots, Y_T$ are independent and generated through some specified
emission distribution $Y_t | X_t \sim \boldsymbol f_t(\mathrm{d} y_t | x_t)$. These
models have wide-ranging applications (e.g.\ in biology, economics and
engineering). Two important inference tasks related to state-space models are
filtering (computing the distribution of $X_t$ given $Y_0, \ldots, Y_t$) and
smoothing (computing the distribution of the whole trajectory $(X_0, \ldots,
X_t)$, again given all data until time $t$). Filtering is usually carried out
through a particle filter, that is, a sequential Monte Carlo algorithm that
propagates $N$ weighted particles (realisations) through Markov and importance
sampling steps; see \cite{SMCbook} for a general introduction to state-space
models (Chapter 2) and particle filters (Chapter 10).
This paper is concerned with smoothing algorithms that approximate the
smoothing distributions with empirical distributions based on the
output of a particle filter (i.e.\ the locations and weights of the $N$
particles at each time step). A simple example is genealogy tracking
\citep[initially introduced by][]{Kitagawa1996}, which keeps track of
the ancestry (past states) of each particles. This smoother suffers from
degeneracy: for $t$ large enough, all the particles have the same ancestor at
time $0$.
The forward filtering backward smoothing (FFBS) algorithm \citep{GodsDoucWest}
has been proposed as a solution to this problem. Starting from the filtering
approximation at time $t$, the algorithm samples successively particles at
times $t-1$, $t-2$, etc.\ using backward kernels. The naive implementation has
an $\mathcal{O}(N^2)$ cost. However, if the Markov transition density is bounded, a
rejection sampling--based scheme can be used \citep{Douc2011}. Its complexity
is shown to be $\mathcal{O}(N)$ under restrictive assumptions on the model.
In many applications, one is mainly interested in approximating smoothing
expectations of additive functions of the form
\[\CE{\psi_0(X_0) + \psi_1(X_0, X_1) + \cdots + \psi_t(X_{t-1}, X_t)}{Y_0, \ldots, Y_t}
\]
for some functions $\psi_0, \ldots, \psi_t$. Such expectations can be
approximated on-line in $\mathcal{O}(N^2)$ time by a procedure described in
\citet{DelMoral2010}. Inspired by this, the particle-based, rapid incremental
smoother (PaRIS) algorithm of \cite{Olsson2017} replaces some of the
calculations with an additional layer of Monte Carlo approximation. Again, it
is possible to employ rejection sampling at this level and get an $\mathcal{O}(N)$
cost under strong assumptions.
There are three problems however with the rejection versions of FFBS and PaRIS.
First, the $\mathcal{O}(N)$ claim does not hold for realistic models (as we
shall demonstrate theoretically and numerically). Second, their running time
is random (we elaborate below why this is a drawback). Third (and this problem
also apply to the $\mathcal{O}(N^2)$ versions of FFBS and PaRIS), they require the
Markov transition of the model to be tractable, which is not the case for
certain models of practical interest.
These three problems are deeply linked to the way the backward sampling step
operates.
\subsection{Motivation and structure}\label{sec:motivation}
We will therefore propose new methods to address these issues. Since backward
sampling is central to a wide variety of algorithms (e.g.\ FFBS,
forward-additive smoothing, PaRIS), Section~\ref{sec:smoothing_generic}
presents them in a unified framework. We show how they can all be expressed in
terms of discrete backward kernels, which are essentially random $N \times N$
matrices. We specify how these matrices are used differently for off-line and
on-line smoothing scenarios. Importantly, we state generic sufficient
conditions which ensure that the resulting algorithms are consistent and stable
as $T \to \infty$.
Having at hand the necessary theoretical framework, the rest of the article is
spent on methodological innovations. We first closely look at the use of
rejection sampling and realise that in many models, the resulting execution
time may have an infinite expectation; see Section~\ref{sec:ffbs_kernel}. In
highly parallel computing architectures, each processor only handles one or a
small number of particles. As such, the heavy-tailed nature of the execution
time means that a few machine might prevent the whole system from moving
forward. In \textit{all} computing architectures, an infinite mean running time
makes it difficult to know when a program will stop, even after having
performed few pilot runs. We introduce a hybrid rejection sampling procedure
which fixes this problem and leads to a nearly $\mathcal{O}(N)$ algorithm (up
to some $\log$ factor) in an important class of practical models; again see
Section~\ref{sec:ffbs_kernel}.
To make the execution time fully linear and deterministic, we propose in
Section~\ref{sec:mcmc_kernel} backward kernels based on MCMC (Markov chain
Monte Carlo). Convergence and stability of the resulting algorithm are
inherited from the general framework developed in
Section~\ref{sec:smoothing_generic}. MCMC methods require evaluation of the
likelihood and thus cannot be applied to models with intractable transition
densities. In Section~\ref{sec:intractable}, we show how the use of forward
coupling can replace the role of backward MCMC steps in these scenarios. This
makes it possible to obtain stable performance in both on-line and off-line
scenarios.
Section~\ref{sec:numexp} illustrates the aforementioned algorithms in both
on-line and off-line uses. We highlight how hybrid and MCMC samplers lead to a
more user-friendly (i.e.\ smaller, less random and less model-dependent)
execution time than the pure rejection sampler. We also apply our smoother for
intractable densities to a continuous-time diffusion process with
discretisation. Further numerical examples, in particular those concerning
Markov jump processes, are planned to be included in a future version of this
paper. We observe that our procedure can indeed prevent degeneracy as $T \to
\infty$, provided that some care is taken to build couplings with good
performance.
Finally, Section~\ref{sec:conclusion} concludes the paper with final practical
recommendations and further research directions.
\subsection{Related work}
Interestingly, the potential issue with the complexity of FFBS-reject has been
suggested by their authors of this method. Indeed, Proposition 1 of
\citet{Douc2011} implies that the asymptotic complexity of FFBS-reject might
tend to infinity in some situations. However, we show that the infiniteness
might already happen at finite values of $N$. Moreover, we propose concrete
solutions to fix this problem and analyse them both theoretically and
practically.
Figure 1 of \citet{Olsson2017} and the accompanying discussion provide an
excellent intuition on the stability of smoothing algorithms based on the
support size of the backward kernels. We formalise these insights and use them
to construct new efficient and stable algorithms.
The heavy-tailed distribution of the running time of FFBS-reject have been
remarked in \citet{taghavi_adaptive}, who proposed a hybrid algorithm combining
multinomial and rejection sampling. However, theoretical analysis of the
complexity was not performed and the extension to online smoothing was not
considered. (The PaRIS algorithm had not be invented then.) Using MCMC steps
(started at the previous ancestor) instead of rejection sampling has been
explored in \citet{godsillmcmc}. Again, consistency and stability were not
formally proved and the article was limited to the offline scenario.
\citet{gloaguen2021pseudomarginal} briefly mention the use of MCMC in PaRIS algorithm, without doing further theoretical or numerical analyses. Moreover, since their MCMC chains do not start at the previous ancestors, a large number of steps are necessary to get a correct algorithm. As we shall see, our procedure requires only one MCMC step.
Another way to reduce the computation time is to perform the expensive backward sampling steps at certain times $t$ only. For other values of $t$, the naive genealogy tracking smoother is used instead. This idea has been recently proposed by \citet{mastrototaro2021fast}, who also provided a practical recipe for deciding at which values of $t$ the backward sampling should take place and derived corresponding theoretical results.
Smoothing in models with intractable transition densities is very challenging.
If these densities can be estimated accurately, the algorithms
proposed by \citet{gloaguen2021pseudomarginal} permit to attack this problem. A
case of particular interest is diffusion models, where unbiased transition
density estimators are provided in \citet{MR2278331, Fearnhead2008}. More
recently, \citet{yonekura2022online_smoothing} use a special bridge path-space
construction to overcome the unavailability of transition densities when the
diffusion (possibly with jumps) must be discretised.
Our smoother for intractable models are based on a general coupling principle
that is not specific to diffusions. We only require users to be able to
simulate their dynamics (e.g.\ using discretisation in the case of diffusions)
and to manipulate random numbers in their simulations so that dynamics starting
from two different points can meet with some probability. Our method does not
directly provide an estimator for the gradient of the transition density with
respect to model parameters and thus cannot be used in its current form to
perform maximum likelihood estimation (MLE) in intractable models; whereas the
aforementioned work have been able to do so in the case of diffusions. However,
the main advantage of our approach lies in its generality beyond the diffusion
case. Furthermore, modifications allowing to perform MLE are possible and might
be explored in further work specifically dedicated to the parameter estimation
problem.
The idea of coupling has been incorporated in the smoothing problem in a
different manner by \citet{jacob2019smoothing}. There, the goal is to provide
offline unbiased estimates of the expectation under the smoothing distribution.
Coupling and more generally ideas based on correlated random numbers are also
useful in the context of partially observed diffusions via the multilevel
approach \citep{jasra2017multilevel}.
In this work, we consider smoothing algorithms that are based on a unique pass
of the particle filter. Offline smoothing can be done using repeated iterations
of the conditional particle filter \citep{PMCMC}. Another approach to smoothing
consists of using an additional information filter \citep{Fearnhead2010a}, but
it is limited to functions depending on one state only. Each of these
algorithmic families has their own advantages and disadvantages, of which a
detailed discussion is out of the scope of this article \citep[see
however][]{nordhquantitative}.
\section{General structure of smoothing algorithms}\label{sec:smoothing_generic}
\subsection{Notations}
\textbf{Measure-kernel-function notations.} Let $\mathcal X$ and $\mathcal Y$
be two measurable spaces with respective $\sigma$-algebras $\mathcal B(\mathcal
X)$ and $\mathcal B(\mathcal Y)$. The following definitions involve integrals
and only make sense when they are well-defined. For a measure $\mu$ on
$\mathcal X$ and a function $f: \mathcal X \to \mathbb R$, the notations $\mu
f$ and $\mu(f)$ refer to $\int f(x) \mu(\mathrm{d} x)$. A kernel (resp.\ Markov
kernel) $K$ is a mapping from $\mathcal X \times \mathcal B(\mathcal Y)$ to
$\mathbb R$ (resp.\ $[0,1]$) such that, for $B\in \mathcal B(\mathcal Y)$
fixed, $x \mapsto K(x, B)$ is a measurable function on $\mathcal X$; and for
$x$ fixed, $B \mapsto K(x, B)$ is a measure (resp.\ probability measure) on $\mathcal Y$. For a real-valued function $g$ defined on $\mathcal Y$, let $Kg: \mathcal X \to \mathbb R$ be the function $Kg(x) := \int g(y) K(x, \mathrm{d} y)$. We sometimes write $K(x, g)$ for the same expression. The product of the measure $\mu$ on $\mathcal X$ and the kernel $K$ is a measure on $\mathcal Y$, defined by $\mu K(B):= \int K(x, B) \mu(\mathrm{d} x)$.
\textbf{Other notations.}\notsep The notation $X_{0:t}$ is a shorthand for $(X_0, \ldots, X_t)$\notsep We denote by $\mathcal M(W^{1:N})$ the multinomial distribution supported on $\px{1, 2, \ldots, N}$. The respective probabilities are $W_1, \ldots, W_N$. If they do not sum to $1$, we implicitly refer to the normalised version obtained by multiplication of the weights with the appropriate constant\notsep The symbol $\stackrel{\mathbb P}{\rightarrow}$ means convergence in probability\notsep The geometric distribution with parameter $\lambda$ is supported on $\mathbb Z_{\geq 1}$, has probability mass function $f(n) = \lambda (1-\lambda)^{n-1}$ and is noted by $\operatorname{Geo}(\lambda)$\notsep Let $\mathcal X$ and $\mathcal Y$ be two measurable spaces. Let $\mu$ and $\nu$ be two probability measures on $\mathcal X$ and $\mathcal Y$ respectively. The o-times product measure $\mu \otimes \nu$ is defined via $(\mu \otimes \nu)(h) := \iint h(x,y)\mu(\mathrm{d} x)\nu(\mathrm{d} y)$ for bounded functions $h: \mathcal X \times \mathcal Y \to \mathbb R$. If $X \sim \mu$ and $Y \sim \nu$, we sometimes note $\mu \otimes \nu$ by $X \otimes Y$.
\subsection{Feynman-Kac formalism and the bootstrap particle filter}\label{sec:fk_bootstrap}
Let $\mathcal X_{0:T}$ be a sequence of measurable spaces and $M_{1:T}$ be a
sequence of Markov kernels such that $M_t$ is a kernel from $\mathcal X_{t-1}$
to $\mathcal X_t$. Let $X_{0:T}$ be an unobserved inhomogeneous Markov chain
with starting distribution $X_0 \sim
\mathbb M_0(\mathrm{d} x_0)$ and Markov kernels $M_{1:T}$; i.e.\ $X_t|X_{t-1}\sim
M_t(X_{t-1}, \dd x_t)$ for $t\geq 1$. We aim to study the distribution of
$X_{0:T}$ given observed data $Y_{0:T}$. Conditioned on $X_{0:T}$, the data
$Y_0, \ldots, Y_T$ are independent and
\[Y_t | X_{0:T} \equiv Y_t | X_t \sim \boldsymbol f_t(\cdot | X_t) \]
for a certain emission distribution
$\boldsymbol f_t(\mathrm{d} y_t | x_t)$. Assume that there exists dominating measures
$\tilde \lambda_t$ not depending on $x_t$ such that
\[\boldsymbol{f}_t(\mathrm{d} y_t| x_t) = f_t(y_t|x_t) \tilde \lambda_t(\mathrm{d} y_t).\]
The distribution of $X_{0:t}|Y_{0:t}$ is then given by
\begin{equation}
\label{eq:fkmodel}
\mathbb{Q}_t(\mathrm{d} x_{0:t}) = \frac{1}{L_t} \mathbb{M}_0 (\mathrm{d} x_0) \prod_{s=1}^t
M_s(x_{s-1}, \mathrm{d} x_s) G_s(x_s)
\end{equation}
where $G_s(x_s) := f(y_s | x_s)$ and $L_t > 0$ is the normalising constant.
Moreover, $\mathbb{Q}_{-1} := \mathbb M_0$ and $L_{-1}:= 1$ by convention.
Equation~\eqref{eq:fkmodel} defines a Feynman-Kac model \citep{DelMoral:book}.
It does not require $M_t$ to admit a transition density, although herein we
only consider models where this assumption holds. Let $\lambda_t$ be a
dominating measure on $\mathcal X_t$ in the sense that there exists a function
$m_t$ (not necessarily tractable) such that
\begin{equation}
\label{eq:density_mt}
M_t(x_{t-1}, \mathrm{d} x_t) = m_t(x_{t-1}, x_t) \lambda_t(\mathrm{d} x_t).
\end{equation}
A special case of the current framework are linear Gaussian state space models.
They will serve as a running example for the article, and some of the results
will be specifically demonstrated for models of this class. The rationale is
that many real-world dynamics are partly, or close to, Gaussian. The notations
for linear Gaussian models are given in
Appendix~\ref{apx:linear_gaussian_models} and we will refer to them whenever
this model class is discussed.
Particle filters are algorithms that sample from $\mathbb{Q}_t(\mathrm{d} x_t)$ in an on-line
manner. In this article, we only consider the bootstrap particle filter
\citep{Gordon} and we detail its notations in Algorithm~\ref{algo:bootstrap}.
Many results in the following do apply to the auxiliary filter \citep{PittShep}
as well, and we shall as a rule indicate explicitly when it is \textit{not} the
case.
\begin{algo}{Bootstrap particle filter}\label{algo:bootstrap}
\KwIn{Feynman-Kac model~\eqref{eq:fkmodel}}
Simulate $X_0^{1:N} \overset{\text{i.i.d.}}{\sim} \mathbb M_0$\;
Set $\omega_0^n \gets G_0(X_0^n)$ for $n=1,\ldots, N$\;
Set $\ell_0^N \gets \sum_{n=1}^N \omega_0^n/N$\;
Set $W_0^n \gets \omega_0^n / N\ell_0^N$ for $n=1,\ldots, N$\;
\For{$t \gets 1$ \KwTo T}{
\underline{Resample}. Simulate $A_t^{1:N} \overset{\text{i.i.d.}}{\sim} \mathcal{M}(W_{t-1}^{1:N})$ \;
\underline{Move}. Simulate $X_t^n \sim M_t(X_{t-1}^{A_t^n}, \mathrm{d} x_t)$ for $n=1,\ldots, N$\;
\reweight
}
\KwOut{For all $t\geq 0$ and function $\varphi: \mathcal X_t \to \mathbb R$, the quantity $\sum_{n=1}^N W_t^n \varphi(X_t^n)$ approximates $\int \mathbb{Q}_t(\mathrm{d} x_{0:t}) \varphi(x_t)$ and the quantity $\ell_t^N$ approximates $L_t/L_{t-1}$}
\end{algo}
We end this subsection with the definition of two sigma-algebras that will be referred to throughout the paper. Using the notations of Algorithm~\ref{algo:bootstrap}, let
\begin{equation}
\begin{split}
\label{eq:def:sigma_algebra_ft}
\mathcal F_t &:= \sigma(X_{0:t}^{1:N}, A_{1:t}^{1:N}),\\
\mathcal F_t^- &:= \sigma(X_{0:t}^{1:N}).
\end{split}
\end{equation}
\subsection{Backward kernels and off-line smoothing}\label{sec:examples_bw_ker}
In this subsection, we first describe three examples of backward kernels, in
which we emphasise both the random measure and the random matrix viewpoints. We
then formalise their use by stating a generic off-line smoothing algorithm.
\begin{example}[FFBS algorithm] \label{exp:FFBS}
Once Algorithm~\ref{algo:bootstrap} has been run, the FFBS procedure generates
a trajectory approximating the smoothing distribution in a backward manner.
More precisely, it starts by simulating index $\mathcal{I}_T \sim
\mathcal{M}(W_T^{1:N})$ at time $T$. Then, recursively for $t= T, \ldots,
1$, given indices $\mathcal{I}_{t:T}$, it generates $\mathcal{I}_{t-1} \in
\px{1, \ldots, N}$ with probability proportional to $W_{t-1}^n m_t(X_{t-1}^n,
X_t^{\mathcal{I}_t})$. The smoothing trajectory is returned as $(X_0^{\mathcal
I_0}, \ldots, X_T^{\mathcal I_T})$. Formally, given
$\mathcal{F}_T$, the indices $\mathcal{I}_{0:T}$ are generated according to the
distribution
\[\mathcal{M}(W_t^{1:N})(\mathrm{d} i_T) \ps{B_T^{N,\mathrm{FFBS}} (i_T, \mathrm{d} i_{T-1}) B_{T-1}^{N, \mathrm{FFBS}}(i_{T-1}, \mathrm{d} i_{T-2}) \ldots B_1^{N, \mathrm{FFBS}}(i_1, \mathrm{d} i_0)}
\]
where the (random) backward kernels $B_t^{N, \mathrm{FFBS}}$ are defined by
\begin{equation}
\label{eq:ffbs_bw}
B_t^{N, \mathrm{FFBS}} (i_t, \mathrm{d} i_{t-1}) := \sum_{n=1}^N
\frac{W_{t-1}^n m_t(X_{t-1}^n, X_t^{i_t})}{\sum_{k=1}^N W_{t-1}^k
m_t(X_{t-1}^k, X_t^{i_t})} \delta_{n}.
\end{equation}
More simply, we can also look at these random kernels as random $N \times N$
matrices of which entries are given by
\begin{equation}
\label{eq:ffbs_mt}
\hat B_t^{N, \mathrm{FFBS}}[i_t, i_{t-1}] := \frac{W_{t-1}^{i_{t-1}}
m_t(X_{t-1}^{i_{t-1}}, X_t^{i_t})}{\sum_{k=1}^N W_{t-1}^{k}
m_t(X_{t-1}^{k}, X_t^{i_t})}.
\end{equation}
We will need both the kernel viewpoint~\eqref{eq:ffbs_bw} and the matrix
viewpoint~\eqref{eq:ffbs_mt} in this paper as the better choice depends on the
context.
\end{example}
\begin{example}[Genealogy tracking]\label{exp:GT}
It is well known that Algorithm~\ref{algo:bootstrap} already gives as a
by-product an approximation of the smoothing distribution. This information
can be extracted from the genealogy, by first simulating index
$\mathcal{I}_T \sim \mathcal{M}(W_T^{1:N})$ at time $T$, then successively
appending ancestors until time $0$ (i.e.\ setting sequentially
$\mathcal{I}_{t-1} \gets A_t^{\mathcal I_t}$). The smoothed trajectory is
returned as $(X_0^{\mathcal I_0}, \ldots, X_T^{\mathcal I_T})$. More
formally, conditioned on $\mathcal{F}_{T}$, we simulate the indices
$\mathcal I_{0:T}$ according to
\[\mathcal{M}(W_t^{1:N})(\mathrm{d} i_T) \ps{B_T^{N,\mathrm{GT}} (i_T, \mathrm{d} i_{T-1})
B_{T-1}^{N, \mathrm{GT}}(i_{T-1}, \mathrm{d} i_{T-2}) \ldots B_1^{N, \mathrm{GT}}(i_1,
\mathrm{d} i_0)}
\]
where GT stands for ``genealogy tracking'' and the kernels
$B_t^{N, \mathrm{GT}}$ are simply
\begin{equation}
\label{eq:bwk:pm}
B_t^{N, \mathrm{GT}}(i_t, \mathrm{d} i_{t-1}) := \delta_{A_t^{i_t}}(\mathrm{d} i_{t-1}).
\end{equation}
Again, it may be more intuitive to view this random kernel as a random
$N \times N$ matrix, the elements of which are given by
\[\hat B_t^{N, \mathrm{GT}}[i_t, i_{t-1}] := \mathbbm{1}\px{i_{t-1} = A_t^{i_t}}.
\]
\end{example}
\begin{example}[MCMC backward samplers]\label{eg:mcmc_smoother}
In Example~\ref{exp:GT}, the backward variable $\mathcal I_{t-1}$ is simply set to
$A_t^{\mathcal I_t}$. On the contrary, in Example~\ref{exp:FFBS}, we need to launch a
simulator for the discrete measure $W_{t-1}^n m_t(X_{t-1}^n, X_t^{\mathcal I_t})$.
Interestingly, the current value of $A_t^{\mathcal I_t}$ is not taken into account in
that simulator. Therefore, a natural idea to combine the two previous examples
is to apply one (or several) MCMC steps to $A_t^{\mathcal I_t}$ and assign the result
to $\mathcal I_{t-1}$. The MCMC algorithm operates on the space $\px{1, 2, \ldots,
N}$ and targets the invariant measure $W_{t-1}^n m_t(X_{t-1}^n, X_t^{\mathcal I_t})$.
If only one independent Metropolis-Hastings (MH) step is used and the proposal
is $\mathcal M(W_{t-1}^{1:N})$, the corresponding random matrix $\hat B_t^{N,
\mathrm{IMH}}$ has values
\[ \hat B_t^{N, \mathrm{IMH}}[i_t, i_{t-1}] =
W_{t-1}^{i_{t-1}} \min\pr{1, {m_t(X_{t-1}^{i_{t-1}},
X_t^{i_t})}/{m_t(X_{t-1}^{A_t^{i_t}}, X_t^{i_t})}}
\]
if $i_{t-1} \neq A_t^{i_t}$, and
\[
\hat B_t^{N, \mathrm{IMH}}[i_t, A_t^{i_t}] = 1 - \sum_{n \neq A_t^{i_t}}
\hat B_t^{N, \mathrm{IMH}}[i_t, n].
\]
This third example shows that some elements of the matrix $\bwm{IMH}$ might be
expensive to calculate. If several MCMC steps are performed, \textnormal{all}
elements of $\bwm{IMH}$ will have non-trivial expressions. Still, simulating
from $\bw{IMH}(i_t, \mathrm{d} i_{t-1})$ is easy as it amounts to running a standard
MCMC algorithm. MCMC backward samples are studied in more details in
Section~\ref{sec:mcmc_kernel}.
\end{example}
We formalise how off-line smoothing can be done given random matrices $\hat
B_{1:T}^N$; see Algorithm~\ref{algo:offline_generic}. Note that in the above
examples, our matrices $\hat B_t^N$ are $\mathcal{F}_t$-measurable (i.e.\ they
depend on particles and indices up to time $t$), but this is not necessarily
the case in general (i.e.\ they may also depend on additional random variables,
see Section~\ref{sec:generic_online}). Furthermore,
Algorithm~\ref{algo:offline_generic} describes how to perform smoothing using the
matrices $\hat B_{1:T}^N$, but does not say where they come from. At this
point, it is useful to keep in mind the above three examples. In
Section~\ref{sec:validity}, we will give a general recipe for constructing valid
matrices $\hat B_t^N$ (i.e.\ those that give a consistent algorithm).
\begin{algo}{Generic off-line smoother}\label{algo:offline_generic}
\KwIn{Filtering results $X_{0:T}^{1:N}$, $W_{0:T}^{1:N}$, and $A_{1:T}^{1:N}$ from Algorithm~\ref{algo:bootstrap}; random matrices $\hat B_{1:T}^N$ (see Section~\ref{sec:examples_bw_ker} for two examples of such matrices and Section~\ref{sec:validity} for a general recipe to construct them)}
\For{$n \gets 1$ \KwTo $N$}{
Simulate $\mathcal I_T^n \sim \mathcal{M}(W_T^{1:N})$\;
\For{$t \gets T$ \KwTo 1}{
Simulate $\mathcal I_{t-1}^n \sim B_t^N(\mathcal I_t^n, \mathrm{d} i_{t-1})$ (the kernel $B_t^N(\mathcal I_t, \cdot)$ is defined by the $\mathcal I_t$-th row of the input matrix $\hat B_t^N$) \;
}
}
\KwOut{The $N$ smoothed trajectories $(X_0^{\mathcal I_0^n}, \ldots, X_T^{\mathcal I_T^n})$ for $n = 1, \ldots, N$}
\end{algo}
Algorithm~\ref{algo:offline_generic} simulates, given $\mathcal{F}_T$
\textit{and} $\hat B_{1:T}^N$, $N$ i.i.d.\ index sequences $\mathcal I_{0:T}^n$, each distributed according to
\[\mathcal{M}(W_T^{1:N})(\mathrm{d} i_T) \prod_{t=T}^1 B_t^N(i_t, \mathrm{d} i_{t-1}).\]
Once the indices $\mathcal I_{0:T}^{1:N}$ are simulated, the $N$ smoothed
trajectories are returned as $(X_0^{\mathcal I_0^n}, \ldots, X_T^{\mathcal
I_T^n})$. Given $\mathcal F_T$ and $\hat B_{1:T}^N$, they are thus
conditionally i.i.d.\ and their conditional distribution is described by the $x_{0:T}$ component of the joint distribution
\begin{equation}
\label{eq:joint_empirical_smoothing}
\bar \mathbb{Q}_T^N(\mathrm{d} x_{0:T}, \mathrm{d} i_{0:T}) := \mathcal{M}(W_T^{1:N})(\mathrm{d} i_T) \ps{\prod_{t=T}^1 B_t^N(i_t, \mathrm{d} i_{t-1})} \ps{\prod_{t=T}^0 \delta_{X_t^{i_t}}(\mathrm{d} x_t)}.
\end{equation}
Throughout the paper, the symbol $\bar \mathbb{Q}_T^N$ will refer to this joint distribution, while the symbol $\mathbb{Q}_T^N$ will refer to the $x_{0:T}$-marginal of $\bar \mathbb{Q}_T^N$ only. This allows the notation $\mathbb{Q}_T^N \varphi$ to make sense, where $\varphi = \varphi(x_0, \ldots, x_T)$ is a real-valued function defined on the hidden states.
\subsection{Validity and convergence}\label{sec:validity}
The kernels $B_t^{N, \text{FFBS}}$ and $B_t^{N, \text{GT}}$ are both valid
backward kernels to generate convergent approximation of the smoothing
distribution \citep{DelMoral:book, Douc2011}. This subsection shows that they
are not the only ones and gives a sufficient condition for a backward kernel to
be valid. It will prove a necessary tool to build more efficient $B_t^N$ later
in the paper.
Recall that Algorithm~\ref{algo:bootstrap} outputs particles $X_{0:T}^{1:N}$,
weights $W_{0:T}^{1:N}$ and ancestor variables $A_{1:T}^{1:N}$. Imagine that
the $A_{1:T}^{1:N}$ were discarded after filtering has been done and we wish to
simulate them back. We note that, since the $X_{0:T}^{1:N}$ are given, the $T
\times N$ variables $A_{1:T}^{1:N}$ are conditionally i.i.d. We can thus
simulate them back from
\[p(a_t^n | x_{0:T}^{1:N})
= p(a_t^n | x_{t-1}^{1:N}, x_t^n)
\propto w_{t-1}^{a_t^n} m_t(x_{t-1}^{a_t^n}, x_t^n).
\]
This is precisely the distribution of $B_t^{N, \text{FFBS}}(n, \cdot)$. It
turns out that any other invariant kernel that can be used for simulating back
the discarded $A_{1:T}^{1:N}$ will lead to a convergent algorithm as well. For
instance, $\bw{GT}(n, \cdot)$ (Example~\ref{exp:GT}) simply returns back the
old $A_t^{n}$, unlike $\bw{FFBS}(n, \cdot)$ which creates a new version. The
kernel $\bw{IMH}(n, \cdot)$ (Example~\ref{eg:mcmc_smoother}) is somewhat an
intermediate between the two. We formalise these intuitions in the following
theorem. It is stated for the bootstrap particle filter, but as a matter of
fact, the proof can be extended straightforwardly to auxiliary particle
filters as well.
\begin{assumption}\label{asp:Gbound}
For all $0 \leq t \leq T$, $G_t(x_t) > 0$ and $\infnorm{G_t} < \infty$.
\end{assumption}
\begin{thm}\label{thm:convergence_mcmc}
We use the same notations as in Algorithms~\ref{algo:bootstrap} and
\ref{algo:offline_generic} (in particular, $\hat B_t^N$ denotes the transition
matrix that corresponds to the considered kernel $B_t^N$). Assume that for any
$1\leq t\leq T$, the random
matrix $\hat B_t^N$ satisfies the following conditions:
\begin{itemize}
\item given $\mathcal{F}_{t-1}$ and $\hat B_{1:t-1}^N$, the variables
$(X_t^n, A_t^n, \hat B_t^N(n, \cdot))$ for $n=1, \ldots, N$ are i.i.d.\
and their distribution only depends on $X_{t-1}^{1:N}$, where $\hat
B_t^N(n, \cdot)$ is the $n$-th row of matrix $\hat B_t^N$;
\item if $J_t^n$ is a random variable such that $J_t^n\ |\
X_{t-1}^{1:N}, X_t^n, \hat B_{t}^N(n, \cdot) \sim B_t^N(n, \cdot)$,
then $(J_t^n, X_t^n)$ has the same distribution as $(A_t^n, X_t^n)$
given $X_{t-1}^{1:N}$.
\end{itemize}
Then under Assumption~\ref{asp:Gbound}, there exists constants $C_T>0$ and
$S_T < \infty$ such that, for any $\varepsilon > 0$ and function $\varphi =
\varphi(x_0, \ldots, x_T)$:
\begin{equation} \label{eq:in_thm_convg}
\P\pr{\frac{\sqrt N}{S_T\norm{\varphi}_\infty} \abs{\mathbb{Q}_T^N \varphi
- \mathbb{Q}_T \varphi} \geq \varepsilon }
\leq 2 C_T e^{-{\varepsilon^2}/2}
\end{equation}
where $\mathbb{Q}_N^T$ is defined by \eqref{eq:joint_empirical_smoothing}.
\end{thm}
A typical relation between variables defined in the statement of the theorem is
illustrated by a graphical model in Figure~\ref{fig:thm1:variables}. (See
\citealt[Chapter 8]{Bishop:book} for the formal definition of graphical models
and how to use them.) By ``typical'', we mean that
Theorem~\ref{thm:convergence_mcmc} technically allows for more complicated
relations, but the aforementioned figure captures the most essential cases.
\begin{figure}
\centering
\begin{tikzpicture}[node distance={15mm}]
\node (xtm1) {$X_{t-1}^{1:N}$};
\node (atn) [right of=xtm1] {$A_t^n$};
\node (xtn) [below right of=xtm1] {$X_t^n$};
\node (btn) [below of=xtn] {$\hat B_t^N(n, \cdot)$};
\node (jtn) [right of=btn] {$J_t^n$};
\draw[->] (xtm1) -- (atn);
\draw[->] (xtm1) -- (xtn);
\draw[->] (atn) -- (xtn);
\draw[->] (xtm1) -- (btn);
\draw[->] (atn) -- (btn);
\draw[->] (xtn) -- (btn);
\draw[->] (btn) -- (jtn);
\end{tikzpicture}
\caption{Relation between variables described in
Theorem~\ref{thm:convergence_mcmc}.\label{fig:thm1:variables}}
\end{figure}
Theorem~\ref{thm:convergence_mcmc} is a generalisation of \citet[Theorem
5]{Douc2011}. Its proof thus follows the same lines
(Appendix~\ref{ap:proof:cvg}). However, in our case the measure $\mathbb{Q}_T^N(\mathrm{d}
x_{0:T})$ is no longer Markovian. This is because the backward kernel
$B_t^N(i_t, \mathrm{d} i_{t-1})$ does not depend on $X_t^{i_t}$ alone, but also
possibly on its ancestor and extra random variables.
As we have seen in~\eqref{eq:joint_empirical_smoothing}, $\mathbb{Q}_T^N$ is fundamentally a discrete measure of which the support contains $N^{T+1}$ elements. As such, $\mathbb{Q}_T^N \varphi$ cannot be computed exactly in general and must be approximated using $N$ trajectories $(X_0^{\mathcal I_0^n}, \ldots, X_T^{\mathcal I_T^n})$ simulated via Algorithm~\ref{algo:offline_generic}. Theorem~\ref{thm:convergence_mcmc} is thus completed by the following corollary, which is an immediate consequence of Hoeffding inequality (Appendix~\ref{ap:hoeffding}).
\begin{corollary}
Under the same setting as Theorem~\ref{thm:convergence_mcmc}, we have
\[
\P\pr{\frac{\sqrt N}{(S_T+1)\norm{\varphi}_\infty} \abs{\frac 1N \sum_n \varphi(X_0^{\mathcal I_0^n}, \ldots, X_T^{\mathcal I_T^n}) - \mathbb{Q}_T \varphi} \geq \varepsilon } \leq 2 (C_T+1) e^{-{\varepsilon^2}/2}.
\]
\end{corollary}
\subsection{Generic on-line smoother}
\label{sec:generic_online}
As we have seen in Section~\ref{sec:examples_bw_ker} and
Section~\ref{sec:validity}, in general, the expectation $\mathbb{Q}_T^N \varphi$, for a
real-valued function $\varphi=\varphi(x_0, \ldots, x_T)$ of the hidden states,
cannot be computed exactly due to the large support ($N^{T+1}$ elements) of
$\mathbb{Q}_T^N$. Moreover, in certain settings we are interested in the quantities
$\mathbb{Q}_t^N \varphi_t$ for different functions $\varphi_t$. They cannot be
approximated in an on-line manner without more assumptions on the connection
between $\varphi_{t-1}$ and $\varphi_t$. If the family $(\varphi_t)$ is
additive, i.e.\ there exists functions $\psi_t$ such that
\begin{equation}
\label{eq:add_func}
\varphi_t(x_{0:t}) := \psi_0(x_0) + \psi_1(x_0, x_1) + \cdots +
\psi_t(x_{t-1}, x_t)
\end{equation}
then we can calculate $\mathbb{Q}_t^N \varphi_t$ both exactly \textit{and} on-line. The
procedure was first described in \citet{DelMoral2010} for the kernel $\mathbb{Q}_t^{N,
\text{FFBS}}$ (i.e.\ the measure defined by
\eqref{eq:joint_empirical_smoothing} and the random kernels $B_t^{N,
\text{FFBS}}$), but we will use the idea for other kernels as well. In this
subsection, we first explain the principle of the method, then discuss its
computational complexity and the link to the PaRIS algorithm
\citep{Olsson2017}.
\subsubsection*{Principle}
For simplicity, we start with the special case $\varphi_t(x_{0:t}) =
\psi_0(x_0)$. Equation~\eqref{eq:joint_empirical_smoothing} and the matrix
viewpoint of Markov kernels then give
\[\mathbb{Q}_t^N \varphi_t = \fastmatrix{W_t^1 \ldots W_t^N} \hat B_t^N \hat B_{t-1}^N
\ldots \hat B_1^N \fastmatrix{\psi_0(X_0^1) \\ \vdots \\ \psi_0(X_0^N)}.
\]
This naturally suggests the following recursion formula to compute
$\mathbb{Q}_t^N \varphi_t$:
\[\mathbb{Q}_t^N \varphi_t = \fastmatrix{W_t^1 \ldots W_t^N} \hat S_t^N\]
with $\hat S_0^N = [\psi_0(X_0^1) \ldots \psi_0(X_0^N)]^\top$ and
\begin{equation}
\label{eq:generic_online_recursion_easy}
\hat S_t^N := \hat B_t^N \hat S_{t-1}^N.
\end{equation}
In the general case where functions $\varphi_t$ are given by
\eqref{eq:add_func}, simple calculations
(Appendix~\ref{proof:full_online_recursion}) show that
\eqref{eq:generic_online_recursion_easy} is replaced by
\begin{equation}
\label{eq:generic_online_recursion_hard}
\hat S_{t}^N := \hat B_t^N \hat S_{t-1}^N + \operatorname{diag}(\hat B_t^N \hat \psi_{t}^N)
\end{equation}
where the $N \times N$ matrix $\hat \psi_t^N$ is defined by
\[\hat \psi_t^N [i_{t-1}, i_t] := \psi_t(X_{t-1}^{i_{t-1}}, X_t^{i_t})\]
and the operator
$\operatorname{diag}: \mathbb R^{N \times N} \rightarrow \mathbb R^N$ extracts
the diagonal of a matrix. This is exactly what is done in
Algorithm~\ref{algo:online_generic}.
\begin{algo}{Generic on-line smoother for additive functions (one step)}
\label{algo:online_generic}
\KwIn{Particles $X_{t-1}^{1:N}$ and weights $W_{t-1}^{1:N}$ at time $t-1$;
the $N \times 1 $ vector $\hat S_{t-1}^N$ (see text); additive function~\eqref{eq:add_func}}
Generate $X^{1:N}_t$ and $W_t^{1:N}$ according to the particle filter
(Algorithm~\ref{algo:bootstrap}) \; Calculate the random matrix $\hat B_t^N$ (see Section~\ref{sec:examples_bw_ker} and Section~\ref{sec:validity})\;
Create the $N\times 1$ vector $\hat S_t^N$ according to~\eqref{eq:generic_online_recursion_hard}. More precisely:\;
\For{$i_t \gets 1$ \KwTo $N$}{
$\hat S_t^N[i_t] \gets \sum_{i_{t-1}} \hat B_t^N[i_t, i_{t-1}] \pr{\hat S_{t-1}^N[i_{t-1}] + \psi_t(X_{t-1}^{i_{t-1}}, X_t^{i_t})}$
}
\KwOut{Estimate $\sum_n W_t^n \hat S_t^N[n]$ of $\mathbb{Q}_t(\varphi_t)$; particles $X_t^{1:N}$, weights $W_t^{1:N}$ and vector $S_t^N$ for the next step}
\end{algo}
\subsubsection*{Computational complexity and the PaRIS algorithm}
Equations~\eqref{eq:generic_online_recursion_easy} and
\eqref{eq:generic_online_recursion_hard} involve a matrix-vector multiplication
and thus require, in general, $\mathcal{O}(N^2)$ operations to be evaluated.
When $\hat B_t^N \equiv \hat B_t^{N, \text{FFBS}}$,
Algorithm~\ref{algo:online_generic} becomes the $\mathcal O(N^2)$ on-line
smoothing
algorithm of~\cite{DelMoral2010}.
The $\mathcal{O}(N^2)$ complexity can however be lowered to $\mathcal{O}(N)$ if
the matrices $\hat B_t^N$ are \textit{sparse}. This is the idea behind the
PaRIS algorithm \citep{Olsson2017}, where the full matrix $\hat B_t^{N,
\text{FFBS}}$ is unbiasedly estimated by a sparse matrix $\hat B_t^{N,
\text{PaRIS}}$. More specifically, for any integer $\tilde N > 1$, for any $n
\in 1, \ldots, N$, let $J_t^{n, 1}, \ldots, J_t^{n, \tilde N}$ be conditionally
i.i.d.\ random variables simulated from $B_t^{N, \text{FFBS}}(n, \cdot)$. The
random matrix $\hat B_t^{N, \text{PaRIS}}$ is then defined as
\[\hat B_t^{N, \text{PaRIS}}[n,m] :=
\frac{1}{\tilde N} \sum_{\tilde n=1}^{\tilde N} \mathbbm{1}\px{J_t^{n,\tilde n} = m}
\]
and the corresponding random kernel is
\begin{equation}
\label{eq:bwk:paris}
B_t^{N, \text{PaRIS}}(n, \mathrm{d} m) =
\frac{1}{\tilde N} \sum_{\tilde n=1}^{\tilde N} \delta_{J_t^{n, \tilde n}}(\mathrm{d} m).
\end{equation}
The following straightforward proposition establishes the validity of the
$B_t^{N, \text{PaRIS}}$ kernel as well as the corresponding $\mathcal O(N)$
complexity of~\eqref{eq:generic_online_recursion_easy} and
\eqref{eq:generic_online_recursion_hard}, provided that $\tilde N$ is fixed as
$N \to \infty$.
\begin{prop}
The matrix $\hat B_t^{N, \mathrm{PaRIS}}$ has only $\mathcal{O}(N \tilde
N)$ non-zero elements out of $N^2$. It is an unbiased estimate of $\hat
B_t^{N, \mathrm{FFBS}}$ in the sense that
\[\CE{\hat B_t^{N, \mathrm{PaRIS}}}{\mathcal F_t} = \hat B_t^{N,
\mathrm{FFBS}}. \] Moreover, the sequence of matrices $B_{1:T}^{N,
\mathrm{PaRIS}}$ satisfies the two conditions of
Theorem~\ref{thm:convergence_mcmc}.
\end{prop}
It is important to remark that the $\mathcal O(N)$ complexity only refers to
the cost of computing the recursions~\eqref{eq:generic_online_recursion_easy}
and~\eqref{eq:generic_online_recursion_hard}. It does not include the cost of
generating the matrices $\hat B_t^{N, \text{PaRIS}}$ themselves, i.e., the
operations required to simulate the indices $J_t^{n, \tilde n}$. In
\citet{Olsson2017} it is argued that such simulations have an $\mathcal{O}(N)$
cost using the rejection sampling method whenever the transition density is
both upper and lower bounded. Section~\ref{sec:ffbs_kernel} investigates the
claim when this hypothesis is violated.
\subsection{Stability}
When $\hat B_t^N \equiv \hat B_t^{N, \text{GT}}$,
Algorithms~\ref{algo:offline_generic} and \ref{algo:online_generic} reduce to
to the genealogy tracking smoother \citep{Kitagawa1996}. The matrix
$\hat B_t^{N, \text{GT}}$ is indeed sparse, leading to the well-known
$\mathcal{O}(N)$ complexity of this on-line procedure. As per
Theorem~\ref{thm:convergence_mcmc}, smoothing via genealogy tracking is
convergent at rate $\mathcal{O}(N^{-1/2})$ if $T$ is \textit{fixed}. When $T
\to \infty$ however, all particles will eventually share the same ancestor at
time $0$ (or any fixed time $t$). Mathematically, this phenomenon is manifested
in two ways: (a) for fixed $t$ and function $\phi_t: \mathcal X_t \to \mathbb
R$, the error of estimating $\mathbb{E}[\phi_t(X_t) | Y_{0:T}]$ grows linearly with
$T$; and (b) the error of estimating $\CE{\sum_{t=0}^T \psi_t(x_{t-1},
x_t)}{Y_{0:T}}$ grows quadratically with $T$. These correspond respectively to
the degeneracy for the fixed marginal smoothing and the additive smoothing
problems; see also the introductory section of \citet{Olsson2017} for a
discussion. The random matrices $\hat B_t^{N, \text{GT}}$ are therefore said to
be \textit{unstable} as $T \to \infty$, which is not the case for $\hat B_t^{N,
\text{FFBS}}$ or $\hat B_t^{N, \text{PaRIS}}$. This subsection gives sufficient
conditions to ensure the stability of a general $\hat B_t^N$.
The essential point behind smoothing stability is simple: the support of
$B_t^{N, \mathrm{FFBS}}(n, \cdot)$ or $B_t^{N, \mathrm{PaRIS}}(n, \cdot)$ for
$\tilde N \geq 2$ contains more than one element, contrary to that of $B_t^{N,
\mathrm{GT}}(n, \cdot)$. This property is formalised by~\eqref{eq:support_cond}.
To explain the intuitions, we use the notations of
Algorithm~\ref{algo:offline_generic} and consider the estimate
\begin{equation*}
N^{-1}
\pr{\psi_0(X_0^{\mathcal I_0^1}) + \cdots + \psi_0(X_0^{\mathcal I_0^N})}
\end{equation*}
of $\CE{\psi_0(X_0)}{Y_{0:T}}$ when $T \to \infty$. The variance of the quantity
above is a sum of $\mathrm{Cov}(\psi_0(X_0^{\mathcal I_0^i}),
\psi_0(X_0^{\mathcal I_0^j}))$ terms. It can therefore be understood by looking
at a pair of trajectories simulated using Algorithm~\ref{algo:offline_generic}.
At final time $t=T$, $\mathcal I_T^1$ and $\mathcal I_T^2$ both follow the
$\mathcal{M}(W_T^{1:N})$ distribution. Under regularity conditions (e.g.\ no
extreme weights), they are likely to be different, i.e., $\P(\mathcal I_T^1 =
\mathcal{I}_T^2) = \mathcal O(1/N)$. This property can be propagated backward:
as long as $\mathcal I_t^1 \neq \mathcal I_t^2$, the two variables $\mathcal
I_{t-1}^1$ and $\mathcal{I}_{t-1}^2$ are also likely to be different, with
however a small $\mathcal{O}(1/N)$ chance of being equal. Moreover, as long as
the two trajectories have not met, they can be simulated independently given
$\mathcal F_T^-$ (the sigma algebra defined
in~\eqref{eq:def:sigma_algebra_ft}). In mathematical terms, under the two
hypotheses of Theorem~\ref{thm:convergence_mcmc}, given $\mathcal{F}_T^-$ and
$\mathcal{I}_{t:T}^{1,2}$, it can be proved that the two variables
$\mathcal{I}_{t-1}^1$ and $\mathcal I_{t-1}^2$ are independent if $\mathcal
I_t^1 \neq \mathcal I_t^2$ (Lemma~\ref{lem:two_backward_traj},
Appendix~\ref{proof:thm:stability}).
Since there is an $\mathcal{O}(1/N)$ chance of meeting at each time step, if $T \gg N$, it is likely that the two paths will meet at some point $t \gg 0$. When $\mathcal{I}_t^1 = \mathcal I_t^2$, the two indices $\mathcal I_{t-1}$ and $\mathcal I_{t-2}$ are both simulated according to $B_t^N(\mathcal I_t^1, \cdot)$. In the genealogy tracking algorithm, $B_t^{N, \text{GT}}(i, \cdot)$ is a Dirac measure, leading to $\mathcal I_{t-1}^1 = \mathcal{I}_{t-1}^2$ almost surely. This spreads until time $0$, so $\operatorname{Corr}(\psi_0(X_0^{\mathcal I_0^1}), \psi_0(X_0^{\mathcal I_0^2}))$ is almost $1$ if $T \gg N$.
Other kernels like $B_t^{N, \text{FFBS}}$ or $B_t^{N, \text{PaRIS}}$ do not suffer from the same problem. For these, the support size of $B_t^{N}(\mathcal I_t^1, \cdot)$ is greater than one and thus there is some real chance that $\mathcal I_{t-1}^1 \neq \mathcal{I}_{t-1}^2$. If that does happen, we are again back to the regime where the next states of the two paths can be simulated independently. Note also that the support of $B_t^{N}(\mathcal I_t^1, \cdot)$ does not need to be large and can contain as few as $2$ elements. Even if $\mathcal I_{t-1}^1$ might still be equal to $\mathcal I_{t-1}^2$ with some probability, the two paths will have new chances to diverge at times $t-2$, $t-3$ and so on. Overall, this makes $\operatorname{Corr}(\psi_0(X_0^{\mathcal I_0^1}), \psi_0(X_0^{\mathcal I_0^2}))$ quite small (Lemma~\ref{lem:cond_covar_two_traj}, Appendix~\ref{proof:thm:stability}).
We formalise these arguments in the following theorem, whose proof
(Appendix~\ref{proof:thm:stability}) follows them very closely. The price for
proof intuitiveness is that the theorem is specific to the bootstrap filter,
although numerical evidence (Section~\ref{sec:numexp}) suggests that other filters
are stable as well.
\begin{assumption}\label{asp:mt_2ways_bound}
The transition densities $m_t$ are upper and lower bounded:
\[\bar M_\ell \leq m_t(x_{t-1}, x_t) \leq \bar M_h\]
for constants $0 < \bar M_\ell < \bar M_h < \infty$.
\end{assumption}
\begin{assumption}\label{asp:g_2ways_bound}
The potential functions $G_t$ are upper and lower bounded:
\[ \bar G_\ell \leq G_t(x_t) \leq \bar G_h \]
for constants $0 < \bar G_\ell < \bar G_h < \infty$.
\end{assumption}
\textbf{Remark.} Since Assumption~\ref{asp:mt_2ways_bound} implies that the
$\mathcal X_t$'s are compact, Assumption~\ref{asp:Gbound} automatically implies
Assumption~\ref{asp:g_2ways_bound} as soon as the $G_t$'s' are continuous functions.
\begin{thm}\label{thm:stability}
We use the notations of Algorithms~\ref{algo:bootstrap}
and~\ref{algo:offline_generic}. Suppose that
Assumptions~\ref{asp:mt_2ways_bound} and~\ref{asp:g_2ways_bound} hold and
the random kernels $B_{1:T}^{N}$ satisfy the conditions of
Theorem~\ref{thm:convergence_mcmc}. If, in addition, for the pair of random
variables $(J_t^{n, 1}, J_t^{n, 2})$ whose distribution given
$X_{t-1}^{1:N}$, $X_t^n$ and $\hat B_t^N(n, \cdot)$ is defined by $B_t^N(n,
\cdot) \otimes B_t^N(n, \cdot)$, we have
\begin{equation}
\label{eq:support_cond}
\CProb{J_t^{n,1}\neq J_t^{n,2}}{ X_{t-1}^{1:N}, X_t^n} \geq \varepsilon_{\mathrm{S}}
\end{equation}
for some $\varepsilon_{\mathrm{S}} > 0$ and all $t$, $n$, $m$; then there exists a constant
$C$ not depending on $T$ such that:
\begin{itemize}
\item fixed marginal smoothing is stable, i.e.\ for $s \in \px{0, \ldots, T}$
and a real-valued function $\phi_s: \mathcal{X}_s \to \mathbb R$ of the
hidden state $X_s$, we have
\begin{equation}
\label{eq:thm_stability_fixed} \mathbb{E}\ps{\pr{\int \mathbb{Q}_T^N(\mathrm{d} x_s)
\phi_s(x_s) - \CE{\phi_s(X_s)}{Y_{0:T}}}^2} \leq \frac{C
\infnorm{\phi_s}^2}{N};
\end{equation}
\item additive smoothing is stable, i.e.\ for $T \geq 2$ and the function
$\varphi_T$ defined in \eqref{eq:add_func}, we have
\begin{equation}
\label{eq:thm_stability_additive}
\mathbb{E}\ps{\pr{\mathbb{Q}_T^N(\varphi_T) - \mathbb{Q}_T(\varphi_T)}^2} \leq
\frac{C\sum_{t=0}^T \infnorm{\psi_t}^2}{N} \pr{1 + \sqrt{\frac
TN}}^2.
\end{equation}
\end{itemize}
\end{thm}
The $(1+\sqrt{T/N})^2$ term in \eqref{eq:thm_stability_additive} first appeared
in \citet[Theorem 3.1]{DubarryLeCorff2011} (which we used in our proof) and we
do not know whether it can be dropped. However, it does not affect the scaling
of the algorithm. Indeed, with or without it, the inequality implies that in
order to have a constant error in the additive smoothing problem, one only has
to take $N=\mathcal O(T)$ (instead of $N = \mathcal O(T^2)$ without backward
sampling). Moreover, from an asymptotic point of view, we always have
$\sigma^2(T) = \mathcal O(T)$ regardless of the presence of the $(1 +
\sqrt{T/N})^2$ term, where
\[\sigma^2(T) := \lim_{N\to\infty} N \mathbb{E}\ps{\pr{\mathbb{Q}_T^N(\varphi_T) -
\mathbb{Q}_T(\varphi_T)}^2}. \]
Theorem~\ref{thm:stability} is stated under strong assumptions (similar to
those used in \citealt[Chapter 11.4]{SMCbook}, and slightly stronger than
\citealt[Assumption 4]{Douc2011}). On the other hand, it applies to a large class
of backward kernels (rather than only FFBS), including the new ones introduced
in the forthcoming sections.
\section{Sampling from the FFBS Backward Kernels}
\label{sec:ffbs_kernel}
Sampling from the FFBS backward kernel lies at the heart of both the FFBS
algorithm (Example~\ref{exp:FFBS}) and the PaRIS one
(Section~\ref{sec:generic_online}). Indeed, at time $t$, they require
generating random variables distributed according to $\btn{FFBS}(i_t, \mathrm{d}
i_{t-1})$ for $i_t$ running from $1$ to $N$. Since sampling from a discrete
measure on $N$ elements requires $\mathcal O(N)$ operations (e.g.\ via CDF inversion), the total computational cost becomes $\mathcal{O}(N^2)$. To reduce this, we start by considering the subclass of models satisfying the following assumption, which is much weaker than Assumption~\ref{asp:mt_2ways_bound}.
\begin{assumption}
\label{asp:Ct}
The transition density $m_t(x_{t-1}, x_t)$ is strictly positive and upper bounded, i.e.\ there exists $\bar M_h > 0$ such that $0 < m_t(x_{t-1}, x_t) \leq \bar M_h, \forall \ (x_{t-1}, x_t)$.
\end{assumption}
The motivation for the first condition $0 < m_t(x_{t-1}, x_t)$ will be clear
after Assumption~\ref{asp:space} is defined. For now, we see that it is
possible to sample from $\btn{FFBS}(i_t, \mathrm{d} i_{t-1})$ using rejection sampling
via the proposal distribution $\mathcal{M}(W_{t-1}^{1:N})$. After an $\mathcal
O(N)$-cost initialisation, new draws can be simulated from the proposal in
amortised $\mathcal O(1)$ time; see \citet[Python Corner, Chapter 9]{SMCbook},
see also \citet[Appendix B.1]{Douc2011} for an alternative algorithm with a
$\mathcal O(\log N)$ cost per draw. The resulting procedure is summarised in
Algorithm~\ref{algo:pure_rejection_sampler}. Compared to traditional FFBS or
PaRIS implementations, these rejection--based variants have a random
execution time that is more difficult to analyse. Under
Assumption~\ref{asp:mt_2ways_bound}, \citet{Douc2011} and \citet{Olsson2017}
derive an $\mathcal O(N \bar M_h/\bar M_\ell)$ expected complexity. However, the
general picture, where the state space is not compact and only
Assumption~\ref{asp:Ct} holds, is less clear.
\begin{algo}{Pure rejection sampler for simulating from $\bw{FFBS}(i_t, \mathrm{d} i_{t-1})$}
\label{algo:pure_rejection_sampler}
\KwIn{Particles $X_{t-1}^{1:N}$ and weights $W_{t-1}^{1:N} $ at time $t-1$; particle $X_t^{i_t}$ at time $t$; constant $\bar M_h$; pre-initialised $\mathcal{O}(1)$ sampler for $\mathcal{M}(W_{t-1}^{1:N})$}
\Repeat{$U\leq m_t(X_{t-1}^{\mathcal I_{t-1}}, X_t^{i_t})/\bar M_h$}{
$\mathcal I_{t-1} \sim \mathcal{M}(W_{t-1}^{1:N})$ using the pre-initialised $\mathcal{O}(1)$ sampler \;
$U \sim \operatorname{Unif}[0,1]$\;
}
\KwOut{$\mathcal I_{t-1}$, which is distributed according to $\bw{FFBS} (i_t, \mathrm{d} i_{t-1})$. }
\end{algo}
The present subsection intends to fill this gap. Our main focus is the PaRIS
algorithm of which the presentation is simpler. Results for the FFBS algorithm
can be found in Appendix~\ref{apx:ffbs_exec_result}. We restrict ourselves to
the case where $\mathcal X_t = \mathbb R^{d_t}$, although extensions to other
non compact state spaces are possible. Only the bootstrap particle filter is
considered, and results from this section do \textit{not} extend trivially to
other filtering algorithms. In Section~\ref{sec:numexp}, we shall employ
different types of particle filters and see that the performance could change
from one type to another, which is an additional weak point of rejection-based
algorithms.
\begin{assumption}
\label{asp:space}
The hidden state $X_t$ is defined on the space $\mathcal{X}_t = \mathbb{R}^{d_t}$. The measure $\lambda_t(\mathrm{d} x_t)$ with respect to which the transition density $m_t(x_{t-1}, x_t)$ is defined (cf. \eqref{eq:density_mt}) is the Lebesgue measure on $\mathbb R^{d_t}$.
\end{assumption}
This assumption together with the condition $m_t(x_{t-1}, x_t) > 0$ of
Assumption~\ref{asp:Ct} ensures that the state space model is ``truly
non-compact''. Indeed, if $m_t(x_{t-1}, x_t)$ is zero whenever $x_{t-1} \notin
\mathcal C_{t-1}$ or $x_t \notin \mathcal C_t$, where $\mathcal C_{t-1}$ and
$\mathcal C_t$ are respectively two compact subsets of $\mathbb R^{d_{t-1}}$
and $\mathbb R^{d_t}$, then we are basically reduced to a state space model
where $\mathcal X_{t-1} = \mathcal C_{t-1}$ and $\mathcal X_t = \mathcal C_t$.
\subsection{Complexity of PaRIS algorithm with pure rejection sampling}
We consider the PaRIS algorithm (i.e.\ Algorithm~\ref{algo:online_generic} using the $\bw{PaRIS}$ kernels). Algorithm~\ref{algo:paris_concrete} provides a concrete description of the resulting procedure, using the bootstrap particle filter. At each time $t$, let $\tau_t^{n, \mathrm{PaRIS}}$ be the number of rejection trials required to sample from $\btn{FFBS}(n, \mathrm{d} m)$. We then have
\begin{equation}
\label{eq:dist_tau_N}
\tau_t^{n, \mathrm{PaRIS}} \textrm{ } | \textrm{ } \mathcal{F}_{t-1}, X_t^n \sim \operatorname{Geo}\pr{\frac{\sum_i W_{t-1}^i m_t(X_{t-1}^i, X_t^n)}{\bar M_h}}
\end{equation}
with $\bar M_h$ defined in Assumption~\ref{asp:Ct}.
\begin{algo}{Concrete implementation of PaRIS algorithm (i.e.\ Algorithm~\ref{algo:online_generic} with the $\bw{PaRIS}$ backward kernel) using the bootstrap particle filter}
\label{algo:paris_concrete}
\KwIn{Particles $X_{t-1}^{1:N}$; weights $W_{t-1}^{1:N}$; vector $S_{t-1}^N$ in $\mathbb{R}^N$; pre-initialised sampler for $\mathcal{M}(W_{t-1}^{1:N})$; function $\psi_t$ (cf. \eqref{eq:add_func}); user-specified parameter $\tilde N$}
\For{$n \gets 1$ \KwTo $N$ }{
$A_t^n \sim \mathcal{M}(W_{t-1}^{1:N})$ $(\star)$\;
$X_t^n \sim M_t(X_{t-1}^{A_t^n}, \mathrm{d} x_t)$ \;
Simulate $J_t^{n, 1:\tilde N} \overset{\textrm{i.i.d.}}{\sim} \bw{FFBS}(n, \mathrm{d} n') $ using either the pure rejection sampler (Algorithm~\ref{algo:pure_rejection_sampler}) or the hybrid rejection sampler (Algorithm~\ref{algo:hybrid_rejection_sampler})\;
$S_t^N[n] \gets \tilde N^{-1} \sum_{\tilde n=1}^{\tilde N} \px{ S_{t-1}^N[J_t^{n, \tilde n}] + \psi_t(X_{t-1}^{J_t^{n, \tilde n}}, X_t^n)}$\;
}
\For{$n \gets 1$ \KwTo $N$}{
$W_t^n \gets G_t(X_t^n)/\sum_{i} G_t(X_t^i)$\;
}
$\mu_t^N \gets \sum_{n=1}^N W_t^n S_t^N(n)$\;
Initialise a sampler for $\mathcal{M}(W_t^{1:N})$\;
\KwOut{Estimate $\mu_t^N$ of $\CE{\varphi(X_{0:t})}{Y_{0:t}}$; particles $X_t^{1:N}$; weights $W_t^{1:N}$; vector $S_t^N$ in $\mathbb{R}^N$ and pre-initialised sampler $\mathcal{M}(W_t^{1:N})$ for the next iteration}
\end{algo}
By exchangeability of particles, the expected cost of the PaRIS algorithm at
step $t$ is proportional to $N\tilde N \mathbb{E}[\tau_t^{1, \mathrm{PaRIS}}]$, where $\tilde N$
is a fixed user-chosen parameter. Occasionally, $X_t^1$ falls into an unlikely
region of $\mathbb R^d$ and the acceptance rate becomes low. In other words,
$\tau_t^{1, \mathrm{PaRIS}}$ is a mixture of geometric distribution, some components of
which might have a large expectation. Unfortunately, these inefficiencies add up
and produce an unbounded execution time in expectation, as shown in the
following proposition.
\begin{prop}
\label{prop:inf_expectation}
Under Assumptions~\ref{asp:Ct} and~\ref{asp:space}, the version of Algorithm~\ref{algo:paris_concrete} using the pure rejection sampler satisfies $\mathbb{E}[\tau_t^{1, \mathrm{PaRIS}}] = \infty$, where $\tau_t^{1,\mathrm{PaRIS}}$ is defined in \eqref{eq:dist_tau_N}.
\end{prop}
\begin{proof}
We have
\begin{align*}
\mathbb{E}[\tau_t^{1,\mathrm{PaRIS}}] &= \bar M_h \mathbb{E}\ps{\frac{1}{\sum_n m_t(X_{t-1}^n, X_t^1)
W_{t-1}^n}} \quad \textrm{via \eqref{eq:dist_tau_N}} \\
&= \bar M_h \mathbb{E}\ps{\CE{\frac{1}{\sum_n m_t(X_{t-1}^n, X_t^1) W_{t-1}^n}}{\mathcal{F}_{t-1}}} \\
&= \bar M_h \mathbb{E}\ps{\int_{\mathcal{X}_t} \frac{1}{\sum_n m_t(X_{t-1}^n, x) W_{t-1}^n}\pr{\sum m_t(X_{t-1}^n, x) W_{t-1}^n} \lambda_t(\mathrm{d} x)} \\
&= \bar M_h \mathbb{E}\ps{\int_{\mathcal{X}_t} 1 \times \lambda_t(\mathrm{d} x)} = \infty
\quad\textrm{by Assumption~\ref{asp:space}}.
\end{align*}
\end{proof}
As we mentioned in Subsection~\ref{sec:motivation}, a heavy-tailed execution
time for each individual particle is not suitable for highly parallel
environments, since a small number of processors might block the whole system.
In a non-parallel setting, an execution time without expectation is essentially
unpredictable. A common practice to estimate execution time is to run a certain
algorithm with a small number $N$ of particles, then ``extrapolate'' to the
$N_\mathrm{final}$ of the definitive run. However, as $\mathbb{E}[\tau_t^{1, \mathrm{PaRIS}}]$ is
infinite for any $N$, it is unclear what kind of information we might get from
preliminary runs. In Appendix~\ref{apx:ffbs_exec_result}, besides studying the
execution time of rejection-based implementations of the FFBS algorithm, we
will delve deeper into the difference between the non-parallel and parallel
computing.
From the proof of Proposition~\ref{prop:inf_expectation}, it is clear that the
quantity $\sum_n W_{t-1}^n m_t(X_{t-1}^n, x_t)$ will play a key role in the
upcoming developments. We thus define it formally.
\begin{defi}
\label{def:rt}
The true predictive density function $r_t$ and its approximation $r_t^N$ are defined as
\begin{align*}
r_t(x_t) &:= \frac{(\mathbb{Q}_{t-1}M_t)(\mathrm{d} x_t)}{\lambda_t(\mathrm{d} x_t)} \\
r_t^N(x_t) &:= \sum W_{t-1}^n m_t(X_{t-1}^n, x_t)
\end{align*}
where the first equation is understood in the sense of the Radon-Nikodym derivative and the density $m_{t-1}(x_{t-1}, x_t)$ is defined with respect to the dominating measure $\lambda_t(\mathrm{d} x_t)$ on $\mathcal X_t$ (cf. \eqref{eq:density_mt}).
\end{defi}
\subsection{Hybrid rejection sampling} \label{subsect:hybrid}
To solve the aforementioned issues of the pure rejection sampling procedure, we
propose a hybrid rejection sampling scheme. The basic observation is that, for
a single
$m$, direct simulation (e.g.\ via CDF inversion) of $\bw{FFBS}(i_t, \mathrm{d}
i_{t-1})$ costs $\mathcal{O}(N)$. Thus, once $K = \mathcal O(N)$ rejection
sampling trials have been attempted, one should instead switch to a direct
simulation method. In other words, it does not make sense (at least
asymptotically) to switch to direct sampling after $K$ trials if $K \ll
\mathcal{O}(N)$ or $K \gg \mathcal{O}(N)$. The validity of this method is
established in the following proposition, where we actually allow $K$ to depend
on trails drawn so far. The proof, which is \textit{not} an immediate
consequence of the validity of ordinary rejection sampling, is given in
Appendix~\ref{apx:proof:hybrid_validity}.
\begin{prop}
\label{prop:hybrid_validity}
Let $\mu_0(x)$ and $\mu_1(x)$ be two probability densities defined on some
measurable space $\mathcal X$ with respect to a dominating measure
$\lambda(\mathrm{d} x)$. Suppose that there exists $C>0$ such that $\mu_1(x) \leq
C\mu_0(x)$. Let $(X_1, U_1), (X_2, U_2), \ldots$ be a sequence of i.i.d.
random variables distributed according to $\mu_0 \otimes
\operatorname{Unif}[0,1]$ and let $X^* \sim \mu_1$ be independent of that
sequence. Put
\[K^* := \inf \px{n \in \mathbb Z_{\geq 1} \textrm{ such that } U_n
\leq \frac{\mu_1(X_n)}{C\mu_0(X_n)}} \]
and let $K$ be \textnormal{any} stopping time with respect to the natural
filtration associated with the sequence $\px{(X_n, U_n)}_{n=1}^\infty$. Let $Z$
be defined as
\begin{equation*}
Z := \begin{cases}
X_{K^*} &\text{if } K^* \leq K \\
X^* &\text{otherwise.}
\end{cases}
\end{equation*}
Then $Z$ is $\mu_1$-distributed.
\end{prop}
Proposition~\ref{prop:hybrid_validity} thus allows users to pick $K = \alpha N$, where $\alpha > 0$ might be chosen somehow adaptively from earlier trials. In the following, we only consider the simple rule $K = N$, which does not induce any loss of generality in terms of the asymptotic behaviour and is easy to implement. The resulting iteration is described in Algorithm~\ref{algo:hybrid_rejection_sampler}.
\begin{algo}{Hybrid rejection sampler for simulating from $\bw{FFBS}(i_t, \mathrm{d} i_{t-1})$}
\label{algo:hybrid_rejection_sampler}
\SetKw{KwNot}{not}
\SetKw{KwBreak}{break}
\KwIn{Particles $X_{t-1}^{1:N}$ and weights $W_{t-1}^{1:N} $ at time $t-1$; particle $X_t^{i_t}$ at time $t$; constant $\bar M_h$; pre-initialised $\mathcal{O}(1)$ sampler for $\mathcal{M}(W_{t-1}^{1:N})$}
$accepted \gets \operatorname{False}$ \;
\For{$i\gets 1$ \KwTo $N$}{
$\mathcal I_{t-1} \sim \mathcal{M}(W_{t-1}^{1:N})$ using the pre-initialised $\mathcal{O}(1)$ sampler \;
$U \sim \operatorname{Unif}[0,1]$ \;
\If{$U \leq m_t(X_{t-1}^{\mathcal I_{t-1}}, X_t^{i_t})/ \bar M_h$}{
$accepted \gets \operatorname{True}$ \;
\KwBreak \;
}
}
\If{\KwNot $accepted$}{
$\mathcal I_{t-1} \sim \mathcal{M}(W_{t-1}^n m(X_{t-1}^n, X_t^{i_t}))$\;
}
\KwOut{$\mathcal I_{t-1}$, which is distributed according to $\bw{FFBS}(i_t, \mathrm{d} i_{t-1})$. }
\end{algo}
When applied in the context of Algorithm~\ref{algo:paris_concrete},
Algorithm~\ref{algo:hybrid_rejection_sampler} gives a smoother of expected
complexity proportional to
\[N\tilde N \mathbb{E}[\min(\tau_t^{1, \mathrm{PaRIS}})]
\]
at time $t$, where $\tau_t^{1, \mathrm{PaRIS}}$ is defined in \eqref{eq:dist_tau_N}).
This quantity is no longer infinite, but its growth when $N \to \infty$ might
depend on the model. Still, in all cases, it remains strictly larger than
$\mathcal{O}(N)$ and strictly smaller than $\mathcal{O}(N^2)$. Perhaps more
surprisingly, in linear Gaussian models (see
Appendix~\ref{apx:linear_gaussian_models} for detailed notations), the smoother
is of near-linear complexity (up to log factors). The following two theorems
formalise these claims.
\begin{assumption}
\label{asp:continuous} The predictive density $r_t$ of $X_t$ given
$Y_{0:t-1}$ and the potential function $G_t$ are continuous functions on
$\mathbb{R}^{d_t}$. The transition density $m_t(x_{t-1}, x_t)$ is a
continuous function on $\mathbb{R}^{d_{t-1}} \times \mathbb{R}^{d_t}$.
\end{assumption}
\begin{thm}
\label{thm:intermediate_perf}
Under Assumptions~\ref{asp:Gbound}, \ref{asp:Ct}, \ref{asp:space} and \ref{asp:continuous}, the version of Algorithm~\ref{algo:paris_concrete} using the hybrid rejection sampler (Algorithm~\ref{algo:hybrid_rejection_sampler}) satisfies $\lim_{N \to \infty} \mathbb{E}[\min(\tau_t^{1, \mathrm{PaRIS}}, N)] = \infty$ and $\lim_{N \to \infty} {\mathbb{E}[\min(\tau_t^{1,\mathrm{PaRIS}}, N)]}/{N} = 0$, where $\tau_t^{1,\mathrm{PaRIS}}$ is defined in \eqref{eq:dist_tau_N}.
\end{thm}
\begin{thm}
\label{thm:near_linear}
We assume the same setting as Theorem~\ref{thm:intermediate_perf}. In linear Gaussian state space models (Appendix~\ref{apx:linear_gaussian_models}), we have $\mathbb{E}[\min(\tau_t^{1,\mathrm{PaRIS}}, N)] = \mathcal{O}((\log N)^{d_t/2})$.
\end{thm}
\section{Alternative backward kernels}
\subsection{MCMC Backward Kernels}
\label{sec:mcmc_kernel}
This subsection analyses and extends the MCMC backward kernel defined in
Example~\ref{eg:mcmc_smoother}. As we remarked there, the matrix $\bwm{IMH}$ is
not sparse and even has some expensive-to-evaluate entries. We thus reserve it
for use in the off-line smoother (Algorithm~\ref{algo:offline_generic}) whereas
in the on-line scenario (Algorithm~\ref{algo:online_generic}), we use its
PaRIS-like counterpart
\begin{equation}
\label{eq:mcmc_paris_kernel}
\bwm{IMHP}[i_t, i_{t-1}] := \frac{1}{\tilde N} \sum_{\tilde n=1}^{\tilde N} \mathbbm 1\px{i_{t-1} = \tilde J_{t}^{i_t, \tilde n}}
\end{equation}
where $\tilde J_t^{i_t, 1:\tilde N}$ is an independent Metropolis-Hastings
chain started at $J_t^{i_t, 1} := A_t^{i_t}$, targeting the measure
$\btn{FFBS}(i_t, \mathrm{d} i_{t-1})$ and using the proposal distribution $\mathcal
M(W_{t-1}^{1:N})$. The validity and the stability of $\bwm{IMH}$ and
$\bwm{IMHP}$ are established in the following simple proposition (proved in
Appendix~\ref{apx:proof:mcmc_validity}). For simplicity, only the case $\tilde
N=2$ is examined, but as a matter of fact, the proposition remains true for
$\tilde N \geq 2$.
\begin{prop}
\label{prop:mcmc_validity}
The kernels $\btn{IMH}$ and $\btn{IMHP}$ with $\tilde N=2$ satisfy the hypotheses of Theorem~\ref{thm:convergence_mcmc} and, under Assumptions~\ref{asp:mt_2ways_bound} and~\ref{asp:g_2ways_bound}, those of Theorem~\ref{thm:stability}. Hence, their respective uses in Algorithms~\ref{algo:offline_generic} and~\ref{algo:online_generic} guarantee a convergent and stable smoother.
\end{prop}
The advantages of independent Metropolis-Hastings MCMC kernels compared to the
rejection samplers of Section~\ref{sec:ffbs_kernel} are the dispensability of
specifying an explicit $\bar M_h$ and the deterministic nature of the execution
time. It is not hard to imagine situations where some proposal smarter than
$\mathcal M(W_{t-1}^{1:N})$ would be beneficial. However, we only consider that
one here, mainly because it already performs satisfactorily in our numerical
examples.
\subsection{Dealing with intractable transition densities}
\label{sec:intractable}
\subsubsection{Intuition and formulation} The purpose of backward sampling is to re-generate, for each particle, a new ancestor that is different from that of the filtering step. However, backward sampling is infeasible if the transition density $m_t(x_{t-1}, x_t)$ cannot be calculated. To get around this, we modify the particle filter so that each particle might, in some sense, have two ancestors right from the \textit{forward} pass.
Consider the standard PF (Algorithm~\ref{algo:bootstrap}). Among the $N$ resampled particles $X_{t-1}^{A_t^{1:N}}$, let us track two of them, say $x_{t-1}$ and $x_{t-1}'$ for simplicity. The move step of Algorithm~\ref{algo:bootstrap} will push them through $M_t$ using independent noises, resulting in $x_t$ and $x_t'$ (that is, given $x_{t-1}$ and $x_{t-1}'$, we have $x_t \sim M_t(x_{t-1}, \cdot)$ and $x_{t}' \sim M_t(x_{t-1}', \cdot)$ such that $x_t$ and $x_t'$ are independent). Thus, for e.g.\ linear Gaussian models, we have $\P(x_t = x_t') = 0$. However, if the two simulations $x_t \sim M_t(x_{t-1}, \cdot)$ and $x_t' \sim M_t(x_{t-1}', \cdot)$ are done with specifically correlated noises, it can happen that $\P(x_t = x_t') > 0$. The joint distribution $(x_t, x_t')$ given $(x_{t-1}, x_{t-1}')$ is called a \textit{coupling} of $M_t(x_{t-1}, \cdot)$ and $M_t(x_{t-1}', \cdot)$; the event $x_t = x_t'$ is called the \textit{meeting} event and we say that the coupling is \textit{successful} when it occurs. In that case, the particle $x_t$ automatically has two ancestors $x_{t-1}$ and $x_{t-1}'$ at time $t-1$ without needing any to perform a backward sampling step.
The precise formulation of the modified forward pass is detailed in
Algorithm~\ref{algo:intractable}. It consists of building in an on-line manner
the backward kernels $\btn{ITR}$ (where ITR stands for ``intractable''). The
main interest of this algorithm lies in the fact that while the function $m_t$
may prove impossible to evaluate, it is usually possible to make $x_t$ and
$x_t'$ meet by correlating somehow the random numbers used in their
simulations. One typical example which this article focuses on is the coupling
of continuous-time processes, but it is useful to keep in mind that
Algorithm~\ref{algo:intractable} is conceptually more general than that.
\begin{algo}{Modified forward pass for smoothing of intractable models (one
time step)}
\label{algo:intractable}
\KwIn{Feynman-Kac model \eqref{eq:fkmodel}, particles $X_{t-1}^{1:N}$ and weights $W_{t-1}^{1:N}$} that approximate the filtering distribution at time $t-1$ \;
\For{$n \gets 1$ \KwTo $N$}{
\underline{Resample}. Simulate $(A_t^{n,1}, A_t^{n,2})$ such that marginally each component is distributed according to $\mathcal{M}(W_{t-1}^{1:N})$\;
\underline{Move}. Simulate $(X_t^{n,1}, X_t^{n,2})$ such that marginally the two components are distributed respectively according to $M_t(X_{t-1}^{A_t^{n,1}}, \mathrm{d} x_t)$ and $M_t(X_{t-1}^{A_t^{n,2}}, \mathrm{d} x_t)$\;
Choose $L \sim \operatorname{Uniform}(\{1, 2\})$ \;
Set $X_t^n \gets X_t^{n, L}$\;
\underline{Calculate backward kernel}.\;
\If{$X_t^{n,1} = X_t^{n,2}$}{
$\btn{ITR}(n, \mathrm{d} i_{t-1}) \gets \pr{\delta\px{ A_t^{n,1} } + \delta\px{ A_t^{n,2} }}/2$ \;
}
\Else
{
$\btn{ITR}(n, \mathrm{d} i_{t-1}) \gets \delta\px{{A_t^{n,L}}}$ \;
}
}
\reweight
\KwOut{Particles $X_t^{1:N}$ and weights $W_t^{1:N}$ that approximate the filtering distribution at time $t$; backward kernel $\btn{ITR}$ that can be used in either Algorithm~\ref{algo:offline_generic} or \ref{algo:online_generic}}
\end{algo}
\subsubsection{Validity and stability}
The consistency of Algorithm~\ref{algo:intractable} follows straightforwardly from Theorem~\ref{thm:convergence_mcmc}. To produce a stable routine however, some conditions must be imposed on the couplings $(A_t^{n,1}, A_t^{n, 2})$ and $(X_t^{n,1}, X_t^{n,2})$. We want $A_t^{n,1}$ to be different from $A_t^{n,2}$ as frequently as possible. On the contrary, we aim for a coupling of the two distributions $M_t(X_{t-1}^{A_t^{n, 1}}, \cdot)$ and $M_t(X_{t-1}^{A_t^{n,2}}, \cdot)$ with high success rate so as to maximise the probability that $X_t^{n,1} = X_t^{n,2}$.
\begin{assumption}
\label{asp:coupling:ancestors}
There exists an $\varepsilon_A > 0$ such that
\[\P(A_t^{n, 1} \neq A_t^{n, 2} | X_{t-1}^{1:N}) \geq \varepsilon_A. \]
\end{assumption}
\begin{assumption}
\label{asp:coupling:dynamics}
There exists an $\varepsilon_D > 0$ such that
\[\P(X_t^{n,2} = X_t^{n,1} | X_{t-1}^{1:N}, A_t^{n,1}, A_t^{n,2}, X_t^{n,1}) \geq \varepsilon_D \pr{1 \land \frac{m_t(X_{t-1}^{A_t^{n,2}}, X_t^{n,1})}{m_t(X_{t-1}^{A_t^{n,1}}, X_t^{n,1})}}. \]
\end{assumption}
The letters A and D in $\varepsilon_A$ and $\varepsilon_D$ stand for ``ancestors'' and
``dynamics''. Assumption~\ref{asp:coupling:dynamics} means that the user-chosen
coupling of $M_t(X_{t-1}^{A_t^{n,1}}, \cdot)$ and $M_t(X_{t-1}^{A_t^{n,2}}, \cdot)$ must be at least as
$\varepsilon_D$ times as efficient as their maximal couplings. For details on this
interpretation, see Proposition~\ref{conditional_proba_maximal_coupling_prop}
in the Appendix. In Lemma~\ref{lem:coupling_efficiency_symmetric}, we also show
that in spite of its appearance, Assumption~\ref{asp:coupling:dynamics} is
actually symmetric with regards to $X_t^{n,1}$ and $X_t^{n,2}$.
We are now ready to state the main theorem of this subsection (see
Appendix~\ref{proof:thm:intractable} for a proof).
\begin{thm}
\label{thm:intractable}
The kernels $\btn{ITR}$ generated by Algorithm~\ref{algo:intractable}
satisfy the hypotheses of Theorem~\ref{thm:convergence_mcmc}. Thus, under
Assumption~\ref{asp:Gbound}, Algorithm~\ref{algo:intractable} provides a
consistent smoothing estimate. If, in addition, the Feynman-Kac model
\eqref{eq:fkmodel} satisfies Assumptions~\ref{asp:mt_2ways_bound} and
\ref{asp:g_2ways_bound} and the user-chosen couplings satisfy
Assumptions~\ref{asp:coupling:ancestors} and~\ref{asp:coupling:dynamics},
the kernels $\btn{ITR}$ also fulfil \eqref{eq:support_cond} and the
smoothing estimates generated by Algorithm~\ref{algo:intractable} are stable.
\end{thm}
\subsubsection{Good ancestor couplings}
\label{subsect:good_ancestor_couplings}
It is notable that Assumption~\ref{asp:coupling:ancestors} only considers the
event $A_t^{n,1} \neq A_t^{n,2}$, which is a pure index condition that does not
take into account the underlying particles $X_{t-1}^{A_t^{n,1}}$ and
$X_{t-1}^{A_t^{n,2}}$. Indeed, if smoothing algorithms prevent degeneracy by
creating multiple ancestors for a particle, we would expect that their
separation (i.e.\ that they are far away in the state space $\mathcal X_{t-1}$,
e.g.\ $\mathbb R^d$) is critical to the performance. Surprisingly, it is
unnecessary: two very close particles (in $\mathbb R^d$) at time $t-1$ may have
ancestors far away at time $t-2$ thanks to the mixing of the model.
We advise choosing an ancestor coupling $(A_t^{n,1}, A_t^{n,2})$ such that the distance between $X_{t-1}^{A_t^{n,1}}$ and $X_{t-1}^{A_t^{n,2}}$ is small. It will then be easier to design a dynamic coupling of $M_t(X_{t-1}^{A_t^{n,1}}, \cdot)$ and $M_t(X_{t-1}^{A_t^{n,2}}, \cdot)$ with a high success rate. Furthermore, simulating the dynamic coupling with two close rather than far away starting points can also take less time when, for instance, the dynamic involves multiple intermediate steps, but the two processes couple early. One way to achieve an ancestor coupling with the aforementioned property is to first simulate $A_t^{n,1} \sim \mathcal M(W_{t-1}^{1:N})$, then move $A_t^{n,1}$ through an MCMC algorithm which keeps invariant $\mathcal M(W_{t-1}^{1:N})$ and set the result to $A_t^{n,2}$. It suffices to use a proposal looking at indices whose underlying particles are close (in $\mathbb R^d$) to $X_{t-1}^{A_t^{n,1}}$. Finding nearby particles are efficient if they are first sorted using the Hilbert curve, hashed using locality-sensitive hashing or put in a KD-tree \citep[see][for a comprehensive review]{samet2006foundations}. In the context of particle filters, such techniques have been studied for different purposes in \citet{MR3351446}, \citet{jacob2019smoothing} and \citet{sen2018coupling}.
\subsubsection{Conditionally-correlated version} In Algorithm~\ref{algo:intractable}, the ancestor pairs $(A_t^{n,1}, A_t^{n,2})_{n=1}^N$ are conditionally independent given $\mathcal F_t^-$ and the same holds for the particles $(X_t^n)_{n=1}^N$. These conditional independences allow easier theoretical analysis, in particular, the casting of Algorithm~\ref{algo:intractable} in the framework of Theorems~\ref{thm:convergence_mcmc} and~\ref{thm:stability}. However, they are not optimal for performance in two important ways: (a) they do not allow keeping both $X_t^{n,1}$ and $X_t^{n,2}$ when the two are not equal, and (b) the set of ancestor variables $(A_t^{n,1})_{n=1}^N$ is multinomially resampled from $\px{1, 2, \ldots, N}$ with weights $W_{t-1}^{1:N}$. We know that multinomial resampling is not the ideal scheme, see Appendix~\ref{apx:alternative_resampling_schemes} for discussion.
Consequently, in practice, we shall allow ourselves to break free from
conditional independence. The resulting procedure is described in
Algorithm~\ref{algo:intractable_practice}
(Appendix~\ref{apx:intractable_pratice}). Despite a lack of rigorous
theoretical support, this is the algorithm that we will use in
Section~\ref{sec:numexp} since it enjoys better performance and it constitutes
a fair comparison with practical implementations of the standard particle
filter, which are mostly based on alternative resampling schemes.
\section{Numerical experiments}
\label{sec:numexp}
\subsection{Linear Gaussian state-space models} \label{numexp_linear_gaussian} Linear Gaussian models constitute a particular class of state space models. They are characterised by Markov dynamics that are Gaussian and observations that are projection of hidden states plus some Gaussian noises. Appendix~\ref{apx:linear_gaussian_models} defines, for different components of these models, the notations that we shall use here. In this section, we consider an instance described in \citet{Guarniero2017}, where the matrix $F_X$ satisfies $F_X[i,j] = \alpha^{1 + |i-j|}$ for some $\alpha$. We consider the problem with $\operatorname{dim}_X = \operatorname{dim}_Y = 2$ and the observations are noisy versions of the hidden states with $C_Y$ being $\sigma_Y^2$ times the identity matrix of size $2$. Unless otherwise specified, we take $\alpha=0.4$ and $\sigma_Y^2 = 0.5$.
In this section, we focus on the performance of different online smoothers
based on either genealogy tracking, pure/hybrid rejection sampling or MCMC.
Rejection-based online smoothing amounts to the PaRIS algorithm, for which we
use $\tilde N=2$ for the $\btn{PaRIS}$ kernel. We take $T = 3000$ and simulate
the data from the model. The benchmark additive function is simply
\begin{equation}
\label{eq:numexp_linear_benchmark}
\varphi_t(x_{0:t}) = \sum_{s=0}^t x_s(0)
\end{equation}
where $x_s(0)$ is the first coordinate of the $\mathbb R^2$ vector $x_s =
[x_s(0), x_s(1)]$. For a study of offline smoothers (including FFBS), see
Appendix~\ref{numexp_linear_gaussian_offline}. In all programs here and there,
we choose $N=1000$ and use systematic resampling for the forward particle
filters (see section~\ref{apx:alternative_resampling_schemes}). Regarding MCMC
smoothers, we employ the kernels $\btn{IMH}$ or $\btn{IMHP}$ consisting of only
one MCMC step. All results are based on $150$ independent runs.
Although our theoretical results are only proved for the bootstrap filter, we
stress throughout that some of them extend to other filters as well. Therefore,
we will also consider guided particle filters in the simulations. An
introduction to this topic can be found in \citet[Chapter 10.3.2]{SMCbook},
where the expression for the optimal proposal is also provided. In linear
Gaussian models, this proposal is fully tractable and is the one we use.
To present efficiently the combination of two different filters (bootstrap and
guided) and four different algorithms (naive genealogy tracking, pure/hybrid
rejection and MCMC) we use the following abbreviations: ``B''
for bootstrap, ``G'' for guided, ``N'' for naive genealogy tracking, ``P'' for
pure rejection, ``H'' for hybrid rejection and ``M'' for MCMC. For instance, the
algorithm referred to as ``BM'' uses the bootstrap filter for the forward pass
and the MCMC backward kernels to perform smoothing. Furthermore, the letter
``R'' will refer to the rejection kernel whenever the distinction between pure
rejection and hybrid rejection is not necessary. (Recall that the two rejection
methods produce estimators with the same distribution.)
Figure~\ref{fig:lg_online_small_iq} shows the squared interquartile range for the online smoothing estimates $\mathbb{Q}_t(\varphi_t)$ with respect to $t$. It verifies the rates of Theorem~\ref{thm:stability}, although linear Gaussian models are not strongly mixing in the sense of Assumptions~\ref{asp:mt_2ways_bound} and \ref{asp:g_2ways_bound}: the grid lines hint at a variance growth rate of $\mathcal O(T)$ for the MCMC and reject-based smoothers and of $\mathcal O(T^2)$ for the genealogy tracking ones. Unsurprisingly guided filters have better performance than bootstrap.
\begin{figure}
\centering
\includegraphics[scale=0.5]{./lg_fig/online_small_iq.pdf}
\caption{Squared interquartile range of the estimators $\mathbb{Q}_t(\varphi_t)$ with respect to $t$, for different online smoothing algorithms. The model is linear Gaussian with parameters specified in section~\ref{numexp_linear_gaussian}. See text for full explanation of the legend. For readability, the curves are down-sampled to $50$ points before being drawn.}
\label{fig:lg_online_small_iq}
\end{figure}
Figure~\ref{fig:lg_online_small_exec} (and its zoomed-in,
Figure~\ref{fig:lg_online_small_exec_close}) show box-plots of the execution
time (divided by $NT$) for different algorithms over $150$ runs. By execution
time, we mean the number of Markov kernel transition density evaluations. We
see that the bootstrap particle filter coupled with pure rejection sampling has
a very heavy-tailed execution time. This behaviour is expected as per
Proposition~\ref{prop:inf_expectation}. Using the guided particle filter seems
to fare better, but Figure~\ref{fig:lg_online_large_exec} (for the same model
but with $\sigma_Y^2 = 2$) makes it clear that this cannot be relied on either.
Overall, these results highlight two fundamental problems with pure rejection
sampling: the computational time has heavy tails and depends on the type of
forward particle filter being used.
\begin{figure}
\centering
\includegraphics[scale=0.5]{./lg_fig/online_small_exec.pdf}
\caption{Box plots (based on $150$ runs) of averaged execution times (numbers of transition density evaluations divided by $NT$) for different algorithms on the linear Gaussian model of section~\ref{numexp_linear_gaussian}.}
\label{fig:lg_online_small_exec}
\end{figure}
\begin{figure}
\centering
\includegraphics[scale=0.5]{./lg_fig/online_small_exec_close.pdf}
\caption{Zoomed-in of Figure~\ref{fig:lg_online_small_exec}.}
\label{fig:lg_online_small_exec_close}
\end{figure}
\begin{figure}
\centering
\includegraphics[scale=0.5]{./lg_fig/online_large_exec.pdf}
\caption{Same as Figure~\ref{fig:lg_online_small_exec}, but for the modified model where $\sigma_Y^2 = 2$.}
\label{fig:lg_online_large_exec}
\end{figure}
On the other hand, hybrid rejection sampling, despite having random execution time in principle, displays a very consistent number of transition density evaluations over different independent runs. Thus it is safe to say that the algorithm has a virtually deterministic execution time. The catch is that the average computational load (which is around $16$ in Figure~\ref{fig:lg_online_small_exec_close}) cannot be easily calculated beforehand. In any case, it is much larger than the value $1$ of MCMC smoothers (since only $1$ MCMC step is performed in the kernel $\btn{IMHP}$); whereas the performance (Figure~\ref{fig:lg_online_small_iq}) is comparable.
The bottom line is that MCMC smoothers should be the default option, and one MCMC step seems to be enough. If for some reason one would like to use rejection-based methods, using hybrid rejection is a must.
\subsection{Lotka-Volterra SDE} \label{numexp_lk_sde} Lotka-Voleterra models
(originated in \citealp{lotka1925elements} and
\citealp{volterra1928variations}) describe the population fluctuation of
species due to natural birth and death as well as the consumption of one
species by others. The emblematic case of two species is also known as the
predator-prey model. In this subsection, we study the stochastic differential
equation (SDE) version that appears in \citet{hening2018foodchains}. Let $X_t =
(X_t(0), X_t(1))$ represent respectively the populations of the prey and the
predator at time $t$ and let us consider the dynamics
\begin{equation}
\label{eq:lotka_sde}
\left\{
\begin{aligned}
\mathrm{d} X_t(0) &= \bigl[ \beta_0 X_t(0) - \frac 12 \tau_0 [X_t(0)]^2 &&- \tau_1 X_t(0) X_t(1) \bigr] \mathrm{d} t + X_t(0) \mathrm{d} E_t(0) \\
\mathrm{d} X_t(1) &= \bigl[ \qquad \quad -\beta_1 X_t(1) &&+ \tau_1 X_t(0) X_t(1) \bigr] \mathrm{d} t + X_t(1) \mathrm{d} E_t(1)
\end{aligned}
\right.
\end{equation}
where $E_t = \Gamma W_t$ with $W_t$ being the standard Brownian motion in
$\mathbb R^2$ and $\Gamma$ being some $2 \times 2$ matrix. The parameters
$\beta_0$ and $\beta_1$ are the natural birth rate of the prey and death rate
of the predator. The predator interacts with (eats) the prey at rate $\tau_1$.
The quantity $\tau_0$ encodes intra-species competition in the prey population.
The $\frac 12$ in its parametrisation is to line up with the Lotka Volterra
jump process in $\mathbb Z^2$ (to be included in a future version of this
paper), where the population sizes are integers and the interaction term
becomes $\tau_0 X_t(0) [X_t(0) - 1]/2$.
The state space model is comprised of the process $X_t$ and its noisy
observations $Y_t$ recorded at integer times. The Markov dynamics cannot be
simulated exactly, but can be approximated through (Euler) discretisation. Nevertheless, the Euler transition density $m_t^\mathrm E(x_{t-1}, x_t)$ remains intractable (unless the step size is exactly $1$). Thus, the algorithms presented in Subsection~\ref{sec:intractable} are useful. The missing bit is a method to efficiently couple $m_t^\mathrm E(x_{t-1}, \cdot)$ and $m_t^\mathrm E(x_{t-1}', \cdot)$, which we carefully describe in Appendix~\ref{apx:coupling_euler}.
We consider the model with $\tau_0 = 1/800$, $\tau_1 = 1/400$, $\beta_0 = 0.3125$ and $\beta_1 = 0.25$. The matrix $\Gamma$ is such that the covariance matrix of $E_1$ is $\begin{bmatrix}
1/100 & 1/200 \\
1/200 & 1/100
\end{bmatrix}$. The observations are recorded on the log scale with Gaussian error of covariance matrix $\begin{bmatrix}
0.04 & 0.02\\
0.02 & 0.04
\end{bmatrix}$. The distribution of $X_0$ is two-dimensional normal with mean $[100, 100]$ and covariance matrix $\begin{bmatrix}
100 & 50\\
50 & 100
\end{bmatrix}$. This choice is motivated by the fact that the preceding parameters give the stationary population vector $[100, 100]$. According to \citet{hening2018foodchains}, they also guarantee that neither animal goes extinct almost surely as $t \to \infty$.
By discretising \eqref{eq:lotka_sde} with time step $\delta = 1$, one can get some very rough intuition on the dynamics. For instance, per second there are about $31$ preys born. Approximately the same number die (to maintain equilibrium), of which $6$ die due to internal competition and $25$ are eaten by the predator. The duration between two recorded observations corresponds more or less to one-third generation of the prey and one-fourth generation of the predator. The standard deviation of the variation due to environmental noise is about $10$ individuals per observation period, for each animal.
Again, these intuitions are highly approximate. For readers wishing to get more familiar with the model, Appendix~\ref{more_figures_sde} contains real plots of the states and the observations; as well as data on the performance of different smoothing algorithms for moderate values of $T$. We now showcase the results obtained in a large scale problem where $T=3000$ and the data is simulated from the model.
We consider the additive function
\[\varphi_t(x_{0:t}) := \sum_{s=0}^t \ps{x_s(0) - 100}.\]
Figure~\ref{fig:sde_big_final_box} represents using box
plots the distributions of the estimators for $\mathbb{Q}_T(\varphi_T)$ using either
the genealogy tracking smoother (with systematic resampling; see
Appendix~\ref{apx:alternative_resampling_schemes}) or
Algorithm~\ref{algo:intractable_practice}. Our proposed smoother greatly
reduces the variance, at a computational cost which is empirically $1.5$ to $2$
times greater than the naive method. Since we used Hilbert curve to design good
ancestor couplings (see Section~\ref{subsect:good_ancestor_couplings}),
coupling of the dynamics succeeds $80 \%$ of the time. As discussed in the
aforementioned section, starting two diffusion dynamics from nearby points make
them couple earlier, which reduces the computational load afterwards.
\begin{figure}
\centering
\includegraphics[scale=0.5]{./sde_example_fig/big_scale_box_plot.pdf}
\caption{Box plot of estimators (over $50$ independent runs with $N=1000$ particles) for $\mathbb{Q}_T(\varphi_T)$ in the Lotka-Volterra SDE model with $T = 3000$. They are calculated using either the naive genealogy tracking smoother or our smoother developed for intractable models (Algorithm~\ref{algo:intractable_practice}).}
\label{fig:sde_big_final_box}
\end{figure}
Figure~\ref{fig:sde_big_iq} plots with respect to $t$ the squared interquartile range of the two methods for the estimation of $\mathbb{Q}_t(\varphi_t)$. Grid lines hint at a quadratic growth for the genealogy tracking smoother (as analysed in \citealp[Sect. 1]{Olsson2017}) and a linear growth for the kernel $\btn{ITRC}$ (as described in Theorem~\ref{thm:stability}).
\begin{figure}
\centering
\includegraphics[scale=0.5]{./sde_example_fig/big_scale_iq_range.pdf}
\caption{Squared interquartile range for the genealogy tracking smoother and our proposed one. Same context as in Figure~\ref{fig:sde_big_final_box}}
\label{fig:sde_big_iq}
\end{figure}
Finally, Figure~\ref{fig:sde_big_ess} (Appendix~\ref{more_figures_sde}) shows properties of the effective sample size (ESS) ratio for this model. In a nutshell, while being globally stable (between $40\%$ and $70\%$), it has a tendency to drift towards near $0$ from time to time due to unusual data points. At these moments, resampling kills most of the particles and aggravates the degeneracy problem for the naive smoother. As we have seen in the above figures, systematic resampling is not enough to mitigate this in the long run.
\section{Conclusion}
\label{sec:conclusion}
\subsection{Practical recommendations}
Our first recommendation does not concern the smoothing algorithm per se. It is of
paramount importance that the particle filter used in in the preliminary
filtering step performs reasonably well, since its output defines the support
of the approximations generated by the subsequent smoothing algorithm.
(Standard recommendations to obtain good performance from a particle filter
are to increase $N$, or to use better proposal distributions, or both.)
Then, if the transition density is tractable, we recommend the MCMC smoother
by default. One to two MCMC steps seem to be sufficient in most
situations. If one still prefers to use rejection sampling (see below for a
possible motivation), it is safe to say that there is no reason not to use the
hybrid method.
Although the assumptions under which we prove the stability of the smoothing estimates are strong, the general message still holds. The Markov kernel and the potential functions must make the model forget its past in some ways. Otherwise, we get an unstable model for which no smoothing methods can work. The rejection sampling -- based smoothing algorithms can therefore serve as the ultimate test. Since they simulate exactly independent trajectories given the skeleton, there is no hope to perform better, unless one switches to another family of smoothing algorithms.
For intractable models, the key issue is to design couplings with high meeting
probability. Fortunately, the inherent chaos of the model makes it possible to
choose two very close starting points for the dynamics and thus easy to obtain
a reasonable meeting probability.
If further difficulties persist, there is a practical (and very heuristic)
recipe to test whether one coupling of $M_t(x, \cdot)$ and $M_t(x', \cdot)$ is
close to optimal. It consists in approximating $M_t(x, \cdot)$ and $M_t(x',
\cdot)$ by Gaussian distributions and deduce the optimal coupling rate from
their total variation distance. There is no closed formula for the total
variation distance between two Gaussian distributions in high dimensions.
However, it can be reliably estimated using the geometric interpretation of the
total variation distance being one minus the area of the intersection created
by the corresponding density graphs. In this way, one can get a very rough idea
of to what extent a certain coupling realises the meeting potential that the
two distributions have. If the coupling seems good and the trajectories still
look degenerate, it can very well be that the model is unstable.
\subsection{Further directions}
The major limitation of our work is the exclusive theoretical analysis under the bootstrap particle filter. Moreover, we require that the $N$ new particles generated at step $t$ are conditionally independent given previous particles at time $t-1$. This excludes practical optimisations like systematic resampling and Algorithm~\ref{algo:intractable_practice}.
Finally, the backward sampling step is also used in other algorithms (in
particular Particle Markov Chain Monte Carlo, see \citealp{PMCMC}) and it would
be interesting to see to what extent our techniques can be applied there.
\subsection{Data and code}
The code used to run numerical experiments is available at https://github.com/hai-dang-dau/backward-samplers-code. The algorithms will soon be implemented in the \verb+particles+ package at https://github.com/nchopin/particles.
\section*{Acknowledgement}
The first author acknowledges a CREST PhD scholarship via AMX funding.
|
\section{Introduction}
In lattice field theory, Monte Carlo Simulation techniques are used to sample lattice configurations based on a distribution defined by the action of the lattice theory.
The parameter value at which we generate the lattice samples determines the cost of the simulation. The non-critical region of the lattice theory has low simulation costs for algorithms like Hybrid Monte Carlo (HMC))\cite{duane1987hybrid}.
However, as we attempt to sample uncorrelated lattice configurations from the critical region, the simulation cost increases rapidly. In the critical region, the integrated autocorrelation time, which gives the measure of correlation, increases rapidly and diverges at the critical point. For a finite-size lattice critical point corresponds to the peak point of the autocorrelation curve. This problem is known as the critical slowing down\cite{Wolff:1989wq,Schaefer:2010hu}. Many efforts have been made to lessen the impact of critical slowing in statistical systems and lattice QFT \cite{Ramos:2012bb, gambhir2015improved,Endres_2015}. But it always remains a challenging task to simulate near the critical point of a lattice QFT by overcoming the critical slowing down.
These days, ML-based solutions to this problem are becoming popular. Various ML algorithms have been applied for statistical physics and condensed matter problems\cite{PhysRevD.100.011501, PhysRevLett.122.080602,Pawlowski_2020,Nicoli_2020, Carrasquilla_2020, Liu_2017, Vielhaben_2021, Chen_2018,PhysRevB.94.165134,Science.355.602,PhysRevB.94.195105,PhysRevLett.120.066401,Singh_2021} .
Some generative learning algorithms\cite{PhysRevD.100.034515,albergoflowbased,shanahan2018machine,Kanwar_2020,albergo2021introduction,Albergo:2022qfi,Hackett:2021idh} have recently been developed to avoid the difficulty in lattice field theory. Conditional GAN
was used in a 2D lattice Gross Neveue model \cite{Singha:2021nht} and shown to be effective in mitigating the influence of critical slowdown.
However, explicit probability density estimation is not accessible in GAN; thus, we cannot guarantee that the model distribution is identical to the true lattice distribution.
Flow based generative leanings are found successful in avoiding the problem of critical slowing down in scalar field theory\cite{PhysRevD.100.034515}, fermionic system\cite{albergoflowbased}, U(1) gauge theory\cite{Kanwar_2020} and Schwinger models\cite{Albergo:2022qfi}. In the flow-based approach \cite{PhysRevD.100.034515,Kanwar_2020} an NF model is trained at a single value of the action parameter with reverse KL divergence. Finally, the trained model can generate lattice samples at the same parameter value. This model is initialized from scratch for a parameter value and does not use any lattice samples.
Since HMC simulation in the non-critical region is not affected by the critical slowing down problem, we can use samples from that region to train a generative model.
We present a method for sampling lattice configurations near the critical regions using Conditional Normalizing Flow (C-NF) to reduce the problem of critical slowing down. This method involves training a C-NF model in a non-critical region to produce samples for several parameter values in the critical region. Our goal is to generate lattice configurations from the distribution $p(\phi|\lambda_{crit}) =\frac{1}{Z} e^{-S(\phi|\lambda_{crit})}$, where $\phi $ denotes the lattice field, $\lambda_{crit}$ denotes the action parameter close to critical point and Z is the partition function.
We train a C-NF model $\tilde{p}({\phi|\lambda})$ with HMC samples from $p(\phi|\lambda)$ for various non-critical $\lambda$ values.
We train the C-NF model to be a generalized model over $\lambda$ parameters. The model is then interpolated or extrapolated to the $\lambda $ values in the critical region to generate lattice configurations. However, the interpolated or extrapolated model may not directly provide samples from the true distribution. But the exactness can be guaranteed by using the Metropolis-Hastings(MH) algorithm at the end. So, after training, we use the interpolated/extrapolated model $\tilde{p}(\phi|{\lambda_{crit}})$ at critical region as proposal for constructing a Markov Chain via an independent MH algorithm\cite{PhysRevD.100.034515}. This method is useful when the probability distribution is known up to a normalizing factor.
The primary contributions of this study are as follows:
\begin{enumerate}
\item Using Conditional Normalizing Flows, we present a new method for sampling lattice configurations near the critical regions. This method eliminates the critical slowdown problem.
\item The model has the ability to learn about the lattice system across multiple $\lambda$ values and use this knowledge to generate sample at any given $\lambda $ values. As a result, our model can generate samples at multiple $\lambda$ values values in the critical region, which is not possible for the existing flow-based methods in lattice thoery.
\item We also demonstrate that Conditional Normalizing flow can be used to do both interpolation and extrapolation for lattice $\phi^4$ theory. The extrapolation demonstrates the possibility of using our approach for sampling lattice gauge theory.
\end{enumerate}
\section{Lattice scalar $\phi^4$ Theory}
In $2d$ euclidean space, the action for $\phi^4$ theory can be written as:
\begin{align}
S(\phi,\lambda,m)=\int dx^2[(\partial_\mu \phi(x))^2+m^2 \phi(x)^2+\lambda\phi(x)^4]
\end{align}
where $\lambda $ and $m$ are the two parameters of the theory.
On lattice the action become:
\begin{align}
S(\phi,\lambda,m)=&\sum\limits_{x} \Big[ \sum\limits_{\mu={1,2}}
\Big[2\phi(x)^2+\phi(x)\phi(x+\hat{\mu})\notag\\
&-\phi(x)\phi(x-\hat{\mu})\Big] +m^2\phi(x)^2 +\lambda\phi(x)^4\Big]
\end{align}
where $x$ is a $2d$ discrete vector and $\hat{\mu}$ represents two possible directions on the lattice. $\phi(x)$ is defined on each lattice site, taking only real values.
We choose this specific form of action for HMC simulation because it is suited for creating datasets for training the C-NF model.
Using this form, we do not need to apply any further transformations to the samples during training.
This action possesses $\phi(x)\rightarrow \phi(-x)$ symmetry, however it is spontaneously broken at a specific parameter region.
We set $m^2=-4$ for our numerical experiments and observed spontaneous symmetry breaking in the theory by varying $\lambda$.
If we begin in the broken phase of the theory, the order parameter under consideration $\langle \phi^2\rangle$ is nonzero which approaches zero at the critical point and remains zero in the symmetric phase, as shown in \Cref{SSB}.
In HMC simulation we choose a parameter $\lambda$ and produce configurations based on the probability distribution:
\begin{align}
P(\phi|\lambda)=\frac{1}{Z}e^{-S(\phi|\lambda)}\\
\text{where, } Z=\sum\limits_{\phi}e^{-S(\phi|\lambda)}\notag
\end{align}
\begin{figure}[H]
\centering
\includegraphics[width=.5\textwidth]{HMC_msq.png}
\caption{ HMC simulation: order parameter $\langle \Tilde{\phi}^2 \rangle$ vs $\lambda$ for $ m^2=-4$, which shows a 2nd order phase transition.}
\label{SSB}
\end{figure}
Each lattice configuration is a $2d$ matrix with the dimensions $L_x\times L_y$.
For our experiment, we use $L_x=L_y=8 $ and add a periodic boundary condition to the lattice in all directions.
More information on lattice $\phi^4$ theory can be found in ref. \cite{Vierhaus2010Simulation}.
Some of the observables which we calculate on the lattice ensembles are:
\begin{enumerate}
\item $\langle \Tilde{\phi}^2 \rangle$:
$\Tilde{\phi}=\frac{1}{V
}\sum_x\phi(x)$
\item Correlation Function:
\begin{align}
G_c(x)= \frac{1}{V} \sum_y[\langle\phi(y)\phi(x+y) \rangle -\langle\phi(y)\rangle \langle\phi(x+y) \rangle] \notag
\end{align}
Zero momentum Correlation Function: \\
$C(t)=\sum_{x_1} G_c(x_1,t)$
\item Two Point Susceptibility:
$\chi=\sum_x G(x)$
\end{enumerate}
\section{Conditional Normalizing Flow}
Normalizing flows\cite{https://doi.org/10.48550/arxiv.1505.05770} are a generative model for constructing complex distributions by transforming a simple known distribution via a series of invertible and smooth mapping $f :\mathbb{R}^d \rightarrow \mathbb{R}^d $ with inverse $
f^{-1}=g$.
If $p_z(z)$ is the prior distribution and $p_t(x)$ is the complex target distribution, then the model distribution $p_m(x;\theta)$ can be written using the change of variable formula as
\begin{align}
p_m(x;\theta)=p_z(z)\big|det \frac{\partial f_{\theta}(z)^{-1}}{\partial x}\big|\\
\text{where, } x=f_{\theta}(z) \notag
\label{probabilty_Trans}
\end{align}
Fitting a flow-based model $p_m(x;\theta)$ to a target distribution $p_t(x)$ can be accomplished by minimising their KL divergence.
The most crucial step is to build the flow so that we can calculate $\big|det \frac{\partial f_{\theta}(z)^{-1}}{\partial x}\big|$.
One such method is the affine coupling block, which divides the input $z$ into two halves and applies an affine transformation to produce upper or lower triangular Jacobians.
The transformation rules for such a building are as follows\cite{https://doi.org/10.48550/arxiv.1907.02392}:
\begin{align}
x_1=z_1\odot exp(s_1(z_2)+t_1(z_2)) \notag\\
x_2=z_2\odot exp(s_2(x_1))+t_2(x_1)
\end{align}
where, $\odot$ represent element-wise product of two vectors.
The inverse of this coupling layer is simply computed as:
\begin{align}
z_2=(x_2-t_2(x_1)) \odot exp(-s_2(x_1)) \notag\\
z_1=(x_1-t_1(z_2)) \odot exp(-s_1(z_2))
\end{align}
\begin{figure}[H]
\includegraphics[width=.45\textwidth, right]{cnfbb.jpg}
\caption{One affine block of Conditional Normalizing flow. Here, c is the conditional parameter. }
\label{CNF}
\end{figure}
Because inverting an affine coupling layer does not require the inverse of $s_1,s_2,t_1,t_2$, they can be any non-linear complex function and can thus be represented by neural networks.
Introducing a conditioning parameter in NF is not as simple as it is in GAN.
However, since $ s $ and $ t $ are only evaluated in the forward direction, we may concatenate the conditioning parameter $c$ with the input $x$ to the coupling layer in order to invert the model\cite{DBLP:journals/corr/abs-1907-02392}, as illustrated in \Cref{CNF}.
As a result, the affine coupling transformation rules become:
\begin{align}
&x_1=z_1\odot exp(s_1(z_2,c)+t_1(z_2,c))\notag\\
&x_2=z_2\odot exp(s_2(x_1,c))+t_2(x_1,c))
\end{align}
And its inverse become
\begin{align}
&z_2=(x_2-t_2(x_1,c)) \odot exp(-s_2(x_1,c)) \notag\\
&z_1=(x_1-t_1(z_2,c)) \odot exp(-s_1(z_2,c))
\end{align}
Let us designate the C-NF model as $f(x;c,\theta)$ and its inverse as $g(z;c,\theta)$.
The invertibility for any fixed condition $c$ is given by
\begin{align}
f^{-1}(.;c,\theta)=g(.;,c,\theta)
\end{align}
The change of variable formula become
\begin{align}
p_m(x;c,\theta)=p_z(f(x;c,\theta))|det J_f(z)|^{-1}
\end{align}
And the loss function is the KL divergence between the model distribution $p_m(x;c,\theta)$ and target distribution $p_t(x;c)$ :
\begin{align}
\mathcal{L}=D_{KL}[{ p_t(x;c)||p_m(x;c,\theta)}]
\label{loss}
\end{align}
We can find the maximum likelihood network parameter $\theta_{ML}$ using this loss. Then, for a fixed $c$, we can execute conditional generation of $x$ by sampling $z$ from $p_z(z)$ and employing the inverted network $g(z;c,\theta_{ML})$.
\section{Numerical Experiments}
This section discusses dataset preparation and the model architecture utilized in training the C-NF model. In addition, the training details of the C-NF model and the sampling process in the critical region are discussed. We train the C-NF model with different datasets and model architecture for interpolation and extrapolation.
\subsection{Dataset}
In the non-critical region, we generate lattice configurations using HMC simulation where autocorrelation is low. In HMC simulation we use Molecular Dynamics(MD) step size=0.1 and MD trajectory length=1. For training purposes, we generate 10,000 lattice configurations for interpolation and 15,000 configurations for extrapolation of size $8\times8$ for each $\lambda$ value.
In the critical region, for the evaluation purpose of the C-NF model, we use HMC to generate around $10^5$ lattice configurations per $\lambda$.
This serves as a baseline for comparing observables to the observable produced through the proposed sampling strategy.
\subsection{C-NF Model Architecture}
The affine coupling block displayed in \Cref{CNF} is the fundamental building component of our C-NF model.
For all neural networks $s$ and $t$, we use the same architecture.
\Cref{Full_cnf} depicts the neural networks used for $s$ and $t$. In the neural networks, we solely employ Fully Convolutional Layers. For the first two layers, we use 64 filter for interpolation and 32 for extrapolation, all of which are $3\times3$ in size. For each Convolutional layer, we employ the Tanh activation function.
We use 8 such affine blocks while training for both interpolation and extrapolation.
For each 8 affine block, the conditional parameter $c$ is concatenated with the input to $s$ and $t$ as shown in \Cref{CNF}.
\begin{figure}[!ht]
\centering
\includegraphics[width=.4\textwidth]{CNF_archN.jpg}
\caption{Architecture of the Neural Network \textbf{s} and \textbf{t} of the $i$-th affine block.}
\label{Full_cnf}
\end{figure}
\subsection{Training and Sampling Procedure} The loss function used for training the C-NF model is the forward KL divergence as in \Cref{probabilty_Trans} between the model distribution $p_m(\phi;\lambda,\theta)$ and target distribution $p_t(\phi;\lambda)$:
\begin{align}
\mathcal{L(\theta)}&=\int d\phi p_t(\phi;\lambda)(log[p_t(\phi;\lambda)]-log[p_m(\phi;\lambda,\theta)])\notag \\
&=E_{\phi\sim p_t}(log[p_t(\phi;\lambda)]-log[p_m(\phi;\lambda,\theta)])\\
\text{where},\notag\\ &log[p_t(\phi;\lambda)]=-[S(\phi|\lambda)+Z] \notag
\end{align}
The expectation $E_{\phi\sim p_t}$ is evaluated using HMC samples from the non-critical region.
During training, we maintain the learning rate at 0.0003 and employ the Adam optimizer.
Once training is complete, we invert the C-NF model, which we call the proposal model. The inputs to the proposal model are i) lattices from the Normal distribution $ \mathcal{N}(0,1)$ and ii) $\lambda$ as a conditional parameter for sample generation. Outputs are the lattice configurations and probability densities for each configuration for a given $\lambda$. For the critical region we give critical $\lambda$ values as conditional parameter to the propsal model. We look at two scenarios in which a C-NF model can be either interpolated or extrapolated to the critical region. Both require different training, but the sampling technique is the same. The samples from the interpolated/extrapolated model may not exactly represent the true distribution of lattice theory $p_t(\phi|\lambda)$. As a result, we use this model as a proposal for the independent MH algorithm, which generates a Markov Chain with asymptotic convergence to the true distribution.
\subsection{Interpolation to the Critical Region}
The $\lambda$ set used to train the C-NF model for interpolation purposes is: $\{3,3.2,3.5,3.6,3.7,3.8,5.8,6,6.5,7,8,9\}$. During training, we bypass the critical region [4.1-5.0] so that we can interpolate the model where the autocorrelation time is large for HMC simulation.
We interpolate the trained model for multiple $\lambda$ values belonging to the critical region (4.1, 4.2, 4.25, 4.3, 4.35, 4.4, 4.45, 4.5, 4.55, 4.6, 4.65, 4.7, 4.8, 5.0). For each $\lambda$ values we generates one ensemble of $10^5$ configurations from the proposed method. On each ensemble we calculate different observables using bootstrap re-sampling method.
\begin{figure}[H]
\begin{subfigure}{.5\textwidth}
\includegraphics[
width=\textwidth]{newmsq_interpol.png}
\caption{$\langle \Tilde{\phi}^2 \rangle$ }
\label{msq}
\end{subfigure}
\begin{subfigure}{.5\textwidth}
\includegraphics[
width=\textwidth]{newchi_interpol.png}
\caption{$\chi$}
\label{chi}
\end{subfigure}
\caption{Interpolation to the critical region:-$\langle \Tilde{\phi}^2 \rangle$ and $\chi$ are calculated on samples generated from i)HMC, ii)C-NF followed by MH, and iii) Naive C-NF. The Error bars indicate standard deviation calculated using bootstrapping re-sampling with bin size 100.}
\label{msqchi}
\end{figure}
We compare the observables from HMC simulation and our proposed method. Observable from the Naive C-NF without MH is also shown to demonstrate the C-NF model's proximity to the true distribution. In \Cref{msqchi} we plot two observables $\langle \Tilde{\phi}^2 \rangle$ and $\chi$ for the interpolated $\lambda$ values. Although the naive C-NF model has biases, MH can eliminate them, and both observables match pretty well within the statistical uncertainty.
In the Appendix, we present a table of numerical values of the observables with errors.
\begin{figure*}[!ht]
\begin{subfigure}{.5\textwidth}
\includegraphics[
width=\textwidth]{interpcorr_lam_47043061.png}
\caption{$\lambda=4.3$}
\label{fig:f1}
\end{subfigure}
\begin{subfigure}{.5\textwidth}
\includegraphics[
width=\textwidth]{interpcorr_lam_47044561.png}
\caption{$\lambda=4.5$}
\label{fig:f2}
\end{subfigure}
\begin{subfigure}{.5\textwidth}
\includegraphics[
width=\textwidth]{interpcorr_lam_47045561.png}
\caption{$\lambda=4.55$}
\label{fig:f3}
\end{subfigure}
\begin{subfigure}{.5\textwidth}
\includegraphics[
width=\textwidth]{interpcorr_lam_47047061.png}
\caption{$\lambda=4.70$}
\label{fig:f4}
\end{subfigure}
\caption{Interpolation-:Zero momentum Correlation function calculated on samples generated from i)HMC, ii)C-NF followed by MH, and iii) Naive C-NF. The Error bars indicate $95\%$ confidence interval calculated using bootstrapping re-sampling method with bin-size 100.}
\label{intp_corr}
\end{figure*}
In \Cref{intp_corr}, the two point zero momentum correlation function ${C(t)}$ is shown for four different $\lambda$ values. For these $\lambda$ values, we can observe that the correlation function is non-vanishing, which is a unique property of the critical region. The plots for other critical $\lambda$ values are included in the Appendix.
In \Cref{hist} we have also shown the histogram of $\Tilde{\phi}$ for a particular critical $\lambda=4.6$. This demonstrates that MH can eliminate this kind artefacts created by the C-NF model.
We displayed plots of various observables on both phases around the critical point for the interpolation. We found that the observables estimated using our technique and the HMC match quite well.
\begin{figure}[!ht]
\begin{subfigure}{.5\textwidth}
\includegraphics[width=\textwidth]{histogram4504591261000.png}
\label{fig:f5}
\end{subfigure}
\begin{subfigure}{.5\textwidth}
\includegraphics[width=\textwidth]{histogram4504591361000.png}
\label{fig:f6}
\end{subfigure}
\caption{Histogram of $\Tilde{\phi}$ for $\lambda=4.6$ from the a)naive C-NF model and b) C-NF with MH is compared against HMC results with a bin-size=100.}
\label{hist}
\end{figure}
\subsection{Extrapolation to the Critical Region}
The $\lambda$ set used to train the C-NF model for the extrapolation is :$\{3,3.1,3.2,3.3,3.4,3.5,3.6,3.7,3.8,3.9\}$. After training the model in the broken phase, we extrapolate it in the critical region around $\lambda=4.6$, which we take to be the critical region's midpoint. The model is extrapolated for five distinct $\lambda$ values:[4.2,4.3,4.4,4.5,4.6]. For each $\lambda$ values we generates one ensemble of $10^5$ configurations from our method. Again, we calculate several observables for each ensemble using the bootstrap re-sampling method and compare them to the HMC results.
We find that the size of the training dataset needs to be increased for extrapolation in order to achieve a C-NF model that is close to the true distribution in the broken phase. We plot the observables $\langle \Tilde{\phi}^2 \rangle$ and $\chi$ in \Cref{extra_chi} and the zero momentum correlation function is plotted in \Cref{corr_ext} for four different $\lambda$ in the critical region .
\begin{figure}[!ht]
\begin{subfigure}{.5\textwidth}
\includegraphics[
width=\textwidth]{newmsq_extrapolate.png}
\caption{$\langle \Tilde{\phi}^2 \rangle$ }
\label{fig:f7}
\end{subfigure}
\begin{subfigure}{.5\textwidth}
\includegraphics[
width=\textwidth]{newchi_extrapolate.png}
\caption{$\chi$}
\label{fig:2nd}
\end{subfigure}
\caption{ Extrapolation to the critical region-: $\langle \Tilde{\phi}^2 \rangle$ and $\chi$ are calculated on samples generated from i)HMC, ii)C-NF followed by MH, and iii) Naive C-NF. The Error bars indicate standard deviation calculated using bootstrapping re-sampling with bin size 100.}
\label{extra_chi}
\end{figure}
\begin{figure*}[!ht]
\begin{subfigure}{.5\textwidth}
\includegraphics[width=\textwidth]{corr_lam_1110042068.png}
\caption{$\lambda=4.20$}
\label{fig:9}
\end{subfigure}
\begin{subfigure}{.5\textwidth}
\includegraphics[width=\textwidth]{corr_lam_1110043068.png}
\caption{$\lambda=4.30$}
\label{fig:f10}
\end{subfigure}
\begin{subfigure}{.5\textwidth}
\includegraphics[
width=\textwidth]{corr_lam_1110044068.png}
\caption{$\lambda=4.40$}
\label{fig:f11t}
\end{subfigure}
\begin{subfigure}{.5\textwidth}
\includegraphics[
width=\textwidth]{corr_lam_1110045068.png}
\caption{$\lambda=4.45$}
\label{fig:f12}
\end{subfigure}
\caption{Extrapolation:-Zero momentum Correlation function calculated on samples generated from i)HMC, ii)C-NF followed by MH, and iii) Naive C-NF. The Error bars indicate $95\%$ confidence interval calculated using bootstrapping re-sampling method with bin-size 100.}
\label{corr_ext}
\end{figure*}
The naive C-NF model produces configurations that are inherently uncorrelated. Since we obtain a Markov Chain after applying MH, therefore we can't guarantee the same. With a $25-40\%$ acceptance rate from the model, we see negligible correlation between the samples. The integrated autocorrelation time for $\chi$ from our proposed approach and HMC is plotted in \Cref{autocorr}. It shows that we successfully reduce the Autocorrelation time for the Markov chain.The comparison is not absolute because HMC is affected by algorithmic settings. But we want to show that for the critical region, there is almost no correlation between samples in the Markov Chains obtained from both interpolation and extrapolation.
\begin{figure}[H]
\centering
\includegraphics[width=.5\textwidth]{Autocorr_all_three_111001368.png}
\caption{Integrated Auto-correlation time calculated on samples generated from HMC and C-NF model with MH. The straight line represents the autocorrelation time for uncorrelated samples.}
\label{autocorr}
\end{figure}
\section{Cost Analysis}The sampling algorithm for the baseline approach (HMC) and the suggested method is vastly different; thus, a direct cost comparison is opaque. Nonetheless, we separate the simulation cost for the proposed technique into two components: Training time and sample generation time.
On a Colab Tesla P100 GPU, the training time for the C-NF model for interpolation or extrapolation is roughly 5-6 hours.
However, sample generation is very fast for the C-NF model.
Generating one Markov Chain of $10^5$ configuration takes 5-7 minutes with a 25-40$\%$ acceptance rate. Due to the short generation time, a low acceptance rate is acceptable until the autocorrelation time increases.
Once the C-NF model has been trained, it can be employed repeatedly to generate configurations for a wide range of $\lambda$ values.
From a single training of the C-NF(interpolated) model, we have generated configurations for 13 $\lambda$'s in the critical region. So, our approach outperforms HMC for sampling at multiple $\lambda$ values in the critical region.
\section{Conclusion}
The critical slowing down problem prevents generating a large ensemble in the critical region of a lattice theory. In order to resolve this, we employ a Conditional normalizing flow trained on HMC samples with low autocorrelation and generate samples in the critical region. In order to learn a general distribution over parameter $\lambda$, we train the C-NF model away from the critical point of lattice $\phi^4$ theory. This model is interpolated in the critical region and serves as a proposal for the MH algorithm to generate a Markov chain. The degree to which the extrapolated or interpolated model resembles the actual distribution determines the acceptance rate in the critical region. In order to achieve a high acceptance rate and prevent the development of autocorrelation, the C-NF model must be trained adequately. The C-NF model generates uncorrelated samples, and we trained well enough to get 25-45$\%$ acceptance rate. With this much acceptance rate, we found no correlation between configuration in the Markov chain.
As a result, our method significantly mitigates the critical slowing down problem. Aside from that, our method can be highly efficient when we need interpolation/extrapolation to numerous $\lambda$ values in the critical region.
Since lattice gauge theory requires extrapolation to the critical region, we have likewise extrapolated $\phi^4$ lattice theory to the critical region.
We observe high agreement between observables estimated using the suggested technique and HMC simulation for both interpolation and extrapolation.
|
\section{Introduction}
\label{Sec-3.1}
Microbiome, which is the collection of micro-organisms in an ecological system, is of great research interest in the science community and has been shown to play an important role in influencing its host or living environment. For instance, it is found that intervening the gut microbiota of African turquoise killifish could result in delay of their aging process \citep{smith2017regulation}. The advancement of the high-throughput sequencing technologies such as 16S rRNA profiling that replicates a specific sequence of marker genes which is counted and serves as the proxy of the abundance of the Operational Taxonomic Units (OTU's, the surrogate of bacteria species) in a sample, has enabled researchers to analyze the microbial compositions in uncultivated samples.
One common goal in microbiome data analysis is to understand how microbes interact with each other. However, the nature of microbiome data determined by the technicalities of the sequencing procedures has imposed various challenges in recovering the microbial interactions. Firstly, the data is composed of discrete counts. Secondly, microbiome data entangles with the ``compositionality", which is a technicality imposed by the sequencing procedures. For instance, in 16S rRNA profiling, the ``sequencing depth", i.e. the total count of sequences in a sample, is pre-determined on the sequencing instrument, and is usually not on the same scale from sample to sample. This implies that the counts for each OTU in a sample carry only the information about their relative abundances instead of their absolute abundances. Thirdly, the microbiome data possesses ``high-dimensionality" in nature. With the resolution at the OTU level, it is likely that the number of OTU’s is far more than the number of samples in a biological experiment.
After one obtains the abundance data for the microbial species, marginal correlation analysis could be used to infer the interactions among microbes \citep{faust2012microbial}. Over the years, several methods have been developed to address the compositionality issue in the construction of correlation networks for microbiome data, such as SparCC \citep{friedman2012inferring} , CCLasso \citep{fang2015cclasso}, and REBECCA \citep{ban2015investigating}. All of those methods aimed to construct a covariance (correlation) matrix or network of the unknown absolute abundances (the positive, unconstrained true abundance of taxa). The high-dimensionality in microbiome data is tackled by imposing a sparsity constraint in the above three methods, with a correlation threshold for SparCC and an $L_1$-norm penalty for CCLasso and REBECCA.
All the above methods are built upon the marginal correlations between two microbial taxa, and they could lead to spurious correlations that are caused by confounding factors such as other taxa in the same community. Alternatively, interactions among taxa can be modeled through their conditional dependencies given the other taxa, which can eliminate the detection of spurious correlations. SPIEC-EASI was probably the first method that was proposed to estimate sparse microbial network based on conditional dependency \citep{kurtz2015sparse}. It first performs a central log-ratio (\textsc{clr}) transformation on the observed counts \citep{aitchison1986statistical}, and then apply graphical lasso \citep{yuan2007model, banerjee2008model, friedman2008sparse} to find the inverse covariance matrix of the transformed data. More recently, gCoda and CD-trace were developed to improve SPIEC-EASI by accounting for the compositionality property of microbiome data \citep{fang2017gcoda, yuan2019compositional}, both of which have been shown to possess better performance in terms of recovering the sparse microbial network than SPIEC-EASI.
It is worth noting that SPIEC-EASI, gCoda, and CD-trace are all built upon the \textsc{clr} transformation of the observed counts. Meanwhile, \cite{jiang2021microbial} and \cite{tian2022compositional} proposed bias-corrected graphical lasso and compositional graphical lasso based on the additive log-ratio (\textsc{alr}) transformed data. In \textsc{alr} transformation, one needs to select a reference taxon and compute the log relative abundance of all other taxa with respect to the reference. One of the major concerns for the \textsc{alr} transformation is the robustness or invariance of the proposed method with respect to the choice of the reference taxon, which is not well studied in the literature.
In this paper, we first establish the reference-invariance property of estimating the sparse microbial network based on the \textsc{alr} transformed data. It shows that a submatrix of the inverse covariance matrix that correspond to the non-candidate-of-reference taxa is invariant with respect to the choice of the reference. Then, we propose a reference-invariant version of the compositional graphical lasso by modifying the penalty in its objective function, which only penalizes the invariant submatrix mentioned above. Additionally, we illustrate the reference-invariance property of the proposed method under a variety of simulation scenarios and also demonstrate its applicability and advantages by applying it to an oceanic microbiome data set.
\section{Methodology}
\label{Sec-3.2}
\subsection{Reference-Invariance Property}
\label{Sec-3.2.1}
Let $\mathbf{p} = (p_1, \ldots, p_{K + 2})'$ denote a vector of compositional probabilities satisfying that $p_1 + \cdots + p_{K + 2} = 1$. The additive log-ratio (\textsc{alr}) transformation picks an entry of this vector as the reference and transforms the compositional vector using log ratios of each entry to the reference. Without loss of generality, suppose we pick the last entry as the reference, then the \textsc{alr} transformed vector becomes
\[ \mathbf{z} = \left[ \log\left(\frac{p_1}{p_{K + 2}}\right), \ldots, \log \left(\frac{p_{K}}{p_{K + 2}} \right), \log \left(\frac{p_{K + 1}}{p_{K + 2}}\right) \right]'. \]
The transformed vector $\mathbf{z}$ is often assumed to follow a multivariate continuous distribution with a mean vector $\boldsymbol{\mu}$ and a covariance matrix $\boldsymbol{\Sigma}$. For example, $\mathbf{z} \sim N(\boldsymbol{\mu}, \boldsymbol{\Sigma})$. Denote further the inverse covariance matrix $\boldsymbol{\Omega} = \boldsymbol{\Sigma}^{-1}$.
Similarly, if we pick another entry as the reference, we can define another \textsc{alr}-transformed vector. For simplicity of illustration, suppose we choose the second last entry to be the reference and consider the following \textsc{alr} transformation
\[ \mathbf{z}_p = \left[ \log\left(\frac{p_1}{p_{K + 1}}\right), \ldots, \log \left(\frac{p_{K}}{p_{K + 1}} \right), \log \left(\frac{p_{K + 2}}{p_{K + 1}}\right) \right]', \]
where the subscript $p$ denotes the ``permuted'' version of $\mathbf{z}$. Similarly, define the mean vector of $\mathbf{z}_p$ by $\boldsymbol{\mu}_p$, the covariance matrix by $\boldsymbol{\Sigma}_p$, and the inverse covariance matrix by $\boldsymbol{\Omega}_p = \boldsymbol{\Sigma}_p^{-1}$.
A simple derivation implies that $\mathbf{z}_p$ is a linear transformation of $\mathbf{z}$ as $\mathbf{z}_p = \mathbf{Q}_p \mathbf{z}$, where
\begin{equation*}
\mathbf{Q}_p = \left( \begin{matrix} \mathbf{I}_{K} & \mathbf{-1} \\ \mathbf{0}' & -1 \end{matrix} \right)
\end{equation*}
with $\mathbf{I}_{K}$ denoting the identity matrix, and $\mathbf{0}$ and $\mathbf{-1}$ denoting the column vectors with all $0$'s and all $-1$'s, respectively. It follows that $\boldsymbol{\mu}_p = \mathbf{Q}_p \boldsymbol{\mu}$, $\boldsymbol{\Sigma}_p = \mathbf{Q}_p \boldsymbol{\Sigma} \mathbf{Q}_p'$, and $\boldsymbol{\Omega}_p = (\mathbf{Q}_p')^{-1} \boldsymbol{\Omega} \mathbf{Q}_p^{-1}$. It is also worth noting that $\mathbf{Q}_p$ is an involutory matrix, i.e., $\mathbf{Q}_p^{-1} = \mathbf{Q}_p$.
The following theorem states the reference-invariance property of the inverse covariance matrix $\boldsymbol{\Omega}$ under the \textsc{alr} transformation.
\begin{thm} \label{Thm-3.1}
$\boldsymbol{\Omega}_{1:K, 1:K} = \boldsymbol{\Omega}_{p, 1:K, 1:K}$, i.e. the $K \times K$ upper-left sub-matrix of the inverse covariance matrix of the \textsc{alr} transformed vector is invariant with respect to the choices of the $(K+2)$-th entry or the $(K+1)$-th entry as the reference.
\end{thm}
Theorem \ref{Thm-3.1} regards the reference-invariance property of the true value of the inverse covariance matrix $\boldsymbol{\Omega}$. It can also be extended to a class of estimators of $\boldsymbol{\Omega}$. Suppose we have i.i.d.\ observations of the compositional vectors $\mathbf{p}_1, \ldots, \mathbf{p}_n$, and consequently, their \textsc{alr} transformed counterparts $\mathbf{z}_1, \ldots, \mathbf{z}_n$. Then, we can construct an estimator of $\boldsymbol{\Sigma}$, denoted by $\hat\boldsymbol{\Sigma}$, based on the i.i.d.\ observations $\mathbf{z}_1, \ldots, \mathbf{z}_n$. Furthermore, we can construct an estimator of $\boldsymbol{\Omega}$, denoted by $\hat\boldsymbol{\Omega}$, by taking its inverse or generalized inverse. The following corollary presents the reference-invariance property for a class of such estimators.
\begin{cor} \label{Cor-3.1}
Suppose $\hat\boldsymbol{\Sigma}_p = \mathbf{Q}_p \hat\boldsymbol{\Sigma} \mathbf{Q}_p'$ and both $\hat\boldsymbol{\Sigma}_p$ and $\hat\boldsymbol{\Sigma}$ are invertible. Let $\hat\boldsymbol{\Omega} = \hat\boldsymbol{\Sigma}^{-1}$ and $\hat\boldsymbol{\Omega}_p = \hat\boldsymbol{\Sigma}_p^{-1}$ be their inverse matrices. Then, $\hat\boldsymbol{\Omega}_{1:K, 1:K} = \hat\boldsymbol{\Omega}_{p, 1:K, 1:K}$, i.e. the $K \times K$ upper-left sub-matrix of the estimated inverse covariance matrix of the \textsc{alr} transformed vector is invariant with respect to the choices of the $(K+2)$-entry or the $(K+1)$-th entry as the reference.
\end{cor}
The above results imply an important property for the additive log-ratio transformation in the compositional data analysis. It can be extended to a more general situation as follows. In general, suppose we have selected a set of entries $\mathbf{p}_{\mathcal{R}}$ as ``candidate references'' in a compositional vector $\mathbf{p}$ and write $\mathbf{p} = (\mathbf{p}_{\mathcal{R}^c}', \mathbf{p}_{\mathcal{R}}')'$. Then, for any \textsc{alr} transformed vector $\mathbf{z}$ based on a reference in the set of candidate references $\mathbf{p}_{\mathcal{R}}$, the $|\mathcal{R}^c| \times |\mathcal{R}^c|$ upper-left sub-matrix of the (estimated) inverse covariance matrix of $\mathbf{z}$ is invariant with respect to the choice of the reference.
In the following subsections, we will incorporate the reference-invariance property into the estimation of a sparse inverse covariance matrix for compositional count data, such as the OTU abundance data in microbiome research.
\subsection{Logistic Normal Multinomial Model}
\label{Sec-3.2.2}
Consider an OTU abundance data set with $n$ independent samples, each of which composes observed counts of $K + 2$ taxa, denoted by $\mathbf{x}_i = (x_{i,1}, \ldots, x_{i,K + 2})'$ for the $i$-th sample, $i = 1,\ldots,n$. Due to the compositional property of the data, the sum of all counts for each sample $i$ is a fixed number, denoted by $M_i$. Naturally, a multinomial distribution is imposed on the observed counts as
\begin{equation}
\mathbf{x}_i | \mathbf{p}_i \sim \text{Multinomial}(M_i, \mathbf{p}_i), \label{multinomial.comp.glasso}
\end{equation}
where $\mathbf{p}_i = (p_{i,1}, \ldots, p_{i,K + 2})'$ are the multinomial probabilities with $\sum_{k=1}^{K + 2} p_{i,k} = 1$.
In addition, we choose one taxon, without loss of generality, the $(K + 2)$-th taxon as the reference and then apply the \textsc{alr} transformation \citep{aitchison1986statistical} on the multinomial probabilities as follows
\begin{equation}
\mathbf{z}_i = \left[ \log \left(\frac{p_{i,1}}{p_{i, K + 2}}\right), \ldots, \log \left(\frac{p_{i, K}}{p_{i, K + 2}}\right), \log \left(\frac{p_{i, K + 1}}{p_{i, K + 2}}\right) \right]',\ i = 1,\ldots,n. \label{log.ratio.transformation.comp.glasso}
\end{equation}
Further assume that $\mathbf{z}_i$'s follow an i.i.d. multivariate normal distribution
\begin{equation}
\mathbf{z}_i \stackrel{iid}{\sim} N (\boldsymbol{\mu}, \boldsymbol{\Sigma}),\ i=1,\ldots,n, \label{logistic.normal.comp.glasso}
\end{equation}
where $\boldsymbol{\mu}$ is the mean, $\boldsymbol{\Sigma}$ is the covariance matrix, and $\boldsymbol{\Omega} = \boldsymbol{\Sigma}^{-1}$ is the inverse covariance matrix. The above model in (\ref{multinomial.comp.glasso})--(\ref{logistic.normal.comp.glasso}) is called a logistic normal multinomial model and has been applied to analyze the microbiome abundance data \citep{xia2013logistic}.
\cite{tian2022compositional} proposed a method called compositional graphical lasso that aims to find a sparse estimator of the inverse covariance matrix $\boldsymbol{\Omega}$, in which the following objective function is minimized
\begin{align}
\ell(\mathbf{z}_1,\ldots,\mathbf{z}_n,\boldsymbol{\mu},\boldsymbol{\Omega}) ={}& -\frac1n\sum_{i=1}^n \left[\mathbf{x}_{i, -(K+2)} ' \mathbf{z}_i - M_i \log\{\mathbf{1}' \exp(\mathbf{z}_i) + 1\}\right] \notag \\
& -\frac12 \log[\det(\boldsymbol{\Omega})] + \frac{1}{2n} \sum_{i=1}^n (\mathbf{z}_i - \boldsymbol{\mu})' \boldsymbol{\Omega} (\mathbf{z}_i - \boldsymbol{\mu}) + \lambda \|\boldsymbol{\Omega}\|_1, \label{objective.function.comp.glasso}
\end{align}
where $\mathbf{x}_{i, -(K+2)} = (x_{i,1}, \ldots, x_{i, K+1})'$ and $\mathbf{1} = (1, \ldots, 1)'$. The above objective function has two parts: The first term in (\ref{objective.function.comp.glasso}) is the negative log-likelihood of the multinomial distribution in (\ref{multinomial.comp.glasso}) and the remaining terms are the regular objective function of graphical lasso for the multivariate normal distribution in (\ref{logistic.normal.comp.glasso}) regarding $\mathbf{z}_1,\ldots, \mathbf{z}_n$ as known quantities.
\subsection{Reference-Invariant Objective Function}
\label{Sec-3.2.3}
Similar to \ref{Sec-3.2.1}, if we choose another taxon, for simplicity of illustration, the $(K + 1)$-th taxon as the reference, then the \textsc{alr} transformation in (\ref{log.ratio.transformation.comp.glasso}) becomes
\[ \mathbf{z}_{i, p} = \left[ \log \left(\frac{p_{i,1}}{p_{i, K + 1}}\right), \ldots, \log \left(\frac{p_{i, K}}{p_{i, K + 1}}\right), \log \left(\frac{p_{i, K + 2}}{p_{i, K + 1}}\right) \right]'.\]
As in Sections \ref{Sec-3.2.1}, $\mathbf{z}_{i, p} = \mathbf{Q}_p \mathbf{z}_i$. Therefore, $\mathbf{z}_{i, p} \stackrel{iid}{\sim} N(\boldsymbol{\mu}_p, \boldsymbol{\Sigma}_p)$, $i=1,\ldots,n$, where $\boldsymbol{\mu}_p = \mathbf{Q}_p \boldsymbol{\mu}$, $\boldsymbol{\Sigma}_p = \mathbf{Q}_p \boldsymbol{\Sigma} \mathbf{Q}_p'$, and $\boldsymbol{\Omega}_p = (\mathbf{Q}_p')^{-1} \boldsymbol{\Omega} \mathbf{Q}_p^{-1}$. The reference-invariance property in \ref{Sec-3.2.1} implies that $\boldsymbol{\Omega}_{1:K,1:K} = \boldsymbol{\Omega}_{p, 1:K,1:K}$.
The different choice of the reference also leads to a different objective function for the compositional graphical lasso method (Comp-gLASSO) as follows
\begin{align}
\ell_p(\mathbf{z}_{1, p},\ldots,\mathbf{z}_{n, p},\boldsymbol{\mu}_p,\boldsymbol{\Omega}_p) =
{}& -\frac1n\sum_{i=1}^n \left[\mathbf{x}_{i, -(K+1)} ' \mathbf{z}_{i,p} - M_i \log\{\mathbf{1}' \exp(\mathbf{z}_{i,p}) + 1\}\right] \notag\\
& -\frac12 \log[\det(\boldsymbol{\Omega}_p)] + \frac{1}{2n} \sum_{i=1}^n (\mathbf{z}_{i, p} - \boldsymbol{\mu}_p)' \boldsymbol{\Omega}_p(\mathbf{z}_{i, p} - \boldsymbol{\mu}_p) + \lambda \|\boldsymbol{\Omega}_p\|_1, \label{objective.function.p}
\end{align}
where $\mathbf{x}_{i, -(K+1)} = (x_{i,1}, \ldots, x_{i, K}, x_{i, K+2})'$ and $\mathbf{1} = (1, \ldots, 1)'$. Comparing (\ref{objective.function.comp.glasso}) and (\ref{objective.function.p}), their first terms are the same as they are both equal to the negative log-likelihood of the multinomial distribution: $-\frac1n \sum_{i=1}^n \sum_{k=1}^{K+2} x_{i,k} \log p_{i,k}$. In addition, from \citet{aitchison1986statistical}, $\det(\boldsymbol{\Omega}) = \det(\boldsymbol{\Omega}_p)$ and $\sum_{i=1}^n (\mathbf{z}_i - \boldsymbol{\mu})' \boldsymbol{\Omega} (\mathbf{z}_i - \boldsymbol{\mu}) = \sum_{i=1}^n (\mathbf{z}_{i, p} - \boldsymbol{\mu}_p)' \boldsymbol{\Omega}_p (\mathbf{z}_{i, p} - \boldsymbol{\mu}_p)$ as known properties of the \textsc{alr} transformation. However, the $L_1$ penalties in (\ref{objective.function.comp.glasso}) and (\ref{objective.function.p}) are different because $\boldsymbol{\Omega}$ is not necessarily equal to $\boldsymbol{\Omega}_p$. The reference-invariance property only implies that $\boldsymbol{\Omega}_{1:K,1:K} = \boldsymbol{\Omega}_{p,1:K,1:K}$.
Motivated by the reference-invariance property, we can impose the $L_1$ penalties only on the invariant entries of $\boldsymbol{\Omega}$ instead of all entries of $\boldsymbol{\Omega}$ as in (\ref{objective.function.comp.glasso}), which leads to
\begin{align}
\ell_{inv}(\mathbf{z}_1,\ldots,\mathbf{z}_n,\boldsymbol{\mu},\boldsymbol{\Omega}) ={}& -\frac1n\sum_{i=1}^n \left[\mathbf{x}_{i, -(K+2)} ' \mathbf{z}_i - M_i \log\{\mathbf{1}' \exp(\mathbf{z}_i) + 1\}\right] \notag \\
& -\frac12 \log[\det(\boldsymbol{\Omega})] + \frac{1}{2n} \sum_{i=1}^n (\mathbf{z}_i - \boldsymbol{\mu})' \boldsymbol{\Omega} (\mathbf{z}_i - \boldsymbol{\mu}) + \lambda \|\boldsymbol{\Omega}_{1:K,1:K}\|_1. \label{invariant.objective.function}
\end{align}
With the previous arguments, we showed that $\ell_{\text{inv}}(\mathbf{z}_1,\ldots,\mathbf{z}_n,\boldsymbol{\mu},\boldsymbol{\Omega})$ is reference-invariant; in other words, the objective function $\ell_{\text{inv}}$ stays the same regardless of whether the $(K + 1)$-th or the $(K + 2)$-th taxa is selected as the reference. This is summarized in the following theorem.
\begin{thm} \label{Thm-3.2}
If $\mathbf{z}_{i,p} = \mathbf{Q}_p \mathbf{z}_i$ for $i = 1,\ldots,n$, $\boldsymbol{\mu}_p = \mathbf{Q}_p \boldsymbol{\mu}$, and $\boldsymbol{\Omega}_p = (\mathbf{Q}_p')^{-1} \boldsymbol{\Omega} \mathbf{Q}_p^{-1}$, then $\ell_{inv}(\mathbf{z}_1,\ldots,\mathbf{z}_n,\boldsymbol{\mu},\boldsymbol{\Omega}) = \ell_{inv, p}(\mathbf{z}_{1,p},\ldots,\mathbf{z}_{n,p},\boldsymbol{\mu}_p,\boldsymbol{\Omega}_p)$.
\end{thm}
We call $\ell_{inv}(\mathbf{z}_1,\ldots,\mathbf{z}_n,\boldsymbol{\mu},\boldsymbol{\Omega})$ in (\ref{invariant.objective.function}) the reference-invariant compositional graphical lasso objective function. To obtain a sparse estimator of $\boldsymbol{\Omega}$, we minimize the objective function $\ell_{inv}(\mathbf{z}_1,\ldots,\mathbf{z}_n,\boldsymbol{\mu},\boldsymbol{\Omega})$ with respect to $\mathbf{z}_1,\ldots,\mathbf{z}_n$, $\boldsymbol{\mu}$, and $\boldsymbol{\Omega}$. We call this estimation approach the reference-invariant compositional graphical lasso (Inv-Comp-gLASSO) method.
In general, suppose we have selected a set of taxa $\mathbf{x}_{\mathcal{R}}$ as ``candidate references'' and write $\mathbf{x} = (\mathbf{x}_{\mathcal{R}^c}', \mathbf{x}_{\mathcal{R}}')'$. Then, the reference-invariant objective function becomes
\begin{align}
\ell_{\text{inv}}(\mathbf{z}_1,\ldots,\mathbf{z}_n,\boldsymbol{\mu},\boldsymbol{\Omega}) ={}& -\frac1n\sum_{i=1}^n \left[\mathbf{x}_{i, \mathcal{R}^c} ' \mathbf{z}_i - M_i \log\{\mathbf{1}' \exp(\mathbf{z}_i) + 1\}\right] \notag \\
& -\frac12 \log[\det(\boldsymbol{\Omega})] + \frac{1}{2n} \sum_{i=1}^n (\mathbf{z}_i - \boldsymbol{\mu})' \boldsymbol{\Omega} (\mathbf{z}_i - \boldsymbol{\mu}) + \lambda \|\boldsymbol{\Omega}_{\mathcal{R}^c, \mathcal{R}^c}\|_1. \label{invariant.objective.function.2}
\end{align}
In other words, (\ref{invariant.objective.function.2}) is invariant regardless of which reference is selected in the set of candidate references, and so is the invariant part of its minimizer.
It is noteworthy that the trick we played in defining the reference-invariant version of Comp-gLASSO is to revise the penalty term from the regular lasso penalty on the whole inverse covariance matrix to that only on the invariant part of the inverse covariance matrix. Using the same trick, we can define the reference-invariant version of other methods such as reference-invariant graphical lasso (Inv-gLASSO). The objective function of Inv-gLASSO is defined as follows when $\mathbf{z}_1, \ldots, \mathbf{z}_n$ are observed instead of $\mathbf{x}_1, \ldots, \mathbf{x}_n$:
\begin{equation}
\ell_{\text{inv}}(\boldsymbol{\mu},\boldsymbol{\Omega}) = -\frac12 \log[\det(\boldsymbol{\Omega})] + \frac{1}{2n} \sum_{i=1}^n (\mathbf{z}_i - \boldsymbol{\mu})' \boldsymbol{\Omega} (\mathbf{z}_i - \boldsymbol{\mu}) + \lambda \|\boldsymbol{\Omega}_{\mathcal{R}^c, \mathcal{R}^c}\|_1. \label{Inv-gLASSO}
\end{equation}
The objective function (\ref{invariant.objective.function.2}) includes naturally three sets of parameters $(\mathbf{z}_1,\ldots,\mathbf{z}_n)$, $\boldsymbol{\mu}$, and $\boldsymbol{\Omega}$, which motivates us to apply a block coordinate descent algorithm. A block coordinate descent algorithm minimizes the objective function iteratively for each set of parameters given the other sets. Given the initial values $(\mathbf{z}_1^{(0)},\ldots,\mathbf{z}_n^{(0)})$, $\boldsymbol{\mu}^{(0)}$, and $\boldsymbol{\Omega}^{(0)}$, a block coordinate algorithm repeats the following steps cyclically for iteration $t= 0,1,2,\ldots$ until the algorithm converges.
\begin{enumerate}
\item Given $\boldsymbol{\mu}^{(t)}$ and $\boldsymbol{\Omega}^{(t)}$, find $(\mathbf{z}_1^{(t+1)},\ldots,\mathbf{z}_n^{(t+1)})$ that maximizes (\ref{invariant.objective.function.2}).
\item Given $(\mathbf{z}_1^{(t+1)},\ldots,\mathbf{z}_n^{(t+1)})$ and $\boldsymbol{\Omega}^{(t)}$, find $\boldsymbol{\mu}^{(t+1)}$ that maximizes (\ref{invariant.objective.function.2}).
\item Given $(\mathbf{z}_1^{(t+1)},\ldots,\mathbf{z}_n^{(t+1)})$ and $\boldsymbol{\mu}^{(t+1)}$, find $\boldsymbol{\Omega}^{(t+1)}$ that maximizes (\ref{invariant.objective.function.2}).
\end{enumerate}
Except for the mild modification on the objective function, the details of the algorithm is essentially the same as the one described in \cite{tian2022compositional}.
\section{Simulation Study}
\label{Sec-3.3}
\subsection{Settings}
\label{Sec-3.3.1}
To illustrate the reference-invariance property under the aforementioned framework, we conduct a simulation study and evaluated the performance of Inv-Comp-gLASSO as well as Inv-gLASSO.
Following \cite{tian2022compositional}, we generate three types of inverse covariance matrices $\boldsymbol{\Omega} = (\omega_{kl})_{1\le k,l \le K + 1}$ as follows:
\begin{enumerate}
\item \textbf{Chain}: $\omega_{kk} = 1.5$, $\omega_{kl} = 0.5$ if $|k - l| = 1$, and $\Omega_{kl} = 0$ if $|k - l| > 1$. Every node is connected to the adjacent node(s), and therefore the degree is $2$ for all but two nodes.
\item \textbf{Random}: $\omega_{kl} = 1$ with probability $3/ (K + 1)$ for $k \ne l$. Every two nodes are connected with a fixed probability, and the expected degree is the same for all nodes.
\item \textbf{Hub}: Nodes are randomly partitioned into $\lceil (K + 1) / 20 \rceil$ groups, and there's one ``hub node" in each group. For the other nodes in the group, they are only connected to the hub node but not each other. There's no connection among groups. The degree of connectedness is much higher for the hub nodes
, and is $1$ for the rest of the nodes.
\end{enumerate}
In the simulations, we also vary two other factors that play a crucial role in the performances of the methods:
\begin{enumerate}
\item \textbf{Sequencing depth}. $M_i$'s are simulated from $\text{Uniform}(20K, 40K)$ or $\text{Uniform}(100K, 200K)$, denoted by ``low" and ``high" sequencing depth.
\item \textbf{Compositional variation}. For each aforementioned inverse covariance matrix $\boldsymbol{\Omega}$ (``low" compositional variation), we also divide each of them by a factor of $5$ to obtain another set of inverse covariance matrices, i.e., $\boldsymbol{\Omega}$/5 (``high" compositional variation).
\end{enumerate}
The data are simulated from the logistic normal multinomial distribution in (\ref{multinomial.comp.glasso})--(\ref{logistic.normal.comp.glasso}). In detail, $\mathbf{z}_i \sim N (\boldsymbol{\mu}, \boldsymbol{\Sigma})$ are first generated independently for $i = 1,\ldots,n$; then, the softmax transformation (the inverse of the \textsc{alr} transformation) was applied to get the multinomial probabilities $\mathbf{p}_i$ with the $(K + 2)$-th entry serving as the true reference; last, the multinomial random variables $\mathbf{x}_i$ were simulated from $Multinomial(M_i; \mathbf{p}_i)$, for $i = 1,\ldots,n$. We set $n = 100$ and $K = 49$ throughout the simulations.
The simulation results are based on 100 replicates of the simulated data. Both Inv-Comp-gLASSO and Inv-gLASSO are applied with two choices of reference, the $(K+1)$-th entry serving as the false reference and the $(K+2)$-th entry serving as the true reference. and only the reference-invariant sub-network $\boldsymbol{\Omega}_{1:K,1:K}$ is used in the evaluations. For Inv-gLASSO, we estimate $\mathbf{p}_1,\ldots,\mathbf{p}_n$ with $\mathbf{x}_1/M_1, \ldots, \mathbf{x}_n/M_n$, and performe the \textsc{alr} transformation to get the estimates of $\mathbf{z}_1,\ldots,\mathbf{z}_n$, which are denoted by $\tilde\mathbf{z}_1,\ldots,\tilde\mathbf{z}_n$. We then apply Inv-gLASSO to $\tilde\mathbf{z}_1,\ldots,\tilde\mathbf{z}_n$ directly to find the inverse covariance matrix $\boldsymbol{\Omega}$, which also serves as the starting value for Inv-Comp-gLASSO. For both methods, we implement them with a common sequence of $70$ tuning parameters of $\lambda$.
We empirically validate the invariance property of Inv-Comp-gLASSO and Inv-gLASSO by comparing the estimators of the two sub-networks $\boldsymbol{\Omega}_{1:K,1:K}$ resulted from choosing the true and false reference separately in each method, which have been shown to be theoretically invariant in Section \ref{Sec-3.2}. The comparison is assessed under four criteria as follows.
\begin{enumerate}
\item Normalized Manhattan Similarity
For two matrices $\mathbf{A}$ and $\mathbf{B}$, we define the normalized Manhattan similarity (NMS) as
\[\text{NMS}(\mathbf{A},\mathbf{B}) = 1 - \frac{ \norm{\mathbf{A } - \mathbf{B}}_1}{\norm{\mathbf{A}}_1 + \norm{\mathbf{B}}_1},\]
where $\norm{\cdot}_1$ represents the entrywise $L_1$ norm of a matrix. Note that $0 \leq \text{NMS} \leq 1$ due to the non-negativity of norms and the triangle inequality.
\item Jaccard Index\\
For two networks with the same nodes, denote their set of edges by $\mathcal{A}$ and $\mathcal{B}$. Then the Jaccard Index \citep{jaccard1901distribution} is defined as follows:
\[J(\mathcal{A}, \mathcal{B}) = \frac{|\mathcal{A} \cap \mathcal{B}|}{|\mathcal{A} \cup \mathcal{B}|}. \]
Obviously, it also holds that $0 \leq J(\mathcal{A}, \mathcal{B}) \leq 1$.
\item Normalized Hamming Similarity\\
In the context of network comparison, the normalized Hamming similarity for two adjacency matrices $\mathbf{A}$ and $\mathbf{B}$ with the same $N$ nodes are defined as follows \citep{hamming1950error}
\[H(\mathbf{A}, \mathbf{B}) = 1 - \frac{\norm{ \mathbf{A} - \mathbf{B}}_1} {N(N-1)},\]
where $\norm{\cdot}_1$ denotes the entrywise $L_1$ norm of a matrix. Since there are at most $N(N-1)$ $1$'s in an adjacency matrix with $N$ nodes, this metric is also between $0$ and $1$.
\item ROC Curve \\
The ROC curves on which true positive rate (TPR) and false positive rate (FPR) are plotted and also compared between the choices of true and false reference.
\end{enumerate}
\subsection{Results}
\label{Sec-3.3.2}
\subsubsection{Normalized Manhattan Similarity}
The normalized Manhattan similarity serves as a direct measure of the similarity between the two estimated inverse covariance matrices with different choices of the reference. On a sequence of $70$ tuning parameter $\lambda$'s, we calculated the normalized Manhattan similarity between the two estimated inverse covariance matrices with the true and false references separately. Figure \ref{Normalized Manhattan Similarity} shows the average normalized Manhattan similarity over 100 replicates along with standard error bars.
\label{Sec-3.3.2.1}
\begin{figure}[htbp]
\centering
\includegraphics[scale=0.425]{dist_invar.pdf}
\caption{Normalized Manhattan similarity between the two estimated inverse covariance matrices with true and false references. Solid blue: Inv-Comp-gLASSO; dashed red: Inv-gLASSO. $\mathbf{h, h}$: high sequencing depth, high compositional variation; $\mathbf{h, l}$: high sequencing depth, low compositional variation; $\mathbf{l, h}$: low sequencing depth, high compositional variation; $\mathbf{l, l}$: low sequencing depth, low compositional variation.}
\label{Normalized Manhattan Similarity}
\end{figure}
We can see from Figure \ref{Normalized Manhattan Similarity} that, the normalized Manhattan similarity for Inv-gLASSO stays close to 1 in all settings, throughout the whole sequence of tuning parameters. On the other hand, there are some fluctuations in the same metric from Inv-Comp-gLASSO, although most values stay higher than 0.9. Empirically, the two estimated matrices are numerically identical for Inv-gLASSO and close for Inv-Comp-gLASSO. A potential reason why the invariance of Inv-gLASSO is numerically more evident than that of Inv-Comp-gLASSO is that Inv-gLASSO is a convex optimization while Inv-Comp-gLASSO is not necessarily convex \citep{tian2022compositional}. With different starting points (as we choose different references), Inv-Comp-gLASSO might result in different solutions as the algorithm is only guaranteed to converge to a stationary point. We refer to \cite{tian2022compositional} for more detailed discussion about the convexity and the convergence of the algorithm.
In addition, it is consistently observed that the normalized Manhattan similarity for Inv-Comp-gLASSO starts close to 1 when $\lambda$ is very large and gradually decreases with some fluctuations as $\lambda$ decreases. This is because the Inv-Comp-gLASSO objective function in (\ref{invariant.objective.function}) is solved by an iterative algorithm between graphical lasso to estimate $(\boldsymbol{\mu}, \boldsymbol{\Omega})$ and Newton-Raphson to estimate $\mathbf{z}_1,\ldots,\mathbf{z}_n$, which can lead to more numerical errors depending on the number of iterations. Furthermore, the algorithm is implemented with warm start for a sequence of decreasing $\lambda$'s, i.e., the solution for the previous $\lambda$ value is used as the starting point for the current $\lambda$ value. With the accumulation of numerical errors, the numerical difference between the two estimated matrices becomes larger.
Among the simulation settings, we find the invariance property for Inv-Comp-gLASSO is most evidently supported by the numerical results in the ``high sequencing depth, low compositional variation'' setting, regardless of the network types. The normalized Manhattan similarity is very close to 1 for Inv-Comp-gLASSO throughout the sequence of tuning parameters. This is because the compositional probabilities $\mathbf{p}_i$'s and thus the $\mathbf{z}_i$'s are estimated accurately with high sequencing depth and low compositional variation in the first iteration of the Inv-Comp-gLASSO algorithm, which implies fewer iterations for the algorithm to converge and less numeric error accumulated during this process. On the other hand, the normalized Manhattan similarity is the lowest in the ``low sequencing depth, high compositional variation'' setting. It is due to a similar reason that it takes more iterations for the Inv-Comp-gLASSO algorithm to converge, accumulating more numerical errors. However, it is noteworthy that this is exactly the setting in which Inv-Comp-gLASSO has the most advantage over Inv-gLASSO in recovering the true network (see Section \ref{Sec-3.3.2.3} for their ROC curves).
\subsubsection{Jaccard Index and Normalized Hamming Similarity}
\label{Sec-3.3.2.2}
Compared to normalized Manhattan similarity that measures directly the similarity between two inverse covariane matrices, both Jaccard index and normalized Hamming similarity measure the similarity between two networks represented by the matrices because they only compared the adjacency matrices or the edges of the two networks. Again, on a sequence of $70$ tuning parameter $\lambda$'s, we computed the Jaccard index and the normalized Hamming similarity between the two networks with true and false references separately. Figures \ref{Jaccard Index} and \ref{Normalized Hamming Similarity} plot the average Jaccard index and the normalized Hamming similarity over 100 replicates along with standard error bars.
\begin{figure}[htbp]
\centering
\includegraphics[scale=0.425]{index_invar.pdf}
\caption{Jaccard index between the two networks with true and false references. Solid blue: Inv-Comp-gLASSO; dashed red: Inv-gLASSO. $\mathbf{h, h}$: high sequencing depth, high compositional variation; $\mathbf{h, l}$: high sequencing depth, low compositional variation; $\mathbf{l, h}$: low sequencing depth, high compositional variation; $\mathbf{l, l}$: low sequencing depth, low compositional variation.}
\label{Jaccard Index}
\end{figure}
\begin{figure}[htbp]
\centering
\includegraphics[scale=0.425]{dist_01_invar.pdf}
\caption{Normalized Hamming similarity between the two networks with true and false references. Solid blue: Inv-Comp-gLASSO; dashed red: Inv-gLASSO. $\mathbf{h, h}$: high sequencing depth, high compositional variation; $\mathbf{h, l}$: high sequencing depth, low compositional variation; $\mathbf{l, h}$: low sequencing depth, high compositional variation; $\mathbf{l, l}$: low sequencing depth, low compositional variation.}
\label{Normalized Hamming Similarity}
\end{figure}
The results of normalized Hamming similarity in Figure \ref{Normalized Hamming Similarity} have a fairly similar pattern to those of normalized Manhattan similarity in Figure \ref{Normalized Manhattan Similarity} and thus can be similarly interpreted. We only focus on the results of Jaccard index in Figure \ref{Jaccard Index} here. The Jaccard index stays close to 1 for Inv-gLASSO, implying the identity between the two networks. Although the results of the Jaccard index for Inv-Comp-gLASSO look quite different from the other measures at the first glance, it actually implies a similar conclusion. First, we notice that there is no Jaccard index for the first few tuning parameters that are large enough. This is because the resultant network is empty with either true or false reference. Although two empty networks agree with each other perfectly, the Jaccard index is not well defined. Then, as Inv-Comp-gLASSO starts to pick up edges when $\lambda$ decreases, the Jaccard index is quite low in some settings, suggesting that the two networks are dissimilar. However, this is due to the fact the Jaccard index is a much more ``strict" similarity measure than the Hamming similarity. For example, for two networks with 100 possible total edges, if both networks only have one but a different edge, then the Jaccard index is $0$ while the normalized Hamming similarity is $0.98$. Finally, as the networks become denser, the Jaccard index increases quickly and stabilizes at a quite high value in most settings.
It is also notable that both the Jaccard index and the normalized Hamming similarity are relatively high in the ``high sequencing depth, low compositional variation'' setting and relatively low in the ``low sequencing depth, high compositional variation'' setting, which is consistent with the finding for the normalized Manhattan similarity.
\subsubsection{ROC Curves}
\label{Sec-3.3.2.3}
An ROC curve is plotted from the average of true positive rates and the average of false positive rates over 100 replicates. An ROC curve can be regarded as an indirect measure of the invariance (two networks possessing similar ROC curves is a necessary but not sufficient condition for the two networks to be similar). However, it is crucial to evaluate the algorithms with this criterion, since it answers the question: ``Does the performance of the algorithm depends on the choice of reference?"
\begin{figure}[h!]
\centering
\includegraphics[scale=0.425]{ROC_invar.pdf}
\caption{ROC curves for Inv-Comp-gLASSO and Inv-gLASSO with true and false references. Long-dashed blue: Inv-Comp-gLASSO with true reference; dashed red: Inv-Comp-gLASSO with false reference; dashed-dotted purple: Inv-Comp-gLASSO with true reference; dotted black: Inv-Comp-gLASSO with false reference. $\mathbf{h, h}$: high sequencing depth and high compositional variation; $\mathbf{h, l}$: high sequencing depth and low compositional variation; $\mathbf{l, h}$: low sequencing depth and high compositional variation; $\mathbf{l, l}$: low sequencing depth and low compositional variation.}
\label{ROC_invar}
\end{figure}
We could see that the ROC curves from Inv-Comp-gLASSO, regardless of the choice of the reference, dominate the ones from Inv-gLASSO in all settings. The two ROC curves from Inv-gLASSO lay perfectly on top of each other, while the curves from Inv-Comp-gLASSO are also fairly close to each other. These empirical results validate the theoretical reference-invariance property for both methods. In addition, Inv-Comp-gLASSO has the most obvious advantage over Inv-gLASSO in the ``low sequencing depth, high compositional variation'' setting and they perform almost identically in the ``low sequencing depth, high compositional variation'' setting. Although the similarity measures are lower in the ``most favorable" setting for Inv-Comp-gLASSO (see Sections \ref{Sec-3.3.2.1} and \ref{Sec-3.3.2.2}), the ROC curves of the two networks from the method do not deviate too much from each other in this setting.
\section{Real Data}
\label{Sec-3.4}
To further validate the theoretical reference-invariance properties of Inv-Comp-gLASSO and Inv-gLASSO, we applied them to a dataset from the TARA Ocean project, in which the Tara Oceans consortium sampled both plankton and environmental data in 210 sites from the world oceans. The data collected was later analyzed using sequencing and imaging techniques. We downloaded the taxonomic data and the literature interactions from the TARA Ocean Project data repository (\url{https://doi.pangaea.de/10.1594/PANGAEA.843018}). As part of the TARA Oceans project, \cite{lima2015determinants} investigated the impact of both biotic and abiotic interactions in oceanic ecosystem. In this article, a literature-curated list of genus-level marine eukaryotic plankton interactions was generated by a panel of experts.
Similar to \cite{tian2022compositional}, we focused the analysis on genus level and only kept the 81 genus involved in the literature-reported interactions. For computational simplicity, we removed the samples with too small reads ($< 100$). As a result, it leaves with 324 samples in the final preprocessed data. From the genera that were not reported in the literature, we chose two of them, Acrosphaera and Collosphaera, with the largest average relative abundances as the references. We then applied both Inv-Comp-gLASSO and Inv-gLASSO to the \textsc{alr}-transformed data with those two references, with a common sequence of tuning parameters. For each combination of a method and a reference, we also selected a tuning parameter that corresponds to the ``asymptotically sparsistent'' (the sparsest estimated network in the path that contains the true network asymptotically) network by StARS \citep{liu2010stability}.
\begin{figure}[htbp]
\centering
\includegraphics[scale=0.9]{TARA_dist_invar_35.pdf}
\caption{Normalized Manhattan similarity between the two estimated inverse covariance matrices with the the two choices of reference, Acrosphaera and Collosphaera, from the TARA data. Solid blue: Inv-Comp-gLASSO; dashed red: Inv-gLASSO.}
\label{TARA_NMS_invar}
\end{figure}
\begin{figure}[htbp]
\centering
\includegraphics[scale=0.65]{TARA_pair_invar_35.pdf}
\caption{Jaccard index and normalized Hamming similarity between the two estimated networks with the the two choices of reference, Acrosphaera and Collosphaera, from the TARA data. Solid blue: Inv-Comp-gLASSO; dashed red: Inv-gLASSO.}
\label{TARA_pair_invar}
\end{figure}
Figures \ref{TARA_NMS_invar} presents the normalized Manhattan similarity between two estimated inverse covariance matrices with the two choices of reference. Figures \ref{TARA_pair_invar} plotted the Jaccard index and the normalized Hamming similarity between the two networks represented by the two estimated inverse covariance matrices. We can see from Figure \ref{TARA_NMS_invar} and Figure \ref{TARA_pair_invar} that, all three similarity metrics stay steadily around $1$ for Inv-gLASSO throughout the sequence of $\lambda$'s. This agrees with our observation in simulations where Inv-gLASSO produced numerically identical inverse covariance matrices.
For Inv-Comp-gLASSO, the similarity scores start around $1$ (for normalized Manhattan similarity and normalized Hamming similarity) or non-existent (for Jaccard index) when the estimated networks are empty. Then, as $\lambda$ decreases, the estimated networks become denser, and the measures start to fluctuate and decline slightly at the end. In spite of the fluctuations, both normalized Manhattan similarity and normalized Hamming similarity stay above 0.9, while the lowest Jaccard index is about 0.64. As discussed earlier, Jaccard index is a stricter measure than normalized Hamming similarity.
Within each method, StARS picked the same tuning parameter $\lambda$ regardless of the choice of the reference, as denoted by the red dot for Inv-gLASSO and the blue dot for Inv-Comp-gLASSO in Figures \ref{TARA_NMS_invar} and \ref{TARA_pair_invar}. In other words, the red and blue dots represent the tuning parameters corresponding to the final estimated networks selected by StARS. Again, the three similarity measures for the two final inverse covariance matrices or networks from Inv-gLASSO is almost 1, while the normalized Manhattan similarity, Jaccard index, and normalized Hamming similarity are $0.98$, $0.96$ and $0.99$ for Inv-Comp-gLASSO. All these high similarity scores imply the empirical invariance for Inv-gLASSO and Inv-Comp-gLASSO. Both methods result in invariant inverse covariance matrices and thus the corresponding networks with respect to the choices of the reference genus (Acrosphaera or Collosphaera) when applied to the TARA Ocean eukaryotic dataset.
\section{Discussion}
\label{Sec-3.5}
In this work, we established the reference-invariance property in sparse inverse covariance matrix estimation and network construction based on the \textsc{alr} transformed data. Then, we proposed the reference-invariant versions of the compositional graphical lasso and graphical lasso by modifying the penalty in their respective objective functions. In addition, we validated the reference-invariance property of the proposed methods empirically by applying them to various scenarios of simulations and a real TARA Ocean eukaryotic dataset.
It is noteworthy that the reference-invariance property is a general property for estimating the inverse covariance matrix based on the \textsc{alr} transformed data. We proposed reference-invariant versions of compositional graphical lasso and graphical lasso based on this property, however, one may revise other existing methods for inverse covariance matrix estimation based on the \textsc{alr} transformed data. The trick is to revise the objective function so that it becomes invariant with respect to the choice of the reference. Subsequently, the resultant inverse covariance matrix and network are expected to be reference-invariant both theoretically and empirically, the latter of which may depend on the algorithm that is used to optimize the reference-invariant objective function.
|
\section{Introduction}
\label{sec:intro}
A reconfiguration problem asks, given two feasible solutions $S$ and $S'$ of a combinatorial problem,
whether there is a step-by-step transformation from $S$ to $S'$ without losing the feasibility~\cite{ItoDHPSUU11}.
The field studying such problems, called \emph{combinatorial reconfiguration}, is growing rapidly.
The source combinatorial problems in reconfiguration problems have spread in many subareas of theoretical computer science
(see surveys~\cite{Heuvel13,Nishimura18}).
In this work, we focus on reconfiguration problems on graphs,
especially the ones considering some vertex subsets as feasible solutions.
Such problems involve classic properties like
independent sets~\cite{KaminskiMM12},
vertex covers~\cite{MouawadNRS18},
dominating sets~\cite{SuzukiMN16},
and some connected variants~\cite{LokshtanovMPS22}.
Restrictions to some important graph classes
such as bipartite graphs~\cite{LokshtanovM19}, split graphs~\cite{BelmonteKLMOS21}, and sparse graphs~\cite{LokshtanovMPRS18}
are also studied.
Since many problems are studied under many settings in combinatorial reconfiguration,
one may ask for a unified method, or an \emph{algorithmic meta-theorem}, for handling reconfiguration problems like Courcelle's theorem
for classic (non-reconfiguration) problems~\cite{Courcelle90mso1,Courcelle92mso3,ArnborgLS91,BoriePT92,CourcelleMR00}.
Since reconfiguration problems are hard in general (often PSPACE-complete~\cite{ItoDHPSUU11}),
we need to consider some special cases or introduce some additional parameters to consider fixed-parameter tractability.
One successful approach in this direction was taken by Mouawad et al.~\cite{MouawadNRW14}, who showed that
if the feasible solutions in a graph can be expressed in monadic second-order logic,
then the reconfiguration problem (under reasonable transformation rules)
is fixed-parameter tractable parameterized simultaneously by the treewidth of the underlying graph
and the length of a transformation sequence.
Their method is quite general and can be applied to several other settings.\footnote{%
We elaborate on this a little more in \cref{ssec:related}.}
On the other hand, Wrochna~\cite{Wrochna18} showed that if the length of a transformation sequence is not part of the parameter,
then some problems that fit in this framework are PSPACE-complete even on graphs of bounded bandwidth.
The two results mentioned above
(the tractability parameterized by treewidth $+$ transformation length~\cite{MouawadNRW14} and
the intractability parameterized solely by bandwidth~\cite{Wrochna18}) might be interpreted as that
if we have the length of a transformation sequence in the parameter, then we can do pretty much everything we expect,
and otherwise we can expect very little.
Thus, one might conclude that this line of research is complete and
the length of a transformation sequence is necessary and sufficient in some sense for having efficient algorithms.
Indeed, to the best of our knowledge, the study of meta-algorithms for reconfiguration problems was not extended after these results.
In this paper, we revisit the investigation of meta-algorithms for reconfiguration problems
and shed light on the settings where the length of a transformation sequence is \emph{not} part of the parameter.
In particular, we present fixed-parameter algorithms
for the reconfiguration problem of vertex sets defined by a monadic second-order formula
parameterized by vertex cover number or neighborhood diversity.
We also show that when combined with the solution set size,
treedepth can be used to obtain a fixed-parameter algorithm.
We then complement this result by showing that when the solution size is not part of the parameter,
the problem is PSPACE-complete on graphs of constant treedepth.
\subsection{Our results}
Now we give a little more precise description of our results.
Formal definitions not given here can be found in \cref{sec:pre}.
For a graph $G$, we denote its clique-width by $\cw(G)$,
treewidth by $\tw(G)$,
treedepth by $\td(G)$, vertex cover number by $\vc(G)$,
neighborhood diversity by $\nd(G)$,
cluster deletion number by $\cd(G)$.
(We define some of these parameters in the last part of \cref{sec:pre}.)
See \cref{fig:parameters} for the hierarchy among the graph parameters studied in this paper and some related ones.
For a graph parameter $\mathsf{f}$, we often say informally that
a problem is fixed-parameter tractable ``parameterized by $\mathsf{f}$''
to mean ``parameterized by $\mathsf{f}(G)$, where $G$ is the input graph.''
Given a monadic second-order (\mso{1}) formula $\phi$ with one free set variable,
a graph $G$, and two vertex subsets $S, S'$ of the same size,
\MSORfull{1} (\MSOR{1}) asks whether there exists a sequence of vertex subsets from $S$ to $S'$
such that each set in the sequence satisfies the property expressed by $\phi$
and each set in the sequence is obtained from the previous one by exchanging one vertex with another.
Note that this rule allows to exchange any pair of vertices.
Such a rule is well studied and called the \emph{token jumping} rule~\cite{KaminskiMM12}.
There is another well-studied rule called the \emph{token sliding} rule~\cite{HearnD05},
which requires that the exchanged vertices are adjacent in $G$.
We focus on the simpler rule token jumping in this paper
and comment on the token sliding counter parts in \cref{sec:token-sliding}.
\MSORfull{2} (\MSOR{2}) with more general \mso{2} formulas is defined analogously.
To show a concrete example of \MSOR{1},
let $\phi(S) \coloneqq \forall u \, \forall v \colon (u \in S \land v \in S) \Rightarrow \lnot E(u,v)$.
This $\phi$ is an \mso{1} formula (see \cref{sec:pre}) expressing that $S$ is an independent set.
Thus, \MSOR{1} with this $\phi$ is exactly \textsc{Independent Set Reconfiguration} under the token jumping rule.
Now the main results in this paper can be summarized as follows.
\begin{enumerate}
\item \MSOR{1} is FPT parameterized by $\nd + |\phi|$.
\begin{itemize}
\item \MSOR{2} is FPT parameterized by $\vc + |\phi|$,
but not by $\nd + |\phi|$ unless $\mathrm{E} = \mathrm{NE}$.
\item The positive results here strongly depend on the token jumping rule.
\end{itemize}
\item \MSOR{2} is FPT parameterized by $\td + k + |\phi|$, where $k$ is the size of input sets $S$ and $S'$.
\begin{itemize}
\item This result holds also under the token sliding rule.
\item As a by-product, we show that \MSOR{1} is FPT parameterized by $\cd + k + |\phi|$.
\end{itemize}
\item For some fixed $\phi$, \MSOR{1} is PSPACE-complete even on forests of depth~$3$.
\begin{itemize}
\item A similar hardness result can be shown under the token sliding rule.
\end{itemize}
\end{enumerate}
In all positive results, we can find a shortest sequence for transformation (if any exists).
\begin{figure}[tb]
\centering
\begin{tikzpicture}[every node/.style={draw, thick, rectangle, rounded corners,align=center,fill=slgray},scale=.90]
\small
\node (vc) at (0, 0) {vertex cover};
\node (ml) at (5.5, 0) {max leaf number};
\node (nd) at (0, 1.5) {neighborhood \\ diversity};
\node (td) at (3, 1) {treedepth};
\node (bw) at (5.5, 1) {bandwidth};
\node (tc) at (-3, 1) {twin cover};
\node (mw) at (0, 3) {modular-width};
\node (pw) at (3, 2.25) {pathwidth};
\node (cd) at (-3, 3.5) {cluster deletion};
\node (tw) at (3, 3.5) {treewidth};
\node (cw) at (0, 4.5) {clique-width};
\draw[thick] (cw) -- (mw) -- (nd) -- (vc);
\draw[thick] (tw) -- (pw) -- (td);
\draw[thick] (cw) [out=0,in=90] to (tw);
\draw[thick] (cw) [out=180,in=90] to (cd);
\draw[thick] (td) [out=270,in=0] to (vc);
\draw[thick] (tc) [out=270,in=180] to (vc);
\draw[thick] (cd) -- (tc);
\draw[thick] (tc) -- (mw);
\draw[thick] (bw) -- (ml);
\draw[thick] (pw) [out=0,in=90] to (bw);
\end{tikzpicture}
\caption{The graph parameters studied in this paper (with some related ones).
A connection between two parameters indicates the existence of a function in the one above
that lower-bounds the one below.}
\label{fig:parameters}
\end{figure}
\subsection{Related work}
\label{ssec:related}
Wrochna~\cite{Wrochna18} showed that \MSOR{1} is PSPACE-complete
on graphs of constant bandwidth when $\phi$ expresses independent sets.
This implies the PSPACE-completeness of \MSOR{1} on graphs of
constant pathwidth, treewidth, and clique-width (see \cref{fig:parameters}).
This result was later strengthened by van der Zanden~\cite{Zanden15},
who showed that the same problem is PSPACE-complete on planar graphs having constant bandwidth and maximum degree~$3$.
To cope with this intractability,
Mouawad et al.~\cite{MouawadNRW14} considered a variant with the additional restriction that
the length of a transformation sequence cannot exceed some upper bound $\ell$.
They showed that this variant of \MSOR{2} is fixed-parameter tractable parameterized by $\ell + \tw + |\phi|$.
They reduce the reconfiguration problem
to the model-checking problem of a single \mso{2} formula
by expressing the existence of fewer than $\ell$ intermediate sets that satisfy $\phi$
and also expressing that the change from a set to the next one obeys the transformation rule.
Their framework is quite general and can be used in several other settings
such as vertex sets defined by an \mso{1} formula with the parameter $\ell + \cw + |\phi|$,
or size-$k$ vertex sets defined by a first-order formula with the parameter $\ell + k + |\phi|$ on a nowhere dense graph class (as observed also in \cite{LokshtanovMPRS18}).
Also, since the step-by-step modification can be defined by a formula,
the results apply not only for the token jumping rule but also for several other rules including the token sliding rule.\footnote{%
Actually, the rule used in~\cite{MouawadNRW14} was another one called ``token addition and removal,'' which is trickier to handle.}
Another important line of studies on parameterized complexity of reconfiguration problems
take the input set size $k$ as the main parameter instead of a graph structural parameter.
This line was initiated by Mouawad et al.~\cite{MouawadN0SS17},
who showed several results parameterized solely by $k$ and also by $k + \ell$.
Recently, Bodlaender et al.~\cite{BodlaenderGNS21,BodlaenderGS21}
further extended this line by showing that
depending on whether and how the parameter depends on $\ell$,
the problem becomes complete to XL, XNL, or XNLP\@.
\section{Preliminaries}
\label{sec:pre}
We assume that the reader is familiar with the parameterized complexity theory.
See a standard textbook (e.g., \cite{CyganFKLMPPS15,Niedermeier06,FlumG06,DowneyF13}) for basic definitions.
Let $G = (V,E)$ be a graph.
For $X \subseteq V$, we denote by $G[X]$ and $G-X$ the graphs induced by $X$ and $V \setminus X$, respectively.
We sometimes denote the vertex set of $G$ by $V(G)$ and the edge set by $E(G)$.
For a digraph $D$, we denote by $A(D)$ its arc set.
For a non-negative integer $d$, let $[d]$ denote the set $\{i \in \mathbb{Z} \mid 1 \le i \le d\}$.
For two non-negative integers $a,b$ with $a \le b$, let $[a,b]$ denote the set $\{i \in \mathbb{Z} \mid a \le i \le b\}$.
\subparagraph*{Colored graphs}
In this paper, we consider graphs in which each vertex has a (possibly empty) set of colors.
We call them \emph{colored graphs}.
Formally, a colored graph $G$ is a tuple $(V,E,\mathcal{C})$
such that the vertex set is $V$,
the edge set $E \subseteq \binom{V}{2}$ is a set of unordered pairs of vertices,
and
$\mathcal{C} = \langle C_{1}, \dots, C_{c} \rangle$
is a tuple of subsets of $V$, where each $C_{i}$ is called a \emph{color}.
For $v \in V$, let $\mathcal{C}(v)$ denote the set of colors that $v$ belongs to.
When $\mathcal{C}(v) = \emptyset$ for all $v \in V$, then the graph is \emph{uncolored}.
As we describe later, monadic second-order formulas treat
the edge set as a symmetric binary relation on $V$ and each color as a unary relation on $V$.
As the number of colors a formula $\phi$ can access is bounded by $|\phi|$,
which is always considered as a parameter or a constant in this paper,
we can assume that the number of colors $c$ is a parameter as well.
We omit the information of colors and say $G = (V,E)$ when colors do not matter.
Two colored graphs $G = (V, E, \langle C_{1}, \dots, C_{c} \rangle)$ and $G' = (V', E', \langle C'_{1}, \dots, C'_{c} \rangle)$ are \emph{isomorphic}
if there is a color-preserving isomorphism $f \colon V \to V'$; that is,
\begin{itemize}
\item for all $u,v \in V$, $\{u,v\} \in E$ if and only if $\{f(u),f(v)\} \in E'$, and
\item for all $v \in V$ and $1 \le i \le c$, $v \in C_{i}$ if and only if $f(v) \in C'_{i}$.
\end{itemize}
We also say that
$\langle G, S \rangle$ and $\langle G', S' \rangle$ are isomorphic for sets $S \subseteq V$ and $S' \subseteq V'$ if the colored graphs
$(V, E, \langle C_{1}, \dots, C_{c}, S \rangle)$ and $(V', E', \langle C'_{1}, \dots, C'_{c}, S' \rangle)$ are isomorphic.
\subparagraph*{Monadic second-order logic}
In the monadic second-order logic on colored graphs, denoted \mso{1},
we can use vertex variables and vertex-set variables.
The atomic formulas are
the equality $x=y$ of vertex variables,
the adjacency relation $E(x,y)$ which means $\{x,y\} \in E$,
the color predicate $C_{i}(x)$ for each color $C_{i}$ which means $x \in C_{i}$,
and the inclusion predicate $X(x)$ for a variable $x$ and a set variable $X$ which means $x \in X$.
The \mso{1} formulas are recursively defined from atomic formulas
using the usual Boolean connectives ($\lnot$, $\land$, $\lor$, $\Rightarrow$, $\Leftrightarrow$),
and quantification of variables ($\forall x$, $\exists x$, $\forall X$, $\exists X$).
For the sake of readability, we often use syntactic sugar in \mso{1} formulas
(e.g., we write ``$\exists x \in X\colon \psi$'' to mean ``$\exists x \colon X(x) \land \psi$'').
As syntax sugars, we also use dotted quantifiers $\dot{\exists}$ and $\dot{\forall}$ to quantify distinct objects.
For example, $\dot{\exists} a,b,c\colon \psi$
means $\exists a,b,c\colon (a \ne b) \land (b \ne c) \land (c \ne a) \land \psi$ and
$\dot{\forall} a,b,c\colon \psi$
means $\forall a,b,c\colon ((a \ne b) \land (b \ne c) \land (c \ne a)) \Rightarrow \psi$.
\mso{2} is an extension of \mso{1} that additionally allows edge variables, edge-set variables,
and an atomic formula $I(e,x)$ that represents the edge-vertex incidence relation.
It is known that \mso{2} is strictly more powerful than \mso{1} in general~\cite{CourcelleE12}.
An \mso{1} (or \mso{2}) formula $\phi$ with free variables $X_{1}, \dots, X_{p}$
is denoted by $\phi(X_{1}, \dots, X_{p})$.
For a graph $G$ and vertex subsets $S_{1}, \dots, S_{p}$ of $G$,
we write $G \models \phi(S_{1}, \dots, S_{p})$
if $\phi$ is true for $G$ when the free variables $X_{1}, \dots, X_{p}$ are interpreted as $S_{1}, \dots, S_{p}$.
We call an \mso{1} (\mso{2}) formula without free variables an \mso{1} (\mso{2}, resp.) \emph{sentence}.
\begin{proposition}
[Folklore, see e.g., \cite{LampisM21}]
\label{prop:isomorphic}
Let $G$ and $G'$ be colored graphs and $S$ and $S'$ be some vertex subsets of them
such that $\langle G, S \rangle$ and $\langle G', S' \rangle$ are isomorphic.
Then, for every \mso{1} (or \mso{2}) formula $\phi$ with one free set variable,
$G \models \phi(S)$ if and only if $G' \models \phi(S')$.
\end{proposition}
\subparagraph*{Problem definitions}
For a colored graph $G$ and an \mso{1} (or \mso{2}) formula $\phi(X)$
a sequence $S_{0}, \dots, S_{\ell}$ of vertex subsets of $G$ is a \emph{$\mathsf{TJ}(\phi)$-sequence from $S_{0}$ to $S_{\ell}$} (of length $\ell$) if
\begin{itemize}
\item $|S_{i-1} \setminus S_{i}| = |S_{i} \setminus S_{i-1}| = 1$ for every $i \in [\ell]$, and
\item $G \models \phi(S_{i})$ for $0 \le i \le \ell$.
\end{itemize}
We denote by $\operatorname{dist}_{\phi,G}(S,S')$ the minimum length of a $\mathsf{TJ}(\phi)$-sequence from $S$ to $S'$,
which is set to $\infty$ if there is no such sequence.
We call a $\mathsf{TJ}(\phi)$-sequence of length~$1$ a \emph{$\mathsf{TJ}(\phi)$-move}.
Now the main problem studied in this paper can be formalized as follows.
\begin{myproblem}
\problemtitle{\MSORfull{1} (\MSOR{1})}
\probleminput{An \mso{1} formula $\phi$, a colored graph $G = (V,E,\mathcal{C})$, and sets $S, S' \subseteq V$ such that
$|S| = |S'|$, $G \models \phi(S)$, and $G \models \phi(S')$.}
\problemquestion{Is there a $\mathsf{TJ}(\phi)$-sequence from $S$ to $S'$?}
\end{myproblem}
We also study \MSOR{2} that allows \mso{2} formulas having one free vertex-set variable as $\phi$.
Observe that \MSOR{1} is PSPACE-hard as it generalizes various PSPACE-complete reconfiguration problems such as
\textsc{Independent Set Reconfiguration}.
On the other hand, it still belongs to PSPACE since we can non-deterministically find the next vertex set $R$ in the $\mathsf{TJ}(\phi)$-sequence
and test whether $G \models \phi(R)$ holds in PSPACE~\cite{Stockmeyer71phdthesis,Vardi82}.
When describing a $\mathsf{TJ}(\phi)$-move from $S_{i-1}$ to $S_{i}$, it is sometimes convenient to say that a \emph{token} on
the vertex $u \in S_{i-1} \setminus S_{i}$ is moved to the vertex $v \in S_{i} \setminus S_{i-1}$.
The intuition behind this is that a vertex set in a $\mathsf{TJ}(\phi)$-sequence is considered as the positions of tokens
and that in one $\mathsf{TJ}(\phi)$-move, token on some vertex jumps to another vertex.
For simplicity, we sometimes write $S_{i-1} -u +v$ instead of $(S_{i-1} \setminus \{u\}) \cup \{v\}$.
\subparagraph*{Graph parameters}
For a graph $G = (V,E)$, a set $S \subseteq V$ is a \emph{vertex cover}
if each $e \in E$ has at least one endpoint in $S$.
The \emph{vertex cover number} of $G$, denoted $\vc(G)$,
is the size of a minimum vertex cover of $G$.
A vertex cover of size $k$ of an $n$-vertex graph, if any exists,
can be found in time $\mathcal{O}(c^{k} \cdot n)$ for some small constant $c$ (see e.g.,~\cite{ChenKX10}).
This implies that we can assume that a vertex cover of minimum size is given with the input
when $\vc(G)$ is part of the parameter.
Two vertices $u$ and $v$ are \emph{twins} if $N(u) = N(v)$ or $N[u] = N[v]$.
The \emph{neighborhood diversity} of a graph $G$, denoted $\nd(G)$,
is the number of subsets $V_{i}$ in the unique partition $V_{1}, \dots, V_{p}$ of $V$
into maximal sets of twin vertices.
It is known that the neighborhood diversity and
the corresponding partition can be computed in linear time~\cite{McConnellS99,TedderCHP08}.
From the definitions, we can see that $\nd(G) \le 2^{\vc(G)} + \vc(G)$ for every graph $G$~\cite{Lampis12}.
The \emph{treedepth} of a graph $G = (V,E)$, denoted $\td(G)$, is the minimum depth $d$ of
a rooted forest $F$ on the vertex set $V$ such that each edge of $G$ connects an ancestor and a descendant in $F$,
where the depth of a forest is defined as the maximum distance between a root and a leaf.
We call such a forest a \emph{treedepth decomposition}.
It is known a treedepth decomposition of depth $d$, if exists, can be found in time $2^{\mathcal{O}(d^{2})} \cdot n$~\cite{ReidlRVS14}.
Thus we may assume that a treedepth decomposition of depth $\td(G)$ is given with the input
when $\td(G)$ is part of the parameter.
\section{\MSOR{1} parameterized by neighborhood diversity}
\label{sec:vc-nd}
The main result of this section is the following theorem.
\begin{theorem}
\label{thm:msor1-nd}
\MSOR{1} parameterized by $\nd + |\phi|$ is fixed-parameter tractable.
Furthermore, for a yes instance of \MSOR{1}, finding a shortest $\mathsf{TJ}(\phi)$-sequence is fixed-parameter tractable with the same parameter.
\end{theorem}
We prove \cref{thm:msor1-nd} in \cref{sec:shortestND}
and then discuss the possibility of an extension to \MSOR{2} in \cref{mso2ND}.
To prove \cref{thm:msor1-nd},
we first partition the feasible sets into a small number of equivalence classes.
We show that the reachability between feasible sets can be
checked by using an appropriately defined adjacency between the equivalence classes.
Then, we take a deeper look at the connections between the equivalence classes
and show that a shortest reconfiguration sequence can be found by finding
some flow-like structure among the equivalence classes.
\subsection{Finding a shortest sequence}
\label{sec:shortestND}
In this section, we fix the input of \MSOR{1} as follows:
\begin{itemize}
\item $\phi(X)$: an \mso{1} formula with one free set variable $X$;
\item $G = (V,E,\mathcal{C})$: a colored graph;
\item $S, S' \subseteq V$: the initial and target sets such that $G \models \phi(S)$, $G \models \phi(S')$, and $|S| = |S'| = k$.
\end{itemize}
We say that a set $X \subseteq V$ is \emph{feasible} if $G \models \phi(X)$.
We assume that the sets $S$ and $S'$ are colors in $G$;
that is, $\mathcal{C}$ is of the form like $\langle C_{1}, \dots, C_{c}, S, S' \rangle$.
If $S$ and $S'$ are originally not colors in $G$, we may add them and increase the number of colors only by~$2$.
Two vertices $u,v \in V$ in $G$ are of the same \emph{type}
if $u$ and $v$ are twins and $\mathcal{C}(u) = \mathcal{C}(v)$.
Let $\langle V_{1}, \dots, V_{t} \rangle$ be the partition of $V$ into the sets of vertices of the same type.
We call each $V_{i}$ a \emph{type}.
Note that the type partition can be computed in polynomial time
and that $t$ depends only on the neighborhood diversity of $G$ and the number of colors in $\mathcal{C}$.
For an \mso{1} formula $\psi$, let $\mathsf{q}(\psi) = 2^{\mathsf{q}_\text{s}} \cdot \mathsf{q}_{\text{v}}$,
where $\mathsf{q}_{\text{s}}$ and $\mathsf{q}_{\text{v}}$ are the numbers of set and vertex quantifies in $\psi$, respectively.
Lampis~\cite{Lampis12} proved the following fact, which is one of the main ingredients in our algorithm.\footnote{%
Note that \cref{prop:Lampis12} implies that,
when neighborhood diversity is part of the parameter,
the \mso{1} model-checking problem admits a small induced subgraph of the input graph
as a kernel~\cite{Lampis12}.
However, this does not directly show the fixed-parameter tractability of \MSOR{1}
(let alone the stronger claim of \cref{thm:msor1-nd}).
In fact, as we will see later, an analogous result (\cref{prop:many-sets}) that implies
a ``natural'' kernel for the \mso{1} model-checking problem parameterized by treedepth is known,
while \MSOR{1} is PSPACE-complete on graphs of constant treedepth (\cref{thm:pspcae-c_td=3}).}
\begin{proposition}
[\cite{Lampis12}]
\label{prop:Lampis12}
Let $\psi$ be an \mso{1} sentence.
Assume that a graph $H$ has more than $\mathsf{q}(\psi)$ vertices of the same type, and
$H'$ is the graph obtained from $H$ by removing a vertex in that type.
Then, $H \models \psi$ if and only if $H' \models \psi$.
\end{proposition}
We need the concept of ``shapes'' of vertex subsets that was used with \cref{prop:Lampis12}
in the context of extended \mso{1} model-checking problems~\cite{KnopKMT19}.
Here we introduce it in the following simplified form, which is sufficient for our purpose.
The \emph{signature} of $X \subseteq V$ is the mapping $\sigma_{X} \colon [t] \to \mathbb{Z}_{\ge 0}$
such that $\sigma_{X}(i) = |V_{i} \cap X|$.
A \emph{shape} is a mapping from $[t]$ to $\mathbb{Z}_{\ge 0} \cup \{\bottop\}$
that maps each $i \in [t]$ to an element of $[0,\mathsf{q}(\phi)-1] \cup \{\bottop\} \cup [|V_{i}| - \mathsf{q}(\phi) + 1, |V_{i}|]$.
Note that the number of shapes is $(2\mathsf{q}(\phi)+1)^{t}$.
A set $X \subseteq V$ \emph{has shape} $\bar{\sigma}$ if for every $i \in [t]$,
\[
\bar{\sigma}(i) =
\begin{cases}
\bottop & \mathsf{q}(\phi) \le \sigma_{X}(i) \le |V_{i}| - \mathsf{q}(\phi), \\
\sigma_{X}(i) & \text{otherwise}.
\end{cases}
\]
We say that a shape $\bar{\sigma}$ is \emph{$k$-feasible}
if there is a feasible set $X \subseteq V$ of size $k$ that has $\bar{\sigma}$ as its shape.
Let $\bar{\sigma}_{S}$ and $\bar{\sigma}_{S'}$ be the shapes of the input sets $S$ and $S'$, respectively.
Since $S$ is a color of $G$, each type $V_{i}$ either is a subset of $S$ or has no intersection with $S$,
that is,
\[
\bar{\sigma}_{S}(i) =
\begin{cases}
|V_{i}| & V_{i} \subseteq S, \\
0 & \text{otherwise}.
\end{cases}
\]
This implies that a set $R \subseteq V$ has shape $\bar{\sigma}_{S}$ if and only if $R = S$.
This applies to $S'$ as well.
\begin{observation}
\label{obs:nd-rshape}
$R \subseteq V$ has shape $\bar{\sigma}_{S}$ ($\bar{\sigma}_{S'}$)
if and only if $R = S$ ($R = S'$, resp.).
\end{observation}
\cref{prop:Lampis12} and the definition of shapes together give the following fact,
which is known in more general forms in the previous studies (see e.g., \cite{KnopKMT19}).
This less general one is sufficient in our setting.
We present a full proof here to be self contained.
\begin{lemma}
\label{lem:nd-shape}
If $R, R' \subseteq V$ have the same shape,
then $G \models \phi(R)$ if and only if $G \models \phi(R')$.
\end{lemma}
\begin{proof}
Let $\phi_{X}$ be the \mso{1} sentence obtained from $\phi(X)$ by considering the free variable $X$ in $\phi(X)$ as a new color.
Note that $\mathsf{q}(\phi_{X})= \mathsf{q}(\phi)$.
Let $G_{R}$ and $G_{R'}$ be the graphs obtained from $G$ by considering $R$ and $R'$ as realizations of the new color $X$, respectively.
Now it suffices to show that $G_{R} \models \phi_{X}$ if and only if $G_{R'} \models \phi_{X}$.
Recall that $\langle V_{1}, \dots, V_{t} \rangle$ is the type partition of $G$.
Observe that as their type partitions,
$G_{R}$ has $\langle V_{1} \cap R, \dots, V_{t} \cap R, V_{1} \setminus R, \dots, V_{t} \setminus R \rangle$ and
$G_{R'}$ has $\langle V_{1} \cap R', \dots, V_{t} \cap R', V_{1} \setminus R', \dots, V_{t} \setminus R' \rangle$,
where some of the types may be empty.
Since $R$ and $R'$ have the same shape, it holds for each $i$ that
\begin{itemize}
\item $|V_{i} \cap R| \ge \mathsf{q}(\phi)$ if and only if $|V_{i} \cap R'| \ge \mathsf{q}(\phi)$, and
\item $|V_{i} \setminus R| \ge \mathsf{q}(\phi)$ if and only if $|V_{i} \setminus R'| \ge \mathsf{q}(\phi)$.
\end{itemize}
We remove vertices from $G_{R}$ and $G_{R'}$
by applying \cref{prop:Lampis12} repeatedly as long as some type has more than $\mathsf{q}(\phi)$ vertices.
We call the resultant graphs $G_{R}^{*}$ and $G_{R'}^{*}$.
Observe that each type in $G_{R}^{*}$ is a subset of one in $G_{R}$.
If a type in $G_{R}$ has at most $\mathsf{q}(\phi)$ vertices, then the type stays the same in $G_{R}^{*}$.
On the other hand, if a type in $G_{R}$ has more than $\mathsf{q}(\phi)$ vertices,
then the type becomes smaller and has size exactly $\mathsf{q}(\phi)$ in $G_{R}^{*}$.
The same holds for $G_{R'}$ and $G_{R'}^{*}$ as well.
Now the discussion in the previous paragraph implies that for each $i$,
\begin{itemize}
\item $|(V_{i} \cap R) \cap V(G_{R}^{*})| = |(V_{i} \cap R') \cap V(G_{R'}^{*})|$ and
\item $|(V_{i} \setminus R) \cap V(G_{R}^{*})| = |(V_{i} \setminus R') \cap V(G_{R'}^{*})|$.
\end{itemize}
This implies that $G_{R}^{*}$ and $G_{R'}^{*}$ are isomorphic.
Thus the lemma holds by \cref{prop:isomorphic}.
\end{proof}
\cref{lem:nd-shape} implies in particular that if a shape $\bar{\sigma}$ is $k$-feasible,
then every size-$k$ set of shape $\bar{\sigma}$ is feasible.
\begin{lemma}
\label{lem:nd-sameshape}
If feasible sets $R, R' \subseteq V$ have the same shape and size,
then there is a $\mathsf{TJ}(\phi)$-sequence of length $|R \setminus R'|$ from $R$ to $R'$
such that all sets in the sequence have the same shape.
\end{lemma}
\begin{proof}
We use induction on $|R \setminus R'|$.
If $|R \setminus R'| = 0$, then we are done.
Assume that $|R \setminus R'| \ge 1$
and that the statement of the lemma is true for sets with strictly smaller differences.
First assume that $R$ and $R'$ have the same signature.
Then, for some $i$, it holds that $|V_{i} \cap R| = |V_{i} \cap R'|$ and $V_{i} \cap R \ne V_{i} \cap R'$.
Let $u \in V_{i} \cap (R \setminus R')$ and $v \in V_{i} \cap (R' \setminus R)$.
Then $R - u + v$ has the same signature (and thus the same shape) as $R$ and $R'$.
By \cref{lem:nd-shape}, $R - u + v$ is feasible.
By the induction hypothesis, the lemma holds.
Next assume that $R$ and $R'$ have different signatures.
Let $\bar{\sigma}$ be the (common) shape of $R$ and $R'$.
Since $|R| = |R'|$, there exist two indices $i$ and $j$ such that
$|V_{i} \cap R| > |V_{i} \cap R'|$ and $|V_{j} \cap R| < |V_{j} \cap R'|$.
This implies that $\bar{\sigma}(i) = \bar{\sigma}(j) = \bottop$, and thus
\begin{itemize}
\item $|V_{i} \cap R'|$, $|V_{j} \cap R|$, $|V_{i} \setminus R|$, $|V_{j} \setminus R'| \ge \mathsf{q}(\phi)$, and
\item $|V_{i} \cap R|$, $|V_{j} \cap R'|$, $|V_{i} \setminus R'|$, $|V_{j} \setminus R| \ge \mathsf{q}(\phi) + 1$.
\end{itemize}
Now let $u \in V_{i} \cap (R \setminus R')$ and $v \in V_{j} \cap (R' \setminus R)$.
Then $R - u + v$ has the shape $\bar{\sigma}$,
and thus it is feasible by \cref{lem:nd-shape}.
By the induction hypothesis, the lemma holds.
\end{proof}
We now introduce the \emph{adjacency} between shapes.
Intuitively, this concept captures how a single token jump connects different shapes.
Let $S_{1}$ and $S_{2}$ be sets having different shapes $\bar{\sigma}_{1}$ and $\bar{\sigma}_{2}$, respectively,
such that $S_{1} \setminus S_{2} = \{u\}$, $u \in V_{i}$,
$S_{2} \setminus S_{1} = \{v\}$, $v \in V_{j}$, and $i \ne j$.
For $h \in [t] \setminus \{i,j\}$, $\bar{\sigma}_{1}(h) = \bar{\sigma}_{2}(h)$ holds.
Since $\bar{\sigma}_{1} \ne \bar{\sigma}_{2}$, at least one of $\bar{\sigma}_{1}(i) \ne \bar{\sigma}_{2}(i)$ and $\bar{\sigma}_{1}(j) \ne \bar{\sigma}_{2}(j)$ holds.
If $\bar{\sigma}_{1}(i) \ne \bar{\sigma}_{2}(i)$,
then $|V_{i} \cap S_{2}| = |V_{i} \cap S_{1}| - 1$ implies that one of the following holds:
\begin{itemize}
\item A1: $\bar{\sigma}_{1}(i) \ne \bottop$, $\bar{\sigma}_{2}(i) \ne \bottop$, and $\bar{\sigma}_{2}(i) = \bar{\sigma}_{1}(i) - 1$;
\item A2: $\bar{\sigma}_{1}(i) = \bottop$ and $\bar{\sigma}_{2}(i) = \mathsf{q}(\phi) -1$;
\hfill ($\sigma_{S_{1}}(i)=\mathsf{q}(\phi)$)
\item A3: $\bar{\sigma}_{1}(i) = |V_{i}| - \mathsf{q}(\phi) + 1$ and $\bar{\sigma}_{2}(i) = \bottop$.
\hfill ($\sigma_{S_{2}}(i)= |V_{i}| - \mathsf{q}(\phi)$)
\end{itemize}
Similarly, if $\bar{\sigma}_{1}(j) \ne \bar{\sigma}_{2}(j)$,
then $|V_{j} \cap S_{2}| = |V_{j} \cap S_{1}| + 1$ implies that one of the following holds:
\begin{itemize}
\item B1: $\bar{\sigma}_{1}(j) \ne \bottop$, $\bar{\sigma}_{2}(j) \ne \bottop$, and $\bar{\sigma}_{2}(j) = \bar{\sigma}_{1}(j) + 1$;
\item B2: $\bar{\sigma}_{1}(j) = \mathsf{q}(\phi) -1$ and $\bar{\sigma}_{2}(j) = \bottop$;
\hfill ($\sigma_{S_{2}}(j)=\mathsf{q}(\phi)$)
\item B3: $\bar{\sigma}_{1}(j) = \bottop$ and $\bar{\sigma}_{2}(j) = |V_{j}| - \mathsf{q}(\phi) + 1$.
\hfill ($\sigma_{S_{1}}(j)= |V_{j}| - \mathsf{q}(\phi)$)
\end{itemize}
Given the observation above, we say that two $k$-feasible shapes
$\bar{\sigma}_{1}$ and $\bar{\sigma}_{2}$ are \emph{adjacent} if and only if the following three conditions are satisfied.\\
(1) One of the following holds:
\begin{itemize}
\item $\bar{\sigma}_{1}$ and $\bar{\sigma}_{2}$ disagree at exactly two indices $i$ and $j$
such that $i$ satisfies one of A1, A2, A3
and $j$ satisfies one of B1, B2, B3;
\item $\bar{\sigma}_{1}$ and $\bar{\sigma}_{2}$ disagree at exactly one index $i$ satisfying one of A1, A2, A3,
or $j$ satisfying one of B1, B2, B3.
\end{itemize}
(2) There exists a size-$k$ set $S_{1}$ of shape $\bar{\sigma}_{1}$ such that
\begin{itemize}
\item if $i$ is defined in (1) and $\bar{\sigma}_{1}(i) = \bottop$, then $\sigma_{S_{1}}(i) = \mathsf{q}(\phi)$;
\item if $j$ is defined in (1) and $\bar{\sigma}_{1}(j) = \bottop$, then $\sigma_{S_{1}}(j) = |V_{j}| - \mathsf{q}(\phi)$.
\end{itemize}
(3) There exists a size-$k$ set $S_{2}$ of shape $\bar{\sigma}_{2}$ such that
\begin{itemize}
\item if $i$ is defined in (1) and $\bar{\sigma}_{2}(i) = \bottop$, then $\sigma_{S_{2}}(i) = |V_{i}|-\mathsf{q}(\phi)$;
\item if $j$ is defined in (1) and $\bar{\sigma}_{2}(j) = \bottop$, then $\sigma_{S_{2}}(j) = \mathsf{q}(\phi)$.
\end{itemize}
The \emph{size-$k$ shape graph} $\mathcal{S}_{k}$ has
the set of $k$-feasible shapes as its vertex set
and the adjacency between the vertices (shapes) is as defined above.
\begin{lemma}
\label{lem:nd-adjshape}
Let $\bar{\sigma}_{1}$ and $\bar{\sigma}_{2}$ be two different shapes that are $k$-feasible.
Then, $\bar{\sigma}_{1}$ and $\bar{\sigma}_{2}$ are adjacent in $\mathcal{S}_{k}$ if and only if
there exist size-$k$ feasible sets $S_{1}$ and $S_{2}$ of shapes $\bar{\sigma}_{1}$ and $\bar{\sigma}_{2}$, respectively,
with $|S_{1} \setminus S_{2}| = |S_{2} \setminus S_{1}| = 1$.
\end{lemma}
\begin{proof}
The if direction is already observed along the definition above.
To prove the only-if direction, assume that $\bar{\sigma}_{1}$ and $\bar{\sigma}_{2}$ are adjacent.
If $\bar{\sigma}_{1}$ and $\bar{\sigma}_{2}$ disagree at exactly two indices,
then we set $i$ to the one satisfying one of A1, A2, A3,
and $j$ to the one satisfying one of B1, B2, B3 in the definition.
If $\bar{\sigma}_{1}$ and $\bar{\sigma}_{2}$ disagree at exactly one index, then we set $i$ to this index.
By symmetry, we assume that $i$ satisfies one of A1, A2, A3 in the definition.
The definition of the shape adjacency implies the existence of a size-$k$ set $S_{1}$ of shape $\bar{\sigma}_{1}$
with the following additional conditions:
\begin{itemize}
\item if $\bar{\sigma}_{1}(i) = \bottop$, then $\sigma_{S_{1}}(i) = \mathsf{q}(\phi)$;
\item if the index $j$ is defined and $\bar{\sigma}_{1}(j) = \bottop$, then $\sigma_{S_{1}}(j) = |V_{j}| - \mathsf{q}(\phi)$.
\end{itemize}
If $\bar{\sigma}_{1}$ and $\bar{\sigma}_{2}$ disagree exactly at $i$,
and thus $j$ is not defined so far, we set $j$ to the index in the next claim.
\begin{claim}
If $\bar{\sigma}_{1}$ and $\bar{\sigma}_{2}$ disagree exactly at $i$,
then there exists an index $j$ such that
$\bar{\sigma}_{1}(j) = \bar{\sigma}_{2}(j)$ ($= \bottop$) and $\sigma_{S_{1}}(j) < |V_{j}| - \mathsf{q}(\phi)$.
\end{claim}
\begin{claimproof}
Let $S_{2}$ be a size-$k$ set of shape $\bar{\sigma}_{2}$.
Suppose to the contrary that for every $h \in [t] \setminus \{i\}$,
it holds that $\bar{\sigma}_{1}(h) \ne \bottop$ or $\sigma_{S_{1}}(h) \ge |V_{h}| - \mathsf{q}(\phi)$.
Then, $|S_{1} \cap V_{h}| \ge |S_{2} \cap V_{h}|$ for all $h \in [t] \setminus \{i\}$.
Since the shapes $\bar{\sigma}_{1}$ and $\bar{\sigma}_{2}$ ensure that $|S_{1} \cap V_{i}| > |S_{2} \cap V_{i}|$,
we have $|S_{1}| > |S_{2}|$, a contradiction.
\end{claimproof}
Let $S_{2}$ be a set obtained from $S_{1}$ by removing a vertex of $V_{i}$ and adding a vertex of $V_{j}$.
The construction of $S_{1}$ implies that $S_{2}$ has shape $\bar{\sigma}_{2}$.
This completes the proof since $|S_{1} \setminus S_{2}| = |S_{2} \setminus S_{1}| = 1$.
\end{proof}
Since $|S| = |S'|= k$, the reachability between them can be reduced to
the reachability between their shapes in $\mathcal{S}_{k}$.
\begin{lemma}
\label{lem:nd-shape-graph}
Let $\bar{\sigma}$ and $\bar{\sigma}'$ be the shapes of $S$ and $S'$, respectively.
There is a $\mathsf{TJ}(\phi)$-sequence from $S$ to $S'$
if and only if
$\bar{\sigma}$ and $\bar{\sigma}'$ belong to the same connected component of $\mathcal{S}_{k}$.
\end{lemma}
\begin{proof}
To show the only-if direction, assume that there is a $\mathsf{TJ}(\phi)$-sequence
$S_{0}, \dots, S_{\ell}$ from $S = S_{0}$ to $S' = S_{\ell}$.
For $0 \le i \le \ell$, let $\bar{\sigma}_{i}$ be the shape of $S_{i}$.
Since $S_{i}$ is a size-$k$ feasible set, $\bar{\sigma}_{i}$ belongs to $V(\mathcal{S}_{k})$.
By \cref{lem:nd-adjshape}, if $\bar{\sigma}_{i}$ and $\bar{\sigma}_{i+1}$ are different, then they are adjacent in $\mathcal{S}_{k}$.
Thus, $\mathcal{S}_{k}$ contains a walk from $\bar{\sigma}_{0} = \bar{\sigma}$ to $\bar{\sigma}_{\ell} = \bar{\sigma}'$.
To show the if direction, assume that there is a $\bar{\sigma}$--$\bar{\sigma}'$ path $\langle \bar{\sigma}_{0}, \dots, \bar{\sigma}_{\ell}\rangle$ in $\mathcal{S}_{k}$.
By \cref{lem:nd-adjshape},
for $0 \le i \le \ell-1$,
there exist size-$k$ sets $S'_{i}$ of shape $\bar{\sigma}_{i}$ and $S_{i+1}$ of shape $\bar{\sigma}_{i+1}$
with $|S'_{i} \setminus S_{i+1}| = |S_{i+1} \setminus S'_{i}| = 1$.
Furthermore, by \cref{lem:nd-sameshape}, for each $1 \le i \le \ell-1$,
there is a $\mathsf{TJ}(\phi)$-sequence from $S_{i}$ to $S'_{i}$.
Finally, observe that $S'_{0} = S$ and $S_{\ell} = S'$ by \cref{obs:nd-rshape}.
Thus, by combining all of them, we obtain a $\mathsf{TJ}(\phi)$-sequence from $S$ to $S'$
because all intermediate sets are feasible by \cref{lem:nd-shape}.
\end{proof}
\cref{lem:nd-shape-graph} implies that \MSOR{1} can be solved by
checking that the shapes of the initial and target sets belong to the same connected component of $\mathcal{S}_{k}$.
We now show that $\mathcal{S}_{k}$ can be constructed efficiently.
\begin{lemma}
Constructing
$\mathcal{S}_{k}$ is fixed-parameter tractable parameterized by $t + \mathsf{q}(\phi)$.
\end{lemma}
\begin{proof}
To enumerate the elements of $V(\mathcal{S}_{k})$ (i.e., the size-$k$ feasible shapes),
we first enumerate all $(2\mathsf{q}(\phi)+1)^{t}$ shapes.
Then, for each shape $\bar{\sigma}$, we define $\bar{\sigma}_{\downarrow}$ and $\bar{\sigma}^{\uparrow}$ as follows:
\begin{align*}
\bar{\sigma}_{\downarrow}(i) &=
\begin{cases}
\mathsf{q}(\phi) & \bar{\sigma}(i) = \bottop, \\
\bar{\sigma}(i) & \text{otherwise},
\end{cases}
&
\bar{\sigma}^{\uparrow}(i) &=
\begin{cases}
|V_{i}| - \mathsf{q}(\phi) & \bar{\sigma}(i) = \bottop, \\
\bar{\sigma}(i) & \text{otherwise}.
\end{cases}
\end{align*}
Observe that there is a set $S \subseteq V$ of size $k \le |V|$ with shape $\bar{\sigma}$
if and only if $\sum_{i\in [t]} \bar{\sigma}_{\downarrow}(i) \le k \le \sum_{i\in [t]} \bar{\sigma}^{\uparrow}(i)$.
If $\bar{\sigma}$ satisfies this condition, then by \cref{lem:nd-shape},
it suffices to check the feasibility of an arbitrary chosen set with shape $\bar{\sigma}$.
We construct such a set $S_{\bar{\sigma}}$ of shape $\bar{\sigma}$ by taking, say, $\bar{\sigma}_{\downarrow}(i)$ vertices from each $V_{i}$.
Testing whether $G \models \phi(S_{\bar{\sigma}})$ is fixed-parameter tractable parameterized by $\nd(G) + |\phi|$~\cite{CourcelleMR00,Lampis12}.
For each pair of vertices in $V(\mathcal{S}_{k})$,
the adjacency can be decided in $\mathcal{O}(t)$ time by checking each coordinate of the shapes
and testing the existence of size-$k$ sets of the given shapes with the additional conditions.
\end{proof}
The lemma above already implies that \MSOR{1} is fixed-parameter tractable parameterized by $\nd + |\phi|$.
To find a shortest $\mathsf{TJ}(\phi)$-sequence, we take a closer look at $\mathcal{S}_{k}$.
A sequence $\bar{\sigma}_{0}, \dots, \bar{\sigma}_{q}$ of shapes with $\bar{\sigma}_{i} \ne \bar{\sigma}_{i+1}$ for $0 \le i < q $ is
the \emph{shape sequence} of a $\mathsf{TJ}(\phi)$-sequence
if the $\mathsf{TJ}(\phi)$-sequence can be split into $q+1$ subsequences
such that all sets in the $i$th subsequence have shape $\bar{\sigma}_{i}$ for $0 \le i \le q$.
\begin{lemma}
\label{lem:nd-path}
If there is a $\mathsf{TJ}(\phi)$-sequence from $S$ to $S'$,
then there is a shortest one such that the corresponding shape sequence
forms a simple path in $\mathcal{S}_{k}$.
\end{lemma}
\begin{proof}
Let $S_{0}, \dots, S_{p}$ be a shortest $\mathsf{TJ}(\phi)$-sequence from $S$ to $S'$
and $\bar{\sigma}_{0}, \dots, \bar{\sigma}_{q}$ be its shape sequence.
By \cref{lem:nd-adjshape}, $\bar{\sigma}_{0}, \dots, \bar{\sigma}_{q}$ is a walk in $\mathcal{S}_{k}$.
Assume that $S_{0}, \dots, S_{p}$ has minimum $q$ among all shortest $\mathsf{TJ}(\phi)$-sequences from $S$ to $S'$.
Suppose that $\bar{\sigma}_{i} = \bar{\sigma}_{j}$ for some $i < j$.
We take $i$ and $j$ so that $j-i$ is maximized.
Let $h_{i}$ and $h_{j}$ be the smallest and largest indices such that
$S_{h_{i}}$ and $S_{h_{j}}$ have the shape $\bar{\sigma}_{i}$ ($= \bar{\sigma}_{j}$).
By \cref{lem:nd-sameshape}, there is a $\mathsf{TJ}(\phi)$-sequence $R_{0}, \dots, R_{|S_{h_{i}} \setminus S_{h_{j}}|}$
of length $|S_{h_{i}} \setminus S_{h_{j}}|$ from $S_{h_{i}} = R_{0}$ to $S_{h_{j}} = R_{|S_{h_{i}} \setminus S_{h_{j}}|}$
such that all sets in the sequence have the same shape.
Since every $\mathsf{TJ}(\phi)$-sequence from $S_{h_{i}}$ to $S_{h_{j}}$ takes at least $|S_{h_{i}} \setminus S_{h_{j}}|$ steps,
$S_{0}, \dots, R_{0} = (S_{h_{i}}), \dots, R_{|S_{h_{i}} \setminus S_{h_{j}}|} (= S_{h_{j}}), \dots, S_{p}$
is also a shortest $\mathsf{TJ}(\phi)$-sequence from $S$ to $S'$.
This new sequence has $\bar{\sigma}_{0}, \dots, \bar{\sigma}_{i}, \bar{\sigma}_{j+1}, \dots, \bar{\sigma}_{q}$ as its shape sequence.
This contradicts the assumption that $q$ is minimum.
\end{proof}
\cref{lem:nd-path} implies that for finding a shortest $\mathsf{TJ}(\phi)$-sequence from $S$ to $S'$,
it suffices to first guess a path in $\mathcal{S}_{k}$ and then find a shortest $\mathsf{TJ}(\phi)$-sequence having the path as its shape sequence.
Note that $|V(\mathcal{S}_{k})| \le (2\mathsf{q}(\phi)+1)^{t}$ and thus the number of candidates for such shape sequences
is upper bounded by a function depending only on $\mathsf{q}(\phi)$ and $t$. (Recall that $t$ is the number of types in $G$.)
Therefore, the following lemma completes the proof of \cref{thm:msor1-nd}.
\begin{lemma}
\label{lem:nd-shortest}
Given a sequence $\bar{\sigma}_{0}, \dots, \bar{\sigma}_{q}$ of shapes such that $\bar{\sigma}_{0} = \bar{\sigma}_{S}$ and $\bar{\sigma}_{q} = \bar{\sigma}_{S'}$,
finding a shortest $\mathsf{TJ}(\phi)$-sequence with the shape sequence $\bar{\sigma}_{0}, \dots, \bar{\sigma}_{q}$ is
fixed-parameter tractable parameterized by $t + \mathsf{q}(\phi)$.
\end{lemma}
\begin{proof}
We reduce the problem to \textsc{Minimum-Cost Circulation} defined as follows.
Let $D = (X,A)$ be a directed graph.
We define $\delta^{\mathrm{in}}(v) = \{a \in A \mid a = (u,v) \in A\}$ and
$\delta^{\mathrm{out}}(v) = \{a \in A \mid a = (v,u) \in A\}$.
A function $f \colon A \to \mathbb{R}$ is a \emph{circulation}
if $f(\delta^{\mathrm{in}}(v)) = f(\delta^{\mathrm{out}}(v))$ for each $v \in X$,
where $f(A') = \sum_{a \in A'} f(a)$ for $A' \subseteq A$.
A circulation $f$ is an \emph{integer circulation} if $f(a)$ is an integer for each $a \in A$.
Given a \emph{cost function} $w \colon A \to \mathbb{Q}$,
the \emph{cost} of a circulation $f$ is defined as $\mathrm{cost}(f) = \sum_{a \in A} w(a) f(a)$.
Now, given a directed graph $D = (X,A)$,
a \emph{demand} function $d \colon A \to \mathbb{Q}$,
a \emph{capacity} function $c \colon A \to \mathbb{Q}$, and
a cost function $w \colon A \to \mathbb{Q}$,
\textsc{Minimum-Cost Circulation} asks to find a circulation $f$
minimizing $\mathrm{cost}(f)$ under the condition that $d(a) \le f(a) \le c(a)$ for each $a \in A$.
It is known that
\textsc{Minimum-Cost Circulation} can be solved in strongly polynomial time, and
if the demand $d$ and the capacity $c$ take integer values only,
then a minimum-cost integer circulation is found~\cite{Tardos85}.
Now we construct an instance of \textsc{Minimum-Cost Circulation}
from the graph $G = (V, E, \mathcal{C})$,
its type partition $\langle V_{1}, \dots, V_{t} \rangle$,
and the shape sequence $\bar{\sigma}_{0}, \dots, \bar{\sigma}_{q}$.
We first construct $D = (X,A)$.
The digraph $D$ contains two special vertices $s$ and $s'$,
and $q$ sets $L_{0}, L_{1}, \dots, L_{q-1}$ of vertices
such that $L_{j} = \{v_{1}^{j}, \dots, v_{t}^{j}\}$ for $0 \le j \le q-1$.
Each $L_{j}$ is a bidirectional clique (i.e., there is an arc for each ordered pair of vertices in $L_{j}$).
For $1 \le j \le q-1$, $D$ contains the matching $\{(v_{i}^{j-1}, v_{i}^{j}) \mid 1 \le i \le t\}$ from $L_{j-1}$ to $L_{j}$.
There are arcs from $s$ to all vertices in $L_{0}$
and from all vertices in $L_{q-1}$ to $s'$.
Additionally, $D$ contains the arc $(s',s)$.
Each arc $a$ in each clique $L_{j}$ has demand $d(a) = 0$, capacity $c(a) = \infty$, and cost $w(a) = 1$.
All other arcs have cost $0$.
We set $d((s',s)) = c((s',s)) = k$.
For $i \in [t]$, we set
$d((s, v_{i}^{0})) = c((s, v_{i}^{0})) = |V_{i} \cap S|$ ($= \bar{\sigma}_{0}(i)$) and
$d((v_{i}^{q-1}, s')) = c((v_{i}^{q-1}, s')) = |V_{i} \cap S'|$ ($= \bar{\sigma}_{q}(i)$).
For $i \in [t]$ and $j \in [q-1]$, we set
\begin{align*}
d((v_{i}^{j-1}, v_{i}^{j}))
&=
\begin{cases}
\mathsf{q}(\phi) & \bar{\sigma}_{j}(i) = \bottop, \\
\bar{\sigma}_{j}(i) & \text{otherwise},
\end{cases}
&
c((v_{i}^{j-1}, v_{i}^{j}))
&=
\begin{cases}
|V_{i}| - \mathsf{q}(\phi) & \bar{\sigma}_{j}(i) = \bottop, \\
\bar{\sigma}_{j}(i) & \text{otherwise}.
\end{cases}
\end{align*}
We show that
there exists a $\mathsf{TJ}(\phi)$-sequence of length at most $p$ with the shape sequence $\bar{\sigma}_{0}, \dots, \bar{\sigma}_{q}$ from $S$ to $S'$
if and only if
the instance $\langle D, d, c, w \rangle$ of \textsc{Minimum-Cost Circulation}
admits an integer circulation $f$ of cost at most $p$.
This completes the proof
since \textsc{Minimum-Cost Circulation} is solvable in strongly polynomial time
and the size of $D$ depends only on $t$ and the number of shapes.
\proofsubparagraph{The only-if direction.}
Assume that
$S_{0}, \dots, S_{p}$ is a $\mathsf{TJ}(\phi)$-sequence from $S = S_{0}$ to $S' = S_{p}$ with the shape sequence $\bar{\sigma}_{0}, \dots, \bar{\sigma}_{q}$.
Let $h(0), \dots, h(q)$ be the first indices such that $S_{h(j)}$ has shape $\bar{\sigma}_{j}$.
Note that $h(0) = 0$ and $h(q) = p$ by \cref{obs:nd-rshape}.
We construct a circulation $f$ as follows.
For $i \in [t]$ and $j \in [q-1]$, we set
$f((v_{i}^{j-1}, v_{i}^{j})) = |V_{i} \cap S_{h(j)}|$.
Since $S_{h(j)}$ has shape $\bar{\sigma}_{j}$, we have
$d((v_{i}^{j-1}, v_{i}^{j})) \le f((v_{i}^{j-1}, v_{i}^{j})) \le c((v_{i}^{j-1}, v_{i}^{j}))$.
For $i,i' \in [t]$ with $i \ne i'$ and for $0 \le j \le q - 1$,
we set $f((v_{i}^{j}, v_{i'}^{j}))$ to the number of $\mathsf{TJ}(\phi)$-moves from $V_{i}$ to $V_{i'}$
in the $\mathsf{TJ}(\phi)$-sequence $S_{h(j)}, \dots, S_{h(j+1)}$.
For the other arcs $a$, we set $f(a) = d(a)$ ($=c(a)$).
To see that $f$ is a circulation,
we need to ensure that $f(\delta^{\mathrm{in}}(v)) = f(\delta^{\mathrm{out}}(v))$ for each $v \in X$.
This holds for the special vertices $s$ and $s'$ since each arc $a$ incident to them satisfies that $d(a) = c(a)$.
For $v_{i}^{j}$, observe that it has
an incoming arc $a_{\text{in}}$ from $s$ or $v_{i}^{j-1}$ such that $f(a_{\text{in}}) = |V_{i} \cap S_{h(j)}|$
and
an outgoing arc $a_{\text{out}}$ to $s'$ or $v_{i}^{j+1}$ such that $f(a_{\text{out}}) = |V_{i} \cap S_{h(j+1)}|$.
Thus we have
\begin{align*}
f(\delta^{\mathrm{in}}(v_{i}^{j}))
&=
|V_{i} \cap S_{h(j)}| + \sum_{i' \in [t] \setminus \{i\}} f((v_{i'}^{j}, v_{i}^{j})),
\\
f(\delta^{\mathrm{out}}(v_{i}^{j}))
&=
|V_{i} \cap S_{h(j+1)}| + \sum_{i' \in [t] \setminus \{i\}} f((v_{i}^{j}, v_{i'}^{j})).
\end{align*}
On the other hand, the definition of $f$ in $L_{j}$ implies that
\[
|V_{i} \cap S_{h(j)}| + \sum_{i' \in [t] \setminus \{i\}} f((v_{i'}^{j}, v_{i}^{j})) - \sum_{i' \in [t] \setminus \{i\}} f((v_{i}^{j}, v_{i'}^{j}))
=
|V_{i} \cap S_{h(j+1)}|.
\]
Hence, $f(\delta^{\mathrm{in}}(v_{i}^{j})) = f(\delta^{\mathrm{out}}(v_{i}^{j}))$ holds.
To see that $\mathrm{cost}(f) = p$,
recall that only the edges in the cliques $L_{j}$ have positive costs
and that each step in the $\mathsf{TJ}(\phi)$-sequence $S_{0}, \dots, S_{p}$ contributes exactly $1$ to $f$ in a clique $L_{j}$.
\proofsubparagraph{The if direction.}
Assume that $\langle D, d, c, w \rangle$ admits an integer circulation $f$ of cost at most~$p$.
We assume that $f$ is of minimum cost.
Let $j$ be an index such that $0 \le j \le q-1$.
Let $R = S$ if $j = 0$; otherwise let $R$ be a set of shape $\bar{\sigma}_{j}$ such that
$|V_{i} \cap R| = f((v_{i}^{j-1},v_{i}^{j}))$ for each $i \in [t]$.
We show that there is a set $R'$ of shape $\bar{\sigma}_{j+1}$ such that
\begin{itemize}
\item $R' = S'$ if $j+1 = q$, otherwise $|V_{i} \cap R'| = f((v_{i}^{j},v_{i}^{j+1}))$ for each $i \in [t]$, and
\item there is a $\mathsf{TJ}(\phi)$-sequence $\langle R_{0}, \dots, R_{\ell'}, \dots, R_{\ell} \rangle$ with $\ell = \sum_{a \in A(D[L_{j}])} f(a)$
from $R_{0} = R$ to $R_{\ell} = R'$, where
each $R_{i}$ with $0 \le i \le \ell'$ has shape $\bar{\sigma}_{j}$ and
each $R_{i}$ with $\ell'+1 \le i \le \ell$ has shape $\bar{\sigma}_{j+1}$.
\end{itemize}
Concatenating such sequences, we can obtain a $\mathsf{TJ}(\phi)$-sequence from a set of shape $\bar{\sigma}_{0}$
to a set of shape $\bar{\sigma}_{q}$ (i.e., from $S$ to $S'$ by \cref{obs:nd-rshape})
with length $\sum_{j=0}^{q-1} \sum_{a \in A(D[L_{j}])} f(a) \le p$.
Observe that in $L_{j}$, no vertex $v_{i}^{j}$ has both outgoing and incoming arcs with positive $f$ values.
To see this, suppose that $f((v_{i}^{j}, v_{i'}^{j})) = a > 0$ and
$f((v_{i''}^{j}, v_{i}^{j})) = b > 0$ for some $i'$ and $i''$.
Then, by subtracting $\min\{a,b\}$ from both $f((v_{i}^{j}, v_{i'}^{j}))$ and $f((v_{i''}^{j}, v_{i}^{j}))$,
and by adding $\min\{a,b\}$ to $f((v_{i''}^{j}, v_{i'}^{j}))$, we obtain a circulation with strictly smaller cost.
This contradicts the assumption that $f$ is of minimum cost.
Let $L_{j}^{\text{out}}$ and $L_{j}^{\text{in}}$
be the sets of vertices in $L_{j}$ with outgoing arcs and incoming arcs in $D[L_{j}]$, respectively, with positive $f$ values.
We initialize a mapping $g$ with the restriction of $f$ to $A(D[L_{j}])$.
Starting with $R_{0} = R$, we obtain $R_{i+1}$ from $R_{i}$
by picking up some arc $(v_{i}^{j}, v_{i'}^{j})$ with $g((v_{i}^{j}, v_{i'}^{j})) > 0$,
making a $\mathsf{TJ}(\phi)$-move from $V_{i}$ to $V_{i'}$,
and updating $g$ by subtracting $1$ from $g((v_{i}^{j}, v_{i'}^{j}))$.
After executing such steps $\sum_{j=0}^{q-1} \sum_{a \in A(D[L_{j}])} f(a)$ times, we obtain $R'$.
Thus it suffices to show that we can execute such steps in a right ordering
so that the requirements for the shapes are satisfied.
Observe that for each $i$, $|R_{x} \cap V_{i}|$ changes monotonically for $0 \le x \le \ell$:
it is decreasing if $v_{i}^{j} \in L_{j}^{\text{out}}$,
increasing if $v_{i}^{j} \in L_{j}^{\text{in}}$, and
it never changes if $v_{i}^{j} \notin L_{j}^{\text{out}} \cup L_{j}^{\text{in}}$.
Thus, if $\bar{\sigma}_{j}(i) = \bar{\sigma}_{j+1}(i)$, then for each $R_{x}$ in the $\mathsf{TJ}(\phi)$-sequence,
it holds that $\bar{\sigma}_{R_{x}}(i) = \bar{\sigma}_{j}(i)$ ($=\bar{\sigma}_{j+1}(i)$), where $\bar{\sigma}_{R_{x}}$ is the shape of $R_{x}$.
Thus, when constructing the $\mathsf{TJ}(\phi)$-sequence, we only have to take care of indices $h$ with $\bar{\sigma}_{j}(h) \ne \bar{\sigma}_{j+1}(h)$.
First assume that there is only one index $h$ with $\bar{\sigma}_{j}(h) \ne \bar{\sigma}_{j+1}(h)$.
In this case, we can make the moves in any order.
Only the $h$th component of the shape changes during the $\mathsf{TJ}(\phi)$-sequence,
and when it changes, the shape becomes equal to $\bar{\sigma}_{j+1}$ and never changes after that.
Next assume that $\bar{\sigma}_{j}$ and $\bar{\sigma}_{j+1}$ disagree at exactly two indices.
We set $i^{\text{out}}$ to the index satisfying one of A1, A2, A3 in the definition of adjacency
and $i^{\text{in}}$ to the one satisfying one of B1, B2, B3.
From the definition of adjacency, $v_{i^{\text{out}}}^{j} \in L_{j}^{\text{out}}$ and $v_{i^{\text{in}}}^{j} \in L_{j}^{\text{in}}$.
We first execute moves that do no change the shape.
After exhaustively executing such moves, we obtain a set $R_{x}$ with shape $\bar{\sigma}_{j}$ satisfying that
\begin{align*}
|V_{i^{\text{out}}} \cap R_{x}|
&=
\begin{cases}
\bar{\sigma}_{j+1}(i^{\text{out}}) + 1 & \bar{\sigma}_{j+1}(i^{\text{out}}) \ne \bottop, \\
|V_{i^{\text{out}}}| - \mathsf{q}(\phi) + 1 & \bar{\sigma}_{j+1}(i^{\text{out}}) = \bottop,
\end{cases}
\\
|V_{i^{\text{in}}} \cap R_{x}|
&=
\begin{cases}
\bar{\sigma}_{j+1}(i^{\text{in}}) - 1 & \bar{\sigma}_{j+1}(i^{\text{in}}) \ne \bottop, \\
\mathsf{q}(\phi)-1 & \bar{\sigma}_{j+1}(i^{\text{in}}) = \bottop.
\end{cases}
\end{align*}
Observe that at this point, each positive arc in $g$ is
an outgoing arc of $v_{i^{\text{out}}}^{j}$ or an incoming arc of $v_{i^{\text{in}}}^{j}$.
Now we make a move from $V_{i^{\text{out}}}$ to $V_{i^{\text{in}}}$ and obtain a set $R_{x+1}$ with shape $\bar{\sigma}_{j+1}$
no matter if $g((v_{i^{\text{out}}}^{j}, v_{i^{\text{in}}}^{j})) > 0$ or not.
If $g((v_{i^{\text{out}}}^{j}, v_{i^{\text{in}}}^{j})) > 0$,
then this is just a valid move. We decrease $g((v_{i^{\text{out}}}^{j}, v_{i^{\text{in}}}^{j}))$ by $1$ in this case.
If $g((v_{i^{\text{out}}}^{j}, v_{i^{\text{in}}}^{j})) = 0$,
then there exist $h^{\text{out}}$ and $h^{\text{in}}$ such that
$g((v_{i^{\text{out}}}^{j}, v_{h^{\text{in}}}^{j})) > 0$ and $g((v_{h^{\text{out}}}^{j}, v_{i^{\text{in}}}^{j})) > 0$
as moves from $V_{i^{\text{out}}}$ and to $V_{i^{\text{in}}}$ still have to be made.
We decrease both
$g((v_{i^{\text{out}}}^{j}, v_{h^{\text{in}}}^{j}))$ and $g((v_{h^{\text{out}}}^{j}, v_{i^{\text{in}}}^{j}))$ by $1$
and increase $g((v_{h^{\text{out}}}^{j}, v_{h^{\text{in}}}^{j}))$ by $1$.
Intuitively, we make a move from $V_{i^{\text{out}}}$ to $V_{i^{\text{in}}}$ and promise to make a move from $V_{h^{\text{out}}}$ to $V_{h^{\text{in}}}$
instead of making moves from $V_{i^{\text{out}}}$ to $V_{h^{\text{in}}}$ and from $V_{h^{\text{out}}}$ to $V_{i^{\text{in}}}$.
After obtaining the set $R_{x+1}$ with shape $\bar{\sigma}_{j+1}$, we execute moves following $g$ in an arbitrary order.
This never changes the shape of the set and obtains $R'$.
\end{proof}
\subsection{Extension to \MSOR{2}}
\label{mso2ND}
Here we try to extend \cref{thm:msor1-nd} to \MSOR{2}.
We first observe that it is easy if the parameter is the vertex cover number.
\begin{proposition}
[{\cite[Lemma~6 (rephrased)]{Lampis12}}]
\label{pro:vc-mso2}
Let $\phi$ be an \mso{2} sentence and $G$ be a colored graph.
Then, there exists an \mso{1} sentence $\phi'$ and a colored graph $G'$ with $\vc(G)$ additional colors such that
$\vc(G') = \vc(G)$,
$|\phi'|$ depends only on $|\phi|$ and $\vc(G)$, and
$G \models \phi$ if and only if $G' \models \phi'$.
\end{proposition}
One can easily extend \cref{pro:vc-mso2} to the corresponding proposition about
an \mso{2} formula with one free vertex-set variable $X$ by considering $X$ as a new color.
This observation and \cref{thm:msor1-nd} together imply the following.
(Recall that $\nd(G) \le 2^{\vc(G)} + \vc(G)$ for every graph $G$.)
\begin{corollary}
\label{cor:msor2-vc}
\MSOR{2} parameterized by $\vc + |\phi|$ is fixed-parameter tractable.
Furthermore, for a yes instance of \MSOR{2}, finding a shortest $\mathsf{TJ}$-sequence is fixed-parameter tractable with the same parameter.
\end{corollary}
Unfortunately, such an extension of \cref{thm:msor1-nd} with its full generality is not possible under some reasonable assumption.
We use the following hardness result on \mso{2} \textsc{Model Checking} on complete graphs.\footnote{%
Recall that $\mathrm{E} = \mathrm{DTIME}(2^{O(n)})$ and $\mathrm{NE} = \mathrm{NTIME}(2^{O(n)})$.
The same hardness result with a stronger assumption $\mathrm{EXP} \ne \mathrm{NEXP}$ was shown earlier by
Courcelle, Makowsky, and Rotics~\cite{CourcelleMR00}.}
Given an \mso{2} sentence $\psi$ and a graph $G$,
\mso{2} \textsc{Model Checking} asks whether $G \models \psi$.
\begin{proposition}
[\cite{Lampis14}]
Unless $\mathrm{E} = \mathrm{NE}$,
\mso{2} \textsc{Model Checking} on $n$-vertex uncolored complete graphs
cannot be solved in time $\mathcal{O}(n^{f(|\phi|)})$ for any function $f$.
\end{proposition}
\begin{theorem}
\label{thm:nd-msor2}
Unless $\mathrm{E} = \mathrm{NE}$,
\MSOR{2} on $n$-vertex uncolored graphs of neighborhood diversity~$2$
cannot be solved in time $\mathcal{O}(n^{f(|\phi|)})$ for any function $f$.
\end{theorem}
\begin{proof}
Let $\psi$ be an \mso{2}-sentence and $K_{n}$ be an uncolored complete graph of $n$ vertices.
We construct an instance $\langle \phi, G, S, S' \rangle$ of \MSOR{2} as follows.
The graph $G$ is obtained from $K_{n+4}$ by removing the three edges in a triangle formed by $x,y,z \in V(K_{n+4})$.
Let $a,b$ be arbitrary two vertices in $V(G) \setminus \{x,y,z\}$.
We set $S = V(G) \setminus \{y,z\}$ and $S' = V(G) \setminus \{a,b\}$.
To define the formula $\phi$, we first modify the sentence $\psi$ by
adding a new free vertex-set variable $X$,
asking all vertex variables and vertex-set variables in $\psi$
to be elements and subsets of $X$, respectively, and
asking all edge variables and edge-set variables in $\psi$
to be elements and subsets of $E(G[X])$, respectively.
We call the obtained \mso{2} formula $\psi'$.
Note that \cref{prop:isomorphic}
implies that for every $X \subseteq V(G)$ with $|X| = n$,
$\psi'(X)$ is true if and only if $K_{n} \models \psi$ and $X$ is a clique of $G$.
We also need the following formula expressing that
the vertex set $G[X]$ has all but one possible edges (i.e., $X$ is an \emph{almost-clique}):
\[
\textsf{almost-clique}(X) = \dot{\exists} u, v \in X \colon
\lnot E(u,v) \land
(\dot{\forall} p, q \in X \colon \lnot E(p,q) \Rightarrow \{p,q\} = \{u,v\}),
\]
where $\{p,q\} = \{u,v\}$ is a syntax sugar for $(p=u \land q = v) \lor (p=v \land q = u)$.
Now we define $\phi$ as follows:
\[
\phi(X) = \textsf{almost-clique}(X) \Rightarrow
\dot{\exists} u,v \in X \colon \lnot E(u,v) \land \psi'(X \setminus \{u,v\}),
\]
where $\psi'(X \setminus \{u,v\})$
can be expressed as
$\exists Y \subseteq X \colon \psi'(Y) \land (\forall w \in X \colon \lnot w \in Y \rightarrow (w = u) \lor (w = v))$.
Note that $G \models \phi(S)$ and $G \models \phi(S')$
since $S$ is a clique and $S'$ misses three edges.
We show that $K_{n} \models \psi$
if and only if $\langle \phi, G, S, S' \rangle$ is a yes-instance of \MSOR{2}.
This implies the theorem as $\nd(G) = 2$ ($\{x,y,z\}$ and $V(G) \setminus \{x,y,z\}$ are the twin classes).
To show the only-if direction, assume that $K_{n} \models \psi$.
We set $S'' = S-a+y$ ($= S' + b -z$).
Observe that $S''$ is an almost-clique with the missing edge $\{x,y\}$
and $S'' \setminus \{x,y\}$ is a clique of size $n$.
Hence, $G \models \phi(S'')$ holds.
Therefore, $\langle S, S'', S' \rangle$ is a $\mathsf{TJ}(\phi)$-sequence.
To show the if direction, assume that there is a $\mathsf{TJ}(\phi)$-sequence from $S$ to $S'$.
Since $|S \cap \{x,y,z\}| = 1$ and $|S' \cap \{x,y,z\}| = 3$,
the $\mathsf{TJ}(\phi)$-sequence contains a set $S''$ with $|S'' \cap \{x,y,z\}| = 2$.
Observe that the set $S''$ is an almost-clique and $S'' \setminus \{x,y,z\}$ is a clique of size $n$.
Since $G \models \phi(S'')$, we have $G \models \psi'(S'' \setminus \{x,y,z\})$,
and thus $K_{n} \models \psi$.
\end{proof}
The proof of \cref{thm:nd-msor2} also shows that \MSOR{2} is hard for graphs of twin cover number~$3$.
A vertex set $C \subseteq V$ of a graph $G = (V,E)$ is a \emph{twin cover}~\cite{Ganian11}
if $V \setminus C$ is a disjoint union of cliques such that each clique is a set of twins in $G$.
The \emph{twin cover number} of a graph is the minimum size of a twin cover in the graph.
The graph $G$ in the proof has a twin cover $\{x,y,z\}$,
and thus \cref{thm:nd-msor2} implies the following corollary.
\begin{corollary}
\label{cor:tc-msor2}
Unless $\mathrm{E} = \mathrm{NE}$,
\MSOR{2} on $n$-vertex uncolored graphs of twin cover number~$3$
cannot be solved in time $\mathcal{O}(n^{f(|\phi|)})$ for any function $f$.
\end{corollary}
\section{Fixed-parameter algorithm parameterized by the solution size and treedepth}
\label{sec:fpt}
In this section, we show that \MSOR{2} is fixed-parameter tractable
when parameterized simultaneously by treedepth, the length of the \mso{2} formula, and the size of input sets $S$ and $S'$.
\begin{theorem}
\label{thm:msor2-td+k}
\MSOR{2} parameterized by $\td + k + |\phi|$ is fixed-parameter tractable, where $k$ is the size of input sets.
Furthermore, for a yes instance of \MSOR{2}, finding a shortest $\mathsf{TJ}$-sequence is fixed-parameter tractable with the same parameter.
\end{theorem}
As we show in \cref{sec:pspace-c},
having the size of input sets is necessary since otherwise it is PSPACE-complete.
It is known (see e.g.,~\cite{CourcelleE12}) that given a colored graph $G$ and an \mso{2} sentence $\phi$,
one can compute in polynomial time a colored graph $G'$ and an \mso{1} sentence $\phi'$
such that
\begin{itemize}
\item $G \models \phi$ if and only if $G' \models \phi'$;
\item $G'$ is obtained from $G$ by subdividing each edge,
and consider the new vertices introduced by the subdivisions as a color;
\item the length of $\phi'$ is bounded by a function of $|\phi|$.
\end{itemize}
Observe that $\td(G') \le \td(G) +1$.\footnote{%
Starting with a treedepth decomposition $F$ of $G$ with depth at most $d$,
we construct a treedepth decomposition $F'$ of $G'$ with depth at most $d+1$
by adding the vertex corresponding to each edge $\{u,v\} \in E(G)$
as a leaf attached to one of $u$ and $v$ that is a descendant of the other.}
Therefore, to prove \cref{thm:msor2-td+k}, it suffices to
show that \MSOR{1} is fixed-parameter tractable parameterized by the claimed parameter.
Now we generalize the type of a vertex used in \cref{sec:vc-nd} to the type of a vertex set.
For a colored graph $G = (V,E,\mathcal{C})$ and vertex sets $X, X' \subseteq V$,
we say that $X$ and $X'$ have the same \emph{type} if there is an isomorphism $\eta$ from $G$ to itself
such that
$\eta(X) = X'$, $\eta(X') = X$, and
$\eta(v) = v$ for every $v \notin X \cup X'$.
Note that from the definition of isomorphisms between colored graphs,
$\mathcal{C}(v) = \mathcal{C}(\eta(v))$ holds for every $v \in V$.
Note also that singletons $\{x\}, \{x'\} \subseteq V$ have the same type
if and only if the vertices $x$ and $x'$ have the same type.
The next lemma says that if there are many disjoint vertex sets of the same type,
then we can avoid most of them when finding $\mathsf{TJ}(\phi)$-sequences.
\begin{lemma}
\label{lem:only-k-sets}
Let $\langle \phi, G, S, S' \rangle$ be a yes-instance of \MSOR{1} with $|S| = |S'| = k$.
Let $C_{1},\dots,C_{t}$ be a family of disjoint vertex sets with the same type
not intersecting $S \cup S'$.
If $t > k$, then for every $I \subseteq [t]$ with $|I| = k$,
there is a shortest $\mathsf{TJ}(\phi)$-sequence $S_{0},\dots,S_{\ell}$ from $S_{0} = S$ to $S_{\ell} = S'$
such that
$C_{i} \cap \bigcup_{0 \le j \le \ell} S_{j} \ne \emptyset$ only if $i \in I$.
\end{lemma}
\begin{proof}
Without loss of generality, assume that $I = [k]$.
Let $S_{0},\dots,S_{\ell}$ be a shortest $\mathsf{TJ}(\phi)$-sequence from $S_{0} = S$ to $S_{\ell} = S'$.
If this sequence has no intersection with sets $C_{k+1}, \dots, C_{t}$, we are done.
Assume that $r$ is the first index such that $C_{p} \cap S_{r} \ne \emptyset$ for some $p \notin [k]$.
Note that such $p$ is unique as a $\mathsf{TJ}(\phi)$-move adds only one new vertex.
We assume that the shortest $\mathsf{TJ}(\phi)$-sequence is chosen so that the index $r$ is maximized.
Observe that $r \ge 1$ as $S_{0}$ intersects no $C_{i}$.
Now we construct a new $\mathsf{TJ}(\phi)$-sequence $S_{0},\dots,S_{r-1}, S_{r}', \dots, S'_{\ell}$ from $S_{0} = S$ to $S'_{\ell} = S'$.
Since $|S_{r}| = k$, there exists an index $q \in [k]$ such that $C_{q} \cap S_{r} = \emptyset$.
We name the vertices in $C_{p}$ and $C_{q}$ as $C_{p} = \{u_{1},\dots,u_{c}\}$ and $C_{q} = \{v_{1},\dots,v_{c}\}$
so that there is an isomorphism $f$ from $G$ to itself
that maps $u_{i}$ to $v_{i}$ for $i \in [c]$, $v_{i}$ to $u_{i}$ for $i \in [c]$, and the other vertices to themselves.
This is possible since $C_{p}$ and $C_{q}$ have the same type.
For $r \le j \le \ell$, we define $S'_{j}$ by \emph{swapping} $C_{p}$ and $C_{q}$ as follows:
\[
S'_{j} = (S_{j} \setminus (C_{q} \cup C_{p})) \cup \{u_{i} \mid v_{i} \in S_{j}\} \cup \{v_{i} \mid u_{i} \in S_{j}\}.
\]
Note that the assumption $S_{\ell} \cap (C_{q} \cup C_{p}) = \emptyset$ implies that $S'_{\ell} = S_{\ell}$.
By the assumption $G \models \phi(S_{j})$, the existence of $f$, and \cref{prop:isomorphic},
it holds that $G \models \phi(S'_{j})$ for $r \le j \le \ell$.
Thus the sequence $S'_{r},\dots,S'_{\ell}$ is a $\mathsf{TJ}(\phi)$-sequence.
We now show that $|S_{r-1} \setminus S'_{r}| = |S'_{r} \setminus S_{r-1}| = 1$.
If $|S_{r-1} \cap C_{q}| = 1$, then $S_{r}$ is the set obtained from $S_{r-1}$ by removing the unique element in $C_{q}$
and adding some element in $C_{p}$ for the first time. In this case, $S_{r-1} = S'_{r}$ holds,
and thus $S_{0},\dots,S_{r-1}, S'_{r+1}, \dots, S'_{\ell}$ is a $\mathsf{TJ}(\phi)$-sequence from $S$ to $S'$.
This contradicts the assumption that $S_{0},\dots,S_{\ell}$ is a shortest one.
Since $S_{r} \cap C_{q} = \emptyset$, we have $S_{r-1} \cap C_{q} = \emptyset$.
Let $S_{r-1} \setminus S_{r} = \{x\}$ and $S_{r} \setminus S_{r-1} = \{u_{i}\}$.
Since $x \notin C_{p} \cup C_{q}$,
we have that $S_{r-1} \setminus S'_{r} = \{x\}$ and $S'_{r} \setminus S_{r-1} = \{v_{i}\}$ as desired.
The discussions so far show that $S_{0},\dots,S_{r-1}, S'_{r}, \dots, S'_{\ell}$ is a (shortest) $\mathsf{TJ}(\phi)$-sequence from $S$ to $S'$.
However, the first index $r'$ (if any exists) such that $S'_{r'} \cap C_{i}$ for some $i \notin [k]$ is larger than $r$
as $C_{i} \cap S'_{r} = \emptyset$ for every $i \notin [k]$.
This contradicts the assumption on $r$.
\end{proof}
Next we further argue that if there are a much larger number of disjoint vertex sets of the same type,
then we can safely remove some of them.
Note that this claim is stronger than \cref{lem:only-k-sets} in some sense.
Since the formula $\phi(X)$ may depend on the whole structure of $G$ (i.e., not only on $G[X]$),
``not using it in a sequence'' and ``removing it from the graph'' are different.
We need the following proposition, which is a generalization of \cref{prop:Lampis12}.
\begin{proposition}
[\cite{LampisM21}]
\label{prop:many-sets}
Let $G$ be a colored graph and $\phi$ be an \mso{1} formula with one free set variable.
Assume that $G$ contains $t > 2^{p \cdot \mathsf{q}(\phi)}$
disjoint size-$p$ vertex sets with the same type.
Let $G'$ be the graph obtained from $G$ by removing one of the $t$ sets.
Then, for every subset $X \subseteq V$ disjoint from the $t$ sets,
$G' \models \phi(X)$ if and only if $G \models \phi(X)$.
\end{proposition}
The proposition above was originally stated for \mso{1} sentences in \cite{LampisM21}
but can be easily modified to this form by considering the free set variable as a new color.
Now we can prove the key lemma.
\begin{lemma}
\label{lem:removing-a-set}
Let $\langle \phi, G, S, S' \rangle$ be an instance of \MSOR{1} with $|S| = |S'| = k$.
Let $C_{1},\dots,C_{t}$ be a family of disjoint size-$p$ vertex sets with the same type
not intersecting $S \cup S'$.
If $t > k + 2^{p \cdot \mathsf{q}(\phi)}$, then for every $C \in \{C_{1},\dots,C_{t}\}$,
$\operatorname{dist}_{\phi,G}(S,S') = \operatorname{dist}_{\phi,G-C}(S,S')$.
\end{lemma}
\begin{proof}
Without loss of generality, assume that $C = C_{t}$.
Let $G' = G - C_{t}$.
By \cref{lem:only-k-sets}, we can focus on shortest $\mathsf{TJ}(\phi)$-sequences (both in $G$ and in $G'$)
that may intersect $C_{1}, \dots, C_{k}$ but do not intersect $C_{k+1}, \dots, C_{t}$.
Since $|\{C_{k+1}, \dots, C_{t}\}| = t - k > 2^{p \cdot \mathsf{q}(\phi)}$,
\cref{prop:many-sets} implies that
for every subset $X \subseteq V \setminus \bigcup_{k+1 \le j \le t} C_{j}$,
we have $G \models \phi(X)$ if and only if $G' \models \phi(X)$.
This implies that a sequence of vertex sets not intersecting $\bigcup_{k+1 \le j \le t} C_{j}$
is a $\mathsf{TJ}(\phi)$-sequence in $G$ if and only the sequence is a $\mathsf{TJ}(\phi)$-sequence in $G'$.
\end{proof}
The next lemma completes the proof of \cref{thm:msor2-td+k}
as it means that we have a kernel of \MSOR{1} parameterized by $\td(G)+k+|\phi|$
that preserves the minimum length of a $\mathsf{TJ}(\phi)$-sequence.
\begin{lemma}
\label{lem:nd-kernel}
Let $\langle \phi, G, S, S' \rangle$ be an instance of \MSOR{1} with $|S| = |S'| = k$.
In polynomial time, one can compute a subgraph $H$ of $G$
such that $\operatorname{dist}_{\phi,G}(S,S') = \operatorname{dist}_{\phi,H}(S,S')$ and
the size of $H$ depends only on the parameter $\td(G)+k+|\phi|$.
\end{lemma}
\begin{proof}
Let $F$ be a treedepth decomposition of depth $\td(G)$.
If $F$ is not connected, then we add a new vertex $r$ and add edges from the new vertex to the roots of trees in $F$
and set $r$ to the new root. We call the resultant tree $T$.
If $F$ is connected, then we just set $T = F$ and call its root $r$.
Let $d$ be the depth of $T$. Note that $d \le \td(G) + 1$.
A node in $T$ has \emph{height} $h$ if
the maximum distance to a descendant is $h$, where the height of a leaf is $0$.
Let $c(0) = 0$, $n(0) = 1$, and for $h \ge 0$, let
\begin{align*}
c(h+1) &= (k + 2^{n(h) \cdot \mathsf{q}(\phi)}) \cdot 2^{|\phi| \cdot n(h)} \cdot 2^{(n(h) +d -h)^{2}} + 2k,
\\
n(h+1) &= n(h) \cdot c(h+1) + 1.
\end{align*}
In the next paragraph, we show that after exhaustively applying \cref{lem:removing-a-set} in a bottom-up manner along $T$,
each node of height $h$ has at most $c(h)$ children
and each subtree rooted at a node of height $h$ contains at most $n(h)$ nodes.
This implies that $H$ has at most $n(d)$ vertices,
where $n(d)$ depends only on $\td(G)$, $k$, and $|\phi|$.
If $h = 0$, then the claim is trivial. Assume that the claim holds for some $h \ge 0$.
It suffices to prove the upper bound $c(h+1)$ for the number of children as the upper bound $n(h+1)$ follows immediately.
Suppose to the contrary that a node $v$ of height $h+1$ has more than $c(h+1)$ children.
Since $|S \cup S'| \le 2k$, more than $c(h+1) - 2k$ subtrees rooted at the children of $v$ have no intersection with $S \cup S'$.
Let $S_{1}, \dots, S_{p}$ be such subtrees.
By the induction hypothesis, $|V(S_{i})| \le n(h)$ holds for $i \in [p]$.
Let $R$ be the vertices on the $v$-$r$ path in $T$ (including $v$ and $r$).
Observe that, in $H$, the vertices in $V(S_{i})$ may have neighbors only in $V(S_{i}) \cup R$.
Thus the number of different types of $V(S_{1}), \dots, V(S_{p})$
is at most $2^{|\phi| \cdot n(h)} \cdot 2^{(n(h)+d-h)^{2}}$,
where $2^{|\phi| \cdot n(h)}$ is the number of possible ways for coloring $n(h)$ vertices with subsets of at most $|\phi|$ colors
and $2^{(n(h)+d-h)^{2}}$ is an upper bound on the number of different ways that
$n(h)$ vertices form a graph and have additional neighbors in $d-h$ vertices.
Since $p > c(h+1) - 2k = (k + 2^{n(h) \cdot \mathsf{q}(\phi)}) \cdot 2^{|\phi| \cdot n(h)} \cdot 2^{(n(h) +d -h)^{2}}$,
there is a subset $I \subseteq [p]$ such that $|I| > k + 2^{n(h) \cdot \mathsf{q}(\phi)}$ and
all vertex sets $V(S_{i})$ with $i \in [I]$ have the same type.
This is a contradiction as \cref{lem:removing-a-set} can be applied here.
Finally, let us see how fast we can apply \cref{lem:removing-a-set} exhaustively in a bottom-up manner.
The description above immediately gives a fixed-parameter algorithm parameterized by $\td(G)+k+|\phi|$,
which is actually sufficient for our purpose.
A polynomial-time algorithm can be achieve in pretty much the same way as presented in~\cite{DemaineEHJLUU19}
for a reconfiguration problem of paths parameterized by $\td$.
The idea is to use a polynomial-time algorithm for labeled-tree isomorphism to classify subtrees into different types.
Only the differences here are that the graph is colored and the parameters involved are larger.
As the colors of the vertices can be handled by a labeling algorithm
and the involved parameters do no matter when they are too large (i.e., if it is $|V|$ or more),
we still obtain a polynomial-time algorithm.
\end{proof}
\subsection{A by-product: Cluster deletion number}
By using \cref{lem:removing-a-set} and \cref{thm:msor2-td+k},
we can show a similar result for cluster deletion number.
For a graph $G$, a vertex subset $D$ of $G$ is a \emph{cluster deletion set}
if $G - D$ is a disjoint union of complete graphs.
The \emph{cluster deletion number} of $G$, denoted $\cd(G)$,
is the minimum size of a cluster deletion set of $G$.
Since finding a minimum cluster deletion set is fixed-parameter tractable parameterized by
$\cd(G)$~\cite{HuffnerKMN10}, we assume that such a set is given when $\cd(G)$ is part of the parameter.
Note that a twin cover is a cluster deletion set,
and thus $\cd(G) \le \tc(G)$ holds for every graph $G$.
\begin{corollary}
\label{cor:msor1-cd+k}
\MSOR{1} parameterized by $\cd + k + |\phi|$ is fixed-parameter tractable, where $k$ is the size of input sets.
Furthermore, for a yes instance of \MSOR{2}, finding a shortest $\mathsf{TJ}(\phi)$-sequence is fixed-parameter tractable with the same parameter.
\end{corollary}
\begin{proof}
Let $\langle \phi, G, S, S' \rangle$ be an instance of \MSOR{1} with $|S| = |S'| = k$
and $D$ be a cluster deletion set of $D$ with size $d \coloneqq \cd(G)$.
Let $C$ be a clique in $G - D$ such that $|C| > 2^{d+|\phi|} (k+2^{\mathsf{q}(\phi)}) + 2k$,
and thus $|C \setminus (S \cup S')| > 2^{d+|\phi|} (k+2^{\mathsf{q}(\phi)})$.
Since each vertex in $C$ has a subset of at most $|\phi|$ colors
and $2^{d}$ possible ways to have neighbors in $D$,
the vertices of $C \setminus (S \cup S')$,
as singletons, can be partitioned into at most $2^{d + |\phi|}$ types.
As $|C \setminus (S \cup S')| > 2^{d+|\phi|} (k+2^{\mathsf{q}(\phi)})$,
at least one of the types includes more than $k+2^{\mathsf{q}(\phi)}$ vertices.
For such a type, we apply \cref{lem:removing-a-set} with $p = 1$
and remove a vertex from $C \setminus (S \cup S')$.
Let $G'$ be the graph obtained by exhaustively applying this reduction.
We have $|C| \le 2^{d+|\phi|} (k+2^{\mathsf{q}(\phi)}) + 2k$ for all cliques $C$ in $G'-D$.
Now observe that $G'$ has treedepth at most $d + 2^{d+|\phi|} (k+2^{\mathsf{q}(\phi)}) + 2k$
since removing the $d$ vertices in $D$ cannot decrease the treedepth by more than $d$
and each clique $C$ in $G' - D$ has treedepth at most $|C|$.
Hence, \cref{thm:msor2-td+k} proves our claim.
\end{proof}
\section{PSPACE-completeness on forests of depth $3$}
\label{sec:pspace-c}
In this section, we complement \cref{thm:msor2-td+k}
by showing that if the size of input sets is not part of the parameter, then the problem becomes PSPACE-complete.
For a set $U$, a subset family $\mathcal{C} \subseteq 2^{U}$ is an \emph{exact cover} if
the elements of $\mathcal{C}$ are pairwise disjoint and $\bigcup_{C \in \mathcal{C}} C = U$.
For two exact covers $\mathcal{C}_{1}, \mathcal{C}_{2}$ of $U$,
we say that $\mathcal{C}_{1}$ can be obtained from $\mathcal{C}_{2}$ by a \emph{merge}
(and $\mathcal{C}_{2}$ can be obtained from $\mathcal{C}_{1}$ by a \emph{split})
if $\mathcal{C}_{1} \setminus \mathcal{C}_{2} = \{D_{1}\}$ and $\mathcal{C}_{2} \setminus \mathcal{C}_{1} = \{D_{2}, D_{3}\}$
for some $D_{1}$, $D_{2}$, $D_{3}$.
Note that $D_{1} = D_{2} \cup D_{3}$ and $D_{2} \cap D_{3} = \emptyset$
as $\mathcal{C}_{1}$ and $\mathcal{C}_{2}$ are exact covers.
Given a set $U$, a family $\mathcal{D} \subseteq 2^{U}$,
and two exact covers $\mathcal{C}, \mathcal{C}' \subseteq \mathcal{D}$ of $U$,
\textsc{Exact Cover Reconfiguration} asks whether
there exists a sequence $\mathcal{C}_{0}, \dots, \mathcal{C}_{\ell}$ of exact covers of $U$
from $\mathcal{C} = \mathcal{C}_{0}$ to $\mathcal{C}' = \mathcal{C}_{\ell}$ such that
$\mathcal{C}_{i} \subseteq \mathcal{D}$ for all $i$
and $\mathcal{C}_{i}$ is obtained from $\mathcal{C}_{i-1}$ by a split or a merge for each $i \in [\ell]$.
It is known that \textsc{Exact Cover Reconfiguration} is PSPACE-complete~\cite{CardinalDEHW20}.
In this section, we prove the following hardness result
by reducing \textsc{Exact Cover Reconfiguration} to \MSOR{1}.
(Recall that \MSOR{1} belongs to PSPACE.)
\begin{theorem}
\label{thm:pspcae-c_td=3}
For some fixed $\phi$,
\MSOR{1} is PSPACE-complete on uncolored forests of depth~$3$.
\end{theorem}
\subsection{Construction}
Let $\langle U, \mathcal{D}, \mathcal{C}, \mathcal{C}' \rangle$
be an instance of \textsc{Exact Cover Reconfiguration}.
We construct an equivalent instance of \MSOR{1}.
Without loss of generality, we assume that $U$ is a set of positive integers greater than or equal to $3$.\footnote{%
We want to identify elements of $U$ with positive integers but do not want to use $1$ and $2$ for some technical reasons.}
For each set $D \in \mathcal{D}$, we construct a tree $T_{D}$ as follows (see \cref{fig:treeD}).
The tree $T_{D}$ contains a central vertex called the \emph{root}.
For each $d \in D$, the root has a child with $d$ grandchildren.
We call the subtree rooted at a child of the root a \emph{star} and each leaf in a star a \emph{star leaf}.
Additionally, the root has two more children that have degree~$1$. They are called the \emph{antennae}.
\begin{figure}[htb]
\centering
\includegraphics[scale=1]{treeD}
\caption{The tree $T_{D}$ with $D = \{d_{1}, d_{2}, \dots, d_{|D|}\}$.}
\label{fig:treeD}
\end{figure}
The entire forest $F$ consists of trees $T_{D}$ for all $D \in \mathcal{D}$
and eight isolated vertices. By $I$, we denote the set of the isolated vertices.
Clearly, $F$ has treedepth~$3$.
The initial set $S$ consists of all vertices in $I$
and all star leaves of $T_{D}$ for all $D \in \mathcal{C}$.
Similarly,
the target set $S'$ consists of all vertices in $I$
and all star leaves of $T_{D}$ for all $D \in \mathcal{C}'$.
Note that $|S| = |S'| = |U| + 8$.
For a set $R \subseteq V(F)$ and a set $D \in \mathcal{D}$,
the tree $T_{D}$ is \emph{full} (\emph{empty}) \emph{under} $R$
if $R$ contains all (no, resp.) star leaves of $T_{D}$,
and $T_{D}$ is \emph{clean} if it is full or empty.
We also say that, for a set $R \subseteq V(F)$ and a set $D \in \mathcal{D}$,
a star in $T_{D}$ is \emph{full} (\emph{empty})
if $R$ contains all (no, resp.) star leaves of the star,
and the star is \emph{clean} if it is full or empty.
A tree $T_{D}$ is \emph{marked} by a vertex set if both antennae are included in the vertex set.
A star in $T_{D}$ is \emph{marked} by a vertex set if the center (i.e., the unique non-leaf vertex) of the star is included.
We use the eight additional vertices to mark trees and stars.
We construct the \mso{1} formula $\phi(X)$ expressing that $X$ satisfies
\ref{itm:clean} or \ref{itm:almost-clean} below.
\begin{enumerate}
\item All trees $T_{D}$ are clean
and exactly eight vertices in $X$ are not star leaves.
\label{itm:clean}
\item Exactly three trees $T_{D_{1}}$, $T_{D_{2}}$, $T_{D_{3}}$ are marked, all other trees are clean, and
the following conditions are satisfied. \label{itm:almost-clean}
\begin{itemize}
\item Exactly one of the three trees, say $T_{D_{3}}$, is clean.
\item In each of $T_{D_{1}}$ and $T_{D_{2}}$, exactly one star is marked and all other stars are clean.
\item The marked star in $T_{D_{1}}$ is clean if and only if so is the marked star in $T_{D_{2}}$.
\end{itemize}
\end{enumerate}
Constructing such $\phi(X)$ is tedious but not difficult.
The expression is given in \cref{ssec:phi-for-hardness}.
We say that $X$ is \emph{clean} if the first condition above is satisfied.
Note that the second case also implies that
exactly eight vertices in $X$ are not star leaves.
This implies that any $\mathsf{TJ}(\phi)$-move involves either two star leaves or two vertices that are not star leaves.
The definition of $\phi$ also implies that a token on an antenna can move only if the set is clean.
Also, a token on a star center can move only if the star is clean.
In what follows, we show that the constructed instance $\langle \phi, F, S, S' \rangle$ is a yes-instance of \MSOR{1}
if and only if
$\langle U, \mathcal{D}, \mathcal{C}, \mathcal{C}' \rangle$ is a yes-instance of \textsc{Exact Cover Reconfiguration}.
\subsection{The if direction}
Assume that $\langle U, \mathcal{D}, \mathcal{C}, \mathcal{C}' \rangle$ is a yes-instance of \textsc{Exact Cover Reconfiguration}.
Let $\mathcal{C}_{0}, \dots, \mathcal{C}_{\ell}$ be a reconfiguration sequence
from $\mathcal{C} = \mathcal{C}_{0}$ to $\mathcal{C}' = \mathcal{C}_{\ell}$ by splits and merges.
For $0 \le i \le \ell$, let $S_{i}$ be the set consists of
the eight vertices in $I$ and all star leaves in $T_{D}$ for all $D \in \mathcal{C}_{i}$.
Observe that $S_{0} = S$, $S_{\ell} = S'$, and each $S_{i}$ is clean.
Thus, it suffices to show that
there is a $\mathsf{TJ}(\phi)$-sequence from $S_{i-1}$ to $S_{i}$ for all $i \in [\ell]$.
Let $i \in [\ell]$. Since $\mathsf{TJ}(\phi)$-sequences are reversible,
it suffices to consider the case where $\mathcal{C}_{i}$ is obtained from $\mathcal{C}_{i-1}$ by a split.
Let $\mathcal{C}_{i-1} \setminus \mathcal{C}_{i} = \{D_{1}\}$ and $\mathcal{C}_{i} \setminus \mathcal{C}_{i-1} = \{D_{2}, D_{3}\}$.
A $\mathsf{TJ}(\phi)$-sequence from $S_{i-1}$ to $S_{i}$ can be constructed as follows.
(Recall that $D_{1} = D_{2} \cup D_{3}$ and $D_{2} \cap D_{3} = \emptyset$.)
\begin{enumerate}
\setcounter{enumi}{-1}
\item Choose arbitrary six tokens on $I$ and call them the \emph{antenna tokens}, and the remaining two the \emph{star tokens}.
\item Move the antenna tokens to the antennae of $T_{D_{1}}$, $T_{D_{2}}$, $T_{D_{3}}$.
\item For each $d \in D_{2}$ and $j \in \{1,2\}$, let $S_{d}^{(j)}$ be the star in $T_{D_{j}}$ corresponding to $d$.
\label{itm:D2}
\begin{enumerate}
\item Move the star tokens to the centers of $S_{d}^{(1)}$ and $S_{d}^{(2)}$.
\item Move the tokens on the star leaves of $S_{d}^{(1)}$ to the star leaves of $S_{d}^{(2)}$.
\end{enumerate}
\item Replace $D_{2}$ with $D_{3}$ and execute Step~\ref{itm:D2}.
\item Move the antenna tokens and the star tokens to $I$.
\end{enumerate}
We can see that $S_{i}$ is obtained after the modifications above, and all intermediate sets satisfy~$\phi$.
Hence, this direction holds.
\subsection{The only-if direction}
Assume that $\langle \phi, F, S, S' \rangle$ is a yes-instance of \MSOR{1}.
Let $S_{0},\dots,S_{\ell}$ be a shortest $\mathsf{TJ}(\phi)$-sequence from $S = S_{0}$ to $S' = S_{\ell}$.
For each $S_{i}$, let $\mathcal{S}_{i} = \{D \in \mathcal{D} \mid T_{D} \ \text{is full under} \ S_{i}\}$.
Observe that $\mathcal{S}_{0} = \mathcal{C}$ and $\mathcal{S}_{\ell} = \mathcal{C}'$.
Since $d > 1$ for each $d \in U$,
a single $\mathsf{TJ}(\phi)$-move cannot make a full star empty.
This implies the following.
\begin{observation}
\label{obs:both-clean}
If $S_{i}$ and $S_{i+1}$ are clean, then $\mathcal{S}_{i} = \mathcal{S}_{i+1}$.
\end{observation}
The next lemma is the main technical ingredient in this direction.
\begin{lemma}
\label{lem:nonclean-interval}
If $S_{i}$ and $S_{i'}$ are clean, $i + 1 < i'$, and $S_{j}$ is not clean for all $j$ with $i < j < i'$,
then $\mathcal{S}_{i'}$ can be obtained from $\mathcal{S}_{i}$ by a split or a merge.
\end{lemma}
\begin{proof}
Since $S_{i}$ is clean and $S_{i+1}$ is not,
the $\mathsf{TJ}(\phi)$-move from $S_{i}$ to $S_{i+1}$ involves two star leaves.
In $S_{i}$, the following conditions are satisfied:
\begin{itemize}
\item all trees $T_{D}$ are clean;
\item exactly three trees $T_{D_{1}}$, $T_{D_{2}}$, $T_{D_{3}}$ are marked;
\item exactly two of them, say $T_{D_{1}}$ and $T_{D_{2}}$, contain one marked star each.
\end{itemize}
The second and third conditions above hold
as the next set $S_{i+1}$ satisfies $\phi$ but is not clean.
For $j \in \{1,2\}$, let $R_{j}$ be the marked star in $T_{D_{j}}$ under $S_{i}$.
We can see that $S_{i+1}$ is obtained from $S_{i}$
by moving a token in one of the stars $R_{1}$ and $R_{2}$ to the other.
By symmetry, assume that a token is moved from $R_{1}$ to $R_{2}$.
This implies that $T_{D_{1}}$ is full and $T_{D_{2}}$ is empty under $S_{i}$
and in particular that $R_{1}$ is full and $R_{2}$ is empty under $S_{i}$.
Let us consider what kind of moves the sequence may take in the next steps.
Since $R_{1}$ and $R_{2}$ are not clean under $S_{i+1}$,
the definition of $\phi$ allows us to move only the tokens in the star leaves of $R_{1}$ and $R_{2}$ until both of them become clean.
Furthermore, the last condition of $\phi$ asks to make them clean at the same time.
This implies that $R_{1}$ and $R_{2}$ have to correspond to the same integer $d \in U$.
If we make $R_{1}$ full and $R_{2}$ empty, then we obtain $S_{i}$ again.
This contradicts the assumption that the sequence is shortest.
Therefore, we can conclude that the next $d-1$ steps move the tokens on star leaves in $R_{1}$ to $R_{2}$,
and make $R_{1}$ empty and $R_{2}$ full.
Now we can move tokens at the centers of $R_{1}$ and $R_{2}$ to star centers in the same trees.
Until one of $T_{D_{1}}$ and $T_{D_{2}}$ becomes clean,
we have to repeat the same steps of moving tokens
from the star leaves in a star to the star leaves in another star corresponding to the same integer.
If we make $T_{D_{1}}$ full (and thus $T_{D_{2}}$ empty), then we obtain $S_{i}$ again, contradicting the assumption.
Thus, we make $T_{D_{1}}$ empty or $T_{D_{2}}$ full.
Since $D_{1} \ne D_{2}$, it is impossible to make $T_{D_{1}}$ empty and $T_{D_{2}}$ full at the same time.
Thus we have the following two cases to consider:
\begin{enumerate}
\item $T_{D_{1}}$ is empty and $T_{D_{2}}$ is not full;
\item $T_{D_{1}}$ is not empty and $T_{D_{2}}$ is full.
\end{enumerate}
We claim that the first case corresponds to a merge and the second to a split.
In the following, we only consider the second case (corresponding to a split)
as the other case is symmetric and allows almost the same proof.
In the current situation,
$T_{D_{1}}$ itself is not clean but its stars are clean,
$T_{D_{2}}$ is full, and $T_{D_{3}}$ is clean.
Recall that the sequence eventually reaches the clean set $S_{i'}$ and
that unless all trees are clean,
no tokens on the antennae of $T_{D_{1}}$, $T_{D_{2}}$, $T_{D_{3}}$ can move.
Thus, in the next steps, we have to make all $T_{D_{1}}$, $T_{D_{2}}$, $T_{D_{3}}$ clean.
If $T_{D_{3}}$ is full now, then this can be possible only by moving back the tokens in $T_{D_{2}}$ to $T_{D_{1}}$ (as $D_{3} \ne D_{2}$).
This contradicts the assumption that the sequence is shortest, and thus we conclude that $T_{D_{3}}$ is empty at this moment.
Similarly, we cannot make $T_{D_{2}}$ empty as it is only possible by making $T_{D_{1}}$ full and leaving $T_{D_{3}}$ empty.
Hence, the only option is to make $T_{D_{1}}$ empty and $T_{D_{3}}$ full, while leaving $T_{D_{2}}$ full.
We can observe that this is possible only if $D_{1} \setminus D_{2} = D_{3}$
by applying almost the same argument for the first steps for making $T_{D_{2}}$ full.
Therefore, it holds that $\mathcal{S}_{i'} = (\mathcal{S}_{i} \setminus \{D_{1}\}) \cup \{D_{2}, D_{3}\}$,
i.e., $\mathcal{S}_{i'}$ can be obtained from $\mathcal{S}_{i}$ by a split.
\end{proof}
Let $S_{i_{0}}, S_{i_{1}}, \dots, S_{i_{p}}$
be the sequence obtained from $S_{0}, \dots, S_{\ell}$ by skipping non-clean sets.
By \cref{obs:both-clean,lem:nonclean-interval},
in the corresponding sequence $\mathcal{S}_{i_{0}}, \mathcal{S}_{i_{1}}, \dots, \mathcal{S}_{i_{p}}$,
consecutive families $\mathcal{S}_{i_{j-1}}$ and $\mathcal{S}_{i_{j}}$ are either the same or in the split-merge relation
for every $j \in [p]$. Furthermore, $\mathcal{S}_{i_{0}} = \mathcal{S}_{0} = \mathcal{C}$
and $\mathcal{S}_{i_{p}} = \mathcal{S}_{\ell} = \mathcal{C}'$.
Therefore, there is a reconfiguration sequence from $\mathcal{C}$ to $\mathcal{C}'$ by splits and merges.
This completes the proof of \cref{thm:pspcae-c_td=3}.
\subsection{Constructing $\phi(X)$}
\label{ssec:phi-for-hardness}
Recall that the \mso{1} formula $\phi(X)$ expresses the property that $X \subseteq V(F)$ satisfies
one of the conditions \ref{itm:clean} or \ref{itm:almost-clean} below.
\begin{enumerate}
\item All trees $T_{D}$ are clean
and exactly eight vertices in $X$ are not star leaves.
\item Exactly three trees $T_{D_{1}}$, $T_{D_{2}}$, $T_{D_{3}}$ are marked, all other trees are clean, and
the following conditions are satisfied.
\begin{itemize}
\item Exactly one of the three trees, say $T_{D_{3}}$, is clean.
\item In each of $T_{D_{1}}$ and $T_{D_{2}}$, exactly one star is marked and all other stars are clean.
\item The marked star in $T_{D_{1}}$ is clean if and only if so is the marked star in $T_{D_{2}}$.
\end{itemize}
\end{enumerate}
We call a set satisfying the first condition \emph{clean}
and a set satisfying the second condition \emph{almost clean}.
In the following, we define formulas $\textsf{clean}(X)$ and $\textsf{almost-clean}(X)$
expressing clean sets and almost clean sets, respectively, and set
\[
\phi(X) = \textsf{clean}(X) \lor \textsf{almost-clean}(X).
\]
\subsubsection{Auxiliary subformulas}
We first define $u\textsf{-leaf}(v)$ meaning that $v$ is a leaf (a degree-$1$ vertex) attached to $u$
and $\textsf{dist2}(r,s)$ meaning that the distance between $r$ and $s$ is exactly $2$:
\begin{align*}
u\textsf{-leaf}(v) &= E(u,v) \land (\forall w \colon E(w,v) \Rightarrow w = u),
\\
\textsf{dist2}(r,s) &= (r \ne s) \land \lnot E(r,s) \land (\exists u \colon E(r,u) \land E(u,s)).
\end{align*}
Note that $u$ in $u\textsf{-leaf}(v)$ is a free variable too.
Now the property of being the root, center, or a star leaf in a tree $T_{D}$ can be expressed as follows:
\begin{align*}
\textsf{root}(r)
&=
\dot{\exists} u,v \colon
r\textsf{-leaf}(u) \land
r\textsf{-leaf}(v) \land
(\forall w \colon r\textsf{-leaf}(w) \Rightarrow ((w = u) \lor (w = v))),
\\
\textsf{center}(c) &= \exists r \colon \textsf{root}(r) \land E(r,c) \land \lnot r\textsf{-leaf}(c),
\\
\textsf{star-leaf}(v)
&=
\exists r \colon \textsf{root}(r) \land \textsf{dist2}(r,v).
\end{align*}
Here we use the characterizations that
a root has exactly two leaves attached (recall that each star contains at least three star leaves),
a center is a non-leaf vertex adjacent to a root, and
a star leaf has distance~$2$ to a root.
Assuming that $r$ is a root vertex,
the next formulas express that the tree $T_{D}$ rooted at $r$ is full, empty, or clean in $X$, respectively:
\begin{align*}
\textsf{full-tree}(r,X) &= \forall s \colon \textsf{dist2}(r,s) \Rightarrow s \in X, \\
\textsf{empty-tree}(r,X) &= \forall s \colon \textsf{dist2}(r,s) \Rightarrow \lnot (s \in X),\\
\textsf{clean-tree}(r,X) &= \textsf{full-tree}(r,X) \lor \textsf{empty-tree}(r,X).
\end{align*}
Similarly, assuming that $c$ is a center of some star,
the next formulas express that the star with the center $c$ is full, empty, or clean in $X$, respectively:
\begin{align*}
\textsf{full-star}(c, X) &= \forall s \colon c\textsf{-leaf}(s) \Rightarrow s \in X, \\
\textsf{empty-star}(c, X) &= \forall s \colon c\textsf{-leaf}(s) \Rightarrow \lnot (s \in X), \\
\textsf{clean-star}(c, X) &= \textsf{full-star}(c, X) \lor \textsf{empty-star}(c, X).
\end{align*}
Finally, assuming that $r$ is the root vertex of a tree $T_{D}$,
the next formula means that $T_{D}$ is marked as the two antennae are only leaves attached to $r$:
\[
\textsf{marked}(r,X) = \dot{\exists} u, v \in X \colon r\textsf{-leaf}(u) \land r\textsf{-leaf}(v).
\]
\subsubsection{Main subformulas}
Given subformulas above, expressing $\textsf{clean}(X)$ is straightforward:
\[
\textsf{clean}(X) =
\left(\forall r \colon \textsf{root}(r) \Rightarrow \textsf{clean-tree}(r, X)\right)
\land
\left(\dot{\exists} v_{1}, \dots, v_{8} \in X \colon \textstyle\bigwedge_{1\le i \le 8} \lnot \textsf{star-leaf}(v_{i})\right).
\]
The expression of $\textsf{almost-clean}(X)$ is a little more involved
but seeing the equivalence to the conditions is not difficult:
\begin{align*}
&\textsf{almost-clean}(X) =
\dot{\exists} r_{1}, r_{2}, r_{3} \colon
\textsf{root}(r_{1}) \land \textsf{root}(r_{2}) \land \textsf{root}(r_{3}) \\
&\qquad\land
\textsf{marked}(r_{1},X) \land \textsf{marked}(r_{2},X) \land \textsf{marked}(r_{3},X)
\\
&\qquad\land
\lnot \textsf{clean-tree}(r_{1}, X) \land
\lnot \textsf{clean-tree}(r_{2}, X) \land
\textsf{clean-tree}(r_{3}, X) \\
&\qquad \land
\left(\forall r \colon \textsf{root}(r) \land \lnot \textsf{clean-tree}(r, X) \Rightarrow (r = r_{1}) \lor (r = r_{2})\right)
\\
&\qquad\land
(\dot{\exists} c_{1}, c_{2} \in X \colon
\textsf{center}(c_{1}) \land \textsf{center}(c_{2})
\land E(c_{1}, r_{1}) \land E(c_{2}, r_{2}) \\
& \qquad\qquad \land (\forall c \colon (\textsf{center}(c) \land c \ne c_{1} \land c \ne c_{2}) \Rightarrow \textsf{clean-star}(c, X)) \\
& \qquad\qquad \land (\textsf{clean-star}(c_{1}, X) \Leftrightarrow \textsf{clean-star}(c_{2}, X))).
\end{align*}
\section{Remarks on the token sliding setting}
\label{sec:token-sliding}
Here we consider the token-sliding variants of \MSOR{1} and \MSOR{2}
that require the exchanged vertices to be adjacent in each reconfiguration step.
\cref{thm:msor1-nd} says \MSOR{1} is fixed-parameter tractable parameterized by $\nd + |\phi|$.
Unfortunately, this result strongly depends on the token jumping setting.
A modification of the ideas there to the token sliding setting does not look quite promising.
\cref{thm:msor2-td+k}, which says that \MSOR{2} is FPT parameterized by $\td + k + |\phi|$,
can be easily modified for the token-sliding setting. Actually, the proof works almost as it is.
The hardness shown in \cref{thm:pspcae-c_td=3} can be easily modified for the token-sliding setting if we slightly weaken it.
To the forest $F$ constructed there, we add a universal vertex $u$ adjacent to all other vertices.
Then we define the feasibility of a set $R$ as
either (i) $R$ satisfies the original formula $\phi$ in $F$, or
(ii) $R$ is obtained from a set $R'$ satisfying $\phi$ in $F$ by exchanging a member of $R'$ with the universal vertex $u$.
Constructing an \mso{1} formula expressing this condition is easy and proving the equivalence is straightforward.
This implies that the token-sliding variant of
\MSOR{1} is PSPACE-complete even on graphs of treedepth~$4$.
\section{Conclusion}
\label{sec:conclusion}
In this paper, we revisited the reconfiguration problems of vertex sets defined by \mso{} formulas,
while putting the length constraint of reconfiguration sequence aside.
We showed that the problem is fixed-parameter tractable parameterized solely by neighborhood diversity
and by the combination of treedepth and the vertex-set size.
The parameterization solely by treedepth would not work
as we showed that the problem is PSPACE-complete on forests of depth~$3$.
Given the positive result for neighborhood diversity and the known hardness for clique-width
(implied by the one for bandwidth~\cite{Wrochna18}),
a natural target would be an extension to modular-width,
which is a parameter sitting between neighborhood diversity and clique-width (see \cref{fig:parameters}).
It is known that a special case, the independent set reconfiguration,
is fixed-parameter tractable parameterized by modular-width~\cite{BelmonteHLOO20},
but the algorithm in \cite{BelmonteHLOO20} is already quite nontrivial.
Another direction would be strengthening the hardness for treedepth.
In \cref{sec:pspace-c}, we showed the hardness for a quite complicated and rather unnatural formula $\phi$,
which simulates the merge and split operations.
Although this rules out the possibility of meta-theorems parameterized by treedepth,
it would be still interesting to investigate the complexity of specific more natural problems.
For example, what is the complexity of the independent set reconfiguration
and the dominating set reconfiguration parameterized solely by treedepth?
|
\section{Introduction}
The study of the transport properties of nanostructures is a pillar in the understanding of semiconducting and superconducting materials and in the engineering of devices for quantum technologies.
Quantum dots, single-electron transistors and superconducting Cooper pair boxes are fundamental building blocks of many of the envisioned devices for quantum information processing based on solid-state architectures, and the main diagnostic tools adopted in their experimental investigation are provided by tunneling spectroscopy.
These Coulomb blockaded elements play a crucial role in the design of novel platforms for nanoelectronics and hybrid heterostructures, as the ones adopted, for instance, for the fabrication of topological superconductors. It is therefore of the uttermost importance to develop suitable theoretical and numerical tools to simulate their dynamics and estimate the nonlinear conductance of such nanostructures characterized by strong charging energy effects.
The most common strategies to model the transport across these interacting systems typically rely on master-equation approaches \cite{Beenakker1991} and perturbation theory over the coupling with the external leads (see, for example the review \cite{Aleiner2002}). Such techniques have been very fruitful in describing many blockaded devices but they often fail in capturing the emergence of non-perturbative phenomena, as the ones characterizing, for example, several impurity problems.
For strongly correlated quantum impurity systems, a plethora of perturbative renormalization group techniques have been developed since the Wilsonian formulation of the renormalization group and numerical renormalization group (NRG)~\cite{Wilson_RevModPhys75,Bulla_RevModPhys2008}.
These methods are efficient to describe toy models based on a reduced number of degrees of freedom. They capture indeed the main universal features of the systems under investigation. However, they become computationally demanding when dealing with more realistic scenarios that include a larger number of degrees of freedom, and they suffer from limitations when dealing with nonequilibrium steady states \cite{PhysRevB.79.235336,Lotem2020}.
Therefore, the development of novel and complementary techniques to study the transport of complex many-body scatterers is a task of considerable importance in the modeling of nanodevices.
In this work, we present a non-perturbative strategy for the evaluation of the non-linear conductance of blockaded and superconducting quantum scatterers from a microscopic and out-of-equilibrium perspective. In particular, we will address systems with both strong charging energies and sizable couplings with the external leads, while accounting for the backaction of the scatterer onto the leads.
In this respect, tensor networks \cite{SCHOLLWOCK201196,Silvi_SCIPOST2019} offer a very efficient set of tools to study the dynamics of quasi 1D interacting models, with the possibility of modelling interaction effects in a non-perturbative way, and limitations set instead by the growth of the entanglement of the system during its time evolution.
We will present an approach based on matrix product states (MPS) and the time dependent variational principle (TDVP) \cite{Haegeman_PRL2011,Haegeman2016} to estimate the conductance of blockaded devices through the real-time simulation of their dynamics. This allows us to evaluate the current as a function of time, to derive its transient behavior, and to estimate the transport features of these interacting systems in the stationary limit. We focus in particular on topological superconducting models, where the interplay between charging energy and superconductivity gives rise to the main signatures of Majorana modes observed so far in tunnel spectroscopy experiments \cite{Lutchyn_NatReview2018}.
Previous works have successfully applied time-dependent density matrix renormalization group (DMRG) to the study of conductance and noise in the interacting resonant level model out of equilibrium \cite{PhysRevB.70.121302,Schmitteckert2008,Schmitteckert2010,Schmitteckert2011,PhysRevB.79.235336,PhysRevB.82.205110,PhysRevB.73.195304,PhysRevLett.101.236801} and to the evaluation of the transport in simple nanostructures \cite{Schoenauer_PRR2019}. Additionally, hybrid NRG-DMRG techniques have been adopted for simulating the quench dynamics of several quantum impurity models \cite{Guttge2013,Weichselbaum2018}. Very recently, the dynamics after a quench of the Anderson impurity models have also been studied through TDVP \cite{Rams2020,Kohn_PRB2021,Kohn_2022}.
Our approach is developed from similar techniques: we will consider systems composed by a Coulomb blockaded scatterer and two external leads and we will perform TDVP simulations of their dynamics after a quantum quench. Our algorithm adopts a Wilson chain description of the leads in terms of energy eigenstates inspired by NRG studies. The scatterer is instead represented based on two main technical ingredients: (i) We adopt a BCS mean-field description and, in particular, we employ a (Bogoliubov) single-particle energy eigenstate basis to model the inner degrees of freedom of the scatterer in the MPS; this greatly reduces the entanglement growth during the evolution after the quench. (ii) We introduce an additional degree of freedom that keeps track of its charge dynamics; this allows us to capture the Coulomb charging energy of the system, obviating the violation of its particle number conservation caused by the BCS mean-field Hamiltonian \cite{keselman2019}.
The combination of these two elements allows us to avoid the necessity of simulating an interacting number-conserving system (for instance the Richardson-Gaudin model~\cite{Dukelsky_RevModPhys2004}, see also the DMRG calculation of the spectra of superconducting models involving leads and quantum dots in Refs. \cite{saldana2021,zitko2021}), whose dynamics is typically difficult to simulate over sufficiently long time durations.
The quantum quench simulations we perform are reminiscent of the study of quenches in interacting one-dimensional models \cite{calabrese2016}, as, for example, the domain wall melting in the quantum XXZ chains (see, for instance, \cite{bertini2016,collura2018,biella2019,collura2020}). In integrable models, these real-time simulations are known to provide good electric and thermal conductance estimates, which typically match the Landauer B\"uttiker predictions obtained in a bosonization framework \cite{langmann2017}. Our calculations extend these results to general interacting models in which a Landauer B\"uttiker approach cannot be straightforwardly applied.
The rest of the paper is organized as follows:
In Sec.~\ref{sec:model} we describe the general structure of the blockaded systems we analyze. In Sec.~\ref{sec:quench} we discuss the general relation between quantum quench dynamics and transport properties in these systems. In Sec.~\ref{sec:TTN} we outline the main features of our tensor network simulations and in Sec.~\ref{sec:benchmark} we present our results for two paradigmatic models of superconducting scatterers, a generic p-wave superconducting quantum dot and the (blockaded) Kitaev chain, which provides a toy model for topological superconductors. For the former, our simulations provide estimates for the cotunneling conductance; for the latter, our non-perturbative approach predicts zero-bias Majorana peaks with a reduced amplitude and an enhanced width with respect to standard scattering matrix approaches. Finally we illustrate our conclusions in Sec.~\ref{sec:conclusion}. Additional details on the symmetries of our MPS construction and the rate equation estimates are presented in the appendices.
\section{Model}\label{sec:model}
In this work, we analyze transport problems in Coulomb blockaded devices connected with external one-dimensional metallic leads.
To illustrate our method, we focus on systems of spinless fermions and only two leads; however the generalization to spinful models and multiple leads is straightforward.
\begin{figure}
\begin{center}
\includegraphics[width=\columnwidth]{sketch2.pdf}
\caption{(a) Sketch of the system we model with matrix product states: a floating superconducting (SC) island is connected to two normal leads, where we measure a single electron current. The gate voltage $V_g$ is used to tune the induced charge on the superconductor $n_g=\frac{e V_g}{2E_c}$.
(b) Matrix product state representation of the system. Each MPS site corresponds to a single-particle energy level of either the leads or the SC device (for $t_{c,\alpha}=0$)
Yellow and orange circles represent the single-particle eigenstates of the left and right leads, respectively, ordered by their energies $\epsilon_{\alpha,l}$, whereas blue circles are the quasiparticle states of the superconductor, with energies $\varepsilon_n$. The square MPS site is the bosonic auxiliary site encoding the charge of the device.
The leads energy levels are filled up to the corresponding chemical potential $\mu_{L/R}$; the states in the interval $V_{b}=\mu_L-\mu_R$ are those mostly involved in the transport process.}\label{fig:sketch}
\end{center}
\end{figure}
The general structure of the Hamiltonian we study is
\begin{equation} \label{Hamtot}
\widehat{H}_T = \widehat{H}_{\rm leads} + \widehat{H}_{\rm sys} + \widehat{H}_{\rm c} + \widehat{H}_{\rm tunn} \ ,
\end{equation}
where $\widehat{H}_{\rm leads}$ describes the two metallic leads; $\widehat{H}_{\rm sys}$ defines the scatterer device whose transport properties are under scrutiny, and it may include interactions and a mean-field superconducting BCS pairing; $\widehat{H}_{\rm c}$ determines its charging energy, which is the specific interaction responsible for the Coulomb blockaded regime; finally, $\widehat{H}_{\rm tunn}$ represents the tunneling Hamiltonian between the device and the leads (see the schematic representation in Fig. \ref{fig:sketch}).
The paradigmatic system we consider is a one dimensional p-wave topological superconductor, hence we describe the scatterer as a Kitaev chain \cite{Kitaev_2001} with open boundaries.
Its charging energy is given by the electrostatic repulsion arising from the finite capacitance of the floating --i.e. not grounded-- device. The scatterer energy is thus defined by the following Hamiltonian contributions:
\begin{align}
\widehat{H}_{\rm sys} &= \sum_{j=1}^\mathcal{M} \left[ -t_s \opddag{j+1} \opd{j} + \Delta \opddag{j+1} \opddag{j} + {\rm H.c.} \right] -\mu_s \opddag{j}\opd{j} \,, \label{kitaevham} \\
\widehat{H}_{\rm c} &= E_c (\widehat{N}- n_g)^2 \, , \label{Hc}
\end{align}
where $t_s$ is the nearest-neighbors hopping amplitude, $\Delta$ the p-wave supeconducting pairing and $\mu_s$ the chemical potential.
$E_c = \frac{e^2}{2C}$ is the energy associated to the addition of a single charge $e$ to the system, which here we consider to have an effective capacitance $C$.
The electrostatic energy then depends on the difference between the charge of the scatterer $\widehat{N}$ and the charge $n_g$, typically induced in the experiments by a tunable voltage gate. Importantly, the Kitaev Hamiltonian does not conserve the particle number: superconductivity is indeed included in a BCS mean-field approximation. The device charge $\widehat{N}$, instead, is a conserved quantity if the scatterer is isolated and it accounts for the charge of both the Cooper pair condensate and the quasiparticle excitations.
In particular, the total charge $\widehat{N}$ is different from the operator $\sum_j \opddag{j} \opd{j}$, which takes into account only the quasiparticle contribution to the charge; however, they share the same fermionic parity.
We emphasize that the Hamiltonian $\widehat{H}_{\rm sys}$ can be easily generalized to different lattice models; in particular, short-range interactions can also be included with additional but affordable computational cost.
Hereafter we will label with $\mathcal{M}$ the number of sites involved in $\widehat{H}_{\rm sys}$.
The leads are described by simple one-dimensional nearest-neighbor hopping Hamiltonians
\begin{equation} \label{Hleads}
\widehat{H}_{\rm leads} = \sum_{\alpha=L,R} \sum_{l=1}^\mathcal{L} \left[ -t^{\alpha}_{0l} \opcdag{\alpha,l+1}\opc{\alpha,l} +{\rm H.c.} \right] - \mu_\alpha \opcdag{\alpha,l}\opc{\alpha,l} \ ,
\end{equation}
where $\alpha = L,R$ labels the two different leads.
The sites are ordered such that in both leads we start counting from the contact with the scatterer.
Notice also that the hopping amplitude can be site dependent: specifically, we choose an exponential decay of the form
\begin{equation} \label{Wilsonchain}
t_{0l}^\alpha = t_0 \textrm{e}^{-(l-1)/\xi} \ ,
\end{equation}
with a decay length $\xi < \mathcal{L}$, building what is known in the literature as Wilson chain~\cite{Wilson_RevModPhys75,Mitchell_PRB2004,DaSilva_PRB2008}.
Physically, it corresponds to a logarithmic discretization of the original continuous Hamitlonian, where the lattice spacing increases as we move farther away from the scatterer.
This choice provides two main advantages, which will become clearer in the following section:
first, there are more eigenvalues with energies close to the Fermi level, which increases our resolution close to zero voltage bias in the quench protocols;
second, the exponentially decaying hopping prevents the current to reach the end of the leads, acting as a sort of effective sink.
This improves the convergence in time towards the intermediate quasi-steady-state we are interested in to compute transport properties.
In the rest of the paper, we consider the two leads as equivalent under inversion symmetry, so we can drop the $\alpha$ index in the hopping amplitude, and we set the zero of the energy at the Fermi level corresponding to half-filled leads.
Finally, the tunneling between leads and system is described by
\begin{equation}
\widehat{H}_{\rm tunn} = -t_{c,L} \left(\opddag{1}\opc{L,1} +{\rm H.c.} \right) -t_{c,R} \left(\opddag{\mathcal{M}}\opc{R,1} +{\rm H.c.} \right) \ .
\end{equation}
In the following, we will also consider $t_{c,L} =t_{c,R} = t_c$ for the sake of simplicity.
\section{Transport properties from quantum quenches}\label{sec:quench}
Our main goal is to compute the conductance of a given device from its nonequilibrium dynamics, without relying on perturbative approaches.
To this purpose, we simulate the time evolution of the system after a quantum quench and extract the conductance from the emerging quasi-steady-state.
In the thermodynamic limit and for noninteracting models, the system relaxes toward a nonequilibrium steady-state with a current flow corresponding to the prediction of the Landauer-B\"uttiker (LB) formula \cite{Ljubotina_SciPost2019} after a quench in which leads with different densities are suddenly connected at time ${\sf t}=0$ ($t_c({\sf t}) \propto \Theta({\sf t})$, with $\Theta$ being the Heaviside step function).
In finite systems, instead, the LB regime appears only as a transient \cite{Chien2014} before the current is reflected back from the edges (see Fig. \ref{fig:quench_exact} for a qualitative example) and eventually a trivial steady-state is reached.
An estimate of the conductance of the system must rely on this transient non-equilibrium quasi steady state (NEQSS) which is, therefore, the object of our investigation.
When the lead Hamiltonian $\widehat{H}_{\rm leads}$ includes only local terms, the post-quench time evolution obeys a Lieb-Robinson bound \cite{liebrobinson,bonnes2014}; the central scatterer region is not affected by the finite size effects of the simulation until the quasiparticles excited by the quench in the central region reach the boundaries and come back. Therefore we can consider the NEQSS as a faithful representation of what happens in the thermodynamic limit (see, for instance, \cite{Ljubotina_SciPost2019,bertini2016,Viti_2016,Essler_2016}).
To bring the system out of equilibrium, we can consider two different quench protocols \cite{Chien2014}:
\begin{itemize}
\item $\mathbf{\mu}$-{\bf quench}: the system is initially prepared in the ground state of $\widehat{H}_T$ where both leads have the same chemical potential. At $t=0$, a voltage bias $V_{b} = \mu_L -\mu_R$ is introduced and the system evolves accordingly to the new Hamiltonian $\widehat{H}_T(V_{b})$.
\item {\bf density quench}: the device and the leads are initially decoupled and the system is prepared in the ground state of $\widehat{H}_{\rm sys} + \widehat{H}_{\rm leads}$, where a voltage bias $V_{b}$ is used to induce a density difference between the two leads. At ${\sf t}=0$, the bias is turned off and the system evolves with $\widehat{H}_T$.
\end{itemize}
After the quench, me measure the current in the leads, following the definition
\begin{equation} \label{currentop}
I_{\alpha,l}({\sf t}) = 2\pi i t^\alpha_{0l} \bra{\Psi({\sf t})} \opcdag{\alpha,l+1}\opc{\alpha,l} - \opcdag{\alpha,l}\opc{\alpha,l+1} \ket{\Psi({\sf t})} \ ,
\end{equation}
where $\ket{\Psi({\sf t})}$ is the time-evolved many-body wavefunction.
Although for small biases the two quench protocols give consistent results, they are not exactly equivalent.
This can be easily seen if we consider a non-interacting case and the related structure of its scattering matrix in one dimension.
In the $\mu$-quench, the leads have different chemical potential, meaning that an energy step is added on top of the scattering matrix of the device. Hence, momentum is not conserved when a particle is transmitted across the device.
In the density quench, instead, far from the device the two leads have the same chemical potential and the momentum is a good quantum number for the scattering process.
In our simulation, we have verified that the density quench protocol gives usually better results for the estimates of the conductance, both in terms of a shorter relaxation time before reaching the quasi-steady-state and a more stable current profile.
Thus, unless otherwise stated, all the results we present are obtained with the density quench protocol. Concerning the simulation of the time-evolution of the system, however, both quench protocols can be
implemented with analogous accuracy.
To illustrate the main physical properties and limitations of studying transport properties through quantum quenches, we discuss next the performance of the method on a noninteracting impurity model.
First, let us consider the situation where the leads have a uniform hopping amplitude, corresponding to an infinite decay length $\xi \to \infty$.
The single site impurity with energy $\varepsilon_{\rm imp}$ is described by the Hamiltonian $\widehat{H}_{\rm sys}=\varepsilon_{\rm imp} \opddag{} \opd{}$.
\begin{figure*}[t]
\begin{center}
\includegraphics[width=18cm]{imp_quench_paper.pdf}
\caption{Exact evolution of a non-interacting impurity model. (a) Space-time profile of the current, with uniform hopping in the leads. The vertical black lines mark the position of the impurity site.
(b) Space-time profile of the current when the hopping in the leads decays exponentially with a characteristic length $\xi=30$.
(c) Comparison between the time evolution of the current at the left and right edge of the scattering region, for uniform leads ($\xi = \infty$, dashed lines) and Wilson chains ($\xi =30$, solid lines).
The horizontal dot-dashed line indicates the Landauer-B\"uttiker prediction.
The energy of the impurity site is $\varepsilon_{\rm imp}=0.1t_0$ and the bias is chosen to be in resonance, hence $V_{b} = \varepsilon_{\rm imp}$. The other parameters are $\mathcal{L}=100$ and $t_c =0.25 t_0$.}\label{fig:quench_exact}
\end{center}
\end{figure*}
In Fig.~\ref{fig:quench_exact}, we summarize the main characteristics of the quench protocol.
The system is initialized with a density imbalance between the left and the right leads, which induces a current flow in the chain.
At first, the current involves only the sites immediately adjacent to the impurity. The initial discontinuity in the density profile splits into two fronts counterpropagating along the two leads with constant speed in the whole system.
This is clearly shown in Fig.~\ref{fig:quench_exact}(a), where we plot the evolution of current density $I({\sf t})$ in time and space.
In particular we emphasize than inside this broadening ``cone'' a NEQSS emerges, carrying a steady current consistent with the LB result, as seen in Fig.~\ref{fig:quench_exact}(c).
However, the finite length of the chain has two consequences:
the first, and more obvious, is that the current is reflected back from the edges of the leads and the NEQSS changes when this signal reaches again the edges of the scatterer.
In general, different NEQSS exist inside each of these rhomboids confined by the propagating signal, as suggested by the different plateaus displayed by the data corresponding to uniform leads $(\xi=\infty$, dashed lines) in Fig.~\ref{fig:quench_exact}(c).
Eventually, the system will reach a trivial steady-state with zero current.
The second consequence is the limit on the energy resolution due to the finite level spacing in the leads which is of the order $2t_0/\mathcal{L}$.
This becomes particularly important when computing the current from a small voltage bias, because in the initial state the particle number in the two leads will differ only by a few units.
As a consequence, the current develops finite size corrections which deviate from the exact LB formula, again visible from Fig.~\ref{fig:quench_exact}(c).
Both these problems are partially cured by choosing a finite decay length for the leads' hopping amplitude, as reported in panels (b) and (c) of Fig.~\ref{fig:quench_exact}.
Indeed, now the reflection from the edges of the system is strongly suppressed and quasi-stationary state survives for longer time.
Also the finite size corrections with respect to the LB formula are reduced, at the cost of a noisier current signal.
However, this noise is easily eliminated by averaging the current in time, after the plateau is reached.
Physically, the Wilson chain construction in Eqs. (\ref{Hleads},\ref{Wilsonchain}) can be thought as a real space renormalization applied to the leads~\cite{Wilson_RevModPhys75,Mitchell_PRB2004}, where the further we are from the contact with the scatterer, the more chain sites are merged together.
By comparing panels (a) and (b) in Fig. \ref{fig:quench_exact}, it is easy to realize that the introduction of the exponential dumping of the tunneling amplitude $t_0$ amounts to a compression of the spreading correlation cone.
While in the uniform chain the signal travels with constant Fermi speed $v_f=2t_0$, leading to a space-time profile ${\sf t} = \frac{l-1}{2t_0}$, in the Wilson chain the speed is exponentially damped.
This results in the space-time profile ${\sf t} = \frac{\xi}{2 t_0}\left(\textrm{e}^{(l-1)/\xi}-1 \right)$.
In this way, we can simulate effectively larger system sizes, thus reducing the finite size effects.
This construction modifies also the spectrum of the leads: the eigenvalue spacing is denser at low energies, thus allowing a finer resolution at small voltage biases.
The main difficulty of this approach is the choice of a proper decay length; if $\xi$ is too large, its effect is negligible and if it is too small the current is reflected back from the effective edge created by the vanishing hopping amplitude.
This trade-off also depends on the strength of the bias, since larger values of $V_{b}$ also require larger decay length.
In our MPS simulations, we adjust heuristically the value of $\xi$ by choosing a value that does not introduce a nonphysical reflection in the current before the lead edges.
For the rest of the paper, unless otherwise specified, the leads will be described by two chains of $\mathcal{L}=100$ sites, with a bare hopping amplitude $t_0=1$ that sets all other energy scales in the model and a decaying length $\xi=40$.
The latter has been chosen in such a way that all the data we present do not display an artificial reflection of the current from the edges and the signal converges fast enough enabling us to average it over a sufficiently large time interval.
\section{Matrix product state implementation}\label{sec:TTN}
We implement the quench dynamics of the systems by using matrix product state (MPS) techniques~\cite{SCHOLLWOCK201196}. As all tensor network techniques, the underlying approximation restricts the maximal entanglement allowed in the simulated state at any time. In particular, we adopt a maximum bond dimension $\chi$ which varies as a function of time and is not uniform in the MPS construction.
In the following numerical simulations, the maximum bond dimension is limited by $\chi \lesssim 2500$, which implies that the simulation of the time evolution of the system is reliable until the correlations between its partitions are below a suitable threshold, which can be estimated by the maximum value of the entanglement entropy $S_{\rm max} = \log_2 \chi$.
Concerning the quench protocol, we will focus on the density quench presented in Sec.~\ref{sec:quench}: the scatterer is initially decoupled and the voltage bias $V_b$ is symmetrically applied ($\mu_L = -\mu_R = V_b/2$) to induce different electron densities in the two leads before the quench, corresponding to their Fermi-Dirac distribution at zero temperature.
The initial state is thus composed by the product of the independent ground states of the leads and the scatterer.
The ground state in the non-interacting leads is simply a free-electron state; however, interacting leads can be considered as well and they can be initialized through density matrix renormalization group (DMRG) \cite{White1992,White1993} calculations.
DMRG can be adopted to initialize the scatterer in its ground state as well.
At time ${\sf t}>0$, the system is quenched to a Hamiltonian with no bias, while the scatterer and the leads are coupled by the tunneling interaction $\widehat{H}_{\rm tunn}$.
Our aim is to tackle superconducting and blockaded devices, with the possibility of describing the out-of-equilibrium physics of setups with large voltage bias and sizable tunneling interactions between the leads and the scatterer. In the following, we discuss in detail the construction of our computational basis, its consequences and the introduction of the charging energy in a number non-conserving model.
The method is implemented by using ITensor library \cite{itensor}. The source code can be found in the repository: \url{https://github.com/chiaminchung/QuenchTransport}.
\subsection{Energy basis}\label{ssec:ebasis}
A well-known challenge for the simulation of the dynamics of out-of-equilibrium many-body systems with tensor network techniques is the growth of their entanglement in time, which typically prevents the possibility of reaching an accurate description of the system dynamics for long times \cite{Schuch2008}. This is clearly a major limitation, since the estimate of the conductance of a given scatterer is based on the NEQSS behavior of the current. When considering an MPS based on a real space basis, the entanglement growth is clearly captured by the entanglement entropy $S$ associated to any partition that separates the degrees of freedom in different leads. Its linear growth in time is easily understood due to the fact that each particle coming from the leads is partially reflected and partially transmitted in a coherent way by the scatterer, thus generating entangled particle-hole pairs \cite{Rams2020,Kohn_PRB2021}. This results indeed in a linear increment of $S\propto V_{b} {\sf t}$ in time and voltage bias, which is consistent with the Lieb-Robinson picture of the dynamics of the system after a quench: the NEQSS appearing inside its space-time cone is progressively constituted by more and more particle-hole pairs, and their number increases linearly in time.
To mitigate the restrictions imposed to tensor network dynamics simulations by this growth of the entanglement, Rams and Zwolak proposed to adopt a different basis \cite{Rams2020}: when the leads are modelled based on an ordered single-particle energy eigenbasis, only states lying in an intermediate energy window defined by the voltage bias are affected in a major way by the time-evolution. Ref. \cite{Rams2020} shows indeed that by modeling a system with a mixed eigenbasis - an energy eigenbasis for the leads and a spacial basis for the scatterer - the entanglement entropy typically displays only a logarithmic growth in time, thus allowing for simulations of a considerably longer time evolution (see also \cite{Zhuoran2017}).
In the following, we adopt this strategy and we use a single-particle eigenbasis of $\widehat{H}_{\rm leads}$ for the leads, with MPS sites ordered by increasing energy. The Wilson chain approach allows us to get a higher resolution in energy close to the Fermi energy, thus in the energy window in which the dynamics has major effects. Concerning the scatterer sites, we may adopt different bases depending on the physical system.
The simplest choice is a real-space basis, in which the scatterer sites are kept together, ordered by their positions and located in proximity of the zero-energy single-particle states of the leads. This choice is convenient in the presence of local interactions within the scatterer Hamiltonian $\widehat{H}_{\rm sys}$.
When the only interaction is provided by the charging energy $\widehat{H}_{\rm c}$, instead, it is convenient to apply a quasiparticle energy eigenbasis also for the scatterer. This will be our choice in the following, since we will focus on superconducting systems with a quadratic $\widehat{H}_{\rm sys}$. In the resulting MPS construction, the single-particle eigenstates of the scatterer are thus represented as sites of the tensor chain, and the MPS is completely ordered based on the corresponding energies, alternating sites describing lead and scatterer states. For Hamiltonians in the form of Eq. \eqref{kitaevham} and charging energy \eqref{Hc}, the adopted MPS sites for the scatterer are associated with its Bogoliubov quasiparticles, and we complete the system description by including an additional MPS site to account for the scatterer total charge (see Sec. \ref{ssec:charge_site} ).
Figure~\ref{fig:sketch}(b) shows a schematic representation of the MPS construction that relies on this energy basis, and the initial occupation of the lead sites is based on their chemical potential.
As a result of this construction, during the time-evolution of the system we can identify three energy intervals: for energies considerably smaller than $-V_{b}/2$ the eigenstates of the leads are approximately frozen in an occupied state, for energies larger than $V_b/2$, the eigenstates of the leads are equally frozen in the empty state; in the intermediate \textit{scattering range}, the states of the scatterer and the leads strongly interact and develop non-trivial correlations.
We illustrate this behavior in Fig.~\ref{fig:occupation_N2} for a simple model of a superconducting (SC) quantum dot with two quasiparticle states and charging energy given by Eq. \eqref{Hc};
the way of dealing with the charging energy will be introduced later in Sec.~\ref{ssec:charge_site}.
Inside the scattering range (yellow shading), we can clearly observe the onset of resonances identified by the variation in time of the occupation number of the two leads at energies set by the energy differences among many-body states of the scatterer. These are identified by the vertical dashed lines in Fig.~\ref{fig:occupation_N2}(a)-(c) and such resonances are consistent with the results of the standard rate equation approaches ~\cite{Beenakker1991,Aleiner2002}.
The initial lead distributions are taken at zero temperature and the resulting width of the depletion/filling regions following the quench is set by the coupling strength $t_c$ between the leads and the SC device. Physically, this corresponds to a regime where the broadening of the device energy levels induced by the hybridization with the leads is larger than the temperature.
\begin{figure}
\begin{center}
\includegraphics[width=\columnwidth]{Occupation_vs_mu_N2_bis.pdf}
\caption{Time evolution of SC quantum dots with two quasiparticle states of energies $\varepsilon_0=0.02E_C$ and $\varepsilon_1=0.6 E_c$. The coupling with the leads is $t_c=0.2E_c$ and $E_c=t_0$. (a-c) Occupation number $\langle \hat{n}_\alpha \rangle $ of the energy levels in the two leads as a function of their energy $\epsilon_{\alpha,l}$ after a quench, once the NEQSS is reached (${\sf t}\sim 20\hbar/t_c$). Vertical dashed lines correspond to the resonances with the transitions between different manybody states in the device. The panels refer to induced charges $n_g=0.4,0.5$ and $0.6$.
(d): time dependence of the occupation number close to a resonance for small bias $V_b=0.1E_c$. The color progression from light to dark indicates longer evolution times; the data refer to ${\sf t} =[0,20 , 40, 60, 80]$ in units of $\hbar/t_c$. Vertical dashed lines highlight the resonance at $\varepsilon_0=0.02E_c$ while the shaded areas indicate the scattering window given by the voltage bias}\label{fig:occupation_N2}
\end{center}
\end{figure}
The time evolution of the occupation numbers of the leads eigenstates close to a resonance is summarized in Fig.~\ref{fig:occupation_N2}(d); as time increases (from lighter to darker colors), the leads are progressively depleted/filled. The NEQSS we are interested in survives as long as there is a sufficient difference between the occupation numbers of the left and right leads.
In simulation efficiency, the advantage of adopting the energy eigenbasis is two-fold: (i) Contrary to a real state basis, most of the leads and device states are only marginally involved in the time evolution, thus the entanglement growth is limited to the scattering energy range, consistently with Ref.~\cite{Rams2020}.
(ii) This approach allows us to evaluate the conductance also for moderately large bias voltage, which is typically a difficult task for a real space basis.
Notwithstanding that the coupling between the leads and the scatterer becomes non-local in the energy basis, $\widehat{H}_{\rm tunn}$ can be expressed in terms of matrix product operators (MPOs) of small bond dimensions~\cite{Rams2020} (in the implementation by ITensor, the MPO can be generated by AutoMPO). As we will discuss in the following, such MPO will also take into account the non-local charging energy effects.
As a consequence, the dynamics of the system can be efficiently simulated by using TDVP \cite{Haegeman_PRL2011, Haegeman2016}. In practice, we use TDVP with single-site update together with Krylov subspace expansion~\cite{Yang2020}. The subspace expansion is performed in advance of the TDVP evolution at each time step.
We finally remark that our basis choice is opposite and complementary with respect to several other techniques, including both NRG, where typically one works in a basis such that the Hamiltonian defines an effective 1D tight-binding chain with local interactions only, and recent studies of quench dynamics in Anderson impurity models~\cite{Kohn_PRB2021,Kohn_2022}, where an alternative ordering of the MPS sites has been proposed in a position basis, in order to alternate filled and empty leads sites and simplify the description of particle-hole pairs.
\subsection{Charging energy and superconducting scatterers}\label{ssec:charge_site}
The BCS mean-field description of a superconducting system does not preserve its particle number, but only its parity. This implies that the charge $\widehat{N}$ of the scatterer cannot be simply deduced by considering the occupation of the sites of its tensor network description; therefore, to account for the charging energy interaction $\widehat{H}_{\rm c}$, the MPS construction must be suitably extended. To this purpose, inspired by the approach adopted in Ref. \cite{keselman2019}, we add an auxiliary bosonic site to our tensor network representation of the system (we locate it at the center of the whole MPS chain). This MPS site behaves as a counter for the number of particles in the scatterer and it is defined by a local Hilbert space spanned by the eigenstates $\ket{N}$ of the scatterer charge $\widehat{N}$.
To keep the Hilbert space dimension of the auxiliary site finite, we introduce a truncation parameter $N_{\rm max}$, such that in our simulations we consider only a set of $2N_{\rm max} + 1$ orthogonal charge states $\ket{N}$ with $N \in \left[-N_{\rm max},N_{\rm max}\right]$ (for $n_g$ taken between -1 and 1, otherwise we can shift this range). The operator $\widehat{N}$ is diagonal in this basis and, in particular, describes the charge variation of the scatterer around the reference value $N=0$, which corresponds to the ground state of the isolated superconductor in absence of induced charge $(n_g=0)$. Given the charge truncation parameter $N_{\rm max}$, our tensor network description provides reliable results when the charging energy $E_c$ is sufficiently large, such that the fluctuations of the charge of the scatterer, determined by the coupling with the leads (and, potentially, by additional Josephson terms) are much smaller than $N_{\rm max}$.
In our simulations, we verified indeed that for strong charging energies, thus in the case of Coulomb blockaded device, the population of states far from $N\sim n_g$ is exponentially suppressed and at the cutoff $\pm N_{\rm max}$ it remains below machine precision.
As a general rule, the introduction of such an auxiliary degree of freedom must be accompanied with a physical constraint. Here, we impose that the parity $\left(-1\right)^{\widehat{N}}$ of the auxiliary site needs to be the same as the parity of the occupation of the scatterer sites. Namely, let us define the operator:
\begin{equation} \label{parityc}
\widehat{P}= \left(-1\right)^{\widehat{N} + \sum_{i=1}^\mathcal{M} \hat{d}^\dag_i \hat{d}_i}\,.
\end{equation}
For any physical state $\ket{\psi_{\rm phys}}$, the constraint
\begin{equation} \label{constr}
\widehat{P}\ket{\psi_{\rm phys}}=\ket{\psi_{\rm phys}}
\end{equation}
must hold. Besides this physical requirement, we also observe that the total number of particles,
\begin{equation} \label{Ntot}
\widehat{N}_{\rm tot} = \widehat{N} + \sum_{\alpha=L,R}\sum_{i=1}^{\mathcal{L}} \hat{c}^\dag_{\alpha,i} \hat{c}_{\alpha,i}\,,
\end{equation}
is a conserved quantity. Our MPS and MPO constructions encode both the $\mathbb{Z}_2$ constraint \eqref{constr} and the global symmetry associated to Eq. \eqref{Ntot} through suitable quantum numbers in its virtual indices. Due to the peculiarities of the conserved operators $\widehat{P}$ and $\widehat{N}_{\rm tot}$, the local symmetry properties of the tensors associated with lead and scatterer sites are different. In particular, the parity constraint affects only the auxiliary and the scatterer sites, whereas the particle number conservation affects only the auxiliary and the lead sites (see Appendix \ref{app:MPS} for more detail).
Based on this MPS construction, the charging energy term $\widehat{H}_{\rm c}$ can be included in a straightforward way in the MPO description of the Hamiltonian, since it simply corresponds to a diagonal operator acting locally on the auxiliary site.
More care is needed instead in the definition of the tunneling operators from the leads to the scatterer, which must be dressed with suitable operators acting on the auxiliary site. To this purpose, we define the operators
\begin{equation} \label{Sigma}
\widehat\Sigma^+ = \sum_{N=-N_{\rm max}}^{N_{\rm max}-1} \ket{N+1}\bra{N} \quad {\text{and}} \quad \widehat\Sigma^- = (\widehat\Sigma^+)^{\dag} \,,
\end{equation}
which respectively raise and lower by 1 the scatterer charge $\widehat{N}$; the tunneling Hamiltonian acquires the form:
\begin{equation}
\widehat{H}_{\rm tunn} = -t_{c} \left[ \opddag{1}\opc{L,1}\widehat\Sigma^+ + \opddag{\mathcal{M}}\opc{R,1}\widehat\Sigma^+ +{\rm H.c.} \right],
\end{equation}
where the lead operators $\hat{c}$ and the scatterer operators $\hat{d}^\dag$ are taken in the real space basis.
In the BdG basis which will be introduced below, the creation and destruction operators must be rewritten as the proper linear combination of eigenstates in the chosen representation.
Independently from the basis choice, $\widehat{H}_{\rm tunn}$ becomes a sum of non-local three-site operators, acting simultaneously on one lead, the scatterer and the auxiliary charge site.
Despite the apparently complicated structure, the whole Hamiltonian can be efficiently represented by an MPO of bond dimension $10$. The related dynamics can thus be conveniently evaluated through a TDVP approach.
\subsection{Quasiparticle basis}\label{ssec:qpbasis}
Depending on the considered model and the corresponding $\widehat{H}_{\rm sys}$, we can apply different basis choices for the scatterer. When the mean-field superconducting pairing is present, for example in the SC quantum dot model analyzed in Fig. \eqref{fig:occupation_N2} or in the Kitaev chain model described by Eq. \eqref{kitaevham}, the best option for the basis is given by the quasiparticle energy eigenstates derived from the quadratic Bogoliubov - de Gennes (BdG) formulation of the corresponding Hamiltonians. Accordingly, to study such models, we developed a MPS description of the scatterer based on the occupation number of the Bogoliubov eigenmodes $\hat{\gamma}_j$ that diagonalize the BCS Hamiltonians $\widehat{H}_{\rm sys}$. This choice greatly speeds our simulations of the system dynamics because it avoids the strong entanglement growth caused by the formation of Cooper pairs that characterizes the real-space basis. In the single-particle energy eigenbasis, only the considerably weaker entanglement between quasiparticles contributes indeed to the entanglement entropy built during the time evolution.
In this basis, the scatterer Hamiltonian reads
\begin{equation}
\widehat{H}_{\rm sys} = \sum_{j=1}^\mathcal{M} \varepsilon_j \hat{\gamma}_j^\dagger \hat{\gamma}_j - \frac{1}{2} \sum_{j=1}^\mathcal{M} (\varepsilon_j + \mu_s),
\end{equation}
where $\varepsilon_j$ and $\hat{\gamma}_j^\dagger$ are the quasiparticle energies and creation operators, corresponding to the \emph{positive} eigenenergies of the BdG Hamiltonian. The first and the second term correspond to the excited states and the ground state energies respectively.
In this basis, the real-space operators $\hat{d}_i$ acquire the form $\hat{d_{i}} = \sum_{j=1}^\mathcal{M} u_{ij} \hat{\gamma_j} + v_{ij}^* \hat{\gamma_j}^\dag$.
We stress that although the complete BdG Hamiltonian has $2\mathcal{M}$ eigenstates, half of them with positive energies and half of them with negative energies, the $\mathcal{M}$ positive energy states are enough to form a complete set due to particle-hole symmetry.
Therefore the number of basis states in the new basis remains unchanged.
As discussed in the previous section, the first step in the simulation of the time evolution of the system for the density quenches requires to determine the ground state of the scatterer.
Since $\widehat{H}_{\rm sys}$ and $\widehat{H}_{\rm c}$ are completely decoupled in our representation, this ground state is the tensor product of two parts referring to the Bogoliubov quasiparticles and the auxiliary charge site.
Such tensor product can display either even or odd fermionic parity and it respectively assumes the form $|\psi^+\rangle|N=0\rangle$ or $|\psi^-\rangle|N=1\rangle$, for $n_g \in \left[0,1\right]$. These are indeed the combinations that fulfill the physical constraint in Eq. \eqref{constr}.
In the quasiparticle basis, $|\psi^+\rangle$ and $|\psi^-\rangle$ are simply the vacuum state and the state $|1,0,0, \ldots\rangle$ respectively; for general bases and $\widehat{H}_{\rm sys}$, $|\psi^\pm\rangle$ can be computed by DMRG. The ground state is then determined as the state of lower total energy including both the contributions of $\widehat{H}_{\rm sys}$ and $\widehat{H}_{\rm c}$, and it is adopted to initialize the time evolution.
\begin{figure*}
\begin{center}
\includegraphics[width=0.55\columnwidth]{entropy_time.pdf}
\includegraphics[width=0.55\columnwidth]{bonddim_time.pdf}
\includegraphics[width=0.4\columnwidth]{bonddim_x.pdf}
\includegraphics[width=0.5\columnwidth]{cputime.pdf}
\caption{
Comparisons for quench dynamics between a free electron basis (dashed lines) and the Bogoliubov quasiparticle basis (solid lines). The scatterer is a Kitaev chain with parameters $E_c=t_0$, $t_s=0.4E_c$, $\mu_s =-0.1E_c$, $\Delta=0.5E_c$, $t_c=0.2E_c$, $n_g=0.5$, and $V_{b}=0.1 E_c$, the same with Fig.~\ref{fig:current_example}.
(a) Maximal entanglement entropy and (b) largest bond dimension reached in the time evolution. (c) Bond dimension on each bond in the MPS. (d) CPU time for the whole simulations for different scatterer lengths. The inset is a zoom in of the solid curve.
}
\label{fig:basis_compare}
\end{center}
\end{figure*}
To illustrate the efficiency of the quasiparticle basis, we consider a Kitaev chain in the topological phase and compare the convergences to a NEQSS under small voltage bias obtained by using two different basis for the MPS construction:
the first corresponds to the free electron eigenbasis of the kinetic term $t_s$ only [see Eq. \eqref{kitaevham}]; in this case, the pairing term is included in the MPO; the second corresponds instead to the Bogoliubov quasiparticle basis, which already takes into account the superconducting pairing.
As shown in Fig.~\ref{fig:basis_compare}(a), for the free electron basis, the entanglement entropies become progressively larger for longer systems (dashed lines). Instead, for the Bogoliubov quasiparticle basis, the entanglement entropies are basically independent on the system length, and are smaller than the entropies in the free electron basis.
Surprisingly, the largest bond dimensions required by the algorithm during the time evolution become smaller for longer chains in both bases, as shown in Fig.~\ref{fig:basis_compare}(b). This can be understood as an effect of the finite overlap acquired by the Majorana edge-modes for short chains, which enhances the entanglement.
For all lengths, the largest bond dimensions reached in the Bogoliubov basis are smaller than the bond dimensions in the free electron basis.
Another advantage of using the quasiparticle basis can be seen in the bond dimension distribution on each bond in the MPS.
As shown in Fig.~\ref{fig:basis_compare}(c), the region of large bond dimension is broader in the free electron basis than in the quasiparticle basis.
This is because under small voltage bias the transport is mainly contributed by the Majorana bound state (MBS), which corresponds to a single site in the quasiparticle basis, whereas in the free-electron basis, the MBS is an entangled state spread through the whole scatterer region.
Fig.~\ref{fig:basis_compare}(d) shows the comparison of CPU times. The Bogoliubov quasiparticle basis is in general more efficient than the free electron basis, and the advantage becomes stronger when the system length is larger.
The construction we presented can be extended, in full generality, by considering any arbitrary quasiparticle basis for the device, and considering a suitable tunneling matrix between the leads and the scatterer. In particular, for the modeling of the transport across specific nanostructures, one may want to consider only a selected number of low-energy single-particle eigenstates by including only the most relevant states involved in the transport process, rather than starting from a tight-binding microscopic model such as Eq.~\eqref{kitaevham}.
This kind of approximation has been successfully applied, for instance, to study Coulomb blockaded transport within the framework of rate equations~\cite{Higginbotham_NatPhys2015,Vaitiekenas_PRB2022};
our MPS representation can easily be adapted to this approach and, together, they also provide a systematic way of improving the resulting conductance estimates by increasing the number of low energy states included in the scatterer description.
\subsection{Josephson energy and inclusion of a superconducting lead}\label{ssec:Josephson}
So far, we discussed systems in which the scatterer exchanges particles with the leads only. The introduction of the auxiliary site, however, allows us to to extend further our model in order to effectively account for an additional SC lead which exchanges Cooper pairs with the SC scatterer. This is possible by replacing the Hamiltonian $\widehat{H}_{\rm c}$ with a more general form:
\begin{equation} \label{SCbox}
\widehat{H}_{\rm SC \, box} = E_c\left(\widehat{N} - n_g\right)^2 - E_J \left[ (\widehat{\Sigma}^+ )^2 + (\widehat{\Sigma}^- )^2\right]\,.
\end{equation}
This constitutes the Hamiltonian of a Cooper pair box \cite{Bouchiat_1998}, and the energy scale $E_J$ represents its Josephson energy. The second term in Eq. \eqref{SCbox} varies the number of electrons in the scatterer by $\pm2$ [see Eq. \eqref{Sigma}] and indeed represents a process in which Cooper pairs tunnel in and out of the system. Given the limitation provided by the truncation $N_{\rm max}$, the simulation of the system is reliable only when $E_J$ is sufficiently smaller than $E_c$, such that, in practice, the states $\ket{\pm N_{\rm max}}$ display a negligible population. Therefore, the extension of the original model provided by Eq. \eqref{SCbox} is suitable to describe scatterers which are typically in a Coulomb-dominated regime, as in the case of SC charge qubits. The opposite transmon limit $E_J > E_c$, instead, cannot be satisfactorily explored.
When replacing $\widehat{H}_{\rm c}$ with $\widehat{H}_{\rm SC \, box}$, the conservation of total particle numbers (in the leads and the scatterer) is reduced to the conservation of parity, which may assume both values depending on the initial lead states.
By including the Josephson energy, the model becomes effectively a three-terminal device, able to simulate the interacting Coulomb blockaded regime of systems analogous to the ones studied in Refs. \cite{Danon2020,Menard2020}. We also observe that, by switching off the tunnel coupling with one lead, it is possible to study two-terminal normal-superconducting junctions mediated by a blockaded scatterer described by $\widehat{H}_{\rm sys}$.
\section{Physical examples}\label{sec:benchmark}
In this section we benchmark our method on two test systems: a p-wave SC quantum dot with two quasiparticle states and a Kitaev chain.
We will use the Kitaev chain to illustrate the main features of our method as well as its limitations, whereas the small Hilbert space dimension of the quantum dot allows for faster simulations and an easier characterization of the Coulomb blockaded structure.
In general, we simulate the nonequilibrium dynamics following a density quench: For any choice of $n_g$ and $V_{b}$, the system is initially prepared in the corresponding ground state with no couplings between the leads and the device ($t_c=0$).
At ${\sf t}=0$, we turn the tunnel coupling $t_c$ on and quench the voltage bias to zero; the transport properties of the system are then estimated based on the NEQSS reached after the initial transient time. Throughout all the simulations, the main observable we measure is the current flowing from one lead to the other as a function of the voltage bias $V_{b}$ and the induced charge $n_g$.
The current is measured on both edges of the central device, in the first links {\em entirely} in the leads [$l=1$ in Eq. \eqref{currentop}], to facilitate comparison between data associated to different couplings between the leads and the scatterer or hopping decay length in the leads.
Since we always consider superconducting models and symmetric voltage drops, we assume that the current $I(V_{b}, n_g)$ is an odd function of the the voltage bias, hence we perform all simulations for $V_{b} >0$, corresponding to a particle current flowing from left to right.
After the current has converged to the stationary value, we divide each data set in several batches from which we compute its average value and standard deviation.
From the current we compute the differential conductance $G=\frac{{\rm d}I}{{\rm d} V_{b}}$ using a fourth-order discrete derivative method.
Other meaningful observables we can extract are the charge on the SC island and the entanglement entropy on each link, which is naturally obtained during the singular value decomposition (SVD) performed at each step of the time evolution.
To give an example of the behavior of these quantities in the quench protocol, we report in Fig.~\ref{fig:current_example} the results for a topological Kitaev chain of $\mathcal{M}=40$ sites at the charge degeneracy point $n_g=0.5$ and a small voltage bias $V_{b}=0.1E_c$. Panel (a) reports the postquench time dependence of the current at the left and right edges of the scatterer;
its behavior is very similar to that shown in the noninteracting case, illustrated in Fig.~\ref{fig:quench_exact}, suggesting that the MPS simulation is capturing correctly the transport phenomenon.
The inset shows the corresponding behavior of the charge accumulated on the device, comparing the difference between the ingoing and outgoing current and the variation of the occupation number of the auxiliary charge site.
Their agreement is a good sanity check to verify that the simulation is physically meaningful and the stationary value $\langle \hat{N}({\sf t}) \rangle -\langle \hat{N}(0) \rangle \sim 0.5$ is correctly reached:
The system is initially prepared in the BCS ground state with no quasiparticle excitation ($\langle \hat{N}(0) \rangle=0$) which is degenerate with the state with the MBS occupied (since we are deep in the topological phase);
after the quench, the system approaches a NEQSS characterized by an equal superposition of the two degenerate many-body states, hence the increase of the charge.
Panel (b) shows the spread of the entanglement in the energy-ordered MPS chain: thanks to the basis choice, the entanglement is confined to low energy states. In particular, states of the Kitaev chain above the energy gap ---located in the region between the two dashed vertical lines--- remain almost uncorrelated with the rest of the system, signaling that transport is mediated mainly by the Majorana modes.
\begin{figure}
\begin{center}
\includegraphics[width=\columnwidth]{example_current_paper2.pdf}
\includegraphics[width=\columnwidth]{example_entanglement_paper.pdf}
\caption{(a) Evolution in time of the left and right currents ($I_L$ and $I_R$ respectively) after the density quench. The shaded area corresponds to the interval where we average the current to extract its steady-state value.
The inset shows the change in time of the charge of the SC island, both as the average particle number in the auxiliary site (dashed line) and as the integral of the current difference between the left and right contact (solid line).
(b) Entanglement entropy at each bond of the MPS chain. The two vertical dashed lines indicate the region where the excited quasiparticle states of the Kitaev chain are located, while the auxiliary charge site and the Majorana modes lies at zero energy, where most of the entanglement is concentrated.
The parameters in the Kitaev chains are $E_c=t_0$, $t_s=0.4E_c$, $\mu_s =-0.1E_c$, $\Delta=0.5E_c$, and $t_c=0.2E_c$.
The current is computed in proximity of the zero-bias peak at the charge degeneracy point $n_g=0.5$, $V_{b}=0.1 E_c$.}\label{fig:current_example}
\end{center}
\end{figure}
This situation represents the ideal case of application of our method: when only a few scatterer states are involved in the transport process, while most remain untouched by the dynamics, the convergence of the simulation towards a NEQSS is robust and it is not limited by the system size.
\subsection{SC quantum dot}\label{ssec:qdot}
\begin{figure*}[ht]
\begin{center}
\includegraphics[width=18cm]{N2_summary.pdf}
\caption{(a) Differential conductance close to a charge degeneracy point in the $n_g$-$V_b$ plane, for a two level SC systems with $\varepsilon_0=0.02 E_c$, $\varepsilon_1=0.6 E_c $, and $t_c=0.2 E_c$. Transport is dominated by the sequential tunneling resonances (black dashed lines), corresponding to $V_b/2 = \pm [ E_c(1-2 n_g)+\varepsilon_0 ]$.
(b) Differential conductance in log-scale, illustrating the cotunneling step in the odd Coulomb valley that arises at $V_b \sim \pm (\varepsilon_1-\varepsilon_0)$ (green dashed line).
Also the transitions involving excited states are more visible: $V_b/2= [ E_c(1-2 n_g)+\varepsilon_1 ]$ (black dashed line) and $V_b/2= [ E_c(2 n_g-1)+\varepsilon_1 ]$ (orange dashed line).
(c) Average charge in the NEQSS of the SC quantum dot, for positive bias. Notice how the sequential tunneling resonances are reflected in the structure of $\langle \widehat{N} \rangle $. }\label{fig:SCdot}
\end{center}
\end{figure*}
A clear example of the physical results that can be explored by our approach is provided by a floating p-wave superconducting two-level system, one of the simplest SC model that displays Coulomb blockaded transport.
Its small size allows for fast and accurate simulations over a wide bias range, making it easy to characterize the Coulomb blockaded differential conductance in the whole $n_g-V_{b}$ plane.
Indeed, the limited growth of the entanglement in this model yields that there is no need of fine tuning the simulation parameters (as the duration of the TDVP time steps or the decay length $\xi$) to ensure the convergence to a NEQSS.
This system is represented by the Hamiltonian:
\begin{equation}\label{eq:twolevel}
\widehat{H}_{\rm sys} = \varepsilon_0 \opgammadag{0}\opgamma{0} + \varepsilon_1\opgammadag{1}\opgamma{1} \ ,
\end{equation}
where $\opgamma{1,2}$ are the destruction operators of the quasiparticle levels \footnote{On a practical level, the SC quantum dot is described as a very short Kitaev chain \eqref{kitaevham} with $\mathcal{M}=2$ sites only.}.
Although simple, this toy model can be used as an approximation for a hybrid semiconductor/superconductor nanowire with strong spin-orbit coupling to allow for the emergence of an effective p-wave SC pairing (see, for instance, Refs. \cite{Higginbotham_NatPhys2015,Vaitiekenas_PRB2022}): in this case, the lowest energy level $\varepsilon_0$ represents a non-degenerate subgap state (Andreev or Majorana bound state), whereas the eigenstate at $\varepsilon_1\sim \Delta$ constitutes an effective representation of all the quasiparticle states above the SC gap.
To reconstruct the Coulomb blockade diamonds, we perform the quench simulations of a grid of points in the $n_g$-$V_{b}$ plane, with a denser sampling close to the zero-bias peak, and compute the time-dependent current averaged over the left and right contacts.
Then, we follow the procedure described at the beginning of Sec.~\ref{sec:benchmark} to extract the differential conductance.
Our results show that the MPS+TDVP simulation allows to capture all the expected perturbative transport features of these SC blockaded systems, including both sequential tunneling resonances and inelastic cotunelling effects at finite bias. In particular, Fig,~\ref{fig:SCdot}(a) illustrates the differential conductance in the $n_g$-$V_{b}$ plane for a quantum dot with $\varepsilon_0 = 0.02 E_c$ and $\varepsilon_1 =0.6 E_c$. The charging energy is the dominant energy scale, alongside the ``bare'' hopping amplitude in the leads $t_0=E_c$, while the tunnel coupling between the leads and the system is $t_c=0.2 E_c$.
The first feature emerging in the differential conductance is the appearance of resonances caused by the incoherent sequential tunneling mediated by the low energy state $\varepsilon_0$.
These bright conductance resonances are clearly visible [indicated by black dashed lines in Fig.~\ref{fig:SCdot}(a)] and appear when the voltage bias matches the energy difference between the ground states in the even and odd sectors $V_{b}/2 = \pm E_c(1-2n_g)+\varepsilon_0$. Sequential tunneling is indeed the main transport mechanism emerging in the perturbative rate equation approaches and the related conductance peaks are commonly observed in superconducting blockaded devices; see, for instance, the experimental data referring to SC islands in nanowires in Refs. \cite{Higginbotham_NatPhys2015, Albrecht2016, Vaitiekenas_PRB2022, Vekris_DNW2021} and the theoretical analysis in \cite{vanHeck_PRB2016,Lai_PRB2021}.
The sequential tunneling mediated by the state $\varepsilon_0$ is not the only perturbative feature that characterizes the intermediate $t_c$ regime we are exploring. In Fig.~\ref{fig:SCdot}(b) we report the same data in logarithmic scale, where a richer structure emerges more clearly. One can indeed observe the fainter resonances corresponding to sequential tunneling processes involving the high-energy quasiparticle level $\varepsilon_1$ (orange and black dashed lines).
Interestingly, besides these sequential tunneling features, which correspond to first-order phenomena in the tunnel coupling $t_c$, we can clearly spot cotunelling effects, related instead to second-order phenomena in $t_c$. The main cotunelling feature is the appearance of an even-odd effect that distinguishes Coulomb diamonds with different parities of the particle number $\widehat{N}$ ~\cite{vanHeck_PRB2016,Vaitiekenas_PRB2022}.
In particular, the finite-bias conductance in the Coulomb valleys with odd particle number [$n_g >0.5$ in Fig. \ref{fig:SCdot}(b)] displays an inelastic cotunneling step visible for $V_{b} \sim \varepsilon_1 - \varepsilon_0$ (green dashed line).
The lack of appreciable cotunneling in the even valley is due to the destructive interference between the possible cotunneling paths when the ground state has even parity, while the interference becomes constructive in the odd valley.
Indeed, with our method we simulate the coherent evolution of a closed quantum systems, where interference effects can play a dominant role. In their absence, cotunneling steps would appear also in the even valley; in particular, when the lowest quasiparticle state has an energy $\varepsilon_0 \ll E_c,\ \Delta_{SC}$, the conductance predicted by rate equations in the even and the odd valley would be almost identical.
Finally, in Fig.~\ref{fig:SCdot}(c), we report the average occupation number $\langle \widehat{N} \rangle$ of the auxiliary site that describes the total charge of the device.
In the simulation we set the charge truncation at $N_{\rm max}=5$.
This truncation has very little effect on the simulations since in the steady state the average charge acquires values between 0 and 1, for $n_g \in [0,1)$, while the occupation of the states at the cutoff $\widehat{N}=N_{\rm max}$ lies below numerical precision.
From the figure, it is clear that, when transport is suppressed, the SC island has a well defined integer charge determined by $n_g$ [blue and yellow areas in Fig.~\ref{fig:SCdot}(c)].
When transport is present, instead, the device is in a mixed state resulting in an average charge $\langle \widehat{N} \rangle \sim 0.5$, with a series of plateaus delimited by the sequential tunneling resonances.
Despite the fact that both sequential tunneling and inelastic cotunneling features are evident in our simulations, we cannot expect a quantitative agreement on the amplitude of the differential conductance peaks between our non-perturbative simulations and the perturbative rate equation techniques.
There are indeed two aspects to be emphasized. First, our MPS calculations simulate the unitary evolution of a closed system at zero temperature, whereas rate equations only describe the non-coherent evolution of the populations of the scatterer many-body states. Therefore the MPS+TDVP method captures interference effects between transport channels in higher-order processes such as cotunneling, as mentioned before, while rate equations do not. Second, rate equations are rigorously justified only when the temperature is larger than the tunnel coupling $t_c$ and mainly describe temperature-broadened conductance peaks (see App.~\ref{app:rates}). In this respect the tunneling strength we used for most of the simulations, $t_c = 0.2 E_c$, is definitely beyond their range of validity.
Finally, we remark that the MPS approach is able to capture also non-perturbative effects. In this respect, we observe that a faint zero-bias peak is visible in Fig. \ref{fig:SCdot}(b) for $0.5 <n_g <0.9$, thus in the odd diamond. Its appearance suggests the onset of a weak non-perturbative Kondo-like effect which cannot be captured by rate equations.
Therefore, our technique provides a method which is complementary to the standard rate equation approach: the MPS+TDVP simulations allow for the investigation of transport in the low-temperature and strong coupling regime, which is typically hard to tackle with traditional techniques. For small tunneling rates and higher temperatures, instead, transport is dominated by perturbative phenomena which can be efficiently captured by rate equations.
\subsection{Coulomb blockaded Kitaev chain}\label{ssec:kitaev}
We now analyze the quantum transport across a Kitaev chain in the topological phase and characterize the zero-bias peak of the differential conductance and its dependence on the voltage bias at the charge degeneracy point.
By simulating the dynamics of a chain with $\mathcal{M}=40$ sites, we show that our method correctly captures the low-bias transport mediated by the Majorana modes.
The analysis of the height and width of the conductance peak as a function of the tunnel coupling $t_c$ shows that we can investigate the dynamics of large systems in a strong coupling regime, well beyond the validity of both perturbative rate equations and single resonant level~\cite{vanHeck_PRB2016} approaches.
To characterize the current dependence of the voltage bias at the charge degeneracy point $n_g=0.5$, we focus, instead, on a shorter chain;
even though we can study much longer {\em gapped} systems at {\em small biases}, we chose $\mathcal{M}=8$ because the simulations with a considerably larger number of quasiparticle states and large biases are subject to a fast entanglement growth and their correlations rapidly saturate the maximum bond dimension we set.
The most characteristic feature of Coulomb blockaded transport is the zero-bias peak that appears at the charge degeneracy point.
Its presence is easily understood by a first order rate equation approach (see App.~\ref{app:rates}): when the energy of the BCS ground state with even fermionic parity -- i.e. no quasiparticle (QP) -- matches the energy of the ground state with odd parity -- thus with the lowest lying QP state occupied -- electrons can tunnel into and out the SC device without paying energy.
In the presence of Majorana zero-energy modes, however, this process results in a coherent teleportation of electrons between the two leads mediated by the MBS \cite{Sodano2007,Fu2010}.
Therefore, in the limit of large energy separation between the zero-energy MBS and the other QP states, the zero-bias conductance peak can be estimated based on a non-perturbative Breit-Wigner (BW) formula for resonant tunneling mediated by the Majorana modes~\cite{vanHeck_PRB2016}.
Indeed, if we consider a single resonant fermionic level, the zero-bias differential conductance close to the charge degeneracy point $n_g=0.5$ is approximated by
\begin{equation}\label{eq:BW}
G_{BW} = \frac{e^2}{h} \frac{\Gamma_L \Gamma_R}{4E_c^2(n_g-0.5)^2+(\Gamma_L+\Gamma_R)^2/4} \ ,
\end{equation}
where $\Gamma_{\alpha} = t^2_{c,\alpha}|u_\alpha|^2/t_0$ is the effective tunnel rate that takes into account the local density of states $\nu = (2 \pi t_0)^{-1}$ of the leads with open boundary conditions at the Fermi energy and the projection of the particle-like component of the resonant level on the device edges, $u_\alpha$. $G_{BW}$ neglects the transport effect of QP states above the SC gap and results in the quantization of the differential conductance peaks for symmetric rates $\Gamma_R=\Gamma_L$.
In the following, we compare our numerical results with this BW theoretical prediction. In analogy with Eq. \eqref{eq:BW}, also the MPS simulations are not perturbative in the tunnel coupling $t_c$; at the same time, they provide a more complete description than the BW formula because they take into account the presence of multiple energy levels above the SC gap.
\begin{figure}
\begin{center}
\includegraphics[width=\columnwidth]{zerobias_kitaev_topo_peak_3.pdf}
\caption{(a): Zero-bias Coulomb peak of the differential conductance $G=\frac{{\rm d}I}{{\rm d}V_{b}}$ close to the resonance at $n_g=0.5$; we compare the results from the MPS + TDVP simulation (blue circles) for symmetric couplings $t_{c,L}=t_{c,R}=0.2 E_c$, the BW formula Eq.~\ref{eq:BW} (dot-dashed curve), which predicts the sharp quantization of $G$, and a fit using again Eq.~\eqref{eq:BW} (dashed line), where the height and width of the peak are used as fit parameters.
The other physical parameters are $\Delta=t_{\rm s}=0.3E_c$, $\mu_{\rm s}=-0.1E_c$, $E_c=t_0$ and $\mathcal{M}=40$.
(b): height (red squares, left vertical axis) and the full width at half maximum (FWHM, orange triangles, right vertical axis) of the conductance peaks as a function of the tunnel coupling $t_c$.
}\label{fig:peak}
\end{center}
\end{figure}
In Fig.~\ref{fig:peak}(a), we compare the zero-bias peak in the differential conductance $G=\frac{\mathrm{d} I}{\mathrm{d} V_{b}}$ obtained from the MPS simulation for symmetric couplings with the two leads (blue curve), Eq.~\eqref{eq:BW} (green dash dotted curve), and a fit of the numerical data with a generic BW function in which the height, broadening and center are considered as free parameters (red dashed curve).
Despite a correct overall peak shape, our simulations do not recover the quantized conductance predicted by Eq.~\eqref{eq:BW} when the left and right couplings are equal; furthermore the peak's width is about twice as large as the bare BW prediction of Eq.~\eqref{eq:BW}.
Indeed, the data in Fig.~\ref{fig:peak} refer to a strong coupling scenario, where $t_c=0.2E_c \sim 0.4 \Delta_{SC}$, where $\Delta_{SC}$ is the energy separation between Majorana and excited states. In this case, the hybridization strength is not negligible and the quench dynamics is sensitive to the presence of the higher energy levels.
Moreover, the quantization of the conductance predicted by Eq.~\eqref{eq:BW} stems from an approximation based on leads with infinite bandwidth and a constant density of states, two limits which are clearly not attained in our approach.
Notice also that the peak's positions of our data and of the corresponding fit are slightly shifted to the right with respect to the bare BW result in Eq. \eqref{eq:BW}.
This can be interpreted as an effect of the strong hybridization between the leads and the Kitaev chain, which might add a small energy shift to the energy of the Majorana modes.
When changing $t_c/E_c$, both the height ($G_{\rm peak}$) and the full width at half maximum (FWHM) of the conductance peak change, as shown in Fig.~\ref{fig:peak}(b).
Both decrease when the coupling becomes smaller. In particular, we observe a sublinear growth of the maximum conductance with $t_c$, for $t_c\gtrsim 0.2 E_C$, which is in contrast with both the first order perturbation theory, predicting a $|t_c|^2$ scaling of the current amplitude, and the BW formula in Eq. \eqref{eq:BW}, where the coupling $t_c$ only changes the width but not the height of the peak (for the symmetric case). This discrepancy is again an effect of the strong coupling limit we are probing.
A further facet of the complementarity between our zero-temperature simulations and the perturbative rate equation calculations is provided by the behavior of the tails of the peak as a function of the induced charge: rate equations result in a temperature-broadening of the conductance peak with exponentially suppressed tails, whereas our approach describes a broadening induced by the tunneling amplitude, which is instead characterized by a power law decay far from $n_g=0.5$.
The next step towards the full characterization of the conductance in the $n_g-V_{b}$ plane is the analysis of the current with respect to the voltage bias.
As mentioned above, here we restrict our simulations to $\mathcal{M}=8$ sites in the scatter to reduce the entanglement growth when $V_{b}$ becomes larger than the superconducting gap.
Our results are reported in Fig.~\ref{fig:IvsVb}, where we plot the current on both edges of the Kitaev chain as a function of the voltage difference between the leads, in correspondence to the resonance $n_g=0.5$.
Since we expect single-electron processes to be dominant at the charge degeneracy point, we compare our data with the prediction of first order rate equations, which indeed gives a qualitative agreement.
However, it must be noticed that both the overall amplitude of the current obtained with rate equations, and the temperature used in the corresponding Fermi factors have been arbitrary set to approximately match the profile given by the MPS data (see Appendix \ref{app:rates} for more detail).
\begin{figure}
\begin{center}
\includegraphics[width=\columnwidth]{current_resonance_topo.pdf}
\caption{Current vs voltage bias in correspondence of the induced charge resonance $n_g=0.5$ for a Kitaev chain with $\mathcal{M}=8$ sites; the vertical dashed line indicates the energy corresponding to the superconducting gap.
The overall scale of the rate equation current (solid red line) has been arbitrary chosen to approximately match that of the TDVP algorithm.
The inset shows the maximum entanglement entropy in the chain reached as a function of $V_{b}$. Again, the vertical dashed line indicates the position of the SC gap, where we observe a fast increase of the entanglement. For the largest two values of $V_{b}$ considered, the estimate of $S_{ent}$ is no longer reliable because the simulation saturates the maximum bond dimension allowed and the error introduced in the SVD truncation becomes larger than the chosen cutoff of $10^{-7}$.}\label{fig:IvsVb}
\end{center}
\end{figure}
As expected, the current increases sharply at small values of $V_{b}$ (the zero-bias peak) and then saturates in the region where transport is mostly mediated by the Majorana edge modes while the voltage is too small to excite states above the SC gap, indicated by the vertical dashed line.
When $V_{b} > \Delta_{SC}\sim 0.5 E_c$, the current decreases because transport across excited states is less efficient with respect to the Majorana modes, due to the reduced projection on the device edges.
From the point of view the differential conductance, this appears as a region with negative $G$, as observed in several experiments on SC devices with subgap states~\cite{Higginbotham_NatPhys2015,Vekris_DNW2021}.
An important effect of the excited states is the abrupt increase of the entanglement entropy at the central bond when $V_{b}$ exceeds the SC gap, as reported in the inset of Fig.~\ref{fig:IvsVb}.
Indeed when the voltage is large enough for multiple quasiparticle states to become populated, the entanglement grows accordingly.
When the bias is smaller than $\sim 0.7 E_c$, the simulations are accurate (truncation error below $10^{-7}$).
When the bias becomes large, $V_{b}/2 \gtrsim 0.7 E_c$, the system progressively saturates the maximum entanglement allowed by our simulations, which is set by the maximal bond dimension $\chi_{\rm max}=2500$, and the errors of our simulations are no longer under control.
This constitutes the principal limitation of our method:
When a continuous spectrum or a large number of excited states are within the bias energy window, thus having significant contribution to the transport of electrons, the entanglement will grow rapidly with time, hence requiring more computational resources for the accurate simulation of the dynamics, in line with general limitations of tensor network methods for studying quantum quenches.
There are several strategies to fine tune the simulations parameter and mitigate these limitations, such as choosing optimal time step durations and adjusting the localization length $\xi$ in the leads.
The best choice depends, however, on the physical parameters of the model and needs to be set accordingly.
\begin{figure}
\begin{center}
\includegraphics[width=\columnwidth]{Sent_vs_time_n.pdf}
\includegraphics[width=\columnwidth]{Sent_profile.pdf}
\caption{(a) increase of $S_{ent}$ in time for cuts in three different positions: auxiliary charge site (solid lines), right left lead bulk (dashed lines), and right lead bulk (dot-dashed lines). The color encodes the size of the scatterer; Notice that the curves corresponding to the entropy at the charge site (solid curves) are perfectly superimposed for $\mathcal{M}>2$, indicating that $S_{\rm ent}$ is almost independent from $\mathcal{M}$ as long as transport is dominated by a single channel. The voltage bias is $V_b=0.1E_c$.
(b) entropy profile of $S_{\rm ent}$ at the end of the time evolution, for different values of the $V_b \in [0.1E_c, 1.6E_c]$. Larger entropy is associated to larger biases. The vertical dashed lines indicate the energy range of the possible manybody transitions of the scatterer, where the total charge changes by 1. This interval is centered around 0 because the data are taken at the charge degeneracy point $n_g=0.5$.
The other parameters in the Kitaev chains are $\Delta=t_s=0.3 E_c$, $\mu_s =-0.1E_c$, and $t_c=0.2E_c$.}\label{fig:entanglement}
\end{center}
\end{figure}
The entanglement entropy at each link is therefore a useful quantity to monitor because it determines whether the simulation succeeds or not: if the entanglement entropy grows too much, so does the bond dimension $\chi$ needed to describe faithfully the quench dynamics.
$\chi$, in turn, is constrained by the memory and computational time allocated for the calculation.
On a practical level, we need to ensure that the maximum bond dimension $\chi_{\rm max}$ allowed is large enough to observe the emergence of a stationary value for the current.
Figure \ref{fig:entanglement} (a) shows the increase in time of the entanglement entropy $S_{ent}$ corresponding to partitions of the tensor network at three different positions and for several lengths of the scatterer (color-coded).
Solid lines correspond to a cut at the position of the charge site, which lies at the center of the MPS. Dashed and dot-dashed lines instead correspond to cuts in the middle of the leads bandwidth, at negative and positive energies respectively.
The simulations are performed at the charge degeneracy point $n_g=0.5$ with a small bias $V_{b} = 0.1E_c$.
Notice that the entanglement entropy at the auxiliary charge site position, where the entropy is the largest, is almost independent from the length of the scattering region $\mathcal{M}$. Hence, in the regime where a single state mediates transport, the efficiency and speed of the simulations depend very weakly on the number of single-particle states in the SC device, allowing for studying relatively large systems.
In Fig.~\ref{fig:entanglement}(b) we plot the entanglement entropy profile as a function of the energy of the MPS sites, at the end of the time evolution.
Different curves refer to different values of $V_{b}$, corresponding to the data presented in Fig.~\ref{fig:IvsVb}, where larger voltage biases induce larger entanglement and also a wider region of the MPS where $S_{\rm ent}$ grows.
Notice, however, that the entanglement is mostly restricted to energies limited by the bandwidth of the scattering device, indicated by the vertical dashed lines.
These data make clear the advantage deriving from our basis choice: the entanglement grows logarithmically in time and is concentrated in an energy window limited by the minimum between $V_{b}$ and the bandwidth of the scatterer.
The ``bulk'' of the leads, meaning states far in energy from the Fermi level, almost remains in its initial product state, as seen also from Fig.~\ref{fig:occupation_N2}.
The logarithmic growth of the entanglement entropy implies that the bond dimension grows linearly in time, making the simulation efficient, since the resources required increase at most as a power law of the system size and the total evolution time.
However, the situation is not always so favorable: in general, the larger the current, the faster the entanglement and bond dimension grow.
\section{Conclusions}\label{sec:conclusion}
In this paper, we illustrated an efficient method to simulate transport phenomena in Coulomb blockaded one-dimensional superconducting systems, which encompass several fundamental building blocks for the realization of both SC qubits and many proposed platform for topologically protected qubits.
We extract their differential conductance from the quasi-steady state current arising after a quantum quench in which we bring the system out of equilibrium by imposing a finite voltage bias between two leads connected to it.
Our method allows for exploring the system behavior in the strong coupling regime between the leads and the interacting SC device and for describing results beyond perturbative approaches (for instance, standard rate equation approaches). It is therefore suited for the study of non-perturbative phenomena such as Kondo or topological Kondo effects.
We simulate the real-time system dynamics within the MPS framework, where each site represent a single-particle energy eigenstate and the charging energy is encoded in an auxiliary site describing the total charge of the scattering region. In this basis, the system entanglement remains localized \cite{Rams2020} an we are able to compute efficiently the time evolution for long times.
In this article, we focused on simple p-wave superconducting spinless models and non-interacting leads; in particular, we analyzed two physical examples: a superconducting dot with two quasiparticle states and a blockaded Kitaev chain. Concerning the former, our method reproduces the predicted sequential tunneling and cotunneling signatures and accounts for the interference between different coherent transport processes. Concerning the latter, our results show that in the strong coupling limit the quantization of the zero-bias differential conductance peak associated with resonant electron tunneling mediated by Majorana modes with a symmetric coupling to the leads is lost. Higher energy states suppress indeed the conductance peak while broadening its shape.
Our method can be easily extended to take into account more leads, additional interactions and spinful systems. A weak Josephson coupling between the superconducting scatterer and grounded superconductors can also be efficiently described, as well as interacting or more complex leads. Furthermore, several recent works applied MPS methods to describe the time evolution after a quantum quench and the transport in interacting systems with leads of infinite length \cite{Zauner_2015,PhysRevB.99.121103,wu2020,PhysRevB.104.235142}. Such techniques can be integrated in our approach and can provide a method, alternative to the Wilson chain description, to mitigate finite size effects.
Our results to estimate the system conductance can also be integrated with recently developed techniques to simulate a dissipative time evolution of the system based on suitable Lindblad operators \cite{Wojtowicz2020,Brenes2020,Lotem2020}. Indeed, our simulations focused on the unitary evolution of closed systems. However, the description we have chosen for the leads degrees of freedom can be extended to account for the coupling with external electronic reservoirs, as well as other thermodynamic baths imposing a dissipative dynamics to the system. Furthermore, the introduction of suitably tailored dissipative terms that decrease the weight of non-local operators in the MPS time evolution has been proven beneficial to reduce the increase of the system entanglement in diffusive systems \cite{Pollmann2020}; such technique could be implemented also in our TDVP evolution, thus allowing for longer simulation times.
Adding the possibility of simulating the quench dynamics at finite temperature is also a necessary step to observe some of the scaling properties associated to topological \cite{Beri2012,Beri2013,Altland2013,Altland2014,Zazunov2014,Beri2017,Michaeli2017,Buccheri_TKE2020,Vayrynen_PRR2020} or charge Kondo effects~\cite{Papaj2019,Giuliano2020,han2021fractional}.
A possible route to include a finite temperature within the tensor network framework, is to promote the system wavefunction to a density matrix, encoded in a matrix product operator (MPO), which can describe both a pure and an open mixed state~\cite{Prosen_JSTAT2009,Benenti_PRB2009}.
Alternatively, one can keep a pure state description of the system, thus maintaining its MPS structure, by exploiting a {\em thermofield} transformation~\cite{deVega_PRA2015,Weichselbaum2018,Kohn_2022}, where the thermal distribution in the leads is reached by tracing out a set of auxiliary sites.
\section*{acknowledgements}
We warmly thank K. Flensberg, M. Leijnse, J. Paaske, R. Seoane Souto, and Mingru Yang for useful discussions. This project is supported by the Villum Foundation (Research Grant No. 25310) and received funding from the European Union’s Horizon 2020 research and innovation program under the Marie Sklodowska-Curie grant agreement No. 847523 “INTERACTIONS.” C.-M.C. acknowledges the support by the Ministry of Science and Technology (MOST) under Grant No. 111-2112-M-110-006-MY3, and by the
Yushan Young Scholar Program under the Ministry of Education (MOE) in Taiwan.
|
\section{Introduction}
Dialogues can build a trusting relationship with others, thus are essential in our daily lives \cite{schein1993dialogue,searle1985speech}.
There are several types of responses in dialogues, and the one we focus on is repetitions \cite{tannen1987repetition}.
A repetition is a response that uses the previous speaker's words or phrases.
Figure \ref{fig:repeat} shows an example. The phrases "a bear" and "came out" are repeated.
Repetitions frequently appear in a conversation with diverse roles, e.g.,
to indicate attentive listening, confirm the previous utterance, and show agreement or sympathy \cite{machi2019managing,shimojima2002informational}.
Many linguistic studies investigating repetitions have concluded that they are important for building and strengthening relationships between speakers \cite{tannen1989talking,johnstone2002discourse,norrick1987functions,brown1999repetition}.
From the above linguistic point of view, we can say that repetitions are indispensable in dialogues.
Repetitions are similar to paraphrases and reflections, which are component skills of counseling \cite{theron2008manual}, in terms of using the previous speaker's utterance. Paraphrases and reflections have been generated using a template-based method \cite{han-etal-2013-counseling}.
While many studies have tackled general response generation with neural network-based frameworks \cite{adiwardana2020humanlike,zhang-etal-2020-dialogpt}, less attention has been paid to repetitions. This might be because they are buried in a huge amount of response data.
Therefore, we focus on automatically generating repetitions. To the best of our knowledge, this is the first study on generating repetitions with a neural approach. We used the pre-trained language model T5 \cite{raffel2019exploring} for generating repetitions because it has performed well in language generation in past few years (e.g., \citealp{radfordlanguage, raffel2019exploring, lewis-etal-2020-bart}).
\begin{figure}[t]
\centering
\small
\begin{tabular}{|l|}
\hline
Speaker: When I was driving,\colorbox{yellow}{a bear}suddenly\colorbox{yellow}{came out}. \\
Listener: Oh.\colorbox{green}{A bear came out}!?\\
\hline
\end{tabular}
\caption{Example repetition. Listener's response uses words from previous speaker's utterance. Yellow words indicate those that are repeated and green words indicate those in the repetition.}
\label{fig:repeat}
\end{figure}
In generating repetitions, it is important to take into account which words should be repeated from the previous utterance.
The repeated words might represent objective facts, names of people and places, and the speaker's experiences and emotions, though they are different depending on the language \cite{machi2008repetition}.
When we use a pre-trained language model, however, the model cannot explicitly learn the repeat likelihood among words during fine-tuning because it is difficult to directly teach which words are likely to be repeated at this step.
To solve this problem, we propose Weighted Label Smoothing (WLS), which is an improvement upon Label Smoothing (LS) \cite{szegedy2016rethinking}.
The method enables a language model-based response generator to learn the words it should use for each input utterance during fine-tuning.
We also propose the repetition scoring method (RSM) to expand the scoring method proposed in \citet{wu2016google} for selecting repetitions that contain appropriate repeated words during decoding.
We evaluated the proposed methods on a dataset we created in Japanese for automatic and human evaluations.
Our methods outperformed baselines, i.e., fine-tuned pre-trained language models without our methods, in both evaluations.
This indicates that our methods can generate repetitions that contain appropriate words to repeat.
Our contributions are as follows:
\begin{enumerate}
\item To the best of our knowledge, this is the first study to use a neural model for generating repetitions.
\item We will release our code and the dataset of repetitions we created.\footnote{\url{https://github.com/titech-nlp/repetition-generation}}
\item We propose WLS, that takes into account words that should be repeated during fine-tuning, for generating repetitions.
\item We propose RSM to select repetitions containing appropriate repeated words during decoding.
\end{enumerate}
\section{Proposed Methods}
Repetitions do not necessarily mean we repeat any word.
For the utterance "Today's dinner was pizza.", the repetition "Oh, you ate pizza." is more appropriate than "Oh, you ate today."
However, a fine-tuned pre-trained language model alone may not be enough to generate repetitions with appropriate repeated words.
Therefore, to generate a response that repeats more appropriate words, we introduce \textit{repeat scores} (\S \ref{sec:score}) to calculate how likely a word is repeated and incorporate the scores into WLS (\S \ref{sec:weighted}) for fine-tuning and RSM (\S \ref{sec:coverage}) for beam search in decoding.
\subsection{Repeat Score}\label{sec:score}
We should give high scores to words that tend to be used in repetitions and low scores to words that should not be.
Since only content words (nouns, verbs, adjectives, or adverbs) are repeated in Japanese, we define a \textit{repeat score} only for them.
Since subwords are used as a unit in a pre-trained language model, all the subwords in the same content word receive the same \textit{repeat score}.
We use BERT \cite{bert} to construct a model for scoring the \textit{repeat scores} in the range of [0, 1].
We pass the final hidden state of BERT through SpanExtractor \cite{lee-etal-2017-end} for each word and then convert the vector to a scalar value through a multi-layer perceptron, which has a sigmoid function as the last layer.
In the training data, the label is set to 1 if the target content word was repeated, and 0 if it was not.
The output is then normalized by applying min-max scaling.
\subsection{Weighted Label Smoothing (WLS)}\label{sec:weighted}
In this section, we explain how to learn words to repeat when fine-tuning a pre-trained language model for repetition generation.
Neural response generation models try to optimize cross-entropy loss.
Let $X$ be a previous utterance and $Y$ be a response, where
$Y$ is divided into subwords as $Y=y_{1}, \dots, y_{T}$.
Letting $K$ be the total number of subwords
and $v_{k}$ be the $k$-th subword, the cross-entropy loss is defined as follows:
\begin{displaymath}
L(q, p)=-\sum_{k=1}^{K}q(v_{k})\log\{p(v_{k}|y_{<t},X)\},
\end{displaymath}
where $p(v_{k}|y_{<t},X)$ is the probability of $v_{k}$ that the model outputs at time step $t$ given $X$, and $q(v_{k})$ is the probability of $v_{k}$ in a target distribution that the model aims for.
When a one-hot distribution is used, $q(v_{k})$ is as follows with a function $\delta_{v_{k},y_{t}}$, which becomes 1 when $v_{k}=y_{t}$:
\begin{displaymath}
q(v_{k}) = \delta_{v_{k},y_{t}}.
\end{displaymath}
When LS is used, however, $q(v_{k})$ is as follows with uniform distribution $u(v_{k})=1/K$:
\begin{displaymath}
q(v_{k}) = (1-\epsilon)\delta_{v_{k},y_{t}} + \epsilon u(v_{k}),
\end{displaymath}
where $\epsilon$ is a hyperparameter.
A one-hot distribution and LS cannot learn a subword to repeat explicitly because there are labels other than the target, i.e., $v_{k}$ when $v_{k} \neq y_{t}$, that have the same $q(v_{k})$.
Therefore, we propose WLS, which takes into account how likely a subword is repeated.
We use \textit{repeat scores}, explained in \S \ref{sec:score}, instead of $u(v_{k})$.
The $q(v_{k})$ of WLS is defined as follows:
\begin{displaymath}
q(v_{k}) = (1-\epsilon)\delta_{v_{k},y_{t}} + \epsilon \frac{r(v_{k})^\gamma}{K},
\end{displaymath}
where $r(v_{k})$ is the \textit{repeat score} for $v_{k}$, and $\gamma$ is a hyperparameter.
We use the $q(v_{k})$ of WLS as the distribution in the cross-entropy loss function.
Subwords in the previous speaker's utterance are weighted in accordance with their $r(v_{k})$.
Note that if we set $\gamma = 0$, WLS is the same as LS.
\begin{table*}[t]
\centering
\small
\begin{tabular}{l|l}
\hline
Dialogue & \begin{tabular}{l}
\begin{CJK}{UTF8}{ipxm}運動やってました. \end{CJK}\\
(I played sports.)\\
\begin{CJK}{UTF8}{ipxm}へーそしたら中学校高校はクラブは何か?\end{CJK}\\
(Oh, did you participate in any clubs in junior high or high school?)\\
\begin{CJK}{UTF8}{ipxm}中学高校大学まで陸上部でした. \end{CJK}\\
(I was a member of a track and field club in junior high, high school, and college.)\\
\end{tabular}\\ \hline \hline
Repetition1 & \begin{tabular}{l}
\begin{CJK}{UTF8}{ipxm}陸上部ですか. \end{CJK}\\
(Track and field club?)\\
\end{tabular}\\
\hline
Repetition2 & \begin{tabular}{l}
\begin{CJK}{UTF8}{ipxm}陸上部だったんですね. \end{CJK}\\
(You were in the track and field club.)\\
\end{tabular}\\
\hline
Repetition3 & \begin{tabular}{l}
\begin{CJK}{UTF8}{ipxm}中学高校大学まで陸上とは, 長く続けられたんですね!\end{CJK}\\
(You were in the track and field club for a long time, from junior high through high school and college.)\\
\end{tabular}\\
\hline
\end{tabular}
\caption{Examples from repetition dataset. There are at most three repetitions for one dialogue.}
\label{tab:data_example}
\end{table*}
\subsection{Repetition Scoring Method (RSM)}\label{sec:coverage}
Pre-trained language models usually use beam search in decoding.
We propose a scoring method, RSM, to select more appropriate repetitions in the beam search.
RSM is an extension of a scoring method for machine translation in \citet{wu2016google}.
The original scoring method uses a length normalization procedure and coverage penalty \cite{tu-etal-2016-modeling}.
Length normalization treats sentences of different lengths equally.
The coverage penalty gives a high score to a sentence that is most likely to cover all the words in the source sentence.
Since the original scoring method cannot select a repetition with appropriate repeated words,
we modify the method by adding \textit{repeat scores}, which indicate words to repeat.
Letting $Y$ be a candidate response during beam search and $X$ be the previous utterance, the generation probability is $P(Y|X)$.
The scoring function $s(Y,X)$ of RSM is as follows:
\footnotesize
\begin{eqnarray*}
s(Y,X)\!&=&\!log\{P(Y|X)\}/lp(Y)\mathalpha{+}cp(Y,\!X)\mathalpha{+}rs(Y,\!X),\\
lp(Y)\!&=&\!\frac{(5+|Y|)^\alpha}{(5+1)^\alpha},\\
cp(Y,X)\!&=&\!\beta*\sum^{|X|}_{i=1}log(\sum^{|Y|}_{j=1}p_{i,j}),\\
rs(Y,X)\!&=&\!log\sum^{|Y|}_{j=1}r(v_{j}),
\end{eqnarray*}
\normalsize
where $\alpha$ and $\beta$ are hyperparameters for length normalization and coverage penalty, respectively.
We carry out two modifications to the original scoring method to yield RSM.
First, we use the attention value of $p_{i,j}$ without suppression.
In contrast to machine translation, in which an input and output have a one-to-one relationship, lengths of an input and output are not the same in repetition generation, and so it is not suitable to suppress the attention value under $1.0$.
Second, we add the term $rs(Y,X)$, which represents the sum of \textit{repeat scores} for subwords in the response.
\section{Dataset}\label{sec:data}
We manually created pairs of a speaker’s utterance and its repetition as our dataset using a crowdsourcing service.\footnote{\url{https://www.lancers.jp/}\label{fo:lancers}}
Since repetitions often occur when a listener replies to a speaker, we used utterances in a corpus of listening dialogues \cite{corpus} between an elderly person and caregiver or clinical psychologist as the speaker's utterances in our dataset.\footnote{We attempted to extract repetitions from the corpus using a rule-based approach and found it is difficult to obtain a sufficient amount of such repetitions.}
In this corpus, the elderly person tends to be a speaker and the others are listeners.
We extracted the elderly person's utterances containing content words for creating a repetition.
The number of extracted utterances was 5,548.
We asked three crowdsourcing workers to create repetitions for each utterance.
Specifically, a worker was shown two utterances before each target utterance and asked to create a repetition, that supports the creation of context-aware repetitions.
When the workers found it difficult to create a repetition for an utterance, they could discard it.
The total number of workers was 333.
Examples from the dataset are given in Table \ref{tab:data_example}.
The size and statistics of our repetition dataset are shown in Tables \ref{tab:dataset} and \ref{tab:stats_dataset}.
The word overlap rate is the percentage of words in an utterance that are repeated in a repetition.
The content-word overlap rate is the percentage of content words of an utterance that are repeated.
Comparing the average numbers of tokens, repetitions are much shorter than utterances.
This may indicate that repetitions cannot be produced simply by copying the utterances, and we need to select information that is worth repeating from the utterances.
To understand what types of words overlap, Table \ref{tab:pos} shows the percentage of all words' parts-of-speech and overlapped words' parts-of-speech in utterances.
Since "postpositional particles" and "auxiliary verbs" tend to accompany content words in a Japanese unit called `bunsetsu',
it might be natural that they also appear in repetitions in high percentages.
While we can have at most three repetitions for an utterance in our dataset, we used only one randomly selected repetition for an utterance in the training data. We used all repetitions for an utterance for the evaluation on the validation and test data to consider the diversity of responses.
\begin{table}[t]
\centering
\small
\begin{tabular}{l|r|r|r}
\hline
&Train.&Valid.&Test\\
\hline
Utterance (Dialogue) & 4106 & 489 & 490\\
Repetition & 10677 & 1305 & 1312\\
\hline
\end{tabular}
\caption{Size of repetition dataset.}
\label{tab:dataset}
\end{table}
\begin{table}[t]
\centering
\small
\begin{tabular}{lr}
\hline
Total Dialogues & 5085\\
Total Repetitions & 13294\\
Average \# of Repetitions per Utterance & 2.61\\
Average \# of Tokens per Utterance & 26.25\\
Average \# of Tokens per Repetition & 11.74\\
Word Overlap Rate & 36.48\%\\
Content-word Overlap Rate & 38.14\%\\
\hline
\end{tabular}
\caption{Statistics of repetition dataset.}
\label{tab:stats_dataset}
\end{table}
\begin{table}[t]
\centering
\small
\begin{tabular}{l|r|r}
\hline
PoS & All(\%) & Overlap(\%)\\
\hline
Postpositional Particle & 27.64 & 39.02\\
Noun & 23.85 & 32.70\\
Auxiliary Verb & 9.34 & 13.09\\
Verb & 13.25 & 10.03\\
Adjective & 1.86 & 2.52\\
Adverb & 4.57 & 1.61 \\
Filler & 0.37 & 0.01\\
\hline
\end{tabular}
\caption{The ratios of words and overlapped words of different parts-of-speech (PoS) in utterances.}
\label{tab:pos}
\end{table}
\section{Experiments}
\subsection{General Setup}
\textit{Repeat scores} were calculated from the training data.
SentencePiece \cite{kudo-richardson-2018-sentencepiece} was used to segment the dataset into subwords.
With WLS, the hyperparameter $\epsilon$ was set to $0.1$ following a previous study \cite{szegedy2016rethinking}, and $\gamma$ was tuned to $4$ with the validation data, as explained in Appendix \ref{sec:hyper}.
With RSM, we used $\alpha=0.2$ and $\beta=0.2$, following a previous study \cite{wu2016google}, and a beam size of 5.
We used MeCab\footnote{\url{https://taku910.github.io/mecab/}\label{mecab}} as a tokenizer to identify content words.
\subsection{Compared Methods}
The baseline methods were as follows:
\begin{table}[t]
\centering
\scriptsize
\begin{tabular}{ll}
\hline
Utterance&\hspace{-1mm}Rule-Based\\
\hline
\hspace{-2mm}\begin{tabular}{l}
\begin{CJK}{UTF8}{ipxm}それとやっぱり深さ, 魚のどの辺におるか\end{CJK}\\
\begin{CJK}{UTF8}{ipxm}とかが難しいんですわ. \end{CJK}\\
(It's hard to know where fish are and what\\
depths they are at.)\\
\end{tabular}&\hspace{-3mm}\begin{tabular}{l}
\begin{CJK}{UTF8}{ipxm}難しいですか. \end{CJK}\\
(Hard, is it?)\\
\end{tabular}\\
\hline
\hspace{-2mm}\begin{tabular}{l}
\begin{CJK}{UTF8}{ipxm}先生の話をしっかり聞く言う事が大事. \end{CJK}\\
(It is important to listen carefully to what\\
a teacher says.)\\
\end{tabular}&\hspace{-3mm}\begin{tabular}{l}
\begin{CJK}{UTF8}{ipxm}先生ですか. \end{CJK}\\
(The teacher, is it?)\\
\end{tabular}\\
\hline
\hspace{-2mm}\begin{tabular}{l}
\begin{CJK}{UTF8}{ipxm}色々ありましたからね, 国際的なニュース\end{CJK}\\
\begin{CJK}{UTF8}{ipxm}もね. \end{CJK}\\
(There's been a lot going on, and international\\
news, too.)\\
\end{tabular}&\hspace{-3mm}\begin{tabular}{l}
\begin{CJK}{UTF8}{ipxm}ニュースですか. \end{CJK}\\
(News, is it?)\\
\end{tabular}\\
\hline
\end{tabular}
\caption{Examples of utterance and rule-based response.}
\label{tab:rule}
\end{table}
\noindent\textbf{Rule-Based} is a rule-based method, with which a response is created with a content word in the speaker's utterance + \textit{"desuka"} ("is it?").
The content word is randomly selected from the utterance.
Examples of rule-based responses are given in Table \ref{tab:rule}.
Responses made with Rule-Based always contain a repeated word and have few grammatical errors.
However, \textit{"desuka"} cannot cover all situations.
\textit{"desuka"} was chosen because 52\% of repetitions in our dataset ends with \textit{"desuka"}, and 6.1\% of repetitions are a single word + \textit{"desuka"}.
\noindent\textbf{BertSumAbs} \cite{liu-lapata-2019-text} is a model trained with BERT\footnote{\url{https://huggingface.co/cl-tohoku/bert-base-japanese}} as the encoder and randomly initialized Transformer as the decoder.
\noindent\textbf{T5}\footnote{\url{https://huggingface.co/sonoisa/t5-base-japanese}} \cite{raffel2019exploring} is a model that was fine-tuned with the repetition dataset.\footnote{While another possible model for comparison is GPT-2 \cite{radfordlanguage}, we did not use it since it was known that T5 is superior to GPT-2 in generation performance \cite{kale-rastogi-2020-text,zhao-etal-2020-knowledge-grounded}.}
\noindent\textbf{LS} is T5 fine-tuned with LS.
\noindent\textbf{Copy} is T5 fine-tuned with the copy mechanism \cite{see-etal-2017-get}.
Since the copy mechanism can be considered similar to the repetition model in that it is used to generate the same words as in an input sentence, we used it for comparison.
Note that the T5 and BERT were versions pre-trained in Japanese.
Our methods are as follows:
\noindent\textbf{WLS} is T5 fine-tuned with WLS, as mentioned in \S \ref{sec:weighted}.
\noindent\textbf{RSM} is T5 using RSM during beam search, as mentioned in \S \ref{sec:coverage}.
\noindent\textbf{WLS + RSM} is T5 fine-tuned with WLS and using RSM during beam search.
\subsection{Automatic Evaluation}
The evaluation metrics were ROUGE (RG-1, RG-2, RG-L) \cite{lin-2004-rouge} and the percentage of outputs containing correct repeated words.
The correct repeated words are content words repeated in the gold response.
The experimental results are listed in Table \ref{tab:result}.
WLS + RSM obtained the highest scores for all metrics, confirming the effectiveness of both WLS and RSM.
\begin{table}[t]
\centering
\small
\begin{tabular}{l|c|c|c|c}
\hline
& RG-1 & RG-2 & RG-L & \% \\
\hline
Rule-Based & 35.26 & 14.03 & 35.11 & 58.24 \\
BertSumAbs & 30.73 & 10.97 & 29.94 & 52.51 \\
T5 & 45.34 & 22.34 & 44.59 & 81.67 \\
LS & 45.89 & 23.08 & 45.12 & 81.83 \\
Copy & 45.83 & 23.32 & 45.07 & 81.67 \\
\hline
WLS & \hspace{1.1mm}\,47.88$^\dag$ & 24.56 & \hspace{1.1mm}\,47.14$^\dag$ & \hspace{1.1mm}\,85.77$^\dag$ \\
RSM & 46.96 & 24.66 & 46.13 & \hspace{1.1mm}\,84.38$^\dag$ \\
WLS + RSM & \hspace{1.1mm}\,\textbf{49.16}$^\dag$ & \hspace{1.1mm}\,\textbf{26.58}$^\dag$ & \hspace{1.1mm}\,\textbf{48.28}$^\dag$ & \hspace{1.1mm}\,\textbf{89.56}$^\dag$ \\
\hline
\end{tabular}
\caption{Results of automatic evaluation. \% is percentage of outputs containing correct repeated words. Results with \dag \hspace{0.5mm} are significantly different from LS, best baseline, using Wilcoxon rank sum test (p < 0.05).}
\label{tab:result}
\end{table}
We conducted an ablation study to analyze the results of RSM.
The results are listed in Table \ref{tab:cov_ablation}.
Since w/o $rs$ received the lowest scores, $rs$ was considered the most effective.
\begin{table}[t]
\centering
\small
\begin{tabular}{l|c|c|c|c}
\hline
& RG-1 & RG-2 & RG-L & \% \\
\hline
w/o $lp$ & 46.81 & 24.52 & 45.98 & 83.91\\
w/o $cp$ & 46.93 & \textbf{24.66} & 46.11 & 84.30\\
w/o $rs$ & 44.97 & 22.25 & 44.13 & 81.28\\
\hline
RSM & \textbf{46.96} & \textbf{24.66} & \textbf{46.13} & \textbf{84.38}\\
\hline
\end{tabular}
\caption{Ablation study for RSM. $lp$, $cp$, and $rs$ were explained in \S \ref{sec:coverage}.}
\label{tab:cov_ablation}
\end{table}
Examples of an input and generated responses from the baseline and our model are shown in Table \ref{tab:res_example}.
The proposed model (WLS + RSM) successfully generated a response that was close to the correct response, focusing on "having friends who play Go".
\begin{table}[t]
\centering
\scriptsize
\begin{tabular}{l|l}
\hline
Utterance & \begin{tabular}{l}
\begin{CJK}{UTF8}{ipxm}昨日は同じ僕らの仲間で囲碁する人いたからね. \end{CJK}\\
(Yesterday there were our friends who play Go.)\\
\end{tabular}\\ \hline\hline
Gold & \begin{tabular}{l}
\begin{CJK}{UTF8}{ipxm}仲間で囲碁する人いたんですね. \end{CJK}\\
(There were friends who play Go.)\\
\end{tabular}\\ \hline
Rule-Based & \begin{tabular}{l}
\begin{CJK}{UTF8}{ipxm}囲碁ですか. \end{CJK}\\
(Go, is it?)\\
\end{tabular}\\ \hline
T5 & \begin{tabular}{l}
\begin{CJK}{UTF8}{ipxm}囲碁をしてくれたんですね. \end{CJK}\\
(You played Go.)\\
\end{tabular}\\ \hline
Ours & \begin{tabular}{l}
\begin{CJK}{UTF8}{ipxm}仲間内で囲碁する人いたんですか. \end{CJK}\\
(There were friends who play Go.)\\
\end{tabular}\\
\hline
\end{tabular}
\caption{Examples of generated responses from different models.}
\label{tab:res_example}
\end{table}
\subsection{Human Evaluation}
We also conducted a human evaluation by comparing three types of response generation methods: Rule-Based, T5, and our model (WLS + RSM).
The evaluation measures were grammaticality (Gram), relevance (Rel), coherence (Cohe), and whether repeated words are included (Rep).
Two hundred pairs were randomly selected from the test data. The responses were shown to five workers and evaluated on a three-point Likert scale.
The response was evaluated with the previous speaker's utterance and one turn before the speaker's utterance as context, meaning the context helps in determining whether the response is an appropriate repetition.
The total number of evaluators was 110.
Average scores from the evaluation are listed in Table \ref{tab:human_eva}.
WLS + RSM outperformed the other methods for all measures, confirming its effectiveness.
\begin{table}[t]
\centering
\small
\begin{tabular}{l|c|c|c|c}
\hline
& Gram & Rel & Cohe & Rep\\
\hline
Rule-Based & 2.63 & 2.49 & 2.37 & 2.64\\
T5 & 2.82 & 2.77 & 2.62 & 2.79\\
WLS + RSM & \hspace{1.1mm}\,\textbf{2.85}$^\dag$ & \hspace{1.1mm}\,\textbf{2.80}\hspace{1.1mm}\, & \hspace{1.1mm}\,\textbf{2.64}\hspace{1.1mm}\, & \hspace{1.1mm}\,\textbf{2.88}$^\dag$ \\
\hline
\end{tabular}
\caption{Results of human evaluation. Results with \dag \hspace{1mm} are significantly different from T5, the best baseline, using Wilcoxon rank sum test (p < 0.05).}
\label{tab:human_eva}
\end{table}
\section{Conclusion}
We focused on repetition generation.
Although repetitions play an important role in dialogues, there has been no neural approach for this task to the best of our knowledge.
We proposed WLS, which is an improvement upon LS, during fine-tuning and RSM, which is an extended scoring method, during decoding for repetition generation.
Through automatic and human evaluations, we confirmed that our model can generate repetitions that contain more appropriate words to repeat than baseline models.
For future work, we will take into account synonyms and multiple gold repetition instances to calculate \textit{repeat scores} for improving the diversity of responses. We are also planning to incorporate our repetition model into a general response generation framework.
\section*{Acknowledgements}
We thank Dr. Koichiro Yoshino of RIKEN for providing the listening dialogue data.
\section*{Ethical Statement}
Neural generative models have the potential to generate unexpected responses such as violent remarks. As we focused on repetition generation, its model repeats a user's utterance, and so there is little chance of causing unintended responses compared with chit-chat dialogue systems. However, this does not mean that unintended responses will never appear, e.g., when a user's utterance is an unintended expression. Thus, the same consideration must be taken as with other dialogue systems.
Our dataset was created to repeat from utterances in a privacy-secured dataset, and so there is no privacy issue. Since the license of the original dataset is CC BY-NC 4.0, we could use it for this study. We define that the license of our dataset is also CC BY-NC 4.0.
|
\section{Introduction}
Cet article fait suite à \cite{J4} où l'on détermine la partie supercuspidale de la cohomologie de Rham pour le premier revêtement de la tour de Drinfeld. Dans les articles fondateurs \cite{lt1,lt2,dr1,dr2}, deux tours de revêtements rigides-analytiques $({\mathcal{M}}_{LT}^n)_n$ ont été construits dont la cohomologie étale $l$-adique a un lien profond avec les correspondances de Jacquet-Langlands et de Langlands locales. La première, la tour de Drinfeld, est une famille dénombrable de revêtements successifs de l'espace symétrique de Drinfeld à savoir ${\mathbb{P}}_K^d \backslash \bigcup_{H \in {\mathcal{H}}} H$ le complémentaire dans l'espace projectif sur $K$ une extension finie de ${\mathbb{Q}}_p$ des hyperplans $K$-rationnels. La seconde, la tour de Lubin-Tate, constitue une famille de revêtements sur la boule unité rigide $\mathring{{\mathbb{B}}}_K$. L'étude des propriétés cohomologiques de ces espaces a culminé dans les travaux \cite{dr1, cara3, harrtay, falt, fargu, dat1, dat0, mied, Scholze1}... où il a été montré que la partie supercuspidale de la cohomologie $l$-adique réalisait à la fois les correspondances de Jacquet-Langlands et de Langlands locale. Le but de ce travail ainsi que de \cite{J4} est d'obtenir des résultats similaires pour les cohomologies $p$-adiques avec l'espoir d'exhiber des versions $p$-adiques des correspondances de Langlands locale encore conjecturales. En guise de première étape à l'établissement de ce programme conséquent, nous nous concentrons uniquement dans ces travaux sur la cohomologie de de Rham où nous nous attendons à obtenir les mêmes représentations que pour la cohomologie $l$-adique où l'on a oublié l'action du groupe de Weil. En particulier, nous pouvons seulement exhiber la correspondance de Jacquet-Langlands.
Même si certaines méthodes en $l$-adique ne peuvent être adaptées à l'étude que nous voulons mener et si la cohomologie de de Rham de l'ensemble des deux tours semble inaccessible pour le moment, quelques cas particuliers ont été établis comme le cas de dimension $1$ du coté Drinfeld (quand $K={\mathbb{Q}}_p$) \cite{brasdospi}, ($K$ quelconque)\cite{GPW1}, du coté Lubin-Tate \cite{GPW1} et récemment en dimension quelconque pour le premier revêtement du côté Drinfeld \cite{J4} (voir aussi \cite{scst,iovsp,ds} pour le niveau $0$ du côté Drinfeld\footnote{En niveau $0$ du coté Lubin-Tate, le résultat est immédiat car la boule unitée ouverte rigide n'a pas de cohomologie.}). Dans cet article, nous prouvons le résultat pour le premier revêtement du coté Lubin-Tate. L'espoir de prolonger les résultats du côté Drinfeld aux espaces analogues du coté Lubin-Tate est motivé par le lien profond qui existe entre la géométrie des deux tours. Ce lien s'illustre dans les travaux \cite{falt2, fafa} où il a été montré que chaque tour en niveau infini à une structure d'espace perfecto\"ide et que ces deux espaces sont isomorphes.
Avant d'énoncer le résultat principal de cet article, introduisons les représentations qui apparaissent dans l'énoncé. Soit $K$ une extension finie de ${\mathbb{Q}}_p$ d'anneau des entiers ${\mathcal{O}}_K$, d'uniformisante $\varpi$ et de corps résiduel ${\mathbb{F}}={\mathbb{F}}_q$. Notons $C=\widehat{\bar{K}}$ le complété d'une clôture alg\'ebrique de $K$ et $\breve{K}= \widehat{K^{nr}}$ le compl\'eté de l'extension maximale non ramifi\'ee dans $\bar{K}$. On note $({\mathcal{M}}_{LT}^n)_n$ les revêtements de dimension $d$ sur $\breve{K}$ de la tour de Lubin-Tate. Chacun de ces espaces rigide-analytiques admettent des actions des groupes $\gln_{d+1}({\mathcal{O}}_K)=G^\circ$, $D^*$ avec $D$ l'algèbre à division sur $K$ de dimension $(d+1)^2$ et d'invariant $1/(d+1)$, $W_K$ le groupe de Weil de $K$ qui commute entre elles. De plus, ces revêtements se décompose sous la forme ${\mathcal{M}}_{LT}^n=\lt^n\times{\mathbb{Z}}$ et on peut aisément relier les cohomologie de ${\mathcal{M}}_{LT}^n$ et de $\lt^n$.
Étant donné un caractère primitif $\theta$ du groupe ${\mathbb{F}}_{q^{d+1}}^*$, on peut lui associer les représentations suivantes :
\begin{enumerate}
\item Sur le groupe $\gln_{d+1}({\mathbb{F}}_q)$, $\dl(\theta)$ sera la repr\'esentation cuspidale associ\'ee \`a $\theta$ via la correspondance de Deligne-Luzstig. On pourra la voir comme une repr\'esentation de $G^\circ $ par inflation.
\item $\tilde{\theta}$ sera le caract\`ere de $I_K (\varphi^{d+1})^{{\mathbb{Z}}}\subset W_K$ par le biais de $I_K \to I_K/ I_{K_N}\cong {\mathbb{F}}_{q^{d+1}}^*\xrightarrow{\theta} \widehat{\bar{K}}^*$ avec $K_N=K(\varpi^{1/N})$. On impose de plus $\tilde{\theta}(\varphi^{d+1})=(-1)^d q^{\frac{d(d+1)}{2}}$.
\end{enumerate}
Nous donnons maintenant les repr\'esentations associ\'ees sur les groupes $D^*$, $W_K$. Posons :
\begin{enumerate}
\item $\rho(\theta):= \cind_{{\mathcal{O}}_D^*\varpi^{\mathbb{Z}}}^{D^*} \theta$ o\`u $\theta$ est vue comme une ${\mathcal{O}}_D^* \varpi^{{\mathbb{Z}}}$-repr\'esentation via ${\mathcal{O}}_D^* \varpi^{{\mathbb{Z}}} \to {\mathcal{O}}_D^* \to {\mathbb{F}}_{q^{d+1}}^*$.
\item $\wwwww(\theta):= \cind_{I_K (\varphi^{d+1})^{{\mathbb{Z}}}}^{W_K} \tilde{\theta}$.
\end{enumerate}
Le théorème principal de l'article est le suivant :
\begin{theointro}
\label{theointroprinc}
Pour tout caractère primitif $\theta: {\mathbb{F}}_{q^{d+1}}^*\to C^*$, il existe des isomorphismes de $G^\circ$-représentations
\[\homm_{D^*}(\rho(\theta), \hdrc{i}(({\mathcal{M}}_{LT, C}^1/ \varpi^{{\mathbb{Z}}}))){\cong} \begin{cases} \dl(\theta)^{d+1} &\text{ si } i=d \\ 0 &\text{ sinon} \end{cases}.\]
\end{theointro}
Rappelons que les représentations $\rho(\theta)$ considéré parcourt l'ensemble des représentations irréductibles de niveau $0$ de $D^*$ de caract\`ere central trivial sur $\varpi^{{\mathbb{Z}}}$ dont l'image par la correspondance de Jacquet-Langlands est supercuspidale.
Expliquons dans les grandes lignes la stratégie de la preuve. L'un des grands avantages à travailler sur les premiers revêtements de chacune des tours est que la géométrie des deux espaces considérés reste encore accessible. Cela nous permet alors d'espérer pouvoir appliquer les arguments purement locaux des thèses de \cite{yosh} (côté Lubin-Tate) et \cite{wa} (côté Drinfeld). En niveau supérieur, la géométrie se complique grandement et nous doutons qu'une stratégie similaire puisse fonctionner. Du côté Drinfeld, cela s'illustre par l'existence d'une équation globale au premier revêtement (voir \cite{J3}). Du côté Lubin-Tate, la situation est encore meilleure car on a l'existence d'un modèle semi-stable généralisé (voir plus bas) construit par Yoshida. Cette propriété jouera un rôle clé dans la stratégie que nous avons entrepris et nous expliquons maintenant son utilité.
Soit ${\mathcal{X}}$ un schéma formel $p$-adique, il est de réduction semi-stable généralisée si, Zariski-localement sur ${\mathcal{X}}$, on peut trouver un morphisme étale vers ${\rm Spf}({\mathcal{O}}_K\langle X_1,...,X_n\rangle/
(X_1^{\alpha_1}...X_r^{\alpha_r}-\varpi))$ pour certains $r\leq n$ et $\alpha_i\geq 1$ (ou $\varpi$ est une uniformisante de $K$). Observons que pour tout schéma formel ${\mathcal{X}}$ vérifiant cette propriété, l'anneau local complété en un point fermé est de la forme
\[
{\mathcal{O}}_{\breve{K}} \llbracket T_0,\ldots, T_d \rrbracket /(T_0^{e_0}\cdots T_r^{e_r}- \varpi )
\]
avec $r\leq d$ et $e_i$ premier à $p$.
Nous dirons alors que ${\mathfrak{X}}$ est ponctuellement semi-stable généralisé si pour tous point fermés, l'anneau local complété est de cette forme. Il s'agit d'une notion un peu plus faible car on peut s'autoriser des espaces qui ne sont pas $p$-adiques\footnote{Par exemple, $\spf({\mathcal{O}}_{\breve{K}} \llbracket T_0,\ldots, T_d \rrbracket /(T_0^{e_0}\cdots T_r^{e_r}- \varpi ))$ est ponctuellement semi-stable généralisé mais pas semi-stable généralisé.}.
Le résultat suivant qui a en premier été prouvé par Grosse-Kl\"onne dans \cite[Theorem 2.4.]{GK1} pour le cas semi-stable puis dans \cite[Théorème 5.1.]{J4} pour le cas semi-stable généralisé, est le point de départ de notre argument.
\begin{propintro
Étant donné un schéma formel semi-stable généralisé ${\mathcal{X}}$ avec pour décomposition en composantes irréductibles ${\mathcal{X}}_s=\bigcup_{i\in I} Y_i$, pour toute partie finie $J\subset I$, la flèche naturelle de restriction
\[\hdr{*} (\pi^{-1}(]Y_J[_{\mathcal{X}}))\fln{\sim}{} \hdr{*} (\pi^{-1}(]Y_{J}^{lisse}[_{\mathcal{X}}))\]
est un isomorphisme pour $Y_J=\inter{Y_j}{j\in J}{}$ et $Y_J^{lisse}=Y_{J}\backslash \bigcup_{i\notin J}Y_i$.
\end{propintro}
Ce résultat nous permet de mettre en place l'heuristique suivante. Étant donné un schéma formel semi-stable généralisé, on a recouvrement de la fibre générique par les tubes des composantes irréductibles $(]Y_i[)_{i\in I}$ de la fibre spéciale. On veut alors appliquer la suite spectrale de Cech à ce recouvrement. On se ramène alors à calculer les cohomologies des intersections $]Y_J[$ pour $J\subset I$ et donc de $]Y_J^{lisse}[$. La géométrie de ces derniers plus simples et les exemples apparaissant dans cet article admettent par exemple des modèles entiers lisses ce qui permet de calculer leurs cohomologies par théorème de comparaison avec la cohomologie rigide de leur fibre spéciale.
Pour pouvoir mettre en place cette stratégie dans ce cas, nous devons comprendre le modèle semi-stable construit par Yoshida et décrire explicitement les différentes composantes irréductibles de la fibre spéciale. En fait, le premier revêtement admet un modèle naturel $Z_0$ provenant de son interprétation modulaire. Ce dernier n'est pas encore semi-stable et nous y résolvons les singularités en éclatant successivement des fermés bien choisis. Plus précisément, il construit une famille de fermés dans la fibre spéciale $(Y_M)_M$ indexés par les sous-espaces vectoriels propres $M\subsetneq {\mathbb{F}}^{d+1}$ qui vérifie $Y_M\cap Y_N=Y_{M\cap N}$. Lorsque $M$ parcourt l'ensemble des hyperplans, les fermés $Y_M$ décrivent l'ensemble des composantes irréductibles de $Z_0$ et on peut exhiber une stratification de la fibre spéciale par les fermés
\[
Y^{[h]}:=\bigcup_{N :\dim N=h} Y_N
\]
On construit alors une suite de modèles $Z_0, \cdots, Z_d$ en éclatant successivement le long des fermés de cette stratification. De plus, à chaque modèle, on peut construire de manière similaire une famille de fermés $(Y_{M,h})_h$ de $Z_h$ avec $Y_{M,h}=Y_M$ en prenant des transformées propres ou strictes suivant les cas (voir la définition \ref{defitrans} pour plus de précisions). Cette famille est essentielle pour comprendre la géométrie de la fibre spéciale et le résultat suivant illustre ce principe.
\begin{theointro
On a les points suivants :
\begin{enumerate}
\item $Z_d$ est ponctuellement semi-stable généralisé.
\item Les composantes irréductibles de la fibre spéciale de $Z_h$ sont les fermés de dimension $d$ suivant $(Y_{M,h})_{M: \dim M\in \left\llbracket 0,h-1\right\rrbracket\cup\{d\}}$.
\item Les intersections non-vides de composantes irréductibles de $Z_h$ sont en bijection avec les drapeaux $M_1\subsetneq \cdots \subsetneq M_k$ tels que $\dim M_{k-1}< h$ via l'application \[M_1\subsetneq \cdots \subsetneq M_k \mapsto \bigcap_{1\leq i \leq k} Y_{M_i,h}.\]
\item Si $Y_{M,h}$ est une composante irréductible de $Z_{h,s}$ avec $\dim M\neq d$, alors les morphismes naturels $\tilde{p}_i$ avec $i=h+1,\ldots, d$ induisent des isomorphismes $ Y_{M,d}^{lisse} \cong\cdots \cong Y_{M,h+1}^{lisse} \cong Y_{M,h}^{lisse}$.
\item Le changement de base du tube $]Y_{\{0\},d}^{lisse}[_{Z_d} \otimes \breve{K}(\varpi_N)\subset {\rm LT}_1 \otimes \breve{K}(\varpi_N)$ admet un modèle lisse dont la fibre spéciale est isomorphe à la variété de Deligne-Lusztig $\dl_{\bar{{\mathbb{F}}}}$ associée à $\gln_{d+1}$ et à l'élément de Coxeter $(1,\cdots, d)\in {\mathfrak{S}}_d$ (ici, $N=q^{d+1}-1$ et $\varpi_N$ est le choix d'une racine $N$-ième de $\varpi$).
\end{enumerate}
\end{theointro}
Grâce à ce résultat et au théorème d'excision cité précédemment, nous pouvons alors prouver :
\begin{propintro
On a un isomorphisme $\gln_{d+1}({\mathcal{O}}_K)$-équivariant :
\[\hdr{*} (\lt^1/\breve{K}_N)\cong \hrig{*} (\dl^d_{\bar{{\mathbb{F}}}}/\breve{K}_N)\] Par dualité de Poincaré, on a un isomorphisme semblable pour les cohomologies à support compact.
\end{propintro}
\begin{rem
Notons que le modèle $Z_d$ obtenu est semi-stable généralisé au sens faible et nous ne pouvons appliquer directement le théorème d'excision. Cette difficulté est surmontée par une astuce déjà présente dans les travaux de Yoshida où $Z_d$ est plongé dans un modèle entier $\hat{{\rm Sh}}$ bien choisi d'une variété de Shimura qui est cette fois-ci semi-stable généralisée au sens fort (et donc $p$-adique). On peut alors un voisinage étale $U\subset \hat{{\rm Sh}}$ de $Z_d$ qui est $p$-adique et semi-stable généralisé et sur lequel on peut appliquer le théorème d'excision.
\end{rem}
L'intérêt principal du résultat précédent réside dans le fait que les variétés de Deligne-Lusztig $\dl^d_{{\mathbb{F}}}$ réalisent les correspondances de Green desquels peuvent se déduire les correspondances de Jacquet-Langlands et de Langlands locale pour les représentation supercuspidales de niveau $0$. La dernière difficulté consiste à vérifier que les actions des groupes $G^\circ:=\gln_{d+1}({\mathcal{O}}_K)$, $D^*$ et $W_K$ sur $\lt^1$ induisent les bons automorphismes sur la variété de Deligne-Lusztig pour pouvoir appliquer cette correspondance. Plus précisément, l'espace algébrique $\dl^d_{{\mathbb{F}}}$ est un revêtement galoisien de $\Omega^d_{{\mathbb{F}}}:={\mathbb{P}}_{{\mathbb{F}}}^d \backslash \bigcup_{H\in {\mathbb{P}}^d({\mathbb{F}})} H$ tel que $\gal (\dl^d_{{\mathbb{F}}}/\Omega^d_{{\mathbb{F}}})={\mathbb{F}}_{q^{d+1}}$ est cyclique d'ordre premier à $p$. De plus, il admet une action de $G^\circ$ qui commute à la projection du revêtement. Il s'agit alors de prouver que les actions des groupes ${\mathcal{O}}_D^*$ et $I_K$ sur $\lt^1$ se transporte à $\dl^d_{{\mathbb{F}}}$ et induisent des isomorphismes naturels :
\[
{\mathcal{O}}_D^* /(1+\Pi_D {\mathcal{O}}_D)\cong \gal (\dl^d_{{\mathbb{F}}}/\Omega^d_{{\mathbb{F}}})\cong I_K/I_{K_N}
\]
avec $N=q^{d+1}-1$ et $K_N=K(\varpi^{1/N})$.
Pour le groupe $I_K$, cela a été déjà fait par Yoshida dans sa thèse et le cas de ${\mathcal{O}}_D^*$ est essentiel pour étudier la correspondance de Jacquet-Langlands. Expliquons comment nous parvenons à traiter ce cas. Comme les actions de $I_K$ et de ${\mathcal{O}}_D^*$ commutent entre elles, on obtient une action de ${\mathcal{O}}_D^*$ sur la base $\Omega^d_{{\mathbb{F}}}$ qui commute avec celle de $G^\circ$. Nous nous ramenons alors à prouver le résultat technique suivant :
\begin{lemintro}\label{lemintroautdl}
On a
\[ \aut_{\gln_{d+1}({\mathbb{F}})}(\Omega^d_{\bar{{\mathbb{F}}}})= \{ 1 \}. \]
\end{lemintro}
En particulier, cette annulation montre que l'on a bien une flèche naturelle ${\mathcal{O}}_D^* \to \gal (\dl^d_{{\mathbb{F}}}/\Omega^d_{{\mathbb{F}}})$ qui induit une flèche ${\mathcal{O}}_D^* /(1+\Pi_D {\mathcal{O}}_D)\to \gal (\dl^d_{{\mathbb{F}}}/\Omega^d_{{\mathbb{F}}})$ car le groupe $1+\Pi_D {\mathcal{O}}_D$ est $N$-divisible alors que $ \gal (\dl^d_{{\mathbb{F}}}/\Omega^d_{{\mathbb{F}}})$ est de $N$-torsion. Par finitude et égalité des cardinaux, il suffit de montrer que cette flèche est injective.
Mais par description explicite de la cohomologie $l$-adique de $\lt^1$ et de $\dl^d_{{\mathbb{F}}}$ en tant que $\bar{{\mathbb{Q}}}_l[{\mathbb{F}}_{q^{d+1}}^*]$-module, l'identité est le seul élément qui agit par un automorphisme de trace non-nulle. Par formule de Lefschetz, il suffit alors de prouver que les éléments réguliers elliptiques de ${\mathcal{O}}_D^*$ qui ne sont pas dans $1+\Pi_D {\mathcal{O}}_D$ n'ont aucun point fixe dans $\lt^1(C)$. Cela se prouve en étudiant l'application des périodes $\pi_{GH}: \lt^1(C)\to {\mathbb{P}}^d(C)$ de Gross-Hopkins (cf \cite{grho}). Les points fixes dans le but sont faciles à déterminer et leur fibre est explicite. On peut alors montrer qu'il n'y a aucun point fixe dans chacune de ces fibres par calcul direct.
En particulier, le raisonnement précédent permet aussi de réaliser les correspondances de Jacquet-Langlands et de Langlands locale pour la cohomologie $l$-adique donnant ainsi une version plus forte du résultat principal de la thèse de Yoshida \cite{yosh} :
\begin{theointro}
\label{theointroprincet}
Fixons un isomorphisme $C\cong \bar{{\mathbb{Q}}}_l$. Pour $l$ premier à $p$, tout caractère primitif $\theta: {\mathbb{F}}_{q^{d+1}}^*\to C^*$, il existe des isomorphismes de $G^\circ\times W_K$-représentations
\[\homm_{D^*}(\rho(\theta), \hetc{i}(({\mathcal{M}}_{LT}^1/ \varpi^{{\mathbb{Z}}}),\bar{{\mathbb{Q}}}_l)\otimes C)\underset{G^{\circ}\times W_K}{\cong} \begin{cases} \dl(\theta) \otimes \wwwww(\theta) &\text{ si } i=d \\ 0 &\text{ sinon} \end{cases}\]
\end{theointro}
\subsection*{Remerciements}
Le présent travail a été, avec \cite{J1,J2,J3,J4}, en grande partie réalisé durant ma thèse à l'ENS de lyon, et a pu bénéficier des nombreux conseils et de l'accompagnement constant de mes deux maîtres de thèse Vincent Pilloni et Gabriel Dospinescu. Je les en remercie très chaleureusement. Je tenais aussi à exprimer ma reconnaissance envers Juan Esteban Rodriguez Camargo pour les nombreuses discussions sur les éclatements qui ont rendu possible la rédaction de ce manuscrit.
\subsection*{Conventions\label{paragraphconv}}
Dans tout l'article, on fixe $p$ un premier. Soit $K$ une extension finie de ${\mathbb{Q}}_p$ fixée, $\mathcal{O}_K$ son anneau des entiers, $\varpi$ une uniformisante et ${\mathbb{F}}={\mathbb{F}}_q$ son corps r\'esiduel. On note $C=\hat{\bar{K}}$ une complétion d'une clôture algébrique de $K$ et $\breve{K}$ une complétion de l'extension maximale non ramifiée de $K$. Soit $L\subset C$ une extension complète de $K$ susceptible de varier, d'anneau des entiers $\mathcal{O}_L$, d'idéal maximal ${\mathfrak{m}}_L$ et de corps r\'esiduel $\kappa$. $L$ pourra être par exemple spécialisé en $K$, $\breve{K}$ ou $C$.
Soit $S$ un $L$-espace analytique, on note ${\mathbb{A}}^n_{ S}={\mathbb{A}}^n_{ L}\times S$ l'espace affine sur $S$
L'espace ${\mathbb{B}}^n_S$ sera la boule unité et les boules ouvertes seront notées $\mathring{{\mathbb{B}}}^n_S$.
Si $X$ est un affinoïde sur $L$, on notera $X^\dagger$ l’espace surconvergent associé. Dans ce cas, le complexe de de Rham $\Omega_{X/L}^\bullet$ (resp. le complexe de de Rham surconvergent $\Omega_{X^\dagger/L}^\bullet$) qui calcule la cohomologie de de Rham $\hdr{*}(X)$ (resp. la cohomologie de de Rham surconvergent $\hdr{*}(X^\dagger)$). Quand $X$ est quelconque, ces cohomologies seront formées à partir de l’hypercohomologie de ces complexes. Par \cite[Proposition 2.5]{GK1}, le théorème $B$ de Kiehl \cite[Satz 2.4.2]{kie} et la suite spectrale de Hodge-de Rham, si $X$ est Stein, ces cohomologies sont encore calculées à partir de leur complexe respectif\footnote{En cohomologie de de Rham (non surconvergente), l'hypothèse $X$ quasi-Stein suffit.}. Les deux cohomologies coïncident si $X$ est partiellement propre (par exemple Stein).
La cohomologie rigide d'un schéma algébrique $Y$ sur $\kappa$ sera notée $\hrig{*} (Y/L)$. Si $X$ est un espace rigide sur $L$ et $Y$ un schéma algébrique sur $\kappa$, $\hdrc{*} (X^\dagger)$ et $\hrigc{*} (Y/L)$ seront les cohomologies de $X^\dagger$ et de $Y$ à support compact. On rappelle la dualité de Poincaré :
\begin{theo} \label{theodualitepoinc}
\begin{enumerate}
\item \cite[proposition 4.9]{GK1} Si $X$ est un $L$-affinoïde lisse de dimension pure $d$, on a \[\hdr{i} (X^\dagger)\cong \hdrc{2d-i} (X^\dagger)^\lor \text{ et } \hdrc{i} (X^\dagger)\cong \hdr{2d-i} (X^\dagger)^\lor\]
\item \cite[proposition 4.11]{GK1} Si $X$ est un $L$-espace lisse et Stein de dimension pure $d$, on a \[\hdr{i} (X^\dagger)\cong \hdrc{2d-i} (X^\dagger)^\lor \text{ et } \hdrc{i} (X^\dagger)\cong \hdr{2d-i} (X^\dagger)^\lor\]
\item \cite[théorème 2.4]{bert1} Si $Y$ est un schéma algébrique lisse sur $\kappa$ de dimension $d$, on a pour tout $i$ \[\hrig{i} (Y/L)\cong \hrigc{2d-i} (Y/L)^\lor \text{ et } \hrigc{i} (Y/L)\cong \hrig{2d-i} (Y/L)^\lor\]
\end{enumerate}
\end{theo}
Nous donnons un théorème de comparaison :
\begin{theo}\label{theopurete}
\cite[proposition 3.6]{GK3}
Soit ${\mathcal{X}}$ un schéma affine formel sur $\spf ({\mathcal{O}}_L)$ de fibre spéciale ${\mathcal{X}}_s$ et de fibre générique ${\mathcal{X}}_\eta$. Supposons ${\mathcal{X}}$ lisse, alors on a un isomorphisme fonctoriel \[\hdr{*}({\mathcal{X}}_\eta^\dagger)\cong \hrig{*}({\mathcal{X}}_s)\]
\end{theo}
Dans ce paragraphe, $L$ est non-ramifié sur $K$. Soit ${\mathcal{X}}$ un schéma formel topologiquement de type fini sur $\spf ({\mathcal{O}}_L)$ de fibre g\'en\'erique ${\mathcal{X}}_\eta$ et de fibre sp\'eciale ${\mathcal{X}}_s$. On a une flèche de spécialisation $\spg: {\mathcal{X}}_\eta \rightarrow {\mathcal{X}}_s$ et pour tout fermé $Z\subset {\mathcal{X}}_s$, on note $]Z[_{{\mathcal{X}}}$ l'espace analytique $\spg^{-1} (Z)\subset {\mathcal{X}}_\eta$.
\begin{defi
On dit que ${\mathcal{X}}$ est faiblement de réduction semi-stable généralisé s'il admet un recouvrement ${\mathcal{X}}=\uni{U_t}{t\in T}{}$ et un jeu de morphisme fini étale \[\varphi_t : U_t\to \spf ({\mathcal{O}}_L\left\langle x_1,\cdots , x_d\right\rangle/(x_1^{\alpha_1}\cdots x_r^{\alpha_r}-\varpi )).\]
\end{defi}
Quitte à rétrécir les ouverts $U_t$ et à prendre $r$ minimal, on peut supposer que les composantes irréductibles $\bar{U}_t$ sont les $V(\bar{x}^*_i)$ pour $i\leq r$ avec $\bar{x}^*_i =\bar{\varphi}_t (\bar{x}_i)$ et ont multiplicités $\alpha_i$.
Observons que pour schéma formel semi-stable ${\mathcal{X}}$, on vérifie aisément que ${\mathcal{X}}$ est ponctuellement de réduction semi-stable généralisé au sens suivant.
\begin{defi
Un schéma formel est ponctuellement de réduction semi-stable généralisé si l'anneau local complété en chacun des points fermés et de la forme
\[{\mathcal{O}}_L\left\llbracket x_1,\cdots , x_d\right\rrbracket /(x_1^{\alpha_1}\cdots x_r^{\alpha_r}-\varpi ).\]
\end{defi}
Cette notion plus faible nous permet par exemple de considérer des schémas formels qui ne sont pas localement des complétions $p$-adiques de schémas algébriques de type fini sur ${\mathcal{O}}_L$. Par exemple, l'espace lui-même $\spf({\mathcal{O}}_L\left\llbracket x_1,\cdots , x_d\right\rrbracket /(x_1^{\alpha_1}\cdots x_r^{\alpha_r}-\varpi ))$ est ponctuellement semi-stable généralisé alors qu'il n'est pas semi-stable généralisé d'après la remarque précédent. Le résultat suivant suggère que sous l'hypothèse d'être localement la complétion $p$-adique d'un schéma algébrique de type fini sur ${\mathcal{O}}_L$, les deux notions de semi-stabilité sont en quelque sorte équivalentes.
\begin{prop
Si ${\mathcal{X}}$ est un schéma formel ponctuellement semi-stable généralisé qui admet une immersion ouverte vers un schéma formel ${\mathcal{Y}}$ qui est localement la complétion $p$-adique de schémas algébriques de type fini sur ${\mathcal{O}}_L$, alors il existe un voisinage étale $U$ de ${\mathcal{X}}$ dans l'espace ambiant ${\mathcal{Y}}$ qui est semi-stable généralisé.
\end{prop}
\begin{proof}
Voir la preuve de \cite[Propositions 4.8. (i)]{yosh}
\end{proof}
L'intérêt des espaces semi-stables que nous avons introduits provient du fait que leur géométrie fait naturellement apparaître des recouvrements dont on peut espérer calculer la cohomologie des intersections grâce à \ref{theopurete} et au résultat qui va suivre. Pour pouvoir énoncer ce dernier, nous introduisons quelques notations pour un schéma formel semi-stable généralisé ${\mathfrak{X}}$ (au sens le plus fort) dont la fibre spéciale admet la décomposition en composantes irréductibles ${\mathcal{X}}_s=\bigcup_{i\in I} Y_i$. Pour toute partie finie $J\subset I$ de l'ensemble des composantes irréductibles, on note $Y_J=\inter{Y_j}{j\in J}{}$ et $Y_J^{lisse}=Y_{J}\backslash \bigcup_{i\notin J}Y_i$. Le résultat est le suivant
\begin{theo}\label{theoexcision}
Étant donné un schéma formel semi-stable généralisé ${\mathcal{X}}$ comme précédemment avec pour décomposition en composantes irréductibles ${\mathcal{X}}_s=\bigcup_{i\in I} Y_i$, pour toute partie finie $J\subset I$, la flèche naturelle de restriction
\[\hdr{*} (\pi^{-1}(]Y_J[_{\mathcal{X}}))\fln{\sim}{} \hdr{*} (\pi^{-1}(]Y_{J}^{lisse}[_{\mathcal{X}}))\]
est un isomorphisme.
\end{theo}
\begin{proof}
Il s'agit de la généralisation du résultat pour le cas semi-stable \cite[Theorem 2.4.]{GK2} au cas semi-stable généralisé réalisée dans \cite[Théorème 5.1.]{J4}.
\end{proof}
\section{La tour de revêtements}
Nous allons d\'efinir la tour de Lubin-Tate construite dans \cite[section 1 et 4]{dr1}.
Soit ${\mathcal{C}}$ la sous-cat\'egorie pleine des ${\mathcal{O}}_{\breve{K}}$-alg\`ebres locales noeth\'eriennes et compl\`etes $A$ telles que le morphisme naturel ${\mathcal{O}}_{\breve{K}}/ \varpi{\mathcal{O}}_{\breve{K}} \to A/ {\mathfrak{m}}_A$ soit un isomorphisme. On consid\`ere, pour $A$ un objet de ${\mathcal{C}}$, l'ensemble des ${\mathcal{O}}_K$-modules formels $F$ sur $A$ modulo isomorphisme. On note $X+_{F} Y\in A\left\llbracket X,Y\right\rrbracket$ la somme et $[ \lambda ]_F X\in A\left\llbracket X\right\rrbracket$ la multiplication par $\lambda$ dans $F$.
Si $A$ est de caract\'eristique $p$, on appelle hauteur le plus grand entier $n$ (possiblement infini) tel que $[ \varpi ]_F$ se factorise par ${\rm Frob}_q^n$. On a le r\'esultat classique (voir par exemple \cite[chapitre III, §2, théorème 2]{frohlforgr}) : %
\begin{prop}
Si $A= \bar{{\mathbb{F}}}$, la hauteur est un invariant total i.e. deux ${\mathcal{O}}_K$-modules formels sont isomorphes si et seulement si ils ont la m\^eme hauteur.
\end{prop}
Fixons un repr\'esentant "normal" $\Phi_d$ de hauteur $(d+1)$ tel que :
\begin{enumerate}
\item $[ \varpi ]_{\Phi_d} X\equiv X^{q^{d+1}} \pmod{X^{q^{d+1}+1}}$,
\item $X +_{\Phi_d} Y\equiv X+Y \pmod{ (X,Y)^2}$,
\item $[ \lambda ]_{\Phi_d} X\equiv \lambda X \pmod{X^2}$ pour $\lambda \in {\mathcal{O}}_K$.
\end{enumerate}
\begin{defi}
On appelle $\widehat{{\mathcal{M}}}^0_{ LT}$ le foncteur qui \`a un objet $A$ dans ${\mathcal{C}}$ associe les doublets $(F, \rho)$ \`a isomorphisme pr\`es o\`u :
\begin{enumerate}
\item $F$ est un ${\mathcal{O}}_K$-module formel sur $A$ de hauteur $d+1$,
\item $\rho : F \otimes A/ {\mathfrak{m}}_A \to \Phi_d$ est une quasi-isog\'enie.
\end{enumerate}
On d\'efinit ${\mathcal{F}}^{0,(h)}_{ LT}$ le sous-foncteur de $\widehat{{\mathcal{M}}}^0_{ LT}$ des doublets $(F, \rho)$ o\`u $\rho$ est une quasi-isog\'enie de hauteur $h$.
\end{defi}
\begin{theo}[Drinfeld \cite{dr1} proposition 4.2]
Le foncteur ${\mathcal{F}}^{0,(0)}_{ LT}$ est repr\'esentable par $\widehat{\lt}^0=\spf (A_0)$ o\`u $A_0$ est isomorphe \`a ${\mathcal{O}}_{\breve{K}} \llbracket T_1, \dots, T_d \rrbracket$.
Le foncteur $\widehat{{\mathcal{M}}}^0_{LT}$ se d\'ecompose en l'union disjointe $\coprod_h {\mathcal{F}}^{0,(h)}_{LT}$, chaque $ {\mathcal{F}}^{0,(h)}_{LT}$ étant isomorphe non-canoniquement à $ {\mathcal{F}}^{0,(0)}_{LT}$.
\end{theo}
D\'efinissons maintenant les structures de niveau.
\begin{defi}
Soit $n$ un entier sup\'erieur ou \'egal \`a 1. Soit $F$ un ${\mathcal{O}}_K$-module formel sur $A$ de hauteur $d+1$, une $(\varpi)^n$-structure de niveau est un morphisme de ${\mathcal{O}}_K$-modules formels $\alpha : ((\varpi)^{-n}/ {\mathcal{O}}_K)^{d+1} \to F \otimes {\mathfrak{m}}_A$ qui v\'erifie la condition :
\[ \prod_{x \in ((\varpi)^{-n}/ {\mathcal{O}}_K)^{d+1}} (X - \alpha(x)) \; | \; [ \varpi^n ](X) \]
dans $A \llbracket X \rrbracket$.
Si $(e_i)_{ 0 \le i \le d}$ est une base de $((\varpi)^{-n}/ {\mathcal{O}}_K)^{d+1}$, le $(d+1)$-uplet $(\alpha(e_i))_i$ est appel\'e syst\`eme de param\`etres formels.
On note $\widehat{{\mathcal{M}}}^n_{LT}$ le foncteur classifiant, pour tout objet $A$ de ${\mathcal{C}}$, les triplets $(F, \rho, \alpha)$ o\`u $(F, \rho) \in \widehat{{\mathcal{M}}}^0_{LT}(A)$ et $\alpha$ est une $(\varpi)^n$-structure de niveau. On d\'efinit de m\^eme par restriction, ${\mathcal{F}}^{n,(h)}_{LT}$.
\end{defi}
\begin{theo}[Drinfeld \cite{dr1} proposition 4.3]
\label{theoreplt}
\begin{enumerate}
\item Le foncteur ${\mathcal{F}}^{n,(0)}_{LT}$ est repr\'esentable par $\widehat{\lt}^n=\spf (A_n)$ o\`u $A_n$ est local de dimension $d+1$, r\'egulier sur $A_0$. Le morphisme $A_0 \to A_n$ est fini et plat de degr\'e $\card(\gln_{d+1}({\mathcal{O}}_K/ \varpi^n {\mathcal{O}}_K))= q^{(d+1)^2(n-1)} \prod_{i=0}^d (q^{d+1}-q^i)$.
\item Si $(F^{univ}, \rho^{univ}, \alpha^{univ})$ est le groupe formel universel muni de la structure de niveau universelle, tout syst\`eme de param\`etres formels $(x_i)_i$ engendre topologiquement $A_n$ i.e. on a une surjection :
\begin{align*}
{\mathcal{O}}_{\breve{K}} \llbracket X_0, \dots, X_d \rrbracket & \to A_n \\
X_i & \mapsto x_i
\end{align*}
\item L'analytification $\lt^n=\widehat{\lt}^{n,rig}$ est lisse sur $\breve{K}$ et le morphisme $\lt^n\to \lt^0$ est un revêtement étale de groupe de Galois $\gln_{d+1} ({\mathcal{O}}_K/\varpi^n {\mathcal{O}}_K)=\gln_{d+1} ({\mathcal{O}}_K)/(1+\varpi^n {\rm M}_{d+1}({\mathcal{O}}_K))$.
\end{enumerate}
\end{theo}
\section{\'Equation des rev\^etements et géometrie de la fibre spécial de $\widehat{\lt}^1=Z_0$ \label{sssectionltneq}}
D'apr\`es le th\'eor\`eme \ref{theoreplt}, on a une suite exacte :
\[ 0 \to I_n \to {\mathcal{O}}_{\breve{K}} \llbracket X_0, \dots, X_d \rrbracket \to A_n \to 0 \]
associ\'ee \`a un syst\`eme de param\`etres formels $x=(x_0, \dots, x_d)$.
Nous allons tenter de d\'ecrire explicitement l'id\'eal $I_n$. D'après la suite exacte précédente, on a une immersion fermée $Z_0\rightarrow \spf {\mathcal{O}}_{\breve{K}} \llbracket X_0, \dots, X_d \rrbracket $ de codimension $1$ entre deux schémas réguliers. L'idéal $I_n$ est donc principal. Pour obtenir un générateur, il suffit d'exhiber un élément de $I_n\backslash {\mathfrak{m}}^2$ avec ${\mathfrak{m}}=(\varpi, X_0,\cdots, X_d)$ l'id\'eal maximal de ${\mathcal{O}}_{\breve{K}} \llbracket X_0 , \dots, X_d \rrbracket$. Nous écrivons aussi $\bar{{\mathfrak{m}}}=(X_0,\cdots, X_d)$ l'idéal maximal de $\bar{{\mathbb{F}}} \llbracket X_0 , \dots, X_d \rrbracket$ et ${\mathfrak{m}}_{A_n}$ l'id\'eal maximal de $A_n$.
Inspirons-nous de \cite[3.1]{yosh}. Si $z=(z_0, \dots , z_m)$ est un $(m+1)$-uplet de points de $\varpi^n$-torsion pour $F^{univ}$ et $a \in ({\mathcal{O}}_K / \varpi^n {\mathcal{O}}_K)^{m+1}$ (par exemple $m=d$), on note \[l_{a, F}(z)=[\tilde{a}_0]_{F^{univ}} (z_0)+_{F^{univ}}\cdots +_{F^{univ}} [\tilde{a}_m]_{F^{univ}} (z_m)\] où $\tilde{a}_i$ est un relevé de $a_i$ dans ${\mathcal{O}}_K$ pour tout $i$. Par d\'efinition de la structure de niveau, on a la relation
\[ [ \varpi^k](T)= U_k(T) \prod_{a \in ({\mathcal{O}}_K/ \varpi^k {\mathcal{O}}_K)^{d+1}} (T- l_{a, F}(x)) \]
pour $k\leq n$, o\`u $U_k$ est une unit\'e telle que $U_k(0) \in 1+ {\mathfrak{m}}_{A_n}$. En comparant les termes constants de $[\varpi^n](T)/ [\varpi^{n-1}](T)$, on obtient
\[ \varpi = (-1)^{q^{n-1}(q-1)}U_n(0)/U_{n-1}(0) \prod_{a \in ({\mathcal{O}}_K/ \varpi^n {\mathcal{O}}_K)^{d+1} \backslash (\varpi {\mathcal{O}}_K/ \varpi^n {\mathcal{O}}_K)^{d+1} )} l_{a, F}(x)=:P. \]
Comme la fl\`eche ${\mathfrak{m}} \to {\mathfrak{m}}_{A_n}$ est surjective, on peut relever $U_n(0)/U_{n-1}(0)$ en un \'el\'ement $\tilde{U}(X_0, \dots, X_d)$ de $1+{\mathfrak{m}}$ et $l_{a,F} (x)$ en une série $l_{a,F}(X_0,\ldots, X_d)$ dans ${\mathcal{O}}_{\breve{K}} \llbracket X_0 , \ldots, X_d \rrbracket$. Par construction, $\varpi-P$ est un élément de $I_n$. Pour prouver qu'il n'est pas dans ${\mathfrak{m}}^2$, on vérifie les congruences suivantes
\begin{prop}[\cite{yosh} Proposition 3.4]
\label{PropConglaF}
\begin{enumerate}
\item Pour tout $a\in({\mathcal{O}}_K/\varpi^n {\mathcal{O}}_K)^{d+1}$, on a \[l_{a,F} (X)\equiv l_{a}(X) \pmod{(\varpi^n,X_0,\cdots,X_d)^2}\] où $l_{a}(X)={a}_0 X_0+\cdots + {a}_d X_d$.
\item Soit $a=ca'\in ({\mathcal{O}}_K/\varpi^n {\mathcal{O}}_K)^{d+1}$ avec $c$ une unité de ${\mathcal{O}}_K/\varpi^n {\mathcal{O}}_K$, alors il existe une unité $u_c$ de ${\mathcal{O}}_{\breve{K}} \llbracket X_0 , \dots, X_d \rrbracket$ telle que $l_{a,F}(X)=u_c(X) l_{a',F}(X)$.
\item S'il existe $j\leq d+1$ tel que $a_{j+1}=\cdots=a_d=0$ (la condition devient vide si $j=d+1$) alors $l_{a,F}(X)\in {\mathcal{O}}_{\breve{K}}\llbracket X_0,\ldots, X_j\rrbracket$.
\end{enumerate}
\end{prop}
Le théorème suivant s'en déduit
\begin{theo}
\label{theolteq}
On a $I_n=(\varpi-P(X))$. Dit autrement, \[A_n={\mathcal{O}}_{\breve{K}} \llbracket X_0 , \dots, X_d \rrbracket/(\varpi-P(X)).\] Ainsi, $\lt^n$ s'identifie à l'hypersurface de la boule unité rigide ouverte de dimension $d+1$ d'équation $\varpi=P(X)$.
\end{theo}
\section{Généralités sur les éclatements}
Nous commençons par donner quelques faits généraux sur les éclatements. Nous pourrons ainsi construire des modèles convenables de $\lt^1$.
\begin{defi}
Soit $X$ un schéma algébrique, ${\mathscr{I}} \subset {\mathscr{O}}_X$ un faisceau d'idéaux et $Y\to X$ l'immersion fermée associée. L'éclatement $\bl_Y (X)$ (ou $\tilde{X}$) de $X$ le long de $Y$ est l'espace propre sur $X$
\[
p: \underline{\proj}_X (\oplus_n {\mathscr{I}}^n) \rightarrow X.
\]
Le fermé $E:=p^{-1}(Y)=V({\mathscr{I}} {\mathscr{O}}_{\tilde{X}})= V^+(\oplus_{n} {\mathscr{I}}^{n+1})$ est appelé le diviseur exceptionnel.
\end{defi}
\begin{defi}\label{defitrans}
Reprenons les notations précédentes, si $Z\to X$ est une immersion fermée, on note
\[
\tilde{Z}=\begin{cases}
p^{-1}(Z) & \text{Si } Z\subset Y, \\
\overline{p^{-1}(Z\backslash Y)} & \text{Sinon}
\end{cases}
\]
Dans le deuxième cas $\tilde{Z}$ est appelé le transformé stricte de $Z$.
\end{defi}
Nous énonçons les résultats principaux sur les éclatements que nous utiliserons:
\begin{theo}
\label{theoBlowUp}
Soit $X$ un schéma algébrique, $Y\to X$ et $Z\to X$ deux immersions fermées, $E\subset \bl_Y(X)=\tilde{X}$ le diviseur exceptionnel. Les points suivants sont vérifiés:
\begin{enumerate}
\item (Propriété universelle) $E\rightarrow \tilde{X}$ est un diviseur de Cartier (i.e. ${\mathscr{I}} {\mathscr{O}}_{\tilde{X}}$ est localement libre de rang $1$). Si $ f:T\to X$ est un morphisme tel que $f^{-1}(Y)$ est un diviseur de Cartier, il existe un unique morphisme sur $X$
\[
g: T\rightarrow \tilde{X}
\]
tel que $g^{-1}(E)=f^{-1}(Y)$.
\item (Compatibilité avec les immersions fermées) Supposons que $Z=V({\mathscr{J}}) \nsubseteq Y$. On a un isomorphisme canonique $\bl_{Z\cap Y}(Z)\cong \tilde{Z}\subset \tilde{X}$. En particulier, $\tilde{Z}=V^+(\bigoplus_n( {\mathscr{J}}\cap {\mathscr{I}}^n))$
\item (Compatibilité avec les morphismes plats) Si $f:T\rightarrow X$ est un morphisme plat, alors on a un isomorphisme canonique $\bl_{f^{-1}(Y)} (T) \cong \bl_{Y}(X)\times_{X,f} T$. En particulier, si $T=X\backslash Y$ la projection $p$ induit un isomorphisme $p^{-1}(X\backslash Y)\rightarrow X\backslash Y$.
\item (Éclatement le long d'une immersion régulière) Si $Y\rightarrow X$ est une immersion régulière alors
$p|_E: E\rightarrow Y$ est une fibration localement triviale en espace projectif de dimension $d-1$ où $d=\dim X -\dim Y$. De plus, si $Z$ est irréductible alors $\tilde{Z}$ l'est aussi.
\end{enumerate}
\end{theo}
\begin{proof}
Le point 1. est prouvé dans \cite[\href{https://stacks.math.columbia.edu/tag/0806}{Tag 0806}]{stp} (voir \href{https://stacks.math.columbia.edu/tag/0805}{Tag 0805} pour le point 3. et \href{https://stacks.math.columbia.edu/tag/080D}{Tag 080D}, \href{https://stacks.math.columbia.edu/tag/0806}{Tag 080E} pour le point 2.). Supposons maintenant que $Y\rightarrow X$ est une immersion régulière. On a
\[
E= \underline{\proj}_X({\mathscr{O}}_{\tilde{X}}/ {\mathscr{I}} {\mathscr{O}}_{\tilde{X}})= \underline{\proj}_X(\bigoplus_{n} {\mathscr{I}}^n/ {\mathscr{I}}^{n+1})=\underline{\proj}_{X}(\underline{\sym}_{X} {\mathscr{N}}_{Y/X}^\vee )
\]
avec ${\mathscr{N}}_{Y/X}^\vee$ le faisceau conormal de $Y$ sur $X$. L'hypothèse de régularité entraîne le caractère localement libre de ${\mathscr{N}}_{Y/X}^\vee$ ce qui montre que $p|_E:E\to Y$ est une fibration localement triviale en espace projectif de dimension $d-1$.
Prenons $Z\subset X$ un fermé irréductible. Si $Z\subset Y$ alors $p^{-1}(Z)\rightarrow Z$ est une fibration localement triviale dont la base et la fibre sont irréductibles. Ainsi $\tilde{Z}=p^{-1}(Z)$ est irréductible. Si $Z\nsubseteq Y$ alors $\tilde{Z}$ est la clôture de $p^{-1}(Z\backslash Y)\cong Z\backslash Y$ (d'après le point 2.). Mais $Z\backslash Y$ est irréductible en tant qu'ouvert de $Z$, d'où l'irréductibilité de $\tilde{Z}$.
\end{proof}
\begin{rem}\label{rembladm}
Si $X$ est une schéma formel localement noethérien muni de la topologie ${\mathscr{I}}$-adique, et $Z\subset X$ est un fermé de la fibre spéciale, on peut définir l'éclatement admissible:
\[
\bl_Z(X)= \varinjlim_k \bl_{Z\times_X V({\mathscr{I}}^k)}(V({\mathscr{I}}^k))
\]
où $V({\mathscr{I}}^k)$ est le schéma fermé définit par ${\mathscr{I}}^k$.
\end{rem}
\section{Transformée stricte et régularité}
Le but de cette section est de comprendre comment se comporte les immersions fermées régulières $Z_1\to Z_2$ lorsque l'on prend la transformée stricte de deux fermés $Z_1$, $Z_2$ d'un espace $X$ que l'on éclate. Le théorème suivant donne des critères précis pour assurer que l'immersion fermée obtenue entre les transformées $\tilde{Z}_1\to \tilde{Z}_2$ reste encore régulière. Il y est donné aussi le calcul de la transformée d'une intersection de fermé dans des cas particuliers.
\begin{theo}\label{theoblreg}
Donnons-nous un schéma algébrique $X$ et des fermés $Y,Z_1,Z_2\subset X$ et écrivons $p:\tilde{X}=\bl_Y (X)\to X$ (en particulier, $\tilde{Y}$ est le diviseur exceptionnel). On a les points suivants :
\begin{enumerate}
\item Si on a $Y\subset Z_1$, $Z_1\subset Z_2$, $Z_2\subset X$ et si ces inclusions sont des immersions régulières, alors les immersions $\tilde{Y}\cap \tilde{Z}_1\subset \tilde{Z}_1$, $\tilde{Z}_1\subset \tilde{Z}_2$ sont régulières de codimension $1$ pour la première et $\codim_{Z_2}Z_1 $ pour la seconde. En particulier, la flèche $\tilde{Z}_1\subset \tilde{X}$ est régulière en considérant le cas $\tilde{Z}_2=\tilde{X}$.
\item Si on a les immersions régulières suivantes $Y\subset Z_1\cap Z_2$, $Z_1\cap Z_2\subset Z_i$, $Z_i\subset X$ alors \[\tilde{Z}_1\cap \tilde{Z}_2=\begin{cases}
\emptyset &\text{Si } Z= Z_1\cap Z_2,\\
\widetilde{Z_1\cap Z_2} &\text{Sinon}
\end{cases}\]
\item Si $Z_1$ et $Y$ sont transverses et si les inclusions $Z_1\cap Y\subset Y$, $Y\subset X$ sont des immersions régulières, alors $\tilde{Z}_1=p^{-1}(Z_1)$ et $\tilde{Z}_1\cap \tilde{Y}\subset \tilde{Y}$ est régulière de codimension $\codim_Y (Z_1\cap Y)$.
\item Si $Z_1$ et $Y$ sont transverses et $Y\subset Z_2$, $Z_2\subset X$ sont des immersions régulières, alors $\tilde{Z}_1\cap \tilde{Y}$ et $\tilde{Z}_2$ sont transverses.
\end{enumerate}
\end{theo}
\begin{rem}\label{remsuitreg}
Les hypothèses des points précédents peuvent se réécrire en termes de suites régulières. Par exemple, les deux premiers points supposent localement l'existence d'une suite régulière $(x_1,\cdots,x_s)$ et de deux sous-ensembles $S_1, S_2 \subset \left\llbracket 1,s\right\rrbracket$ (avec $S_2\subset S_1$ pour le premier point) tel que $Y=V(x_1,\cdots,x_s)$, $Z_i=V((x_j)_{j\in S_i})$ pour $i=1,2$. Pour le troisième point, on demande localement en plus de la suite régulière $(x_1,\cdots,x_s)$ l'existence d'une partition $\left\llbracket 1,s\right\rrbracket=T\amalg S$ tel que $Y=V((x_j)_{j\in T})$ et $Z_1=V((x_j)_{j\in S})$ et le dernier point est une synthèse des cas précédents. Nous laissons au lecteur le soin de trouver des interprétations similaires aux conclusions de l'énoncé en termes de suites régulières locales.
\end{rem}
\begin{proof}
On remarque que les conclusions du théorème peuvent se vérifier localement. De plus, on a pour tout ouvert $U=\spec (A)\subset X$ affine d'après \ref{theoBlowUp} 2., 3.:
\[
p^{-1}(U)=\bl_{U\cap Y} U \text{ et } \tilde{Z}_i\cap p^{-1}(U) =\bl_{Z_i\cap U\cap Y} Z_i\cap U =\widetilde{Z_i\cap U},
\]
on peut se ramener à étudier les objets qui vont suivre quand $X=U=\spec (A)$ et $Y\subset U$. Donnons-nous une suite régulière $(x_1,\cdots, x_s)$ dans $A$, et introduisons pour tout sous-ensemble $S\subset \left\llbracket 1,s\right\rrbracket$, des idéaux $I_S =\sum_{j\in S} x_j A$ et des fermés $Z_S=V(I_S)$. On fixe $S_0$ et on pose $Y=Z_{S_0}$, $p:\tilde{X}=\bl_{Y}(X)\to X$. On construit comme dans \ref{defitrans} les transformées strictes $\tilde{Y}_S$ de $Y_S$ (pour $S_0\nsubseteq S$) et on note $\tilde{{\mathscr{I}}}_S\subset {\mathscr{O}}_{\tilde{X}}$ les idéaux associés. D'après la Remarque \ref{remsuitreg}, il suffit de prouver le résultat local suivant :
\begin{lem}
\label{lemReg2}
En reprenant les notations précédentes $X=\spec A$, $Y$, $Z_S $, $p:\tilde{X}\to X$, $\tilde{Y}$, $\tilde{Z}_S$, on a les points suivantes
\begin{enumerate}
\item Si $S_1$ est une partie de $S_0$ et $n \geq 1$, on a $I_{S_1}\cap I_{S_0}^n= I_{S_1} I_{S_0}^{n-1}$. En particulier, si $S_1$, $S_2$ sont deux parties de $S_0$, on a \[\tilde{Z}_{S_1}\cap \tilde{Z}_{S_0}=\begin{cases}
\emptyset &\text{Si } S_0= S_1\cup S_2,\\
\tilde{Z}_{S_1\cup S_0} &\text{Sinon}
\end{cases}\
\item Si $S_1$ est une partie de $\left\llbracket 1,s\right\rrbracket$ disjointe de $S_0$ et $n \geq 1$, on a $I_{S_1}\cap I_{S_0}^n=I_{S_1} I_{S_0}^n $. Dans ce cas, on a $ \tilde{Z}_{S_1}= p^{-1}(Z_{S_1})$.
\item Il existe un recouvrement affine de $\tilde{X}= \bigcup_{i\in S_0} U_i$ tel que pour tout $i$, il existe une suite régulière $(\tilde{x}_1^{(i)}, \ldots, \tilde{x}_s^{(i)})\in {\mathscr{O}}(U_i)$ vérifiant
\begin{itemize}
\item[•] $\widetilde{Z_{S_1}}\cap U_i =\emptyset$ si $i\in S_1\subsetneq S_0$.
\item[•] $ V((\tilde{x}_j)_{j\in S_1})=\tilde{Z}_{S_1}\cap U_i$ si $S_1\subset S_0\backslash\{i\}$ ou si $S_1\cap S_0 =\emptyset$.
\item[•] $\tilde{Y}\cap U_i= V(\tilde{x}_i)$.
\end{itemize}
\item Si $S_1$ est une partie stricte de $S_0$ et $S_2$ est disjointe de $S_0$, on a $\tilde{Z}_{S_1}\cap \tilde{Z}_{S_2}$ (resp. $\tilde{Z}_{S_0}\cap \tilde{Z}_{S_1}\cap \tilde{Z}_{S_2}$) est de codimension $|S_1|+|S_2|$ (resp. $|S_1|+|S_2|+1$).
\end{enumerate}
\end{lem}
\end{proof}
\begin{proof}
Commençons par prouver pour tout $n>1$, les égalités entre idéaux suivantes pour $S_1\subset\left\llbracket 1,s\right\rrbracket$ :
\[I_{S_1}\cap I_{S_0}^n=\begin{cases} I_{S_1} I_{S_0}^{n-1} &\text{Si } S_1\subset S_0\\
I_{S_1} I_{S_0}^n & \text{Si } S_1\cap S_0 =\emptyset
\end{cases}\]
Nous commençons par cette observation utile qui permettra de réduire la preuve du résultat au cas $n=1$.
\begin{claim}\label{claimreg}
Reprenons la suite régulière $(x_1,\cdots,x_s)$ dans $A$, pour $T_1\subset T_2\subset\left\llbracket 1,s\right\rrbracket$ et n'importe quel idéal $J$, on a l'identité suivante :
\[I_{T_1}J \cap I_{T_2}^n=I_{T_1} (J\cap I_{T_2}^{n-1})\]
\end{claim}
\begin{proof}
Prenons un élément $x\in I_{T_2}$ et écrivons-le sous la forme :
\[
y=\sum_{t\in T_2} x_t a_t.
\]
L'hypothèse de régularité de la suite $(x_1,\cdots,x_s)$ entraîne que l'élément $y$ est dans $I^n_{T_2} $ si et seulement si chaque terme $a_t$ est dans $ I^{n-1}_{T_2}$ (dit autrement $I^{}_{T_2}/I^{n}_{T_2}\cong \bigoplus_{t\in T_2}x_{t} A/I^{n-1}_{T_2}$). En particulier, si chaque $a_t$ est dans $J$ (c'est-à-dire $y\in I_{T_2}J$) et $y\in I_{T_2}^n$ alors nous avons $a_t\in J\cap I_{T_2}^{n-1}$ ce qui montre l'inclusion $(I_{T_2}^{n-1} J )\cap I^n_{T_2} \subset I_{T_2}(J\cap I_{T_2}^{n-1})$ quand $T_1=T_2$. Celle dans l'autre sens étant triviale, on en déduit le résultat dans ce cas.
Si, de plus, $a_t=0$ quand $t\notin T_1$ (ie. $y\in (I_{T_1}J)\cap I_{T_2}^n$) alors $y\in I_{T_1}(J\cap I_{T_2}^{n-1})$) grâce au raisonnement précédent. Le cas plus général s'en déduit.
\end{proof}
Utilisons cette observation pour prouver les égalités précédentes et supposons qu'elle sont vraies au rang $n$ pour $n\ge 1$ (ainsi qu'au rang 1). On a alors pour $S_1\subset \left\llbracket 1,s\right\rrbracket$
\[I_{S_1}\cap I_{S_0}^{n+1}=I_{S_1}\cap I_{S_0}^{n}\cap I_{S_0}^{n+1}= (I_{S_1} I_{S_0}^{n-1})\cap I_{S_0}^{n+1}=I_{S_1} (I_{S_0}^{n-1}\cap I_{S_0}^{n})=I_{S_1} I_{S_0}^{n}\]
si $S_1\subset S_0$ et
\[I_{S_2}\cap I_{S_0}^{n+1}=I_{S_2}\cap I_{S_0}\cap I_{S_0}^{n+1}=(I_{S_0} I_{S_2} )\cap I_{S_0}^{n+1}=I_{S_0} (I_{S_2}\cap I_{S_0}^{n})=I_{S_2} I_{S_0}^{n+1}\] si $S_1\cap S_0 =\emptyset$. On en déduit le résultat au rang $n+1$.
Nous nous sommes ramenés au cas $n=1$ où on a clairement $I_{S_1}\cap I_{S_0}=I_{S_1}$ si $S_1\subset S_0$ ce qui prouve la première équation. Quand $S_1\cap S_0 =\emptyset$, on raisonne par récurrence sur $|S_1|$. Si $|S_1|=0$, on pose $I_{S_1}=0$ et le résultat est trivial. Supposons le résultat vrai pour pour les parties strictes de $S_1\neq\emptyset$ et fixons $j_0\in I_{S_1}$. Par hypothèse de récurrence, on a $I_{S_1\backslash\{j_0\}}\cap I_{S_0}=I_{S_1\backslash\{j_0\}} I_{S_0}$. Il suffit de montrer que la flèche naturelle $ I_{S_1}I_{S_0}/I_{S_1\backslash\{j_0\}}I_{S_0} \to I_{S_1}\cap I_{S_0}/I_{S_1\backslash\{j_0\}}\cap I_{S_0}$ est un isomorphisme par théorème de Noether. Observons le diagramme de $A$-modules commutatif suivant
\[
\begin{tikzcd}
I_{S_1}I_{S_0} \ar[r] & I_{S_1}\cap I_{S_0} \\ I_{S_0} \ar[r] \ar[u, "\times x_{j_0}"]& I_{S_0} \ar[u, "\times x_{j_0}"']
\end{tikzcd}
\]
et montrons qu'il induit un diagramme commutatif (nous allons justifier que les flèches verticales sont bien définies)
\[
\begin{tikzcd}
I_{S_1}I_{S_0}/ I_{S_1\backslash\{j_0\}}I_{S_0} \ar[r] & (I_{S_1}\cap I_{S_0})/( I_{S_1\backslash\{j_0\}}\cap I_{S_0} )\\
I_{S_0}/( I_{S_0}\cap I_{S_1\backslash\{j_0\}}) \ar[r] \ar[u, "\times x_{j_0}"]& (I_{S_0}+I_{S_1\backslash\{j_0\}})/ I_{S_1\backslash\{j_0\}} \ar[u, "\times x_{j_0}"']
\end{tikzcd}
\]
La flèche horizontale inférieure est clairement bijective, et nous allons utiliser la régularité de $x_r$ pour montrer que les flèches verticales sont bien définies et sont des isomorphismes.
Par définition de $I_{S_1\backslash\{j_0\}}$, la flèche $b\in I_{S_0} \mapsto x_{j_0} b\in I_{S_1}I_{S_0}/I_{S_1\backslash\{j_0\}}I_{S_0}$ est surjective. Si $b$ est dans le noyau, $x_{j_0} b\in I_{S_1\backslash\{j_0\}}$ d'où $b\in I_{S_1\backslash\{j_0\}}\cap I_{S_0}=I_{S_1\backslash\{j_0\}}I_{S_0}$ par régularité et hypothèse de récurrence. Ainsi la multiplication par $x_{j_0}$ induit un isomorphisme $I_{S_0}/I_{S_1\backslash\{j_0\}} I_{S_0} \stackrel{\sim}{\rightarrow} I_{S_1}I_{S_0} /I_{S_1\backslash\{j_0\}}I_{S_0}$.
Étudions $M:=(I_{S_1}\cap I_{S_0})/( I_{S_1\backslash\{j_0\}}\cap I_{S_0} )$. On observe le diagramme commutatif dont les deux lignes horizontales sont exactes
\[
\begin{tikzcd}
0 \ar[r] & I_{S_1}\cap I_{S_0} \ar[r] & I_{S_1} \oplus I_{S_0} \ar[r] & I_{S_1}+I_{S_0} \ar[r] & 0 \\
0 \ar[r] & I_{S_1\backslash\{j_0\}}\cap I_{S_0} \ar[r] \ar[u, hook] & I_{S_1\backslash\{j_0\}} \oplus I_{S_0} \ar[r] \ar[u, "\iota_1", hook] & I_{S_1\backslash\{j_0\}}+I_{S_0} \ar[r] \ar[u, "\iota_2", hook]& 0
\end{tikzcd}
\]
Par régularité, on a $\coker \iota_1 = I_{S_1}/I_{S_1\backslash\{j_0\}}=x_{j_0} (A /I_{S_1\backslash\{j_0\}}) $ et $\coker \iota_2\cong x_{j_0} (A/(I_{S_1\backslash\{j_0\}}+I_{S_0}))$. Comme les flèches verticales sont injectives, \[M\stackrel{\sim}{\rightarrow}\ker( A/I_{S_1\backslash\{j_0\}}\fln{}{} A/(I_{S_1\backslash\{j_0\}}+I_{S_0}))= (I_{S_1\backslash\{j_0\}}+I_{S_0})/I_{S_1\backslash\{j_0\}}\] ce qui termine l'argument par récurrence.
Maintenant, terminons la preuve de 1. et 2. grâce aux égalités précédentes. Le résultat pour 2. est clair, passons à 1. Pour cela, raisonnons dans un cadre un peu plus général. Pour $J_1$, $J_2$, $J_3$ des idéaux d'un anneaux $B$, on a toujours $(J_1+J_2)J_3=J_1J_3+J_2J_3$ mais rarement $(J_1+J_2)\cap J_3=J_1\cap J_3+J_2\cap J_3$ sauf si on a par exemple un idéal ${J'_3}$ tel que $(J_1+J_2)\cap J_3=(J_1+J_2) J'_3$ et $J_i\cap J_3=J_i J'_3$ pour $i=1,2$. Un raisonnement similaire au cas général précédent permet d'établir si \[\bigoplus_n I_{S_1\cup S_2}\cap I_{S_0}^n=\bigoplus_n (I_{S_1}+I_{S_2}) I_{S_0}^{n-1}=\bigoplus_n I_{S_1} I_{S_0}^{n-1}+\bigoplus_n I_{S_2} I_{S_0}^{n-1}=\bigoplus_n I_{S_1}\cap I_{S_0}^{n}+\bigoplus_n I_{S_2}\cap I_{S_0}^{n}\] quand $S_1\cup S_2\subset S_0$. En terme de fermé de $\tilde{X}$, cela se traduit par $ \tilde{Y}_{S_1\cup S_2}=\tilde{Y}_{S_1}\cap \tilde{Y}_{S_2}$ si $S_0\neq S_1\cup S_2$. Le cas $S_0= S_1\cup S_2$ sera montré plus tard (pas de risque d'argument circulaire).
Passons au point 3. Notons $\tilde{A}=A\oplus I \oplus I^2\oplus\cdots$ et si $x\in I^n$, on note $x^{[n]}\in \tilde{A}$ l'élément $x$ vu comme un élément homogène de degré $n$. Considérons le recouvrement $\tilde{X}=\bigcup_{i\in S_0} U_i$ avec $U_i=D^+(x_i^{[1]})$. On a \[\widetilde{V(x_j)}=V^+(\bigoplus_n x_jI^{n-1})= V^+(x_j^{[0]}\tilde{A}+ x_j^{[1]} \tilde{A} )\] si $j\in S_0$ d'après le point $1$ et \[\widetilde{V(x_j)}=V^+(\bigoplus_n x_jI^{n})= V^+(x_j^{[0]}\tilde{A})\] si $j\notin S_0$ d'après le point $2$. Ainsi, d'après l'égalité dans $\tilde{A}$: $x_j^{[0]}x_i^{[1]}-x_j^{[1]}x_i^{[0]}$, on a :
\begin{itemize}
\item[•]$\widetilde{V(x_i)}\cap U_i=\emptyset$,
\item[•]$\tilde{Y}_{S_0} =V(x_i^{[0]})$
\item[•]$ \widetilde{V(x_j)}\cap U_i= V\left(\frac{x_j^{[1]}}{x_i^{[1]}}\right) $ pour $j\in S_0\backslash\{i\}$,
\item[•]$ \tilde{Y}_j\cap U_i= V\left({x_j^{[0]}}\right)\cap U_i$ si $j\notin S_0$.
\end{itemize}
Posons alors $\tilde{x}_j^{(i)}=\frac{x_j^{[1]}}{x_i^{[1]}}$ si $j\in S_0\backslash\{i\}$, $\tilde{x}_j^{(i)}=x_j^{[0]}$ si $j\notin S_0$ et $\tilde{x}_i^{(i)}=x_i^{[0]}$. On a par construction \[\tilde{Y}_{\{j\}}\cap U_i= V\left({x_j^{(i)}}\right)\] pour $1\le j\le s$. De plus, on a grâce aux points 1. et 2. pour $S_1\subsetneq S_0\backslash\{i\}$ ou $S_1\cap S_0=\emptyset$ \[\tilde{Y}_{S_1}=\bigcap_{j\in S_1} \tilde{Y}_{\{j\}}=V\left({x_j^{(i)}}\right)_{j\in S_1}\] et \[\tilde{Y}_{S_0}\cap \tilde{Y}_{S_1}=V\left({x_j^{(i)}}\right)_{j\in S_1\cup \{i\}}.\
Il reste à prouver que $(\tilde{x}^{(i)}_j)_{j\in \left\llbracket 1,s\right\rrbracket}$ est régulière pour montrer qu'il s'agit bien de la suite recherchée. Commençons par montrer que la sous-suite $(\tilde{x}^{(i)}_j)_{j\in S_0}$ est régulière par récurrence sur $|S_0|$. Quand $S_0=\{s_0\}$, on a $X=\tilde{X}$ et $\tilde{x}^{(s_0)}_{s_0}=x_{s_0}$ qui est régulier par hypothèse. Supposons le résultat vrai pour $|S_0|-1\geq 1$. On se place en $U_i\subset \tilde{X}$.
Comme $x_{j_0}$ ($j_0\neq i$) n'est pas un diviseur de $0$ dans $A$, donc $x_{j_0}^{[1]}$ ne l'est pas non plus dans $\tilde{A}$ et $\tilde{x}_{j_0}^{(i)}=\frac{x_{j_0}^{[1]}}{x_i^{[1]}}$ est un élément régulier dans ${\mathscr{O}}(U_i)$. On veut montrer que $(\tilde{x}_{j}^{(i)})_{j\in S_0\backslash\{j_0\}}$ est régulier dans ${\mathscr{O}}(U_s)/(\tilde{x}_{j_0})={\mathscr{O}}(U_i\cap \widetilde{V(x_{j_0})})$. Mais
\[
\widetilde{V(x_{j_0})}=\bl_{V((\tilde{x}_{j}^{(i)})_{j\in S_0\backslash\{j_0\}})}(V(x_{j_0}))=:\proj(\widetilde{A/ x_{j_0}})
\]
et $U_i\cap \widetilde{V(x_{j_0})} =D^+(x_i^{[1]}\widetilde{A/ x_{j_0}}) $ est un ouvert standard. On conclut alors par hypothèse de récurrence sur $\widetilde{V(x_{j_0})}$.
Maintenant, nous devons montrer que la suite $(x_j^{(i)})_{j\notin S_0}$ est régulière dans ${\mathscr{O}}(U_i)/(x_j^{(i)})_{j\in S_0}=A/I_{S_0}$ et cela découle de la régularité de $(x_j)_{j\in \left\llbracket 1,s\right\rrbracket}$ dans $A$.
Pour 4., on a d'après le point précédent pour $S_1$ est une partie stricte de $S_0$ et $S_2$ est disjointe de $S_0$, on a \[\tilde{Y}_{S_1}\cap \tilde{Y}_{S_2}=V\left({x_j^{(i)}}\right)_{j\in S_1\cup S_2}\]
et
\[\tilde{Y}_{S_0}\cap\tilde{Y}_{S_1}\cap \tilde{Y}_{S_2}=V\left({x_j^{(i)}}\right)_{j\in S_1\cup S_2\cup\{i\}}. \]
Par régularité de $(\tilde{x}^{(i)}_j)_{j\in \left\llbracket 1,s\right\rrbracket}$, on voit que la codimension de $\tilde{Y}_{S_1}\cap \tilde{Y}_{S_2}$ (resp. $\tilde{Y}_{S_0}\cap\tilde{Y}_{S_1}\cap \tilde{Y}_{S_2}$) est $|S_1\cup S_2|=|S_1|+| S_2|$ (resp. $|S_1\cup S_2\cup\{i\}|=|S_1|+| S_2|+1$).
\end{proof}
\section{Construction de modèles de $\lt^1$}
Rappelons que nous avons construit une tour de revêtement $(\lt^n)_n$ de la boule unitée rigide. Dans toute la suite, on prend $n=1$ et nous construirons une suite de modèles $Z_0=\widehat{\lt}^1,Z_1,\cdots,Z_d$ de $\lt^1$. Nous avons vu que le modèle $Z_0$ était $\spf (A_1)$ avec $A_1$ local et régulier sur ${\mathcal{O}}_{\breve{K}}$. Il est important de préciser que nous munissons $A_1$ de la topologie $p$-adique et non de la topologie engendrée par l'idéal maximal. En particulier, la fibre spéciale de $Z_0$ est de la forme
\[
Z_{0,s}= \spec ( \bar{{\mathbb{F}}} \llbracket X_0,\ldots, X_d \rrbracket )/ (\prod_{a\in {\mathbb{F}}^{d+1}\backslash\{0\}} l_{a,F}(X)).
\]
où on note encore $l_{a,F}$ la réduction modulo $\varpi$. On a alors une décomposition $Z_{0,s}=\bigcup_a Y_a$ où $Y_a=V(l_{a,F})$ \cite[Définition 3.7 + sous-section 3.2., page 11]{yosh}. On a le résultat suivant :
\begin{prop}[\cite{yosh} Proposition 3.9]\label{propltfibrspe}
\begin{enumerate}
\item Si $S\subset {\mathbb{F}}_q^{d+1}\backslash\{0\}$ et $M= \langle S \rangle^{\perp}$, le fermé $\bigcap_{a\in S} Y_a$ ne depends que de $M$ et pas de $S$ et nous le noterons $Y_M$.
\item Si $S$ est minimal (i.e. est une famille libre), alors la suite $(l_{a,F})_{a\in S}$ est regulière.
\item Les composantes irréductibles de $Z_{0,s}$ sont les fermés $Y_M$ où $M=a^\perp$ est un hyperplan. En particulier, chaques composantes irréductibles a multiplicité $q-1$ qui est le cardinal d'une ${\mathbb{F}}$-droite de ${\mathbb{F}}^{d+1}$ à laquelle on a retiré l'élément nul.
\item L'application $M\mapsto Y_M$ est une bijection croissante $G^{\circ}$-équivariante entre l'ensemble des sous-espaces de ${\mathbb{F}}^{d+1}$ et l'ensemble des intersections finies de composantes irréductibles de $Z_{0,s}$. De plus, chaque $Y_M$ est irreductible.
\end{enumerate}
\end{prop}
\begin{proof}
Il s'agit d'une application de \ref{PropConglaF} qui a été faite dans \cite[Proposition 3.9.,Lemma 3.11.]{yosh}.
\end{proof}
On définit
\[
Y^{[h]}=\uni{Y_N}{N\subset {\mathbb{F}}^{d+1}\\ {\rm dim}(N)=h}{}.
\]
Nous allons définir une suite d'espaces $Z_0,\ldots, Z_d$ sur ${\mathcal{O}}_{\breve{K}}$, et des fermés $Y^{[0]}_i\subset \cdots \subset Y_i^{[d]}\subset Z_{i,s}$ tels que $Y_0^{[h]}=Y^{[h]}$ s'inscrivant dans le diagramme commutatif
\[\xymatrix{
Z_i\ar[r]^{\tilde{p}_i} \ar@/_0.75cm/[rrrr]_{p_i} & Z_{i-1}\ar[r]^{\tilde{p}_{i-1}} & \cdots \ar[r]^{\tilde{p}_2} & Z_1 \ar[r]^{\tilde{p}_1} & Z_0}\]
avec $\tilde{p}_i$ un éclatement . Supposons $Z_0, \ldots, Z_{i}$, et $Y_i^{[0]}, \ldots, Y_i^{[d]}$ préalablement construit, on définit $Z_{i+1}$ et $Y_{i+1}^{[h]}$ via le relation de récurrence
\[
Z_{i+1}=\bl_{Y^{[i]}_h}(Z_{i}) \text{ et } Y_{i+1}^{[h]}= \widetilde{Y^{[h]}_i}.
\]
De même, pour tout fermé $Y\subset Z_{0,s}$, on définit pour tout $i$ un fermé $Y_i\subset Z_{i,s}$ via $ Y_0=Y $ et $ Y_{i+1}= \widetilde{Y_i}$. En particulier, nous pourrons nous intéresser à la famille des fermés $Y_{M,i},Y_{a,i}\subset Z_{i,s}$ pour $M\nsubseteq {\mathbb{F}}^{d+1}$ et $a\in {\mathbb{F}}^{d+1}\backslash\{0\}$.
\begin{rem
Notons que les éclatements considérés ici sont bien admissibles au sens de \ref{rembladm} car les fermés que nous avons considérés sont contenus dans la fibre spéciale (ce qui explique le choix de la topologie dans la définition de $Z_0$). Ce fait justifie aussi que chacun des espaces $Z_i$ obtenus sont encore des modèles de $\lt^1$.
Nous pouvons aussi donner la construction de ces modèles dans un cadre plus "algébrique". En effet, on peut construire dans $\spec (A_1)$ un analogue de la stratification $(Y^{[h]})_h$ et considérer les éclatements successifs suivant les fermés de cette stratification. On obtient alors une chaîne d'éclatement qui fournit encore, lorsqu'on complète $p$-adiquement, les modèles $Z_i$ décrits auparavant.
\end{rem}
L'interprétation modulaire de $Z_0$ fournit une action naturelle des trois groupes ${\mathcal{O}}_D^*$ (qui s'identifient aux isogénies de $\Phi^d$), $G^{\circ}$ (en permutant les structures de niveau) et de $W_K$ (sur $Z_0\otimes {\mathcal{O}}_C$ pour ce dernier). Comme les morphismes de vari\'et\'es envoient les irr\'eductibles sur les irr\'eductibles, tout groupe agit en permutant les $Y_a$ et donc les $Y_M$ de même dimension. Ainsi, $Y^{[h]}_0$ est stable sous les actions de $G^\circ$, ${\mathcal{O}}_D^*$ et $W_K$ et $Z_1$ hérite d'une action de ces groupes qui laisse stable $Y^{[h]}_1$ par propriété universelle de l'éclatement. Par récurrence immédiate, on a encore une action de $G^\circ$, ${\mathcal{O}}_D^*$ et $W_K$ sur $Z_i$ qui laisse stable $Y^{[h]}_i$ pour tout $i$.
Dans le cas particulier où $i=1$, $Y^{[0]}_0= Y_{\{0\}}$ est l'unique point fermé de $Z_0$. Le diviseur exceptionnel $Y_{\{0\},1}$ s'identifie à ${\mathbb{P}}^d_{\overline{{\mathbb{F}}}}$ et hérite des actions de $G^\circ, {\mathcal{O}}_D^*$ et $W_K$.
\section{Les composantes irréductibles de la fibre spéciale des modèles $Z_i$}
Nous souhaitons décrire les composantes irréductibles de la fibre spéciale de chacun des modèles intermédiaires $Z_i$. Si $Y$ est une composante irréductible de $Z_{i,s}$, on écrit $Y^{lisse}=Y\backslash \bigcup Y'$ où $Y'$ parcourt l'ensemble des composantes irréductibles de $Z_{i,s}$ différentes de $Y$. Le but de cette section est de démontrer le théorème suivant :
\begin{theo}
\label{TheoZH}
Soit $0\leq i \leq d$ un entier, On a
\begin{enumerate}
\item Les composantes irréductibles de la fibre spéciale de $Z_i$ sont les fermés de dimension $d$ suivants $(Y_{M,i})_{M: \dim M\in \left\llbracket 0,i-1\right\rrbracket\cup\{d\}}$.
\item Les intersections non-vides de composantes irréductibles de $Z_i$ sont en bijection avec les drapeaux $M_1\subset \cdots \subset M_k$ tels que $\dim M_{k-1}< i$ via l'application \[M_1\subset \cdots \subset M_k \mapsto \bigcap_{1\leq j \leq k} Y_{M_j,i}.\]
\item Si $Y_{M,i}$ est une composante irréductible de $Z_{i,s}$ avec $\dim M\neq d$, alors les morphismes naturels $\tilde{p}_h$ avec $j=i+1,\ldots, d$ induisent des isomorphismes $ Y_{M,d}^{lisse} \cong\cdots \cong Y_{M,i+1}^{lisse} \cong Y_{M,i}^{lisse}$.
\item Le changement de base du tube $]Y_{\{0\},d}^{lisse}[_{Z_d} \otimes \breve{K}(\varpi_N)\subset {\rm LT}_1 \otimes \breve{K}(\varpi_N)$ admet un modèle lisse dont la fibre spéciale est isomorphe à la variété de Deligne-Lusztig $\dl_{\bar{{\mathbb{F}}}}$ (ici, $N=q^{d+1}-1$ et $\varpi_N$ est le choix d'une racine $N$-ième de $\varpi$).
\end{enumerate}
\end{theo}
En fait, nous allons prouver le résultat plus technique et plus précis.
\begin{lem}\label{lemirrzh}
Soit $0\leq i \leq d$ un entier fixé, la propriété ${\mathscr{P}}_i$ suivante est vérifiée :
\begin{enumerate}
\item Pour tout sous-espace vectoriel $M\subsetneq {\mathbb{F}}^{d+1}$, $Y_{M,i}$ est irréductible et $Y_{M,i}\subset Z_i$ est une immersion régulière de codimension $1$ si $\dim M<i$ et $\codim M$ sinon.
\item Si $M=\langle S \rangle^{\perp}$ avec $ S=\{a_1,\ldots, a_s\}\subset {\mathbb{F}}^{d+1}$, on a $Y_{a_1,i}\cap \cdots \cap Y_{a_s,i}= \begin{cases} Y_{M,i}, & \text{Si } \dim M\geq i \\
\emptyset & \text{Sinon} \end{cases} $
\item Si $M\subsetneq N\subset {\mathbb{F}}^{d+1}$ avec $\dim M \geq i$, alors $Y_{M,i}\to Y_{N,i}$ (bien définie d'après le point précédent), est une immersion régulière de codimension $\dim N-\dim M$
\item Si $M_1\subset \cdots \subset M_k$ avec $\dim M_{k-1}< i$, $\bigcap_{1\leq j \leq k} Y_{M_j,i}\subset Y_{M_k,i}$ est une immersion régulière de codimension $s-1$. En particulier, $Y_{M_k,i}$ et $\bigcap_{1\leq j \leq k-1} Y_{M_j,i}$ sont transverses.
\item Si $i> i'=\dim M$, on a un isomorphisme $Y_{M,i}= \tilde{p}_{i,i'}^{-1}(Y_{M,i'})$.
\end{enumerate}
\end{lem}
\begin{proof}
Raisonnons par récurrence sur $i$.
Quand $i=0$, ${\mathscr{P}}_0$ correspond à la Proposition \ref{propltfibrspe} (4. et 5. sont vides dans ce cas). Supposons ${\mathscr{P}}_i$ vrai et montrons ${\mathscr{P}}_{i+1}$. On sait (${\mathscr{P}}_i$ 1. et 2.) que $Y_{N,i}\to Z_i$ est régulière pour tout $N$ et $Y_{N_1,i}\cap Y_{N_2,i}=\emptyset$ si $\dim N_1=\dim N_2=i$ et $N_1\neq N_2$. Donc $Y^{[i]}_i= \bigsqcup_N Y_{N,i}\rightarrow Z_i$ est régulière. Considérons le recouvrement $Z_i =\bigcup_{N:\dim N=i} U_N$ avec $U_N:=Z_i\backslash (\bigcup_{N'} Y_{N',i})$ où $N'$ parcours les espaces vectoriels de dimension $i$ différents de $N$. On a par construction $U_N\cap Y^{[i]}_i=Y_{N,i}$ et les résultats \ref{theoBlowUp} 2. et 3. entraînent
\begin{align*}
\tilde{p}_{i+1}^{-1}(U_N)&=\bl_{Y_{N,i}} (U_N)\\
Y_{M,i+1} \cap \tilde{p}_{i+1}^{-1}(U_N)&=\bl_{Y_{M,i}\cap Y_{N,i}} (Y_{M,i}\cap U_N)=\widetilde{Y_{M,i}\cap U_N}
\end{align*}
et on peut appliquer \ref{theoBlowUp} 4., \ref{theoblreg} pour montrer que $Y_{M,i+1} \cap \tilde{p}_{i+1}^{-1}(U_N)$ vérifie les propriétés voulues. Mais comme ces dernières sont des égalités entre des intersections et des propriétés de régularité qui sont locales, on en déduit la propriété ${\mathscr{P}}_{i+1}$ ce qui termine la preuve.
\end{proof}
\begin{proof}[Démonstration du Théorème \ref{TheoZH}]
Pour le premier point, tous les fermés de la forme $Y_{M,i}$ avec $\dim M\in \left\llbracket 0,i-1\right\rrbracket\cup\{d\}$ sont irréductibles d'après le résultat précédent. On a aussi montré qu'ils étaient tous de dimension $d$ et que les intersections de deux éléments étaient ou vide ou de dimension $d-1$. On en déduit qu'il n'existe aucune relation d'inclusion entre deux de ces fermés. Il suffit donc de prouver que les fermés étudiés recouvrent bien la fibre spéciale de $Z_i$. Pour cela, raisonnons par récurrence sur $i$. Au rang $0$, cela provient de \ref{propltfibrspe}. Supposons le résultat vrai au rang $i$. Dans ce cas, l'union $\bigcup_{\dim M\in \left\llbracket 0,i-1\right\rrbracket\cup\{d\}} Y_{M,i}$ contient $Z_i\backslash Y^{[i]}_i$ et on en déduit d'après \ref{theoBlowUp} 2.
\[
Z_{i+1}\backslash Y^{[i]}_{i+1}\subset \bigcup_{\dim M\in \left\llbracket 0,i-1\right\rrbracket\cup\{d\}} Y_{M,i+1}.
\]
De plus, le diviseur exceptionnel $Y^{[i]}_{i+1}$ est l'union des fermés de la forme $Y_{M,i+1}$ avec $\dim M =i$ ce qui prouve que la famille exhibée correspond bien à la décomposition parties irréductibles de la fibre spéciale de $Z_{i+1}$.
Pour le deuxième point, les intersections de composantes irréductibles sont de la forme $\bigcap_{1\leq j \leq k-1} Y_{M_j,i}\cap \bigcap_{a\in S}Y_{a,i}$ avec $S\subset {\mathbb{F}}^{d+1}\backslash\{0\}$ et $\dim M_j<i$. Posons $M_k=\langle S \rangle^{\perp}$, l'intersection précédente est vide si $\dim M_k <i$. Supposons que ce ne soit pas le cas, il s'agit de voir que $\bigcap_{1\leq j \leq k} Y_{M_j,i}$ est non vide si et seulement si $(M_j)_j$ est un drapeau. Si c'en est un, d'après \ref{theoblreg}, l'intersection est de codimension
\[
\begin{cases}
s &\text{Si } \dim M_{k}< i\\
s-1 + \codim M_k &\text{Sinon}
\end{cases}
\]
qui est inférieure ou égale à $d$ ce qui montre que ces intersections sont non-vides. Pour l'autre sens, supposons $M_{j_1}\nsubseteq M_{j_2}$ et $M_{j_1}\nsubseteq M_{j_2}$ pour $j_1\neq j_2$, nous devons montrer $Y_{M_{j_1},i}\cap Y_{M_{j_2},i}=\emptyset$. On peut trouver sous ces hypothèses $i'$ tel que \[\dim M_{j_1}\cap M_{j_2}< i' \le \min (\dim M_{j_1},\dim M_{j_2}) <i.\] On a alors $Y_{M_{j_1},i'}\cap Y_{M_{j_2},i'}=\emptyset$ d'après ${\mathscr{P}}_{i'}$ 2. De plus, si $i_2>\dim M_{j_1}\cap M_{j_2}$ et $Y_{M_{j_1},i_2}\cap Y_{M_{j_2},i_2}=\emptyset$, alors $Y_{M_{j_1},i_2+1}\subset\tilde{p}^{-1}_{i_2+1}(Y_{M_{j_1},i_2})$ (idem pour $Y_{M_{j_2},i_2}$) d'où \[Y_{M_{j_1},i_2+1}\cap Y_{M_{j_2},i_2+1}\subset\tilde{p}^{-1}_{i_2+1}(Y_{M_{j_1},i_2}\cap Y_{M_{j_2},i_2})=\emptyset\] ce qui montre par récurrence $Y_{M_{j_1},i}\cap Y_{M_{j_2},i}=\emptyset$.
Passons à 3. Si $Y$ est irréductible sur $Z_{i,s}$ et n'est pas de la forme $Y_{a,i}$ pour $a\in {\mathbb{P}}^{d}({\mathbb{F}})$, alors $Y^{lisse}$ ne rencontre aucun $Y_{a,i}$ et donc aucun $Y_{M,i}$ avec $\dim M=i$ car ce sont des intersections de tels fermés de la forme $Y_{a,i}$ d'après 1. En particulier, $Y^{lisse}\cap Y^{[i]}_{i}=\emptyset$. De même, $(\tilde{Y})^{lisse}$ ne rencontre pas $ Y^{[i]}_{i+1}$ qui est une union de composantes irréductibles toujours d'après 1. Il reste à prouver que $(\tilde{Y})^{lisse}=\tilde{p}_{i+1}^{-1}(Y^{lisse})$. Cela découle de l'isomorphisme (cf \ref{theoBlowUp} 3.) pour $Y'$ une composante irréductible différente de $Y$ :
\[
\tilde{p}_{i+1}: \widetilde{Y'}\backslash Y^{[i]}_{i+1} \stackrel{\sim}{\rightarrow} Y'\backslash Y^{[i]}_{i}.
\]
Pour le dernier point, cela a été montré dans \cite[Proposition 5.2]{yosh} quand $i=0$. Pour les autres valeurs de $i$, il suffit d'appliquer le point 3.
\end{proof}
\section{Semi-stabilité du modèle $Z_d$}
Notre but dans cette section est de rappeler le théorème principal de \cite[Théorème 4.2]{yosh}. Pour le confort du lecteur, nous donnerons les grandes lignes de la preuve. L'énoncé est le suivant
\begin{theo}[Yoshida]
Pour tout point fermé $x\in Z_d$, l'anneau local complété au point $x$ est isomorphe à
\[
{\mathcal{O}}_{\breve{K}} \llbracket T_0,\ldots, T_d \rrbracket /(T_0^{e_0}\cdots T_r^{e_r}- \varpi )
\]
avec $r\leq d$ et $e_i$ premier à $p$.
\end{theo}
\begin{rem}
Expliquons succinctement la stratégie de la preuve. L'idée est de calculer par récurrence l'anneau local complété en les points fermés des différents éclatements $Z_{i}$. Plus précisément, on montre une décomposition pour cet anneau en un point $z$ sous la forme ${\mathcal{O}}_{\breve{K}}\llbracket X_0,\ldots, X_d \rrbracket/(\prod_j f_j^{m_j}-\varpi)$ où les fermés $(V(f_j))_j$ décrivent l'ensemble des composantes irréductibles rencontrant le point $z$ considéré et l'entier $m_i$ est la multiplicité de la composante associée. D'après le théorème \ref{TheoZH} 2., ces composantes sont de la forme $Y_{M,i}$ avec $\dim {M}< i$ ou $Y_{a,i}$ avec $a\in {\mathbb{F}}^{d+1}\backslash\{0\}$. \'Etant donnée une famille des composantes $(Y_{M_j,i})_{j} \cup (Y_{a_j,i})_j$, les fonctions associées $(f_{M_j})_j\cup f_{a_j})_{j}$ forment une suite régulière si et seulement si les $(a_j)_j$ sont libres (et donc une famille $\bar{{\mathbb{F}}}$-libre dans l'espace cotangent). On peut alors estimer le nombre des composantes de la forme $Y_{a,i}$ et montrer qu'il y en a au plus une quand $i=d$. Dans ce cas, les $(f_j)$ forment une suite régulière vérifiant la propriété de liberté précédente et la semi-stabilité en découle.
Pour pouvoir décrire les fonctions $f_j$ et les $m_j$, on raisonne par récurrence sur $i$. Quand $i=0$, il s'agit du théorème \ref{theolteq}. Si $z$ est un point fermé de $Z_{i+1}$, son image par l'éclatement $\tilde{z}\in Z_{i}$ est un point fermé et $\widehat{{\mathscr{O}}}_z$ se voit comme l'anneau local complété en un point du diviseur exceptionnel d'un éclatement de $\widehat{{\mathscr{O}}}_{\tilde{z}}$. Grâce au lemme \ref{lemReg2}, on peut décrire explicitement le lien entre les composantes irréductibles de $\widehat{{\mathscr{O}}}_{\tilde{z}}$ et celles de $\widehat{{\mathscr{O}}}_{z}$.
\end{rem}
\begin{proof}
Fixons $z\in Z_i$ pour $i\leq d$. Calculons l'anneau local complété dans $z$. Comme $p_i: Z_{i}\rightarrow Z_0$ est propre, $p_i(z)$ est un point fermé et est donc $Y_{\{0\},0}$ par localité de $A_0={\mathscr{O}}(Z_0)$. Ainsi, on a $z\in p_i^{-1}(Y_{\{0\},0})=Y_{\{0\},i}$ d'après le lemme \ref{lemirrzh} 5. D'après le théorème \ref{TheoZH} 2., il existe un drapeau $M_0 \subsetneq M_1\subsetneq \cdots \subsetneq M_{j_0} \subsetneq M_{j_0+1} $ avec $\dim M_{j_0} <i $ tel que les composantes irréductibles rencontrant $z$ sont les $Y_{M_0,i}, \cdots,Y_{M_{j_0,i}}$ ainsi que les fermés $Y_{a,i}$ avec $a^\perp\supset M_{j_0+1} $. De plus, $M_0=\{0\}$ d'après la discussion précédente.
Quitte à translater par un élément de $\gln_{d+1}({\mathbb{F}})$, on peut supposer que $M_j=\langle e_0,\ldots, e_{d_{j}} \rangle$ avec $(e_i)_i$ la base canonique de ${\mathbb{F}}^{d+1}$ (en particulier, $d_i=\dim M_i-1$). Nous voulons prouver par récurrence sur $i$ que l'anneau local complété $\widehat{{\mathscr{O}}}_z$ au point $z$ est isomorphe à
\[
{\mathcal{O}}_{\breve{K}} \llbracket X_0,\ldots, X_d \rrbracket /(uX_{d_0}^{m_0} \cdots X_{d_{j_0}}^{m_{j_0}}(\prod_{a\in M_{j_0+1}^{\perp}\backslash\{0 \} } f_a) - \varpi)
\]
avec
\begin{enumerate}
\item $u$ est une unité et $m_j=|M_j^{\perp} |-1=q^{d-d_j}-1$.
\item $V(f_a)= \spec \widehat{{\mathscr{O}}}_z \times_{Z_i} Y_{a,i}$ et $V(X_{d_j})= \spec \widehat{{\mathscr{O}}}_z \times_{Z_i} Y_{M_j,i}$.
\item Si $a=\sum_{j\geq k } a_j e_j$ avec $k> d_{j_0+1}$, on peut trouver des relevés $\tilde{a}_j\in {\mathcal{O}}_{\breve{K}}$ tel que
\[
f_a= \sum_{i} \tilde{a}_j X_j \mod (X_{k}, \ldots , X_d)^2.\]
\end{enumerate}
Cette description de l'anneau local complété quand $i=d$ établi le théorème. En effet, on a $M_{j_0+1}^{\perp}=0$ et le produit $(\prod_{a\in M_{j_0+1}^{\perp}\backslash\{0 \} } f_a)$ est vide. De plus, d'après le lemme de Hensel, $\widehat{{\mathscr{O}}}_{z}^*$ est $n$-divisible pour $n$ premier à $p$. En posant $\tilde{X}_{0}= u^{1/m_0} X_{0}$ et $\tilde{X}_j=X_j$ pour $j\neq 0$, on voit que $\widehat{{\mathscr{O}}}_z$ est de la forme voulue.
Quand $i=0$, voyons que la description précédente de l'anneau local complété découle de \ref{propltfibrspe}. Le fermé $Y_{\{0\}}$ est l'unique point fermé de $Z_{0}$ et l'anneau local complété est
\[
{\mathscr{O}}(Z_0)= {\mathcal{O}}_{\breve{K}}\llbracket X_0,\ldots, X_d \rrbracket/(u\prod_{a\in {\mathbb{F}}^{d+1}\backslash \{0\}} l_{a,F} -\varpi)
\]
avec $u$ une unité. Décrivons les quantités $j_0, (M_j)_{0\leq j\leq j_0+1} $ et $(f_a)_{a\in M_{j_0+1}^{\perp}\backslash \{0\}}$ pour ${\mathscr{O}}(Z_0)$. On a $j_0={-1}$, $M_{j_0+1}=M_{0}=\{0\}$, en particulier $M_0^\perp= {\mathbb{F}}^{d+1}$ . Posons $f_{a}=l_{a,F}$ pour $a\in {\mathbb{F}}^{d+1}\backslash \{0\}$ et on obtient la formule voulue grâce à \ref{PropConglaF} et l'action transitive de $\gln_{d+1}({\mathbb{F}})$ sur la famille $(l_{a,F})$.
Supposons le résultat pour $i\geq 0$, montrons-le pour $i+1$ et prenons $z\in Z_{i+1}$ un point fermé. Par propreté des éclatements, $\tilde{z}={p}_{i+1}(z)$ est un point fermé de $Z_{i}$. Si $\dim M_{j_0} < i$, alors $\tilde{z}$ n'est pas dans le centre de l'éclatement et $p_{i+1}$ induit un isomorphisme entre $\hat{{\mathscr{O}}}_{\tilde{z}}$ et $\hat{{\mathscr{O}}}_z$. Le résultat dans ce cas s'en déduit par hypothèse de récurrence.
Sinon, toujours par hypothèse de récurrence, on écrit l'anneau local complété sous la forme
\[
\widehat{{\mathscr{O}}}_{\tilde{z}}\cong {\mathcal{O}}_{\breve{K}} \llbracket \tilde{X}_0,\ldots, \tilde{X}_d \rrbracket /(u\tilde{X}_{d_0}^{m_{0}} \cdots \tilde{X}_{d_{j_0-1}}^{m_{j_0-1}}(\prod_{a\in M_{j_0}^{\perp}\backslash\{0 \} } f_a) - \varpi)
\]
où $j_0-1$, $(M_j)_{j\le j_0}$, et $(f_a)_a$ vérifient les propriétés escomptées au rang. Pour relier l'anneau $\hat{{\mathscr{O}}}_{\tilde{z}}$ à l'anneau $\hat{{\mathscr{O}}}_z$, on observe (cf. théorème \ref{theoBlowUp} 3.) l'identité
\[
S: = \bl_{Y_{M_{j_0+1},i}\times_{{Z_i}} {\widehat{Z}_{i, \tilde{z}}} }(\widehat{Z}_{i, \tilde{z}} )= Z_{i+1}\times_{Z_{i}}\widehat{Z}_{i, \tilde{z}}.
\]
avec $\widehat{Z}_{i, z}=\spec \widehat{{\mathscr{O}}}_{\tilde{z}}$ car $\widehat{Z}_{i,\tilde{z}}\rightarrow Z_{i}$ est plat.
D'après 2. et 3. de l'hypothèse de récurrence et \ref{TheoZH} 3., $(\tilde{X}_j)_{j=i,\dots, d}$ est une suite régulière et
\[
S= \bl_{V((f_{e_j})_j)}(\widehat{Z}_{i,\tilde{z}})= \proj( \widehat{{\mathscr{O}}}_{\tilde{z}}[T_i, \ldots, T_{d}]/(T_{j_1} \tilde{X}_{j_2}- T_{j_2} \tilde{X}_{j_1})).
\]
L'anneau $\spf \hat{{\mathscr{O}}}_z$ correspond au complété en un point fermé du diviseur exceptionnel $\proj( \overline{{\mathbb{F}}} [T_i,\ldots, T_d])$, et ces derniers sont en bijection avec ${\mathbb{P}}^{d-i}(\overline{{\mathbb{F}}})$. Mais par hypothèse, $z\notin Y_{e_{i},i+1}$ et le point fermé en question est dans $D^+(T_i)= \spec B$.
Écrivons-le sous la forme \[z=[1,z_{i+1}, \cdots, z_d]=[1,z_{i+1}, \cdots, z_{d_{j_0+1}-1}, 0, \cdots, 0]\in {\mathbb{P}}^{d-i}(\bar{{\mathbb{F}}}).\] On a alors
\[
B:= {\mathcal{O}}_{\breve{K}}\llbracket \tilde{X}_0,\ldots, \tilde{X}_d \rrbracket [\tilde{T}_{i+1}, \ldots, \tilde{T}_{d}]/(\tilde{T}_{j}\tilde{X}_i-\tilde{X}_j, P-\varpi)
\]
avec $\tilde{T}_j=\frac{T_j}{T_i}$ et l'idéal associé à $z$ est \[{\mathfrak{m}}_{z}={\mathfrak{m}}_{\tilde{z}}B+(\tilde{T}_j-\tilde{z}_j)_j,\] où $\tilde{z}_j\in {\mathcal{O}}_{\breve{K}}$ est un relèvement de $z_j\in \overline{{\mathbb{F}}}$, et $P=u\tilde{X}_{d_0}^{m_0} \cdots \tilde{X}_{d_{j_0-1}}^{m_{j_0-1}}(\prod_{a\in M_{j_0}^{\perp}\backslash\{0 \} } f_a) $.
Par noetherianité, on obtient d'après \cite[Prop 10.13]{atimcdo}
\[
\widehat{{\mathscr{O}}}_{z}= {\mathcal{O}}_{\breve{K}}\llbracket X_0, \cdots, X_d \rrbracket/(P(X_0, \cdots,X_i, (X_{i+1}+\tilde{z}_{i+1}) X_i,\cdots, (X_d+\tilde{z}_d) X_i)-\varpi)
\] en posant\footnote{Notons que l'on a pris $\tilde{z}_j=0$ si $j \geq d_{j_0+1}$} \[
X_j= \begin{cases}
\tilde{X}_j & \text{Si } j\leq i \\
\tilde{T}_j-\tilde{z}_j & \text{Sinon}.
\end{cases}
\]
Comme $f_{a}(\tilde{X}_{0},\dots, \tilde{X}_d)\in (\tilde{X}_{i},\dots, \tilde{X}_d)$ d'après 3., alors
\[
f_a( X_0, \cdots,X_i, (X_{i+1}+\tilde{z}_{i+1}) X_i,\cdots, (X_d+\tilde{z}_d) X_i)=: X_i g_a({X}_{0},\dots, {X}_d).
\]
Ainsi, réécrivons $P$ sous la forme
\begin{eqnarray*}
P(X_0, \cdots,X_i, (X_{i+1}+\tilde{z}_{i+1}) X_i,\cdots, (X_d+\tilde{z}_d) X_i) & = & u X_{d_0}^{m_{0}} \cdots X_{d_{j_0-1}}^{m_{j_0-1}} \prod_{a \in M_{j_0}^{\perp}\{ 0 \} } X_i g_a \\
& = & v X^{m_0}_{d_0}\cdots X^{m_{j_0-1}}_{d_{j_0-1}} X_{d_{j_0}}^{m_{j_0}} \prod_{a\in M_{j_0+1}^{\perp}\backslash \{0\} } g_a \\
\end{eqnarray*}
avec $v=u \prod_{a\notin M_{j_0+1}^{\perp}\backslash\{0\}} g_{a}$. D'après \ref{lemReg2} 3., chacun des $g_a$ dans le produit définissant $v$ est inversible car $z\notin Y_{a,i}$. On obtient
\[
\widehat{{\mathscr{O}}}_{z}={\mathcal{O}}_{\breve{K}}\llbracket X_0, \ldots, X_d \rrbracket/((v X_{d_0}^{m_0} \cdots X_{d_{j_0}}^{m_{j_0}} (\prod_{a\in M_{j_0+1}^{\perp}\backslash\{0 \} } g_a) - \varpi ).
\]
Montrons que cette description vérifie les hypothèses demandées. Pour le point 1., c'est clair par construction. Le point 3. montre la régularité de $\tilde{X}_{d_{0}}, \ldots, \tilde{X}_{d_{j_0}}, \tilde{X}_{d_{j_0+1}+1}, \tilde{X}_{d_{j_0+1}+2},\ldots, \tilde{X}_d$. \footnote{on peut aussi raisonner par récurrence sur $i$ grâce à \ref{lemReg2}.} Ainsi, on peut appliquer les arguments de la preuve de \ref{lemReg2} pour obtenir
\[
V(X_{d_j}) = Y_{M_j,i+1}\times_{Z_{i+1}} \widehat{Z}_{i+1,z} \text{ et } V(g_{a}) = Y_{a,i+1}\times_{Z_{i+1}} \widehat{Z}_{i+1,z}
\]
pour $j\leq j_{0}+1$ et $a\in M_{j_0+1}^{\perp} \backslash \{0\}$. Le point 2. est alors vérifié. Pour le point 3. en $z$, cela découle de l'hypothèse analogue en $\tilde{z}$ et de la relation \[g_a({X}_{0},\dots, \tilde{X}_d)=f_a( X_0, \cdots,X_i, (X_{i+1}+\tilde{z}_{i+1}) X_i,\cdots, (X_d+\tilde{z}_d) X_i)/X_i\] pour $a\in M_{j_0+1}^{\perp}\backslash \{0\}$.
\end{proof}
\section{Relation avec un modèle semi-stable d'une variété de Shimura\label{sssectionlt1sh}}
Nous rappelons la construction de modèles entiers pour certaines variétés de Shimura développés dans (\cite[chapitre III.3]{yosh}) et (\cite[chapitre 2.4, chapitre 4]{harrtay}) et nous décrivons le lien entre ces modèles et ceux des sections précédentes.
Soit $F=EF^+$ un corps CM avec $F^+$totalement réel de degré\footnote{noté $d$ dans \cite{harrtay}} $k$ et $E$ quadratique imaginaire où $p$ est décomposé. Fixons $r$ un entier positif et donnons nous $w_1(=w),\cdots,w_r$ des places de $F$ au-dessus de $p$ tel que \footnote{Pour montrer l’existence d’une telle extension $F$, on se ramène au cas où $K/{\mathbb{Q}}_p$ est galoisienne quitte à prendre une clôture galoisienne et à passer aux invariants sous Galois. Par résolubilité de l’extension, on peut raisonner sur des extensions abéliennes cycliques par dévissage. Trouver $F$ revient alors à montrer l'existence de certain caractère par théorie du corps de classe ce qui est réalisé dans \cite[appendice A.2]{blggt} par exemple.} $F_w=K$. Soit $B/F$ une algèbre à division de dimension\footnote{noté $n^2$ dans \cite{harrtay}} $(d+1)^2$ déployé en la place $w$ (voir p.51 de \cite{harrtay} pour les hypothèses supplémentaires imposées sur $B$). Nous appelons $G$ le groupe réductif défini dans \cite{harrtay} p.52-54. Soit $U^p$ un sous-groupe ouvert compact assez petit de $G({\mathbb{A}}^{\infty,p})$ et, $m=(1,m_2,\cdots, m_r)\in {\mathbb{N}}^r$, Nous nous intéresserons au problème modulaire considéré dans \cite[p. 108-109]{harrtay} qui est représentable par ${X}_{U^p,m}$ un schéma sur ${\mathcal{O}}_K$ propre, plat de dimension $d+1$.
Nous n'allons pas décrire en détail le problème modulaire représenté par ${X}_{U^p,m}$ mais nous rappelons seulement que le foncteur associé classifie les quintuplets $(A,\lambda, \iota, \eta^p , (\alpha_i)_i)$ à isomorphisme près où $A$ est un schéma abélien de dimension $k(d+1)^2$ muni d'une polarisation $\lambda$ première à $p$, d'une ${\mathcal{O}}_B$-action et d'une structure de niveau $\alpha_1 :\varpi^{-1}\varepsilon{\mathcal{O}}_{B_w}/\varepsilon{\mathcal{O}}_{B_w}\to \varepsilon A[\varpi]$ où $\varepsilon$ est un idempotent de $\mat_{d+1}({\mathcal{O}}_K)$ (avec quelques compatibilité entre ces données). On rappelle que l'on a une identification $\varepsilon{\mathcal{O}}_{B_w}\cong {\mathcal{O}}_K^{d+1}$ par équivalence de Morita.
Nous écrirons $(A,\lambda,\iota,\eta^p, (\alpha_i)_i)$ le quintuplet universel du problème modulaire $X_{U^p,m}$.
La fibre spéciale $\bar{X}_{U^p,m}={X}_{U^p,m}\otimes {\mathbb{F}}$ admet une stratification par des sous-schémas fermés réduits $\bar{X}_{U^p,m}=\bigcup_{0\le h\le d} \bar{X}_{U^p,m}^{[h]}$ de dimension pure $h\in\llbracket 0,d\rrbracket$. L'espace $\bar{X}_{U^p,m}^{[h]}$ est la clôture de l'ensemble des points fermés $s$ où ${\mathcal{G}}_{A,s}$ a pour hauteur étale inférieure ou égale à $h$ (cf p. 111 dans \cite[Corollary III.4.4]{harrtay}). Chacun de ces espaces admet un recouvrement $\bar{X}_{U^p,m}^{[h]}=\bigcup_M \bar{X}_{U^p,m,M}$ où $M$ parcourt les sous-espaces ${\mathbb{F}}$-rationnels de ${\mathbb{P}}_{{\mathbb{F}}}^d$ de dimension $h$ \cite[3.2 (see Remark 10(2))]{mant}. Nous allons maintenant étendre les scalaires à $\spec({\mathcal{O}}_{\breve{K}})$ et noter ${{\rm Sh}}_{}:={X}_{U^p,m}\otimes {\mathcal{O}}_{\breve{K}}$, $\bar{{\rm Sh}}_{}:=\bar{X}_{U^p,m}\otimes \bar{{\mathbb{F}}}$, $\bar{{\rm Sh}}_{M}:=\bar{X}_{U^p,m,M}\otimes \bar{{\mathbb{F}}}$ et $\bar{{\rm Sh}}_{}^{[h]}:=\bar{X}_{U^p,m}^{[h]}\otimes \bar{{\mathbb{F}}}$ ainsi que $\hat{{\rm Sh}}$ la complétion de ${\rm Sh}$ le long de la fibre spéciale $\bar{{\rm Sh}}$.
Comme dans la section précédente, on construit une suite de modèles entiers $\hat{\rm Sh}_0=\hat{\rm Sh}, \hat{\rm Sh}_1,\cdots,\hat{\rm Sh}_d$ s'inscrivant dans un diagramme \[\xymatrix{
\hat{\rm Sh}_i \ar[r]^{\tilde{p}_i} \ar@/_0.75cm/[rrrr]_{p_i} & \hat{\rm Sh}_{i-1} \ar[r]^{\tilde{p}_{i-1}} & \cdots \ar[r]^{\tilde{p}_2} & \hat{\rm Sh}_1 \ar[r]^{\tilde{p}_1} & \hat{\rm Sh}_0}\] en réalisant successivement les éclatement admissibles le long des transformés stricts de $\bar{{\rm Sh}}^{[i-1]}$ (cela revient aussi à éclater ${\rm Sh}$ puis à compléter $p$-adiquement chaque modèle intermédiaire). On notera aussi $\bar{{\rm Sh}}_{M,i}$ le transformé strict de $\bar{{\rm Sh}}_{M}$. De même si $\bar{s}$ est un point géométrique fermé centré en $s\in \bar{X}_{U^p,m}^{[0]}$ que l'on voit par changement de base comme un point fermé de $\bar{{\rm Sh}}_{}^{[0]}$, on note $\bar{{\rm Sh}}_{\bar{s},i}:=p_i^{-1}(\bar{s})$. En particulier, $\bar{{\rm Sh}}_{\bar{s},1}$ s'identifie à un espace projectif ${\mathbb{P}}^d_{\bar{{\mathbb{F}}}}$. Le théorème suivant relie les constructions relatives au premier revêtement de la tour de Lubin-Tate à celles de la variété de Shimura.
\begin{theo}[Harris-Taylor,Yoshida]\label{theomodeleshltalg}
Soit $\bar{s}$ un point fermé géométrique centré en $s\in\bar{X}^{[0]}_{U^p,m}$ vu comme un point de ${\rm Sh}$.
\begin{enumerate}
\item (\cite[Lemma III.4.1]{harrtay}) On a un isomorphisme \[Z_0\cong \spec(\hat{{\mathscr{O}}}_{{\rm Sh},\bar{s}})\cong \spec(\hat{{\mathscr{O}}}_{\hat{\rm Sh},\bar{s}})\] Il en résulte un morphisme $Z_0\to \hat{\rm Sh}$.
\item (\cite[Lemma 4.4]{yosh}) Via cette application $Z_0\to \hat{\rm Sh}$, on a des isomorphismes \[Y_M\cong {\bar{\rm Sh}}_M \times_{\hat{\rm Sh}}Z_0\text{ et } Y^{[h]}\cong \bar{{\rm Sh}}^{[h]}\times_{\hat{\rm Sh}} Z_0\]
\item (\cite[Lemma 4.6]{yosh}) Pour tout $i\le d$, \[Z_i\cong {\hat{\rm Sh}}_i\times_{\hat{\rm Sh}} Z_0 \text{ et } Y_{\{0\},i}\cong {\bar{\rm Sh}}_{\bar{s},i}\times_{\bar{\rm Sh}_i} Z_i\] De plus, il existe un voisinage étale de $Z_d$ vu comme un fermé de ${\rm Sh}_d$ de réduction semi-stable.
\item $\bar{\rm Sh}_{\bar{s},d}$ est une composante irréductible de $\bar{{\rm Sh}}_d$ et les autres composantes rencontrent $\bar{\rm Sh}_{\bar{s},d}$ exactement en les espaces $\bar{\rm Sh}_{\bar{s},d}\cap \bar{\rm Sh}_{M,d}$ où $M$ est un hyperplan ${\mathbb{F}}$-rationnel de ${\mathbb{P}}^d_{zar,\bar{{\mathbb{F}}}}$.
\item Le tube $]\bar{{\rm Sh}}_{\bar{s},d}^{lisse}[_{\hat{{\rm Sh}}_d}\otimes \breve{K}(\varpi_N)\subset \lt^1 \otimes \breve{K}(\varpi_N)$ au dessus du lieu lisse $\bar{\rm Sh}_{\bar{s},d}^{lisse}:=\bar{\rm Sh}_{\bar{s},d}\backslash \bigcup_Y Y$ (où $Y$ parcourt les composantes irréductibles de $\bar{\rm Sh}_d$ différentes de $\bar{{\rm Sh}}_{\bar{s},d}$) admet un modèle lisse isomorphe à la variété de Deligne-Lusztig $\dl^d_{\bar{{\mathbb{F}}}}$.
\end{enumerate}
\end{theo}
\begin{proof}
Le premier point a été prouvé dans \cite[Lemma III.4.1]{harrtay}. Le premier isomorphisme du point 2. s'obtient en explicitant l'isomorphisme du point 1. et en comparant la définition de ${\rm Sh}_M$ \cite[Lemma 4.4]{yosh}. L'autre isomorphisme du point 2. et ceux du point 3. s'en déduisent par combinatoire et compatibilité du procédé d'éclatement \cite[Lemma 4.6]{yosh} et de complétion $p$-adique. La dernière assertion du troisième point découle de l'argument technique de la preuve de \cite[Proposition 4.8 (i)]{yosh}. Le point 4. résulte de la description de la fibre spéciale de $Z_d$ réalisée dans \ref{TheoZH}. Le dernier point découle de 4. et de \ref{TheoZH} 3. et 4.
\end{proof}
\section{Cohomologie des vari\'et\'es de Deligne-Lusztig\label{ssectiondl}}
Considérons la variété
$$\Omega^d_{{\mathbb{F}}}:={\mathbb{P}}_{{\mathbb{F}}}^d \backslash \bigcup_H H,$$ o\`u $H$ parcourt l'ensemble des hyperplans ${\mathbb{F}}_q$-rationnels. Elle admet une action naturelle de $\gln_{d+1}({\mathbb{F}})$ et un revêtement fini étale $\gln_{d+1}({\mathbb{F}})$-équivariant \[\dl_{{\mathbb{F}}}^d := \{x\in {\mathbb{A}}^{d+1}_{{\mathbb{F}}_q}\backslash \{0\} | \prod_{a\in {\mathbb{F}}_q^{d+1}\backslash \{0\} } a_0x_0++a_dx_d=(-1)^d \}\] de groupe de Galois ${\mathbb{F}}_{q^{d+1}}^*$ via $\zeta\cdot (x_0,\cdots,x_d)=(\zeta x_0,\cdots, \zeta x_d)$.
On note $\dl^d_{\bar{{\mathbb{F}}}}$ l'extension des scalaires de $\dl_{{\mathbb{F}}}^d$ \`a $\bar{{\mathbb{F}}}$. Soit $l\ne p$ un nombre premier, l'intérêt principal de cette construction est l'étude de la partie cuspidale
de la cohomologie $l$-adique à support compact de $\dl^d_{\bar{{\mathbb{F}}}_q}$ dont nous allons rappeler la description.
Soit $\theta: {\mathbb{F}}_{q^{d+1}}^*\to \overline{\mathbb{Q}}_l^*$ un caractère. Si $M$ est un $ \overline{\mathbb{Q}}_l[{\mathbb{F}}_{q^{d+1}}^*]$-module on note
$$M[\theta]={\rm Hom}_{{\mathbb{F}}_{q^{d+1}}^*}(\theta, M).$$
On dit que le caractère $\theta$ est
\emph{primitif}
s'il ne se factorise pas par la norme ${\mathbb{F}}_{q^{d+1}}^*\to {\mathbb{F}}_{q^e}^*$ pour tout diviseur propre $e$ de $d+1$.
Si $\pi$ est une représentation de $\gln_{d+1}( {\mathbb{F}}_q)$, on dit que $\pi$ est \emph{cuspidale} si
$\pi^{N({\mathbb{F}}_q)}=0$ pour tout radical unipotent $N$ d'un parabolique propre de $\gln_{d+1}$.
La théorie de Deligne-Lusztig (ou celle de Green dans notre cas particulier) fournit:
\begin{theo}\label{DLet}
Soit $\theta: {\mathbb{F}}_{q^{d+1}}^*\to \overline{\mathbb{Q}}_l^*$ un caractère.
a) Si $\theta$ est primitif, alors
$\hetc{i}(\dl_{\bar{{\mathbb{F}}}_q}^d, \bar{{\mathbb{Q}}}_l)$ est nul pour $i\ne d$ et
$$\bar{\pi}_{\theta,l}:=\hetc{d}(\dl_{\bar{{\mathbb{F}}}_q}^d, \bar{{\mathbb{Q}}}_l)[\theta]$$
est une $\gln_{d+1}( {\mathbb{F}}_q)$-représentation irréductible, cuspidale, de dimension $(q-1)(q^2-1) \dots (q^d-1)$. Toutes les repr\'esentations cuspidales sont ainsi obtenues.
b) Si $\theta$ n'est pas primitif, aucune repr\'esentation cuspidale n'intervient dans $\oplus_{i}\hetc{i}(\dl_{\bar{{\mathbb{F}}}_q}^d, \bar{{\mathbb{Q}}}_l)[\theta]$.
\end{theo}
\begin{proof}
Voir \cite[cor. 6.3]{DL}, \cite[th. 7.3]{DL}, \cite[prop. 7.4]{DL}, \cite[prop. 8.3]{DL}, \cite[cor. 9.9]{DL}, \cite[Proposition 6.8.(ii) et remarques]{yosh} pour ces résultats classiques.
\end{proof}
Ainsi, la partie cuspidale $\hetc{0}(\dl_{\bar{{\mathbb{F}}}_q}^d, \bar{{\mathbb{Q}}}_l)_{\rm cusp}$ de $\oplus_{i} \hetc{i}(\dl_{\bar{{\mathbb{F}}}_q}^d, \bar{{\mathbb{Q}}}_l)$ est concentrée en degré $d$, où elle est donnée par $\oplus_{\theta} \bar{\pi}_{\theta,l}\otimes\theta$, la somme directe portant sur tous les caractères primitifs.
\begin{rem} (voir \cite[6.3]{DL}) Soit $N=q^{d+1}-1$ et fixons de isomorphismes ${\mathbb{F}}_{q^{d+1}}^*\simeq {\mathbb{Z}}/N{\mathbb{Z}}$ et
${\mathbb{Z}}/N{\mathbb{Z}}^{\vee}\simeq {\mathbb{Z}}/N{\mathbb{Z}}$.
Soient $\theta_{j_1}$ et $\theta_{j_2}$ deux caract\`eres primitifs vus comme des \'el\'ements de ${\mathbb{Z}}/N{\mathbb{Z}}$ via $j_1$, $j_2$, les repr\'esentations $\bar{\pi}_{\theta_{j_1}}$ et $\bar{\pi}_{\theta_{j_2}}$ sont isomorphes si et seulement si il existe un entier $n$ tel que $j_1= q^n j_2$ dans ${\mathbb{Z}}/N{\mathbb{Z}}$ .
\end{rem}
Nous aurons besoin d'un analogue des résultats précédents pour
la cohomologie rigide. Cela a été fait par Grosse-Klönne dans \cite{GK5}.
Si $\theta: {\mathbb{F}}^*_{q^{d+1}}\to \bar{K}^*$ est un caractère, posons
$$\bar{\pi}_{\theta}=\hrigc{*}(\dl_{{\mathbb{F}}_q}^d/ \bar{K})[ \theta]:=\bigoplus_{i}\hrigc{i}(\dl_{{\mathbb{F}}_q}^d/ \bar{K})[ \theta],$$
où
$$\hrigc{i}(\dl_{{\mathbb{F}}_q}^d/ \bar{K}):=\hrigc{i}(\dl_{{\mathbb{F}}_q}^d)\otimes_{W({\mathbb{F}}_q)[1/p]} \bar{K}$$
et où $M[\theta]$ désigne comme avant la composante $\theta$-isotypique de $M$.
\begin{theo}\label{theodlpith}
Fixons un premier $l\ne p$ et un isomorphisme $\bar{K} \cong \bar{{\mathbb{Q}}}_l$. Si $\theta$ est un caract\`ere primitif, alors $$\bar{\pi}_{\theta}:=\hrigc{d}(\dl_{{\mathbb{F}}_q}^d/ \bar{K})[ \theta]$$ est isomorphe en tant que
$\gln_{d+1}({\mathbb{F}}_q)$-module à $\bar{\pi}_{\theta,l}$, en particulier c'est une représentation irréductible cuspidale.
\end{theo}
\begin{proof} Cela se fait en trois étapes, cf. \cite[4.5]{GK5}. Dans un premier temps, on montre \cite[3.1]{GK5} que
les $\bar{K}[\gln_{d+1}({\mathbb{F}}_q) \times {\mathbb{F}}^*_{q^{d+1}}]$-modules virtuels
\[ \sum_i (-1)^i \hetc{i}(\dl_{\bar{{\mathbb{F}}}_q}^d, \bar{{\mathbb{Q}}}_l) \text{ et } \sum_i (-1)^i \hrigc{i}(\dl_{{\mathbb{F}}_q}^d/ \bar{K}) \]
co\"incident.
Il s'agit d'une comparaison standard des formules des traces de Lefschetz en
cohomologies étale $l$-adique et rigide. Dans un deuxième temps (et c'est bien la partie délicate du résultat)
on montre que $\bigoplus_{i}\hrigc{i}(\dl_{{\mathbb{F}}_q}^d/ \bar{K})[ \theta]$ est bien concentré en degré $d$, cf. \cite[th. 2.3]{GK5}. On peut alors conclure en utilisant le théorème \ref{DLet}.
\end{proof}
\section{Automorphismes équivariants des variétés de Deligne-Lusztig}
\begin{lem}\label{lemautdl}
On a
$\aut_{\gln_{d+1}({\mathbb{F}})}(\Omega^d_{\bar{{\mathbb{F}}}})= \{ 1 \}$.
\end{lem}
\begin{proof}
On a ${\mathscr{O}}(\Omega^d_{\bar{{\mathbb{F}}}})= \bar{{\mathbb{F}}} [X_1, \dots, X_d, \frac{1}{\prod_{a \in {\mathbb{P}}^d({\mathbb{F}})} l_a(1,X)}]$. Soit $\psi$ un automorphisme $\gln_{d+1}({\mathbb{F}})$-\'equivariant, $\psi$ est d\'etermin\'e par l'image de $X_i$ pour tout $i$ qui sont des \'el\'ements inversibles et qui s'\'ecrivent en fractions irr\'eductibles de la forme
\[ \psi(X_i)=\frac{P_i(X)}{Q_i(X)} = \lambda_i\prod_{a \in {\mathbb{P}}^d({\mathbb{F}})} l_a(1,X)^{\beta_{a,i}}, \ \ \ \beta_{a,i}\in {\mathbb{Z}}\
On veut montrer que $\psi(X_i)=X_i$ pour tout $i$.
\begin{itemize}
\item Prenons $\sigma : \left\llbracket 1,d \right\rrbracket\to \left\llbracket 1,d \right\rrbracket$ une permutation, on trouve $g_{\sigma} \in \gln_{d+1}({\mathbb{F}})$ tel que $g_{\sigma}.X_i=X_{\sigma(i)}$. La relation $g_{\sigma}.\psi(X_i)=\psi(g_{\sigma}.X_i)$ impose l'\'egalit\'e
\[ \frac{P_{\sigma(i)}(X)}{Q_{\sigma(i)}(X)}= \frac{P_i(\sigma(X))}{Q_i(\sigma(X))}. \]
Nous nous int\'eressons uniquement \`a $\frac{P_1(X)}{Q_1(X)}$. Nous supposons $d \ge 2$ et nous voulons nous ramener au cas $d=1$.
\item On consid\`ere $\stab(X_1) \subset \gln_{d+1}({\mathbb{F}})$. Par \'equivariance de $\psi$, on voit que $\frac{P_1}{Q_1}$ est fix\'e par $\stab(X_1)$. Introduisons $U_1= \bigcup_{i \neq 0,1} D^+(z_i^*) \subset {\mathbb{P}}^d({\mathbb{F}})$ avec $(z_i^*)_{0\le i\le d}$ la base duale de ${\mathbb{F}}^{d+1}$ (on a identifi\'e ${\mathbb{P}}^d({\mathbb{F}})$ avec ${\mathbb{P}}(({\mathbb{F}}^{d+1})^*)$). Sous ces choix, on a $X_i=\frac{z_i^*}{z_0^*}$ pour $1\le i\le d$. On v\'erifie alors que $l_a(1,X)$ est un polynôme en $X_1$ si et seulement si $a \notin U_1$. On a alors une \'ecriture unique en fractions irr\'eductibles :
\[ \frac{P_1(X)}{Q_1(X)}= \frac{\widetilde{P}_1(X_1)}{\widetilde{Q}_1(X_1)} \prod_{a \in U_1}l_a(1,X)^{\beta_{a,1}}.\]
Comme $\stab(X_1)$ agit transitivement \footnote{Soit $a$, $b$ dans $U_1$. Les familles $\{ (1,0, \dots,0), (0,1,0, \dots, 0), a \}$ et $\{ (1,0, \dots,0), (0,1,0, \dots, 0), b \}$ sont libres et on peut trouver un endomorphisme qui fixe $(1,0, \dots, 0)$, $(0,1,0, \dots, 0)$ et qui envoie $a$ sur $b$.} sur $U_1$ et laisse stable $\frac{\widetilde{P}_1(X_1)}{\widetilde{Q}_1(X_1)}$, on obtient l'\'ecriture
\[ \frac{P_1(X)}{Q_1(X)}= \frac{\widetilde{P}_1(X_1)}{\widetilde{Q}_1(X_1)} (\prod_{a \in U_1} l_a(1,X))^n \] ie. $\beta_{a,1}$ ne dépend pas de $a$ lorsque $a\in U_1$.
\item Soit $c$ dans ${\mathbb{F}}^*$, il existe $g_c \in \gln_{d+1}({\mathbb{F}})$ tel que $g_c(X_1)=X_1+c$ et $g_c(X_i)=X_i$ pour $i \neq 1$. $g_c$ laisse stable $U_1$ et on a ainsi, $g_c.(\prod_{a \in U_1} l_a(1,X))^n=(\prod_{a \in U_1} l_a(1,X))^n$. La relation $\psi(g_c.X_1)= g_c.\psi(X_1)$ impose l'\'egalit\'e
\[ c+ \frac{\widetilde{P}_1(X_1)}{\widetilde{Q}_1(X_1)} (\prod_{a \in U_1} l_a(1,X))^n = \frac{\widetilde{P}_1(X_1+c)}{\widetilde{Q}_1(X_1+c)} (\prod_{a \in U_1} l_a(1,X))^n. \]
D'o\`u
\[c.( \prod_{a \in U_1} l_a(1,X))^{-n} =\frac{\widetilde{P}_1(X_1+c)}{\widetilde{Q}_1(X_1+c)}-\frac{\widetilde{P}_1(X_1)}{\widetilde{Q}_1(X_1)} \in \bar{{\mathbb{F}}}(X_1). \]
Ainsi, $n=0$ car $\prod_{a \in U_1} l_a(1,X) \notin \bar{{\mathbb{F}}}(X_1)$ et $c\neq 0$. D'où,
\[ \psi(X_1) \in \bar{{\mathbb{F}}}[X_1, \frac{1}{\prod_{a \in {\mathbb{F}}} (X_1-a)}]^*=\bar{{\mathbb{F}}}^* \times \prod_{a \in {\mathbb{F}}} (X_1-a)^{{\mathbb{Z}}}. \]
\item On s'est ramen\'e \`a $d=1$ et on \'ecrit $X=X_1$. On a l'\'ecriture en fractions rationnelles irr\'eductibles $\psi(X)= \frac{\widetilde{P}_1(X)}{\widetilde{Q}_1(X)}$ dont tous les p\^oles et z\'eros sont dans ${\mathbb{F}}$. De plus, pour tout $c$, d'apr\`es le point pr\'ec\'edent, on a
\[ c+\frac{\widetilde{P}_1(X)}{\widetilde{Q}_1(X)}= \frac{\widetilde{P}_1(X+c)}{\widetilde{Q}_1(X+c)}. \]
Comme $c\widetilde{Q}_1+\widetilde{P}_1$ est encore premier à $\widetilde{Q}_1$, on obtient $\widetilde{Q}_1(X+c) = \widetilde{Q}_1(X)$ pour tout $c$ par unicité de l'\'ecriture en fractions rationnelles irr\'eductibles. Ainsi, $\widetilde{Q}_1(X)= (\prod_{a \in {\mathbb{F}}}(X-a))^k$ car les racines de $\widetilde{Q}_1(X)$ vues dans $\bar{{\mathbb{F}}}$ sont contenues dans ${\mathbb{F}}$ et ${\mathbb{F}}$ agit transitivement dessus par translation. Supposons $k \neq 0$, il existe $c$ tel que $c \widetilde{Q}_1(X) + \widetilde{P}_1(X)$ est non-constant\footnote{Si ce n'est pas le cas, $\widetilde{Q}_1$ et $\widetilde{P}_1$ sont tous deux constants ce qui contredit la bijectivité de $\psi$.} et admet donc une racine dans $\bar{{\mathbb{F}}}$ et donc dans ${\mathbb{F}}$. Cette dernière ne peut être une racine de $\widetilde{Q}_1$ par primalité, ce qui impose $k=0$ et $\widetilde{Q}_1$ est constante
\item On a montr\'e que $\psi(X)=P(X) \in {\mathbb{F}}[X]$. Soit une matrice $g$ telle que $g.X= \frac{1}{X}$, comme $\psi(g.X)=g. \psi(X)$, on a\footnote{Notons que $P(\frac{1}{X})$ signifie que l'on a évalué $P$ en $\frac{1}{X}$ ie. $P(\frac{1}{X})=\sum_i (a_i(\frac{1}{X^i})$ si $P(X)=\sum_i a_i X^i$}
\[\frac{1}{P(X)}=P(\frac{1}{X}).\]
Les z\'eros de $P(X)$ sont les p\^oles de $P(\frac{1}{X})$ qui sont réduits au singleton $\{ 0 \}$ d'o\`u $P(X)=\lambda X^n$ pour un certain $n$. Comme $\psi$ est une bijection, $n=1$ et $P=\lambda X$.
\item D'après ce qui précède, $P(X+c)=P(X)+c$ pour tout $c\in {\mathbb{F}}$ d'où $\lambda c=c$ et $\lambda=1$. Ainsi, $\psi=\id$!
\end{itemize}
\end{proof}
\section{Cohomologie de De Rham du premier rev\^etement\label{sssectionlt1dr}}
Nous sommes maintenant en mesure d'énoncer et de prouver le résultat technique principal de cette article.
\begin{theo}\label{theolt1dr}
On a un isomorphisme $\gln_{d+1}({\mathcal{O}}_K)$-équivariant :
\[\hdr{*} (\lt^1/\breve{K}_N)\cong \hrig{*} (\dl^d_{\bar{{\mathbb{F}}}}/\breve{K}_N)\] Par dualité de Poincaré, on a un isomorphisme semblable pour les cohomologies à support compact.
\end{theo}
\begin{proof}
Comme dans l'énoncé du théorème \ref{theomodeleshltalg}, on fixe un point géométrique $\bar{s}$ de $\bar{\rm Sh}^{[0]}$ ainsi qu'une identification $Z_0\cong \spf (\hat{{\mathscr{O}}}_{{\rm Sh},\bar{s}})$. On se donne de plus un schéma formel p-adique $V$ de réduction semi-stable voisinage de $Z_d$ dans $\hat{\rm Sh}_d$ cf \ref{theomodeleshltalg} 3. et on note $U^{lisse}$ le modèle lisse de $]\bar{\rm Sh}_{d,\bar{s}}^{lisse}[_U\otimes \breve{K}_N$ construit dans \ref{theomodeleshltalg} 4. et $U^{lisse}_s$ sa fibre spéciale. D'après \ref{theomodeleshltalg} 1., 2., on a une suite d'isomorphismes \[\lt^1\cong]\bar{s}[_{\hat{\rm Sh}}\cong ]p_d^{-1}(\bar{s})[_{\rm \hat{Sh}_d} \cong ]\bar{\rm Sh}_{d,\bar{s}}[_{\hat{\rm Sh}_d}\cong ]\bar{\rm Sh}_{d,\bar{s}}[_V\] avec $p_d$ la flèche ${\rm \hat{Sh}_d} \rightarrow \rm{ \hat{Sh} }_0$ obtenue par éclatement. L'identité $p_d^{-1}(\bar{s})= ]\bar{\rm Sh}_{d,\bar{s}}[_{\hat{\rm Sh}_d}$ découle de \ref{lemirrzh} 5. On peut alors appliquer le théorème \ref{theoexcision} dans $V$ qui est $p$-adique de réduction semi-stable et obtenir cette suite d'isomorphismes \[\hdr{*} (\lt^1\otimes \breve{K}_N)\cong \hdr{*} (]\bar{\rm Sh}_{d,\bar{s}}[_V\otimes \breve{K}_N)\cong\hdr{*} (]\bar{\rm Sh}_{d,\bar{s}}^{lisse}[_V \otimes \breve{K}_N)\] Ces morphismes naturels se déduisent d'applications de restriction qui sont $\gln_{d+1}({\mathcal{O}}_K)$-équivariantes (l'espace $]\bar{\rm Sh}_{d,\bar{s}}^{lisse}[_V)$ est stable pour cette action).
D'après \ref{theomodeleshltalg} 4. et \ref{theopurete}, on a \[\hdr{*}(]\bar{\rm Sh}_{d,\bar{s}}^{lisse}[_V\otimes \breve{K}_N)\cong\hrig{*}(U_s^{lisse}/\breve{K}_N)\cong \hrig{*}(\dl^d_{\bar{{\mathbb{F}}}}/\breve{K}_N)\] Comme l'identification entre les fibres spéciales est $\gln_{d+1}({\mathcal{O}}_K)$-équivariant, le morphisme au niveau des cohomologies l'est aussi.
L'isomorphisme de l'énoncé s'obtient en composant chacune de ces bijections équivariantes intermédiaires.
\end{proof}
\section{Actions de groupes sur la partie lisse\label{sssectionlt1dlacgr}}
Nous notons $N= q^{d+1}-1$ et $K_N=K(\varpi_N)$ o\`u $\varpi_N$ est une racine $N$-i\`eme de $\varpi$ et $\Omega^d_{\bar{{\mathbb{F}}}}={\mathbb{P}}^d \setminus \bigcup_{H \in {\mathcal{H}}_1} H=\spec(A)$ et ${\rm DL}^d_{\bar{{\mathbb{F}}}}=\spec(B)$ .
L'interprétation modulaire de $Z_0\otimes {\mathcal{O}}_C$ fournit une action naturelle des trois groupes ${\mathcal{O}}_D^*$, $G^{\circ}$ et de $I_K$ sur cet espace. Par naturalité du procédé d'éclatement, ces actions se prolongent à chaque modèle $Z_i$ et les fl\`eches $p_i : Z_i \to Z_0$ sont \'equivariantes. Ces actions ont pour effet de permuter les composantes irréductibles de la fibre spéciale et leurs intersections à savoir les fermés de la forme $Y_{M,i}$ et ces transformations respectent la dimension des espaces $M$. Ainsi, les trois groupes $G^{\circ}$, ${\mathcal{O}}_D^*$ et $I_K$ laissent stable la composante $Y_{\{0\} ,i}$ et permutent les autres, l'action de se transporte à la composante ouverte (\ref{TheoZH} 3.) $Y_{\{0\} ,d}^{lisse}=\cdots=Y_{\{0\} ,0}^{lisse}$ et donc à la variété de Deligne-Lusztig ${\rm DL}^d_{\bar{{\mathbb{F}}}}$ d'après le théorème \ref{TheoZH} 4. Mais, si l'on fixe des identifications $I_K/ I_{K_N} \cong{\mathbb{F}}_{q^{d+1}}^* \cong {\mathcal{O}}_D^*/1+ \Pi_D {\mathcal{O}}_D$ (on rappelle que ${\mathbb{F}}_{q^{d+1}}^* $ est isomorphe à $\gal(\dl_{\bar{{\mathbb{F}}}}^d/ \Omega_{\bar{{\mathbb{F}}}}^d)$), on obtient alors une autre action des trois groupes sur ${\rm DL}^d_{\bar{{\mathbb{F}}}}$.
\begin{theo}\label{theodlactgdw}
Sous le choix d'identification convenable $I_K/ I_{K_N} \cong{\mathbb{F}}_{q^{d+1}}^* \cong {\mathcal{O}}_D^*/1+ \Pi_D {\mathcal{O}}_D$, les différentes actions décrites plus haut de $G^{\circ}$, ${\mathcal{O}}_D^*$ et $I_K$ sur ${\rm DL}^d_{\bar{{\mathbb{F}}}}$ co\"incident.
\end{theo}
\begin{proof}
Pour l'action de $G^{\circ}$, cela d\'ecoule clairement de l'action de $\gln_{d+1}({\mathbb{F}})$ sur les composantes irr\'eductibles $Y_a$ \ref{TheoZH}4.. Le mod\`ele lisse dont la fibre sp\'eciale est isomorphe \`a ${\rm DL}^d_{\bar{{\mathbb{F}}}}$ est obtenu en \'etendant les scalaires \`a ${\mathcal{O}}_{\breve{K}_N}$ puis en normalisant dans $\lt^1 \otimes \breve{K}_N$. Cette op\'eration a pour effet de changer les variables $X_0, \dots, X_d$ d\'efinies dans la partie \ref{sssectionltneq} en les variables $\frac{X_0}{\varpi_N}, \dots, \frac{X_d}{\varpi_N}$. Ceci explique le fait que l'action de $I_K$ est triviale sur $I_{K_N}$ et que cette action identifie $I_K/ I_{K_N} \cong \gal({\rm DL}^d_{\bar{{\mathbb{F}}}}/ \Omega^d_{\bar{{\mathbb{F}}}}) \cong {\mathbb{F}}_{q^{d+1}}^*$ (cf \cite[Proposition 5.5. (ii)]{yosh}).
Le point le plus d\'elicat est la description de l'action de ${\mathcal{O}}_D^*$.
Celle-ci commute \`a l'action de $I_K$ qui agit par automorphismes du groupe de Galois $\gal(\dl_{\bar{{\mathbb{F}}}}^d/ \Omega_{\bar{{\mathbb{F}}}}^d)$. Comme $A= {\mathscr{O}}(\Omega^d_{\bar{{\mathbb{F}}}})$ est pr\'ecis\'ement l'ensemble des fonctions invariantes sous ce groupe, ${\mathcal{O}}_D^*$ pr\'eserve $A$. La restriction de cette action \`a $A$ d\'efinit des automorphismes $\gln_{d+1}({\mathbb{F}})$-\'equivariants, ils sont triviaux sur $A$ par \ref{lemautdl}. Ainsi, l'action étudiée d\'efinit un morphisme ${\mathcal{O}}_D^* \to \gal(\dl_{\bar{{\mathbb{F}}}}^d/ \Omega_{\bar{{\mathbb{F}}}}^d)$ qui est trivial sur $1+ \Pi_D {\mathcal{O}}_D$ car c'est un pro-$p$-groupe
qui s'envoie sur un groupe cyclique d'ordre premier \`a $p$ d'où une flèche $ {\mathcal{O}}_D^*/(1+ \Pi_D {\mathcal{O}}_D) \to \gal(\dl_{\bar{{\mathbb{F}}}}^d/ \Omega_{\bar{{\mathbb{F}}}}^d)$. Il s'agit de voir que c'est un isomorphisme voire une injection, par \'egalit\'e des cardinaux
D\'eployons $D^*$ dans $\gln_{d+1}(K_{(d+1)})$ avec $K_{(d+1)}$ l'extension non-ramifiée de degré $d+1$. Prenons $b \in {\mathcal{O}}_D^*/(1+ \Pi_D {\mathcal{O}}_D)$ et relevons-le en $\tilde{b} \in {\mathcal{O}}_D^*$ r\'egulier elliptique. En effet, les \'el\'ements r\'eguliers elliptiques forment un ouvert Zariski de ${\mathcal{O}}_D^*$ et sont donc denses pour la topologie $p$-adique. Appelons $\iota(b)$ l'image de $b$ dans $\gal(\dl_{\bar{{\mathbb{F}}}}^d/ \Omega_{\bar{{\mathbb{F}}}}^d)$. La description explicite de la cohomologie des vari\'et\'es de Deligne-Lusztig nous donne\footnote{On a $\tr(\iota(b) | \hetc{\heartsuit}(\dl_{\bar{{\mathbb{F}}}}^d,\bar{{\mathbb{Q}}}_l)[\theta])=\theta(\iota(b))\dim\hetc{\heartsuit}(\dl_{\bar{{\mathbb{F}}}}^d,\bar{{\mathbb{Q}}}_l)[\theta]=\theta(\iota(b))\dim\hetc{\heartsuit}(\Omega_{\bar{{\mathbb{F}}}}^d,\bar{{\mathbb{Q}}}_l)$ pour tout caractère $\theta$. Ainsi, $\tr(\iota(b) | \hetc{\heartsuit}(\dl_{\bar{{\mathbb{F}}}}^d,\bar{{\mathbb{Q}}}_l))=\dim\hetc{\heartsuit}(\Omega_{\bar{{\mathbb{F}}}}^d,\bar{{\mathbb{Q}}}_l)\sum_{\theta}\theta(\iota(b))$ et la dernière somme est nulle ssi $\iota(b)\neq 1$}
\[ \iota(b)=1 \Leftrightarrow \tr(\iota(b) | \hetc{\heartsuit}(\dl_{\bar{{\mathbb{F}}}}^d,\bar{{\mathbb{Q}}}_l)) \neq 0\]
Mais on a la formule de trace \cite[Th\'eor\`eme (3.3.1)]{stra}
\[ \tr(\iota(b) | \hetc{\heartsuit}(\dl_{\bar{{\mathbb{F}}}}^d, \bar{{\mathbb{Q}}}_l)) = \tr(\tilde{b} | \hetc{\heartsuit}(\lt^{1}, \bar{{\mathbb{Q}}}_l))= | \fix(\tilde{b}, \lt^1(C)) | \]
La premi\`ere \'egalit\'e d\'ecoule de l'isomorphisme entre les cohomologies de \cite{yosh}.
Nous expliquons comment calculer le nombre de points fixes sur $\lt^1(C)$ d'un élément $\tilde{b}$ r\'egulier elliptique. Nous avons un morphisme des p\'eriodes analytique ${\mathcal{O}}_D^*$-\'equivariant $\pi_{GH}: \lt^1\to \lt^0 \to {\mathbb{P}}(W)$ \cite{grho} o\`u $W$ s'identifie \`a $C^{d+1}$ et l'action sur $W$ se d\'eduit du choix d'un isomorphisme $D \otimes C \cong \mat_{d+1}(C)$. Ainsi $\tilde{b}$ admet $d+1$ points fixes dans ${\mathbb{P}}(W)$ qui sont les droites propres. Fixons $x \in {\mathbb{P}}(W)$ une de ces droites propres. D'apr\`es \cite[Proposition (2.6.7)(ii)-(iii)]{stra}, il existe alors $g_{\tilde{b}} \in G=\gln_{d+1}(K)$ ayant m\^eme polyn\^ome caract\'eristique que $\tilde{b}$ tel que
\[ \pi_{GH}^{-1}(x) \cong G/G_1\varpi^{{\mathbb{Z}}} \text{ et } b.(hG_1\varpi^{{\mathbb{Z}}}) = (g_bh)G_1\varpi^{{\mathbb{Z}}} \]
avec $G_1=1+ \varpi \mat_{d+1}({\mathcal{O}}_K)$. Ainsi $hG_1\varpi^{{\mathbb{Z}}}$ est un point fixe si et seulement si $h^{-1}g_{\tilde{b}}h \in G_1\varpi^{{\mathbb{Z}}}$.
Supposons maintenant $b\in {\mathcal{O}}_D^*/(1+ \Pi_D {\mathcal{O}}_D)$ non-trivial et montrons $| \fix(\tilde{b}, \lt^1(C)) |=0$ pour $\tilde{b}$ un relèvement r\'egulier elliptique.
Soit $x \in {\mathbb{P}}(W)$ une droite propre pour $\tilde{b}$, la matrice $g_{\tilde{b}}\in G$ décrivant l'action de $\tilde{b}$ sur $\pi_{GH}^{-1}(x)$ et supposons l'existence d'un point fixe $hG_1\varpi^{{\mathbb{Z}}}\in\pi_{GH}^{-1}(x)$ pour $\tilde{b}$ . Dans ce cas, $h^{-1}g_{\tilde{b}}h\in G_1\varpi^{{\mathbb{Z}}}$ est diagonalisable. Comme $b \equiv \zeta \pmod{\Pi_D}$, o\`u $\zeta$ est une racine de l'unit\'e diff\'erente de $1$ dans $K_{(d+1)}$, au moins une valeur propre est dans $\zeta+ {\mathfrak{m}}_{C}$\footnote{On voit que que le produit de toutes les valeurs propres de $\tilde{b}-\zeta\in \Pi_D{\mathcal{O}}_D$ est $\nr(\tilde{b}-\zeta)\in {\mathfrak{m}}_C$. Ainsi, une de ces valeurs propres doit être dans ${\mathfrak{m}}_C$. }. De m\^eme, une matrice dans $G_1\varpi^{{\mathbb{Z}}}$ diagonalisable a ses valeurs propres dans $\varpi^{{\mathbb{Z}}}(1+ {\mathfrak{m}}_{C})$\footnote{Il s'agit de voir que les matrices diagonalisables $M$ dans $\mat_{d+1}({\mathcal{O}}_K)$ ont des valeurs propres dans ${\mathcal{O}}_C$. Raisonnons sur une extension finie $L$ dans laquelle on peut diagonaliser $M$. Prenons un vecteur propre $v$ de $M$ que l'on suppose unimodulaire quitte à le normaliser ie $v$ a au moins une coordonnée dans ${\mathcal{O}}_L^*$. Par Nakayama topologique, on peut trouver une ${\mathcal{O}}_L$-base du réseau standard ${\mathcal{O}}_L^{d+1}\subset L^{d+1}$ contenant $v$. Comme la matrice $M$ préserve ce réseau, on a $Mv=\lambda v\in{\mathcal{O}}_L^{d+1}$ d'où $\lambda\in{\mathcal{O}}_L$. }. L'\'el\'ement $h^{-1}g_bh$ ne peut v\'erifier ces deux conditions en m\^eme temps, ce qui montre qu'il ne peut y avoir de point fixe dans $\pi_{GH}^{-1}(x)$ ni m\^eme dans $\lt^1(C)$. Ainsi, $\tr(\iota(b) | \hetc{\heartsuit}(\dl_{\bar{{\mathbb{F}}}}^d, \bar{{\mathbb{Q}}}_l))=0$ et $\iota$ est injective donc bijective.
\end{proof}
\begin{rem}
On a aussi une donnée de descente sur $\widehat{\lt}^1$ à la Weil (construite dans \cite[(3.48)]{rapzin}) qui induit sur $\dl_{\bar{{\mathbb{F}}}}^d$ la donnée de descente provenant de la forme ${\mathbb{F}}$-rationnelle $\dl_{{\mathbb{F}}}^d$ en suivant l'argument \cite[Lemme (3.1.11)]{wa}.
\end{rem}
D'après la remarque précédente, la structure ${\mathbb{F}}_q$-rationnelle $\dl_{{\mathbb{F}}_q}^d$ de $\dl_{\bar{{\mathbb{F}}}_q}^d$ induit une action du Frobenius $\varphi$ sur $\hetc{*}(\dl_{\bar{{\mathbb{F}}}_q}^d, \bar{{\mathbb{Q}}}_l)$ et $\hrigc{*}(\dl_{{\mathbb{F}}_q}^d/K_0) \otimes_{K_0} \bar{K}$ (cf \cite[2.1 Proposition]{EtSt}
pour ce dernier). De plus, $\varphi^{d+1}$ commute aux actions de $\gln_{d+1}({\mathbb{F}}_q) \times {\mathbb{F}}^*_{q^{d+1}}$ et les $\gln_{d+1}({\mathbb{F}}_q)$-repr\'esentations $\hetc{d}(\dl_{{\mathbb{F}}_q}^d, \bar{{\mathbb{Q}}}_l)[\theta]$ et $\hrigc{*}(\dl_{{\mathbb{F}}_q}^d)[ \theta]$ sont irr\'eductibles pour $\theta$ primitif. Cet op\'erateur agit alors par un scalaire $\lambda_{\theta}$. On a le r\'esultat suivant :
\begin{prop}\label{propdlwk}
$\lambda_{\theta}= (-1)^d q^{\frac{d(d+1)}{2}}$ pour la cohomologie \'etale $l$-adique et pour la cohomologie rigide.
\end{prop}
\begin{proof}
L'argument provient de \cite[section V, 3.14]{DM} \`a quelques twists pr\`es. Nous avons pr\'ef\'er\'e r\'ep\'eter la preuve pour \'eviter toute confusion. Pour simplifier, dans toute la d\'emonstration, $\hhh$ d\'esignera la cohomologie consid\'er\'ee ($l$-adique ou rigide), $\hhh^{\heartsuit}$ la caract\'eristique d'Euler vue comme une repr\'esentation virtuelle, $Y=\dl_{\bar{{\mathbb{F}}}}^d$ et $X=\Omega_{\bar{{\mathbb{F}}}}^d $. Par d\'efinition, on a \[ \lambda_{\theta}= \frac{{\rm Tr}(\varphi^{d+1} | \hhh^{d}(Y)[\theta])}{\dim \hhh^d(Y)[\theta]}= (-1)^d \frac{{\rm Tr}(\varphi^{d+1} | \hhh^{\heartsuit}(Y)[\theta])}{\dim \hhh^\heartsuit(Y)[\theta]}. \]
On dispose du projecteur $p_{\theta}= \frac{1}{N} \sum_{a \in \mu_N} \theta(a^{-1})a$ sur la partie $\theta$-isotypique d'o\`u la suite d'\'egalit\'es
\begin{equation}
\label{eqtrace}
{\rm Tr}(\varphi^{d+1} | \hhh^{\heartsuit}(Y)[\theta])={\rm Tr}(\varphi^{d+1} p_{\theta} | \hhh^{\heartsuit}(Y))= \frac{1}{N} \sum_{a \in \mu_N} \theta(a^{-1}) {\rm Tr}(a\varphi^{d+1} | \hhh^{\heartsuit}(Y)).
\end{equation}
Mais d'apr\`es le th\'eor\`eme des points fixes de Lefshetz (cf \cite[6.2 Théorème]{EtSt} pour la cohomologie rigide), ${\rm Tr}(a\varphi^{d+1} | \hhh^{\heartsuit}(Y))= | Y^{a \varphi^{d+1}} |$. Nous chercherons \`a d\'eterminer ces diff\'erents cardinaux. Remarquons l'\'egalit\'e ensembliste suivante due \`a la $\varphi$-\'equivariance de la projection $\pi : Y \to X$ :
\[ \pi^{-1}(X^{\varphi^{d+1}})= \pi^{-1}(X({\mathbb{F}}_{q^{d+1}}))=\bigcup_{a} Y^{a \varphi^{d+1}} \] où la dernière union est disjointe.
Pour le sens indirect, il suffit d'observer que pour un point ferm\'e $y \in Y^{a \varphi^{d+1}}$, $\pi(y)=\pi(a \varphi^{d+1}(y))=\varphi^{d+1}(\pi(y))$. Pour le sens direct, on raisonne de la m\^eme mani\`ere en se donnant un point ferm\'e $y$ tel que $\pi(y)=\varphi^{d+1}(\pi(y))$. Comme le groupe de Galois du rev\^etement $\pi$ agit librement et transitivement sur les fibres, il existe un unique $a$ dans $\mu_N$ tel que $a \varphi^{d+1}(y)=y$.
Nous allons prouver que $\pi^{-1}(X({\mathbb{F}}_{q^{d+1}}))= Y({\mathbb{F}}_{q^{d+1}})(= |Y^{\varphi^{d+1}}|)$, ce qui montrera l'annulation des autres ensembles de points fixes. Nous venons de montrer l'inclusion indirecte et \'etablissons l'autre inclusion. Prenons $(x_1, x_2, \dots, x_d, t)$ un point de $ \pi^{-1}(X({\mathbb{F}}_{q^{d+1}}))$. Ainsi $(x_1, \dots, x_d)$ appartient \`a ${\mathbb{F}}_{q^{d+1}}^d$ et $t$ v\'erifie l'\'equation\footnote{On voit $Y$ comme le rev\^etement de type Kummer associ\'e \`a $u$.} $t^N-u(x_1, \dots, x_d)=0$ dans une extension finie de ${\mathbb{F}}_{q^{d+1}}$. Mais le polyn\^ome $T^N-u(x_1, \dots, x_d) \in {\mathbb{F}}_{q^{d+1}}[T]$ est scind\'e \`a racines simples dans ${\mathbb{F}}_{q^{d+1}}$ et $(x_1, \dots, x_d,t)$ est ${\mathbb{F}}_{q^{d+1}}$-rationnel. On a montr\'e l'\'egalit\'e voulue et on obtient de plus
\[ | \pi^{-1}(X({\mathbb{F}}_{q^{d+1}})|=|Y({\mathbb{F}}_{q^{d+1}})|= N | X({\mathbb{F}}_{q^{d+1}}) |. \]
Il reste \`a calculer cette derni\`ere quantit\'e. En fixant une ${\mathbb{F}}_q$ base de ${\mathbb{F}}_{q^{d+1}}$, on a un isomorphisme de ${\mathbb{F}}_q$-espaces vectoriels ${\mathbb{F}}_{q^{d+1}}^{d+1} \xrightarrow{\sim} M_{d+1}({\mathbb{F}}_q)$ (on voit chaque \'el\'ement de ${\mathbb{F}}_{q^{d+1}}$ comme un vecteur colonne). Il est ais\'e de voir qu'un vecteur $x \in {\mathbb{F}}_{q^{d+1}}^{d+1} \backslash \{ 0 \}$ engendre une droite de $X({\mathbb{F}}_{q^{d+1}})$ si et seulement si la matrice associ\'ee par l'isomorphisme pr\'ec\'edent est inversible, d'o\`u $|X({\mathbb{F}}_{q^{d+1}})|= \frac{| \gln_{d+1}({\mathbb{F}}_q)|}{N}$.
En rempla\c{c}ant dans \eqref{eqtrace}, on obtient :
\[ {\rm Tr}(\varphi^{d+1} | \hhh^{\heartsuit}(Y)[\theta]) =\frac{ | \gln_{d+1}({\mathbb{F}}_q) |}{N} = (q^{d+1}-q^d) \dots (q^{d+1}-q) \]
d'o\`u $\lambda_{\theta}=(-1)^d q^{\frac{d(d+1)}{2}}$.
\end{proof}
\section{Réalisation de la correspondance de Langlands locale}
Dans cette partie, nous allons d\'ecrire la cohomologie des espaces ${\mathcal{M}}_{LT}^1$ et montrer qu'elle r\'ealise la correspondance de Jacquet-Langlands. On \'etendra les scalaires \`a $C$ pour tous les espaces consid\'er\'es en fibre g\'en\'erique.
On pourra simplifier le produit $G^{\circ} \times D^* $ (resp. $G^{\circ} \times D^* \times W_K$) en $GD$ (resp. $GDW$). On a
une "valuation" $v_{GDW}$ sur $GDW$ :
\[ v_{GDW} : (g,b,w) \in GDW \mapsto v_K( \nr(b) \art^{-1}(w)) \in {\mathbb{Z}}. \]
On introduit alors pour $i=0$ ou $i=d+1$, $[GDW]_{i}=v_{GDW}^{-1}(i{\mathbb{Z}})$ et $[D]_{i}=D^*\cap[GDW]_{i}={\mathcal{O}}_D^*\varpi^{\mathbb{Z}}$, $[W]_{i}=W_K\cap[GDW]_{i}=I_K(\varphi^{d+1})^{\mathbb{Z}}$.
L'espace ${\mathcal{M}}_{LT}^1$ (resp. ${\mathcal{M}}_{LT}^1/ \varpi^{{\mathbb{Z}}}$) s'identifie non canoniquement \`a $\lt^1 \times {\mathbb{Z}}$ (resp. $\lt^1 \times {\mathbb{Z}}/(d+1){\mathbb{Z}}$) et on confondra alors $\lt^1$ avec $\lt^1 \times \{0 \}$ (où $0$ est vu dans ${\mathbb{Z}}$ ou dans ${\mathbb{Z}}/(d+1){\mathbb{Z}}$ suivant si $\lt^1$ est vu comme un sous-espace de ${\mathcal{M}}_{LT}^1$ ou de ${\mathcal{M}}_{LT}^1/ \varpi^{{\mathbb{Z}}}$. Chaque élément $(g,b,w)\in GDW$ (resp $GD$) envoie $\lt^1 \times \{i \}$ si $\lt^1 \times \{i+ v_{GDW} (g,b,w)\}$
On obtient alors une action sur $\lt^1$ de $[GDW]_{d+1}$. On a alors la relation :
\[ \hetc{i}( {\mathcal{M}}_{LT}^1/ \varpi^{{\mathbb{Z}}},\bar{{\mathbb{Q}}}_l) \underset{GDW}{\cong} \cind^{GDW}_{[GDW]_{d+1}} \hetc{i}( \lt^1,\bar{{\mathbb{Q}}}_l)\cong \hdrc{i}( \lt^1,\bar{{\mathbb{Q}}}_l)^{d+1}. \]
\[ \hdrc{i}( {\mathcal{M}}_{LT}^1/ \varpi^{{\mathbb{Z}}}) \cong \hdrc{i}( \lt^1)^{d+1}. \]
Passons aux repr\'esentations qui vont nous int\'eresser. Nous d\'efinissons d'abord des $C$-repr\'esentations sur $[GDW]_{d+1}$ que nous \'etendrons \`a $GDW$ par induction. Fixons $\theta$ un caract\`ere primitif de ${\mathbb{F}}_{q^{d+1}}^*$ et des isomorphismes ${\mathcal{O}}_D^*/1+ \Pi_D {\mathcal{O}}_D \cong {\mathbb{F}}_{q^{d+1}}^* \cong I_K/I_{K_N}$ o\`u $K_N= K(\varpi^{\frac{1}{N}})$ avec $N=q^{d+1}-1$. On pose :
\begin{itemize}
\item $\theta$ sera vu comme une $[D]_{d+1}$-repr\'esentation via $[D]_{d+1}={\mathcal{O}}_D^* \varpi^{{\mathbb{Z}}} \to {\mathcal{O}}_D^* \to {\mathbb{F}}_{q^{d+1}}^*$,
\item $\bar{\pi}_{\theta}$ sera la repr\'esentation associ\'ee \`a $\theta$ sur $\bar{G}=\gln_{d+1}({\mathbb{F}})$ via la correspondance de Green. On la voit comme une $G^{\circ} \varpi^{{\mathbb{Z}}}$-repr\'esentation via $G^{\circ} \varpi^{{\mathbb{Z}}} \to G^{\circ} \to \bar{G}$,
\item $\tilde{\theta}$ sera la repr\'esentation de $[W]_{d+1}$ telle que $\tilde{\theta}|_{I_K}=\theta$ via $I_K \to I_K/I_{K_N} \xrightarrow{\sim} {\mathbb{F}}_{q^{d+1}}^*$ et $\tilde{\theta}(\varphi^{d+1})=(-1)^d q^{\frac{d(d+1)}{2}}$.
\end{itemize}
Par induction, on obtient :
\begin{itemize}
\item une $D^*$-repr\'esentation $\rho(\theta):= \cind_{[D]_{d+1}}^{D^*} \theta$,
\item une $W_K$-repr\'esentation $\sigma^{\sharp}(\theta):= \cind_{[W]_{d+1}}^{W_K} \tilde{\theta}$.
\end{itemize}
Nous souhaitons prouver :
\begin{theo}
Fixons un isomorphisme $C\cong \bar{{\mathbb{Q}}}_l$. Si $\theta$ un caract\`ere primitif, on a :
\[ \homm_{D^*}(\rho(\theta),\hdrc{i}( ({\mathcal{M}}_{LT}^1/ \varpi^{{\mathbb{Z}}})/C))\underset{G^{\circ}}{\cong} \begin{cases} \bar{\pi}_{\theta}^{d+1} & \text{ si } i=d \\ 0 & \text{ sinon.} \end{cases} \]
\[ \homm_{D^*}(\rho(\theta),\hetc{i}( ({\mathcal{M}}_{LT}^1/ \varpi^{{\mathbb{Z}}}),\bar{{\mathbb{Q}}}_l)\otimes C)\underset{G^{\circ} \times W_K}{\cong} \begin{cases} \bar{\pi}_{\theta} \otimes \sigma^{\sharp}(\theta) & \text{ si } i=d \\ 0 & \text{ sinon.} \end{cases} \]
\end{theo}
\begin{rem
Pour la deuxième partie, il a été prouvé dans \cite[Proposition 6.14.]{yosh} le résultat moins précis \[\homm_{I_K}(\tilde{\theta},\hetc{i}( ({\mathcal{M}}_{LT}^1/ \varpi^{{\mathbb{Z}}}),\bar{{\mathbb{Q}}}_l)\otimes C)\underset{G^{\circ} }{\cong} \begin{cases} \bar{\pi}_{\theta}^{d+1} & \text{ si } i=d \\ 0 & \text{ sinon.} \end{cases}.\] L'énoncé que nous obtenons est une conséquence directe de cette égalité et de \ref{theolt1dr} et \ref{theodlactgdw}.
\end{rem}
\begin{proof}
Nous avons d\'ej\`a prouv\'e l'annulation de la cohomologie quand $i \neq d$. Int\'eressons-nous au cas $i=d$. D'après les discussion précédente, on a $\hdrc{i}( {\mathcal{M}}_{LT}^1/ \varpi^{{\mathbb{Z}}}) \cong \hdrc{i}( \lt^1)^{d+1}$ et l'action de $[D]_{d+1}\times G^{\circ}$ respecte cette décomposition en produit. On a alors des isomorphismes $G^{\circ}$-équivariant:
\begin{align*}
\homm_{D^*}(\rho(\theta), \hdrc{d}( ({\mathcal{M}}_{LT}^1/ \varpi^{{\mathbb{Z}}})/C)) & = \homm_{D^*}(\cind_{[D]_{d+1}}^{D^*} \theta, \hdrc{d}( ({\mathcal{M}}_{LT}^1/ \varpi^{{\mathbb{Z}}})/C)) \\
& = \homm_{[D]_{d+1}}(\theta, \hdrc{d}( ({\mathcal{M}}_{LT}^1/ \varpi^{{\mathbb{Z}}})/C)) \\
& = \homm_{{\mathbb{F}}_{q^{d+1}}^*}(\theta, \hrigc{d}( \dl_{\bar{{\mathbb{F}}}}/C))^{d+1} &\text{d'apr\`es \ref{theolt1dr} et \ref{theodlactgdw}} \\
& = \bar{\pi}_{\theta}^{d+1}.
\end{align*}
Le même raisonnement en cohomologie étale entraîne d'après \cite[Proposition 6.16.]{yosh} et \ref{theodlactgdw} \[\homm_{D^*}(\rho(\theta), \hetc{d}( ({\mathcal{M}}_{LT}^1/ \varpi^{{\mathbb{Z}}}),\bar{{\mathbb{Q}}}_l)\otimes C) = \bar{\pi}_{\theta}^{d+1}\] en tant que $G^{\circ}$-repr\'esentation. Plus précisément, on a
\begin{align*}
\homm_{D^*}(\rho(\theta), \hetc{d}( ({\mathcal{M}}_{LT}^1/ \varpi^{{\mathbb{Z}}}),\bar{{\mathbb{Q}}}_l)\otimes C) & = \homm_{D^*}(\cind_{[D]_{d+1}}^{D^*} \theta, \cind^{GDW}_{[GDW]_{d+1}} \hetc{d}( \lt^1,\bar{{\mathbb{Q}}}_l)\otimes C) \\
& = \homm_{[D]_{d+1}}(\theta, \cind^{GW}_{[GW]_{d+1}} \hetc{d}( \lt^1,\bar{{\mathbb{Q}}}_l)\otimes C) \\
& = \cind^{GW}_{[GW]_{d+1}} \homm_{{\mathbb{F}}_{q^{d+1}}^*}(\theta, \hetc{d}(\dl_{\bar{{\mathbb{F}}}},\bar{{\mathbb{Q}}}_l)\otimes C ) &\\
& = \cind^{GW}_{[GW]_{d+1}} \hetc{d}(\dl_{\bar{{\mathbb{F}}}},\bar{{\mathbb{Q}}}_l)[\theta]\otimes C=:\tau_{GW}.
\end{align*}
en tant que $GW$-repr\'esentation.
De plus, on a
\begin{align*}
\homm_{G^{\circ}}(\bar{\pi}_{\theta}, \tau_{GW}) & = \homm_{G^{\circ}}(\bar{\pi}_{\theta},\cind^{W_K}_{[W]_{d+1}} \hetc{d}(\dl_{\bar{{\mathbb{F}}}},\bar{{\mathbb{Q}}}_l)[\theta]\otimes C) \\
&= \cind^{W_K}_{[W]_{d+1}} \homm_{G^{\circ}}(\bar{\pi}_{\theta}, \hetc{d}(\dl_{\bar{{\mathbb{F}}}},\bar{{\mathbb{Q}}}_l)[\theta]\otimes C) \\
&= \cind^{W_K}_{[W]_{d+1}} \tilde{\theta} = \sigma^{\sharp}(\theta) &\text{ d'apr\`es \ref{theodlactgdw},}
\end{align*}
en tant que $W_K$-repr\'esentation, ce qui conclut la preuve.
\end{proof}
\nocite{J1},\nocite{J2}
\bibliographystyle{alpha}
|
\section{Introduction}
\label{section:introduction}
Dynamic Time Warping (DTW) distance is a well-known similarity measure
for comparing strings that represent time-series data. DTW distance
was first introduced by Vintsyuk in 1968~\cite{vintzyuk1968}, who
applied it to the problem of speech discrimination. In the decades
since, DTW has become one of the most widely used similarity
heuristics for comparing time series~\cite{DBLP:journals/pr/Liao05} in
applications such as bioinformatics, signature verification, and
speech
recognition~\cite{dtwapp1,dtwapp2,dtwapp3,dtwapp4,dtwapp5,dtwapp6}.
Consider any two strings $x$ and $y$, with characters taken from some
metric space $(\Sigma, \delta)$. For example, in many applications, we
have that $\Sigma = \mathbb{R}^{c}$ for some parameter $c$ and that
$\delta(a, b) = \| a-b\|_2$ computes $\ell_2$ distance. Define a
\defn{time warp} of $x$ (and similarly of $y$) to be any string $x'$
that can be obtained by \defn{warping} the letters in $x$, where
warping a letter means replacing it with $\ge 1$ consecutive copies of
itself. The DTW-distance $\mbox{\it DTW}(x, y)$ is defined to be
\[
\min_{|x'| = |y'|} \sum_{i = 1}^{|x'|} \delta(x'_i, y'_i),
\]
where $x'$ and $y'$ range over all time warps of $x$ and $y$.
The most fundamental question concerning DTW is how to compute it
efficiently. Vintsyuk showed that, given strings $x$ and $y$ of length
$n$, it is possible to compute $\mbox{\it DTW}(x, y)$ in $\mbox{O}(n^2)$
time~\cite{vintzyuk1968}. His algorithm, which was one of the earliest
uses of dynamic programming, continues to be taught in textbooks and
algorithms courses today.
For many decades, it was an open question whether any algorithm could
achieve a running time of $\mbox{O}(n^{2 - \Omega(1)})$. (Interestingly,
it is known that one \emph{can} shave small sub-polynomial factors off
of the running time~\cite{DBLP:conf/icalp/GoldS17}.) A major
breakthrough occurred in 2015, when Abboud, Backurs, and Williams
\cite{DTWhard2} and Bringmann and K{\"u}nnemann \cite{DTWhard}
established conditional lower bounds prohibiting any strongly
subquadratic-time algorithm for DTW, unless the Strong Exponential
Time Hypothesis (SETH) fails.
This lower bound puts us in an interesting situation. On one hand, the
classic $\mbox{O}(n^2)$-time algorithm is often too slow for practical
applications. On the other hand, we have good reason to believe that
it is nearly optimal. This has led researchers to focus on forms of beyond-worst-case
analysis when studying the DTW problem.
An especially appealing
question~\cite{DBLP:journals/kais/SharabianiDHDKJ18,DBLP:journals/corr/abs-1903-03003}
is what happens if $x$ and $y$ both contain long runs of repeated
letters. In this case, the strings can be compressed using run-length
encoding (RLE). For example, the string ``$\str{aaaaabbc}$'' has RLE
encoding ``($\chr{a}$, 5), ($\chr{b}$, 2), ($\chr{c}$, 1)''. If a
string $x$ has $k$ runs, then it is said to have an RLE representation
of length $k$.
It is known that, if $x$ and $y$ each contain $k$ runs, then $\mbox{\it DTW}(x,
y)$ can be computed in $\mbox{O}(k^3)$
time~\cite{DBLP:journals/corr/abs-1903-03003}.\footnote{%
More generally, if $x$ contains $k$ runs and $y$ contains $\ell$ runs,
then the time becomes $\mbox{O}(k\ell^2 + \ell k^2)$.
}
It is still an open question whether it is possible to significantly
reduce this cubic running time, and in particular, whether a
near-quadratic time algorithm might be possible.
\paragrap
{This paper: A Near-Quadratic Approximation Algorithm.}
We show that, if a small approximation loss is permitted, then a
near-quadratic time algorithm is indeed possible. Consider any two
run-length encoded strings $x \in \Sigma^{n}$ and $y \in \Sigma^{n}$,
where $x$ has $k$ runs and $y$ has $\ell$ runs. Let $\delta$ be an
arbitrary distance function $\delta: \Sigma \times \Sigma \rightarrow
[\operatorname{poly}(n)]$ mapping pairs of characters to $\mbox{O}(\log n)$-bit
nonnegative integers. (Perhaps surprisingly, our algorithms will not
require $\delta$ to satisfy the triangle inequality, or even to be
symmetric.)
Our main result is an algorithm that computes a $(1+\epsilon)$-approximation for $\mbox{\it DTW}(x, y)$
in $\mbox{\~{O}}(k\ell/\epsilon^3)$ time\footnote{Here we are using
soft-O notation to mean that $\mbox{\~{O}}(k\ell/\epsilon^3)$ is equivalent to
$\mbox{O}((k\ell/\epsilon^3)\operatorname{polylog}(n))$.}. In the special case where
$\Sigma$ is over Hamming space (i.e., $\delta(a, b)$ is either $0$ or $1$ for all $a, b \in
\Sigma$), the running time of our algorithm further improves to $\mbox{\~{O}}(k\ell / \epsilon^2)$.
Our algorithm takes a classical geometric interpretation of DTW in
terms of paths through a grid, and shows how to decompose each path in
such a way that its components can be efficiently approximated. This
allows for us to reduce the problem of approximating DTW-distance
between RLE strings to the problem of computing pairwise distance in a
small directed acyclic graph.
\paragraph{Other related work.}
In addition to work on run-length-encoded strings
\cite{DBLP:journals/kais/SharabianiDHDKJ18,DBLP:journals/corr/abs-1903-03003},
there has been a recent push to study other theoretical facets of the
DTW problem. This includes work on approximation algorithms
\cite{DBLP:conf/icalp/Kuszmaul19, DTWapprox1, DTWapprox2},
low-distance-regime algorithms \cite{DBLP:conf/icalp/Kuszmaul19},
communication complexity \cite{dtwcomm}, slightly-subquadratic
algorithms \cite{DBLP:conf/icalp/GoldS17}, reductions to other
similarity measures
\cite{DBLP:conf/icalp/Kuszmaul19,sakai2020reduction, sakai2020faster},
binary DTW \cite{kuszmaul2021binary, schaar2020faster}, etc.
All of these results (along with the results in this paper) can be
viewed as part of a larger effort to close the gap between what is
known about DTW and what is known about its closely related cousin
\defn{edit distance}, which measures the number of insertions,
deletions, and substitutions of characters needed to turn one string
$x$ into another string $y$. Like DTW, edit distance can be computed
in $\mbox{O}(n^2)$ time using dynamic programming \cite{vintzyuk1968,
needleman1970general} (and can be computed in \emph{slightly}
subquadratic time using lookup-table techniques
\cite{masek1980faster}). Also like DTW, edit distance has
conditional lower bounds \cite{DTWhard,
DTWhard2,DBLP:conf/icalp/Kuszmaul19} prohibiting strongly
subquadratic time algorithms.
When it comes to beyond-worst-case analysis, however, edit distance
has yielded much stronger results than DTW: it is known how to compute
a constant-approximation for edit distance in strongly subquadratic
time \cite{edapprox1, edapprox2, edapprox3, edapprox4, edapprox5,
edapprox6, edapprox7, edapprox8}; it is known how to compute the
edit distance between RLE strings in $\tilde{O}(k\ell)$ time
\cite{rle1, rle2, rle3, rle4, rle5, rle6, rle7, rle8, rle9}; and if
two strings $x$ and $y$ have small edit distance $k$, it is known how
to compute the edit distance in $\mbox{O}(|x|+|y|+ k^2)$ time
\cite{chakraborty2016streaming, landau1998incremental}.
Whether or not any of these results can be replicated for DTW remains
the central open question in modern theoretical work on DTW. There are
several reasons to believe that DTW computation should be more
challenging than edit distance. Whereas edit distance satisfies the
triangle inequality, DTW does not (for example, if we take $\Sigma =
\{0, 1\}$, then $\mbox{\it DTW}(111110, 100000) = 0$, $\mbox{\it DTW}(100000, 000000) =
1$, and $\mbox{\it DTW}(111110, 000000) = 5$). This erratic behavior of DTW
seems to make it especially difficult to approximate. Additionally,
whereas almost all work on edit distance focuses on
insertion/deletion/substitution costs of $1$, work on DTW must
consider arbitrary cost functions $\delta$ for comparing
characters. Finally, it is known that the problem of computing edit
distance actually \emph{reduces} to that of computing DTW
\cite{DBLP:conf/icalp/Kuszmaul19}, indicating that the latter problem
is at least as hard (although, interestingly, this reduction
\emph{does not} apply in the run-length encoded setting).
Our paper represents the first evidence that an
$\tilde{O}(k\ell)$-time algorithm for DTW may be within reach. Such an
algorithm would finally unify edit distance and DTW in the
run-length-encoded setting.
\section{Technical Overview}\label{sec:technical}
This section gives a technical overview of how we approximate
$\mbox{\it DTW}$-distance between run-length encoded strings. To simplify
exposition, we focus here only on the big ideas in the algorithm
design and we defer the detailed analysis to later sections.
Throughout the section, we consider two strings $x$ and $y$ of length
$n$ whose characters are taken from a set $\Sigma$ with a
symmetric distance function $\delta: \Sigma \times \Sigma \rightarrow
\mathbb{N} \cup \{0\}$. Our only assumption on $\delta$ is that
$\delta(a, b) \in \{0, 1, 2, \ldots, \operatorname{poly}(n)\}$ for all $a, b \in
\Sigma$. (We do not need the triangle inequality on $\delta$.) Let $k$
and $\ell$ be the number of runs in $x$ and $y$, respectively. We
will describe a $(1 + \mbox{O}(\epsilon))$-approximate algorithm that takes
$\tilde{O}(k \ell / \operatorname{poly}(\epsilon))$ time.
\paragraph{How to think about $\mbox{\it DTW}$.}
There are several mathematically equivalent ways (see, e.g.,
\cite{DBLP:conf/icalp/Kuszmaul19,
DBLP:conf/icalp/GoldS17,DBLP:journals/corr/abs-1903-03003}) to
define the dynamic time warping distance between $x$ and $y$. In this
paper, we work with the geometric interpretation: consider an $n
\times n$ grid where cell $(i, j)$ has \defn{cost} $\delta(x_i, y_j)$;
consider the \defn{paths} through the grid that travel from $(1, 1)$
to $(n, n)$ via steps of the form $\langle 1, 0 \rangle$ (a horizontal
step (h-step) to the right), $\langle 0, 1\rangle$ (a vertical step
(v-step) up), and $\langle 1, 1\rangle$ (a diagonal step (d-step) to
the upper right); the \defn{cost} of such a path is the sum of the
costs of the cells that it encounters, and $\mbox{\it DTW}(x, y)$ is defined to
be the smallest cost of any such path. For an example, see Figure
\ref{figure:DTWexample1}, which shows an optimal full path for computing
$\mbox{\it DTW}(\str{aaabbbbddd}, \str{aabcdd}) = 1$, where the
$\delta$-function measures the distance between characters in the
alphabet.
Note that the $i$-th column of the grid corresponds to $x_i$ and the
$j$-th row of the grid corresponds to $y_j$. Thus, each run $x_{i_0},
\ldots, x_{i_1}$ in $x$ corresponds to a sequence of adjacent columns
$i_0, \ldots, i_1$ in the grid, and each run $y_{j_0}, \ldots,
y_{j_1}$ in $y$ corresponds to a sequence of adjacent rows $j_0,
\ldots, j_1$ in the grid.
If we want to design an algorithm that approximates $\mbox{\it DTW}(x, y)$ in
$\tilde{O}(k \ell / \operatorname{poly}(\epsilon))$ time, then it is natural to think
about the grid as follows. We break the grid into \defn{blocks} by
drawing a vertical line between every pair of runs in $x$ and a
horizontal line between every pair of runs in $y$; and label the
blocks $\{\mbox{\bf B}_{i, j}\}_{i\in[k], j\in[\ell]}$, where block $\mbox{\bf B}_{i,
j}$ corresponds horizontally to the $i$-th run in $x$ and vertically
to the $j$-th run in $y$. All of the cells within a given block $B$
have the same cost, which we refer to as $\delta(B)$. We may also use
$\delta_{i,j}$ for $\delta(\mbox{\bf B}_{i,j})$. We refer to the first/last
row of each block as a lower/upper \defn{horizontal boundary} and to
the first/last column of each block as a left/right \defn{vertical
boundary}.
Finally, it will be helpful to talk about sequences of blocks that are
adjacent horizontally or vertically. An \defn{h-block segment}
consists of a sequence of consecutive blocks lined up
horizontally. Formally, given $i_1\leq i_2$ in $[k]$ and $j$ in
$[\ell]$, we use $\mbox{\bf B}_{[i_1,i_2],j}$ for the h-block segment
$\mbox{\bf B}_{i_1,j},\mbox{\bf B}_{i_1+1,j},\ldots,\mbox{\bf B}_{i_2,j}$. Similarly, a
\defn{v-block segment} consists of a sequence of consecutive blocks
lined up vertically---we use $\mbox{\bf B}_{i,[j_1,j_2]}$ for the v-block
segment $\mbox{\bf B}_{i,j_1},\mbox{\bf B}_{i,j_1+1},\ldots,\mbox{\bf B}_{i,j_2}$. In the same
way that we can talk about the four boundaries of a block, we can talk
about the four boundaries of a given h-block or v-block segment.
Intuitively, since there are $\mbox{O}(k\ell)$ blocks, our goal is to design
an algorithm that runs in time roughly proportional to the number of
blocks.
\paragraph{How to think about the optimal path.}
Let $P$ be a minimum-cost path through the grid. We can decompose the
path into a sequence of disjoint \defn{components} $P_1, P_2, P_3,
\ldots$, where each component takes one of two forms:
\begin%
{enumerate}
\item
A \textbf{horizontal-to-vertical} (h-to-v) component connects a cell
on the lower boundary of some v-block segment to another cell on the
right boundary of the same v-block segment.
\item
A \textbf{vertical-to-horizontal} (v-to-h) component connects a cell
on the left boundary of some h-block segment to another cell on the
upper boundary of the same h-block segment.
\end{enumerate}
The components $P_1, P_2, P_3, \ldots$ are defined such that the end
cell of each $P_r$ connects to the the start cell of each $P_{r+1}$
via a single step (either horizontal, vertical, or diagonal).
We will now describe a series of simplifications that we can make to
$P$ while increasing its total cost by at most a $(1 +
\mbox{O}(\epsilon))$-factor. The simplifications are central to the design of
our algorithm.
\paragraph%
{Simplification 1: Rounding each component to start and end on ``snap
points''.}
Let us call a grid cell $(i, j)$ an \defn{intersection point} if it
lies in the intersection of a horizontal boundary and a vertical
boundary. (Each block contains at most four intersection points.) We
call a grid cell a \defn{snap point} if either it is an intersection
point, or it is of the form $(i+(1+\epsilon)^{t}, j)$ on the upper
boundary of a block $B$, or it is of the form $(i+1+(1+\epsilon)^{t}, j)$
on the lower boundary of a block $B$, or it is of the form $(i,
j+(1+\epsilon)^{t})$ on the right boundary of a block $B$, or it is of the
form $(i, j+1+(1+\epsilon)^{t})$ on the left boundary of a block $B$,
where $(i, j)$ is an intersection point of the block $B$ and $t$ is
nonnegative integer (since this is a technical overview, we ignore
floor and ceiling issues). For each boundary cell $p$ in the grid,
define $\mbox{\it snap}(p)$ to be the nearest snap point to the right of $p$,
if $p$ is on a horizontal boundary, and to be the nearest snap point
above $p$, if $p$ is on a vertical boundary. If $p$ is on both a
horizontal boundary and a vertical boundary, then $p$ is an
intersection point, so $\mbox{\it snap}(p) = p$.
How much would the cost of $P$ increase if we required each of its
components to start and end on snap points? Suppose, in particular,
that we replace each component $P_r$ with a component $P'_r$ whose
start point $p_r$ has been replaced with $\mbox{\it snap}(p_r)$ and whose end
point $q_r$ has been replaced with $\mbox{\it snap}(q_r)$. It may be that
$\mbox{\it snap}(q_r)$ does not connect to $\mbox{\it snap}(p_{r + 1})$, meaning that
$P_r'$ and $P_{r + 1}'$ do not connect properly. If this happens,
however, then one can simply modify the starting-point of $P_{r + 1}'$
in order to connect it to $P_r'$ (and it turns out this only makes
$P_{r + 1}'$ cheaper).
Let $P'$ be the concatenation of $P'_1$, $P'_2$, $P'_3$, $\ldots$. To
bound the cost of $P'$, we can argue that the cost of each $P'_r$ is
at most $(1+\epsilon)$ times that of $P_r$. To transform $P_r$ into
$P'_r$, the first step is to round the start point $p_r$ of $P_r$ to
$\mbox{\it snap}(p_r)$---one can readily see that this only decreases (or
leaves unchanged) the cost of $P_r$. The second step is to round the
end point $q_r$ of $P_r$ to $\mbox{\it snap}(q_r)$. For simplicity, assume
that $P_r$ is an h-to-v component that starts on the lower boundary of
some block $\mbox{\bf B}_{i,j_1}$ and finishes on the right boundary of some
block $\mbox{\bf B}_{i, j_2}$. Let $(u, v)$ be the lower-right intersection
point of $\mbox{\bf B}_{i, j_2}$ and suppose that $P_r$ finishes in cell
$(u,v+s)$. Then $P_r$ incurs cost at least $(s+1)\cdot\delta_{i, j_2}$ in
block $\mbox{\bf B}_{i, j_2}$. Moreover, the snap point $\mbox{\it snap}(q_r) =
\mbox{\it snap}(u,v+s)$ is guaranteed to be in the set $\{(u, v+s+t)\}_{t \in
\{0, 1, \ldots, \epsilon\cdot{s}\}}$. Thus the cost of traveling from
$q_r$ to $\mbox{\it snap}(q_r)$ is at most $\epsilon\cdot{s}\cdot\delta_{i,
j_2}$. So the cost of $P'_r$ is at most $(1+\epsilon)$ times that of
$P_r$.
By analyzing each component in this way, we can argue that
$\operatorname{cost}(P') \le (1+\epsilon)
\operatorname{cost}(P)$. Throughout the rest of the section, we will
assume that $P$ has been replaced with $P'$, meaning that each
component starts and ends with a snap point.
\paragraph{Simplification 2: Understanding the structure of each component.}
Next we observe that each individual component can be assumed to have
a relatively simple structure. For simplicity, let us focus on an
h-to-v component $P_r$ in a v-block segment $\mbox{\bf B}_{i,[j_1,j_2]}$. We
may assume without loss of generality that all of $P_r$'s h-steps
occur together on the lower boundary of some block; and that all of
$P_r$'s v-steps occur at the end of $P_r$. In other words, $P_r$ is of
the form $D_1\oplus{H}\oplus{D_2}\oplus{U}$ where $\oplus$ is for path
concatenation, $D_1$ consists of d-steps, $H$ consists of h-steps
(along a lower boundary), $D_2$ again consists of d-steps, and $U$
consists of v-steps (along a right boundary).\footnote{Note that the
components $D_1$, $H$, $D_2$, and $U$ are each individually allowed
to be length 0.} (See Figure~\ref{figure:h-to-v-path-approximation}
where the path $p_1q_1q_2p_2p_3$ in solid lines is such an example.)
Combined, these assumptions make it so that $P_r$ is fully determined
by four quantities: (1) $P_r$'s start point $p_r$, (2) the block
$\mbox{\bf B}_{i, j}$ in which $H$ occurs, (3) the length of $H$, and (4) the
length of $U$.
Define $\overline{P_r}$ to be the prefix of $P_r$ that
terminates as soon as $U$ hits its first snap point. (See
Figure~\ref{figure:h-to-v-path-approximation} where the path
$p_1q_1q_2p_2p'_2$ is such a prefix of the path $p_1q_1q_2p_2p_3$.) We
will see later that $\overline{P_r}$ is, in some sense, the
``important'' part of $P_r$ to our algorithm. Observe that
$\overline{P_r}$ is fully determined by just three quantities: (1)
$P_r$'s start point $p_r$, (2) the block $\mbox{\bf B}_{i, j}$ in which $H$
occurs, and (3) the length of $H$.
\paragraph{Simplification 3: Reducing the number of options for each component.}
We will now argue that, if we fix the start point $p_r$, and we are
willing to tolerate a $(1 + \mbox{O}(\epsilon))$-factor approximation loss, then we only need to consider $\operatorname{poly}(\epsilon^{-1} \log n)$ options for $\overline{P_r}$.
We begin by considering block $\mbox{\bf B}_{i,j}$ in which $H$ occurs. Let us
define the sequence of blocks $B_0, B_1, B_2, \ldots$ so that $B_s =
\mbox{\bf B}_{i, j + s}$ and define the sequence of costs $\delta_0,
\delta_1, \delta_2, \ldots$ so that $\delta_s = \delta_{i, j +
s}$. We say that a block $B_s$ is \defn{extremal} if $(1 +
\epsilon)\delta_s \le \delta_{t}$ for all $t < s$. If we are willing to
tolerate a $(1 + \mbox{O}(\epsilon))$-factor increase in $\overline{P_r}$'s cost, then we
can assume without loss of generality that $H$ occurs in an extremal
block. On the other hand, there are only $\mbox{O}(\log_{1+\epsilon}(n))$
extremal blocks, so this means that we only need to consider
$\mbox{O}(\log_{1+\epsilon}(n)) \le \operatorname{poly}(\epsilon^{-1} \log n)$ options for the
starting point of $H$.
Next we consider the length of the horizontal sub-component $H$. If we
are willing to tolerate a $(1 + \mbox{O}(\epsilon))$-factor increase in $\overline{P_r}$'s
cost, then we can round $|H|$, the length of $H$, up to be a power of
$(1+\epsilon)$ (or to be whatever length brings us to the next vertical
boundary). Thus we only need to consider $\mbox{O}(\log_{1+\epsilon}(n)) \le
\operatorname{poly}(\epsilon^{-1} \log n)$ options for $|H|$.
Together, the block $\mbox{\bf B}_{i, j}$ in which $H$ occurs and the length of $H$ fully determine $\overline{P_r}$. Thus, we have reached the following conclusion:
if the start point $p_r$ of the component $\overline{P_r}$ is known, then there
are only $\operatorname{poly}(\epsilon^{-1} \log n)$ options that we must consider for what $\overline{P_r}$ could look like. Moreover, although we have considered only
h-to-v components here, one can make a similar argument for v-to-h components.
\paragraph{Approximating $\mbox{\it DTW}$ in $\tilde{O}(k \ell / \operatorname{poly}(\epsilon))$ time.}
We will now construct a weighted directed acyclic graph $G = \pairg{V, E}$
that has two special vertices $\mbox{\textbf v}_0$ and $\mbox{\textbf v}_{*}$ and that satisfies the
following properties:
\begin{itemize}
\item $G$ has a total of $\tilde{O}(k \ell / \operatorname{poly}(\epsilon))$ vertices/edges, and
\item the distance from $\mbox{\textbf v}_0$ to $\mbox{\textbf v}_{*}$ in $G$ is a $(1 + \mbox{O}(\epsilon))$-approximation for $\mbox{\it DTW}(x, y)$.
\end{itemize}
This reduces the problem of approximating $\mbox{\it DTW}(x, y)$ to the problem
of computing a distance in a weighted directed acyclic graph. The
latter problem, of course, can be solved in linear time with dynamic
programming; thus the graph $G$ give us a $\tilde{O}(k \ell /
\operatorname{poly}(\epsilon))$-time $(1 + \mbox{O}(\epsilon))$-approximation algorithm for
$\mbox{\it DTW}$.
We construct $G$ to capture the different ways in which path
components $P_r$ can connect together (assuming that the path
components take the simplified forms described above). As the vertices
$v \in V$ correspond to the snap points $p$ in the grid, we can use a
vertex to refer to its corresponding snap point and vice versa. We
define $\mbox{\textbf v}_0$ to be the cell $(1, 1)$ in the grid and $\mbox{\textbf v}_{*}$
to be the cell $(n, n)$. We add edges $E$ as follows:
\begin{itemize}
\item
We connect each snap point $p$ on a horizontal (resp. vertical)
boundary to the next snap point $q$ to its right (resp. above it).
\item
We connect each snap point $p$ on a right (resp. upper) boundary to
any snap points $q$ on the adjacent left (resp. lower) boundary that
can be reached from $p$ in a single step.
\item
Each snap point $p \in V$ has $\operatorname{poly}(\epsilon^{-1} \log n)$ out-edges
corresponding to the $\operatorname{poly}(\epsilon^{-1} \log n)$ options for what a
(truncated) component $\overline{P_r}$ starting at $p$ could look
like.\footnote{Note that $ G $ is not necessarily simple. If there are
multiple ways that a component $\overline{P_r}$ could connect two
vertices $p_1$ and $p_2$, then there will be multiple edges from
$p_1$ to $p_2$.}
\end{itemize}
Note that, although we only add edges for \emph{truncated} path
components $\overline{P_r}$ (rather than full components $P_r$), these
edges can be combined with edges of the first type in order to obtain
the full component. This is why we said earlier that the truncated
component is the ``important'' part of the component.
The paths from $\mbox{\textbf v}_0$ to $\mbox{\textbf v}_{*}$ in $G$ correspond to the ways
in which we can concatenate path components together to get a full
path through the grid; if we assign the appropriate weights to the
edges, then the cost of a path through $G$ corresponds to the cost of
the same path through the grid. The distance from $\mbox{\textbf v}_0$ to
$\mbox{\textbf v}_{*}$ is therefore a $(1 + \mbox{O}(\epsilon))$-approximation for
$\mbox{\it DTW}(x, y)$.
Finally, we must bound the size of $ G $. Each block
contains at most four intersection points; so there are $\mbox{O}(k\ell)$
total intersection points. Each intersection point creates at most
$\mbox{O}(\log_{1+\epsilon}(n))$ snap points; so there are $\mbox{O}(k \ell \epsilon^{-1}
\log n)$ snap points (which are the vertices in $V$). Each snap point
has an out-degree of at most $\operatorname{poly}(\epsilon^{-1} \log n)$. Hence we have:
\[
|E| \le \mbox{O}(k \ell \epsilon^{-1} \log n) \operatorname{poly}(\epsilon^{-1} \log n) = \tilde{O}(k \ell / \operatorname{poly}(\epsilon)).
\]
We can therefore compute the distance from $\mbox{\textbf v}_0$ to $\mbox{\textbf v}_{*}$ in
$\tilde{O}(k \ell / \operatorname{poly}(\epsilon))$ time, as desired.
\paragraph{Paper outline.}
For the sake of simplicity, there are a number of details that we
chose to ignore in this section (such as a time-efficient construction
of $G$ and a careful proof that the modifications to $P$ incur only a
$(1+\mbox{O}(\epsilon))$-factor change in its cost). In the remainder of the
paper, we give a formal presentation and analysis of the algorithm
outlined above.
\sectio
{Preliminaries}
\label{section:preliminaries}
\def\myrun#1#2{{#1}{\char094}{#2}}
\begin%
{figure}[t]
\centering
\begin%
{tikzpicture}[scale=0.75]
\draw[step=1cm,gray,thin](0,0) grid (10,6);
\filldraw[fill=gray](0,0) rectangle (1,1);
\filldraw[fill=gray](1,1) rectangle (2,2);
\filldraw[fill=gray](2,1) rectangle (3,2);
\filldraw[fill=gray](3,2) rectangle (4,3);
\filldraw[fill=gray](4,2) rectangle (5,3);
\filldraw[fill=gray](5,2) rectangle (6,3);
\filldraw[fill=gray](6,3) rectangle (7,4);
\filldraw[fill=gray](7,4) rectangle (8,5);
\filldraw[fill=gray](8,5) rectangle (9,6);
\filldraw[fill=gray](9,5) rectangle (10,6);
\foreach \y in {0.5,1.5}
\foreach \x in {0.5,1.5,2.5}
\draw (\x cm,\y cm) -- (\x cm,\y cm) node {$0$};
\foreach \y in {0.5,1.5}
\foreach \x in {3.5,4.5,5.5,6.5}
\draw (\x cm,\y cm) -- (\x cm,\y cm) node {$1$};
\foreach \y in {0.5,1.5}
\foreach \x in {7.5,8.5,9.5}
\draw (\x cm,\y cm) -- (\x cm,\y cm) node {$3$};
\foreach \y in {2.5}
\foreach \x in {0.5,1.5,2.5}
\draw (\x cm,\y cm) -- (\x cm,\y cm) node {$1$};
\foreach \y in {2.5}
\foreach \x in {3.5,4.5,5.5,6.5}
\draw (\x cm,\y cm) -- (\x cm,\y cm) node {$0$};
\foreach \y in {2.5}
\foreach \x in {7.5,8.5,9.5}
\draw (\x cm,\y cm) -- (\x cm,\y cm) node {$2$};
\foreach \y in {3.5}
\foreach \x in {0.5,1.5,2.5}
\draw (\x cm,\y cm) -- (\x cm,\y cm) node {$2$};
\foreach \y in {3.5}
\foreach \x in {3.5,4.5,5.5,6.5}
\draw (\x cm,\y cm) -- (\x cm,\y cm) node {$1$};
\foreach \y in {3.5}
\foreach \x in {7.5,8.5,9.5}
\draw (\x cm,\y cm) -- (\x cm,\y cm) node {$1$};
\foreach \y in {4.5,5.5}
\foreach \x in {0.5,1.5,2.5}
\draw (\x cm,\y cm) -- (\x cm,\y cm) node {$3$};
\foreach \y in {4.5,5.5}
\foreach \x in {3.5,4.5,5.5,6.5}
\draw (\x cm,\y cm) -- (\x cm,\y cm) node {$2$};
\foreach \y in {4.5,5.5}
\foreach \x in {7.5,8.5,9.5}
\draw (\x cm,\y cm) -- (\x cm,\y cm) node {$0$};
\foreach \y in {0.5}
\draw (1pt,\y cm) -- (-1pt,\y cm) node[anchor=east] {$\chr{a}$};
\foreach \y in {1.5}
\draw (1pt,\y cm) -- (-1pt,\y cm) node[anchor=east] {$\chr{a}$};
\foreach \y in {2.5}
\draw (1pt,\y cm) -- (-1pt,\y cm) node[anchor=east] {$\chr{b}$};
\foreach \y in {3.5}
\draw (1pt,\y cm) -- (-1pt,\y cm) node[anchor=east] {$\chr{c}$};
\foreach \y in {4.5}
\draw (1pt,\y cm) -- (-1pt,\y cm) node[anchor=east] {$\chr{d}$};
\foreach \y in {5.5}
\draw (1pt,\y cm) -- (-1pt,\y cm) node[anchor=east] {$\chr{d}$};
\foreach \y in {6.5}
\draw (1pt,\y cm) -- (-1pt,\y cm) node[anchor=east] {$( y )$};
\foreach \x in {0.5}
\draw (\x cm,1pt) -- (\x cm,-1pt) node[anchor=north] {$\chr{a}$};
\foreach \x in {1.5}
\draw (\x cm,1pt) -- (\x cm,-1pt) node[anchor=north] {$\chr{a}$};
\foreach \x in {2.5}
\draw (\x cm,1pt) -- (\x cm,-1pt) node[anchor=north] {$\chr{a}$};
\foreach \x in {3.5}
\draw (\x cm,1pt) -- (\x cm,-1pt) node[anchor=north] {$\chr{b}$};
\foreach \x in {4.5}
\draw (\x cm,1pt) -- (\x cm,-1pt) node[anchor=north] {$\chr{b}$};
\foreach \x in {5.5}
\draw (\x cm,1pt) -- (\x cm,-1pt) node[anchor=north] {$\chr{b}$};
\foreach \x in {6.5}
\draw (\x cm,1pt) -- (\x cm,-1pt) node[anchor=north] {$\chr{b}$};
\foreach \x in {7.5}
\draw (\x cm,1pt) -- (\x cm,-1pt) node[anchor=north] {$\chr{d}$};
\foreach \x in {8.5}
\draw (\x cm,1pt) -- (\x cm,-1pt) node[anchor=north] {$\chr{d}$};
\foreach \x in {9.5}
\draw (\x cm,1pt) -- (\x cm,-1pt) node[anchor=north] {$\chr{d}$};
\foreach \x in {10.5}
\draw (\x cm,1pt) -- (\x cm,-1pt) node[anchor=north] {$( x )$};
\end{tikzpicture}
\caption{An optimal full path of the order $(10, 6)$ whose cost equals $1$}
\label{figure:DTWexample1}
\end{figure}
\def\myhlen#1{\lambda_h(#1)}
\def\myvlen#1{\lambda_v(#1)}
We use $\myran{n_1,n_2}$ for the set $\myset{n_1,n_1+1,\ldots,n_2}$
consisting of all the integers between $n_1$ and $n_2$, inclusive, and
use $\myran{n}$ as a shorthand for $\myran{1,n}$. We use $T_{m,n}$
for a table consisting of $m$ columns and $n$ rows and $T_{m,n}[i,j]$
for the entry on the $i$-th column and $j$-th row, where
$(i,j)\in\myran{m}\times\myran{n}$ is assumed. We may use $T$ for
$T_{m,n}$ if $m$ and $n$ can be readily inferred from the
context. Please note that an entry $T_{m, n}[i, j]$ in a table should
be distinguished from the value stored in the entry---when discussing
the value, we shall refer to it as the content of the entry $T_{m,n}[i, j]$.
\noindent{\bf Letters.}~\kern6pt
Let us assume an alphabet $\mbox{$\Sigma$}$, which is possibly infinite. We
use $\mbox{$\delta$}$ for a distance function on letters such that
$\delta(a,a)=0$ for any $a \in \mbox{$\Sigma$}$. We do not require that
$\delta$ be symmetric or the triangular inequality
$\delta(a,c)\leq\delta(a,b)+\delta(b,c)$ hold for $\delta$.
\noindent{\bf Strings.}~\kern6pt
We use $x$ and $y$ for strings. We write $x=(a_1,\ldots,a_m)$ for a
string consisting of $m$ letters such that $x[i]$ (often written as
$x_i$), the $i$-th letter in $x$, is $a_i$ for each $i\in\myran{m}$.
We use $\myrun{a}{n}$ for a string of $n$ occurrences of $a$, which is
also referred to as a {\it run} of a, and $\myrle{x}$ for a run-length
encoded (RLE) string, which consists of a sequence of runs. We use
$\mylen{\myrle{x}}$ and $\myrlen{\myrle{x}}$ for the length and
r-length of $\myrle{x}$, which are $m_1+\cdots+m_k$ and $k$,
respectively, in the case
$\myrle{x}=(\myrun{a'_1}{m_1},\ldots,\myrun{a'_k}{m_k})$.
A run in a string $x$ is maximal if it is not contained in a longer
run in $x$. There is a unique run-length encoding $\myrle{x}$ of $x$
that consists of only maximal runs in $x$, and this encoding
$\myrle{x}$ is referred to as the RLE representation of $x$. We
also use $\myrlen{x}$ for the number of maximal runs in $x$ (and
thus $\myrlen{x}=\myrlen{\myrle{x}}$).
We use $p$ for points, which are just integer pairs.
\begin%
{definition}
Given a point $p_1=(i_1,j_1)$, another point
$p_2=(i_2,j_2)$ is a successor of $p_1$ if (1) $i_2=i_1+1$ and
$j_2=j_1$, or (2) $i_2=i_1$ and $j_2=j_1+1$, or (3) $i_2=i_1+1$ and
$j_2=j_1+1$.
\end{definition}
\begin%
{definition}
Let $P=\pathseq{p_1,\ldots,p_R}$ be a sequence of points such that
$p_r\in\myran{m}\times\myran{n}$ holds for each $1\leq r\leq R$. We
call $P$ a path of order $({m},{n})$ if $p_{r+1}$ is a successor of
$p_{r}$ for each $1\leq r < R$ (and this $P$ is sometimes also called
a ``warping path''~\cite{DBLP:journals/corr/abs-1903-03003}). Also, we
refer to a path of length $2$ as a step that connects a point to one
of its successors.
\end{definition}
We use ${\mathcal P}(m,n)$ for the set of paths of order $(m,n)$. A path
$P_1\in{\mathcal P}(m,n)$ is a subpath of another path $P_2\in{\mathcal P}(m,n)$ if
$P_1$ is contained in $P_2$ (as a consecutive segment).
\begin%
{definition}
Let $P_1$ and $P_2$ be two non-empty paths. We use $P_1\simeq P_2$ to
mean that $P_1$ and $P_2$ begin at the same point and end at the same
point.
\end{definition}
\begin%
{definition}
Let $P_1$ and $P_2$ be two paths such that the first point of $P_2$,
if it exists, is the successor of the last point of $P_1$, if it
exists. We write $P_1+{P_2}$ to mean the concatenation of $P_1$
and $P_2$ (as sequences of points) that forms a path containing both
$P_1$ and $P_2$ as its subpaths. In the case where both $P_1$ and
$P_2$ are non-empty, there is a step in $P_1+{P_2}$ connecting
$P_1$ and $P_2$ that consists of the last point in $P_1$ and the first
point in $P_2$.
\end{definition}
Also, we write $P_1\oplus{P_2}$ to mean $P_1+{P'_2}$ where the
last point of $P_1$ is assumed to be the first point of $P_2$ and
$P'_2$ is the tail of $P_2$, that is, $P'_2$ is obtained from removing
the first point in $P_2$. In other words, $P_1+{P_2}$ implies
that $P_1$ and $P_2$ share no point while $P_1\oplus{P_2}$ implies
that $P_1$ and $P_2$ share one point, which is the last point of $P_1$
and the first point of $P_2$.
\begin%
{definition}
Let $x=(a_1,\ldots,a_m)$ and $y=(b_1,\ldots,b_n)$ be two
strings. For each path $P\in{\mathcal P}(m,n)$, there is a value
$\mbox{\it cost}_{x,y}(P)=\Sigma_{r=1}^{R}\mbox{$\delta$}(a_{i_r},b_{j_r})$, where $P$
equals $((i_1,j_1),\ldots,(i_R,j_R))$. This value is often referred to
as the cost of $P$. We may write $\mbox{\it cost}(P)$ for $\mbox{\it cost}_{x,y}(P)$ if it is
clear from the context what $x$ and $y$ should be.
\end{definition}
We call each $P\in{\mathcal P}(m,n)$ a full path if $(i_1,j_1)=(1,1)$ and
$(i_R,j_R)=(m,n)$. The DTW distance between $x$ and $y$, denoted by
$\mbox{\it DTW}(x, y)$, is formally defined as the minimum of $\mbox{\it cost}_{x,y}(P)$,
where $P$ ranges over the set of full paths of order $(m, n)$. Also, a
full path $P$ is referred to as an optimal full path if
$\mbox{\it cost}_{x,y}(P)=\mbox{\it DTW}(x,y)$. Given there are only finitely many paths of
order $(m, n)$, there must exist one full path that is optimal.
As an example, the shaded squares in Figure~\ref{figure:DTWexample1}
illustrate the following full path of the order $(10, 6)$:
\[
\pathseq{(1,1),(2,2),(3,2),(4,3),(5,3),(6,3),(7,4),(8,5),(9,6),(10,6)}
\]
where the number in each square is the assumed distance between the
two corresponding letters (computed here as the difference between
their positions in the alphabet).
\begin%
{definition}
Let $P=\pathseq{(i_1,j_1),\ldots,(i_R,j_R)}$.
\begin%
{enumerate}
\item
$P$ is a v-path if all the $i_r$ are the same for $1\leq r\leq R$.
\item
$P$ is a h-path if all the $j_r$ are the same for $1\leq r\leq R$.
\item
$P$ is a d-path if $i_{r+1}=i_r+1$ and $j_{r+1}=j_r+1$ for $1\leq r < R$.
\end{enumerate}
Please recall that a step is a path of length $2$. If a step is a
h-path/v-path/d-path, respectively, then it is a h-step/v-step/d-step,
respectively.
\end{definition}
\begin%
{definition}
Let $x=(a_1,\ldots,a_m)$ and $y=(b_1,\ldots,b_n)$ be two strings. We
use $\mbox{\it DTW}_{T}(x,y)$ for the table $T_{m,n}$ such that the content of
$T_{m,n}[i,j]$ is $\mbox{$\delta$}(a_i,b_j)$ for each $i\in\myran{m}$ and
$j\in\myran{n}$.
\end{definition}
We may use $\mbox{\it DTW}_{T}$ for $\mbox{\it DTW}_{T}(x,y)$ if $x$ and $y$ can be readily
inferred from the context. If a table $\mbox{\it DTW}_{T}$ can be readily inferred
from the context, we often associate a point $(i,j)$ with the entry
$\mbox{\it DTW}_{T}[i,j]$ and think of a path
$P=\pathseq{(i_1,j_1),\ldots,(i_R,j_R)}$ as the sequence of entries
$\mbox{\it DTW}_{T}[i_r,j_r]$ for $1\leq r\leq R$. As an example, a full path of
the order $(10,6)$ is given in Figure~\ref{figure:DTWexample1}, where
the path is indicated with the 10 shaded entries.
Suppose that the $i$th run ($j$th) in $x$ ($y$) consists of the
letters in $x$ ($y$) from position $i_1$ ($j_1$) to position $i_2$
($j_2$), inclusive. Then there is a corresponding block $\mbox{\bf B}_{i,j}$
consisting of all the entries $\mbox{\it DTW}_{T}[u,v]$ for $i_1\leq u\leq i_2$ and
$j_1\leq v\leq j_2$.
Finally, we introduce notation for discussing specific blocks:
\begin%
{definition}\label{define:beta-h-v}
If there exists a block $B$ to the right of $\mbox{\bf B}_{i,j}$ such that
$\delta(B) < \delta(\mbox{\bf B}_{i,j})$, we use $\beta_h(\mbox{\bf B}_{i,j})$ for such
a $B$ that is the closest to $\mbox{\bf B}_{i,j}$. In other words,
$\beta_h(\mbox{\bf B}_{i,j})$ is $\mbox{\bf B}_{i',j}$ for the least $i'$ satisfying $i
< i'$ and $\delta(\mbox{\bf B}_{i',j}) < \delta(\mbox{\bf B}_{i,j})$. Similarly, if
there exists a block $B$ above $\mbox{\bf B}_{i,j}$ such that $\delta(B) <
\delta(\mbox{\bf B}_{i,j})$, then $\beta_v(\mbox{\bf B}_{i,j})$ is $\mbox{\bf B}_{i,j'}$ for the
least $j'$ satisfying $j < j'$ and $\delta(\mbox{\bf B}_{i,j'}) <
\delta(\mbox{\bf B}_{i,j})$.
\end{definition}
\subsectio
{Computing DTW Distance with Graphs}
\label{subsection:DTW_with_graphs}
It is well known~\cite{vintzyuk1968} that one can turn the problem of
computing $\mbox{\it DTW}(x,y)$ for two given strings $x$ and $y$ into a problem
of finding the shortest distance between two given vertices in some graph,
as follows.
Let $x=(a_1,\ldots,a_m)$ and $y=(b_1,\ldots,b_n)$. We can construct a
directed graph $G_0=\pairg{V_0,E_0}$ such that
\begin%
{enumerate}
\item
there is a vertex $\mbox{\textbf v}_{i,j}\in V_0$ for each pair
$(i,j)\in\myran{m}\times\myran{n}$, and
\item
there is a directed edge $\mbox{\textbf e}(\mbox{\textbf v}_{i_1,j_1},\mbox{\textbf v}_{i_2,j_2})$ of length
$\delta(a_{i_1},b_{j_1})$ connecting $\mbox{\textbf v}_{i_1,j_1}$ to
$\mbox{\textbf v}_{i_2,j_2}$ whenever $(i_2,j_2)$ is a successor of $(i_1,j_1)$.
\end{enumerate}
We use $\mbox{\it DTW}_{G}(x,y)$ for this graph $G_0$ and use $v$ and $e$ to range
over $V_0$ and $E_0$, respectively. We may also refer to each vertex
$\mbox{\textbf v}_{i,j}\in V_0$ simply as point $(i,j)$ if there is no risk of
confusion. Clearly, $\mylen{V_0}$, the size of $V_0$, is $mn$, and
$\mylen{E_0}$, the size of $E_0$, is bounded by $3mn$ (since each point
can have at most $3$ successors).
As every warping path is naturally mapped to a path in the graph
$\mbox{\it DTW}_{G}(x,y)$ and vice versa, we can use $P$ to range over both warping
paths in $\mbox{\it DTW}_{T}(x,y)$ and paths in $\mbox{\it DTW}_{G}(x,y)$ without risking
confusion. Given a (non-empty) warping path $P$ in $\mbox{\it DTW}_{T}(x,y)$, we
use $\mbox{\it leng}(P)$ for the length of the corresponding path of $P$ in
$\mbox{\it DTW}_{G}(x,y)$, which equals the cost of $P$ minus the cost associated
with the last point in $P$. Therefore, finding the value of
$\mbox{\it DTW}(x,y)$ is equivalent to finding the shortest distance from
$\mbox{\textbf v}_{1,1}$ to $\mbox{\textbf v}_{m,n}$, which can be done by running some
version of Dijkstra's shortest distance algorithm. Alternatively,
since $\mbox{\it DTW}_{G}(x, y)$ is acyclic, one can use dynamic programming to
find the shortest distance, in which case the running time becomes
$\mbox{O}(mn)$. This yields the classic dynamic-programming solution for
computing $\mbox{\it DTW}(x, y)$~\cite{vintzyuk1968}.
The basic strategy that we use in this paper to design a DTW
approximation algorithm can be outlined as follows. Let
$G_0=\pairg{V_0,E_0}$ be the graph $\mbox{\it DTW}_{G}(x,y)$ given above. We try
to construct a graph $G=\pairg{V,E}$ such that $V\subseteq V_0$ holds
and the length of each edge $e$ in $E$ that connects a vertex $v_1$ to
another vertex $v_2$ equals the shortest distance from $v_1$ to $v_2$
as is defined in $G_0$. Let $\mbox{\it dist}_0$ and $\mbox{\it dist}$ be the shortest distance
functions on the graphs $G_0$ and $G$, respectively. We attempt to
prove that
\[
\mbox{\it dist}_0(\mbox{\textbf v}_{1,1},\mbox{\textbf v}_{m,n})\leq\mbox{\it dist}(\mbox{\textbf v}_{1,1}, \mbox{\textbf v}_{m,n})\leq\alpha\cdot{\mbox{\it dist}_0(\mbox{\textbf v}_{1,1},\mbox{\textbf v}_{m,n})}
\]
for some approximation ratio $\alpha>1$ (e.g., $\alpha=1+\epsilon$ for
$\epsilon>0$). By running a shortest-path algorithm on $G$, we are able
to compute $\mbox{\it dist}(\mbox{\textbf v}_{1,1}, \mbox{\textbf v}_{m,n})$ and thus obtain an
$\alpha$-approximation algorithm for $\mbox{\it DTW}(x,y)$. As the time
complexity of such an algorithm can be bounded by $\mbox{O}(\mylen{E})$
plus the time needed for constructing $G$, the key to finding a fast
algorithm is try to minimize $\mylen{E}$, the size of $E$ (while
ensuring that the construction of $G$ can be done in
$\mbox{O}(\mylen{E})$ time).
\section%
{A (1+$\epsilon$)-Approximation Algorithm for DTW}
\label{section:ApproxDTW2}
\def\beta^{*}{\beta^{*}}
In this section, we present and analyze a $(1
+ \epsilon)$-approximation algorithm for approximating the DTW
distance between two run-length encoded strings in near-quadratic
time.
Let $x=(a_1,\ldots,a_m)$ and $y=(b_1,\ldots,b_n)$ be two non-empty
strings. Following Section~\ref{subsection:DTW_with_graphs}, our
approach will be to construct a graph $G=\pairg{V,E}$ based on
$\mbox{\it DTW}_{G}(x,y)$, reducing the problem of computing a
$(1+\epsilon)$-approximation of $\mbox{\it DTW}(x,y)$ to finding the shortest
distance between the vertex $\mbox{\textbf v}_{1,1}$ and the vertex $\mbox{\textbf v}_{m,n}$
in $G$.
We begin by describing the notions of h-to-v paths and v-to-h
paths. The role that these will play in our algorithm is that we will
show how to decompose any full path $P$ into a concatenation $P_1 +
P_2 + \cdots$ of h-to-v and v-to-h paths.
\begin%
{definition}
Let $x$ and $y$ be two non-empty strings. A horizontal-to-vertical (h-to-v) path in $\mbox{\it DTW}_{T}(x,y)$ is a path that
connects a point on the lower boundary of a block $B_{i,j_1}$ to
another point on the right boundary of $B_{i,j_2}$. An h-to-v
component in a full path is a maximal h-to-v path that is not
contained in any longer h-to-v path in the same full path. A
vertical-to-horizontal (v-to-h) path can be defined similarly.
\end{definition}
Note that an h-to-v path matches characters from a \emph{single run}
in $x$ to characters from (possibly multiple) runs in $y$. We now make
the (standard) observation that, when we are comparing a single run to
characters to a multi-run string, DTW behaves in a very natural way:
\begin%
{observation}
\label{obs:run-path-dtw}
Let $x=(a_1,\ldots,a_m)$ and $y=(b_1,\ldots,b_n)$ be two non-empty
strings. Assume that $x$ is a run of some letter $a_0$, that is,
$a_0=a_i$ for $1\leq i\leq m$.
\begin%
{enumerate}
\item
If $m\leq n$, then we have:
$\mbox{\it DTW}(x, y)=\Sigma_{j=1}^{n}\delta(a_0,b_j)$.
This case corresponds to a path of the form $D\oplus{U}$,
where $D$ consists of only d-steps and $U$ only v-steps.
\item
If $m\geq n$, then we have:
$\mbox{\it DTW}(x,y)=\Sigma_{j=1}^{n}\delta(a_0,b_j)+(m-n)\cdot\delta(a_0,b_0)$,
where $b_0$
is some $b_j$ closest to $a_0$, that is, $\delta(a_0,b_0)$
equals the minimum of $\delta(a_0,b_j)$ for $1\leq j\leq n$.
This case corresponds to a path of the form $D_1\oplus{H}\oplus{D_2}$,
where $D_1$ and $D_2$ consist of only d-steps and $H$ only h-steps. It should be further noted that, in this case, $H$ can be assumed to travel along the lower boundary of some block, without loss of generality.
\end{enumerate}
\end{observation}
We say that a path connecting $p$ and $q$ is optimal if its cost is
the least among all the paths connecting $p$ and $q$. By merging the
two cases in Observation~\ref{obs:run-path-dtw}, we can assume that each
optimal h-to-v path is of the form $D_1\oplus{H}\oplus{D_2}\oplus{U}$,
where any of the four sub-components can vanish. From now on, we can
use a 5-tuple $(p_1, q_1, q_2, p_2, p_3)$ (which may also be written as
$p_1q_1q_2p_2p_3$) to refer to an h-to-v path, where $p_1q_1$ is $D_1$,
$q_1q_2$ is $H$, $q_2p_2$ is $D_2$, and $p_2p_3$ is $U$. Similarly,
each optimal v-to-h path is of the form
$D_1\oplus{U}\oplus{D_2}\oplus{H}$, and we use a corresponding 5-tuple
representation to refer to a v-to-h path as well.
\begin%
{figure}[t]
\centering
\begin%
{tikzpicture}[scale=1]
\node[label=left:{$p_1$}](p1) at (0.00,0.00) {};
\node[label=left:{$p_2$}](p2) at (4.00,3.00) {};
\node[label=left:{$p_3$}](p3) at (4.00,3.50) {};
\node[label=above:{$q_1$}](p3) at (1.00,1.00) {};
\node[label=above:{$q_2$}](p4) at (2.00,1.00) {};
\node[label=right:{$p'_3=\mbox{\it snap}(p_3)$}](p5) at (4.00,3.85) {};
\draw[thick](0.00,0.00)--(1.00,1.00)--(2.00,1.00)--(4.00,3.00)--(4.00,3.50);
\node[label=right:{$p'_1$}](q1) at (0.25,0.00) {};
\node[label=right:{$p'_2=\mbox{\it snap}(p_2)$}](q2) at (4.00,3.25) {};
\node[label=below:{$q'_1$}](q3) at (1.25,1.00) {};
\node[label=right:{$q'_2$}](q4) at (2.35,1.00) {};
\node[label=right:{$q'_3$}](q5) at (4.00,2.65) {};
\draw[dashed,thick](0.25,0.00)--(1.25,1.00)--(2.35,1.00)--(4.00,2.65)--(4.00,3.25)--(4.00,3.85);
\end{tikzpicture}
\caption{For illustrating h-to-v path approximation}
\label{figure:h-to-v-path-approximation}
\end{figure}
Next we argue that any full path $P_0$ can be decomposed into h-to-v and v-to-h paths.
\begin%
{lemma}
\label{lemma:run-path-seq}
Let $x$ and $y$ be two non-empty strings. Given a full path $P_0$ in
$\mbox{\it DTW}_{T}(x,y)$, we have $P_0 = P_1 + \cdots + P_R$ where $P_r$ is an
h-to-v path for each odd $1\leq r\leq R$ and $P_r$ is a v-to-h path for each even
$1\leq r\leq R$.
\end{lemma}
\begin%
{proof}
We defer the proof to Appendix~\ref{appendix:ApproxDTW2}.
\end{proof}
Given two non-empty strings $x=(a_1,\ldots,a_m)$ and
$y=(b_1,\ldots,b_n)$, we outline as follows a strategy for
approximating $\mbox{\it DTW}(x,y)$. Let $P_0$ be an optimal full path on
$\mbox{\it DTW}_{T}(x,y)$ such that $\mbox{\it cost}(P_0)=\mbox{\it DTW}(x,y)$. By
Lemma~\ref{lemma:run-path-seq}, we have $P_0 = P_1 + \cdots + P_R$,
where $P_1$ is an h-to-v path and $P_1,\ldots,P_R$ are a sequence of
alternating h-to-v paths and v-to-h paths. Let us choose an h-to-v
path $P_r$ for some $1\leq r\leq R$. By
Observation~\ref{obs:run-path-dtw}, we can assume that $P_r$ is of the
form of solid lines depicted in
Figure~\ref{figure:h-to-v-path-approximation}.%
\footnote{The meaning of the dashed lines in the figure is to be explained later.}
In more detail, the path $P_r$ moves diagonally from a point $p_1$ on the lower
boundary of a block $B_1$ until it meets the lower boundary of another
block; it moves horizontally along that lower boundary for some distance; it then moves diagonally to reach a point $p_2$ on the right boundary of another block $B_2$ (which is
either $B_1$ or sits above $B_1$); and finally it moves vertically to reach a point $p_3$ on the right boundary of another block $B_3$ (which is
either $B_2$ or sits above $B_2$). Note that the horizontal moves
contained in $P_r$ must be inside a block where those moves cost the
least.\footnote{If there are several blocks in which such horizontal
moves can take place, we simply assume that the moves are inside the
lowest of these blocks.}
Let $G_0=\pairg{V_0,E_0}$ be the graph $\mbox{\it DTW}_{G}(x,y)$ described in
Section~\ref{subsection:DTW_with_graphs} for computing $\mbox{\it DTW}(x,y)$.
We may use a point (that is, an integer pair) to refer to the
corresponding vertex in $V_0$. We may also use a path $P$ in
$\mbox{\it DTW}_{T}(x,y)$ to denote its counterpart in $G_0$.
Given $\epsilon>0$, we will construct a graph $G=\pairg{V,E}$ such that:
\begin%
{itemize}
\item
The point $(1,1)$ is in $V$ and $V\subseteq V_0$ holds.
\item
Every point in $V$ is on a boundary. Each point in $V$ that is on either a right or upper boundary is connected by an edge to the next snap point on the same boundary (if there is one).
\item
If there is a step (either an h-step, v-step, or d-step) connecting two boundary points $p_1$ and $p_2$ in
$E_0$, then there is also a step connecting $\mbox{\it snap}(p_1)$ and
$\mbox{\it snap}(p_2)$ in $E$, where $\mbox{\it snap}(p_1)$ (resp. $\mbox{\it snap}(p_2)$) is
the nearest point in $V$ above or to the right of $p_1$ (resp. $p_2$) on the same boundary as $p_1$.
\item
For each h-to-v (resp. v-to-h) path $P$ from $p_1$ to $p_2$ (depicted
by some solid lines in Figure~\ref{figure:h-to-v-path-approximation})
in $G_0$ and any point $p'_1$ in $G$ to the right of $p_1$
(resp. above $p_1$) such that $p_1$ and $p'_1$ are on the same block
boundary, there exists a path $P'$ (depicted by some dashed lines in
Figure~\ref{figure:h-to-v-path-approximation}) in $G$ connecting
$p'_1$ and the point $p'_2=\mbox{\it snap}(p_2)$ in $G$ such that $\mbox{\it dist}(P')\leq
(1+\epsilon)\mbox{\it dist}_0(P)$, where $\mbox{\it dist}$ and $\mbox{\it dist}_0$ are the shortest distance
functions on the graphs $G$ and $G_0$, respectively.
\end{itemize}
We remark that our construction of $G$ will repeatedly make use of the
following basic fact.
\def\floor#1{\lfloor{#1}\rfloor}
\begin%
{observation}\label{obs:Delta}
Let
$\Delta(t)=\floor{(1+\epsilon)^{t}}$
for integers $t\geq 0$.
For each integer $d\geq 1$,
we have
a $(1+\epsilon)$-approximation of $d$
that is of the form $\Delta(t)$.
In other words,
$d\leq\Delta(t)\leq(1+\epsilon)\cdot{d}$ holds for some $t$.
\end{observation}
We now describe how to construct the graph $G$. We construct the set $V$ of vertices as follows:
\begin
{enumerate}
\item
Each vertex in $G_0$ corresponding to a corner point in
$\mbox{\it DTW}_{T}(x,y)$ should be added into $V$. There are at most $4k\ell$ such
vertices, where $k=\myrlen{x}$ and $\ell=\myrlen{y}$.
\item
Assume
$(i, j)$ is the lower-left corner of block $B$.
\begin%
{itemize}
\item
If a point
$(i+1+\Delta(t), j)$
is on the lower boundary of $B$
for some $t\geq 0$,
then this point should be added into $V$.
There are at most $\log_{1+\epsilon}(m)$ such points for the block $B$.
\item
If a point
$(i, j+1+\Delta(t))$
is on the left boundary of $B$
for some $t\geq 0$,
then this point should be added into $V$.
There are at most $\log_{1+\epsilon}(n)$ such points for the block $B$.
\end{itemize}
\item
Assume
$(i, j)$ is the upper-left corner of block $B$.
If a point
$(i+\Delta(t), j)$ is on the upper boundary of $B$
for some $t\geq 0$,
then this point should be added into $V$.
There are at most $\log_{1+\epsilon}(m)$ such points for the block $B$.
\item
Assume
$(i, j)$ is the lower-right corner of block $B$.
If a point
$(i, j+\Delta(t))$ is on the right boundary of $B$
for some $t\geq 0$,
then this point should be added into $V$.
There are at most $\log_{1+\epsilon}(n)$ such points for the block $B$.
\end{enumerate}
The points in $V$ are referred to as \defn{snap points}. Given a snap
point $p'$ on the upper or right boundary of some block, if $p'q'$ is
a d-step for some point $q'$, then $q'$ is also a snap point. This can
be readily verified by inspecting the construction of $V$. Also, for
each block $B$, there are at most $\mbox{O}(\log(m+n)/\epsilon)$ points added
to $V$. Therefore, $\mylen{V}$, the size of $V$, is
$\mbox{O}(k\ell\cdot\log(m+n)/\epsilon)$ or simply $\mbox{\~{O}}(k\ell/\epsilon)$.
\begin%
{definition}
Given a point $p\in V_0$ on a horizontal
boundary of a block $B$, we use $\mbox{\it snap}_h(p)$
for the point $p'\in V$ such that $p'$ is $p$ if $p\in V$ or $p'$ is
the closest point to the right of $p$ that is on the same boundary of $B$.
The existence of such a point is guaranteed
as all of the corner points are included in $V$.
Similarly, $\mbox{\it snap}_v(p)$ can be defined for each point $p$ on a vertical boundary
of a block.
\end{definition}
We can use $\mbox{\it snap}(p)$ for either $\mbox{\it snap}_h(p)$ or $\mbox{\it snap}_v(p)$ without
confusion: If both $\mbox{\it snap}_h(p)$ and $\mbox{\it snap}_v(p)$ are defined for $p$,
then $p$ must be a corner of some block $B$, implying
$p=\mbox{\it snap}_h(p)=\mbox{\it snap}_v(p)$ since $p\in V$ holds. We argue as follows
that finding $\mbox{\it snap}(p)$ for each given $p$ can be done in
$\mbox{\~{O}}(1)$ time.\footnote{ We slightly abuse the $\mbox{\~{O}}$ notation here
as the parameters $m$ and $n$ for the implicit log-terms are not explicitly
mentioned.}
\def\mbox{\bf B}{\mbox{\bf B}}
\def\myhat#1{\hat{#1}}
\def\myhat{i}_{x}{\myhat{i}_{x}}
\def\myhat{j}_{y}{\myhat{j}_{y}}
\begin%
{definition}
\label{lemma:ij-hat}
Let $x=(a_1,\ldots,a_m)$ be a string and
$\myrle{x}=(\myrun{a'_1}{m_1},\ldots,\myrun{a'_k}{m_k})$ be its RLE
representation. Let $M_{r}$ be $m_1+\cdots+m_{r}$ for each $0\leq r <
k$. For each $1\leq i\leq m$, we use $\myhat{i}_{x}$ for the pair $(i_0,i_1)$
such that $i=M_{i_0}+i_1$ for $1\leq i_1\leq m_{i_0+1}$.
\end{definition}
We may use ${\myhat{i}}$ for $\myhat{i}_{x}$ if $x$ can be readily inferred from the
context.
It is worth taking a moment to verify that we can compute $\myhat{i}_{x}$ efficiently. Assume that an array storing $M_{r}$ for $0\leq r < k$
is already built (in $\mbox{O}(k)$ time). Given $i\in\myran{m}$, we can
perform binary search on the array to find $i_0$ in
$\mbox{O}(\log(k))$ time such that $M_{i_0} < i \leq M_{i_0+1}$; we can
then compute $\myhat{i}_{x}$ as $(i_0,i-M_{i_0})$.
It is also worth verifying that we can compute $\mbox{\it snap}(p)$ in $\mbox{\~{O}}(1)$ time. Given a point $p=(i,j)$ on a boundary of some block $B$ in
$\mbox{\it DTW}_{T}(x,y)$, we can compute $\myhat{i}_{x}=(i_0,i_1)$ in $\mbox{O}(\log(k))$ time.
Similarly, we can compute $\myhat{j}_{y}=(j_0,j_1)$ in $\mbox{O}(\log(\ell))$ time.
We can locate the block $B$ as $\mbox{\bf B}_{i_0+1,j_0+1}$, and then find
$\mbox{\it snap}(p)$ in $\mbox{O}(1)$ time (assuming $\log_{1+\epsilon}(i_1)$ and
$\log_{1+\epsilon}(j_1)$ can be computed in $\mbox{O}(1)$ time). Therefore,
given $p$, we can compute $\mbox{\it snap}(p)$ in $\mbox{\~{O}}(1)$ time.
Having established that we can compute $\myhat{i}$ and $\mbox{\it snap}(p)$
efficiently, we are nearly ready to describe the construction of the
edges $E$. Our final task before doing so is to establish a bit more
notation for how to talk about blocks.
Please recall that $\beta_h(\mbox{\bf B}_{i,j})$ (resp. $\beta_v(\mbox{\bf B}_{i,j})$
refers to the closest block $\mbox{\bf B}_{i',j}$ (resp. $\mbox{\bf B}_{i,j'}$) such
that $\delta(\mbox{\bf B}_{i',j}) < \delta(\mbox{\bf B}_{i,j})$
(resp. $\delta(\mbox{\bf B}_{i,j'}) < \delta(\mbox{\bf B}_{i,j})$) holds. If there is
no such a block, $\beta_h(\mbox{\bf B}_{i,j})$ (resp. $\beta_h(\mbox{\bf B}_{i,j})$) is
undefined.
\begin{definition}
\label{definition:nbeta}
We refer to $\mbox{\bf B}_{i_1,j}, \cdots, \mbox{\bf B}_{i_S,j}$ as a $\beta_h$-sequence
if $\mbox{\bf B}_{i_{s+1},j}=\beta_h(\mbox{\bf B}_{i_{s},j})$ for $1\leq s < S$. Let
$\beta^{*}_h(x,y)$ be the length of a longest $\beta_h$-sequence.
Clearly, we have $\beta^{*}_h(x,y)\leq\myrlen{x}$. Similarly, we refer to
$\mbox{\bf B}_{i,j_1}, \cdots, \mbox{\bf B}_{i,j_S}$ as a $\beta_v$-sequence if
$\mbox{\bf B}_{i,j_{s+1}}=\beta_v(\mbox{\bf B}_{i,j_s})$ for $1\leq s < S$. Let
$\beta^{*}_v(x,y)$ be the length of a longest $\beta_v$-sequence.
Clearly, we have $\beta^{*}_v(x,y)\leq\myrlen{y}$. Let
$\beta^{*}(x,y)=\max(\beta^{*}_h(x,y),\beta^{*}_v(x,y))$.
\end{definition}
Observe that if
the underlying distance function $\delta$ on letters is from Hamming
space, then $\beta^{*}(x,y)\leq 2$ for any $x$ and $y$. Slightly more
generally, if $\delta$ is bounded by a constant, then $\beta^{*}(x,y)$ is
bounded by the same constant plus one. Later in the section, in the proof of
Theorem \ref{theorem:ApproxDTW2-poly-n}, we will also see an important (and
much more general) case where $\beta^{*}(x,y)$ is guaranteed to be
$\mbox{\~{O}}(1)$.
\def\overline{q}{\tilde{q}}
\def\overline{q}{\overline{q}}
\def{\it snaps}{{\it snaps}}
We are now ready to explain the construction of the set $E$ of edges
for connecting vertices in $V$. The basic idea is to construct $E$ in
such a way that, for any constructed path $p'_1q'_1q'_2q_3'p'_2$ (as
is depicted in Figure~\ref{figure:h-to-v-path-approximation}), there
should be a path in $G$ going from $p'_1$ to $p'_2$ whose cost is at
most the cost of the path in $G_0$---this allows for the
graph $G$ to capture all such paths, and ultimately allows for $G$ to
be used in our approximation algorithm. Formally, the construction of
$E$ can be performed with the following steps:
\begin%
{enumerate}
\item
Note that
the corner points in $V_0$ are all in $V$.
The edges
connecting these corner points in $E_0$ should be added into $E$.
\item
Given a point $p'_1\in V$ on the upper boundary of a block $B$, if
there is a d-step from $p'_1$ to $p'_2$ (on the lower boundary of the
block above $B$), then $p'_2$ is in $V$ and an edge from $p'_1$ to
$p'_2$ should be added into $E$ whose length equals $\delta(B)$.
\item
Given a point $p'_1\in V$ on the right boundary of a block $B$, if
there is a d-step from $p'_1$ to $p'_2$ (on the left boundary of the
block to the right of $B$), then $p'_2$ is in $V$ and an edge from
$p'_1$ to $p'_2$ should be added into $E$ whose length equals
$\delta(B)$.
\item
If two points $p'_1=(i_1,j_1)$ and $p'_2=(i_2,j_2)$ in $V$ are on the
same horizontal or vertical boundary of a block $B$ such that $p'_2$
is the closest point above or to the right of $p'_1$, then an edge from
$p'_1$ to $p'_2$ should be added into $E$ whose length equals
$(i_2-i_1)\cdot\delta(B)$ (horizontal) or $(j_2-j_1)\cdot\delta(B)$ (vertical).
\item
Let $p'_1$ be a point in $V$ on the lower boundary of a block
$B_1$. This step adds into $E$ edges between $p'_1$ and certain chosen
snap points $q'_4$ such that there are h-to-v paths connecting $p'_1$
and $q'_4$.
Let us use $B_1^{1},\ldots,B_1^{S}$ for the sequence where
$B_1=B_1^{1}$ and $B_1^{s+1}=\beta_v(B_1^{s})$ for $1\leq s < S$ and
$\beta_v(B_1^{S})$ is undefined. Clearly, $S$ is bounded by
$\beta^{*}_v(x,y)$ (according to the definition of $\beta^{*}_v(x,y)$). Let
$B'_1$ range over $B_1^{1},\ldots,B_1^{S}$.
Let $q'_1 = (i'_1, j'_1)$ be the point on the lower boundary of $B'_1$
such that the path connecting $p'_1$ and $q'_1$ consists of only
d-steps. Let ${\it snaps}_h(q'_1)$ be the set consisting of the point
$q'_1$, the points on the lower boundary of $B'_1$ of the form
$(i'_1+\Delta(t), j'_1)$ for some $t\geq 0$, and the lower-right
corner point of $B'_1$. For each $q'_2$ ranging over the set
${\it snaps}_h(q'_1)$, there exists at most one point $q'_3$ on the right
boundary of some $B_2$ (which is either $B'_1$ or sits above $B'_1$)
such that the path connecting $q'_2$ and $q'_3$ consists of only
d-steps. As this $q'_3$ may not be in $V$, we choose $q'_4$ to be
$\mbox{\it snap}_v(q'_3)$, which is in $V$ by definition. Note that the path
$p'_1q'_1q'_2q'_3q'_4$ is an h-to-v path in $\mbox{\it DTW}_{T}(x,y)$.
We add into $E$ an edge between $p'_1$ and $q'_4$ for each $q'_4$.
The length of each added edge connecting $p'_1$ and $q'_4$ is the
shortest distance between $p'_1$ and $q'_4$, which, by
Lemma~\ref{lemma:h-to-v-path-cost}, can be computed in
$\mbox{\~{O}}(1)$ time.
There is one $q'_1$ for each $B'_1$, and there are at most
$\log_{1+\epsilon}(m)$ many of $q'_2$ for each $q'_1$, and there is at
most one $q'_3$ for each $q'_2$ and one $q'_4$ for each
$q'_3$. Therefore, for each $p'_1$, there are at most
$\beta^{*}_v(x,y)\cdot\log_{1+\epsilon}(m)$ edges added into $E$.
\item
Let $p'_1$ be a point in $V$ on the left boundary of a block $B_1$.
This step adds into $E$ edges between $p'_1$ and certain chosen snap
points $q'_4$ such that there are v-to-h paths connecting $p'_1$ and
$q'_4$. We omit the details that are parallel to those in the
previous step. There are at most $\beta^{*}_h(x,y)\cdot\log_{1+\epsilon}(n)$
edges added into $E$ for each $p'_1$.
\end{enumerate}
Let us take a moment to discuss how to efficiently compute the lengths
of the edges added to $E$ during the construction of
$G=\pairg{V,E}$. That is, how to construct and determine the cost of
each dotted path $p'_1q'_1q'_2q'_3q'_4$ depicted in
Figure \ref{figure:h-to-v-path-approximation}. (Note that
$q'_4=\mbox{\it snap}_v(q'_3)$ is not shown in the figure.)
\begin%
{lemma}
\label%
{lemma:beta-compute}
Let $x$ and $y$ be two non-empty strings.
For $k=\myrlen{x}$ and $\ell=\myrlen{y}$,
\begin%
{enumerate}
\item
we can compute $\beta_h(B)$ for all the blocks $B$ in $\mbox{\it DTW}_{T}(x,y)$
in $\mbox{O}(k\ell\cdot\log(k))$ time, and
\item
we can compute $\beta_v(B)$ for all the blocks $B$ in $\mbox{\it DTW}_{T}(x,y)$
in $\mbox{O}(k\ell\cdot\log(\ell))$ time.
\end{enumerate}\end{lemma}
\begin%
{proof}
Please see Appendix~\ref{appendix:ApproxDTW2} for details.
\end{proof}
\begin%
{lemma}
\label{lemma:h-to-v-path-cost}
For each h-to-v path $(p'_1,q'_1,q'_2,q'_3,q'_4)$, its length can be
computed in $\mbox{\~{O}}(1)$ time if the five snap points $p'_1$, $q'_1$, $q'_2$,
$q'_3$, and $q'_4$ are given.
\end{lemma}
\begin%
{proof}
Please see Appendix~\ref{appendix:ApproxDTW2} for details.
\end{proof}
For brevity, we omit the obvious lemma parallel to
Lemma~\ref{lemma:h-to-v-path-cost} that is instead on computing
the lengths of v-to-h paths in $\mbox{\~{O}}(1)$ time.
We are now in a position to state and prove the main theorems of the
paper. As noted earlier, the basic idea behind our $(1
+ \epsilon)$-approximation algorithms is to compute a path-distance
through the graph $G = (V, E)$, and show that this distance closely
approximates $\mbox{\it DTW}(x, y)$.
We begin by stating a theorem that parameterizes its running time by
$\beta^{*}(x, y)$---we will then apply this result to obtain fast running
times in the cases where the distance function $\delta$ outputs either
$\mbox{O}(\log n)$-bit integer values
(Theorem \ref{theorem:ApproxDTW2-poly-n}) or
$\{0, 1\}$-values (Theorem \ref{theorem:ApproxDTW2-const}).
\begin%
{theorem}
\label{theorem:ApproxDTW2}
Let $x=(a_1,\ldots,a_m)$ and $y=(b_1,\ldots,b_n)$ be two non-empty
strings, and let $\myrle{x}$ and $\myrle{y}$ denote the run-length encoded versions of the two strings.
There exists a $(1+\epsilon)$-approximation algorithm (ApproxDTW) for
each $\epsilon>0$ that takes $\myrle{x}$ and $\myrle{y}$ as its input and
returns a value $\tilde{\mbox{\it DTW}}(x,y)$ satisfying $\mbox{\it DTW}(x,y) \leq \tilde{\mbox{\it DTW}}(x,y)
\leq (1+\epsilon)\cdot\mbox{\it DTW}(x,y)$. Moreover, the worst-case time complexity of this
algorithm is $\mbox{\~{O}}(k\ell\cdot\beta^{*}(x,y)/\epsilon^2)$ for $k=\myrlen{x}$
and $\ell=\myrlen{y}$, where $\beta^{*}(x,y)$ is defined in
Definition~\ref{definition:nbeta}.
\end{theorem}
\begin%
{proof}
The analysis of the approximation ratio follows as in Section \ref{sec:technical}. For the full proof of the theorem, see Appendix~\ref{appendix:ApproxDTW2}.
\end{proof}
\subsection%
{Time-Bound for Polynomially-Bounded Letter Distances}
In this section, we present a variant of the algorithm ApproxDTW for
approximating $\mbox{\it DTW}(x,y)$ under the general condition that the
distances between letters are integer values bounded by some
polynomial of the lengths of $x$ and $y$. The time complexity of this
variant, which takes $\myrle{x}$ and $\myrle{y}$ as its input to
compute $\mbox{\it DTW}(x,y)$, is $\mbox{\~{O}}(k\ell/\epsilon^3)$ for $k=\myrlen{{x}}$
and $\ell=\myrlen{{y}}$.
\def\mbox{cpow}{\mbox{cpow}}
\begin%
{definition}
Let $\delta$ be a distance function on letters such that
$\delta(a,b)\geq 1$ if $\delta(a,b)\neq 0$. Given $\epsilon_1 > 0$, we
use $\delta_{\epsilon_1}$ for the distance function such that
$\delta_{\epsilon_1}(a,b)=0$ if $\delta(a,b)=0$, or $\delta_{\epsilon_1}(a,
b)=\mbox{cpow}(1+\epsilon_1,\delta(a,b))$ if $\delta(a,b)\geq 1$, where
$\mbox{cpow}(1+\epsilon_1,\alpha)$ equals $(1+\epsilon_1)^{t}$ for the least integer
$t$ such that $\alpha\leq(1+\epsilon_1)^{t}$ holds.
\end{definition}
Please note that
$\delta(a,b)\leq\delta_{\epsilon_1}(a,b)\leq(1+\epsilon_1)\cdot\delta(a,b)$ holds
for any letters $a$ and $b$.
\begin%
{lemma}
\label{lemma:delta_eps}
Let $\mbox{\it DTW}(\delta)$ be the DTW distance function where the
underlying distance function for letters is $\delta$. Given $\epsilon_1>0$,
we have the following inequality for each pair of strings $x$ and $y$:
\[
\mbox{\it DTW}(\delta_{\epsilon_1})(x,y)\leq(1+\epsilon_1)\cdot\mbox{\it DTW}(\delta)(x,y)
\]
\end{lemma}
\begin%
{proof}
Let $P$ be an optimal full path such that its length based on $\delta$
equals $\mbox{\it DTW}(\delta)(x,y)$. We know that the length of $P$ based on
$\delta_{\epsilon_1}$ is bounded by $(1+\epsilon_1)\cdot\mbox{\it DTW}(\delta)(x,y)$
since $\delta_{\epsilon_1}(a,b)\leq(1+\epsilon_1)\cdot\delta(a,b)$ holds for
any letters $a$ and $b$. As $\mbox{\it DTW}(\delta_{\epsilon_1})(x,y)$ is bounded
by the length of $P$ based on $\delta_{\epsilon_1}$, we have the claimed
inequality.
\end{proof}
Let $\epsilon_1>0$ and $\epsilon_2>0$. By Lemma~\ref{lemma:delta_eps}, every
$(1+\epsilon_2)$-approximation algorithm for DTW based on
$\delta_{\epsilon_1}$ is a $(1+\epsilon_1)\cdot(1+\epsilon_2)$-approximation
algorithm for DTW based on $\delta$. For each $\epsilon>0$, if we choose,
for example, $\epsilon_1=\epsilon/2-\epsilon^2/2$ and $\epsilon_2=\epsilon/2$, then we
have $(1+\epsilon_1)\cdot(1+\epsilon_2) < 1+\epsilon$, implying that every
$(1+\epsilon_2)$-approximation algorithm for DTW based on
$\delta_{\epsilon_1}$ is a $(1+\epsilon)$-approximation algorithm for DTW
based on $\delta$.
\begin%
{theorem}\label{theorem:ApproxDTW2-poly-n}
Let $x=(a_1,\ldots,a_m)$ and $y=(b_1,\ldots,b_n)$ be two non-empty
strings.
Assume that the underlying distance function $\delta$ satisfies
(1)~$\delta(a,b)\geq 1$ if $\delta(a,b)\neq 0$ and (2)~$\delta(a,b)$
is $\operatorname{poly}(m+n)$ for any letters $a$ in $x$ and $b$ in $y$. There
exists a $(1+\epsilon)$-approximation algorithm for each $\epsilon > 0$ that
takes $\myrle{x}$ and $\myrle{y}$ as its input and returns a value $w$
satisfying $\mbox{\it DTW}(x,y) \leq w\leq (1+\epsilon)\cdot\mbox{\it DTW}(x,y)$. And the
worst-case time complexity of this algorithm is $\mbox{\~{O}}(k\ell/\epsilon^3)$ for
$k=\myrlen{{x}}$ and $\ell=\myrlen{{y}}$.
\end{theorem}
\begin%
{proof}
Let $\epsilon_1=\epsilon/2-\epsilon^2/2$ and $\epsilon_2=\epsilon/2$. By
Theorem~\ref{theorem:ApproxDTW2}, ApproxDTW (as is
presented in the proof of Theorem~\ref{theorem:ApproxDTW2}) takes
$\myrle{x}$ and $\myrle{y}$ as input and returns a
$(1+\epsilon_2)$-approximation of $\mbox{\it DTW}(\delta_{\epsilon_1})(x,y)$. And the
time complexity of the algorithm is $\mbox{\~{O}}(k\ell\cdot\beta^{*}(x,y)/{\epsilon_2}^2)$.
Note that there are only $\mbox{O}(\log_{1+\epsilon_1}(m+n))$-many distinct
values of $\delta_{\epsilon_1}(a,b)$ for $a$ and $b$ ranging over letters
in $x$ and $y$, respectively. Hence, for the underlying distance
function $\delta_{\epsilon_1}$ on letters, $\beta^{*}_h(x,y)$ is
$\mbox{O}(\log_{1+\epsilon_1}(m+n))$ and $\beta^{*}_v(x,y)$ is also
$\mbox{O}(\log_{1+\epsilon_1}(m+n))$, which implies that $\beta^{*}(x,y)$ is
$\mbox{O}(\log_{1+\epsilon_1}(m+n))$ or simply $\mbox{\~{O}}(1/\epsilon_1)$. Therefore,
we can use ApproxDTW to compute a $(1+\epsilon_2)$-approximation of
$\mbox{\it DTW}(\delta_{\epsilon_1})(x,y)$ in
$\mbox{\~{O}}(k\ell/{\epsilon_1}{\epsilon_2}^2)$ time. Since any
$(1+\epsilon_2)$-approximation of $\mbox{\it DTW}(\delta_{\epsilon_1})(x,y)$ is a
$(1+\epsilon)$-approximation of $\mbox{\it DTW}(\delta)(x,y)$, we are done.
\end{proof}
\subsection%
{Time-Bound for Constant-Bounded Letter Distances}
Assume that there exists a constant $N$ such that $\delta(a,b)$ is an
integer less than $N$ for each pair $a$ and $b$ in $\mbox{$\Sigma$}$. For
instance, $(\Sigma,\delta)$ satisfies this condition if it is Hamming
space (for which $N$ can be set to $2$).
\begin%
{theorem}\label{theorem:ApproxDTW2-const}
Assume that $\delta(a,b)$ are $\mbox{O}(1)$ for $a,b\in\Sigma$.
Then ApproxDTW,
the $(1+\epsilon)$-approximation algorithm for DTW
given in the proof of Theorem~\ref{theorem:ApproxDTW2}, runs
in $\mbox{\~{O}}(k\ell/\epsilon^2)$ time for $k=\myrlen{{x}}$ and
$\ell=\myrlen{{y}}$, where $\myrle{x}$ and $\myrle{y}$ are the
input of the algorithm.
\end{theorem}
\begin%
{proof}
This theorem follows from Theorem~\ref{theorem:ApproxDTW2} immediately
since $\beta^{*}(x,y)$ is $\mbox{O}(1)$.
\end{proof}
\section{Conclusion}
\label{section:conclusion}
We have presented in this paper an algorithm for approximating the
DTW distance between two RLE strings. Trading accuracy for
efficiency, this algorithm is of (near) quadratic-time complexity
and thus, as can be expected, asymptotically faster than the exact DTW
algorithm of cubic-time
complexity~\cite{DBLP:journals/corr/abs-1903-03003}, which is
currently considered the state-of-art of its kind.
It will be interesting to further investigate whether there exist
asymptotically faster approximation algorithms for DTW than the one
presented in this paper. In particular, it seems both interesting and
challenging to answer the open question as to whether there exists a
(near) quadratic-time algorithm for computing the (exact) DTW distance
between two RLE strings.
\section*{Acknowledgements}
The authors would like to thank Charles E. Leiserson for his helpful feedback and suggestions.
This research was funded by a Hertz Foundation Fellowship and an NSF GRFP Fellowhship.
The research was also partially sponsored by the United States Air Force Research Laboratory and the United States Air Force Artificial Intelligence Accelerator and was accomplished under Cooperative Agreement Number FA8750-19-2-1000. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the United States Air Force or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation herein.
\newpage
|
\section{Introduction}
Federated learning (FL)~\cite{mcmahan2017communication, konevcny2015federated} enables building an ML model from private data distributed among a set of participating worker devices. In FL, the workers fine-tune a global model received from the server on their local data to compute local model updates that they upload to the server, which aggregates them to obtain an updated global model. This process is iterated until it converges to a high-quality global model.
Therefore, FL improves accuracy, privacy and scalability, respectively, by learning from big joint data, keeping the workers' local data at their respective devices ({\em e.g.} smartphones) and distributing the training load across the workers' devices~\cite{bonawitz2019towards}.
Despite these benefits, the distributed nature of FL makes it vulnerable to poisoning attacks~\cite{blanco2021achieving,ferrag2021federated}.
Since the server cannot control the behavior of the workers, any of them may deviate from the prescribed training protocol to attack the model by conducting either untargeted poisoning ({\em i.e.,} Byzantine) attacks~\cite{blanchard2017machine, wu2020federated} or targeted poisoning attacks~\cite{biggio2012poisoning, fung2020limitations, bagdasaryan2020backdoor}.
In the former attacks, the attacker aims at degrading the model's overall performance; in the latter attacks, he aims at causing the global model to incorrectly classify some attacker-chosen inputs.
Furthermore, poisoning attacks can be performed in two ways: model poisoning~\cite{blanchard2017machine, wu2020federated, bagdasaryan2020backdoor} or data poisoning~\cite{biggio2012poisoning,fung2020limitations,tolpegin2020data}.
In model poisoning, the attackers maliciously manipulate their local model parameters before sending them to the server.
In data poisoning, they inject fabricated or falsified data examples into their training data before local model training.
Both attacks result in poisoned updates being uploaded to the server, in order to prevent the global model from converging or to bias it. Compared to untargeted poisoning~\cite{blanchard2017machine, wu2020federated}, targeted attacks~\cite{biggio2012poisoning,fung2020limitations,tolpegin2020data, bagdasaryan2020backdoor,wang2020attack, xie2019dba} are more serious, given their stealthy nature and severe security implications~\cite{steinhardt2017certified, fung2020limitations,tolpegin2020data, awan2021contra}.
Several defenses against poisoning attacks have been proposed, which we discuss in Section \ref{related}.
However, they are either impractical~\cite{nelson2008exploiting, jagielski2018manipulating}, may degrade the performance of the aggregated model on the main task~\cite{bagdasaryan2020backdoor, wang2020attack} or assume specific distributions of local training data~\cite{shen2016auror,blanchard2017machine,tolpegin2020data,fung2020limitations, awan2021contra,chen2017distributed,yin2018byzantine}. Specifically,
\cite{jagielski2018manipulating} assumes the server to possess some data examples representing the workers' data, which is not a realistic assumption in FL;
\cite{shen2016auror,blanchard2017machine,tolpegin2020data,chen2017distributed,yin2018byzantine} assume the local data are independent and identically distributed (iid) among workers, which leads to poor performance on non-iid data~\cite{awan2021contra};
\cite{fung2020limitations,awan2021contra} identify workers with similar updates as attackers, which leads to wrongly penalizing honest workers with similar local data~\cite{nguyen2021flguard, li2021auto}.
Besides those assumptions, the dimensionality of the model is a paramount factor that affects the performance of most of the methods above: high-dimensional models are more vulnerable to targeted poisoning attacks because they cause small changes on a poisoned local update without being detected~\cite{chang2019cronus}.
To the best of our knowledge, no contribution to the state of the art provides an effective defense against targeted poisoning attacks without being hampered by the data distribution or model dimensionality.
{\bf Contributions and plan.}
In this paper, we study targeted poisoning attacks by analyzing the behavior of label-flipping (LF) and backdoor (BA) attacks on DL models. We find that an unbalanced distribution of the workers' local data and a high dimensionality of the DL model make the detection of these attacks quite challenging.
Moreover, we observe that attack-related last-layer neurons exhibit a different behavior from attack-unrelated last-layer neurons, which makes the last-layer gradients useful features for detecting targeted attacks.
Accordingly, we propose \textit{FL-Defender}, a method that can mitigate the attacks regardless of the model dimensionality or the distribution of the workers' data.
First, we use the workers' last-layer gradients to engineer more robust discriminative features that capture the attack behavior and discard redundant information.
Specifically, we compute the worker-wise angle similarity for the workers' last-layer gradients and then compress the computed similarity vectors using principal component analysis (PCA)~\cite{wold1987principal} to reduce redundant information. After that, we penalize the workers' updates based on their angular deviation from the centroid of the compressed similarity vectors.
Experimental results on three data sets with different DL model sizes and worker data distributions demonstrate the effectiveness of our approach at defending against the attacks. Compared with several state-of-the-art defenses, \textit{FL-Defender} achieves better performance at retaining the accuracy of the global model on the main task, reducing the attack success rate and causing minimal computational overhead on the server.
The rest of this paper is organized as follows.
Section~\ref{prelim} introduces preliminary notions.
Section~\ref{lf_attack_threat_model} formalizes the attacks and the threat model being considered.
Section~\ref{related} discusses countermeasures for poisoning attacks in FL.
Section~\ref{attacks_analysis} analyzes the behavior of label-flipping and backdoor attacks, and shows the robustness of the engineered features.
Section~\ref{meth} presents the methodology of the proposed defense.
Section~\ref{evaluation} details the experimental setup, and reports the obtained results.
Finally, conclusions and future research lines are gathered in Section~\ref{conclusion}.
\section{Preliminaries}
\label{prelim}
\textbf{Deep neural network-based classifiers.}
A deep neural network (DNN) is a function $F(x)$, obtained by composing $L$ functions $f^l, l\in [1, L]$, that transforms an input $x$ to a predicted output $\hat{y}$. Each $f^l$ is a layer that is parameterized by a weight matrix $w^l$, a bias vector $b^l$ and an activation function $\sigma^l$. $f^l$ takes as input the output of the previous layer $f^{l-1}$. The output of $f^l$ on an input $x$ is computed as $f^l(x) = \sigma^l(w^l \cdot x + b^l)$. Therefore, a DNN can be formulated as \[ F(x) = \sigma^L(w^L \cdot \sigma^{L-1}(w^{L-1} \dots \sigma^1(w^1 \cdot x + b^1) \dots + b^{L-1} )+ b^L).\]
A DNN-based classifier consists of a feature extractor and a classifier~\cite{krizhevsky2017imagenet, minaee2021deep}.
The classifier makes the final classification decision based on the extracted features and usually consists of one or more fully connected layers where the last layer contains $|\mathcal{C}|$ neurons with $\mathcal{C}$ being the set of all possible class values.
The output layer's vector $o \in \mathbb{R^{|\mathcal{C}|}}$ is usually passed to the softmax function that converts it to a vector $p$ of probabilities, which is called the vector of confidence scores.
In this paper, we use predictive DNNs as $|\mathcal{C}|$-class classifiers, where the index of the highest confidence score in $p$ is considered the final predicted class $\hat{y}$.
Also, we analyze the last layers' gradients of DNNs to filter out poisoned updates resulting from LF and backdoor attacks.
\textbf{Federated learning.}
In FL, an aggregator server and $K$ workers cooperatively build a shared global model.
The server starts by randomly initializing the global model $W^t$.
Then, at each training round, the server selects
a subset of workers $S$ of size $C \cdot K \ge 1$
where $K$ is the total number of workers in the system, and $C$ is the fraction of workers that are selected in the training round. After that, the server distributes the current global model
$W^t$ to all workers in $S$.
Besides the global model, the server sends a set of hyper-parameters to be used at the workers' side to train their model locally: number of local epochs $E$, local batch size $BS$ and learning rate $\eta$.
After receiving the new shared model $W^t$, each worker divides her local data into batches of size $BS$ and performs $E$ local training epochs of stochastic gradient descent (SGD). Finally, workers upload their updated local models $W_{(k)}^{t+1}$ to the server, which then aggregates them to obtain the new global model $W^{t+1}$.
The federated averaging algorithm (\textit{FedAvg})\cite{mcmahan2017communication} is usually employed to perform the aggregation as
\[ W^{t+1} = \sum_{k=1}^{K} \frac{n_{(k)}}{n} W^{t+1}_{(k)},\]
where $n_{(k)}$ is the number of data points locally held by worker $k$ and $n$ is the total number of data points locally held by the $K$ workers, that is, $n=\sum_{k=1}^{K} n_{(k)}$.
\section{Attacks and threat model}
\label{lf_attack_threat_model}
As mentioned above, we focus on the LF and BA attacks, two widely used targeted attacks in the FL literature.
In the LF attack~\cite{biggio2012poisoning,fung2020limitations}, each attacker poisons his training data set $D_k$ as follows: for all examples in $D_k$ with a class label $c_{src}$, change their class label to $c_{target}$. An example is changing the labels of ''fraudulent'' activities to ''non-fraudulent''.
In the BA attack~\cite{gu2017badnets}, the attacker poisons his training data by embedding a specific pattern (the backdoor) into training examples with specific features and assigns them a target class label of his choice.
The pattern acts as a trigger for the global model to output the desired target label for the backdoored examples.
As a famous example, the attacker could put a small sticker on a ''stop traffic sign'' and change its label to ''speed limit''.
After poisoning their data, the attacker trains his local models on the poisoned data, with the same training settings as the honest workers, and uploads the resulting poisoned updates to the server to be aggregated into the global model.
\textbf{Assumptions on training data distribution.}
Since the local data sets of the workers may come from heterogeneous sources~\cite{bonawitz2019towards,wang2019edge}, they may be either identically distributed (iid) or non-iid. In the iid setting, each worker holds local data representing the whole distribution.
In the non-iid setting, the distributions of the workers' local data sets can be different in terms of the classes represented in the data and/or the number of samples each worker holds for each class.
Consequently, each worker may have local data with i) all the classes being present in a similar proportion as in the other workers' local data (iid setting), ii) some classes being present in a different proportion (non-iid setting).
\textbf{Threat model.}
We consider a number of attackers $K'\leq K/5$, that is, no more than $20\%$ of the $K$ workers in the system.
Although some works in the literature assume larger percentages of attackers, finding more than 20\% of attackers in real-world FL scenarios is unlikely.
For example, with millions of users~\cite{davenport_corbin} in Gboard~\cite{hard2018federated}, controlling a small percentage of user devices requires the attacker(s) to compromise a large number of devices, which demands huge effort and resources and is therefore impractical.
Furthermore, we assume the FL server to be honest and not compromised, and the attackers to have no control over the aggregator or the honest workers.
The attacker's goal for the LF attack is to cause the learned global model to classify the source class examples into the target class at test time.
The attacker's goal for the BA attack is to fool the global model into falsely predicting the attacker's chosen class for any target example carrying the backdoor pattern, while maintaining the benign model performance on non-backdoored examples.
\section{Related work}
\label{related}
Existing methods to counter poisoning attacks in FL are based on one of the following principles.
\textbf{Evaluation metrics.} An update is penalized as being probably bad if it degrades an evaluation metric of the global model, {\em e.g.} its accuracy. \cite{nelson2008exploiting, jagielski2018manipulating} use a validation set on the server to compute the loss caused by each local update and then keep or discard an update based on its computed loss. However, this is impractical in FL because the server does not have access to the workers' data.
In addition, this approach cannot properly detect backdoor attacks because these attacks have little to no impact on the model's performance on the main task.
\textbf{Clustering updates.} Updates are clustered into two separate groups, where the smaller group contains all the bad updates, that are subsequently disregarded in the model learning process. The
Auror~\cite{shen2016auror} and the multi-Krum (MKrum)~\cite{blanchard2017machine} methods assume that the workers' data are iid, which explains their poor performance on non-iid data~\cite{awan2021contra}, where they incur high false positive and false negative rates.
\textbf{Worker behavior.} This approach assumes the attackers' behavior is reflected in their updates, making them more similar to each other than honest workers' updates. Hence, updates are penalized based on their similarity. For example, FoolsGold~\cite{fung2020limitations} and CONTRA~\cite{awan2021contra} limit the contributions of similar updates by reducing their learning rates or preventing their originators from being selected. However, these methods also penalize similar good updates, which results in significant drops in the model performance~\cite{nguyen2021flguard, li2021auto} when good updates are similar.
\textbf{Update aggregation.} This approach uses robust update aggregation rules, such as the median~\cite{yin2018byzantine}, the trimmed mean~\cite{yin2018byzantine} or the repeated median~\cite{siegel1982robust}. However, the performance of these rules
deteriorates on non-iid data because they discard most of the information at the time
of update aggregation. Also, their estimation error scales up proportionally to the square root of the model size~\cite{chang2019cronus}.
\textbf{Differential privacy (DP).} Methods under this approach~\cite{bagdasaryan2020backdoor, sun2019can} clip individual update parameters to a maximum threshold and add random noise to the parameters to reduce the impact of potentially poisoned updates on the aggregated global model.
However, there is a trade-off between adding noise to mitigate the attacks and maintaining the benign performance of the aggregated model on the main task~\cite{bagdasaryan2020backdoor, wang2020attack}.
Also, DP-based methods consider only mitigating backdoor attacks and are not designed to counter label-flipping attacks.
Several works propose to analyze specific parts of the updates to counter poisoning attacks.
\cite{jebreel2020efficient} proposes analyzing the last layer's biases. However, it assumes the local data are iid and form two separate clusters.
FoolsGold~\cite{fung2020limitations} analyzes the last layer's weights to counter targeted poisoning attacks. However, as mentioned above, it performs poorly when good updates are similar because it considers them to be bad. To counter LF attacks, \cite{tolpegin2020data} uses PCA to analyze the weights associated with \textit{the possibly attacked source class} and excludes potential bad updates that differ from the majority of updates in those weights.
However, the method is evaluated only for LF attacks under the iid setting, and it requires prior knowledge on the possible source class.
The methods just cited share the shortcomings of (i) making assumptions on the distributions of the workers' data and (ii) not providing analytical or empirical evidence of why focusing on specific parts of the updates contributes towards defending against the attacks.
In contrast, we provide comprehensive conceptual and empirical analyses that explain why focusing on the last-layer gradients is especially useful to defend against targeted poisoning attacks.
Also, we propose a more robust method that can mitigate the attacks without being limited by the distribution of the workers' data or the dimension of the models in use.
\section{Analysing targeted attacks against FL}
\label{attacks_analysis}
This section is key in our work. We study the behavior of label-flipping and backdoor attacks to find robust discriminative features that can detect such attacks.
Let us consider an FL classification task where each local model is trained with the cross-entropy loss over one-hot encoded labels as follows.
First, the activation vector $o$ of the last layer neurons (a.k.a. logits) is fed into the softmax function to compute the vector $p$ of probabilities as follows:
\[ p_k = \frac{e^{o_k}}{\sum_{j = 1}^{|\mathcal{C}|} e^{o_j}},\;\;\; k=1, \ldots, |\mathcal{C}|.\]
Then, the loss is computed as
\[ \mathcal{L}(y, p) = - \sum_{k= 1}^{|\mathcal{C}|} y_k \log(p_k),\]
where $y = (y_1, y_2, \ldots, y_{|\mathcal{C}|})$ is the corresponding one-hot encoded true label and $p_k$ denotes the confidence score predicted for the $k^{th}$ class.
After that, the gradient of the loss w.r.t. the output $o_{i}$ of the $i^{th}$ neuron (a.k.a the $i^{th}$ neuron error) in the output layer is computed as
\begin{equation}
\label{derivative_neuron}
\delta_i = \frac{\partial \mathcal{L}(y, p)}{\partial o_i}
= p_i - y_i.
\end{equation}
Note that $\delta_i$ will always be in the interval $[0, 1]$ when $y_i = 0$ (for the wrong class neuron), while it will always be in the interval $[-1, 0]$ when $y_i = 1$ (for the true class neuron).
The gradient $\nabla b^L_i$ w.r.t. the bias $b^L_i$ connected to the $i^{th}$ neuron in the output layer can be written as
\begin{dmath}
\label{derivative_bias}
\nabla b^L_i = \delta_i \frac{\partial \sigma^L}{\partial (w^L_i \cdot a^{L-1} + b^L_{i})},
\end{dmath}
where $a^{L-1}$ is the activation output of the previous layer.
Likewise, the gradient $\nabla w^L_i$ w.r.t. the weights vector $w^L_i$ connected to the $i^{th}$ neuron in the output layer is
\begin{dmath}
\label{derivative_weights}
\nabla w^L_i = \delta_i a^{L-1}
\frac{\partial \sigma^L}{\partial (w^L_i \cdot a^{L-1} + b^L_{i})}.
\end{dmath}
From Equations~\eqref{derivative_bias} and~\eqref{derivative_weights}, we can notice that $\delta_i$ directly and highly impacts on the gradients of the output layer's weights and biases. \\
\textbf{Behavior of label-flipping attacks.}
In FL, a label-flipping attacker always tries to minimize $p_{c_{src}}$ for any example in his training data, including examples that belong to class $c_{src}$.
On the other side, he always tries to maximize $p_{c_{target}}$ for examples that belong to $c_{src}$ during model training.
Since this goes in the opposite direction of the objective of honest workers for examples in $c_{src}$, the attack will entail substantial alteration of
$\delta_{c_{src}}$ and $\delta_{c_{target}}$, as it can be seen from Expression \eqref{derivative_neuron}.
In turn, from Expressions \eqref{derivative_bias} and
\eqref{derivative_weights}, it follows that
altering $\delta_{c_{src}}$ and $\delta_{c_{target}}$ directly alters the biases and weights corresponding to the output neurons of $c_{src}$ and $c_{target}$ during the training of the attacker's local model.
Hence, the impact of the attack can be expected to show in the gradients of the last-layer neurons corresponding to
$c_{src}$ and $c_{target}$.
However, the last layer is likely to contain other neurons unrelated to the attack where both the attacker and the honest workers share the same objectives, which makes the attack harder to spot.
Considering all layers is still worse, because in the layers different from the last one the impact of the attack will be even less perceptible
(as it will be mixed with more unrelated parameters).
Moreover, there are two other factors that increase the difficulty of detecting the attack by analyzing the update as a whole: i) the early layers usually extract common features that are not class-specific~\cite{nasr2019comprehensive} and ii) in general, most parameters in DL models are redundant \cite{denil2013predicting}. That causes the magnitudes and angles of the bad and good updates to be similar, which makes models with large dimensionality an ideal environment for a successful label-flipping attack.
\textbf{Behavior of backdoor attacks.}
Backdoor attacks might be viewed as a particular case of label-flipping attacks because the attacker flips the label of a training example when it contains a specific feature or pattern, whereas he retains the correct label when the example does not contain the pattern (clean example).
However, since the global model will correctly learn from a majority of honest workers and, in the clean examples, from the attackers as well, the received global model will probably overlook the backdoor pattern and assign the correct classes to backdoored examples, especially in the early training iterations.
This will prompt the attackers to try to minimize $p_{c_{src}}$ and maximize $p_{c_{target}}$ for the backdoored examples, which can be expected to stand out in the magnitudes and the directions of the gradients contributed by the attackers.
On the other hand, since the attackers also try to maximize $p_{c_{src}}$ for their clean examples, the impact of the backdoor attacks is expected to be stealthier compared to that of LF attacks even when looking at the last-layer gradients.
\textbf{Engineering more robust features to detect attacks.}
From the above analysis, it is clear that focusing on analyzing last-layer gradients is more helpful to detect targeted attacks than analyzing all layers. Nevertheless, the presence of a large number of attack-unrelated gradients in the last layer may still render attack detection difficult.
Getting rid of those redundant and unrelated gradient features could help obtain more robust discriminatory features for targeted attacks.
Since the impact of the targeted attacks is directly reflected in the directions of gradients of attack-related neurons, comparing the difference in directions between the gradients of a good update and a poisoned update can be expected to better capture the attack's behavior.
If we look at the angular similarity of the workers' last-layer gradients, the similarity values between good and poisoned updates are expected to display unique characteristics in the computed similarity matrix.
PCA can be used to capture those unique characteristics from the matrix and reduce redundant features.
\textbf{Empirical analysis.}
To empirically validate our previous conceptual discussion, we used $20$ local updates resulting from simulating an FL scenario under the LF and BA attacks with each of the CIFAR10-IID and CIFAR10-non-IID benchmarks, where $4$ updates (that is, 20\%) were poisoned. In these two benchmarks, the ResNet18~\cite{he2016deep} architecture, which contains about $11M$ parameters was used. In addition, training data were randomly and uniformly distributed among workers in CIFAR-IID, while we adopted a Dirichlet distribution~\cite{minka2000estimating} with $\alpha = 1$ to generate non-iid data for the $20$ workers in the CIFAR10-non-IID.
The details of the experimental setup are given in Section~\ref{setup}.
Then, for each benchmark and attack scenario, we computed the following:
\begin{itemize}
\item The first two principal components (PCs) of the all-layer gradients for each local update. Then, we computed the centroid (CL) of the first two PCs for the $20$ local updates. After that, we computed the angle between CL and every pair of PCs for each update.
\item The centroid (CL) of the last-layer gradients for the $20$ local updates and the angle between CL and each last-layer gradient for each update.
\item The first two PCs of the last-layer gradients for each local update. Then, we computed the centroid (CL) of the first two PCs of the $20$ last-layer gradients. After that, we computed the angle between CL and every pair of PCs for each last-layer gradient.
\item The cosine similarity for the $20$ workers' last-layer gradients. Then, we computed the first two PCs of the similarity matrix. After that, we computed the centroid (CL) of the first two PCs of the $20$ similarity vectors.
Finally, we computed the angle between CL and every pair of PCs of each similarity vector.
\end{itemize}
Once the above computations were completed, we visualized the magnitude of each input, and the angle between the input and its corresponding centroid.
Fig.~\ref{fig:cifar10_iid} shows the visualized vectors for the CIFAR-IID benchmark. For the LF attack, we can see that analyzing the first two PCs of the all-layer gradients (All) led to poisoned updates and good updates with very similar magnitudes and angular deviation from the centroid, which made it quite challenging to tell them apart. The same applies to analyzing the last-layer gradients (Last).
On the other hand, analyzing the first two PCs of the last-layer gradients (Last-PCA) led to an apparent separation between good and bad updates. This also applied to analyzing the engineered features (Engineered).
For the BA attack, the results were similar with the difference that our engineered features allowed better separation than Last-PCA.
This confirms our conceptual discussion that redundant and attack-unrelated gradients make the attacks stealthier.
\vspace{-3ex}
\begin{figure}[!htbp]
\centering
\includegraphics[width=0.8\linewidth]{figures/cifar10_iid_features.pdf}
\caption{Deviation of CIFAR10-IID gradient features from the centroid}
\label{fig:cifar10_iid}
\end{figure}
\vspace{-3ex}
Fig.~\ref{fig:cifar10_noniid} shows the visualized vectors for the CIFAR-non-IID benchmark, where the data were non-iid among workers.
For the LF attack, we can see that only our engineered features provided robust discrimination between good and bad updates.
For the BA attack, even if our engineered features allowed better separation, it was challenging to tell updates apart.
This is because of the impact of the non-iidness and also because BA attacks are stealthier than LF attacks.
This again confirms our intuitions and shows that our engineered features are more useful than the alternatives to detect targeted attacks.
\vspace{-3ex}
\begin{figure}[!htbp]
\centering
\includegraphics[width=0.8\linewidth]{figures/cifar10_noniid_features.pdf}
\caption{Deviation of CIFAR10-non-IID gradient features from the centroid}
\label{fig:cifar10_noniid}
\end{figure}
\vspace{-3ex}
We were able to conclude from these analytical and empirical explorations that a high model dimensionality and the distribution of the workers' training data highly impact on the ability to discriminate between good updates and updates poisoned by targeted attacks.
Fortunately, it also became evident that we can use the last-layer gradients to engineer more robust discriminative features for attack
detection.
\section{FL-Defender design}
\label{meth}
In this section, we present the design of FL-Defender, our proposed defense against FL targeted poisoning attacks. Our aims are:
1) to prevent attackers from achieving their goals by mitigating the impact of their poisoned updates on global model,
2) to maintain the global model performance on the main task,
3) to stay robust against the attacks regardless of the model size or the workers' data distribution, and
4) to avoid substantially increasing the computational cost at the server.
According to the lessons learned in the previous section, our defense first extracts the last-layer gradients of the workers' local updates, computes the worker-wise cosine similarity and then compresses the computed similarity vectors using PCA to reduce redundant information and extract more robust features.
After that, it computes the centroid of the compressed similarity vectors and computes the cosine similarity values between the centroid and each compressed vector.
The similarity values are accumulated during training and used, after re-scaling them, to re-weight the workers updates in the global model aggregation.
We formalize our method in Algorithm~\ref{algorithm1}.
The aggregator server $A$ starts a federated learning task by initializing the global model $W^{0}$ and the history vector $H^0$ that is used to accumulate the similarities between the directions of the workers' engineered features and their centroid.
Then, in every training iteration $t$, $A$ selects a random subset $S$ of $m$ workers and sends the current global model $W^t$ to the $m$ selected workers.
Each worker $k\in S$ locally trains $W^{t}$ on her data $D_k$ and sends her local update $W_{k}^{t+1}$ back to $A$.
Once $A$ receives the $m$ local updates, it separates the gradients of the last layers to obtain the set $\{\nabla L^{t+1}_k|k \in S\}$.
\vspace{0cm}
\begin{algorithm}[!ht]
\SetKwProg{Fn}{Function}{}{end}
\caption{FL-Defender: Combating targeted attacks in FL}
\label{algorithm1}
\SetAlgoLined
\KwInput{$K, C, BS, E, \eta, T$}
\KwOutput{$W^T$, the global model after $T$ training rounds}
$A$ initializes $W^{0}$, $H^0 = \{H_k^0 = 0\}_{k = 1}^{K}$;
\For{each round $t \in [0, T-1]$}{
$m \leftarrow \max(C \cdot K, 1)$;
$S \leftarrow$ random set of $m$ workers;
$A$ sends $W^t$ to all workers in $S$;
\For{each worker $k \in S$ \textbf{in parallel }}{
$W_{k}^{t+1} \leftarrow$\FuncSty{WORKER\_UPDATE($k, W^{t}$)}\tcp*{\small $A$ sends
$W^t$ to each worker $k$ who trains $W^t$ using her data $D_k$ locally, and sends her local update $W_{k}^{t+1}$ back to the aggregator.}
}
Let $(\nabla_1, \ldots, \nabla_i, \ldots, \nabla_m)$ be the gradients of the last layers of $\{W_{k}^{t+1}|k\in S\}$;
$(cs_{1, 1}, \ldots, cs_{i,j},\ldots, cs_{m, m}) \leftarrow$ \FuncSty{COSINE\_SIMILARITY$(\nabla_1, \ldots, \nabla_i, \ldots, \nabla_m)$};
\tcp{ $\forall i, j \in (1, \ldots, m)$, $cs_{i, j}$ is the cosine similarity between $\nabla_i$ and $\nabla_j$.}
$((p_1^1, p_1^2), \ldots, (p_i^1, p_i^2), \ldots, (p_m^1, p_m^2)) \leftarrow$ \FuncSty{PCA$((cs_{1, 1}, \ldots, cs_{m, m}), components = 2)$};
\tcp{$(p_i^1, p_i^2)$ are the first two PCs of $(cs_{i, 1}, \ldots, cs_{i, m})$.}
$CL\leftarrow$\FuncSty{Median($((p_1^1, p_1^2), \ldots, (p_i^1, p_i^2), \ldots, (p_m^1, p_m^2))$)};
\tcp{$CL$ is the centroid of the compressed similarity vectors.}
Let $cs_i$ be the cosine similarity between $(p_i^1, p_i^2)$ and $CL$;
\For{each worker $k \in S$}{
$cs_{k}^t \leftarrow$ \FuncSty{Assign$(cs_1, \ldots, cs_i, \ldots, cs_m)$};
\tcp{Assign the computed cosine similarities to their corresponding workers.}
$H_{k}^t = H_{k}^{t - 1} + cs_{k}^t$;
\tcp{Accumulate the similarities of the worker to the centroid.}
}
$Q1 \leftarrow$ \FuncSty{FIRST\_QUARTILE$(H^t)$};
$\gamma = H^t - Q1$; \tcp{Subtract Q1 from every entry in $H^t$. Since attackers are expected to be below Q1, this will make their trust values in $\gamma$ negative.}
\For{each worker $k \in (1, \ldots, K)$}{
\uIf {$\gamma_k < 0$} {
$\gamma_k = 0$; \tcp{Attacker trusts are brought to 0 to neutralize them in the aggregation.}
}
}
$\gamma = \gamma/max_k(\gamma)$;
\tcp{Normalize trust in workers updates to 0-1 range.}
$A$ aggregates $W^{t+1} \leftarrow \frac{1}{\sum_{k \in S} \gamma_k} \sum_{k \in S} \gamma_k W_{k}^{t+1}$.}
\end{algorithm}
\vspace{0cm}
\textbf{Cosine similarity.} We compute the cosine similarities among
gradients of the last layers
to capture the discrepancy between the gradients from
the honest workers and those from the attackers. This discrepancy is caused by their contradicting objectives.
The cosine similarity between two gradients $\nabla_i$ and $\nabla_j$ is defined as:
\[ cs(\nabla_i, \nabla_j) = \cos \varphi = \frac{\nabla_i \cdot \nabla_j}{||\nabla_i|| \cdot || \nabla_j||}.
\]
This way, if $\nabla_i$ and $\nabla_j$ lie in the same direction, their cosine similarity will be 1, and their similarity value will decrease as their directions differ more.
The cosine similarity measures the angular similarity among gradients and it is more robust than the Euclidean distance because, even if the attackers scale their model update gradients to avoid detection, they need to keep their directions to achieve their objectives.
\textbf{Compressing similarity vectors.} Since the number of workers is expected to be large in FL, we use PCA~\cite{wold1987principal}, with two principal components, to compress the computed similarity matrix and reduce the attackers' chance to hide their impact on the high-dimensional similarity matrix.
PCA returns a compact representation of a high-dimensional input by projecting it onto a subspace of lower dimension so that the unique characteristics of the input are reduced to the subspace.
\textbf{Similarity between compressed vectors and their centroid.} After
compressing the workers' similarity vectors into a pair of PCs, we aggregate the latter component-wise using the median to obtain their centroid $CL \in {\Bbb R^2}$. Since we assume the majority of the workers ($\geq 80\%$) to be honest, the centroid is expected to fall into the heart of a majority of good components.
After that, we compute the cosine similarity between the centroid and each worker's pair of PCs.
Good components are expected to have a similar direction to the centroid and thus have similarity values close to 1.
On the other hand, poisoned components are expected to be farther from the centroid with values closer to $-1$.
\textbf{Update history and compute updates trust scores.} We use the similarity values with the centroid to update the similarity history vector $H$ for the selected $m$ workers. This guarantees that, as the training evolves, the closest workers to the centroid have larger and larger values than the farthest workers. Since we assume the centroid falls amid the honest workers, this guarantees that honest workers have larger accumulated similarity values than attackers. After updating the similarity history vector $H$, we compute the first quartile $Q1$ for the values in $H$ and then subtract it from the similarity value
accumulated by every worker. That is, we shift every similarity value in $H$ to the left by $Q1$
and we assign the shifted similarities to the
workers' trust scores vector $\gamma$.
Since the accumulated similarities of attackers are low, they
are likely to be below $Q1$ and hence they become negative
after the shift. After that, we set negative trust scores in $\gamma$
to 0, in order to neutralize attackers when using trust scores as weights in the
final aggregation (see below).
Finally, we normalize the scores in $\gamma$ to be in the range [0, 1] by dividing them by their maximum value.
\textbf{Re-weighting and aggregating updates}. In the final step of Algorithm~\ref{algorithm1}, the server uses the trust scores in $\gamma$ to re-weight the corresponding local updates and aggregates the global model using the re-weighted local updates.
Note that, since $\frac{1}{\sum_{k \in S} \gamma_k} \sum \gamma_k= 1
$, the convergence of the proposed aggregation procedure at the server side is guaranteed as long as \textit{FedAvg} converges.
\section{FL-Defender evaluation}
\label{evaluation}
In this section we compare the performance of our method with that of several state-of-the-art countermeasures against poisoning attacks.
\subsection{Experimental setup}
\label{setup}
We implemented our experiments using the PyTorch framework on an AMD Ryzen 5 3600 6-core CPU with 32 GB RAM, an NVIDIA GTX 1660 GPU, and Windows 10 OS. For reproducibility, our code and data are available at \url{https://github.com/anonymized30/FL-Defender}.
\vspace{1ex}
\textbf{Data sets and models.}
\label{data_models}
We used the following data sets and models:
\begin{itemize}
\item MNIST. It contains $70K$ handwritten digit images from $0$ to $9$~\cite{lecun1999object}. The images are divided into a training set ($60K$ examples) and a testing set ($10K$ examples). We used a two-layer convolutional neural network (CNN) with two fully connected layers on
this data set (number of model parameters $\approx 22K$).
\item CIFAR10. It consists of $60K$ colored images of $10$ different classes \cite{krizhevsky2009learning}. The data set is divided into $50K$ training examples and $10K$ testing examples. We used the ResNet18 CNN model~\cite{he2016deep} with one fully connected layer on this data set (number of parameters $\approx
11M$).
\item IMDB. Specifically, we used the IMDB Large Movie Review data set
\cite{maas2011learning} for binary sentiment classification. The data set is a collection of $50K$ movie reviews and their corresponding sentiment binary labels (either positive or negative). We divided the data set into $40K$ training examples and $10K$ testing examples. We used a Bidirectional Long/Short-Term Memory (BiLSTM) model with an embedding layer that maps each word to a 100-dimensional vector.
The model ends with a fully connected layer followed by a sigmoid function to produce the final predicted sentiment for an input review (number of parameters $\approx 12M$).
\end{itemize}
\textbf{Data distribution and training.}
\label{data_training}
We defined the following benchmarks by distributing the data from the data sets above among the participating workers in the following way:
\begin{itemize}
\item MNIST-non-IID. We adopted
a Dirichlet distribution~\cite{minka2000estimating} with a hyperparameter $\alpha = 1$ to generate \textit{non-iid} data for $20$ participating workers.
The CNN model was trained during $200$ iterations. In each iteration, the FL server asked the workers to train their models for $3$ local epochs with a local batch size $64$. The participants used the cross-entropy loss function and the stochastic gradient descent (SGD) optimizer with learning rate = $0.01$ and momentum = $0.9$ to train their models.
\item CIFAR10-IID. We randomly and uniformly divided the CIFAR10 training data among $20$ workers.
The ResNet18 model was trained during $100$ iterations.
In each iteration, the FL server asked the $20$ workers to train the model for $3$ local epochs with a local batch size $32$.
The workers used the cross-entropy loss function and the SGD optimizer with learning rate = $0.01$ and momentum = $0.9$.
\item CIFAR10-non-IID. We took a Dirichlet distribution with a hyperparameter $\alpha = 1$ to generate \textit{non-iid} data for $20$ participating workers.
The training settings were the same as in the CIFAR10-IID.
\item IMDB. We randomly and uniformly split the $40K$ training examples among $20$ workers.
The BiLSTM was trained during $50$ iterations.
In each iteration, the FL server asked the $20$ workers to train the model for $1$ local epoch with a local batch size $32$.
The workers used the binary cross-entropy with logit loss function and the \textit{Adam} optimizer with learning rate = $0.001$.
\end{itemize}
\textbf{Attack scenarios.}
\label{attack_set}
i) Label-flipping attacks. In the CIFAR10 experiments, the attackers flipped the examples with the label \emph{Dog} to \emph{Cat} before training their local models. For IMDB, the attackers flipped the examples with the label \emph{positive} to \emph{negative}.
ii) Backdoor attacks. In the CIFAR10 benchmarks, the attackers embedded a $3\times3$ square with white pixels in the bottom-right corner of the examples belonging to class \emph{Car} and changed its label to class \emph{Plane} before training their local models.
In the MNIST-non-IID, the attackers embedded the same pattern in the examples belonging to class \emph{9} and changed its label to class \emph{0}.
In all the experiments, the number of attackers $K'$ ranged in $\{0, 2, 4\}$, which corresponds to a ratio of attackers in $\{0\%, 10\%, 20\%\}$.
\textbf{Evaluation metrics.}
\label{metrics} We used the following evaluation metrics on the test set examples to assess the impact of the attacks on the learned model and the performance of the proposed method w.r.t. the state of the art:
\begin{itemize}
\item \emph{Test error (TE)}. This is the error resulting from the loss functions used in training. The lower the test error, the more robust the method is against the attack.
\item \emph{Overall accuracy (All-Acc)}. This is the number of correct predictions divided by the total number of predictions.
\item \emph{Source class accuracy (Src-Acc)}. We evaluated the
accuracy for the subset of test examples belonging to the source class. Note that one may achieve a good overall accuracy while degrading the accuracy of the source class.
\item \emph{Attack success rate (ASR)}. It is defined as the proportion of targeted examples (with the source label or the backdoor
pattern) that are incorrectly classified into the label desired by the attacker.
\end{itemize}
An effective defense against the attacks needs to retain the benign performance of the global model on the main task while reducing ASR.
\subsection{Results}
\label{results}
We evaluated the robustness of our defense against the LF and BA attacks and compared it with several countermeasures discussed in Section~\ref{related}:
median~\cite{yin2018byzantine}, trimmed mean (TMean)~\cite{yin2018byzantine}, multi-Krum (MKrum)~\cite{blanchard2017machine} and FoolsGold (FGold)~\cite{fung2020limitations}. We also compared with the standard FedAvg~\cite{mcmahan2017communication} aggregation method (that is not meant counter security attacks).
We report the average results of the last $10$ training rounds to ensure a fair comparison among methods.
\textbf{Robustness against label-flipping attacks.}
Table~\ref{tab:lf} reports the results for the LF attacks.
For CIFAR-IID and when no attack is performed, our method achieved comparable performance to FedAvg for the test error and the overall accuracy.
On the other hand, in the presence of attacks, in general our method achieved the highest source class accuracy and the lowest attack success rate, whereas
FoolsGold ranked second. Mkrum achieved the worst performance because it considers all layers, which caused a lot of false positives and false negatives. Note that the theoretical upper bound on the number of attackers MKrum~\cite{blanchard2017machine} can resist is $K' = (K/2) - 2$ which corresponds to $K' = 8$ in our setting.
The performance of the rest of the methods (FedAvg, Median and TMean) was diminished with regard to the protection of the source class, even though the data were iid. The reason was the large model size.
Looking at results for CIFAR10-non-IID, we can see the influence of the data distribution and the model size on the performance of the methods.
However, thanks to the robust engineered features, our method preserved the global model performance while preventing the attackers from performing successful label-flipping attack.
For the IMDB benchmark, the performance of our method was almost the same as FoolsGold, which scored best.
Both methods outperformed the other methods by a large margin in providing adequate and simultaneous protection for all the metrics.
FoolsGold performed well in this benchmark because it is its ideal setting: updates for honest workers were somewhat different due to the different reviews they gave, while updates for attackers became very close to each other because they shared the same objective. In addition, there was no redundant information from other classes because the task was binary classification.
\begin{table}[!ht]
\centering
\caption{Robustness against label-flipping attacks}
\label{tab:lf}
\resizebox{\textwidth}{!}{%
\begin{tabular}{|ll|cccccc|cccccc|cccccc|}
\hline
\multicolumn{2}{|c|}{Benchmark} & \multicolumn{6}{c|}{CIFAR10-IID} & \multicolumn{6}{c|}{CIFAR10-non-IID} & \multicolumn{6}{c|}{IMDB} \\ \hline
\multicolumn{1}{|c|}{K'/K} & \multicolumn{1}{c|}{Method} & FedAvg & Median & TMean & MKrum & FGold & Ours & FedAvg & Median & TMean & MKrum & FGold & Ours & FedAvg & Median & TMean & MKrum & FGold & Ours \\ \hline
\multicolumn{1}{|c|}{\multirow{4}{*}{0/20}} & TE & \textbf{0.80} & \textbf{0.80} & 0.81 & 0.83 & \textbf{0.80} & 0.81 & \textbf{0.85} & 0.95 & 0.89 & 0.90 & 0.98 & 0.89 & 0.28 & 0.27 & 0.28 & 0.28 & 0.28 & 0.28 \\
\multicolumn{1}{|c|}{} & All-Acc\% & 76.9 & 76.35 & 76.91 & 76.83 & \textbf{77.24} & 76.81 & \textbf{75.88} & 74.40 & 74.86 & 74.18 & 73.93 & 74.96 & 88.55 & \textbf{88.75} & 88.55 & 88.61 & 88.73 & 88.56 \\
\multicolumn{1}{|c|}{} & Src-Acc\% & 63.6 & 65.30 & 66.50 & 65.70 & \textbf{67.60} & \textbf{67.60} & \textbf{66.70} & 66.10 & 66.10 & 65.90 & 52.90 & 66.20 & 85.88 & 86.12 & 85.88 & 86.12 & 86.16 & 86.1 \\
\multicolumn{1}{|c|}{} & ASR\% & 15.60 & 14.40 & 13.50 & 13.40 & \textbf{12.70} & 13.10 & 14.90 & 13.60 & 14.80 & 15.50 & 21.40 & \textbf{11.8} & 14.12 & 13.88 & 14.12 & 13.88 & 13.84 & 13.87 \\ \hline
\multicolumn{1}{|l|}{\multirow{4}{*}{2/20}} & TE & 0.80 & \textbf{0.78} & \textbf{0.79} & 0.84 & 0.84 & 0.82 & 0.93 & 0.92 & 0.97 & 1.04 & 0.92 & \textbf{0.90} & 0.40 & 0.34 & 0.37 & 0.45 & \textbf{0.29} & \textbf{0.29} \\
\multicolumn{1}{|l|}{} & All-Acc\% & 76.96 & 76.50 & 76.47 & \textbf{77.04} & 76.87 & 76.17 & \textbf{74.76} & 74.12 & 74.62 & 71.60 & 74.08 & 74.46 & 81.52 & 84.21 & 82.94 & 79.57 & \textbf{88.66} & 88.24 \\
\multicolumn{1}{|l|}{} & Src-Acc\% & 55.20 & 55.80 & 57.90 & 53.90 & 65.60 & \textbf{65.70} & 48.40 & 51.70 & 50.40 & 39.10 & 58.40 & \textbf{64.9} & 66.07 & 72.74 & 69.52 & 61.65 & \textbf{86.44} & 86.3 \\
\multicolumn{1}{|l|}{} & ASR\% & 23.40 & 23.00 & 20.60 & 24.50 & 15.00 & \textbf{12.00} & 28.70 & 25.10 & 28.70 & 31.90 & 18.80 & \textbf{14.6} & 33.93 & 27.26 & 30.48 & 38.35 & \textbf{13.56} & 13.74 \\ \hline
\multicolumn{1}{|l|}{\multirow{4}{*}{4/20}} & TE & 0.85 & \textbf{0.81} & \textbf{0.81} & 0.95 & 0.84 & 0.82 & 0.92 & 0.91 & 0.96 & 1.08 & 0.93 & \textbf{0.90} & 0.63 & 0.49 & 0.53 & 0.85 & \textbf{0.30} & 0.31 \\
\multicolumn{1}{|l|}{} & All-Acc\% & 75.27 & 76.3 & 75.76 & 75.2 & \textbf{76.42} & 76.10 & \textbf{75.22} & 74.28 & 74.18 & 69.84 & 74.51 & 74.20 & 72.50 & 77.11 & 75.97 & 64.9 & \textbf{88.45} & 88.03 \\
\multicolumn{1}{|l|}{} & Src-Acc\% & 44.00 & 54.20 & 47.70 & 38.90 & 63.00 & \textbf{65.10} & 44.20 & 48.80 & 42.60 & 21.50 & 51.10 & \textbf{58.10} & 46.04 & 56.26 & 53.78 & 30.36 & \textbf{86.40} & \textbf{86.40} \\
\multicolumn{1}{|l|}{} & ASR\% & 33.60 & 25.30 & 31.60 & 37.70 & 16.40 & \textbf{15.00} & 29.60 & 32.30 & 33.60 & 51.50 & 25.50 & \textbf{16.6} & 53.96 & 43.74 & 46.22 & 69.64 & 13.60 & \textbf{13.56} \\ \hline
\end{tabular}%
}
\end{table}
\textbf{Robustness against backdoor attacks.}
Fig.~\ref{fig:backdoor_robust} shows the results for the backdoor attacks.
We employed FedAvg when no attacks were performed as a baseline.
For MNIST-non-IID (with 4 attackers), FoolsGold and our method achieved comparable results to the baseline.
FoolsGold achieved such good performance because of the low variability of the MNIST data set, which made the attackers' last-layer gradients more similar to each other.
On the other hand, the attackers achieved attack success rates about $100\%$ with the other methods.
For CIFAR10-IID (with 4 attackers), our method achieved superior performance compared to the other methods, which failed to counter the BA attack.
We can see that our method achieved a performance very close to the baseline.
For CIFAR10-non-IID results, all methods achieved poor performance against BA attacks because of the double impact of model size and data distribution.
Nevertheless, our method improved over the rest of the methods in reducing the attack success rate. Besides, it maintained the global model's benign performance on the non-attacked examples.
\begin{figure}[!htbp]
\centering
\includegraphics[width=1\linewidth]{figures/backdoor_plot.pdf}
\caption{Robustness against backdoor attacks}
\label{fig:backdoor_robust}
\end{figure}
To sum up, our defense performed effectively against label-flipping attacks, while it improved over the state-of-art methods against backdoor attacks.
\textbf{Runtime overhead.}
We measured the CPU runtime of our method and compared it with that of the other methods.
Fig.~\ref{fig:runtime} shows the per-iteration server runtime overhead
in seconds for each method.
The results show that our method and FoolsGold achieved the smallest runtime in general, excluding FedAvg, which just averages updates and is not meant to counter the attacks. Furthermore, the small runtime overhead of our method can be viewed as a good investment, given its effectiveness at combating the targeted attacks.
\vspace{-3ex}
\begin{figure}[!ht]
\centering
\includegraphics[width=1\linewidth]{figures/runtime.pdf}
\caption{CPU runtime per iteration on the server side (in seconds)}
\label{fig:runtime}
\end{figure}
\vspace{-3ex}
\section{Conclusions and future work}
\label{conclusion}
In this paper, we have studied the behavior of targeted attacks against FL and
we have found that robust features for attack detection can be
extracted from the gradients of the last layers of deep learning models.
Accordingly, we have engineered robust discriminative features for attack detection by computing the worker-wise similarities of gradient directions and
then compressing them using PCA to reduce redundant information.
Then, we have built on the engineered features to design FL-Defender, a novel and effective method to defend against attacks.
FL-Defender re-weights the workers' local updates during the
global model aggregation based on their historical deviation
from the centroid of the engineered features.
The empirical results show that our method performs very well at
defending against label-flipping attacks regardless of the workers' data distribution or the model size. Also, it improves over the state of the art
at mitigating backdoor attacks.
Besides, it maintains the benign model performance
on the non-attacked examples
and causes minimal computational overhead on the server.
Future work directions include to deeply study the behavior of backdoor attacks on different components of DL models, in different FL settings and with different model sizes. This should yield more robust discriminative features for such dangerous and stealthy attacks.
\vspace{0cm}
\section*{Acknowledgments}
\vspace{0cm}
This research was funded by the European Commission (projects H2020-871042 ``SoBigData++'' and H2020-101006879 ``MobiDataLab''), the Government of Catalonia (ICREA Acad\`emia Prizes to J.Domingo-Ferrer and D. Sánchez, and FI grant to N. Jebreel), and MCIN/AEI /10.13039/501100011033 /FEDER, UE under project PID2021-123637NB-I00 ``CURLING''.
The authors are with the UNESCO Chair in Data Privacy, but the views in this paper are their own and are not necessarily shared by UNESCO.
\vspace{-0.5cm}
|
\subsection{Quadratic functions}
\label{sec:exp_quad}
In this section, we empirically show the convergence behavior of GDA with different stepsize ratios on quadratic functions. We set $\boldsymbol{z}^\ast=0$ w.l.o.g. as it does not affect the convergence behavior. The matrices $A,B,C\in\mathbb{R}^{4\times 4}$ are randomly generated and processed to satisfy Assumption~\ref{assumption:quadratic}. We choose $L=100$, $\mu=1$ in the beginning and compute $\mu_{\vx}$ after the matrices are sampled. We keep $\eta_{\vy}=\frac{1}{2L}$ and change the stepsize ratio by varying $\eta_{\vx}$.
Figure~\ref{fig:quad_training} shows the training curves under two independent samples for four different stepsize ratios. The orange curve uses the best stepsize ratio, $2\kappa$, as suggest by our theorems. The red curve uses the stepsizes as in \citep{lin2020gradient} (note $200\kappa=2\kappa^2$). According to Figure~\ref{fig:quad_training_a}, as the stepsize ratio increases from $2\kappa$, the convergence becomes slower. For the red curve, since $\eta_{\vx}$ is much smaller than $\eta_{\vy}$, $\boldsymbol{x}$ updates much more slowly than $\boldsymbol{y}$. As a result, the training can be roughly splitted into two phases. During the first phase (first $1000$ iterations in Figure~\ref{fig:quad_training_a}), the change of $\boldsymbol{x}$ can be ignored and $\boldsymbol{y}$ is updated to maximize $f$. Therefore the red curve goes up. During the second phase (after $1000$ iterations in Figure~\ref{fig:quad_training_a}), $\boldsymbol{y}$ is updated to keep maximizing $f$ for each $\boldsymbol{x}$. Therefore essentially, $\boldsymbol{x}$ is trained to minimze the primal function $\Phi(\boldsymbol{x})$ and thus the curve goes down. However, such phenomenon does not exist for the orange curve, as both variables are basically simultaneously trained to the optimal point.
For the blue curve which uses a stepsize ratio even much smaller than $2\kappa$, although it converges even faster than the orange curve as in Figure~\ref{fig:quad_training_a}, it sometimes does diverge as in Figure~\ref{fig:quad_training_b}. This is consistent with our lower bound in Theorem~\ref{thm:lower_bound}.
\subsection{A non-quadratic function}
\label{sec:exp_nonquad}
Although our theory only applies to quadratic functions or local convergence, the empirical training behavior we observed above may exist for more general functions. In this section, we empirically run GDA on a non-quadratic function defined as follows. We first generate an instance of quadratic funtions, $f_0$, as in Section~\ref{sec:exp_quad}. Then we add a non-quadratic function of $\boldsymbol{x}$ only. Formally, we run GDA on the following function:
\begin{align}
f(\boldsymbol{x};\boldsymbol{y}):=&f_0(\boldsymbol{x};\boldsymbol{y})+\tfrac{L}{n}\textstyle\sum_{i=1}^n\left[\log\left(1+\exp(a(x_i-b_i)\right)\right.\nonumber\\&\left.+\log\left(1+\exp(-a(x_i-b_i)\right)\right].
\label{eq:nonquad_example}
\end{align}
The training curves for different stepsize ratios are shown in Figure~\ref{fig:nonquad_training}, with similar behaviors to those in Figure~\ref{fig:quad_training}.
\subsection{GAN training}
\label{sec:mot_exp}
\input{Sections/mot_exp}
\iffalse
When the Hessian of a general NC-SC function $f$ is continuous, it satisfies Assumption~\ref{assumption:near_quad} within a small neighborhood of a stationary point. Therefore, our theory can be viewed as a local convergence theory. It also suggests that after GDA reaching such a neighborhood, one may increase the stepsize ratio to speed up the convergence. Our experiments will show that this happens for the training of Generative Adversarial Networks (GAN) which is even not NC-SC.
As shown in Figure~\ref{fig:to_include}, for all the three toy GAN datasets (8gaussians, 25gaussians, and swissroll), setting the stepsizes as $(\eta_{\vx},\eta_{\vy})=(0.01,0.001)$ at the beginning does not work. However, if we train the model with $\eta_{\vx}=\eta_{\vy}=0.001$ for some time and change the stepsizes to $(0.01,0.001)$ at iteration XXX, it converges even faster.
\haochuan{Now I feel this part is kind of weird... as the learning rates $\eta_{\vx}=\eta_{\vy}=0.001$ are already simultaneous, what is the point to further decrease the stepsize ratio?}
\fi
\subsection{Nearly quadratic functions}
Suppose $f:\mathbb{R}^n\times\mathbb{R}^m\to \mathbb{R}$ belongs to the function class of interest. In this section, we assume that $f(\boldsymbol{x};\cdot)$ is $\mu$-strongly concave for any fixed $\boldsymbol{x}$ and $f(\cdot;\cdot)$ is ${L}$-smooth as in Section~\ref{sec:theory}. Similar to Section~\ref{sec:42}, we assume $\Phi(\cdot):=\max_{\boldsymbol{y}}f(\cdot;\boldsymbol{y})$ is strictly convex through this section. Let $\boldsymbol{x}^\ast$ be its unique global minimum and $\boldsymbol{y}^\ast:=\text{argmax}_{\boldsymbol{y}}f(\boldsymbol{x}^\ast;\boldsymbol{y})$. Assume that $f$ is twice continuously differentiable, which implies the Hessian at every point exists and is symmetric. We denote the Hessian at the optimal point $(\boldsymbol{x}^\ast,\boldsymbol{y}^\ast)$ as
\begin{align*}
\begin{pmatrix}
C & B \\ B^\top & -A
\end{pmatrix} :=\nabla^2 f(\boldsymbol{x}^\ast;\boldsymbol{y}^\ast),
\end{align*}
i.e., $C:=\nabla^2_{\boldsymbol{x}\vx}f(\boldsymbol{x}^\ast;\boldsymbol{y}^\ast)$, $B:=\nabla^2_{\boldsymbol{x}\boldsymbol{y}}f(\boldsymbol{x}^\ast;\boldsymbol{y}^\ast)$, and $A:=-\nabla^2_{\boldsymbol{y}\vy}f(\boldsymbol{x}^\ast;\boldsymbol{y}^\ast)$.
Also define
\begin{align*}
M := \begin{pmatrix}
-C & -B \\ r B^\top & -r A
\end{pmatrix} .
\end{align*}
We know $A,C$ are symmetric and $\mu I \le A\le {L}I$, $\|B\|_2, \|C\|_2\le {L}$. Also define $\mu_{\vx}=\min\left\{L,\lambda_{\min}(C+BA^{-1}B^\top)\right\}>0$ as $\Phi$ is strictly convex. We assume $f$ is nearly quadratic: the Hessian of $f$ satisfies the following assumption.
\begin{assumption}
There exist some nonnegative scalars $\Delta_{\boldsymbol{x}\vx},\Delta_{\boldsymbol{x}\boldsymbol{y}},\Delta_{\boldsymbol{y}\vy}\ge 0$ such that the Hessian of $f$ at every point $(\boldsymbol{x},\boldsymbol{y})$ satisfies
\begin{align*}
\|\nabla^2_{\boldsymbol{x}\vx}f(\boldsymbol{x};\boldsymbol{y})-C\|_2\le& \Delta_{\boldsymbol{x}\vx},\\
\|\nabla^2_{\boldsymbol{x}\boldsymbol{y}}f(\boldsymbol{x};\boldsymbol{y})-B\|_2\le& \Delta_{\boldsymbol{x}\boldsymbol{y}},\\
\|\nabla^2_{\boldsymbol{y}\vy}f(\boldsymbol{x};\boldsymbol{y})+A\|_2\le& \Delta_{\boldsymbol{y}\vy}.
\end{align*}
\label{assumption:near_quad}
\end{assumption}
Let $\Delta_r := \Delta_{\boldsymbol{x}\vx}+\left(r+1\right)\Delta_{\boldsymbol{x}\boldsymbol{y}}+r \Delta_{\boldsymbol{y}\vy}$. In the following theorem, we show that if $\Delta_{r}$ is small enough, i.e., the function is nearly quadratic, GDA has a linear convergence rate.
\begin{theorem}
\label{thm:conv_general}
Suppose $M=P^{-1
}\Lambda P$ is diagonizable. Let $C_P=\norm{P}_2\norm{P^{-1}}_2$. Choose $\eta_{\vx}=\frac{1}{2r L}$ and $\eta_{\vy}=\frac{1}{2L}$ where $r\ge 2\kappa$. If $\Delta_{r}\le \frac{\mu_{\vx}}{8 C_P}$, we have
\begin{align*}
\|\boldsymbol{z}^T-\boldsymbol{z}^\ast\|_2\le C_P\norm{\boldsymbol{z}^0-\boldsymbol{z}^\ast}_2\left(1-\frac{1}{16r\kappa_{\vx}}\right)^T.
\end{align*}
It means the gradient complexity of achieving an error less than $\epsilon$ is\begin{align*}
\mathcal{O}\left(r\kappa_{\vx}\log\left(\frac{C_P\norm{\boldsymbol{z}^0-\boldsymbol{z}^\ast}_2}{\epsilon}\right)\right).
\end{align*}
\end{theorem}
Note that given any general nonconvex-strongly-concave function $f$, we know that Assumption~\ref{assumption:near_quad} holds within a sufficiently small neighborhood around some local stationary point. Therefore, Theorem~\ref{thm:conv_general} can be viewed as a local convergence theory for general NC-SC functions. Formally, it leads to the following theorem.
\begin{theorem}
\label{cor:local}
For a NC-SC smooth function $f(\boldsymbol{x};\boldsymbol{y})$, Let $\boldsymbol{x}^\ast$ be a strict stationary point of its primal function $\Phi(\boldsymbol{x})=\max_{\boldsymbol{y}}f(\boldsymbol{x};\boldsymbol{y})$ and $\boldsymbol{y}^\ast=\text{argmax}_{\boldsymbol{y}}f(\boldsymbol{x}^\ast;\boldsymbol{y})$. Then if $(\boldsymbol{x}^0,\boldsymbol{y}^0)$ is initialized within a sufficient neighborhood around $(\boldsymbol{x}^\ast,\boldsymbol{y}^\ast)$, GDA with $\eta_{\vx}=\frac{1}{2r L}$ and $\eta_{\vy}=\frac{1}{2L}$ where $r\ge 2\kappa$ converges to $(\boldsymbol{x}^\ast,\boldsymbol{y}^\ast)$ locally at a linear rate.
\end{theorem}
\subsection{Stochastic gradient oracle}
Now we extend our result to mini-batch stochastic gradient descent-ascent (SGDA) for quadratic functions with a stochastic oracle. The analysis below can be possibly extended to nearly quadratic functions and we leave this to future work. The function $f$ takes the form and assumptions as in Section~\ref{sec:pre}. However, only a stochastic estimate of the gradient is available to the algorithm.
The mini-batch SGDA update rule with batch size $S$ can be written as
\begin{align*}
\boldsymbol{x}^{k+1} &= \boldsymbol{x}^k -\eta_{\vx} \nabla_{\boldsymbol{x}} f(\boldsymbol{x}^k;\boldsymbol{y}^k)-\eta_{\vx}\tfrac{1}{S}\textstyle\sum_{i=1}^{S}\boldsymbol{\xi}^{\boldsymbol{x}}_{k,i}\\
\boldsymbol{y}^{k+1} &= \boldsymbol{y}^k +\eta_{\vy} \nabla_{\boldsymbol{y}} f(\boldsymbol{x}^k;\boldsymbol{y}^k)+\eta_{\vy}\tfrac{1}{S}\textstyle\sum_{i=1}^{S}\boldsymbol{\xi}^{\boldsymbol{y}}_{k,i},
\end{align*}
where for each fixed $k$, the noises $\left\{\left(\boldsymbol{\xi}^{\boldsymbol{x}}_{k,i},\boldsymbol{\xi}^{\boldsymbol{y}}_{k,i}\right)\right\}_{i=1}^S$ are i.i.d. sampled from some unknown distribution. We impose the standard assumption of zero mean and bounded variance on the noises:
\begin{assumption}
We assume $\mathbb{E}[\boldsymbol{\xi}^{\boldsymbol{x}}_{k,i}]=\mathbf{0}$, $\mathbb{E}[\boldsymbol{\xi}^{\boldsymbol{y}}_{k,i}]=\mathbf{0}$, $\mathbb{E}[\|\boldsymbol{\xi}^{\boldsymbol{x}}_{k,i}\|_2^2]\le \sigma_{\boldsymbol{x}}^2$, and $\mathbb{E}[\|\boldsymbol{\xi}^{\boldsymbol{y}}_{k,i}\|_2^2]\le \sigma_{\boldsymbol{y}}^2$ for some $\sigma_{\boldsymbol{x}},\sigma_{\boldsymbol{y}}\ge 0$.
\end{assumption}
We also denote
\begin{align*}
\boldsymbol{\xi}_k= \begin{pmatrix}
-\frac{1}{S}\sum_{i=1}^{S}\boldsymbol{\xi}^{\boldsymbol{x}}_{k,i} \\ \frac{r}{S}\sum_{i=1}^{S}\boldsymbol{\xi}^{\boldsymbol{y}}_{k,i}
\end{pmatrix}.
\end{align*}
We know $\mathbb{E}[\norm{\boldsymbol{\xi}_k}_2^2]\le ({\sigma_{\boldsymbol{x}}^2+r^2\sigma_{\boldsymbol{y}}^2})/S=: \sigma_r^2/S$. The following theorem establishes a convergence result for mini-batch SGDA.
\begin{theorem}
\label{thm:conv_general_sgda}
We use the same parameters as in Theorem~\ref{thm:conv_general}. Suppose $M=P^{-1}\Lambda P$ is diagonizable. We have
\begin{align*}
\mathbb{E}[\|\boldsymbol{z}^T-\boldsymbol{z}^\ast\|_2^2]\le& C_P^2\norm{\boldsymbol{z}^0-\boldsymbol{z}^\ast}_2^2\left(1-\frac{1}{16\kappa\kappa_{\vx}}\right)^{2T}\\&+\frac{2\kappa_{\vx} C_P^2\sigma^2_{r}}{rL^2 S}.
\end{align*}
It means the gradient complexity of achieving $ \mathbb{E}[\|\boldsymbol{z}^T-\boldsymbol{z}^\ast\|_2^2]\le\epsilon^2$ is\begin{align*}
\mathcal{O}\left(r\kappa_{\vx}\log\left(\frac{C_P\norm{\boldsymbol{z}^0-\boldsymbol{z}^\ast}_2}{\epsilon}\right)\max\left\{1,\frac{\kappa_{\vx} C_P^2\sigma^2_{r}}{rL^2 \epsilon^2}\right\}\right).
\end{align*}
\end{theorem}
Remark that if $\max\{\sigma_{\boldsymbol{x}},\sigma_{\boldsymbol{y}}\}=\mathcal{O}(1)$, we know $\sigma_{r}^2=\mathcal{O}(r^2)$ and the above complexity is
\begin{align*}
\Tilde{\mathcal{O}}\left(\frac{r^2\kappa_{\vx}^2}{\epsilon^2}\right).
\end{align*}
\subsection{Summary of main contributions}
\begin{itemize
\item We provide a precise answer to the above question for local convergence to a Stackelberg Equilibrium of locally $L$ smooth functions. In this setting, we prove that choosing $\eta_{\boldsymbol{x}}=\Theta(1/r L)$ and $\eta_{\boldsymbol{y}}=\Theta(1/L)$ with a stepsize ratio $r=\Omega(\kappa)$ suffices to guarantee convergence. We then show the necessity of the $\Omega(\kappa)$ stepsize ratio to guarantee convergence. Therefore the optimal choice is $r=\Theta(\kappa)$.
\item For any $r=\Omega(\kappa)$, we provide a nearly tight convergence rate with matching lower bounds in this setting. Our result is locally much faster than that under the conservative stepsize choice in \citep{lin2020gradient}.
\ite
We further extend our local convergence results to Stochastic Gradient Descent Ascent (SGDA) and extre-gradient methods (EG). For EG, the convergence rate is also optimal for any $r=\Omega(\kappa)$.
\item We conduct experiments on quadratic NC-SC functions to illustrate the convergence behaviors under different stepsize ratios. We also run the GDA algorithm to optimize non-quadratic functions and show that such behaviors further exist globally for several non-quadratic functions. Finally, we conduct experiments on GANs to show that simultaneous GDA with $\eta_{\vx}\approx\eta_{\vy}$ enjoys fast convergence to a desired solution.
\end{itemize}
\subsection{A lower bound of the stepsize ratio for GDA}
\label{sec:lower_bound_ratio}
To start with, we show that for GDA, the stepsize ratio $r$ must be at least $\Omega(\kappa)$ to ensure local convergence to a Stackelberg Equilibrium. Formally, we have the following theorem.
\begin{theorem}
\label{thm:lower_bound}
For any given $L,\mu>0$ and $0\le \mu_{\vx}\le L$ such that $\kappa=L/\mu\ge 2$, there exists a function $f$ that has a differential Stackelberg Equilibrium with parameters $(L,\mu,\mu_{\vx})$ such that if choosing a stepsize ratio $r\le \kappa$, the GDA algorithm does not locally converge for all initial points irrespective of any choice of positive stepsize $\eta_{\vx}$.
\end{theorem}
The hard function $f$ in Theorem~\ref{thm:lower_bound} is constructed as $f:\mathbb{R}\times\mathbb{R}\to \mathbb{R}$ with the following expression
\begin{align*}
{f}(x;y) =& -\frac{\mu}{2}y^2+L xy-\frac{L}{2} x^2.
\end{align*}
Note that since the above $f$ is a quadratic NC-SC function and global convergence implies local convergence, Theorem~\ref{thm:lower_bound} can be also viewed as a lower bound of the stepsize ratio of GDA for the general NC-SC minimax optimization problem studied in \citep{lin2020gradient}.
For such a simple function $f$, we can directly solve the two eigenvalues of its corresponding $M$ matrix and show that one of them, say $\lambda_1$, has a positive real part. Then $|1+\eta_{\vx}\lambda_1|>1$ for any positive $\eta_{\vx}$ which implies divergence of GDA. However, it does not directly apply to EG because it is much harder to lower bound $|1+\eta_{\vx}\lambda_1+\eta_{\vx}^2\lambda_1^2|$ unless assuming $\eta_{\vx}$ is very small (which is not desirable). We leave the optimal choice of the stepsize ratio for EG as an interesting open problem.
\subsection{Convergence rate of GDA and EG}
Now we show that $r=\Omega(\kappa)$ is sufficient for both GDA and EG to converge. We also provide a tight local convergence rate for them.
\begin{theorem}
\label{thm:main_local_conv}
Given a function $f$ and its Stackelberg Equilibrium $\boldsymbol{z}^\ast$ satisfying all the assumptions in Section~\ref{sec:pre}. Choose $\eta_{\vx}=\frac{1}{4rL}$ and $\eta_{\vy}=\frac{1}{4L}$ with $r\ge 2\kappa$.
Suppose that $M$ defined in \eqref{eq:M} is diagonalizable and its eigenvalue decomposition is $M=P^{-1}\Lambda P$. Let $C_P=\norm{P}_2\norm{P^{-1}}_2$. There exists some $\delta>0$ such that if $\norm{\boldsymbol{z}^0-\boldsymbol{z}^\ast}_2\le \delta$, we have the iterates of GDA and EG with an exact gradient oracle satisfy
\begin{align*}
\|\boldsymbol{z}^T-\boldsymbol{z}^\ast\|_2\le C_P\norm{\boldsymbol{z}^0-\boldsymbol{z}^\ast}_2\left(1-\frac{c_0}{r\kappa_{\vx}}\right)^T
\end{align*}
for all $T\ge 0$, where $c_0$ is some numerical constant. It means the gradient complexity of achieving an error less than $\epsilon$ is\begin{align*}
\mathcal{O}\left(r\kappa_{\vx}\log\left(\frac{C_P\norm{\boldsymbol{z}^0-\boldsymbol{z}^\ast}_2}{\epsilon}\right)\right).
\end{align*}
\end{theorem}
\paragraph{Remark 1.} The assumption that $M$ is diagonalizable is actually without loss of generality. One can easily obtain similar convergence result without this assumption by using Lemma~\ref{lem:spectral_GDA_EG} and \citep[Chapter 2.1.2, Theorem~1]{intro_opt}. However, we still keep this assumption because (1) it is a mild assumption as the set of non-diagonalizable matrices has zero measure and (2) it enables us to explicitly derive the dependence on all involved problem-dependent constants like the condition number $C_P$.
\paragraph{Remark 2.} The factor $2$ in the assumption $r\ge2\kappa$ is also \emph{arbitrary}. Following our analysis, we can replace it by $r\ge c\kappa$ for any numerical constant $c>1$ and obtain nearly the same convergence result up to constant factors. However, we will always choose $c=2$ in this paper to make expressions as simple as possible.
Even if $c>1$ is not a numerical constant and depends on $\kappa$ or $\kappa_{\vx}$, local convergence can still be guaranteed although the rate might be worse. Therefore, combined with the negative result in Theorem~\ref{thm:lower_bound}, we know $r=\kappa$ is the exact \emph{phase transition point} between convergence and non-convergence.
The above complexity is $\Tilde{\mathcal{O}}(r\kappa_{\vx})$ which scales linearly in $r$ when $r\ge 2\kappa$. So choosing $r=2\kappa$ results in the best complexity bound of $\Tilde{\mathcal{O}}(\kappa\kappa_{\vx})$. This rate significantly improves upon the $\Tilde{\mathcal{O}}(\kappa^2\kappa_{\vx})$ complexity under the choice of $r=\Theta(\kappa^2)$ as in \citep{lin2020gradient}.
Note that the condition number of the local primal function $\Phi$ is $\kappa_{\vx}(\kappa+1)$ as $\Phi$ is $(\kappa+1)L$ smooth. Therefore, the $\Tilde{\mathcal{O}}(\kappa\kappa_{\vx})$ gradient complexity for $r=2\kappa$ is nearly the same as the iteration complexity of running gradient descent directly on $\Phi$ although we do not really have access to its value and gradient!
We also want to point out we fix $\eta_{\vy}=\Theta(1/L)$ and vary $\eta_{\vx}$ for different $r$ because it is well known that $\Theta(1/L)$ is the largest possible step size for $L$ smooth functions to ensure convergence.
To prove Theorem~\ref{thm:main_local_conv}, we note that the dynamics of GDA or EG is approximately a linear time invariant system as in (\ref{eq:approx_lti_gda},\ref{eq:approx_lti_eg}). By a careful analysis of the spectral properties of $M$, we can show that the spectral radius of the transition matrix $I+\eta_{\vx} M$ or $I+\eta_{\vx} M+\eta_{\vx}^2 M^2$ is strictly upper bounded by $1$. In Section~\ref{sec:quad_analysis}, we will introduce our analysis methods in detail through simpler quadratic NC-SC functions. In this case, the dynamical systems~(\ref{eq:approx_lti_gda},\ref{eq:approx_lti_eg}) are exactly LTIs. Then bounding the spectral radius of the transition matrix is sufficient to prove convergence. We will show how to use the results for quadratic functions to prove Theorem~\ref{thm:main_local_conv} in Appendix~\ref{app:main_local_conv}.
It is also worth pointing out that when $f$ is quadratic, it is actually nonconvex-strongly-concave (NC-SC). Also, the results for quadratic NC-SC functions are slightly stronger than Theorem~\ref{thm:main_local_conv}. For example, $M$ no longer needs to satisfy the diaonalizability assumption. As the dynamics of the quadratic functions are globally LTI, a global convergence result is feasible to obtain in this setting. It means that all our local convergence results can be viewed as global results for quadratic NC-SC functions.
Now we provide a matching lower bound to show the convergence rate in Theorem~\ref{thm:main_local_conv} is nearly tight for GDA.
\begin{theorem}
\label{thm:lower_bound_conv_rate_deterministic} Suppose we run GDA or EG with the stepsize choices in Theorem~\ref{thm:main_local_conv} with $r\ge 2\kappa$.
There exists a function $f$ and its Stackelberg Equilibrium $\boldsymbol{z}^\ast$ satisfying all the assumptions in Section~\ref{sec:pre} with a diagonalizable $M$ matrix, such that for any there exists a $\boldsymbol{z}^0$ that is arbitrarily close to $\boldsymbol{z}^\ast$ and the iterates satisfy
\begin{align*}
\|\boldsymbol{z}^T-\boldsymbol{z}^\ast\|_2\ge \left(1-\frac{1}{r\kappa_{\vx}}\right)^T\norm{\boldsymbol{z}^0-\boldsymbol{z}^\ast}_2.
\end{align*}
\end{theorem}
The proof of Theorem~\ref{thm:lower_bound_conv_rate_deterministic} is deferred in Appendix~\ref{app:lower_bound}.
The following theorem establishes the convergence rate of GDA and EG when the gradient oracle is stochastic.
\begin{theorem}
\label{thm:main_local_conv_stochastic}
With the same assumptions and notation as in Theorem~\ref{thm:main_local_conv}.
There exists some $\delta>0$ such that if $\norm{\boldsymbol{z}^0-\boldsymbol{z}^\ast}_2\le \delta$, we have with probability at least $1-p$ for arbitrarily small constant $p$, the iterates of mini-batch SGDA and stochastic EG under Assumption~\ref{ass:zero_mean_bounded_variance} satisfy $\|\boldsymbol{z}^T-\boldsymbol{z}^\ast\|_2\le \epsilon$ if choosing
\begin{align*}
T=&O\left(r\kappa_{\vx}\log\left(\frac{C_P\norm{\tilde{\boldsymbol{z}}^0}_2}{\epsilon}\right)\right)\\
S=&O\left(\frac{r^2\kappa_{\vx}^2 C_P^2\sigma^2}{L^2\epsilon^2}\log^2\left(\frac{C_P\norm{\tilde{\boldsymbol{z}}^0}_2}{\epsilon}\right)\right).
\end{align*}
This implies a gradient complexity of
\begin{align*}
T\cdot S=O\left(\frac{r^3\kappa_{\vx}^3 C_P^2\sigma^2}{L^2\epsilon^2}\log^3\left(\frac{C_P\norm{\tilde{\boldsymbol{z}}^0}_2}{\epsilon}\right)\right).
\end{align*}
\end{theorem}
We are not sure whether the above $\tilde{O}\left(\frac{r^3\kappa_{\vx}^3}{\epsilon^2}\right)$ complexity is tight or not. Actually, as we will show in next section, the convergence rate for quadratic NC-SC functions in the stochastic setting is $\tilde{O}\left(\frac{r^2\kappa_{\vx}^2}{\epsilon^2}\right)$, strictly better than the above theorem. Here we get a worse rate because the deviation of the local dynamics of GDA/EG from the corresponding LTI can depend on the gradient noise, which makes the analysis harder. It is an interesting future direction to see whether the above rate can be improved.
\subsection{Problem setup}
\label{subsec:setup}
We study the minimax optimization problem \eqref{eq:minimax} where $f$ is twice-continuously differentiable. This assumption guarantees that $\nabla^2 f(\boldsymbol{x};\boldsymbol{y})$ is a symmetric Hessian matrix for any $\boldsymbol{x}\in\mathcal{X}\subseteq \mathbb{R}^n$ and $\boldsymbol{y}\in\mathcal{Y}\subseteq\mathbb{R}^m$. We will often denote $\boldsymbol{z}=(\boldsymbol{x},\boldsymbol{y})$ for simplicity.
We further assume that there exists a differential Stackelberg Equilibrium $\boldsymbol{z}^\ast=(\boldsymbol{x}^\ast,\boldsymbol{y}^\ast)$. Formally, denote the Hessian at $\boldsymbol{z}^\ast$ as
\begin{align}
\begin{pmatrix}
\nabla^2_{\boldsymbol{x}\vx}f(\boldsymbol{z}^\ast) &\nabla^2_{\boldsymbol{x}\boldsymbol{y}}f(\boldsymbol{z}^\ast)\\
\nabla^2_{\boldsymbol{y}\boldsymbol{x}}f(\boldsymbol{z}^\ast)&\nabla^2_{\boldsymbol{y}\vy}f(\boldsymbol{z}^\ast)
\end{pmatrix}=\begin{pmatrix}
C &B\\
B^\top&-A
\end{pmatrix}.
\label{eq:hessian_def}
\end{align}
Then differential Stackelberg Equilibrium is defined as follows.
\begin{definition}[\cite{pmlr-v119-fiez20a}] A point $\boldsymbol{z}^\ast$ satisfying \eqref{eq:hessian_def} is a differential Stackelberg Equilibrium if $\nabla_{\boldsymbol{x}} f(\boldsymbol{z}^\ast)=\mathbf{0}$, $\nabla_{\boldsymbol{y}} f(\boldsymbol{z}^\ast)=\mathbf{0}$, $A> 0$, $C+BA^{-1}B^\top>0$.
\label{def:stackelberg}
\end{definition}
Here $C+BA^{-1}B^\top$ is the Schur complement with respect to the top left $n\times n$ block in the block matrix $\nabla^2 f(\boldsymbol{z}^\ast)$. We will see later that it is also the Hessian of the primal function $\Phi(\cdot)=\max_{\boldsymbol{y}\in\mathcal{Y}}f(\cdot;\boldsymbol{y})$ at $\boldsymbol{x}^\ast$. The condition $A>0$ implies the function is locally strictly concave in $\boldsymbol{y}$ around $\boldsymbol{z}^\ast$. The condition $C+BA^{-1}B^\top$ further suggests $\Phi$ is locally strictly convex.
We assume that $f$ is locally $L$ smooth around $z^\ast$. Specifically, assume\footnote{Our definition of smoothness is slightly different from the usual one up to a factor of $2$.}
\begin{align*}
\max\{\norm{A}_2,\norm{B}_2,\norm{C}_2\}\le L.
\end{align*}
Denote
\begin{align*}
\mu = \lambda_{\min}(A),\quad\mu_x=\min\{L,\lambda_{\min}(C+BA^{-1}B^\top)\}
\end{align*}
and the corresponding condition numbers
\begin{align*}
\kappa = L/\mu,\quad \kappa_{\vx}=L/\mu_{\vx}.
\end{align*}
We will call $\boldsymbol{z}^\ast$ a Stackelberg Equlibrium with parameters $(L,\mu,\mu_{\vx})$. Also remark that $\Phi$ is locally $(\kappa+1)L$ smooth and $\mu_{\vx}$ strongly convex, which implies the local condition number of $\Phi$ is actually $\kappa_{\vx}(\kappa+1)$.
\paragraph{Learning Dynamics}
In this paper, we focus on the two-time-scale GDA algorithm and also extend the results to two-time-scale EG. Let $\eta_{\vx}$ and $\eta_{\vy}$ be the stepsizes for $\boldsymbol{x}$ and $\boldsymbol{y}$ and $r=\eta_{\vy}/\eta_{\vx}$ be the stepsize ratio.
At each iterate $\boldsymbol{z}^k=(\boldsymbol{x}^k,\boldsymbol{y}^k)$, we are given an exact or stochastic oracle that returns gradient $(g_{\boldsymbol{x}}(\boldsymbol{z}^k),g_{\boldsymbol{y}}(\boldsymbol{z}^k))$. If it is an exact oracle, we have
\begin{align*}
g_{\boldsymbol{x}}(\boldsymbol{z}^k)=\nabla_{\boldsymbol{x}}f(\boldsymbol{z}^k),\quad g_{\boldsymbol{y}}(\boldsymbol{z}^k)=\nabla_{\boldsymbol{y}}f(\boldsymbol{z}^k).
\end{align*}
In the stochastic setting, we hide the randomness in the random functions $g_{\boldsymbol{x}}$ and $g_{\boldsymbol{y}}$. Denote the noise of gradient as
\begin{align}
\boldsymbol{\xi}_{\boldsymbol{x}}^{k}=&g_{\boldsymbol{x}}(\boldsymbol{z}^k)-\nabla_{\boldsymbol{x}}f(\boldsymbol{z}^k),\label{eq:gradient_noise}\\\boldsymbol{\xi}_{\boldsymbol{y}}^{k}=&g_{\boldsymbol{y}}(\boldsymbol{z}^k)-\nabla_{\boldsymbol{y}}f(\boldsymbol{z}^k).\nonumber
\end{align}
We assume the gradient is estimated with a mini-batch of samples of size $S$ and is unbiased with bounded variance. Formally, we assume
\begin{assumption}
$\mathbb{E}[\boldsymbol{\xi}_{\boldsymbol{x}}^{k}]=\mathbf{0}$, $\mathbb{E}[\boldsymbol{\xi}_{\boldsymbol{y}}^{k}]=\mathbf{0}$, $\mathbb{E}[\|\boldsymbol{\xi}_{\boldsymbol{x}}^{k}\|_2^2]\le \sigma^2/S$, and $\mathbb{E}[\|\boldsymbol{\xi}_{\boldsymbol{y}}^{k}\|_2^2]\le \sigma^2/S$ for some $\sigma\ge 0$. Also, the noises for different $k$ are independent.
\label{ass:zero_mean_bounded_variance}
\end{assumption}
Remark that in the stochastic setting, it takes $S$ gradient evaluations to estimate $(g_{\boldsymbol{x}}(\boldsymbol{z}^k),g_{\boldsymbol{y}}(\boldsymbol{z}^k))$.
The learning dynamics of (stochastic) GDA is given by
\begin{align}
\boldsymbol{x}^{k+1}=&\;\boldsymbol{x}^k-\eta_{\vx} g_{\boldsymbol{x}}(\boldsymbol{x}^{k};\boldsymbol{y}^{k}),\label{eq:gda_def}\\
\boldsymbol{y}^{k+1}=&\;\boldsymbol{y}^k+\eta_{\vy} g_{\boldsymbol{y}}(\boldsymbol{x}^{k};\boldsymbol{y}^{k}).\nonumber
\end{align}
The learning dynamics of (stochastic) EG is given by
\begin{align}
\boldsymbol{x}^{k+1/2}=&\;\boldsymbol{x}^k-\eta_{\vx} g_{\boldsymbol{x}}(\boldsymbol{x}^{k};\boldsymbol{y}^{k}),\nonumber\\
\boldsymbol{y}^{k+1/2}=&\;\boldsymbol{y}^k+\eta_{\vy} g_{\boldsymbol{y}}(\boldsymbol{x}^{k};\boldsymbol{y}^{k}); \label{eq:eg_def}\\
\boldsymbol{x}^{k+1}=&\;\boldsymbol{x}^k-\eta_{\vx} g_{\boldsymbol{x}}(\boldsymbol{x}^{k+1/2};\boldsymbol{y}^{k+1/2}),\nonumber\\
\boldsymbol{y}^{k+1}=&\;\boldsymbol{y}^k+\eta_{\vy} g_{\boldsymbol{y}}(\boldsymbol{x}^{k+1/2};\boldsymbol{y}^{k+1/2}).\nonumber
\end{align}
From Definition~\ref{def:stackelberg}, we can see that $f$ is approximately a quadratic NC-SC function near $\boldsymbol{z}^\ast$. The dynamics of GDA or EG is a linear time invariant system. Specifically, define matrix
\begin{align}
M=\begin{pmatrix}
-C& - B\\
rB^\top & - rA
\end{pmatrix}.\label{eq:M}
\end{align}
Let $\boldsymbol{z}^k=(\boldsymbol{x}^k,\boldsymbol{y}^k)$. We will see that with an exact gradient oracle, the dynamics of GDA is approximately
\begin{align}
\boldsymbol{z}^{k+1}-\boldsymbol{z}^\ast \approx (1+\eta_{\vx} M)\cdot (\boldsymbol{z}^k-\boldsymbol{z}^\ast).\label{eq:approx_lti_gda}
\end{align}
Similarly, the dynamics of EG is approximately
\begin{align}
\boldsymbol{z}^{k+1}-\boldsymbol{z}^\ast\approx (1+\eta_{\vx} M+\eta_{\vx}^2M^2)\cdot (\boldsymbol{z}^k-\boldsymbol{z}^\ast).\label{eq:approx_lti_eg}
\end{align}
\subsection{Problem setup for quadratic functions}
We first formulate the problem in the quadratic setting. Consider the quadratic function $f:\mathbb{R}^n\times\mathbb{R}^m\to\mathbb{R}$ of the following form:
\begin{align}
f(\boldsymbol{x};\boldsymbol{y}) =& \! - \! \frac{1}{2}(\boldsymbol{y} \! - \! \boldsymbol{y}^\ast)^\top \! A (\boldsymbol{y} \! - \! \boldsymbol{y}^\ast) \! + \! (\boldsymbol{x} \! - \! \boldsymbol{x}^\ast)^\top \! B (\boldsymbol{y} \! - \! \boldsymbol{y}^\ast)\nonumber \\
& +\frac{1}{2}(\boldsymbol{x}-\boldsymbol{x}^\ast)^\top C (\boldsymbol{x}-\boldsymbol{x}^\ast)
\label{eq:quadratic}
\end{align}
for some matrices $A\in\mathbb{R}^{m\times m}$, $B\in\mathbb{R}^{n\times m}$, $C\in\mathbb{R}^{n\times n}$ where $A$ and $C$ are symmetric matrices. $\boldsymbol{z}^\ast=(\boldsymbol{x}^\ast,\boldsymbol{y}^\ast)$ is the differential Stackelberg Equilibrium. In this setting, the assumptions in Section~\ref{sec:pre} are reduced as follows.
\begin{assumption}
The function $f$ defined in \eqref{eq:quadratic} satisfies
\begin{enumerate}
\item $\mu I\le A\le{L} I$ and $\|B\|_2,\|C\|_2\le {L}$.
\item $C+BA^{-1}B^\top\ge \mu_{\vx}>0$.
\end{enumerate}
\label{assumption:quadratic}
\end{assumption}
\iffalse
Define the primal function as
\begin{align*}
\Phi(\boldsymbol{x}) :=& \max_{\boldsymbol{y}\in\mathbb{R}^m} f(\boldsymbol{x};\boldsymbol{y})\\
=&\frac{1}{2}(\boldsymbol{x}-\boldsymbol{x}^\ast)^\top \left(C+BA^{-1}B^\top\right)(\boldsymbol{x}-\boldsymbol{x}^\ast).
\end{align*}
First note that $\Phi$ is $(\kappa+1)L$ smooth as $\norm{C+BA^{-1}B^\top}_2\le (\kappa+1)L$. We also assume $\Phi$ is lower bounded over $\mathbb{R}^n$, which is a standard assumption made in existing nonconvex-strongly-concave minimax optimization literature~\citep{lin2020gradient,lin2020nearoptimal}. It is equivalent to assuming $C+BA^{-1}B^\top\ge 0$, i.e., $\Phi$ is convex. We formally summarize all the above discussions into the following assumption:
\begin{remark}
A function satisfying Assumption~\ref{assumption:quadratic} may not be $L$ smooth, but it is guaranteed to be $2L$ smooth. For simplicity, we still view $L$ as the smoothness parameter and define the condition number as $\kappa:=L/\mu\ge 1$.
\end{remark}
\fi
Then one can check that the primal function is
\begin{align*}
\Phi(\boldsymbol{x})=&\frac{1}{2}(\boldsymbol{x}-\boldsymbol{x}^\ast)^\top \left(C+BA^{-1}B^\top\right)(\boldsymbol{x}-\boldsymbol{x}^\ast).
\end{align*}
Also, we have $\boldsymbol{x}^\ast=\text{argmin}_{\boldsymbol{x}} \Phi(\boldsymbol{x})$ and $\boldsymbol{y}^\ast=\text{argmax}_{\boldsymbol{y}}f(\boldsymbol{x}^\ast;\boldsymbol{y})$, i.e., $\boldsymbol{z}^\ast$ is a global minimax point for this quadratic NC-SC minimax optimization problem.
\subsection{Convergence in the deterministic setting}
For quadratic functions, (\ref{eq:approx_lti_gda},\ref{eq:approx_lti_eg}) are exactly Linear Time-Invariant (LTI) systems with transition matrices $I+\eta_{\vx} M$ and $I+\eta_{\vx} M+\eta_{\vx}^2M^2$ respectively. Note that from the definition of $M$ in \eqref{eq:M}, these two matrices are non-symmetric and pretty general block matrices. Their eigenvalues could be complex numbers. Although their spectral norms are easy to bound, they could be strictly greater than $1$. Therefore, we have to bound a more fine-grained quantity, the spectral radius, which could be strictly less than the spectral norm. To bound the spectral radius, we provide a careful analysis of the spectral properties of $M$ in the following lemma which is also our main technical contribution.
\begin{lemma}
Suppose $\lambda=\lambda_0+i\lambda_1$ is an eigenvalue of $M$ where $\lambda_0,\lambda_1\in\mathbb{R}$ and $i=\sqrt{-1}$. Then\begin{enumerate}
\item $|\lambda_1| \le \sqrt{r}{L}$.
\item If $\lambda_1\neq 0$, we have $\lambda_0\le-\frac{\mu(r-\kappa)}{2}$.
\item If $r\ge1$, the spectral norm of $M$ is bounded: $\lambda_0^2+\lambda_1^2\le \norm{M}_2^2\le 4r^2{L}^2$.
\item Choosing $r>\kappa$, if $\lambda_1=0$, we have $\lambda_0\le -\mu_{\vx}$.
\item If $r> \kappa$ and $\mu_{\vx}>0$, we must have $\lambda_0 < 0$.
\end{enumerate}
\label{lem:spectral_M}
\end{lemma}
Remark that Lemma~\ref{lem:spectral_M}.1 and~\ref{lem:spectral_M}.5 together suggest that if $\mu_{\vx}>0$ and $r>\kappa$, every eigenvalue $\lambda$ of $M$ has a strictly negative real part and a bounded imaginary part. Then if fixing $r=\eta_{\vy}/\eta_{\vx}>\kappa$ and choosing a small enough $\eta_{\vx}$ (or $\eta_{\vy}$), one can guarantee $|1+\eta_{\vx} \lambda|<1$, i.e., the spectral radius of the transition matrix of GDA is less than $1$ which implies convergence. Similary, the convergence of EG can also be guaranteed.
Lemma~\ref{lem:spectral_M} also suggests that the angle between the complex number $\lambda$ and the real line in the complex plane is bounded by some $\theta<\pi/2$. If further assuming $r\ge c\kappa$ for some numerical constant $c>1$, we can get a tight bound of $\theta$ which allows us to choose $\eta_{\vx}$ to make $|1+\eta_{\vx} \lambda|$ as small as possible. Then we can obtain a quantitative and tight bound of the spectral radius of the transition matrices in the following lemma.
\begin{lemma}
\label{lem:spectral_GDA_EG}
Choose $\eta_{\vx}=\frac{1}{4r{L}}$ and $\eta_{\vy}=\frac{1}{4{L}}$ where $r\ge2\kappa$. Let $\rho_1$ be the spectral radius of $I+\eta_{\vx} M$ and $\rho_2$ be that of $I+\eta_{\vx} M+\eta_{\vx}^2 M^2$. We have
\begin{align*}
\max\{\rho_1,\rho_2\}\le 1-\frac{1}{64r\kappa_{\vx}}.
\end{align*}
\end{lemma}
\input{Sections/figures}
The proofs of Lemma~\ref{lem:spectral_M} and Lemma~\ref{lem:spectral_GDA_EG} are deferred in Appendix~\ref{app:spectral}.
With Lemma~\ref{lem:spectral_GDA_EG},
the convergence result of GDA and EG for quadratic NC-SC functions follows naturally.
\begin{theorem}
Let $M=P^{-1}J P$ be its Jordan decomposition. Define $C_P=\|P\|_2\|P^{-1}\|_2$ as the condition number of $P$ and $s$ be the size of the largest Jordan block in $J$.
Under Assumption~\ref{assumption:quadratic}, choosing $\eta_{\vx}=\frac{1}{4rL}$ and $\eta_{\vy}=\frac{1}{4L}$ with $r\ge 2\kappa$, we have the iterates of GDA or EG with an exact gradient oracle satisfy
\begin{align*}
\|\boldsymbol{z}^T \! - \! \boldsymbol{z}^\ast\|_2 \! \le \! sC_P \! \norm{\boldsymbol{z}^0 \! - \! \boldsymbol{z}^\ast}_2 \! T^{s-1} \! \left(1 \! - \! \frac{c_0}{r\kappa_{\vx}}\right)^{T-s+1}
\end{align*}
for all $T\ge0$, where $c_0$ is some numerical constant. It means the gradient complexity of achieving $\|\boldsymbol{z}^T-\boldsymbol{z}^\ast\|_2\le\epsilon$ is\begin{align*}
\mathcal{O}\left(sr\kappa_{\vx} \log\left(\frac{sr\kappa_{\vx} C_P\norm{\boldsymbol{z}^0-\boldsymbol{z}^\ast}_2}{\epsilon}\right)\right).
\end{align*}
\label{thm:converence_nond_1}
\end{theorem}
Note that Theorem~\ref{thm:converence_nond_1} is a global convergence result and does not assume $M$ is diagonalizable.
However, the gradient complexity has a factor of $s$ which could be proportional to the dimension $d=m+n$ in the worst case when $M$ is not diagonalizable but is usually very small.
\subsection{Convergence in the stochastic setting}
The following theorem establishes a convergence result for mini-batch SGDA.
\begin{theorem}
\label{thm:conv_general_sgda}
We use the same assumptions and parameters as in Theorem~\ref{thm:converence_nond_1} except that now we consider stochastic gradient oracles. The iterates of SGDA and stochastic EG satisfy
\begin{small}
\begin{align*}
\mathbb{E}[\|\boldsymbol{z}^T\!-\!\boldsymbol{z}^\ast\|_2^2]\le C_P^2\left(1\!-\!\frac{c_1}{r\kappa_{\vx}}\right)^{2T}\!\norm{\boldsymbol{z}^0-\boldsymbol{z}^\ast}_2^2\!+\!\frac{c_2r\kappa_{\vx} C_P^2\sigma^2}{L^2S}
\end{align*}
\end{small}
for all $T\ge0$, where $c_1$ and $c_2$ are numerical constants. It means the gradient complexity of achieving $\mathbb{E}[\|{\boldsymbol{z}^T-\boldsymbol{z}^\ast}\|_2]\le\epsilon$ is\begin{align*}
\mathcal{O}\left(r\kappa_{\vx}\log\left(\frac{C_P\norm{\boldsymbol{z}^0-\boldsymbol{z}^\ast}_2}{\epsilon}\right)\max\left\{1,\frac{r\kappa_{\vx} C_P^2\sigma^2}{L^2 \epsilon^2}\right\}\right).
\end{align*}
\end{theorem}
The proofs of Theorem~\ref{thm:converence_nond_1} and Theorem~\ref{thm:conv_general_sgda} can be found in Appendix~\ref{app:quad_conv}.
As we mentioned before, the above $\Tilde{O}(\frac{r^2\kappa_{\vx}^2}{\epsilon^2})$ rate is better than the stochastic local convergence counterpart in Theorem~\ref{thm:main_local_conv_stochastic}.
Again note that when $r=2\kappa$, the rate is $\tilde{O}\left(\frac{(\kappa\kappa_{\vx})^2}{\epsilon^2}\right)$ which is the gradient complexity of stochastic gradient descent directly on $\Phi$ although we do not have access to the stochasic oracle of $\Phi$!
\subsection{A lower bound of the stepsize ratio}
\label{sec:lower_bound_ratio}
To start with, we show that for unconstrained NC-SC minimax optimization problems, the stepsize ratio $r$ of GDA must be at least $\Omega(\kappa)$ to ensure convergence. Formally, we have the following theorem:
\begin{theorem}
\label{thm:lower_bound}
For any given $L,\mu>0$ and $0\le \mu_{\vx}\le L$ such that $\kappa=L/\mu\ge 2$, there exists a function $f$ satisfying Assumption~\ref{assumption:quadratic} and $C+BA^{-1}B^\top\ge \mu_{\vx} I$ such that if choosing a stepsize ratio $r\le \kappa$, the GDA algorithm does not converge for all initial points irrespective of any choice of positive stepsize $\eta_{\vx}$.
\end{theorem}
Note that Theorem~\ref{thm:lower_bound} is also a lower bound of stepsize ratio for the general NC-SC function class as the quadratic function class subsumes the general one. With this lower bound, we will always choose a stepsize ratio at least linear in $\kappa$.
\subsection{Linear convergence when $\mu_{\vx}>0$}
\label{sec:42}
Now we show that a stepsize ratio, at least linear in $\kappa$, suffices to guarantee convergence of GDA when $\mu_{\vx}>0$.
We will bound $\rho<1$ to prove the linear convergence. To obtain such a bound of $\rho$, we need to analyze the spectral properties of $M$. Informally, through fine-grained analysis, we can show that if $\mu_{\vx}>0$ and $r>\kappa$, every eigenvalue $\lambda$ of $M$ has a strictly negative real part. Moreover, the angle between the complex number $\lambda$ and the real line in the complex plane is bounded by some $\theta<\pi/2$. Therefore, when $\eta_{\vx}$ is small enough, $1+\eta_{\vx} \lambda$ will lie strictly inside the unit circle which implies $\rho<1$.
Then we can obtain the following convergence result. Note that since there is a unique optimal point $\boldsymbol{z}^\ast$, we use the distance $\norm{\boldsymbol{z}^T-\boldsymbol{z}^\ast}_2$ as the performance measure instead of the notion of approximate stationary points used in \citep{lin2020gradient}.
\begin{theorem}
Let $M=P^{-1}J P$ be its Jordan decomposition. Define $C_P=\|P\|_2\|P^{-1}\|_2$ as the condition number of $P$ and $s$ be the size of the largest Jordan block in $J$.
Under Assumption~\ref{assumption:quadratic}, choosing $\eta_{\vx}=\frac{1}{2rL}$ and $\eta_{\vy}=\frac{1}{2L}$ with $r\ge 2\kappa$ and assuming $\mu_{\vx}>0$, we have
\begin{align*}
\|\boldsymbol{z}^T \! - \! \boldsymbol{z}^\ast\|_2 \! \le \! sC_P \! \norm{\boldsymbol{z}^0 \! - \! \boldsymbol{z}^\ast}_2 \! T^{s-1} \! \left(1 \! - \! \frac{1}{16r\kappa_{\vx}}\right)^{T-s+1},
\end{align*}
which means the gradient complexity of achieving $ \|\boldsymbol{z}^T-\boldsymbol{z}^\ast\|_2\le\epsilon$ is\begin{align*}
\mathcal{O}\left(sr\kappa_{\vx} \log\left(\frac{sr\kappa_{\vx} C_P\norm{\boldsymbol{z}^0-\boldsymbol{z}^\ast}_2}{\epsilon}\right)\right).
\end{align*}
\label{thm:converence_nond_1}
\end{theorem}
The gradient complexity has a factor of $s$ which could be proportional to the dimension $d=m+n$ in the worst case but is usually very small. When $s=1$, i.e., $M$ is diagonalizable, we can actually slightly improve the complexity to $$\mathcal{O}\left(r\kappa_{\vx}\log\left(C_P\norm{\boldsymbol{z}^0-\boldsymbol{z}^\ast}_2/\epsilon\right)\right).$$
Ignoring $s$ and the log factor, the complexity is $\Tilde{\mathcal{O}}(r\kappa_{\vx})$ which scales linearly in $r$ when $r\ge 2\kappa$. So choosing $r=2\kappa$ results in the best complexity bound of $\Tilde{\mathcal{O}}(\kappa\kappa_{\vx})$. This rate significantly improves upon the state-of-the-art rate, $\Tilde{\mathcal{O}}(\kappa^2\kappa_{\vx})$, of choosing $r=\Theta(\kappa^2)$ as in \citep{lin2020gradient}.
Note that the condition number of the primal function $\Phi$ is $\kappa_{\vx}(\kappa+1)$. Therefore, the $\Tilde{\mathcal{O}}(\kappa\kappa_{\vx})$ gradient complexity for $r=2\kappa$ is nearly the same as the iteration complexity of running gradient descent directly on $\Phi$ although we do not really have access to its value and gradient!
\iffalse
\subsubsection{Lower bound}
\haochuan{Currently we can show a tight lower bound only for the case $r=\Theta(\kappa)$, we can not get a matching lower bound for \citep{lin2020gradient}'s stepsizes}
Now we show that the above complexity of $\Tilde{\mathcal{O}}(\kappa\kappa_{\vx})$ for the best stepsize ratio choice of $r=2\kappa$ is tight in terms of dependence on $\kappa_{\vx}$, $\kappa$, and $\epsilon$. Formally, we prove the following lower bound
\begin{theorem}
For any given $L,\mu>0$ and $0\le \mu_{\vx}\le L$ such that $\kappa=L/\mu>4$, there exists a function $f$ satisfying Assumption~\ref{assumption:quadratic} and $C+BA^{-1}B^\top\ge \mu_{\vx} I$ such that GDA with a stepsize ratio $r\ge 2\kappa$ can not achieve $\norm{\boldsymbol{z}^T-\boldsymbol{z}^\ast}_2\le \epsilon$ for some intial point $\boldsymbol{x}^0$ until
\begin{align*}
T = \Omega\left(\kappa\kappa_{\vx}\log\left(\frac{\norm{\boldsymbol{z}^0-\boldsymbol{z}^\ast}_2}{\epsilon}\right)\right).
\end{align*}
\label{lower_bound_gda}
\end{theorem}
This lower matches our upper bound for $r=\Theta(\kappa)$ if ignoring $s$ and the log factor.
\fi
\subsection{Convergence when $\mu_{\vx}=0$}
\label{sec:mux_zero}
Now we analyze the case $\mu_{\vx}=0$. In this case, the previous spectral analysis can only obtain $\rho\le 1$ which itself is not sufficient to show convergence. Besides that, one also has to show the arithmetic multiplicity and geometric multiplicity of $0$ as an eigenvalue of $M$ are equal, i.e., $0$ is a regular eigenvalue. However, such analysis for $M$, a quite general block matrix, is very hard if not impossible.
We bypass this issue by adding a $\frac{\delta}{2}\norm{\boldsymbol{x}}_2^2$ term to $\Phi$ to make it $\delta$ strongly convex, where $0<\delta\le L$ is a small scalar to be specified later. Then we can use the above analysis in Section~\ref{sec:42} on $\Phi(\boldsymbol{x})+\frac{\delta}{2} \norm{\boldsymbol{x}}_2^2$. Formally, define
\begin{align*}
f_\delta(\boldsymbol{x};\boldsymbol{y}):=f(\boldsymbol{x};\boldsymbol{y})+\frac{\delta}{2} \norm{\boldsymbol{x}}_2^2.
\end{align*}
We have
\begin{align*}
\Phi_\delta(\boldsymbol{x}):=\max_{\boldsymbol{y}}f_\delta(\boldsymbol{x};\boldsymbol{y})=\Phi(\boldsymbol{x})+\frac{\delta}{2} \norm{\boldsymbol{x}}_2^2.
\end{align*}
Let $\boldsymbol{x}_\delta^\ast :=\text{argmin}_{\boldsymbol{x}} \Phi_\delta(\boldsymbol{x})$ and $\boldsymbol{y}_\delta^\ast:=\text{argmin}_{\boldsymbol{y}} f(\boldsymbol{x}_\delta^\ast;\boldsymbol{y})$. Also denote $\boldsymbol{z}_\delta^\ast:=(\boldsymbol{x}_\delta^\ast,\boldsymbol{y}_\delta^\ast)$. Then we know that GDA applied on $f_\delta$ converges to $\boldsymbol{x}_\delta^\ast$ at a linear rate. It is also easy to show that $\boldsymbol{x}_\delta^\ast$ is an approximately optimal point: $ \Phi(\boldsymbol{x}_\delta^\ast)-\Phi(\boldsymbol{x}^\ast)\le \frac{\delta}{2}\norm{\boldsymbol{x}^\ast}_2^2.$ Define
\begin{align*}
M_{\delta}=\begin{pmatrix}
-C-\delta & -B\\
r B^\top & -r A
\end{pmatrix}.
\end{align*}
we obtain the following convergence result:
\begin{theorem}
Let $R$ be an estimated upper bound of $\norm{\boldsymbol{x}^\ast}_2$. Choose $\delta=\epsilon/R^2$ and assume $\epsilon$ is small enough such that $\delta\le L$.
Let $M_\delta=P^{-1}J P$ be its Jordan decomposition. Define $C_{P}=\|P\|_2\|P^{-1}\|_2$ be the condition number of $P$ and $s$ be the size of the largest Jordan block in $J$.
Applying GDA on $f_\delta$ with $\eta_{\vx}=\frac{1}{4r L}$ and $\eta_{\vy}=\frac{1}{4L}$ where $r\ge 2\kappa$, under Assumption~\ref{assumption:quadratic}, we have \begin{align*}
&\Phi(\boldsymbol{x}^T)-\Phi(\boldsymbol{x}^\ast)\le \epsilon/2\\
&+ \,(\kappa+1)L s^2C_P^2\norm{\boldsymbol{z}^0-\boldsymbol{z}_\delta^\ast}_2^2T^{2(s-1)}\left(1-\frac{\epsilon}{32r L R^2}\right)^{2(T-s+1)}.
\end{align*}
Therefore the gradient complexity of achieving $\Phi(\boldsymbol{x}^T)-\Phi(\boldsymbol{x}^\ast)\le \epsilon$ is \begin{align*}
\mathcal{O}\left(\frac{sr LR^2}{\epsilon} \log\left(\frac{sr LR^2 C_P\norm{\boldsymbol{z}^0-\boldsymbol{z}_\delta^\ast}_2}{\epsilon}\right)\right).
\end{align*}
\label{thm:converence_nond_nonstrong}
\end{theorem}
Assuming $s=\mathcal{O}(1)$ and ignoring the log factor, choosing $r=2\kappa$, the complexity of $\Tilde{\mathcal{O}}(\kappa L/\epsilon)$ is again the same as the iteration complexity of gradient descent directly on $\Phi$ although we do not have access to its gradient.
\subsubsection*{\bibname}}
\onecolumn
\section{Proofs for lower bounds}
\label{app:lower_bound}
In this section, we provide the proofs for all the lower bounds. Specifically, we prove Theorem~\ref{thm:lower_bound} and Theorem~\ref{thm:lower_bound_conv_rate_deterministic}.
\subsection{Proof of Theorem~\ref{thm:lower_bound}}
\begin{proof}[Proof of Theorem~\ref{thm:lower_bound}]
Consider the following quadratic NC-SC function ${f}:\mathbb{R}\times\mathbb{R}\to \mathbb{R}$:
\begin{align*}
{f}(x;y) =& -\frac{\mu}{2}(y-\kappa x)^2 + \frac{\mu}{2}(\kappa^2-\kappa)x^2\\
=&-\frac{\mu}{2}y^2+L xy-\frac{L}{2} x^2\\
=&\frac{\mu}{2} \begin{pmatrix}
x & y
\end{pmatrix}\begin{pmatrix}
-\kappa & \kappa\\
\kappa & -\mu
\end{pmatrix} \begin{pmatrix}
x \\ y
\end{pmatrix}.
\end{align*}
Note that ${\Phi}(x)=\max_{y\in\mathbb{R}} {f}(x;y)=\frac{\mu}{2}(\kappa^2-\kappa)x^2\ge\frac{\mu_{\vx}}{2}x^2$. It is easy to verify that $f$ satisfies Assumption~\ref{assumption:quadratic} and $(0,0)$ is its unique differential Stackelberg Equilibrium with parameters $(L,\mu,\mu_{\vx})$. Indeed, it is also the global minimax point. The $M$ matrix for $f$ is
\begin{align*}
M=\begin{pmatrix}
\kappa & -\kappa\\
r \kappa & -r
\end{pmatrix}.
\end{align*}
Let $\lambda_1$ and $\lambda_2$ be the eigenvalues of $M$, we have
\iffalse
the following is attempt to show a lower bound for eg
\begin{align*}
\lambda_{1,2}=\frac{1}{2}\left(\kappa-r\pm \sqrt{(r-\kappa)^2-r\kappa(\kappa-1)}\right).
\end{align*}
If $r\le\kappa/2$, we know that $\operatorname{Re}[\lambda_1]\ge \kappa/4>0$. To show that GDA and EG diverge, it suffices to show that the modulus of one of their eigenvalues is strictly greater than $1$.
First, for GDA, it is easy to bound that
\begin{align*}
|1+\eta_{\vx}\lambda_1|\ge 1+\eta_{\vx}\operatorname{Re}[\lambda_1]>1.
\end{align*}
Next, for EG, we have
\begin{align*}
|1+\eta_{\vx}\lambda_1+\eta_{\vx}^2\lambda_1^2|\ge& \operatorname{Re}[1+\eta_{\vx}\lambda_1+\eta_{\vx}^2\lambda_1^2]\\
=& 1+\eta_{\vx}\operatorname{Re}[\lambda_1]+\eta_{\vx}^2\left(\operatorname{Re}[\lambda_1]^2-\operatorname{Im}[\lambda_1]^2\right)\\
\ge&1+\frac{\eta_{\vx}}\left(\frac{\kappa}{4}-\eta_{\vx}\right)
\end{align*}
\fi
\begin{align*}
\text{Trace}(M)=\lambda_1+\lambda_2 = \kappa-r.
\end{align*}
There are two possible cases:
\begin{itemize}
\item If $r<\kappa$, we know $\lambda_1+\lambda_2>0$ which implies at least one of them has a positive real part. Suppose $\operatorname{Re}[\lambda_1]>0$ without loss of generality. We know $|1+\eta_{\vx}\lambda_1|>1$ for every $\eta_{\vx}>0$.
\item If $r=\kappa$, $M=\begin{pmatrix}
\kappa & -\kappa\\
\kappa^2 & -\kappa
\end{pmatrix}$. We can directly compute its eigenvalues $\lambda_1=i\sqrt{\kappa^3-\kappa^2}$ and $\lambda_2=-i\sqrt{\kappa^3-\kappa^2}$ where $i=\sqrt{-1}$. We also have $|1+\eta_{\vx}\lambda_1|=\sqrt{1+\eta_{\vx}^2(\kappa^3-\kappa^2)}>1$ for every $\eta_{\vx}>0$.
\end{itemize}
Then the power sequence $\{(I+\eta_{\vx} M)^k\}_{k=0}^{\infty}$ will diverge and we complete the proof.
\end{proof}
\subsection{Proof of Theorem~\ref{thm:lower_bound_conv_rate_deterministic}}
\begin{proof}[Proof of Theorem~\ref{thm:lower_bound_conv_rate_deterministic}]
Consider the following quadratic NC-SC function $f:\mathbb{R}\times\mathbb{R}\to \mathbb{R}$
\begin{align*}
f(x,y):=-\frac{1}{2}L x^2+bxy-\frac{1}{2}\mu y^2,
\end{align*}
where $b = \sqrt{\mu (L+\mu_x)}$. The primal function is $\Phi(x):=\max_y f(x,y)=\tfrac{1}{2}\mu_x x^2$. Therefore, it is straight-forward to verfity that $f$ satisfies Assumption~\ref{assumption:quadratic} and $(0,0)$ is its unique differential Stackelberg Equilibrium with parameters $(L,\mu,\mu_{\vx})$. Assume $\kappa=L/\mu\ge 2$. We first show the lower bound of GDA to achieve $(0,0)$. The $M$ matrix is
\begin{align*}
M=\begin{pmatrix}
L & -b\\ r b & -\mu r
\end{pmatrix}.
\end{align*}
Let $\lambda_1$ and $\lambda_2$ be the two eigenvalues of $M$, we have
\begin{align*}
\lambda_{1,2} = -\frac{1}{2}\left(\mu r-L\right) \pm \frac{1}{2}\sqrt{\left(\mu r-L\right)^2-4r\mu\mu_x}.
\end{align*}
\begin{align*}
0\ge \lambda_1 &= -\frac{1}{2}(\mu r-L)\left(1-\sqrt{1-\frac{4r\mu\mu_x}{(\mu r-L)^2}}\right)\\
& \ge-\frac{2r\mu\mu_{\vx}}{r\mu-L}\ge -4\mu_{\vx}.
\end{align*}
Let $s_1$ be the corresponding eigenvalue of $I+\eta_x M$, it satisfies
\begin{align*}
0\le 1-\frac{\mu_x}{rL}\le s_1=1+\eta_x \lambda_1\le 1.
\end{align*}
We adversarially choose the initial point $\boldsymbol{z}^0$ such that it is parallel to the eigenvector of $I+\eta_x M$ corresponding to $s_1$. Note that for any $\delta>0$, we can choose such a $\boldsymbol{z}^0$ such that $\norm{\boldsymbol{z}^0-\boldsymbol{z}^\ast}_2\le \delta$. Then we have
\begin{align*}
\boldsymbol{z}^{T} = (I+\eta_{\vx} M)^T\boldsymbol{z}^0 = s_1^T\boldsymbol{z}^0,
\end{align*}
which implies
\begin{align*}
\norm{\boldsymbol{z}^T}_2=s_1^T\norm{\boldsymbol{z}^0}_2\ge \left(1-\frac{1}{r\kappa_{\vx}}\right)^T\norm{\boldsymbol{z}^0}_2.
\end{align*}
For EG, note that $1+\eta_{\vx}\lambda_1^2+\eta_{\vx}^2\lambda_2^2\ge 1+\eta_{\vx}\lambda_1^2=s_1$. The rest of proof is the same as that of GDA.
\end{proof}
\iffalse
\subsection{Proof of Theorem~\ref{tbd}}
\haochuan{ref error}
\begin{proof}[Proof of Theorem~\ref{tbd}]
We use the same quadratic hard instance and notation as in the proof of Theorem~\ref{thm:lower_bound_conv_rate_deterministic}. To prove a lower bound in the stachastic setting, we also need to specify a hard gradient oracle. Let $\boldsymbol{\xi}^k=(-\xi^k_x,r\xi^k_y)$ where $\xi^k_x,\xi^k_y$ are the gradient noise defined in \eqref{eq:gradient_noise}. We can choose $\{\boldsymbol{\xi}^k\}_{k\ge 0}$ such that they are i.i.d. and parallel to $\boldsymbol{z}^0$, or equivalently, the eigenvector of $M$ corresponding to $\lambda_1$. For this oracle, the dynamics of GDA initialized as in the proof of Theorem~\ref{thm:lower_bound_conv_rate_deterministic} is
\begin{align*}
\boldsymbol{z}^{k+1}=(1+\eta_{\vx} M)\boldsymbol{z}^{k}+\eta_{\vx} \boldsymbol{\xi}^k.
\end{align*}
We can bound $\mathbb{E}\left[\norm{\boldsymbol{\xi}^k}_2^2\right]\le 2r^2\sigma^2$. Since $\boldsymbol{\xi}$ is parallel to $\boldsymbol{z}^0$, we can easily show for any $k$, $\boldsymbol{z}^k$ is parallel to $\boldsymbol{z}^0$ by induction. Then we have
\begin{align*}
\mathbb{E}\left[\norm{\boldsymbol{z}^{k+1}_2}^2\right] = s_1^2 \mathbb{E}\left[\norm{\boldsymbol{z}^{k}_2}^2\right] + \frac{\sigma^2}{S}.
\end{align*}
Then we can obtain
\begin{align*}
\mathbb{E}\left[\norm{\boldsymbol{z}^{T}_2}^2\right] =& s_1^{2T}\norm{\boldsymbol{z}^{0}_2}^2+\frac{\sigma^2}{S}\cdot\frac{1-s_1^{2T}}{1-s_1^2}\\
\ge&s_1^{2T}\norm{\boldsymbol{z}^{0}_2}^2+\frac{\sigma^2 r\kappa_{\vx}}{2S}\left(1-s_1^T\right).
\end{align*}
Now we bound the gradient complexity. Note that if we require $\epsilon^2\ge \mathbb{E}\left[\norm{\boldsymbol{z}^{T}_2}^2\right]$, we have $\epsilon^2\ge s_1^{2T}\norm{\boldsymbol{z}^{0}_2}^2$,
It implies $1-s_1^T\ge 1-\frac{\epsilon}{\norm{\boldsymbol{z}^{0}_2}} \ge 1/2$ for small enough $\epsilon$. Therefore, we have
\begin{align*}
\epsilon^2
\ge&s_1^{2T}\norm{\boldsymbol{z}^{0}_2}^2+\frac{\sigma^2 r\kappa_{\vx}}{4S},
\end{align*}
which implies
\begin{align*}
T=&\Omega\left(r\kappa_{\vx}\log\left(\frac{\norm{\boldsymbol{z}^{0}_2}}{\epsilon}\right)\right),\\
S =& \Omega\left(\frac{\sigma^2r\kappa_{\vx}}{\epsilon^2}\right)
\end{align*}
Note that gradient complexity is $T\cdot S$ which is lower bounded by
\begin{align*}
T\cdot S= \Omega\left(\frac{\sigma^2r^2\kappa_{\vx}^2}{\epsilon^2}\log\left(\frac{\norm{\boldsymbol{z}^{0}_2}}{\epsilon}\right)\right).
\end{align*}
We complete the proof.
\end{proof}
\fi
\section{Analysis of the spectral properties}
\label{app:spectral}
In this section, we prove the spectral properties of $M$ (Lemma~\ref{lem:spectral_M}) and the spectrual radius bound of GDA and GD (Lemma~\ref{lem:spectral_GDA_EG}).
We first present the following lemma and its corollary useful for analyzing spectral properties of a matrix.
\begin{lemma}
Suppose $G=A+iB\in \mathbb{C}^{d\times d}$ where $A,B\in \mathbb{R}^{d\times d}$ are both symmetric real matrices and $i=\sqrt{-1}$. If there exist $a,b\in \mathbb{R}$ such that $aA+bB$ is strictly positive or negative definite, then $G$ is invertible, i.e., $\det(G)\neq 0$.
\label{lem:1}
\end{lemma}
\begin{proof}[Proof of Lemma~\ref{lem:1}]
If $\det(G)=0$, we know there exists $z=z_0+iz_1\neq 0$ for some $z_0,z_1\in\mathbb{R}^d$ such that $Gz=0$. Then we have\begin{align*}
z^\dag G z = z_0^\top A z_0+z_1^\top A z_1+i\left(z_0^\top B z_0+z_1^\top B z_1\right)=0,
\end{align*}
where $z^\dag$ is the conjugate transpose of $z$. It means both the real and imaginary parts of $z^\dag G z$ are zero. So is any linear combination of them. Therefore\begin{align*}
z_0^\top (aA+bB) z_0+z_1^\top (aA+bB) z_1 = 0
\end{align*}
which contradicts with the strict definiteness of $aA+bB$. Therefore $\det(G)\neq 0$.
\end{proof}
Choosing $a=1,b=0$ or $a=0,b=1$, we obtain the following corollary immediately.
\begin{corollary}
Suppose $G=A+iB\in \mathbb{C}^{d\times d}$ where $A,B\in \mathbb{R}^{d\times d}$ are both symmetric real matrices and $i=\sqrt{-1}$. If at least one of $A$ and $B$ is strictly positive or negative definite, then $G$ is invertible, i.e., $\det(G)\neq 0$.
\label{cor:1}
\end{corollary}
Now we are ready to prove Lemma~\ref{lem:spectral_M}, the spectral properties of $M$.
\begin{proof}[Proof of Lemma~\ref{lem:spectral_M}]
Before proving the five parts separately, we will first prove that $\lambda_0\le 0$ if $r>\kappa$, which is a slightly weaker version of part 5 (where we claim $\lambda_0< 0$ if $r>\kappa$). We will prove it by contradiction.
Assume that $r>\kappa$ but $\lambda_0>0$. The eigenvalue satisfies $\det(\lambda I-M)=0$. Note by the theory of Schur Complement,
\begin{align*}
\det(\lambda I-M)&=\det \begin{pmatrix}
C+\lambda I & B\\
-r B^\top & r A+\lambda I
\end{pmatrix}\\
&= \det\left(r A+\lambda I \right)\det\left( C+\lambda I+B \left(A+\frac{\lambda}{r}I\right)^{-1}B^\top \right),
\end{align*}
where in the second equality we use the fact that $r A+\lambda I$ is invertible due to Corollary~\ref{cor:1}. Let $A=U\Lambda U^\top$ where $U\in\mathbb{R}^{m\times m}$ is orthonormal and $\Lambda=\text{diag}(\sigma_1,\ldots,\sigma_m)$ is diagonal. We know $\mu\le \sigma_i \le {L}$ for every $i\in[m]$. Let $\widetilde{B}=BU$. Define
\begin{align*}
H(\lambda) :=& C+\lambda I+B \left(A+\frac{\lambda}{r}I\right)^{-1}B^\top\\
=& C+\lambda I+\widetilde{B}D\widetilde{B}^\top
\end{align*}
where $D=\text{diag}(d_1,\ldots,d_m)$ is a diagonal matrix with\begin{align*}
d_i = \frac{ \sigma_i+\frac{\lambda_0}{r}-i\left(\frac{\lambda_1}{r}\right)
}{\left(\sigma_i+\frac{\lambda_0}{r}\right)^2+\left(\frac{\lambda_1}{r}\right)^2}
\end{align*}whose real part is strictly positive. We know $\det(\lambda I-M)=0$ if and only if $\det(H(\lambda))=0$ as $\det(rA+\lambda I)\neq 0$.
The real part of $H(\lambda)$ is\begin{align*}
\operatorname{Re}[H(\lambda)]= C+\lambda_0 I+ \widetilde{B}\operatorname{Re}[D]\widetilde{B}^\top.
\end{align*}
Since $C\ge -{L}I$ and $\operatorname{Re}[D]\ge 0$, we know that if $\lambda_0>{L}$, then $\operatorname{Re}[H(\lambda)]>0$. Then by Corollary~\ref{cor:1}, $\det(H(\lambda))\neq 0$. Therefore we must have $\lambda_0\le {L}$.
Now suppose $\lambda_1\neq 0$. Then note the imaginary part of $H(\lambda)$ is\begin{align*}
\operatorname{Im}[H(\lambda)]=\lambda_1 \left(I-\frac{1}{r}\widetilde{B}E\widetilde{B}^\top\right),
\end{align*}
where $E=\text{diag}(e_1,\ldots,e_m)$ with \begin{align*}
e_i=\frac{ 1
}{\left(\sigma_i+\frac{\lambda_0}{r}\right)^2+\left(\frac{\lambda_1}{r}\right)^2}.
\end{align*}
Note\begin{align*}
\operatorname{Re}[H(\lambda)]+\frac{r\mu}{\lambda_1}\operatorname{Im}[H(\lambda)]=C+\lambda_0I+r\mu I+\widetilde{B}F\widetilde{B}^\top,
\end{align*}
where $F=\text{diag}(f_1,\ldots,f_m)$ with \begin{align*}
f_i=\frac{ \sigma_i+\frac{\lambda_0}{r}-\mu
}{\left(\sigma_i+\frac{\lambda_0}{r}\right)^2+\left(\frac{\lambda_1}{r}\right)^2}>0.
\end{align*}
Then we have $\operatorname{Re}[H(\lambda)]+\frac{r\mu}{\lambda_1}\operatorname{Im}[H(\lambda)]>0$ which contradicts with Lemma~\ref{lem:1}. Therefore we must have $\lambda_1=0$, i.e., $\lambda$ is real.
Then we can calculate
\begin{align*}
H(\lambda) &= C+\lambda_0 I+B \left(A+\frac{\lambda_0}{r}I\right)^{-1}B^\top \\
&=C+\lambda_0 I+B \left(A+\frac{\lambda_0}{r}I\right)^{-1}\left[\left(A+\frac{\lambda_0}{r}I\right)-\frac{\lambda_0}{r}I\right]A^{-1}B^\top \\
&=C+\lambda_0 I+BA^{-1}B^\top -\frac{\lambda_0}{r}B \left(A+\frac{\lambda_0}{r}I\right)^{-1} A^{-1}B^\top\\
&\ge C+BA^{-1}B^\top+\lambda_0 I-\frac{\lambda_0}{r\mu}BA^{-1}B^\top\\
&=\left(1-\frac{\lambda_0}{r\mu}\right)\left( C+BA^{-1}B^\top\right)+\lambda_0\left( I+\frac{C}{r\mu}\right)\\
&>0,
\end{align*}
which again contradicts with Corollary~\ref{cor:1}, where in the last inequality we use the fact $1-\lambda_0/r\mu>0$ and $I+C/r\mu>0$ if $r>\kappa$ and $0<\lambda_0\le L$. Therefore we must have $\lambda_0\le 0$.
Now we are ready to prove the five parts one by one.
\begin{enumerate}
\item
First note that if $\abs{\lambda_1}>\sqrt{r}{L}$, we know $r A+\lambda I$ is still invertible without assuming $\lambda_0>0$ as $\lambda_1\neq 0$, which means we are still able to define $H(\lambda)$ and obtain \begin{align*}
\operatorname{Im}[H(\lambda)]=\lambda_1 \left(I-\frac{1}{r}\widetilde{B}E\widetilde{B}^\top\right).
\end{align*}
It is easy to see $\|E\|_2\le \left(\frac{r}{\lambda_1}\right)^2$.
Noting $\|\widetilde{B}\|_2=\|B\|_2\le{L}$, we have\begin{align*}
I-\frac{1}{r}\widetilde{B}E\widetilde{B}^\top>0.
\end{align*}
Then by Corollary~\ref{cor:1}, $\det(H(\lambda))\neq 0$ which leads to contradiction. Therefore we must have $|\lambda_1|\le \sqrt{r}{L}$.
\item
Note if $\lambda_1\neq 0$, we have
\begin{align*}
\operatorname{Re}[H(\lambda)]+\frac{\alpha r\mu}{\lambda_1}\operatorname{Im}[H(\lambda)]=C+\lambda_0I+\alpha\mu r I+ \widetilde{B}F^{(\alpha)} \widetilde{B}^\top,
\end{align*}
where we choose $\alpha=\frac{r+\kappa}{2r}$ and $F^{(\alpha)}=\text{diag}(f^{(\alpha)}_1,\ldots,f^{(\alpha)}_m)$ with \begin{align*}
f^{(\alpha)}_i=\frac{ \sigma_i+\frac{\lambda_0}{r}-\alpha\mu
}{\left(\sigma_i+\frac{\lambda_0}{r}\right)^2+\left(\frac{\lambda_1}{r}\right)^2}.
\end{align*}
Suppose $\lambda_0>-(\alpha \mu r-L)=-\frac{\mu(r-\kappa)}{2}$. We have $C+\lambda_0I+\alpha\mu r I>0$.
Also note that
\begin{align*}
\sigma_i+\frac{\lambda_0}{r}-\alpha\mu\ge \sigma_i- 2\alpha\mu+L/r\ge (1-2\alpha+\kappa/r)\mu=0
\end{align*}
which implies $f^{(\alpha)}_i\ge 0$ and thus $F^{(\alpha)}$ is positive semi-definite. Therefore $ \operatorname{Re}[H(\lambda)]+\frac{\alpha r\mu}{\lambda_1}\operatorname{Im}[H(\lambda)]>0$ which leads to contradiction by Lemma~\ref{lem:1}. Therefore $\lambda_0\le-\frac{\mu(r-\kappa)}{2}$.
\item
Note that the spectral radius of a matrix is always bounded by its operator norm, i.e., $\lambda_0^2+\lambda_1^2\le \|M\|^2_2$. Note\begin{align*}
\left\|M \begin{pmatrix}
x \\ y
\end{pmatrix}\right\|_2 &=\left\| \begin{pmatrix}
-Cx-By \\ r B^\top x-r Ay
\end{pmatrix} \right\|_2\\
&= \sqrt{\|-Cx-By\|_2^2+\|r B^\top x-r Ay\|_2^2}\\
&\le \sqrt{2\left(\|Cx\|_2^2+\|By\|_2^2 \right)+2r^2\left(\| B^\top x\|_2^2+\| Ay\|_2^2\right)}\\
&\le \sqrt{2(r^2+1){L}^2 \left(\| x\|_2^2+\| y\|_2^2\right) }\\
&\le 2r{L} \left\| \begin{pmatrix}
x \\ y
\end{pmatrix}\right\|_2.
\end{align*}
Therefore $\|M\|_2\le 2r{L}$ and $\lambda_0^2+\lambda_1^2\le 4r^2{L}^2$.
\item If $\lambda_1=0$ and $-\min\{{L},\lambda_{\min}(C+BA^{-1}B^\top)\}<\lambda_0\le 0$, we have
\begin{align*}
H(\lambda) &= C+\lambda_0 I+B \left(A+\frac{\lambda_0}{r}I\right)^{-1}B^\top \\
& >\lambda_0 I+C+B A^{-1}B^\top\\
&>0,
\end{align*}
which leads to contradiction.
\item This part can be directly shown by combining part 2 and part 4.
\end{enumerate}
\end{proof}
With the properties of $M$, we proceed to prove Lemma~\ref{lem:spectral_GDA_EG}.
\begin{proof}[Proof of Lemma~\ref{lem:spectral_GDA_EG}]
Let $\lambda=\lambda_0+i\lambda_1$ be an eigenvalue of $M$, we only need to show $\rho_{1,\lambda}=|1+\eta_{\vx}\lambda|\le 1-\frac{1}{16r\kappa_{\vx}}$ and $\rho_{2,\lambda}=|1+\eta_{\vx}\lambda+\eta_{\vx}^2\lambda^2|\le 1-\frac{1}{16r\kappa_{\vx}}$, for any eigenvalue $\lambda$.
We first bound $\rho_{1,\lambda}$. There are two possible cases.
\begin{itemize}
\item If $\lambda_1=0$, by Lemma~\ref{lem:spectral_M}, we know $-2r{L}\le \lambda_0\le -\mu_x$. Therefore $\rho_{1,\lambda}=|1+\eta_{\vx}\lambda_0|\le 1-\frac{1}{4r\kappa_x}\le 1-\frac{1}{16r\kappa_{\vx}}$.
\item If $\lambda_1\neq 0$, we know $-2r{L}\le \lambda_0\le-\frac{\mu(r-\kappa)}{2}$ and $|\lambda_1|\le \sqrt{r}{L}$. Then we have\begin{align*}
\rho_{1,\lambda}^2=& (1+\eta_{\vx}\lambda_0)^2+\eta_{\vx}^2\lambda_1^2\\
\le &\left(1+\frac{-\mu(r-\kappa)}{8rL}\right)^2+\frac{1}{16r}\\
\le &(1-\frac{1}{16\kappa})^2+\frac{1}{32\kappa}\le 1-\frac{1}{16\kappa}.
\end{align*}
Therefore \begin{align*}
\rho_{1,\lambda}<\sqrt{1-\frac{1}{16\kappa}}\le 1-\frac{1}{32\kappa}\le 1-\frac{1}{16r\kappa_x} .
\end{align*}
\end{itemize}
Next, we bound $\rho_{2,\lambda}$. Similarly, there are also two possible cases.
\begin{itemize}
\item If $\lambda_1=0$, noting that $-2rL\le\lambda_0\le-\mu_{\vx}$ and $\abs{\eta_{\vx}\lambda_0}\le 1/2$, we have
\begin{align*}
\rho_{2,\lambda}\triangleq \abs{1+\eta_{\vx}\lambda_0+\eta_{\vx}^2\lambda_0^2} \le 1+\frac{1}{2}\eta_{\vx}\lambda_0\le 1-\frac{1}{8r\kappa_{\vx}}.
\end{align*}
\item If $\lambda_1\neq 0$,
\begin{align*}
\rho_{2,\lambda}^2 =& \abs{1+\eta_{\vx}\lambda+\eta_{\vx}^2\lambda^2}^2\\
=& \abs{1+\eta_{\vx}\lambda_0+\eta_x^2(\lambda_0^2-\lambda_1^2)+i\eta_{\vx}\lambda_1(1+2\eta_{\vx}\lambda_0)}^2\\
=&\abs{1+\eta_{\vx}\lambda_0+\eta_x^2(\lambda_0^2-\lambda_1^2)}^2+\eta_{\vx}^2\lambda_1^2(1+2\eta_{\vx}\lambda_0)^2\\
\le & \left(1+\frac{1}{2}\eta_{\vx}\lambda_0\right)^2+\eta_{\vx}^2\lambda_1^2\\
\le & \left(1-\frac{\mu}{4}\eta_{\vx}(r-\kappa)\right)^2+\frac{1}{16r}\\
\le & 1-\frac{1}{64\kappa}.
\end{align*}
Therefore \begin{align*}
\rho_{2,\lambda}<\sqrt{1-\frac{1}{64\kappa}}\le 1-\frac{1}{128\kappa}\le 1-\frac{1}{64r\kappa_x} .
\end{align*}
\end{itemize}
Noting that $\rho_{1}=\max_{\lambda}\rho_{1,\lambda}$ and $\rho_{2}=\max_{\lambda}\rho_{2,\lambda}$, we complete the proof.
\end{proof}
\section{Proofs of the convergence results for quadratic NC-SC functions}
\label{app:quad_conv}
\subsection{Proof of Theorem~\ref{thm:converence_nond_1}}
In this section, we show the linear convergence results for quadratic functions. Given Lemma~\ref{lem:spectral_GDA_EG}, if $M$ is diagonalizable, it is straight-forward to obtain a linear convergence rate. However, in some rare cases, $M$ may not be diagonalizable and things become trickier. Therefore, we further need the following lemma.
\begin{lemma}
Let $A\in \mathbb{C}^{n\times n}$ be a (possibly nondiagonalizable) matrix and its spectral radius is $\rho<1$. Suppose its Jordan decomposition is $A=P^{-1}JP$, then we have\begin{align*}
\|A^k\|_2\le sC_P k^{s-1} \rho^{k-s+1},
\end{align*}
where $s$ is the size of the largest Jordan block in $J$ and $C_P=\|P^{-1}\|_2\|P\|_2$ is the condition number of $P$.
\label{lem:power_conv}
\end{lemma}
\begin{proof}[Proof of Lemma~\ref{lem:power_conv}]
Note that
\begin{align*}
\norm{A^k}_2 = \norm{P^{-1}J^kP}_2\le C_P \norm{J^k}_2.
\end{align*}
So it suffices to bound $\norm{J^k}_2$. Use $J(\lambda,m)$ to denote the Jordan block with eigenvalue $\lambda$ and size $m$. We know $[J(\lambda,m)]^k=(a_{i,j})$ where $a_{i,j}={k \choose j-i}\lambda^{k-(j-i)}$ (here we define ${N\choose n}=0$ if $n<0$ or $n>N$). Then since $|\lambda|\le \rho <1$, we can bound $\|[J(\lambda,m)]^k\|_2\le m k^{m-1} \rho^{k-m+1} \le s k^{s-1} \rho^{k-s+1} $. Then we have $\|J^k\|_2\le s k^{s-1} \rho^{k-s+1}$ and complete the proof.
\end{proof}
With Lemma~\ref{lem:power_conv}, it is straight forward to show Theorem~\ref{thm:converence_nond_1} and we omit the proof.
\subsection{SGDA on quadratic functions}
Now we show Theorem~\ref{thm:conv_general_sgda}, the converge result for SGDA on quadratic functions.
\iffalse
\begin{proof}[Proof of Theorem~\ref{thm:conv_general_sgda}]
Similar to the proof of Theorem~\ref{thm:conv_general},
denoting $\tilde{\boldsymbol{x}}=\boldsymbol{x}-\boldsymbol{x}^\ast$ and $\tilde{\boldsymbol{y}}=\boldsymbol{y}-\boldsymbol{y}^\ast$, we have
\begin{align*}
\begin{pmatrix}
\tilde{\boldsymbol{x}}^{k+1} \\ \tilde{\boldsymbol{y}}^{k+1}
\end{pmatrix}=\left(I+\eta_{\vx} M+E_k\right)\begin{pmatrix}
\tilde{\boldsymbol{x}}^k \\ \tilde{\boldsymbol{y}}^k
\end{pmatrix}+\eta_{\vx}\boldsymbol{\xi}_k,
\end{align*}
where we can bound $\|E_k\|_2 \le \eta_{\vx} \Delta_{r}$ and $\mathbb{E}[\norm{\boldsymbol{\xi}_k}_2^2]\le \sigma_{2\kappa}^2/R$.
Then we can bound that for any subset $S\subseteq [T]$,
\begin{align*}
\left\|\prod_{k\in S} \left(I+\eta_{\vx} M+E_k\right)\right\|_2\le& C_P \left(1-\frac{1}{32\kappa\kappa_{\vx}}\right)^{|S|}.
\end{align*}
Then we have\haochuan{perhaps a tighter analysis is possible here}
\begin{align*}
\mathbb{E}\left[\norm{\begin{pmatrix}
\tilde{\boldsymbol{x}}^{T} \\ \tilde{\boldsymbol{y}}^{T}
\end{pmatrix}}_2^2\right]\le& \left\|\prod_{k=0}^{T-1} \left(I+\eta_{\vx} M+E_k\right)\right\|_2^2 \norm{\begin{pmatrix}
\tilde{\boldsymbol{x}}^{0} \\ \tilde{\boldsymbol{y}}^{0}
\end{pmatrix}}_2^2+\eta_{\vx}^2\sum_{i=0}^{T-1}\left\|\prod_{k=i+1}^{T-1} \left(I+\eta_{\vx} M+E_k\right)\right\|_2^2 \mathbb{E}[\norm{\boldsymbol{\xi}_i}_2^2]\\
\le&C_P\left(1-\frac{1}{32\kappa\kappa_{\vx}}\right)^{T}\norm{\begin{pmatrix}
\tilde{\boldsymbol{x}}^{0} \\ \tilde{\boldsymbol{y}}^{0}
\end{pmatrix}}_2+\eta_{\vx} C_P \frac{\sigma_{2\kappa}}{\sqrt{R}} \sum_{i=0}^{T-1}\left(1-\frac{1}{32\kappa\kappa_{\vx}}\right)^{T-i-1}\\
\le& C_PD_0\left(1-\frac{1}{32\kappa\kappa_{\vx}}\right)^{T}+\frac{8C_P\sigma_{2\kappa}}{\mu_{\vx}\sqrt{R}}
\end{align*}
Choosing $R=\ceil{\left(\frac{16C_P\sigma_{2\kappa}}{\mu_{\vx}\epsilon}\right)^2}$, we obtain the gradient complexity.
\end{proof}
\fi
\begin{proof}[Proof of Theorem~\ref{thm:conv_general_sgda}]
We first prove the convergence for GDA. Denote $\tilde{\boldsymbol{z}}=\boldsymbol{z}-\boldsymbol{z}^\ast$ and $\boldsymbol{\xi}^k = (\boldsymbol{\xi}_{\boldsymbol{x}}^k,\boldsymbol{\xi}_{\boldsymbol{y}}^k)$ where $\boldsymbol{\xi}_{\boldsymbol{x}}^k,\boldsymbol{\xi}_{\boldsymbol{y}}^k$ are defined in \eqref{eq:gradient_noise}. The dynamics of GDA is
\begin{align*}
\tilde{\boldsymbol{z}}^{k+1}=\left(I+\eta_{\vx} M\right)\tilde{\boldsymbol{z}}^k+\eta_{\vx}\boldsymbol{\xi}^k,
\end{align*}
where we can bound $\mathbb{E}\left[\norm{\boldsymbol{\xi}^k}_2^2\right]\le 2r^2\sigma^2/S$.
Note that we have
\begin{align*}
\left\|\prod_{k\in S} \left(I+\eta_{\vx} M\right)\right\|_2\le& C_P \left(1-\frac{1}{64r\kappa_{\vx}}\right)^{|S|}.
\end{align*}
Then we can bound
\begin{align*}
\mathbb{E}\left[\norm{\tilde{\boldsymbol{z}}^T}_2^2\right]\le& \left\| \left(I+\eta_{\vx} M\right)^T\right\|_2^2 \norm{\tilde{\boldsymbol{z}}^0}_2^2+\eta_{\vx}^2\sum_{i=0}^{T-1}\left\|\left(I+\eta_{\vx} M\right)^{T-i-1}\right\|_2^2 \mathbb{E}[\norm{\boldsymbol{\xi}^i}_2^2]\\
\le&C_P^2\left(1-\frac{1}{64r\kappa_{\vx}}\right)^{2T}\norm{\tilde{\boldsymbol{z}}^0}_2^2+\eta_{\vx}^2 C_P^2 \frac{2r^2\sigma^2}{S} \sum_{i=0}^{T-1}\left(1-\frac{1}{64r\kappa_{\vx}}\right)^{T-i-1}\\
\le& C_P^2\left(1-\frac{1}{64r\kappa_{\vx}}\right)^{2T}\norm{\tilde{\boldsymbol{z}}^0}_2^2+\frac{8r\kappa_{\vx} C_P^2\sigma^2}{L^2 S},
\end{align*}
where the first inequality is due to the independence of $\{\boldsymbol{\xi}^k\}_{k\ge 0}$. If we require $\mathbb{E}\left[\norm{\tilde{\boldsymbol{z}}^T}_2^2\right]\le\epsilon^2$, we only need to have
\begin{align*}
T=&O\left(r\kappa_{\vx}\log\left(\frac{C_P\norm{\tilde{\boldsymbol{z}}^0}_2}{\epsilon^2}\right)\right),\\
S=&O\left(\frac{r\kappa_{\vx} C_P^2\sigma^2}{L^2\epsilon^2}\right).
\end{align*}
This implies a gradient complexity bound of
\begin{align*}
T\cdot S=O\left(\frac{r^2\kappa_{\vx}^2 C_P^2\sigma^2}{L^2\epsilon^2}\log\left(\frac{C_P\norm{\tilde{\boldsymbol{z}}^0}_2}{\epsilon^2}\right)\right).
\end{align*}
Now we prove the convergence result for EG. Note that the dynamics of EG is
\begin{align*}
\tilde{\boldsymbol{z}}^{k+1}=&\tilde{\boldsymbol{z}}^{k}+\eta_{\vx} M \tilde{\boldsymbol{z}}^{k+1/2}+\eta_{\vx}\boldsymbol{\xi}^{k+1/2}\\
=&\tilde{\boldsymbol{z}}^{k}+\eta_{\vx} M \left(\tilde{\boldsymbol{z}}^{k}+\eta_{\vx} M \tilde{\boldsymbol{z}}^{k}+\eta_{\vx}\boldsymbol{\xi}^{k}\right)+\eta_{\vx}\boldsymbol{\xi}^{k+1/2}\\
=&(I+\eta_{\vx} M+\eta_{\vx}^2M^2)\tilde{\boldsymbol{z}}^{k}+\eta_{\vx}\boldsymbol{\xi}^{k+1/2}+\eta_{\vx}^2M\boldsymbol{\xi}^{k}.
\end{align*}
Since $\eta_{\vx}\norm{M}_2\le 1$ by Lemma~\ref{lem:spectral_M}, we can bound $\mathbb{E}\left[\norm{\boldsymbol{\xi}^{k+1/2}+\eta_{\vx} M\boldsymbol{\xi}^{k}}_2^2\right]\le 4r^2\sigma^2/S$. Also note that by Lemma~\ref{lem:spectral_GDA_EG}, the transition matrix of EG also satisfies $\norm{I+\eta_{\vx} M+\eta_{\vx}^2 M^2}_2\le 1-\frac{1}{64r\kappa_{\vx}}$.
Then the rest of proof is the same as that for GDA.
\end{proof}
\iffalse
\subsection{Quadratic functions with $\mu_{\vx}=0$}
\begin{proof}[Proof of Theorem~\ref{thm:converence_nond_nonstrong}]
Note that $f_\delta$ is $2L$ smooth as we assume $\delta\le L$ and $f_\delta(\boldsymbol{x},\cdot)$ is $\mu$ strongly concave. Also, we have $\Phi_\delta$
is $\delta$ strongly convex.
Let $\boldsymbol{x}_\delta^\ast :=\text{argmin}_{\boldsymbol{x}} \Phi_\delta(\boldsymbol{x})$. Then we know that GDA applied on $f_\delta$ converges to $\boldsymbol{x}_\delta^\ast$ at a linear rate by Theorem~\ref{thm:converence_nond_1}. Specifically, we have
\begin{align*}
\norm{\boldsymbol{x}^T-\boldsymbol{x}_\delta^\ast}_2\le s C_{P}D_{0}T^{s-1}\left(1-\frac{\epsilon}{32 r L R^2}\right)^{T-s+1}.
\end{align*}
Note that it is easy to see $\Phi$ is $(\kappa+1)L$ smooth and $\nabla \Phi(\boldsymbol{x}_\delta^\ast)=\nabla \Phi_\delta(\boldsymbol{x}_\delta^\ast)-\delta \boldsymbol{x}_\delta^\ast= -\delta \boldsymbol{x}_\delta^\ast$. We have
\begin{align*}
\Phi(\boldsymbol{x}^T)-\Phi(\boldsymbol{x}_\delta^\ast)\le & -\delta\langle \boldsymbol{x}_\delta^\ast,\boldsymbol{x}^T-\boldsymbol{x}_\delta^\ast\rangle+ \frac{(\kappa+1)L}{2}\norm{\boldsymbol{x}^T-\boldsymbol{x}_\delta^\ast}_2^2
\end{align*}
Also note that
\begin{align*}
\Phi(\boldsymbol{x}_\delta^\ast)+\frac{\delta}{2}\norm{\boldsymbol{x}_\delta^\ast}_2^2 = \Phi_\delta(\boldsymbol{x}_\delta^\ast)\le \Phi_\delta(\boldsymbol{x}^\ast)= \Phi(\boldsymbol{x}^\ast)+\frac{\delta}{2}\norm{\boldsymbol{x}^\ast}_2^2\le \Phi(\boldsymbol{x}^\ast)+\epsilon/2.
\end{align*}
We have
\begin{align*}
\Phi(\boldsymbol{x}^T)-\Phi(\boldsymbol{x}^\ast)\le& \epsilon/2-\frac{\delta}{2}\norm{\boldsymbol{x}_\delta^\ast}_2^2 -\delta\langle \boldsymbol{x}_\delta^\ast,\boldsymbol{x}^T-\boldsymbol{x}_\delta^\ast\rangle+ \frac{(\kappa+1)L}{2}\norm{\boldsymbol{x}^T-\boldsymbol{x}_\delta^\ast}_2^2\\
\le & \epsilon/2+ \frac{(\kappa+1)L}{2}\norm{\boldsymbol{x}^T-\boldsymbol{x}_\delta^\ast}_2^2+\frac{\delta}{2}\norm{\boldsymbol{x}^T-\boldsymbol{x}_\delta^\ast}_2^2\\
\le &\epsilon/2+{(\kappa+1)L}\norm{\boldsymbol{x}^T-\boldsymbol{x}_\delta^\ast}_2^2.
\end{align*}
Plugging in the bound of $\norm{\boldsymbol{x}^T-\boldsymbol{x}_\delta^\ast}_2$, we complete the proof.
\end{proof}
\fi
\section{Proof of Theorem~\ref{thm:main_local_conv}}
\label{app:main_local_conv}
In this section, we prove our main theorem (Theorem~\ref{thm:main_local_conv}). Since the function $f$ is locally approximately quadratic, we are essentially extending the results of quadratic functions to approximately quadratic functions. So the proofs in this section build upon the lemmas and proofs for quadratic functions in Appendix~\ref{app:spectral} and Appendix~\ref{app:quad_conv}.
Note that since the Hessian of $f$ is continuous under our assumption, for any $\Delta>0$, there exist some $\delta_m>0$ such that if $\norm{\boldsymbol{z}-\boldsymbol{z}^\ast}_2\le \delta_m$, we have
\begin{align*}
\max\left\{ \|\nabla^2_{\boldsymbol{x}\vx}f(\boldsymbol{x};\boldsymbol{y})-C\|_2,\|\nabla^2_{\boldsymbol{x}\boldsymbol{y}}f(\boldsymbol{x};\boldsymbol{y})-B\|_2,
\|\nabla^2_{\boldsymbol{y}\vy}f(\boldsymbol{x};\boldsymbol{y})+A\|_2
\right\}\le \Delta.
\end{align*}
Before proving the theorem, we first present the following useful lemma.
\begin{lemma}
For any two points $\boldsymbol{z}_1$ and $\boldsymbol{z}_2$ such that $\max\{\norm{\boldsymbol{z}_1-\boldsymbol{z}^\ast}_2,\norm{\boldsymbol{z}_2-\boldsymbol{z}^\ast}_2\}\le \delta_m$, there exists a symmetric matrix $\Tilde{H}=\begin{pmatrix}
\Tilde{C}&\Tilde{B}\\
\Tilde{B}^\top &-\Tilde{A}
\end{pmatrix}$ such that
\begin{align*}
\nabla f(\boldsymbol{z}_2)-\nabla f(\boldsymbol{z}_1)= \Tilde{H}\cdot (\boldsymbol{z}_2-\boldsymbol{z}_1),
\end{align*}
where we also have
\begin{align*}
\max\left\{\norm{C-\Tilde{C}}_2, \norm{B-\Tilde{B}}_2, \norm{A-\Tilde{A}}_2\right\}\le \Delta.
\end{align*}
\label{lem:mvt}
\end{lemma}
\begin{proof}[Proof of Lemma~\ref{lem:mvt}]
For any $0\le t\le 1$, denote $\boldsymbol{z}_t=(1-t)\boldsymbol{z}_1+t\boldsymbol{z}_2$. We can denote the hessian at $\boldsymbol{z}_t$ as
\begin{align*}
\nabla^2 f(\boldsymbol{z}_t)=\begin{pmatrix}
C_t&B_t\\B_t^\top & -A_t
\end{pmatrix}.
\end{align*}
By Jensen's inequality, we know $\norm{\boldsymbol{z}_t-\boldsymbol{z}^\ast}_2\le \delta_m$. Therefore
\begin{align}
\max\{\norm{C-C_t}_2, \norm{B-B_t}_2, \norm{A-A_t}_2\}\le \Delta.
\label{eq:abc}
\end{align}
Note that
\begin{align*}
\nabla f(\boldsymbol{z}_2)-\nabla f (\boldsymbol{z}_1) = \int_{0}^{1}\nabla^2 f(\boldsymbol{z}_t)\cdot (\boldsymbol{z}_2-\boldsymbol{z}_1)\,dt=:\Tilde{H}\cdot (\boldsymbol{z}_2-\boldsymbol{z}_1),
\end{align*}
where we define
\begin{align*}
\Tilde{H}:=\int_{0}^{1}\nabla^2 f(\boldsymbol{z}_t)\,dt=\mathbb{E}_{t\sim\mathcal{U}(0,1)}\left[\nabla^2 f(\boldsymbol{z}_t)\right],
\end{align*}
where $\mathcal{U}(0,1)$ denotes the uniform distribution over $[0,1]$.
Then we have
\begin{align*}
\Tilde{A}=\mathbb{E}_{t\sim\mathcal{U}(0,1)}[A_t],\quad \Tilde{B}=\mathbb{E}_{t\sim\mathcal{U}(0,1)}[B_t],\quad \Tilde{C}=\mathbb{E}_{t\sim\mathcal{U}(0,1)}[C_t].
\end{align*}
Taking expectation of the \eqref{eq:abc} and applying Jensen's inequality, we complete the proof.
\end{proof}
With Lemma~\ref{lem:mvt}, we are ready to prove Theorem~\ref{thm:main_local_conv}.
\begin{proof}[Proof of Theorem~\ref{thm:main_local_conv}]
Since $\nabla f(\boldsymbol{z}^\ast)=\mathbf{0}$, by Lemma~\ref{lem:mvt}, for any point $\boldsymbol{z}$ such that $\norm{\boldsymbol{z}-\boldsymbol{z}^\ast}_2\le\delta_m$, there exists a matrix $\Tilde{H}=\begin{pmatrix}
\Tilde{C}&\Tilde{B}\\
\Tilde{B}^\top &-\Tilde{A}
\end{pmatrix}$ such that
\begin{align*}
\nabla f(\boldsymbol{z}) =
\Tilde{H}\cdot (\boldsymbol{z}-\boldsymbol{z}^\ast).
\end{align*}
We will use $\Tilde{H}_k=\begin{pmatrix}
\Tilde{C}_k&\Tilde{B}_k\\
\Tilde{B}_k^\top &-\Tilde{A}_k
\end{pmatrix}$ to such a matrix for $\boldsymbol{z}^k$, i.e., $\nabla f(\boldsymbol{z}^k) =
\Tilde{H}_k\cdot (\boldsymbol{z}^k-\boldsymbol{z}^\ast)$.
Let use first prove the convergence rate of GDA. Choosing $\Delta\le \frac{c_0L}{r\kappa_{\vx} C_P}$ for some small enough numerical constant $c_0$ and initialize $\boldsymbol{z}^0$ such that $\norm{\boldsymbol{z}^0-\boldsymbol{z}^\ast}_2\le \delta_m/C_P$. We claim that $\norm{\boldsymbol{z}^t-\boldsymbol{z}^\ast}_2\le\delta_m$ for all $t\ge 0$. We will prove this claim by induction. First note that it is trivially true when $t=0$. Let us assume it is true for any $t\le T$ and try to show it also holds for $t=T+1$.
Denote $\tilde{\boldsymbol{z}}=\boldsymbol{z}-\boldsymbol{z}^\ast$. We have for any $k\le T$,
\begin{align*}
\tilde{\boldsymbol{z}}^{k+1} =\left(I+\eta_{\vx} \Tilde{H}_k \right)\tilde{\boldsymbol{z}}^{k}=\left(I+\eta_{\vx} M+E_k\right)\tilde{\boldsymbol{z}}^{k},
\end{align*}
where
\begin{align*}
E_k:=\eta_{\vx}(\Tilde{H}_k-M)=\eta_{\vx}\begin{pmatrix}
-\left(\Tilde{C}_k-C \right) & -\left(\Tilde{B}_k-B \right) \\ r \left(\Tilde{B}_k-B \right)^\top & r \left(\Tilde{A}_k-A \right)
\end{pmatrix}.
\end{align*}
It is easy to bound $\|E_k\|_2 \le 2\eta_{\vx} r\Delta$.
Suppose $I+\eta_{\vx} M=P^{-1}\Lambda P$ is diagonalizable, where $\Lambda=\text{diag}(\lambda_1,\ldots,\lambda_{m+n})$ and we have shown $|\lambda_i|\le 1-\frac{1}{64r\kappa_{\vx}}$. Then we can bound that
\begin{align*}
\left\|\prod_{k=0}^T \left(I+\eta_{\vx} M+E_k\right)\right\|_2\le& \sum_{i=0}^{T+1} {T+1\choose i} C_p^{i+1}\left(1-\frac{1}{64r\kappa_{\vx}}\right)^{T+1-i}\left(2\eta_{\vx} r\Delta\right)^i\\
\le & C_P \left(1-\frac{1}{64r\kappa_{\vx}}+2\eta_{\vx} r\Delta C_P\right)^{T+1}\\
\le &C_P \left(1-\frac{1}{128r\kappa_{\vx}}\right)^{T+1}.
\end{align*}
Then we have
\begin{align*}
\norm{\boldsymbol{z}^{T+1}-\boldsymbol{z}^\ast}_2\le C_P \left(1-\frac{1}{128r\kappa_{\vx}}\right)^{T+1}\norm{\boldsymbol{z}^0-\boldsymbol{z}^\ast}_2\le C_P\cdot\frac{\delta_m}{C_P}= \delta_m.
\end{align*}
Therefore we have proved the claim as well as obtained the convergence rate for GDA.
Now we prove the convergence rate for EG. Note that the dynamics of EG can be written as
\begin{align*}
\tilde{\boldsymbol{z}}^{k+1}=&\tilde{\boldsymbol{z}}^k+\eta_{\vx}\Tilde{H}_{k+1/2}\cdot \tilde{\boldsymbol{z}}^{k+1/2}\\
=&\left(1+\eta_{\vx}\Tilde{H}_{k+1/2}+\eta_{\vx}^2\Tilde{H}_{k+1/2}\Tilde{H}_{k}\right)\tilde{\boldsymbol{z}}^k\\
=:&\left(1+\eta_{\vx} M+\eta_{\vx}^2 M^2+F_k\right)\tilde{\boldsymbol{z}}^k,
\end{align*}
where we have
\begin{align*}
\norm{F_k}_2 =\norm{(1+\eta_{\vx} M)E_{k+1/2}+E_k(\eta_{\vx} M+E_{k+1/2})}_2 \le 4\norm{E_k}_2,
\end{align*}
where in the inequality we use the fact $\norm{E_{k+1/2}}_2\le 1$ and $\eta_{\vx}\norm{M}_2\le 1$ due to Lemma~\ref{lem:spectral_M}. Also note that by Lemma~\ref{lem:spectral_GDA_EG}, the transition matrix of EG also satisfies $\norm{I+\eta_{\vx} M+\eta_{\vx}^2 M^2}_2\le 1-\frac{1}{64r\kappa_{\vx}}$. The rest of proof for EG is similar to that of GDA.
\end{proof}
\section{Proof of Theorem~\ref{thm:main_local_conv_stochastic}}
\label{app:main_local_conv_stochastic}
\begin{proof}[Proof of Theorem~\ref{thm:main_local_conv_stochastic}]
We use the same notation as in the proof of Theorem~\ref{thm:conv_general_sgda}. We first prove the convergence for GDA.
Similar to the proof of Theorem~\ref{thm:main_local_conv}, we choose $\Delta\le \frac{c_0L}{r\kappa_{\vx} C_P}$ for some small enough numerical constant $c_0$ and initialize $\boldsymbol{z}^0$ such that $\norm{\boldsymbol{z}^0-\boldsymbol{z}^\ast}_2\le \delta_m/2C_P$. We claim that with probability at least $1-p$ where $p$ is an arbitrarily small constant, we have $\norm{\boldsymbol{z}^t-\boldsymbol{z}^\ast}_2\le\delta_m$ for any $t\le T$ where $T$ is the maximum number of iterations. Denote the event
\begin{align*}
\mathcal{E} = \left\{\boldsymbol{\xi}\Big|\eta_{\vx} C_P\sum_{k=0}^{T-1}\|\boldsymbol{\xi}^k\|_2\le \epsilon/2\right\},
\end{align*}
where $\boldsymbol{\xi}=\{\boldsymbol{\xi}^k\}_{k=0}^{T-1}$ and we can bound $\mathbb{E}\left[\norm{\boldsymbol{\xi}^k}_2^2\right]\le 2r^2\sigma^2/S$. Choosing
\begin{align*}
S=&\frac{C T^2 C_P^2\sigma^2}{L^2\epsilon^2}
\end{align*}
for some large enough constant $C$, by Markov inequality, we have
\begin{align*}
\mathbb{P}\left(\boldsymbol{\xi}\notin\mathcal{E}\right)\le& \frac{2\eta_{\vx} C_P}{\epsilon}\sum_{k=0}^{T-1}\mathbb{E}[\|\boldsymbol{\xi}^k\|_2]\\
\le & \frac{2 C_P}{4rL\epsilon}\cdot T\cdot \sqrt{2}r\sigma /\sqrt{S}\\
\le & p.
\end{align*}
In other words, with probability at least $1-p$, we have $\boldsymbol{\xi}\in\mathcal{E}$. We will condition on this event in the following proof.
Then we can use the induction technique similar to the proof of Theorem~\ref{thm:main_local_conv}. Suppose that $\|\tilde{\boldsymbol{z}}^k\|\le\delta_m$ for all $k\le K$ where $K<T$. The dynamics of GDA is
\begin{align*}
\tilde{\boldsymbol{z}}^{k+1}=\left(I+\eta_{\vx} M+E_k\right)\tilde{\boldsymbol{z}}^k+\eta_{\vx}\boldsymbol{\xi}^k,
\end{align*}
where $E_k$ is defined in the proof of Theorem~\ref{thm:main_local_conv}.
Note that in this case, following the proof of Theorem~\ref{thm:main_local_conv}, we can bound
\begin{align*}
\left\|\prod_{k\in \mathcal{I}} \left(I+\eta_{\vx} M+E_k\right)\right\|_2\le& C_P \left(1-\frac{1}{128r\kappa_{\vx}}\right)^{|\mathcal{I}|},\text{ for any index set }\mathcal{I}.
\end{align*}
The problem is more difficult than that in Theorem~\ref{thm:conv_general_sgda} because $E_k$ could potentially depend on the gradient noise $\{\boldsymbol{\xi}^i\}_{i<k}$. Conditioned on the event $\boldsymbol{\xi}\in\mathcal{E}$, we can bound that
\begin{align*}
\norm{\tilde{\boldsymbol{z}}^{K+1}}_2\le& \left\| \prod_{k=0}^K\left(I+\eta_{\vx} M+E_k\right)\right\|_2 \norm{\tilde{\boldsymbol{z}}^0}_2+\eta_{\vx}\sum_{i=0}^{K}\left\|\prod_{k=i}^K\left(I+\eta_{\vx} M+E_k\right)\right\|_2 \norm{\boldsymbol{\xi}^i}_2\\
\le&C_P\left(1-\frac{1}{128r\kappa_{\vx}}\right)^{K+1}\norm{\tilde{\boldsymbol{z}}^0}_2+\eta_{\vx} C_P \sum_{i=0}^{T-1} \norm{\boldsymbol{\xi}^i}_2\\
\le& C_P\norm{\tilde{\boldsymbol{z}}^0}_2+\epsilon/2\le \delta_m,
\end{align*}
where in the last inequality we use $\epsilon\le\delta_m$ which holds because otherwise the initialization point is already $\epsilon$-approximately optimal.
Therefore the induction hypothesis also holds for $K+1$. Then we can conclude that $\|\tilde{\boldsymbol{z}}^k\|_2\le\delta_m$ for all $0\le k\le T-1$, i.e., the iterates never escape from the neighborhood around $\boldsymbol{z}^*$ under the event $\boldsymbol{\xi}\in\mathcal{E}$.
From the above inequalities, when $K=T-1$, we get
\begin{align*}
\norm{\tilde{\boldsymbol{z}}^{T}}_2
\le&C_P\left(1-\frac{1}{32r\kappa_{\vx}}\right)^{T}\norm{\tilde{\boldsymbol{z}}^0}_2+\epsilon/2.
\end{align*}
If we require $\norm{\tilde{\boldsymbol{z}}^T}_2\le\epsilon$, we only need to have
\begin{align*}
T=&O\left(r\kappa_{\vx}\log\left(\frac{C_P\norm{\tilde{\boldsymbol{z}}^0}_2}{\epsilon}\right)\right),
\end{align*}
which implies
\begin{align*}
S=&O\left(\frac{r^2\kappa_{\vx}^2 C_P^2\sigma^2}{L^2\epsilon^2}\log^2\left(\frac{C_P\norm{\tilde{\boldsymbol{z}}^0}_2}{\epsilon}\right)\right).
\end{align*}
This implies a gradient complexity bound of
\begin{align*}
T\cdot S=O\left(\frac{r^3\kappa_{\vx}^3 C_P^2\sigma^2}{L^2\epsilon^2}\log^3\left(\frac{C_P\norm{\tilde{\boldsymbol{z}}^0}_2}{\epsilon^2}\right)\right).
\end{align*}
Now we prove the convergence result for EG. Note that the dynamics of EG is
\begin{align*}
\tilde{\boldsymbol{z}}^{k+1}=&\tilde{\boldsymbol{z}}^{k}+(\eta_{\vx} M+E_{k+1/2}) \tilde{\boldsymbol{z}}^{k+1/2}+\eta_{\vx}\boldsymbol{\xi}^{k+1/2}\\
=&\tilde{\boldsymbol{z}}^{k}+(\eta_{\vx} M+E_{k+1/2}) \left(\tilde{\boldsymbol{z}}^{k}+(\eta_{\vx} M+E_{k}) \tilde{\boldsymbol{z}}^{k}+\eta_{\vx}\boldsymbol{\xi}^{k}\right)+\eta_{\vx}\boldsymbol{\xi}^{k+1/2}\\
=&(I+\eta_{\vx} M+\eta_{\vx}^2M^2+F_k)\tilde{\boldsymbol{z}}^{k}+\eta_{\vx}\boldsymbol{\xi}^{k+1/2}+\eta_{\vx}(\eta_{\vx} M+E_{k+1/2})\boldsymbol{\xi}^{k}.
\end{align*}
Note that it is straight forward to bound $\norm{\eta_{\vx} M+E_{k+1/2}}_2\le 1$.
Then we can bound $\mathbb{E}\left[\norm{\boldsymbol{\xi}^{k+1/2}+(\eta_{\vx} M+E_{k+1/2})\boldsymbol{\xi}^{k}}_2\right]\le 4r\sigma/\sqrt{S}$. Then the rest of proof is similar to that for GDA. In particular, we can define the event
\begin{align*}
\mathcal{E} = \left\{\boldsymbol{\xi}\Big|\eta_{\vx} C_P\sum_{k=0}^{T-1}(\|\boldsymbol{\xi}^k\|_2+\|\boldsymbol{\xi}^{k+1/2}\|_2)\le \epsilon/2\right\}
\end{align*}
and show it holds with high probability if choosing a large enough $S$. Following the proof of Theorem~\ref{thm:main_local_conv} for EG, we can also show that
\begin{align*}
\left\|\prod_{k\in \mathcal{I}} \left(I+\eta_{\vx} M+\eta_{\vx}^2M^2+F_k\right)\right\|_2\le& C_P \left(1-\frac{c_0}{r\kappa_{\vx}}\right)^{|\mathcal{I}|},\text{ for any index set }\mathcal{I},
\end{align*}
for some small enough numerical constant $c_0$. Then the the following steps are straight forward.
\end{proof}
\section{Additional experimental results}
We present additional experimental results in this section.
In Figure~\ref{fig:mot_exp}, we showed the training curves of SGDA on MNIST and CIFAR10 with different stepsize ratios.
Now we show the generated images of the trained generator in Figure~\ref{fig:images_app}. As we can clearly see, a larger stepsize ratio not only makes it converging more slowly, but also results in a worse generator for both MNIST and CIFAR10 datasets. This is also shown in by the evolution FID score during training for CIFAR10 in Figure~\ref{fig:fid}.
All the experimental results so far use the WGAN-GP model. We will show that another GAN model, DCGAN, has similar training behaviors. Figure~\ref{fig:dcgan_curve} shows the evolution of the Wasserstein Distance and FID score under different stepsize choices for DCGAN and CIFAR10. Figure~\ref{fig:dcgan_images} shows the generated images in this setting. As we can see, the results are similar to those for WGAN-GP.
\input{figure_app}
\section{Introduction}
\label{sec:intro}
\input{Sections/intro}
\section{Related work}
\label{sec:related}
\input{Sections/related}
\section{Preliminaries}
\label{sec:pre}
\input{Sections/pre}
\section{Main results}
\label{sec:local_result}
\input{Sections/local_result}
\section{Analysis through quadratic NC-SC functions}
\label{sec:quad_analysis}
\input{Sections/quad_pre}
\section{Experimental results}
\label{sec:exp}
\input{Sections/experiments}
\section{Conclusion}
\label{sec:conclusion}
\input{Sections/conclusion}
\section{Acknowledgement}
\input{Sections/ack}
\bibliographystyle{plainnat}
|
\section{Introduction}
Throughout this article, a cube
$\q$ \emph{always means} that $\q$ has finite edge length, all its edges parallel
to the coordinate axes, but $\q$ is not necessary to be open or
closed. We \emph{always} let $\xx$ represent either $\rn$
or a cube $\q$ of $\rn$ with finite edge length.
For any integrable function $f$ and any cube $Q$, let
\[f_{Q}:=\fint_{Q}f:=\frac{1}{|Q|}\int_{Q}f.\]
Here and thereafter, in all integral representation,
in order to simplify the presentation, we \emph{always omit} the
differential $dx$ if there exists no confusion.
The John--Nirenberg space $JN_p$ has attracted
a lot of attention in recent years.
It is a byproduct appearing in the study of
John and Nirenberg \cite{JN61} on functions
with bounded mean oscillation
(the celebrated space BMO),
and was further used in the interpolation
theory by Stampacchia \cite{S65}.
Both $JN_p$ and BMO are function spaces
based on mean oscillations of functions, and we refer the reader to
\cite{be20,cds99,cl99,cs06,ins14,ins19,is17,jlx19,lmv20,lny18}
for more related researches.
Obviously, we have $JN_1(Q_0)=L^1(Q_0)$ and $JN_\fz(Q_0)=\BMO(Q_0)$;
see, for instance, \cite{tyyM}.
Moreover, an interesting result of Dafni et al. \cite{DHKY18}
shows the non-triviality of $JN_p(Q_0)$ with $p\in(1,\fz)$
via constructing a surprising function belonging to $JN_p(Q_0)$
but not an element of $L^p(Q_0)$.
This means that $JN_p(Q_0)$ is strictly larger than $L^p(Q_0)$.
Later, a $JN_p$-type space mixed with Campanato structure,
called the \JN space $\jn$, was introduced and studied
in \cite{tyyNA}; see Definition \ref{s2def2} below. Indeed, for
any $p,q\in[1,\fz]$, $s\in \zp$, and $\az \in\rr$,
$$
\jn=
\begin{cases}
\text{the John--Nirenberg space } JN_p(\xx), &q=1,\ s=0=\az,\\
\text{the Campanato space } \cx, & p=\fz,\\
\text{the space }\BMO(\xx),& p=\fz,\ \az=0,
\end{cases}
$$
and hence $\jn$ combines some futures of both
the John--Nirenberg space and the Campanato space.
However, as is mentioned in \cite{DHKY18},
the structure of $JN_p$ is largely a mystery,
and so does $\jn$.
For instance, even for some classical operators
(such as the Hardy--Littlewood maximal operator,
the Calder\'on-Zygmund operator, and the fractional integral),
it is still unclear whether or not it is
bounded on $JN_p(\xx)$ or $\jn$;
we refer the reader to
\cite{jtyyz21,jtyyz22a,jtyyz22b,km21,tyyM}
for some related studies.
The main purpose of this article is to investigate
the \JN space from the point of view of the negative part
$f^{-}:=-\min\{f,0\}$, and to shed some light on the structure
of John--Nirenberg-type spaces associated
with both maximal functions and their commutators.
The negative part reveals some significant properties of $\BMO(\rn)$
related to maximal functions.
Precisely, let $\mathcal{M}$ denote
the \emph{Hardy--Littlewood maximal operator}
defined by setting, for any $f\in L^1_{\rm loc}(\rn)$ (the set of all
locally integrable functions) and any $x\in\rn$,
$$\mathcal{M}(f)(x)
:=\sup_{\text{cube }Q\ni x}\fint_{Q} |f(y)|\,dy.$$
Moreover, for any given cube $Q$ of $\rn$ and for
any $f\in L^1_{\rm loc}(\rn)$ and $x\in\rn$, let
\begin{align}\label{MQ}
\mathcal{M}_Q(f)(x)
:=\sup_{\{\text{cube }Q_\ast:\ x\in
Q_\ast\subset Q\}}\fint_{Q_\ast} |f(y)|\,dy.
\end{align}
For any $b\in L^1_{\rm loc}(\rn)$, define the
\emph{commutator $[b,\mathcal{M}]$} by setting,
for any $f\in L^1_{\rm loc}(\rn)$ and $x\in\rn$,
\begin{align}\label{commutator}
[b,\mathcal{M}](f)(x):=b(x)\mathcal{M}(f)(x)-\mathcal{M}(bf)(x).
\end{align}
Then Bastero et al. \cite{BMR00} proved that
the following three statements are mutually equivalent:
\begin{enumerate}[\rm(i)]
\item for any (or some) $p\in(1,\fz)$,
the commutator $[b,\mathcal{M}]$ is bounded on $L^p(\rn)$;
\item $b\in\BMO(\rn)$ with $b^-\in L^\fz(\rn)$;
\item for any (or some) $q\in[1,\fz)$,
$$\sup\fint_Q \lf|b-\mathcal{M}_Q(b)\r|^q<\fz,$$
where the supremum is taken over all cubes $Q$ of $\rn$.
\end{enumerate}
Very recently, Wang and Shu \cite{WS22} further showed that,
if we replace $\mathcal{M}_Q(b)$ in (iii) by $|b|_Q$,
then the above equivalence still holds true.
Indeed, they obtain the equivalence between (ii) and
\begin{enumerate}
\item[\rm(iv)] ${\sup\fint_Q |b-|b|_Q|}<\fz$,
where the supremum is taken over all cubes $Q$ of $\rn$.
\end{enumerate}
This implies that (i) $\Longleftrightarrow$ (ii)
$\Longleftrightarrow$ (iii) $\Longleftrightarrow$ (iv).
Moreover, Wang and Shu \cite{WS22} also
studied this phenomenon
in the context of Campanato spaces,
and introduced a new function spaces of
Morrey--Campanato type in \cite{WS22}.
As applications, they obtained an integral
characterization of the non-negative
H\"older continuous functions.
Note that $f$ is non-negative if and only if $f^-=0$.
Thus, the structure of this new space of Morrey--Campanato type
is also completely determined by the classical Campanato space
and the boundedness of the negative part $f^-$.
In this article, we introduce a new
John--Nirenberg--Campanato-type space $\njn$
with $p,q\in [1,\fz]$, $\az\in\rr$, and $s$
being a non-negative integer;
see Definition \ref{s2def2} below.
We give an equivalent characterization of $\njn$ via
the John--Nirenberg--Campanato space and the
Riesz--Morrey space.
Moreover, for the particular case $s=0$,
this new space can be equivalently
characterized by maximal functions and their commutators.
Additionally, we give some basic properties,
a good-$\lambda$ inequality,
and a John--Nirenberg type inequality for $\njq$.
The only difference between the ``norms'' of $\jn$ and $\njn$ is that
we change the mean oscillation
$${\fint_{Q}|f-P^{(s)}_{Q}(f)|^{q}}\ \mathrm{into}\
{\fint_{Q}|f-P^{(s)}_{Q}(|f|)|^{q}},$$
where $P^{(s)}_{Q}(\cdot)$ denotes the unique polynomial
satisfying \eqref{s1eq1}.
Since $P^{(0)}_{Q}(f)$ coincides with $f_{Q}$,
this is a natural generalization of the above (iv).
Thus, a natural question appears:
\[\text{Whether or not $f^-$ is still a bridge
connecting $\jn$ and $\njn$?}\]
Indeed, we give a positive answer to this question
in Theorem \ref{s2thm1} below,
and the key ingredient is the Riesz--Morrey space $\RM$
studied in \cite{tyyBJMA,ZT2021}.
Correspondingly, the only difference between the
norms of $\jn$ and $\RM$ is that
we change the mean oscillation
$$\fint_{Q}\lf|f-P^{(s)}_{Q}(f)\r|^{q}\ \mathrm{into}\
\fint_{Q}|f|^{q};$$
see Definition \ref{s2def3} below.
Moreover, for the case $s=0$,
we further obtain a corresponding equivalence of above
(i) $\Longleftrightarrow$ (ii) $\Longleftrightarrow$
(iii) $\Longleftrightarrow$ (iv) on $\njn$ via maximal functions
and their commutators;
see Theorem \ref{s3thm1} and Corollary \ref{s3cor2} below.
The remainder of this article is organized as follows.
In Section \ref{s2},
we introduce a ``new'' \JN type space $\njn$,
and prove that
\begin{equation}\label{s1eq00}
\RM\subset \njn\subset \jn
\end{equation}
in Proposition \ref{s2prop1} below. Indeed,
Remark \ref{s2rmk4} shows that this is truly
a new space between the Riesz--Morrey space
and the John--Nirenberg space,
namely, the inclusions in \eqref{s1eq00} are proper.
Moreover, we give an equivalent characterization of $\njn$
in Theorem \ref{s2thm1} below
via the \JN space $\jn$ and the Riesz--Morrey space $\Rm$.
The proofs of these results rely heavily on \eqref{s1eq2} below
and the linearity of $P^{(s)}_{Q}(\cdot)$.
In Section \ref{s3}, we first give some basic properties
of $\njn$, including the monotonicity
on the subindices $p$, $q$, and $s$
(see Proposition \ref{s3prop2} below),
the limit behavior as $p\to\fz$ (see Proposition \ref{s3prop1}
and Corollary \ref{s3cor1} below),
and the invariance on the second subindex $q$
(see Proposition \ref{s3prop4} below).
Moreover, for the case $s=0$, $P^{(s)}_{Q}(|f|)=|f|_{Q}$
is closely connected with the maximal function $\mathcal{M}_Q(f)$,
and hence we further study the relation between
$\njn$ and maximal functions.
On one hand, the maximal operator is bounded on $L^q(\xx)$ with
$q\in (1,\fz)$
but not bounded on $L^1(\xx)$. On the other hand, when dominating
mean oscillations by maximal functions,
the linearity of $\|\cdot\|_{L^1(\xx)}$ plays a key role,
which is no longer feasible for $L^q(\xx)$ with $q\in (1,\fz)$;
see Remark \ref{rem-q<p} below.
To coordinate these two conflicts (namely, $q=1$ and $q>1$),
we give another characterization of $\njn$ in Proposition \ref{s3prop3} below.
With the aid of Propositions \ref{s3prop4} and \ref{s3prop3},
we flexibly change the index $q$ and hence
characterize $\njn$ via maximal functions in Theorem \ref{s3thm1} below.
Furthermore, a related characterization via their commutators
is also established in Corollary \ref{s3cor2} below.
In Section \ref{s4}, we prove a John--Nirenberg type inequality
and a good-$\lambda$ inequality for the space $\njq$,
respectively, in Theorem \ref{s4thm1} and Lemma \ref{s4lem2} below.
As an application, we use this John--Nirenberg type inequality
to obtain another proof of Proposition \ref{s3prop4} at
the end of this section.
Finally, we make some conventions on notation.
Throughout this article, $\xx$ always represents
either $\rn$ or a cube $\q$ of $\rn$ with finite edge length.
Let $\mathbb{N}:=\{1, 2, \dots\}$ and $\zp:=\mathbb{N}\cup \{0\}$.
For any real-valued function $f$, we use $f^{-}:=-\min\{f,0\}$
to denote its negative part.
Let ${\bf {1}}_{E}$ denote the characteristic function of
any set $E\subset \rn$, and $\psq$ the set of all polynomials of
degree not greater than $s\in\zp$ on $Q$.
We denote by both $C$ and $\wz{C}$ positive
constants which are independent of the main parameters, but
they may vary from line to line.
Moreover, we use
$C_{(\gamma,\ \beta,\ \dots)}$ to denote
a positive constant depending
on the indicated parameters $\gamma, \beta, \dots$. Constants
with subscripts, such as $C_{0}$ and $A_{1}$, do not change in
different occurrences. Moreover, the symbol $f\lesssim g$
represents that $f \leq Cg$ for some positive constant $C$.
If $f\lesssim g$ and $g\lesssim f$, we then write $f\thicksim g$.
If $f\leq Cg$ and
$g=h$ or $g\leq h$, we then write $f\lesssim g\thicksim h$
or $f\lesssim g\lesssim h$, rather than $f\lesssim g=h$ or
$f\lesssim g\leq h$. For any $p\in[1,\fz]$, let $p'$ be its
\emph{conjugate index}, that is, $p'$ satisfies $1/p+1/p'=1$.
\section{New Function Spaces of John--Nirenberg--Campanato
Type \label{s2}}
To introduce the space $\njn$, we first recall the following
basic concepts.
\begin{itemize}
\item For any $s\in \zp$ (the set of all
non-negative integers), $\psf$ denotes the unique polynomial
of degree not greater than $s$ such that, for any $|\gamma|\leq s$,
\begin{equation}\label{s1eq1}
\int_{Q}\left[f(x)-P^{(s)}_{Q}(f)(x)\right]x^{\gamma}\,dx=0,
\end{equation}
where $\gamma:=(\gamma_{1},\dots,\gamma_{n})\in\mathbb{Z}^{n}_{+}:
=(\mathbb{Z}_{+})^{n},\ |\gamma|:=\gamma_{1}+\cdots+\gamma_{n}$, and
$x^{\gamma}:=x^{\gamma_{1}}_{1}\cdots x^{\gamma_{n}}_{n}$ for any
$x:=(x_{1},\dots,x_{n})\in \rn$. It is well known that
$P^{(0)}_{Q}(f)=f_{Q}$
and, for any $s\in \zp$, there exists a constant $\c\in [1,\fz)$,
independent of both $f$ and $Q$, such that, for any $x\in Q$,
\begin{equation}\label{s1eq2}
\left| P_{Q}^{(s)}(f)(x)\right| \leq C_{(s)}\fint_{Q}|f|;
\end{equation}
see \cite[p.\,83]{TG80} and \cite[Lemma 4.1]{SLF95} for more details.
\item For any given $q\in [1,\fz)$, the symbol $L^{q}(\xx)$
denotes the
spaces of all the measurable functions $f$ on $\xx$ such that
\[\|f\|_{L^{q}(\xx)}:=\lf[\int_{\xx}|f(x)|^{q}\,dx\r]^{\frac{1}{q}}
<\fz\]
and the symbol $L^{q}_{\rm loc}(\xx)$ the set of all the measurable
functions $f$ on $\xx$ such that $f{\bf{1}}_{E}\in L^{q}(\xx)$ for any
bounded set $E\subset \xx$. Besides, when $q=\fz$,
$\|\cdot\|_{\xx}$ represents the essential supremum on $\xx$.
\item For any given $q\in [1,\fz]$ and for any measurable
function $f$, let
\begin{equation*}
\|f\|_{L^{q}(Q_{0},|Q_{0}|^{-1}dx)}
:=\lf[\fint_{Q_{0}}|f(x)|^{q}\,dx\r]^{\frac{1}{q}}.
\end{equation*}
\item For any given $q\in[1,\fz)$ and $s\in \zp$, the space
$L^{q}(Q_{0},|Q_{0}|^{-1}dx)/\ps$ is defined by setting
\begin{equation*}
L^{q}(Q_{0},|Q_{0}|^{-1}dx)/\ps:\ =\lf\{f\in \lqq:\
\|f\|_{L^{q}(Q_{0},|Q_{0}|^{-1}dx)/\ps}<\fz \r\},
\end{equation*}
where
\begin{equation*}
\|f\|_{L^{q}(Q_{0},|Q_{0}|^{-1}dx)/\ps}:=\inf_{m\in\ps}
\|f+m\|_{L^{q}(Q_{0},|Q_{0}|^{-1}dx)}.
\end{equation*}
\item The space $\BMO (\xx)$, introduced by John and
Nirenberg \cite{JN61}
in 1961 to study the functions of \emph{bounded mean oscillation},
is defined by setting
\[\BMO(\xx):=\lf\{f\in L^{1}_{\rm loc}(\xx):\ \|f\|_{\BMO(\xx)}=
\sup_{{\rm cube}\,Q\subset\xx}\fint_{Q}\lf|f-f_{Q}\r|<\fz\r\}
\]
with the supremum taken over all cubes $Q$ of $\xx$.
\end{itemize}
\begin{definition}\label{s2def1}
Let $\az \in\rr$, $q\in[1,\fz]$, and $s\in \zp$.
\begin{enumerate}[\rm(i)]
\item The \emph{Campanato space $\cx$},
introduced by Campanato \cite{C64},
is defined by setting
\[\cx:=\lf\{f\in\lql:\ \fcx<\fz\r\}\]
with
\[\fcx:=\sup\left\{|Q|^{-\alpha}
\left[\fint_{Q}\lf|f-P^{(s)}_{Q}(f)\r|^{q}\right]^{\frac{1}{q}}
\right\},\]
where $P^{(s)}_{Q}(f)$ is the same as in \eqref{s1eq1}
and the supremum is taken over all cubes $Q$ of $\xx$.
\item The \emph{space $\ncx$} is defined by setting
\[\ncx:=\lf\{f\in\lql:\ \fncx<\fz\r\}\]
with
\[\fncx:=\sup\left\{|Q|^{-\alpha}
\left[\fint_{Q}\lf|f-P^{(s)}_{Q}(|f|)\r|^{q}\right]^{\frac{1}{q}}
\right\},\]
where $P^{(s)}_{Q}(f)$ is the same as in \eqref{s1eq1}
and the supremum is taken over all cubes $Q$ of $\xx$.
\end{enumerate}
\end{definition}
\begin{remark}
\begin{enumerate}[(i)]
\item The ``norm'' $\|\cdot\|_{\cx}$ is defined modulo polynomials.
For simplicity, we regard $\cx$ as the quotient space
$\cx /\mathcal{P}_{s}(\xx)$. However, $\|\cdot\|_{\ncx}$ is
not a norm of $\lql$
because the triangular inequality does not hold true.
\item Comparing $\ncx$ in Definition \ref{s2def1}(ii) with
$\overline{\mathcal{L}}^{p,\lambda}(\xx)$ in \cite{WS22},
it is easy to find that
$$\widetilde{\mathcal{C}}_{\az,q,0}(\xx)
=\overline{\mathcal{L}}^{q,n(\az q+1)}(\xx),$$ where $n$ denotes
the dimension of $\xx$.
\end{enumerate}
\end{remark}
\begin{definition}\label{s2def2}
Let $q\in[1,\fz]$, $s\in \zp$, and $\az \in\rr$.
\begin{enumerate}[\rm(i)]
\item If $p\in [1,\fz)$, then the \emph{\JN space $\jn$}, introduced in \cite{tyyNA},
is defined by setting
\[
\jn:=\lf\{ f \in L^{q}_{\rm loc}(\xx) :\ \fjn <\fz \r\}
\]
with
\[
\fjn:=\sup\lf\{ \sum_{i}|Q_{i}|\lf[ |Q_{i}|^{-\alpha}
\lf\{\fint_{Q_{i}}\lf|f-P^{(s)}_{Q_{i}}
(f)\r|^{q}\r\}^{\frac{1}{q}}\r]^{p}\r\}^{\frac{1}{p}},
\]
where
$P^{(s)}_{Q_{i}}(f)$ for any $i$ is the same as in \eqref{s1eq1}
with $Q$ replaced by
$Q_{i}$ and the supremum is taken over all the collections of
interior pairwise disjoint cubes $\qi$ of $\xx$.
\item If $p\in [1,\fz)$, then the
\emph{John--Nirenberg--Campanato-type space $\njn$} is defined by setting
\[
\njn:=\lf\{ f \in L^{q}_{\rm loc}(\xx) :\ \fnjn <\fz \r\}
\]
with
\[
\fnjn:=\sup\lf\{ \sum_{i}|Q_{i}|\lf[ |Q_{i}|^{-\alpha}
\lf\{\fint_{Q_{i}}\lf|f-P^{(s)}_{Q_{i}}
(|f|)\r|^{q}\r\}^{\frac{1}{q}}\r]^{p}\r\}^{\frac{1}{p}},
\]
where $P^{(s)}_{Q_{i}}(|f|)$ for any $i$ is the same as in \eqref{s1eq1}
with both $Q$ replaced by
$Q_{i}$ and $f$ replaced by $|f|$,
and where the supremum is taken over all the collections of
interior pairwise disjoint cubes $\qi$ of $\xx$.
\item Let
$JN_{(\fz,q,s)_{\az}}(\xx):=\cx$ and
$\wz{JN}_{(\fz,q,s)_{\az}}(\xx):=\ncx$.
\end{enumerate}
\end{definition}
\begin{remark}\label{s2rmk2}
Let $p$, $q$, $s$, and $\az$ be the same as in Definition \ref{s2def2}.
\begin{enumerate}[(i)]
\item Let $f$ be any non-negative function on $\xx$.
Then $f\in\jn$ if and only if $f\in\njn$.
\item $\|\cdot\|_{\njn}$ is not a norm of $\lql$
because the triangular inequality does not hold true.
\end{enumerate}
\end{remark}
The following Riesz--Morrey space was introduced in \cite{tyyBJMA}
as a bridge connecting Lebesgue spaces and Morrey spaces.
\begin{definition}\label{s2def3}
Let $p,q\in[1,\fz]$ and $\az\in\rr$.
Then the \emph{Riesz--Morrey space $\RM$} is defined by setting
\[
\RM:=\lf\{ f \in \lql :\ \fRM <\fz \r\}
\]
with
\begin{equation*}
\fRM:=
\begin{cases}
{\displaystyle
\sup\left\{ \sum_{i}|Q_{i}|\left[ |Q_{i}|^{-\az}
\left\{\fint_{Q_{i}}|f|^{q}\right\}
^{\frac{1}{q}}\right]^{p}\right\}^{\frac{1}{p}}}
&{\rm if}\ p\in[1,\fz),\ q\in[1,\fz],\\
{\displaystyle
\sup_{{\rm cube}\ Q\subset \xx}|Q|^{-\az}\lf[\fint_{Q}|f|^{q}\r]
^{\frac{1}{q}}}
&{\rm if}\ p=\fz,\ q\in[1,\fz],
\end{cases}
\end{equation*}
where the first supremum is taken over all the collections of
interior pairwise disjoint cubes $\qi$ of $\xx$ and the second
supremum is taken over all cubes $Q$ of $\xx$.
\end{definition}
\begin{remark}\label{s2rmk3}
The relation between Riesz--Morrey spaces and Lebesgue spaces
is completely clarified over all indices in
\cite[Corollary 3.7]{ZT2021}. For the convenience
of the reader, we list
all cases of $\Rm$ as follows.
\begin{enumerate}[(i)]
\item Let $p\in(1,\fz]$. Then
\[
RM_{p,1,\az}(\rn)
\begin{cases}
=L^{1}(\rn) &{\rm if}\ \az=\frac{1}{p}-1,\\
\supsetneqq L^{\frac{p}{1-p\az}}(\rn) &{\rm if}\ \az
\in \lf(\frac{1}{p}-1,0\r),\\
=L^{p}(\rn) &{\rm if}\ \az=0,\\
=\{0\} &{\rm if}\ \az\in \lf(-\fz,\frac{1}{p}-1\r)\cup (0,\fz).
\end{cases}
\]
In particular, for any $\az\in(-1,0)$,
$RM_{\fz,1,\az}(\rn)=M_{1,\az}(\rn)$ which is the Morrey space.
\item
\[
RM_{1,1,\az}(\rn)=
\begin{cases}
L^{1}(\rn) &{\rm if }\ \az=0,\\
\{0\} &{\rm if }\ \az\in\rr \setminus\{0\}.
\end{cases}
\]
\item Let $p\in(1,\fz]$ and $Q_{0}$ be any cube of
$\rn$. Then
\[
RM_{p,1,\az}(Q_{0})
\begin{cases}
=L^{1}(Q_{0}) &{\rm if}\ \az\in\lf( -\fz,\frac{1}{p}-1\r],\\
\supsetneqq L^{\frac{p}{1-p\az}}(Q_{0}) &{\rm if}\ \az
\in \lf(\frac{1}{p}-1,0\r),\\
=L^{p}(Q_{0}) &{\rm if}\ \az=0,\\
=\{0\} &{\rm if}\ \az\in(0,\fz).
\end{cases}
\]
In particular, $RM_{\fz,1,\az}(Q_{0})=M_{1,\az}(Q_{0})$
if $\az\in(-1,0)$.
\item Let $Q_{0}$ be any cube of
$\rn$. Then
\[
RM_{1,1,\az}(Q_{0})=
\begin{cases}
L^{1}(Q_{0}) &{\rm if}\ \az\in( -\fz,0],\\
\{0\} &{\rm if}\ \az\in (0,\fz).
\end{cases}
\]
\end{enumerate}
\end{remark}
\begin{proposition}\label{s2prop1}
Let $p,q\in[1,\infty]$, $s\in\zp$, and $\alpha \in\rr$. Then
\begin{equation*}
\RM \subset \njn\subset \jn
\end{equation*}
and
\begin{equation}\label{s2prop1eq1}
\lf[1+\c\r]^{-1}\|\cdot\|_{\jn}\leq\|\cdot\|_{\njn}
\leq\lf[1+\c\r]\|\cdot\|_{\RM},
\end{equation}
where $\c\in[1,\fz)$ is the same as in \eqref{s1eq2}.
\end{proposition}
\begin{proof}
To show Proposition \ref{s2prop1}, it is enough
to prove that \eqref{s2prop1eq1} holds true.
First, we show the first inequality of \eqref{s2prop1eq1}.
To this end, for
any $f\in \lql$ and any interior pairwise disjoint
cubes $\qi$ of $\xx$, from the Minkowski inequality,
the linearity of $\{P^{(s)}_{Q_{i}}\}_{i}$,
\eqref{s1eq2},
and the H\"{o}lder inequality, it follows that
\begin{align*}
&\left\{\sum_{i}|Q_{i}|\left[ |Q_{i}|
^{-\alpha}\left\{\fint_{Q_{i}}\lf|f-P^{(s)}_{Q_{i}}(f)\r|^{q}
\right\}^{\frac{1}{q}}\right]^{p}\right\}^{\frac{1}{p}}\\
&\quad\leq
\left\{\sum_{i}|Q_{i}|^{1-p\alpha}\left[
\fint_{Q_{i}}\lf|f-P^{(s)}_{Q_{i}}(|f|)\r|^{q}\right]
^{\frac{p}{q}}\right\}^{\frac{1}{p}}\\
&\quad\quad+\left\{\sum_{i}|Q_{i}|^{1-p\alpha}\left[
\fint_{Q_{i}}\lf|P^{(s)}_{Q_{i}}(|f|)-P^{(s)}_{Q_{i}}(f)\r|
^{q}\right]
^{\frac{p}{q}}\right\}^{\frac{1}{p}}\\
&\quad\le \fnjn
+\left\{\sum_{i}|Q_{i}|^{1-p\alpha}\left[
\fint_{Q_{i}}\lf|P^{(s)}_{Q_{i}}\lf(P^{(s)}_{Q_{i}}(|f|)-f\r)\r|
^{q}\right]
^{\frac{p}{q}}\right\}^{\frac{1}{p}}\\
&\quad\leq\fnjn
+\c\left\{\sum_{i}|Q_{i}|^{1-p\alpha}\left[
\fint_{Q_{i}}\lf|P^{(s)}_{Q_{i}}(|f|)-f\r|
\right]
^{p}\right\}^{\frac{1}{p}}\\
&\quad\leq
\fnjn
+\c\left\{\sum_{i}|Q_{i}|^{1-p\alpha}\left[
\fint_{Q_{i}}\lf|P^{(s)}_{Q_{i}}(|f|)-f\r|^{q}
\right]
^{\frac{p}{q}}\right\}^{\frac{1}{p}}\\
&\quad\leq \lf[1+\c\r]\fnjn,
\end{align*}
which implies that
the first inequality of \eqref{s2prop1eq1} holds true.
Next, we show the second inequality of \eqref{s2prop1eq1}.
To this end, for any $f\in \lql$ and any interior pairwise disjoint
cubes $\qi$ of $\xx$, by the Minkowski inequality, \eqref{s1eq2},
and the H\"{o}lder inequality, we conclude that
\begin{align*}
&\left\{\sum_{i}|Q_{i}|\left[ |Q_{i}|
^{-\alpha}\left\{\fint_{Q_{i}}\lf|f-P^{(s)}_{Q_{i}}(|f|)\r|^{q}
\right\}^{\frac{1}{q}}\right]^{p}\right\}^{\frac{1}{p}}\\
&\quad\leq
\left\{\sum_{i}|Q_{i}|^{1-p\alpha}\left[
\fint_{Q_{i}}\lf|f\r|^{q}\right]
^{\frac{p}{q}}\right\}^{\frac{1}{p}}
+\left\{\sum_{i}|Q_{i}|^{1-p\alpha}\left[
\fint_{Q_{i}}\lf|P^{(s)}_{Q_{i}}(|f|)\r|^{q}\right]
^{\frac{p}{q}}\right\}^{\frac{1}{p}}\\
&\quad\leq
\fRM+\c \left\{\sum_{i}|Q_{i}|^{1-p\alpha}\left[
\fint_{Q_{i}}\lf|f\r|\right]
^{p}\right\}^{\frac{1}{p}}\\
&\quad\leq\fRM+\c \left\{\sum_{i}|Q_{i}|^{1-p\alpha}\left[
\fint_{Q_{i}}\lf|f\r|^{q}\right]
^{\frac{p}{q}}\right\}^{\frac{1}{p}}\\
&\quad
\leq \lf[1+\c\r]\fRM,
\end{align*}
which implies that
the second inequality of \eqref{s2prop1eq1} holds true.
Therefore, \eqref{s2prop1eq1} holds true,
which completes the proof of Proposition \ref{s2prop1}.
\end{proof}
\begin{remark}\label{s2rmk4}
Let $p\in(1,\fz)$ and $Q$ denote any given cube of $\rn$.
Then we claim that
$$RM_{p,1,0}(Q)\subsetneqq \wz{JN}_{(p,1,0)_{0}}(Q)
\subsetneqq JN_{(p,1,0)_{0}}(Q).$$
Indeed, by \cite[Proposition 1]{tyyBJMA}, we have
$RM_{p,1,0}(Q)=L^{p}(Q)$.
Moreover, it was proved in \cite[Corollary 4.2]{DHKY18} that there
exists a non-negative function $f\in JN_{(p,1,0)_{0}}(Q)\setminus
L^{p}(Q)$. From
Remark \ref{s2rmk2}(i), we infer that this
non-negative function $f\in\wz{JN}_{(p,1,0)_{0}}(Q)$.
Therefore, we have
\[ f\in\wz{JN}_{(p,1,0)_{0}}(Q)
\setminus L^{p}(Q)=\wz{JN}_{(p,1,0)_{0}}(Q)
\setminus RM_{p,1,0}(Q).\]
Moreover, let $g:=-f\leq 0$. Then we have
$g\in JN_{(p,1,0)_{0}}(Q)$ and
$g^{-}=f\notin L^{p}(Q)=RM_{p,1,0}(Q)$. Thus, from
Theorem \ref{s2thm1} below,
we deduce that
\[g\in JN_{(p,1,0)_{0}}(Q)\setminus \wz{JN}_{(p,1,0)_{0}}(Q).\]
Therefore, the above claim holds true.
\end{remark}
Now, we state the first main result of this article.
\begin{theorem}\label{s2thm1}
Let $p,q\in[1,\infty]$, $s\in\zp$,
and $\alpha \in\rr$. Then $f\in\njn$ if and only if
$f\in\jn$ and $f^{-}\in\Rm$. Moreover, for any
$f\in L^q_\loc(\xx)$,
$$\|f\|_{\njn}\sim \lf[\|f\|_{\jn}+\|f^{-}\|_{\Rm}\r]$$
with the positive equivalence constants
depending only on both $s$ and $n$.
\end{theorem}
\begin{proof}
Let $p$, $q$, $s$, and $\az$ be the same as in the present theorem.
We only consider the case $p<\fz$ because the case $p=\fz $ can
be similarly proved.
We first claim that $\|(\cdot)^{-}\|_{\Rm}
\lesssim \|\cdot\|_{\njn}$.
Indeed, for any cube $Q\subset\xx$ and any $f\in \lql$,
from the linearity of $P^{(s)}_{Q}$, $P^{(s)}_{Q}
(P^{(s)}_{Q}(|f|))=P^{(s)}_{Q}(|f|)$, and \eqref{s1eq2}, we deduce that
\begin{align}\label{s2thm1eq1}
\lf|2P^{(s)}_{Q}(f^{-})\r|&=\lf|P^{(s)}_{Q}(|f|-f)\r|
=\lf|P^{(s)}_{Q}(|f|)-P^{(s)}_{Q}(f)\r|=\lf|P^{(s)}_{Q}
\lf(P^{(s)}_{Q}(|f|)\r)-P^{(s)}_{Q}(f)\r|\\
&=\lf|P^{(s)}_{Q}\lf(P^{(s)}_{Q}(|f|)-f\r)\r|\leq
\c\fint_{Q}\lf|P^{(s)}_{Q}(|f|)-f\r|.\notag
\end{align}
Moreover, by \eqref{s1eq1}, we obtain
\[\fint_{Q}|f^{-}|=\fint_{Q}f^{-}=\fint_{Q}P^{(s)}_{Q}(f^{-})\leq
\fint_{Q}\lf|P^{(s)}_{Q}(f^{-})\r|\]
Therefore, for any $f\in\njn$ and any interior pairwise disjoint
cubes $\qi$ of $\xx$, from this, \eqref{s2thm1eq1},
and the H\"{o}lder inequality, it follows that
\begin{align*}
&\left\{\sum_{i}|Q_{i}|^{1-p\alpha}\left[ \fint_{Q_{i}}|f^{-}|
\right]^{p}\right\}^{\frac{1}{p}}\\
&\quad\leq\left\{\sum_{i}|Q_{i}|^{1-p\alpha}
\left[ \left\{\fint_{Q_{i}}
\lf|P^{(s)}_{Q_{i}}(f^{-})\r|\right\}
\right]^{p}\right\}^{\frac{1}{p}}\\
&\quad\leq\frac{\c}{2}\left\{\sum_{i}|Q_{i}|^{1-p\alpha}\left[
\fint_{Q_{i}}\lf|f-P^{(s)}_{Q_{i}}(|f|)\r|
\right]^{p}\right\}^{\frac{1}{p}}\\
&\quad\leq\frac{\c}{2}\left\{\sum_{i}|Q_{i}|^{1-p\alpha}\left[
\left\{\fint_{Q_{i}}\lf|f-P^{(s)}_{Q_{i}}(|f|)\r|^{q}\right\}
^{\frac{1}{q}}\right]^{p}\right\}^{\frac{1}{p}}\\
&\quad\leq\frac{\c}{2}\fnjn<\fz,
\end{align*}
which implies that
\begin{equation}\label{s2thm1eq02}
\|f^{-}\|_{\Rm}\leq\frac{\c}{2}\fnjn<\fz
\end{equation}
and hence $f^{-}\in\Rm$. This shows that the above claim
holds true.
Moreover, using Proposition \ref{s2prop1}, we find that $f\in\jn$
and $$\|\cdot\|_{\jn}\lesssim\|\cdot\|_{\njn}.$$
To sum up,
$ \lf[\|\cdot\|_{\jn}+\|(\cdot)^{-}\|_{\Rm}\r]\lesssim
\|\cdot\|_{\njn}$ holds true.
It remains to prove
$ \|\cdot\|_{\njn}\lesssim
\lf[\|\cdot\|_{\jn}+\|(\cdot)^{-}\|_{\Rm}\r]$.
For any $f\in \jn$ with $f^{-}\in\Rm$,
and any interior pairwise
disjoint cubes $\qi$ of $\xx$,
from the Minkowski inequality, the linearity of $P^{(s)}_{Q_{i}}$, and \eqref{s1eq2},
we deduce that
\begin{align*}
&\left\{\sum_{i}|Q_{i}|\left[ |Q_{i}|^{-\alpha}\left\{\fint_{Q_{i}}
\lf|f-P^{(s)}_{Q_{i}}(|f|)\r|^{q}
\right\}^{\frac{1}{q}}\right]^{p}\right\}^{\frac{1}{p}}\\
&\quad\leq \left\{\sum_{i}|Q_{i}|^{1-p\alpha}
\left[ \left\{\fint_{Q_{i}}
\lf|f-P^{(s)}_{Q_{i}}(f)\r|^{q}\right\}
^{\frac{1}{q}}+\left\{\fint_{Q_{i}}\lf|P^{(s)}_{Q_{i}}(f)-P^{(s)}
_{Q_{i}}(|f|)\r|^{q}\right\}^{\frac{1}{q}}\right]^{p}\right\}
^{\frac{1}{p}}\\
&\quad=\left\{ \sum_{i}|Q_{i}|^{1-p\alpha}\left[
\left\{\fint_{Q_{i}}\lf|f-P^{(s)}_{Q_{i}}(f)\r|^{q}\right\}
^{\frac{1}{q}}+2\left\{\fint_{Q_{i}}\lf|P^{(s)}_{Q_{i}}(f^{-})\r|
^{q}\right\}^{\frac{1}{q}}\right]^{p}\right\}
^{\frac{1}{p}}\\
&\quad\leq\left[\sum_{i}|Q_{i}|^{1-p\alpha}\left\{
\fint_{Q_{i}}\lf|f-P^{(s)}_{Q_{i}}(f)\r|^{q}\right\}
^{\frac{p}{q}}\right]^{\frac{1}{p}}\\
&\quad \quad+2\left[\sum_{i}|Q_{i}|
^{1-p\alpha}\left\{\fint_{Q_{i}}\lf|P^{(s)}_{Q_{i}}(f^{-})\r|
^{q}\right\}^{\frac{p}{q}}\right]^{\frac{1}{p}}\\
&\quad\leq\fjn+2\c\left[\sum_{i}|Q_{i}|^{1-p\alpha}\left\{
\fint_{Q_{i}}|f^{-}|\right\}^{p}
\right]^{\frac{1}{p}}\\
&\quad\leq\fjn+2\c\|f^{-}\|_{\Rm}<\fz,
\end{align*}
which further implies that
\begin{equation}\label{s2thm1eq03}
\fnjn\leq\fjn+2\c\|f^{-}\|_{\Rm}<\fz
\end{equation}
and hence $f\in \njn$. This shows that
$$ \|\cdot\|_{\njn}\lesssim
\lf[\|\cdot\|_{\jn}+\|(\cdot)^{-}\|_{\Rm}\r],$$
which completes the proof of Theorem \ref{s2thm1}.
\end{proof}
\begin{remark}\label{s2rmk5}
We have the following observations on Theorem \ref{s2thm1}.
\begin{enumerate}[(i)]
\item This theorem gives an equivalent characterization of $\njn$.
\item Let $p\in(1,\fz)$, $q\in[p,\fz)$, $\az=0$, $s\in\zp$,
and $Q_{0}$ be a
cube of $\rn$. By Remark \ref{s2rmk3}(iii), we have
$$RM_{p,1,0}(Q_{0})=L^{p}(Q_{0})\supset L^{q}(Q_{0})
=L^{q}_{\rm loc}(Q_{0})\supset JN_{(p,q,s)_{0}}(Q_{0}).$$
For any $f\in JN_{(p,q,s)_{0}}(Q_{0})$, from this,
we deduce that $f^{-}\in RM_{p,1,0}(Q_{0})$. By this
and Theorem \ref{s2thm1}, we have
$$\wz{JN}_{(p,q,s)_{0}}(Q_{0})=JN_{(p,q,s)_{0}}(Q_{0}).$$
From this and \cite[Proposition 2.5]{tyyNA}, it follows that
\[|Q_{0}|^{-\frac{1}{p}}\njq=|Q_{0}|^{-\frac{1}{p}}\jq
=L^{q}(Q_{0},|Q_{0}|^{-1}dx)
/\mathcal{P}_{s}(Q_{0}).\]
\item Let $p,q\in[1,\fz)$, $s\in \zp$,
$\az\in(\frac{s+1}{n},\fz)$, and $Q_{0}$ be a cube of $\rn$.
Using both \cite[Proposition 2.9]{tyyNA} and
\cite[Lemma 3.1]{BBP15}, we have $\jq= \mathcal{P}_{s}(Q_{0})$.
Moreover,
by Remark \ref{s2rmk3}, we find that
$RM_{p,1,\az}(Q_{0})=\{0\}$.
Therefore, combining these and Theorem \ref{s2thm1},
we obtain
$$\wz{JN}_{(p,q,s)_{\az}}(Q_{0})
=\lf\{f\in\mathcal{P}_{s}(Q_{0}):f\geq 0\r\}.$$
\item Observe that $\mathcal{C}_{0,1,0}(\xx)=\BMO(\xx)$
and also that $RM_{\fz,1,0}=L^{\fz}(\xx)$ due to Remark \ref{s2rmk3}.
From these and Theorem \ref{s2thm1}, we deduce that
$f\in \wz{\mathcal{C}}_{0,1,0}(\xx)$ if and only if
$f\in \BMO(\xx)$ and $f^{-}\in L^{\fz}(\xx)$.
This coincides with \cite[Theorem 3.5]{WS22}.
\end{enumerate}
\end{remark}
\section{Basic Properties and Characterizations
via Maximal Functions\label{s3}}
In this section, we first give some basic properties of the spaces $\njn$
and then characterize them when $s=0$ via both maximal
functions and their commutators.
\begin{proposition}\label{s3prop2}
Let $p,q\in[1,\infty]$, $s\in \zp$, and $\alpha \in\rr$.
Then
\begin{enumerate}[\rm(i)]
\item for any $\widetilde{p}\in[p,\fz]$,
$\widetilde{JN}_{(\widetilde{p},q,s)_{\alpha}}(Q_0)
\subset
\widetilde{JN}_{(p,q,s)_{\alpha}}(Q_0)$ and
$$|Q_0|^{-1/p}
\|\cdot\|_{\widetilde{JN}_{(p,q,s)_{\alpha}}(Q_0)}
\le
|Q_0|^{-1/\widetilde{p}}
\|\cdot\|_{\widetilde{JN}_{(\widetilde{p},q,s)_{\alpha}}(Q_0)};$$
\item for any $\widetilde{q}\in[q,\fz]$,
$\widetilde{JN}_{(p,\widetilde{q},s)_{\alpha}}(\xx)
\subset
\widetilde{JN}_{(p,q,s)_{\alpha}}(\xx)$ and
$$\|\cdot\|_{\widetilde{JN}_{(p,q,s)_{\alpha}}(\xx)}
\le
\|\cdot\|_{\widetilde{JN}_{(p,\widetilde{q},s)_{\alpha}}(\xx)};$$
\item $\njnsp\subset\njn$ and
\begin{equation}\label{s3prop2eq00}
\|\cdot\|_{\njnsp}\leq\lf\{\lf[1+C_{(s+1)}\r]\lf[1+\c\r]+\c C_{(s+1)}
\r\}\|\cdot\|_{\njn},
\end{equation}
where $\c\in[1,\fz)$ is the same as in \eqref{s1eq2}.
\end{enumerate}
\end{proposition}
\begin{proof}
First, (i) follows from the Jensen inequality
and (ii) follows from the H\"older inequality;
we omit the details here.
It remains to prove (iii) of the present proposition.
To this end, it suffices to show that
\eqref{s3prop2eq00} holds true.
We only consider the case $p<\fz$ because the case $p=\fz $ can
be similarly proved.
Let $p\in[1,\infty)$, $q\in[1,\infty]$,
and $\alpha \in\rr$.
For any $s\in \zp$, we claim that
\begin{equation}\label{s3prop1eq00}
\|\cdot\|_{\jnsp}\leq\lf[1+C_{(s+1)}\r]\|\cdot\|_{\jn}.
\end{equation}
Indeed, for any $f\in \lql$ and any interior pairwise
disjoint cubes $\qi$
of $\xx$, by the Minkowski inequality,
$P^{(s)}_{Q_{i}}(f)=P^{(s+1)}_{Q_{i}}P^{(s)}_{Q_{i}}(f)$, the linearity
of $P^{(s+1)}_{Q_{i}}$, and \eqref{s1eq2}, we have
\begin{align*}
&\left\{\sum_{i}|Q_{i}|\left[ |Q_{i}|^{-\alpha}\left\{\fint_{Q_{i}}
\lf|f-P^{(s+1)}_{Q_{i}}(f)\r|^{q}
\right\}^{\frac{1}{q}}\right]^{p}\right\}^{\frac{1}{p}}\\
&\quad\leq \left\{\sum_{i}|Q_{i}|^{1-p\alpha}
\left[ \left\{\fint_{Q_{i}}
\lf|f-P^{(s)}_{Q_{i}}(f)\r|^{q}\right\}
^{\frac{1}{q}}\right]^{p}\right\}
^{\frac{1}{p}}\\
&\qquad+\left\{\sum_{i}|Q_{i}|^{1-p\alpha}
\left[\left\{\fint_{Q_{i}}\lf|P^{(s)}_{Q_{i}}(f)
-P^{(s+1)}
_{Q_{i}}(f)\r|^{q}\right\}^{\frac{1}{q}}\right]^{p}\right\}
^{\frac{1}{p}}\\
&\quad\le\fjn+\left\{\sum_{i}|Q_{i}|^{1-p\alpha}\left[\left\{\fint_{Q_{i}}\lf|P^{(s+1)}
_{Q_{i}}\lf(f-P^{(s)}_{Q_{i}}(f)
\r)\r|^{q}\right\}^{\frac{1}{q}}\right]^{p}\right\}
^{\frac{1}{p}}\\
&\quad\leq\fjn+\left\{\sum_{i}|Q_{i}|^{1-p\alpha}
\left[C_{(s+1)}\left\{\fint_{Q_{i}}
\lf|f-P^{(s)}_{Q_{i}}(f)\r|\right\}\right]^{p}\right\}
^{\frac{1}{p}}\\
&\quad\leq\fjn+C_{(s+1)}\left\{\sum_{i}|Q_{i}|^{1-p\alpha}
\left[ \left\{\fint_{Q_{i}}
\lf|f-P^{(s)}_{Q_{i}}(f)\r|^{q}\right\}
^{\frac{1}{q}}\right]^{p}\right\}
^{\frac{1}{p}}\\
&\quad\leq\lf[1+C_{(s+1)}\r] \fjn,
\end{align*}
which implies that the above claim \eqref{s3prop1eq00} holds true.
Now, for any $s\in \zp$ and $f\in\lql$, from \eqref{s2thm1eq03}, the above claim,
Proposition \ref{s2prop1},
and \eqref{s2thm1eq02}, we deduce that
\begin{align*}
\|f\|_{\njnsp}&\leq\|f\|_{\jnsp}+2C_{(s+1)}\|f^{-}\|_{\Rm}\\
&\leq\lf[1+C_{(s+1)}\r]\fjn+2C_{(s+1)}\|f^{-}\|_{\Rm}\\
&\leq\lf\{\lf[1+C_{(s+1)}\r]\lf[1+\c\r]+\c C_{(s+1)}\r\}\|f\|_{\njn},
\end{align*}
which implies that \eqref{s3prop2eq00} holds true.
This finishes the proof of Proposition \ref{s3prop2}.
\end{proof}
\begin{proposition}\label{s3prop1}
Let $\az\in\rr$, $q\in[1,\fz)$, and $s\in\zp$. Then, for any
$$f \in \bigcup_{r\in [1,\infty)}\bigcap_{p\in [r,\infty)}\njn,$$
it holds true that
\[\lim_{p\rightarrow\fz}\fnjn=\fncx.\]
\end{proposition}
\begin{proof}
Let $\az$, $q$, and $s$ be the same as in the present proposition.
Let $\qw$ be a cube of $\xx$ and $\qi$ a collection of
interior pairwise disjoint cubes of $\xx$ which contains
$\qw$ as its element. Then, for any $p\in[1,\fz)$ and
$f\in L^{q}_{\rm loc}(\xx)$,
\begin{align*}
\fnjn
&\geq\left\{\sum_{i}|Q_{i}|\left[|Q_{i}|^{-\alpha}\lf\{\fint_{Q_{i}}
\lf|f-P^{(s)}_{Q_{i}}(|f|)\r|^{q}\r\}^{\frac{1}{q}}
\right]^{p}\right\}
^{\frac{1}{p}} \\
&\geq \lf|\widetilde{Q}\r|^{\frac{1}{p}}
\lf|\widetilde{Q}\r|^{-\alpha}\left[
\fint_{\widetilde{Q}}\lf|f-P^{(s)}_{\widetilde{Q}}(|f|)\r|^{q}\right]
^{\frac{1}{q}}.
\end{align*}
Thus,
\[
\liminf_{p\rightarrow
\infty}\|f\|_{\njn}\geq
\lf|\widetilde{Q}\r|^{-\alpha}\left[
\fint_{\widetilde{Q}}\lf|f-P^{(s)}_{\widetilde{Q}}(|f|)\r|^{q}\right]
^{\frac{1}{q}}.
\]
By the arbitrariness of $\qw$, we obtain
$\liminf_{p\rightarrow \infty}\fnjn\geq \fncx$ for any
$f\in L^{q}_{\rm loc}(\xx)$.
Now, let $f \in \bigcup_{r\in [1,\infty)}\bigcap_{p\in
[r,\infty)}\njn$. Then there exists some $r_{0}\in[1,\fz)$
such that $f\in\njn$ for any $p\in[r_{0},\fz)$. We now show that
\begin{equation}\label{s3prop1eq1}
\limsup_{p\rightarrow\fz}\fnjn\leq\fncx.
\end{equation}
Indeed, if $\fncx=\fz$, then \eqref{s3prop1eq1} holds true trivially.
If $\fncx$ is finite, then, without loss of generality, we may assume
$\fncx=1$ because $\|\cdot\|_{\njn}$ and
$\|\cdot\|_{\ncx}$ are positively homogeneous.
Then, for any $p\in[r_{0},\fz)$, we have
\begin{align*}
\|f\|^{p}_{\njn} &=\sup \sum_{i}|Q_{i}|\left\{
|Q_{i}|^{-\alpha}\lf[\fint_{Q_{i}}\lf|f-P^{(s)}_{Q_{i}}(|f|)\r|
^{q}\r]
^{\frac{1}{q}}\right\}^{p} \\
&\leq \sup \sum_{i}|Q_{i}|\left\{
|Q_{i}|^{-\alpha}\lf[\fint_{Q_{i}}\lf|f-P^{(s)}_{Q_{i}}(|f|)\r|
^{q}\r]
^{\frac{1}{q}}\right\}^{r_{0}}
\leq \|f\|^{r_{0}}_{\njn},
\end{align*}
where the suprema are taken over all the collections of interior
pairwise disjoint cubes $\qi$ of $\xx$ and the first inequality
holds true because
$$|Q_{i}|^{-\alpha}\lf\{\fint_{Q_{i}}
\lf|f-P^{(s)}_{Q_{i}}(|f|)\r|^{q}\r\}
^{\frac{1}{q}}\leq\fncx=1.$$
Letting $p\rightarrow\fz$, we then obtain
\[\limsup_{p\rightarrow\fz}\fnjn\leq1=\fncx,\]
and hence \eqref{s3prop1eq1} holds true.
This finishes the proof of Proposition \ref{s3prop1}.
\end{proof}
\begin{remark}\label{s3rmk1}
Let $\az$, $q$, and $s$ be the same as in Proposition
\ref{s3prop1}. From Proposition
\ref{s3prop1}, it follows that,
if \[f \in \bigcup_{r\in [1,\infty)}\bigcap_{p\in [r,\infty)}
\njn \quad
\text{and} \quad \liminf_{p\rightarrow \infty}\fnjn<\fz,\] then
\[f\in\ncx \quad\text{and} \quad \fncx=\lim_{p\rightarrow\fz}\fnjn.\]
\end{remark}
\begin{corollary}\label{s3cor1}
Let $q\in[1,\fz)$, $\az\in\rr$, $s\in\zp$, and $\q$ be a cube of
$\rn$. Then
\[\ncq=\lf\{f\in\bigcap_{p\in[1,\fz)}\njq:\ \lim_{p\rightarrow\fz}
\fnjq<\fz\r\}\]
and, for any $f\in\ncq$,
\[\fncq=\lim_{p\rightarrow\fz}\fnjq.\]
\end{corollary}
\begin{proof}
Let $q$, $\az$, and $s$ be the same as in the present corollary.
For any given $$f\in\bigcap_{p\in[1,\fz)}\njq\subset\bigcup_{r\in
[1,\infty)}\bigcap_{p\in [r,\infty)}\njq $$ with
$\lim_{p\rightarrow\fz}\fnjq<\fz$, by Remark \ref{s3rmk1},
we find that $f\in\ncq$ and $\|f\|_{\ncq}=\lim_{p\rightarrow\fz}\fnjq$.
Conversely, for any given $f\in\ncq=\wz{JN}_{(\fz,q,s)_{\az}}(Q_0)$,
from Proposition \ref{s3prop2}(i), it follows that
$f\in\njq$ for any $p\in[1,\fz)$,
which implies that
$$f\in\bigcap_{p\in[1,\fz)}\njq\subset\bigcup_{r\in
[1,\infty)}\bigcap_{p\in [r,\infty)}\njq .$$
Therefore, by Proposition \ref{s3prop1}, we obtain
\[\lim_{p\rightarrow\fz}\fnjq=\fncq<\fz.\]
This finishes the proof of Corollary \ref{s3cor1}.
\end{proof}
\begin{proposition}\label{s3prop4}
Let $1\leq q<p\leq \fz$, $s\in\zp$, and $\az\in[0,\fz)$.
Then
\[\njn=\wz{JN}_{(p,1,s)_{\az}}(\xx) \quad\text{and} \quad
\|\cdot\|_{\njn}\sim\|\cdot\|_{\wz{JN}_{(p,1,s)_{\az}}(\xx)}.\]
\end{proposition}
\begin{proof}
Let $p$, $q$, $s$, and $\az$ be the same as the present
proposition. We only consider the case $p<\fz$
because the case $p=\fz $ can be similarly proved.
By \cite[Proposition 4.1]{tyyNA}, we have
$\jn=JN_{(p,1,s)_{\az}}(\xx)$ with equivalent norms. From this
and Theorem \ref{s2thm1}, we deduce that,
for any $f\in\wz{JN}_{(p,1,s)_{\az}}(\xx)$,
\begin{align*}
\fnjn&\sim \fjn+\|f^{-}\|_{\Rm}\\
&\sim \|f\|_{JN_{(p,1,s)_{\az}}(\xx)}+\|f^{-}\|_{\Rm}
\sim \|f\|_{\wz{JN}_{(p,1,s)_{\az}}(\xx)}<\fz.
\end{align*}
This shows that $\wz{JN}_{(p,1,s)_{\az}}(\xx)\subset\njn $ and
$\|\cdot\|_{\njn}\lesssim\|\cdot\|_{\wz{JN}_{(p,1,s)_{\az}}(\xx)}$.
On the other hand, for any $f\in\njn$, by the H\"{o}lder
inequality, we have
\[\|f\|_{\wz{JN}_{(p,1,s)_{\az}}(\xx)}\lesssim\fnjn.\]
This shows that $\njn\subset\wz{JN}_{(p,1,s)_{\az}}(\xx) $ and
$\|\cdot\|_{\wz{JN}_{(p,1,s)_{\az}}(\xx)}\lesssim\|\cdot\|_{\njn}$,
which completes the proof of Proposition \ref{s3prop4}.
\end{proof}
\begin{remark}
Let $\az=0=s$ and $q\in[1,\fz)$. By Proposition
\ref{s3prop4}, we have
$$\wz{\mathcal{C}}_{0,q,0}(Q_{0})
=\wz{\mathcal{C}}_{0,1,0}(Q_{0})
\quad\text{and}\quad
\|\cdot\|_{\wz{\mathcal{C}}_{0,q,0}(Q_{0})}
\sim\|\cdot\|_{\wz{\mathcal{C}}_{0,1,0}(Q_{0})}.$$
This coincides with \cite[Theorem 3.3]{WS22}.
\end{remark}
\begin{remark}
From Remark \ref{s2rmk5}(iii), we deduce that
$\njnaq=\wz{JN}_{(q,q,s)_{0}}(Q_{0})$ for any given $p\in(1,\fz)$,
$q\in[p,\fz)$, and $s\in\zp$. By this and Proposition
\ref{s3prop4}, we conclude that, for any $p\in(1,\fz)$
and $s\in\zp$,
\[\njnaq=
\begin{cases}
\wz{JN}_{(p,1,s)_{0}}(Q_{0}),&q\in[1,p),\\
\wz{JN}_{(q,q,s)_{0}}(Q_{0}),&q\in [p,\fz).
\end{cases}
\]
Moreover, from Proposition \ref{s3prop2}(i),
it follows that, for any given $p\in[1,\fz]$, $q\in[p,\fz]$,
$s\in\zp$, $\az\in\rr$, and
any given cube $Q_{0}$ of $\rn$,
we have
\[\wz{JN}_{(q,q,s)_{\az}}(Q_{0})\subset \njq \quad
\text{and}\quad
|Q_{0}|^{-\frac{1}{p}}\|\cdot\|_{\wz{JN}_{(q,q,s)_{\az}}(Q_{0})}
\leq |Q_{0}|^{-\frac{1}{q}}\|\cdot\|_{\njq}.\]
\end{remark}
Now, we further investigate the case $s=0$
because, in this case, $P^{(0)}_{Q}(|f|)=|f|_{Q}$
is closely connected with the maximal function $\mathcal{M}_Q(f)$.
To this end, we first establish the following
equivalent characterization.
\begin{proposition}\label{s3prop3}
Let $p,q\in[1,\infty]$ and $\alpha \in\rr$. Then
$f\in\njns$ if and only if $f\in\lql$ and
\begin{equation}\label{s3prop3eq00}
\sup\lf\{\sum_{i}|Q_{i}|^{1-p\az}\inf_{c\in [0,\fz)}
\|f-c\|_{L^{q}(Q_{i},|Q_{i}|^{-1}dx)}^{p}\r\}^{\frac{1}{p}}<\fz,
\end{equation}
where the infimum is taken over all non-negative real number
and the supremum is taken over all the collections of
interior pairwise disjoint cubes $\qi$ of $\xx$.
Moreover, for any $f\in L^q_\loc(\xx)$, $\|f\|_{\njns}\sim$ the left-hand side
of \eqref{s3prop3eq00} with the positive equivalence constants
independent of $f$.
\end{proposition}
\begin{proof}
Since the case $p=\fz$ was obtained in \cite[Theorem 3.6]{WS22},
it suffices to consider the case $p\in[1,\fz)$.
We first show that ``only if'' part. For any cube $Q\subset\xx$, by
$P^{(0)}_{Q}(|f|)=|f|_{Q}\geq 0$, we conclude that
\[\inf_{c\in [0,\fz)}\|f-c\|_{L^{q}(Q,|Q|^{-1}dx)}
=\inf_{c\in [0,\fz)}
\lf[\fint_{Q}|f-c|^{q}\r]^{\frac{1}{q}}\leq\lf[
\fint_{Q}\lf|f-|f|_{Q}\r|^{q}\r]^{\frac{1}{q}}. \]
Therefore, for any $f\in\njns\subset \lql$, we have
\begin{align}\label{s3prop3eq1}
&\sup\lf\{\sum_{i}|Q_{i}|^{1-p\az}\inf_{c\in [0,\fz)}
\|f-c\|_{L^{q}(Q_{i},|Q_{i}|^{-1}dx)}^{p}\r\}^{\frac{1}{p}}\\
&\quad\leq \sup\lf\{ \sum_{i}|Q_{i}|\lf[ |Q_{i}|^{-\alpha}
\lf\{\fint_{Q_{i}}\lf|f-|f|_{Q}\r|^{q}\r\}^{\frac{1}{q}}\r]
^{p}\r\}^{\frac{1}{p}}
=\|f\|_{\njns}<\fz.\notag
\end{align}
Next, we show that ``if'' part. Let $Q$ denote any cube of
$\xx$. Then, for any given
$f\in L^{q}(Q)$ and for any $c\in [0,\fz)$, we have
\[\lf|c-|f|_{Q}\r|=\lf||f|_{Q}-c\r|\leq \lf|f_{Q}-c\r|
\leq \fint_{Q}\lf|f-c\r|.\]
From this, the Minkowski inequality,
and the H\"{o}lder inequality, it follows that
\begin{align*}
&\lf[\fint_{Q}\lf|f-|f|_{Q}\r|^{q}\r]^{\frac{1}{q}}\\
&\quad\leq \lf[\fint_{Q}\lf|f- c\r|^{q}\r]^{\frac{1}{q}}
+ \lf[\fint_{Q}\lf| c-|f|_{Q}\r|^{q}\r]^{\frac{1}{q}}
\leq \lf[\fint_{Q}\lf|f- c\r|^{q}\r]^{\frac{1}{q}}
+\fint_{Q}\lf|f- c\r| \\
&\quad\leq \lf[\fint_{Q}\lf|f- c\r|^{q}\r]^{\frac{1}{q}}
+\lf[\fint_{Q}\lf|f- c\r|^{q}\r]^{\frac{1}{q}}
=2\lf[\fint_{Q}\lf|f- c\r|^{q}\r]^{\frac{1}{q}},
\end{align*}
which further implies that
$$\lf[\fint_{Q}\lf|f-|f|_{Q}\r|^{q}\r]^{\frac{1}{q}}
\leq 2\inf_{c\in [0,\fz)}\|f-c\|_{L^{q}(Q,|Q|^{-1}dx)}.$$
By this, we conclude that, for any $f\in \lql$,
\begin{align*}
\|f\|_{\njns}
&=\sup\lf\{ \sum_{i}|Q_{i}|\lf[ |Q_{i}|^{-\alpha}
\lf\{\fint_{Q_{i}}\lf|f-|f|_{Q}\r|^{q}\r\}^{\frac{1}{q}}\r]
^{p}\r\}^{\frac{1}{p}}\\
&\leq\sup\lf\{\sum_{i}|Q_{i}|^{1-p\az}\lf[2\inf_{c\in [0,\fz)}
\|f-c\|_{L^{q}(Q_{i},|Q_{i}|^{-1}dx)}\r]^{p}\r\}^{\frac{1}{p}}\\
&=2\sup\lf\{\sum_{i}|Q_{i}|^{1-p\az}\inf_{c\in [0,\fz)}
\|f-c\|_{L^{q}(Q_{i},|Q_{i}|^{-1}dx)}^{p}\r\}^{\frac{1}{p}}<\fz,
\end{align*}
which implies $f\in \njn$.
This finishes the proof of Proposition \ref{s3prop3}.
\end{proof}
\begin{remark}
\begin{enumerate}[\rm (i)]
\item Proposition \ref{s3prop3} implies that,
for any $c_0\in[0,\fz)$,
$$\|\cdot\|_{\njns}\sim\|\cdot+c_0\|_{\njns}.$$
\item It is still \emph{unclear} whether or not
Proposition \ref{s3prop3} holds true for $s\in\nn$,
namely, whether or not $f\in\njn$ if and only if
$$\sup\lf\{\sum_{i}|Q_{i}|^{1-p\az}
\inf_{\{m\in\mathcal{P}_s(Q):\ m\geq 0\}}
\|f-m\|_{L^{q}(Q_{i},|Q_{i}|^{-1}dx)}^{p}\r\}^{\frac{1}{p}}<\fz.$$
Indeed, the ``if'' part can be similarly proved as
in Proposition \ref{s3prop3}.
But the ``only if'' part is no longer obvious because
$P^{(s)}_Q(|f|)\ge0$ may be false when $s>0$.
For instance, let $Q:=[-1,1]$, $a\in(0,1]$,
and $f(x):=a{\bf 1}_{[0,1/a]}(x)$ for any $x\in Q$.
Then it is easy to find that
$$P^{(1)}_{Q}(|f|)(x)=P^{(1)}_{Q}(f)(x)=\frac{3}{4a}x+\frac{1}{2}$$
and hence $P^{(1)}_{Q}(|f|)(x)<0$ when $x\in[-1,-\frac{2a}{3})$.
\end{enumerate}
\end{remark}
In \cite[Proposition 4]{BMR00}, Bastero et al. showed that
$f\in\BMO (\rn)$ and $f^{-}\in L^{\fz}(\rn)$ if and only if
\[\sup_{Q}\fint_{Q}\lf|f-\mathcal{M}_{Q}(f)\r|^{q}<\fz,\]
where $q\in[1,\fz)$, $\mathcal{M}_{Q}$ is the same as in \eqref{MQ},
and the supremum is taken over all cubes $Q$ of $\xx$.
Correspondingly, we have the following equivalence,
which is the second main result of this article.
\begin{theorem}\label{s3thm1}
Let $1\leq q<p\leq \fz$ and $\az\in[0,\fz)$. Then
$f\in \njns$ if and only if $f\in L^{q}_{\rm loc}(\xx)$ and
\begin{equation}\label{s3thm1eq0}
\sup\lf\{ \sum_{i}|Q_{i}|\lf[ |Q_{i}|^{-\alpha}
\lf\{\fint_{Q_{i}}\lf|f-\mathcal{M}_{Q_{i}}(f)\r|^{q}\r\}
^{\frac{1}{q}}\r]
^{p}\r\}^{\frac{1}{p}}<\fz,
\end{equation}
where the supremum is taken over all the collections of
interior pairwise disjoint cubes $\qi$ of $\xx$.
Moreover, for any $f\in L^q_\loc(\xx)$, $\|f\|_{\njns}\sim$ the left-hand
side of \eqref{s3thm1eq0} with the positive equivalence
constants independent of $f$.
\end{theorem}
\begin{proof}
We first show that ``only if'' part by considering the following
two cases.
Case (i)$_1$ $1<q<p\leq\fz$. In the case,
for any cube $Q$ of $\xx$ and
for any non-negative constant $c$, we have
\begin{equation}\label{s3propeq003}
\lf[\fint_{Q}\lf|f-\mathcal{M}_{Q}(f)\r|^{q}\r]^\frac{1}{q}
\leq \lf[\fint_{Q}\lf|f-c\r|^{q}\r]^\frac{1}{q}
+\lf[\fint_{Q}\lf|c-\mathcal{M}_{Q}(f)\r|^{q}\r]^\frac{1}{q}.
\end{equation}
In addition, from $c\ge 0$, it follows that, for any $x\in Q$,
\begin{align*}
\lf|\mathcal{M}_{Q}(f)(x)-c\r|
&=\lf|\sup_{\{\text{cube }Q_\ast:\ x\in Q_\ast\subset Q\}}
\fint_{Q_\ast} |f(y)|\,dy-c\r|\\
&=\lf|\sup_{\{\text{cube }Q_\ast:\ x\in Q_\ast\subset Q\}}
\fint_{Q_\ast} \lf[|f(y)|-c\r]\,dy\r|\\
&\le\sup_{\{\text{cube }Q_\ast:\ x\in Q_\ast\subset Q\}}
\fint_{Q_\ast} \big||f(y)|-c\big|\,dy\\
&\le\sup_{\{\text{cube }Q_\ast:\ x\in Q_\ast\subset Q\}}
\fint_{Q_\ast} \big|f(y)-c\big|\,dy=\mathcal{M}_{Q}(f-c)(x),
\end{align*}
which, together with the boundedness of $\mathcal{M}_{Q}$
on $L^{q}(Q)$
(see, for instance, \cite[Theorem 2.2]{h01}),
further implies that
\begin{equation}\label{s3propeq004}
\lf[\fint_{Q}\lf|\mathcal{M}_{Q}(f)-c\r|^{q}\r]^\frac{1}{q}
\leq \lf[\fint_{Q}\lf|\mathcal{M}_{Q}(f-c)\r|^{q}\r]^\frac{1}{q}
\leq C_{(q,n)} \lf[\fint_{Q}\lf|f-c\r|^{q}\r]^\frac{1}{q},
\end{equation}
where the positive constant $C_{(q,n)}$ depends only on both $q$
and $n$. Thus, by \eqref{s3propeq003}
and \eqref{s3propeq004}, we obtain
\[\lf[\fint_{Q}\lf|f-\mathcal{M}_{Q}(f)\r|^{q}\r]^\frac{1}{q}
\leq \lf[1+C_{(q,n)}\r] \lf[\fint_{Q}\lf|f-c\r|^{q}\r]^\frac{1}{q},\]
which, combined with the arbitrariness of $c\ge0$,
further implies that
\begin{align*}
\lf[\fint_{Q}\lf|f-\mathcal{M}_{Q}(f)\r|^{q}\r]^\frac{1}{q}
&\leq \lf[1+C_{(q,n)}\r] \inf_{c\in [0,\fz)}\lf[\fint_{Q}\lf|f-c\r|^{q}\r]^\frac{1}{q}\\
&=\lf[1+C_{(q,n)}\r]\inf_{c\in [0,\fz)}\|f-c\|_{L^{q}(Q,|Q|^{-1}dx)}.
\end{align*}
From this, it follows that, for any $f\in\njns$ and any interior
pairwise disjoint cubes $\qi$
of $\xx$,
\begin{align*}
&\lf\{ \sum_{i}|Q_{i}|\lf[ |Q_{i}|^{-\alpha}
\lf\{\fint_{Q_{i}}\lf|f-\mathcal{M}_{Q_{i}}(f)\r|^{q}\r\}
^{\frac{1}{q}}\r]
^{p}\r\}^{\frac{1}{p}}\\
&\quad \leq\lf[1+C_{(q,n)}\r]\lf[\sum_{i}|Q_{i}|^{1-p\az}
\inf_{c\in [0,\fz)}\|f-c\|_{L^{q}(Q_{i},|Q_{i}|^{-1}dx)}
^{p}\r]^{\frac{1}{p}}.
\end{align*}
By this and \eqref{s3prop3eq1}, we conclude that
\begin{align*}
&\sup\lf\{ \sum_{i}|Q_{i}|\lf[ |Q_{i}|^{-\alpha}
\lf\{\fint_{Q_{i}}\lf|f-\mathcal{M}_{Q_{i}}(f)\r|^{q}\r\}
^{\frac{1}{q}}\r]
^{p}\r\}^{\frac{1}{p}}\\
&\quad\leq \lf[1+C_{(q,n)}\r]\sup\lf[\sum_{i}|Q_{i}|^{1-p\az}
\inf_{c\in [0,\fz)}\|f-c\|_{L^{q}(Q_{i},|Q_{i}|^{-1}dx)}
^{p}\r]^{\frac{1}{p}}\\
&\quad\leq \lf[1+C_{(q,n)}\r]\|f\|_{\njns}<\fz.
\end{align*}
Case (ii)$_1$ $1=q<p\leq\fz$. In the case, let
$r:=\frac{1+\min\{p,3\}}{2}\in(1,p)
$. Then, by the H\"{o}lder inequality, Case (i)$_1$
with $q$ replaced by $r$, and Proposition
\ref{s3prop4}, we have, for any $f\in \wz{JN}_{(p,1,0)_{\az}}(\xx)$
\begin{align*}
&\sup\lf\{ \sum_{i}|Q_{i}|\lf[ |Q_{i}|^{-\alpha}
\lf\{\fint_{Q_{i}}\lf|f-\mathcal{M}_{Q_{i}}(f)\r|\r\}\r]
^{p}\r\}^{\frac{1}{p}}\\
&\quad \leq \sup\lf\{ \sum_{i}|Q_{i}|\lf[ |Q_{i}|^{-\alpha}
\lf\{\fint_{Q_{i}}\lf|f-\mathcal{M}_{Q_{i}}(f)\r|^{r}\r\}
^{\frac{1}{r}}\r]
^{p}\r\}^{\frac{1}{p}}\\
&\quad\leq \lf[1+C_{(q,n)}\r] \|f\|_{\wz{JN}_{(p,r,0)_{\az}}(\xx)}
\lesssim\|f\|_{\wz{JN}_{(p,1,0)_{\az}}(\xx)}<\fz.
\end{align*}
Combining both Cases (i)$_1$ and (ii)$_1$, we find
that the ``only if'' part holds true.
Next, we show that ``if'' part by considering the following
two cases.
Case (i)$_2$ $1=q<p\leq \fz$. In this case, let
$f\in L^{1}_{\rm loc}(\xx)$, $Q$ be a given cube
of $\xx$, $E:=\lf\{x\in Q:\ f(x)\leq f_{Q}\r\}$, and
$F:=\lf\{x\in Q:\ f(x)> f_{Q}\r\}$. The following equality is
trivially true:
\begin{align}\label{E=F}
\int_{E}|f-f_{Q}|=\int_{F}|f-f_{Q}|.
\end{align}
Combining this and the observation
$f(x)\leq f_{Q}\leq \mathcal{M}_{Q}(f)(x)$ for any $x\in E$,
we obtain
\begin{equation}\label{s3propeq005}
\fint_{Q}\lf|f-f_{Q}\r|=\frac{2}{|Q|}\int_{E}\lf|f-f_{Q}\r|
\leq\frac{2}{|Q|}\int_{E}\lf|f-\mathcal{M}_{Q}(f)\r|
\leq 2\fint_{Q}\lf|f-\mathcal{M}_{Q}(f)\r|.
\end{equation}
Moreover, notice that
$\mathcal{M}_{Q}(f)(x)\geq |f(x)|$ for almost every $x\in Q$.
Thus, we have, for almost every $x\in Q$,
\begin{equation*}
0\leq f^{-}(x)\leq \mathcal{M}_{Q}(f)(x)-f^{+}(x)+f^{-}(x)
=\mathcal{M}_{Q}(f)(x)-f(x),
\end{equation*}
which implies that
\begin{equation}\label{s3propeq006}
f^{-}_{Q}= \fint_{Q}|f^{-}|\leq \fint_{Q}\lf|f-\mathcal{M}_{Q}(f)\r|.
\end{equation}
From \eqref{s3propeq005}
and \eqref{s3propeq006}, it follows that
\[
\fint_{Q}\lf|f-|f|_{Q}\r|=\fint_{Q}\lf|f-f_{Q}-2f^{-}_{Q}\r|
\leq \fint_{Q}\lf|f-f_{Q}\r|+2f^{-}_{Q}
\leq4\fint_{Q}\lf|f-\mathcal{M}_{Q}(f)\r|.
\]
By this, we conclude that,
for any interior pairwise disjoint cubes $\qi$ of $\xx$,
\begin{align*}
&\lf\{ \sum_{i}|Q_{i}|\lf[ |Q_{i}|^{-\alpha}
\lf\{\fint_{Q_{i}}\lf|f-|f|_{Q_{i}}\r|\r\}\r]
^{p}\r\}^{\frac{1}{p}}\\
&\quad\leq 4\lf\{ \sum_{i}|Q_{i}|\lf[ |Q_{i}|^{-\alpha}
\lf\{\fint_{Q_{i}}\lf|f-\mathcal{M}_{Q_{i}}(f)\r|\r\}\r]
^{p}\r\}^{\frac{1}{p}},
\end{align*}
which implies that
\[\|f\|_{\wz{JN}_{(p,1,0)_{\az}}(\xx)}
\leq 4\sup\lf\{ \sum_{i}|Q_{i}|\lf[ |Q_{i}|^{-\alpha}
\lf\{\fint_{Q_{i}}\lf|f-\mathcal{M}_{Q_{i}}(f)\r|\r\}\r]
^{p}\r\}^{\frac{1}{p}}<\fz\]
and hence $f\in \wz{JN}_{(p,1,0)_{\az}}(\xx)$.
Case (ii)$_2$ $1<q<p\leq \fz$. In this case, for any
$f\in L^{q}_{\rm loc}(\xx)$, from Proposition \ref{s3prop4},
Case (i)$_2$,
and the H\"{o}lder inequality, we deduce that
\begin{align*}
&\|f\|_{\njns}\\
&\quad\lesssim\|f\|_{\wz{JN}_{(p,1,0)_{\az}}(\xx)}\\
&\quad\lesssim \sup\lf\{ \sum_{i}|Q_{i}|\lf[ |Q_{i}|^{-\alpha}
\lf\{\fint_{Q_{i}}\lf|f-\mathcal{M}_{Q_{i}}(f)\r|\r\}\r]
^{p}\r\}^{\frac{1}{p}}\\
&\quad\lesssim \sup\lf\{ \sum_{i}|Q_{i}|\lf[ |Q_{i}|^{-\alpha}
\lf\{\fint_{Q_{i}}\lf|f-\mathcal{M}_{Q_{i}}(f)\r|
^{q}\r\}^{\frac{1}{q}}\r]
^{p}\r\}^{\frac{1}{p}}<\fz
\end{align*}
and hence $f\in \njns$.
Combining Cases (i)$_2$ and (ii)$_2$,
we find that the ``if'' part also holds true.
This finishes the proof of Theorem \ref{s3thm1}.
\end{proof}
\begin{remark}\label{rem-q<p}
We prove Theorem \ref{s3thm1} under the assumptions on $p$, $q$, and $\az$ same as
in Proposition \ref{s3prop4}.
This is reasonable because, based on the following two observations,
it is necessary to apply the equivalence of $\njns$ between $q=1$
and $q\in(1,\fz)$ in the proof of Theorem \ref{s3thm1}:
\begin{enumerate}[\rm(i)]
\item The maximal operator is bounded when $q\in(1,\fz)$, but not bounded when $q=1$;
\item The domination of the mean oscillation of functions
by their maximal functions, namely,
\eqref{s3propeq005}, follows essentially from the linearity of
the integral,
namely, \eqref{E=F}. This linearity holds true only when $q=1$.
\end{enumerate}
Indeed, when proving Theorem \ref{s3thm1},
we flexibly change the index $q$ such that
all these $q$ correspond to the same space,
which is just the conclusion of Proposition \ref{s3prop4}.
\end{remark}
In what follows, we still use $\mathcal{M}$ to denote
the Hardy--Littlewood maximal operator on $\xx$
even when $\xx=Q_0$. Namely, for any $f\in L^1(Q_0)$ and $x\in Q_0$,
$$\mathcal{M}(f)(x)
:=\sup_{\{\text{cube }Q_\ast:\
x\in Q_\ast\subset Q_0\}}\fint_{Q_\ast} |f(y)|\,dy.$$
Based on this, even when $\xx=Q_0$, we still use $[b,\mathcal{M}]$
as in \eqref{commutator} to
denote the commutator generated by $\mathcal{M}$ defined on $Q_0$.
\begin{corollary}\label{s3cor2}
Let $p,q\in[1,\fz]$ and $\az\in \rr$.
\begin{enumerate}[\rm(I)]
\item The following three
statements are mutually equivalent:
\begin{enumerate}[\rm(i)]
\item $f\in \njns;$
\item $f\in \jns$ and $f^{-}\in \Rm;$
\item $f\in\lql$ and
\begin{equation}\label{s3cor1eq0}
\sup\lf\{\sum_{i}|Q_{i}|^{1-p\az}\inf_{c\in [0,\fz)}
\|f-c\|_{L^{q}(Q_{i},|Q_{i}|^{-1}dx)}^{p}\r\}^{\frac{1}{p}}<\fz,
\end{equation}
where the supremum is taken over all the collections of
interior pairwise disjoint cubes $\qi$ of $\xx$.
\end{enumerate}
Moreover, for any $f\in L^q_\loc(\xx)$, $\|f\|_{\njns}\sim [\|f\|_{\jns}
+\|f^{-}\|_{\Rm}]\sim$ the left-hand side of \eqref{s3cor1eq0}
with the positive equivalence constants independent of $f$.
\item The following two statements are mutually equivalent:
\begin{enumerate}
\item[\rm (iv)] $f\in L^{q}_{\rm loc}(\xx)$ and
\begin{equation}\label{s3cor1eq1}
\sup\lf\{ \sum_{i}|Q_{i}|\lf[ |Q_{i}|^{-\alpha}
\lf\{\fint_{Q_{i}}\lf|f-\mathcal{M}_{Q_{i}}(f)\r|
^{q}\r\}^{\frac{1}{q}}\r]
^{p}\r\}^{\frac{1}{p}}<\fz,
\end{equation}
where the supremum is taken the same as in {\rm (iii);}
\item[\rm (v)] $f\in\lql$ and
\begin{equation}\label{s3cor1eq2}
\sup\lf\{ \sum_{i}|Q_{i}|\lf[ |Q_{i}|^{-\alpha}
\lf\{\fint_{Q_{i}}\lf|\lf[f,\mathcal{M}\r]({\bf 1}_{Q_{i}})
\r|^{q}\r\}
^{\frac{1}{q}}\r]
^{p}\r\}^{\frac{1}{p}}<\fz,
\end{equation}
where the supremum is taken the same as in {\rm (iii)}.
\end{enumerate}
Moreover, for any $f\in L^q_\loc(\xx)$,
the left-hand sides of both \eqref{s3cor1eq1} and \eqref{s3cor1eq2}
are equivalent with the positive equivalence constants
independent of $f$.
\item If $q<p$ and $\az\ge0$,
then all these five statements in both (I) and (II)
are mutually equivalent and so do the corresponding quantities
with the positive equivalence constants independent of $f$.
\end{enumerate}
\end{corollary}
\begin{proof}
Let $p$, $q$, and $\az$ be the same as in the present corollary.
By Theorem \ref{s2thm1}, we find that (i)
$\Longleftrightarrow$ (ii). From
Proposition \ref{s3prop3}, it follows that
(i) $\Longleftrightarrow$ (iii).
Moreover, Theorem \ref{s3thm1} shows
that (i) $\Longleftrightarrow$ (iv) when $q<p$ and $\az\geq 0$.
Therefore, it suffices to prove (iv) $\Longleftrightarrow$ (v).
Indeed, for any given cube $Q$ of $\xx$ and any $x\in Q$, we have
$$\mathcal{M}_{Q}({\bf 1}_{Q})(x)={\bf 1}_{Q}(x)
\quad\text{and}\quad
\mathcal{M}(f{\bf 1}_{Q})(x)=\mathcal{M}_{Q}(f)(x),$$
and hence, for any $q\in[1,\fz]$,
\begin{align*}
\lf[\fint_{Q}\lf|f-\mathcal{M}_{Q}(f)\r|^{q}\r]^{\frac{1}{q}}
&=\lf[\fint_{Q}\lf|f\mathcal{M}_{Q}({\bf 1}_{Q})
-\mathcal{M}_{Q}(f{\bf 1}_{Q})\r|^{q}
\r]^{\frac{1}{q}}\\
&=\lf[\fint_{Q}\lf|f\mathcal{M}({\bf 1}_{Q})
-\mathcal{M}(f{\bf 1}_{Q})\r|^{q}
\r]^{\frac{1}{q}}\\
&=\lf[\fint_{Q}\lf|\lf[f,\mathcal{M}\r]({\bf 1}_{Q})\r|^{q}\r]
^{\frac{1}{q}}.
\end{align*}
By this, we conclude that
\begin{align*}
&\sup\lf\{ \sum_{i}|Q_{i}|\lf[ |Q_{i}|^{-\alpha}
\lf\{\fint_{Q_{i}}\lf|f-\mathcal{M}_{Q_{i}}(f)\r|
^{q}\r\}^{\frac{1}{q}}\r]
^{p}\r\}^{\frac{1}{p}}\\
&\quad=\sup\lf\{ \sum_{i}|Q_{i}|\lf[ |Q_{i}|^{-\alpha}
\lf\{\fint_{Q_{i}}\lf|\lf[f,\mathcal{M}\r]
({\bf 1}_{Q_{i}})\r|^{q}\r\}
^{\frac{1}{q}}\r]
^{p}\r\}^{\frac{1}{p}},
\end{align*}
which shows the equivalence (iv)
$\Longleftrightarrow$ (v). This finishes
the proof of Corollary \ref{s3cor2}.
\end{proof}
\begin{remark}
Let $p=\fz$ and $\az=0$. In this case, if $q\in(1,\fz)$
and $f\in L^{1}_{\rm loc}(\rn)$ is real-valued, then
the boundedness of $[f,\mathcal{M}]$ on $L^q(\rn)$
is equivalent to that \eqref{s3cor1eq2} holds true,
which was proved by Bastero et al. \cite{BMR00} via
the real interpolation techniques.
\end{remark}
\section{John--Nirenberg-Type Inequality \label{s4}}
In this section, we prove a \emph{good-$\lambda$ inequality}
(namely, Lemma \ref{s4lem2} below) and apply
this good-$\lambda$ inequality to
prove a John--Nirenberg type inequality on $\njq$
(namely, Theorem \ref{s4thm1} below)
via borrowing some ideas from the proof of
\cite[Theorem 4.3]{tyyNA}.
Our main tool is the Calder\'{o}n--Zygmund decomposition.
As an application, we use this John--Nirenberg type inequality
to obtain another proof of Proposition \ref{s3prop4} at
the end of this section.
In what follows, for any given $p\in[1,\fz)$, the
\emph{weak Lebesgue space} $L^{p,\fz}(\xx)$ is defined to be
the set of all the measurable functions $f$ on $\xx$ such that
\[\|f\|_{L^{p,\fz}(\xx)}:=\sup_{\lambda\in(0,\fz)}\lambda
\lf|\lf\{x\in\xx :|f(x)|>\lambda\r\}\r|^{\frac{1}{p}}<\fz.\]
Now, we state the third main result of this article.
\begin{theorem}\label{s4thm1}
Let $p\in(1,\fz)$, $s\in\zp$, $\az \in\rr$, and
$\q$ be a cube of $\rn$. If
$f\in\wz{JN}_{(p,1,s)_{\az}}(\q)$, then
$f-P^{(s)}_{\q}(|f|)\in L^{p,\fz}(\q)$ and there exists a
positive constant $C_{(n,p,s)}$, depending only on
$n$, $p$, and $s$, but independent of $f$, such that
\begin{align}\label{s4thm1eq1}
\lf\|f-P^{(s)}_{\q}(|f|)\r\|_{L^{p,\fz}(\q)}
\leq C_{(n,p,s)}|\q|^{\az}
\|f\|_{\wz{JN}_{(p,1,s)_{\az}}(\q)}.
\end{align}
\end{theorem}
Recall that, for any cube $Q$ and any $\ell\in\zp$,
\begin{align*}
\mathcal{D}^{(\ell)}_{Q}& :=\Big\{(x_{1},\dots,x_{n})\in\rn:
\text{for any }i\in\{1,\dots,n\},\\
&\qquad x_{i}\in\lf[a_{i}+k_{i}
2^{-\ell}l(Q),
a_{i}+(k_{i}+1)2^{-\ell}l(Q)\r]\ \text{with } k_{i}\in\{0,\dots,2^{\ell}-2\} \\
&\qquad\text{or }x_{i}
\lf.\in\lf[a_{i}+(1-2^{-\ell})l(Q),a_{i}+l(Q)\r]\r\},
\end{align*}
where $l(Q)$ denotes the edge length of $Q$
and $(a_{1},\dots,a_{n})$ is a left and lower vertex of $Q$, which
means that, for any $(x_{1},\dots,x_{n})\in Q$, $x_{i}\geq a_{i}$
for any $i\in\{1,\dots,n\}$. Moreover,
the \emph{dyadic family} $\mathcal{D}_{Q}$
on $Q$ is defined by setting
\[\mathcal{D}_{Q}:=\bigcup_{\ell\in\zp}\mathcal{D}^{(\ell)}_{Q}.\]
In what follows, for any cube $Q$ of $\rn$, $\md$
denotes the \emph{dyadic maximal operator} related to
the dyadic family $\mathcal{D}_{Q}$ on $Q$, namely,
for any $f\in L^{1}(Q)$ and $x\in Q$,
\[\md(f)(x):=\sup_{Q_{(x)}\ni x}\fint_{Q_{(x)}}|f(y)|\,dy,\]
where the supremum is taken over all the dyadic cubes
$Q_{(x)}\in \mathcal{D}_{Q}$ containing $x$. The following
Calder\'{o}n--Zygmund decomposition, which is just
\cite[p.150, Lemma 1]{S93}, is
needed
in the proof of Theorem \ref{s4thm1}.
\begin{lemma}\label{s4lem1}
Let $\q$ be a cube of $\rn$, $f\in L^{1}(\q)$, and
$\lambda\geq\fint_{\q}|f|$. Then there exist
disjoint dyadic cubes $\{Q_{k}\}_{k}\subset
\mathcal{D}_{\q}$ such that
\begin{enumerate}[\rm(i)]
\item $\{x\in\q:\mdq(f)(x)>\lambda\}=\bigcup_{k}
Q_{k}$;
\item
\(\lambda<\fint_{Q_{k}}|f|\leq2^{n} \lambda\)
\ \ for any $k\in\nn$;
\item \(|\{x\in\q:\mdq(f)(x)>\lambda\}|\leq
\frac{1}{\lambda}\int_{\{x\in\q:\mdq(f)(x)>\lambda\}}
|f|;\)
\item $f(x)\leq\lambda$ for almost every
$x\in\q\setminus \bigcup_{k}Q_{k}$.
\end{enumerate}
\end{lemma}
Now, we prove Theorem \ref{s4thm1} via beginning with the
following \emph{good-$\lambda$ inequality}. We borrow some
ideas from the proof of \cite[Lemma 4.5]{ABKY11}
(see also \cite[Lemma 4.6]{tyyNA})
with suitable
modifications.
\begin{lemma}\label{s4lem2}
Let $p\in(1,\fz)$, $s\in \zp$, $\c\in[1,\fz)$ be the same
as in \eqref{s1eq2},
$\theta\in(0,2^{-n}\c^{-1})$, $\q$ be a
cube of $\rn$, and $f\in\njnqq$. Then, for any
$\lambda\geq\frac{1}{\theta}\fint_{\q}|f-P^{(s)}_{\q}(|f|)|$,
\begin{align}\label{s4lem2eq1}
&\lf|\lf\{x\in\q:\mdq\lf(f-P^{(s)}_{\q}(|f|)\r)(x)>\lambda\r\}\r|\\
&\quad \leq\frac{1+\c}{1-2^{n}\theta\c}
\frac{\|f\|_{\njnqq}}{\lambda}
\lf|\lf\{x\in\q:\mdq\lf(f-P^{(s)}_{\q}(|f|)\r)(x)
>\theta\lambda\r\}\r|
^{\frac{1}{p'}},\notag
\end{align}
where
$p'$ denotes the \emph{conjugate index} of $p$, that is,
$p'$ satisfies $1/p+1/p'=1$.
\end{lemma}
\begin{proof}
Let all symbols be the same as in the present lemma.
Applying Lemma \ref{s4lem1} to $f-P^{(s)}_{\q}(|f|)$ on $\q$
at height
$\theta\lambda$, we find interior pairwise disjoint dyadic
cubes $\{Q_{k}\}_{k}\subset\mathcal{D}_{\q}$ such that
$$\lf\{x\in\q:\mdq\lf(f-P^{(s)}_{\q}(|f|)\r)(x)
>\theta\lambda\r\}=\bigcup_{k}
Q_{k}.$$
Since $\theta<2^{-n}\c^{-1}<1$, it follows that
\begin{equation*}
\lf\{x\in\q:\mdq\lf(f-P^{(s)}_{\q}(|f|)\r)(x)>\lambda\r\}
\subset\lf\{x\in\q:\mdq\lf(f-P^{(s)}_{\q}(|f|)\r)(x)
>\theta\lambda\r\}
\end{equation*}
and hence
\begin{align}\label{s4lem2eq2}
&\lf\{x\in\q:\mdq\lf(f-P^{(s)}_{\q}(|f|)\r)(x)>\lambda\r\}\\
&\quad=\bigcup_{k}\lf\{x\in Q_{k}:\mdq\lf(f-P^{(s)}_{\q}(|f|)\r)(x)>
\lambda\r\}.\notag
\end{align}
We now claim that, for any $k\in \mathbb{N}$,
\begin{align}\label{s4lem2eq3}
&\lf\{x\in Q_{k}:\mdq\lf(f-P^{(s)}_{\q}(|f|)\r)(x)>\lambda\r\}\\
&\quad\subset\lf\{x\in Q_{k}:\mdq\lf(\lf[f-P^{(s)}_{Q_{k}}(|f|)
\r]{\bf1}_{Q_{k}}\r)(x)>\frac{[1-2^{n}\theta\c]\lambda}{1+\c}\r\}.\notag
\end{align}
Indeed, for any $x\in Q_{k}$ with $\mdq\lf(f-P^{(s)}_{\q}
(|f|)\r)(x)>\lambda$, by Lemma \ref{s4lem1}, we know that there
exists a dyadic cube $Q_{(x)}\ni x$ in $\mathcal{D}
_{\q}$ such that
\begin{equation}\label{s4lem2eq4}
\fint_{Q_{(x)}}\lf|f-P^{(s)}_{\q}(|f|)\r|>\lambda.
\end{equation}
Since $Q_{k}$ is the maximal dyadic cube satisfying
$\fint_{Q}|f-P^{(s)}_{Q}(|f|)|>\theta\lambda$,
then we have $Q_{(x)}\subset Q_{k}$. From this and
\eqref{s4lem2eq4}, it follows that
\[\mdq\lf(\lf[f-P^{(s)}_{\q}(|f|)\r]{\bf1}_{Q_{k}}\r)(x)
\geq\fint_{Q_{(x)}}\lf|f-P^{(s)}_{\q}(|f|)\r|>\lambda.\]
By this,
$P^{(s)}_{Q_{k}}(P^{(s)}_{Q_{k}}(|f|))=
P^{(s)}_{Q_{k}}(|f|)$, $P^{(s)}_{Q_{k}}(P^{(s)}_{Q_{0}}(|f|))
=P^{(s)}_{Q_{k}}(|f|)$, the linearity of $P^{(s)}_{Q_{k}}$,
\eqref{s1eq2}, and Lemma \ref{s4lem1}{\rm(ii)},
we conclude that, for any $x\in Q_{k}$,
\begin{align*}
\lambda
&<\mdq\lf(\lf[f-P^{(s)}_{\q}(|f|)\r]{\bf1}_{Q_{k}}\r)(x)
=\sup_{Q\ni x}\fint_{Q}\lf|\lf(\lf[f-P^{(s)}_{\q}(|f|)\r]{\bf1}
_{Q_{k}}\r)(y)\r|\,dy\\
&\leq\sup_{Q\ni x}\lf[\fint_{Q}\lf|f(y)-P^{(s)}_{Q_{k}}
(|f|)(y)\r|{\bf1}_{Q_{k}}(y)\,dy
+\fint_{Q}\lf|P^{(s)}_{Q_{k}}(|f|)(y)-P^{(s)}_{Q_{k}}(f)(y)\r|
{\bf1}_{Q_{k}}(y)\,dy\r.\\
&\quad\lf.+\fint_{Q}\lf|P^{(s)}_{Q_{k}}(f)(y)-P^{(s)}_{\q}(|f|)
(y)\r|{\bf1}_{Q_{k}}(y)\,dy\r]\\
&=\sup_{Q\ni x}\lf[\fint_{Q}\lf|f(y)-P^{(s)}_{Q_{k}}
(|f|)(y)\r|{\bf1}_{Q_{k}}(y)\,dy
+\fint_{Q}\lf|P^{(s)}_{Q_{k}}(f-P^{(s)}_{Q_{k}}(|f|))(y)\r|
{\bf1}_{Q_{k}}(y)\,dy\r.\\
&\quad\lf.+\fint_{Q}\lf|P^{(s)}_{Q_{k}}(f-P^{(s)}_{\q}(|f|))(y)
\r|{\bf1}_{Q_{k}}(y)\,dy\r]\\
&\leq\mdq\lf(\lf[f-P^{(s)}_{Q_{k}}(|f|)
\r]{\bf1}_{Q_{k}}\r)(x)+\c\fint_{Q_{k}}\lf|f-P^{(s)}_{Q_{k}}
(|f|)\r|
+\c\fint_{Q_{k}}\lf|f-P^{(s)}_{\q}(|f|)\r|\\
&\leq\lf[1+\c\r]\mdq\lf(\lf[f-P^{(s)}_{Q_{k}}(|f|)
\r]{\bf1}_{Q_{k}}\r)(x)+2^{n}\theta\c\lambda.
\end{align*}
This shows that the above claim \eqref{s4lem2eq3} holds true.
Next, we prove that, for any $k$,
\begin{align}\label{s4lem2eq5}
&\lf|\lf\{x\in Q_{k}:\mdq\lf(f-P^{(s)}_{\q}(|f|)\r)(x)
>\lambda\r\}\r|\\
&\quad\leq\frac{1+\c}{[1-2^{n}\theta\c]\lambda}
\int_{Q_{k}}\lf|f-P^{(s)}_{Q_{k}}(|f|)\r|.\notag
\end{align}
Indeed, if $\fint_{Q_{k}}|f-P^{(s)}_{Q_{k}}(|f|)|>
\frac{[1-2^{n}\theta\c]\lambda}{1+\c}$, then we
have $|Q_{k}|<\frac{1+\c}{[1-2^{n}
\theta\c]\lambda}\int_{Q_{k}}|f-P^{(s)}_{Q_{k}}(|f|)|$
due to $\theta<2^{n}\c$. Thus,
\[\lf|\lf\{x\in Q_{k}:\mdq\lf(f-P^{(s)}_{\q}(|f|)\r)(x)
>\lambda\r\}\r|\leq |Q_{k}|<\frac{1+\c}{[1-2^{n}
\theta\c]\lambda}
\int_{Q_{k}}\lf|f-P^{(s)}_{Q_{k}}(|f|)\r|,\]
and hence \eqref{s4lem2eq5} holds true in this case.
If $\fint_{Q_{k}}|f-P^{(s)}_{Q_{k}}(|f|)|\leq
\frac{[1-2^{n}\theta\c]\lambda}{1+\c}$, then,
applying Lemma \ref{s4lem1} to $f-P^{(s)}_{Q_{k}}(|f|)$
on $Q_{k}$ at height $\frac{[1-2^{n}\theta\c]\lambda}{1+\c}$,
we obtain
\begin{align*}
&\lf|\lf\{x\in Q_{k}:\mathcal{M}^{(\rm d)}_{Q_{k}}
\lf(\lf[f-P^{(s)}_{Q_{k}}(|f|)\r]{\bf1}_{Q_{k}}\r)(x)
>\frac{[1-2^{n}\theta\c]\lambda}{1+\c}\r\}\r|\\
&\quad\leq\frac{1+\c}{[1-2^{n}\theta\c]\lambda}
\int_{Q_{k}}\lf|f-P^{(s)}_{Q_{k}}(|f|)\r|.
\end{align*}
From this, $\mathcal{M}^{(\rm d)}_{Q_{0}}([\cdots]{\bf1}_{Q_{k}})=
\mathcal{M}^{(\rm d)}_{Q_{k}}([\cdots]{\bf1}_{Q_{k}})$,
and \eqref{s4lem2eq3}, we deduce that
\begin{align*}
& \lf|\lf\{x\in Q_{k}:\mdq\lf(f-P^{(s)}_{\q}(|f|)\r)(x)
>\lambda\r\}\r|\\
&\quad\leq\lf|\lf\{x\in Q_{k}:\ \mdq\lf(\lf[f-P^{(s)}_{Q_{k}}(|f|)
\r]{\bf1}_{Q_{k}}\r)(x)>\frac{[1-2^{n}\theta\c]\lambda}{1+\c}
\r\}\r|\\
&\quad=\lf|\lf\{x\in Q_{k}:\ \mathcal{M}^{(\rm d)}_{Q_{k}}
\lf(\lf[f-P^{(s)}_{Q_{k}}(|f|)\r]{\bf1}_{Q_{k}}\r)(x)
>\frac{[1-2^{n}\theta\c]\lambda}{1+\c}\r\}\r|\\
&\quad\leq\frac{1+\c}{[1-2^{n}\theta\c]\lambda}
\int_{Q_{k}}\lf|f-P^{(s)}_{Q_{k}}(|f|)\r|.
\end{align*}
Thus, \eqref{s4lem2eq5} holds true. From \eqref{s4lem2eq2},
\eqref{s4lem2eq5}, the H\"{o}lder inequality, and the construction
of $\{Q_{k}\}_{k}$, we deduce that
\begin{align*}
&\lf|\lf\{x\in\q:\mdq\lf(f-P^{(s)}_{\q}(|f|)\r)(x)>\lambda\r\}\r|\\
&\quad\leq\sum_{k}\lf|\lf\{x\in Q_{k}:\mdq\lf(f-P^{(s)}_{\q}
(|f|)\r)(x)>\lambda\r\}\r|\\
&\quad\leq\sum_{k}\frac{[1+\c]}
{[1-2^{n}\theta\c]\lambda}
|Q_{k}|^{\frac1{p'}}
\lf[|Q_{k}|^{\frac{1}{p}-1}
\int_{Q_{k}}\lf|f-P^{(s)}_{Q_{k}}(|f|)\r|\r]\\
&\quad\leq\frac{1+\c}{[1-2^{n}\theta\c]\lambda}
\lf(\sum_{k}|Q_{k}|\r)^{\frac{1}{p'}}\lf\{\sum_{k}|Q_{k}|
^{1-p}\lf[\int_{Q_{k}}\lf|f-P^{(s)}_{Q_{k}}(|f|)\r|\r]^{p}\r\}
^\frac{1}{p}\\
&\quad\leq\frac{1+\c}{[1-2^{n}\theta\c]\lambda}
\lf|\lf\{x\in\q:\mdq\lf(f-P^{(s)}_{\q}(|f|)\r)(x)>
\theta \lambda\r\}\r|^{\frac{1}{p'}}\|f\|_{\njnqq},
\end{align*}
which shows that \eqref{s4lem2eq1} holds true. This finishes
the proof of Lemma \ref{s4lem2}.
\end{proof}
\begin{proof}[Proof of Theorem \ref{s4thm1}]
We first prove \eqref{s4thm1eq1} for $\az=0$. Let $\theta:=
2^{-(n+1)}\c^{-1}$, where $\c$ is the same as \eqref{s1eq2},
and let $\eta:=\frac{\|f\|_{\wz{JN}_{(p,1,s)_{0}}(\q)}}{\theta |\q|
^{1/p}} $. We show that
\begin{align*}\lf\|f-P^{(s)}_{\q}(|f|)\r\|_{L^{p,\fz}(\q)}
&=\sup_{\lambda\in(0,\fz)}
\lambda\lf|\lf\{x\in\q :\ \lf|f(x)-P^{(s)}_{\q}(|f|)(x)\r|>\lambda\r\}\r|^
{\frac{1}{p}}\\
&\lesssim \|f\|_{\njnqq}
\end{align*}
by considering the following two cases.
Case (i) $\lambda\leq\eta$, namely, $\lambda\leq
\frac{\|f\|_{\wz{JN}_{(p,1,s)_{0}}(\q)}}{\theta |\q|
^{1/p}}$.
In this case, $\lambda|\q|^{\frac{1}{p}}\leq 2^{n+1}\c\|f\|
_{\njnqq}$
and hence
\begin{align*}
&\sup_{\lambda\in (0,\eta]}\lambda\lf|\lf\{x\in\q
:\ \lf|f(x)-P^{(s)}
_{\q}(|f|)(x)\r|>\lambda\r\}\r|^{\frac{1}{p}}\\
&\quad\leq \sup_{\lambda
\in (0,\eta]}\lf[\lambda|\q|^{\frac{1}{p}}\r]\leq 2^{n+1}\c
\|f\|_{\njnqq},
\end{align*}
which is the desired estimate in this case.
Case (ii) $\lambda>\eta$. In this case, by the definition
of $\|f\|_{\njnqq}$ and $\theta<1$, we have
\[\lambda>\eta=\frac{\|f\|_{\wz{JN}_{(p,1,s)_{0}}(\q)}}{\theta |\q|
^{1/p}}\geq\frac{|\q|^{1/p}\fint_{\q}|f-P^{(s)}
_{\q}(|f|)|}{\theta |\q|^{1/p}}>\fint_{\q}\lf|f-P^{(s)}_
{\q}
(|f|)\r|.\]
Next, we show that
\begin{equation}\label{s4thm1eq2}
\sup_{\lambda\in(\eta,\fz)}\lambda\lf|\lf\{x\in\q :\ \mdq
\lf(f-P^{(s)}_{\q}(|f|)\r)(x)>\lambda\r\}\r|^{\frac{1}{p}}
\lesssim\|f\|_{\njnqq}.
\end{equation}
Let $j_{0}$ be the smallest non-negative integer such that
$\theta^{-j}\eta<\lambda$. By \eqref{s4lem2eq1},
$\theta\lambda\leq\theta^{-j_{0}}\eta<\lambda$, and Lemma
\ref{s4lem1}{(iii)}, we have
\begin{align*}
&\lf|\lf\{x\in\q :\ \mdq\lf(f-P^{(s)}_{\q}(|f|)\r)(x)>\lambda\r\}
\r|\\
&\quad\leq\lf|\lf\{x\in\q :\ \mdq\lf(f-P^{(s)}_{\q}(|f|)\r)(x)
>\theta^{-j_{0}}\eta\r\}\r|\\
&\quad\leq\frac{D_0}{\theta^{-j_{0}}\eta}
\lf|\lf\{x\in\q :\ \mdq\lf(f-P^{(s)}_{\q}(|f|)\r)(x)
>\theta^{-j_{0}+1}\eta\r\}\r|^{(p')^{-1}}\\
&\quad\leq\frac{D_0}{\theta^{-j_{0}}\eta}
\lf\{\frac{D_0}{\theta^{-j_{0}+1}\eta}\r\}^
{(p')^{-1}}\\
&\qquad\times \lf|\lf\{x\in\q :\mdq\lf(f-P^{(s)}_{\q}(|f|)\r)(x)
>\theta^{-j_{0}+2}\eta\r\}\r|^{(p')^{-2}}\\
&\quad\leq\frac{D_0}{\theta^{-j_{0}}\eta}
\lf\{\frac{D_0}{\theta^{-j_{0}+1}\eta}\r\}^
{(p')^{-1}}\times\cdots\\
&\qquad\times\lf\{\frac{D_0}
{\theta^{-1}\eta}\r\}^{(p')^{-j_{0}+1}}\lf|\lf\{x\in\q :\mdq\lf(f-P^{(s)}_{\q}(|f|)\r)(x)
>\eta\r\}\r|^{(p')^{-j_{0}}}\\
&\quad\leq\frac{D_0}{\theta\lambda}
\lf\{\frac{D_0}{\theta^{2}\lambda}\r\}^
{(p')^{-1}}\times\cdots\\
&\qquad\times\lf\{\frac{D_0}
{\theta^{j_{0}}\lambda}\r\}^{(p')^{-j_{0}+1}}
\lf(\frac{1}{\eta}\int_{\q}\lf|f-P^{(s)}_{\q}(|f|)\r|\r)
^{(p')^{-j_{0}}}\\
&\quad=\lf(\frac{1}{\theta}\r)^{1+2(p')^{-1}+\cdots+
j_{0}(p')^{-j_{0}+1}}\lf\{\frac{D_0}
{\lambda}\r\}^{1+(p')^{-1}+(p')^{-2}+\cdots+(p')^{-j_{0}+1}}\\
&\qquad\times\lf[\frac{1}{\eta}\int_{\q}\lf|f-P^{(s)}
_{\q}(|f|)\r|\r]^{(p')^{-j_{0}}},
\end{align*}
where $D_0:=2[1+\c]\|f\|_{\njnqq}$.
Observe that $|\q|^{\frac{1}{p}}\fint_{\q}|f-P^{(s)}
_{\q}(|f|)|\leq\|f\|_{\njnqq}$. We obtain
\[\frac{1}{\eta}\int_{\q}\lf|f-P^{(s)}_{\q}(|f|)\r|=
\frac{\theta|\q|^{\frac{1}{p}}}{\|f\|_{\njnqq}}
\int_{\q}\lf|f-P^{(s)}_{\q}(|f|)\r|\leq \theta|\q|.\]
From this, $1+2(p')^{-1}+\cdots+j_{0}(p')^{-j_{0}+1}=
p^{2}[1-(p')^{-j_{0}}]-pj_{0}(p')^{j_{0}}\leq p^{2}$, and
\[1+(p')^{-1}+(p')^{-2}+\cdots+(p')^{-j_{0}+1}
=p[1-(p')^{-j_{0}}],\]
we deduce that
\begin{align}\label{3eq7}
&\lf|\lf\{x\in\q :\ \mdq\lf(f-P^{(s)}_{\q}(|f|)\r)(x)>
\lambda\r\}\r|\\
&\quad\leq\lf(\frac{1}{\theta}\r)^{p^{2}}\lf\{\frac{2[1+\c]
\|f\|_{\njnqq}}{\lambda}\r\}^{p[1-(p')^{-j_{0}}]}(\theta|\q|)
^{(p')^{-j_{0}}}\notag\\
&\quad=\lf\{2\lf[1+\c\r]\r\}^{p[1-(p')^{-j_{0}}]}\lf(\frac{1}{\theta}\r)
^{p^{2}-(p')^{-j_{0}}}\lf[\frac{\|f\|_{\njnqq}}{\lambda}\r]^{p}
\lf[\frac{\lambda|\q|^{\frac{1}{p}}}{\|f\|_{\njnqq}}\r]
^{p(p')^{-j_{0}}}\notag\\
&\quad\leq\lf\{2\lf[1+\c\r]\r\}^{p}\lf(\frac{1}{\theta}\r)^{p^{2}}
\lf[\frac{\|f\|_{\njnqq}}{\lambda}\r]^{p}
\lf[\frac{\lambda|\q|^{\frac{1}{p}}}{\|f\|_{\njnqq}}\r]
^{p(p')^{-j_{0}}}.\notag
\end{align}
By the definitions of both $\eta$ and $j_{0}$, we have
\begin{equation}\label{s4thm1eq3}
\frac{\lambda|\q|^{1/p}}{\|f\|_{\njnqq}}=\frac{\lambda}
{\theta\eta}\leq\frac{\theta^{-j_{0}-1}\eta}{\theta\eta}
=\theta^{-j_{0}-2}.
\end{equation}
We now claim that, for any $j\in\mathbb{N}$,
\begin{equation}\label{s4thm1eq4}
(j+2)(p')^{-j}\leq\max\{p,2\}.
\end{equation}
Indeed, for any $j\in\zp$, let $F(j):=(j+2)(p')^{-j}.$
Then $F$ attains its maximal value at some $j_{1}\in\zp$.
If $j_{1}=0$, then $(j_{1}+2)(p')^{-j_{1}}=2\leq\max\{p,2\}$.
If $j_{1}\in\mathbb{N}$, then
\[\frac{F(j_{1}-1)}{F(j_{1})}=\frac{(j_{1}+1)(p')^{-j_{1}+1}}
{(j_{1}+2)(p')^{-j_{1}}}\leq 1,\]
which implies that $j_{1}+2\leq\frac{1}{p'-1}+1=p$ and hence
$(j_{1}+2)(p')^{-j_{1}}\leq p\leq\max\{p,2\}$. This proves
\eqref{s4thm1eq4}. Therefore, by \eqref{3eq7},
\eqref{s4thm1eq3}, \eqref{s4thm1eq4},
and $\theta=2^{-(n+1)}\c^{-1}$, we conclude that
\begin{align*}
&\lf|\lf\{x\in\q :\ \mdq\lf(f-P^{(s)}_{\q}(|f|)\r)(x)>
\lambda\r\}\r|\\
&\quad\leq 2^{p}\lf[1+\c\r]^{p}\lf(\frac{1}{\theta}\r)^{p^{2}
-p(j_{0}+2)(p')^{-j_{0}}}\lf[\frac{\|f\|_{\njnqq}}{\lambda}
\r]^{p}\\
&\quad\leq 2^{p}\lf[1+\c\r]^{p}\lf(\frac{1}{\theta}\r)
^{p^{2-p\max \{p, 2\}}}\lf[\frac{\|f\|_{\njnqq}}{\lambda}\r]
^{p}\\
&\quad=2^{p+(n+1)(p^{2}-p\max\{p,2\})}\c^{p^{2}-p\max\{p,2\}}
\lf[1+\c\r]^{p}\lf[\frac{\|f\|_{\njnqq}}{\lambda}\r]^{p}.
\end{align*}
This implies that \eqref{s4thm1eq2} holds true. Moreover,
using Lemma
\ref{s4lem1}{\rm{(iv)}}, we find that
\[\lf\{x\in\q:\ \lf|f-P^{(s)}_{\q}(|f|)\r|>\lambda\r\}\subset\lf\{x\in\q:\
\mdq\lf(f-P^{(s)}_{\q}(|f|)\r)(x)>\lambda\r\}.\]
From this and \eqref{s4thm1eq2}, it follows that
\[\sup_{\lambda\in(\eta,\fz)}\lf[\lambda
\lf|\{x\in\q:\ |f-P^{(s)}_{\q}(|f|)|>\lambda\}\r|^{\frac{1}{p}}\r]
\lesssim\|f\|_{\njnqq}.\]
Therefore, \eqref{s4thm1eq1} for $\az=0$ holds true by
combining Case {\rm (i)} and Case {\rm (ii)} and
letting
\[C_{(n,p,s)}:=\max\lf\{2^{n+1}\c,2^{p+(n+1)(p^{2}-
p\max\{p,2\})}\c^{p^{2}-p\max\{p,2\}}\lf[1+\c\r]^{p}\r\}.\]
Finally, for any $\az\in[0,\fz)$, by \eqref{s4thm1eq1} with
$\az=0$, we find that
\begin{align*}
&\lf\|f-P^{(s)}_{\q}(|f|)\r\|_{L^{p,\fz}(\q)}\\
&\quad\leq C_{(n,p,s)}\|f\|_{\wz{JN}_{(p,1,s)_{0}}(\q)}
=C_{(n,p,s)}\sup\lf\{\sum_{i}|Q_{i}|\lf[\fint_{Q_{i}}
\lf|f-P^{(s)}_{Q_{i}}(|f|)\r|\r]^{p}\r\}^{\frac{1}{p}}\\
&\quad\leq C_{(n,p,s)}|\q|^{\az}\sup\lf\{\sum_{i}|Q_{i}|
\lf[|Q_{i}|^{-\az}\lf\{\fint_{Q_{i}}
\lf|f-P^{(s)}_{Q_{i}}(|f|)\r|\r\}\r]^{p}\r\}^{\frac{1}{p}}\\
&\quad\leq C_{(n,p,s)}|\q|^{\az}\|f\|_{\wz{JN}_{(p,1,s)_{\az}}(\q)}.
\end{align*}
This finishes the proof of Theorem \ref{s4thm1}.
\end{proof}
As an application of Theorem \ref{s4thm1}, we give
another proof of Proposition \ref{s3prop4} as follows.
\begin{proof}[Another Proof of Proposition \ref{s3prop4}]
We only consider the case $p<\fz$
because the case $p=\fz $ can be similarly proved.
For any $f\in\njn$ with $1\leq q<p< \fz$ and for any $\az\in\rr$,
by the H\"{o}lder inequality, we obtain
\begin{align*}
\|f\|_{\njnq}&=\sup\lf\{\sum_{i}|Q_{i}|
\lf[|Q_{i}|^{-\az}\lf\{\fint_{Q_{i}}
\lf|f-P^{(s)}_{Q_{i}}(|f|)\r|\r\}\r]^{p}\r\}^{\frac{1}{p}}\\
&\leq \sup\lf\{\sum_{i}|Q_{i}|
\lf[|Q_{i}|^{-\az}\lf\{\fint_{Q_{i}}
\lf|f-P^{(s)}_{Q_{i}}(|f|)\r|^{q}\r\}^{\frac{1}{q}}
\r]^{p}\r\}^{\frac{1}{p}}\\
&=\|f\|_{\njn}.
\end{align*}
This shows that $\njn\subset\njnq$.
On the other hand, for any $1\leq q<p<\fz$ and any
cube $Q$ of $\rn$, by the embedding $L^{p,\fz}(Q)
\subset L^{q}(Q)$ (see, for instance,
\cite[p.\,14, Exercises 1.1.11]{G14}) and
Theorem \ref{s4thm1}, we have
\begin{equation}\label{s4APeq4eq1}
\lf[\fint_{Q}\lf|f-P^{(s)}_{Q}(|f|)\r|^{q}\r]^{\frac{1}{q}}
\lesssim
|Q|^{-\frac{1}{p}}\lf\|f-P^{(s)}_{Q}(|f|)\r\|_{L^{p,\fz}(Q)}
\lesssim |Q|^{-\frac{1}{p}}\|f\|_{\wz{JN}_{(p,1,s)_{0}}(Q)}.
\end{equation}
Now, for any given interior pairwise disjoint cubes
$\qi$ of $\xx$, from the definition of
$\wz{JN}_{(p,1,s)_{0}}(Q_{i})$, we deduce that,
for any $i$, there exist
interior pairwise disjoint cubes $\{Q_{i,j}\}_{j}$ of $Q_{i}$
such that
\begin{equation}\label{s4APeq4eq2}
\wz{JN}_{(p,1,s)_{0}}(Q_{i})\lesssim \lf\{\sum_{j}|Q_{i,j}\lf[
\fint_{Q_{i,j}}\lf|f-P^{(s)}_{Q_{i,j}}(|f|)\r|\r]^{p}\r\}^
{\frac{1}{p}}.
\end{equation}
By \eqref{s4APeq4eq1}, \eqref{s4APeq4eq2}, and $\az\in[0,\fz)$,
we obtain
\begin{align*}
&\sum_{i}|Q_{i}| \lf[|Q_{i}|^{-\az}\lf\{\fint_{Q_{i}}
\lf|f-P^{(s)}_{Q_{i}}(|f|)\r|^{q}\r\}^{\frac{1}{q}}\r]^{p}\\
&\quad\lesssim \sum_{i}|Q_{i}|\lf[|Q_{i}|^{-\az}|Q_{i}|^
{-\frac{1}{p}}\|f\|_{\wz{JN}_{(p,1,s)_{0}}(Q_{i})}\r]^{p}\\
&\quad\sim \sum_{i}|Q_{i}|^{-\az p}\|f\|^{p}_{\wz{JN}_{(p,1,s)
_{0}}(Q_{i})}\lesssim \sum_{i}|Q_{i}|^{-\az p}\sum_{j}|Q_{i,j}|
\lf[\fint_{Q_{i,j}}\lf|f-P^{(s)}_{Q_{i,j}}(|f|)\r|\r]^{p}\\
&\quad \lesssim \sum_{i}\sum_{j}|Q_{i,j}|\lf[|Q_{i,j}|
^{-\az}\fint
_{Q_{i,j}}\lf|f-P^{(s)}_{Q_{i,j}}(|f|)\r|\r]^{p}\lesssim \|f\|^
{p}_{\wz{JN}_{(p,1,s)_{0}}(Q_{i})}.
\end{align*}
This implies that $\|f\|_{\njn}\lesssim\|f\|_{\njnq}$ and hence
$\njnq\subset\njn$.
To sum up, $\njn=\njnq$ and
$\|\cdot\|_{\njn}\sim\|\cdot\|_{\wz{JN}_{(p,1,s)_{\az}}(\xx)}$.
This finishes the proof of Proposition \ref{s3prop4}.
\end{proof}
|
\section{Introduction}
In this work, we use the standard notation of error correcting codes. An
appropriate reference is the book \cite{Huff-Pless}. Let $C$ be a binary
linear self-dual code of length $n.$ Thus $C$ is a linear subspace of
dimension $\ n/2$ of the vector space $F^{n},$ where $F$ is the binary
field, and $C$ is equal to its orthogonal code with respect to the usual dot
product. The exact weight enumerator of $C$ is a row vector $W$ of length
2^{n}$ with integer entries labeled with the vectors from $F^{n}$ listed in
lexicographic order. The entry $W[v]$ labeled with a vector $v$ is defined
with
\begin{equation*}
W[v]=\left\{
\begin{tabular}{cc}
$1$ & if $v\in C$ \\
$0$ & if $v\notin C.
\end{tabular
\right.
\end{equation*
Thus $W$ belongs to the vector space $Q^{2^{n}}$ where $Q$ is the rational
field. Clearly the exact weight enumerator $W$ determines completely the
code $C.$
Let $K=\frac{1}{\sqrt{2}
\begin{bmatrix}
1 & 1 \\
1 & -
\end{bmatrix
,$ $K^{[2]}=K\otimes K,$ $K^{[3]}=K^{[2]}\otimes K,$ and let
K^{[n]}=K^{[n-1]}\otimes K,$ be the $n$-th Kronecker power of $K.$ A\
summery of the properties of Kronecker products of matrices is given in \cit
{Zhang}. Let $R$ be the real number field. The matrix $K$ has eigenvalues $1$
and $-1.$ The vectors $\left( 1,\sqrt{2}-1\right) $ and $\left( 1,-\sqrt{2
-1\right) $ are eigenvectors of $K$ corresponding to $1$ and $-1.$Therefore,
$K$ is simple, meaning that there exist a basis of $R^{2}$ consisting of
eigenvectors of $K.$ The rows of the matrix \
\begin{equation*}
B
\begin{bmatrix}
1 & \sqrt{2}-1 \\
1 & -\sqrt{2}-
\end{bmatrix
\end{equation*
form such basis of $R^{2}.$ It follows that the matrix $K^{[n]}$ is also
simple and has eigenvalues $1$ and $-1$ , \cite{Lan} page 413. The rows of
the Kronecker power $B^{[n]}$ form a basis of $R^{2^{n}}.$ We label the rows
of $B^{[n]}$ with the vectors from $F^{n}$ listed in lexicographic order.
\begin{lemma}
The rows of $B^{[n]}$ with even weight labels form a basis of the eigenspace
of $1$ of $K^{[n]}.$
\end{lemma}
\begin{proof}
We have $BK=DB$ where
\begin{equation*}
D
\begin{bmatrix}
1 & 0 \\
0 & -
\end{bmatrix
.
\end{equation*
Using the properties of Kronecker power, we obtain $\left( BK\right)
^{[n]}=\left( DB\right) ^{[n]}$ and $B^{[n]}K^{[n]}=D^{[n]}B^{[n]}.$ Since
the diagonal matrix $D^{[n]}$ has $1$ on the rows labeled with even weight
vectors and $-1$ on the rows labeled with odd weight vectors, the lemma
follows from the last equality.
\end{proof}
The next lemma is a particular case of a result proved in \cite{Sim}.
\begin{lemma}
\cite{Sim}\label{Lsim} The complete weight enumerator $W$ of the binary
self-dual code $C$ belongs to the eigenspace of $1$ of the matrix $K^{[n]}$.
Moreover, any nontrivial (0,1) vector from the eigenspace of $1$ of the
matrix $K^{[n]}$ determines a self-dual binary code.
\end{lemma}
Since $2^{n}$ increases very rapidly with $n,$ this lemma is not practical
when the code length $n$ increases. In the next section we define
derivatives of $W$ which contain less information about the code $C$ but
have smaller size.
\section{Derivatives of the Complete Weight Enumerator}
Let $\rho =\sqrt{2}-1$ and $\mu =-\sqrt{2}-1.$ The quadratic extension
Q(\rho )$ has automorphism group of order two generated by the automorphism
\Phi :Q(\rho )\rightarrow Q(\rho )$ defined with $\Phi (\rho )=\mu .$
\begin{definition}
\label{defDer}For every integer $t,$ $0\leq t\leq n,$ the $t$-th derivative
of $W$ is the row vector $W_{<t>}$ of length $2^{n-t}$ having an entry with
label $v\in F^{n-t}$ determined by
\begin{equation*}
W_{<t>}[v]=\sum_{u\in F^{t}}\rho ^{wt(u)}W[uv]
\end{equation*
where $wt(u)$ is the Hemming weight of $u$ and $uv$ is the concatenation of
u$ and $v.$
\end{definition}
For example, if $u=(1,1,0,1)$ and $v=(1,0),$ then $uv=(1,1,0,1,1,0).$ It
follows that every derivative $W_{<t>}$ has nonnegative entries from the
quadratic extension $Q(\rho ).$ Particularly, $W_{<n>}$ is determined by the
weight distribution of $C.$
\begin{lemma}
\begin{equation*}
W_{<n>}=\sum_{u\in F^{n}}\rho ^{wt(u)}W[u]=\sum_{k=0}^{n}A_{k}\rho ^{k}
\end{equation*}
\end{lemma}
where $A_{k}$ is the number of weight $k$ vectors in $C.$
Thus $W_{<n>}\in Q(\rho )$ and contains less information about $C$ than the
weight distribution of $C.$ On the other end, $W_{<0>}=W$ determines the
code $C$ completely.
\begin{lemma}
\label{nextD}For every integer $t,$ $0\leq t\leq n-1$ and for every $v\in
F^{n-t-1},$ we have $W_{<t+1>}[v]=W_{<t>}[(0)v]+\rho W_{<t>}[(1)v].$
\end{lemma}
\begin{proof}
The proof is straightforward:
\begin{eqnarray*}
W_{<t+1>}[v] &=&\sum_{u^{\prime }\in F^{t+1}}\rho ^{wt(u^{\prime
})}W[u^{\prime }v] \\
&=&\sum_{u\in F^{t}}\rho ^{wt(u(0))}W[u(0)v]+\sum_{u\in F^{t}}\rho
^{wt(u(1))}W[u(1)v] \\
&=&\sum_{u\in F^{t}}\rho ^{wt(u)}W[u(0)v]+\rho \sum_{u\in F^{t}}\rho
^{wt(u)}W[u(1)v] \\
&=&W_{<t>}[(0)v]+\rho W_{<t>}[(1)v].
\end{eqnarray*}
\end{proof}
Less formally, $W_{<t+1>}=$ $W_{<t>}[0]+\rho W_{<t>}[1]$ where $W_{<t>}[0]$
is the first half and $W_{<t>}[1]$ is the second half of $W_{<t>}$.
The next lemma shows that every entry of the second half of $W_{<t>}$
depends only on a corresponding entry from the first half of $W_{<t>}.$
\begin{lemma}
\label{2half}For every integer $t,$ $0\leq t\leq n-1$ and for every $v\in
F^{n-t-1},$ we have $W_{<t>}[(1)\overline{v}]=(-1)^{wt(v)}\rho ^{t}\Phi
(W_{<t>}[(0)v])$ where $\overline{v}$ is the complementary vector of $v$ and
$\Phi $ is the automorphism of $Q(\rho )$ defined above.
\end{lemma}
\begin{proof}
As the all one vector is in the code $C,$ for any $u\in F^{t}$ we have $W
\overline{u}(1)\overline{v}]=W[u(0)v]$ where $\overline{u}$ and $\overline{v}
$ are the complementary vectors of $u$ and $v.$ By Definition \ref{defDer},
\begin{eqnarray*}
W_{<t>}[(1)\overline{v}] &=&\sum_{\overline{u}\in F^{t}}\rho ^{wt(\overline{
})}W[\overline{u}(1)\overline{v}] \\
&=&\sum_{\overline{u}\in F^{t}}\rho ^{wt(\overline{u})}W[u(0)v] \\
&=&\sum_{u\in F^{t}}\rho ^{t-wt(u)}W[u(0)v] \\
&=&\rho ^{t}\sum_{u\in F^{t}}\rho ^{-wt(u)}W[u(0)v]
\end{eqnarray*
We check that $\rho ^{-1}=-\mu .$ Because $C$ contains only even weight
vectors, $W[u(0)v]=0$ when $wt(u)$ and $wt(v)$ have different parities.
Therefor
\begin{eqnarray*}
W_{<t>}[(1)\overline{v}] &=&\rho ^{t}\sum_{u\in F^{t}}(-\mu )^{wt(u)}W[u(0)v]
\\
&=&\rho ^{t}(-1)^{wt(v)}\sum_{u\in F^{t}}\mu ^{wt(u)}W[u(0)v] \\
&=&\rho ^{t}(-1)^{wt(v)}\Phi \left( \sum_{u\in F^{t}}\rho
^{wt(u)}W[u(0)v]\right) \\
&=&(-1)^{wt(v)}\rho ^{t}\Phi \left( W_{<t>}[(0)v]\right)
\end{eqnarray*}
\end{proof}
\begin{theorem}
\label{ThEigen}For every integer $t,$ $0\leq t\leq n,$ the $t$-th derivative
$W_{<t>}$ belongs to the eigenspace of $1$ of $K^{[n-t]}.$
\end{theorem}
\begin{proof}
The statement of the theorem is true for $W_{<0>}=W$ from Lemma \ref{Lsim}.
Thus $WK^{[n]}=W.$ Since $W=(W[0]W[1])$ (recall that this is the
concatenation of $W[0]$\ and $W[1])$ an
\begin{equation*}
K^{[n]}=K\otimes K^{[n-1]}=\frac{1}{\sqrt{2}
\begin{bmatrix}
K^{[n-1]} & K^{[n-1]} \\
K^{[n-1]} & -K^{[n-1]
\end{bmatrix
\end{equation*
we have
\begin{eqnarray*}
\frac{1}{\sqrt{2}}(W[0]+W[1])K^{[n-1]} &=&W[0] \\
\frac{1}{\sqrt{2}}(W[0]-W[1])K^{[n-1]} &=&W[1].
\end{eqnarray*
By adding and then subtracting these equations, we obtain
\begin{eqnarray*}
W[0]K^{[n-1]} &=&\frac{1}{\sqrt{2}}\left( W[0]+W[1]\right) \\
W[1]K^{[n-1]} &=&\frac{1}{\sqrt{2}}\left( W[0]-W[1]\right) .
\end{eqnarray*
Now it is easy to check that
\begin{eqnarray*}
\left( W[0]+\left( \sqrt{2}-1\right) W[1]\right) K^{[n-1]} &=&\frac{1}{\sqrt
2}}\left( W[0]+W[1]\right) +\frac{\sqrt{2}-1}{\sqrt{2}}\left(
W[0]-W[1]\right) \\
&=&W[0]+\frac{2-\sqrt{2}}{\sqrt{2}}W[1] \\
&=&W[0]+\left( \sqrt{2}-1\right) W[1].
\end{eqnarray*
Hence, $W_{<1>}=$ $W_{<0>}[0]+\rho W_{<0>}[1]=W[0]+\left( \sqrt{2}-1\right)
W[1]$ is in the eigenspace of $1$ of $K^{[n-1]}.$ \newline
From this, we proof similarly that $W_{<2>}=$ $W_{<1>}[0]+\rho W_{<1>}[1]$
is in the eigenspace of $1$ of $K^{[n-2]}.$ \newline
Using Lemma \ref{nextD}, we complete the proof by induction on $t.$
\end{proof}
\section{A Balance Principle for Self-Dual Codes}
\begin{theorem}
Let $t$ be a selected coordinate position of $C,$ let $\delta \in F=\{0,1\},$
and let $A_{k,\delta }$ be the cardinality of the set
\begin{equation*}
\left\{ v\in C~|~wt(v)=k\text{ and }v[t]=\delta \right\} .
\end{equation*
Then $\sum_{k=0}^{n}A_{k,1}\rho ^{k-1}=\sum_{k=0}^{n}A_{k,0}\rho ^{k+1}$ and
$\sum_{k=0}^{n}A_{k,1}\rho ^{k-1}=\frac{1+\rho }{4}W_{<n>}.$ Particularly,
\sum_{k=0}^{n}A_{k,1}\rho ^{k-1}$ does not depend on the selection of $t.$
\end{theorem}
\begin{proof}
Let $t=n.$ From Theorem 6, $W_{<n-1>}=(W_{<n-1>}(0)W_{<n-1>}(1))$ is in the
eigenspace of $1$ of $K.$ which is generated by vector $(1,\rho ).$
Therefore, $W_{<n-1>}(1)=\rho W_{<n-1>}(0).$ Since
\begin{eqnarray*}
W_{<n-1>}(1) &=&\sum_{u\in F^{n-1}}\rho
^{wt(u)}W[u(1)]=\sum_{k=0}^{n}A_{k,1}\rho ^{k-1} \\
W_{<n-1>}(0) &=&\sum_{u\in F^{n-1}}\rho
^{wt(u)}W[u(0)]=\sum_{k=0}^{n}A_{k,0}\rho ^{k}
\end{eqnarray*
we obtain the first equality of the Theorem. From Lemma 5,
W_{<n>}=W_{<n-1>}(0)+\rho W_{<n-1>}(1).$ Thus $W_{<n>}=W_{<n-1>}(0)+\rho
^{2}W_{<n-1>}(0).$ Using Lemma 4, we obtain $\sum_{k=0}^{n}A_{k}\rho
^{k}=(1+\rho ^{2})W_{<n-1>}(0)$ and $W_{<n-1>}(0)=\frac{1}{1+\rho ^{2}
\sum_{k=0}^{n}A_{k}\rho ^{k}.$ Then $W_{<n-1>}(1)=\frac{\rho }{1+\rho ^{2}
\sum_{k=0}^{n}A_{k}\rho ^{k}.$ Since $\frac{\rho }{1+\rho ^{2}}=\frac{1+\rho
}{4},$ we obtain the second equality of the Theorem. \newline
If $t\neq n,$ we apply a permutation to the coordinates of $C$ which sends
t $ to $n.$ Since equivalent codes have the same weight distribution, the
statement of the Theorem holds for $t\neq n.$
\end{proof}
\section{Examples}
\subsection{Binary Self-Dual Codes of Length 8}
There are two binary self-dual codes of length 8 \cite{Pless1972}. They have
weight enumerators \newline
$W_{a}=(1,0,0,0,14,0,0,0,1)$ and $W_{b}=(1,0,4,0,6,0,4,0,1).$ Here the entry
$A_{k}$ in position $1+k$ is equal to the number of code vectors of weight
k,$ $k=0,1,\ldots ,8.$
Each of these weight enumerator satisfies the equation $XM=2^{4}X$ where $M$
is the transpose of the Krawtchouk matrix $K_{8}$ \cite{Sim}. The entry of
K_{n}$ in row $i$ and column $j$ is
\begin{equation*}
\sum_{m=0}^{i}(-1)^{m}\binom{j}{m}\binom{n-j}{i-m}.
\end{equation*}
Using computer algebra system Magma \cite{Mag}, we determine all solutions
of this equation with nonnegative integer entries. They are:\newline
$(1,0,0,0,14,0,0,0,1),(1,0,1,0,12,0,1,0,1),\newline
(1,0,20,10,0,20,1),(1,0,30,8,0,30,1),\newline
(1,0,4,0,6,0,40,1),(1,0,5,0,4,0,5,0,1),\newline
(1,0,6,0,20,6,0,1),(1,0,7,0,0,0,7,0,1).$
Let \ $A_{2,0}=y$ for a self-dual binary code realizing some of these
solutions. Then we can express the possible nonzero values of $A_{k,0}$ and
A_{k,1}$ with $y.$ We have
\begin{tabular}{|c|c|c|c|c|c|}
\hline
$k$ & $0$ & $2$ & $4$ & $6$ & $8$ \\ \hline
$A_{k,0}$ & $1$ & $y$ & $\frac{1}{2}A_{4}$ & $A_{2}-y$ & $0$ \\ \hline
$A_{k,1}$ & $0$ & $A_{2}-y$ & $\frac{1}{2}A_{4}$ & $y$ & $1$ \\ \hline
\end{tabular}
For each of the eight possible weight enumerators we solve for $y$ the
balance equation from Theorem 7. The found values of $y$ are $0,$ $\frac{3}{
},$ $\frac{3}{2},$ $\frac{9}{4},$ $3,$ $\frac{15}{4},$ $\frac{9}{2},$ $\frac
21}{4}.$ Since $y$ must be a nonnegative integer, this result eliminates all
possible weight enumerators except for $W_{a}$ and $W_{b}.$
\subsection{The Golay Code of Length 24}
This well known code is the only binary self-dual code of length 24 with
minimum weight 8 \cite{Pless1968}. The nonzero entries of the weight
distribution of this code are $A_{0}=1,$ $A_{8}=759,$ $A_{12}=2576,$
A_{16}=759,$ $A_{24}=1.$ The supports of all code vectors of weight 8, 12,
and 16 form 5-designs \cite{AssMatt}. Hence we can compute all values
A_{k,0}$ and $A_{k,1.}$The result is given in the table\newline
\begin{tabular}{|c|c|c|c|c|c|}
\hline
$k$ & $0$ & $8$ & $12$ & $16$ & $24$ \\ \hline
$A_{k,0}$ & $1$ & $506$ & $\frac{2576}{2}$ & $759-506$ & $0$ \\ \hline
$A_{k,1}$ & $0$ & $759-506$ & $\frac{2576}{2}$ & $506$ & $1$ \\ \hline
\end{tabular
\newline
These values satisfy the balance equation of Theorem 7.
Using the three 5-design supported by the code wards of weight 8, 12, and
16, we compute the derivative $W_{<19>}$ and check that it satisfies the
equation $W_{<19>}K^{[5]}=$ $W_{<19>}.$ Its entries are given below:
-1167936*p + 483776, 1202240*p - 497984,
1202240*p - 497984, -1180608*p + 489024,
1202240*p - 497984, -1180608*p + 489024,
-1180608*p + 489024, 1023936*p - 424128,
1202240*p - 497984, -1180608*p + 489024,
-1180608*p + 489024, 1023936*p - 424128,
-1180608*p + 489024, 1023936*p - 424128,
1023936*p - 424128, -750144*p + 310720,
1202240*p - 497984, -1180608*p + 489024,
-1180608*p + 489024, 1023936*p - 424128,
-1180608*p + 489024, 1023936*p - 424128,
1023936*p - 424128, -750144*p + 310720,
-1180608*p + 489024, 1023936*p - 424128,
1023936*p - 424128, -750144*p + 310720,
1023936*p - 424128, -750144*p + 310720,
-750144*p + 310720, 7081024*p - 2933056
\subsection{The Extended Quadratic Residue Code of Length 48}
This is the only [48,24,12] binary self-dual code \cite{Houg}. The supports
of all code vectors of weight 12, 16, 20, 24, 28, 32, and 36 form 5-designs
\cite{AssMatt}. This allows us to compute the derivative $W_{<43>}$ and to
check that $W_{<43>}K^{[5]}=$ $W_{<43>}.$ The entries of $W_{<43>}$ are
-1801295637184512*p + 746121082765312,
1799773991403520*p - 745490796445696,
1799773991403520*p - 745490796445696,
-1787591301070848*p + 740444560883712,
1799773991403520*p - 745490796445696,
-1787591301070848*p + 740444560883712,
-1787591301070848*p + 740444560883712,
1749670572392448*p - 724737280770048,
1799773991403520*p - 745490796445696,
-1787591301070848*p + 740444560883712,
-1787591301070848*p + 740444560883712,
1749670572392448*p - 724737280770048,
-1787591301070848*p + 740444560883712,
1749670572392448*p - 724737280770048,
1749670572392448*p - 724737280770048,
-1666630947373056*p + 690341141872640,
1799773991403520*p - 745490796445696,
-1787591301070848*p + 740444560883712,
-1787591301070848*p + 740444560883712,
1749670572392448*p - 724737280770048,
-1787591301070848*p + 740444560883712,
1749670572392448*p - 724737280770048,
1749670572392448*p - 724737280770048,
-1666630947373056*p + 690341141872640,
-1787591301070848*p + 740444560883712,
1749670572392448*p - 724737280770048,
1749670572392448*p - 724737280770048,
-1666630947373056*p + 690341141872640,
1749670572392448*p - 724737280770048,
-1666630947373056*p + 690341141872640,
-1666630947373056*p + 690341141872640,
11704454583615488*p - 4848143828713472
\subsection{The Putative [72,36,16] Binary Self-Dual Code}
The existence of this code is a long standing open question \cite{Sloane}.
Its weight enumerator is known:
[\TEXTsymbol{<}0,1\TEXTsymbol{>},\TEXTsymbol{<}16,249849\TEXTsymbol{>}
\TEXTsymbol{<}20,18106704\TEXTsymbol{>},\TEXTsymbol{<}24,46296295
\TEXTsymbol{>},\TEXTsymbol{<}28,4397342400\TEXTsymbol{>},\TEXTsymbol{<
32,16602715899\TEXTsymbol{>},
\TEXTsymbol{<}36,25756721120\TEXTsymbol{>},\TEXTsymbol{<}40,1660271589
\TEXTsymbol{>},\TEXTsymbol{<}44,4397342400\TEXTsymbol{>},\TEXTsymbol{<
48,462962955\TEXTsymbol{>},\TEXTsymbol{<}52,18106704\TEXTsymbol{>},
\TEXTsymbol{<}56,249849\TEXTsymbol{>},\TEXTsymbol{<}72,1\TEXTsymbol{>}].
The supports all code vectors of weight 16, 20, 24, 28, 32, 36, 40, 44, 48,
52, and 56 form 5-designs \cite{AssMatt}. Using this designs, we compute the
derivative $W_{<67>}$ and check that $W_{<67>}K^{[5]}=$ $W_{<67>}.$ The
entries of $W_{<67>}$ are
-2766052144192871265730560*p + 1145736312355867181711360,
2764814255733869297795072*p - 1145223562167443435552768,
2764814255733869297795072*p - 1145223562167443435552768,
-2759776102730699957600256*p + 1143136690864219955920896,
2764814255733869297795072*p - 1145223562167443435552768,
-2759776102730699957600256*p + 1143136690864219955920896,
-2759776102730699957600256*p + 1143136690864219955920896,
2745563299524396139413504*p - 1137249555016829104029696,
2764814255733869297795072*p - 1145223562167443435552768,
-2759776102730699957600256*p + 1143136690864219955920896,
-2759776102730699957600256*p + 1143136690864219955920896,
2745563299524396139413504*p - 1137249555016829104029696,
-2759776102730699957600256*p + 1143136690864219955920896,
2745563299524396139413504*p - 1137249555016829104029696,
2745563299524396139413504*p - 1137249555016829104029696,
-2713300183161139309314048*p + 1123885734654746797539328,
2764814255733869297795072*p - 1145223562167443435552768,
-2759776102730699957600256*p + 1143136690864219955920896,
-2759776102730699957600256*p + 1143136690864219955920896,
2745563299524396139413504*p - 1137249555016829104029696,
-2759776102730699957600256*p + 1143136690864219955920896,
2745563299524396139413504*p - 1137249555016829104029696,
2745563299524396139413504*p - 1137249555016829104029696,
-2713300183161139309314048*p + 1123885734654746797539328,
-2759776102730699957600256*p + 1143136690864219955920896,
2745563299524396139413504*p - 1137249555016829104029696,
2745563299524396139413504*p - 1137249555016829104029696,
-2713300183161139309314048*p + 1123885734654746797539328,
2745563299524396139413504*p - 1137249555016829104029696,
-2713300183161139309314048*p + 1123885734654746797539328,
-2713300183161139309314048*p + 1123885734654746797539328,
18297763639587213294960640*p - 7579181860614308846632960
The existence of this code remains an open question. If a code exists, there
must be a chain of derivatives $\ W_{<67>},\cdots ,W_{<0>}$ with $W_{<0>}$
having only $0$ and $1$ entries. Lemma \ref{nextD}, Lemma \ref{2half}, and
Theorem \ref{ThEigen} may be usful tools in a search for such chain.
\begin{acknowledgement}
This copy of computer algebra system Magma \cite{Mag} used in this work has
been made available through a generous initiative of the Simons Foundation
covering U.S. colleges, universities, nonprofit research entities, and their
students, faculty, and staff.
\end{acknowledgement}
\section{References}
|
\section{INTRODUCTION}
A plethora of ZrCuSiAs (1111) type compounds with diverse physical properties has been synthesized; largely because of the versatile nature of ZrCuSiAs type crystal structure in which all four crystallographic sites have a countless candidate elements to make it stable \cite{Pottgen2008, Quebe2000, Ishida2009, Ozawa2008}. For instance, LaFeAsO which is the parent compound of first Fe based superconductor reported by Kamihara {\it et al.,} posses ZrCuSiAs (1111) type structure consisting of alternative staking of [La$_2$O$_2$]$^{2+}$ and [Fe$_2$As$_2$]$^{2-}$ layers with spin stripe type anti-ferromagnetic (AFM) order \cite{Kamihara2008, Stewart2011}. Superconductivity arises in this compound either by means of external pressure or by chemical doping (chemical pressure). However, a number of similar iso-structural compounds with different physical properties has been reported. For example, LaCrAsO shows metallic anti-ferromagnetism \cite{Park2013}. On the other hand, LaMnAsO displays insulating anti-ferromagnetic behaviour \cite{McGuire2016}. Whereas, LaCoAsO is an itinerant ferromagnet in contrast to the Pauli paramagnetism with low temperature phonon mediated superconductivity in LaNiAsO \cite{Yanagi2008, Ohta2009, Prando2013, Watanabe2007}. Mn based 1111 compounds including LaMnAsO in general, exhibit insulating behaviour with AFM ordering, which is of special interest because of its resemblance with the parent compounds of high T$_c$ cuprates superconductors. Apart from that, there are a number of Mn based compounds manifesting various phase transitions like Mott transition, charge ordering, spin reorientation transition etc., with the variation of temperature, external pressure, doping and applied magnetic field \cite{Kunes2008, Emmanouilidou2017, Kawano1997, Kimber2010, Luo2007, Kim2019, Riss2009}. In LaMnAsO, Sr doping in La site leads to a phase transition from AFM insulator to metallic AFM phase \cite{Sun2012}. It is also reported that, AFM order in LaMnAsO can be fully suppressed by hydrostatic pressure yet no superconductivity has been discerned up to 1.5 K \cite{Guo2013, Simonson2012}. Howover, there is no spin reorientation transition in LaMnAsO as observed in NdMnAsO, PrMnSbO, and CeMnAsO at low temperatures \cite{Kimber2010, Corkett2015, Marcinkova2010}. It is also worthy to be mentioned here that pressure induced metallization on the verge of metal-insulator transition is observed in BaMn$_2$As$_2$ experimentally along with the proclaimed superconductivity \cite{Satya2012}.
Recently, a new 1111-type Fe based superconductors ThFeAsN has been discovered with a superconducting T$_c$ as high as 30 K without external pressure or chemical doping \cite{Wang2016}. Although no long range magnetic order has been found in ThFeAsN, a strong magnetic fluctuation above 35 K has been revealed via muon-spin rotation/relaxation and nuclear magnetic resonance techniques \cite{Shiroka2017}. On the other hand, ThNiAsN is an electron-phonon coupled superconductor with a T$_c$ of 4.3 K as evident from the previous experimental and theoretical investigations \cite{Wang2017, Yang2018}. However, a weak ferromagnetic ordering has been predicted theoretically in ThCoAsN \cite{Sen2020PRB}. ThMnAsN has been synthesized very recently by Zhang {\it et al.} and one common thing in all these ThZAsN (Z=Fe, Co, Ni, Mn) crystal structures is distinctively shorter c-axis in contrast to the other ZrCuSiAs (1111) type compounds which give rise to a inherent internal chemical pressure \cite{Zhang2020}. This internal in-built chemical pressure is believed to play an important role in the diverse physical properties of this series of materials. Neutron diffraction data suggests an AFM ordering in ThMnAsN at room temperature (300 K). Temperature variation of experimentally measured magnetic susceptibility exhibits cusps at 52 and 36 K respectively for ThMnAsN and ThMnPN. This susceptibility cusps are indicating a spontaneous anti-ferromagnetic to
anti-ferromagnetic transition for Mn$^{2+}$ moments as reported in the reference \cite{Zhang2020}. Ordered magnetic moments of ThMnAsN and ThMnPN are 3.41 $\mu_B$ (2.30 $\mu_B$) and 3.60 $\mu_B$ (2.69 $\mu_B$) respectively, measured at 4 K (300 K) \cite{Zhang2020}. The range of values of Mn moments can be well understood in terms of the half-filling of Mn-3d orbitals, which maximizes Hund’s coupling and the reduction of moment from the full moment of gS = 5 $\mu_B$ is due to the valence fluctuations \cite{Simonson2012}. An extensive investigation revealing the structural parameters like bond length, bond angle and electronic structure is required to understand the physical properties of ThMnAsN. Recent experimental as well as theoretical studies on ZrCuSiAs (1111) type compound reveal that the electronic structure is very sensitive to pressure (chemical/external) \cite{Zhang2020, Sen2020PRM, Satya2012}. Therefore, it is very interesting to study the effect of external pressure on the magnetism and electronic structures of ThMnAsN.
In this work, we systematically study the magnetism and electronic structures of ThMnAsN at ambient pressure. Our theoretical results quantitatively explain most of the experimental findings of ThMnAsN \cite{Zhang2020}. We also investigate the effect of hydrostatic pressure on the structural and physical properties of ThMnAsN. Our calculations also suggest that at higher pressure, ThMnAsN posses very similar electronic structure as that of the Fe based superconductors.
\section{COMPUTATIONAL METHODS}
The crystal structure of ThMnAsN is tetragonal with space group symmetry $P4/nmm$ (space group no. 129).
ThMnAsN consist of alternating layers of MnAs and ThN. MnAs plane is very similar to the FeAs/Se plane of the Fe based superconductors where Mn atoms are in the same plane but the As atoms are situated above and below of that plane. Height of this As atoms from the Mn plane is known as 'anion height'.
Experimental lattice parameters of tetragonal ThMnAsN at 4 K, are used as the input of our first principles density functional theory calculations \cite{Zhang2020}.
Our first principles calculations were performed by employing the projector augmented-wave
(PAW) method as implemented in the Vienna \textit{ab initio} simulation package (VASP) \cite{Kresse1993,Bloch1994,Kresse1996}. Exchange correlation functional has been treated under generalized-gradient approximation (GGA) within Perdew-Burke-Ernzerhof (PBE) functional \cite{Perdew1996}.
\begin{figure}[ht!]
\centering
\includegraphics [height=6.5cm,width=6.5cm]{spin.eps}
\caption{Schematic representation of (a) Ferromagnetic (FM), (b) C-type anti-ferromagnetic (AFM), (c) A-type anti-ferromagnetic (C-AFM) and (d) G-type anti-ferromagnetic (G-AFM) spin arrangements for tetragonal ThMnAsN.}
\label{spin}
\end{figure}
\begin{figure}[ht!]
\centering
\includegraphics [height=8cm,width=6.5cm]{SC.eps}
\caption{A schematic representation of $\sqrt{2}\times\sqrt{2}\times2$ supercell of tetragonal ThMnAsN. Th, Mn, As/P and N atoms are indicated by green, red, blue and grey colour respectively. Various magnetic couplings (J$_1$, J$_2$ and J$_3$) between Mn atoms are also shown.}
\label{SC}
\end{figure}
We consider four magnetic spin arrangements namely ferromagnetic (FM), C type anti-ferromagnetic, A type anti-ferromagnetic and G type anti-ferromagnetic for magnetic Mn atoms as shown in Fig.\ref{spin}. We construct a $\sqrt{2}\times\sqrt{2}\times2$ super-cell in order to implement the above mentioned spin arrangements. A schematic diagram of $\sqrt{2}\times\sqrt{2}\times2$ super-cell of ThMnAsN is shown in Fig.\ref{SC}. Various magnetic coupling constants (J$_1$, J$_2$, J$_3$) are also indicated in the Fig.\ref{SC}.
We perform a spin polarised single point energy calculation using various spin configurations as mentioned above. The wave functions were expanded in plane waves basis with an energy cutoff of $550$ eV and the energy tolerance of self consistence calculations are set to 10$^{-6}$ eV. The sampling of the Brillouin zone was done using a $\Gamma$-centered $6\times6\times3$ Monkhorst-Pack grid.
To obtain the crystal structures at different pressures, we start with P=0
structure. Then, we increase the pressure gradually at the steps of 1 GPa and relax the lattice parameters
and internal atomic coordinates at each pressure. Density of states calculations are performed using these optimized crystal structures at a particular external pressure. The forces and stresses of the converged structures at each pressure were optimized and checked to be within the error allowance of the VASP code. Elastic constants were calculated within VASP by finite differences of stress with respect to strain \cite{Page2002}. For the Fermi surface calculations in the non magnetic phase, a denser k-grid of size $20\times20\times20$ is considered for the calculation. In order to visualise the Fermi surface, we use Fermi surfer software \cite{Kawamura2019}. Charge density plots are prepared using VESTA software \cite{Momma2008}. The COHP (Crystal Orbital Hamilton Population) analysis was carried out in the framework of the LOBSTER software \cite{Maintz2016, Deringer2011, Dronskowski1993}.
\section{RESULTS AND DISCUSSION}
\subsection{Magnetism and electronic structure}
First, we find the magnetic ground state of the tetragonal ThMnAsN. As mentioned earlier, we consider three different anti-ferromagnetic (AFM) spin arrangements along with the ferromagnetic (FM) spin configuration (see Fig.\ref{spin}). In order to find the magnetic ground state, we perform single point energy calculations using the experimental lattice parameters as well as atomic positions for various spin configurations namely FM, C-AFM, A-AFM and G-AFM.
\begin{table}[h!]
\begin{center}
\caption{Calculated total energies (with respect to the NM state) and local magnetic moments of Mn atoms of ThMnAsN using experimental structure (at 4 K) for NM, FM, A-AFM, C-AFM and G-AFM states. The energy of the NM state is set to zero.}
\vspace{2mm}
\label{table1}
\begin{tabular}{l|c|c}
\hline
{Magnetic} & Energy & Mn-moment\\
{ Order } & (meV/f.u.) & ($\mu_B$)\\
\hline
NM & 0 & 0\\
\hline
FM & -317.8 &2.39\\
\hline
A-AFM &-322.3 &2.69\\
\hline
C-AFM & -781.1 &3.52\\
\hline
G-AFM & -780.3 &3.52\\
\hline
\end{tabular}
\end{center}
* Experimental values of Mn-moment of ThMnAsN is 3.41 $\mu_B$ at 4 K \cite{Zhang2020}.
\end{table}
In Table-\ref{table1}, we depict our calculated total energies and local magnetic moments of Mn atoms of ThMnAsN for NM, FM, A-AFM, C-AFM and G-AFM spin configurations. It turns out that C-AFM spin arrangement has the lowest total energy among all other spin arrangements that we considered. Therefore, ThMnAsN have C-AFM type ground states which is consistent with the experimental findings \cite{Zhang2020}. From Table-\ref{table1}, we can clearly see that magnetic moments in Mn atoms are 3.52 $\mu_B$ for ThMnAsN with C-AFM spin configuration. Magnetic moments in Mn atoms as well as total energy for C-AFM and G-AFM spin arrangements in ThMnAsN are quite similar but differ significantly from that of the A-AFM and FM spin arrangements. Our calculated ground state Mn moments (C-AFM spin configuration) for ThMnAsN, is quite close to that of the experimental one (measured at 4 K). We present our calculated density of states (spin-polarised) of ThMnAsN in Fig.\ref{Asafm} for all four magnetic spin arrangements.
\begin{figure}[h!]
\centering
\includegraphics [height=7cm,width=8.5cm]{Asafm.eps}
\caption{Calculated density of states of ThMnAsN for (a) A-AFM, (b) C-AFM, (c) G-AFM and (d) FM spin arrangements. Up spin and down spin density of states are indicated by blue and red lines respectively. Fermi level is denoted by a vertical black line at $E=0$ eV.}
\label{Asafm}
\end{figure}
It is quite evident from Fig.\ref{Asafm} that in case of C-AFM and G-AFM spin configuration, both of these systems posses a small energy gap in the density of states at the Fermi level (insulating behaviour at low temperature). On the other hand, for the other two spin configurations (A-AFM and FM), density of states clearly suggest a metallic behaviour for ThMnAsN.
\subsection{Effect of hydrostatic pressure on the crystal structure and magnetism of ThMnAsN}
In this section, we will demonstrate the effect of hydrostatic pressure in the structural parameters, magnetism and electronic structures of ThMnAsN. In the first step, we fully optimize (both lattice parameters as well as atomic positions) the geometry of the crystal structure.
\begin{table}[h!]
\begin{center}
\caption{Optimised and experimental (measured at 4 K) structural parameters and local magnetic moment of Mn for ThMnAsN with the C-AFM spin arrangement.}
\vspace{2mm}
\label{table2}
\begin{tabular}{l|c|c}
\hline
{Structural} & GGA & Experiment*\\
{parameters} & (C-AFM) & (4 K) \\
\hline
a=b (\AA) & 4.084 & 4.076 \\
\hline
c (\AA) & 8.297 & 8.929 \\
\hline
V (\AA$^3$) & 148.89 & 148.34 \\
\hline
z$_{Th}$ & 0.1293 & 0.1301 \\
\hline
z$_{As}$ & 0.6631 & 0.6727 \\
\hline
Mn moment ($\mu_B$) & 3.42 & 3.41 \\
\hline
\end{tabular}
\end{center}
* Reference \cite{Zhang2020}
\end{table}
\begin{figure}[h!]
\centering
\includegraphics [height=7cm,width=8.5cm]{Pstr.eps}
\caption{Variation of (a) Normalized lattice parameters (a/a$_0$, c/c$_0$), (b) c/a ratio, (c) volume of the unit cell (V) and (d) local magnetic moment of Mn atom with hydrostatic pressure in ThMnAsN with C-AFM spin configuration.}
\label{Pstr}
\end{figure}
In Table-\ref{table2}, we present the GGA optimized structural parameters as well as the local magnetic moment of Mn atom for ThMnAsN with C-AFM spin configuration. Along with that, we also depict the experimentally measured structural parameters and Mn moment at 4 K in Table-\ref{table2} (last column). Changes in the optimized lattice parameters with the experimental values are less than 0.2 $\%$ whereas 1.4 $\%$ decrease in the z$_{As}$ value is observed. On the other hand, local magnetic moment of Mn in the optimized structure is in good agreement with the experimentally measured value. It should be noted that the value of local magnetic moment of Mn atom in ThMnAsN with C-AFM spin configuration, calculated using experimental structural parameters is 3.52 $\mu_B$. To obtain the crystal structures at various pressures, we begin with the optimized structure at P=0 (Table.\ref{table2}).
\begin{figure}[h!]
\centering
\includegraphics [height=7cm,width=8.5cm]{Pbond.eps}
\caption{Variation of (a) bond lengths (Mn-Mn, Mn-As), (b) In-plane and out of plane As-As distances, (c) anion height (h$_{As}$) and (d) As-Mn-As bond angles ($\alpha$, $\beta$) with hydrostatic pressure for ThMnAsN with C-AFM spin configuration.}
\label{Pbond}
\end{figure}
In the next step, we optimize the lattice parameters as well as atomic positions in presence of hydrostatic pressure and we increase the external pressures in the steps of 1 GPa. In Fig.\ref{Pstr}, we display the variation of various structural parameters like normalized lattice parameters (a/a$_0$, c/c$_0$), c/a ratio, volume of the unit cell (V) and local magnetic moment of Mn atom as a function of hydrostatic pressure. At around 9 GPa pressure, all the structural parameters show some anomalies. Magnetic moments of Mn atoms also collapse at the same pressure (9 GPa) indicating a phase transition from AFM to para-magnetic (PM) phase. It is quite evident that there is a abrupt change in the normalized lattice parameters, c/a ratio and volume of the unit cell at 9 GPa pressure. The change in the c-axis as compared to the a-axis is more prominent. This anomalous behaviour of structural parameters with the hydrostatic pressure may be attributed to a phase transition from tetragonal to a collapse tetragonal phase occurs simultaneously with the magnetic transition (AFM to PM phase). Furthermore, we also study the variation of various bond lengths and bond angles with pressure as shown in Fig.\ref{Pbond}. From Fig.\ref{Pbond}a, we can see a pronounced change in the Mn-As bond distance at 9 GPa pressure as compared to the Mn-Mn bond distance. Added to that, Fig.\ref{Pbond}b(c), showing the variation of in plane and out of plane As-As distances ('anion height') with pressure also indicate a significant out of plane modification (along the c-axis) that occurs at 9 GPa pressure. Modifications of Mn-As tetrahedral bond angles ($\alpha$ and $\beta$) are depicted in Fig.\ref{Pbond}d. In all these figures (Fig.\ref{Pbond}b-d), we also depict the schematic diagrams of in plane and out of plane As-As distances, anion height, As-Fe-As tetrahedral bond angles in the inset. It is quite evident from Fig.\ref{Pbond}d that, a large distortion in the Mn-As tetrahedron transpire at 9 GPa pressure. Therefore, we can say that crystal structure plays a crucial role in controlling the physical properties of ThMnAsN system.
\begin{figure}[h!]
\centering
\includegraphics [height=3.5cm,width=8.5cm]{elastic.eps}
\caption{Pressure variation of (a) various elastic constants and (b) Cauchy pressures (C$_{13}$-C$_{44}$) and (C$_{12}$-C$_{66}$) of tetragonal ThMnAsN.}
\label{elastic}
\end{figure}
\par Next we present the variation of elastic constants of tetragonal ThMnAsN as a function of hydrostatic pressure as depicted in Fig.\ref{elastic}a. It shows that all the elastic constants are more or less increasing with the increase of external pressure except C$_{44}$. It is also to be noted here that elastic constant C$_{11}$ is always greater than C$_{33}$ up to 15 GPa pressure which indicates that it is easier to compress the system along 001 direction than to 100 direction. In order to understand the observed behaviour of elastic constants around 9 GPa pressure, we also calculate the Cauchy pressure for tetragonal system as a function of pressure (see Fig.\ref{elastic}b). It is well known that for metallic bonding, the Cauchy pressure is positive, while for directional bonding, it is negative and larger negative Cauchy pressure indicates a more directional character in the bonds \cite{Pettifor1992}. As we can see from Fig.\ref{elastic}b, Cauchy pressure C$_{13}$-C$_{44}$ has small negative value at lower pressure but it increases rapidly as we go above 9 GPa pressure. On the other hand, there is almost no variation of Cauchy pressure C$_{12}$-C$_{66}$ with the hydrostatic pressure. This is so, because the variations of elastic constants C$_{12}$ and C$_{66}$ with the pressure are not very substantial as compared to the other elastic constants where the pressure variation is noticeable.
\begin{figure}[h!]
\centering
\includegraphics [height=5.5cm,width=6.5cm]{C44.eps}
\caption{Variation of C$_{44}$-P as a function of external pressure for tetragonal ThMnAsN.}
\label{c44}
\end{figure}
High positive values of Cauchy pressure C$_{13}$-C$_{44}$ above 9 GPa pressure indicate the enhancement of metallic behaviour. In Fig.\ref{c44}, we present the pressure variation of C$_{44}$-P. There is a sudden drop of C$_{44}$-P at around 9 GPa pressure and above 14 GPa pressure C$_{44}$-P becomes negative. When the value of C$_{44}$-P is less than zero, it indicates that the system is mechanically unstable or is on the threshold of structural phase transition. Further we have also depict the charge densities of ThMnAsN at various pressures along the 100 plane in Fig.\ref{Chrgp}. We can clearly see that (see the black arrow in the Fig.\ref{Chrgp}) at 9 GPa pressure, the overlap of charge densities along Mn-As bond is significantly increased if we compare the same with that at the 8 GPa pressure.
\begin{figure}[h!]
\centering
\includegraphics [height=11cm,width=8cm]{dosP.eps}
\caption{Calculated density of states of ThMnAsN with C-AFM spin configuration at (a) 1 GPa, (b) 5 GPa, (c) 8 GPa and (d) 9 GPa pressure. Fermi level is denoted by a vertical black line at $E=0$ eV.}
\label{dosP}
\end{figure}
\begin{figure}[h!]
\centering
\includegraphics [height=7.5cm,width=7.5cm]{Chrgp.eps}
\caption{Calculated charge density plots of ThMnAsN along (100) plane at (a) 1 GPa (b) 8 GPa and (c) 9 GPa of hydrostatic pressure.}
\label{Chrgp}
\end{figure}
\begin{figure}[h!]
\centering
\includegraphics [height=5cm,width=8.5cm]{LOBS.eps}
\caption{COHP bonding analysis of Mn-As bonds (red for spin up and black for spin down) at (a) 1 GPa, (b) 8 GPa, (c, d) 9 GPa pressure (C-AFM and NM).}
\label{LOBS}
\end{figure}
All these results collectively stipulate the enhancement of metallic character above 9 GPa pressure. To corroborate the charge density plots at 1, 8 and 9 GPa, the calculated integral crystal orbital Hamilton population (ICOHP) is indicated on Table \ref{table3}. Their sign indicates net bonding for the reported distances. The absolute value of the ICOHP is proportional to the strength of the bond and is increasing for all bonds with pressure from 1 to 9 GPa. The Mn-As absolute value shows an increase of 6.7 \% from 1 to 8 GPa and of 8.9 \% from 8 to 9 GPa, considering the up spin channel (similar trend is observed for the dn spin channel). Therefore, the evolution in the smaller range 8 to 9 GPa is more important than the whole 1 to 8 GPa range. It pictures the structural transition described from 8 to 9 GPa and the greater metallic character at 9 GPa.
The projected COHP on another hand is shown on Fig.\ref{LOBS} for the bonds Mn-As. Antibonding states are present at the top of the valence band just below the fermi level for both 1 and 8 GPa. In the two later the band gap is opened in the AFM state while the metallic state at 9 GPa gives rise to antibonding states at the Fermi level. Such situation is destabilizing and should lead to a structural distortion and/or magnetic transition.
\begin{table*}[t]
\begin{center}
\caption{ICOHP (Integral Crystal Orbital Hamilton Population) for ThMnAsN for the different types of bonds at pressures of 1, 8 and 9 GPa.}
\vspace{2mm}
\label{table3}
\begin{tabular}{l|c|c|c|c|c|c}
\hline
{Pressure(GPa)}&Mn-As(\AA)&ICOHP(up/dn)&Th-N(\AA)&ICOHP(up/dn)&Th-As(\AA)&ICOHP(up/dn)\\
\hline
1 & 2.508 &-3.89/ -3.52& 2.347& -2.69/-2.68 &3.417& -1.47/-1.49\\
\hline
8& 2.449& -4.15/ -3.74& 2.316& -2.80/ -2.80& 3.291& -1.66/-1.68 \\
\hline
9 (AFM)& 2.336& -4.52/-4.16& 2.309& -2.84/ -2.84& 3.281& -1.84/-1.86 \\
\hline
9 (NM)& 2.336& -8.74 (-4.37/spin channel)& 2.309& -5.69 (-2.84/spin channel)& 3.281& -3.65 (-1.83/spin channel) \\
\hline
\end{tabular}
\end{center}
\end{table*}
Now we present our calculated density of states at different hydrostatic pressures (see Fig.\ref{dosP}). We can clearly see, with the increasing pressure metallic behaviour is increasing. This suggests that ThMnAsN is in the threshold of a metal insulator transition and this transition may occur with the variation of pressure, temperature or may be even with the doping. However, in this work, we have not studied the effect of doping and temperature in ThMnAsN. Nevertheless, we find three possible phase transitions (AFM to PM, tetragonal to collapse tetragonal and insulator to metal) that take place at around 9 GPa pressure. However, further experimental and theoretical studies are required to understand the interrelation between these phase transitions in ThMnAsN.
\subsection{Electronic structure of ThMnAsN at high pressure}
In this section, we will present the electronic structure of non magnetic ThMnAsN at 9 GPa pressure and discuss the possible manifestation of high temperature superconductivity. We clearly see that at 9 GPa pressure, an anti-ferromagnetic to para-magnetic transition occurs in ThMnAsN. Therefore, we perform a non spin polarized calculation to find the electronic structure of ThMnAsN in the non magnetic phase at 9 GPa pressure. In Fig.\ref{9dos}a, we display our calculated atom projected density of states.
\begin{figure}[h!]
\centering
\includegraphics [height=3.5cm,width=8.5cm]{9dos.eps}
\caption{Calculated (a) atom projected and (b) Mn-3d orbital projected density of states of non-magnetic ThMnAsN at 9 GPa pressure.}
\label{9dos}
\end{figure}
\begin{figure}[h!]
\centering
\includegraphics [height=4.5cm,width=8.0cm]{band.eps}
\caption{Calculated band structure of non-magnetic ThMnAsN at 9 GPa pressure. Black dotted lines indicate the shifted Fermi levels for verious chemical potentials. }
\label{band}
\end{figure}
\begin{figure}[h!]
\centering
\includegraphics [height=6cm,width=8.5cm]{orb.eps}
\caption{Calculated Mn-3d orbital projected band structure of non-magnetic ThMnAsN at 9 GPa pressure for $\mu=0.25$. Mn d$_{xz+yz}$, d$_{xy}$, d$_{z^2}$ and d$_{x^2-y^2}$ orbitals are denoted by Blue, red, magenta and green colours respectively.}
\label{orb}
\end{figure}
Atom projected density of states suggest that among all other atoms in ThMnAsN, Mn atoms have mostly contributed to the total density of states around the Fermi level. Therefore, Mn d-orbital projected density of states for non magnetic ThMnAsN at 9 GPa pressure is presented in Fig.\ref{9dos}b. All five Mn-d orbitals are present at the Fermi level. Among them, Mn d$_{xz+yz}$ orbitals dominate the Fermi level. In Fig.\ref{band}, we depict our calculated band structure of non magnetic ThMnAsN at high pressure (9 GPa). Positions of Fermi level at different chemical potentials are also indicated in the band structure with a dotted line which is used to mimic the electron doping in the non magnetic ThMnAsN system within the rigid band model. With the value of chemical potential ($\mu$) 0.25, we find a electronic band dispersion very similar to that of the generic band dispersion of Fe based superconductors. We also find that orbital nature of the low energy bands of electron doped ThMnAsN (within rigid band approximation with $\mu=0.25$) at 9 GPa pressure which are also quite similar to the low energy band dispersion of most of the Fe based superconductors.
\begin{figure}[h!]
\centering
\includegraphics [height=6.5cm,width=8cm]{fs.eps}
\caption{Calculated Fermi surfaces of non-magnetic ThMnAsN at 9 GPa pressure shaded by band velocity for (a) $\mu=0$, (b) $\mu=0.1$, (c) $\mu=0.2$ and (d) $\mu=0.25$.}
\label{fs}
\end{figure}
In Fig.\ref{orb}, we depict the Mn d-orbial projected band structure of ThMnAsN with $\mu=0.25$. Blue, red, magenta and green colours are used to indicate the Mn d$_{xz+yz}$, d$_{xy}$, d$_{z^2}$ and d$_{x^2-y^2}$ orbitals respectively. Mainly d$_{xz+yz}$ and d$_{x^2-y^2}$ dominate the Fermi level at $\Gamma$ and M points which is quite similar to the band structure of stochiometric ThFeAsN \cite{2Wang2016, Singh2016, Sen2020PRB}, a Fe based superconductor iso-structural to ThMnAsN. We also calculate the Fermi surface of ThMnAsN at 9 GPa pressure in the non magnetic phase for different chemical potentials as shown in Fig.\ref{fs}. Fermi velocities are also indicated in all the Fermi surfaces. Fermi surface topology, specially with $\mu=0.25$, closely resembles with the generic Fermi surface of the Fe based superconductor \cite{Stewart2011, Sen2014, Sen2015, Paglione2010, Mazin2008}. It contains three hole like Fermi surfaces in the centre of the Brillouin zone ($\Gamma$ point) and two electron like Fermi surfaces at the corner of the Brillouin zone (M point). Nature of these Fermi surfaces are also favourable for nesting which plays a very important role in pnictides superconductors to give rise to various exotic phases like spin density wave order (SDW), orbital density wave order (ODW) {\it etc.,} including superconductivity \cite{Terashima2019, Sen2015, Ghosh2017, 1Sen2015, Sunagawa2015}. Since Fermi surface topology and low energy electronic structure believed to be the main controlling factors of superconductivity in Fe based superconductors, ThMnAsN at high pressure has a great potential to become a high temperature superconductor with unconventional superconducting properties.
\section{Conclusions}
In this section, we briefly summarise our results. Through our first principles calculations, we find the magnetic ground state of ThMnAsN and it turns out to be anti-ferromagnetic with C type spin orientation. Our results are in good agreement with the experimental findings \cite{Zhang2020}. A small energy gap ($\sim0.4$ eV) is observed in the density of states near Fermi level. Applying hydrostatic pressure in ThMnAsN, we find that all the structural parameters show anomalies at 9 GPa pressure which is attributed to a structural phase transition from a tetragonal to a collapse tetragonal phase. We find that local magnetic moments of Mn atoms also collapsed at 9 GPa pressure indicating a magnetic phase transition from AFM to PM phase. We also evaluate the variation of various elastic constants of tetragonal ThMnAsN with pressure. We show that with the increasing pressure, metallic behaviour of the system also enhances which is supported by our pressure dependent density of states and charge density plots. Moreover, we have seen a significant increase of positive Cauchy pressure C$_{13}$-C$_{44}$ around 9 GPa pressure, also indicating an abrupt uplift of the metallic character in ThMnAsN.
Therefore, we observe a simultaneous structural, magnetic and metal-insulator transitions that occur at the vicinity of 9 GPa pressure. Electronic structure of ThMnAsN at high pressure closely resembles with the electronic structure of Fe-based superconductors. Therefore, a possible unconventional high temperature superconductivity may appear in ThMnAsN which might help to resolve the unsettled issues of Fe based superconductivity or in general high temperature superconductivity. However, further experimental and theoretical studies are required to understand the physical properties of ThMnAsN.
|
\section{Introduction}\label{section1}
Although Einstein's theory of general relativity (GR) is indeed the most successful theory of gravity, it suffers from the quantization \cite{Kiefer:2007aa, DeWitt:1967yk} as well as dark matter and dark energy problems \cite{Cline:2013aa, Sahni:2004ai}.
Therefore, testing GR still is one of the key tasks in modern physics \cite{Will:1993aa}.
Studies of alternative theories of gravity play a significant role in testing GR.
A natural alternative theory is $f(R)$ gravity \cite{Sotiriou:2010aa, De-Felice:2010aa}, in which the Ricci scalar in the Einstein--Hilbert action is replaced by a general function of the Ricci scalar.
The $f(R)$ theories do not seem to introduce any new type of matter and can drive early inflation \cite{Starobinsky:1980aa} or late-time acceleration of the universe \cite{Capozziello:2003tk, Carroll:2004aa}.
In fact, the $f(R)$ theories can be reformulated in terms of scalar-tensor theories with a strong coupling of the scalar field to matter \cite{Sotiriou:2010aa, De-Felice:2010aa}.
The strong coupling would induce the scalar fifth force in the theory, which violates all current experimental constraints on deviations from Newton's law of gravity.
In order to evade these tight local tests of gravity, the chameleon mechanism \cite{Khoury:2004aa, Khoury:2004ab, Gubser:2004aa} is introduced into $f(R)$ theories, which imposes restrictions on the functional form of $f(R)$.
The chameleon scalar field can develop an environment-dependent mass, which increases as the ambient density increases.
Therefore, the scalar fifth force can be hidden and evade the tight local tests in high density regions (e.g., the solar system), in which the force range becomes so short that it is extremely difficult to detect by local test experiments \cite{Gubser:2004aa}.
Whereas in low density regions (e.g., the galaxy or the universe), the scalar fifth force becomes the long-range force, which could affect the galactic dynamics \cite{Gronke:2015aa, Schmidt:2010aa} and the evolution of the universe \cite{Starobinsky:1980aa, Capozziello:2003tk, Carroll:2004aa}.
Since the Hulse-Taylor binary pulsar observations led to the first indirect detection of gravitational waves (GWs) \cite{Hulse:1975aa, Taylor:1982aa, Taylor:1989aa}, binary pulsars have become the excellent laboratories for testing gravity in the strong field regime \cite{Stairs:2003aa, Damour:1996aa, Damour:1998aa, Yagi:2014aa, Beltran-Jimenez:2016aa}.
In this paper, we study the full post-Keplerian (PK) effects of binary pulsars in the framework of chameleon $f(R)$.
We calculate the effects of periastron advance, Einstein delay and Shapiro delay by investigating the orbital dynamics of binary pulsars, and derive the decay rates of orbital period and eccentricity caused by GWs damping by investigating the Noether charges and currents in the theory.
In chameleon $f(R)$, the leading term of tensor GWs radiation is the quadrupole radiation carrying both energy and angular momentum, and the leading term of scalar GWs radiation is the monopole radiation carrying energy but not angular momentum.
However, the monopole radiation and the quadrupole radiation are of the same post-Newtonian (PN) order.
Scalar dipole radiation carries both energy and angular momentum away from the binary pulsars and dominates the orbital decay, and its intensity is proportional to the square of the difference in the compactnesses of binaries.
Therefore, the asymmetric systems like the neutron star (NS) - white dwarf (WD) binary pulsars are the ideal targets for testing chameleon $f(R)$ gravity.
We perform the numerical simulation of the orbital evolution of binary pulsars, and place constraints on chameleon $f(R)$ with the observables of PK parameters from three NS-WD PSRs J1141$-$6545, J1738$+$0333 and J0348$+$0432.
It turns out that the dipole radiation in chameleon $f(R)$ further accelerates the orbital evolution of binary pulsars.
The orbital period decay rates from these three systems impose the tight constraints on dipole radiation, which can also be thought of as tests of the existence of helicity-0 or helicity-1 degrees of freedom.
The pulsar constraint from PSRs J1738$+$0333 is the most stringent test in these three systems.
These pulsar tests rule out the significant deviations from GR in strong-field asymmetric systems.
The organization of this paper is as follows.
In Sec. \ref{section2}, we review $f(R)$ gravity and chameleon mechanism.
In Sec. \ref{section3}, we calculate in detail the PK parameters in chameleon $f(R)$ gravity.
In Sec. \ref{section4}, we place constraints on chameleon $f(R)$ by the observational data of the binary pulsar, and discuss in detail these results.
We conclude in Sec. \ref{section5}.
Appendixes present further mathematical details.
\section{$f(R)$ gravity with chameleon screening mechanism}\label{section2}
The $f(R)$ gravity is based on the corrections and extensions of GR adding higher order terms or non-minimally coupled scalar fields into the dynamics.
The Lagrangian density for $f(R)$ gravity takes the form \cite{Sotiriou:2010aa, De-Felice:2010aa}
\begin{eqnarray}
\label{Lagrangian_fr}
\mathcal{L}=\frac{M_{\scriptscriptstyle\rm Pl}^2}{2}\sqrt{-g} f(R)+ \mathcal{L}_m(g_{\mu\nu},\psi_m),
\end{eqnarray}
where $M_{\scriptscriptstyle\rm Pl}\equiv\sqrt{1/8\pi G}$, $G$ is the gravitational constant, $g$ is the determinant of the metric $g_{\mu\nu}$, $R$ is the Ricci scalar, $\mathcal{L}_m$ is the matter Lagrangian density, and $\psi_m$ denotes all the matter fields. Here, we set the units to $c=\hbar=1$.
The $f(R)$ gravity can be recast as a scalar-tensor theory via the following conformal transformation \cite{Sotiriou:2010aa, De-Felice:2010aa}
\begin{eqnarray}
\label{conf_fR_ST}
g_{\mu\nu}\rightarrow \tilde{g}_{\mu\nu} = g_{\mu\nu} f'(R) \equiv g_{\mu\nu}\exp(-\sqrt{\frac{2}{3}}\frac{\phi}{M_{\scriptscriptstyle\rm Pl}}),
\end{eqnarray}
where a prime denotes differentiation with respect to $R$, and $\phi$ is the scalar field which can be directly related to the Jordan frame Ricci scalar by the above relation.
The Lagrangian density in the Einstein frame has the form \cite{Sotiriou:2010aa, De-Felice:2010aa}
\begin{eqnarray}
\label{Lagrangian_fR_E}
\tilde{\mathcal{L}} \!=\! \sqrt{\!-\tilde{g}}\Big[\frac{M_{\scriptscriptstyle\rm Pl}^2}{2} \! \tilde{R} \!-\! \frac{(\tilde{\partial}\phi)^2}{2} \!-\! V\!(\phi)\Big]\!+\!\tilde{\mathcal{L}}_m(A^2\!(\phi)\tilde{g}_{\mu\nu},\psi_m),~~~~
\end{eqnarray}
where the potential is
\begin{eqnarray}
V(\phi)=\frac{1}{2}{M_{\scriptscriptstyle\rm Pl}^2}f'(R)^{-2}(f'(R)R-f(R)),
\end{eqnarray}
and the coupling function is
\begin{eqnarray}
A(\phi)=f'(R)^{-\frac{1}{2}}=\exp(\frac{\phi}{\sqrt{6}M_{\scriptscriptstyle\rm Pl}}).
\end{eqnarray}
Here, a tilde represents quantities in the Einstein frame.
Variation of $\tilde{\mathcal{L}}$ with respect to the tensor field and the scalar field gives the field equations
\begin{eqnarray}
\label{tensor_Eq}
\tilde{G}_{\mu\nu}\!
&=& 8\pi G \big[\tilde{T}_{\mu\nu}+\partial_\mu\phi\partial_\nu\phi-\big((\tilde{\partial}\phi)^2/2+V\big)\tilde{g}_{\mu\nu}\big],~~~~~
\\
\label{scalar_Eq}
\tilde{\square}\phi
&=& {d V_{\rm eff}}/{d\phi},
\end{eqnarray}
where $\tilde{\square}$ is the curved space d'Alembertian, $\tilde{G}_{\mu\nu}$ is the Einstein tensor, and $\tilde{T}_{\mu\nu} \equiv(-2/\sqrt{-\tilde{g}}) \delta ({\int} dx^4 \tilde{\mathcal{L}}_m) / \delta \tilde{g}^{\mu\nu}$ is the energy-momentum tensor of the matter.
Here, the effective potential $V_{\text {eff}}(\phi) \equiv V(\phi)+{\rho}A(\phi)$, and $\rho$~\footnote{$\rho$ is defined as the conserved energy density in the Einstein frame \cite{Joyce:2015aa}.} is the local environment density of the scalar field.
In the previous work \cite{Zhang:2016aa, Zhang:2017aa, Zhang:2019ab, Zhang:2019aa, Zhang:2019ac, Liu:2018ab}, we have investigated the screening mechanisms for the Lagrangian density \eqref{Lagrangian_fR_E} with a general potential and coupling function.
For this theory to have a screening mechanism one must require that \cite{Zhang:2019ab}
\begin{eqnarray}
\label{mass_eff}
\frac{d V_{\rm eff}}{d\phi}\bigg|_{\phi_{\rm min}}=0, ~~
m^2_{\rm eff}\equiv \frac{d^2 V_{\rm eff}}{d\phi^2}\bigg|_{\phi_{\rm min}}>0, ~~
\frac{d m_{\rm eff}}{d\rho}>0.~~~~~
\end{eqnarray}
In other words, the effective potential has a minimum (acting as the physical vacuum), and the effective mass of the scalar field increases as the ambient density increases.
As a result of these requirements, all mechanics effects induced by the scalar field are suppressed in dense regions, where the range of the scalar fifth force is so short that it is hard to find by local experiments.
Theories in which the scalar field mass depends on the ambient density are called to be chameleon theories \cite{Khoury:2004aa, Khoury:2004ab, Gubser:2004aa}.
For $f(R)$ gravity the above requirements turns into, in some regions of $\phi$ \cite{Brax:2008aa},
\begin{eqnarray}
\label{fR_V_const}
\frac{d V}{d\phi}<0, \quad~~
\frac{d^2 V}{d\phi^2}>0, \quad~~
\frac{d^3 V}{d\phi^3}<0,
\end{eqnarray}
these can be translated into the constraints on the functional form of $f(R)$ (see Appendix \ref{appendix_cfR}).
If the potential function satisfies the above conditions, the $f(R)$ gravity can have a chameleon screening mechanism.
The $f(R)$ gravity with chameleon screening mechanism is also called chameleon $f(R)$ gravity.
Note that, for convenience, thereafter, we still use $f(R)$ to refer to chameleon $f(R)$, work in the Einstein frame and no longer label the Einstein frame with a tilde.
\section{PK parameters}\label{section3}
In this section, we study the PK effects in $f(R)$ gravity and calculate in detail the PK parameters for the binary pulsar moving on a quasi-elliptical orbit.
\subsection{Periastron Advance}
The periastron advance is an astronomical phenomenon in which the major axis of the orbit slowly rotates in the orbital plane.
This phenomenon is because in fact the net force experienced by a planet does not vary exactly as inverse-square.
In $f(R)$ gravity, the scalar fifth force modifies the orbital dynamics of binary pulsars and contributes to the periastron advance.
The scalar field corrections to the orbital dynamics can be effectively described by the point-particle action with scalar field-dependent mass introduced by Eardley \cite{Eardley:1975aa}.
The Lagrangian for the $a$-th body is given by
\begin{eqnarray}
\label{matter_Lag}
L_a = m_a(\phi)\frac{d\tau_a}{dt} = m_a(\phi)\Big(-g_{\mu\nu}\frac{dx_a^{\mu}}{dt}\frac{dx_a^{\nu}}{dt}\Big)^{\frac{1}{2}}.~~~~
\end{eqnarray}
By substituting the post-Newtonian (PN) expressions of the scalar and tensor fields in Eqs.\eqref{PN_metric_scalar}, and adopting the method of Einstein, Infeld and Hoffmann \cite{Einstein:1938aa}, we obtain the $N$-body Lagrangian up to $\mathcal{O}(v^4)$,
\begin{subequations}
\begin{eqnarray}
L_{N}
&=& - \sum_am_a \big( 1-\frac{v_a^2}{2}-\frac{v_a^4}{8} \big) + \frac12\sum_{a}\sum_{b\ne a}\frac{Gm_am_b}{r_{ab}}
\nonumber\\
&& \times \Big[ \mathscr{G}_{ab} + 3\mathscr{B}_{ab}v_a^2 - \frac12( \mathscr{G}_{ab}+6\mathscr{B}_{ab} )( \mathbf{v}_a\cdot \mathbf{v}_b )
\nonumber\\
&& - \frac12\mathscr{G}_{ab}(\mathbf{n}_{ab} \cdot \mathbf{v}_a)(\mathbf{n}_{ab} \cdot \mathbf{v}_b) - \sum_{c \ne a} \frac{Gm_c}{r_{ac}}\mathscr{D}_{abc}\Big], \qquad~
\end{eqnarray}
with
\begin{eqnarray}
\mathscr{G}_{\!ab} \!=\! 1 \!+\! \frac{\epsilon_a\epsilon_b}{2},~
\mathscr{B}_{\!ab} \!=\! 1 \!-\! \frac{\epsilon_a\epsilon_b}{6},~
\mathscr{D}_{\!abc} \!=\! 1 \!+\! \frac{\epsilon_a(\epsilon_b \!+\! \epsilon_c)}{2},\qquad~
\end{eqnarray}
\end{subequations}
where $\mathbf{n}_{ab}\equiv({\mathbf{r}_a-\mathbf{r}_b})/{r_{ab}}$ is the unit direction vector, and $\epsilon$ is the scalar charge of the body.
The scalar charge characters the difference from GR and can be well approximated by $\epsilon=\phi_{\scriptscriptstyle\infty}/({M_{\scriptscriptstyle\rm Pl}\Phi})$ (see Eq.~\eqref{epsilon_a}).
Using Eq.\eqref{conf_fR_ST}, the scalar charge can be rewritten as
\begin{eqnarray}
\label{epsilon_fR}
\epsilon=-\sqrt{\frac{3}{2}}\frac{\ln{f^{\prime}\!(R_{\scriptscriptstyle\infty}\!)}}{\Phi},
\end{eqnarray}
where $R_{\scriptscriptstyle\infty}$ is the background value of Ricci scalar, and $\Phi=Gm/R$ is the compactness of the body and $R$ is its radius.
Specializing to a two-body system (labeled by 1 and 2), the two-body equations of motion following from this Lagrangian are
\begin{eqnarray}
\frac{d^2 \mathbf{r}_1}{dt^2}
&=& - \frac{Gm_2\mathbf{n}_{12}}{r^2} \Big[ \mathscr{G}(1-v_{1}^2+\frac{\mathbf{v}_{12}^2}{2}-\frac{3}{2}(\mathbf{v}_{2}\cdot\mathbf{n}_{12})^2) \nonumber\\
&& - \frac{Gm_2}{r}(3\mathscr{G}\mathscr{B} \!+\! \mathscr{D}_{122}) \!-\! \frac{Gm_1}{r}(\mathscr{G}^2 \!+\! 3\mathscr{G}\mathscr{B} \!+\! \mathscr{D}_{211}\!) \nonumber\\
&& + \frac{3\mathscr{B}}{2}\mathbf{v}_{12}^2 \Big] \!+\! \frac{Gm_2\mathbf{v}_{12}}{r^2}(\mathscr{G}\mathbf{v}_1 \!+\! 3\mathscr{B}\mathbf{v}_{12}) \!\cdot\! \mathbf{n}_{12},~~~~~~~~\\
\frac{d^2 \mathbf{r}_2}{dt^2}
&=& \{1 \leftrightarrow 2\}, \nonumber
\end{eqnarray}
where $\mathbf{v}_{12} \equiv \mathbf{v}_1-\mathbf{v}_2$, $r \equiv r_{12}$, $\mathscr{G} \equiv \mathscr{G}_{12}$ and $\mathscr{B} \equiv \mathscr{B}_{12}$.
Obviously, at the Newtonian order, the equations of motion satisfy the inverse-square law, only the gravitational constant is replaced by $\mathscr{G}G$.
This result also suggests that the conservative orbital dynamics at the Newtonian order still hold, e.g., the Kepler's third law $a^3 = \mathscr{G}{G}m({P_b}/{2\pi})^2$.
Using the above equations of motion, employing the method of osculating elements \cite{Will:1993aa}, the periastron advance of the binary system is given by \cite{Will:1993aa}
\begin{eqnarray}
\label{PK_ome_dot}
\dot{\omega}=\frac{6\pi{Gm}}{a(1-e^2)P_b}\big(\mathscr{B}+\frac{\mathscr{G}}{6}-\frac{m_1\mathscr{D}_{211}+m_2\mathscr{D}_{122}}{6\mathscr{G}m}\big),~~~~
\end{eqnarray}
where $m$, $P_b$, $e$ and $a$ are the total mass, orbital period, orbital eccentricity and semi-major axis, respectively.
Using the Kepler's third law, the expression \eqref{PK_ome_dot} for the periastron advance is further simplified and summarized in Eqs.\eqref{PK_p}.
\subsection{Time Delay}
\subsubsection{Einstein Delay}
The combined effect of gravitational and kinetic time dilation is so-called Einstein delay.
In a circular orbit, the Einstein delay can be absorbed as a constant parameter, and it is meaningless.
In an elliptical orbit, the Einstein delay is always changing with time due to a variation in the pulsar velocity and a change of the distance between the pulsar and its companion.
The Einstein delay in an elliptical orbit can be computed by the proper time at the pulsar's point of emission,
\begin{eqnarray}
d{\tau}_p = dt \Big(-g_{\mu\nu}\frac{dx_p^{\mu}}{dt}\frac{dx_p^{\nu}}{dt}\Big)^{\frac{1}{2}},
\end{eqnarray}
where the subscript $p$ represents the pulsar.
Using the PN expressions in \eqref{PN_metric_scalar}, integrating the above equation, and dropping the constant terms, the result to first order is given by
\begin{subequations}
\begin{eqnarray}
{\tau}_p={t}-\gamma\sin{E},
\end{eqnarray}
with
\begin{eqnarray}
\gamma=\frac{\mathscr{G}Gm_c}{a}\Big(1+\frac{m_c}{m}\Big)\frac{P_b}{2\pi}e,
\end{eqnarray}
\end{subequations}
where $E$ is the eccentric anomaly of the orbit and $m_c$ is the companion mass.
The parameter $\gamma$ is the amplitude of Einstein delay, using the Kepler's third law, and it is rewritten as
\begin{eqnarray}
{\gamma}=e\frac{P_b}{2\pi}\left(\frac{2\pi{\mathscr{G}Gm}}{P_b}\right)^{\frac{2}{3}}\frac{m_c}{m}\left(1+\frac{m_c}{m}\right),
\end{eqnarray}
which is identical to that of GR in the limit of $\epsilon\rightarrow0$ \cite{Will:2014aa}.
\subsubsection{Shapiro Delay}\label{Shapiro}
The retardation of light signal caused by the reduced coordinate velocity of light in a gravitational field is so-called Shapiro delay \cite{Shapiro:1964aa}.
In binary pulsar systems, the Shapiro delay is usually parameterized by \cite{Wex:2014aa}
\begin{eqnarray}
\Delta t_{\rm S}
&=& 2r\ln\Big[1-e\cos{E}-s\sin{\omega}(\cos{E}-e) \nonumber\\
&& - s\cos{\omega}(1-e^2)^{\frac{1}{2}}\sin{E}\Big],
\end{eqnarray}
where $r$ and $s$ are called the range and shape of the Shapiro delay, and $\omega$ is the longitude of periastron.
The light signal travels along a null geodesic $g_{\mu\nu}dx^{\mu}dx^{\nu}=0$, which remains unchanged under the conformal transformation.
In other words, photons do not couple to the scalar field in $f(R)$ gravity, because the electromagnetic energy-momentum tensor has a vanishing trace.
Using the PN expressions \eqref{PN_metric_scalar}, the equation of null geodesic translates into the coordinate velocity of light,
\begin{eqnarray}
c_{\gamma}(\mathbf{r})
\equiv \frac{\sqrt{dx^i dx^j \delta_{ij}}}{dt}
= 1-2\sum_a\frac{Gm_a}{| \mathbf{r}-\mathbf{r}_a |} + \mathcal{O}(v^4).~~~~~
\end{eqnarray}
The Shapiro delay can be obtained by the integral $\Delta t_{\rm S} = \int dz/c_{\gamma}(\mathbf{r})$.
Clearly, $c_{\gamma}(\mathbf{r})$ is exactly the same as that in GR, which indicates that the Shapiro delay parameters are also the same as those in GR.
Therefore, the range of the Shapiro delay is given by $r=r_{\scriptscriptstyle\rm GR}=Gm_c$ \cite{Will:2014aa}.
The shape of the Shapiro delay is defined by $s\equiv\sin{i}=x_p/a_p$, where $a_p$ and $x_p$ are the semi-major axis and projected semi-major axis of the pulsar orbit, and $i$ is the orbital inclination angle.
Using the Kepler's third law, the shape of the Shapiro delay is rewritten as
\begin{eqnarray}
s={x_p}\left(\frac{2\pi}{{P_b}}\right)^{\frac{2}{3}}\frac{m^\frac{2}{3}}{{(\mathscr{G}G)^\frac{1}{3}}m_c}.
\end{eqnarray}
\subsection{Orbital Decay}
In the previous sections, the periastron advance and time delay only describe the conservative sector of the theory.
In this section we focus on the dissipative effects, calculate the loss rates of the orbital energy and angular momentum from the emission of GWs predicted by $f(R)$, and derive their contributions to the orbital decay.
\subsubsection{Energy and Angular Momentum Fluxes}
The orbital decay due to GWs damping is very important for testing gravity \cite{Hulse:1975aa, Taylor:1982aa, Taylor:1989aa}, and its theoretical derivation is also the basis of GWs waveform calculation \cite{Liu:2018aa, Zhang:2017ab}.
In the far zone, the tensor and scalar fields can be decomposed as the perturbations about the Minkowski background and the scalar background, i.e., $g_{\mu\nu}=\eta_{\mu\nu}+h_{\mu\nu}$ and $\phi=\phi_{\scriptscriptstyle\infty}+\varphi$.
Using these and imposing the transverse-traceless (TT) gauge on the Lagrangian density \eqref{Lagrangian_fR_E}, expanding to quadratic order in the perturbations $h_{\mu\nu}$ and $\varphi$, the Lagrangian densities of the tensor and scalar GWs are given by
\begin{eqnarray}
\mathcal{L}_{T}
&=& -\frac{M_{\scriptscriptstyle\rm Pl}^2}{8}\partial_{\mu} h_{ij}^{\rm TT}\partial^{\mu} h_{ij}^{\rm TT}, \\
\mathcal{L}_{S}
&=& -\frac{(\partial\varphi)^2}{2}-\frac{1}{2}m^2_s\varphi^2,
\end{eqnarray}
where ${h}^{\rm TT}_{ij}$ is the TT part of ${h}_{ij}$, and $m^2_{s}=d^2 V_{\rm eff}/d\phi^2|_{\phi_{\scriptscriptstyle\infty}}$ is the scalar field mass.
Energy and angular momentum are the conserved charges associated to time translation invariance and spatial rotation invariance, respectively.
The energy and angular momentum fluxes of the tensor and scalar GWs are derived directly from the above Lagrangians by investigating the Noether charges and currents, given by
\begin{subequations}
\label{E_L_fluxes}
\begin{eqnarray}
\label{tensor_Eflux}
\dot{E}_{T}
&=& \frac{r^2}{32\pi G} \!\int\! {d\Omega} {\big\langle} \dot{h}^{\rm TT}_{ij}\dot{h}^{\rm TT}_{ij} {\big\rangle}, \\
\label{scalar_Eflux}
\dot{E}_{S}
&=& - r^2 \!\int\! {d\Omega} {\big\langle} \dot{\varphi}\partial_r{\varphi} {\big\rangle}, \\
\label{tensor_Lflux}
\dot{L}^i_{T}
&=& \epsilon^{ijk}\frac{r^2}{32\pi G} \!\int\! {d\Omega} {\big\langle} 2h_{jl}^{\rm TT}\dot{h}_{kl}^{\rm TT}-\dot{h}_{lm}^{\rm TT}x^j\partial_kh_{lm}^{\rm TT} {\big\rangle}, \qquad~\\
\label{scalar_Lflux}
\dot{L}^i_{S}
&=& -\epsilon^{ijk}r^2 \!\int\! {d\Omega} {\big\langle} \dot{\varphi} x^j\partial_k\varphi {\big\rangle},
\end{eqnarray}
\end{subequations}
where the overdots denote time derivatives, the angular brackets stand for an average over an orbital period, $\Omega$ is the solid angle, and $\epsilon^{ijk}$ is the Levi-Civita symbol.
Obviously, the energy and angular momentum fluxes of the tensor GWs are exactly the same as those in GR.
In Eq.\eqref{tensor_Lflux}, the angular momentum flux of the tensor GWs comes from the contributions of the spin and orbital angular momentum of the tensor graviton.
In Eq.\eqref{scalar_Lflux}, the angular momentum flux of the scalar GWs comes only from the orbital angular momentum of the scalar GWs, because the scalar field is spin-0.
\subsubsection{Wave Solutions}
In the far zone, expanding the field equations \eqref{tensor_Eq} and \eqref{scalar_Eq} to linear order in the perturbations $h_{\mu\nu}$ and $\varphi$, and imposing the Lorentz gauge $\partial^{\mu}(h_{\mu\nu}-\frac{1}{2}\eta_{\mu\nu}h)=0$, the wave equations for the perturbations are given by \cite{Zhang:2017aa, Zhang:2019ac}
\begin{eqnarray}
\label{tensor_wave_eq}
&&\square{h}_{\mu\nu}=-16\pi G\big(T_{\mu\nu}-\frac{1}{2}\eta_{\mu\nu}T\big),
\\
\label{scalar_wave_eq}
&&(\square-m^2_s)\varphi=-\partial_{\varphi} T,
\end{eqnarray}
where $\square\equiv\eta^{\mu\nu}\partial_{\mu}\partial_{\nu}$ is the d'Alembertian of the flat space-time, and $T = \eta^{\mu\nu}T_{\mu\nu}$.
Note that here, $T_{\mu\nu}$ is the energy-momentum tensor of the matter, the energy-momentum tensors of the perturbations do not contribute to the wave equations in the linear regime.
From the definition of $T_{\mu\nu}\equiv-(2/\sqrt{-g})\delta S_m/\delta g^{\mu\nu}$, using the matter action of $S_m=-\sum_{a}\int m_a(\phi)d\tau_a$ (see Eq.~\eqref{matter_Lag}), yields
\begin{eqnarray}
\label{Tuv_matter}
T^{\mu\nu}\!=(-g)^{\!-\! \frac{1}{2}} \! \sum_{a}m_a(\phi) u^{\mu}_{a} u^{\nu}_{a} ({u^{0}_{a}})^{\!-\!1}\delta^3 \! (\mathbf{r} - \mathbf{r}_a\!),\quad
\end{eqnarray}
where $u^{\mu}_a$ is the unit four-velocity of the $a$-th body.
By substituting a plane wave $\varphi\sim e^{ik^\lambda x_\lambda}$ into $(\square-m_s^2)\varphi=0$, yields the dispersion relation $\omega^2={\mathbf k}^2+m_s^2$, where $\omega$ and $\mathbf k$ are the frequency (energy) and wave vector of the scalar GWs, and $k^\lambda=(\omega,{\mathbf k})$.
It is clear that the scalar mode in $f(R)$ can be excited only when its the energy is greater than its mass.
In general, $m_s\ll\omega$ for compact binaries, because $m_s\sim10^{-12}{\rm Hz}$ for a scalar fifth force range on galactic scales ($\sim10{\rm kpc}$) and $\omega\sim10^{-3} {\rm Hz}$ for a typical binary pulsar with a 1 hour orbital period.
Therefore, the scalar field mass is neglected in the calculations below.
By using the Green's function method, the formal solutions of the wave equations are
\begin{eqnarray}
&&{h}_{ij}^{\rm TT}(t,\mathbf{r})=4G \Lambda_{ij,kl}(\mathbf{n}) {\int} d^3\mathbf{r'} \frac{T_{kl}(t-|\mathbf{r-r'}|,\mathbf{r'})}{|\mathbf{r-r'}|},~~~~
\\
&&\varphi(t,\mathbf{r})=\frac{1}{4\pi} {\int} d^3\mathbf{r'} \frac{\partial_{\varphi} T(t-|\mathbf{r-r'}|,\mathbf{r'})}{|\mathbf{r-r'}|},
\end{eqnarray}
where we have used ${h}_{ij}^{\rm TT}=\Lambda_{ij,kl}{h}_{kl}$ and $\Lambda_{ij,kl}\delta_{kl}=0$, $\Lambda_{ij,kl}(\mathbf{n})$ is the Lambda tensor as defined in \cite{Maggiore:2007aa}, and $\mathbf{n}=\mathbf{r}/r$ is a unit vector in the direction of $\mathbf{r}$.
Here the spatial (source point $\mathbf{r'}$) integration region is over the near zone, the field point $\mathbf{r}$ is in the far zone, i.e., $|\mathbf{r}'|\ll|\mathbf{r}|$, such that $|\mathbf{r-r'}|=r-\mathbf{r' \cdot n} + \mathcal{O}(r'^2/r)$.
Using this, the wave solutions can be expanded in the sum of a series of multipole moments,
\begin{eqnarray}
\label{tensor_wave_solu}
&&{h}_{ij}^{\rm TT}\!(t,\mathbf{r}) \!=\! \frac{4G}{r} \! \Lambda_{i\!j\!,k\!l}(\mathbf{n}) \!\!\sum_{{\ell}=0}^\infty \!\! \frac{1}{{\ell}!}\partial_t^{\ell} \!\! \int \!\! d^3\!\mathbf{r'} (\mathbf{r' \!\!\cdot\! n})^{\ell} T_{kl}\!(t \!-\! r, \mathbf{r'}\!),~~~~~
\\
\label{scalar_wave_solu}
&&\varphi(t,\mathbf{r})=\frac{1}{4\pi r}\sum_{{\ell}=0}^\infty\frac{1}{{\ell}!} \partial_t^{\ell} \int d^3\mathbf{r'}(\mathbf{r' \cdot n})^{\ell} \partial_{\varphi}T\big(t\!-\!r,\,\mathbf{r'}\big),
\end{eqnarray}
where $\partial_t^{\ell} \equiv (\partial/\partial t)^{\ell}$.
\subsubsection{Orbital Decay}
According to the balance law, the decay rates of the orbital energy and angular momentum equal to minus the energy flux and angular momentum flux of GWs of the emission, respectively.
For binary pulsar systems, substituting the multipole moment expressions \eqref{tensor_wave_solu} and \eqref{scalar_wave_solu} of the wave solutions into the expressions \eqref{E_L_fluxes} of the energy and angular momentum fluxes, performing a series of calculations, up to the 2.5PN order, and the decay rates of the orbital energy and angular momentum are given and summarized in Appendix \ref{appendix_EL}.
Keeping only the leading order terms in Eqs.~\eqref{total_E_dot} and \eqref{total_L_dot}, the results reduce to
\begin{eqnarray}
\label{total_E_dot1}
\dot{E}&=&
- \frac{32 G^4\mu^2m^3}{5 a^5} F(e)
- \frac{G^3\mu^2m^2}{6a^4}\frac{(1+\frac{1}{2}e^2)}{(1-e^2)^{\frac{5}{2}}} \epsilon_d^2,
\\
\label{total_L_dot1}
\dot{L}&=&
- \frac{32 G^{\frac{7}{2}} \mu^2 m^{\frac{5}{2}}}{5 a^{\frac{7}{2}}}\frac{(1+\frac{7}{8}e^2)}{(1-e^2)^2}
- \frac{G^{\frac{5}{2}} \mu^2 m^{\frac{3}{2}}}{6a^{\frac{5}{2}}}\frac{\epsilon_d^2}{(1-e^2)}, \qquad
\end{eqnarray}
where $F(e)$ is defined in Eq.\eqref{F_e}, $\epsilon_p$ and $\epsilon_c$ are the scalar charges of the pulsar and its companion, $\epsilon_d \equiv \epsilon_p-\epsilon_c$, and $\mu \equiv m_1m_2/m$.
The orbital energy $E$ and the orbital angular momentum $L$ are related to the orbital semi-major axis $a$ and eccentricity $e$ through,
\begin{eqnarray}
E = - \frac{\mathscr{G}Gm\mu}{2a}, ~~~~
L^2=\mathscr{G}Gm\mu^2a(1-e^2).
\end{eqnarray}
Derivatives with respect to time yields
\begin{eqnarray}
\dot{a} \!=\! \frac{2a^2}{\mathscr{G}Gm\mu}\dot{E},~~~~
\dot{e} \!=\! \frac{a(1 \!-\! e^2)}{\mathscr{G}Gm\mu e}\Big[\dot{E} \!-\! \frac{(\mathscr{G}Gm)^{\frac{1}{2}}}{a^{\frac{3}{2}}(1 \!-\! e^2)^{\frac{1}{2}}}\dot{L}\Big],~~~~~
\end{eqnarray}
where $\dot{E}<0$ is a negative contribution to $\dot{e}$, and $\dot{L}<0$ is a positive contribution to $\dot{e}$.
Substituting Eqs. \eqref{total_E_dot1} and \eqref{total_L_dot1} into the above expressions, and using the Kepler's third law, the decay rates of the orbital parameters $P_b$, $e$ and $a$ are given by
\begin{eqnarray}
\label{Pb_dot1}
\dot{P}_b &=&
-\frac{192\pi}{5} \! \Big( \frac{2{\pi}Gm}{P_b} \Big)^{\!\frac{5}{3}} \! \frac{\mu}{m} F(e)
- \frac{2\pi^2 G\mu (1 \!+\! \frac{1}{2}e^2) \epsilon^2_d}{P_b (1 \!-\! e^2)^{\frac{5}{2}}},
\\
\label{e_dot1}
\dot{e} &=&
-\frac{608\pi}{15} \! \Big( \frac{2{\pi}Gm}{P_b} \Big)^{\!\frac{5}{3}} \! \frac{{\mu} e (1 \!+\! \frac{121}{304}e^2)}{m P_b (1 \!-\! e^2)^{\frac{5}{2}}}
-\frac{\pi^2 G\mu e \epsilon_d^2}{P_b^2 (1 \!-\! e^2)^{\frac{3}{2}}}, \qquad
\\
\dot{a} &=& \frac{1}{3 \pi} \Big( \frac{2{\pi}Gm}{P_b} \Big)^{\frac{1}{3}} {\dot{P}_b}.
\end{eqnarray}
Here, the first and second terms are the quadrupole and dipole radiation.
It can be seen that the orbital decay for an asymmetric binary system is dominated by the dipole radiation and is typically faster than in GR.
The above results will return to the GR case when $\epsilon_p=\epsilon_c=0$.
In fact, most extended theories of GR include extra helicity-0 or helicity-1 degrees of freedom, both of which can open up new channels of dipole gravitational radiation in asymmetric binary systems \cite{Maggiore:2007aa}.
Therefore, testing dipole radiation can also probe whether gravity includes these degrees of freedom.
Note that, the above expressions are also applicable to most theories of gravity with dipole radiation, and the only difference is that the model-dependent coefficients in dipole radiation are different.
\begin{figure}[!htbp]
\centering
\includegraphics[width=1\columnwidth]{fig_fe.pdf}
\caption{
Temporal evolution of the orbital frequency and eccentricity of a $1.6M_\odot$ - $0.4M_\odot$ NS-WD binary system with compactnesses of $0.2$ - $5\times10^{-5}$ in $f(R)$ theories with different values of $f^{\prime}\!(R_{\scriptscriptstyle\infty}\!)$.
The initial values of the orbital frequency and eccentricity are $10^{-4}$ Hz and 0.4.
}
\label{fig_fe}
\end{figure}
The orbital evolution can be obtained by solving the above system of nonlinear differential equations.
In Figure~\ref{fig_fe}, we show the temporal evolution of the orbital frequency ($f_b=1/P_b$) and eccentricity ($e$) of a NS-WD binary system in $f(R)$ theories with different values of $f^{\prime}\!(R_{\scriptscriptstyle\infty}\!)$.
The temporal evolution is given by numerically solving Eqs.~\eqref{Pb_dot1} and~\eqref{e_dot1} for a $1.6M_\odot$ - $0.4M_\odot$ NS-WD binary system with compactnesses of $0.2$ - $5\times10^{-5}$ and an initial eccentricity of 0.4 and an initial orbital frequency of $10^{-4}$ Hz (correspond to an initial orbital period of 2.8 hours).
Observe that the orbital frequency and eccentricity decay typically faster in $f(R)$ than in GR due to the presence of dipole radiation.
\subsection{Summary of PK parameters}
For convenience, the PK parameters are rewritten and summarized as follows:
\begin{subequations}
\label{PK_p}
\begin{eqnarray}
\label{PK_p1}
\dot{\omega}
&=& \dot{\omega}^{\scriptscriptstyle\rm GR}(1-\frac{1}{3} \epsilon_p\epsilon_c), \\
\label{PK_p2}
\gamma
&=& \gamma^{\scriptscriptstyle\rm GR}(1+\frac{1}{3}\epsilon_p\epsilon_c), \\
\label{PK_p3}
r
&=& r^{\scriptscriptstyle\rm GR}, \\
\label{PK_p4}
s
&=& s^{\scriptscriptstyle\rm GR}(1-\frac{1}{6}\epsilon_p\epsilon_c), \\
\label{PK_p5}
\dot{P_b}
&=& \dot{P}_b^{\scriptscriptstyle\rm GR}\Big[1+\frac{5}{192}\Big(\frac{P_b}{2{\pi}Gm}\Big)^{\frac{2}{3}}\frac{(1+\frac{1}{2}e^2) \epsilon_d^2}{(1-e^2)^{\frac{5}{2}}F(e)}\Big],\\
\label{PK_p6}
\dot{e}
&=& \dot{e}^{\scriptscriptstyle\rm GR}\Big[1+\frac{15}{1216}\Big(\frac{P_b}{2{\pi}Gm}\Big)^{\frac{2}{3}}\frac{(1-e^2) \epsilon_d^2}{1+\frac{121}{304}e^2}\Big], \\
\label{PK_p7}
\dot{a}
&=& \dot{a}^{\scriptscriptstyle\rm GR}\Big[1+\frac{5}{192}\Big(\frac{P_b}{2{\pi}Gm}\Big)^{\frac{2}{3}}\frac{(1+\frac{1}{2}e^2) \epsilon_d^2}{(1-e^2)^{\frac{5}{2}}F(e)}\Big], \qquad
\end{eqnarray}
with
\begin{eqnarray}
\label{PK_p8}
\epsilon_p\epsilon_c\!=\!\frac{3[\ln \! f^{\prime}\!(R_{\scriptscriptstyle\infty}\!)]^2}{2\Phi_p\Phi_c}, \quad
\epsilon_d^2\!=\!3[\ln \! f^{\prime}\!(R_{\scriptscriptstyle\infty}\!)]^2\frac{(\Phi_p\!-\!\Phi_c)^2}{2\Phi_p^2\Phi_c^2}, \qquad~
\end{eqnarray}
\end{subequations}
where the superscript GR denotes the GR values of the PK parameters (see Appendix \ref{appendix_GRPK}).
The periastron advance, Einstein delay and Shapiro delay are the PK effects of 1PN, 1PN and 1.5PN, respectively.
The orbital decay rates come from the contributions of 2.5PN quadrupole radiation and 1.5PN dipole radiation.
In binary pulsars, through timing analysis, in general, the measurement of $\dot{P}_b$ is more accurate than that of $\dot{e}$ (or $\dot{a}$), and hence the constraint on the theory from $\dot{P}_b$ is generally more stringent.
Therefore, in binary pulsars, $\dot{P}_b$ and the first four PK parameters in Eqs.\eqref{PK_p} are usually used to test GR.
\section{Binary Pulsar Tests}\label{section4}
In this section, we study how to place constraints on $f(R)$ gravity with binary pulsar observations.
\subsection{Binary Pulsars}
\begin{table*}[!htbp]
\centering
\caption{Timing model parameters for three binary pulsar systems. Numbers in parentheses represent 1$\sigma$ (68.3\%) uncertainties in the last quoted digit. $^{\rm a}$The masses are derived by assuming that GR is valid. $^{\rm b}$The WD radius is derived by the WD mass-radius relation \cite{Hamada:1961aa}. $^{\rm c}$The NS radius is derived by assuming APR EoS is valid \cite{Akmal:1998aa}.}
\label{tab_PSRs}
\renewcommand{\arraystretch}{1.1}
\begin{tabular}{lrrrr}
\hline\hline
PSR Name & J1141$-$6545 \cite{Bhat:2008aa,Ord:2002aa}
& J1738$+$0333 \cite{Freire:2012aa}
& J0348$+$0432 \cite{Antoniadis:2013aa}
\\ \hline
Orbital period, $P_b$ (days)&0.1976509593(1)&0.3547907398724(13)&0.102424062722(7)\\
Projected semi-major axis, $x_p$ (s)&1.858922(6)&0.343429130(17)&0.14097938(7)\\
Eccentricity, $e$&0.171884(2)&$0.34(11)\times10^{-6}$&$0.24(10)\times10^{-5}$\\
Periastron advance, $\dot\omega$ (deg/yr)&5.3096(4)& ... & ... \\
Einstein delay, $\gamma$ (ms)&0.773(11)& ... & ... \\
Observed $\dot P_b$, $\dot P_b^{\text{obs}}$ $(10^{-13})$&$-4.03(25)$&$-0.170(31)$&$-2.73(45)$\\
Intrinsic $\dot P_b$, $\dot P_b^{\text{int}}$ $(10^{-13})$&$-4.01(25)$&$-0.259(32)$&$-2.73(45)$\\
Shapiro delay, $s$ &0.97(1)& ... & ... \\
Mass ratio, $q=m_{\scriptscriptstyle\rm NS}/m_{\scriptscriptstyle\rm WD}$& ... &8.1(2)&11.70(13)\\
WD mass, $m_{\scriptscriptstyle\rm WD}$ ($M_{\scriptscriptstyle\odot}$)&$1.02(1)^{\rm a}$&${0.181^{+0.008}_{-0.007}}$&$0.172(3)$ \\
NS mass, $m_{\scriptscriptstyle\rm NS}$ ($M_{\scriptscriptstyle\odot}$)&$1.27(1)^{\rm a}$&${1.46^{+0.06}_{-0.05}}^{\rm a}$&$2.01(4)^{\rm a}$ \\
WD radius, $R_{\scriptscriptstyle\rm WD}$ ($R_{\scriptscriptstyle\odot}$) & $0.0080(1)^{\rm b}$ & $0.037_{-0.003}^{+0.004}$ & $0.065(5)$ \\
NS radius, $R_{\scriptscriptstyle\rm NS}$ (km) & $11.391(2)^{\rm c}$ & $11.35(2)^{\rm c}$ & $10.89(8)^{\rm c}$ \\
\hline\hline
\end{tabular}
\end{table*}
Binary pulsars are crucial as the first indirect detectors of GWs \cite{Hulse:1975aa,Taylor:1982aa,Taylor:1989aa}.
Binary pulsars possess extreme gravitational environment, making them very useful tools for testing strong-field gravity.
The orbital decay in $f(R)$ gravity is dominated by the dipole radiation, which depends on the difference in the compactnesses of pulsar and its companion (see Eqs.~\eqref{PK_p}).
Therefore the asymmetric systems like NS-WD binaries are one of the ideal targets to test $f(R)$ gravity.
Moreover, although the theory parameter $f^{\prime}\!(R_{\scriptscriptstyle\infty}\!)$ is degenerate with the compactnesses of binaries, the degeneracy can be broken by the radii of binaries.
Therefore, in the PK parameters, there are only three independent parameters $m_p$, $m_c$ and $f^{\prime}\!(R_{\scriptscriptstyle\infty}\!)$ to be determined.
For all these reasons, testing $f(R)$ gravity by binary pulsars requires that they can provide at least three PK observables, including the intrinsic $\dot{P}_b^{\rm int}$~\footnote{The intrinsic $\dot{P}_b^{\rm int}$ can be obtained from the observed value of $\dot{P}_b^{\rm obs}$ by subtracting two main effects: the differential galactic acceleration \cite{Damour:1991aa} and the Shklovskii effect \cite{Shklovskii:1970aa}.
} caused by gravitational radiation damping.
Based on the above analysis, we consider the following three NS-WD systems: PSRs J1141$-$6545 \cite{Bhat:2008aa,Ord:2002aa}, J1738$+$0333 \cite{Freire:2012aa} and J0348$+$0432 \cite{Antoniadis:2013aa}.
Among these three NS-WD systems only the latter two systems provide the measured value of WD radius.
The radius of the WD in the first system is estimated by using the WD mass-radius relation \cite{Hamada:1961aa}.
For each NS in these three systems, the NS radius is estimated by using the mass-radius relation derived from the equations of state (EoS) based on the Akmal, Pandharipande, and Ravenhall (APR)~\footnote{So far, the NS EoS is not fully known. Here we consider the APR model and assume that it is valid.} model \cite{Akmal:1998aa}.
The relevant parameters for these three systems are listed in Table \ref{tab_PSRs}.
\subsection{Method and Results}
We perform a Monte-Carlo simulation to determine these three unknown parameters $m_p$, $m_c$ and $f^{\prime}\!(R_{\scriptscriptstyle\infty}\!)$ for each of these systems mentioned above.
In this simulation, the input quantities are mainly the PK observables, and each of them is randomly sampled from a normal distribution with mean and standard deviation equal to its observed value and 1-$\sigma$ uncertainty.
Then, these unknown parameters as the output quantities are estimated by numerically solving the system of equations \eqref{PK_p} of the PK parameters.
This process is repeated $10^6$ times to construct the histograms of these unknown parameters and determine their median values and uncertainties.
The results are shown in Fig.~\ref{fig_m1m2fR_Violin} and Table~\ref{tab_m1m2fR}.
\begin{figure}[!htbp]
\centering
\includegraphics[width=1\columnwidth]{fig_m1m2fR_Violin.pdf}
\caption{Violin plots of parameters $m_{\scriptscriptstyle\rm NS}$, $m_{\scriptscriptstyle\rm WD}$ and $|1-f^{\prime}\!(R_{\scriptscriptstyle\infty}\!)|^2$ for binary pulsars.
PSRs J1141$-$6545, J1738$+$0333 and J0348$+$0432 are represented in gray, blue and orange, respectively.
The red lines represent the 95.4\%~CL upper bound.}
\label{fig_m1m2fR_Violin}
\end{figure}
\begin{table}[!htbp]
\centering
\caption{Parameters $m_{\scriptscriptstyle\rm NS}$, $m_{\scriptscriptstyle\rm WD}$, and upper bound on $|1-f^{\prime}\!(R_{\scriptscriptstyle\infty}\!)|$ at 95.4\%~CL for binary pulsars.}
\label{tab_m1m2fR}
\renewcommand{\arraystretch}{1.1}
\begin{tabular}{p{2cm}<{\raggedright}p{1.5cm}<{\raggedleft}p{2cm}<{\raggedleft}p{2.5cm}<{\raggedleft}}
\hline\hline
PSR Name & $m_{\scriptscriptstyle\rm NS}\,(M_{\scriptscriptstyle\odot})$ & $m_{\scriptscriptstyle\rm WD}\,(M_{\scriptscriptstyle\odot})$ & $|1-f^{\prime}\!(R_{\scriptscriptstyle\infty}\!)|\le$ \\
\hline
J1141$-$6545 & $1.27(1)$ & $1.02(1)$ & $8.9\times10^{-7}$ \\
J1738$+$0333 & $1.47(7)$ & $0.181(8)$ & $2.6\times10^{-8}$ \\
J0348$+$0432 & $2.01(4)$ & $0.172(3)$ & $3.3\times10^{-8}$ \\
\hline\hline
\end{tabular}
\end{table}
\begin{figure*}[!htbp]
\centering
\subfigure[PSR J1141$-$6545]{
\label{fig_a}
\includegraphics[width=5.8cm, height=5.8cm]{fig_mm_J1141.pdf}}
\subfigure[PSR J1738$+$0333]{
\label{fig_b}
\includegraphics[width=5.8cm, height=5.8cm]{fig_mm_J1738.pdf}}
\subfigure[PSR J0348$+$0432]{
\label{fig_c}
\includegraphics[width=5.8cm, height=5.8cm]{fig_mm_J0348.pdf}}
\caption{Mass-mass diagrams for the NS-WD PSRs J1141$-$6545, J1738$+$0333 and J0348$+$0432.
In (a), for $\dot\omega$, $\gamma$ and $s$, the dashed curves ($f(R)$) are covered by the solid curves (GR).
In (b) and (c), $q$ and $m_{\scriptscriptstyle\rm WD}$ are independent of specific gravity theories.
The width of each curve represents $\pm1\sigma$ error bounds.
The gray regions are ruled out by the condition $s\equiv\sin{i}\le1$.}
\label{fig_MM}
\end{figure*}
PSR J1141$-$6545 is a 394 ms pulsar in a 4.74 hours elliptical orbit with a WD companion.
This system provides the four PK observables $\dot{P}_b^{\rm int}$, $\dot\omega$, $\gamma$ and $s$.
The first three observables are used to compute the three unknown parameters $m_{\scriptscriptstyle\rm NS}$, $m_{\scriptscriptstyle\rm WD}$ and $f^{\prime}\!(R_{\scriptscriptstyle\infty}\!)$, and the last is the only one test on $f(R)$.
By performing a Monte-Carlo simulation, the unknown parameters for this system are derived and shown in Fig.~\ref{fig_m1m2fR_Violin} and Table~\ref{tab_m1m2fR}.
This system gives the upper bound on $|1-f^{\prime}\!(R_{\scriptscriptstyle\infty}\!)|$ of $8.9\times10^{-7}$ at 95.4\%~confidence level (CL).
These results imply the Shapiro delay shape $s=0.96(1)$ (68.3\%~CL) in $f(R)$, which agrees with its observed value 0.97(1) (see Table \ref{tab_PSRs}).
PSRs J1738$+$0333 and J0348$+$0432 are millisecond pulsars in low-eccentricity orbits with low-mass WD companions.
Each of these two systems provides only the three observables $\dot{P}_b^{\rm int}$, WD mass $m_{\scriptscriptstyle\rm WD}$ and mass ratio $q$.
Using these observables and performing Monte-Carlo simulations, we obtain the upper bounds on $|1-f^{\prime}\!(R_{\scriptscriptstyle\infty}\!)|$ of $2.6\times10^{-8}$ and $3.3\times10^{-8}$ at 95.4\%~CL from PSRs J1738$+$0333 and J0348$+$0432 (see Fig.~\ref{fig_m1m2fR_Violin} and Table~\ref{tab_m1m2fR}), respectively.
These results rule out significant strong-field deviations of gravity from GR, and confirm that GR is a correct theory of gravity for asymmetric systems of strong gravity.
PSR J1738$+$0333 is the most constraining binary pulsar for testing $f(R)$ in these binary pulsar systems.
The mass-mass diagrams for PSRs J1141$-$6545, J1738$+$0333 and J0348$+$0432 are shown in Figs.~\ref{fig_a}, \ref{fig_b} and \ref{fig_c}, respectively.
These constraints on $m_{\scriptscriptstyle\rm NS}$ and $m_{\scriptscriptstyle\rm WD}$ in GR (solid) and in $f(R)$ (dashed) are based on the observables of the PK parameters, WD mass and mass ratio.
The PK constraint curves in $f(R)$ (dashed) are obtained by giving the deviation parameter $|1-f^{\prime}\!(R_{\scriptscriptstyle\infty}\!)|$ an upper limit (see Table~\ref{tab_m1m2fR}).
In Fig.~\ref{fig_a}, for a very small value of $8.9\times10^{-7}$ of $|1-f^{\prime}\!(R_{\scriptscriptstyle\infty}\!)|$, the $\dot\omega$, $\gamma$ and $s$ constraint curves in $f(R)$ (dashed) are exactly covered by those in GR (solid).
The $\dot P_b$ constraint curves in $f(R)$ (blue dashed) are significantly different from that in GR (red solid), because the stronger dipole radiation appears in $f(R)$.
Therefore, the constraint on $f(R)$ from PSR J1141$-$6545 mainly comes from the measured value of $\dot{P}_b^{\rm int}$.
In Figs.~\ref{fig_b} and \ref{fig_c}, the WD mass $m_{\scriptscriptstyle\rm WD}$ and mass ratio $q$ are theory-independent, therefore the constraints on $f(R)$ from PSRs J1738$+$0333 and J0348$+$0432 only come from the measured value of $\dot{P}_b^{\rm int}$.
These constraints from $\dot{P}_b^{\rm int}$ exclude significant dipole radiation deviations, which indicates no solid evidence of the existence of helicity-0 or helicity-1 degrees of freedom.
\section{Conclusions}\label{section5}
Chameleon $f(R)$ gravity is a natural alternative to GR.
In this paper, in the framework of chameleon $f(R)$, we studied the full PK effects of binary pulsars, and constrained the theory by using the observed PK parameters of NS-WD binary pulsar systems.
The PK effects in chameleon $f(R)$ differ from those in GR and the deviations are quantified by a combination of theory parameter $f^{\prime}\!(R_{\scriptscriptstyle\infty}\!)$ and star's compactness.
Because of the degeneracy between them, the theory parameter cannot be constrained alone.
The parameter degeneracy is broken by using the mass-radius relation, which allows us to place constraints on theory parameter.
The temporal evolution of the orbital period and eccentricity is typically faster than in GR due to the emission of dipole radiation in chameleon $f(R)$.
We used the three NS-WD binary pulsars to place constraints on chameleon $f(R)$ by performing Monte-Carlo simulations.
These constraints can also be thought of as tests of dipole radiation, which can probe whether GWs include extra helicity-0 or helicity-1 polarization states.
The results show that PSR J1738$+$0333 is the most constraining binary pulsar for testing chameleon $f(R)$ in these systems.
The significant strong-field deviations from GR are excluded by binary pulsar tests.
All tests show good agreement with GR, which indicates that GR is correct for asymmetric systems of strong gravity.
\acknowledgments{
We appreciate the helpful discussion with Dan Wang.
This work is supported by the National Natural Science Foundation of China (NSFC) Grant No.11903033 and the Fundamental Research Funds for the Central Universities under Grant No.WK2030000036.
}
|
\section{Introduction}
\label{sec:intro}
Recent years have witnessed an accelerated growth of capturing devices, enabling the ubiquitous image acquisition in various illuminace conditions.
Typically, images acquired under low-light conditions inevitably degraded by various visual quality impairments, such as undesirable visibility, low contrast, and intensive noise.
Low-light image enhancement aims to restore the latent normal-light image from the observed low-light one to simultaneously obtain desirable visibility, appropriate contrast, and suppressed noise~\cite{wang2019underexposed, yang2020fidelity}.
It greatly improves the quality of images to benefit human vision and can also assist in high-level computer vision tasks, such as image classification~\cite{loh2019getting}, face recognition~\cite{jiang2019enlightengan}, and objection detection~\cite{loh2019getting},~\textit{etc}.
Pioneering low-light image enhancement methods stretch the dynamic range of low-light images, \textit{i.e.} Histogram equalization (HE)~\cite{abdullah2007dynamic, coltuc2006exact, stark2000adaptive, arici2009histogram}, or adjust the decomposed illumination and reflectance layers adaptively, \textit{i.e.} Retinex-based approaches~\cite{wang2013naturalness, fu2016weighted, jobson1997multiscale, guo2016lime}.
\begin{figure}[t]
\centering
\subfigure[Input]{
\includegraphics[width=4.0cm]{illustration/teaser/low00743-input.png}}
\subfigure[SICE~\cite{cai2018learning}]{
\includegraphics[width=4.0cm]{illustration/teaser/low00743-sice.png}}
\\ \vspace{-5pt}
\subfigure[ZeroDCE~\cite{jiang2019enlightengan}]{
\includegraphics[width=4.0cm]{illustration/teaser/low00743-zerodce.png}}
\subfigure[CIGAN]{
\includegraphics[width=4.0cm]{illustration/teaser/low00743-cigan.png}}
\\
\vspace{-10pt}
\caption{
Visual quality comparison of different methods on a real low-light image in LOL~\cite{wei2018deep}. SICE~\cite{cai2018learning} and ZeroDCE~\cite{guo2020zero} are the leading~\textit{supervised} and~\textit{unsupervised} methods, respectively. Our proposed CIGAN well restores the normal-light image with appropriate illumination and contrast as well as suppressed noise.
}
\vspace{-15pt}
\label{fig:teaser}
\end{figure}
Recently, learning-based approaches have achieved remarkable successes~\cite{cai2018learning, chen2018learning, wang2019underexposed, ni2020towards}. Most of these methods follow the paradigm of supervised learning and heavily rely on the well-prepared paired normal/low-light images to train and evaluate models. However, the commonly seen paired training datasets suffer from their respective limitations. First, \textit{synthesized data} via a simplified simulated imaging pipeline~\cite{lore2017llnet} might fail to capture intrinsic properties of real low-light images. Second, it is quite labor-intensive and time-consuming to create \textit{manual retouching data}~\cite{wang2019underexposed, bychkovsky2011learning} by expert retouchers. It also takes the risk of personal quality bias of the retouchers to adopt such kinds of data as the training data. Third, \textit{real captured data}~\cite{wei2018deep} might capture real degradation but fail to cover diverse scenes and objects in the wild. Besides, the ground truths captured with a pre-defined setting, \textit{i.e.} the exposure time and ISO, might not be optimal. Therefore, the reliance of supervised methods on the paired data inevitably leads to the domain shift between the training data and testing data in the real world,
further bringing challenges to the generalization on real low-light images.
Recently, a series of unsupervised low-light enhancement methods are proposed. These methods have no reliance on the paired training data and only require two unpaired collections of low/normal-light images. They are built based on the uni-directional generative adversarial network (GAN)~\cite{jiang2019enlightengan} or learnable curve adjustment~\cite{guo2020zero}. These methods achieved promising performances in illumination/contrast adjustment.
However, due to the absence of supervision of detailed signal, the quality for some challenging real low-light images with intensive noise are not satisfactory. As a very similar topic, image aesthetic quality enhancement benefits from
CycleGAN~\cite{zhu2017unpaired, chen2018deep, ni2020unpaired} to deliver state-of-the-art performance. We argue that, these CycleGANs neither handle low-light image enhancement problem effectively. First, low-light degradation introduces information lost, which makes the enhancement problem ambiguous. In other words, the mapping between low/normal-light images is~\textit{one-to-many mapping}.
However, CycleGAN can only lead to one-to-one discriminative mapping~\cite{choi2018stargan}.
Second, the intrinsic dimensions of low/normal-light domains are imbalanced as low-light images with intensive noise reflect more complicated properties. The imbalance might disturb the training of CycleGANs, namely that the degradation generator fails to synthesize realistic noise and subsequently the enhancement generator cannot handle the realistic degradation.
In this paper, we propose a novel~\textit{Cycle Interactive GAN} (CIGAN) for unsupervised low-light image enhancement to simultaneously~\textit{adjust illumination, enhance contrast} and~\textit{suppress noise}.
The more comprehensive consideration of image degradation leads to more effective degradation and enhancement processes in cycle modeling. In other words, the more~\textit{realistic and diverse} the low-light images generated in image degradation, the better and more robust the results in image enhancement.
To address the above-mentioned issues of CycleGANs, efforts have been made in three aspects. First, we make the degradation and enhancement generators in our CIGAN~\textit{interact} with each other. More specifically, we propose a novel low-light guided transformation to transfer the features of real low-light images from the enhancement generator to the degradation generator. With the information of different real low-light images as the reference during the whole training process, more diverse low-light images are synthesized, which is beneficial for modeling multiple mappings relationship between low/normal-low images. Second, to handle the domain imbalance issue, we incorporate a novel feature randomized perturbation in the degradation generator. The perturbation applies a learnable randomized affine transform to the intermediate features, which balances the intrinsic dimensions of the features in two domains and is beneficial for synthesizing realistic noise. Last but not least, we design a series of advanced modules to improve the modeling capacities of our CIGAN, such as a dual attention module at the generator side, a multi-scale feature pyramid at the discriminator side, a logarithmic image processing model as the fusion operation of enhancement generator.
Extensive experimental results show that our method is superior to existing~\textit{unsupervised} methods and even the state-of-the-art supervised methods on real low-light images.
To summarize, the main contributions of our paper are three-fold:
\begin{itemize}
\item We propose a novel CIGAN for unsupervised low-light image enhancement to simultaneously~\textit{adjust illumination},~\textit{enhance contrast}, and~\textit{suppress noise}, which excellent in image enhancement and significantly surpasses most previous works in image degradation modeling.
\vspace{5pt}
\item We propose a low-light guided transformation (LGT) that allows generators of degradation/enhancement to interact, which helps to generate low-light images with more~\textit{diverse} and~\textit{realistic illumination} and~\textit{contrast}.
\vspace{5pt}
\item We propose a learnable feature randomized perturbation (FRP) to produce diverse feature distributions, which makes the generated low-light images with more~\textit{realistic noise} and
benefits the low-light image enhancement process.
\end{itemize}
\begin{figure*}[t]
\centering
\subfigure{
\includegraphics[width=1.0\linewidth]{./illustration/framework.pdf}}
\caption{
The proposed~\textit{unsupervised} CIGAN consists of complementary dGAN and eGAN.
(i) The dGAN learns to synthesize realistic low-light images under the supervision of~\textit{unpaired} normal/low-light images. (ii) The eGAN restores normal-light images from synthesized low-light images under the paired supervision generated by dGAN.
Our CIGAN is different from previous CycleGANs in:
1) {\color{red}Red dotted line:} the generator of eGAN feed-forwards information of low-light features $\mathcal{E}^i(I_l)$ to that of dGAN via LGT to help dGAN generate more diverse and realistic illumination and contrast;
2) {\color{blue}Blue dotted line:} Random noise is injected into dGAN via Feature Randomized Perturbation (FRP) to learn to produce more diverse feature distributions for synthesizing more realistic noise.
The better the synthesized low-light images, the better the eGAN that learns to enhance low-light images towards better illumination, contrast, and suppressed noise.
}
\label{fig:framework}
\end{figure*}
\section{Related Work}
\label{sec:related}
\subsection{Traditional Image Enhancement}
\noindent \textbf{Histogram equalization (HE)}. HE focuses on fitting the illumination histogram to a specific distribution according to local or global statistical characteristics~\cite{abdullah2007dynamic, coltuc2006exact, stark2000adaptive, arici2009histogram}. For example, Arici~\emph{et al.}~\cite{arici2009histogram} cast HE as an optimization problem to improve image contrast while suppressing unnatural effects. Abdullah~\emph{et al.}~\cite{abdullah2007dynamic} proposed a dynamic HE technique using partition operation. Stark~\emph{et al.}~\cite{stark2000adaptive} presented an adaptive contrast enhancement based on generalizations of HE. The main problem of HE is that it easily causes over-enhancement and noise amplification.
\noindent \textbf{Retinex-based approaches}. The Retinex-based method decomposes low-light images into an illumination layer and a reflectance layer to adaptively perform joint illumination adjustment and noise suppression~\cite{wang2013naturalness, fu2016weighted, jobson1997multiscale, guo2016lime}. Wang~\emph{et al.}~\cite{wang2013naturalness} proposed a naturalness Retinex for non-uniform illumination image enhancement. Fu~\emph{et al.}~\cite{fu2016weighted} introduced a weighted variation Retinex that simultaneously estimates the illumination and reflectance layer. These methods have shown satisfying performance in illuminance adjustment, however, hand-crafted constraints are difficult to accurately decompose the low-light image into the illumination and reflection layers, resulting in unnatural visual effects.
\subsection{Learning-based Image Enhancement}
Low-light image enhancement has achieved great successes with the booming of deep learning~\cite{lore2017llnet, wang2019underexposed, jiang2019enlightengan, yang2020fidelity, guo2020zero}. Broadly speaking, learning-based image enhancement methods can be roughly divided into three categories according to training data: supervised~\cite{cai2018learning, lore2017llnet, ren2019low, wang2019underexposed}, semi-supervised~\cite{yang2020fidelity}, and unsupervised~\cite{jiang2019enlightengan, guo2020zero, ni2020unpaired, xiong2020unsupervised, ni2020towards}. LLNet~\cite{lore2017llnet} is the first attempt to introduce deep learning into the problem of low-light image enhancement. For enhanced performance, various supervised methods are proposed by designing sophisticated network architectures and optimization objects, such as MSR-net~\cite{shen2017msr}, DRD~\cite{wei2018deep}, SICE~\cite{cai2018learning}, DHN~\cite{ren2019low}, and UPE~\cite{wang2019underexposed}. However, these supervised methods are subject to the common restriction of highly dependent on~\emph{paired} data, which limits the performance of these methods on real testing data.
Most recently, Yang~\emph{et al.}~\cite{yang2020fidelity} proposed a semi-supervised low-light enhancement method.
Jiang~\emph{et al.}~\cite{jiang2019enlightengan} proposed the first unsupervised model based on GAN.
Guo~\emph{et al.}~\cite{guo2020zero} adopted the no-reference optimization without paired or unpaired data.
These unsupervised methods achieve promising performance in illumination adjustment, however, noise suppression has not been considered.
\begin{figure*}[t]
\centering
\subfigure{
\includegraphics[width=0.96\linewidth]{./illustration/modules.pdf}}
\vspace{-10pt}
\caption{
The detailed structure of proposed (a) LGT, (b) FRP, and (c) DAM. The Conv and LReLU are convolution and LeakyReLU operations, respectively.
The FRP used in dGAN helps synthesize realistic noise. The DAM is used in eGAN and dGAN to effectively model contextual information.
}
\label{fig:modules}
\vspace{-10pt}
\end{figure*}
\section{Method}
\label{sec:methodology}
As shown in Fig.~\ref{fig:framework}, our proposed CIGAN aims to improve the perceptual quality of low-light images by simultaneously adjusting illumination, enhancing contrast and suppressing noise under the supervision of~\textit{unpaired} data.
It consists of complementary degradation GAN (dGAN) and enhancement GAN (eGAN).
\noindent\textbf{1) dGAN}: It aims to synthesize a realistic low-light image $\tilde{I}_l \in \mathbb{L}$ (low-light image domain) from the input normal-light image $I_n \in \mathbb{N}$ (normal-light image domain) with the help of a~\textit{reference} low-light image $I_l \in \mathbb{L}$.
We design two modules to synthesize more realistic low-light images with low-light illumination and contrast as well as intensive noise.
As denoted by the {\color{red}red dotted line} in Fig.~\ref{fig:framework}, \textbf{LGT} (see Sec.~\ref{sec:lgt}\textcolor{red}{-1}) helps dGAN synthesize $\tilde{I}_l$ with the feature information of $I_l$, which preserves the content of $I_n$ while the introduced low-light attributes of $I_l$ makes $\tilde{I}_l$ have more realistic and diverse low-light illumination and contrast.
As denoted by the {\color{blue}blue dotted line} in Fig.~\ref{fig:framework}, \textbf{FRP} (see Sec.~\ref{sec:frp}\textcolor{red}{-2}) learns to inject random noise into features to make the feature distributions more diverse and synthesize more realistic image noise.
Furthermore, an exposure assessment loss $L_{\text{exp}}$ (see Sec.~\ref{sec:objectives}\textcolor{red}{-1}) is adopted to keep the local average illumination of synthesized low-light images close to a low value.
\noindent\textbf{2) eGAN}: Conversely, it focuses on learning to recover the latent normal-light image $\hat{I}_n$ ($\hat{I}_n \in \mathbb{N}$) from the synthesized low-light image $\tilde{I}_l$.
To make the generator of eGAN yield high-quality normal-light images, we design a flexible logarithmic image processing (LIP) fusion model and a dual attention module (DAM) (see Sec.~\ref{sec:attention}\textcolor{red}{-3}).
\subsection{Model Architecture}
\noindent \textbf{1) Generator of dGAN}.
Given an input normal-light image $I_n$ and a reference low-light image $I_l$, we adopt the pre-trained VGG-19 network~\cite{simonyan2014very} $\mathcal{E}(\cdot)$ to extract their multi-scale feature representations as $\mathcal{E}^i(I_n)$ and $\mathcal{E}^i(I_l)$, respectively.
The LGT uses the features $\mathcal{E}^i(I_l)$ extracted from $I_l$ to adaptively modulates the features $\mathcal{E}^i(I_n)$ of $I_n$, which helps to synthesize more diverse illumination and contrast under the guidance of various unpaired reference low-light images.
The DAM is designed to capture context information from spatial and channel dimensions.
The FRP learning randomly perturbs the features of decoder $\mathcal{G}_L$ to help synthesize low-light images with~\textit{realistic noise}.
Therefore, the synthesized low-light image $\tilde{I}_l$ can be expressed as:
\begin{equation}
\label{equ:dgan}
\tilde{I}_l = \mathcal{G}_L \Big( \mathcal{E}^i(I_n), \mathcal{E}^i(I_l), \mathcal{T}_i, \mathcal{A}_i, \mathcal{P}_i \Big),
\end{equation}where $\mathcal{T}_i$, $\mathcal{A}_i$, and $\mathcal{P}_i$ are LGT, DAM, and FRP at the $i$-th scale, respectively. Basically, the multi-scale features $\mathcal{E}^i(\cdot)$ is relu\textit{i}\_1(\textit{i.e.,} relu1\_1, relu2\_1, relu3\_1, relu4\_1, and relu5\_1, respectively), where the parameters in $\mathcal{E}(\cdot)$ are fixed during the training phase.
\noindent \textbf{2) Generator of eGAN}.
The generator of eGAN is dedicated to recovering the normal-light image $\hat{I}_n$ from the synthesized low-light image $\tilde{I}_l$:
\begin{equation}
\label{equ:egan}
\hat{I}_n = \mathcal{F} \Big( \mathcal{G}_N \big(\mathcal{E}^i(\tilde{I}_l), \mathcal{A}_i\big), \tilde{I}_l \Big).
\end{equation}where $\mathcal{G}_N$ is the decoder of the generator of eGAN.
Different from most previous methods that subtract the output of the network from the input low-light image to obtain the final enhanced image. We propose a flexible LIP model $\mathcal{F}(\cdot)$ to fuse the input $\tilde{I}_l$ and output $\overline{I}_n$ into one image to combine information from two sources, which are formulated as follows,
\begin{equation}
\label{equ:lip}
\hat{I}_n = \frac{\tilde{I}_l + \overline{I}_n}{\lambda + \tilde{I}_l \overline{I}_n},
\end{equation}where $\lambda$ is a scalar controlling the enhancement process, which is set to 1 in our work. The proposed LIP model effectively improves the stability and performance of model training (see Sec.~\ref{sec:ablationstudy}).
\noindent\textbf{3) Multi-scale Feature Pyramid Discriminator}.
\label{sec:mfpd}
A critical issue associated with GAN is to design a discriminator that can distinguish real/fake images based on local details and global consistency. Our solution is to design a discriminator network that can simultaneously focus on low-level texture and high-level semantic information. Therefore, we propose a multi-scale feature pyramid discriminator (MFPD) as shown in Fig.~\ref{fig:mfpd}. The intermediate layer of the discriminator has a smaller receptive field to make the generator pay more attention to texture and local details, while the last layer has a larger receptive field to encourage the generator to ensure global consistency~\cite{ni2020towards}. In short, the proposed MFPD uses multi-scale intermediate features and a pyramid scheme to guide the generators to generate images with finer local details and appreciable global consistency.
\subsection{Module Design}
\label{sec:moduledesign}
\noindent \textbf{1) Low-light Guided Transformation}. \label{sec:lgt}
We propose a novel low-light guided transformation (LGT) module to transfer the low illumination and contrast attributes of low-light images from the enhancement generator to the degradation generator, which adaptively modulate the features of normal-light images to generate low-light images with more diverse and realistic illumination and contrast. As shown in Fig.~\ref{fig:modules} (a), our LGT has two inputs at the $i$-th scale: the intermediate features $\mathcal{E}^i(I_n) \in \mathbb{R}^{b\times c\times h\times w}$ of the normal-light image and the intermediate features $\mathcal{E}^i(I_l) \in \mathbb{R}^{b\times c\times h\times w}$ from the reference low-light image, where $b$ represents the batch size, $c$ is the number of feature channels, $h$ and $w$ are height and width of feature, respectively. The transformation parameters $w\left(\mathcal{E}^i(I_l)\right)$ and $b\left(\mathcal{E}^i(I_l)\right)$ are learned from the reference features $\mathcal{E}^i(I_l)$ by two convolution layers, where the first convolution is shared. The modulated intermediate features $\tilde{\mathcal{E}}^i(I_n)$ can be produced via affine transformation as follows:
\begin{equation}
\label{equ:lgt}
\tilde{\mathcal{E}}^i(I_n) = \mathcal{E}^i(I_n) \odot w\big(\mathcal{E}^i(I_l)\big) + b\big(\mathcal{E}^i(I_l)\big),
\end{equation}where $\odot$ and $+$ are Hadamard element-wise product and element-wise addition, respectively.
Compared with AdaIN~\cite{huang2017arbitrary} using statistical information to perform denormalization on~\textit{channel-wise}, our LGT processes at the~\textit{element level} and provides a flexible way to~\textit{spatially} modulate normal-light image features $\mathcal{E}^i(I_n)$.
In this way, the proposed LGT incorporates the low illumination and contrast attributes of the reference low-light image into the synthesized low-light image through element-wise affine parameters $w\left(\mathcal{E}^i(I_l)\right)$ and $b\left(\mathcal{E}^i(I_l)\right)$.
\begin{figure}[t]
\centering
\subfigure{
\includegraphics[width=1.0\linewidth]{./illustration/mfpd.pdf}}
\caption{
The detailed structure of proposed MFPD.
}
\label{fig:mfpd}
\vspace{-10pt}
\end{figure}
\noindent \textbf{2) Feature Randomized Perturbation}. \label{sec:frp}
The LGT can effectively help to synthesize low-light images with diverse low illumination and contrast but light noise, and achieve relatively promising performance (see Sec.~\ref{sec:ablationstudy}). However, this light noise cannot provide enough information for eGAN to learn to suppress the intensive noise of real low-light images, so that we propose the FRP to make the generator of dGAN synthesize more~\textit{realistic noise}. As shown in Fig.~\ref{fig:modules} (b), the scaling and shifting parameters $\alpha \in \mathbb{R}^{b\times c\times 1\times 1}$ and $\beta \in \mathbb{R}^{b\times 1\times h\times w}$ are sampled from the standard Gaussian distributions, then fused as:
\begin{equation}
\label{equ:frp}
\tilde{x} = (1 + \theta_1 \cdot \alpha) x + \theta_2 \cdot \beta,
\end{equation}where $\{\theta_1, \theta_2\} \in \mathbb{R}^{1\times c\times 1\times 1}$ are two learnable scalar weights, which are learned together with all other parameters of the network by back-propagation. As shown in Fig.~\ref{fig:framework}, we embed the proposed FRP module into generator of dGAN at multiple scales to make the noise of synthesized low-light images close to real low-light images.
\noindent\textbf{3) Attention Module}.
\label{sec:attention}
The DAM is proposed to model contextual information and feature recalibration.
As shown in Fig.~\ref{fig:modules} (c), DAM consists of spatial attention (SA) branch and channel attention (CA) branch. Inspired by SENet~\cite{hu2018squeeze}, both SA and CA perform squeeze and excitation operations in sequence, respectively. Specifically, we use the global average pooling and global max pooling along the channel dimension to compress the feature maps in the SA branch, and adopt mean and standard deviation along the spatial dimension to squeeze the feature maps in the CA branch.
\subsection{Training Objectives}
\label{sec:objectives}
\noindent \textbf{1) Exposure Assessment Loss}. We propose the exposure assessment loss to control the exposure consistency between the synthesized low-light images and the real ones. Our insight is to keep the average intensity of local regions of the synthesized low-light images close to a low value.
Inspired by~\cite{mertens2009exposure}, we formulate $L_\text{exp}$ as:
\begin{equation}
\label{equ:exploss}
L_{\text{exp}} = 1 - \text{exp}\big(\frac{-(i-e)^2}{2\sigma^2}\big),
\end{equation}where $i$ is the average intensity of a local region, $e$ is the desired intensity, which should be close to a low value, and $\sigma$ controls the smoothness of the Gaussian curve. In our work, $\sigma$, $e$ and the local region size are set to 0.1, 0.1, and $7\times7$, respectively.
\noindent \textbf{2) Adversarial Loss}. We adopt the relativistic average Hinge loss GAN (RaHingeGAN) loss~\cite{jolicoeur2018relativistic, ni2020towards} to guide dGAN to synthesize realistic low-light images. The RaHingeGAN loss of dGAN can be formulated as:
\begin{equation}
\normalsize
\begin{split}
\label{equ:ladvloss}
L^L_{\text{G}} =
\mathbb{E}_{\tilde{I}_l\sim \mathbb{\tilde{L}}}\Big[\text{max}\Big(0, 1 - \big(D_L(\tilde{I}_l) - \mathbb{E}_{I_l\sim \mathbb{L}}D_L(I_l)\big)\Big)\Big] \\
+ \mathbb{E}_{I_l\sim \mathbb{L}}\Big[\text{max}\Big(0, 1 + \big(D_L(I_l)-\mathbb{E}_{\tilde{I}_l\sim \mathbb{\tilde{L}}}D_L(\tilde{I}_l)\big)\Big)\Big],\\
L^L_{\text{D}} =
\mathbb{E}_{\tilde{I}_l\sim \mathbb{\tilde{L}}}\Big[\text{max}\Big(0, 1 + \big(D_L(\tilde{I}_l) - \mathbb{E}_{I_l\sim \mathbb{L}}D_L(I_l)\big)\Big)\Big] \\
+ \mathbb{E}_{I_l\sim \mathbb{L}}\Big[\text{max}\Big(0, 1 - \big(D_L(I_l)-\mathbb{E}_{\tilde{I}_l\sim \mathbb{\tilde{L}}}D_L(\tilde{I}_l)\big)\Big)\Big],
\end{split}
\end{equation}where $I_l$ is the real low-light image from the domain of low-light images $\mathbb{L}$, and $\tilde{I}_l$ is the synthesized data from the domain of synthesized low-light images $\mathbb{\tilde{L}}$. Similarly, the RaHingeGAN loss of eGAN is expressed as:
\begin{equation}
\normalsize
\begin{split}
\label{equ:eadvloss}
L^N_{\text{G}} =
\mathbb{E}_{\tilde{I}_n\sim \mathbb{\tilde{N}}}\Big[\text{max}\Big(0, 1 - \big(D_N(\tilde{I}_n) - \mathbb{E}_{I_n\sim \mathbb{N}}D_N(I_n)\big)\Big)\Big] \\
+ \mathbb{E}_{I_n\sim \mathbb{N}}\Big[\text{max}\Big(0, 1 + \big(D_N(I_n)-\mathbb{E}_{\tilde{I}_n\sim \mathbb{\tilde{N}}}D_N(\tilde{I}_n)\big)\Big)\Big], \\
L^N_{\text{D}} =
\mathbb{E}_{\tilde{I}_n\sim \mathbb{\tilde{N}}}\Big[\text{max}\Big(0, 1 + \big(D_N(\tilde{I}_n) - \mathbb{E}_{I_n\sim \mathbb{N}}D_N(I_n)\big)\Big)\Big] \\
+ \mathbb{E}_{I_n\sim \mathbb{N}}\Big[\text{max}\Big(0, 1 - \big(D_N(I_n)-\mathbb{E}_{\tilde{I}_n\sim \mathbb{\tilde{N}}}D_n(\tilde{I}_n)\big)\Big)\Big],
\end{split}
\end{equation}where $\mathbb{N}$ and $\mathbb{\tilde{N}}$ are the real normal-light image domain and synthesized normal-light image domain, respectively.
\begin{table*}[htbp]
\normalsize
\renewcommand{\arraystretch}{1.1}
\tabcolsep0.22cm
\centering
\caption{Quantitative comparisons of different methods on real low-light test images in \textit{LOL-Real} dataset~\cite{wei2018deep}. EG denotes EnlightenGAN.}
\begin{tabular}{lccccccccccc}
\hline
\hline
\multirow{2}{*} {Metric} & BIME & BPDHE & CRM & DHECE & Dong & EFF & CLAHE & LIME & MF & CycleGAN & QAGAN\\
{} & \cite{ying2017bio} & \cite{ibrahim2007brightness} & \cite{ying2017camera} & \cite{nakai2013color} & \cite{dong2011fast} & \cite{ying2017fusion} & \cite{zuiderveld1994contrast} & \cite{guo2016lime} & \cite{fu2016fusion} & \cite{zhang2020better} & \cite{ni2020unpaired}\\
\hline
PSNR & 17.85 & 13.84 & 19.64 & 14.64 & 17.26 & 17.85 & 13.13 & 15.24 & 18.73 & 18.80 & 18.97 \\
PSNR-GC & 24.72 & 19.55 & 24.92 & 16.31 & 20.57 & 24.72 & 16.60 & 17.19 & 20.98 & 23.48 & 24.43 \\
SSIM & 0.6526 & 0.4254 & 0.6623 & 0.4450 & 0.5270 & 0.6526 & 0.3709 & 0.4702 & 0.5590 & 0.6316 & 0.6081 \\
SSIM-GC & 0.7231 & 0.5936 & 0.6968 & 0.4521 & 0.5715 & 0.7231 & 0.3947 & 0.4905 & 0.5765 & 0.6648 & 0.6513 \\
\hline
\multirow{2}{*} {Metric} & MR & JED & RRM & SRIE & DRD & UPE & SICE & UEGAN & EG & ZeroDCE & \multirow{2}{*}{CIGAN} \\
{} & \cite{jobson1997multiscale} & \cite{ren2018joint} & \cite{li2018structure} & \cite{fu2016weighted} & \cite{wei2018deep} & \cite{wang2019underexposed} & ~
\cite{cai2018learning} & \cite{ni2020towards} & \cite{jiang2019enlightengan} & \cite{guo2020zero} & {} \\
\hline
PSNR & 11.67 & 17.33 & 17.34 & 14.45 & 15.48 & 13.27 & 19.40 & 19.60 & 18.23 & 18.07 & \textbf{19.89} \\
PSNR-GC & 18.47 & 22.87 & 23.18 & 23.91 & 23.87 & 24.57 & 23.63 & 23.65 & 21.99 & 23.64 & \textbf{26.92} \\
SSIM & 0.4269 & 0.6654 & 0.6859 & 0.5421 & 0.5672 & 0.4521 & 0.6906 & 0.6575 & 0.6165 & 0.6030 & \textbf{0.7817} \\
SSIM-GC & 0.5158 & 0.7236 & 0.7459 & 0.7075 & 0.7476 & 0.7051 & 0.7250 & 0.6727 & 0.6452 & 0.6739 & \textbf{0.8189} \\
\hline
\hline
\end{tabular}
\label{tab:obj1}
\vspace{-5pt}
\end{table*}
\noindent \textbf{3) Cycle-Consistency Loss}. It consists of two terms: (1) $L_{\text{con}}$ calculates the $L1$ distance between the input images $I_n$ / $I_l$ and the cycled images $\hat{I}_n$ / $\hat{I}_l$. (2) $L_{\text{per}}$ is formulated as the $L2$ norm between the feature maps of the input images and those of the cycled images, as follows:
\begin{align}
L_{\text{con}} &= \|I_n - \hat{I}_n\|_1 + \|I_l - \hat{I}_l\|_1, \nonumber\\
L_{\text{per}} &= \|\phi_j(I_n) - \phi_j(\hat{I}_n)\|_2 + \|\phi_j(I_l) - \phi_j(\hat{I}_l)\|_2,
\end{align}where $\phi_j(\cdot)$ is the feature map of the $j$-th layer of the VGG-19 network~\cite{simonyan2014very}, and relu4\_1 is used in our work.
\noindent \textbf{Total Loss}. The proposed CIGAN is optimized with the following objective,
{\setlength\abovedisplayskip{0pt}
\setlength\belowdisplayskip{0pt}
\begin{equation}
\label{equ:gtotalloss}
L_{\text{G}} = L^L_{\text{G}} + L^N_{\text{G}} + \lambda_{\text{exp}} L_{\text{exp}} + \lambda_{\text{con}} L_{\text{con}} + \lambda_{\text{per}} L_{\text{per}},
\end{equation}}
{\setlength\abovedisplayskip{0pt}
\setlength\belowdisplayskip{0pt}
\begin{equation}
\label{equ:dtotalloss}
L_{\text{D}} = L^L_{\text{D}} + L^N_{\text{D}},
\end{equation}}where $\lambda_{\text{exp}}$, $\lambda_{\text{con}}$, and $\lambda_{\text{per}}$ are positive constants to control the relative importance of $L_{\text{exp}}$, $L_{\text{con}}$, and $L_{\text{per}}$, respectively.
\section{Experiments}
\label{sec:experiments}
In this section, the performance of the proposed method is validated through quantitative and qualitative comparisons as well as user study.
\noindent \textbf{Dataset}. We follow~\cite{yang2020fidelity} to comprehensively evaluate our proposed method on LOL dataset~\cite{wei2018deep} with diverse scenes and much variability. It consists of 689 training image pairs and 100 test image pairs, all of which are captured in real-world scenarios. To meet the requirement of unpaired learning, the training set is divided into two partitions: 344 low-light images and another 345 normal-light images with no intersection with each other. Furthermore, we collect more norm/low-light images from the publicly accessible datasets to expand the training images to 1000 unpaired normal/low-light images.
\noindent \textbf{Baselines}. To carry out an overall comparison and evaluation, the proposed CIGAN is compared with twenty-one classical and state-of-the-art methods, including BIMEF~\cite{ying2017bio}, BPDHE~\cite{ibrahim2007brightness}, CRM~\cite{ying2017camera}, DHECE~\cite{nakai2013color}, Dong~\cite{dong2011fast}, EFF~\cite{ying2017fusion}, CLAHE~\cite{zuiderveld1994contrast}, LIME~\cite{guo2016lime}, MF~\cite{fu2016fusion}, MR~\cite{jobson1997multiscale}, JED~\cite{ren2018joint}, RRM~\cite{li2018structure}, SRIE~\cite{fu2016weighted}, DRD~\cite{wei2018deep}, UPE~\cite{wang2019underexposed}, SICE~\cite{cai2018learning}, CycleGAN~\cite{zhu2017unpaired}, EnlightenGAN~\cite{jiang2019enlightengan}, QAGAN~\cite{ni2020unpaired}, UEGAN~\cite{ni2020towards}, and ZeroDCE~\cite{guo2020zero}, where SICE and UPE, EnlightenGAN and ZeroDCE are the leading~\textit{supervised} and~\textit{unsupervised} methods for low-light image enhancement, respectively.
\noindent \textbf{Evaluation Metrics}. We follow~\cite{cai2018learning, wang2019underexposed, yang2020fidelity} and adopt the most widely-used full-reference image quality assessment (FR-IQA) metrics: PSNR and SSIM~\cite{wang2004image}. And calculated the PNSR and SSIM of the Gamma correction results (\textit{i.e.,} PSNR-GC and SSIM-GC). The PSNR and SSIM quantitatively compare our proposed method with other methods in terms of~\textit{pixel} level and~\textit{structure} level, respectively. The higher the values of the PSNR, SSIM, PNSR-GC, and SSIM-GC, the better the quality of the enhanced images.
\noindent \textbf{Implementation Details}. The network is trained for 100 epoches with a batch size of 10 and images are cropped into $224 \times 224$ patches. The Adam~\cite{kingma2014adam} optimizer with $\beta_1$ = 0 and $\beta_2$ = 0.999 is applied to optimize the network. The learning rate of the generator and the discriminator is initialized to 0.0001, the first 50 epoches are fixed and then linearly decay to zero in the next 50 epochs. The hyper-parameters $L_\text{exp}$, $L_\text{con}$, and $L_\text{per}$ are respectively set to 10, 10, and 1. The spectral norm~\cite{miyato2018spectral} is used to all layers in both generator and discriminator.
\begin{figure*}[htbp]
\centering
\subfigure[Input]{
\includegraphics[width=4.3cm]{illustration/group1/low00758-input-c.png}}
\hspace{-5pt}
\subfigure[BIMEF~\cite{ying2017bio}]{
\includegraphics[width=4.3cm]{illustration/group1/low00758-bimef-c.png}}
\hspace{-5pt}
\subfigure[DHECE~\cite{nakai2013color}]{
\includegraphics[width=4.3cm]{illustration/group1/low00758-dheci-c.png}}
\hspace{-5pt}
\subfigure[LIME~\cite{guo2016lime}]{
\includegraphics[width=4.3cm]{illustration/group1/low00758-lime-c.png}}
\\ \vspace{-5pt}
\subfigure[MF~\cite{fu2016fusion}]{
\includegraphics[width=4.3cm]{illustration/group1/low00758-mf-c.png}}
\hspace{-5pt}
\subfigure[JED~\cite{ren2018joint}]{
\includegraphics[width=4.3cm]{illustration/group1/low00758-jed-c.png}}
\hspace{-5pt}
\subfigure[RRM~\cite{li2018structure}]{
\includegraphics[width=4.3cm]{illustration/group1/low00758-rrm-c.png}}
\hspace{-5pt}
\subfigure[UPE~\cite{wang2019underexposed}]{
\includegraphics[width=4.3cm]{illustration/group1/low00758-upe-c.png}}
\\ \vspace{-5pt}
\subfigure[EnlightenGAN~\cite{jiang2019enlightengan}]{
\includegraphics[width=4.3cm]{illustration/group1/low00758-eg-c.png}}
\hspace{-5pt}
\subfigure[ZeroDCE~\cite{guo2020zero}]{
\includegraphics[width=4.3cm]{illustration/group1/low00758-zerodce-c.png}}
\hspace{-5pt}
\subfigure[CIGAN]{
\includegraphics[width=4.3cm]{illustration/group1/low00758-cigan-c.png}}
\hspace{-5pt}
\subfigure[GT]{
\includegraphics[width=4.3cm]{illustration/group1/low00758-gt.png}}
\\ \vspace{-5pt}
\caption{Visual quality comparisons of state-of-the-art enhancement methods. Upper left: original results. Lower right: the corresponding results after Gamma transformation correction for better comparison.
}
\label{fig:qualitative_results1}
\end{figure*}
\subsection{Quantitative Comparison}
\label{sec:quantitative}
Table~\ref{tab:obj1} compares the proposed CIGAN with the classical and state-of-the-art methods on LOL dataset~\cite{wei2018deep}. It can be observed that the proposed method outperforms all previous methods in the comparison because it consistently achieves the highest scores in terms of PSNR, PSNR-GC, SSIM, and SSIM-GC. This reveals that the proposed CIGAN is much more effective in illumination enhancement, structure restoration, and noise suppression. From Table~\ref{tab:obj1}, we can see that the proposed method is significantly superior to other state-of-the-art~\textit{unsupervised} methods (\textit{i.e.}, CycleGAN, EnlightenGAN, and ZeroDCE). This is because, on one hand, dGAN makes the attributes of synthesized low-light images consistent with those of real ones, and on the other hand, eGAN is able to restore high-quality normal-light images. Another interesting observation is that the proposed CIGAN even achieves better performance than leading~\textit{supervised} methods (\textit{i.e.}, DRD, UPE, and SICE) trained on a large number of paired images. It is worth noting that the larger PSNR gap between with and without Gamma correction shows that our method can effectively remove intensive noise and restore vivid details.
\subsection{Qualitative Comparison}
\label{sec:qualitative}
\vspace{5pt}
Extensive qualitative comparisons have been carried out as shown in Fig.~\ref{fig:qualitative_results1} and \ref{fig:qualitative_results2}. From the enhanced results, we have several insights. First, most of the existing methods (\textit{i.e.}, BIMEF, JED, RRM, UPE, and ZeroDCE) show poor performance in terms of illumination adjustment and detail restoration. The DHECE, LIME, MF, and EnlightenGAN are able to achieve desirable contrast adjustment. However, they also amplify noise and severely degrade visual quality. Second, although several methods especially consider noise suppression (\textit{i.e.}, JED and RRM), they perform unsatisfactory global contrast enhancement and remove many textures and details. In general, our proposed CIGAN achieves favorable visual quality by simultaneously realizing pleasing contrast enhancement and effective noise suppression.
\begin{table}[t]
\small
\renewcommand{\arraystretch}{1.1}
\tabcolsep0.10cm
\caption{The results of pairwise comparisons in user study. Each value indicates the number of times the method in the row outperforms the method in the column.}
\centering
\begin{tabular}{c|cccccccccc}
\hline
\hline
\multirow{2}{*}{} & DHECE & LIME & UPE & SICE & EG & ZeroDCE & \multirow{2}{*}{CIGAN} & \multirow{2}{*}{Total} \\
& \cite{nakai2013color} & \cite{guo2016lime} & \cite{wang2019underexposed} & \cite{cai2018learning} & \cite{jiang2019enlightengan} & \cite{guo2020zero} & & \\
\hline
DHECE & - & 326 & 421 & 511 & 267 & 248 & 16 & 1789 \\
LIME & 394 & - & 452 & 563 & 295 & 269 & 24 & 1997 \\
UPE & 299 & 268 & - & 391 & 227 & 203 & 19 & 1407 \\
SICE & 209 & 157 & 329 & - & 171 & 143 & 12 & 1021 \\
EG & 453 & 425 & 493 & 549 & - & 335 & 125 & 2380 \\
ZeroDCE & 472 & 451 & 517 & 577 & 385 & - & 141 & 2543 \\
CIGAN & 704 & 696 & 701 & 708 & 595 & 579 & - & 3983 \\
\hline
\hline
\end{tabular}
\label{tab:userstudy}
\end{table}
\begin{figure*}[htbp]
\centering
\subfigure[Input]{
\begin{overpic}
[width=4.3cm] {illustration/group2/low00775-input.png}
\put(0, 0)
{\includegraphics[scale=0.6]
{illustration/group2/low00775-input-crop.png}}
\end{overpic}}
\hspace{-5pt}
\subfigure[BIMEF~\cite{ying2017bio}]{
\begin{overpic}
[width=4.3cm] {illustration/group2/low00775-bimef.png}
\put(0, 0)
{\includegraphics[scale=0.6]
{illustration/group2/low00775-bimef-crop.png}}
\end{overpic}}
\hspace{-5pt}
\subfigure[DHECE~\cite{nakai2013color}]{
\begin{overpic}
[width=4.3cm] {illustration/group2/low00775-dheci.png}
\put(0, 0)
{\includegraphics[scale=0.6]
{illustration/group2/low00775-dheci-crop.png}}
\end{overpic}}
\hspace{-5pt}
\subfigure[LIME~\cite{guo2016lime}]{
\begin{overpic}
[width=4.3cm] {illustration/group2/low00775-lime.png}
\put(0, 0)
{\includegraphics[scale=0.6]
{illustration/group2/low00775-lime-crop.png}}
\end{overpic}}
\\ \vspace{-5pt}
\subfigure[MF~\cite{fu2016fusion}]{
\begin{overpic}
[width=4.3cm] {illustration/group2/low00775-mf.png}
\put(0, 0)
{\includegraphics[scale=0.6]
{illustration/group2/low00775-mf-crop.png}}
\end{overpic}}
\hspace{-5pt}
\subfigure[JED~\cite{ren2018joint}]{
\begin{overpic}
[width=4.3cm] {illustration/group2/low00775-jed.png}
\put(0, 0)
{\includegraphics[scale=0.6]
{illustration/group2/low00775-jed-crop.png}}
\end{overpic}}
\hspace{-5pt}
\subfigure[RRM~\cite{li2018structure}]{
\begin{overpic}
[width=4.3cm] {illustration/group2/low00775-rrm.png}
\put(0, 0)
{\includegraphics[scale=0.6]
{illustration/group2/low00775-rrm-crop.png}}
\end{overpic}}
\hspace{-5pt}
\subfigure[UPE~\cite{wang2019underexposed}]{
\begin{overpic}
[width=4.3cm] {illustration/group2/low00775-upe.png}
\put(0, 0)
{\includegraphics[scale=0.6]
{illustration/group2/low00775-upe-crop.png}}
\end{overpic}}
\\ \vspace{-5pt}
\subfigure[EnlightenGAN~\cite{jiang2019enlightengan}]{
\begin{overpic}
[width=4.3cm] {illustration/group2/low00775-eg.png}
\put(0, 0)
{\includegraphics[scale=0.6]
{illustration/group2/low00775-eg-crop.png}}
\end{overpic}}
\hspace{-5pt}
\subfigure[ZeroDCE~\cite{guo2020zero}]{
\begin{overpic}
[width=4.3cm] {illustration/group2/low00775-zerodce.png}
\put(0, 0)
{\includegraphics[scale=0.6]
{illustration/group2/low00775-zerodce-crop.png}}
\end{overpic}}
\hspace{-5pt}
\subfigure[CIGAN]{
\begin{overpic}
[width=4.3cm] {illustration/group2/low00775-cigan.png}
\put(0, 0)
{\includegraphics[scale=0.6]
{illustration/group2/low00775-cigan-crop.png}}
\end{overpic}}
\hspace{-5pt}
\subfigure[GT]{
\begin{overpic}
[width=4.3cm] {illustration/group2/low00775-gt.png}
\put(0, 0)
{\includegraphics[scale=0.6]
{illustration/group2/low00775-gt-crop.png}}
\end{overpic}}
\\ \vspace{-0pt}
\caption{The visual quality comparison for a close-up region of state-of-the-art enhancement methods.
}
\label{fig:qualitative_results2}
\end{figure*}
\begin{figure}[t]
\centering
\subfigure[Input]{
\includegraphics[width=2cm]{illustration/group3/low00703-input.png}}
\hspace{-5pt}
\subfigure[w/o FRP]{
\includegraphics[width=2cm]{illustration/group3/low00703-no-fat.png}}
\hspace{-5pt}
\subfigure[w/o $L_{\text{exp}}$]{
\includegraphics[width=2cm]{illustration/group3/low00703-no-lexp.png}}
\hspace{-5pt}
\subfigure[w/o LGT]{
\includegraphics[width=2cm]{illustration/group3/low00703-no-lgat.png}}
\\ \vspace{-3pt}
\subfigure[w/o all]{
\includegraphics[width=2cm]{illustration/group3/low00703-no-all.png}}
\hspace{-5pt}
\subfigure[CIGAN]{
\includegraphics[width=2cm]{illustration/group3/low00703-legan.png}}
\hspace{-5pt}
\subfigure[GT]{
\includegraphics[width=2cm]{illustration/group3/low00703-gt.png}}
\vspace{-10pt}
\caption{Ablation study of the effectiveness of three key components (\textit{i.e.}, FRP, LGT, and $L_{\text{exp}}$) in our proposed CIGAN. The (e) w/o all means the CIGAN without FRP, LGT, and $L_{\text{exp}}$ that very similar to vanilla CycleGAN.
}
\label{fig:ablationstudy}
\end{figure}
\subsection{User Study}
\label{sec:userstudy}
\vspace{5pt}
To study how users prefer the enhanced results of each method, we perform a user study with 24 participants and 30 images of seven methods using pairwise comparisons. Each time the participants are randomly present with the enhanced results of two different methods of the same test image, they are then asked to select their favorite result from the two presented images. Table~\ref{tab:userstudy} tabulates the results of the pairwise comparison, from which we can observe that the enhanced results of the proposed CIGAN are more favorite with users because CIGAN is selected more frequently than the comparison methods. This is consistent with the quantitative and qualitative results, and further consolidates the conclusion that the proposed CIGAN is superior to the state-of-the-art methods.
\begin{table}[t]
\normalsize
\renewcommand{\arraystretch}{1.1}
\caption{Comparison of average PSNR and SSIM performance of different variants of our method on LOL Dataset~\cite{wei2018deep}.}
\vspace{2pt}
\label{tab:ablationstudy}
\tabcolsep0.18cm
\centering
\begin{tabular}{l|cccc}
\hline
\hline
Method & PSNR & PSNR-GC & SSIM & SSIM-GC \\
\hline
CIGAN w/o LGT & 18.85 & 25.21 & 0.7488 & 0.7882 \\
CIGAN w/o FRP & 18.24 & 23.71 & 0.7178 & 0.7573 \\
CIGAN w/o DAM & 19.25 & 26.28 & 0.7644 & 0.8060 \\
CIGAN w/o MFPD & 19.55 & 26.36 & 0.7711 & 0.8083 \\
CIGAN w/o LIP & 19.57 & 24.71 & 0.7641 & 0.7969 \\
CIGAN w/o $L_\text{exp}$ & 19.75 & 24.86 & 0.7266 & 0.7739 \\
CIGAN & \textbf{19.89} & \textbf{26.92} & \textbf{0.7817} & \textbf{0.8189} \\
\hline
\hline
\end{tabular}
\end{table}
\subsection{Ablation Study}
\label{sec:ablationstudy}
\vspace{5pt}
We conduct extensive ablation studies to quantitatively evaluate the effectiveness of each component
in our proposed CIGAN. The variant of CIGAN w/o $L_\text{exp}$ replaces the proposed LIP-based fusion by subtracting the network output from the input low-light image. We perform an ablation analysis on the real low-light image in Fig.~\ref{fig:ablationstudy}. It can be observed that the result produced by CIGAN is obviously better than its variants. Table~\ref{tab:ablationstudy} lists the performance of different variants of our proposed CIGAN on 100 testing images in the LOL dataset in terms of average PSNR, PSNR-GC, SSIM, and SSIM-GC. From Table~\ref{tab:ablationstudy}, we want to emphasize three key components. First, it is critical for LGT to adaptively modulate the normal-light image features with low-light image features. Without it, generator $\mathcal{G}_L$ fails to learn domain-specific properties~\textit{directly} from low-light images, which results in a significant performance degradation. Second, removing the FRP that encourages the synthesis of low-light images with~\textit{realistic noise}, which also leads to a striking performance gap. Last, the proposed exposure assessment loss $L_{\text{exp}}$ plays a key role in synthesizing realistic low-light images that keeps contrast consistent with the real low-light images. All the proposed components lead to better performance, and considering them together enables CIGAN to further improve the quantitative performance towards the best.
\section{Conclusions}
\label{sec:conclusion}
\vspace{5pt}
This paper aims to improve the perceptual quality of real low-light images using~\textit{unpaired} data only in an~\textit{unsupervised} manner. To this end, we propose a novel unsupervised CIGAN, which contains three elaborately designed components: (1) LGT module adaptively modulates normal-light image features with low-light image features to synthesize more diverse low-light images; (2) FRP module encourages the synthesis of low-light images with realistic noise; (3) MFPD improves image quality from coarse-to-fine. Finally, a novel exposure assessment loss is formulated to control the~\textit{exposure} of synthesized low-light images and attention mechanisms are adopted to further improve the image quality. Extensive experiments on real-world low-light images show that our method achieves the superior performance in both quantitative and qualitative evaluations.
\begin{acks}
The authors would like to thank the anonymous referees for their insightful comments and suggestions.
This work was supported in part by National Natural Science Foundation of China under Grant 61976159, Shanghai Innovation Action Project of Science and Technology under Grant 20511100700.
\end{acks}
\bibliographystyle{ACM-Reference-Format}
\balance
|
\section{\label{sec:level1} Introduction}
The Casimir effect \cite{Casimir:1948dh} arises as a consequence of restricting the allowed
zero-point fluctuations in the vacuum to discrete values due to the experimental set-up.
This vacuum distortion manifests as an attractive force
due to a finite lowering of the vacuum energy. These forces have been measured between two parallel plates, and the phenomenon was confirmed to a high degree of precision in several experiments \cite{Lamoreaux, Mohideen} recently.
One might conclude quantum phenomena like these to be esoteric, with a limited practical consequence. But, as characteristic distances get smaller, their effects have become
increasingly significant in nanotechnology, for example, the silicon integrated
circuits based on micro-and nano-electromechanical systems \cite{Gong}. The Casimir effect
also established the fact that energy density in certain regions of space is
negative relative to the ordinary vacuum energy. This has exciting consequences,
as such effects contribute to the stability of hadrons and model
colour-confinement \cite{Johnson:1975zp, Milton:2001yy, ChernodubNonPert}, might
make it possible to stabilize a traversable wormhole \cite{Morris}, and provide
significant insights into the cosmological constant problem \cite{MAHAJAN20066}.
The Casimir effect has also been generalized to the scalar and fermion
fields.
The strong coupling between quark and gluon fields gives rise to various
non-perturbative phenomena in Quantum Chromodynamics. Given the role Casimir
effect plays in the MIT Bag model, it would be interesting to investigate its
role in the confinement of quarks in hadrons and spontaneous symmetry breaking
using the formalism defined in Ref. \cite{Ishikawa:2020ezm}. Clearly using a
space-time lattice for such investigations appears to be a natural choice. An
important motivation for studying the Casimir effect for various lattice
fermions is that their form also appears in condensed matter systems, like Dirac
semi-metals, topological insulators and ultracold atom systems, which are
currently active areas of research. Chern Insulators are also shown to exhibit a repulsive Casimir effect
\cite{Araki:2013qva, Rodriguez}. The negative mass Wilson
fermions and overlap fermions
correspond to the bulk and surface fermions of the topological insulator,
respectively \cite{Ishikawa:2020icy}.
Studying the Casimir effect for these lattice fermions\cite{Susskind} is equivalent to
studying it for corresponding topological insulators, which can then be
experimentally observed for very small lattice sizes.
The Casimir effect for free lattice fermions was first studied in Ref.
\cite{Ishikawa:2020ezm, Ishikawa:2020icy} using periodic and antiperiodic
boundary conditions, commonly employed with most condensed matter systems. While
the Casimir energy for the Wilson and overlap fermions exactly matched
the continuum expressions expected for the fermionic Casimir effect in the zero
limit of the lattice spacing, it was observed that the result for the naive
fermion rapidly oscillated and approached two different expressions in the
continuum limit for the odd and even lattice sizes respectively. This lead
Ref. \cite{Ishikawa:2020ezm} to claim that the naive fermion
cannot be used to compute Casimir energy for the Dirac fermion, which is
an apparent violation of the universality,
Motivated by the physically appealing fact that the MIT Bag boundary conditions
\cite{Johnson:1975zp} prevent the fermionic current from crossing the plates,
thereby ensuring the confinement of fermions within the bag, we adopt these
boundary conditions in this work to study the fermionic Casimir energy. If the
fermion field $\psi$ is subjected to the MIT Bag boundary conditions, and
confined between the two parallel plates placed at $x^1 = 0$ and $x^1 = d$,
$\psi$ satisfies the following equation
\begin{equation}
\label{bound}
(1+i\gamma^1)\psi|_{x^1 =0,d}= 0~.
\end{equation}
By substituting the standard positive and negative frequency solutions of the
Dirac equation in the equation for the MIT boundary conditions one obtains the
following transcendental relations for the corresponding momentum $k_1$
\cite{Mamaev:1980jn, BelussiSaharian} : \begin{equation} \label{trans}
md~\sin(k_1d)/k_1d + \cos(k_1d) = 0. \end{equation} For the massless fermion
case, this reduces to \begin{equation} \label{allow} k_1d =
\left(n+\frac{1}{2}\right)\pi \;\;\;n\in \mathbb{Z} \end{equation} These
boundary conditions will be used to calculate Casimir energy for the lattice
fermions in section (\ref{slabbag}).
The results we obtained from the MIT Bag boundary
conditions were encouraging and precisely matched the continuum results for all
lattice fermions, including the naive fermions, in the zero limit of the lattice
spacing. As expected, doubling was observed for the results for the naive
fermion. In order to investigate whether the choice of boundary conditions
is crucial for our results above, we focused our attention on the periodic and
antiperiodic boundary conditions for naive fermions again. Instead of
examining the even and the odd lattice size series separately we treat them
together as one series and applied known series extrapolation techniques.
Contrary to the claim of Ref. \cite{Ishikawa:2020ezm} of an apparent violation
of the universality for the naive fermion, we succeded in demonstrating
numerically that the Casimir effect for Dirac fermions can also be computed
from the naive fermion in the zero limit of the lattice spacing since looked at
this way the series converges to the same result as the other lattice fermions
in the continuum limit. We mention the known continuum results for both massless
and massive fermions for the MIT boundary conditions for reference and comparison.
\subsection{Massless fermions in $(3+1)$-dimensional spacetime}
In continuum theory, one computes the zero-point energy using dimensional regularization by summing over the odd integer modes obtained in (\ref{allow}).
We obtain the characteristic Casimir energy for massless fermions in (1+1)- and (3+1)-dimensional spacetime as \cite{Paola, Milton:2001yy} ($\hbar=c=\kappa_B$=1):
\begin{equation}
\label{fercont}
E^{3+1,\text{cont},f}_{\text{Cas}}(d) = -\frac{7\pi^2 }{2880 d^3}\;\;;\;\;E^{1+1,\text{cont},f}_{\text{Cas}}(d) = -\frac{\pi}{24 d}
\end{equation}
\subsection{Massive fermions in $3+1$-dimensional spacetime}
One obtains approximate solutions for the Casimir energy of massive fermions (\textit{mf}) in continuum theory for two limiting cases, namely $md \ll 1$ and $md \gg 1$. The Casimir force per unit area in the limit $md \gg 1 $, which we shall verify for the lattice fermions is \cite{ELIZALDE, Cruz}:
\begin{equation}
\label{massivefer}
E^{3+1,\text{cont},mf}_{\text{Cas}}(d) = -\frac{3}{32}\sqrt{\frac{m}{\pi^3d^5}}e^{-2md}
\end{equation}
where the Casimir energy decays exponentially with $md$. \cite{Cruz}
\section{Casimir effect for lattice fermion fields in slab-bag}
\label{slabbag}
In this letter, out of the $D$ latticized spatial dimensions, we consider only one
($x^1$) compactified by a boundary condition at $x^1=0,d$. The corresponding spatial momentum component $p_1$ is discretized, while the other momenta components remain continuous. Initially, modelling time is kept continuous and temporal components of momentum are unaffected by latticization.
The non-zero lattice spacing is `$a$', with an ultraviolet cut-off scale `$1/a$' in momentum space. The energy - momentum dispersion relation for lattice fermions is obtained from the Dirac operator defined in a relativistic fermion action. The energy is defined as:
\begin{equation}
\label{Drel}
a E(ap) = a \sqrt{\mathcal{D}^{\dagger} \mathcal{D}}
\end{equation}
The Dirac operator, $\mathcal{D}$ includes the spatial momenta and mass but not the temporal momenta.
The boundary condition obtained in (\ref{allow}) constrains the allowed modes and ensures that there is no particle current through the walls, thereby confining the fermion fields inside the slab-bag. The MIT Bag (B) boundary conditions are realized on the lattice as follows:
\begin{equation}
\label{allowed}
ap_1\rightarrow ap^{\text{B}}_1(n) = \left(n+\frac{1}{2}\right)\frac{\pi a}{d} = \left(n+\frac{1}{2}\right)\frac{\pi}{N}
\end{equation}
Here, $N = d/a$ is the lattice size in the compactified spatial direction.
The discretized momentum component under periodic (P) and antiperiodic (AP) boundary conditions, on the other hand, is:
\begin{equation}
\label{PAP}
ap_1 \rightarrow ap^{\text{P}}_1(n) = \frac{2n\pi}{N} \;\;;\;\; ap_1 \rightarrow ap^{\text{AP}}_1(n) = \frac{(2n+1)\pi}{N}
\end{equation}
Restriction of the momentum to the Brillouin zone bounds the integer $n$ for periodic, antiperiodic and MIT Bag boundary conditions is, $0 \leq n^{\text{B,P,AP}} < N$.
The Casimir energy on lattice is also calculated by subtracting the zero-point energy at finite lattice size $aE_0(N\rightarrow \infty)$ from the one at infinite lattice size $aE_0(N)$ \cite{Ishikawa:2020ezm}:
\begin{align}
\label{def3+1}
aE^{\text{3+1}}_{\text{Cas}} &= aE_0(N) - aE_0(N \rightarrow \infty) \nonumber \\
&= c_{\text{deg}}\int_{\text{BZ}} \frac{d^2ap_{\perp}}{(2\pi)^2}\left[-\sum_n aE(ap_{\perp},ap_1(n)) + N\int_{\text{BZ}}\frac{dap_1}{2\pi}aE(ap) \right]
\end{align}
The Casimir energy for the naive fermion is $2^D$ times the result for the Wilson fermion
due to the doubling multiplicity for the naive fermion. Here, $c_{\text{deg}}$ is the degeneracy factor which accounts for the spin of fermion and the naive fermion doubling.
All comparisons are made taking care this factor, so that the equivalence between analytic results of naive and Wilson can be established in (\ref{limnaive}) and (\ref{limwilson}) below.
\subsection{Naive Fermions}
The dispersion relation for naive fermions in ($D+1$)-dimensions obtained from (\ref{Drel}) is \cite{Gattringer:2010zz}:
\begin{equation}
\label{naived}
a^2E_{nf}(ap) = \sum_{k=1}^{D}\sin^2(ap_k) +(am_f)^2
\end{equation}
As in Ref. \cite{Ishikawa:2020ezm}, the ($1+1$)-dimensions is treated analytically.
By substituting (\ref{naived}) in the definition (\ref{def3+1}), the expression for Casimir energy of naive fermion with MIT Bag boundary conditions in ($D+1$)-dimensional space-time is:
\begin{align}
\label{naivemitbagexp}
&aE_{\text{Cas}}^{\text{D+1,B,}nf} \equiv aE_{\text{0}}^{\text{D+1,B,}nf}(N) - aE_{\text{0}}^{\text{D+1,B,}nf}(N\rightarrow\infty)\\
&= c_{\text{deg}}\int_{\text{BZ}} \frac{d^{D-1}ap_{\perp}}{(2\pi)^2}\Bigg[
-\sum_n \sqrt{\sin^2 \frac{(n+1/2)\pi}{N}+ \sum_{k=2}^{D}\sin^2 ap_k + (am_f)^2}\;\; + \\&\;\;\;\;\;\;\;\;\;\;\;\; \;\;\;\;\;\; \;\;\;\;\;\; \;\;\;\;\;\; \;\;\;\;\;\; \;\;\;\;\;\; N\int_{\text{BZ}}\frac{dap_1}{2\pi}\sqrt{ \sum_{k=1}^{D}\sin^2 ap_k+ (am_f)^2}\Bigg] \nonumber
\end{align}
In the case for $D=1$, the series expansions are substituted, and the exact expression is calculated using the Abel- Plana formulae for finite range \cite{Saharian:2006iv, Saharian:2007ph} to be:
\begin{align}
aE_{\text{Cas}}^{\text{1+1,B,}nf} & =\frac{N}{\pi} -\frac{1}{2}\csc(\frac{\pi}{2N})\label{mitbagnaive}\\
& =-4\left[-\frac{d}{4a\pi} + \frac{1}{8}\left\{\frac{2d}{a\pi} + \frac{1}{6}\frac{a\pi}{2d} +\frac{7}{360}\left(\frac{a\pi}{2d}\right)^3 + ...\right\} \right]\nonumber\\
\Rightarrow E_{\text{Cas}}^{\text{1+1,B,}nf} & = -\frac{\pi}{24d} - \frac{7\pi^3a^2}{5760d^3} + \mathcal{O}(a^4)
\end{align}
Therefore, the Casimir energy obtained per unit area in the continuum limit $a\rightarrow 0$, is:
\begin{equation}
\label{limnaive}
\lim_{a \to 0}E_{\text{Cas}}^{\text{1+1,B},nf} = -\frac{\pi}{24 d}
\end{equation}
As expected, taking the naive fermion doubling correction in one spatial dimension into account, the above result in continuum limit is equivalent to the expression obtained for Dirac fermion (\ref{fercont}). These expressions for Casimir energy of naive fermions, without the doubling factor are plotted in Fig. \ref{mitbagplot1}. Studies for the naive fermion for $D>1$ are done numerically. Results for (2+1)- and (3+1)- dimensions have been verified to be exactly equal to the continuum expressions. Only results for (3+1)-dimensions have been shown in Fig. \ref{mitbagplot1}.
\subsection{Wilson Fermion}
We shall now discuss the Casimir energy for Wilson lattice fermion in $(1+1)$-dimensional spacetime.
The Wilson term proportional to $r$ in the Dirac operator breaks the chiral symmetry and acts as a momentum dependent mass term introduced to eliminate fermion doubling.
The expression for Casimir energy of Wilson fermion in ($D+1$) is similar to the one for naive fermion, where the Wilson Dispersion relation, obtained using (\ref{Drel}), is substituted in (\ref{def3+1}).
Using the Abel-Plana formulae for finite range like in the naive fermion case, setting $r=1$, the following expressions obtained:
\begin{align}
aE_{\text{Cas}}^{\text{1+1,B,W}}& =\frac{4N}{\pi} -\csc(\frac{\pi}{4N})\label{mitbagwilson} \\
& =-4
\left[-\frac{d}{a\pi} + \frac{1}{4}\left\{\frac{4d}{a\pi} + \frac{1}{6}\frac{a\pi}{4d} +\frac{7}{360}\left(\frac{a\pi}{4d}\right)^3 + ...\right\} \right]\nonumber\\
\Rightarrow E_{\text{Cas}}^{\text{1+1,B,W}} & = -\frac{\pi}{24d} - \frac{7\pi^3a^2}{23040d^3} + \mathcal{O}(a^4)
\end{align}
\begin{figure}[t!]
\centering
\footnotesize{(a)}{{\includegraphics[width=6.25cm]{Casimir_naive_plots_1+1_mitbag.pdf} }} %
\footnotesize{(b)}{{\includegraphics[width=6.25cm ]{Casimir_Wilson_plots_1+1_mitbag.pdf} }}%
\footnotesize{(c)}{{\includegraphics[width=6.25cm]{Casimir_naive_plots_3+1_mitbag.pdf}}} %
\footnotesize{(d)}{{\includegraphics[width=6.25cm]{Casimir_Wilson_Plots_3_+1_mitbag_MASSIVE.pdf}}}%
\caption{{Casimir energy for Massless and positively massive Wilson and naive fermion with MIT Bag boundary conditions. [(a),(b)] and [(c),(d)] represent the MIT Bag Casimir energy for naive and Wilson fermion in ($1+1$)- and ($3+1$)-dimension respectively. Subfigure (d) also confirms the exponential decay of Casimir energy for massive fermions with $N$ on a lattice.}}%
\label{mitbagplot1}
\end{figure}
Therefore, In the limit $a\rightarrow 0$, the Casimir energy obtained per unit area is:
\begin{equation}
\label{limwilson}
\lim_{a \to 0}E_{\text{Cas}}^{\text{1+1,B,W}} = -\frac{\pi}{24 d}
\end{equation}
The exact expressions obtained for the massless naive and Wilson fermion using MIT Bag boundary conditions in $(1+1)$-dimension are (\ref{mitbagnaive}) and (\ref{mitbagwilson}) respectively.
The leading terms of the order $1/N$ in the zero lattice spacing limit of these analytic results and the numerical results for naive lattice fermion in ($3+1$)- dimensions are plotted in Fig. \ref{mitbagplot1}. Note that the exponential suppression of Casimir energy for massive fermionic fields, which is derived for the fermion mass limit $md\gg1$ in (\ref{massivefer}), is also verified in numerical calculations on a lattice as shown in Fig. \ref{mitbagplot1}(d) for comparison.
In $(D+1)$-dimensional spacetime, the smaller windows in each plot represent the coefficient of Casimir energy, $N^{D}\cdot a\cdot E_{\text{Cas}}$, which is constant in continuum and thus is used to observe the precision of agreement between the lattice and continuum results.
The result obtained for the Wilson fermion
matches with the continuum result (\ref{fercont}) exactly.
\begin{figure}[t!]
\centering
\footnotesize{(a)}{{\includegraphics[width=6.25cm]{Overlap_fermions_1+1_plots_mitbag.pdf} }}
\footnotesize{(c)}{{\includegraphics[width=6.25cm]{Overlap_fermions_3+1_plots_mitbag.pdf}}}
\caption{\footnotesize{Casimir energy for overlap fermion
with MIT Bag boundary conditions. (a),(b) and (c) represent the Casimir energy in ($1+1$)- and ($3+1$)-dimension respectively. }}%
\label{omitbag}
\end{figure}
\subsection{Overlap Fermion
}
\label{overlapmitbag}
The analytic calculation of the Casimir effect for overlap fermions in (1+1)-dimensions turned out to be intractable. Thus, the results for the overlap fermion are numerically calculated for all dimensions, using the MIT Bag boundary conditions by substituting the corresponding Dirac operator into the definition (\ref{def3+1}).
The Dirac operator for overlap fermion is defined as:
\begin{equation}
a{\mathcal{D}}_{\text{OV}}\equiv2 M_0 \times\frac{(1+am_f)+(1-am_f)V}{2}
\end{equation}
where $am_f$ is the fermion mass
and $V$ is defined as:
\begin{equation}
\label{V}
V\equiv\gamma_5\;\text{sign}(\gamma_5 a {\mathcal{D}}_{\text{W}}) = \frac{{\mathcal{D}}_{\text{W}}}{\sqrt{{\mathcal{D}}_{\text{W}}^\dagger {\mathcal{D}}_{\text{W}}}}
\end{equation}
with
${\mathcal{D}}_{\text{W}}$ as the previously defined Wilson Dirac operator with $r=1$ and a negative mass parameter -$M_0$. We used $M_0 = 0.5$, $1.0$ and $1.5$.
The results obtained for $(1+1)$- and $(3+1)$-dimensions are plotted in Fig. \ref{omitbag}.
It is easy to notice in ($1+1$)- dimensions that the overlap fermion $M_0 = 1.0$ case and massless ($am_f = 0$) Wilson fermion case have equivalent dispersion relations. The expressions obtained numerically for overlap fermions
in higher dimensions, also match precisely with the naive and Wilson fermions in the zero lattice spacing limit $a\rightarrow0$ and, subsequently, also with the continuum result.
\section{Naive fermion and Series Extrapolation in large $N$-Limit}
\label{extrapol}
While it is ressuring that one obtains the {\em same} results for the naive, Wilson and overlap fermions for the physically appealing MIT bag boundary conditions, as shown in the section above, it still is a bit disturbing that such validation of universality is not seen in the results of Ref. \cite{Ishikawa:2020ezm} which employed periodic and antiperiodic boundary conditions. We therefore now turn to examine the naive fermion case with those boundary conditions in an attempt to shed more light on this problem. The exact expressions for Casimir energy $aE_{\text{Cas}}$ of massless naive fermion on lattice in ($1+1$)-dimensional spacetime with periodic and antiperiodic boundary conditions, were first obtained in Ref \cite{Ishikawa:2020ezm, Ishikawa:2020icy}.
Their results
are:
\begin{equation}
\label{naivePcont}
\lim_{a \to 0}E_{\text{Cas}}^{\text{1+1,P,}nf} = \frac{\pi}{6d}\;\;\;\;\;(\text{odd } N)\;\;;\;\;\lim_{a \to 0}E_{\text{Cas}}^{\text{1+1,P,}nf} = \frac{2\pi}{3d}\;\;\;\;\;(\text{even } N)
\end{equation}
for periodic boundary.
Similarly, for antiperiodic boundary conditions, the result is:
\begin{equation}
\label{naiveAPcont}
\lim_{a \to 0}E_{\text{Cas}}^{\text{1+1,AP,}nf} = \frac{\pi}{6d}\;\;\;\;\;(\text{odd } N)\;\;;\;\;\lim_{a \to 0}E_{\text{Cas}}^{\text{1+1,AP,}nf} = -\frac{\pi}{3d}\;\;\;\;\;(\text{even } N)
\end{equation}
The continuum Casimir energy for massless Dirac fermion using periodic and antiperiodic conditions in (\ref{PAP}) is found to be:
\begin{equation}
\label{cont}
E^{1+1,\text{cont},\text{P}}_{\text{Cas}} = \frac{\pi}{3d}\;;\;E^{1+1,\text{cont},\text{AP}}_{\text{Cas}} = -\frac{\pi}{6d}
\end{equation}
Thus, the Casimir energy depends on the type of boundary conditions.
Comparing (\ref{fercont}) and (\ref{cont}) one observes a peculiar apparent violation of universality as first shown in Ref \cite{Ishikawa:2020ezm}. The results depend on the whether the lattice size is odd or even, and their respective continuum limits do not agree with (\ref{cont}).
Since $d= N a$, where $N$ now can be even or odd, $aE \propto 1/N$ with differing constants for the continuum result as well as odd/even lattice results, as seen in
(\ref{naivePcont}-\ref{cont}). These curves are shown with appropriate labels in the panels of Fig. \ref{osci} for both periodic and antiperiodic boundary conditions.
\begin{figure}[t!]
\centering
\footnotesize{(a)}{{\includegraphics[width=6.25cm]{Casimir_naive_plots_1+1_Periodic.pdf} }}
\footnotesize{(b)}{{\includegraphics[width=6.25cm ]{Casimir_naive_plots_1+1_Antiperiodic.pdf} }}%
\caption{\footnotesize{Oscillation of Casimir energy for positively massive and massless naive fermion for odd and even $N$. [(a),(b)] represent the periodic and antiperiodic boundary conditions in ($1+1$)-dimension respectively.}}%
\label{osci}
\end{figure}
In the limit of large lattice size $N$, one can compute the difference between the Casimir energy for odd and even lattice sizes from Ref. \cite{Ishikawa:2020ezm}, as $aE^{\text{1+1},nf}_{\text{Cas}}(\text{odd } $N$)-aE^{\text{1+1},nf}_{\text{Cas}}(\text{even } $N$) = \mp4\tan(\frac{\pi}{4N})$ for periodic and antiperiodic boundary conditions respectively, which is an oscillating yet rapidly converging function.
The oscillations as $N$ increases from odd to even are depicted
by the black dotted function in Fig. \ref{osci} in both the panels. The continuum expressions are represented by the continuous green line in Fig. \ref{osci} and are seen to average out the oscillations well.
This observation provided us a hint to look for suitable methods to understand the behaviour of Casimir energy for naive fermion as part of a single series.
In (\ref{def3+1}), the Casimir energy is expressed as a difference between the integral and summation of the same function in one spatial dimension on the lattice. It is the sum-part which contributes to the rapidly oscillating behaviour above.
The Euler-Maclaurin formula\footnote{The routine attribute of numerical summation in Wolfram Mathematica, $\texttt{"NSum"}$ uses the Euler-Maclaurin formulae using $\texttt{"Method}\rightarrow\texttt{EulerMaclaurin"}$ to extrapolate the series after a specified number of terms in the summation using the $\texttt{"NSumTerms"}$ attribute.
}
is a series acceleration technique often applied
in such cases,
where the last term of the series tends to 0 as $n\rightarrow\infty$, and expresses the Euler-Maclaurin sum of a function as an infinite series in terms of integral of the same function and higher-order derivative differences.
\begin{figure}[t!]
\centering
\footnotesize{(a)}{{\includegraphics[width=6.25cm]{Casimir_naive_plots_1+1_Periodic_Extrapolated.pdf} }} %
\footnotesize{(b)}{{\includegraphics[width=6.25cm ]{Casimir_naive_plots_1+1_Antiperiodic_Extrapolated.pdf} }}%
\footnotesize{(c)}{{\includegraphics[width=6.25cm]{Casimir_naive_plots_2+1_Periodic.pdf}}} %
\footnotesize{(d)}{{\includegraphics[width=6.25cm]{Casimir_naive_plots_2+1_Antiperiodic.pdf}}}
\caption{\footnotesize{The convergence of Casimir energy for massless naive fermion to the continuum expression after extrapolation is demonstrated by series acceleration methods. [(a),(b)] and [(c),(d)] represent the periodic and antiperiodic boundary conditions for naive fermion in ($1+1$)- and ($2+1$)-dimension respectively.}}%
\label{extrapolation}
\end{figure}
Employing the Euler-Maclaurin method as implemented in Wolfram Mathematica, we obtained the results
as exhibited in Fig. \ref{extrapolation} (a),(b). The oscillatory Casimir energy data points for $N<15$ are obtained from definition (\ref{def3+1}) for periodic and antiperiodic boundary conditions. The extrapolated results are represented by hollow markers in Fig. \ref{extrapolation} for $N>15$, and signal their precise agreement with the continuum results in (\ref{cont}). The Euler-Maclaurin method of numerical sum extrapolates the data for points greater than the prescribed number to terms to be considered using the \texttt{NSumTerms} attribute of Wolfram Mathematica. In Fig. \ref{extrapolation}, this attribute is set to 15 for the agreement between the extrapolated points and continuum results to be clearly visible. Changing the attribute to higher values, say 20, does not alter the results qualitatively.
We find that the Casimir energy for naive fermion converge to a single function which is exactly equal to the continuum result. Moreover, these expressions also match the Wilson and overlap fermion results for both the periodic and antiperiodic boundary conditions, as expected from universality. {In contrast to Ref. \cite{Ishikawa:2020ezm},
we therefore argue that the continuum limit of the Casimir energy expression (\ref{naivemitbagexp}) must be treated as a combined oscillatory expression of the odd and even lattice sizes ($N$).}
A similar extrapolation works for the $(2+1)$-dimensions as shown in Fig \ref{extrapolation}(c),(d). However,
some lattice points are seen to be off the mark as the numerical computation involves calculating the integral of a sum approximated by an expression of higher-order derivatives of the function $|\sin(2\pi n/N)|$, over a continuous variable. This function is not differentiable at the lattice points and thus leads to this discrepancy. Nonetheless, it is sufficiently clear that the oscillating series indeed converges to the same continuum expression as $N$ increases.
In \cite{Ishikawa:2020icy}, it was shown that the negative mass Wilson fermions behave differently according to phases of the fermion mass and represent the bulk fermions, whereas the overlap fermions represent the surface fermions in a topological insulator. They also exhibit oscillation of Casimir energy on odd and even lattice sizes in certain phases. In all such phases,
it is observed that these oscillatory results approach different expressions in the continuum limit. We have verified that applying the same principle of treating both odd and even $N$ as part of the same series, and applying the Euler-Maclaurin series extrapolation method for the Casimir energy of the negative mass Wilson fermions also leads to the correct result in the continuum limit. Therefore, it is shown that the apparent universality violations in all known cases so far are cured when the rapid oscillations between odd and even $N$ are treated as a single oscillatiory function.
\section{Conclusion}
In this paper, we first studied
the continuum Casimir effect for
Dirac fermions in the light of the MIT Bag model.
In section (\ref{slabbag}), the MIT Bag boundary conditions were realized on a lattice for the first time and used to calculate the Casimir effect for lattice fermions as per the formalism developed in Ref. \cite{Ishikawa:2020ezm}. Analytic expressions obtained for the Casimir energy of naive (with doubling correction) and Wilson fermions, along with the numerical results for overlap fermions
matched the continuum results for Dirac fermions exactly as expected from universality. We observe that the naive Casimir energy oscillation, as seen for the periodic and antiperiodic boundary conditions in the naive fermion case, are absent for these boundary conditions. Results in higher dimensions are also similar to the ($1+1$)-dimensions.
Following the studies done in Ref. \cite{Ishikawa:2020ezm, Ishikawa:2020icy}, exact expressions for Casimir energy in continuum, for naive lattice fermions using periodic and antiperiodic boundary conditions were also studied, keeping in mind its applications to condensed matter systems. We have shown that the universality of lattice fermion actions is not violated while calculating the Casimir energy for naive fermion by proposing that the odd and even lattice sizes are part of the single oscillatory series for these boundary conditions, in contrast to the claim \cite{Ishikawa:2020ezm, Ishikawa:2020icy}, making even the naive fermions with periodic/antiperiodic boundary conditions suitable for such calculations. Employing better series acceleration and extrapolation methods, we showed the convergence of the oscillating analytic expression between odd and even lattice sizes to the same expression as continuum. One can also verify the repulsive Casimir energy between Chern Insulators with oppositely signed Chern numbers \cite{Rodriguez} using this formalism
\section{Acknowledgements}
RVG gratefully acknowledges the support of the Department of Atomic Energy, Government of India through Raja Ramanna Fellowship. YVM gratefully acknowledges the support of the INSPIRE fellowship, Department of Science and Technology, Government of India.
\textcolor{red}{
}
\nocite{*}
\bibliographystyle{elsarticle-num}
|
\section{\label{sec:intro} Introduction}
{\sl Introduction.} Hybrid polaritonic states, resulting from the interaction between excitons and photons, manifests on systems such as molecules in cavities\cite{li2021molecular,dunkelberger2022vibration}, plexcitons\cite{fofang2011plexciton,mondal2021coupling}, optically-stimulated semiconductors\cite{kaitouni2006engineering,deng2010exciton,ochoa2020extracting,khan2021efficient,denning2022cavity}, and nanomechanical devices\cite{pigeau2015observation,li2016hybrid,munoz2018hybrid}. Excitonic polaritons display distinct properties that frequently depart from those of their components, providing an ideal platform for the investigation of strong coupling emergence, hybrid-state formation, their quantum control and potential quantum technologies\cite{kurizki2015quantum}. For foundational and practical reasons, it is interesting to study polaritons as nanoscale devices and, in particular, address their stability and performance under modulation due to external fields and forces.
Quantum thermodynamics\cite{pekola2015towards,esposito2015quantum,vinjanampathy2016quantum,deffner2019quantum,kosloff2019quantum} aims to extend thermodynamic concepts, such as work\cite{talkner2007fluctuation}, heat\cite{esposito2015nature,pekola2015towards,whitney2018quantum}, entropy\cite{esposito2015quantum,kalaee2021positivity}, and efficiency\cite{esposito2015efficiency} to nonequilibrium systems with a few degrees of freedom, evolving in regimes where quantum fluctuations cannot be ignored. Studies in this field have concentrated on dissipative fermionic \cite{esposito2015quantum,ludovico2014dynamical,bruch2016quantum,haughian2018quantum}, and bosonic\cite{ochoa2018quantum} systems under slow or periodic modulation, and different techniques to describe periodically driven nanoscale systems are continuously emerging based on reduced quantum master equations\cite{hotz2021coarse,tanimura2020numerically,wacker2022nonresonant} and Floquet theory\cite{hone2009statistical,restrepo2018quantum,deng2016dynamics}. Of particular interests are nanoscale systems and quantum materials resulting from light-matter interactions\cite{ochoa2015pump,elouard2020thermodynamics,wacker2022nonresonant}. Frequently, the dynamic and thermodynamic representation of these systems appear to be contradictory, especially when the interaction term, responsible for appearance of hybrid states, is of the same order of magnitude than the system energy\cite{ludovico2014dynamical,ochoa2016energy}, such as in the case of strongly coupled polaritons. Recent studies in the polariton dynamics \cite{bamba2012dissipation,sieberer2013dynamical,drezet2017quantizing,pistorius2020quantum} attempt to account for dissipation in open or lossy systems.
In this letter we report on the quantum thermodynamics of periodically-driven dissipative polaritons, characterizing the stationary energy and population distribution. Our model describes weakly damped polaritons coupled to both heat and work reservoirs, providing direct access to the stationary state and the absorption lineshape in terms of damping parameters, exciton-phonon coupling and detuning from the driving field frequency. Remarkably, our thermodynamic analysis reveals that the energy dissipated to the environment in the form of heat is related to the von Neumann entropy of the polariton and its effective temperature.
{\sl Polariton dynamics.} We consider a composite $\hat H_{\rm S}$ consisting of a two-level electronic system and a phonon, interacting with the environment $\hat H_{\rm B}$ and with interaction energy $\hat H_{\rm I} = \hat H_{\rm IX}+ \hat H_{\rm IP}$ given by ($\hbar = 1$)
\begin{align}
\hat H =& \hat H_{\rm S} + \hat H_{\rm I} + \hat H_{\rm B} \label{eq:Htot}\\
\hat H_{\rm S} =& \sum_{i=1}^2 \varepsilon_i \hat d_i^\dagger \hat d_i + \omega \hat a^\dagger \hat a + V \hat d_2^\dagger \hat d_1 \hat a +V^* \hat a^\dagger \hat d_1^\dagger \hat d_2 \label{eq:Hsys}\\
\hat H_{\rm IX} =& \sum_k W^X_{k} \hat c_k^\dagger \hat d_1 ^\dagger \hat d_2 + W^{X *}_{k} \, \hat d_2 ^\dagger \hat d_1 c_k \label{eq:HIX}\\
\hat H_{\rm IP} =& \sum_k W^P_k \hat b_k^\dagger \hat a + \text{ h.c} \, \label{eq:HIP} ;
\end{align}
The Hamiltonian $\hat H$ in Eq.\ \eqref{eq:Htot} is reminiscent of the Jaynes-Cummings model and incorporates explicitly energy damping to the environment. In Eq.\ \eqref{eq:Hsys}, $\varepsilon_i$ is the $i$-th level energy, $\omega$ is the characteristic frequency for the phonon, $\hat d_i^\dagger $ ($\hat d_i$) is the creation (annihilation) operator for an electron in the $i$-th level, $\hat a^\dagger$ ($\hat a$) creates (annihilates) a phonon, and $V$ is the coupling term between the phonon and the two-level system. The electronic and phononic components of the system interact with the corresponding bosonic baths, namely, $\hat H_X = \sum_k \varepsilon_k \hat c_k^\dagger \hat c_k$ and $\hat H_P =\sum_k \omega_k \hat b_k^\dagger \hat b_k$, with coupling terms $W^X_{k}$ and $W^P_{k}$ as in Eqs.\ \eqref{eq:HIX} and \eqref{eq:HIP}.
As a consequence of the electron-phonon coupling, hybrid states $| \alpha \rangle$ are formed. These hybrid states diagonalize $\hat H_{\rm S}$, with corresponding eigenenergies $\lambda_\alpha$ and, in general, differ from the product states $|i , m \rangle$ characterized by the electronic quantum number $i$ and phonon mode $m$. To bring the polariton in a nonequilibrium condition, we consider the following generic periodic time-dependent variation, with frequency $\omega'$ and interaction strength $A$
\begin{align}
\hat H_{d}(t) =& 2 A \cos(\omega' t ) \sum_{m} | 1, m \rangle \langle m, 2 | + | 2, m \rangle \langle m, 1 |,
\end{align}
and obtain a dynamical description of the driven polariton by solving the Liouville-von Neumann equation for the full density matrix. The Hamiltonian $\hat H_d(t)$ describes the polariton interaction with an unspecified reversible work reservoir. We solve the Liouville equation in the interaction picture with interacting Hamiltonian $\hat H_d(t)+ \hat H_I$, invoking the Born-Markov approximation\cite{breuer2002theory} (see SM for details) . In this form, our solution is valid to second order in $W^X, W^P$ and $A$; holds for arbitrary values in the coupling term $V$. The resulting Markovian equation for the reduced density matrix $\rho(t)$ is
\begin{align}
\frac{d}{dt} \vec \rho(t) = -\left(\mathcal{D} + \mathcal{L}_X+\mathcal{L}_P +\mathcal{L}_d(t)\right) \vec \rho(t) \label{eq:rhot},
\end{align}
where we write the reduced density matrix as a vector $ \vec \rho(t)$ with elements $\rho_\alpha^\beta (t) = \langle \alpha | \rho(t) |\beta \rangle$. In Eq.\ \eqref{eq:rhot}, the operator $\mathcal{D}$ is diagonal with matrix element $\mathcal{D}_{\alpha_2 \beta_2}^{\alpha_1 \beta_1} = -i (\lambda_{\alpha_1} -\lambda_{\beta_1}) \delta_{\alpha_1}^{\alpha_2} \delta_{\beta_1}^{\beta_2}$ and corresponds to the free evolution of the polariton in the absence of any relaxation mechanism; $\mathcal{L}_X$ and $\mathcal{L}_P$ are operators that result from the independent exciton and phonon relaxation and are correspondingly proportional to the damping rates $\Gamma_\square = 2 \pi \sum_k |W_k^\square|^2 \delta (\omega_k - \omega)$ with $\square = X, P$. The time-dependent operator $\mathcal{L}_d(t)$ introduces the effects of the driving field in the polariton state, in a form that is proportional to $A^2$ and that depends on the frequency of the incident field $\omega'$. Notably, $\mathcal{L}_d(t)$ is periodic with period $\tau = 2 \pi /\omega'$ (See the Supplementary material for details).
Formally, in the representation chosen in Eq. \eqref{eq:rhot}, the reduced density matrix has an infinite (countable) number of matrix elements. Due to the relaxation induced by the couplings to the environment, the contributions to the dynamics from higher energy states can be disregarded and a finite matrix representation of the operators in Eq.\ \eqref{eq:rhot}, in terms of the hybrid states formed by the lowest $m_o$ phonon modes, results in a faithful approximation to the dynamics. Within this finite representation the $\mathcal{L}$ operators are $(2m_o)^2$-square matrices, and the time-dependent reduced density matrix obtained from the initial condition $\vec \rho(0)$ is
\begin{align}
\vec \rho(t) = \exp\left[-(\mathcal{D} + \mathcal{L}_X+\mathcal{L}_P) t - \int_0^t \mathcal{L}_d(t') dt' \right] \vec \rho(0).\label{eq:rhoExp}
\end{align}
Utilizing the $\mathcal{L}_d$ periodicity we find that for $t = N \tau + \Delta t$, $\Delta t < \tau $
\begin{align}
\int_{0}^{t} \mathcal{L}_d(t') dt' =& \pi A^2 \left(\frac{t}{2}-i \frac{e^{2 i \omega' \Delta t}}{4 \omega'}\right) \mathcal{N}_+ \notag \\
& + \pi A^2 \left(\frac{t}{2}+i \frac{e^{-2 i \omega' \Delta t}}{4 \omega'}\right) \mathcal{N}_{-}, \label{eq:LdB}
\end{align}
where $\mathcal{N_\pm}$ are time-independent transition matrices describing the allowed system state conversions due to the external modulation.
Equations \eqref{eq:rhoExp} - \eqref{eq:LdB} provide a simple description of a weakly damped periodically-modulated polariton in the strong coupling regime, as it holds for arbitrary values for the electron-phonon coupling strength $V$. Moreover, Eq.\ \eqref{eq:rhoExp} constitutes a numerically stable model for the dynamics of the driven system, naturally incorporating the effects of the system-bath couplings (system-bath coherences) within the Markovian regime, and allowing direct investigation of the polariton long-time evolution. In contrast, the numerical propagation of Eq.\ \eqref{eq:rhot} demands the initial evolution of the free system to introduce system-bath correlations and may not be stable near the resonance condition ($\omega = \omega'$), as in this case Eq.\ \eqref{eq:rhot} becomes a stiff differential equation. In this form, Eqs.\ \eqref{eq:rhoExp}-\eqref{eq:LdB} overcome the difficulties found in the study of lossy cavities\cite{davidsson2020simulating} near resonance\cite{du2021nonequilibrium}, in the long-time evolution regime, and for an arbitrary driving frequency $\omega'$. Significantly, Eqs.\ \eqref{eq:rhoExp} and \eqref{eq:LdB} are not limited to slow driving rates and do not requires time-coarse graining\cite{hotz2021coarse} to describe the system in the long-time evolution limit.
{\sl Polariton thermodynamics.} Starting from Eq.\ \eqref{eq:rhot} we define element-wise the time-dependent operators $L_X, L_P$ and $L_d$ corresponding to the different partial time-derivatives of the polariton density matrix
\begin{align}
L^{\;\;\beta_1}_{\square\, \alpha_1} = \sum_{\alpha_2 \beta_2}\mathcal{L}^{\;\;\; \alpha_1 \beta_1}_{\square\, \alpha_2 \beta_2} \rho^{\beta_2}_{\alpha_2}(t) \hspace{0.5cm}(\square = X, P , d),
\end{align}
and identify two reversible heat rates due to the polariton-heat reservoir interaction
\begin{align}
\dot Q_X(t) =& - {\rm Tr} \left[ L_X(t) \hat H_{\rm S} \right ] \label{eq:dotQX}\\
\dot Q_P(t) =& - {\rm Tr} \left[ L_P(t) \hat H_{\rm S} \right ]. \label{eq:dotQP}
\end{align}
Similar considerations were used in, e.g., Ref. \cite{wacker2022nonresonant} to define heat rates in dissipative driven TLS. Since we chose an interaction representation that includes the driving field $\hat H_d(t) $ in the interaction term, the power or work rate on the polariton due to this external modulation is given by
\begin{align}
\dot W(t) =& - {\rm Tr} \left [ L_d (t) \hat H_{\rm S} \right ]. \label{eq:dotW}
\end{align}
\begin{figure}[t]
\centering
\includegraphics[scale=0.3]{Fig1.pdf}
\caption{Polariton energy distribution. a) Stationary phonon, exciton, interaction and polariton energies, respectively denoted by $E_{\rm pho}$, $E_{\rm TLS}$, $E_{\rm int}$ and $\langle \hat H_{\rm S} \rangle$), as a function of coupling strength $V$. b) $\langle \hat H_{\rm S} \rangle$ near $V=\omega$ calculated at three different bath temperatures: 300 (black), 100 (brown), 10 (green). c) $\langle \hat H_{\rm S} \rangle$ at resonance ($V= 2 \omega$) as function of the damping parameters $\Gamma_X$, $\Gamma_P$. d) Phonon, exciton, interaction and polariton energies as a function of time, and after a propagation period of 8.721 ps. (color code as in panel a ). e) diagonal density matrix elements in the product state basis, as a function of energy and for several $V$. Parameters are $\omega'=\omega =1.0$ eV, $\Gamma_X =0.04$ eV, $\Gamma_P =0.16$ eV, $A= 0.1$ eV, $\varepsilon_1= 0$ eV, $\varepsilon_2 = 1$ eV, $T=300$ K, unless otherwise specified.}\label{fig:lineshape}
\end{figure}
The polariton's von Neumann entropy
\begin{align}
S(t) = & - {\rm Tr } \{ \rho(t) \ln \rho(t) \},
\end{align}
significantly differs from the sum of the exciton and phonon residual entropies in the strong-coupling regime. However, the total entropy change rate is the linear combination of three different rates resulting from interactions with the environment
\begin{align}
\dot S(t) =& \dot S_X(t)+\dot S_P(t)+\dot S_d(t) \\
\dot S_{\square} =& {\rm Tr } \left[ L_\square(t) \ln \rho(t) \right] \hspace{0.5cm} (\square = X, P, d) \label{eq:dotS}.
\end{align}
In terms of the reversible heat and entropy rates, we define the effective polariton temperature $\beta_{\rm eff}$ as the proportionality factor between the total reversible heat rate and the sum of the associated entropy rates
\begin{align}
\beta_{\rm eff} \left( \dot Q_X(t)+\dot Q_P(t)\right) =& \dot S_X(t)+\dot S_P(t) .\label{eq:Beff}
\end{align}
In this form, $\beta_{\rm eff}$ has units of inverse energy and may fluctuate as the driving field. The first law imposes that the internal energy variation for the universe, $\dot U_{\rm univ}$, must always vanish. Consequently, $\dot U_{\rm S}+\dot U_{X}+\dot U_{P}+ \dot U_{W} = 0$, where $U_W$ is the work source internal energy. Since the thermal reservoirs are assumed to be reversible, then $\dot U_X = - \dot Q_x$, $\dot U_P = - \dot Q_p$ and $\dot W + \dot Q_{\rm irrev} + \dot U_W = 0$. We identify an additional heat rate, $\beta_{\rm eff}^{-1}\dot S_d$, between the polariton and the work source. Assuming that the work source volume is fixed, we conclude that $\dot U_W = - \beta_{\rm eff}^{-1}\dot S_d$. Consequently, the irreversible heat rate is given by
\begin{align}
\dot Q_{\rm irrev}(t) =& \beta_{\rm eff}^{-1} \dot S_d(t) - \dot W (t). \label{eq:Qirrev}
\end{align}
Note that $\dot Q_{\rm irrev}$ vanishes as the driving intensity $A \to 0$. Moreover, the second law requires that $\dot W \leq \dot U_W$, and we therefore expect $\dot Q_{\rm irrev}(t)$ be always positive. We verify this assertion numerically for a representative system next.
\begin{figure}[t]
\centering
\includegraphics[scale=0.23]{Fig2.pdf}
\caption{Polariton quantum thermodynamics. a) Work and heat rates as a function of time. b) Total work $\overline{W}$ done in the polariton by the external source per period $\tau$ as a function of coupling strength $V$. c) von Neumann entropy rates as a function of time. d) Inverse effective temperature $\beta_{\rm eff}^{-1}$ as a function of $V$. e) Irreversible dissipated heat rate $\dot Q_{\rm irrev}$ as a function of time f) Total irreversible dissipated heat $\overline{Q}_{\rm irrev}$ per period as a function of coupling strength $V$. These quantities are calculated after 8.271 ps of evolution. Parameters are as in Fig.\ \ref{fig:lineshape}.}\label{fig:rates}
\end{figure}
{\sl Numerical example.} We now consider a driven dissipative polariton with identical driving field, phonon and exciton frequencies ( specifically $\omega' = \omega = \varepsilon_2 = 1$ eV, and $\varepsilon_1 = 0$ ) with driving parameter $A= 0.1$ eV, initially at the ground state (such that $\rho_\alpha^\beta(0) = \delta_{\alpha,(0,0)} \delta_{\beta,(0,0)}$ in the $|i,m \rangle$ basis). For this system, $\hat H_{\rm S}$ is a block matrix with eigenvalues $ \lambda_n^{\pm}= (n+1)\omega \pm V$ and zero. Figure \ref{fig:lineshape}a shows the phonon energy $E_{\rm pho} = \omega \langle \hat a^\dagger \hat a \rangle$, the exciton energy $E_{\rm TLS}= \varepsilon_2 \langle \hat d_2^\dagger \hat d_2 \rangle$, the interaction energy $E_{\rm int} = V \langle( \hat d_2^\dagger \hat d_1 \hat a +\hat a^\dagger \hat d_1^\dagger \hat d_2) \rangle $, and the total polariton energy $\langle \hat H_{\rm S} \rangle$ as a function of coupling strength $V$ at 300 K and after propagating the system 8.271 ps (2000$\tau$). In Fig.\ \ref{fig:lineshape} we assume the wideband limit and set the damping rates to $\Gamma_X = 0.04$ eV and $\Gamma_P = 0.16$ eV and include the lowest 30 phonon modes, which was enough to achieve numerical convergence in the rates. As we vary the coupling strength $V$, we find two significant features in the energy. First, we observe a monotonic increase in the absolute energies starting around $V = 0.85 $ eV with a sudden decay at 1 eV; and second, a broad peak near 2 eV. Indeed, when $V = \omega - \delta$, for small but positive $\delta$, the hybrid state $\lambda_0^- = \delta $ comes close in energy with the ground state, favoring the energy transfer cascade driven by thermal fluctuations. Figure \ref{fig:lineshape}b presents the polariton energy $\langle \hat H _{\rm S} \rangle$ near $V = \omega = 1 $ eV at 300, 100 and 10 K. We observe a reduction in the height and spread of this peak as the bath temperature drops, with a clear suppression of this peak at 10 K. This finding confirms that the energy absorption close to $V = \omega$ originates on the thermal fluctuations and the harmonic nature of the phonon. The second peak, centered at $V = 2 \omega$, results from the emergence of a hybrid state with energy $\lambda_0^- = - \omega $, and the fact that the driving field frequency is in resonance with transition $\varepsilon_1 \to \lambda_0^{-}$. This resonant peak, can be fit to a Lorentzian distribution with a scale parameter linearly depending on $V$ and centered at $2$ eV (see Supplementary Material). The energy contour in \ref{fig:lineshape}c, reveals how the total polariton energy in resonance varies for different values in the damping rates $\Gamma_X$ and $\Gamma_P$, suggesting that $\langle \hat H_{\rm S} \rangle$ is more sensitive to $\Gamma_P$ than $\Gamma_X$. We also note that majority of the polariton energy is stored in the phonon modes. Figure \ref{fig:lineshape}d shows that the systems reaches a periodic stationary state. The energy oscillation amplitude in this stationary state is very small, on the order of a few $\mu$eV, as expected for an overdamped system with $A^2/{\rm eV} < \Gamma_X, \Gamma_P$. These oscillations are not detectable from Fig.\ \ref{fig:lineshape}d, and we can regard the polariton energy as constant. Figure \ref{fig:lineshape}e shows that density matrix diagonal elements for several values on the coupling strengths $V$, and as a function of the energy. These probabilities can be fit to a biexponential function with two energy decay parameters: one dominating at low energies, and the second one dominating at higher energies. Such biexponential fitting function is consistent with the definitions of $\hat H$ and $\hat H_d$ and the form for the density matrix in Eq.\ \eqref{eq:rhoExp}. Notably, while the population probabilities are maximal in resonance, their decay parameters do not change significantly with $V$.
We investigate the polariton quantum thermodynamics under periodic driving in Fig.\ \ref{fig:rates}. First, we calculate the heat and work rates defined in Eqs.\ \eqref{eq:dotQX}, \eqref{eq:dotQP} and \eqref{eq:dotW} in the long-time evolution regime in Fig.\ \ref{fig:rates}a. We find negative and constant $\dot Q_X$ and $\dot Q_P$, indicating a net flux of heat energy from the polariton to the environment, while the work done on the system oscillates as the driving field. The total work per period $\overline{W} \equiv \int_{0}^{\tau} \dot W(t) dt$, presented in Fig.\ \ref{fig:rates}b serves as a measure of the thermodynamic efficiency of the process as a function of the coupling strength. Indeed, for a specific realization of the system, the intensity of the external field enters in the definition of the parameter $A$ in our model, which is kept constant in our calculations. The thermodynamic efficiency, defined by the ratio between $\overline{W}$ and the intensity of the external field, is therefore maximal in resonance ($\omega'=\omega$ and $V = 2 \omega$) as it is in these conditions that $\overline{W}$ is maximal. We note that during the cyclic process imposed by external modulation, the polariton remains in a stationary state far from equilibrium. As a result, the efficiency described here cannot be compared with the Carnot efficiency, and it is therefore the figure of merit for the performance of the external pumping. Figure \ref{fig:rates}c shows the von Neumann entropy rates defined in Eq.\ \eqref{eq:dotS} at resonance, and Fig.\ \ref{fig:rates}d presents the inverse effective temperature introduced in Eq.\ \eqref{eq:Beff} as a function of $V$. We observe that $\beta_{\rm eff}^{-1}$ achieves its maximum value at resonance, and it quickly decays away from this point. With this effective temperature, and according to the definition in Eq.\ \eqref{eq:Qirrev}, we obtain the irreversible heat rate $\dot Q_{\rm irrev}$ in Fig.\ \ref{fig:rates}e at resonance. Notably, we find that $\dot Q_{\rm irrev}$ is always nonnegative in agreement with the second law. We also verify that this is the case when the driving occurs off-resonance (not shown in the Fig.\ \ref{fig:rates}). Finally, in Fig.\ \ref{fig:rates}f we show the total irreversible heat dissipated per period $\overline{Q}_{\rm irrev} \equiv \int_{0}^{\tau} \dot Q_{\rm irrev}(t) dt$ as a function of $V$, and find that this quantity is also maximal in resonance.
In conclusion, we developed a robust and efficient model for periodically driven polaritons, weakly interacting with external reservoirs, in the strong-coupling regime. We utilized this formalism to reveal the polariton long-time evolution and thermodynamic performance upon external modulation. Significantly, our approach is not limited to the stationary case and can also be used to investigate the polariton transient dynamics and performance. Moreover, we believe that our formalism permits the study of the quantum thermodynamics of other analog systems.
\nocite{*}
\section{Quantum Master Equation }\label{ap:RME}
We solve the Liouville-von Neumann (LvN) equation for the full density matrix $\bar \rho(t)$, assuming that the surroundings remain in equilibrium during the driving, such that, $\bar \rho (t) = \rho^{\rm S} (t) \otimes \rho^{\rm B}_{\rm eq}$ at all times. We write the LvN equation in the interaction picture
\begin{align}\tag{S1}
\frac{d \bar \rho_I}{d t} = -\frac{i}{\hbar}[\hat{\mathcal{V}}_I(t), \bar \rho_I (t)],
\end{align}
with interaction Hamiltonian $\hat{\mathcal{V}}_I(t) = \hat H_I + \hat H_d(t) $. Up to second order in $W_X$, $W_P$ and $A$ and after tracing out the bath degrees of freedom we obtain
\begin{align}
\frac{d}{dt} \rho_I^{\rm S}(t) = &- \frac{i}{\hbar} [\hat H_{\rm S}, \rho_I^{\rm S}(t)] \notag\\
&- \frac{1}{\hbar^2}\int_0^t e^{-i\hat H_{\rm S} t /\hbar}\times \notag \\
&\hspace{2cm}{\rm Tr}_B \{ [\hat{\mathcal{V}}_I(t), [\hat{\mathcal{V}}_I(t'), \rho_I^{\rm S}(t')]]\} \notag \\
& \hspace{5cm}\times e^{-i\hat H_{\rm S} t /\hbar}\, dt' \label{eq:LvNeq} \tag{S2}
\end{align}
From the first term in the right hand side in Eq.\ \eqref{eq:LvNeq} we recover $\mathcal{D}$.
\begin{align}
\frac{\partial }{\partial t }\rho^{\alpha}_{\beta} (t) = -i (\lambda_{\alpha}-\lambda_{\beta}) \rho^{\alpha}_{\beta} (t). \tag{S3}
\end{align}
The second term incorporates the effect of the coupling of the polariton to the environment and the external driving, which are represented by the operators $\mathcal{L}_X$, $\mathcal{L}_P$, and $\mathcal{L}_d$ in the main text. Since the derivation of $\mathcal{L}_X$ and $\mathcal{L}_P$ follow a similar pattern, we illustrate this derivation in some detail for $\mathcal{L}_P$ and indicate how $\mathcal{L}_X$ results from simple substitutions.
First, we introduce the self-energies
\begin{align}
\Sigma^{P,>} (t,t') =& \sum_k |W_k^P|^2 \langle \hat b_k(t)\hat b_k^\dagger(t')\rangle_B \tag{S4}\\
\Sigma^{P,<} (t,t') =& \sum_k |W_k^P|^2 \langle \hat b_k^\dagger(t)\hat b_k(t')\rangle_B, \tag{S5}
\end{align}
and adopt a Markovian approximation to the dynamics in Eq. \eqref{eq:LvNeq} by replacing $\rho_I(t') \to \rho_I(t)$. After this, we invoke the Redfield-Markov approximation and change the integral domain from $(0,t)$ to $(-\infty, \infty)$, with a rescaling $1/2$ factor such that $\int_0^t \to \frac{1}{2}\int_{-\infty}^\infty $. The eight terms resulting from the explicit evaluation of the commutators in the second term in Eq. \eqref{eq:LvNeq} are
\begin{align}
\mathcal{L}^{\;\;\; \alpha_1 \beta_1}_{P\, \alpha_2\beta_2}& = \int_{-\infty}^\infty \tilde{\mathcal{L}}^{\;\;\; \alpha_1 \beta_1}_{P\, \alpha_2\beta_2}(t, t') dt' \notag \\
= \Gamma_P &\sum_\gamma \big( n(\gamma,\beta_1)\, \hat a^{\alpha_1}_{\gamma} \hat a^{\dagger \gamma}_{\;\; \alpha_2} + (1 + n(\gamma,\beta_1))\, \hat a^{\dagger \alpha_1}_{\;\; \gamma} \hat a^{\gamma}_{\alpha_2}\big) \delta^{\beta_1}_{\beta_2} \notag \\
-\big( n&(\alpha_1,\gamma)\,\hat a^{\dagger \alpha_1} _{\;\; \alpha_2} \hat a^{\beta_2}_{\beta_1} + (1 + n(\alpha_1,\gamma))\, \hat a^{\alpha_1}_{\alpha_2} \hat a^{ \dagger \beta_2}_{\;\; \beta_1} \big) \delta^{\beta_2}_{\gamma} \notag \\
+\big( n&(\gamma,\alpha_2)\,\hat a^{\beta_2} _{\gamma} \hat a^{\dagger \gamma}_{\;\; \beta_1} + (1 + n(\gamma,\alpha_2))\, \hat a^{\dagger \beta_2}_{\;\; \gamma} \hat a^{\gamma}_{\beta_1} \big) \delta^{\alpha_2}_{\alpha_1} \notag \\
-\big( n&(\beta_1,\alpha_2)\,\hat a^{\dagger \alpha_1} _{\;\; \alpha_2} \hat a^{\gamma}_{\beta_1} + (1 + n(\beta_1,\alpha_2))\, \hat a^{\alpha_1}_{\alpha_2} \hat a^{\dagger \gamma}_{\;\; \beta_1} \big) \delta^{\gamma}_{\beta_2} \tag{S6}
\end{align}
with $\Gamma_P = 2 \pi \sum_k |W_k^P|^2 \delta(\omega_k - \omega)$. In this work we invoke the wideband approximation. This is justified under the assumption that $\Gamma_P$ is small compared to the width of the spectral function. As indicated above $\mathcal{L}_X$ follows from similar considerations, and under the substitution $\hat b_k \to \hat c_k$, $\hat a \to \hat d_1^\dagger \hat d_2$, and $W_P \to W_X$.
For the driving field introduced in Eq.\ (5) in the main text we write
\begin{align}
\hat x = & \hat d_1^\dagger \hat d_2 = \sum_m | 1, m \rangle \langle 2, m | \tag{S7}
\end{align}
and evaluate the double commutator in Eq.\ \eqref{eq:LvNeq}, under the Markovian approximations described above. For this we note that ($\hbar = 1$)
\begin{align}
\int_{-\infty}^{\infty}d t' &\cos(\omega t ) \cos(\omega t') e^{-i \Delta \lambda (t' -t)} = \notag\ \\
& \pi \cos(\omega t) \left( e^{i \omega t} \delta(\Delta \lambda - \omega)+e^{-i \omega t} \delta(\Delta \lambda + \omega) \right) \tag{S8}
\end{align}
and as a result
\begin{align}
\mathcal{L}^{\;\;\; \alpha_1 \beta_1}_{d\, \alpha_2\beta_2}(t) = & -2 |A|^2 \cos(\omega' t) \times \notag\\
\Big\{ & (g(\beta_1,\alpha_2,\omega', t)+g(\beta_2,\alpha_1,\omega',t))\notag\\
&\hspace{1cm} \times \left(\hat x^{\dagger \alpha_2}_{\;\; \alpha_1} \hat x^{\beta_1}_{\beta_2} + \hat x^{\alpha_2}_{\alpha_1} \hat x^{\dagger \beta_1}_{\;\; \beta_2} \right) \notag \\
-\sum_\gamma & \Big( g(\beta_1,\gamma,\omega',t) \left(\hat x^{\dagger \gamma}_{\;\; \alpha_1} \hat x^{\alpha_2}_{\gamma} + \hat x^{\gamma}_{\alpha_1} \hat x^{\dagger \alpha_2}_{\;\; \gamma} \right) \delta^{\beta_1}_{\beta_2} \notag\\
& + g(\gamma,\alpha_1,\omega',t) \left(\hat x^{\dagger \gamma}_{\;\; \beta_2} \hat x^{\beta_1}_{\gamma} + \hat x^{\gamma}_{\beta_2} \hat x^{\dagger \beta_1}_{\;\; \gamma} \right) \delta^{\alpha_1}_{\alpha_2}\Big) \Big\} \label{eq:Ldt} \tag{S9}
\end{align}
where
\begin{align}
g(\alpha, \beta, \omega, t) = & e^{i \omega t } \delta(\lambda_{\alpha}-\lambda_\beta -\omega)+e^{-i \omega t } \delta(\lambda_{\alpha}-\lambda_\beta +\omega)\label{eq:gfunc}. \tag{S10}
\end{align}
From Eq. \eqref{eq:Ldt}, we obtain the transition matrices, $\mathcal{N}_{\pm}$, defined in Eq. (8) in the main text.
\begin{align}
\mathcal{N}&^{\;\;\; \alpha_1 \beta_1}_{\pm\, \alpha_2\beta_2} = \notag\\
&\Big\{ ( \delta(\lambda_{\beta_1}-\lambda_{\alpha_2} \mp \omega')+\delta(\lambda_{\beta_2}-\lambda_{\alpha_1} \mp \omega'))\notag\\
&\hspace{2.5cm} \times \left(\hat x^{\dagger \alpha_2}_{\;\; \alpha_1} \hat x^{\beta_1}_{\beta_2} + \hat x^{\alpha_2}_{\alpha_1} \hat x^{\dagger \beta_1}_{\;\; \beta_2} \right) \notag \\
&-\sum_\gamma \Big( \delta(\lambda_{\beta_1}-\lambda_{\gamma} \mp \omega') \left(\hat x^{\dagger \gamma}_{\;\; \alpha_1} \hat x^{\alpha_2}_{\gamma} + \hat x^{\gamma}_{\alpha_1} \hat x^{\dagger \alpha_2}_{\;\; \gamma} \right) \delta^{\beta_1}_{\beta_2} \notag\\
&\hspace{0.3cm} + \delta(\lambda_{\gamma}-\lambda_{\alpha_1} \mp \omega') \left(\hat x^{\dagger \gamma}_{\;\; \beta_2} \hat x^{\beta_1}_{\gamma} + \hat x^{\gamma}_{\beta_2} \hat x^{\dagger \beta_1}_{\;\; \gamma} \right) \delta^{\alpha_1}_{\alpha_2}\Big) \Big\} \label{eq:Npm} \tag{S11}
\end{align}
\begin{figure}[t]
\centering
\includegraphics[scale=0.3]{Fig1Soff.pdf}
\caption{ Absolute energies, heat, work, and von Neumann entropy rates as a function of the upper bound in the number of phonon modes $m_o$, for the system in Figs.\ 1 and 2 in the main text, for $V= 1.9 \omega$, $\tau = 2000 \tau =8.271 $ ps, $\Gamma_P = 0.16$ e V $ = 4 \Gamma_X$. Other parameters are as in Figs. 1 and 2.}\label{fig:ConvOff}
\end{figure}
In our calculations involving Eqs.\ \eqref{eq:gfunc} and \eqref{eq:Npm}, we approximate the Dirac's delta function by a Lorentzian function with broadening parameter equal to $1 \times 10^{-4}$ eV.
\section{Numerical convergence tests}
\begin{figure}[t]
\centering
\includegraphics[scale=0.3]{Fig1SRes.pdf}
\caption{Absolute energies, heat, work, and von Neumann entropy rates as a function of the upper bound in the number of phonon modes $m_o$, for the system in Figs.\ 1 and 2 in the main text, for $V= 2 \omega$, $\tau = 2000 \tau =8.271 $ ps, $\Gamma_P = 0.16$ e V $ = 4 \Gamma_X$. Other parameters are as in Figs. 1 and 2}\label{fig:ConvRes}
\end{figure}
In this section, we provide evidence for the numerical convergence of the energy and thermodynamic rates reported in Figs.\ 1 and 2 in the main text, when we carry out the summation over the phonon modes including only the first thirty modes ($m_o = 30$). In Figs. \ref{fig:ConvOff} and \ref{fig:ConvRes} we present the energies $E_{\rm TLS}$, $E_{\rm int}$, $E_{\rm pho}$, $\langle \hat H_{\rm S} \rangle$; the heat and work rates $\dot Q_X+ \dot Q_P$ and $\dot W$; the von Neumann entropy rates $\dot S_X+ \dot S_P$ and $\dot S_d$ correspondingly off-resonance ($V = 1.9 \omega$) and in resonance ( $V = 2 \omega $) for $t = 2000 \tau =8.271$ ps. We find that the energy rates converge to the numerical exact value for $m_o= 30$. We also note that $E_{\rm pho}$ and $\langle \hat H_S \rangle$ deviate about 3 \% from the limit value in resonance ($m_o = 45$). This deviation is not relevant for the thermodynamic analysis in the main text.
\section{Lineshape near Resonance}
In this section we show that we can fit the second peak in Fig.\ 1a, centered at $V = 2 \omega$, to a Lorentzian form with a broadening parameter that linearly depends on the exciton-phonon coupling strength. Explicitly, we write $\langle \hat H_S \rangle$ as function of $V$
\begin{align}
\langle \hat H_{\rm S} \rangle = 0.376 * \frac{(0.0696 V - 0.0349)}{(V - 2.0)^2 + (0.0696 V - 0.0349)^2} \tag{S12} \label{eq:fitline}
\end{align}
Figure \ref{fig:Lineshape} presents a comparison between the energies obtained as the expectation value of $H_S$ and the ones obtained from the fitting function in Eq.\ \eqref{eq:fitline}.
\begin{figure}[t]
\centering
\includegraphics[scale=0.8]{FigPeak_Jun2.pdf}
\caption{Polariton energy near $V = 2 \omega$, obtained from the density matrix (dots) and from the fitting function in Eq. \eqref{eq:fitline}. Other parameters are as in Fig. 1a in the main text.}\label{fig:Lineshape}
\end{figure}
\nocite{*}
\end{document}
|
\section{Introduction}
A verifiable database protects the integrity of user data and query execution on untrusted database providers.
Until recently, the focus has been on protecting the integrity of query execution~\cite{integridb, ads, arx}. In
this context, users upload the data to an untrusted provider which executes queries and returns proofs that certify
the correctness of the results. However, such OLAP-style verifiable databases rely on complex cryptographic primitives
that limit the performance or the range of possible queries.
We observe a renewed interest in verifiable databases, with a focus on OLTP-style systems. In particular, there
emerges a new class of systems, called {\em verifiable ledger databases}, whose goal is to protect the integrity
of the data history. In particular, the data is maintained by an untrusted provider that executes read
and update queries. The provider produces integrity proofs about the data content and its entire evolution
history.
An example of verifiable ledger databases is the blockchain~\cite{hyperledger, ethereum, quorum}. The blockchain
maintains a replicated append-only log in a decentralized setting. It protects the integrity of the log against
Byzantine attackers, by running a distributed consensus protocol among the participants. The integrity proof
(in a permissioned blockchain) consists of signed statements from a number of participants. Another example is
a certificate transparency log~\cite{ct,coniks}, in which a centralized server maintains a tamper-evident,
append-only log of public key certificates. The server regularly publishes summaries of the log which are
then checked for consistency by a set of trusted {\em auditors}. The integrity proof generated by the server
can be verified against the published and audited summaries. The third example is Amazon's
Quantum Ledger Database (QLDB) service~\cite{qldb}, which maintains an append-only log similar to that of
certificate transparency. QLDB uses the log to record data operations that are then applied to another backend database.
Our goal is to build a practical verifiable ledger database system. We observe that the three examples above are built from a common abstraction, namely a {\em transparency log}, which provides two important security properties.
First, users can verify that the log is append-only, namely, any successful update operations will not be
reverted. Second, users can verify that the log is linear, that is, there is no fork in history.
Blockchains enforce these properties by replicating the log and running consensus protocol among the
participants. Certificate transparency log and QLDB rely on auditors or users to detect violations of
the properties. Despite useful security properties, transparency logs are inadequate as databases. In
fact, we identify three challenges in building a practical verifiable ledger database system on top of this abstraction.
The first challenge is the lack of a unified framework for comparing verifiable ledger databases. In
particular, we note that the three systems above have roots from three distinct fields of computer science: blockchains are from
distributed computing, certificate transparency is from security, and QLDB is from database. As a consequence,
there is no framework within which they can be compared fairly. The second challenge is the lack of database
abstraction, that is, transactions. The transparency logs used in existing systems expose a key-value interface. For
example, blockchains maintain the states in a key-value storage, certificate transparency and QLDB store
the hashes of the certificates and the operations in the log, respectively. This key-value model
is too low-level to support general OLTP database workloads. The third challenge is how to achieve high
performance while retaining security. Blockchains, for instance, suffer from poor performance due to the
consensus bottleneck. Certificate transparency has low performance because of expensive disk-based operations, while
QLDB generates inefficient integrity proofs for verifying the latest data.
We address the first challenge by establishing the design space of verifiable ledger databases. The space
consists of three dimensions. The abstraction dimension captures the interface exposed to the users, which
can be either key-value or general transactions. The threat model dimension includes different security assumptions. The performance dimension includes design choices that affect the integrity proof sizes and the overall
throughput. In addition to the design space, we propose a benchmark for comparing the performance of different
verifiable ledger databases. Specifically, we extend traditional database benchmarks, namely YCSB and TPC-C,
with additional workloads containing verification requests on the latest or historical data.
We address the second and third challenges by designing and implementing
\textsc{GlassDB}\xspace, a new distributed verifiable ledger database system that overcomes the limitations of
existing systems. \textsc{GlassDB}\xspace supports distributed transactions and has
efficient proof sizes. It relies on auditing and user gossiping for security.
It achieves high throughput by building on top of a novel data structure: a
two-level Merkle-like tree. This data structure protects the data indexes, which
enables secure and efficient verification. Furthermore, it is built over the
states, as opposed to over transactions, which enables efficient lookup and
proof generation while reducing the storage overhead. \textsc{GlassDB}\xspace partitions data
over multiple nodes, where each node maintains a separate ledger, and uses the classic
two-phase commit protocol to achieve transaction semantics. Each node of \textsc{GlassDB}\xspace
has multiple threads for processing transactions and generating proofs in parallel,
and a single thread for updating the ledger storage. \textsc{GlassDB}\xspace uses
optimistic concurrency control to resolve conflicts in transactions, and batching
to reduce the cost of updating and persisting the core data structure. We conduct an
extensive evaluation of \textsc{GlassDB}\xspace, and benchmark
it against three baselines: reimplemented versions of two
verifiable databases, and a key-value store based on the transparency log.
In summary, we make the following contributions.
\begin{itemize}[topsep=2pt,itemsep=1pt,parsep=0pt,partopsep=0pt,leftmargin=11pt]
\item We present the design space of verifiable ledger databases, consisting of three dimensions: abstraction,
threat model, and performance. We discuss how existing systems fit into this design space.
\item We design and implement \textsc{GlassDB}\xspace, a distributed verifiable ledger database system that addresses the limitations of existing works. In
particular, \textsc{GlassDB}\xspace supports distributed transactions with high performance, under a practical threat model.
\item We design new benchmarks for evaluating and comparing verifiable ledger databases. The benchmarks extend YCSB
and TPC-C with workloads that stress test the performance of proof generation and historical data access.
\item We conduct detailed performance analysis of \textsc{GlassDB}\xspace, and compare it against two
verifiable databases, namely QLDB~\cite{qldb} and LedgerDB~\cite{ledgerdb}, and a key-value store based on transparency log, Trillian~\cite{trillian}. The results show that \textsc{GlassDB}\xspace consistently outperforms the three baselines across all workloads.
\end{itemize}
\section{\textsc{GlassDB}\xspace}
\label{sec:design}
\subsection{Existing Designs}
\label{subsec:existingdesign}
Figure~\ref{fig:qldb} shows a design of verifiable ledger databases used in commercial
systems such as QLDB~\cite{qldb}.
The key idea is to replace the transaction log in conventional databases with a variant of transparency log
called {\em ledger}. The ledger is a hash-chained sequence of blocks, each of which contains the operation
type and parameters, and
a Merkle tree is built on top of them to protect their integrity.
Updating the ledger requires appending a new operation block and rebuilding the Merkle tree.
Transaction execution in this design is similar to that in a conventional database.
The transaction is first committed to the ledger as a new block, under some concurrency
control mechanisms. Then, the data and indexes are updated.
The transaction is considered committed once the ledger is updated and the data can be queried via the
indexes.
The response to the client includes a block sequence number indicating where in the ledger the transaction is committed.
During verification, the client requests a digest of the ledger, and then sends a {\tt GetProof}
request containing the sequence number and the digest.
It receives a Merkle proof showing that the specified block is included in the ledger.
After verifying the proof, it checks that the data is included in the block.
\begin{figure}[t]
\centering
\includegraphics[width=.46\textwidth]{figures/arch_qldb.pdf}
\caption{A simple verifiable ledger database. The ledger consists of blocks containing the operation, data, and metadata of the transactions.}
\label{fig:qldb}
\vspace{-4mm}
\end{figure}
\begin{figure}[t]
\centering
\includegraphics[width=.46\textwidth]{figures/arch_ledgerdb.pdf}
\caption{LedgerDB~\cite{ledgerdb} authenticated data structures. There is one clue index for every key, and the size of each clue index is stored in a leaf of the Merkle Patricia Trie.}
\label{fig:ledgerdb}
\vspace{-4mm}
\end{figure}
The main advantage of this design is that it is easy to extend an existing database system into a verifiable ledger database. In addition, the design is independent of the underlying data abstraction and layout.
However, it has two major deficiencies.
First, it incurs significant overhead in transaction processing, because updates of the Merkle tree are in the critical path. Second, the indexes are not integrity protected, i.e., the server can respond with stale data. As a result, this design requires the client to scan the ledger to guarantee the returned value is current, which incurs $O(N)$ cost.
LedgerDB~\cite{ledgerdb} improves the design above by updating the authenticated data structures asynchronously.
Figure~\ref{fig:ledgerdb} shows the different indexes and Merkle trees used in LedgerDB.
In LedgerDB, each
transaction is appended to a ledger in the form of a journal entry, and a Merkle tree built on top of the ledger is updated asynchronously in batch, which is called batch accumulated Merkle-tree (bAMT). LedgerDB maintains a skip-list index (called a {\em clue index}) for each individual data key, with each entry in the skip list pointing to the journal entry corresponding to the transaction that modifies the data key. The size of the index is stored as a leaf of a Merkle Patricia Trie, called clue-counter MPT(ccMPT). The root of ccMPT and bAMT are stored as a block in a hash chain. LedgerDB also supports data freshness by using another ledger that stores time entries from a timestamp authority.
There are three limitations of LedgerDB's design that result in high verification cost. First, bAMT stores one transaction per leaf, therefore its size can be large when there are many transactions, which leads to larger proofs. Second, it is expensive to verify a value of a key, even in the presence of a trusted auditor. In particular, the ccMPT structure used to protect the clue index is not secure, because each leaf of the ccMPT stores only the size of each clue index, instead of capturing the content of the entire index. As a consequence, to verify the value of a key, the client needs to scan and verify the entire index to ensure that each entry in the clue index points to a correct journal entry. We note that even if a trusted auditor verifies the ccMPT and clue indexes, the client still needs to verify the clue index by itself, because a malicious server can modify the index without changing the ccMPT. Finally, the size of the proof for multiple keys, even when the keys belong to the same transaction, grows linearly with the number of keys because each key requires a separate proof from the ccMPT.
\remove{
\begin{figure}[t]
\centering
\includegraphics[width=.46\textwidth]{figures/ldb_fig.pdf}
\caption{LedgerDB \cite{ledgerdb} authenticated data structures. There is one clue index for every key, and the size of each clue index is stored in a leaf of the Merkle Patricia Trie.}
\label{fig:ledgerdb}
\vspace{-4mm}
\end{figure}
}
\vspace{-2mm}
\subsection{\textsc{GlassDB}\xspace Overview}
\label{subsec:design:our}
\textsc{GlassDB}\xspace is a new, distributed verifiable ledger database system that overcomes the limitations of the existing designs.
\remove{
\st{It achieves high transaction throughputs by updating the authenticated data structure asynchronously and with aggressive batching. It reduces the overhead of verification by using a two-level pattern-oriented split (POS) tree
that protects the integrity of the entire database states. This tree enables the efficient generation of proofs with small sizes. In addition, by storing the entire states at the lower POS-tree, \textsc{GlassDB}\xspace guarantees data freshness without relying on a trusted time authority, as the client can verify if the data values correspond to the latest block.}
}
It supports general transactions, which makes it easy to use by existing and
future applications. It adopts the same threat model as QLDB and LedgerDB,
which assumes that the database server is untrusted, and there exists a set
of trusted auditors that gossip among each other. \textsc{GlassDB}\xspace achieves high
throughputs and small verification costs. Table~\ref{tab:overview} shows how
the system fits in the design space.
There are three novelties in the design of \textsc{GlassDB}\xspace that facilitate its
high performance. First, \textsc{GlassDB}\xspace adopts hash-protected index structures.
The key insight we identify from the limitation of existing ledger databases is
the lack of comprehensive and efficient protection of the indexes, which leads
to either security issues or high verification overhead. Such limitations can
be eliminated by adopting hash-protected index structures. Second, \textsc{GlassDB}\xspace
builds its ledger over the state of data instead of transactions. One advantage of
this approach is that the system can retrieve the data and generate
current-value proofs more efficiently. Another advantage is that it results in
a smaller data structure. The Merkle trees of the existing systems are built
over the transactions, which grow quickly and lead to higher storage and
computation overhead. In contrast, \textsc{GlassDB}\xspace's core data structure grows more
slowly as it batches updates from multiple transactions.
Third, \textsc{GlassDB}\xspace
partitions the data over multiple nodes, which enables it to scale to achieve
high throughput. Furthermore, it adopts three optimizations that help speed up
transaction processing and verification, namely transaction batching,
asynchronous persistence,
and deferred verification.
Figure~\ref{fig:architecture} shows the design of \textsc{GlassDB}\xspace. It partitions the data (modeled as key-value tuples) into different shards based on the hash of the keys, and uses two-phase commit (2PC) protocol to ensure the atomicity of cross-shard transactions. Each shard has three main components: a transaction manager, a verifier, and a ledger storage. A transaction request is forwarded to the transaction manager, which executes the transaction using a thread pool with optimistic concurrency control. A verification request is forwarded to the verifier, which returns the proof.
The ledger storage maintains the core data structure that provides efficient data access and proof generation.
Each shard maintains an individual ledger based on the records committed.
The client keeps track of the key-to-shard mapping, and caches the digests of the shards' ledgers. \textsc{GlassDB}\xspace uses write-ahead-log (WAL) to handle application failures. It handles node failures by replicating the nodes.
The life cycle of a transaction at the server can be divided into four phases: prepare, commit, persist, and get-proof.
The prepare phase checks for conflicts between concurrent transactions before making commit or abort decisions.
The commit phase stores the write set in memory and appends the transaction to a WAL for durability and recovery.
The persist phase appends the committed in-memory data to the ledger storage and updates the authenticated data structures for future verification.
The get-proof phase generates the requested proofs for the client.
In \textsc{GlassDB}\xspace, the persist and get-proof phases are executed asynchronously and in parallel with the other two phases. The detail is illustrated in Section~\ref{subsec:design:detail}.
\begin{figure*}
\centering
\includegraphics[height=5cm]{figures/arch_glassdb.pdf}
\caption{\textsc{GlassDB}\xspace design.
The transaction manager executes transactions, with a persisting thread asynchronously append committed data to the ledger storage, and the verifier handles proof requests.}
\label{fig:architecture}
\vspace{-2mm}
\end{figure*}
\vspace{-2mm}
\subsubsection{APIs}
\label{subsec:api}
\remove{
\begin{table}[t]
\caption{API List}
\centering
\vspace{-2ex}
\begin{tabular}{| c | c |}
\hline
Role & Function \\
\hline
Client &
\begin{minipage}{15em}
\begin{verbatim}
Init(sk)
BeginTxn()
Get(tid, key)
Get(tid, key, timestamp)
Get(tid, key, block_no)
Put(tid, key, value)
Commit(tid)
Verify(promise)
\end{verbatim}
\end{minipage} \\
\hline
Auditor &
\begin{minipage}{15em}
\begin{verbatim}
Verify(digest, block_no)
UpdateDigest(digest, block_no)
\end{verbatim}
\end{minipage} \\
\hline
\end{tabular}
\label{tab:api}
\end{table}
}
\remove{
\noindent
The user (or client) uses the following APIs to interact with the server and the auditor.
\begin{itemize}[leftmargin=*]
\item {\tt Init(sk)}: initializes the client with private key $sk$ for
signing the transactions, and sends public key $pk$ to the auditors for
verification.
\item {\tt BeginTxn()}: starts a transaction. It returns a unique
transaction ID $tid$ based on client ID and timestamp.
\item {\tt Get(tid, key, (timestamp | block\_no))}: returns the latest value of the given key (default option), or the value of the key before the given timestamp or block number.
\item {\tt Put(tid, key, value)}: buffers the write for the ongoing transaction.
\item {\tt Commit(tid)}: signs and sends the transaction to the server for commit. It returns a promise.
\item {\tt Verify(promise)}: requests the server for a proof corresponding to the given promise, then verifies the proof.
\item {\tt Audit(digest, block\_no)}: sends a digest of a given block to the auditors.
\end{itemize}
The auditors use the following APIs to ensure that the database server is working correctly.
\begin{itemize}[leftmargin=*]
\item {\tt VerifyBlock(digest, block\_no)}: requests the server for the block at
$block\_no$, proof of the block, and the signed block transactions.
It verifies that all the keys in the transactions are included
in the ledger.
\item {\tt VerifyDigest(digest, block\_no)}: verifies that the given digest
and the current digest correspond to a linear history, by asking
the server to generate append-only proofs. If the given block
number is larger than the current block number, it uses {\em
VerifyBlock} to verify all the blocks in between.
\item {\tt Gossip(digest, block\_no)}: broadcasts the current digest and
block number to other auditors.
\end{itemize}
}
\noindent
The user (or client) starts by calling {\tt Init(pk, sk)}, which initializes the client's session with the private key $sk$
for signing transactions, and sends the corresponding public key $pk$ to the auditors for
verification. The client invokes {\tt BeginTxn()} to start a transaction, which returns a transaction ID
$tid$ based on client ID and timestamp. During the transaction, the client uses {\tt Get(tid, key, (timestamp |
block\_no))} and {\tt Put(tid, key, value)}. When ready to commit, the client invokes {\tt Commit(tid)},
which signs and sends the transaction, including the buffered writes, to the server. This
method returns a promise, which can be passed to {\tt Verify(promise)} to request a proof and verify it.
The client frequently invokes {\tt Audit(digest, block\_no)} to send a digest of a given block to the auditors.
An auditor uses {\tt VerifyBlock(digest, block\_no)} to request the server for the block at
{\tt block\_no}, proof of the block, and the signed block transactions.
It verifies that all the keys in the transactions are included
in the ledger. It also uses {\tt VerifyDigest(digest, block\_no)} to verify that the given digest
and the current digest correspond to a linear history, by asking
the server to generate append-only proofs. If the given block
number is larger than the current block number, it uses {\em
VerifyBlock} to verify all the blocks in between. Finally, the auditor calls {\tt
Gossip(digest, block\_no)} to broadcast the current digest and
block number to other auditors.
\vspace{-2mm}
\subsection{\textsc{GlassDB}\xspace Design}
\label{subsec:design:detail}
\subsubsection{Ledger storage}
The design goal of \textsc{GlassDB}\xspace is to build a storage system that not only offers efficient access to the data, but also
supports efficient inclusion, latest, and append-only proofs. To this end, we use a Merkle variant
called two-level pattern-oriented split tree (or two-level POS-tree).
\remove{
\textit{SIRI} is a class of immutable indexes that combine Merkle trees with the index trees. Each node of the index is identified by the hash of its content. The index node stores the hashes of the child nodes instead of physical addresses. New instances are created from the previous instances using copy-on-write. \textit{SIRI} supports efficient data access by traversing the index, and efficient proofs that contain only neighboring nodes in the path from the leaf to the root. In addition, it is space-efficient because nodes with the same content are reused. In \textsc{GlassDB}\xspace, we use POS-tree, a type of \textit{SIRI} structure with a high deduplication ratio~\cite{forkbase,siri}.}
A POS-tree is an instance of {Structurally Invariant and Reusable
Index} (SIRI)~\cite{forkbase,siri}, which combines the Merkle tree and
balanced search tree. A parent node in the POS-tree
stores the cryptographic hash of its child nodes, such that the root
node contains the digest of the entire tree. The user can
perform efficient data lookup by traversing the tree. The POS-tree is
built from the globally sorted sequence of data. The data is split into
leaf nodes using content-defined chunking, in which a new node is created when a pattern is matched. The cryptographic hash values of the
nodes in one level form the byte sequence for the layer above. The
byte sequence is split into index nodes using similar content-defined chunking approach. POS-tree is optimized for high
deduplication rates because of its content-defined chunking. Finally,
it is immutable, that is, a new tree is created, using copy-on-write,
when a node is updated.
The core data structure of \textsc{GlassDB}\xspace is shown in the right part of Figure~\ref{fig:architecture}. It consists of an upper level POS-tree and a lower level POS-tree.
The lower level POS-tree is built on the database states, and its root node, called the data block, contains the root hash and other block meta information such as block number.
The data blocks are stored as the leaves of the upper level POS-tree. This POS-tree serves as an index over the data blocks, and its root is the digest of the entire ledger.
Retrieving a key from a given block number entails getting the data block with the corresponding block number from the upper level POS-tree, then traversing the lower level POS-tree to locate the data.
Metadata such as the block number where the previous version of data resides are stored together with the data in the leaf nodes, making it efficient to trace the history of data.
When updating a key, new nodes are created at both levels using copy-on-write.
One advantage of this authenticated data structure is that it provides efficient current-value proofs, in addition to the
inclusion and append-only proofs. Since each data block represents a snapshot of the database states, the latest values always
appear in the last block, thus current-value proof can be verified with only one block.
\noindent
{\bf Comparison with QLDB and LedgerDB's storage.} Both QLDB and LedgerDB use Merkle trees to ensure the integrity of the data. However, they offer weak security and incur significant verification overhead, as we discussed in Section \ref{subsec:existingdesign}. The fundamental difference between their design and ours is that our ledger storage protects the integrity of the indexes. Specifically, both the database indexes and the clue indexes in QLDB and LedgerDB are not protected. As the result, the server can return stale data, or tamper with the indexes without being detected. For example, in LedgerDB, because only the sizes of the clue indexes are protected by a Merkle tree, the server can change the pointers inside the skip lists to point to stale journal entries. To detect against such tampering, the client needs to verify all entries in the skip lists, therefore incurring significant costs.
In contrast, the two-level POS-tree protects both the data, the indexes, and the history. In particular, the upper level protects the lineage of the states, while the lower level protects the data and serves as the index. A proof in \textsc{GlassDB}\xspace includes relevant nodes from the leaf of lower level POS-tree to the root of upper level POS-tree. Since both levels are tamper-evident, it is not possible for the server to modify the data or skip some versions without being detected. In addition, the client can check the data block from which the data is fetched, thereby verifying that the data is the latest.
\subsubsection{Transaction}
\label{subsubsec:transaction}
\vspace{-2mm}
\textsc{GlassDB}\xspace partitions the keys into shards based on their hash values.
When a transaction involves multiple shards,
\textsc{GlassDB}\xspace achieves atomicity using 2PC.
Each client is a coordinator. It generates the read set and write set of the transaction, then sends prepare message to the shards. The transaction manager at each shard logs the transaction and responds with a commit or abort based on the concurrency control algorithm. \textsc{GlassDB}\xspace uses optimistic concurrency control to achieve serializability. In particular, the read set and write set of concurrent transactions are validated to check for the read-write and write-write conflicts. The shard returns ``commit'' if there are no conflicts, and returns ``abort'' otherwise. The client waits for the responses from all shards involved in the transactions, and it resends the messages after a timeout period. If all shards return commits, the client sends the commit messages to the shards, otherwise it sends abort. Each shard then commits or aborts the transaction accordingly, and returns an acknowledgment to the client.
At each shard, the transaction is processed by the transaction manager as follows. All incoming requests are buffered in the transaction queue, waiting to be assigned to available transaction threads. If the queue is full, the transaction is aborted. The transaction threads store the prepared transactions and committed data in the shared memory. The persisting thread persists the committed data asynchronously to the ledger storage.
\noindent
\textbf{Asynchronous persistence.} Committing transactions to the ledger incurs large
overheads due to high contention and long execution time. To address this, \textsc{GlassDB}\xspace updates the ledger asynchronously. In particular, when receiving the commit message, the transaction manager stores the transaction data in a multi-version ``committed data map'' $\langle \textit{key, ver, val}\rangle$
in memory, and writes to the WAL for durability and recovery. After a
timeout, a background thread persists the data in the map to the
ledger storage. The persisted data is then removed from the committed data map
to keep the memory consumption low. This approach moves the updating of the ledger out
of the critical path, thus reducing transaction latency. The trade-off here is that the users cannot retrieve the proofs for data that has not been persisted to the ledger. We explain the verification process in Section \ref{subsec:verification}.
\noindent
\textbf{Transaction batching.}
The cost of updating and persisting the authenticate data structures is large, even though they are now out of the critical path of transaction execution. It is because both levels of the POS-tree need to be updated and written to disk.
To reduce this cost, \textsc{GlassDB}\xspace batches multiple committed transactions
before updating the ledger. In particular, it uses an aggressive batching strategy that collects independent data from recently committed transactions into a data block.
All the blocks created within a time window are appended to the ledger storage.
To form a block, the server selects data from the ``committed data map'' version by version.
For a given data version, it can compute the sequence number of the block at which the data will be committed, by adding the current block sequence with the version sequence in the data map. This estimation is used for deferred verification (explained later in Section \ref{subsec:verification}).
\noindent
{\bf Comparison with QLDB and LedgerDB. }
In LedgerDB and QLDB, the ledgers are built from transactions, thus the size of the Merkle tree grows with the number of transactions, which can be large.
The bigger the Merkle tree, the longer the proofs, and the more expensive it is to update and generate proofs. By batching multiple transactions, \textsc{GlassDB}\xspace affords a smaller Merkle tree, therefore it is more efficient.
\textit{Example.} Suppose a server commits three transactions T1, T2, and T3 in timestamp order within a persistence interval. T1 inserts two keys A and B. T2 inserts C and updates A. Lastly, T3 updates B and C. After the commitments, the "committed data map" stores $\langle\textit{A, 1, Va}\rangle$, $\langle\textit{B, 1, Vb}\rangle$, $\langle\textit{C, 1, Vc}\rangle$, $\langle\textit{A, 2, Va'}\rangle$, $\langle\textit{B, 2, Vb'}\rangle$, $\langle\textit{C, 2, Vc'}\rangle$. When the persistence interval expires, the persist thread will divide the data into two batches according to the version number to create two blocks. In particular, it will update the lower POS-tree with $\langle\textit{A, Va}\rangle$, $\langle\textit{B, Vb}\rangle$, $\langle\textit{C, Vc}\rangle$ and $\langle\textit{A, Va'}\rangle$ $\langle\textit{B, Vb'}\rangle$ $\langle\textit{C, Vc'}\rangle$ respectively. The root hash of the updated lower POS-tree together with meta information such as the transaction ID and timestamp are used to create the blocks. Lastly, the two blocks are appended to the upper POS-tree and the digest is updated.
\vspace{-2mm}
\subsubsection{Verification}
\label{subsec:verification}
Verifying a transaction requires checking both the read set and the write set. To verify the read set, the client checks that the data is correct and is the latest (for example, for the default Get(.) operation). In other words, the server needs to produce current-value proof. To verify the write set, the client checks that the new ledger is append-only, and that the data written to the ledger is correct. In other words, the server needs to produce an append-only proof and an inclusion proof. The inclusion and current-value proofs in \textsc{GlassDB}\xspace contain the hashes of the nodes in the two-level POS-tree along the path from the leaf to the root, through the specific block and the latest block, respectively. The append-only proof contains the hashes of nodes along the path where the old root resides. If the old root node does not exist in the new Merkle tree (i.e., because the old Merkle tree is not a complete tree), a proof for its left child node is generated. To verify the proof, the client computes the digest and compares it with the digest saved locally.
In \textsc{GlassDB}\xspace, the verification requires getting proofs from all participating shards.
There is no coordination overhead, because the ledger is immutable with copy-on-write which means read operations can run concurrently with other transactions.
\noindent
{\bf Deferred verification. }
\textsc{GlassDB}\xspace supports {\em deferred} verification, meaning that transaction verification occurs within a time window, as opposed to immediately. This strategy is suitable for applications that require high performance and can tolerate temporary violations of data integrity.
For these applications, the client gets a {\em promise} from the server containing the
future block sequence number where the data will be committed, transaction ID, current digest, the key and the value. The client can verify the transaction after the block is available by sending a verification request taking the promise as parameter. The server, on receiving the verification request, will check if the block has been persisted. It generates the inclusion proof and append-only proof if the check passes, and returns the proofs and new digest to the client. The client can then verify the integrity of the data as mentioned above. The two-level POS-tree allows the server to batch proofs for multiple keys (especially when they are packed in the same data block). Furthermore, getting the data and the proof can be done at the same time by traversing the tree, which means proof generation can be done with little cost when fetching the data during transaction processing. This is as opposed to LedgerDB requiring the server to traverse one data structure to retrieve the data, and then another data structure to retrieve the proof. To alleviate the burden of deferred verification, in \textsc{GlassDB}\xspace, the proof of persisted data is returned immediately during transaction processing, and proof for data to be persisted in future blocks will be generated in deferred verification requests in batch.
This approach leaves a window of vulnerability during which a malicious
database can tamper with the data, but any misbehavior will be detected once the {\em promised} block number appears in the ledger.
\textsc{GlassDB}\xspace allows clients to specify customized delay time for verification to find suitable trade-offs between security guarantee and performance according to their needs.
Particularly, zero delay time means immediate verification. In this case, the transactions are persisted to the ledger synchronously during the commit phase.
This strategy is suitable for applications that cannot afford even a temporary violation of data integrity.
\subsubsection{Auditing}
While the user verification ensures that the user's own transactions are executed
correctly, \textsc{GlassDB}\xspace ensures the correct execution of the database server
across multiple users. In particular, it relies on a set of auditors, some of
which are honest, to ensure that different users see consistent views of the
database.
Each auditor performs two important tasks. First, it checks that the
server does not fork the history log, by checking that the users receive
digests that correspond to a linear history. It maintains a current
digest $d$ and block number $b$ corresponding to the longest history that it
has seen so far. When it receives a digest $d'$ from a user, it
asks the server for an append-only proof showing that $d$ and $d'$ belong to a
linear history.
Second, the auditor re-executes the transactions to ensure that the current
database states are correct. This is necessary to prevent the server from
arbitrarily adding unauthorized transactions that tamper with the states. It
also defends against undetected tampering when some users do not perform
verification (because they are offline, or due to resource constraints). The
auditor starts with the same initial states as the initial states at the
server. For each digest $d$ and corresponding block number $b$, the auditor
requests the signed transactions that are included in the block, and the proof
of the block and of
the transactions. It then verifies the signatures on the transactions,
executes them on its local states, computes the new digest, and verifies it
against $d$.
When the auditor receives a digest corresponding to a block number $b'$
which is larger than the current block number $b$, it first requests and verifies the
append-only proof from the server. Next, for each block between $b$ and $b'$,
it requests the transactions and verifies that the states are updated
correctly. After that, it updates the current digest and block number to $d'$
and $b'$ respectively. Finally, after a pre-defined interval, the auditor
broadcasts its current digest and block number to other auditors.
\remove{
While the client verification ensures the clients' own transactions are executed correctly, it is the auditors' job to ensure that transactions issued by other clients and the entire system are in correct states. \textsc{GlassDB}\xspace relies on a group of auditors, which gossip among themselves to ensure global consistency. There are two tasks of auditors. First, the auditors synchronize with the servers and among each other to maintain a consistent history of digests. Second, they replay the transaction log to ensure the state of the database is correct. To achieve the first task, the auditor broadcasts the latest block number and digests obtained from the server to the group of auditors. The recipients which possess larger block number will check whether the digests exist in its digest history. To achieve the second task, the auditor requests the server for proof step-by-step for each digest. The servers return to the auditor the transaction entries included with clients' signature, the tip block data
for that digest, and the proof of the block. The auditor validates the signature with the public key received from the clients on their initialization and replays the transaction entries. The root hash is compared with the data hash in the block data. Lastly, the auditor verifies the block data by recalculating the digest with the proof.
}
\subsubsection{Failure Recovery}
\label{subsec:ft}
\textsc{GlassDB}\xspace supports transaction recovery after a node crashes and reboots.
In particular, if a node fails before the commit phase, the client aborts the transaction after a timeout.
Otherwise, the client proceeds to commit the transaction. When the failed node
recovers, it queries the client for the status of transactions, then decides to
whether abort or commit. It then checks the WAL for updates that have not been
persisted to the ledger storage, and updates the latter accordingly. If the
client fails, the nodes have to wait for it to recover, because the 2PC
protocol is blocking. We note that this can be mitigated by replacing 2PC with
a non-blocking atomic commitment protocol, such as three-phase commit (3PC).
\textsc{GlassDB}\xspace tolerates permanent node failures by
replicating the nodes using a crash-fault tolerant protocol, namely Raft. To ensure consistent ledgers across the replicas, \textsc{GlassDB}\xspace uses a fixed batch size when creating the blocks during the persistence phase. A timeout is set in case the number of upcoming transactions is insufficient to build a block.
When it is expired, a dummy transaction is replicated to all replicas to enforce the block creation. We evaluate the performance impact of node crashes on both schemes in section \ref{sec:exp}.
\remove{
\subsubsection{Analysis}
The costs for maintaining the authenticated data structure are summarized in Table~\ref{tab:overview}.
\textsc{GlassDB}\xspace is secure according to Definition~\ref{lab:def} since it satisfies both integrity and
append-only property. Due to space constraints, we include the detailed analysis in the extended version of
the paper. Here, we briefly discuss how the user can detect forks.
In \textsc{GlassDB}\xspace, each individual user has a local view of the latest digest $\ensuremath{\mathsf{digest}}_{S_l,H_l}$ from the
server. Because of deferred verification, the user sends $\ensuremath{\mathsf{digest}}_{S_l,H_l}$ together with the server's
promise during verification. When the latest digest at the server $\ensuremath{\mathsf{digest}}_{S_g,H_g}$ corresponds to a
history log $H_g$ such that $|H_g| > |H_l|$, the server also generates and includes the proof $\pi \leftarrow
\ensuremath{\mathsf{ProveAppend}}(\ensuremath{\mathsf{digest}}_{S_l,H_l}, \ensuremath{\mathsf{digest}}_{S_g,H_g})$ in the response to the user. This way, the user can
detect any {\em local} forks in its view of the database. After an interval, the user sends its latest digest
to the auditor, which uses it to detect {\em global} forks.
}
\vspace{-1mm}
\subsection{Analysis}
\subsubsection{Cost analysis}
Similar to other verifiable databases, \textsc{GlassDB}\xspace incurs additional costs to
maintain the authenticated data structure and to generate verification proofs
compared to conventional databases. We now analyze the asymptotic computational
costs of the main operations in \textsc{GlassDB}\xspace.
\noindent
{\bf Persistence.}
The persistence phase updates the committed data to the two-level POS-tree. The
cost of this phase is bounded by the height of the tree, which is the height
of upper level plus that of the lower level, i.e., $O(\log{B} + \log{m})$, where B
is the number of blocks and m is the number of distinct keys. In contrast, LedgerDB
needs to update both the bAMT and ccMPT, which is $O(\log{N} +
\log{m})$, where N is the total number of transactions. We note that due to
batching, $B$ is much smaller than $N$. QLDB also updates the Merkle
tree over the transactions, thus its cost is $O(\log{N})$.
\noindent
{\bf Inclusion proof.}
To generate an inclusion proof, \textsc{GlassDB}\xspace traverses the two-level POS-tree
to get the nodes on the path from the leaf to the root. Hence, the
cost is $O(\log{B} + \log{m})$. For LedgerDB and QLDB, the proof
includes the Merkle proof for a transaction, and the transaction content. The
cost is $O(\log{N})$, since the transaction content is small compared
to the number of transactions.
\noindent
{\bf Current-value proof.}
In \textsc{GlassDB}\xspace, the lower-level POS-tree captures the entire states, therefore
the latest value always appears in the right-most block. The current-value proof
is a special case of inclusion proof that includes the right-most block. In other
words, the cost is $O(\log{B} + \log{m})$. In contrast, LedgerDB and QLDB do
not have protection over indexes. Therefore, their current-value proofs
require scanning from one transaction to the latest transaction to
check for any new updates on the key. The cost of this is $O(N)$.
\noindent
{\bf Append-only proof.}
The append-only proof checks if the two digests belong to a linear history.
Such a proof contains the nodes created between one digest and another.
The cost is $O(\log{B})$ for \textsc{GlassDB}\xspace, and $O(\log{N})$ for LedgerDB and QLDB.
\subsubsection{Security analysis}
\textsc{GlassDB}\xspace is a verifiable ledger database system since it supports the four
operations described in Section~\ref{sec:vldb}. We now sketch the proof that
\textsc{GlassDB}\xspace is secure, which involves showing that it satisfies both integrity
and append-only property.
For integrity, we first consider Get operation that returns the latest value of
a given key (the other Get variants are similar) at a given $\ensuremath{\mathsf{digest}}$. The user
checks that the returned proof $\pi$ is a valid inclusion proof corresponding
to the latest value of the key in the POS-tree whose root is $\ensuremath{\mathsf{digest}}$. Since
POS-tree is a Merkle tree, integrity holds because a proof to a different value
will not correspond to the Merkle path to the latest value, which causes the
verification to fail. Next, consider the Put operation that updates a key. The user verifies that the new value is included as the latest value
of the key in the updated digest. By the property of the POS-tree, it is not
possible to change the result (e.g., by updating a different key or updating the given key with a
different value) without causing the verification to fail.
For append-only, the auditor keeps track of the latest digest $\ensuremath{\mathsf{digest}}_{S,H}$
corresponding to the history $H$. When it receives a digest value
$\ensuremath{\mathsf{digest}}_{S',H'}$ from a user, it asks the server to generate an append-only
proof $\pi \leftarrow \ensuremath{\mathsf{ProveAppend}}(\ensuremath{\mathsf{digest}}_{S',H'}, \ensuremath{\mathsf{digest}}_{S,H})$. Since our
POS-tree is a Merkle tree whose upper level grows in the append-only fashion,
the server cannot generate a valid $\pi$ if $H'$ is not a prefix of $H$ (assuming $|H'| < |H|$). Therefore, the append-only property is achieved.
In \textsc{GlassDB}\xspace, each individual user has a local view of the latest digest
$\ensuremath{\mathsf{digest}}_{S_l,H_l}$ from the server. Because of deferred verification, the user
sends $\ensuremath{\mathsf{digest}}_{S_l,H_l}$ together with the server's promise during verification.
When the latest digest at the server $\ensuremath{\mathsf{digest}}_{S_g,H_g}$ corresponds to a
history log $H_g$ such that $|H_g| > |H_l|$, the server also generates and
includes the proof $\pi \leftarrow \ensuremath{\mathsf{ProveAppend}}(\ensuremath{\mathsf{digest}}_{S_l,H_l},
\ensuremath{\mathsf{digest}}_{S_g,H_g})$ in the response to the user. This way, the user can detect
any {\em local} forks in its view of the database. After an interval, the user
sends its latest digest to the auditor, which uses it to detect {\em
global} forks.
\section{Verifiable Ledger Databases}
\label{sec:vldb}
\subsection{What A Verifiable Ledger Database Is}
A verifiable database is a database that ensures the integrity of both the data and query execution. It is useful in outsourced settings, in which the data is managed by an untrusted third party whose misbehavior can be
reliably detected. Until recently, verifiable databases have focused on ensuring the integrity of query execution,
particularly on the performance and expressiveness of analytical queries that can be verified~\cite{integridb,
ads,arx}.
A verifiable ledger database is one instance of verifiable database, which focuses on protecting the integrity of both the data content and data history. \remove{Figure~\ref{fig:vdb}(a) illustrates how it works.} A user issues a read or
update operation (OLTP query) to the database server (or server), which then executes the operation and appends it to a history log
$H$. The database returns integrity proofs showing that (1) the operation is
executed correctly on the states derived from $H$, and (2) the operation is
appended to $H$, and $H$ is append-only. These proofs ensure that malicious tampering such as changing the data content,
back-dating operations, forking the history log, are detected. Existing works on authenticated data
structure~\cite{ads}, for example, only meet the first condition.
\remove{
\begin{definition}
Let $\textit{op}$ be a user query, $H$ be a sequence of operations, i.e., $H=\langle \textit{op}_1, \textit{op}_2...\rangle$. A
database $D$ executes $\textit{op}$ and returns a proof, which is a tuple $\langle \sigma(H), \pi \rangle$ for some function $\sigma$. Let $S(H)$ be
the states derived by applying operations in $H$ in sequence to the initial database states. The user verifies the proof with the function
$\textit{Verify}(\sigma(H), \textit{op}, \pi)$ which returns True if the user accepts the proof, and False otherwise. $D$ is a verifiable ledger database if the following conditions are true:
\begin{itemize}[topsep=2pt,itemsep=1pt,parsep=0pt,partopsep=0pt,leftmargin=11pt]
\item For any $H, \textit{op}, \pi$, there does not exist $\textit{op}' \neq \textit{op}$ such that
$S(H + \textit{op}) \neq S(H + \textit{op}')$ and $\textit{Verify}(\sigma(H), \textit{op}, \pi) = \textit{Verify}(\sigma(H), \textit{op}', \pi) = \text{True}$
\item For any $H, \textit{op}, \pi, H', \textit{op}', \pi'$ such that $\textit{Verify}(\sigma(H), \textit{op}, \pi) = \textit{Verify}(\sigma(H'), \textit{op}', \pi') = \text{True}$ and
$|H| \leq |H'|$, then $H$ is a prefix of $H'$.
\end{itemize}
\label{lab:def}
\end{definition}
}
More formally, a verifiable ledger database $D$ consists of four main operations.
\begin{itemize}[leftmargin=*]
\item $(\ensuremath{\mathsf{digest}}_{S',H'}, \pi, R, S', H') \leftarrow \ensuremath{\mathsf{Execute}}(S,H,\textit{op})$: this is
run by the database server. It takes as input the current state
$S$ and history log $H$, and the user operation $\textit{op}$. It
executes $\textit{op}$, updates the states $S$ accordingly, and appends
$\textit{op}$ to $H$. It returns the updated states $S'$, updated
history $H'$, a digest value $\ensuremath{\mathsf{digest}}_{S',H'}$ computed over the new
state and history, an execution result $R$, and a proof $\pi$.
\item $\pi \leftarrow \ensuremath{\mathsf{ProveAppend}}(\ensuremath{\mathsf{digest}}_{S,H}, \ensuremath{\mathsf{digest}}_{S',H'})$:
this is run by the server. It takes as input two digest values
corresponding to two different history logs. It returns a proof
$\pi$.
\item $\{0,1\} \leftarrow \ensuremath{\mathsf{VerifyOp}}(\textit{op}, R, \pi, \ensuremath{\mathsf{digest}}_{S,H}, \ensuremath{\mathsf{digest}}_{S',H'})$:
this is run by the user. It takes as input the user operation
$\textit{op}$, the execution result $R$, the proof $\pi$, and $\ensuremath{\mathsf{digest}}_{S,H}, \ensuremath{\mathsf{digest}}_{S',H'}$ that
correspond to the history and state before and after $\textit{op}$ is executed.
It returns $1$ if the proof is valid, and $0$ otherwise.
\item $\{0,1\} \leftarrow \ensuremath{\mathsf{VerifyAppend}}(\ensuremath{\mathsf{digest}}_{S,H}, \ensuremath{\mathsf{digest}}_{S',H'},
\pi)$: this is run by the user. It takes as input two digest
values corresponding to two different history logs, and a
proof $\pi$. It returns $1$ if the proof is valid, and $0$
otherwise.
\end{itemize}
\begin{definition}
A verifiable ledger database, which supports the four operations
defined above, is secure if it satisfies the following properties.
\begin{itemize}[leftmargin=*]
\item {\bf Integrity:} the database server cannot tamper with the user
operation without being detected. More precisely, given
any $\textit{op}, \pi, R, S,S', H, H', \ensuremath{\mathsf{digest}}_{S,H}, \ensuremath{\mathsf{digest}}_{S',H'}$ such that $(\ensuremath{\mathsf{digest}}_{S',H'},\pi,R,\_,\_)
\leftarrow \ensuremath{\mathsf{Execute}}(S,H,\textit{op})$, $\ensuremath{\mathsf{VerifyOp}}(\textit{op},R,\pi,
\ensuremath{\mathsf{digest}}_{S,H},\ensuremath{\mathsf{digest}}_{S',H'}) = 1$, the server cannot find $\pi', R'$
such that $R' \neq R$ and
$\ensuremath{\mathsf{VerifyOp}}(\textit{op},R',\pi',\ensuremath{\mathsf{digest}}_{S,H},\ensuremath{\mathsf{digest}}_{S',H'}) =
1$.
\vspace{0.1cm}
\item {\bf Append-only:} the database server cannot fork the history
log without being detected.
More precisely, for any $\textit{op}, S_1, H_1, S, H,
\ensuremath{\mathsf{digest}}_{S,H}, \ensuremath{\mathsf{digest}}_{S_1,H_1}, R, \pi$ such that
$(\ensuremath{\mathsf{digest}}_{S_1,H_1},\pi,R,S_1,H_1) \leftarrow
\ensuremath{\mathsf{Execute}}(S,H,\textit{op})$ and
$\ensuremath{\mathsf{VerifyOp}}(\textit{op},R,\pi,\ensuremath{\mathsf{digest}}_{S,H},
\ensuremath{\mathsf{digest}}_{S_1,H_1})=1$, the server cannot find $\textit{op}',
S_2, H_2, S', H', \ensuremath{\mathsf{digest}}_{S',H'}, \ensuremath{\mathsf{digest}}_{S_2,H_2},
R', \pi', \pi_a$ such that $(\ensuremath{\mathsf{digest}}_{S_2,H_2},\pi',R',S_2,H_2) \leftarrow
\ensuremath{\mathsf{Execute}}(S',\ H',\ \textit{op}')$,
$\ensuremath{\mathsf{VerifyOp}}(\textit{op}',\ R',\ \pi',\ \ensuremath{\mathsf{digest}}_{S',H'},\
\ensuremath{\mathsf{digest}}_{S_2,H_2})=1$, $\pi_a \leftarrow
\ensuremath{\mathsf{ProveAppend}}(\ensuremath{\mathsf{digest}}_{S_1,H_1},\ensuremath{\mathsf{digest}}_{S_2,H_2})$,
$\ensuremath{\mathsf{VerifyAppend}}(\ensuremath{\mathsf{digest}}_{S_1,H_1},\ensuremath{\mathsf{digest}}_{S_2,H_2},
\pi_a) = 1$, $|H_1| < |H_2|$, and $H_1$ is not
a prefix of $H_2$.
\remove{
$\textit{op},S,H,\ensuremath{\mathsf{digest}}_{S,H}$ such that $(\ensuremath{\mathsf{digest}}_{S,H},\_,\_,S,H)
\leftarrow \ensuremath{\mathsf{Execute}}(\_,\_,\_)$ the server cannot find
$S',H',\ensuremath{\mathsf{digest}}_{S',H'}, \pi$ such that
$(\ensuremath{\mathsf{digest}}_{S',H'},\_,\_,S',H') \leftarrow
\ensuremath{\mathsf{Execute}}(\_,\_,\_)$, $\pi \leftarrow
\ensuremath{\mathsf{ProveAppend}}(\ensuremath{\mathsf{digest}}_{S,H}, \ensuremath{\mathsf{digest}}_{S',H'})$,
$\ensuremath{\mathsf{VerifyAppend}}(\ensuremath{\mathsf{digest}}_{S,H}, \ensuremath{\mathsf{digest}}_{S',H'}, \pi)=1$,
$|H|<|H'|$, and $H$ is not
a prefix of $H$. }
\end{itemize}
\label{lab:def}
\end{definition}
\remove{
\noindent We now give a definition for secure ledger databases.
\begin{definition}
A verifiable ledger database is secure if it satisfies the following properties.
\begin{itemize}[leftmargin=*]
\item {\bf Integrity:} the database server cannot tamper with the user
operation without being detected. More precisely, given
a proof $\pi$ corresponding to $R$ such that $\ensuremath{\mathsf{VerifyOp}}$ returns 1, the server cannot find $\pi', R'$
such that $\ensuremath{\mathsf{VerifyOp}}$ returns $1$ and $R \neq R'$ .
\vspace{0.1cm}
\item {\bf Append-only:} the database server cannot fork the history
log without being detected.
More precisely, given a proof $\pi$ for an $\textit{op}$ that results in a log $H$, such that
$\ensuremath{\mathsf{VerifyOp}}$ returns $1$, the server cannot find $\pi', \textit{op}'$ that results in another log
$H'$ such that $\ensuremath{\mathsf{VerifyOp}}$ returns 1, $\ensuremath{\mathsf{VerifyAppend}}$ for $H, H'$ return $1$, but $H$
is not a prefix of $H'$.
\remove{
$\textit{op},S,H,\ensuremath{\mathsf{digest}}_{S,H}$ such that $(\ensuremath{\mathsf{digest}}_{S,H},\_,\_,S,H)
\leftarrow \ensuremath{\mathsf{Execute}}(\_,\_,\_)$ the server cannot find
$S',H',\ensuremath{\mathsf{digest}}_{S',H'}, \pi$ such that
$(\ensuremath{\mathsf{digest}}_{S',H'},\_,\_,S',H') \leftarrow
\ensuremath{\mathsf{Execute}}(\_,\_,\_)$, $\pi \leftarrow
\ensuremath{\mathsf{ProveAppend}}(\ensuremath{\mathsf{digest}}_{S,H}, \ensuremath{\mathsf{digest}}_{S',H'})$,
$\ensuremath{\mathsf{VerifyAppend}}(\ensuremath{\mathsf{digest}}_{S,H}, \ensuremath{\mathsf{digest}}_{S',H'}, \pi)=1$,
$|H|<|H'|$, and $H$ is not
a prefix of $H$. }
\end{itemize}
\label{lab:def}
\end{definition}
}
\remove{
\textit{Example.} We use Figure~\ref{fig:vdb}(b) to illustrate the properties of verifiable ledger
databases. Suppose the current history at database $D$ is $H_1$, corresponding to the states $\{a=1, b=2\}$.
When a user submits a query that adds value $c=3$, the states are updated to $\{a=1, b=2, c=3\}$, and the
operation $\textit{add(c,3)}$ is appended to the $H_1$. $D$ returns a proof $\langle \sigma(H_1), \pi\rangle$. The
user verifies it with $\textit{Verify}(\sigma(H_1),\textit{add(c,3)}, \pi)$. The first condition of Definition~\ref{lab:def}
means that $\pi$ captures the states $\{a=1, b=2, c=3\}$, such that if the
verification passes, any operation $\textit{op} \neq \textit{add(c,3)}$ will make $\textit{Verify}(\sigma(H_1), \textit{op}, \pi)$ fails. In
other words, if $D$ updates the states to $\{a=1, b=2, c=4\}$, for example by replacing user's operation
with $\textit{add(c,4)}$, the verification will fail.
Figure~\ref{fig:vdb}(c) illustrates another scenario, in which starting from the same $H_1$, one user issues a sequence of
queries that adds $c=3$, removes $c$, then adds $d=4$. The database returns $(\sigma(H_3, \pi))$ for the last operation,
and $\textit{Verify}(\sigma(H_3), \textit{add(d,4)}, \pi)$ succeeds. The second condition of Definition~\ref{lab:def} forbids
the case when another user adds $d=4$ and the database returns $\sigma(H_1), \pi'$ such that
$\textit{Verify}(\sigma(H_1), \textit{add(d,4)}, \pi')$ also succeeds. In other words, the database cannot fork the
history, even if the two histories result in the same states. Otherwise, $D$ can remove operations from its
history, for instances the two operations on $c$.
}
\textit{Example.} \remove{We use Figure~\ref{fig:vdb}(b) to illustrate the
properties of verifiable ledger databases.} Suppose the current history at the
database $D$ is $H_1$, corresponding to the state $S_1 = \{a=1,
b=2\}$.
Starting from
the same $H_1$, one user $A$ issues a sequence of operations $\langle
\mathsf{add}(c,3), \mathsf{remove}(c), \mathsf{add}(d,4) \rangle$, while
another user $B$ issues $\mathsf{add(d,4)}$. This scenario can happen due to
concurrency, or because the server acts maliciously. For user $A$'s last
operation, the server returns $\ensuremath{\mathsf{digest}}_{S_4,H_4}, \pi_4, R_4$. For user $B$'s
operation, it returns $\ensuremath{\mathsf{digest}}_{S_2',H_2'}, \pi_2', R_2'$. The append-only property
means that for $\pi \leftarrow \ensuremath{\mathsf{ProveAppend}}(\ensuremath{\mathsf{digest}}_{S_2',H_2'},
\ensuremath{\mathsf{digest}}_{S_4,H_4})$, $\ensuremath{\mathsf{VerifyAppend}}(\ensuremath{\mathsf{digest}}_{S_2',H_2'}, \ensuremath{\mathsf{digest}}_{S_4,H_4},
\pi) = 0$. In other words, the server cannot fork the history, even if the two branches result in the same state.
\begin{table*}
\footnotesize
\centering
\caption{\textsc{GlassDB}\xspace vs. other verifiable ledger databases. N is number of transactions, m is number of keys, and B is number of blocks, where $m \ge N \ge B$. All systems, except Forkbase, support inclusion proof of the same size as append-only proof.}
\vspace{-2mm}
\resizebox{\textwidth}{!}{\begin{tabular}{p{3.5cm}|c|c|c|c|c}
\hline
{\bf System} & {\bf Abstraction} & {\bf Threat model} & {\bf Append-Only Proof} & {\bf Current-Value Proof} & {\bf Throughput} \\
\hline
QLDB~\cite{qldb} & Transaction & Audit & $O(\log N)$ & $O(N)$ & Low \\ \hline
LedgerDB~\cite{ledgerdb} & Transaction & Audit & $O(\log N)$ & $O(N)$ & Medium \\ \hline
Forkbase~\cite{forkbase} & Key-value & Audit & $O(N)$ & $O(\log m)$ & Medium \\ \hline
Blockchain~\cite{hyperledger} & Transaction & Consensus & $O(1)$ & $O(1)$ & Low \\ \hline
CreDB~\cite{credb} & Transaction & Trusted hardware & $O(1)$ & $O(1)$ & Low \\ \hline
Trillian~\cite{trillian}, ECT~\cite{ect}, $\text{Merkle}^2$\cite{merkle2}& Key-value & Audit & $O(\log m)$ & $O(\log m)$ & Low \\ \hline
{\bf \textsc{GlassDB}\xspace} & Transaction & Audit & $O(\log B)$ & $O(\log B + \log m)$ & High \\ \hline
\end{tabular}}
\label{tab:overview}
\end{table*}
\subsection{Design Space}
\label{sec:security-definition}
Definition~\ref{lab:def} admits a simple, naive design in which the proof consists of the query result and
complete history $H$ (signed with the provider's cryptographic key). The users replay all operations in $H$ to
verify the correctness of $H$, and they broadcast messages among each other to detect any inconsistent behavior, e.g., the database signed different histories that were not linear. However, this design incurs
significant communication and computation costs for the users. A more practical design would need to reduce these
costs. To enable a principled comparison of different verifiable ledger databases, we propose to explore the design space along three dimensions: abstraction, threat model, and performance.
\textit{Abstraction.} This refers to the programming interface supported by the database, which has a
trade-off between flexibility and expressiveness. At one end of the spectrum is the simple key-value storage
that exposes simple {\tt Put} and {\tt Get} operations. At the other end is the full-fledged transactional
system that supports serializable (ACID) transactions. The key-value abstraction is more flexible and easier to scale,
whereas transactions are easier to use and reason about.
There are other design choices between pure key-value and ACID transactions. In particular, some database
systems support serializable transactions over small sets of related
keys~\cite{bigtable,gstore}, or keys within the same partitions~\cite{hstore}. Some other
databases support transactions with weaker isolation levels, such as snapshot
isolation~\cite{percolator}. These design choices can deliver higher
performance than the design with serializable transactions, but they suffer from
anomalies. We note that in the context of verifiable ledger databases, such anomalies can
happen due to the server acting maliciously to cause conflict during execution,
instead of due to real concurrency. As a consequence, the application needs to
handle a potentially large number of anomalies, which increases complexity and
performance overhead. For the rest of the paper, we use the term transactions
to refer to serializable transactions.
\textit{Threat model.} The security of a verifiable ledger database is defined as having integrity proofs
that satisfy the two conditions in Definition~\ref{lab:def} under a specific threat model. All threat
models share common assumptions that the attacker cannot break cryptographic primitives or mount denial of
service attacks.
There are three main threat models in the context of verifiable ledger databases. The most common model involves
a single untrusted database provider that behaves in a Byzantine manner. It has been shown that in this
setting, it is only possible to achieve {\em fork consistency}~\cite{sundr}, i.e., users cannot prevent misbehavior but can only detect it by communicating with each other. As a result, this model assumes
that users engage in gossiping, and that the attacker cannot permanently partition the network. To further
reduce the cost on the users, the model can be extended by introducing a set of trusted, powerful users called
{\em auditors} that only gossip among themselves. The auditors check for the misbehavior of the database on behalf
of the users.
The second threat model assumes that the database is replicated over a set of providers, the majority of which
are trusted. Even though there are malicious providers, the system as a whole enforces the correct behavior.
In particular, the providers participate in a distributed, Byzantine fault tolerant consensus protocol to
ensure consistency of the database~\cite{pbft}. We note that such consensus-based systems provide stronger
security guarantees than systems with single malicious providers, that is they can prevent misbehavior as
opposed to only detecting it.
The final threat model assumes that the database server is malicious, but it is
equipped with some trusted hardware that supports trusted execution environments
(TEEs). The TEE protects the computation and data running inside the environment against
malicious operating systems and hardware attacks. The entire database can run
securely inside the TEE. However, this model assumes that both the computation
and the TEE itself are free of vulnerabilities, which
does not always hold in practice~\cite{foreshadow}.
\textit{Performance.} The performance of a verifiable ledger database is evaluated based on two
metrics: the user's verification cost, and the database throughput. The former depends on the complexity of
the integrity proofs. An efficient proof is short and fast to verify. We further categorize integrity proofs
into three types.
\begin{itemize}[topsep=2pt,itemsep=1pt,parsep=0pt,partopsep=0pt,leftmargin=11pt]
\item Inclusion proof: given $\ensuremath{\mathsf{digest}}_{S,H}$ and a value $v$ corresponding to a key $k$, this proof ensures that
this value is included at some point in $H$.
\item Current-value proof: given $\ensuremath{\mathsf{digest}}_{S,H}$ and a value $v$ of a key $k$, this proof ensures that $v$ is the latest value of $k$ in $H$.
\item Append-only proof: given $\ensuremath{\mathsf{digest}}_{S,H}$ and $\ensuremath{\mathsf{digest}}_{S',H'}$, the proof ensures that $H$ is a prefix of $H'$
(assuming that $|H| \leq |H'|$).
\end{itemize}
The database throughput is measured in terms of the number of user queries completed per second, and it depends on
the cost of maintaining the security-related data structures for generating the proofs. Designs that exploit
parallel execution and avoid contention will have high throughputs.
\subsection{Transparency Log}
\label{subsec:proof}
\remove{
Transparency log is an append-only log accompanied by a Merkle
tree. Figure~\ref{fig:merkle} shows an example of a transparency log at two different times: one with $3$
elements and another with $6$ elements. Each leaf represents an operation, for example updating a key-value
tuple. The proof for an append operation is the new Merkle root tree.
\begin{itemize}[leftmargin=*
\item Inclusion proof: the proof is the Merkle path from the
corresponding leaf to the root. The cost of this proof is $O(\log(N))$ where $N$ is the size of the log. In the
example, the proof that element 2 exists in the log consists of the hashes of node $1$ and $b$.
\item Append-only proof: the proof consists of nodes for reconstructing both trees, which has the complexity of $O(\log(N))$. In the example, to
prove that $c$ is included in $l$, the proof includes the hashes of node $e, 3, 4, k$. The first three are
sufficient to compute $c$, and all four are sufficient to compute $l$.
\item Current-value proof: the proof
includes all the leaves of the tree, which has the complexity of $O(N)$. In our
example, suppose the latest value for key $k$ is set at node $3$. Given $l$ and the tuple, the user has to fetch all $6$
elements and check that nodes $4, 5, 6$ do not update the tuple.
\end{itemize}
The security of transparency logs depends on auditing. In particulars, users broadcast signed Merkle roots to a
number of auditors which check that that there is a single log with no forks. The check is done by requesting
and verifying append-only proof from the database provider.
}
Transparency log is an append-only log protected by a Merkle
tree~\cite{crosby09}.
Each leaf represents an operation, for example updating a key-value
tuple. This data structure supports all three types of integrity proofs. The {\em inclusion proof} consists of the Merkle path from the
leaf to the root, which costs $O(\log(N))$ where $N$ is the size of the log.
The {\em append-only proof} include intermediate nodes between two trees, and has the cost of $O(\log(N))$. The {\em current-value proof}, however, requires all the leaves of the tree, thus its cost is $O(N)$.
The security of transparency logs depends on auditing. In particulars, users broadcast signed Merkle roots to a
number of auditors which check that that there is a single log with no forks. The check is done by requesting
and verifying append-only proof from the database provider.
\subsection{Review of Existing Systems}
Table~\ref{tab:overview} compares existing verifiable ledger databases according to the design space above. These
systems build on top of the transparency logs described above.
\remove{
\begin{figure}
\centering
\includegraphics[width=0.35\textwidth]{figures/fig3-crop.pdf}
\caption{
Merkle-tree based transparency logs. The leaves are log entries. The gray leaf nodes
represent empty entries.}
\label{fig:merkle}
\vspace{-4mm}
\end{figure}
}
\textit{Commercial verifiable ledger databases.} QLDB~\cite{qldb} and LedgerDB~\cite{ledgerdb} are
two recent services offered by major cloud providers. QLDB uses transparency logs for storing transactions,
and executes the operations on indexed tables. However, its throughput is low due to the disk-based
communication between the log and the indexed tables. LedgerDB~\cite{ledgerdb} improves the performance of QLDB by batching multiple
operations when updating the Merkle roots of the log. Since QLDB and LedgerDB build Merkle trees over transactions, the append-only proof costs $O(\log(N))$. However, both systems do not have protection over indexes, which require scanning to the latest transaction for current-value proof. The cost of this is $O(N)$.
\textit{Forkbase.} Forkbase~\cite{forkbase} is a state-of-the-art versioned, key-value storage system.
It implements a variant of transparency logs called transparency maps. In particular, Forkbase builds a Merkle
tree on top of immutable maps: each update operation results in a new map and a new Merkle root. Each Merkle
root also includes a cryptographic pointer to the previous root. Unlike transparency logs, the current-value
proof in Forkbase costs $O(\log(m))$ because the latest value is included in the map. However, the append-only
proof is $O(N)$, since users have to follow the hash chain to ensure that there are no forks.
\textit{Blockchain.} Existing blockchain systems assume the majority of trusted providers in a
decentralized setting. The providers run a Byzantine fault tolerant consensus protocol to keep the ledger and
global states consistent. As the system as a whole is trusted, signed statements from the blockchain can be
used as integrity proofs. In particular, in a permissioned blockchain that tolerates $f$ Byzantine failures,
the proof contains signatures from $f+1$ providers. The proof complexity is therefore independent of the
history, or $O(1)$. However, the performance of a blockchain is limited by the consensus
protocol~\cite{blockbench}.
\textit{CreDB} Instead of relying on consensus to protect against
Byzantine database servers, CreDB assumes that the server can create trusted
execution environments backed by trusted hardware. CreDB processes user
transactions inside the TEE and produces signed {\em witnesses} that capture the
history of the states. Both inclusion and current-value proofs in CreDB are efficient, because they
are simple messages signed by the TEE. However, the hardware limitation, e.g. the limited memory available for Intel SGX, makes the TEE a
performance bottleneck, and results in low throughputs.
\textit{Public-key transparency logs.} Trillian~\cite{trillian} combines transparency logs and maps to implement new
primitives called {\em verifiable log-based map}. It exposes a key-value interface, and is used for storing public key certificates. When a key is updated, the
map is updated and a new Merkle root is computed on the map. It then appends the log with both the operation
and the Merkle root. As the result, both the current-value and append-only proofs are efficient, i.e.
$O(\log(m))$ complexity. On the other hand, Trillian relies on trusted auditors to regularly verify the
consistency between the log and the corresponding map. More specifically, the auditors reconstruct the map
from the log and ensure that the Merkle root included in the log is correct. This auditing process is
expensive and should be performed by powerful, external entities rather than by the users. Other systems such as CONIKS\cite{coniks}, ECT~\cite{ect}, and $\text{Merkle}^2$~\cite{merkle2} are similar to Trillian in our design space. They improve Trillian by adding support for privacy, revocation (non-inclusion proofs), and reducing the audit cost.
\section{Related Work}
\label{sec:related}
\noindent
{\bf Verifiable OLAP databases.}
Zhang et al.~\cite{ZhangGKPP17} propose interactive protocols for verifiable SQL queries. However, their techniques rely on expensive cryptographic primitives
Systems that use trusted hardware include EnclaveDB~\cite{enclavedb}, Opaque~\cite{opaque}, and
ObliDB~\cite{oblidb}, and they support full-fledged SQL query execution inside trusted enclaves.
VeritasDB~\cite{veritasdb18} and Concerto~\cite{concerto17} leverage trusted hardware to ensure the integrity of key-value operations.
VeriDB~\cite{veridb} extends Concerto to supports general SQL queries.
All of these systems make a strong security assumption on the availability and security of the trusted hardware.
\noindent
{\bf Authenticated data structure.} Li et al.~\cite{ads} propose multiple
index structures based on Merkle tree and B$^+$-tree.
IntegriDB~\cite{integridb} proposes efficient authenticated
data structures that support a wide range of queries such as join and aggregates. We note that these data
structures do not guarantee the integrity of the data history.
\noindent
{\bf Blockchain databases.}
Veritas~\cite{veritas} proposes a verifiable table abstraction, by storing transaction logs on a blockchain.
vChain~\cite{vchain19} and FalconDB~\cite{falcondb} combine authenticated data structures
with blockchain, by storing digests of the authenticated index structures in the blockchain.
The main disadvantage of blockchain-based systems is that they have poor performance.
\section{Benchmark}
\label{sec:benchmark}
Even though the verifiable databases expose database-like interface to applications, the existing database benchmarks do not contain verification workloads. To fairly compare \textsc{GlassDB}\xspace with other systems, we extend YCSB and TPC-C by including verification workloads.
\vspace{-2mm}
\subsection{YCSB}
The existing YCSB workloads include simple put and get operations. We add three more operations, called {\tt
VerifiedPut}, {\tt VerifiedGetLatest}, and {\tt VerifiedGetHistory}, and a new parameter {\tt delay}. These
operations return integrity proofs that can be verified by the user. The {\tt delay} parameter allows for
deferred verification, that is, the database generates the proofs only after the specified duration. When
set to $0$, the operations return the proof immediately. When greater than $0$, the database can improve
its performance by batching multiple operations in the same proof.
\begin{itemize}[leftmargin=*
\item {\tt VerifiedPut(k,v,delay)}: returns a promise. The user then invokes {\tt GetProof(promise)} after
{\tt delay} seconds to retrieve the proof.
\item {\tt VerifiedGetLatest(k,fromDigest,delay)}: returns the latest value of $k$. The user only sees the
history up to {\tt headDigest}, which may be far behind the latest history. For example, the user last
interacts with the database, the latter's history digest is {\tt fromDigest}. After a while, the history is
updated to another digest {\tt latestDigest}. This query allows the user to specify the last seen history.
The integrity proof of this includes an append-only proof showing a linear history from {\tt fromDigest} to
{\tt latestDigest}.
\item {\tt VerifiedGetAt(k,atDigest,fromDigest)}: returns the value when the database history is at {\tt
atDigest}. {\tt fromDigest} is the last history that user sees. The integrity proof for this query includes
an append-only proof from {\tt fromDigest} to {\tt atDigest}.
\end{itemize}
Based on these operations, we add two new workloads to YCSB. First,
{\em Workload-X} consists of 50\% VerifiedPut, 50\% VerifiedGetLatest, with 100ms delay.
Second, {\em Workload-Y} consists of 20\% VerifiedPut, 40\% VerifiedGetLatest, 40\% VerifiedGetAt, with 100ms delay.
\subsection{TPC-C}
\label{subsec:tpccbench}
We extend all five types of transactions in TPC-C to the verified versions. Similar to YCSB, each new
transaction has a {\tt delay} parameter for specifying deferred verification. When {\tt delay > 0}, each
transaction returns a promise which is later used to request the integrity proof. In addition to the five new
transactions, we add a new one called {\tt VerifiedWarehouseBalance}, which retrieves the last $10$ versions
of {\tt w\_ytd}. This transaction is possible with verifiable ledger databases because they maintain all
historical versions of the data.
\section{Conclusions}
\label{sec:conclusion}
In this paper, we described the design space of verifiable ledger databases. We designed and implemented
\textsc{GlassDB}\xspace that addresses the limitations of existing systems. \textsc{GlassDB}\xspace supports transactions, has
efficient proofs, and high performance. We evaluated our system against three baselines, using new
benchmarks supporting verification workloads.
The results show \textsc{GlassDB}\xspace significantly outperforms the baselines.
\section{Evaluation}
\label{sec:exp}
\subsection{Baselines}
\label{subsec:baseline}
We compare \textsc{GlassDB}\xspace against three state-of-the-art verifiable ledgers, namely QLDB, LedgerDB, and Trillian. We do not compare against blockchains due to the different threat models. QLDB and LedgerDB are not open-sourced, thus we implement them based on the documentation available online, or based on the details in the papers.
We denote them by QLDB$^\ast$ and LedgerDB$^\ast$ respectively.
To facilitate \textit{fair performance comparison}, we
implement QLDB$^\ast$, LedgerDB$^\ast$ and \textsc{GlassDB}\xspace on top of the
same distributed layer, which removes the impact of communication protocols and related implementation details on the overall performance gaps. In particular, all three systems partition their
data over multiple nodes, and they use the same 2PC implementation for
distributed transactions. All systems are implemented in C++, using libevent v2.1.12 and Protobuf v3.19.3 for network communication and serialization respectively.
\textit{QLDB$^\ast$.}
\label{subsection:emulated_system}
We implement a version of QLDB based on the available documentation.
The system consists of a ledger storage and an index storage as shown in Figure~\ref{fig:qldb}.
The former maintains the transaction log (the WAL) and a Merkle tree built on top of it.
The latter maintains a B$^+$-tree and data materialized from the ledger.
When committing a new transaction, the system appends a new log entry
containing the type, parameters and other metadata of the transaction, and updates
the Merkle tree. After that, the transaction is considered committed and the
status is returned to the client. A background thread executes the
transaction and updates the B$^+$-tree with the transaction data and metadata.
We implement the inclusion proof, append-only proof, and current-value proof as
described in Section~\ref{subsec:proof}. We do not implement the SQL layer,
which is complex and only negatively impacts the overall performance of OLTP workloads.
\textit{LedgerDB$^\ast$.}
We implement a version of LedgerDB based on the descriptions in \cite{ledgerdb}.
The system consists of a transaction log, a bAMT, clue index, and a ccMPT.
We implement bAMT by
forcing the update API to take as input a batch of transaction journals. The
nodes in bAMT are immutable, that is, each modification results in a new node. We
implement the clue index by building a skip-list for each clue, and keep
the mapping of each clue to its skip list's head in memory. To enable queries on keys, we
create one clue for each key. As the result, a transaction may update multiple skip lists.
The ccMPT is constructed to protect the integrity of the clue index, in which the key
is the clue, and the value is the number of leaf nodes in the corresponding
skip-list. When committing a new transaction, the system creates a transaction
journal containing the type and parameters of the transaction, updates the clue
index with it, and returns the status to the client. A background thread
periodically updates the bAMT with the committed journals, and updates the ccMPT.
The root hash of ccMPT and bAMT are stored in a hash
chain. We do not implement the timeserver authority (TSA), which is used for
security in LedgerDB, as its complexity adds extra overheads to the system.
\textit{Trillian.} We use an implementation of verifiable log-based maps provided by \cite{wave, trillian}.
The system exposes a key-value interface, and consists of two transparency logs and one map. It stores the map of
all the keys in a sparse Merkle tree, and asynchronously updates the maps with the new operations in batches.
We use the default
configurations provided in~\cite{wave}, and use the throughput of the root log as the overall throughput.
\remove{When a new key is added, the operation is appended to the {\em operation log}. The system stores the map of
all the keys in a sparse Merkle tree, and asynchronously updates the maps with the new operations in batches.
Each update results in a new Merkle root, which is then appended to the {\em root log}. An auditor process
executes the update operations and checks that the new Merkle roots are computed correctly. Every update
operation returns a {\em promise} indicating the future version where the update will be reflected in the map.
Each get operation returns the inclusion proof, and append-only proof of the root log. We use the default
configurations provided in~\cite{wave}, and use the throughput of the root log as the overall throughput.}
\vspace{-2mm}
\subsection{Experiment Setup and Results Summary}
All experiments are conducted on 32 machines with Ubuntu 20.04, which are equipped with 10x2 Intel Xeon CPU W-1290P processor (3.7GHz) and 125GB RAM. The machines are on the same rack and connected by 1Gbps network.
For each experiment, we collect the measurements after a warm-up of two minutes during which the systems are stable. The results show that \textsc{GlassDB}\xspace consistently outperforms both QLDB$^\ast$ and LedgerDB$^\ast$ across all workloads. In particular, compared to LedgerDB$^\ast$ it achieves up to $1.7\times$ higher throughput on the YCSB workload, $1.3\times$ higher throughput for the TPC-C workload, and $1.6\times$ higher throughput for the verification workload. These improvements are due to \textsc{GlassDB}\xspace's efficient authenticated data structure, deferred verification, and effective batching.
We note that our results are different from what is reported in~\cite{ledgerdb}. In particular, the absolute and relative performances of different systems are not the same, for which we attribute two four reasons. First, the Amazon QLDB service has low performance due to its many limitations such as the maximum transaction size. Moreover, it runs on a serverless platform that is out of the user's control, making it difficult for fair comparisons. Our emulated implementation of QLDB removes these limitations and achieves much higher throughput than the original Amazon QLDB service. Second, \cite{ledgerdb} lacks sufficient details regarding the experiments. For example, it does not say how it is compared against QLDB (whether the authors used the QLDB service from Amazon, or implemented an emulated one). Third, since the technique details of QLDB are not public, it is not clear from ~\cite{ledgerdb} how much the performance gap is due to the differences in hardware, low-level communication protocol, or serialization. Finally, it is not possible to reproduce the results in \cite{ledgerdb} due to the experiment artifacts being unavailable.
\subsection{Micro-Benchmarks}
\begin{figure*}[t]
\centering
\begin{minipage}{\linewidth}
\centering
\subfigure[Varying transaction sizes]{
\centering
\includegraphics[height=3cm]{figures/breakdown/bd_tlen.pdf}
\label{fig:exp:bd_tlen}
}
\subfigure[Varying workloads]{
\centering
\includegraphics[height=3cm]{figures/breakdown/bd_workload.pdf}
\label{fig:exp:bd_workload}
}
\subfigure[Varying number of nodes]{
\centering
\includegraphics[height=3cm]{figures/breakdown/bd_server.pdf}
\label{fig:exp:bd_server}
}
\subfigure[Varying persist interval]{
\centering
\includegraphics[height=3cm]{figures/breakdown/bd_delay.pdf}
\label{fig:exp:bd_delay}
}
\vspace{-3mm}
\caption{Latency breakdown at the server.}
\label{fig:exp:breakdown}
\end{minipage}
\vspace{-2mm}
\end{figure*}
\begin{figure*}[t]
\centering
\begin{minipage}{0.49\linewidth}
\centering
\subfigure[Verification latency at the client]{
\centering
\includegraphics[height=3cm]{figures/breakdown/bd_delay_per_key.pdf}
\label{fig:exp:bd_delay_per_key}
}
\subfigure[Proof size]{
\centering
\includegraphics[height=3cm]{figures/breakdown/bd_delay_proofsize.pdf}
\label{fig:exp:bd_delay_proofsize}
}
\vspace{-3mm}
\caption{Impact of delay time at the client.}
\label{fig:exp:delay}
\end{minipage}
\begin{minipage}{0.49\linewidth}
\subfigure[Throughput, varying persist interval]{
\centering
\includegraphics[height=3cm]{figures/breakdown/delay_persist_tps.pdf}
\label{fig:exp:delay_persist_tps}
}
\subfigure[Throughput, varying verification delay]{
\centering
\includegraphics[height=3cm]{figures/breakdown/delay_verify_tps.pdf}
\label{fig:exp:delay_verify_tps}
}
\vspace{-3mm}
\caption{Impact of delay time on the overall performance.}
\end{minipage}
\vspace{-2mm}
\end{figure*}
In this section, we evaluate the cost at the server in terms of execution time and storage consumption. We extend the vanilla YCSB benchmark to support transactions, by batching every 10 operations as a transaction. We characterize the workloads as read-heavy (8 reads and 2 writes), balanced (5 reads and 5 writes), and write-heavy(2 reads and 8 writes).
\vspace{-1mm}
\subsubsection{Cost breakdown of \textsc{GlassDB}\xspace} We break down the server cost into four phases as described in Section~\ref{subsubsec:transaction}: prepare, commit, persist, and get-proof.
For the last two phases, we report the average latency per key, because the these phases' costs depend on the number of records in the batch.
Figure~\ref{fig:exp:bd_tlen} shows the latency of different phases with varying numbers of operations per transaction (or transaction sizes).
We observe that the latency of prepare and commit phase increases as the transactions become larger, which is due to more expensive conflict checking and data operation.
Figure \ref{fig:exp:bd_workload} shows the latency under different workloads.
The latency of the prepare phase increases slightly as the workload move from read-heavy to write-heavy
because a larger write set leads to more write-write and write-read conflict checking.
In contrast, the commit latency of read-heavy workload is much higher than that of write-heavy workload, since read operations are more expensive than the write operations in \textsc{GlassDB}\xspace as explained in Section \ref{subsec:design:our}. Figure \ref{fig:exp:bd_server} shows the latency breakdown for varying number of nodes. The latency of the prepare and commit phase decrease as the number of nodes increases, because having more shards means fewer keys to process per node.
{Figure \ref{fig:exp:bd_delay} shows the impact of increasing the persist interval. It can be seen that with a longer interval, the persist phase is invoked less frequently, which reduces contention with other phases. As a result, the latency of prepare and commit phases decrease.
The persist batch size increases with longer persist intervals, larger transaction sizes, higher write ratio, or with fewer nodes because they lead to more data committed per node. A large persist batch size results in larger data blocks created in the ledger, which in turn increase the batch size of get-proof phases. The results in Figure~\ref{fig:exp:breakdown} show that persist and get-proof costs decrease as the persist batch size increases, demonstrating the effectiveness of batching.
}
We quantify the cost at the client in terms of verification latency and the proof size (which is proportional to the network cost) as shown in Figure~\ref{fig:exp:delay}. We vary the verification delay to show the impact on the costs. The client batches more keys for verification when the delay time is higher, which results in larger proofs as shown in Figure \ref{fig:exp:bd_delay_proofsize}, and therefore increases the verification latency~\ref{fig:exp:bd_delay_per_key}. We note that the cost per key decreases with higher delay, demonstrating that batching is effective.
We evaluate the impact of the persistence interval on the overall performance by fixing
the client verification delay to 1280ms, while varying the persistence
interval from 10ms to 1280ms. Figure~\ref{fig:exp:delay_persist_tps} shows the performance for read-heavy, balanced,
and write-heavy workloads.
{It can be seen that longer intervals lead to higher throughputs
for all workloads except for write-heavy workloads. This is because less frequent updates of
the core data structure helps reduce contention and increase the effect of
batching. For write-heavy workload, however, a long interval causes the update
of the core data structure to block transaction execution for longer, which increases the abort rate. In particular, we observe that the abort rate
increases to $21.6\%$ at interval of 1280ms for write-heavy workloads, while it remains $1.5\%$ and $3.5\%$
for read-heavy and balanced workloads. Next, we evaluate the impact of verification delay by
fixing the persistence interval to 10 ms and varying the delay from 10 ms to
1280 ms. The results are shown in Figure \ref{fig:exp:delay_verify_tps},
in which the throughput increases with larger delays due to proof batching.
However, the throughput drops after the peak at 800ms. This is because the batched proof becomes too large that the network cost becomes significant.}
\subsubsection{Cost breakdown versus other baselines}
We compare the latency breakdown of \textsc{GlassDB}\xspace with that of two other baselines. We do not compare against Trillian because it does not support transactions.
\begin{figure*}[t]
\centering
\begin{minipage}{\linewidth}
\centering
\subfigure[Breakdown latency]{
\centering
\includegraphics[height=3cm]{figures/breakdown/bd_comp.pdf}
\label{fig:exp:bd_comp}
}
\subfigure[Verification time]{
\centering
\includegraphics[height=3cm]{figures/breakdown/verifytime.pdf}
\label{fig:exp:proof_latency}
}
\subfigure[Proof size per key]{
\centering
\includegraphics[height=3cm]{figures/breakdown/proofsize.pdf}
\label{fig:exp:proof_size}
}
\subfigure[Storage]{
\centering
\includegraphics[height=3cm]{figures/breakdown/sto_records.pdf}
\label{fig:exp:storage}
}
\vspace{-3mm}
\caption{Server and client cost versus other baselines.}
\end{minipage}
\vspace{-2mm}
\end{figure*}
Figure \ref{fig:exp:bd_comp} shows that
\textsc{GlassDB}\xspace and LedgerDB$^\ast$ have lower latency than QLDB$^\ast$ in most phases. The commit latency of QLDB$^\ast$ is especially high because it includes the cost of persisting the authenticated data structure, which explains why Figure~\ref{fig:exp:bd_comp} does not show the cost of the persist phase for QLDB$^\ast$. In contrast, \textsc{GlassDB}\xspace and LedgerDB$^\ast$ persist the authenticated data structures asynchronously, therefore they have lower latency.
\textsc{GlassDB}\xspace has the lowest commit latency because it only persists the write-ahead logs when the transaction commits. Furthermore, it has lower latency in the persist and get-proof phases because the size of the data structure is smaller.
Figure~\ref{fig:exp:proof_latency} and Figure~\ref{fig:exp:proof_size} compare the verification latency and per-key proof size of different systems. We measure the proof size per key because each proof is for the entire block containing multiple keys. QLDB$^\ast$ has the smallest proof size, and therefore lowest verification time, due to its small Merkle tree. However, we note that it locks the entire tree during proof generation, thus its latency for the get-proof phase is high. The per-key proof size of \textsc{GlassDB}\xspace is smaller than that of LedgerDB$^\ast$ for two reasons. First, the authenticated data structure in \textsc{GlassDB}\xspace is smaller, resulting in a smaller proof for a block. This leads to smaller verification time in Figure~\ref{fig:exp:proof_latency}. Second, \textsc{GlassDB}\xspace has more keys per block, therefore the per-key proof is even smaller.
\vspace{-2mm}
\subsubsection{Storage consumption}
We measure the storage cost of \textsc{GlassDB}\xspace with varying batch sizes, and compare them against the two other baselines. Figure \ref{fig:exp:storage} shows that \textsc{GlassDB}\xspace consumes less storage as the batch size increases, because there are fewer saved snapshots. It is most space-efficient when the batch size exceeds $1,000$ keys per batch, which can be achieved with 16 nodes and with 100ms delay.
LedgerDB$^\ast$ consumes more storage because its authenticated data structure is larger than that of \textsc{GlassDB}\xspace.
\begin{figure*}
\centering
\begin{minipage}{0.24\linewidth}
\centering
\includegraphics[height=3cm]{figures/breakdown/bd_contribution.pdf}
\caption{Impact of design choices.}
\label{fig:exp:contribution}
\end{minipage}
\begin{minipage}{0.74\linewidth}
\centering
\subfigure[Throughput, 16 nodes]{
\centering
\includegraphics[height=3cm]{figures/distributed/tps_client.pdf}
\label{fig:exp:ycsb_peak}
}
\subfigure[Throughput, varying number of nodes]{
\centering
\includegraphics[height=3cm]{figures/distributed/tps_server.pdf}
\label{fig:exp:ycsb_scale}
}
\subfigure[Read-write workload]{
\centering
\includegraphics[height=3cm]{figures/distributed/tps_workload.pdf}
\label{fig:exp:ycsb_workload}
}
\vspace{-3mm}
\caption{Performance for YCSB uniform workloads.}
\label{fig:exp:ycsb}
\end{minipage}
\vspace{-2mm}
\end{figure*}
\subsubsection{Impact of design choices}
{
To quantify the impacts of our three novel design choices, we remove these features from \textsc{GlassDB}\xspace and compare the resulting system with the baselines. The result is shown in Figure~\ref{fig:exp:contribution}. With only the two-level POS-tree, the system (\textsc{GlassDB}\xspace-no-DV-no-BA) outperforms QLDB$^\ast$ by $1.2\times$. By adding deferred verification, the system (\textsc{GlassDB}\xspace-no-BA) improves the performance by $2.4\times$, outperforming LedgerDB$^\ast$, a system with deferred verification, by $1.3\times$. By further adding batching, the throughput of the final system (\textsc{GlassDB}\xspace) increases by another $1.3\times$.
}
\subsection{YCSB Workloads}
In the experiments, we run read-heavy, balanced, and write-heavy workloads with number of nodes ranging from 1 to 16, number of clients ranging from 8 to 80, and delay time ranging from 10ms to 1280ms. We first measure peak throughput by fixing the number of nodes to 16, while increasing the number of clients until the systems are saturated. Figure~\ref{fig:exp:ycsb_peak} compares the systems under the balanced uniform workload, i.e. Zipf factor is 0. \textsc{GlassDB}\xspace outperforms
QLDB$^\ast$ and LedgerDB$^\ast$ by up to $3.7\times$ and $1.7\times$ respectively. Both \textsc{GlassDB}\xspace and LedgerDB$^\ast$ are better than QLDB$^\ast$ because they persist the authenticated data structure asynchronously, that is, they avoid updating the Merkle tree in the critical path.
Furthermore, they both use batching that helps improve the throughput.
In particular, \textsc{GlassDB}\xspace collects non-overlapping keys from multiple transactions when creating a new block,
whereas LedgerDB$^\ast$ batches newly committed transactions when constructing the Merkle tree. The latter constructs Merkle trees on top of all transactions, which results in larger Merkle trees, and hence, higher overheads during the persist and get-proof phases.
\remove{Figure~\ref{fig:exp:ycsb_lat} shows the average latency at peak throughput.
\textsc{GlassDB}\xspace has the lowest average latency, because the client gets the response as soon as the transaction is committed to the write-ahead log. The newly committed data at the server is also kept in memory to speed up queries.
The latency of LedgerDB$^\ast$ is higher because it persists the transaction blocks to storage, and getting a key requires scanning the block.
In contrast, QLDB$^\ast$ updates and persists the ledger and the
Merkle tree synchronously, which results in the highest latency.
Next, we increase the number of server nodes from 1 to 16 and compare the peak throughput. }
Figure~\ref{fig:exp:ycsb_scale} shows that all systems scale linearly, and \textsc{GlassDB}\xspace achieves the highest throughput. The linear scalability demonstrates that the two-phase commit's overhead is small.
\remove{To understand the improvement over the single-node setting, we record the
execution time and the number of keys processed at the server node for each transaction.
The results in Figure~\ref{fig:exp:distribution} show that the execution time
and the number of keys processed per node decrease with more nodes, which
explains the higher throughputs as the system scales.}
Figure~\ref{fig:exp:ycsb_workload} displays the throughput comparison under different workloads.
It can be seen that \textsc{GlassDB}\xspace consistently outperforms the baselines across all workloads. In particular, its throughput increases with higher write ratio, because write operations are more efficient as data is kept in memory. We note that higher write ratio leads to more aborts and larger search space for conflicts.
For QLDB$^\ast$, the time to update the Merkle tree is dominant, therefore the abort rate is a key factor that affects the throughput. For LedgerDB$^\ast$, since the update of Merkle tree is asynchronous, its reduction of throughput is due to higher disk I/Os and larger conflict search space.
\remove{Figure~\ref{fig:exp:ycsb_zipf} and Figure~\ref{fig:exp:ycsb_abort} show the impact of increasing conflicts. It can be seen that the throughputs of all systems drop as there are more aborts. Figure~\ref{fig:exp:ycsb_not_scale} illustrates how the system scales with more nodes. Unlike with uniform workloads, we observe that the throughputs scale sub-linearly, because more transactions are aborted as the number of nodes increases. }
\begin{figure*}
\centering
\begin{minipage}{0.6\linewidth}
\centering
\subfigure[Throughput, 16 nodes]{
\centering
\includegraphics[height=3.1cm]{figures/distributed/tpcc_peak.pdf}
\label{fig:exp:tpcc_peak}
}
\remove{\subfigure[Throughput, varying number of nodes]{
\centering
\includegraphics[height=3.1cm]{figures/distributed/tpcc_scale.pdf}
\label{fig:exp:tpcc_scale}
}}
\subfigure[Average latency breakdown]{
\centering
\includegraphics[height=3.1cm]{figures/distributed/tpcc_lat_op.pdf}
\label{fig:exp:tpcc_lat_op}
}
\vspace{-3mm}
\caption{Performance for TPC-C workloads.}
\label{fig:exp:dist_tpcc}
\end{minipage}
\begin{minipage}{0.38\linewidth}
\centering
\includegraphics[height=3.2cm]{figures/distributed/ft.pdf}
\caption{Failure recovery.}
\label{fig:exp:ft}
\end{minipage}
\vspace{-5mm}
\end{figure*}
\begin{figure*}[!t]
\centering
\begin{minipage}{0.5\linewidth}
\subfigure[Throughput of Workload-X]{
\centering
\includegraphics[height=3.1cm]{figures/distributed/workloadx.pdf}
\label{fig:exp:dist_x}
}
\hspace{-3mm}
\subfigure[Latency of Workload-X]{
\centering
\includegraphics[height=3.1cm]{figures/distributed/workloadx_lat.pdf}
\label{fig:exp:dist_lat_x}
}
\vspace{-3mm}
\caption{Workload-X with 16 nodes.}
\end{minipage}
\begin{minipage}{0.24\linewidth}
\hspace{-4mm}
\subfigure{
\centering
\includegraphics[height=3.1cm]{figures/distributed/singlenodeX.pdf}
}
\vspace{-3mm}
\caption{Workload-X on a single node.}
\label{fig:exp:singlenode}
\end{minipage}
\begin{minipage}{0.24\linewidth}
\hspace{-3mm}
\subfigure{
\includegraphics[height=3.1cm]{figures/distributed/audit_new.pdf}
}
\vspace{-3mm}
\caption{Auditing performance.}
\label{fig:exp:audit}
\end{minipage}
\vspace{-3mm}
\end{figure*}
\vspace{-2mm}
\subsection{TPC-C Workloads}
We run a mixed workload containing all six types of TPC-C transactions mentioned in Section~\ref{subsec:tpccbench}, with new order and payment transactions accounted for 42\%, and other types accounted for 4\% each.
We implement the tables in TPC-C on top of the key-value stores in all the systems.
In particular, each field in a row is a data unit, and the
key-value pair becomes <ColumnName\_PrimaryKey, FieldValue>. We make a further optimization to
combine fields that are not frequently updated. For example, we combine c\_first, c\_middle, and c\_last
to c\_name.
Figure \ref{fig:exp:tpcc_peak} shows the throughput with an increasing number of clients.
\textsc{GlassDB}\xspace outperforms LedgerDB$^\ast$ by $1.3\times$ and outperforms QLDB$^\ast$ by $2.3\times$.
We note that the TPC-C workload has larger and more complex transactions than YCSB workloads, therefore we observe $2.1\times$ lower throughput.
In particular, \textsc{GlassDB}\xspace achieves peak throughput at $48$ clients, as opposed to $64$ clients for YCSB. This is because large transaction size involves more nodes and increases the overhead of coordination.
\remove{The average latency of the systems are shown in Figure \ref{fig:exp:tpcc_lat}. The results are consistent with the throughput performance.}
Figure~\ref{fig:exp:tpcc_lat_op} shows the latency breakdown at the peak throughput for each transaction
type;
\textsc{GlassDB}\xspace consistently has the lowest latency among all types of transactions.
\subsection{Verification Workloads}
We use workload-X as described in Section~\ref{sec:benchmark} to compare \textsc{GlassDB}\xspace with
QLDB$^\ast$, LedgerDB$^\ast$, and Trillian. We omit the results for workload-Y since it displays a similar trend. We run key-value workloads, as Trillian does not support concurrent transactions.
For each verified operation, the client performs verification of the proof.
In the distributed settings with 16 nodes,
Figure~\ref{fig:exp:dist_x} shows the throughput for workload-X with an increasing number of clients.
\textsc{GlassDB}\xspace achieves the highest throughput: $2.5\times$ higher than QLDB$^\ast$ and $1.6\times$ higher than LedgerDB$^\ast$.
We evaluate the impact of deferred verification by measuring the throughput with $0$ms delay, that is, every operation is verified synchronously. Without deferred verification, the throughput is lower than LedgerDB$^\ast$, and higher than QLDB$^*$.
Figure \ref{fig:exp:dist_lat_x} shows the latency for each operation. For \textsc{GlassDB}\xspace and LedgerDB$^\ast$, which use deferred verification, we separate out the cost of verifying one key.
\textsc{GlassDB}\xspace outperforms the other systems in the read and write latency due to its efficient proofs (smaller proof sizes) and efficient persist phase.
Even when combining the cost of transaction execution with that of verification, the total cost
of \textsc{GlassDB}\xspace and LedgerDB$^\ast$ are still lower than that of
QLDB$^\ast$. This is because the verification request contains multiple keys, and the
two former systems can batch multiple keys in the same proof, whereas QLDB$^\ast$ has
one proof per key.
\remove{Even with the combination of transaction execution and verification latency, the total cost
for \textsc{GlassDB}\xspace and LedgerDB$^\ast$ are still smaller than QLDB$^\ast$, as each verification request contains 5 keys on average.}
\remove{Figure \ref{fig:exp:dist_y} and \ref{fig:exp:dist_lat_y} show similar results for workload-Y.
However, we observe verification latency for \textsc{GlassDB}\xspace and LedgerDB$^\ast$ are higher because of larger proofs.}
To fairly compare with Trillian, which is a single node system that only supports key-value abstraction, we use the single-node version of \textsc{GlassDB}\xspace, LedgerDB$^\ast$, and QLDB$^\ast$. The results are shown in Figure \ref{fig:exp:singlenode}. \textsc{GlassDB}\xspace outperforms LedgerDB$^\ast$, QLDB$^\ast$, and Trillian by up to $2.0\times$, $5.7\times$ and two orders of magnitude, respectively. The performance gap is due to the cost of the put and get operations in Trillian being orders of magnitude more expensive. In particular, Trillian stores all data in a separate, local MySQL database instance, thus each operation incurs cross-process overheads.
Finally, we evaluate the cost of the auditing process. We use $16$ servers with
$64$ clients, running the balanced transaction workload. After an interval, an auditor
sends $\texttt{VerifyBlock(.)}$ requests to the servers and verifies all the new
blocks created during the interval. Figure~\ref{fig:exp:audit} shows the
auditing costs with varying intervals from 10s to 60s. Both the latency for
verifying the new blocks, and the number of new blocks grows almost linearly
with the audit interval. This is because more blocks are created during a
longer interval, and it takes a roughly constant time to verify
each block. We remark that the auditing process is expensive, especially when
the rate of block creation is high. However, it can be done off the critical path,
and is amenable to distributed processing.
\subsection{Failure Recovery}
In this section, we test the impact of crash failures and the recovery process of \textsc{GlassDB}\xspace. We compare the two implementations, i.e., the failure recovery with respect to 2PC and fault tolerance with replication, as described in Section \ref{subsec:ft}. We set the replica group size to be 3 to tolerate one node failure for the replication setting. The experiment is conducted with 16 nodes and 160 clients. After the performance of the system becomes stable, we let the system continues running for 40 seconds. Next, we kill one node and reboot it after 20 seconds. After that, we let the system run for another 40 seconds. We take measurement of the throughput for every second. The results are shown in Figure ~\ref{fig:exp:ft}. In the normal scenario where no crash failure occurs, replication contributes to around 22\% overhead. When one node crashes, \textsc{GlassDB}\xspace without replication has to abort all transactions accessing keys in the partition hosted by the failed node, therefore, has low throughput until the crashed node is brought back at 60 seconds.
For \textsc{GlassDB}\xspace with replication, in the case of a leader failure, the system encounters a temporary low throughput because of leader election, syncing of the states, and transaction aborts due to timeouts. It takes around 7 seconds to recover to peak throughput and continues to work as normal. In the case of a replica failure, the system will continues to process the transactions at the peak throughput. |
\section*{Acknowledgments}
Funded by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) under Germany's Excellence Strategy - EXC 2033 - 390677874 - RESOLV (C.B., U.B, K.M., J.T.) as well as EXC 2008/1-390540038 - UniSysCat (C.P. and P.S.). The DFG is furthermore acknowledged for funding within Project ID No. 278162697-SFB 1242 (J.T.). C.P. is grateful to the Alexander von Humboldt foundation for financial support within the Feodor Lynen program. We thank M. Meyer for experimental support, as well as M. Wolf and A. Rubio for fruitful discussions.
|
\section{Introduction}
\label{Sec-1}
\subsection{Background}
\label{Sec-1.1}
Microorganisms are ubiquitous in nature and manage critical ecosystem services, ranging from global nutrient cycling to human health. Microbes do not exist in a vacuum in nature, but instead are members of diverse communities known as microbiomes, wherein microbes may interact with other microbes of different species. These microbial interactions may be favorable or antagonistic and are crucial for the successful establishment and maintenance of a microbial community, and frequently result in important pathogenic or beneficial effect to the host or environment \citep{braga2016microbial}. A thorough understanding of how microbe interact with one another is critical to uncovering the underlying role microorganisms play in the host or environment.
However, it is a highly challenging biological task as it is estimated that only 1\% of bacteria are cultivatable. The inability to culture the majority of microbial species has motivated the use of culture-independent methods for microbiome studies in different environments \citep{faust2012microbial, tang2019microbial}.
Fortunately, recent innovations in in situ DNA sequencing provide opportunities to infer how microbes interact with one another or their environments. Modern studies on microbial interactions frequently rely on DNA sequencing techniques through the bioinformatic analysis of taxonomically diagnostic genetic markers (e.g., 16S rRNA) sequenced directly from a sample. The counts of the taxonomically diagnostic genetic markers can be used to represent the abundance of microbial species, e.g., Operational Taxonomic Units (OTUs) or phylotypes (e.g., genera), in a sample. Here, the frequency with which a taxon’s marker is observed in a sequence library represents its relative abundance in the community. When such abundance data are available from many communities, interactions among microbiota can be inferred through \textcolor{blue}{statistical} correlation analysis \citep{faust2012microbial}. \textcolor{blue}{For example}, if the relative abundances of two microbial taxa are statistically correlated, then it is inferred that they interact on some level. This approach has been used to document interaction networks in the healthy human microbiome \citep{faust2012microbial}, as well as free-living microbial communities \citep{freilich2010large}, and has been useful for generating hypotheses of host-microbiome interaction \citep{morgan2015associations}.
\subsection{Methodological Innovations}
\label{Sec-1.2}
Despite the great potential of microbiome interaction networks as a tool to advance microbiome research, the power of this approach has been limited by the availability of effective statistical methods and computationally efficient estimation techniques. Microbial abundance data possess a few important features that pose tremendous challenges to standard statistical tools. First, the data are represented as compositional counts of the 16S rRNA sequences because the total count of sequences per sample is predetermined by how deeply the sequencing is conducted, a concept named sequencing depth. The counts only carry information about the relative abundances of the taxa instead of their absolute abundances. Second, the sequencing depth is always finite and often varies considerably across samples in a microbiome dataset. Thus, the observed relative abundance of a taxon in a sample is only an estimator of its true relative abundance with the variance depending on sample-specific sequencing depth, causing the ``heteroscedasticity'' issue \citep{mcmurdie2014waste}. Third, the data are high-dimensional in nature. It is likely that the number of taxa is far more than the number of samples in any biological experiment.
When such abundance data are available, one common strategy to resolve the interactions among microbial taxa is to use correlation-type analyses. For example, after the sample correlations are calculated between \textcolor{blue}{the relative abundances of} each pair of microbial taxa, a threshold is then applied such that an interaction is deemed present if the sample correlation exceeds the threshold. More \textcolor{blue}{recently developed methods} have started to \textcolor{blue}{account for} the compositional feature and aim to construct sparse networks for the absolute abundances instead of relative abundances, \textcolor{blue}{including} SparCC \citep{friedman2012inferring}, CCLasso \citep{fang2015cclasso}, and REBACCA \citep{ban2015investigating}, \textcolor{blue}{among others.}
\textcolor{blue}{The above-mentioned network methods based on marginal correlations} could lead to spurious correlations that are caused by confounding factors such as other \textcolor{blue}{species} in the same community. \textcolor{blue}{To eliminate the detection of spurious correlations}, interactions among taxa can be modeled through their conditional dependencies given the other taxa. The Gaussian graphical model \textcolor{blue}{is a classical approach to modeling} the conditional dependency, \textcolor{blue}{in which the conditional dependency is determined by the nonzero entries of the inverse covariance matrix of a multivariate normal distribution used to model the data.} Graphical lasso \citep{yuan2007model, banerjee2008model, friedman2008sparse} and neighborhood selection \citep{meinshausen2006high} are two commonly used methods to estimate sparse inverse covariance matrix under the \textcolor{blue}{high-dimensional} Gaussian graphical model. However, \textcolor{blue}{when applied to microbiome abundance data, its multivariate normality assumption was violated by either the count or the compositional features of the data.}
Several methods have been proposed to infer microbial conditional dependence networks based on Gaussian graphical models, such as SPIEC-EASI \citep{kurtz2015sparse}, gCoda \citep{fang2017gcoda}, CD-trace \citep{yuan2019compositional}, and SPRING \citep{yoon2019microbial}. In order to transform the discrete counts to continuous variables and to remove the compositionality constraint, all these methods take the centered log-ratio transformation \citep{aitchison1986statistical} on the observed counts as their first step. However, the centered log-ratio transformation suffers from an undefined inverse covariance matrix of the transformed data. To partially address this issue, these methods impose a sparsity assumption on the inverse covariance matrix and adding an $L_1$-norm penalty to their objective functions. Additionally, these methods ignore the heteroscedasticity issue as they simply treat the observed relative abundances as the truth. Ignoring the heteroscedasticity issue could impact downstream analysis including constructing microbial interaction networks \citep{mcmurdie2014waste}.
In this article, we provide a new statistical tool to help unleash the full potential of microbiome interaction networks as a research tool in the microbiome field. We adopt the logistic normal multinomial distribution to model the compositional count data \citep{aitchison1986statistical, billheimer2001statistical, xia2013logistic}. Compared to previous methods, this model accounts for the heteroscedasticity issue as the sequencing depth is treated as the number of trials in the multinomial distribution. Additionally, the additive log-ratio transformation applied to the multinomial probabilities results in a well-defined inverse covariance matrix in contrast to the centered log-ratio transformation. Based on this model, we develop an efficient algorithm that iterates between Newton-Raphson and graphical lasso for estimating a sparse inverse covariance matrix. We call this new approach ``compositional graphical lasso''. We establish the theoretical convergence of the algorithm and illustrate the advantage of compositional graphical lasso in comparison to current methods under a variety of simulation scenarios. We further apply the developed method to the data from the Zebrafish Parasite Infection study \citep{gaulke2019longitudinal} (see Section \ref{Sec-1.3}) to investigate how microbial interactions associate with parasite infection.
\subsection{Zebrafish Parasite Infection Study}
\label{Sec-1.3}
Helminth parasites represent a significant threat to the health of human and animal populations, and there is a growing need for tools to treat, diagnose, and prevent these infections. A growing body of evidence points to the gut microbiome as an agent that interacts with parasites to influence their success in the gut. To clarify how the gut microbiome varies in accordance with parasitic infection dynamics, the Zebrafish Parasite Infection Study was a recent effort \citep{gaulke2019longitudinal} conducted at Oregon State University, which assessed the association of an intestinal helminth of zebrafish, \textit{Pseudocapillaria tomentosa}, and the gut microbiome of 210 4-month-old 5D line zebrafish. Among these fish, 105 were exposed to \textit{P.\ tomentosa} and the remaining 105 were unexposed controls. At each of the seven time points after exposure, a randomly selected group of 30 fish (15 exposed and 15 unexposed) were euthanized and fecal samples were collected. The parasite burden and tissue damage in \textit{P.\ tomentosa}-infected fish were also monitored over 12 weeks of infection.
Previous analyses \citep{gaulke2019longitudinal} of the Zebrafish Parasite Infection Study data have revealed that parasite exposure, burden, and intestinal lesions were correlated with gut microbial diversity. They also identified individual taxa whose abundance associated with parasite burden, suggesting that gut microbiota may influence \textit{P.\ tomentosa} success. Numerous associations between taxon abundance, burden, and gut pathologic changes were also observed, indicating that the magnitude of microbiome disruption during infection varies with infection severity. However, it remains unclear how parasite success may disrupt or be modulated by the microbial interactions in the gut. Understanding how the microbial interactions associate with parasitic infection can help resolve potential drug or diagnostic test for parasitic infection.
\subsection{Benchmarking and Novel Biological Discoveries}
\label{Sec-1.4}
To evaluate the performance of our method and to benchmark it against previously available tools, we take advantage of a unique data resource provided by the \textit{Tara} Oceans Project on ocean planktons. This data set is particularly suitable for method comparison because it enjoys an experimentally validated sub-network of plankton interactome that has served as a gold standard for method benchmarking. Compared to other methods, compositional graphical lasso performs better in reconstructing the microbial interactions that are validated by the literature. In addition, it performs the best in picking up the keystone taxa, which are those with an excessive number of interactions with other taxa in the literature, such as \textit{Amoebophyra} \citep{chambouvet2008control}, \textit{Blastodinium} \citep{skovgaard2012parasitic}, \textit{Phaeocystis} \citep{verity2007current}, and \textit{Syndinium} \citep{skovgaard2005phylogenetic}. All these genera are well-described keystone organisms in marine ecosystems. Finally, compositional graphical lasso affords an opportunity to resolve novel modulators of community composition. For example, as one of a few described genera within the syndinean dinoflagellates---an enigmatic lineage with abundant diversity in marine environmental clone libraries, \textit{Euduboscquella} \citep{bachvaroff2012molecular} ranked high in the degree distribution uniquely by compositional graphical lasso.
To investigate the role of the gut microbiome plays in the parasite infections, we apply compositional graphical lasso to the Zebrafish Parasite Infection Study data. {\color{blue}Interestingly, compositional graphical lasso identifies changes in interaction degree between infected and uninfected individuals for three taxa, \textit{Photobacterium}, \textit{Gemmobacter}, and \textit{Paucibacter}, which are inversely predicted by other methods. Further investigation of these method-specific taxa interaction changes reveals their biological plausibility, and provides insight into their relevance in the context of parasite-linked changes in the zebrafish gut microbiome. In particular, based on our observations, we speculate on the potential pathobiotic roles of \textit{Photobacterium} and \textit{Gemmobacter} in the zebrafish gut, and the potential probiotic role of \textit{Paucibacter}. Future studies should seek to experimentally validate the ecological roles of \textit{Photobacterium}, \textit{Gemmobacter}, and \textit{Paucibacter} in the zebrafish gut, including their impacts on the rest of the microbial community and their roles in infection induced tissue damage.}
\section{Compositional Graphical Lasso}
\label{Sec-2}
\subsection{Logistic Normal Multinomial Model}
\label{Sec-2.1}
Consider a microbiome abundance dataset with $n$ independent samples, each of which is composed of the observed counts of $K + 1$ taxa, denoted by $\mathbf{x}_i = (x_{i,1}, \ldots, x_{i,K+1})'$ for the $i$-th sample, $i = 1,\ldots,n$. Due to the compositional property of the data, the total count of all taxa for each sample $i$ is a fixed number, denoted by $M_i$. Naturally, a multinomial distribution is imposed on the observed counts:
\begin{equation}
\mathbf{x}_i | \mathbf{p}_i \sim \text{Multinomial}(M_i; p_{i,1}, \ldots, p_{i,K +1}), \label{multinomial}
\end{equation}
where $\mathbf{p}_i = (p_{i,1}, \ldots, p_{i,K+1})'$ are the multinomial probabilities for all taxa and $\sum_{k=1}^{K+1} p_{i,k} = 1$.
To apply the additive log-ratio transformation \citep{aitchison1986statistical} on the multinomial probabilities, we choose one taxon, without loss of generality the $(K+1)$-th taxon, as a reference to which all the other tax are compared. The transformed multinomial probabilities are given by
\begin{equation}
z_{i,k} = \log (\frac{p_{i, k}}{p_{i, K + 1}}),\ i = 1,\ldots,n, \ k = 1,\ldots,K. \label{log.ratio.transformation}
\end{equation}
Let $\mathbf{z}_i = (z_{i,1}, \ldots, z_{i,K})'$ for $i = 1,\ldots,n$, and further assume that they follow an i.i.d. multivariate normal distribution
\begin{equation}
\mathbf{z}_1, \ldots, \mathbf{z}_n \stackrel{i.i.d.}{\sim} N (\boldsymbol\mu, \boldsymbol\Sigma), \label{logistic.normal}
\end{equation}
where $\boldsymbol\mu$ is the mean and $\boldsymbol\Sigma$ is the covariance matrix. Let $\boldsymbol\Omega = \boldsymbol\Sigma^{-1}$ be the inverse covariance matrix or the precision matrix.
The above model given in (\ref{multinomial})--(\ref{logistic.normal}) is often referred to as the logistic normal multinomial model. In this model, a multinomial distribution is imposed on the compositional counts, which is the distribution of the observed data given the multinomial probabilities. In addition, to capture the variation of the multinomial probabilities across samples, we impose a logistic normal distribution on the multinomial probabilities as a prior distribution. We thereby obtain as our final model the logistic normal multinomial model, which is a hierarchical model with two levels.
The logistic normal multinomial model has a long history in modeling compositional count data and it has also been applied to analyze microbiome abundance data. For example, \citet{xia2013logistic} proposed a penalized regression under this model to identify a subset of covariates that are associated with the taxon composition. Our objective is different from \citet{xia2013logistic} as we aim to reveal the microbial interaction network by finding a sparse estimator of the inverse covariance matrix $\boldsymbol{\Omega}$ in (\ref{logistic.normal}). It is also noteworthy that \cite{jiang2020microbial} has the same objective as ours. However, \cite{jiang2020microbial} did not make full use of the logistic normal multinomial model as it focused on correcting the bias of a naive estimator of the $\boldsymbol{\Sigma}$ that does not require the logistic normal part of the model. By contrast, we aim to find an estimator of $\boldsymbol{\Omega}$ directly based on the logistic normal multinomial model.
\subsection{Objective Function}
\label{Sec-2.2}
{\color{blue}From the logistic normal multinomial model in (\ref{multinomial})--(\ref{logistic.normal}), we aim to derive an objective function of $\boldsymbol{\Omega}$ to estimate the microbial interaction network. To this end, we take a two-step procedure similar to SPIEC-EASI \citep{kurtz2015sparse}. In the first step, we find estimated values of $\mathbf{z}_1,\ldots,\mathbf{z}_n$ based on the logistic normal multinomial model given $\mu$ and $\boldsymbol{\Sigma}$; in the second step, we find an estimate of $\boldsymbol{\Omega}$ based on the estimated values of $\mathbf{z}_1,\ldots,\mathbf{z}_n$.
In the first step, we consider the posterior distribution of $\mathbf{z}_1,\ldots,\mathbf{z}_n$ given the data $\mathbf{x}_1,\ldots,\mathbf{x}_n$ and find the maximum a posteriori (MAP) estimates of $\mathbf{z}_1,\ldots,\mathbf{z}_n$. For $i=1,\ldots,n$, the logarithm of the posterior density function of $\mathbf{z}_i$ given $\mathbf{x}_i$ is
\begin{align*}
& \log[f_{\boldsymbol{\mu},\boldsymbol{\Omega}}(\mathbf{z}_i | \mathbf{x}_i)] \propto \log[f_{\boldsymbol{\mu},\boldsymbol{\Omega}}(\mathbf{x}_i, \mathbf{z}_i)] \\
\propto{}& \sum_{k=1}^{K+1} x_{i,k} \log p_{i,k} + \frac12 \log[\det(\boldsymbol{\Omega})] - \frac12 (\mathbf{z}_i - \boldsymbol{\mu})' \boldsymbol{\Omega} (\mathbf{z}_i - \boldsymbol{\mu}) \\
={} &\sum_{k=1}^{K} x_{i,k} z_{i,k} - M_i \log(\sum_{k=1}^K e^{z_{i,k}} + 1) + \frac12 \log[\det(\boldsymbol{\Omega})] - \frac12 (\mathbf{z}_i - \boldsymbol{\mu})' \boldsymbol{\Omega} (\mathbf{z}_i - \boldsymbol{\mu}),
\end{align*}
where $\propto$ denotes that two quantities are equal up to a term not depending on $\mathbf{z}_i$. In the above derivation, we ignored the marginal density function of $\mathbf{x}_i$ that does not depend on $\mathbf{z}_i$, which does not affect the estimation of $\mathbf{z}_i$.}
By independence between all the samples, the logarithm of the posterior density function of $(\mathbf{z}_1,\ldots,\mathbf{z}_n)$ given the data $(\mathbf{x}_1,\ldots,\mathbf{x}_n)$ can be written as (again, ignoring a term independent of $\mathbf{z}_1,\ldots,\mathbf{z}_n$):
\begin{equation}
\sum_{i=1}^n \left[\sum_{k=1}^{K} x_{i,k} z_{i,k} - M_i \log(\sum_{k=1}^K e^{z_{i,k}} + 1)\right] + \frac{n}2 \log[\det(\boldsymbol{\Omega})] - \frac12 \sum_{i=1}^n (\mathbf{z}_i - \boldsymbol{\mu})' \boldsymbol{\Omega} (\mathbf{z}_i - \boldsymbol{\mu}). \label{objective.function.1}
\end{equation}
Given the values of the multivariate normal parameters $\boldsymbol{\mu}$ and $\boldsymbol{\Omega}$, one can maximize (\ref{objective.function.1}) with respect to $(\mathbf{z}_1,\ldots,\mathbf{z}_n)$. This leads to the MAP estimator $(\hat\mathbf{z}_1,\ldots,\hat\mathbf{z}_n)$.
{\color{blue}In the second step, we find a sparse inverse covariance estimator of $\boldsymbol{\Omega}$ based on the estimate values $(\hat\mathbf{z}_1,\ldots,\hat\mathbf{z}_n)$. Hereby, we use the graphical lasso estimator, which minimizes the $L_1$ penalized negative log-likelihood function as follows:
\begin{equation}
-\frac{1}2 \log[\det(\boldsymbol{\Omega})] + \frac1{2n} \sum_{i=1}^n (\hat\mathbf{z}_i - \boldsymbol{\mu})' \boldsymbol{\Omega} (\hat\mathbf{z}_i - \boldsymbol{\mu}) + \lambda \|\boldsymbol{\Omega}\|_1. \label{objective.function.2}
\end{equation}
It turns out that the above two-step procedure is equivalent to minimizing an overall objective function with respect to both $\mathbf{z}_1,\ldots,\mathbf{z}_n$ and $(\boldsymbol{\mu},\boldsymbol{\Omega})$:
\begin{align}
\ell(\mathbf{z}_1,\ldots,\mathbf{z}_n,\boldsymbol{\mu},\boldsymbol{\Omega}) ={}& -\frac1n\sum_{i=1}^n \left[\sum_{k=1}^{K} x_{i,k} z_{i,k} - M_i \log(\sum_{k=1}^K e^{z_{i,k}} + 1)\right] \notag\\
& -\frac12 \log[\det(\boldsymbol{\Omega})] + \frac{1}{2n} \sum_{i=1}^n (\mathbf{z}_i - \boldsymbol{\mu})' \boldsymbol{\Omega} (\mathbf{z}_i - \boldsymbol{\mu}) + \lambda \|\boldsymbol{\Omega}\|_1. \label{objective.function}
\end{align}
In other words, $\mathbf{z}_1,\ldots,\mathbf{z}_n$, $\boldsymbol{\mu}$, and $\boldsymbol{\Omega}$ are all treated as unknown parameters in the minimization of the objective function (\ref{objective.function}).
It is noteworthy that similar ideas to the above two-step procedure have been used in existing microbial interaction network estimation methods. For example, SPIEC-EASI is also a two-step procedure. In its first step, the abundance counts are converted into their centered log-ratio transformed data; in its second step, either graphical lasso or neighborhood selection is applied to estimate a sparse inverse covariance matrix based on the centered log-ratio transformed data in the first step.
Although both our method and SPIEC-EASI can be regarded as two-step procedures, we underline two important distinctions between them. First, our method is based on the additive log-ratio transformation and SPIEC-EASI uses the centered log-ratio transformation. As mentioned in the Introduction, the centered log-ratio transformation suffers from an undefined inverse covariance matrix of the transformed data while the additive log-ratio transformation does not. Second, in the first step, our method accounts for the sequencing depths [$M_i$'s in (\ref{multinomial})] and further the uncertainty of the observed relative abundances, and thus addresses the heteroscedasticity issue. However, the heteroscedasticity issue is ignored in SPIEC-EASI.}
\subsection{Computational Algorithm}
\label{Sec-2.3}
The objective function (\ref{objective.function}) naturally includes three sets of parameters $(\mathbf{z}_1,\ldots,\mathbf{z}_n)$, $\boldsymbol{\mu}$, and $\boldsymbol{\Omega}$, which motivates us to apply a block coordinate descent algorithm. A block coordinate descent algorithm minimizes the objective function iteratively for each set of parameters given current values of the other sets. Given the initial values $(\mathbf{z}_1^{(0)},\ldots,\mathbf{z}_n^{(0)})$, $\boldsymbol{\mu}^{(0)}$, and $\boldsymbol{\Omega}^{(0)}$, a block coordinate algorithm repeats the following steps cyclically for iteration $t= 0,1,2,\ldots$ until the algorithm converges.
\begin{enumerate}[nosep]
\item Given $\boldsymbol{\mu}^{(t)}$ and $\boldsymbol{\Omega}^{(t)}$, find $(\mathbf{z}_1^{(t+1)},\ldots,\mathbf{z}_n^{(t+1)})$ that maximizes (\ref{objective.function}).
\item Given $(\mathbf{z}_1^{(t+1)},\ldots,\mathbf{z}_n^{(t+1)})$ and $\boldsymbol{\Omega}^{(t)}$, find $\boldsymbol{\mu}^{(t+1)}$ that maximizes (\ref{objective.function}).
\item Given $(\mathbf{z}_1^{(t+1)},\ldots,\mathbf{z}_n^{(t+1)})$ and $\boldsymbol{\mu}^{(t+1)}$, find $\boldsymbol{\Omega}^{(t+1)}$ that maximizes (\ref{objective.function}).
\end{enumerate}
Below, we will present the details of this algorithm in each iteration. For the initial values $(\mathbf{z}_1^{(0)},\ldots,\mathbf{z}_n^{(0)})$, we use their maximum likelihood estimators from the multinomial distribution, i.e.,
\[ {z}_{i,k}^{(0)} = \log (\frac{x_{i, k}}{x_{i, K + 1}}),\ i = 1,\ldots,n, \ k = 1,\ldots,K.\]
If $x_{i, k} = 0$ for some $i$ and $k$, we add a small constant to it to evaluate the log ratio. For the initial value $\boldsymbol{\mu}^{(0)}$, we have a closed form minimizer of $\boldsymbol{\mu}$ for (\ref{objective.function}) given the values of $(\mathbf{z}_1,\ldots,\mathbf{z}_n)$, which is $\boldsymbol{\mu} = \bar{\mathbf{z}} = \frac1n \sum_{i=1}^n \mathbf{z}_i$. Therefore, we set the initial value as $\boldsymbol{\mu}^{(0)} = \frac1n \sum_{i=1}^n \mathbf{z}_i^{(0)}$. Finally, for the initial value $\boldsymbol{\Omega}^{(0)}$, we use the estimate of the graphical lasso algorithm taking the sample covariance matrix computed from $\mathbf{z}_1^{(0)},\ldots,\mathbf{z}_n^{(0)}$ as input.
In step 1, given $\boldsymbol{\mu}^{(t)}$ and $\boldsymbol{\Omega}^{(t)}$, minimizing the objective function (\ref{objective.function}) with respect to $(\mathbf{z}_1,\ldots,\mathbf{z}_n)$ is equivalent to minimizing the following objective function with respect to each $\mathbf{z}_i$ separately, for $i = 1,\ldots,n$:
\begin{equation}
\ell_i^{(t)}(\mathbf{z}_i) = \frac12 (\mathbf{z}_i - \boldsymbol{\mu}^{(t)})' \boldsymbol{\Omega}^{(t)} (\mathbf{z}_i - \boldsymbol{\mu}^{(t)}) - \left[\sum_{k=1}^{K} x_{i,k} z_{i,k} - M_i \log(\sum_{k=1}^K e^{z_{i,k}} + 1)\right]. \label{objective.function.zi}
\end{equation}
The above objective function is a smooth and convex function in $\mathbf{z}_i$ with the following positive definite Hessian matrix
\begin{equation*}
\boldsymbol{\Omega}^{(t)} + \frac{M_i}{\left(\sum_{k=1}^K e^{z_{i,k}} + 1\right)^2} \left\{\left(\sum_{k=1}^K e^{z_{i,k}} + 1\right) \text{diag} (e^{\mathbf{z}_i}) - (e^{\mathbf{z}_i})(e^{\mathbf{z}_i})'\right\},
\end{equation*}
where $e^{\mathbf{z}_i} = (e^{z_{i,1}}, \ldots, e^{z_{i,K}})'$ and $\text{diag}(e^{\mathbf{z}_i})$ is the diagonal matrix with the diagonal elements $e^{z_{i,1}}, \ldots, e^{z_{i,K}}$. Therefore, we apply the Newton-Raphson algorithm to find the minimizer numerically. In addition, we implement a line search procedure in each Newton-Raphson iteration following the Armijo rule \citep{armijo1966minimization}. This procedure ensures sufficient decrease in the objective function at each iteration to prevent possible divergence of the algorithm.
Step 2 is similar to the initialization step, in which $\boldsymbol{\mu}$ has a closed-form solution and is updated as $\bar{\mathbf{z}}^{(t+1)} = \frac1n \sum_{i=1}^n \mathbf{z}_i^{(t+1)}$ from the current numerical values of $(\mathbf{z}_1^{(t+1)},\ldots,\mathbf{z}_n^{(t+1)})$ that are computed from the Newton-Raphson algorithm in step 1.
In step 3, given $(\mathbf{z}_1^{(t+1)},\ldots,\mathbf{z}_n^{(t+1)})$ and $\boldsymbol{\mu}^{(t+1)} = \bar{\mathbf{z}}^{(t+1)}$, the objective function for $\boldsymbol{\Omega}$ can be simplified as
\begin{align}
\ell^{(t)}(\boldsymbol{\Omega}) &= -\frac12 \log[\det(\boldsymbol{\Omega})] + \frac{1}{2n} \sum_{i=1}^n (\mathbf{z}_i^{(t+1)} - \boldsymbol{\mu}^{(t+1)})' \boldsymbol{\Omega} (\mathbf{z}_i^{(t+1)} - \boldsymbol{\mu}^{(t+1)}) + \lambda \|\boldsymbol{\Omega}\|_1, \notag \\
&= -\frac12 \log[\det(\boldsymbol{\Omega})] + \frac{1}{2} \mathrm{tr} (\mathbf{S}^{(t+1)} \boldsymbol{\Omega}) + \lambda \|\boldsymbol{\Omega}\|_1, \label{objective.function.omega}
\end{align}
where $\mathbf{S}^{(t+1)} = \frac{1}{n} \sum_{i=1}^n (\mathbf{z}_i^{(t+1)} - \bar{\mathbf{z}}^{(t+1)}) (\mathbf{z}_i^{(t+1)} - \bar{\mathbf{z}}^{(t+1)})'$. It is obvious that minimizing the objective function (\ref{objective.function.omega}) becomes a graphical lasso problem \citep{yuan2007model, banerjee2008model, friedman2008sparse}. It is well known that the graphical lasso objective function is a convex function in $\boldsymbol{\Omega}$ \citep{banerjee2008model} and efficient algorithms have been developed for its optimization \citep{friedman2008sparse}. In this paper, we implement this step using the graphical lasso algorithm included in the \texttt{huge} \citep{zhao2012huge} package in R.
The above block coordinate descent algorithm iterates between Newton-Raphson and graphical lasso and is designed specifically to optimize the objective function (\ref{objective.function}) for compositional count data. Therefore, we name this algorithm the compositional graphical lasso algorithm, and the entire approach the compositional graphical lasso method including both the model and the algorithm for the analysis of microbiome abundance data.
\subsection{Theoretical Convergence}
\label{Sec-2.4}
Unfortunately, the objective function (\ref{objective.function}) is not necessarily a convex function jointly in $(\mathbf{z}_1,\ldots,\mathbf{z}_n)$, $\boldsymbol{\mu}$, and $\boldsymbol{\Omega}$. However,
we have shown that it is convex in each of the three subsets of its parameters. The convergence property of such an optimization problem has been studied in the literature. For example, \cite{tseng2001convergence} studied the convergence property of a block coordinate descent method applied to minimize a nonconvex function with certain separability and regularity properties. We will establish the convergence property of the compositional graphical lasso algorithm following \cite{tseng2001convergence}.
Recall that our algorithm treats the three sets of parameters $(\mathbf{z}_1,\ldots,\mathbf{z}_n)$, $\boldsymbol{\mu}$, and $\boldsymbol{\Omega}$ as three blocks and optimizes for each block iteratively. In addition, as in \cite{tseng2001convergence}, the objective function (\ref{objective.function}) can be regarded as the sum of two parts, the first of which is an inseparable but differentiable function given by
\begin{equation}
\ell_0(\mathbf{z}_1,\ldots,\mathbf{z}_n,\boldsymbol{\mu},\boldsymbol{\Omega}) = \frac{1}{2n} \sum_{i=1}^n (\mathbf{z}_i - \boldsymbol{\mu})' \boldsymbol{\Omega} (\mathbf{z}_i - \boldsymbol{\mu}), \label{objective.function.inseparable}
\end{equation}
and the second of which is a sum of separable and differentiable functions given by $\ell_1(\mathbf{z}_1,\ldots,\mathbf{z}_n) + \ell_2(\boldsymbol{\Omega})$, where
\begin{align}
\ell_1(\mathbf{z}_1,\ldots,\mathbf{z}_n) &= -\frac1n\sum_{i=1}^n \left[\sum_{k=1}^{K} x_{i,k} z_{i,k} - M_i \log(\sum_{k=1}^K e^{z_{i,k}} + 1)\right], \label{objective.function.separable.1}\\
\ell_2(\boldsymbol{\Omega}) &= -\frac12 \log[\det(\boldsymbol{\Omega})] + \lambda \|\boldsymbol{\Omega}\|_1. \label{objective.function.separable.2}
\end{align}
\cite{tseng2001convergence} established the convergence property of a block coordinate descent algorithm under regularity conditions on $\ell_0$, $\ell_1$, and $\ell_2$.
To present the main convergence property of the compositional graphical lasso algorithm, let's review the definition of a cluster point in real analysis. A cluster point of a set $\mathcal{A} \subset \mathbb{R}^n$ is a real vector $\mathbf{a} \in \mathbb{R}^n$ such that for every $\delta > 0$, there exists a point $\mathbf{x}$ in $\mathcal{A}\setminus \{\mathbf{a}\}$ satisfying that $\|\mathbf{x} - \mathbf{a}\|_2 < \delta$. Obviously, any limit point of the set $\mathcal{A}$ is a cluster point. Furthermore, define a cluster point of the compositional graphical lasso algorithm to be a cluster point of the set $\{(\mathbf{z}_1^{(t)},\ldots,\mathbf{z}_n^{(t)},\boldsymbol{\mu}^{(t)},\boldsymbol{\Omega}^{(t)}): t = 0,1,2,\ldots\}$, which are minimizers found at each iteration $t$. Then, the following theorem presents a theoretical property for every cluster point of our algorithm as follows.
\begin{thm} \label{Thm-1}
Any cluster point of the compositional graphical lasso algorithm is a stationary point of the objective function (\ref{objective.function}).
\end{thm}
The proof of Theorem \ref{Thm-1} can be found in the supplementary materials. This theorem guarantees that a cluster point, usually a limit point, of the compositional graphical lasso algorithm, is at least a stationary point. It is noteworthy that there exists a global minimizer for the objective function in (\ref{objective.function}) because we have proved the coerciveness of the objective function in the proof \citep[Lemma 8.4]{calafiore2014optimization}. Therefore, to achieve global optimization in practice, one can run the algorithm multiple times starting with different initial values and choose the one solution that yields the smallest objective function among the multiple ones.
In addition, the values of the objective function at each iteration, i.e., \\
$\{\ell(\mathbf{z}_1^{(t)},\ldots,\mathbf{z}_n^{(t)},\boldsymbol{\mu}^{(t)},\boldsymbol{\Omega}^{(t)}): t = 0,1,2,\ldots\}$, will always converge. This is because that the objective function is bounded below (as $\ell_0 + \ell_2$ is bounded below as shown in the proof and $\ell_1 > 0$ by definition)
and our algorithm results in non-increasing objective function values between two iterations. Therefore, the values of objective function will always converge to a limit point. In practice, we have always observed the numerical convergence of both the minimizers and the values of the objective function after a certain number of iterations.
\subsection{Tuning Parameter Selection}
\label{Sec-2.5}
There is a large body of literature on the selection of a tuning parameter in the variable selection framework. Common approaches can be broadly categorized into three types: criteirion-based methods, prediction-based methods, and stability-based methods. Criterion-based methods such as Akaike information criterion (AIC) \citep{akaike1974new} and Bayesian information criteria (BIC) \citep{schwarz1978estimating} balance the model complexity and the goodness of fit, prediction-based methods such as cross validation \citep{stone1974cross, geisser1975predictive} and generalized cross validation \citep{golub1979generalized} aim to minimize the expected prediction error of the selected model on independent datasets. Stability-based methods such as stability selection \citep{meinshausen2010stability} and the Stability Approach to Regularization Selection (StARS) \citep{liu2010stability} select a model with high stability under subsampling or bootstrapping the original data.
In this work, we apply StARS to select the tuning parameter $\lambda$ in our objective function (\ref{objective.function}). In StARS, we draw $N$ subsamples without replacement from the original dataset with $n$ observations, each subsample of size $b$. For each value of the tuning parameter $\lambda$, we obtain an estimate of $\boldsymbol{\Omega}$, i.e., a network for each subsample. Then, we measure the total instability of these resultant networks across the $N$ subsamples. The total instability of these networks is defined by averaging the instabilities of each edge across the $N$ subsamples over all possible edges, where the instability of each edge is estimated as the twice the sample variance of the Bernoulli indicator of whether this edge is selected or not in each of the $N$ subsamples.
Starting from a large penalty which corresponds to the empty network, the instability of networks increases as $\lambda$ decreases. StARS stops and selects the tuning parameter to be the minimum value of $\lambda$'s with which the instability of the resultant networks is less than a threshold $\beta > 0$. In principle, StARS selects a tuning parameter so that the resultant network is the densest among networks with a total instability less than a threshold $\beta$ without violating some sparsity assumption. The selected network is the ``densest on the sparse side," as it starts with the empty network and stops when the instability first across the threshold.
\section{Simulation Studies}
\label{Sec-3}
\subsection{Simulation Settings}
\label{Sec-3.1}
To evaluate the performance of compositional graphical lasso, we conduct \textcolor{blue}{simulation studies} and compare it with other network estimation methods.
Given that our goal is to estimate the true network, i.e., $\boldsymbol{\Omega}$ in (\ref{logistic.normal}), we consider the following three types of true precision matrices $\boldsymbol{\Omega} = (\omega_{kl})_{1\le k,l \le K}$, which are different in the pattern of edge distributions as well as the degree of connectedness.
\begin{enumerate}[nosep]
\item Chain network: $\omega_{kk} = 1.5$, $\omega_{kl} = 0.5$ if $|k - l| = 1$, and $\omega_{kl} = 0$ if $|k - l| > 1$. A node is designed to be connected to its adjacent nodes, and the connectedness of nodes is balanced.
\item Random network: $\omega_{kl} = 1$ with probability $3/K$ for $k \ne l$. A node is connected to all other nodes randomly with a fixed probability, set to be $3/K$. Similar to the chain structure, the connectedness of nodes is balanced.
\item Hub network: All nodes are randomly split into $\lceil K / 20 \rceil$ disjoint groups, and a hub node $k$ is selected from each group. For any other node $l$ in the same group, $\omega_{kl} = 1$. All the remaining entries of $\boldsymbol{\Omega}$ are zero. Here, nodes are partitioned into the same group at random, but is then designated to be connected to the hub node at certain. The degree of connectedness among nodes is extremely unbalanced in this case: the hub nodes are connected to all the other nodes in its group (around 20 nodes) and all the other nodes are only connected to the hub node in its group, i.e., just one node.
\end{enumerate}
In addition to the true network, we also consider two other factors that are expected to influence the result. The first factor is the sequencing depth, $M_i$, in the multinomial distribution (\ref{multinomial}). \textcolor{blue}{We simulate $M_i$ from uniform distributions, the detail of which will be discussed in the following subsections.} The second factor is the degree of variation in the logistic normal distribution (\ref{logistic.normal}). For each of the three types of precision matrices, we consider an additional factor by multiplying a positive constant $c$ to $\boldsymbol{\Omega}$ so that the true precision matrix is $c\boldsymbol{\Omega}$. We choose $c = 1$ and $c = 1/5$ separately and call the two settings low and high compositional variation, respectively.
The data are simulated following the logistic normal multinomial model in (\ref{multinomial})--(\ref{logistic.normal}). We first simulate $\mathbf{z}_i \sim N (\boldsymbol{\mu}, \boldsymbol{\Sigma})$ independently for $i = 1,\ldots,n$; then, we perform the inverse log-ratio transformation (also know as the softmax transformation, the inverse transformation of (\ref{log.ratio.transformation})) to obtain the multinomial probabilities $\mathbf{p}_i$ for $i = 1,\ldots,n$; last, we simulate multinomial counts $\mathbf{x}_i$ from a multinomial distribution with sequencing depth $M_i$ and probabilities $\mathbf{p}_i$. Throughout this simulation study, we fix $n = 100$ and $K = 200$.
The simulation results are based on 100 replicates. For each replicate, we apply compositional graphical lasso, neighborhood selection, and graphical lasso separately to obtain a sparse estimator of $\boldsymbol{\Omega}$. For neighborhood selection and graphical lasso, we first obtain an estimate of $\mathbf{z}_1,\ldots,\mathbf{z}_n$ from the multinomial distribution via the additive log-ratio transformation
\begin{equation}
\tilde{z}_{i,k}= \log (\frac{x_{i, k}}{x_{i, K + 1}}),\ i = 1,\ldots,n, \ k = 1,\ldots,K, \label{z.surrogates}
\end{equation}
and then apply neighborhood selection and graphical lasso directly on the estimates $\tilde\mathbf{z}_1,\ldots,\tilde\mathbf{z}_n$ by treating them as surrogates for their true counterparts, i.e., $\mathbf{z}_1,\ldots,\mathbf{z}_n$. These methods are almost identical to SPIEC-EASI although we replaced the centered log-ratio transformation in SPIEC-EASI with additive log-ratio transformation for a fair comparison.
To compare the performance of the three methods in terms of network recovery, all three methods are applied with a sequence of tuning parameter values, and their true positive rates (TPR) and false positive rates (FPR) in terms of edge selection are recorded for each value of $\lambda$. An ROC curve is plotted from the average TPR and the average FPR over the 100 replicates for each of the tuning parameters.
In addition, we apply StARS to select an optimal tuning parameter $\lambda$. Following the recommendation in \citet{liu2010stability}, we set the threshold for the total instability to be $\beta = 0.05$, the size of each subsample $b = 7 \sqrt{n}$, and the number of subsamples $N = 50$. Once the optimal tuning parameter is determined by StARS, we fit the whole dataset with the selected tuning parameter and evaluate the resultant network using three criteria: precision, recall, and F1 score, which are defined as
\begin{equation*}
\text{Precision} = \frac{\text{TP}}{\text{TP} + \text{FP}},\quad \text{Recall} = \frac{\text{TP}}{\text{TP} + \text{FN}}, \quad \text{F1} = \frac{2 \times \text{Precision} \times \text{Recall}}{\text{Precision} + \text{Recall}},
\end{equation*}
where TP, FP, and FN are numbers of true positives, false positives, and false negatives, respectively.
\subsection{\textcolor{blue}{Simulation Results for Dense Data}}
\label{Sec-3.2}
\textcolor{blue}{In this subsection, we evaluate the performance of compositional graphical lasso on dense data, in which most of the simulated counts are nonzero. This corresponds to a simulation setting where the sequencing depths $M_i$'s are relatively larger than the number of taxa $K + 1$. Still, to evaluate the effect of the sequencing depth on the performance of network estimation methods, we simulate $M_i$ from two uniform distributions, Uniform$(20K, 40K)$ and Uniform$(100K, 200K)$, and call the two settings low and high sequencing depth in this subsection, respectively.}
Figure \ref{ROC} presents the ROC curves for compositional graphical lasso (Comp-gLASSO), neighborhood selection (MB), and graphical lasso (gLASSO), from which we can see that compositional graphical lasso dominates its competitors in terms of edge selection in all settings. In particular, the advantage of the compositional graphical lasso over neighborhood selection and graphical lasso is the most obvious when the compositional variation is high and the sequencing depth is low, no matter which type of network structure is considered. On the contrary, the three methods perform very similarly for all types of network structures when the compositional variation is low and the sequencing depth is high. The difference between compositional graphical lasso and the rest is intermediate for the other two settings when both compositional variation and sequencing depth are high or when both are low. Comparing graphical lasso and neighborhood selection, they tend to perform more similarly although graphical lasso seems to outperform neighborhood selection in some settings with a small margin.
\begin{figure}[h]
\centering
\includegraphics[width=0.8\textwidth]{ROC_MB.pdf}
\caption{ROC curves for compositional graphical lasso (Comp-gLASSO), graphical lasso (gLASSO) and neighborhood selection (MB). Solid blue: Comp-gLASSO; dashed red: gLASSO; dotted black: MB. $\mathbf{h/l, h/l}$: high/low sequencing depth, high/low compositional variation.}
\label{ROC}
\end{figure}
\begin{figure}[h]
\centering
\includegraphics[width=0.8\textwidth]{bar_graph_MB.pdf}
\caption{Recall, precision and F1 score for the network selected by StARS for compositional graphical lasso (Comp-gLASSO), graphical lasso (gLASSO) and neighborhood selection (MB). Red (left): Comp-gLASSO; green (middle): gLASSO; blue (right): MB. $\mathbf{h/l, h/l}$: high/low sequencing depth, high/low compositional variation.}
\label{Recall.Precision.F1}
\end{figure}
The above observations agree with our expectation about how the two factors, compositional variation and sequencing depth, affect the comparison between the methods. Recall that neighborhood selection and graphical lasso replace the true values of $\mathbf{z}_1,\ldots,\mathbf{z}_n$ by their estimates/surrogates $\tilde\mathbf{z}_1,\ldots,\tilde\mathbf{z}_n$ as in (\ref{z.surrogates}) without taking into account the estimation accuracy or uncertainty of these surrogates. First, a higher sequencing depth leads to more accurate surrogates $\tilde\mathbf{z}_1,\ldots,\tilde\mathbf{z}_n$; therefore, it is not surprising to see that the three methods perform more similarly when the sequencing depth is high. Second, a higher compositional variation results in a higher variation in $\mathbf{z}_i$'s and further in $\mathbf{p}_i$'s that are multinomial probabilities. Since neighborhood selection and graphical lasso ignore the multinomial component in the model, it is also not surprising to see that their performance is deteriorated by a high compositional variation.
Figure \ref{Recall.Precision.F1} presents the recall, precision, and F1 score from 50 replicates of the estimated network resulted from the tuning parameter selected by StARS. The first observation would be that the precisions of both compositional graphical lasso and graphical lasso are much worse than their recalls, whereas the precisions and recalls are more comparable for neighborhood selection. Interestingly, StARS results in a much more sparse network for neighborhood selection than the other methods under the same stability threshold, suggesting that fewer edges selected by neighborhood selection are stable enough (within the instability threshold). When it comes to method comparison, compositional graphical lasso has much higher recall than neighborhood selection in most settings, but have comparable or lower precision in most of the settings with high sequencing depth. The network from compositional graphical lasso has higher F1 score than the ones from neighborhood selection in most settings, except when sequencing depth is high and compositional variation is low for chain and hub networks. In addition, the network from compositional graphical lasso has higher or comparable precision, recall, and F1 score than the ones from graphical lasso in all settings. Similar to the observations from the ROC curves, the advantage of compositional graphical lasso is more obvious with a low sequencing depth or a high compositional variation.
\subsection{\textcolor{blue}{Simulation Results for Sparse Data}}
\label{Sec-3.3}
\textcolor{blue}{In this subsection, we evaluate the performance of compositional graphical lasso on sparse data, in which a range of proportions of the compositional counts are simulated as zero. We only present the simulation results for the chain network, given that the simulation results for the other network types are similar. To examine how our method performs for different sparsity levels, we simulate $M_i$ from four uniform distributions, Uniform$(8K, 16K)$, Uniform$(4K, 8K)$, Uniform$(2K, 4K)$, and Uniform$(K, 2K)$, respectively. Note that the sparsity level of the simulated data also depends on the compositional variation (see Section \ref{Sec-3.1}). In a typically simulated dataset with high compositional variation, the sparsity level is around 40\%, 50\%, 60\%, and 70\% with the four uniform distributions for $M_i$; in a typically simulated dataset with low compositional variation, the sparsity level is around 5\%, 10\%, 25\%, and 40\% with the four uniform distributions for $M_i$. In both cases, we refer to these four sparsity levels as 1, 2, 3, and 4, with 1 the least sparse and 4 the most sparse. Due to the limited space, we place the figures resulted from this simulation in the supplementary materials.}
\textcolor{blue}{Figure \ref{ROC_MB_Sparse} presents the ROC curves for compositional graphical lasso (Comp-gLASSO), neighborhood selection (MB), and graphical lasso (gLASSO). Similar to Figure \ref{ROC}, we can see that compositional graphical lasso dominates its competitors in terms of edge selection across all sparsity levels. As the sequencing depths for sparse data are relatively small compared to the ones used for dense data, the advantage of the compositional graphical lasso over neighborhood selection and graphical lasso is obviously and consistently observed in all simulation settings. In addition, graphical lasso and neighborhood selection tend to perform more similarly although graphical lasso seems to outperform neighborhood selection with a small margin. This result is consistent with that observed for dense data in Section \ref{Sec-3.2}.}
\textcolor{blue}{Figure \ref{Recall.Precision.F1.Sparse} presents the recall, precision, and F1 score from 50 replicates of the estimated network resulted from the tuning parameter selected by StARS. The first observation is that all methods perform worse for sparse data than for dense data from the comparison between Figure \ref{Recall.Precision.F1.Sparse} and Figure \ref{Recall.Precision.F1}; all methods perform worse as the sparsity level increases. Similar to Figure \ref{Recall.Precision.F1}, Figure \ref{Recall.Precision.F1.Sparse} implies that compositional graphical lasso outperforms graphical lasso and neighborhood selection, with a higher recall, precision, and F1 score consistently observed in most settings. The only exception is that, when data are extremely sparse with a low compositional variation, graphical lasso seems to outperform compositional graphical lasso by a very small margin as both methods are not working well. For sparse data, StARS results in an almost empty network for neighborhood selection, resulting in zero recall, precision, and F1 score for most settings. This agrees with our observation from the simulation results for dense data that neighborhood selection tends to produce a much sparser network than compositional graphical lasso and graphical lasso when its tuning parameter is selected by StARS.}
\section{Real Data}
\label{Sec-4}
\subsection{Benchmark Study: \textit{Tara} Oceans Project}
\label{Sec-4.1}
To better understand the ocean, the largest ecosystem on the earth, the \textit{Tara} Oceans Project aims to build the global ocean interactome that can be used to predict the dynamics and structure of ocean ecosystems. To achieve this, the \textit{Tara} Oceans Consortium sampled both plankton and environmental data at 210 sites from the world's oceans using the 110-foot research schooner \textit{Tara} during the \textit{Tara} Oceans Expedition (2009-2013). The data collected was later processed using sequencing and imaging techniques. One unique advantage of the \textit{Tara} Oceans Project is that it has generated a list of 91 genus-level marine planktonic interactions that have been validated in the literature \citep{lima2015determinants}. Though this list only comprises interactions between microbes that represent a small fraction of the total marine eukaryotic diversity and is therefore far from complete, it could serve as partial ground truth for us to evaluate the interactions identified by different methods. Thus, our major goal is to use the \textit{Tara} Oceans Project as a benchmark study in order to compare the performance of different methods in constructing the planktonic interactions.
As the partial ground truth is a list of genus-level interactions, we choose to analyze the genus-level abundance data, which are aggregated from the original OTU abundance data downloadable from the \textit{Tara} Oceans Project data repository (\url{http://taraoceans.sb-roscoff.fr/EukDiv/}). As a benchmark study, we only include the 81 genera that are involved in the list of gold-standard interactions in our analysis. In addition, we discard the samples with too few sequence reads (less than 100), resulting in 324 samples left in our analysis.
Similar to the simulation study, we apply compositional graphical lasso, graphical lasso, and neighborhood selection to estimate the interaction network among the 81 genera. We first pick the genus \textit{Acrosphaera}, which has the largest average relative abundance among those genera not involved in the gold-standard list, and use this genus as the reference taxon for all three methods. Then, we apply each method with a sequence of 70 decreasing tuning parameter values, resulting in a sequence of interaction networks starting from an empty network. Finally, we apply StARS to find the optimal tuning parameter, in which the parameters $\beta$, $b$, and $N$ are set the same as in the simulation study.
\begin{figure}[htbp]
\centering
\begin{subfigure}{.4\textwidth}
\centering
\includegraphics[width=1\linewidth]{TARA_path_half.pdf}
\caption{}
\label{tara_path}
\end{subfigure}%
\begin{subfigure}{.4\textwidth}
\centering
\includegraphics[width=1\linewidth]{TARA_degree_half.pdf}
\caption{}
\label{tara_degree}
\end{subfigure}
\caption{(a): Number of identified literature interactions versus number of edges of the estimated network from the \textit{Tara} dataset. (b): The degree distribution of vertices from the networks selected by StARS. Solid red: compositional graphical lasso; dashed green: graphical lasso; dashed dotted blue: neighborhood selection.}
\label{network.P}
\end{figure}
First, we compare the three methods in terms of how highly they rank the literature validated interactions amongst their top reported edges. Specifically, we start with a large value of the tuning parameter that results in an empty network, then decrease the tuning parameter so that the network becomes denser, and stop until the network has about 200 edges (out of a total of 3240 possible edges). At each value of the tuning parameter, we plot the number of literature validated interactions included in the network versus the total number of edges of the network, resulting in a step function for each method (Figure \ref{tara_path}). From Figure \ref{tara_path}, we observe that compositional graphical lasso identifies slightly more literature validated interactions than graphical lasso until the total number of edges arrives 175 and graphical lasso identifies one more literature validated interaction afterwards. Neighborhood selection selects much fewer literature validated interactions than either compositional graphical lasso or graphical lasso. These observations imply that compositional graphical lasso slightly outperforms graphical lasso in reconstructing the literature validated interactions, while its advantage over neighborhood selection is much more obvious.
Second, we compare the overall topologies of the three interaction networks with tuning parameters selected by StARS. We find that compositional graphical lasso, graphical lasso, and neighborhood selection identify 749, 921, and 190 edges, respectively, with the same instability threshold used in StARS. This agrees with our observation in the simulation study that the network from neighborhood selection is much sparser than those from compositional graphical lasso and graphical lasso. The degree distributions from the networks estimated by the three methods are shown in Figure \ref{tara_degree}.
The center of the three degree distributions are ranked as neighborhood selection, compositional graphical lasso, and graphical lasso in the ascending order, which is also reflected in the densities of the three interaction networks.
Third, we investigate the high-degree nodes, i.e., hub genera, in the interaction networks. High-degree nodes are often thought to represent taxa that elicit an effect on a large number of other members of their community, such as keystone taxa and generalistic parasites. It is observed that there are a few hub genera that have an excessive number of interactions with other genera in the literature, such as \textit{Amoebophrya}, \textit{Blastodinium}, and \textit{Parvilucifera}, which are referred to as benchmark hub genera. Although the literature validated interactions are rather incomplete, it is still of interest to evaluate how well the three methods pick up those benchmark hub genera. Since the density of networks from the three methods are rather different, it is hard to compare the degrees of the hub genera from the three networks directly, but it is reasonable to compare the ranks of those degrees within each degree distribution. The method that generates lower ranks (degree of genera ranked in descending order) for those hubs in their degree distribution are believed to pick up the benchmark hub genera better.
A list of 7 benchmark hubs (which has degree $\geq 5$) along with their degrees from the incomplete network constructed from the literature is shown in Table \ref{tab:degree rank of lit hubs}, followed by the corresponding ranks of those genera in the degree distributions from each of the three methods and their corresponding degrees in the parentheses. We can see that compositional graphical lasso generates lower ranks than graphical lasso for all 7 genera, while neighborhood selection generates lower ranks than compositional graphical lasso for 3 genera, and the opposite for the other 4 genera. Overall, compositional graphical lasso performs the best in picking up the benchmark hub genera among the three methods.
\begin{table}[htbp]
\centering
\begin{tabular}{lllll}
\hline
& Literature & Comp-gLASSO & gLASSO & MB \\
\hline
\textit{Amoebophrya} & 1 (21) & 31 (19) & 47 (21) & 2 (9) \\
\textit{Blastodinium} & 2 (12) & 13 (23) & 26 (24) & 30 (5) \\
\textit{Parvilucifera} & 2 (12) & 46 (17) & 67 (19) & 58 (3) \\
\textit{Syndinium} & 4 (7) & 14 (23) & 27 (24) & 19 (6) \\
\textit{Vampyrophrya} & 4 (7) & 34 (19) & 60 (20) & 6 (8) \\
\textit{Phaeocystis} & 6 (6) & 1 (31) & 3 (29) & 17 (6) \\
\textit{Pirsonia} & 7 (5) & 64 (15) & 68 (19) & 33 (5) \\
\hline
\end{tabular}
\caption{\label{tab:degree rank of lit hubs} For the hub genera, their ranks in each degree distribution (in descending order) from the literature, compositional graphical lasso (Comp-gLASSO), graphical lasso (gLASSO) and neighborhood selection (MB). The numbers in the parentheses are the corresponding degrees of the genera.}
\end{table}
We find that compositional graphical lasso predicts a high degree for genera that are known to act as keystone species or parasitize other taxa, many of which are also high-degree in the literature validated network. For example, \textit{Phaeocystis} elicits a high degree in both literature validated and compositional graphical lasso networks. This genus is a well-described keystone organism in some marine ecosystems \citep{verity2007current}, where it causes large phytoplankton blooms and plays an important role in the global cycling of carbon and sulfur \citep{verity1996organism}. Similarly, these two networks predict a high degree for taxa that are known parasites, such as \textit{Blastodinium} \citep{skovgaard2012parasitic}, \textit{Amoebophyra} \citep{chambouvet2008control}, and \textit{Syndinium} \citep{skovgaard2005phylogenetic}. In some instances, compositional graphical lasso uniquely reveals high-degree genera even when compared to the literature validated network, such as in the case of the parasite \textit{Euduboscquella} \citep{bachvaroff2012molecular}, which is ranked the 5th by compositional graphical lasso but only has 1 interaction in the literature. Given the fact that the literature validated network only captures a subset of interactions that exist in nature (i.e., those interactions that have been explicitly tested), we posit that compositional graphical lasso affords an opportunity to resolve novel modulators of community composition, such as keystone taxa and generalistic parasites, that follow-up experiments can validate.
\subsection{Zebrafish Parasite Infection Study}
\label{Sec-4.2}
The Zebrafish Parasite Infection Study, recently conducted at Oregon State University, used a zebrafish helminth intestinal infection model to resolve how the gut microbiome and parasite burden covary during infection \citep{gaulke2019longitudinal}. This study quantified the infection burden of an intestinal helminth of zebrafish, \textit{Pseudocapillaria tomentosa}, and the gut microbiome in 210 4-month-old zebrafish. Half of these fish were exposed to the parasite, \textit{P.\ tomentosa}, and the other half were unexposed. Given that not all exposed fish would be ultimately infected, parasite burden was measured more accurately as the total number of worms in their fecal samples. In addition, the same fecal samples were used to measure the abundance of the gut microbiome species via 16S rRNA sequencing, which resulted in gut microbiome data for 207 fish. Among these fish, 81 were infected after being exposed to \textit{P.\ tomentosa} and the other 126 fish were not infected, as indicated by the total number of worms. Our major goal is to evaluate how the microbial interaction network associates with successful parasite infection in the gut.
Similar to the \textit{Tara} Oceans Project, we choose to analyze the genus-level abundance data. We discard those genera that have a nonzero abundance in less than 5\% of the samples, resulting in 42 genera left in our analysis. In addition, we follow the same strategy to define a reference genus as in \citet{jiang2020microbial}, i.e., combining those OTUs that do not have a genus-level taxonomic classification into a pseudo-genus and using it as the reference genus. The analysis is conducted in the same way as in the \textit{Tara} Oceans Project, except that the methods (compositional graphical lasso, graphical lasso, and neighborhood selection) are applied separately for the uninfected and the infected fish, resulting in three interaction networks for each group of fish. Analyzing the uninfected and infected fish separately allows us to compare the microbial interaction networks between the two groups.
First, we compare the overall topologies of the interaction networks with tuning parameters selected by StARS. We find that compositional graphical lasso, graphical lasso, and neighborhood selection identify 262, 312, and 78 edges, respectively, for uninfected fish, and 241, 259, and 60 edges, respectively, for infected fish. Comparing the two groups of fish, the interaction networks for the uninfected fish are slightly denser than the infected fish. The comparison among the three methods agrees with our observation in the simulation study and in the \textit{Tara} Oceans Project that the network from neighborhood selection tends to be much sparser than those from compositional graphical lasso and graphical lasso. The degree distributions based on the three methods are shown in Figure \ref{fish_degree}, which again suggests high similarity between the two groups of fish. Similar to the \textit{Tara} Oceans Project, neighborhood selection results in the lowest median degree, followed by composition graphical lasso and graphical lasso, regardless of whether the fish are infected or not.
\begin{figure}[htbp]
\centering
\begin{subfigure}{.4\textwidth}
\centering
\includegraphics[width=1\linewidth]{not_infected_degree.pdf}
\caption{}
\label{not_infected_degree}
\end{subfigure}%
\begin{subfigure}{.4\textwidth}
\centering
\includegraphics[width=1\linewidth]{infected_degree.pdf}
\caption{}
\label{infected_degree}
\end{subfigure}
\caption{(a): The degree distribution of vertices from the networks selected by StARS for uninfected fish. (b): The degree distribution of vertices from the networks selected by StARS for infected fish. Solid red: compositional graphical lasso; dashed green: graphical lasso; dashed dotted blue: neighborhood selection.}
\label{fish_degree}
\end{figure}
Second, we further investigate the degree of each node in the interaction networks. This analysis helps identify those high-degree nodes, i.e., hub genera, which are indicative of keystone taxa in the microbial community. {\color{blue}Due to the limited space, we refer to Table \ref{fish_hubs} in the supplementary materials that presents all 42 genera with their degrees in each network in descending order.} Although the networks are similar in density between the two groups of fish, we have observed a substantial difference between the degrees of individual nodes. To see this we sort the nodes in each network based on their degrees and compare the top ten nodes between networks. Taking compositional graphical lasso as an example, only three out of the top ten nodes overlap between uninfected and infected fish: \textit{Paicibacter}, \textit{Photobacterium}, \textit{Fusobacterium}. This suggests that the network structures between the uninfected and infected fish are more distinctive than what their overall topologies might appear. The hub genera identified by different methods are quite different from each other too. For the group of uninfected fish, only three out of the top ten nodes overlap between the networks from the three methods: \textit{Aeromonas}, \textit{Photobacterium}, and \textit{Rheinheimera}; similarly, for the group of infected fish, only three out of the top ten nodes overlap between the networks from the three methods: \textit{Fusobacterium}, \textit{Paucibacter}, and \textit{Yersinia}.
{\color{blue}Third, we compare the networks generated from uninfected and infected fish to clarify the relationship between infection and the interactions that exist in the gut microbiome, motivated by the hypothesis that intestinal dysbiosis is defined not only by changes in community composition, but also by how members of the community ecologically interact. In order to understand this relationship, we identify microbes whose interaction set changes between infected and uninfected hosts then compare these results across methods. One of the bacterial taxa that compositional graphical lasso identifies as increasing in interaction degree among infected individuals, while other methods estimate a decrease in detected interaction degree, is the genus \textit{Gemmobacter}. Our earlier work \citep{gaulke2019longitudinal} showed that the abundance of this taxon positively links to parasite exposure, indicating that it is more ecologically successful in infected versus uninfected intestines. The analysis from compositional graphical lasso indicates that this increase in \textit{Gemmobacter} relative abundance in infected individuals is coincident with an increase in the ecological interactions between \textit{Gemmobacter} and other members of the gut microbiome, as it interacts with a greater number of other taxa in infected individuals. While \textit{Gemmobacter} is not a particularly well studied genus, prior work links it to dysbiotic diseases in a variety of hosts \citep{bates2022microbiome, ni2020gut}. Our observation of an increase in its interaction with other taxa in infected individuals strengthens the hypothesis that \textit{Gemmobacter} may act as an agent of dysbiosis, as its increase in its relative abundance not only links to a disease context, but its more integrated role in the microbial community (i.e., it potentially impacts a larger number of taxa in the gut).
The results from compositional graphical lasso also uniquely suggest that the \textit{Paucibacter} genus in uninfected individuals displays a higher number of identified interactions relative to infected individuals. The other methods we evaluated find that \textit{Paucibacter}'s interactions are relatively consistent between infected and uninfected individuals. The results from compositional graphical lasso are notable because the genus \textit{Paucibacter} includes clades that have been identified as being conserved in the healthy zebrafish gut microbiome \citep{sharpton2021phylogenetic}, presumably because these taxa are critical to the commensal microbial community. Based on our observations, namely that disruption to the broader microbiome by parasite infection appears to disrupt the set of interactions between \textit{Paucibacter} and other taxa in the community, we hypothesize that \textit{Paucibacter} is a keystone member of the healthy zebrafish gut microbiome and that parasite exposure induced dysbiosis occurs in part by disrupting \textit{Paucibacter} in the gut. Collectively, our observations reveal patterns of interaction between infected and uninfected individuals that clarify the potential ecological role of \textit{Gemmobacter} and \textit{Paucibacter}, which future research should seek to empirically test.}
{\color{blue}In addition to these observations about \textit{Gemmobacter} and \textit{Paucibacter}, compositional graphical lasso also finds insightful patterns about \textit{Photobacterium}, a genus which contains pathogens of marine fish \citep{romalde2002photobacterium, osorio2018photobacterium}, though its role as a pathogen in zebrafish is less clear.} However, as prior work has cultured \textit{Photobacterium} from the zebrafish gut \citep{cantas2012culturable} and other studies have demonstrated that \textit{Photobacterium} elicits toxicity to zebrafish cells in culture \citep{osorio2018photobacterium}, observations collectively point to \textit{Photobacterium} as a potential pathogen or pathobiont of zebrafish. Consistent with this speculation, prior work found that \textit{Photobacterium} statistically explained variation in \textit{P. tomentosa} worm burden as well as worm infection induced intestinal inflammation \citep{gaulke2019longitudinal}. We sought to determine if our interaction network analysis could clarify the role of \textit{Photobacterium} in the zebrafish gut microbiome, especially as it relates to parasite infection.
Interestingly, \textit{Photobacterium} is identified as an interaction hub (i.e., a relatively high degree node) in all networks assembled from all methods we evaluated. However, compositional graphical lasso uniquely reveals that the number of interactions linked to \textit{Photobacterium} increases in infected fish (19 edges) as compared to uninfected fish (16 edges), whereas the other approaches observe the opposite pattern (graphical lasso: 11 versus 17 edges; neighborhood selection: 3 versus 5 edges). These differences in the \textit{Photobacterium} subgraph across approaches also includes variation in the specific taxa that \textit{Photobacterium} is inferred to interact with. {\color{blue}To better understand changes in the set of \textit{Photobacterium} interactions, we extracted the first-degree sub-graph connected to \textit{Photobacterium} that each of the three methods produced for both the infected and uninfected host interaction networks. Compositional graphical lasso alone estimates eight interactions in the \textit{Photobacterium}-specific infected host network, and six of these eight genera have previously been linked to parasite exposure, disease burden, or histopathology score.} Two of these parasite etiology-linked taxa are \textit{Aeromonas} and \textit{Gemmobacter}, genera which are notable because they contain microbes that elicit pathogenic or pathobiotic phenotypes. For example, the \textit{Aeromonas} genus includes well-characterized and abundant opportunistic pathogens, such as \textit{A. hydrophila} \citep{saraceni2016establishment}, and the \textit{Gemmobacter} genus, as noted above, has been shown to opportunistically increase abundance \citep{huang2020exposure} in dysbiotic fish gut communities which display impeded overall gut function. {\color{blue}Given that \textit{Photobacterium} proliferates in the infected host gut, these observations suggest that \textit{Photobacterium} may work alongside and even promote the growth of other pathobiotic taxa to disrupt the composition of the gut microbiome and induce dysbiosis upon infection.}
Based on these collective observations, we hypothesize that \textit{Photobacterium} is an intestinal pathobiont of the zebrafish gut and contributes to dysbiosis in infected fish. \textit{Photobacterium} is a relatively prevalent genus in the zebrafish intestines, even in uninfected fish. However, \textit{P. tomentosa} infection links to an increase in the relative abundance of \textit{Photobacterium}, which also positively associates with intestinal hyperplasia \citep{gaulke2019longitudinal}, possibly due to the cytotoxic effect of \textit{Photobacterium}. Given that \textit{Photobacterium} is also an interaction hub whose influence on the community increases in infected fish, at least according to compositional graphic lasso, infection induced changes in \textit{Photobacterium} relative abundance may drive additional changes in the success of other taxa in the microbiome, including opportunistic pathogens and pathobionts like members of \textit{Aeromonas} and \textit{Gemmobacter}. Going forward, future studies should seek to experimentally validate our novel hypothesis about the pathobiotic role of \textit{Photobacterium} in the zebrafish gut, including its impact on the rest of the microbial community and its role in infection induced tissue damage. If our hypothesis is accurate, \textit{Photobacterium} may serve as an important model taxon for discerning how the gut microbiome and helminths interact to impact infection outcomes.
{\color{blue}Collectively, these results provide evidence for our hypothesis that in the case of intestinal helminth infection, dysbiosis may be defined by not only a change in the composition of the gut microbiome, but a restructuring in how key members of the microbial community interact with the rest of the microbiota. Notably, these patterns were only observed by compositional graphical lasso, as the other methods did not observe unique evidence of such infection-associated inversions for \textit{Gemmobacter}, \textit{Paucibacter}, or \textit{Photobacterium}.
Finally, we visualize the six genus interaction networks, three for infected fish and three for uninfected fish (Figure \ref{fish_StARS}). For a better visualization, we only keep the top $100$ edges for the networks resulted from compositional graphical lasso and graphical lasso as they are much denser than the ones from neighborhood selection. Their edges are ranked in the exactly same way as in the \textit{Tara} Oceans Study, first by selection probability and then by edge weight (see Figure \ref{tara_StARS} in the supplementary materials for details). For all networks, darker blue implies higher magnitude in the absolute value of partial correlation.
\begin{figure}[htbp]
\centering
\includegraphics[scale=0.8]{Fish_StARS_genus_level.pdf}
\caption{Inferred networks from each method with edges filtered by selection probability and ranked by edge weight separately for the groups of uninfected and infected fish. In each network, darker blue implies stronger (larger in absolute value) edge weight.}
\label{fish_StARS}
\end{figure}}
\section{Discussion}
\label{Sec-5}
A growing body of work points to the gut microbiome as an agent to treat, diagnose, and prevent human diseases. The innovation of these utilities requires foundational knowledge about the pathobiotic {\color{blue}or probiotic} role that the gut microbiome play in the development and progression of the diseases. While most studies have focused on investigating how the abundance of gut microbes covary with a disease, such as infection \citep{gaulke2019longitudinal}, how the microbial interactions associate with the diseases is largely unknown. Understanding how the microbial interactions associate with a disease is critical in identifying microbes as a pathobiont {\color{blue}or probiotic}, which are candidates for potential drug or diagnostic test.
This work focuses on gaining a better understanding of the underlying role that microorganisms play in their communities by constructing microbial interaction networks. We propose a novel method called compositional graphical lasso that simultaneously accounts for the following key features of microbiome abundance data: (a) the data are compositional counts and only carry information about relative abundances of the taxa; (b) the observed relative abundance is subject to heteroscedasticity as its variance depends on the varying sequence depth across samples; (c) the data are high-dimensional as the number of taxa are often larger than the number of samples. We have demonstrated the advantages of our approach over previously proposed methods in simulations and on a benchmark dataset.
We apply compositional graphical lasso to the data from the Zebrafish Parasite Infection Study, which used a parasite infection model to identify gut microbiota that positively and negatively associate with infection burden \citep{gaulke2019longitudinal}. {\color{blue}Our approach identified method-specific changes in interaction degree between infected and uninfected individuals for three taxa, \textit{Photobacterium}, \textit{Gemmobacter}, and \textit{Paucibacter}. Further investigation of these method-specific taxa interaction changes reveals their biological plausibility, and provides insight into their relevance in the context of parasite-linked changes in the zebrafish gut microbiome. In particular, we hypothesize that \textit{Photobacterium} and \textit{Gemmobacter} are pathobionts of zebrafish gut for parasitic infection and that \textit{Paucibacter} is a probiotic. Future studies should seek to experimentally validate their ecological roles in the zebrafish gut, including their impacts on the rest of the microbial community and their roles in infection induced tissue damage.}
It is noteworthy that compositional graphical lasso requires one to choose a reference taxon. As a general rule of thumb, we recommend choosing a ``common'' taxon that has a high average relative abundance and relatively few zero counts across samples, as its true relative abundance serves as the denominator in the additive log-ratio transformation. In practice, we also suggest that a user choose a taxon that is not of direct interest to investigate, as the reference taxon will not be represented in the resultant network. {\color{blue}It is also of interest to study how much the choice of the reference taxon may affect the estimated network, and whether some robustness could be guaranteed across different choices of the reference. Because the robustness against the choice of the reference is so important not just for compositional graphical lasso, but for many other network estimation methods as well, we have chosen to devote a major effort to this issue in a separate ongoing project. In this ongoing work, we have theoretically established the reference-invariance property of the inverse covariance matrix of a class of additive log-ratio transformation-based models, including the logistic normal multinomial model as a special case. However, as it is beyond the scope of this paper, this invariance property will be detailed in the future.}
\bibliographystyle{asa}
|
\section{Conclusion}
In this paper, we present {NARRATE}, a novel portrait stylization pipeline that enables high-quality perspective editing and relighting.
{NARRATE} leverages a hybrid neural-physical face model to generate photorealistic images under novel perspectives, as well as consistent input normal maps in relighting to create coherent new illumination effects.
It can further couple with various facial applications, boosting them in free-view and relightable manner.
We experimentally demonstrate that {NARRATE} produces more plausible and stable view editing and relighting results, outperforming existing state-of-the-art methods by a large margin.
To the best of our knowledge, {NARRATE} is the first approach that supports perspective and lighting adjustment at photographic quality. We believe it opens a new door for portrait stylization and has great potential to facilitate various AR/VR applications like virtual cinematography, 3D video conferencing, and post-production.
\bibliographystyle{ACM-Reference-Format}
\section{Introduction}
As a new technology, Wireless Sensor Networks (WSNs) has a wide
range of applications \cite{Akyildiz-01, Bahl-02, Culler-01}, including
environment monitoring, smart buildings, medical care, industrial and
military applications. Among them, a recent trend is to develop
commercial sensor networks that require pervasive sensing of both
environment and human beings, for example, assisted living
\cite{Akyildiz-02,CROSSBOW,Harvard-01} and smart homes
\cite{Adya-01, CROSSBOW, Harvard-01}.
\begin{quote}
``For these applications, sensor devices are incorporated into human
cloths \cite{Adya-01, Bahl-02, Natarajan-01, Zhou-06} for monitoring
health related information like EKG readings, fall detection, and
voice recognition''.
\end{quote}
While collecting all these multimedia information
\cite{Akyildiz-02} requires a high network throughput, off-the-shelf
sensor devices only provide very limited bandwidth in a single
channel: 19.2\,Kbps in MICA2 \cite{Bahl-02} and 250\,Kbps in MICAz.
In this article, we propose MMSN, abbreviation for Multifrequency
Media access control for wireless Sensor Networks. The main
contributions of this work can be summarized as follows.
\begin{itemize}
\item To the best of our knowledge, the MMSN protocol is the first
multifrequency MAC protocol especially designed for WSNs, in which
each device is equipped with a single radio transceiver and
the MAC layer packet size is very small.
\item Instead of using pairwise RTS/CTS frequency negotiation
\cite{Tzamaloukas-01, Adya-01, Culler-01, Zhou-06},
we propose lightweight frequency assignments, which are good choices
for many deployed comparatively static WSNs.
\item We develop new toggle transmission and snooping techniques to
enable a single radio transceiver in a sensor device to achieve
scalable performance, avoiding the nonscalable ``one
control channel + multiple data channels'' design \cite{Natarajan-01}.
\end{itemize}
\section{MMSN Protocol}
\subsection{Frequency Assignment}
We propose a suboptimal distribution to be used by each node, which is
easy to compute and does not depend on the number of competing
nodes. A natural candidate is an increasing geometric sequence, in
which
\begin{equation}
\label{eqn:01}
P(t)=\frac{b^{\frac{t+1}{T+1}}-b^{\frac{t}{T+1}}}{b-1},
\end{equation}
where $t=0,{\ldots}\,,T$, and $b$ is a number greater than $1$.
In our algorithm, we use the suboptimal approach for simplicity and
generality. We need to make the distribution of the selected back-off
time slice at each node conform to what is shown in
Equation~\eqref{eqn:01}. It is implemented as follows: First, a random
variable $\alpha$ with a uniform distribution within the interval $(0,
1)$ is generated on each node, then time slice $i$ is selected
according to the following equation:
\[
i=\lfloor(T+1)\log_b[\alpha(b-1)+1]\rfloor.
\]
It can be easily proven that the distribution of $i$ conforms to Equation
(\ref{eqn:01}).
So protocols \cite{Tzamaloukas-01, Akyildiz-01, Adya-01, Bahl-02, Culler-01,Zhou-06} that use RTS/CTS
controls\footnote{RTS/CTS controls are required to be implemented by
802.11-compliant devices. They can be used as an optional mechanism
to avoid Hidden Terminal Problems in the 802.11 standard and
protocols based on those similar to \cite{Akyildiz-01} and
\cite{Adya-01}.} for frequency negotiation and reservation are not
suitable for WSN applications, even though they exhibit good
performance in general wireless ad-hoc
networks.
\subsubsection{Exclusive Frequency Assignment}
In exclusive frequency assignment, nodes first exchange their IDs
among two communication hops so that each node knows its two-hop
neighbors' IDs. In the second broadcast, each node beacons all
neighbors' IDs it has collected during the first broadcast period.
\paragraph{Eavesdropping}
Even though the even selection scheme leads to even sharing of
available frequencies among any two-hop neighborhood, it involves a
number of two-hop broadcasts. To reduce the communication cost, we
propose a lightweight eavesdropping scheme.
\subsection{Basic Notations}
As Algorithm~\ref{alg:one} states, for each frequency
number, each node calculates a random number (${\textit{Rnd}}_{\alpha}$) for
itself and a random number (${\textit{Rnd}}_{\beta}$) for each of its two-hop
neighbors with the same pseudorandom number generator.
\begin{algorithm}[t]
\SetAlgoNoLine
\KwIn{Node $\alpha$'s ID ($ID_{\alpha}$), and node $\alpha$'s
neighbors' IDs within two communication hops.}
\KwOut{The frequency number ($FreNum_{\alpha}$) node $\alpha$ gets assigned.}
$index$ = 0; $FreNum_{\alpha}$ = -1\;
\Repeat{$FreNum_{\alpha} > -1$}{
$Rnd_{\alpha}$ = Random($ID_{\alpha}$, $index$)\;
$Found$ = $TRUE$\;
\For{each node $\beta$ in $\alpha$'s two communication hops
}{
$Rnd_{\beta}$ = Random($ID_{\beta}$, $index$)\;
\If{($Rnd_{\alpha} < Rnd_{\beta}$) \text{or} ($Rnd_{\alpha}$ ==
$Rnd_{\beta}$ \text{and} $ID_{\alpha} < ID_{\beta}$)\;
}{
$Found$ = $FALSE$; break\;
}
}
\eIf{$Found$}{
$FreNum_{\alpha}$ = $index$\;
}{
$index$ ++\;
}
}
\caption{Frequency Number Computation}
\label{alg:one}
\end{algorithm}
Bus masters are divided into two disjoint sets, $\mathcal{M}_{RT}$
and $\mathcal{M}_{NRT}$.
\begin{description}
\item[RT Masters]
$\mathcal{M}_{RT}=\{ \vec{m}_{1},\dots,\vec{m}_{n}\}$ denotes the
$n$ RT masters issuing real-time constrained requests. To model the
current request issued by an $\vec{m}_{i}$ in $\mathcal{M}_{RT}$,
three parameters---the recurrence time $(r_i)$, the service cycle
$(c_i)$, and the relative deadline $(d_i)$---are used, with their
relationships.
\item[NRT Masters]
$\mathcal{M}_{NRT}=\{ \vec{m}_{n+1},\dots,\vec{m}_{n+m}\}$ is a set
of $m$ masters issuing nonreal-time constrained requests. In our
model, each $\vec{m}_{j}$ in $\mathcal{M}_{NRT}$ needs only one
parameter, the service cycle, to model the current request it
issues.
\end{description}
Here, a question may arise, since each node has a global ID. Why
don't we just map nodes' IDs within two hops into a group of
frequency numbers and assign those numbers to all nodes within two
hops?
\section{Simulator}
\label{sec:sim}
If the model checker requests successors of a state which are not
created yet, the state space uses the simulator to create the
successors on-the-fly. To create successor states the simulator
conducts the following steps.
\begin{enumerate}
\item Load state into microcontroller model.
\item Determine assignments needed for resolving nondeterminism.
\item For each assignment.
\begin{enumerate}
\item either call interrupt handler or simulate effect of next instruction, or
\item evaluate truth values of atomic propositions.
\end{enumerate}
\item Return resulting states.
\end{enumerate}
Figure~\ref{fig:one} shows a typical microcontroller C program that
controls an automotive power window lift. The program is one of the
programs used in the case study described in Section~\ref{sec:sim}.
At first sight, the programs looks like an ANSI~C program. It
contains function calls, assignments, if clauses, and while loops.
\begin{figure}
\includegraphics{mouse}
\caption{Code before preprocessing.}
\label{fig:one}
\end{figure}
\subsection{Problem Formulation}
The objective of variable coalescence-based offset assignment is to find
both the coalescence scheme and the MWPC on the coalesced graph. We start
with a few definitions and lemmas for variable coalescence.
\begin{definition}[Coalesced Node (C-Node)]A C-node is a set of
live ranges (webs) in the AG or IG that are coalesced. Nodes within the same
C-node cannot interfere with each other on the IG. Before any coalescing is
done, each live range is a C-node by itself.
\end{definition}
\begin{definition}[C-AG (Coalesced Access Graph)]The C-AG is the access
graph after node coalescence, which is composed of all C-nodes and C-edges.
\end{definition}
\begin{lemma}
The C-MWPC problem is NP-complete.
\end{lemma}
\begin{proof} C-MWPC can be easily reduced to the MWPC problem assuming a
coalescence graph without any edge or a fully connected interference graph.
Therefore, each C-node is an uncoalesced live range after value separation
and C-PC is equivalent to PC. A fully connected interference graph is made
possible when all live ranges interfere with each other. Thus, the C-MWPC
problem is NP-complete.
\end{proof}
\begin{lemma}[Lemma Subhead]The solution to the C-MWPC problem is no
worse than the solution to the MWPC.
\end{lemma}
\begin{proof}
Simply, any solution to the MWPC is also a solution to the
C-MWPC. But some solutions to C-MWPC may not apply to the MWPC (if any
coalescing were made).
\end{proof}
\section{Performance Evaluation}
During all the experiments, the Geographic Forwarding (GF) by Akyildiz
et al.~\shortcite{Akyildiz-01} routing protocol is used. GF exploits
geographic information of nodes and conducts local data-forwarding to
achieve end-to-end routing. Our simulation is configured according to
the settings in Table~\ref{tab:one}. Each run lasts for 2 minutes and
repeated 100 times. For each data value we present in the results, we
also give its 90\% confidence interval.
\begin{table}%
\caption{Simulation Configuration}
\label{tab:one}
\begin{minipage}{\columnwidth}
\begin{center}
\begin{tabular}{ll}
\toprule
TERRAIN\footnote{This is a table footnote. This is a
table footnote. This is a table footnote.} & (200m$\times$200m) Square\\ \midrule
Node Number & 289\\
Node Placement & Uniform\\
Application & Many-to-Many/Gossip CBR Streams\\
Payload Size & 32 bytes\\
Routing Layer & GF\\
MAC Layer & CSMA/MMSN\\
Radio Layer & RADIO-ACCNOISE\\
Radio Bandwidth & 250Kbps\\
Radio Range & 20m--45m\\
\bottomrule
\end{tabular}
\end{center}
\bigskip\centering
\footnotesize\emph{Source:} This is a table
sourcenote. This is a table sourcenote. This is a table
sourcenote.
\emph{Note:} This is a table footnote.
\end{minipage}
\end{table}%
\section{Conclusions}
In this article, we develop the first multifrequency MAC protocol for
WSN applications in which each device adopts a
single radio transceiver. The different MAC design requirements for
WSNs and general wireless ad-hoc networks are
compared, and a complete WSN multifrequency MAC design (MMSN) is
put forth. During the MMSN design, we analyze and evaluate different
choices for frequency assignments and also discuss the nonuniform
back-off algorithms for the slotted media access design.
\section{Typical References in New ACM Reference Format}
A paginated journal article \cite{Abril07}, an enumerated
journal article \cite{Cohen07}, a reference to an entire issue \cite{JCohen96},
a monograph (whole book) \cite{Kosiur01}, a monograph/whole book in a series (see 2a in spec. document)
\cite{Harel79}, a divisible-book such as an anthology or compilation \cite{Editor00}
followed by the same example, however we only output the series if the volume number is given
\cite{Editor00a} (so Editor00a's series should NOT be present since it has no vol. no.),
a chapter in a divisible book \cite{Spector90}, a chapter in a divisible book
in a series \cite{Douglass98}, a multi-volume work as book \cite{Knuth97},
an article in a proceedings (of a conference, symposium, workshop for example)
(paginated proceedings article) \cite{Andler79}, a proceedings article
with all possible elements \cite{Smith10}, an example of an enumerated
proceedings article \cite{VanGundy07},
an informally published work \cite{Harel78}, a doctoral dissertation \cite{Clarkson85},
a master's thesis: \cite{anisi03}, an online document / world wide web
resource \cite{Thornburg01, Ablamowicz07, Poker06}, a video game (Case 1) \cite{Obama08} and (Case 2) \cite{Novak03}
and \cite{Lee05} and (Case 3) a patent \cite{JoeScientist001},
work accepted for publication \cite{rous08}, 'YYYYb'-test for prolific author
\cite{SaeediMEJ10} and \cite{SaeediJETC10}. Other cites might contain
'duplicate' DOI and URLs (some SIAM articles) \cite{Kirschmer:2010:AEI:1958016.1958018}.
Boris / Barbara Beeton: multi-volume works as books
\cite{MR781536} and \cite{MR781537}.
A couple of citations with DOIs: \cite{2004:ITE:1009386.1010128,
Kirschmer:2010:AEI:1958016.1958018}.
Online citations: \cite{TUGInstmem, Thornburg01, CTANacmart}.
\bibliographystyle{ACM-Reference-Format}
\section{Experimental Results}\label{sec:results}
We evaluate our NARRATE framework on a number of portrait stylization tasks, including perspective changes, relighting, animation, style change, etc, as well as their combinations.
We also discuss implementation details and compare them with the state-of-the-art techniques. It is worth noting that most existing approaches tackle only one specific effect whereas NARRATE can tackle multiple effects at the same time. Specifically, we show NARRATE is better at preserving find details, maintaining view consistency, producing more photorealistic relighting, on both images and videos.
\begin{figure*}[t]
\begin{center}
\includegraphics[width=\linewidth]{fill_images/style_result.pdf}
\end{center}
\vspace{-0.5cm}
\caption
\textbf{Style Transfer.} {NARRATE} supports to integrate with image stylizers, producing free-view images or videos with the target style. We show oil painting in top 2 rows and hatching in the last row. We change pose in Col 2,3,4 and light in Col.5. After editing, the results still preserve the coherence of input portrait appearance.
}
\label{fig:stylization}
\vspace{-0.3cm}
\end{figure*}
\subsection{Novel View Synthesis}
We first compare NARRATE with previous approaches on perspective changes for portraits. In prior art, the same effect corresponds to novel view synthesis whereas we provide explicit pose controls. We show NARRATE, using a hybrid neural physical approach, preserves photorealism as well as coherence.
We use the seminal work of {StyleSDF} with its pre-trained model~\footnote{https://github.com/royorel/StyleSDF} as baseline. Recall that the original StyleSDF serves as a generator, i.e., it synthesizes images from latent codes instead of directly changing style of a given portrait. We therefore need to neural inversion. We use the latest PTI~\cite{roich2021pivotal} inversion to find the closest generated image that resembles the input portrait. To elaborate, we follow the two-stage optimization strategy: we first fix the network weights and conduct 1,000 iterations to optimize the latent code and camera view; we then fix the latent and view point and perform extra 1,500 iterations to fine-tune the network weights.
We adopt the MSE and Perception loss between the input and the inverted images with the total loss as $\mathcal{L}=\lweightNote{MSE}\lossNote{MSE}+\lweightNote{Per}\lossNote{Per}$. We use the same setting as ~\cite{roich2021pivotal} with $\lweightNote{MSE}=0.1$ and $\lweightNote{Per}=1$. Using the PTI inverted image as input to StyleSDF produces our baseline results, a free-view portrait rendering along with a coarse mesh.
Using NARRATE's physical modeling module, we infer the portrait normal as discussed in Sec.~\ref{sec:normal} and then fuse it with the coarse mesh into a high-fidelity physical face model using Poisson integration. We texture the result with the original image and use Pytorch3D~\cite{ravi2020pytorch3d} to physically render the model. Finally, we fuse the physically-rendered component (the facial part) and the neural-inverted rest (hair, ear, clothing, background, etc) into the final result.
On a desktop with an Intel Core i9-10980XE CPU (3.00 GHz) and a NVIDIA TITAN RTX GPU (24GB memory), neural inversion converges in 20 minutes whereas the rest of the process takes only a few seconds.
Fig.~\ref{fig:perspective} compares perspective changes of three sample portrait, one for each row. The baseline {StyleSDF}+PTI technique produces reasonable results at individual new poses but the quality still falls short of photographic quality. NARRATE, with the support of geometry-aware generation, much better preserves fine details and produces portrait-level images. For example, closeup view of the eye and mouth regions demonstrate that the baseline tends to create overly-smooth appearance with many important details washed out, which, in contrast are well preserved by our technique.
A more severe artifact of the baseline is view consistency. In the supplementary video, we synthesize free view portrait videos both techniques. {StyleSDF} even with SDF constraints cannot fully account for detail consistency. This is largely due to the radiance field based multi-view SDF estimation is not yet capability of producing fine details, resulting in temporal (cross-view) aliasing and vibrations. In addition, such artifacts are magnified in portraits as human eyes are particularly acute to tell differences under view changes. In comparison, we impose the learned normal map, with is both high quality and free-view consistent and {NARRATE} produces stable and aliasing-free results.
\subsection{Free View Relighting}
Next apply {NARRATE} in free view relighting. Our approach predict plausible normal and albedo maps, achieving consistent illumination effects for arbitrary poses.
We use the dynamic OLAT dataset to conduct end-to-end training of the three individual modules of relighting network: the albedo prediction network $\network_A$, the normal prediction network $\network_N$, and the relighting network $\network_R$. We use the Adam optimizer~\cite{zhang2018improved} and set the learning rate to $10^{-3}$, and use SSIM with MSE loss functions. The training converges in 48 hours.
\begin{comment}
We next show the results of our multi-view consistent relighting, as shown in Fig.~\ref{fig:lighting_results}. For a given input image, we perform relighting in the input view and a new view respectively, and use our multi-view consistent normal as a prior for relighting. It can be seen that our results are consistent across views and maintain the geometric features of the portrait during relighting from different views.
Compared to estimation normal from novel-view RGB image, our method is a good solution to the instability caused by the difficulty of estimating the portrait normal in viewpoints such as side and top view. Fig.xxx shows a comparison of our method with the estimation normal from novel-view RGB image method. In some views, direct estimation from fusion RGB result leads to significant inconsistencies in the results, whereas our method is consistent across views.
We further demonstrate that our normal is more suitable for Relighting than computing normal from the SDF. Fig.xxx shows the qualitative comparison. Normal calculated from SDF causes an unnatural reflections in the eyes, cheeks etc., whereas our relighting results are more natural and realistic.
We also performed a quantitative comparison using OLAT data, which shown in Table.xxx. We generated xxx pairs of images by OLAT data by different environment illuminations, where one for the input and one for the target.
We use the two method of generating normal to relit the input image, and use PSNR, MSE to evaluate the results. The comparison shows that the results of our method are more accurate compared to the normal calculated by SDF.
\end{comment}
Fig.~\ref{fig:lighting_results} shows free-view relighting results on several portraits with different facial shapes and skin complexions. By applying a single normal map across different perspectives at the same time maintaining consistent 3D geometry, NARRATE achieves consistent relighting, captures facial contours, and preserves texture details.
Benefiting from the high-quality dynamic OLAT dataset, we virtually cast professional illuminations such as Rembrandt lighting on to the subject. A unique trait of our result is that it produces photographic quality similar to \cite{pandey2021total} whereas previous single image relighting techniques tend to lose many fine details and are limited to relatively simple lighting conditions. We can further use NARRATE for image retargetting: given an input portrait and a target one, we can simultaneously match the pose and lighting. Specifically, we can first estimate the pose and illumination of the target image and then use NARRATE to transform the input portrait to the target pose with corresponding lightings. Fig.~\ref{fig:lighting_results} shows a few examples where we manage to produce photographic quality retargeting results.
\begin{table}[t]
\centering
\resizebox{\linewidth}{!}{%
\begin{tabular}{|c|c|c|c|c|}
\hline
\multicolumn{1}{|c|}{Algorithm} & \multicolumn{1}{c|}{\textless $5^\circ$} & \multicolumn{1}{c|}{\textless $15^\circ$} & \textless $25^\circ$ & \textless $30^\circ$\\ \hline
StyleSDF & 66.637\% & 72.069\% & 78.635\% & 81.638\% \\ \hline
\textbf{Ours} & \textbf{67.449\%} & \textbf{75.288\%} & \textbf{81.281\%} & \textbf{83.5095}\% \\ \hline
\end{tabular}%
}
\caption{Normal Error on OLAT Dataset. We compare our normal and
StyleSDF normal on captured OLAT data. Our normal is more accurate
than StyleSDF.}
\label{table:normal}
\vspace{-0.5cm}
\end{table}
\begin{table}[t]
\centering
\begin{tabular}{|c|c|c|c|}
\hline
Method & SSIM$\uparrow$ & PSNR$\uparrow$ & RMSE$\downarrow$ \\ \hline
StyleSDF & 0.895 & 23.809 & 0.072 \\ \hline
Ours & \textbf{0.936} & \textbf{26.426} & \textbf{0.054} \\ \hline
\end{tabular}
\caption{Quantitative comparison on portrait relighting. We then apply the
two normal prediction in relighting. No surprisingly, our better normal also
brings better relighting results.}
\label{table:com_relit}
\vspace{-0.5cm}
\end{table}
One of the major benefits of NARRATE is that it produces coherent pose changes with consistent relighting effects. As we employ a high quality normal map as constraints for relighting across viewpoints and a hybrid neural-physical face model to ensure correctness in pose-based warping, we produce very smooth and natural transitions under continuous pose changes, e.g., for emulating a face turning from the front to the side, as shown in Fig.~\ref{fig:relighting_comp} and the supplementary video.
To demonstrate the importance of high quality normal maps, we further show the results using the normal map from {StyleSDF} for relighting. Although the overall geometry (e.g, per-view depth maps) from {StyleSDF} tends to be smooth, computing the normal maps from the estimated geometry leads to large errors, especially near eyes, cheeks, chin, etc. This is mainly because {StyleSDF} does not explicit use normal maps as constraints in either training or inference. Table.~\ref{table:normal} shows the quantitative comparisons between NARRATE and StyleSDF normals for relighting. For the ground truth, we use the OLAT data to generate 150 images under different environment illuminations. NARRATE achieves better performance in PSNR and MSE compared to using StyleSDF normal for relighting.
\subsection{Facial Animation and Style Transfer}
The capability of free-view relighting using NARRATE can be further integrated with existing tools to support additional stylization. Specifically, we demonstrate virtual facial animation and style transfers.
\paragraph{Facial Animation.}
Combined with {FOMM} model, {NARRATE} can be used to create free-view animated virtual human, with broad applications in virtual and augmented reality. Given a source image $\mathbf{I}$ and a drive video $D$, {NARRATE} can animate $\mathbf{I}$ to perform the same facial expression as $D$. In all experiments, we use the pre-trained {FOMM} model to drive the portrait without any fine-tuning.
Fig.~\ref{fig:animation_result} shows several sample animated faces under different viewpoints. Both the La La Land and Peking Opera clips demonstrate that we can convert a static portrait to live actions, whether singing or chanting, at the photorealism. At any time instance, we can render new viewpoints of the animated performance, potentially providing an immersive viewing experience to the audience. Our current implementation cannot yet achieve near real-time performance. Yet tailored accelerations may be possible to support real-time rendering and thereby upgrading the 2D avatar animator to 3D.
Another unique capability of {NARRATE} that it lifts the restriction of the input to {FOMM}: the original {FOMM} expects the input portrait to have a pose that matches the first frame of the video $\videoTarNote{1}$. Otherwise the final generated video exhibits strong distortions due to pose discrepencies. NARRATE eliminates this requirement: we can simply render the portrait at the pose of $\videoTarNote{1}$ and use it as input to {FOMM}. Fig.~\ref{fig:comp_animation} and the supplementary video compares the animated faces with and without using NARRATE for pose correction. With pose correction, facial distortions are significantly reduced and the final results appear much more natural.
Alternative one-shot facial animation solution such the Neural Talking Head (NHT)~\cite{wang2021one}, although effective, tend to lose facial details. This is mainly due to they do not employ full 3D facial geometry in the synthesis process. For example, NTH adopts a keypoint representation to decompose identity-specific and motion-related information and it can achieve robust pose synthesis under rotation as well as complex facial animation. However, keypoints alone are insufficient to maintain detailed geometry or appearance and their results cannot meet the quality of high resolution videos, e.g., for feature film productions. In contrast, by inferring a high quality neural physical face model, NARRATE can faithfully preserve details critical to preserve facial traits. NARRATE further provides effective relighting capabilities absent in prior art, to produce unprecedented lighting effects at a photographic quality. Fig.~\ref{fig:animation_result} and our supplementary video show a number of examples.
\begin{comment}
\wyj{lmz should fill the implementation details}
We next show the effect of our free-view images bring to facial animation. First we show the result in Fig.~\ref{fig:comp_animation}. We selected two Sources and drove them using two drivers. Our method enables the source to make the same action from different views and keeps the action consistent.
We also compared it with the method of one-shot[xxxx], the results of which are shown in Fig. xxx. Since the novel view prior is provided directly for the driven generator, our results are clearer and more consistent than the one-shot method. \wyj{should have a figure here.}
\end{comment}
\begin{figure}[H]
\begin{center}
\includegraphics[width=0.93\linewidth]{fill_images/animation_comp.pdf}
\end{center}
\vspace{-0.5cm}
\caption{
We compared our method with {FOMM}~\cite{fomm2019}. {NARRATE} supports large pose variations between the source and driving frames, producing animations with high-frequency details and vivid expression. On the contrary, {FOMM} fails to hand such a case, producing distorted and blurry results.
}
\label{fig:comp_animation}
\vspace{-0.3cm}
\end{figure}
\paragraph{Style Transfer.}
{NARRATE} maintains coherence of appearance under view and lighting changes as well as with animations. When combined with an image stylizer, it produces free-view point images or videos with the target style. Three are a number of high resolution image stylization tools based on either on classical physically-based rendering or emerging generative models. The former uses tailored shaders for processing known geometry primitives, e.g., hatching requires smooth surfaces to robustly estimate the hatching directions. The latter such as PixeltoPixelHD ~\cite{wang2018pix2pixHD} takes images as inputs without known geometry and can produce a wide variety of styles. As a hybrid neural physical model, {NARRATE} supports both types of stylization.
Fig.~\ref{fig:stylization} and the supplementary video show the typical examples of synthesizing the oil painting painting and hatching. For oil painting, we use {NARRATE} to produce a single image under the original or new lighting or a video sequence with continuous pose changes with fixed lighting or even track light with the movement. We then feed the results into our syylizer, the pix2pixHD network, to stylize individual frames. Combined with facial animation, style transfers on top of {NARRATE}'s free-view rendering can bring famous oil painting figures to live and viewable in 3D, providing surreal experiences to users.
Since most styles serve as de facto low-pass filters, they preserve perspective and temporal coherence of {NARRATE} generated results. A notable exception of hatching that produces additional high frequency details rather than smoothing. Applying image to image style transfer to emulate hatching effect cannot reach the quality as in classic rendering based methods, e.g., hatching should align with the principal directions on the mesh. Since {NARRATE} produces a high quality normal map, it is straightforward to directly compute the hatching directions to produce visually compelling results. More importantly, since the normal map is coherent across view direction changes, conducting geometry-based hatching on free-view portraits using {NARRATE} preserves view consistency, avoiding disturbing shower-door effect common in generation based results.
Finally {NARRATE} can unify pose change, relighting, facial animation, and style transfer into a fully automated pipeline, achieving these effects either separately or in combination, all at a photographic quality. Fig.~\ref{fig:stylization} shows an example with all four effects: a single portrait, we produce an oil painting style free-view video of the subject performing opera. In an Andy Wahol style matrix layout, we vary pose in one dimension and lighting the other. Each synthesized image maintains fine details in facial traits and hence identity and at the same time transitions across the matrix appear coherent and harmonious. Additional results can be found in the supplementary video.
\begin{figure}[t]
\begin{center}
\includegraphics[width=0.93\linewidth]{fill_images/failure.pdf}
\end{center}
\vspace{-0.5cm}
\caption{
We show two failure cases.
The first one contains odd camera angle that is beyond the training distribution. As a result, our neural model fails to run invert it to a reasonable view and geometry.
The glasses regions in the second example presents us from exacting correct normal for our physical model, also resulting in a distortion when changing views.
}
\label{fig:failure_case}
\vspace{-0.3cm}
\end{figure}
\subsection{Limitations}
We have verified {NARRATE} on a variety of applications, providing a new scheme for high quality portrait editing. However, as the first pipeline to accomplish all the goals, {NARRATE} still has the following limitations, as shown in Fig.~\ref{fig:failure_case}.
Firstly, our method relies on the inherent capabilities of the geometry-aware generative models, which would fail in the cases beyond the training distributions. E.g., when the camera angle is too lateral, {StyleSDF} produces poor fitting, leading the failure of {NARRATE} as well.
In addition, our physical model is built on top of the coarse geometry obtained from {StyleSDF}. However, the correctness of geometry is also limited in corner cases, especially when the person is wearing adornments (e.g. glasses, hat). This also influences accuracy of the physical model, bringing incorrect normal estimation and introducing artifacts when conducting photo editing. This problem existed in both neural part and physical part would be a valuable research topic in our future work.
\begin{figure*}[ht]
\begin{center}
\includegraphics[width=0.95\linewidth]{fill_images/gallery-2.pdf}
\end{center}
\vspace{-0.5cm}
\caption{
\textbf{Comprehensive editing.} We demonstrate the comprehensive editing ability of {NARRATE}. It can unify pose change, relighting, facial animation, and style transfer into a fully automated pipeline, achieving these effects either separately or in combination, all at a photographic quality. In row 2\&3, we show free-view relighting. In row 4\&5, we combine all the editing effects together.}
\label{fig:Gallery}
\vspace{-0.3cm}
\end{figure*}
\section{Introduction}
Even in today's digital era, portrait photography remains inarguably the most popular genre.
For any successful portrait, be it an actor still, a beauty shot, or a character study, \emph{lighting styles}, coupled with \emph{shooting angles}, play the key role to emphasize the subject's feature as well as to express artistic or dramatic intent. On lighting, popular loop lighting defines facial features with soft shadows to illustrate harmony whereas a half lit and half in shadow face by split lighting reflects the subject's inner struggle. Rembrandt lighting combines a key light and a fill light (e.g., a reflector) to cast a distinctive triangle of light on one cheek, baking a moody atmosphere. On shooting angle, front view (full face) shots highlight complete facial details to convey an assertive attitude whereas side view (profile) shots emphasize on the physical form-factor such as facial contours to exude character. Three-quarter views, popularized by self-portraits, reveal both with a personal touch.
Despite richness in styles, a portrait photograph, once taken, is fixed in its final presentation.
Editing its lighting and perspective to produce an equally compelling alternative, if possible at all, requires tremendous manual processing even for the professionals. Overall, restylizing the photograph not only requires using a disarray of advanced retouching tools but can be extremely time-consuming.
As such, an automated portrait stylization pipeline is highly valuable for photographers and visual artists as well as for daily users. Yet the challenges are multi-fold, including \textbf{geometrically correct perspective changes}, \textbf{persuasive lighting adjustment}, and \textbf{high photorealism maintenance}.
Face pose changes have long followed the warping pipeline that largely relies on accurate 3D facial geometry estimations. Exemplary techniques such as 3D morphable models (3DMM)~\cite{blanz1999morphable} can recover large scale geometry but tend to produce overly smooth surfaces that lack details. Further, 3DMM cannot model geometry beyond face such as hair, clothing, glasses, and even ears and consequently the morphing results exhibit strong visual artifacts in respective regions. Recent implicit solutions, popularized by generative models~\cite{gan2014}, can generate unseen portraits with convincing pose variations~\cite{karras2019style,shen2020interpreting}. However, as a generator, they do not readily support restylizing a given portrait. Techniques such as inversion~\cite{zhu2016generative} for fitting a latent code to the known image can lead to excessive blurs or distortions ~\cite{tov2021designing}.
Adjusting lighting, on the other hand, requires reliable estimations of a portrait's original illumination, facial reflectance, and facial normal.
Existing portrait relighting techniques have largely focused on fixed viewpoint retouching ~\cite{sun2019single,pandey2021total}. When applied to new facial poses, e.g., rigged using 3DMM, they produce strong visual artifacts with even slight illumination and shape inaccuracy and continuous pose changes generate strong flickering.
\begin{comment}
In this paper, we present a {NARRATE} (\textbf{N}ormal \textbf{A}ssisted \textbf{P}ortrait \textbf{St}yliz\textbf{er}) based on neural modeling and rendering that takes a single high resolution portrait as input and conducts pose change, style change, relighting, and facial animation, either separately or in combination, at a photographic quality.
At the core of {NARRATE} is a hybrid neural-physical face model that leverages complementary benefits of geometry-aware generative approaches ~\cite{orel2021styleSDF,ed3d,chanmonteiro2020pigan,gu2021stylenerf,zhou2021CIPS3D} and high fidelity normal estimation techniques ~\cite{pandey2021total}.
In a nutshell, {NARRATE} first infers an albedo map and a normal map from the portrait and then sets out to conduct neural inversion~\cite{roich2021pivotal} for finding a generated portrait that closely resembles the input.
The inverted portrait, although low in image quality, comes with coarse face geometry that together with facial normal and textures produces convincing pose changes. Other components of the portrait such as ear, hair, clothing, , etc are rendered directly via the multi-view generator. \wz{Is it too concise?} In particular, we demonstrate how the estimated normal maps further improves the robustness in inversion.
\end{comment}
In this paper, we present {NARRATE} (\textbf{N}ormal \textbf{A}ssisted \textbf{P}ortrait \textbf{St}yliz\textbf{er}), a novel portrait stylization pipeline
that takes a single high resolution portrait as input and conducts pose change, light change, facial animation, and style transfer, either separately or in combination, at a photographic quality.
At the core of {NARRATE} is a hybrid neural-physical face model that leverages complementary benefits of geometry-aware generative approaches ~\cite{orel2021styleSDF} and normal-assisted physical face models.
In a nutshell, {NARRATE} first conducts GAN inversion~\cite{roich2021pivotal} for finding a generated portrait that closely resembles the input.
In 3D-aware generation, the inverted portrait latent initiates a coarse geometry in order to produce convincing pose changes, as well as employs neural rendering to synthesize complete portrait effects including hair, ear, and clothing.
However, GAN inversion brings mismatch between the input and fitted images, resulting in low-quality, less detailed synthesis. Thus, we further adopt high fidelity normal estimation techniques to infer portrait albedo and normal information~\cite{pandey2021total} to enhance the coarse geometry to a high quality physical face model, synthesizing images full of realistic facial details with graphics rendering engines.
In particular, we fuse the two renderings to composite more realistic and consistent novel perspective images.
For relighting, we extend the fixed viewpoint framework~\cite{pandey2021total} to support consistent relighting over continuous viewpoint changes.
Instead of processing individual poses,
We show how to conduct neural relighting on all views at once
by imposing consistent normal and albedo maps from the same physical face model.
Our technique significantly suppresses flickering than per-frame based baseline where a user can specify exquisite lighting effects (e.g, Rembrandt) at any new poses to produce photographic portraits or videos.
{NARRATE} also supports dynamic animations and non-photorealistic stylization. Combined with either implicit or explicit animators~\cite{fomm2019}, {NARRATE} produces relightable free-viewpoint videos of virtual human talents such as opera singing, potentially useful for virtual cinematography and post-production.
We also bridge {NARRATE} with artistic style transfer tools~\cite{wang2018pix2pixHD, praun2001real}, creating 3D-aware styled images like oil painting and hatching drawing, bringing famous portrait paintings to life.
\begin{comment}
we first perform inversion~\cite{roich2021pivotal} to turn a 2D portrait into a 3D face and produce novel view images with neural rendering.
To alleviate the fitting mismatch and aliasing artifacts,
we enhance the coarse geometry with an inferred normal map~\cite{pandey2021total}, creating a high fidelity face mesh textured with the original image.
It is further passed through regular rendering engines~\cite{}, synthesizing new images full of realistic facial details. We fuse the two renderings to generate detailed images as well as keeping other regions like hair, glass and clothes.
By this way, we successfully produce photorealistic images for arbitrary perspectives.
We then relight novel views with desired illuminations. Inspired by~\cite{pandey2021total}, we train a decomposition network to map it into albedo and normal maps. The intermediate results are sent to a synthesis network to create exquisite lighting effects with manually specified illumination conditions. While~\cite{pandey2021total} is designed for fixed view,
processing each view independetly brings instablity lighing effects. We improve it by unifying the same normal input for all the views, producing stable and consistent relit images. Our method supports a wide range of complex lighting styles, producing realistic relighting effects as shown in the Fig.~\ref{fig:teaser}.
Beyond the high-quality free view relighting, our pipeline can be further extended to produce styled facial animations to support virtual cinematography, post-production, tele-presence, etc. We bridge our pipeline with image style transfer~\cite{} and facial animation~\cite{}. Such marriage brings dramatic reactions, allowing us to create delicate animations including magic photos in Harry Potter~\cite{} and vivid opera solo. {NARRATE} can be applied in more scenarios to help artists create exquisite effects, the only limitation is imagination.
\end{comment}
We summarize our contributions as follows:
\begin{itemize}
\item We propose {NARRATE}, a novel portrait stylization pipeline that supports editing perspective and lighting in a photorealistic manner.
\item Our hybrid neural-physical face model takes advantage of geometry-aware generative methods and normal-assisted physical models, fusing neural and graphics renderings to create plausible and stable free-view relighting effects.
\item {NARRATE} can further combine with animation and style transfer tools to synthesize delicate styled facial animation, demonstrating its potential in future AR/VR applications.
\end{itemize}
\begin{comment}
Previous works address it in two lines: reconstruction and generation. 3D face reconstruction from based methods. The former takes an 2D face image as input and predicts the corresponding xx and xx.
Generating such video portraits conveniently still remains challenging and has attracted substantive attention of both the computer vision and graphics communities.
In this paper, we focus on automatically and conveniently synthesizing a photo-realistic video portrait of a \textit{target} actor where the facial expression, the lighting condition and background are fully disentangled and controllable through various \textit{source} actors.
It is particularly challenging since humans are highly sensitive to facial inconsistency and the video portraits are influenced by the complex interaction of environment, lighting patterns and various facial attributes like material and specular reflection.
The most common practice for manipulating video portraits in the film industry still relies on tedious manual labor and sophisticated devices for reflectance field acquisition~\cite{debevec2000acquiring} or chroma-keying~\cite{wright2006digital}.
The recent neural techniques~\cite{NR_survey,kim2018deep} bring huge potential for convenient and highly-realistic manipulations, enabling compelling visual quality in various applications, such as visual dubbing~\cite{kim2019neural,ji2021audio}, telepresence~\cite{lombardi2018deep}, video post-editing~\cite{fried2019text,yao2020talkinghead} or audio-driven virtual assistant~\cite{thies2020neural}, even in real-time~\cite{thies2016face2face,thies2018headon}.
However, they still suffer from pre-baked shading of the specific training scenes without manipulating the illumination, which is critical for relighting applications in portrait photography like virtual cinematography.
On the other hand, various neural schemes with controllable portrait's lighting conditions have been proposed using high-quality pore-level 4D facial reflectance fields~\cite{debevec2000acquiring} acquired under multi-view and multi-lit configurations.
However, they are limited to image-based relighting~\cite{sun2019single,pandey2021total}, a subset of the reflectance field learning~\cite{sun2020light,meka2019deep} or relightable model and appearance reconstruction~\cite{guo2019relightables,meka2020deep,bi2021avatar}.
Researchers pay less attention to combine the background and lighting manipulation with face-interior reenactment into a universal data-driven framework.
In this paper, we attack the above challenges and present the first approach to generating relightable neural video portraits for a specific performer.
As illustrated in Fig.~\ref{fig:teaser}, with the aid of immediate and high-quality facial reflectance field inference, our approach endows the entire photo-realistic video portraits synthesis with the ability of fully disentanglement and control of various head poses, facial expressions, backgrounds, and lighting conditions.
This unique capability also enables numerous photo-realistic visual editing effects.
Our key idea is to combine high-quality 4D reflectance field learning, model-based facial performance capture and target-aware neural rendering into a consistent framework, so as to support convenient, realistic and controllable editing of neural video portraits.
To this end, for the temporal ground-truth supervision, we first build up a light stage setup to collect the dynamic facial reflectance fields of the target performer with one-light-at-a-time (OLAT) images under various sequential poses and expressions.
Then, with such target-specific OLAT data, the core of our approach is a novel rendering-to-video translation network design with the explicit head pose, facial expression, lighting and background disentanglement for highly controllable neural video portrait synthesis.
After training, reliable head pose and facial expression editing are obtained by applying the same facial capture and normalization scheme to the source video input, while our explicit OLAT output enables high-quality relit effect. This relit effect can not only match the portrait with the environment, but also simulate the rim-light to improve the matting quality for a better background replacement.
An encoder-decoder architecture is further adopted to encode the illumination weighting parameters of OLAT images from the corresponding relit images, enabling automatic lighting editing from natural source images.
Thus, our approach enables automatically and conveniently control of facial expression, lighting condition and background of the performer's video portrait with high photo-realism for various visual editing effects.
To summarize, our main contributions include:
\begin{itemize}
\setlength\itemsep{0em}
\item We demonstrate the new capability of simultaneous relighting and and expression transfer, which enables photo-realistic video portraits synthesis for various visual editing effects, with full disentanglement of expressions, backgrounds and lighting conditions.
\item We introduce a rendering-to-video translation network to transfer model-based input into high-fidelity facial reflectance fields, with a multi-frame multi-task learning strategy to encode content, segmentation and temporal information.
\item We propose to utilize hybrid model-based facial capture with a carefully designed semantic-aware facial normalization scheme for reliable disentanglement.
\end{itemize}
\end{comment}
\section{Overview}
\label{sec:overview}
In this section, we describe {NARRATE} pipeline and applications.
As shown in Fig.~\ref{fig:overview}, given a portrait image, {NARRATE} allows separate modifications to its perspective and lighting, enabling photorealistic and consistent editing effects at a photographic quality across different views.
{NARRATE} can further integrate with animation and style transfer tools to create free-view animated/styled faces,
benefiting AR/VR applications such as tele-presence as well as virtual cinematography.
We first describe photorealisitc free view synthesis and view-consistent relighting in Sec.~\ref{sec:perspective}. Then, we present free-view, relightable facial animation and style transfer applications in Sec.~\ref{sec:application}.
\section{Free-View Relight}\label{sec:perspective}
Take a portrait $\mathbf{I}$ as input, we set out to synthesize a novel view $\imageNote{\mathbf{v}}$ under a new camera perspective $\mathbf{v}$ while maintaining photorealism.
{NARRATE} adopts a hybrid neural-physical face model by leveraging a geometry-aware generative model and a normal-assisted physical face model.
As shown in Fig.~\ref{fig:overview} (left top), we first employ the powerful geometry aware generative models~\cite{orel2021styleSDF} and apply GAN inversion~\cite{roich2021pivotal} to reverse the input to the latent code. The generator then maps it to a coarse geometry $\meshNote{l}$ and conducts neural rendering to synthesize a high resolution novel view image $\imageNoteUp{\mathbf{v}}{\mathbf{n}}$. We describe detailed procedures in Sec.~\ref{sec:invertion}
We observe though that both inversion and neural rendering introduce artifacts in novel view synthesis, creating over-smoothed and aliasing results. As such, we further propose to enhance the result with normal-assisted physical meshes.
Specifically, we employ a normal estimation network (Sec~\ref{sec:fusion}) to obtain a detailed normal map $\mathbf{N}$ from the input $\mathbf{I}$. With the assistance of $\mathbf{N}$, we improve the generated coarse geometry $\meshNote{l}$ through Poisson normal integration~\cite{horn1986variational}, producing a high quality physical model $\meshNote{h}$. We then texture it with the original image and
render a new image $\imageNoteUp{\mathbf{v}}{\mathbf{m}}$ using the traditional pipeline~\cite{woo1999opengl}.
Finally, we fuse $\imageNoteUp{\mathbf{v}}{\mathbf{n}}$ and $\imageNoteUp{\mathbf{v}}{\mathbf{m}}$ and with Poisson blending~\cite{perez2003poisson} and generate a photorealistic image with much reduced artifacts while maintaining details. We discuss the physical model generation and fusion processes in Sec.~\ref{sec:normal} and Sec.~\ref{sec:fusion}, respectively.
\subsection{Neural Inversion}
\label{sec:invertion}
Geometry-aware generative models can now produce images under explicit geometry constraints, achieving better view consistency in novel view synthesis.
We build our pipeline on top of the {StyleSDF}~\cite{orel2021styleSDF} framework, currently viewed as the state-of-the-art.
StyleSDF first maps a latent code $\mathbf{z}$ to a coarse Signed Distance Field (SDF), where a low resolution image is generated via volume rendering~\cite{wang2021neus} with a specific camera view $\mathbf{v}$.
Different from 2D generation architectures~\cite{karras2019style,Karras2019stylegan2,Karras2021stylegan3}, its rendering process helps regularize generation with explicit geometrical constraints. This allows us to adjust $\mathbf{v}$ to render different viewpoints towards the same shape, resulting in consistent multi-view images.
Neural rendering (generally 2D CNN layers) is further employed to upsample the low resolution image to a high resolution one.
We denote the complete generation as $\imageNoteUp{\mathbf{v}}{\mathbf{n}}=\mathcal{G}(\mathbf{z}, \mathbf{v}; \mathbf{\theta})$ where $\mathcal{G}$ is the generator and $\mathbf{\theta}$ is its parameters. The SDF can also be used to extract a coarse mesh $\meshNote{l}$ as well as a low quality normal map $\normalNote{l}$ that will be used in later steps.
Conceptually, {StyleSDF} can be treated as a neural face model.
While {StyleSDF} is not designed for any subject, we perform GAN inversion to invert the input image $\mathbf{I}$ back to the latent $\mathbf{z}$. Once $\mathbf{z}$ is ready, we can utilize the generator to synthesize novel view images $\imageNoteUp{\mathbf{v}}{\mathbf{n}}$ under any camera view $\mathbf{v}$. We choose to use the state of the art method PTI~\cite{roich2021pivotal} technique. While PTI is designed for StyleGAN 2D inversion, we extend it for {StyleSDF} 3D inversion.
Specifically, PTI contains two stages. We first fix the weights $\mathbf{\theta}$ of the generator $\mathcal{G}$ and then optimize the latent code $\mathbf{z}$ as well as the camera view $\mathbf{v}$ such that the generated image would best match the input.
Notice that brute-force optimization over $\mathbf{z}$ generally produces blurred results~\cite{tov2021designing}. Alternatively, we can fix $\mathbf{z}$ and $\mathbf{v}$ but optimize the generator weights $\mathbf{\theta}$ to enforce the generated image closer to the input. In either case, we refine the initial results using normal maps in Sec.~\ref{sec:normal}. In our implementation, we adopt the same loss and regulation as PTI where more details can be found in ~\cite{roich2021pivotal}.
\begin{figure}[ht]
\begin{center}
\includegraphics[width=0.93\linewidth]{fill_images/normal_integration_v6.pdf}
\end{center}
\vspace{-0.5cm}
\caption
{NARRATE} creates its physical face model from high quality normal maps and depth priors. The former is inferred from a normal predictor while the latter comes from inverted coarse geometry. We perform Poisson normal integration for the outline region, generating a high-fidelity face mesh.}
\label{fig:normal_estimation}
\vspace{-0.3cm}
\end{figure}
\subsection{Hybrid Neural Physical Modeling}
\label{sec:normal}
Novel views synthesized from {StyleSDF} and PTI, although of a much higher quality than previous GAN-based results, still exhibit artifacts beyond acceptable as a photograph. The causes are two-fold: first, the image generated with PTI inversion still contains mismatch from the input portrait, especially for the regions with high frequency details. Second, precise view consistency only is only enforced on low resolution generated images whereas the upsampling process in neural renderings introduces additional aliasing and inconsistency, causing vibration under view changes when presented in a high resolution ~\cite{ed3d,chanmonteiro2020pigan}.
The visual artifacts are magnified on portraits due to incredible visual acuity of human for distinguishing human faces. To mitigate the problem, we employ an auxiliary normal-assisted physical face model.
Recall that {StyleSDF} generates not only 2D images but also the 3D geometry of the face, although it is coarse by nature. We thus aim to create a high quality face mesh,
textured with the original image, to enhance the facial details as well as reduce view inconsistency. We observe the coarse mesh $\meshNote{l}$ extracted from {StyleSDF} is too noisy to be directly used a proxy. We therefore propose to enhance the geometric quality by exploiting extra normal information.
To do so, we set out to infer a high quality normal map $\normalNote{h}$ from $\mathbf{I}$ via a normal predictor(Sec.~\ref{sec:fusion}), with which we then construct a high quality face mesh $\meshNote{h}$ from $\meshNote{l}$ with the assistance of $\normalNote{h}$ by Poisson integration. Note that $\normalNote{h}$ alone is insufficient for creating a high quality mesh $\meshNote{h}$: discontinuous regions (e.g., nose, mouth) exhibit ambiguity that can lead to the reconstruction of a flattened 3D face. We hence solve a constrained linear equations, where $\meshNote{l}$ provide depth priors in discontinuities whereas $\normalNote{h}$ sets out to preserve fine geometric details. In our implementation, we focus on the front face as it contains more details. Next, we re-project $\meshNote{h}$ to the image with camera view $\mathbf{v}$ and use the original image as the texture. We take $\meshNote{h}$ as our normal-assisted physical model that supports being
rendered at arbitrary view $\tilde{\view}$ with full details obtained from the front view. Fig. ~\ref{fig:normal_estimation} shows how $\meshNote{h}$ is reconstructed.
\begin{figure}[t]
\begin{center}
\includegraphics[width=0.93\linewidth]{fill_images/PTI_result.pdf}
\end{center}
\vspace{-0.5cm}
\caption
Neural Inversion only generates images missing facial details. {NARRATE} compensates it by hybrid neural-physical model, achieving more detailed and realistic results
In addition, it provides better surface normal maps, which helps in the subsequent relighting and other applications.}
\label{fig:PTI_result}
\vspace{-0.3cm}
\end{figure}
\subsection{Warping and Relighting}
\label{sec:fusion}
With renderings from both neural and physical models, we are able to create high quality, view-consistent images under arbitrary views.
For a new camera view $\tilde{\view}$, we synthesize a RGB image, as well as a normal map which is further used in subsequent relighting module and applications.
The final RGB image $\imageNote{\tilde{\view}}$ is fused from the {StyleSDF} generation $\imageNoteUp{\tilde{\view}}{\mathbf{n}}$ and the mesh-rendered image $\imageNoteUp{\tilde{\view}}{\mathbf{m}}$. $\imageNoteUp{\tilde{\view}}{\mathbf{n}}$ contains a complete portrait with all essential regions such as hairs, clothing, ears (and ear rings), and the even background that are critical for preserving photorealistic. At the same time, recall $\imageNoteUp{\tilde{\view}}{\mathbf{m}}$ only presents the main face region but with fine details.
We therefore create $\imageNote{\tilde{\view}}$ by fusing the two by Poisson blending~\cite{perez2003poisson}. In our experiments, we observe the Poisson scheme marginally impacts photorealism but manages to maintain high consistency under view changes.
We further compute an companion normal map generated by applying the same fusion technique to two normal maps, the first from {StyleSDF} SDF whereas the other from rendering under camera pose changes with the normal map and mesh from $\meshNote{h}$. Fig.~\ref{fig:PTI_result} compares our method with PTI where our technique significantly improves the visual fidelity in both detail preservation and noise reduction over the PTI result. Fig.~\ref{fig:fusion_pipeline} shows sample results using our technique under view changes.
Next we present a technique for relighting the free view portrait images with user specified illumination patterns. Existing single image relighting techniques ~\cite{sun2019single,pandey2021total} produce promising results but unanimously assume fixed viewpoint.
Directly applying such methods to free-view images produces inconsistent and even flicking results. We reduce such artifacts by employing the normal maps as constraints to enforce high-fidelity, consistent relighting effects across the views.
We follow a similar relighting process as ~\cite{pandey2021total} with three key modules: a normal prediction network$\network_N$, an albedo prediction network $\network_A$ and a relighting network $\network_R$. Since \cite{pandey2021total} has not yet open sourced their solution, we therefore implemented our own version using a newly captured OLAT dataset. Specifically, we have constructed a photometric capture stage composed with 114 LED light sources synchronized with a companion 4K video camera. Using illumination multiplexing with optical flow compensation, we managed to capture dynamic OLAT video sequences at 25 fps. In our training dataset, we use 600K OLAT images covering 36 performances (18 male and 18 females) under 2810 HDR environment maps. In our experiments, we observe they are sufficient to handle a diverse class of portraits in facial shapes, complexions, skin textures (e.g., wrinkles).
We follow the ~\cite{ronneberger2015u} footprint and use U-Net as the backbones for $\network_N$, $\network_A$, and $\network_R$ and follow the same training strategy as \cite{pandey2021total}. Since the OLAT data can be used to extract the ground truth albedo and normal maps via photometric stereo, we use the OLAT results for training the complete network. This allows us to first predict a high quality normal map $\mathbf{N}$ from the input portrait $\mathbf{I}$, where $\mathbf{N} = \network_N(\mathbf{I})$ that has been used to support free view generation, as described in Sec.~\ref{sec:normal}. We can then apply the albedo network to extract the reflectance map $\image_A = \network_A(\mathbf{I}, \mathbf{N})$. Finally, we generate the relighted image $\image_R$ using the relighting network $\image_R=\network_N(\image_A, \mathbf{N}, \light_e)$, where $\light_e$ refers to a user specified environment map.
\begin{figure}[t]
\begin{center}
\includegraphics[width=0.93\linewidth]{fill_images/Fusion_pipeline.pdf}
\end{center}
\vspace{-0.5cm}
\caption
Once the hybrid neural-physical model is ready, we can easily render novel view images from both neural part and physical part(middle). We then use Poisson image blending to fuse them and get the final image(right).}
\label{fig:fusion_pipeline}
\vspace{-0.3cm}
\end{figure}
A key different between NARRATE and TotalRelighting is that NARRATE supports relighting at a new viewpoint $\imageNote{\tilde{\view}}$. Conceptually one can first conduct free-view rendering and then apply ~\cite{pandey2021total,sun2019single} on $\imageNote{\tilde{\view}}$. This would require estimating a per-viewpoint normal $\normalUp{\tilde{\view}}=\network_N(\imageNote{\tilde{\view}})$ and a per-viewpoint albedo map $\imageAlbedoUp{\tilde{\view}}=\network_A(\imageNote{\tilde{\view}}, \normalUp{\tilde{\view}})$. Such an implementation is not only expensive but also difficult to maintain consistency across views in normal and albedo estimation. In addition, robustly estimating normal maps from side views remains challenging, especially due to discontinuity caused by occlusions, e.g., the nose will partially occlude the cheek.
Alternatively, similar to NARRATE, one can warp the normal field from the front view to new perspectives to void redundant computations. However, such a warping requires using 3D geometry (depth maps) where integrating the normal field relies on accurate boundary estimation. In addition, when $\tilde{\view}$ is close to side views, warping the normal map needs to accurately resolve occlusions. In NARRATE, the front view normal map is computed using the fusion method (Sec.~\ref{sec:fusion}) whereas the boundary is provided by the SDF geometry. This allows us to conduct warping-based relighting without performing per-view normal re-estimation, i.e., $\imageRelitUp{\tilde{\view}}=\network_N(\imageAlbedoUp{\tilde{\view}}, \normalhighqualUp{\tilde{\view}}, \light_e)$ where $\imageAlbedoUp{\tilde{\view}}=\network_A(\imageNote{\tilde{\view}}, \normalhighqualUp{\tilde{\view}})$.
\begin{comment}
XXX: 不知道你在说什么。
The availability of coarse geometry from the face generator complements the normal map: our fused results improve albedo and lighting estimations as well as help maintain view consistency. To reiterate the relighting process, we start XXX.
你必须要写relighting的方法,我们olat的数据怎么来,网络怎么设计。用自己的话说;怎么用我们的完整几何benefit了process。必须给我三段话;
一段网络结构,方法;
一段数据采集;
一段limitation:
It is important to note that the original TotalRelighting that recovers a single normal map is insufficient to support view changes. XXX: why; 我们怎么改进;特别要说明我们的一点点改进。In addition, the recovered normal map from non-frontal view portraits are incomplete due to occlusions, undermining albedo estimation and subsequent relighting. We refer the reviewers to the supplemental video for details.
\end{comment}
\begin{figure*}[t]
\begin{center}
\includegraphics[width=0.93\linewidth]{fill_images/Perspective.pdf}
\end{center}
\vspace{-0.5cm}
\caption{\textbf{Photorealisitc Free View Synthesis Result.} Our method produces high quality portrait images of new perspectives. This method generates images with greater clarity than using the StyleSDF's Generator directly after PTI and maintains the maximum number of features of the portrait, including freckles, eyes, lips, etc.}
\label{fig:perspective}
\vspace{-0.3cm}
\end{figure*}
\section{Portrait Stylization}
\label{sec:application}
In addition to viewpoint changes and relighting, our hybrid neural physical facial model supports a variety of stylization.
\subsection{Facial Animation}
{NARRATE} can be integrated with facial animation tools for creating realistic animated avatars.
Here, given a target video $D$ , our goal is to drive the source image $\mathbf{I}$ to behave the same actions and expressions as each frame in $D$ while keeping its own content identity.
In our system, we modify the popular image animation method {FOMM}~\cite{fomm2019}. The original {FOMM} assumes that the source image and the first frame in the target video $D$ are aligned, i.e., they have to have an identical pose. This is a strong constraint that greatly limits its applicable to the types of input portrait. As {NARRATE} supports view changes while maintaining realism, we can easy first produce a portrait to match the initial pose of the video and then conduct animation transfer.
To reiterate, given a source image $\mathbf{I}$ and the $t$-th frame $\videoTarNote{t}$ in the driving video, {FOMM} detects the keypoints and estimates a backward dense motion field $\motionFieldNote{\mathbf{I}}{\videoTarNote{t}}$ in the form of per-pixel correspondence from $\videoTarNote{t}$ to $\mathbf{I}$, along with an occlusion field $\occlusionFieldNote{\mathbf{I}}{\videoTarNote{t}}$. A generator $\mathbf{G}$ is further employed to synthesize the animated image $\imageNote{\videoTarNote{t}}$, where $\imageNote{\videoTarNote{t}} = \mathbf{G}(I, \motionFieldNote{\mathbf{I}}{\videoTarNote{t}}, \occlusionFieldNote{\mathbf{I}}{\videoTarNote{t}})$. Although highly effective, the final quality using ~\cite{fomm2019} depends on accurate motion field estimations and thereby requires $\mathbf{I}$ and the first frame $\videoTarNote{1}$ be well aligned.
We exploit the free view generation capability of {NARRATE} for supporting {FOMM} to drive a source image with any pose. Specifically, given the input image $\mathbf{I}$ and target video $D$, we first create a reference image $\imageNote{r}$ which has the same pose as $\videoTarNote{1}$. This allows {FOMM} to obtain an accurate motion field $\motionFieldNote{\imageNote{r}}{\videoTarNote{t}}$ between the reference image $\imageNote{r}$ and the corresponding frame $\videoTarNote{t}$. We then estimate the motion filed $\motionFieldNote{\mathbf{I}}{\imageNote{r}}$ from $\imageNote{r}$ to the source image $\mathbf{I}$. Recall that $\imageNote{r}$ and $\mathbf{I}$ are the same face rendered with different poses using the known neural-physical model. Therefore we can directly compute $\motionFieldNote{\mathbf{I}}{\imageNote{r}}$ from the known shape and pose changes. The complete process for motion field estimation is as follows:
$\motionFieldNote{\mathbf{I}}{\videoTarNote{t}} = \motionFieldNote{\imageNote{r}}{\videoTarNote{t}} + \motionFieldNote{\mathbf{I}}{\imageNote{r}}$. The animated image $\imageNote{\videoTarNote{t}}$ is generated by $\mathbf{G}$ in the same way where the occlusion field is automatically computed with the motion field.
Combining {NARRATE} and {FOMM} produces exciting new applications at an unprecedented quality: {NARRATE} is fully automated and only requires the user provide an input portrait and the target environment for relighting; therefore we can connect our technique with any pre-trained {FOMM} models ~\footnote{https://github.com/AliaksandrSiarohin/first-order-model} to emulate a variety of facial animations, from Broadway performances to Peking Operas. All results shown in the paper are automatically generated without any fine-tuning.
Compared with state-of-the-art free view facial animation engine NTH~\cite{wang2021one}, our approach much better preserves photorealism with fine texture and geometry details. It is also faster in inference speed and more memory efficient. More importantly, we support high quality relighting that can help not only matching facial animations and poses but also lighting effects, producing dramatic mood that faithfully resembles the original clip. Fig.~\ref{fig:lighting_results} and our supplementary video show a number of examples.
\subsection{Style Transfer}
Occasionally, the pose adjusted, relighted, and even animated portrait demand a different, artistic styles. We show it is very easy to employ {NARRATE} in style transfer, e.g., for mapping a portrait photograph to oil paintings.
State-of-the-art approaches essentially formulate style transfer as an image to image translation problem. They, however, assume aligned viewpoint and ignore lighting discrepancies. {NARRATE}, in contrast, enables pose-aware, lighting-consistent style transfers.
\begin{figure*}[t]
\begin{center}
\includegraphics[width=0.95\linewidth]{fill_images/relighting.pdf}
\end{center}
\vspace{-0.5cm}
\caption
\textbf{Consistent Free View Relighting Result.} {NARRATE} supports consistent relighting for arbitrary views. For the input images (Col.1), we illuminate them with two environment maps. We exhibit relighted images at two views under each light (Col.2\&3, Col.4\&5). We demonstrate plausible and consistent relighting results among different views.}
\label{fig:lighting_results}
\vspace{-0.3cm}
\end{figure*}
\begin{figure}[h]
\begin{center}
\includegraphics[width=\linewidth]{fill_images/relighting_comp.pdf}
\end{center}
\vspace{-0.5cm}
\caption{
We extract normal maps from input images with different methods
and apply them in relighting. We compare the quality of our fused normal
and StyleSDF normal. Clearly, our normal is more accurate and produces
plausible relighting results, while StyleSDF extracts distorted normal and
shows weird relighting effects.
}
\label{fig:relighting_comp}
\vspace{-0.5cm}
\end{figure}
\begin{figure*}[t]
\begin{center}
\includegraphics[width=0.93\linewidth]{fill_images/Animation_result.pdf}
\end{center}
\vspace{-0.5cm}
\caption
\textbf{Free View Facial Animation.}
Combined with {FOMM} model, {NARRATE} can be used to create free-view animated virtual human. Given two source images, we drive them with La La Land(Row 2) and Peking Opera(Row 3) clips. {NARRATE} further supports synthesizing motions in novel views, creating consistent and natural free-view animation effects.
}
\label{fig:animation_result}
\vspace{-0.3cm}
\end{figure*}
We follow the same warping first, transfer second procedure as in facial animation but in this case combine with a high quality image transfer engine. Given oil painting style transfer as an example, we set out train a pix2pixHD~\cite{wang2018pix2pixHD} network $\mathbf{M}$ to map a photograph $\mathbf{I}$ with aligned pose to oil painting style $\imageNote{\mathbf{S}}=\mathbf{M}(\mathbf{I})$ with training data provided by ~\cite{Karras2019stylegan2}. To make sure the poses are well aligned, we again use our pose change module to render respective viewpoint that matches the one from the painting.
What is more exciting is that the transfer network, once trained, can now support style transfers with pose changes: we simple map the portrait under the new pose to its stylized version using the same network. As {NARRATE} maintains high view consistent, the resulting stylized sequence, although non-photorealistic, also maintains consistency. Fig.~\ref{fig:stylization} and the video shows examples of various painting styles that produce free-view portrait with corresponding styles, virtually animating an oil painting figure.
We can also edit the lighting effects of $\imageNote{\mathbf{S}}$.
Notice that $\mathbf{M}$ does not readily support lighting adjustment. We therefore utilize the shading maps to implicitly relight $\imageNote{\mathbf{S}}$. Specifically, given a new lighting condition $\light_e$, our goal is construct a relighted, stylized version $\imageNoteUp{\mathbf{S}}{l}$.
We first apply our relighting module to produce a relighted image $\imageNoteUp{}{l}$ from $\mathbf{I}$. Next, we compute the shading map $S=\frac{\imageNoteUp{}{l}}{\mathbf{I}}$.
Since $\imageNote{\mathbf{S}}$ directly comes from $\mathbf{I}$, applying $\light_e$ to $\imageNote{\mathbf{S}}$ can be approximated by multiplying $\imageNote{\mathbf{S}}$ with $S$ so that the final stylized result $\imageNoteUp{\mathbf{S}}{l} = S \imageNote{\mathbf{S}}$. Fig.~\ref{fig:stylization} also shows that our relighted oil painting portrait simultaneously preserve styles, perspectives, and lighting.
Since {NARRATE} also provides a high quality normal map, it can be used to produce additional stylization effects that have previously relied on differential geometry operators, not easy to replicate by learning based approaches. One of such example is hatching ~\cite{praun2001real}. Real artists hatch long the two principal directions along the surface that can be computed from a high quality normal map. The tone map of the hatching texture depends on shading, which can also be adjusted by our approach. Fig.~\ref{fig:stylization} shows the sample result of a portrait stylized under hatching.
\section{Related Work}
Our work focuses on post-capture photographic portrait adjustment and retargeting. While previous approaches have adopted different strategies to handle pose, lighting, style, and animations, we propose a unified solution via hybrid neural physical face modeling.
\paragraph{Perspective Adjustment.}
Post-capture perspective adjustment to portrait has drawn broad interest in computer graphics and vision, and latest virtual reality. Images are essentially 2D projections of 3D geometry and therefore previous efforts have focused on inferring and then rigging 3D faces from the portraits. Since the problem is inherently ill-posed, earlier approaches attempt to fit 3D template models (3DMM)~\cite{blanz1999morphable} from landmarks via optimization schemes~\cite{blanz2004exchanging,cao2014displaced,cao2015real}. More recent methods ~\cite{kazemi2014one,zhu2017face,tewari2017mofa,tewari2018self,richardson20163d,richardson2017learning,yamaguchi2018high} adopt a data-driven strategy and produce more faithful reconstructions on both shape and appearance. By far, existing parametric template models~\cite{blanz1999morphable,li2017learning,feng2020learning} cannot yet preserve fine-grained facial details. They also only model the facial regions while ignoring other body parts such as hair styles or even ears. Pose adjustments on high quality portrait often lead to uncanny results where faces look plastic due to loss of details.
The emerging implicit solutions, popularized by generative models~\cite{gan2014,karras2019style,Karras2019stylegan2,Karras2021stylegan3}, have shown huge potential for free-view high-quality portrait synthesis. Although, as a generation task, they were not specifically designed for perspective retargeting, it is possible to tweak these solutions via neural inversion to support free-view rendering \cite{karras2019style,tewari2020stylerig,shen2020interpreting,shen2021closedform}. Yet, despite significant advances, neural inversion still loses high frequency and earlier generative methods produce aliased and inconsistent view changes.
Followup geometry-aware generative models~\cite{orel2021styleSDF,chanmonteiro2020pigan,ed3d,zhou2021CIPS3D,gu2021stylenerf} combine 2D generation with explicit 3D geometry constraints and have greatly improved view consistency. However, their estimated geometry is still too smooth and lacks the precision for conducting other stylization tasks such as relighting. Most recently, ~\cite{tan2022volux} imposes additional lighting constraints to simultaneously achieve relighting and perspective changes. Yet, the final quality still falls short of the photographic level due to volumetric neural rendering which also causes cross-view flickering .
\paragraph{Portrait Relighting.}
A separate research line on portrait stylization is one-shot relighting. Pioneered by the LightStage ~\cite{debevec2000acquiring}, approaches over the past decade have focused on capturing and modeling the 4D reflectance field. Using a spherical lighting rig, various version of the LightStage manage to capture one-light-at-a-time or OLAT reflectance field \cite{pandey2021total, zhang2021neural, guo2019relightables, meka2019deep} for a human face and even their full body ~\cite{meka2020deep}.
Latest advances on deep learning have subsequently enabled efficient modeling of the OLAT data to address various aspects of the relighting problem ~\cite{shu2017portrait,meka2019deep,meka2020deep,guo2019relightables,zhou2019deep,sun2019single,nestmeyer2020learning,wang2020single,pandey2021total}, ranging from modeling lighting using spherical harmonics representations ~\cite{zhou2019deep,liu2021relighting,sengupta2018sfsnet} to more sophisticated environment lighting \cite{sun2019single}. To overcome the limitation of low frequency lighting, \cite{nestmeyer2020learning} explicitly models shadows and specularity by directional light source whereas \cite{wang2020single} employs richer synthetic data to account for non-Lambertian effects. The seminal work of TotalRelighting \cite{pandey2021total} significantly improves prior learning based techniques by employing specialized network designs coupled with robust matting. Their technique can produce photographic quality results under a broad range of virtual lighting. Yet, TotalRelighting is still restricted to fixed viewpoint. Brute-force application to pose adjusted portrait can lead to incorrect normal estimation and subsequently visual artifacts.
\paragraph{Animation.}
An exciting new area of portrait stylization is to animate the face via a driving video. The solution has largely followed facial motion transfers or reenactment and has been divided into subject-dependent and subject-agnostic models, both can be conducted either in 3D or 2D. 3D approaches~\cite{fried2019text,geng2018warp,nagano2018pagan,olszewski2017realistic} are more robust to pose changes and potentially amenable to relighting. However, since reliable reconstructions can only be conducted on near diffuse regions with simple geometry, they often miss teeth, ear, hair etc, causing the reenacted performance unconvincing. A variety of 2D generative models~\cite{fomm2019,zakharov2019few,zakharov2020fast,wang2019few} can now produce highly compelling facial animations without using any 3D shape prior. The lack of 3D, however, limits them from perspective changes, let alone relighting which we aim to resolve. The latest Neural Talk Head~\cite{wang2021one} demonstrates that even slight support of 3D in the general framework can lead to big improvement. By using canonical 3D keypoints, they are able to produce free-view video synthesis from a single face image. Their quality may be sufficient for teleconferencing but falls short of production-level portrait photography.
\paragraph{Artistic Stylization.} Artistic stylization has a long history in rendering, ranging from early statistics model ~\cite{tang2003face,shih2014style} to the deep learning model ~\cite{gatys2015neural,johnson2016perceptual,liao2017visual,selim2016painting}. Latest solutions essentially model the problem as image-to-image translation ~\cite{CycleGAN2017,pix2pix2017,futschik2019real}. As they unanimously assume fixed viewpoint input \cite{chen2018stereoscopic,d2017coherent,Jamriska19-SIG}, combining these solutions with free-view rendering require high consistent across viewpoints. Recent techniques ~\cite{fivser2017example,han2021exemplar} attempt to impose 3D constraints either based on a depth map or an explicit 3D model, yet both lacked precision to produce faithful perspective changes while maintaining fine details. We instead propose a hybrid neural physical model that can be adopted to simultaneously tackle perspective change, relighting, animation, or artistic stylization.
\section{Introduction}
\begin{comment}
Even in today's digital era, portrait photography remains inarguably the most popular photography genre. For any successful portrait, be it a corporate headshot, a beauty shot, or a character study, lighting styles, coupled with shooting angles, play the key role to emphasize the subject's feature as well as to express artistic or dramatic intent. For example, popular loop lighting defines facial features with soft shadows to illustrate harmony whereas a half lit and half in shadow face by split lighting reflects the subject's inner struggle. Rambrandt pioneered combining a key light and a fill light (e.g., a reflector) to construct a distinctive triangle of light on one cheek, baking a moody atmosphere.
Despite rich diversities in styles, a portrait, once taken, is fixed in its appearance where post-capture lighting alteration remains difficult, let alone complete lighting style changes. Perspective changes, in contrast, have attracted much attention in both computer vision and computer graphics communities. the main idea is to rig the portrait [], with or without explicitly modeling facial geometry. Classic 3D morphable face model (3DMM) XXX. Extensions. Rely on high quality scans. Generation approaches. StyleGAN XXX.
The seminal work of StyleSDF. combine generation with explicit geometry constraints. Describe how it works. How to use it to realize lighting style changes. Limitations: 1) a generation task, cannot fix the subject, unless inversion. inversion not reliable with appearance only. 2) geometry quality not sufficient for lighting.
Our approach. 1), 2), 3), 4).
Experimental validations. Applications. Beyond light stylization with availability of normal.
Jingyi's structure
I. Intro
1. Portrait stylization. Reconstruction tasks vs. Generation tasks. Former: relighting but not free viewpoint; core techniques; Latter: cannot enable photorealistic relighting;
2. Existing approaches. Model-based: issues, cannot model hair and ears, let alone clothing, parametric model + texture mapping still lacks realism due to incorrect shape and lack of view dependencies; StyleSDF geometry not sufficient (discuss SIG paper this year).
3. Our approach. Core: dataset augmentation;
4. Applications: 1) Non-photorealistic rendering; 2) Super-resolution?? 3) Simultaneous relighting + perspective adjustment;
5. Generation tasks: normal map adjustment/transfer - why for what purpose? detail preservation transfer (wrinkles?); aging and deaging.
\end{comment}
\begin{comment}
\wz{It is a pipeline paper, where we propose a free view, relightable pipeline for poitraint stylization.
1) portrait photography is popular. lighting and view angle is important.
2) post process is hard--> we want to jointly edit view, light at high quality. no existing works achieve all three goals.
3) existing relighting works xxx
4) existing perspective changing works xxx -> 3DMM, generation
5) geometry aware generative models xxx
6) our solution -> fulfill all the requirements.
7) its free view editing is enhanced with normal
8) its lighting module xxx
9) its application supports magic photo in harry potter and palace opera solo animation
10) summary.
}
\end{comment}
Even in today's digital era, portrait photography remains inarguably the most popular genre.
For any successful portrait, be it an actor still, a beauty shot, or a character study, \emph{lighting styles}, coupled with \emph{shooting angles}\wz{need a unified definition}, play the key role to emphasize the subject's feature as well as to express artistic or dramatic intent. On lighting, popular loop lighting defines facial features with soft shadows to illustrate harmony whereas a half lit and half in shadow face by split lighting reflects the subject's inner struggle. Rambrandt lighting combines a key light and a fill light (e.g., a reflector) to cast a distinctive triangle of light on one cheek, baking a moody atmosphere. On shooting angle, front view (full face) shots highlight complete facial details to convey an assertive attitude whereas side view (profile) shots emphasize on the physical form-factor such as facial contours to exude character. Three-quarter views, popularized by self-portraits, reveal both with a personal touch.
\wz{the current starting focuses too much on relighting, say sth with view angles.}
Despite richness in styles, a portrait, once taken, is fixed in its final presentation. Style changes, even though highly desirable, remains largely unresolved even with the most advanced retouching tools. The challenges are multi-fold. Persuasive lighting adjustment requires reliable estimations of a portrait's original illumination and detailed facial geometry, e.g., normals. Further, high photorealism needs to be maintained under perspective changes where existing warping-based techniques still fall short of. In this paper, we present a novel neural portrait stylization pipeline that can simultaneously edit a portrait's \textbf{lighting effects} and \textbf{shooting angles} at the \textbf{photographic} quality, benefiting photographers and visual artists as well as daily users. Our pipeline can be further extended to produce styled facial animations to support virtual cinematography, post-production, tele-presence, etc.
Most existing portrait relighting works are designed for fixed input view~\cite{} which cannot be applied in free view lighting alteration. Recent works~\cite{} combine relighting and view editing together, but xxx. As a consequence, they cannot support high quality realistic view editing, let alone complete lighting style changes.
\wz{say sth more about the limitation about light changes. @XULAN What's the other work that support free view relighting?}
Portrait perspective changes, in contrast, have a much longer history in both computer graphics and computer vision. The most widely adopted solution so far is to rig the portrait, either with or without explicitly modeling facial geometry.
The former largely adopts 3D morphable models (3DMM)~\cite{}, which represent 3D face by statistics PCA models.
Recent neural network based 3DMM methods are able to predict faithful shape and texture, and render them in novel views.
However, 3DMM models focus overwhelmingly on large scale geometry of face and tend to produce overly smooth surfaces that lack details. They are also sensitive to corner cases, such as various hair styles, wrinkled clothes, topological changes caused by glasses or even ears. The quality of the final rigged result cannot yet match the original photography.
Implicit solutions, popularized by generative models~\cite{gan, stylegan123}, have shown potential for high quality portrait synthesis. Their goal is not to change the style of an existing portrait but to create various styles by manipulating the latent space. The seminal XXX framework [] produces perspective variations by XXX ~\cite{}. Yet, the lack of geometric constraints prohibits it from producing convincing perspective changes where the results exhibit strong aliasing and inconsistency. Recent geometry-aware generative models~\cite{pigan,ed3d,stylesdf} combine 2D generation with explicit 3D geometry constraints and have shown stunning successes.
They map latent codes to 3D representations~\cite{} and leverage differentiable rendering to convert 3D representations back to 2D images to avoid 3D supervision~\cite{}. These techniques can achieve much higher view consistency in perspective changes but their target is still generation rather than stylizing an existing portrait. They also rely mainly on coarse geometry for training where the high resolution is achieved via CNN upsampling, causing vibration artifacts across views. Further, the quality of geometry is not readily sufficient for relighting.
\wz{do we mention volux gan here or in related work? we mention in related work. Say In current work, XXX et al. XXX}
Consequently, it is hard to apply them in free-view relighting, either.
\wz{Current version is too verbose. Need condense them into half. Some of them will put in related work. Also, we focus on the view changes methods, we should talk more about lighting.}
\wz{we can consider submit to neurips :). The name is just for fun.}
In this work, we introduce {NARRATE}(Normal Enhanced neURal Implicit surfaces for Portrait Stylization), a novel \wz{can we use novel?} pipeline that fulfills all the requirements of portrait stylization. From a front view \wz{can we do other view?} portrait as input, {NARRATE} supports free-view lighting alteration and produces faithful editing effects at photography quality. We carefully design {NARRATE} by combine a geometry aware generative model~\cite{} and a relighting network to achieve these goals.
At its core, we first leverage StyleSDF to turn a 2D portrait into a 3D shape via inversion~\cite{} and produce a novel view image with neural rendering.
To alleviate the fitting mismatch and vibrating artifacts,
we enhance the low quality geometry with a inferred normal map~\cite{}, creating a high fidelity textured mesh.
It is further passed through regular rendering engines~\cite{} and synthesize a new image full of realistic portrait details. We fuse the two renderings to generate a high-quality image with minimal artifacts at arbitrary views, both for the main face region as well as for corner cases like hair, glass and clothes.
We then stylize the lighting effects with the free view image. Inspired by xxx~\cite{}, we train a decomposition network to map it into albedo and normal maps. The intermediate results are sent to a synthesis network to create exquisite lighting effects with manually specified illumination conditions. We improve ~\cite{} by xxx\wz{can we do sth novel?}. Our method supports a wide range of complex lighting styles, producing realistic relighting effects as shown in the Fig.~\ref{fig:teaser}.
Beyond the high-quality free view relighting, {NARRATE} can further be coupled with other facial applications to create movie special effects. We incorporate our pipeline with image stylization~\cite{} and facial animation~\cite{}. Such marriage brings dramatic reactions, allowing us to create delicate animations including magic photos in Harry Potter~\cite{} and vivid palace opera solo. {NARRATE} has great potential to be applied in more scenarios to help artists create exquisite effects.
We summary our contributions as follow.
\begin{itemize}
\item We propose {NARRATE}, an automatic portrait stylization pipeline which enables high-quality, free view relighting.
\item We demonstrate our normal enhanced solution largely reduces the free view editing artifacts, creating plausible and stable novel view synthesis.
\item Our light module xxx.
\item We connect {NARRATE} with stylization and ficial animation and showcase magic face editing effects.
\end{itemize}
\begin{comment}
Previous works address it in two lines: reconstruction and generation. 3D face reconstruction from based methods. The former takes an 2D face image as input and predicts the corresponding xx and xx.
Generating such video portraits conveniently still remains challenging and has attracted substantive attention of both the computer vision and graphics communities.
In this paper, we focus on automatically and conveniently synthesizing a photo-realistic video portrait of a \textit{target} actor where the facial expression, the lighting condition and background are fully disentangled and controllable through various \textit{source} actors.
It is particularly challenging since humans are highly sensitive to facial inconsistency and the video portraits are influenced by the complex interaction of environment, lighting patterns and various facial attributes like material and specular reflection.
The most common practice for manipulating video portraits in the film industry still relies on tedious manual labor and sophisticated devices for reflectance field acquisition~\cite{debevec2000acquiring} or chroma-keying~\cite{wright2006digital}.
The recent neural techniques~\cite{NR_survey,kim2018deep} bring huge potential for convenient and highly-realistic manipulations, enabling compelling visual quality in various applications, such as visual dubbing~\cite{kim2019neural,ji2021audio}, telepresence~\cite{lombardi2018deep}, video post-editing~\cite{fried2019text,yao2020talkinghead} or audio-driven virtual assistant~\cite{thies2020neural}, even in real-time~\cite{thies2016face2face,thies2018headon}.
However, they still suffer from pre-baked shading of the specific training scenes without manipulating the illumination, which is critical for relighting applications in portrait photography like virtual cinematography.
On the other hand, various neural schemes with controllable portrait's lighting conditions have been proposed using high-quality pore-level 4D facial reflectance fields~\cite{debevec2000acquiring} acquired under multi-view and multi-lit configurations.
However, they are limited to image-based relighting~\cite{sun2019single,pandey2021total}, a subset of the reflectance field learning~\cite{sun2020light,meka2019deep} or relightable model and appearance reconstruction~\cite{guo2019relightables,meka2020deep,bi2021avatar}.
Researchers pay less attention to combine the background and lighting manipulation with face-interior reenactment into a universal data-driven framework.
In this paper, we attack the above challenges and present the first approach to generating relightable neural video portraits for a specific performer.
As illustrated in Fig.~\ref{fig:teaser}, with the aid of immediate and high-quality facial reflectance field inference, our approach endows the entire photo-realistic video portraits synthesis with the ability of fully disentanglement and control of various head poses, facial expressions, backgrounds, and lighting conditions.
This unique capability also enables numerous photo-realistic visual editing effects.
Our key idea is to combine high-quality 4D reflectance field learning, model-based facial performance capture and target-aware neural rendering into a consistent framework, so as to support convenient, realistic and controllable editing of neural video portraits.
To this end, for the temporal ground-truth supervision, we first build up a light stage setup to collect the dynamic facial reflectance fields of the target performer with one-light-at-a-time (OLAT) images under various sequential poses and expressions.
Then, with such target-specific OLAT data, the core of our approach is a novel rendering-to-video translation network design with the explicit head pose, facial expression, lighting and background disentanglement for highly controllable neural video portrait synthesis.
After training, reliable head pose and facial expression editing are obtained by applying the same facial capture and normalization scheme to the source video input, while our explicit OLAT output enables high-quality relit effect. This relit effect can not only match the portrait with the environment, but also simulate the rim-light to improve the matting quality for a better background replacement.
An encoder-decoder architecture is further adopted to encode the illumination weighting parameters of OLAT images from the corresponding relit images, enabling automatic lighting editing from natural source images.
Thus, our approach enables automatically and conveniently control of facial expression, lighting condition and background of the performer's video portrait with high photo-realism for various visual editing effects.
To summarize, our main contributions include:
\begin{itemize}
\setlength\itemsep{0em}
\item We demonstrate the new capability of simultaneous relighting and and expression transfer, which enables photo-realistic video portraits synthesis for various visual editing effects, with full disentanglement of expressions, backgrounds and lighting conditions.
\item We introduce a rendering-to-video translation network to transfer model-based input into high-fidelity facial reflectance fields, with a multi-frame multi-task learning strategy to encode content, segmentation and temporal information.
\item We propose to utilize hybrid model-based facial capture with a carefully designed semantic-aware facial normalization scheme for reliable disentanglement.
\end{itemize}
\end{comment}
\section{Related Work}
\wz{3 parts: face }
\textbf{Face capture and reconstruction.}
Face reconstruction methods aim to reconstruct the geometry and appearance of 3D face models from visual data and we refer to two recent reports on monocular 3D face reconstruction and applications~\cite{zollhofer2018state,egger20203d} for a comprehensive overview.
Early solutions adopt optimization schemes by fitting a 3D template model of only the face regions into various visual input, such as a single image~\cite{blanz2004exchanging,blanz1999morphable}, a temporal consistent video~\cite{cao2014displaced,fyffe2014driving,suwajanakorn2014total,ichim2015dynamic,garrido2016reconstruction,wu2016anatomically} or even unstructured image sets~\cite{kemelmacher2010being,kemelmacher2013internet,roth2016adaptive}.
The recent deep learning techniques bring huge potential for face modeling, which learn to predict the 3D face shape, geometry or appearance~\cite{kazemi2014one,zhu2017face,tewari2017mofa,tewari2018self,tewari2019fml,cao2015real,richardson20163d,richardson2017learning,yamaguchi2018high}
However, these method above still cannot create a photo-realistic model in a controllable manner, especially for those fine-grained facial regions like hair, mouth interior or eye gaze.
The recent work~\cite{gafni2020dynamic} enables controllable implicit facial modeling and rendering using neural radiance field, but it still relies on per-scene training and suffers from pre-baked illumination of the training scenes.
In contrast, our approach enables more disentanglement and control of background, lighting condition as well as facial capture parameters for photo-realistic video portrait generation.
\textbf{Face reenactment and replacement.}
Facial reenactment re-generates the face content of a target actor in a portrait video by transferring facial expression and pose from a source actor.
Many recent reenactment approaches model-based expression capturing and the expressions are transferred via dense motion fields~\cite{liu2011realistic,suwajanakorn2015makes,averbuch2017bringing} or facial parameters~\cite{vlasic2006face,garrido2014automatic,li2013data,thies2015real,thies2016face2face,thies2018facevr}.
The recent neural approaches~\cite{NR_survey,kim2018deep} replace components of the standard graphics pipeline by learned components, which bring huge potential for convenient and highly-realistic manipulations, enabling compelling visual quality in various applications, such as visual dubbing~\cite{kim2019neural,ji2021audio}, telepresence~\cite{lombardi2018deep}, video post-editing~\cite{fried2019text,yao2020talkinghead} or audio-driven virtual assistant~\cite{thies2020neural}, even in real-time~\cite{thies2016face2face,thies2018headon}.
Inspired by pix2pix~\cite{isola2017image}, Deep Video Portraits~\cite{kim2018deep} proposes an rendering-to-image translation approach that converts synthetic rendering input to a scene-specific realistic image output.
However, ~\cite{kim2018deep} and the work followed by, such as ~\cite{kim2019neural, ji2021audio, thies2019deferred} suffers from pre-baked shading of the specific training scenes without manipulating the illumination which is critical for relighting applications like virtual cinematography.
Some recent work enables lighting or facial expression control during the facial portrait image generation~\cite{tewari2020stylerig,chen2020free} or editing~\cite{tewari2020pie,tewari2021photoapp} based on styleGAN~\cite{karras2019style}.
However, these methods mainly focus on the task of portrait image generation and suffers from unrealistic interpolation for neural video portrait reenactment.
Differently, we take advantage of learning from the temporally consistent OLAT dataset of the target performer to allow for larger changes in facial expression reenactment, background as well as the lighting condition, while maintaining high photo-realism.
\textbf{Facial portrait relighting.}
High quality facial portrait relighting requires the modeling of pore-level 4D reflectance fields.
Debevec~\emph{et al.}~\cite{debevec2000acquiring} invent Light Stage to capture the reflectance field of human faces, which has
enabled high-quality 3D face reconstruction and illuminations rendering, advancing the film’s special effects industry.
Some subsequent work has also achieved excellent results by introducing deep learning~\cite{zhang2021neural,meka2019deep,meka2020deep,guo2019relightables,sun2019single}.
Some work follows the pipeline of color transfer to achieve the relighting effects~\cite{chen2011face,shih2014style,shu2017portrait,song2017stylizing}, which usually needs another portrait image as the facial color distribution reference.
With the advent of deep neural networks and neural rendering, some methods~\cite{zhou2019deep,liu2021relighting,sengupta2018sfsnet} adopt Spherical Harmonics (SH) lighting model to manipulate the illumination.
Several works~\cite{aldrian2012inverse,egger2018occlusion, wang2007face} jointly estimate the 3D face and SH [5, 34] parameters and achieved relighting by recovering the facial geometry and modify the parameters of the SH lighting model.
Explicitly modeling the shadow and specular~\cite{wang2020single,nestmeyer2020learning} achieve excellent results in directional light source relighting.
Mallikarjunr~\emph{et al.}~\cite{tewari2020monocular} take a single image portrait as input to predict OLAT(one-light-at-a-time) as Reflectance Fields, which can be relit to other lighting via image-based rendering.
Sun~\emph{et al.}~\cite{sun2019single} choose environment map as lighting model and use light stage captured OLAT data to generate realistic training data and train relighting networks in an end-to-end fashion.
Similarly, we use the target-aware temporal OLAT images to generate training data for high-quality lighting disentanglement.
Differently, we further combine the background and lighting manipulation with face-interior reenactment into a universal data-driven framework.
\section{Methodology}
\label{sec:overview}
{NARRATE} stylizes a portrait with user desired perspective and lighting effects, producing novel view relit images with high photorealsm.
We provide an overview of our method in Fig.~\ref{fig:overview}.
Given a portrait input, {NARRATE} sequentially modify its perspective and lighting effects.
Finally we stylize and animate the edited images, generating movie special effects videos. \wz{application is unclear!}
We first describe photorealisitc free view synthesis in Sec.~\ref{sec:perspective}, then talk about our relighting module in Sec.~\ref{}. Lastly, we present style transfer and facial animation applications in Sec.~\ref{}.
\subsection{Photorealisitc Free View Synthesis}\label{sec:perspective}
Take a portrait as input $\mathbf{I}$, our goal is to synthesize its novel view $\imageNote{\mathbf{v}}$ under a new view $\mathbf{v}$ in a realistic manner.
As shown in Fig.~\ref{fig:overview} (a), we first leverage the powerful geometry aware generative models~\cite{orel2021styleSDF}, applying GAN inversion~\cite{roich2021pivotal} to reverse the input to the latent code. The generator then map it to a coarse geometry and employ neural rendering to synthesize a high resolution novel view image $\imageNoteUp{\mathbf{v}}{\mathbf{n}}$. We describe this part in Sec.~\ref{sec:invertion}
However, we observe that both inversion and neural rendering introduce artifacts in novel view synthesis, creating over-smoothed and aliasing results. As such, we further propose to enhance it with normal maps. Specifically, we employ a normal estimation network(Sec~\ref{}) to acquire an accurate normal map $\mathbf{N}$ from the input $\mathbf{I}$. With the assistance of $\mathbf{N}$, we improve the generated coarse geometry through Poisson normal integration~\cite{bibid}, producing a high quality mesh. We then texture it with the original image and render a new image $\imageNoteUp{\mathbf{v}}{\mathbf{m}}$.
Finally, we fuse $\imageNoteUp{\mathbf{v}}{\mathbf{n}}$ and $\imageNoteUp{\mathbf{v}}{\mathbf{m}}$ and with Poisson blending~\cite{bibid}, generating a photorealistic image with minimal artifacts. We detail the mesh generation and fusion in Sec Sec, respectively.
\subsection{Overall Image Generation}
The StyleSDF generation framework is a 3D-aware GAN generator based on Volume Rendering with an upsampling module. The generator contains a set of parameters $\theta$ and takes a latent $\mathbf{z}$, a noise $\mathbf{n}$ and a viewpoint $\mathbf{v}$ as input. The output is a portrait image, denoted as $G(\mathbf{z}, \mathbf{n}, \mathbf{v} ;\theta)$. In addition, we can obtain the density of each voxel, which can be used for the subsequent calculation of normal and depth.
\wyj{Should we provide more details about StyleSDF?}
For an image of an Input, we want to be able to use the framework of StyleSDF to generate images of its other views and to obtain its 3D geometry. Inspired by PTI, we do this in two stages.
The first stage is to optimise the latent, noise and perspective to provide a good starting condition for the fine-tune process. In this phase, we lock the parameters of the network and optimise the three variables mentioned above. We use pcpt error and mse error to monitor the images generated by the network so that they are close to the original image. In addition, to prevent the noise vector from bringing in artifacts from other perspectives, we introduce regular term. the optimisation for this step is defined as follows:
\begin{equation}
\mathbf{v}^*, \mathbf{z}^*, \mathbf{n}^* = \arg \min_{\mathbf{v}, \mathbf{z}, \mathbf{n}} \mathcal{L}_{mse}(I, G(\mathbf{v}, \mathbf{z}, \mathbf{n})) + \mathcal{L}_{pcpt}(I, G(\mathbf{v}, \mathbf{z}, \mathbf{n})) + \lambda L_{2}(\mathbf{n})
\end{equation}
\wyj{this paragraph seems like PTI. }
The second stage is the fine-tune StyleSDF generator. In this step we unfreeze the parameters $\theta$ of the network and freeze $\mathbf{v}^*, \mathbf{z}^*, \mathbf{n}^*$. In this stage we not only want to make the generated image is closer to the original image, but also keep the consistency when change the viewpoint. We therefore use two separate loss functions to train the network.
Tuning loss make the network to learn the input image features by calculating the difference between the input image and the generated image:
\begin{equation}
\mathcal{L}_{tune}(\theta) = \mathcal{L}_{mse}(I, G(\mathbf{v}^*, \mathbf{z}^*, \mathbf{n}^*; \theta)) + \mathcal{L}_{pcpt}(I, G(\mathbf{v}^*, \mathbf{z}^*, \mathbf{n}^*; \theta))
\end{equation}
Regularization loss ensures that the consistency of the images is not broken by sampling around the latent and constraining the fine-tuned network to generate results that are close to those generated by the original network at any viewpoint.
\begin{equation}
\begin{aligned}
\mathcal{L}_{reg}(\theta, \theta_0) &= \mathcal{L}_{mse}(G(\mathbf{v}_r, \mathbf{z}_r, \mathbf{n}_r; \theta_0), G(\mathbf{v}_r, \mathbf{z}_r, \mathbf{n}_r; \theta))\\ &+ \mathcal{L}_{pcpt}(G(\mathbf{v}_r, \mathbf{z}_r, \mathbf{n}_r; \theta_0), G(\mathbf{v}_r, \mathbf{z}_r, \mathbf{n}_r; \theta)),
\end{aligned}
\end{equation}
where $\theta_0$ is the network's weight before tunining, $\mathbf{z}_r$ is the interpolated code obtained by the interpolation method of [xxxPTI], $\mathbf{n}_r$ and $\mathbf{v}_r$ is randomly sampled in the training domain.
Our optimization objective is to optimize the above two Losses in order to obtain the most appropriate network weights $\theta^*$:
\begin{equation}
\theta^* = \arg \min_{\theta} \mathcal{L}_{tune}(\theta) + \mathcal{L}_{reg}(\theta, \theta_0)
\end{equation}
\subsection{Face Mesh}
The process of inversion of a 3D-aware styleSDF results in a loss of high-frequency information in the resulting image and a deterioration in 3D consistency. This phenomenon is more pronounced at the human face because of the importance of facial detail when discriminating between portrait identities. To solve this problem, we have used the Surface normal predictor, which has higher definition and fidelity, to predict facial geometry.
The Surface Normal Predictor is a neural network with a U-net structure. The input is an RGB portrait image, and the output is the corresponding Surface Normal image. \wyj{Do we need to write exactly how the training pair is constructed here? Because it is written in total relighting and also in IJCV.}
By integrating Normal, we can recover the geometry of the portrait face. However, since in some places the facial depth is incontinuous (e.g. nose, mouth), there will be ambiguity when using Poisson integration and the facial geometry will take on a flattened effect. Therefore, we introduce the portrait SDF from the previous step to provide a depth prior for the integration.
Specifically, we first outline the portrait through xxx. On the outline, we use the depth through the SDF as a prior for the Poisson integration. We then use Poisson normal integration in the face region to obtain the final face geometry.
\wyj{should we introduce Poisson integration equation here?}
Using the shot view obtained in the previous step, we can reproject the geometry to obtain the coordinates of each node on the original image. We treat the projected coordinates as the texture coordinates of the nodes and use the original or normal image as the texture map of the facial mesh to support the projection in the new perspective.
\subsection{Fusion}
For any given new viewpoint $\mathbf{v}_n$, we expect a high quality RGB portrait image and a normal image for the corresponding viewpoint for subsequent relighting, stylisation etc.
For the RGB image, we first use the fine-tune generator $G(\theta^*)$, the latent $\mathbf{z}^*$ and the noise $\mathbf{n}^*$, which allows us to render a complete portrait with background, head and body. We then use the mesh of the face $M$ to project on a new perspective to obtain a detailed and accurate image of the face.
We fuse the two images by Poisson image blending method to produce the final image.
For the Normal image, we use the fine-tune generator and latent to find the density of each voxel, calculate the normal of each voxel $\mathbf{x}$ as $\mathbf{n}(\mathbf{x}) = \nabla \sigma(\mathbf{x})$
and then integrate to obtain the surface normal for each pixel by the volume rendering equation of SDF.
The normal of the face is similar to the RGB projection, but a step of directional transformation is required before projection.
\subsection{religting}
Lighting is fundamental to one's feeling of a portrait image.
We utilize a relighting module inspired by~\cite{pandey2021total} to achieve high-fidelity portrait lighting editing. The relighitng module consists of albedo network, normal network and a relighting network. We first use the albedo network to extract the albedo under each viewpoint.
We train a U-net structure network to achieve relighting effect, and use the Phong shading as prior. In details, for a given target illumination, we use Phong shading to render the diffuse light map and four specualr light maps with different shininess exponents, as the input of the relighting network. The output of the network is the final portrait under target illumination.
To train the network, we use Dynamic-OLAT (one-light-at-time) dataset [xxxNVPR] as training set for supervised learning.
Different from~\cite{pandey2021total}, our normal map for Phong shading is not generated by per-frame prediction. Instead, we propose a novel fused normal map, which has 3D consistent property. For free-view video relighting, the fused normal map produces a more stable and consistent shading prior to the relighting network.
\subsection{Motion}
Under this application, given a specified object S, mark its image at different viewpoints, $S^v$. Our goal is to process $S^v$ independently with the drive frame $D_t$ to obtain $S^v_t$ such that $S^v_t$ has the relative motion information of $D_t$ as well as the content information of S, while maintaining the geometric consistency of S when v changes and when t changes. To achieve this, we use the driving process of fomm.
The fomm consists of two parts, the motion generation module and the image generation module. The motion generation module is designed to predict the dense motion field, which contains the mapping relationship of pixel positions between the driving frame $D_t$(3XHXW) and the original image $S^v$, modeled by $T_(S<-D)$. [?] The image generation module accepts the dense motion field and the original image as input to generate $S^v_t$ with motion information.[?]
Based on fomm, our drive phase is specifically divided into three stages.
First, the locations of keypoints in D and S are predicted by an encoder-decoder network, respectively. The keypoint detector network outputs the keypoint positions and the parameters of each affine transformation.
\subsection{Style}
|
\section{The MixedWM38 Dataset}\label{sec:MixedWM38}
\subsection{Dataset description}
The MixedWM38 dataset \cite{waferDefectDataset} was published by Wang et al. \cite{wang2020deformable}. This dataset has 38 defect patterns, viz., one fault-free pattern, eight single defect patterns, thirteen 2 mixed-type patterns, twelve 3 mixed-type defect patterns, and four 4 mixed-type defects for a total of 38,015 WMs.
The dataset contains images of $52\times52$ dimension and class information as one hot encoded array in numpy format.
Table \ref{tab:cause} describes these defects along with their possible causes. Table \ref{tab:defectpattern} shows 38 defect patterns.
\begin{table*}[htbp]
\centering
\caption{Single-type defect classes and their possible causes (WM =wafer map, acr. = acronym)}
\begin{tabular}{|l|c|p{5cm}|p{10cm}|}
\hline
Name & Acr. & Description & Cause of defect \\
\hline
Center & C & Defective die scattered in the centre of WM & Abnormality of RF (Radio Frequency) power, abnormality in liquid flow or abnormality in liquid pressure. Problem in the plasma area \cite{hansen1998use}. Thin film deposition \cite{piao2018decision} or abnormality in liquid pressure. \\
\hline
Donut & D & Defective die from centre of WM in a ring configuration & Redeposition of dissolved photoresist solids backing onto wafer during developing process, as the center rinsing step results less defective at the center of the wafer. \\
\hline
Edge-Loc & EL & Localized clusters on the edge & Uneven heating during diffusion process \cite{hansen1997monitoring}. \\
\hline
Edge- Ring & ER & Ring-shaped clusters around perimeter & Abnormal temperature control in the rapid thermal annealing process \cite{tello2018deep}. \\
\hline
Local type & L & Localised clusters occuring regularly & Excess vibration in a given machine liberating enough particles \cite{hansen1998use}. Crystalline heterogeneity \cite{jeong2008automatic}. Due to silt valve leak, abnormality during robot handos or abnormality in the pump. \\
\hline
Nearful & NF & Unusual fault pattern & Reception failure. \\
\hline
Scratch & S & Distribution of faulty dies in a long, narrow region & Human error at the shipping and handling process \cite{jeong2008automatic}. Error at chemical mechanical polishing (CMP). \\
\hline
Random & R & Random defect without patterns & Contaminated pipes, abnormality in shower-head, or abnormality in control wafers. \\
\hline
\end{tabular}%
\label{tab:cause}%
\end{table*}%
\begin{table}[htbp]
\centering
\caption{{38 defect patterns in MixedWM38 dataset}}
\begin{tabular}{|c|c|c|c|c|c|c|c|}
\hline
No. & Single defect & No. & Two-mixed defect & No. & Three-mixed defect & No. & Four-mixed defect \\
\hline
1 & Normal & 10 & C+EL & 23 & C+EL+L & 35 & C+L+EL+S \\
\hline
2 & Center (C) & 11 & C+ER & 24 & C+EL+S & 36 & C+L+ER+S \\
\hline
3 & Donut (D) & 12 & C+L & 25 & C+ER+L & 37 & D+L+EL+S \\
\hline
4 & edgeLoc (EL) & 13 & C+S & 26 & C+ER+S & 38 & D+L+ER+S \\
\hline
5 & edgeRing (ER) & 14 & D+EL & 27 & C+L+S & & \\
\hline
6 & Loc (L) & 15 & D+L & 28 & D+EL+L & & \\
\hline
7 & Nearful (NF) & 16 & ER+L & 29 & D+EL+S & & \\
\hline
8 & Scratch (S) & 17 & EL + S & 30 & D+L+S & & \\
\hline
9 & Random (R) & 18 & ER+S & 31 & D+ER+L & & \\
\hline
& & 19 & L+S & 32 & D+ER+S & & \\
\hline
& & 20 & D+ER & 33 & EL+L+S & & \\
\hline
& & 21 & D+S & 34 & ER+L+S & & \\
\hline
& & 22 & EL+L & & & & \\
\hline
\end{tabular}%
\label{tab:defectpattern}%
\end{table}%
\subsection{Data Preparation and Preprocessing}\label{sec:preprocessing}
The dataset is divided into training and validation set containing 80 and 20 percent of the dataset, which is 30412 and 7603 images, respectively. In the MixedWM38 dataset, each WM has three regions: wafer boundary, background and defect. MixedWM38 dataset provides class labels, which are required for classification. However, MixedWM38 dataset does not provide annotations of segmentation masks. To get around this limitation, we combine wafer boundary and background into a single class and the defect into another class and then perform binary segmentation to segment the defects. We reshape the dataset images from $52\times52$ to $224\times224$ to learn features and patterns more effectively. To match the dimension of masks with the dimensions of the input image, we reshape masks to the shape of $224\times224$. We perform one-hot encoding on ground truth class labels to generate ground truth of shape $B\times1\times38$, which is required for WSCN model, where B is the batch size.
\section{Related work} \label{sec:relatedWork}
\textbf{Related works on defect classification:}
Nakazawa et al. \cite{nakazawa2018wafer} use CNNs for wafer defect classification. They train and validate their CNN models using synthetically generated WM. The testing is done on generated as well as on real WMs.
Maksim et al. \cite{maksim2019classification} evaluate the performance of well-known CNN models like MobileNetV2, VGG19, ResNet50, and ResNet34 on various WM defects. To address the problem of data scarcity, they make their own composite dataset consisting of synthetic data and experimental data. This composite dataset is used for training the models. Testing is done on the WM–811K dataset \cite{wu2014wafer}.
Wang et al. \cite{wang2020deformable} propose a ``deformable convolutional network (DCNet)'' for defect classification. DCNet uses ``deformable convolution'' (DC) to extract the defects' feature representations by focusing on the sampling area on defective dies. The output layer is multi-labeled and is one-hot encoded. This transforms the mixed type of defects into individual single defects and ensures effective identification of each defect.
Kyeong et al. \cite{kyeong2018classification} train separate classification models for classifying single defects and then use all those models for finding the presence of mixed-type defects. However, such an approach is not scalable because it significantly increases storage and computation overhead. Also, it requires separately training for all those models. Further, they study only four single defect patterns, namely ``circle'', ``ring'', ``scratch'', and ``zone''. By contrast, we propose a single model for classifying single-type and mixed-type defects. Also, we test our model on 8 single-type and 29 mixed-type defect patterns.
Elliptical basis function neural networks use a hidden layer of elliptical units. They handle every input individually using separate weights. Sciuto et al. \cite{sciuto2019organic,lo2021organic} use elliptical basis neural networks for detecting defects in organic solar cells.
\textbf{Related works on defect segmentation:}
Saad et al. \cite{saad2015defect} convert the wafer image from ``RGB-space'' to ``L*a*b*'' space, where all the color information is present in the a*b* spaces only. Then, they use k-means clustering to separate the pixels into two clusters, representing the defect and wafer, respectively. Nakazawa et al. \cite{nakazawa2019anomaly} use encoder-decoder-based models for detection and segmentation of abnormal patterns of wafer defects. They generate abnormal wafer defects using ``defect pattern generation model''. They develop three separate encoder-decoder models based on SegNet \cite{badrinarayanan2017segnet}, U-Net \cite{ronneberger2015u} and FCN \cite{long2015fully}.
Table \ref{tab:comparison} compares selected previous works on key parameters.
\begin{table*}[htbp]
\centering
\caption{Comparison of related works}
\begin{tabular}{|c|c|c|c|c|}
\hline
Work & Objective & Types of defects & Network & Dataset \\
\hline
Nakazawa et al. \cite{nakazawa2018wafer} & Classification & 22 defects & CNN & 28.6K for training, 1.19K for testing \\
\hline
Wang et al. \cite{wang2020deformable} & Classification & 8 single, 29 mixed & CNN based on deformable CONV & 38015 images \\
\hline
Saad et al. \cite{saad2015defect} & Segmentation & 1 & k-means clustering & 2 images \\
\hline
Nakazawa et al. \cite{nakazawa2019anomaly} & Segmentation & 11 defects & FCN, SegNet and U-Net & 17K for training, 3.3K for testing \\
\hline
Han et al. \cite{han2020polycrystalline} & Segmentation & 1 & RPN+U-net with dilated CONV & 106 images \\
\hline
Ours & Classification+Segmentation & 8 single, 29 mixed & Encoder-decoder CNN & 38015 images \\
\hline
\end{tabular}%
\label{tab:comparison}%
\end{table*}%
\section{Proposed Approach} \label{sec:ProposedApproach}
We present the overall architecture of our proposed WaferSegClassNet network (Section \ref{sec:overallArchitecture}), the encoder and decoder stages (Section \ref{sec:encoder}-\ref{sec:decoderStage}). We also discuss the loss function used for pretraining the encoder (Section \ref{sec:lossfunction}).
\subsection{WaferSegClassNet architecture} \label{sec:overallArchitecture}
The diversity of defect shapes and defect overlap for semiconductor wafer defect datasets has posed new challenges for identifying WM defects. To solve these challenges and enable CNN to identify different types of defect shapes and defects overlap, we propose a novel model, WaferSegClassNet (WSCN), that can perform both defect classification and segmentation. WSCN model follows a multi-task learning framework that allows it to learn to segment and classify an image simultaneously. A classification network works with global information, whereas a segmentation network incorporates more local information in the input image. Thus, we propose a single network that focuses both on global and local information. Some previous works (e.g., \cite{wang2006detection}) remove global random defects before applying classification or clustering. Our CNN-based approach does not require such ad-hoc steps, nor does it require clustering.
Figure \ref{fig:ModelArchitecture}(a) shows the overall architecture of WaferSegClassNet. Here, the spatial dimension of the input is 224 $\times$ 224, and the output dimension of the encoder branch is 14 $\times$ 14. WSCN follows encoder-decoder architecture, where the encoder performs downsampling and the decoder performs upsampling. In Figure \ref{fig:ModelArchitecture}(a), $f$ denotes the number of filters. At each downsampling layer, f is used as 8, 16, 16, 32, and 64, respectively. At each up-sampling layer, f is used as 32, 16, 16 and 8, respectively. We now describe the encoder and decoder stages of our model.
\begin{figure}[htbp] \centering
\includegraphics [scale=0.70] {BlockDiagram.png}
\caption{a) WaferSegClassNet architecture (`f' shows the number of filters; SC = skip-connection), (b) CONV Block, (c) Transpose CONV block }
\label{fig:ModelArchitecture}
\end{figure}
\subsection{Encoder stage}\label{sec:encoder}
The encoder uses a series of convolution blocks with pooling layers to extract multi-scale local details. As depicted in Figure \ref{fig:ModelArchitecture}(b), the convolution block contains a 3 $\times$ 3 convolution layer with batch-normalization and dropout layers and a 3 $\times$ 3 separable convolution layer with batch-normalization.
We use separable convolutions in the CONV block to reduce the memory bandwidth and computational requirements while also improving the representational efficiency. After the last convolution block, we use ``average pooling'' to linearly transform the vectorized feature maps. Addition of this average pooling layer acts as an effective regularizer and ensures no information loss. This is important for accurately classifying and segmenting the semiconductor wafer defects.
\subsection{Decoder stage}\label{sec:decoderStage}
In our network, the decoder block serves a dual purpose of performing classification and producing the semantic segmentation masks by recovering the spatial information.
\textbf{Segmentation branch:} The segmentation branch produces the binary segmentation mask. It has four transpose CONV blocks of $3\times3$ and a $1\times1$ convolution layer. The segmentation branch contains transpose CONV blocks for generating the output mask by upsampling the feature representation. As shown in Figure \ref{fig:ModelArchitecture}(c), transpose CONV blocks contain the transpose convolution layer. Transpose convolution upsamples the ``input feature map'' to a desired ``output feature map'' using learnable parameters.
It interprets the coarse input data to fill-in the detail during upsampling. In the transpose convolution block, the concatenation (``concatenate'') layer is used to enrich the semantic information of input image through skip connections. This reduces the error rate of mask generation.
\textbf{Classification branch:} The classification branch identifies the defect type based on the features extracted by the encoder. The classification branch contains ``global average pooling'' (GAP) layer and two dense layers with 64 and 38 nodes, respectively. We have used GAP layer because it is more native to the convolution structure and it enforces correspondence between feature maps and categories. GAP layer has no learnable parameters and hence, it avoids overfitting. GAP layer makes the network more robust towards spatial translations due to its nature of adding spatial information. The last dense layer outputs 38 class probabilities corresponding to 38 defect types.
\subsection{N-pair contrastive loss function}\label{sec:lossfunction}
The most widely used loss function for supervised learning is the ``cross-entropy loss''. However, it has crucial limitations \cite{zhang2018generalized}, such as noisy labels causing lack of robustness and poor performance with adversarial examples. In this paper, we use N-pair contrastive loss \cite{sohn2016improved} for supervised learning where normalized embeddings from the same category are drawn together more closely than embeddings from different categories.
This loss is used to train the encoder to generate vector embeddings of input images so that representations of images in the same class category are more similar than representations in different classes. Experimentally, it outperforms supervised training with ``cross-entropy loss''. Training an encoder with N-pair contrastive loss helps better embedding representation in the latent dimension of semiconductor WM having single defect and mixed defect types. This improves the accuracy of the overall network. Pre-training an encoder with N-pair contrastive loss reduces the distance between similar embeddings, resulting in better feature learning in the encoder stage, which aids in both classification and segmentation branches of the decoder.
We pre-train the encoder for 100 epochs with N-pair contrastive loss to generate feature representation of input data. We use the learned feature representations from the encoder block in the segmentation branch, and classification branch by freezing weights learned from the encoder branch. Instead of a ``dedicated network'' for segmentation and classification, a ``shared encoder'' makes it possible to train WSCN end-to-end, thereby reducing training time and model size.
Also, a ``shared encoder'' takes advantage of the shared information across multiple tasks and thus, helps in improvement of the model performance for all tasks.
\section{Experimental Results}\label{sec:experimentalResults}
In this section, we describe the evaluation approach (Section \ref{sec:evaluation}), and present the results of classification (Section \ref{sec:classification}), including ROC-AUC curve (Section \ref{sec:ROC}). We also analyze the failure cases to gain more insights (Section \ref{sec:mispredictedCases}). We then present the results of segmentation (Section \ref{sec:segmentation}). Finally, we report the latency value, and the model size reduction achieved by quantization (Section \ref{sec:latency}) and the limitation of the proposed methodology (Section \ref{sec:limitation}).
\subsection{Evaluation approach}\label{sec:evaluation}
\textbf{Experimental platform:}
The experimental tests were conducted using TensorFlow-GPU 2.6, and CUDA 11.2.
The initial ``learning rate'' is 0.001 and the ``decay rate'' is 0.1 whenever there is no convergence for 10 continuous epochs.
The batch size is 64. We use Adam optimizer with N-pair contrastive loss for pre-training the encoder for 100 epochs. We then use Adam optimizer with BCE-Dice loss for training the segmentation network and categorical cross-entropy loss for training the classification for 50 epochs. BCE-DICE loss combines ``binary cross-entropy loss'', which is ``distribution-based loss'' with ``DICE loss'' which is ``region-based loss''.
\textbf{Metrics:} For evaluating classification performance, we use accuracy, MCC \cite{chicco2020advantages}, ROC-AUC curve, precision and recall metrics. In the ROC curve, the ``area under curve'' (AUC) value ranges from 0 to 1. The higher the AUC, the better is the model's performance at distinguishing between the positive and negative classes. Matthews correlation coefficient (MCC) is defined as follows:
$MCC = \frac{TP * TN - FP * FN}{ \sqrt{ (TP + FP)(TP+FN)(TN+FP)(TN+FN)} } $
A value of -1 and +1 indicate perfect misclassification and perfect classification, respectively.
MCC considers true/false positive/negative and hence, is a better metric than ROC-AUC curve. MCC is the only binary classification rate that a high score only if the binary classifier could correctly predict a majority of positive instances and the majority of negative instances \cite{chicco2020advantages}. MCC is especially useful for mitigating the class imbalance issue \cite{chicco2020advantages}.
For evaluating the performance of segmentation, we use the dice coefficient, also known as dice similarity coefficient and intersection over union (IoU) \cite{MetricDefinition}. Although similar, these metrics have subtle differences \cite{DiceScoreIoU} and hence, we have included both of them.
\subsection{ROC-AUC curve} \label{sec:ROC}
Figure \ref{fig:ROC} shows the ROC curve for performance evaluation of different classification models. WSCN has an AUC of 0.9907, which is marginally below that of DenseNet121 (0.9991) and EfficientNetB0 (0.9946). All other classifiers have lower AUC value than WSCN.
\begin{figure}[htbp] \centering
\includegraphics [scale=0.70] {ROC.png}
\caption{ROC-AUC curve for different classifiers}
\label{fig:ROC}
\end{figure}
ROC-AUC curve depends on both the true positive rate and the false positive rate. However, the true negative and the false negative rate information is neglected in ROC-AUC curve.
Thus, the ROC-AUC curve may provide a misleading impression that the model gives good performance even though there might be chances of misclassification.
In Table \ref{tab:classificationResultsSummary}, we have presented the MCC metric, which gives a more complete picture of a classifier's performance than the ROC-AUC curve.
\subsection{Analysis of mispredicted wafer-maps}\label{sec:mispredictedCases}
We further investigate the 138 WMs that our model misclassifies. Figure \ref{fig:Misclassified} shows four such sample WMs.
In Figure \ref{fig:Misclassified1}, the GT annotation is Donut + EdgeLoc + Scratch. However, as evident from the figure and as predicted by our model, the GT should be Donut + Scratch only. Similarly, for Figures \ref{fig:Misclassified2} and \ref{fig:Misclassified3}, we find that the GT labels in the dataset are D + EL + L and ER + L, respectively, but our model predicts D + ER + L and ER, respectively. Our predictions appear to be more reasonable according to the visible defect pattern.
For a few other mispredicted WMs also, we observe that the GT labels appear to be confusing, whereas our model predicts correctly.
\begin{figure}[htbp]
\centering
\begin{subfigure}[b]{0.23\textwidth}
\centering
\includegraphics[width=0.9\textwidth]{Misclassified1.png}
\caption[Network2]%
{{\small GT:D+EL+S, Pred: D+S}}
\label{fig:Misclassified1}
\end{subfigure}
\begin{subfigure}[b]{0.23\textwidth}
\centering
\includegraphics[width=0.9\textwidth]{Misclassified2.png}
\caption[]%
{{\small GT:D+EL+L, Pred:D+ER+L}}
\label{fig:Misclassified2}
\end{subfigure}
\begin{subfigure}[b]{0.23\textwidth}
\centering
\includegraphics[width=0.9\textwidth]{Misclassified3.png}
\caption[]%
{{\small GT:ER+L, Pred: ER}}
\label{fig:Misclassified3}
\end{subfigure}
\begin{subfigure}[b]{0.23\textwidth}
\centering
\includegraphics[width=0.9\textwidth]{Misclassified4.png}
\caption[]%
{{\small GT: D+L, Pred: D+EL+L}}
\label{fig:Misclassified4}
\end{subfigure}
\caption[]
{\small Four sample failure cases (GT=ground-truth, Pred = prediction)}
\label{fig:Misclassified}
\end{figure}
For most misclassified 138 images, it is difficult for the model to learn the defects from the GT labels as there is no uniformity across the defect images. Especially, given the high similarity between EL and ER, distinguishing between them is challenging, and the correct GT label itself is debatable. Similarly, every ``nearfull'' defect is also a random defect. Hence, for four out of 138 images, the GT is ``random'', whereas the model predicts it as ``nearfull'' defect. Further, any localized defect, regardless of its size, is considered as L. Hence, it is difficult to distinguish an L defect and a regular (fault-free) pattern or other defect patterns. This discrepancy can be addressed if we have a dataset containing well-annotated bounding boxes or masks validated by semiconductor manufacturing experts.
For some WMs, such as the one shown in Figure \ref{fig:Misclassified4}, our model gives incorrect prediction. We believe that these WMs are difficult to predict even for humans.
\subsection{Segmentation Results}\label{sec:segmentation}
We have used ``IOU'' and ``dice coefficient'' to measure the performance of our model.
``Dice coefficient'' demonstrates the similarity between the ``ground truth'' and ``predicted mask''. As shown in Table \ref{tab:quantsegresults} in the ``WSCN(FP32)'' row, the value of dice-coefficient is 0.9999. This value indicates an extremely high similarity between ground truth and predicted mask. WSCN achieves an IoU of 0.9999, which confirms its high segmentation capability.
\begin{table}[htbp]
\centering
\caption{Model size and segmentation results of open-source models, WSCN(FP32), i.e., without quantization and WSCN(INT8), i.e., with INT8 quantization}\label{tab:quantsegresults}
\begin{tabular}{|l|c|c|c|}\hline
& Model Size & Dice Coefficient & IOU \\ \hline
UNet \cite{ronneberger2015u} & 125.77MB & 0.9998 & 0.9881 \\ \hline
DeepLabV3+ (ResNet50 backbone) \cite{chen2017deeplab} & 47.83 MB & 0.9946 & 0.9924 \\ \hline
WSCN(FP32) & 0.51 MB & 0.9999 & 0.9999 \\ \hline
WSCN(INT8) & 0.17MB & 0.9999 & 0.9999 \\ \hline
\end{tabular}
\end{table}
\textbf{Comparative evaluation:} Since ours is the first model to show segmentation on the MixedWM38 dataset, we compare WSCN against two well-known open-source segmentation models, namely UNet and DeepLabV3+ (with ResNet50 backbone). Table \ref{tab:quantsegresults} shows the results. While these models achieve comparable results as WSCN, their model size is much larger. In fact, WSCN's model size is 250$\times$ lower than that of UNet. Given this, WSCN can be considered the best among the segmentation models. Since the dice coefficient and IoU values of WSCN are 0.9999, the ROC-AUC curve remains close to 1. Hence, we omit it
\textbf{Visualization of WSCN results:} Table \ref{tab:segmentationVisualization} shows selected input images, corresponding ground-truth images, and the binary segmentation masks generated by WSCN. Evidently, the mask generated by WSCN is identical to the ground truth.
\subsection{Latency and quantization results}\label{sec:latency}
\textbf{Inference latency of WSCN:} We measure the latency of WSCN execution as follows. We first resize the input image from $52\times52$ to $224\times224$ size. We compute results of each image in batch of 1000 images from test set by sending corresponding image to WSCN, our proposed model. We record the time taken by each image for completing this process. We repeat this process ten times and take the average.
We observe a frame-rate of 25.11 frames-per-second on the Tesla P100 GPU. Thus, WSCN can work in real-time to perform defect classification with high-performance.
\textbf{Reducing model size using quantization:} The reference WSCN model uses single-precision (FP32) weights. We further reduce the model size by performing full integer quantization. The representative dataset is used to determine the min-max values of the inputs in full-integer quantization. When the converter quantizes the model, these are required to appropriately calculate the quantization nodes. As shown in Table \ref{tab:quantsegresults}, quantization reduces the model size of WSCN to merely 0.17MB, with negligible impact on the dice-coefficient and IoU values.
\subsection{Classification Results}\label{sec:classification}
We compare the results of classification for our model WSCN with DCNet \cite{wang2020deformable}, ResNet50 (shown as ResNet) \cite{he2016deep} and DenseNet121 (shown as DenseNet) \cite{huang2017densely}. This is because DCNet was also trained on the same dataset and ResNet50 and DenseNet121 are well-known, open-source models that can be trained on any dataset.
Table \ref{tab:classwise} presents classwise accuracy, precision and recall results.
\begin{table*}[htbp]
\centering
\caption{Classwise accuracy results. Avg(1Defect) shows average of eight single defect patterns. Avg(2Defects) shows average of thirteen 2 mixed-type patterns. Average(3Defects) shows average of twelve 3 mixed-type defect patterns. Average(4Defects) shows the average of four 4 mixed-type defects.}
\begin{tabular}{|c|r|r|r|r|r|r|r|r|r|r|r|r|}
\hline
Class & \multicolumn{4}{c|}{Accuracy} & \multicolumn{4}{c|}{Precision} & \multicolumn{4}{c|}{Recall} \\ \hline
\multicolumn{1}{|c|}{} & \multicolumn{1}{c|}{DenseNet} & \multicolumn{1}{c|}{ResNet} & \multicolumn{1}{c|}{DCNet} & \multicolumn{1}{c|}{WSCN} & \multicolumn{1}{c|}{DenseNet} & \multicolumn{1}{c|}{ResNet} & \multicolumn{1}{c|}{DCNet} & \multicolumn{1}{c|}{WSCN} & \multicolumn{1}{c|}{DenseNet} & \multicolumn{1}{c|}{ResNet} & \multicolumn{1}{c|}{DCNet} & \multicolumn{1}{c|}{WSCN} \\
\hline
\multicolumn{1}{|c|}{1} & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .451, .612, .812}99.70\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .984, .925, .937}94.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .984, .878, .89}91.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% \\
\hline
\multicolumn{1}{|c|}{2} & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .984, .984, .996}97.80\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .522, .659, .835}99.48\% & \cellcolor[rgb]{ .984, .91, .922}93.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% \\
\hline
\multicolumn{1}{|c|}{3} & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .988, .988, 1}98\% & \cellcolor[rgb]{ .984, .965, .976}96.50\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .957, .969}96.04\% & \cellcolor[rgb]{ .984, .941, .953}95.00\% & \cellcolor[rgb]{ .984, .957, .969}96.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .839, .882, .949}98.48\% & \cellcolor[rgb]{ .984, .91, .922}93.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% \\
\hline
\multicolumn{1}{|c|}{4} & \cellcolor[rgb]{ .984, .957, .969}96.00\% & \cellcolor[rgb]{ .984, .957, .969}96.00\% & \cellcolor[rgb]{ .984, .933, .941}94.40\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .533, .667, .839}99.44\% & \cellcolor[rgb]{ .984, .957, .969}96.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .984, .969, .98}96.72\% & \cellcolor[rgb]{ .984, .878, .89}91.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% \\
\hline
\multicolumn{1}{|c|}{5} & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .42, .588, .8}99.80\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .984, .957, .969}96.09\% & \cellcolor[rgb]{ .984, .91, .922}93.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .639, .745, .878}99.10\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% \\
\hline
\multicolumn{1}{|c|}{6} & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .984, .941, .953}95.00\% & \cellcolor[rgb]{ .984, .922, .933}93.80\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .984, .945, .957}95.31\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% \\
\hline
\multicolumn{1}{|c|}{7} & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .984, .953, .965}95.80\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .984, .894, .906}92.00\% & \cellcolor[rgb]{ .973, .553, .561}69.39\% & \cellcolor[rgb]{ .984, .867, .875}90.00\% & \cellcolor[rgb]{ .984, .894, .906}92.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .984, .925, .937}94.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% \\
\hline
\multicolumn{1}{|c|}{8} & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .984, .918, .929}93.40\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .984, .976, .988}97.30\% & \cellcolor[rgb]{ .973, .412, .42}60.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .98, .835, .847}88.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% \\
\hline
\multicolumn{1}{|c|}{9} & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .878, .89}91.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .894, .906}91.89\% & \cellcolor[rgb]{ .984, .91, .922}93.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% \\
\hline
\multicolumn{1}{|c|}{10} & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .608, .722, .867}99.20\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .973, .984}97.13\% & \cellcolor[rgb]{ .984, .925, .937}94.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .51, .651, .831}99.51\% & \cellcolor[rgb]{ .984, .925, .937}94.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% \\
\hline
\multicolumn{1}{|c|}{11} & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .984, .996}97.90\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .831, .878, .945}98.50\% & \cellcolor[rgb]{ .984, .894, .906}92.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% \\
\hline
\multicolumn{1}{|c|}{12} & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .984, .941, .953}95.00\% & \cellcolor[rgb]{ .831, .878, .945}98.50\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .518, .659, .835}99.49\% & \cellcolor[rgb]{ .984, .894, .906}92.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .984, .949, .961}95.61\% & \cellcolor[rgb]{ .984, .957, .969}96.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% \\
\hline
\multicolumn{1}{|c|}{13} & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .984, .965, .976}96.70\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .973, .984}97.17\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .506, .651, .831}99.52\% & \cellcolor[rgb]{ .984, .851, .859}89.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% \\
\hline
\multicolumn{1}{|c|}{14} & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .576, .698, .855}99.30\% & \cellcolor[rgb]{ .984, .925, .937}94.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .824, .875, .945}98.52\% & \cellcolor[rgb]{ .984, .957, .969}96.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .98, .992}97.56\% & \cellcolor[rgb]{ .984, .894, .906}92.00\% & \cellcolor[rgb]{ .984, .941, .953}95.00\% \\
\hline
\multicolumn{1}{|c|}{15} & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .957, .969}96.10\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .851, .89, .953}98.44\% & \cellcolor[rgb]{ .984, .878, .89}91.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .851, .89, .953}98.44\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% \\
\hline
\multicolumn{1}{|c|}{16} & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .91, .922}93.00\% & \cellcolor[rgb]{ .894, .922, .969}98.30\% & \cellcolor[rgb]{ .984, .941, .953}95.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .984, .925, .937}94.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .922, .933}93.75\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .984, .941, .953}95.00\% \\
\hline
\multicolumn{1}{|c|}{17} & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .984, .906, .918}92.80\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .984, .929, .941}94.20\% & \cellcolor[rgb]{ .984, .957, .969}96.00\% & \cellcolor[rgb]{ .984, .957, .969}96.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .518, .659, .835}99.49\% & \cellcolor[rgb]{ .984, .925, .937}94.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% \\
\hline
\multicolumn{1}{|c|}{18} & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .925, .937}93.90\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .667, .761, .886}99.02\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .973, .976, .996}98.06\% & \cellcolor[rgb]{ .984, .851, .859}89.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% \\
\hline
\multicolumn{1}{|c|}{19} & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .984, .898, .91}92.30\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .533, .667, .839}99.44\% & \cellcolor[rgb]{ .984, .925, .937}94.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .984, .984, .996}97.81\% & \cellcolor[rgb]{ .984, .878, .89}91.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% \\
\hline
\multicolumn{1}{|c|}{20} & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .984, .894, .906}92.00\% & \cellcolor[rgb]{ .984, .933, .945}94.60\% & \cellcolor[rgb]{ .984, .957, .969}96.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .506, .651, .831}99.52\% & \cellcolor[rgb]{ .984, .941, .953}95.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .984, .91, .918}92.83\% & \cellcolor[rgb]{ .984, .878, .89}91.00\% & \cellcolor[rgb]{ .984, .957, .969}96.00\% \\
\hline
\multicolumn{1}{|c|}{21} & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .875, .886}90.70\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .984, .984, .996}97.87\% & \cellcolor[rgb]{ .984, .957, .969}96.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .863, .902, .957}98.40\% & \cellcolor[rgb]{ .984, .894, .906}92.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% \\
\hline
\multicolumn{1}{|c|}{22} & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .984, .871, .882}90.30\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .984, .937, .949}94.87\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .984, .996}97.88\% & \cellcolor[rgb]{ .98, .835, .847}88.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% \\
\hline
\multicolumn{1}{|c|}{23} & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .984, .941, .953}95.00\% & \cellcolor[rgb]{ .984, .847, .859}88.90\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .663, .761, .886}99.03\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .984, .953, .965}95.79\% & \cellcolor[rgb]{ .984, .957, .969}96.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% \\
\hline
\multicolumn{1}{|c|}{24} & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .855, .867}89.40\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .678, .773, .894}98.98\% & \cellcolor[rgb]{ .984, .894, .906}92.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .918, .937, .976}98.23\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% \\
\hline
\multicolumn{1}{|c|}{25} & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .984, .957, .969}96.00\% & \cellcolor[rgb]{ .984, .886, .898}91.40\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .855, .898, .957}98.42\% & \cellcolor[rgb]{ .984, .91, .922}93.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .961, .973}96.39\% & \cellcolor[rgb]{ .984, .878, .89}91.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% \\
\hline
\multicolumn{1}{|c|}{26} & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .984, .902, .914}92.50\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .984, .973, .984}97.22\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% \\
\hline
\multicolumn{1}{|c|}{27} & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .871, .882}90.50\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .984, .922, .933}93.85\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .867, .902, .957}98.39\% & \cellcolor[rgb]{ .984, .91, .922}93.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% \\
\hline
\multicolumn{1}{|c|}{28} & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .98, .839, .851}88.30\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .984, .941, .953}95.00\% & \cellcolor[rgb]{ .984, .941, .953}95.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .98, .992}97.54\% & \cellcolor[rgb]{ .984, .878, .89}91.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% \\
\hline
\multicolumn{1}{|c|}{29} & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .957, .969}96.00\% & \cellcolor[rgb]{ .984, .871, .882}90.50\% & \cellcolor[rgb]{ .984, .957, .969}96.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .686, .776, .894}98.96\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .969, .98}96.95\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% \\
\hline
\multicolumn{1}{|c|}{30} & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .898, .91}92.30\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .89, .918, .965}98.32\% & \cellcolor[rgb]{ .984, .851, .859}89.00\% & \cellcolor[rgb]{ .984, .925, .937}94.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .89, .918, .965}98.32\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% \\
\hline
\multicolumn{1}{|c|}{31} & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .984, .886, .898}91.50\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .957, .965, .988}98.11\% & \cellcolor[rgb]{ .984, .867, .875}90.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .506, .651, .831}99.52\% & \cellcolor[rgb]{ .984, .925, .937}94.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% \\
\hline
\multicolumn{1}{|c|}{32} & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .984, .957, .969}96.00\% & \cellcolor[rgb]{ .98, .839, .851}88.30\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .984, .957, .969}96.19\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .984, .965, .976}96.65\% & \cellcolor[rgb]{ .98, .835, .847}88.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% \\
\hline
\multicolumn{1}{|c|}{33} & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .98, .808, .82}86.20\% & \cellcolor[rgb]{ .984, .957, .969}96.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .984, .976, .988}97.38\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .984, .976, .988}97.38\% & \cellcolor[rgb]{ .984, .91, .922}93.00\% & \cellcolor[rgb]{ .984, .957, .969}96.00\% \\
\hline
\multicolumn{1}{|c|}{34} & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .851, .859}89.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .984, .886, .898}91.37\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .875, .91, .961}98.36\% & \cellcolor[rgb]{ .984, .925, .937}94.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% \\
\hline
\multicolumn{1}{|c|}{35} & \cellcolor[rgb]{ .984, .941, .953}95.00\% & \cellcolor[rgb]{ .984, .925, .937}94.00\% & \cellcolor[rgb]{ .98, .82, .831}87.00\% & \cellcolor[rgb]{ .984, .925, .937}94.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .8, .855, .933}98.60\% & \cellcolor[rgb]{ .984, .957, .969}96.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .984, .957, .969}96.00\% & \cellcolor[rgb]{ .984, .933, .945}94.62\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .984, .941, .953}95.00\% \\
\hline
\multicolumn{1}{|c|}{36} & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .984, .875, .886}90.60\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .957, .965}95.94\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .984, .976, .988}97.42\% & \cellcolor[rgb]{ .984, .957, .969}96.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% \\
\hline
\multicolumn{1}{|c|}{37} & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .98, .812, .82}86.40\% & \cellcolor[rgb]{ .984, .941, .953}95.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .984, .941, .953}95.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .835, .882, .949}98.49\% & \cellcolor[rgb]{ .984, .851, .859}89.00\% & \cellcolor[rgb]{ .984, .941, .953}95.00\% \\
\hline
\multicolumn{1}{|c|}{38} & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .98, .839, .847}88.20\% & \cellcolor[rgb]{ .984, .941, .953}95.00\% & \cellcolor[rgb]{ .353, .541, .776}100.00\% & \cellcolor[rgb]{ .984, .969, .98}96.81\% & \cellcolor[rgb]{ .984, .894, .906}92.00\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .988, .988, 1}98.00\% & \cellcolor[rgb]{ .871, .906, .961}98.38\% & \cellcolor[rgb]{ .984, .894, .906}92.00\% & \cellcolor[rgb]{ .984, .941, .953}95.00\% \\
\hline
Avg(1Defect) & \cellcolor[rgb]{ .788, .851, .933}98.63\% & \cellcolor[rgb]{ .984, .976, .988}97.29\% & \cellcolor[rgb]{ .984, .961, .973}96.44\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .984, .984, .996}97.88\% & \cellcolor[rgb]{ .984, .937, .949}94.72\% & \cellcolor[rgb]{ .984, .871, .882}90.38\% & \cellcolor[rgb]{ .984, .976, .988}97.25\% & \cellcolor[rgb]{ .71, .792, .902}98.88\% & \cellcolor[rgb]{ .984, .984, .996}97.95\% & \cellcolor[rgb]{ .984, .922, .933}93.78\% & \cellcolor[rgb]{ .569, .694, .855}99.33\% \\
\hline
Avg(2Defects) & \cellcolor[rgb]{ .722, .8, .906}98.85\% & \cellcolor[rgb]{ .984, .969, .98}96.92\% & \cellcolor[rgb]{ .984, .949, .957}95.43\% & \cellcolor[rgb]{ .984, .984, .996}97.92\% & \cellcolor[rgb]{ .773, .835, .925}98.69\% & \cellcolor[rgb]{ .988, .988, 1}98.01\% & \cellcolor[rgb]{ .984, .937, .949}94.85\% & \cellcolor[rgb]{ .792, .851, .933}98.62\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .984, .98, .992}97.53\% & \cellcolor[rgb]{ .984, .91, .922}93.08\% & \cellcolor[rgb]{ .871, .906, .961}98.38\% \\
\hline
Avg(3Defects) & \cellcolor[rgb]{ .984, .984, .996}97.92\% & \cellcolor[rgb]{ .984, .976, .988}97.33\% & \cellcolor[rgb]{ .984, .863, .875}89.90\% & \cellcolor[rgb]{ .984, .98, .992}97.58\% & \cellcolor[rgb]{ .776, .839, .925}98.67\% & \cellcolor[rgb]{ .984, .976, .988}97.32\% & \cellcolor[rgb]{ .984, .945, .957}95.33\% & \cellcolor[rgb]{ .984, .98, .992}97.58\% & \cellcolor[rgb]{ .965, .973, .992}98.08\% & \cellcolor[rgb]{ .984, .984, .996}97.79\% & \cellcolor[rgb]{ .984, .933, .945}94.50\% & \cellcolor[rgb]{ .984, .984, .996}97.92\% \\
\hline
Avg(4Defects) & \cellcolor[rgb]{ .984, .973, .984}97.00\% & \cellcolor[rgb]{ .984, .969, .98}96.75\% & \cellcolor[rgb]{ .98, .835, .847}88.05\% & \cellcolor[rgb]{ .984, .945, .957}95.25\% & \cellcolor[rgb]{ .592, .71, .863}99.25\% & \cellcolor[rgb]{ .984, .976, .988}97.34\% & \cellcolor[rgb]{ .984, .949, .961}95.50\% & \cellcolor[rgb]{ .671, .765, .89}99.00\% & \cellcolor[rgb]{ .984, .98, .992}97.50\% & \cellcolor[rgb]{ .984, .976, .988}97.23\% & \cellcolor[rgb]{ .984, .925, .937}94.00\% & \cellcolor[rgb]{ .984, .953, .965}95.75\% \\
\hline
\multicolumn{1}{|c|}{Avg(All38)} & \cellcolor[rgb]{ .882, .914, .965}98.34\% & \cellcolor[rgb]{ .984, .973, .984}97.19\% & \cellcolor[rgb]{ .984, .914, .925}93.20\% & \cellcolor[rgb]{ .925, .945, .98}98.20\% & \cellcolor[rgb]{ .796, .855, .933}98.61\% & \cellcolor[rgb]{ .984, .973, .984}97.08\% & \cellcolor[rgb]{ .984, .925, .937}94.00\% & \cellcolor[rgb]{ .965, .973, .992}98.08\% & \cellcolor[rgb]{ .816, .867, .941}98.55\% & \cellcolor[rgb]{ .984, .98, .992}97.68\% & \cellcolor[rgb]{ .984, .941, .953}95.00\% & \cellcolor[rgb]{ .933, .949, .98}98.18\% \\
\hline
\end{tabular}%
\label{tab:classwise}%
\end{table*}%
\subsection{Limitations of Proposed Methodology}\label{sec:limitation}
We note the following areas for further improvement of our approach:
1. \textbf{Performance on unseen classes:}
We have used predetermined defect classes and combinations of multiple defect classes. Due to the dynamic nature of the manufacturing process, all the different types of defects cannot be decided in the initial stage. We have used a CNN-based dynamic defect feature extraction approach from wafermap images. Since WSCN is trained on predetermined classes, it may show lower performance on real-world defect classes that are not introduced to the model in the training phase. To achieve high accuracy on those defects, we would need to retrain or fine-tune the model. Also, we plan to train WSCN using unsupervised learning to further improve its classification performance.
2. \textbf{Ability to distinguish \textit{similar-looking} unseen classes:} We have trained our feature extraction encoder using N-pair contrastive loss. It helps in finding similarity between embeddings from the same class in the training phase. If our model comes across an unknown class which is similar to one of the known classes on which the model has been trained, our model would predict that unknown class to the similar known class. For example, if there is an unknown class which is similar to ER, then our model would predict the unknown class as ER defect. This is due to the fact that N-pair contrastive loss in the encoder maps the embeddings of similar patterns of defects close to each other in the latent representation.
3. \textbf{Improving training efficiency:} Currently, we have trained WSCN model from scratch. To increase the model's training efficiency and shorten the training time, we plan to use transfer learning.
\section{Conclusion} \label{sec:Conclusion}
We propose WaferSegClassNet (WSCN), a lightweight deep learning architecture for performing the classification and segmentation of semiconductor wafer defects. We use N-pair contrastive loss to reduce the time to train and also boost classification and segmentation performance.
The classification accuracy achieved by WSCN is higher than that of DCNet and ResNet50 and is in the same range as that of DenseNet121. The dice-score and IoU of WSCN are close to 1 and are competitive with open-source models such as DeepLabv3+ and UNet. WSCN's model size is 200$\times$ lower than that of ResNet50 and 250$\times$ lower than that of UNet. Thus, considering the balance of both predictive performance and model size, WSCN can be regarded as the best. We are the first to show segmentation performance on the MIXEDWM38 dataset.
Our future work will extend our defect analysis technique to detect defects in other scenarios such as civil constructions.
\section*{Acknowledgement}
The experimental results were obtained using the computing resources provided by IIT Roorkee under the grant FIG-100874.
\section{0pt}{12pt plus 4pt minus 2pt}{0pt plus 2pt minus 2pt}
\newcommand{\myresp}[1]{{\color{blue}#1}}
\newcommand{\revised}[1]{{\color{magenta}#1}}
\newcolumntype{C}[1]{>{\centering\let\newline\\\arraybackslash}m{#1}}
\usepackage{url}
\usepackage{caption}
\captionsetup[table]{skip=1pt}
\setlength{\tabcolsep}{3pt}
\onecolumn
\begin{document}
\title{WaferSegClassNet - A Light-weight Network for Classification and Segmentation of Semiconductor Wafer Defects}
\author{Subhrajit Nag, Dhruv Makwana, Sai~Chandra~Teja~R, Sparsh Mittal, C Krishna Mohan
\thanks{Subhrajit Nag is at IIT Hyderabad. Dhruv Makwana and Sai~Chandra~Teja~R are at CKMVigil Pvt Ltd. Sparsh is at IIT Roorkee. C Krishna Mohan is at IIT Hyderabad and CKMVigil Pvt Ltd. Email of the corresponding author: <EMAIL> } }
\maketitle
\input{0abstract}
\maketitle
\IEEEpeerreviewmaketitle
\ifCLASSOPTIONcompsoc
\noindent\raisebox{2\baselineskip}[0pt][0pt]%
{\parbox{\columnwidth}{\section{Introduction}\label{sec:introduction}%
\global\everypar=\everypar}}%
\vspace{-1\baselineskip}\vspace{-\parskip}\par
\else
\section{Introduction}\label{sec:introduction}\par
\fi
\input{10intro}
\input{16relatedwork}
\input{15background}
\input{25Data_PreProcessing}
\input{30proposedApproach}
\input{50experimentation}
\input{70ClassificationAccuracyResultsFinal}
\input{55resultsClassification}
\input{56failurecaseResults}
\input{52segmentationVisualization}
\input{57resultsSegmentation}
\input{90conclusion}
\bibliographystyle{IEEEtran}
|
\section{Introduction}
The volume conjecture is one of the most important problems in low-dimensional topology.
In \cite{Ka}, Kashaev discovered that a certain limit of the Kashaev invariant of specific hyperbolic knots
such as the figure-eight knot is equal to the hyperbolic volume of their complements.
In \cite{MM}, Murakami and Murakami proved that the Kashaev invariant is a specialization of the colored Jones polynomial and conjectured
that a similar limit of the colored Jones polynomial for an arbitrary knot is equal to the simplicial volume of its complement.
In addition, Chen and Yang \cite{CY} considered the volume conjectures for 3-manifold invariants such as Reshetikhin-Turaev invariant
and Turaev-Viro invariant, and provided numerical evidence for them for specific 3-manifolds.
In \cite{DKY}, Detcherry, Kalfagianni and Yang showed the relationship between the colored Jones polynomial for a link and the Turaev-Viro invariant of its
complement. By using this relation, they mathematically verified the Chen-Yang conjecture for complements of the figure-eight knot and Borromean rings.\par
Meanwhile, theoretical evidence of the original volume conjecture has been considered.
In \cite{KT}, Kashaev and Tirkkonen proved the volume conjecture for torus knots. In \cite{Yo},
on the other hand, Yokota found a correspondence between quantum factorials in the Kashaev invariant and an ideal triangulation of a hyperbolic knot complement.
He showed that a saddle point equation for the potential function (see Section \ref{sec:pf} for the definition) of the invariant is equivalent to a hyperbolicity equation.
Also, the potential function of the colored Jones polynomial $J_N(K;e^{\frac{2 \pi \sqrt{-1}}{N}})$ for a hyperbolic knot $K$ is considered in \cite{Ch}, \cite{Ch2}, and \cite{CM}.\par
In this study, we consider the potential function of
the colored Jones polynomial for a link $L$ with arbitrary colors.
We establish a relationship between a saddle point equation and a hyperbolicity equation of the link complement.
More precisely,
for a fixed diagram $D$ of the link $L$, we introduce a potential function
$\Phi_D(a_1,\ldots,a_n,w_1,\ldots,w_\nu)$ of the colored Jones polynomial $J_{\boldsymbol{a}(N)}(L;e^{\frac{2 \pi \sqrt{-1}}{N}})$
with new parameters corresponding to the colors $\boldsymbol{a}(N)$ of link components.
When we fix the new parameters $ \boldsymbol{a}=(a_1,\ldots,a_n)$
the saddle point $(\sigma_1(\boldsymbol{a}),\ldots,\sigma_\nu(\boldsymbol{a}))$
of $\Phi_D(\boldsymbol{a},-)$ gives a non-complete hyperbolic structure to the link complement.
In fact, the manifold $M_{a_1,\ldots,a_n}$ with the hyperbolic structure is a cone-manifold.
Especially, we prove the following statement.
\begin{mthm}[Theorem \ref{thm:m1}] \label{mthm1}
The hyperbolic volume of the cone-manifold $M_{a_1,\ldots,a_n}$ is equal to the imaginary part of the value
\[
\tilde{\Phi}_D = \Phi _D - \sum^{\nu}_{j=1}w_j \frac{\partial \Phi _D}{\partial w_j} \log w_j
\]
evaluated at $w_j = \sigma _j(\boldsymbol{a}),\ (j=1,\ldots,\nu)$.
\end{mthm}
Furthermore, we prove that the derivatives of the potential function
with respect to the new parameters correspond to the completeness of the hyperbolic structure of the link complement.
Note that similar arguments for the Kashaev invariant of the $5_2$ knot are indicated in \cite{Y2}.
As an application,
we prove the following theorem.
\begin{mthm}[Theorem \ref{thm:m2}] \label{mthm2}
Let $D$ be a diagram of a hyperbolic link with $n$ components, and $\boldsymbol{1}$ be $(1,\ldots,1) \in \mathbb{Z}^n$.
The point $(\boldsymbol{1},\sigma_1(\boldsymbol{1}),\ldots,\sigma_\nu (\boldsymbol{1}))$ is a saddle point of the function
$\Phi_D (a_1,\ldots,a_n,w_1,\ldots,w_\nu)$ and gives a complete hyperbolic structure to the link complement.
\end{mthm}
The paper is organized as follows. In section \ref{sec:prelim}, we recall the facts on the colored Jones polynomial and the Turaev-Viro invariant.
In section \ref{sec:pf}, we give the potential function of the colored Jones polynomial.
In section \ref{sec:nchypstr}, we consider the case where the new parameters are fixed and prove the Main Theorem \ref{mthm1}.
In section \ref{sec:compness}, we regard the new parameters as variables and prove the Main Theorem \ref{mthm2}.
In section \ref{sec:wrt}, we briefly mention the Witten-Reshetikhin-Turaev invariant.
\par
\noindent \textit{Acknowledgments.} The author is grateful to Jun Murakami for his helpful comments.
\section{Preliminaries} \label{sec:prelim}
In this section, we review some facts on the invariants for a link and a $3$-manifold.
\subsection{The colored Jones polynomial and the Turaev-Viro invariant}
Let $L$ be an oriented $n$-component link, $\boldsymbol{i}$ be a multi-integer, and $t$ be an indeterminate.
The colored Jones polynomial $J_{\boldsymbol{i}}(L;t)$ is defined skein-theoretically by using the Kauffman bracket,
which is a map $ \langle \cdot \rangle$ from the set of all unoriented diagrams of links to
the ring of Laurent polynomials $\mathbb{Z}[A,A^{-1}]$ in an indeterminate $A$ given by the following axioms:
\begin{enumerate}
\item For the trivial diagram $ \bigcirc $,
\[
\langle \bigcirc \rangle = 1.
\]
\item For an unoriented diagram $D$ with the trivial component added,
\[
\langle D \sqcup \bigcirc \rangle = (-A^2-A^{-2}) \langle D \rangle.
\]
\item For each crossing,
\begin{center}
\includegraphics[scale=1.0]{skein.pdf}
\end{center}
\end{enumerate}
Let $D_0$ be an unoriented diagram of the link $L$. The colored Jones polynomial $J_{\boldsymbol{i}}(L;t)$ for the link $L$
is a certain normalization of the Kauffman bracket of the
parallelized diagram of $D_0$ in which the Jones-Wentzl idempotent is inserted, where $t=A^{-4}$ \cite{DKY}.
\begin{rem}
In this paper, we normalize the colored Jones polynomial so that the one for the trivial knot is equal to $1$.
\end{rem}
From the perspective of the skein theory, we can define
the 3-manifold invariants such as the Reshetikhin-Turaev invariant or the Turaev-Viro invariant.
In \cite{DKY},
Detcherry, Kalfagianni, and Yang presented the relationship between the Turaev-Viro invariant for the link complement and the colored Jones polynomial.
\begin{thm}[Detcherry-Kalfragianni-Yang \cite{DKY}] \label{thm:TVvsJ}
Let $L \subset S^3$ be a link with $n$ components and $\overline{t}=q^2$. Namely, $\overline{t}=q^2=A^4$.
\begin{enumerate}
\item For an integer $r \geq 3$ and a primitive $4r$-th root of unity $A$, we have
\[
TV_r(S^3 \setminus L,q)= \eta _r^2 \sum _{1 \leq \boldsymbol{i}\leq r-1}|J'_{\boldsymbol{i}}(L;\overline{t})|^2.
\]
\item For an odd integer $r=2m+1 \leq 3$ and a primitive $2r$-th root of unity $A$, we have
\[
TV_r(S^3 \setminus L,q)= 2^{n-1}(\eta'_r)^2 \sum _{1 \leq \boldsymbol{i}\leq m}|J'_{\boldsymbol{i}}(L;\overline{t})|^2.
\]
\end{enumerate}
Here, $ \eta _r$ and $ \eta'_r$ are
\[
\eta _r = \frac{A^2-A^{-2}}{\sqrt{-2r}},\quad \eta'_r = \frac{A^2-A^{-2}}{\sqrt{-r}}.
\]
In addition, for a multi-integer $\boldsymbol{i}=(i_1,\ldots,i_n)$,
$ 1 \leq \boldsymbol{i}\leq m $ denotes that $1 \leq i_k \leq m $ for all integers $k = 1,\ldots,n$.
\end{thm}
\begin{rem}
In \cite{DKY}, the normalization of the colored Jones polynomial and conventions on parameters are slightly different from the ones in this paper.
Therefore, we use the notation $J'_{\boldsymbol{i}}(L;\overline{t})$ in Theorem \ref{thm:TVvsJ}.
\end{rem}
These invariants are conjectured to relate to the geometry of the 3-manifold.
In \cite{MM},
Murakami and Murakami conjectured that a certain limit of the colored Jones polynomial for a knot
is equal to the volume of the complement of the knot.
\begin{conj}[Volume Conjecture \cite{MM}]
For any knot $K$,
\[
2 \pi \lim _{N \to \infty} \frac{\log |J_N(K;t=e^{\frac{2 \pi \sqrt{-1}}{N}})|}{N} = v_3 ||K||,
\]
where $v_3$ is the volume of the ideal regular tetrahedron in the three-dimensional hyperbolic space
and $|| \cdot ||$ is the simplicial volume for the complement of $K$.
\end{conj}
This conjecture was generalized to the one for $3$-manifold invariants.
\begin{conj}[Chen-Yang Conjecture \cite{CY}]
For any $3$-manifold $M$ with a complete hyperbolic structure of the finite volume,
\[
2 \pi \lim _{r \to \infty}\frac{\log TV_r(M,q=e^{\frac{2 \pi \sqrt{-1}}{r}})}{r}= \vol(M),
\]
where $r$ runs over all odd integers, $TV(M)$ is a Turaev-Viro invariant of $M$ and $\vol(M)$ is a hyperbolic volume of $M$.
\end{conj}
Moreover, Detcherry, Kalfagianni, and Yang proved the following theorem by using Theorem \ref{thm:TVvsJ}.
\begin{thm}[Detcherry-Kalfragianni-Yang \cite{DKY}] \label{thm:CYconjforL}
Let $L$ be either the figure-eight knot or the Borromean rings, and let $M$ be the complement of $L$ in $S^3$. Then,
\[
2 \pi \lim _{r \to \infty}\frac{\log TV_r(M,q=e^{\frac{2 \pi \sqrt{-1}}{r}})}{r}=4 \pi \lim _{m \to \infty}\frac{\log |J'_{m}(L;\overline{t}=e^{\frac{4 \pi \sqrt{-1}}{2m+1}})|}{2m+1} =\vol(M),
\]
where $r = 2m+1$ runs over all odd integers.
\end{thm}
\begin{rem}
If $t$ is a root of unity, $\overline{t}$ is the complex conjugate of $t$. Therefore,
\[
\lim _{m \to \infty}\frac{\log |J'_{m}(L;\overline{t}=e^{\frac{4 \pi \sqrt{-1}}{2m+1}})|}{2m+1}=\lim _{m \to \infty}\frac{\log |J_{m}(L;t=e^{\frac{4 \pi \sqrt{-1}}{2m+1}})|}{2m+1}
\]
holds.
\end{rem}
Meanwhile, the evidence of the volume conjecture was established in \cite{Yo}.
What is important is that a saddle point equation of a potential function of the colored Jones polynomial for a knot coincides with
a gluing condition of the ideal triangulation of the knot complement.
This and Theorem \ref{thm:TVvsJ} indicate that
if we can establish a similar relationship between a hyperbolicity equation and a potential function of the colored Jones polynomial
with arbitrary colors, the relationship is evidence of the Chen-Yang conjecture for a link complement.
\subsection{The $R$-matrix of the colored Jones polynomial}
In this subsection, we give the $R$-matrix of the colored Jones polynomial by following \cite{KM}.
For an integer $r>1$, Let $\mathcal{A}_r$ be the algebra generated by $X,\ Y,\ K,\ \overline{K}$ with the following relations:
\begin{align*}
\overline{K}=K^{-1},\quad KX=sXK,\quad &KY=s^{-1}YK,\quad XY-YX=\frac{K^2-\overline{K}^2}{s-s^{-1}},\\
&X^r=Y^r=0,\quad K^{4r}=1,
\end{align*}
where $s=e^{\frac{\pi \sqrt{-1}}{r}}$.
Namely, $\mathcal{A}_r$ is $\mathcal{U}_q(sl_2)$ with the last $3$ relations. The universal $R$-matrix $\mathcal{R} \in \mathcal{A}_r \otimes \mathcal{A}_r$ is given by
\[
\mathcal{R}=\frac{1}{4r}\sum _{\substack{0 \leq k < r \\ 0 \leq a,b <4r}}\frac{(s-s^{-1})^k}{[k]_s !}s^{-\frac{1}{2}(ab+(b-a)k+k)}X^kK^a \otimes Y^k K^b.
\]
Here, we put
\[
[k]_s=\frac{s^k-s^{-k}}{s-s^{-1}},\quad [k]_s !=[k]_s \cdots [1]_s, \quad [0]_s!=1.
\]
Let $N$ be a positive integer and $m$ be the half-integer satisfying $N=2m+1$.
We define the action of $\mathcal{A}_r$ on $N$-dimensional complex vector space $V$ with a basis $\{e_{-m},e_{-m+1},\ldots,e_m\}$ by
\begin{align*}
Xe_i &= [m-i+1]_s e_{i-1}, \\
Ye_i &= [m+i+1]_s e_{i+1}, \\
Ke_i &= s^{-i}e_i.
\end{align*}
Here, $e_i$ in this paper corresponds to $e_{-i}$ in \cite{KM}.
Let $V'$ be $N'=2m'+1$ dimensional comlex vector space with a basis $\{e'_{-m'},\ldots,e'_{m'}\}$.
Then, the quantum $R$-matrix $R_{VV'}:V \otimes V' \to V' \otimes V$ is given by
\begin{align*}
R_{VV'}(e_i \otimes e'_j)=\sum _{k=0}^{\min \{m+i,\ m'-j \}} &\frac{\{m-i+k\}_s!\{m'+j+k\}_s!}{\{k\}_s!\{m-i\}_s!\{m'+j\}_s!} \\
& \times s^{2ij+k(i-j)-k(k+1)/2}e'_{j+k} \otimes e_{i-k},
\end{align*}
where
\[
\{k\}_s = s^{k}-s^{-k}, \quad \{k\}_s!=\{k\}_s \cdots \{1\}_s,\quad \{0\}_s! = 1.
\]
Also, its inverse is
\begin{align*}
R_{VV'}^{-1}(e'_i \otimes e_j) = \sum _{k=0}^{\min \{m-i,\ m'+j \}} &(-1)^k \frac{\{m-j+k\}_s!\{m'+i+k\}_s!}{\{k\}_s!\{m-j\}_s!\{m'+i\}_s!} \\
& \times s^{-2ij+k(i-j)/2+k(k+1)/2}e_{j-k} \otimes e'_{i+k}.
\end{align*}
These matrices and the isomorphism $\mu: V \to V$
\[
\mu(e_i)=s^{-2i}e_i,\quad(i=-m,\ldots,m)
\]
defines a link invariant $\tilde{J}$.
If $V=V'$ and $\dim V = 2$, Then
\[
R_{VV}=\left(\begin{array}{cccc}
s^{\frac{1}{2}}& 0& 0& 0\\
0& 0& s^{-\frac{1}{2}}& 0\\
0& s^{-\frac{1}{2}}& s^{\frac{1}{2}}-s^{-\frac{3}{2}}& 0 \\
0& 0& 0& s^{\frac{1}{2}}
\end{array} \right)
\]
and satisfies
\[
s^{\frac{1}{2}}R_{VV} - s^{-\frac{1}{2}}R_{VV}^{-1}= (s-s^{-1})I_4,
\]
where $I_4$ is the $4 \times 4$ identity matrix.
Considering the writhes, this implies
\begin{equation} \label{eq:Jske}
s^2 \tilde{J}(L_+)-s^{-2} \tilde{J}(L_-)=(s-s^{-1})\tilde{J}(L_0),
\end{equation}
where $L_+,\ L_-,\ L_0$ are the links in Figure \ref{fig:LLL}.
\begin{figure}[htb]
\centering
\includegraphics[scale=0.7]{LLL.pdf}
\caption{The links that are identical except for these regions.}
\label{fig:LLL}
\end{figure}
Under substitution $s=-t^{-\frac{1}{2}}$, the relation \eqref{eq:Jske} coincides with the skein relation of the Jones polynomial.
Therefore, under this substitution the $R$-matrix of the colored Jones polynomial $J_{\boldsymbol{i}}(L;t)$
for $L$ with colors $\boldsymbol{i}=(i_1,\ldots,i_n) \in \mathbb{Z}^n_{>0}$, where $i_j\ (j=1,\ldots,n)$ is a dimension of the assigned representation is
\begin{align} \label{eq:Rmat}
\begin{split}
R_{VV'}(e_i \otimes e'_j)=\sum _{k=0}^{\min \{m+i,\ m'-j \}} &(-1)^{k+k(m+m')+2ij}\frac{\{m-i+k\}!\{m'+j+k\}!}{\{k\}!\{m-i\}!\{m'+j\}!} \\
& \times t^{-ij-\frac{k(i-j)}{2}+\frac{k(k+1)}{4}}e'_{j+k} \otimes e_{i-k},
\end{split}
\end{align}
and its inverse is
\begin{align*}
R_{VV'}^{-1}(e'_i \otimes e_j) = \sum _{k=0}^{\min \{m-i,\ m'+j \}} &(-1)^{-k(m+m')-2ij} \frac{\{m-j+k\}!\{m'+i+k\}!}{\{k\}!\{m-j\}!\{m'+i\}!} \\
& \times t^{ij-\frac{k(i-j)}{2}-\frac{k(k+1)}{4}}e_{j-k} \otimes e'_{i+k},
\end{align*}
where
\[
\{k\} = t^{\frac{k}{2}}-t^{-\frac{k}{2}}, \quad \{k\}!=\{k\}\{k-1\}\cdots \{1\},\quad \{0\}! = 1.
\]
\section{Potential function} \label{sec:pf}
Let $L=L_1 \cup \cdots \cup L_n$ be an oriented $n$-component link. We deform $L$ so that $L$ is a closure of a braid.
Let $D$ be its oriented diagram, and $\xi_N=e^{\frac{2\pi \sqrt{-1}}{N}}$ be the primitive $N$-th root of unity.
For each link component $L_i \ (i=1,\ldots,n)$, we assign its color $a_i(N) \in \mathbb{Z}_{>0}$. We put $\boldsymbol{a}(N)=(a_1(N),\ldots,a_n(N))$.
In this section, we determine a potential function of the colored Jones polynomial
$J_{\boldsymbol{a}(N)}(L;\xi_N^p)$ for $L$, where $p$ is a non-zero integer.
See \cite{Ch} for details.
\begin{defi}
Suppose that a certain quantity $Q_N$ can be written as
\[
Q_N \underset{N \to \infty}{\sim} \int \cdots \int _\Omega P_N e^{\frac{N}{2 \pi \sqrt{-1}} \Phi(z_1,\ldots,z_\nu)}dz_1 \cdots dz_\nu,
\]
where $P_N$ grows at most polynomially and $ \Omega $ is a region in $\mathbb{C}^\nu$. We call this function $\Phi(z_1,\ldots,z_\nu)$ a potential function of $Q_N$.
\end{defi}
We can easily verify that
\begin{equation} \label{eq:qfbr}
\{k\}! = (-1)^k t^{-\frac{k(k+1)}{4}}(t)_k,
\end{equation}
where
\[
(t)_k =(1-t)(1-t^2) \cdots (1-t^k).
\]
Thus, we approximate $(\xi_N^p)_k$ by continuous functions.
\begin{prop} \label{prop:approx}
For a sufficiently large integer $N$,
\[
\log(\xi^p_N)_k = \frac{N}{2p \pi \sqrt{-1}}\left( -\li(\xi^{pk}_N)+\frac{\pi^2}{6}+o(1)\right)
\]
holds, where $\li$ is a dilogarithm function
\[
\li(z) = -\int^z_0 \frac{\log(1-x)}{x}dx.
\]
\end{prop}
\begin{rem}
The dilogarithm function satisfies
\[
\li(z) = \sum^{\infty}_{k=1}\frac{z^2}{k^2}
\]
for $|z|<1$, and
\[
\li(1) = \sum^{\infty}_{k=1}\frac{1}{k^2} = \frac{\pi^2}{6}.
\]
\end{rem}
\begin{proof}
By the direct calculation, we have
\begin{align*}
\log(\xi^p_N)_k &= \sum^k_{j=1}\log(1-e^{\frac{2p \pi j \sqrt{-1} }{N}}) \\
&= N \left( \int^{\frac{k}{N}}_0 \log(1-e^{2p \pi \sqrt{-1} \theta})d \theta+o(1) \right)\\
&=\frac{N}{2p \pi \sqrt{-1}}\left( \int^{\xi^{pk}_N}_1 \frac{\log(1-x)}{x}dx +o(1) \right)\\
&= \frac{N}{2p \pi \sqrt{-1}}\left( -\li(\xi^{pk}_N)+\frac{\pi^2}{6}+o(1)\right).
\end{align*}
\end{proof}
First, we consider the case where the strings at a crossing are in the different components.
Let $\{a(N)\}_{N=1,2,\ldots}$ and $\{b(N)\}_{N=1,2,\ldots}$ be sequences of natural numbers.
We can approximate the $R$-matrix by Proposition \ref{prop:approx}.
For a positive crossing of the link diagram, the $R$-matrix $R_{VV'}$ of \eqref{eq:Rmat} is labeled.
For convenience, we recall the summand of the $R$-matrix:
\[
(-1)^{k+k(m_N+m'_N)+2ij}t^{-ij-\frac{k(i-j)}{2}+\frac{k(k+1)}{4}}\frac{\{m_N-i+k\}!\{m'_N+j+k\}!}{\{k\}!\{m_N-i\}!\{m'_N+j\}!}.
\]
Here, $m_N$ and $m'_N$ are the half-integers satisfying $a(N) = 2m_N +1$ and $b(N)=2m'_N +1$.
If we assume that $a(N)$ and $b(N)$ are odd numbers, indices $i,\ j$ are integers.
Moreover, by adding $2$ to $a(N)$ or $b(N)$ if necessary, we can assume that $m_N+m'_N$ is an even integer
without changing the values of the limit $a(N)/N$ and $b(N)/N$. Therefore, under these assumptions the summand is
\[
(-1)^{k}t^{-ij-\frac{k(i-j)}{2}+\frac{k(k+1)}{4}}\frac{\{m_N-i+k\}!\{m'_N+j+k\}!}{\{k\}!\{m_N-i\}!\{m'_N+j\}!}.
\]
From the equality \eqref{eq:qfbr}, we have
\[
t^{-ij-\frac{m_N+m'_N}{2} k}\frac{(t)_{m_N +j+k}(t)_{m'_N -i+k}}{(t)_{k}(t)_{m_N+j}(t)_{m'_N-i}}.
\]
Under substitution $x=\xi_N^i$, $y=\xi_N^j$ and $z=\xi_N^k$, the potential function for a positive crossing is
\begin{align*}
\frac{1}{p} &\left\{-\pi \sqrt{-1} p \frac{a+b}{2} \log(z^p)- \log(x^p)\log(y^p) - \frac{\pi^2}{6} \right.\\
&-\left. \li \left(e^p_a \frac{z^p}{x^p} \right) -\li (e^p_b y^pz^p) +\li \left(\frac{e^p_a}{x^p} \right) +\li(e^p_b y^p) +\li(z^p) \right\},
\end{align*}
where $a(N)/N \to a$, $b(N)/b \to b$ and $e_a = e^{\pi \sqrt{-1} a}$.
Note that the indices of the summand are labeled to the edges of the link diagram.
We change these indices to the ones corresponding to regions of the link diagram as shown in Figure \ref{fig:regionedge}.
\begin{figure}[htb]
\centering
\includegraphics[scale=1.0]{regionedge2.pdf}
\caption{Indices corresponding to an edge $E_i$ and regions $R_l,\ R_r$.}
\label{fig:regionedge}
\end{figure}
If $k_{j_1},\ldots,k_{j_4}$ are indices around a crossing as shown in Figure \ref{fig:regionindices}, we have
\[
i=k_{j_2}-k_{j_1},\quad j=k_{j_3}-k_{j_2},\quad j+k=k_{j_4}-k_{j_1},\quad i-k=k_{j_3}-k_{j_4}.
\]
From the above equations, we have $k=k_{j_2}+k_{j_4}-k_{j_1}-k_{j_3}$. Therefore by putting $w_{j_i}=\xi_N^{k_{j_i}}$ and under substitution
\[
x=\frac{w_{j_2}}{w_{j_1}},\quad y=\frac{w_{j_3}}{w_{j_2}},\quad z=\frac{w_{j_2}w_{j_4}}{w_{j_1}w_{j_3}},
\]
the potential function for a positive crossing $c$ is
\begin{align*}
\Phi_{c,p}^+&=\frac{1}{p} \left\{\pi \sqrt{-1} p^2 \frac{a+b}{2} \log \frac{w_{j_1}w_{j_3}}{w_{j_2}w_{j_4}}- p^2 \log \frac{w_{j_2}}{w_{j_1}} \log \frac {w_{j_3}}{w_{j_2}} \right.\\
&-\li \left(e^p_a \frac{w_{j_4}^p}{w_{j_3}^p}\right)-\li \left(e^p_b \frac{w_{j_4}^p}{w_{j_1}^p}\right)+\li \left(\frac{w_{j_2}^p w_{j_4}^p}{w_{j_1}^p w_{j_3}^p} \right)\\
&+\li \left(e^p_a \frac{w_{j_1}^p}{w_{j_2}^p}\right)+\left.\li \left(e^p_b \frac{w_{j_3}^p}{w_{j_2}^p} \right)-\frac{\pi^2}{6}\right\}.
\end{align*}
\begin{figure}[htb]
\centering
\includegraphics[scale=0.7]{regionindices.pdf}
\caption{Indices corresponding to regions around a crossing.}
\label{fig:regionindices}
\end{figure}
If the strings at a crossing are in the same component, we have to consider the modification on the Reidemeister move I.
The Reidemeister move I on the component with a color $a(N)$ leads to the multiplication by $s^{2m_N^2+2m_N}=(-1)^{2m_N^2+2m_N}t^{-m_N^2-m_N}$.
Therefore, we have to multiply $(-1)^{-2m_N^2-2m_N}t^{m_N^2+m_N}$ to cancel it.
Under the assumption that $a(N)$ is an odd integer, this corresponds to the addition of the function $(\pi \sqrt{-1} pa)^2/p$.
Therefore, the potential function is
\begin{align*}
&\Phi_{c,p}^+ =\frac{1}{p} \left\{(\pi \sqrt{-1} pa)^2 + \pi \sqrt{-1} p^2 a \log \frac{w_{j_1}w_{j_3}}{w_{j_2}w_{j_4}}- p^2 \log \frac{w_{j_2}}{w_{j_1}} \log \frac {w_{j_3}}{w_{j_2}} -\frac{\pi^2}{6}\right.\\
&-\li \left(e^p_a \frac{w_{j_4}^p}{w_{j_3}^p}\right)-\li \left(e^p_a \frac{w_{j_4}^p}{w_{j_1}^p}\right)+\li \left(\frac{w_{j_2}^p w_{j_4}^p}{w_{j_1}^p w_{j_3}^p} \right)+\li \left(e^p_a \frac{w_{j_1}^p}{w_{j_2}^p}\right)+\left.\li \left(e^p_a \frac{w_{j_3}^p}{w_{j_2}^p} \right)\right\}.
\end{align*}
Similarly, we obtain
\begin{align*}
\Phi_{c,p}^-&=\frac{1}{p} \left\{-\pi \sqrt{-1} p^2 \frac{a+b}{2} \log \frac{w_{j_1}w_{j_3}}{w_{j_2}w_{j_4}}+ p^2 \log \frac{w_{j_3}}{w_{j_4}} \log \frac{w_{j_4}}{w_{j_1}} \right.\\
&-\li \left(e^p_a \frac{w_{j_1}^p}{w_{j_4}^p} \right)-\li \left(e^p_b\frac{w_{j_3}^p}{w_{j_4}^p} \right)-\li \left(\frac{w_{j_2}^p w_{j_4}^p}{w_{j_1}^p w_{j_3}^p} \right)\\
&+\left.\li \left(e^p_a \frac{w_{j_2}^p}{w_{j_3}^p}\right)+\li \left(e^p_b \frac{w_{j_2}^p}{w_{j_1}^p}\right)+\frac{\pi^2}{6}\right\}
\end{align*}
for a negative crossing $c$ between different components, and
\begin{align*}
&\Phi_{c,p}^-=\frac{1}{p} \left\{-(\pi \sqrt{-1} pa)^2 -\pi \sqrt{-1} p^2 a \log \frac{w_{j_1}w_{j_3}}{w_{j_2}w_{j_4}}+ p^2 \log \frac{w_{j_3}}{w_{j_4}} \log \frac{w_{j_4}}{w_{j_1}}+\frac{\pi^2}{6} \right.\\
&-\li \left(e^p_a \frac{w_{j_1}^p}{w_{j_4}^p} \right)-\li \left(e^p_a\frac{w_{j_3}^p}{w_{j_4}^p} \right)-\li \left(\frac{w_{j_2}^p w_{j_4}^p}{w_{j_1}^p w_{j_3}^p} \right)+\left.\li \left(e^p_a \frac{w_{j_2}^p}{w_{j_3}^p}\right)+\li \left(e^p_a \frac{w_{j_2}^p}{w_{j_1}^p}\right)\right\}
\end{align*}
for a negative crossing $c$ between the same component.
The potential function $\Phi_{D,p}$ of $J_{\boldsymbol{a}(N)}(L,\xi^p_N)$ is a summation of these
potential functions with respect to all crossings of $D$. That is
\[
\Phi _{D,p}(\boldsymbol{a},w_1,\ldots,w_\nu)= \sum _{c:\mathrm{crossings}}\Phi^{\mathrm{sgn}(c)}_{c,p},
\]
where
\[
\boldsymbol{a} = (a_1 ,\ldots,a_n ),\quad a_i=\lim_{N \to \infty} \frac{a_i(N)}{N}
\]
and $\mathrm{sgn}(c)$ is a signature of a crossing $c$.
We can easily verify the following property by the definition of $ \Phi_{D,p}$.
\begin{prop}
$\Phi _{D,p}(\boldsymbol{a},w_1,\ldots,w_\nu)$ satisfies
\[
\Phi_{D,p}(\boldsymbol{a},w_1,\ldots,w_\nu) = \frac{1}{p}\Phi_{D,1}(p \boldsymbol{a},w_1^p,\ldots,w_\nu^p).
\]
\end{prop}
Therefore, We mainly consider the case where $p=1$ and write $ \Phi _D = \Phi_{D,1}$.
\section{A Non-complete hyperbolic structure} \label{sec:nchypstr}
In this section, we provide geometric meanings of the potential function.
In the rest of this paper, we assume that $L$ is a hyperbolic link with $n$ components.
In this section, we also assume that $a_i \in [1-\varepsilon,1]$ for all $i=1,\ldots,n$,
where $ \varepsilon $ is a sufficiently small positive real number.
First, we consider derivatives of the potential functions with respect to the parameters corresponding to the regions of the link diagram \cite{CM}.
For a positive crossing $c$ between different components, we have
\begin{align} \label{eq:pglu}
\begin{split}
w_{j_1}\frac{\partial \Phi^+_c}{\partial w_{j_1}}&= \pi \sqrt{-1} \frac{a-b}{2} + \log \left(1-e_a\frac{w_{j_1}}{w_{j_2}}\right)^{-1}\left(1-e_b^{-1}\frac{w_{j_1}}{w_{j_4}}\right)^{-1}\left( 1-\frac{w_{j_1}w_{j_3}}{w_{j_2}w_{j_4}}\right),\\
w_{j_2}\frac{\partial \Phi^+_c}{\partial w_{j_2}}&= \pi \sqrt{-1} \frac{a+b}{2} + \log \left(1-e_a^{-1}\frac{w_{j_2}}{w_{j_1}}\right)\left(1-e_b^{-1}\frac{w_{j_2}}{w_{j_3}}\right)\left( 1-\frac{w_{j_2}w_{j_4}}{w_{j_1}w_{j_3}}\right)^{-1},\\
w_{j_3}\frac{\partial \Phi^+_c}{\partial w_{j_3}}&= \pi \sqrt{-1} \frac{-a+b}{2} + \log \left(1-e_a^{-1}\frac{w_{j_3}}{w_{j_4}}\right)^{-1}\left(1-e_b \frac{w_{j_3}}{w_{j_2}}\right)^{-1}\left( 1-\frac{w_{j_1}w_{j_3}}{w_{j_2}w_{j_4}}\right),\\
w_{j_4}\frac{\partial \Phi^+_c}{\partial w_{j_4}}&= -\pi \sqrt{-1} \frac{a+b}{2} + \log \left(1-e_a \frac{w_{j_4}}{w_{j_3}}\right)\left(1-e_b\frac{w_{j_4}}{w_{j_1}}\right)\left( 1-\frac{w_{j_2}w_{j_4}}{w_{j_1}w_{j_3}}\right)^{-1}.
\end{split}
\end{align}
Similarly, for a negative crossing $c$ between different components, we have
\begin{align} \label{eq:nglu}
\begin{split}
w_{j_1}\frac{\partial \Phi^-_c}{\partial w_{j_1}}&= \pi \sqrt{-1} \frac{-a+b}{2} + \log \left(1-e_a \frac{w_{j_1}}{w_{j_4}}\right)\left(1-e_b^{-1} \frac{w_{j_1}}{w_{j_2}}\right)\left( 1-\frac{w_{j_1}w_{j_3}}{w_{j_2}w_{j_4}}\right)^{-1},\\
w_{j_2}\frac{\partial \Phi^-_c}{\partial w_{j_2}}&= \pi \sqrt{-1} \frac{a+b}{2} + \log \left(1-e_a \frac{w_{j_2}}{w_{j_3}}\right)^{-1}\left(1-e_b \frac{w_{j_2}}{w_{j_1}}\right)^{-1}\left( 1-\frac{w_{j_2}w_{j_4}}{w_{j_1}w_{j_3}}\right),\\
w_{j_3}\frac{\partial \Phi^-_c}{\partial w_{j_3}}&= \pi \sqrt{-1} \frac{a-b}{2} + \log \left(1-e_a^{-1} \frac{w_{j_3}}{w_{j_2}}\right)\left(1-e_b \frac{w_{j_3}}{w_{j_4}}\right)\left( 1-\frac{w_{j_1}w_{j_3}}{w_{j_2}w_{j_4}}\right)^{-1},\\
w_{j_4}\frac{\partial \Phi^-_c}{\partial w_{j_4}}&= -\pi \sqrt{-1} \frac{a+b}{2} + \log \left(1-e_a^{-1}\frac{w_{j_4}}{w_{j_1}}\right)^{-1}\left(1-e_b^{-1}\frac{w_{j_4}}{w_{j_3}}\right)^{-1}\left( 1-\frac{w_{j_2}w_{j_4}}{w_{j_1}w_{j_3}}\right).
\end{split}
\end{align}
If a crossing is between the same component, the derivatives are equations \eqref{eq:pglu} and \eqref{eq:nglu} with $a=b$.
These correspond to D. Thurston's triangulation \cite{Dt} of the link complement (see Figures \ref{fig:pcrossoct}, \ref{fig:ncrossoct}).
\begin{figure}[tb]
\begin{tabular}{cc}
\begin{minipage}[t]{0.45\hsize}
\captionsetup{width=5.5cm}
\centering
\includegraphics[scale=1.0]{pcrossoct2.pdf}
\caption{Ideal tetrahedra on a positive crossing.}
\label{fig:pcrossoct}
\end{minipage}
\begin{minipage}[t]{0.45\hsize}
\captionsetup{width=5.5cm}
\centering
\includegraphics[scale=1.0]{ncrossoct2.pdf}
\caption{Ideal tetrahedra on a negative crossing.}
\label{fig:ncrossoct}
\end{minipage}
\end{tabular}
\end{figure}
Here, we put
\[
u_1=e_a \frac{w_{j_1}}{w_{j_2}},\quad u_2=e_a^{-1}\frac{w_{j_3}}{w_{j_4}},\quad u_3=\frac{w_{j_2}w_{j_4}}{w_{j_1}w_{j_3}},\quad u_4=e_b^{-1}\frac{w_{j_1}}{w_{j_4}},\quad u_5=e_b \frac{w_{j_3}}{w_{j_2}},
\]
\[
v_1=e_a^{-1}\frac{w_{j_4}}{w_{j_1}},\quad v_2=e_a \frac{w_{j_2}}{w_{j_3}},\quad v_3=\frac{w_{j_1}w_{j_3}}{w_{j_2}w_{j_4}},\quad v_4=e_b \frac{w_{j_2}}{w_{j_1}},\quad v_5=e_b^{-1}\frac{w_{j_4}}{w_{j_3}}.
\]
in Figures \ref{fig:pcrossoct} and \ref{fig:ncrossoct}.
Furthermore, for a comlex number $z$, $z'$, and $z''$ denote
\[
z' = \frac{1}{1-z},\quad z''=1-\frac{1}{z}.
\]
Note that if there exists a non-alternating part, the ideal tetrahedron abuts the one with the inverse complex number labeled.
Thus we can ignore the contribution of such a part.
Let $G_i$ be a product of the parameters of ideal tetrahedra around the region $R_i$ corresponding to the parameter $w_i$.
Then, we have
\[
w_i \frac{\partial \Phi _D}{\partial w_i} = \frac{\pi \sqrt{-1}}{2}r(a_1,\ldots,a_n) + \log G_i,
\]
where $\pi \sqrt{-1} r(a_1,\ldots,a_n)/2$ is the summation of first terms of $w_{i}\partial\Phi_c^\pm/\partial w_{i}$,
where $c$ runs over all crossings around $R_i$.
However, this is equal to $0$ because the contribution of each parameter $a$ to $r(a_1,\ldots,a_n)$ is canceled
as in Figures \ref{fig:crosspm} and \ref{fig:colcontrib}.
\begin{figure}[htb]
\centering
\begin{minipage}{0.45\hsize}
\captionsetup{width=5.5cm}
\centering
\includegraphics[height=3.0cm]{crosspm.pdf}
\caption{Signatures of parameters correponding to edges. Note that the pattern of signatures is independent of the signature of a crossing.}
\label{fig:crosspm}
\end{minipage}
\begin{minipage}{0.45\hsize}
\captionsetup{width=5.5cm}
\centering
\includegraphics[height=3.0cm]{colcontrib.pdf}
\caption{Contributions of each parameter. White circles represent either possitive or negative crossings.}
\label{fig:colcontrib}
\end{minipage}
\end{figure}
Therefore, the equations
\begin{equation} \label{eq:lsaddle}
\exp \left( w_i \frac{\partial \Phi _D}{\partial w_i} \right)= 1, \quad (i=1,2,\ldots,\nu)
\end{equation}
coincide with the gluing condition of the ideal tetrahedra.
Hence, we can obtain a hyperbolic structure from a saddle point $(\sigma_1(\boldsymbol{a}),\ldots,\sigma_\nu(\boldsymbol{a}))$ of $\Phi_D(\boldsymbol{a},-)$,
where $\boldsymbol{a}=\left(a_1,\ldots,a_n\right)$.
In addition, this hyperbolic structure is not complete in general because the dilation component of the meridian of the link component
with the color $a$ is equal to $e_a^{-2}$ (see Figure \ref{fig:cdmerid}).
\begin{figure}[htb]
\centering
\includegraphics[scale=0.7]{cdmerid.pdf}
\caption{The dilation component of the meridian of the link component with the parameter $a$.}
\label{fig:cdmerid}
\end{figure}
Note that $\boldsymbol{a}=(1,\ldots,1)$ is the case of the original volume conjecture.
So we suppose that $(\sigma_1(\boldsymbol{a}),\ldots,\sigma_\nu(\boldsymbol{a}))$ gives $S^3 \setminus L$ the hyperbolic structure with the finite volume $\vol(S^3 \setminus L)$
when $\boldsymbol{a}=(1,\ldots,1)$ \cite{Ch2}.
Let $M_{a_1,\ldots,a_n}$ be a manifold with the hyperbolic structure given by $(\sigma_1(\boldsymbol{a}),\ldots,\sigma_\nu(\boldsymbol{a}))$.
We will determine the detail of this non-complete hyperbolic manifold $M_{a_1,\ldots,a_n}$.
Let $a$ be a real number slightly less than $1$. Note that the action derived from each meridian does not change a length because $|e_a^{-2}|=1$.
Therefore, the action derived from each longitude changes a length otherwise, both meridians and longitudes do not change a length
and this results in the complete hyperbolic structure \cite{BP}.
Therefore, the developing image in the upper half-space $\mathbb{H}^3$ of the link complement around the edge corresponding to parameter $a$
should be as shown in Figure \ref{fig:develop}.
\begin{figure}[htb]
\centering
\includegraphics[scale=0.7]{develop.pdf}
\caption{The developing image of the link complement with the non-complete hyperbolic structure.}
\label{fig:develop}
\end{figure}
If we glue faces by the action of meridians in Figure \ref{fig:develop}, each face is glued with the face rotated $2\pi(1-a)$ around the singular set.
Therefore, $M_{a_1,\ldots,a_n}$ is a cone-manifold of $L$ with cone-angle $2\pi(1-a_i)$ around the component corresponding to $a_i$.
Especially, we can prove the following proposition.
\begin{thm} \label{thm:m1}
The hyperbolic volume of the cone-manifold $M_{a_1,\ldots,a_n}$ is equal to the imaginary part of the value\footnote{In \cite{Mh}, this value is called the optimistic limit.} of a fuction
\[
\tilde{\Phi}_D = \Phi _D - \sum^{\nu}_{j=1}w_j \frac{\partial \Phi _D}{\partial w_j} \log w_j
\]
evaluated at $w_j = \sigma _j(\boldsymbol{a}),\ (j=1,\ldots,\nu)$.
\end{thm}
\begin{proof}
The hyperbolic volume $V(z)$ of the ideal tetrahedron with modulus $z$ is given by the well-known formula
\begin{equation} \label{eq:volz}
V(z) = \im \li(z) + \log|z| \arg(1-z).
\end{equation}
We only consider the case where a crossing is between different components.
Let $V^{\pm}_c(a,b)$ be the sum of hyperblic volumes of five ideal tetrahedra at a positive or negative crossing $c$ respectively.
By using the formula \eqref{eq:volz}, we can show that
\[
\im \Phi^+_c - V^+_c(a,b) = A^+_{j_1} \log|w_{j_1}|+A^+_{j_2} \log|w_{j_2}|+A^+_{j_3} \log|w_{j_3}|+A^+_{j_4} \log|w_{j_4}|,
\]
where $A^+_{j_i}\ (i=1,2,3,4)$ are
\begin{align*}
A^+_{j_1}&= \frac{\pi}{2}(a-b) + \arg \left(1-e_a\frac{w_{j_1}}{w_{j_2}}\right)^{-1}\left(1-e_b^{-1}\frac{w_{j_1}}{w_{j_4}}\right)^{-1}\left( 1-\frac{w_{j_1}w_{j_3}}{w_{j_2}w_{j_4}}\right),\\
A^+_{j_2}&= \frac{\pi}{2}(a+b) + \arg \left(1-e_a^{-1}\frac{w_{j_2}}{w_{j_1}}\right)\left(1-e_b^{-1}\frac{w_{j_2}}{w_{j_3}}\right)\left( 1-\frac{w_{j_2}w_{j_4}}{w_{j_1}w_{j_3}}\right)^{-1},\\
A^+_{j_3}&= \frac{\pi}{2}(-a+b)+ \arg \left(1-e_a^{-1}\frac{w_{j_3}}{w_{j_4}}\right)^{-1}\left(1-e_b\frac{w_{j_3}}{w_{j_2}}\right)^{-1}\left( 1-\frac{w_{j_1}w_{j_3}}{w_{j_2}w_{j_4}}\right),\\
A^+_{j_4}&= -\frac{\pi}{2}(a+b)+ \arg \left(1-e_a\frac{w_{j_4}}{w_{j_3}}\right)\left(1-e_b \frac{w_{j_4}}{w_{j_1}}\right)\left( 1-\frac{w_{j_2}w_{j_4}}{w_{j_1}w_{j_3}}\right)^{-1}.
\end{align*}
Similarly, we can show that
\[
\im \Phi^-_c - V^-_c(a,b) = A^-_{j_1} \log|w_{j_1}|+A^-_{j_2} \log|w_{j_2}|+A^-_{j_3} \log|w_{j_3}|+A^-_{j_4} \log|w_{j_4}|,
\]
where $A^-_{j_i}\ (i=1,2,3,4)$ are
\begin{align*}
A^-_{j_1}&= \frac{\pi}{2}(-a+b)+ \arg \left(1-e_a \frac{w_{j_1}}{w_{j_4}}\right)\left(1-e_b^{-1}\frac{w_{j_1}}{w_{j_2}}\right)\left( 1-\frac{w_{j_1}w_{j_3}}{w_{j_2}w_{j_4}}\right)^{-1},\\
A^-_{j_2}&= \frac{\pi}{2}(a+b) + \arg \left(1-e_a \frac{w_{j_2}}{w_{j_3}}\right)^{-1}\left(1-e_b \frac{w_{j_2}}{w_{j_1}}\right)^{-1}\left( 1-\frac{w_{j_2}w_{j_4}}{w_{j_1}w_{j_3}}\right),\\
A^-_{j_3}&= \frac{\pi}{2}(a-b) + \arg \left(1-e_a^{-1}\frac{w_{j_3}}{w_{j_2}}\right)\left(1-e_b \frac{w_{j_3}}{w_{j_4}}\right)\left( 1-\frac{w_{j_1}w_{j_3}}{w_{j_2}w_{j_4}}\right)^{-1},\\
A^-_{j_4}&= -\frac{\pi}{2}(a+b)+ \arg \left(1-e_a^{-1}\frac{w_{j_4}}{w_{j_1}}\right)^{-1}\left(1-e_b^{-1}\frac{w_{j_4}}{w_{j_3}}\right)^{-1}\left( 1-\frac{w_{j_2}w_{j_4}}{w_{j_1}w_{j_3}}\right).
\end{align*}
By summing up over all crossings, we can verify the proposition.
\end{proof}
\begin{ex}[the figure-eight knot]
Let $ \theta $ be a real number in $[0,\pi/3]$. The volume $V(\theta)$ of the cone-manifold of the figure-eight knot with a cone-angle $ \theta $ is
given by the following formula \cite{Med,MR}.
\[
V(\theta) = \int^{\frac{2 \pi }{3}}_{\theta} \arccosh (1+ \cos \theta - \cos 2 \theta)d \theta
\]
In this case, the cone-manifold admits a hyperbolic structure.
On the other hand, the colored Jones polynomial for the figure-eight knot is given by Habiro and Le's formula \cite{Ha}.
\[
J_N(4_1;t) = \frac{1}{\{N\}}\sum^{N-1}_{p=0}\frac{\{N+p\}!}{\{N-p-1\}!}
\]
We assume that $a$ is in $(5/6,1)$ so that $0 < 2 \pi(1-a)<\pi/3$.
The potential function of $J_{a(N)}(4_1,\xi _N)$ is
\[
\Phi(a,x) = -2 \pi \sqrt{-1} a \log x -\li(e_a^2x)+\li(e_a^2x^{-1})
\]
and the derivative of this function with respect to $x$ is
\[
\frac{\partial \Phi}{\partial x} = \frac{1}{x} \log(-x+e_a^2+e_a^{-2}-x^{-1}).
\]
As a solution of the equation $ \partial \Phi/\partial x =0$, we obtain
\[
x_0(a) = \left( \cos 2 \pi a - \frac{1}{2}\right)- \sqrt{\left( \cos 2 \pi a - \frac{3}{2}\right)\left( \cos 2 \pi a + \frac{1}{2}\right)}.
\]
Since $5/6 < a < 1$, the absolute value of $x_0(a)$ is equal to $1$. So we put $x_0(a) = e^{\sqrt{-1} \varphi(a)},\ (\varphi(a) \in (-\pi,\pi])$.
Then, the imaginary part of $\Phi(a,x_0(a))$ is
\[
\im \Phi(a,x_0(a)) = -2 \Lambda \left( \pi a + \frac{\varphi(a)}{2}\right)+2 \Lambda \left( \pi a - \frac{\varphi(a)}{2}\right).
\]
We will show that $ \im \Phi(a,x_0(a))= V(2 \pi(1-a))$ as a function on the closed interval $[2/3,1]$.
If $a = 2/3$, they are both $0$. The derivative with respect to $a$ is
\begin{align*}
\frac{d \Phi(a,x_0(a))}{da} &= \frac{\partial \Phi}{\partial a}(a,x_0(a)) + \frac{\partial \Phi}{\partial x}(a,x_0(a))\frac{d x_0(a)}{da}\\
&=2 \pi \sqrt{-1} \log \frac{1-e_a^2 x_0(a)}{x_0(a)-e_a^2} \\
&=-2 \pi^2 + 2 \pi \sqrt{-1} \log \left( \frac{e_a^2 x_0(a)-1}{e_a^{-2}x_0(a)-1}e_a^{-2}\right).
\end{align*}
Since $e^{\sqrt{-1} \theta}-1 = 2 \sin (\theta/2)e^{\sqrt{-1}(\pi+ \theta)/2}$, we obtain
\[
\frac{d \Phi(a,x_0(a))}{da} = -2 \pi^2 + 2 \pi \sqrt{-1} \log \frac{\sin \frac{\varphi(a)+2 \pi a}{2}}{\sin \frac{\varphi(a)-2 \pi a}{2}}.
\]
Let $f(a)$ be the function inside the $\log$, then
\[
\cosh \log f(a) = \frac{\sin^2 \frac{\varphi(a)+2 \pi a}{2} + \sin^2 \frac{\varphi(a)-2 \pi a}{2}}{2\sin \frac{\varphi(a)+2 \pi a}{2}\sin \frac{\varphi(a)-2 \pi a}{2}}.
\]
Note that the dinominator of the right hand side is $ \cos(2 \pi a) -\cos \varphi(a) = 1/2$. Then,
\begin{align*}
\cosh \log f(a) &= 2 \left( \sin^2 \frac{\varphi(a)+2 \pi a}{2} + \sin^2 \frac{\varphi(a)-2 \pi a}{2}\right) \\
&=2- \cos(\varphi(a) + 2 \pi a) - \cos(\varphi(a) - 2 \pi a) \\
&=2-2 \cos \varphi(a)\cos 2 \pi a \\
&=1 + \cos 2 \pi a -\cos 4 \pi a.
\end{align*}
Therefore, we obtain
\[
\frac{d \Phi(a,x_0(a))}{da} = -2 \pi^2 + 2 \pi \sqrt{-1} \arccosh(1 + \cos 2 \pi a -\cos 4 \pi a)
\]
Clearly, the imaginary part of this function is $ 2 \pi \arccosh(1 + \cos 2 \pi a -\cos 4 \pi a)$ which is equal to $dV(2\pi(1-a))/da$.
This shows that $ V(2\pi(1-a)) = \im \Phi(a,x_0(a))$.
\end{ex}
\begin{rem}
We can show the following statement by the same procedure that appeared in \cite{Mh2}\footnote{In \cite{Mh2}, the value substituted for $t$ is slightly changed from the $N$-th root of unity.}:
Let $a \in (5/12,1/2)$ be the limit of $a(N)/N \ (N \to \infty)$. Then, the limit
\[
4 \pi \lim _{N \to \infty} \frac{\log | J_{a(N)}(4_1;\xi_N^2)|}{N}
\]
is equal to the volume of the cone-manifold of the figure-eight knot with a cone-angle $2 \pi -4 \pi a$,
where $N$ runs over all odd integers.
\end{rem}
\begin{ex}[the Borromean rings]
Let $K_B$ be the Borromean rings, $K_B(\alpha,\beta,\gamma)$ be the cone manifold of $K_B$ with cone-angles $\alpha,\ \beta,\ \gamma $,
and $\Delta(\alpha,\theta)=\Lambda(\alpha+\theta)-\Lambda(\alpha-\theta)$, where $\Lambda(x)$ is the Lobachevsky function.
If $0 < \alpha,\beta,\gamma < \pi$, $K_B(\alpha,\beta,\gamma)$ admits a hyperbolic structure, and its volume is given by
\[
\vol K_B(\alpha,\beta,\gamma) = 2 \left(\Delta \left(\frac{\alpha}{2},\theta \right)+\Delta \left(\frac{\beta}{2},\theta \right)+\Delta \left(\frac{\gamma}{2},\theta \right)-2 \Delta \left(\frac{\pi}{2},\theta \right)-\Delta \left(0,\theta \right)\right),
\]
where $ \theta \in (0,\pi/2)$ is defined by the following conditions \cite{Med}.
\begin{align*}
\tan \theta &= T,\ T^4-(L^2+M^2+N^2+1)T^2 -L^2M^2N^2=0, \\
L&= \tan \frac{\alpha}{2},\ M= \tan \frac{\beta}{2},\ N= \tan \frac{\gamma}{2}.
\end{align*}
We define the function $ \tilde{\Delta}(x,y,z,\theta)$ by
\[
\tilde{\Delta}(x,y,z,\theta) = 2 \left(\Delta \left(x,\theta \right)+\Delta \left(y,\theta \right)+\Delta \left(z,\theta \right)-2 \Delta \left(\frac{\pi}{2},\theta \right)-\Delta \left(0,\theta \right)\right)
\]
for convenience.
On the other hand, the colored Jones polynomial for $K_B$ is given by \cite{Ha}
\[
J_{(l,m,n)}(K_B;t) = \sum^{\min(l,m,n)-1}_{i=1}\frac{\{l+i\}!\{m+i\}!\{n+i\}!(\{i\}!)^2}{\{1\}\{l-i-1\}!\{m-i-1\}!\{n-i-1\}!(\{2i+1\}!)^2}.
\]
Let $a,\ b,\ c$ be the limit of $l/N,\ m/N, n/N$ respectively.
The potential function $\Phi_{K_B}(x)$ of $J_{(l,m,n)}(K_B;\xi_N)$ is
\begin{align*}
\Phi_{K_B}(a,b,c,x) &= -2 \pi \sqrt{-1}(a+b+c)\log x +\frac{3}{2}(\log x)^2 \\
&-\li(e_a^2 x)-\li(e_b^2 x)-\li(e_c^2 x)-2\li(x)\\
&+\li \left(\frac{e_a^2}{x} \right)+\li \left(\frac{e_b^2}{x} \right)+\li \left(\frac{e_c^2}{x}\right)+2\li(x^2).
\end{align*}
The derivative of $\Phi_{K_B}(x)$ with respect to $x$ is
\[
x \frac{\partial \Phi_{K_B}}{\partial x}=\log \left(e_a^{-2}e_b^{-2}e_c^{-2}F(a,x)F(b,x)F(c,x)\frac{x^3(1-x)^2}{(1-x^2)^4}\right),
\]
where
\[
F(a,x) = (1-e_a^2 x)\left(1-\frac{e_a^2}{x} \right).
\]
Under substistution $x = e^{2 \pi \sqrt{-1} \zeta}$ we obtain
\begin{align*}
&\frac{1}{2 \pi \sqrt{-1}}\frac{\partial \Phi_{K_B}}{\partial \zeta}\\
&=\log \frac{\sin \pi(\zeta+a)\sin \pi(\zeta-a)\sin \pi(\zeta+b)\sin \pi(\zeta-b)\sin \pi(\zeta+c)\sin \pi(\zeta-c)}{\sin^2 \pi \zeta \cos^4 \pi \zeta}\\
&=\log \frac{\tan^2 \pi \zeta-A^2}{1+A^2}\frac{\tan^2 \pi \zeta-B^2}{1+B^2}\frac{\tan^2 \pi \zeta-C^2}{1+C^2}\frac{1}{\tan^2 \pi \zeta},
\end{align*}
where $A = \tan \pi(1-a),\ B = \tan \pi(1-b),\ C = \tan \pi(1-c)$. Therefore, if $\pm \tan \pi \zeta $ are solutions of the equation
\[
\frac{t^2-A^2}{1+A^2}\frac{t^2-B^2}{1+B^2}\frac{t^2-C^2}{1+C^2}\frac{1}{t^2} = 1,
\]
which is equivalent to the equation
\[
(t^2+1)(t^4 -(A^2+B^2+C^2+1)t^2 - A^2 B^2 C^2) = 0,
\]
then $x = e^{2 \pi \sqrt{-1} \zeta}$ is a saddle point of $\Phi_{K_B}(a,b,c,x)$.
By using the properties of the Lobachevsky function such as
\begin{align*}
\li(e^{2 \sqrt{-1} \theta}) &= \frac{\pi^2}{6}-\theta(\pi-\theta)+2 \sqrt{-1} \Lambda(\theta), \\
\Lambda(2\theta) &= 2 \Lambda(\theta)+2 \Lambda \left( \theta + \frac{\pi}{2}\right),
\end{align*}
we obtain
\begin{align*}
\im \Phi _{K_B}(a,b,c,e^{2 \pi \sqrt{-1} \zeta}) &= \tilde{\Delta}\left(\pi(1-a),\pi(1-b),\pi(1-c),\pi(1-\zeta)\right)\\
&= \vol K_B(2 \pi(1-a),2 \pi(1-b),2 \pi(1-c)).
\end{align*}
\end{ex}
\section{The completeness condition} \label{sec:compness}
In the previous section, we fixed $a_1,\ldots,a_n$. In this section, we regard them as variables and find a geometric meaning.
First, we consider the case where a crossing is between different components.
The derivatives of the potential function with respect to the parameters corresponding to the colors are
\begin{align*}
\frac{\partial \Phi^+_c}{\partial a} &=\frac{\pi \sqrt{-1}}{2} \log \left( 1- e_a \frac{w_{j_4}}{w_{j_3}}\right)\left( 1- e_a \frac{w_{j_1}}{w_{j_2}}\right)^{-1}\left( 1- e_a^{-1} \frac{w_{j_3}}{w_{j_4}}\right)\left( 1- e_a^{-1} \frac{w_{j_2}}{w_{j_1}}\right)^{-1},\\
\frac{\partial \Phi^+_c}{\partial b} &=\frac{\pi \sqrt{-1}}{2} \log \left( 1- e_b \frac{w_{j_4}}{w_{j_1}}\right)\left( 1- e_b \frac{w_{j_3}}{w_{j_2}}\right)^{-1}\left( 1- e_b^{-1} \frac{w_{j_1}}{w_{j_4}}\right)\left( 1- e_b^{-1} \frac{w_{j_2}}{w_{j_3}}\right)^{-1},\\
\frac{\partial \Phi^-_c}{\partial a} &=\frac{\pi \sqrt{-1}}{2} \log \left( 1- e_a \frac{w_{j_1}}{w_{j_4}}\right)\left( 1- e_a \frac{w_{j_2}}{w_{j_3}}\right)^{-1}\left( 1- e_a^{-1} \frac{w_{j_4}}{w_{j_1}}\right)\left( 1- e_a^{-1} \frac{w_{j_3}}{w_{j_2}}\right)^{-1},\\
\frac{\partial \Phi^-_c}{\partial b} &=\frac{\pi \sqrt{-1}}{2} \log \left( 1- e_b \frac{w_{j_3}}{w_{j_4}}\right)\left( 1- e_b \frac{w_{j_2}}{w_{j_1}}\right)^{-1}\left( 1- e_b^{-1} \frac{w_{j_4}}{w_{j_3}}\right)\left( 1- e_b^{-1} \frac{w_{j_1}}{w_{j_2}}\right)^{-1}.
\end{align*}
We can observe the correspondence between these derivatives and dilation components by cusp diagrams (Figure \ref{fig:cdl}).
\begin{figure}[htb]
\centering
\begin{minipage}{0.45\hsize}
\centering
\includegraphics[height=4.5cm]{cdpol2.pdf}
\subcaption{Upper side of a positive crossing.}
\label{fig:cdpol}
\end{minipage}
\begin{minipage}{0.45\hsize}
\centering
\includegraphics[height=4.5cm]{cdpul2.pdf}
\subcaption{Lower side of a positive crossing.}
\label{fig:cdpul}
\end{minipage}\\
\begin{minipage}{0.45\hsize}
\centering
\includegraphics[height=4.5cm]{cdnol2.pdf}
\subcaption{Upper side of a negative crossing.}
\label{fig:cdnol}
\end{minipage}
\begin{minipage}{0.45\hsize}
\centering
\includegraphics[height=4.5cm]{cdnul2.pdf}
\subcaption{Lower side of a negative crossing.}
\label{fig:cdnul}
\end{minipage}
\caption{Cusp diagrams.}
\label{fig:cdl}
\end{figure}
In Figure \ref{fig:cdl}, $\partial\Phi_c^+/\partial a$ corresponds to the upper side of a positive crossing (Figure \ref{fig:cdpol}),
$\partial\Phi_c^+/\partial b$ to the lower side of a positive crossing (Figure \ref{fig:cdpul}),
$\partial\Phi_c^-/\partial a$ to the upper side of a negative crossing (Figure \ref{fig:cdnol}),
and $\partial\Phi_c^-/\partial b$ to the upper side of a negative crossing (Figure \ref{fig:cdnul}).
A similar correspondence holds in the case where a crossing is between the same component.
Let $l_i$ be the longitude that is parallel to the component $L_i$, and $\tilde{l}_i$ be the longitude of the component $L_i$ with $\lk(\tilde{l}_i,L_i)=0$.
For a curve $\gamma$ on the cusp diagram, we difine $\delta(\gamma)$ as the dilation component of $\gamma$.
Then, by the above observation
\[
\exp \left(\frac{1}{\pi \sqrt{-1}} \frac{\partial \Phi'_D}{\partial a_i}\right) = \exp \left(\frac{1}{2} \log \delta(l_i)^2 \right) = \delta(l_i)
\]
holds, where $\Phi'_D$ is a potential function of the colored Jones polynomial without the modification for the Reidemeister move I.
Next, we consider the contribution of the modification.
For a positive crossing between the same component with a parameter $a$,
the modification corresponds to the addition of $(\pi \sqrt{-1} a)^2$ and its derivative is
\[
\frac{1}{\pi \sqrt{-1}}\frac{d}{da}(\pi \sqrt{-1} a)^2 = 2 \pi \sqrt{-1} a = \log e_a^2.
\]
Here, $e_a^2$ is equal to the dilation component of the meridian with the inverse orientation.
Similarly, for a negative crossing, the derivative of $-(\pi \sqrt{-1} a)^2$ corresponds to the dilation component of the meridian.
Therefore,
\begin{equation}\label{eq:delaihol}
\exp \left(\frac{1}{\pi \sqrt{-1}} \frac{\partial \Phi _D}{\partial a_i}\right) = \delta (\tilde{l}_i)
\end{equation}
holds.
\begin{rem}
If $K$ is a knot, we have more simple correspondence. The derivatives of $\Phi^{\pm}_c$ with respect to $a$ are
\begin{align}
\begin{split}\label{eq:delpak}
\frac{1}{\pi \sqrt{-1}} &\frac{\partial \Phi^+_c}{\partial a}=\log e_a^2 \\
&+ \log \left( 1- e_a^{-1} \frac{w_{j_3}}{w_{j_4}}\right)\left( 1- e_a \frac{w_{j_4}}{w_{j_1}}\right)\left( 1- e_a^{-1} \frac{w_{j_2}}{w_{j_1}}\right)^{-1}\left( 1- e_a \frac{w_{j_3}}{w_{j_2}}\right)^{-1},\\
\end{split}
\end{align}
\begin{align}
\begin{split}\label{eq:delnak}
\frac{1}{\pi \sqrt{-1}} &\frac{\partial \Phi^-_c}{\partial a}=\log e_a^{-2}\\
&+\log \left( 1- e_a^{-1} \frac{w_{j_4}}{w_{j_1}}\right)\left( 1- e_a \frac{w_{j_3}}{w_{j_4}}\right)\left( 1- e_a^{-1} \frac{w_{j_3}}{w_{j_2}}\right)^{-1}\left( 1- e_a \frac{w_{j_2}}{w_{j_1}}\right)^{-1}.
\end{split}
\end{align}
The second term of equation \eqref{eq:delpak} corresponds to the upper side and the lower side of a positive crossing (Figures \ref{fig:cdpok} and \ref{fig:cdpuk}),
and the second term of equation \eqref{eq:delnak} corresponds to the upper side and the lower side of a negative crossing (Figures \ref{fig:cdnok} and \ref{fig:cdnuk})
\begin{figure}[htb]
\centering
\begin{minipage}{0.45\hsize}
\centering
\includegraphics[height=4.5cm]{cdpok2.pdf}
\subcaption{Upper side of a positive crossing.}
\label{fig:cdpok}
\end{minipage}
\begin{minipage}{0.45\hsize}
\centering
\includegraphics[height=4.5cm]{cdpuk2.pdf}
\subcaption{Lower side of a positive crossing.}
\label{fig:cdpuk}
\end{minipage}\\
\begin{minipage}{0.45\hsize}
\centering
\includegraphics[height=4.5cm]{cdnok2.pdf}
\subcaption{Upper side of a negative crossing.}
\label{fig:cdnok}
\end{minipage}
\begin{minipage}{0.45\hsize}
\centering
\includegraphics[height=4.5cm]{cdnuk2.pdf}
\subcaption{Lower side of a negative crossing.}
\label{fig:cdnuk}
\end{minipage}
\caption{Cusp diagrams of a knot complement.}
\end{figure}
\end{rem}
If $a_i =1,\ (i=1,\ldots,n)$, all the dilation components of meridians are $1$.
Furthurmore, the contributions of parts as shown in Figure \ref{fig:cdmerid} to the dilation component of the longitude is $1$ hence $\delta _i =1,\ (1,\ldots,n)$.
Therefore, the point $(\boldsymbol{1},\sigma_1(\boldsymbol{1}),\ldots,\sigma_\nu (\boldsymbol{1}))$
gives a complete hyperbolic structure to the link complement \cite{BP}, where $\boldsymbol{1}=(1,\ldots,1)$.
Moreover, by the equations \eqref{eq:lsaddle} and \eqref{eq:delaihol} the point is a solution of the following system of equations:
\[
\begin{dcases}
\exp \left(w_i \frac{\partial \Phi _D}{\partial w_i} \right)= 1, &(i = 1,\ldots,\nu)\\
\exp \left(\frac{1}{\pi \sqrt{-1}}\frac{\partial \Phi _D}{\partial a_j}\right) = 1, &(j = 1,\ldots,n)
\end{dcases}
\]
Hence, we obtain the following theorem.
\begin{thm} \label{thm:m2}
Let $D$ be a diagram of a hyperbolic link with $n$ components, and $\boldsymbol{1}$ be $(1,\ldots,1) \in \mathbb{Z}^n$.
The point $(\boldsymbol{1},\sigma_1(\boldsymbol{1}),\ldots,\sigma_\nu (\boldsymbol{1}))$ is a saddle point of the function
$\Phi_D (a_1,\ldots,a_n,w_1,\ldots,w_\nu)$ and gives a complete hyperbolic structure to the link complement.
\end{thm}
\section{The Witten-Reshetikhin-Turaev invariant} \label{sec:wrt}
In \cite{KM}, the Witten-Reshetikhin-Turaev invariant for the manifold obtained by Dehn surgery on a link is stated.
Furthermore, H. Murakami \cite{Mh} calculated the optimistic limit of the Witten-Reshetikhin-Turaev invariant
for the manifold obtained by integer surgery on the figure-eight knot.
By similar argument in Section \ref{sec:nchypstr}, we would be able to explain
the correspondence of the Witten-Reshetikhin-Turaev invariant and the geometry of the manifold obtained by Dehn surgery on a link.
The procedure might be as follows:
The Witten-Reshetikhin-Turaev invariant for the manifold $M_{f_1,\ldots,f_n}$ obtained by Dehn surgery on a link $L=L_1 \cup \cdots \cup L_n$
with a framing $f_i$ on $L_i\ (i=1,\ldots,n)$ can be written as a summation of the colored Jones polynomial $J_{\boldsymbol{k}}(L;\xi_N)$
multiplied by $t^{-\frac{1}{4}\sum f_j k_j^2}$, where $\boldsymbol{k}=(k_1,\ldots,k_n)$ are colors of $L$.
See \cite{KM} for details but note that $t$ in \cite{KM} and $t$ in this paper are different.
We suppose that $M_{f_1,\ldots,f_n}$ admits a hyperbolic structure.
Let $ \alpha_i$ be $e^{\pi \sqrt{-1} a_i}$ and regard it as a complex parameter that is not necessarily in the unit circle. Then, we have
\[
\frac{1}{\pi \sqrt{-1}} \frac{\partial \Phi}{\partial a_i} = \alpha _i \frac{\partial \Phi}{\partial \alpha _i}.
\]
Multiplying $t^{-\frac{1}{4}\sum f_j k_j^2}$ leads to the addition of $-\sum f_j (\log \alpha _j)^2$ to the potential function.
The derivative of it with respect to $\alpha _i$ is
\[
\alpha_i \frac{\partial}{\partial \alpha_i} \left( -\sum^n_{j=1} f_j (\log \alpha_j)^2 \right)=-2 f_i \log \alpha_i = \log \alpha_i^{-2f_i}.
\]
Then, the saddle point equation is equivalent to the system of equations consisting of the gluing condition and
\[
\delta(\tilde{l}_i) = \alpha _i^{2f_i},\quad (i=1,\ldots,n).
\]
Recall that the dilation component of the meridian $m_i$ of $L_i$ is $\alpha_i^{-2}$, which implies that $\delta(m_i)^{-f_i} = \delta(\tilde{l}_i)$.
If we suppose that $|\alpha_i|$ is less than $1$ and $f_i$ is a positive integer, the developing image would be as shown in Figure \ref{fig:wrtdev}.
By filling in the singular set, the developing image becomes complete.
\begin{figure}[htb]
\centering
\includegraphics[scale=0.7]{wrtdev.pdf}
\caption{The schematic diagram of the developing image in the case of $f_i = 6$.}
\label{fig:wrtdev}
\end{figure}
|
\section{Model}
Although most of the ideas presented here can be used for hard particles of any form, we did our simulations on hard-spheres fluids.
The systems we study in this paper are: (i) Single size discs in 2D; (ii) binary mixture of disks width radii $1$ and $\sqrt(2)\sim 1.4$, with a proportion of 2:1;
(iii) and one-size spheres in 3D.
In all three systems, periodic boundary conditions were applied to reduce the size effects. In the case of the $2$-dimensional systems $10,044$ disks were used, while in the $3$-dimensional system $2,048$ spheres were used.
We use the \emph{packing fraction} $\phi$ as the independent variable.
To perform the simulations, we first used the Lubachevsky--Stillinger algorithm~\cite{lubachevsky} to obtain systems with a certain packing fraction $\phi$ numerically. Then we used a molecular dynamics algorithm with hard-spheres~\cite{sigurgeirsson} to evolve the system, both written in Julia~\cite{bezanson2017julia}.
It is common to define an order parameter $\Psi_n$ that compares the orientational symmetry of the system to one with $n$-fold symmetry.
In the $2$-dimensional case $n = 6$ is typically used to compare the system with a perfect triangular arrangement and observe at what density there is a jump of this parameter. In the general case, the order parameter $n$ is defined as:
\begin{equation}
\Psi_n = \frac{1}{N} \sum_{i = 1}^N \left\lVert \frac{1}{Z_{i}} \sum_{j = 1}^{Z_{i}} e^{in\theta_{ij}}\right\rVert,
\label{eq: order parameter}
\end{equation}
where $Z_{i}$ is the number of neighbors of the particle $i$, and $\theta_{ij}$ is the angle formed by the segment that joins the particles $i$ and $j$ with the horizontal axis. A similar definition is used for the $3$-dimensional systems~\cite{torquato2010jammed}.
This definition of the order parameter does not restrict what is considered a neighbor of the particle $i$.
\section{Dynamical Neighbors}
One of the simplest ways of defining neighbors is to use distances between particles. In this case, $\Psi_n$ is a function of $r$. If $r$ is too small, $\Psi_n(r)$ is not well defined because the number of neighbors $Z(r)$ is zero, but if it is too long, $\Psi_n(r) \rightarrow 0$.
In the case of a crystalline system, it is more or less clear which the close neighbors are, but for systems that do not have translational symmetry, it is more difficult to recognize a distance at which the close neighbors can interact.
Alternatively, we can fix the number of neighbors such that the first $n$ closest particles are considered the neighbors~\cite{haggstrom1996nearest}. Choosing the number $n$ of neighbors is usually compared to an arbitrary structure, such as the array of maximum density, where the neighbors are defined by contact. In the case of monodispersive fluids hard spheres, this structure is the FCC lattice or the triangular lattice for 3 and 2 dimensions, respectively. In these two examples, $n$ is the same for every sphere; however, the number of neighbors in the maximum density lattice may vary from disk to disk for systems such as mixtures of spheres \cite{yi2012radical} or even for other shapes such as fluids of tetrahedra \cite{haji2009disordered}. When the number of neighbors in the array of maximum density is not constant (as for example when there is a binary mixture of particles), it is unclear which is the number of neighbors to consider.
Another alternative is to use Voronoi cells~\cite{voronoi1,voronoi2}, defining neighboring particles as those that share one face of their Voronoi cells.
This definition has been used to study the topological properties of random close packing~\cite{coxeter1958close, voronoi1}.
In particular, it can be shown that there is no regular honeycomb with the topological properties of the Voronoi tessellation produced by a random close packing~\cite{coxeter1958close}, since the cells would have to have faces with approximately $5.12$ sides, and each sphere should have $13.6$ neighbors.
Although a regular tessellation with these characteristics is meaningless, it is possible to have a non-regular tessellation that, on average, has that number of neighbors with that average number of sides per face in each Voronoi cell.
Inspired by this result, Finney~\cite{finney1970random} obtained the distribution of faces (neighbors) and edges of each face in a random close packing, obtaining on average $14.251$ faces per cell and $5.158$ edges per face. In addition to the usefulness of studying the topological properties of jammed states, Voronoi cells have also been used to estimate the free volume and thus obtain a heuristic deduction of the Vogel-Fulcher-Tamman law~\cite{elliott1983physics, wales2003energy}.
Moreover, this has laid the foundation for the cage theory used to estimate the densities at which the phase transition occurs~\cite{kraemer2008use}, and has been used directly to measure the transition between a jamming state and the crystalline phase in hard-spheres when checking the probability of having a certain volume of the Voronoi cell~\cite{jin2010first}.
Despite its usefulness in the description of phase transitions, the definition of a neighbor via a Voronoi cell does not reflect the interactions between particles, and it is expensive computationally \cite{engel2013hard}, especially when the shape of the particles is not spherical \cite{schaller2013set}. The computational complexity grows fast when we increase the dimension of the system \cite{boissonnat1998voronoi}.
On the other hand, the number of collisions has been related with pressure via $\frac{pV}{k_B T} = 1+\frac{N_{coll}\pi^{1/2}}{9 \delta t}$ \cite{woodcock1997computation}, where $N_{coll}$ is the number of collisions per particle, and $\delta t$ is the time window when the collisions occur. In figure \ref{fig:colisions} we show the average number of collisions as a function of the packing fraction $\phi$. The inset plots correspond to the zoom close to the phase transition in the case of $2$ and $3$-dimensional systems. We can see that the behavior of the average number of collisions as a function of $\phi$ is similar to the observed pressure \cite{engel2013hard} close to the phase transition. This observation motivated us to consider the dynamical information that collisions give to define neighbors instead of using geometric information as the distance or the faces of Voronoi cells.
\begin{figure}
\centering
\includegraphics[width=240pt,height=140pt]{AvgCol2D3D.pdf}
\caption{(Color online) The number of average collisions per particle as a function of $\phi$ for a system of hard discs of the same size (dark blue), a binary mixture (light blue), hard spheres with a slow compression speed (dark red), a fast compression speed with a short relaxation time (orange), and fast compression speed with a long relaxation time (pink). The insets are the zooms to the phase transition region. The vertical dashed lines correspond to $\phi = 0.54, 0.59, 0.702, 0.724, 0.8, 0.82$. }
\label{fig:colisions}
\end{figure}
We propose to define the \emph{dynamical neighbors} of a particle $i$ as the particles that collide with $i$ in a given time window $\delta t$. This implies that the number of dynamical neighbors $Z_d$ is a function of $\delta t$. If the time window is large enough, each particle will have collided with all the others. On the other hand, if the time considered is too short, most of the particles will not collide.
This is why it is necessary to define an \emph{adequate} time window, one large enough so that all the particles have collided several times (not necessarily with different particles) but not so long that most have collided with all the particles. As the system is compressed, the energy increases, which means the velocity of particles increases. This means that the distance traveled by each particle in a fixed time window increases as a function of energy. To avoid this problem, we propose that the time window is a function of the kinetic energy $E$ of the particles $\delta t (E) = \frac{c}{\sqrt{E}}$, where $c$ is a constant.
To choose the proper value of $c$, let us first note that unlike neighbors defined using Voronoi cells or as a function of the distance, $Z_d$ can be very large. We can use this difference in our favor for two reasons: (i) we can produce much wider distributions of neighbors for low densities (specially if $c$ is large), and extract information from the shape of those distributions, and (ii) we can define a \emph{binding parameter}: $\mu_{C/Z_d} = \frac{N_{coll}}{\langle Z_d \rangle \sqrt{E}}$ where collisions $N_{coll}$ is the number of total collision per particle, and $E$ is the energy of the system. Because this binding parameter is the average number of redundant collisions, it measures a kind of linking intensity between neighbors.
We will use (i) to give a method to choose $c$. The distribution of $Z_d$ depends on $c$. Figure \ref{fig: distributions_example} shows how the distribution of neighbors changes as a function of $c$ for $\phi = 0.2$. In general, for low packing fractions, the higher the value of $c$, the farther the expected value is from 0, and the wider the distribution is. Once the system solidifies, the distribution keeps the same expected value for every $c$, but the width of the distribution reduces as $c$ increases.
\begin{figure}
\centering
\includegraphics[width=240pt,height=140pt]{HistC2D.pdf
\caption{Distribution of dynamic neighbors $Z_d$ for a system with 1024 particles at $\phi = 0.2$ with various values of $c$. The labels correspond to the value of $c$.}
\label{fig: distributions_example}
\end{figure}
Because $Z_d$ is bounded by the minimum number of neighbors of one particle $n_m$ in the solid phase and by the number of particles $N$, the choice of $c$ should consider that these boundaries $N$ and $n_m$ have little effect. So, we need that the value of $c$ is large enough such that $|n_m-\langle Z_d \rangle|>> \sigma$, where $\sigma$ is the standard deviation of the distribution of $Z_d$, but small enough such that $|N-\langle Z_d \rangle|>>\sigma$.
In general, a larger value of $c$ is better because this means more statistics to obtain the distribution of $Z_d$, so, if we are not close to the limit $\langle Z_d \rangle = N$, it is better to have a large value of $c$. If $N$ is a large number, it typically is computationally challenging to reach a value of $c$ such that $|N-\langle Z_d \rangle|<\sigma$, so the larger the value of $c$, the better.
Because the neighbors distributions are mostly symmetric, unimodal distributions, the position of the maximum, the most probable dynamical neighbor $Z_d$, and the average number of neighbors $\langle Z_d \rangle$ are close related quantities, but they are not identical. Close to a phase transition, the distributions are not perfectly symmetric. In practice $\langle Z_d \rangle (\phi)$ is smoother than the most probable dynamical neighbor $Z_d(\phi)$.
To qualitatively describe the shape of $Z_d(\phi)$ as a function of $\phi$, first note that for the ideal gas $ Z_d(0) = 0$, since there are no collisions.
As the packing fraction increases, $Z_d$ increases almost linearly (see figure \ref{fig:NNPF}).
The latter is due to the fact that for low packing fractions most interactions between two given particles occur on a single occasion, then, the mean free path $\langle l \rangle \propto t_{av} = \delta t N/(2N_{coll})$ , where $t_{av}$ is the mean time between collisions and $N$ is the number of particles and also $\langle l \rangle \propto V/(N v_1'(r)) \sim r / \phi$~\cite{serway2018physics}.
The last relation follows since $v_1(r) \sim v_1'(r) r$. This implies $ Z_d \sim \langle Z_d \rangle \propto N_{coll}\propto \phi$.
However, if the packing fraction continues to grow, collisions with the same particle (redundant collisions) become common, so the number of dynamic neighbors decreases. So, $ Z_d $ is $0$ for $\phi = 0$, then grows linearly until redundant collisions become dominant where a maximum is reached and then decreases. When the system crystallizes $ Z_d $ must become $6$ or $12$ for $2$ and $3$ dimensions respectively, so we expect an abrupt change in $ Z_d $ as shows figure \ref{fig:NNPF} (solid lines). It can also occur that the system has a jamming transition; in such a case, $Z_d$ continues to decrease (dashed lines).
\begin{figure}
\centering
\includegraphics[width=240pt,height=140pt]{NVMP2D3D.pdf}
\caption{(Color online) Most probable $Z_d$ as a function of the packing fraction $\phi$ for a system of hard discs of the same size (dark blue), a binary mixture (light blue), hard-spheres with a slow compression speed (dark red) a fast compression speed with a short relaxation time (orange), and fast compression speed with a long relaxation time (pink). The insets are the same plot but with no logarithmic scale. The horizontal dashed lines represent $6$ dynamic neighbors and $12$ dynamic neighbors. The vertical dashed lines correspond to $\phi = 0.54, 0.59, 0.702, 0.724, 0.8, 0.82$. }
\label{fig:NNPF}
\end{figure}
\subsection{Diffusion coefficients}
Now we would like to focus on the relationship between $\langle Z_d \rangle$ and the diffusion coefficient.
For low densities, $\langle Z_d \rangle \approx N_{coll}/N$, since each collision generally occurs with a different particle.
However, when the packing fraction grows, this is no longer true.
Suppose that only the particle $i$ can move. The rest have their position fixed.
If we tile the space using Voronoi cells omitting the particle $i$, for medium and high packing fractions, practically every time the particle $i$ visits a Voronoi cell, it will collide with the particle in that cell.
Thus $\langle Z_d \rangle$ approximates the number of different Voronoi cells that were visited.
Since the average volume of the Voronoi cells is $V / N$, $\langle Z_d \rangle V /N$ is approximately the volume covered by a particle in time $\delta t$, that is, the mean square displacement $\langle x^2 (\delta t) \rangle \sim D \delta t \approx (\langle Z_d \rangle V / N)^{2/d} $, which implies that $D \approx (\langle Z_d \rangle V / N)^{2/d} 1/\delta t$, where $d$ is the dimension of the system.
\subsection{Orientational order parameters}
As we have mentioned, another important quantity is $\mu_{C/Z_d}$, which can be used as an order parameter without the need to compare with any particular structure, which is a usual problem as discussed in \cite{zachary2009hyperuniformity}.
Before showing that $\mu_{C/Z_d}$ can be used as an order parameter, we will discuss the typical orientational order parameters using the dynamical neighbors.
We obtained the orientational $\Psi_n$ for different values of $n$ both in the monodispersive system of hard disks and in the mixture for $\phi = 0.88$ for the monodisperse case and $\phi = 0.84$ for the binary mixture.
Figure \ref{fig: order parameter n} shows the order parameter $\Psi_n$, varying $n$ from $0$ to $15$ for the monodisperse (continuous line) and binary mixture (dashed line) systems. As expected, this parameter has peaks around $n = 6k$, with $k$ an integer for the monodisperse case. The other peaks correspond to the cases $n =k+ 1/2$. These peaks also meet the expectations of equation (\ref{eq: order parameter}) for a triangular array.
\begin{figure}
\centering
\includegraphics[width=240pt,height=140pt]{POX2D-10044-t12-088-084.pdf
\caption{$\Psi_n$ as a function of the orientational order $n$ for the densest arrangement obtained in the monodisperse system (continuous line) and the binary mixture (dashed line).The vertical dashed lines correspond to $\phi = 0.54, 0.59, 0.702, 0.724, 0.8, 0.82$. }
\label{fig: order parameter n}
\end{figure}
For the binary mixture, it could be expected that the orientation order parameter would depend on the reached configuration. Still, after performing several simulations, almost the same graph was always obtained.
In this case, it is notable that $\Psi_n$ has a maximum for $n = 6$, so this parameter can be used to measure the jamming transition, just like in the crystalline case.
However, unlike the crystalline case, $\Psi_5$ and $\Psi_7$ are not negligible and neither $\Psi_{11}$.
Therefore, using $\Psi_6$, one can expect to see a jump in both cases, while using $\Psi_{5}$ and $\Psi_{11}$, one should only see a jump when the transition is a jamming transition.
The fact that the orientational order parameter depends on which structure it is compared with has the consequence that there may be an order that we cannot observe for some systems. For example, the maximum density array would appear disordered when measuring the orientational order parameter $\Psi_5$ as well as a quasicrystal with pentagonal symmetry using $\Psi_6$. Instead, we can use an order parameter that is independent of the geometry but depends on the dynamical properties, as is the case of $\mu_{C/Z_d}$. If the number of degrees of freedom of the system is reduced, as, during the break of rotational or translational symmetry, we would expect that the number of redundant collisions must change, so $\mu_{C/Z_d}$ must change its behavior as well.
Figure \ref{fig: order parametesr and BF} shows the orientational order parameter $\Psi_6$ ($2$-dimensional systems), $Q_6$ ($3$-dimensional systems) defined as in~\cite{torquato2010jammed} and $\mu_{C/Z_d}$ as a function of $\phi$ for all the systems we study in this paper. We observe that $\Psi_6$ and $\mu_{C/Z_d}$ are very close for the monodisperse hard disk fluid, showing a transition around $\phi \approx 0.7$. This result agrees with what was observed using other definitions of close neighbors~\cite{huerta2003role}.
For the binary mixture $\mu_{C/Z_d}$ and $\Psi_6$ are also similar showing that the jamming transition is around $\phi \approx 0.75$.
In the case of $3$-dimensional systems $Q_6$ and $\mu_{C/Z_d}$ are very different for low packing fractions, but for high packing fractions both parameters are correlated, showing a transition at $\phi \approx 0.54$. For the jammed system, $Q_6$ is very low. It has a small jump before the jamming transition for which we believe is in a region of meta-stability of the fluid and then it goes to 0 while $\mu_{C/Z_d}$ is always growing, with only a change in the behavior around $\phi = 0.63$, which is close to the maximal random jamming.
\begin{figure}
\centering
\includegraphics[width=240pt,height=140pt]{POMU2D3D-avg.pdf}
\caption{(color online) Orientational order parameters $\Psi_6$ and $Q_6$ (solid lines) and binding parameter $\mu_{C/Z_d}$ (dashed lines) as a function of the packing fraction for $3$-dimensional systems (red-orange lines), and $2$-dimensional systems (blue lines). Red and dark blue lines correspond to the systems with a phase transition, while orange and light blue lines represent the systems with a jamming transition. Pink lines correspond to the systems where the compression rate is fast, but the relaxation time is long.}
\label{fig: order parametesr and BF}
\end{figure}
We can observe that $\mu_{C/Z_d}$ behaves very close to the orientational order parameter when the orientational order parameter captures a phase or jamming transition but differ when the orientational order parameter does not recognize such transition. So we have an order parameter independent of the final structure we obtain that can be useful if the final structure is unknown, as in a mixture of different size particles or non-spherical particles like tetrahedra \cite{haji2009disordered}.
\subsection{Configurational Entropy}
The understanding glass transition is still one of the most critical challenges in material sciences. A possible scenario proposed by Gibbs and Adams \cite{adam1965temperature} relates the increases in viscosity with a dramatic reduction of the number of configurations available to the fluid. An ideal glass transition occurs if the liquid is trapped in one of the remaining configurations.
Configurational entropy $s_{c}$ measures the number of possible distinct states accessible to a system, and it is believed that $s_{c} \approx s_L- s_g$ \cite{donev2007configurational, berthier2019configurational}, where $s_L$ is the entropy in the liquid state and $s_g$ is the entropy of the glassy state. Because in the jammed state, particles are trapped, it is possible to estimate $s_g$ in single-occupancy cells (SOC) using the Bonding Cell Molecular Dynamics algorithm \cite{donev2007calculating} to measure the average reduced pressure on the walls of each cell $p_c=P_cV_c /k_B T$ and then obtain the change in free energy as the work of compressing the cells by integrating $p_c$. This gives the free energy $f_g = -s_g$ of the SOC system \cite{donev2007calculating}. $s_L$ can be obtained simply by thermodynamic integration of the equation of state of the fluid (see \cite{luding2001global}) from the ideal-gas limit. This algorithm has proved to be accurate \cite{donev2006binary}, but it is admitted to be computational expensive even if it is already an improvement to other similar algorithms \cite{kumar2005voronoi}. The reason is that reducing the volume of the cells must be very slow because when the size of the cell is close to the radius of the particles, the number of collisions increases exponentially.
There are at least two other approaches to estimate $s_{c}$, by approximating it with the entropy of only two-particle interactions \cite{baranyai1989direct} and using the Shannon entropy of information \cite{walraven2020entropy}. The first of these approaches uses the expansion of the entropy in a series of n-particle correlation functions \cite{nettleton1958expression}. The correlation function for three or more particles is difficult to calculate, but the pair correlation function is not difficult to estimate via computational simulations. The second approach is based on data compression algorithms. Walraven et al. proposed to store the information of a hard-sphere system in a file, as the positions of the particles, then apply a compression algorithm to the data to obtain a smaller file. The compression ratio (the ratio of file sizes before and after compression) is related to the information entropy of the file, which must be related to the configurational entropy of the system. Applying this idea to a 3-dimensional hard-sphere system of 256 particles, they obtained an almost constant entropy for packing fractions between 0 and 0.5. Then they observe an abrupt reduction in the entropy similar to what has been observed in \cite{donev2007configurational}.
The problem with the approach using the two-particle approximation is that no phase transition is observed, so higher terms are necessary. In the case of the data compression algorithms, they depend on the used algorithm, and the behavior for very high packing fraction seems to move away from the true entropy.
Here we propose an alternative method to estimate the configurational entropy that can be easily obtained for any hard-potential particles.
If the packing fraction is high enough, practically all visits to a Voronoi cell involve a collision with the particle in that cell. Then, the probability that a particle visits $Z_d$ of neighbors in a time $\delta t$ depends on the local configuration of particles. So, the standard deviation $\sigma$ of the distribution $\rho_{\phi} (Z_d)$ must be proportional to the number of local configurations, i.e., the number of different local arrays of particles in the system. We assume that this distribution of local arrays is proportional to the number of accessible configurations.
Then the number of configurations $\Omega(\phi)$, must be proportional to the standard deviation $\sigma$ of the probability distribution $\rho_{\phi} (Z_d)$.
If the probability distribution of $Z_d$ is a normal distribution, then, to estimate $\sigma$, we just need to calculate the value of the maximum $\max(\rho_{Z_d})$, since $\sigma \sim 1 / \max(\rho_{Z_d})$.
Now, using the Boltzmann equation for the entropy we can be calculated $s_{c}$ as $s_{c} = K_B \log(\Omega)$, then $s_{c} \sim -\log(\max(\rho_{Z_d}))$.
Figure~\ref{fig:histt3} (top-left) shows the probability distributions of the number of dynamic neighbors for various packing fractions for monodisperse hard disk fluid.
In general increasing $\phi$ increases $\max(\rho_{Z_d}))$; however, for $\phi \in [0.7, 0.72]$ there is a drop in $\max(\rho_{Z_d }))$.
The range of values for which there is this decrease in $\max(\rho_{Z_d}))$ corresponds to the packing fractions of the hexatic phase~\cite{engel2013hard, bernard2011two, jaster2004hexatic}.
A similar effect is observed in figure \ref{fig:histt3} (bottom-left), where the crystallization process of the fluid of $3$-dimensional hard-spheres is shown. However, in this case, there is a jump in the average number of neighbors (it passes from 60 to 12).
\begin{figure}
\centering
\includegraphics[width=240pt,height=140pt]{Hist2D3D.pdf}
\caption{(Color online) Distributions of the number of dynamic neighbors for various packing fractions for systems: (top-left) monodispersive, and (top-right) binary mixtures of hard discs (bottom-left) slow compression speed and, (bottom-right) fast compression speed of hard spheres. Some labels with the packing fraction were added for easier reading.
}
\label{fig:histt3}
\end{figure}
In the case of the binary mixture and the fast compression speed, crystallization is frustrated and no fall appears in the maximum of the probability distribution for medium densities. This is shown in figure \ref{fig:histt3} (top-right), and (bottom-right).
With the height of these distributions, we computed the entropy of the system using $s_c \approx -\log(\max(\rho_{Z_d}))$. This is shown in figure \ref{fig:entropy}. The blue lines correspond to the $2$-dimensional systems. The red line correspond to a $3$-dimensional system with a slow rate of compression, while the orange line and pink line correspond to a fast rate. The difference between the orange and solid pink is that in one case (orange) the time for relaxation of the system was short (pink) while the other was a long time of relaxation.
We can see that the paths with slow and fast relaxation times differ notoriously for $ \phi \in [0.54,0.59] $ (vertical lines).
This shows that the states corresponding to the short relaxation times are meta-stable.
However, for $ \phi> 0.59 $ both paths almost match. We interpret this to mean that it is at $ \phi = 0.59 $ where the jamming transition occurs
The dark blue curve shows an increment of the entropy just before the phase transition to the crystal phase occurs (similarly the orange curve at the beginning of the meta-stable phase). This increment occurs just before the hexatic phase, which correspond to the lowering of the maximum in the distribution of figure \ref{fig:histt3} (top-left) at $\phi = 0.702$.
\begin{figure}
\centering
\includegraphics[width=240pt,height=140pt]{SC2D3D.pdf}
\caption{(color online) Entropy for the $2$ and $3$-dimensional systems. Blue lines correspond to the $2$-dimensional systems, while red and orange lines correspond to the $3$-dimensional cases. We added a plot of the configurational entropy minus the entropy of the binary mixture for the $2$-dimensional cases, using the data from \cite{donev2007configurational} (green squares for monodispersive systems and blue triangles for binary mixture). The vertical dashed lines correspond to $\phi = 0.54, 0.59, 0.702, 0.724, 0.8, 0.82$. }
\label{fig:entropy}
\end{figure}
We want to highlight that in the $3$-dimensional case, the change in entropy when passing from one phase to the other appears discontinuous; that is, it is a first-order transition. However, for the $2$-dimensional case, we do not observe that there is an abrupt change in entropy, the hexatic-solid transition, but for the liquid-hexatic transition, there is a jump increasing the entropy, which could be a discontinuity in entropy. This coincides with the abrupt change in the number of dynamic neighbors for the $3$-dimensional system in contrast to what happens in the $2$-dimensional case (see inset of figure \ref{fig:NNPF}) and would also be in agreement with \cite{engel2013hard}.
About the metastability region $\phi \in [0.54,59]$, it has been suggested that it includes any $\phi>0.54$ \cite{rintoul1996metastability}, in such case, there is no glass transition; however, we did not observe that all the systems crystallize.
\section{Soft particles and Monte-Carlo generalizations}
With hard-core potentials, the deviation angle of the particles after a collision is independent of the speed of the particles. Thus, if we consider, for example, only the collisions that produce a minimum deviation, this would be independent of the speed of the particles that collide, and all the measurements would be proportional. Thus, the number of neighbors can be decoupled from temperature independent of any imposition to consider a minimum deviation (for example, at least angles of $45$ degrees).
In the case of soft particles, the deviation depends on the speed of the particles. Then, to take this into account, any generalization of the dynamical neighbors to soft potential must rely on the speed of particles that collide. Then the distribution of dynamical neighbors would be temperature-dependent, as well as the entropy or the binding parameter.
On the other hand, in Monte-Carlo simulations, a particle's movement is rejected with some probability if the energy is increased. The rejection can be interpreted as a collision. So, all the particles involved in rejecting a movement can be considered dynamical neighbors. For hard particles, this means every time there is an overlap between particles, but in the case of soft particles, this depends on the temperature.
\section*{Conclusions and remarks}
We proposed to define dynamical neighbors in systems with hard-core potential as those that have a collision in a given time window. We found that the average number of dynamical neighbors must be proportional to the diffusion coefficient. Also, we proposed defining an order parameter using the number of collisions and the number of dynamical neighbors. We found that this order parameter, which is independent of the system's geometry, can be used to detect phase and jamming transitions in $2$ and $3-$dimensions. In $2-$dimensions, this parameter was available to see fluid, hexatic, and crystal phases. Finally, we propose a method to estimate the configurational entropy using the distribution of dynamic neighbors. We computed it for four systems: hard disks of a single size of particles, a binary mixture of hard disks, and hard spheres with slow and fast compression rates. The measurements of this entropy were in agreement with other measurements reported in the literature. Since the simplicity of the method, it was possible to measure the entropy in many more packing fractions and with larger systems. This allowed us to observe an increase in the entropy in the transition from fluid to the hexatic phase and the phase transition from fluid to solid in $3-$dimensions. We also observe a meta-stable phase in $3-$ dimensions and a drop in the entropy during the transition from hexatic to the solid phase. We also observed that the metastable phase becomes stable at a packing fraction corresponding to the jamming transition in 3D.
\begin{acknowledgments}
We thank David P. Sanders for useful discussions. The authors appreciate the computing platform provided by the Laboratorio de Cómputo de Alto Rendimiento, under coordination of Departamento de Matemáticas of Facultad de Ciencias, UNAM.
\end{acknowledgments}
\section*{Conclusions}
It was found that the number of dynamic neighbors must be proportional to the diffusion coefficient. Also, using the distribution of dynamic neighbors, the entropy was obtained for 4 systems, hard disks of a single size, a binary mixture, and hard-spheres with slow and fast compression rate. With this, it was found that the 2D monodispersive system form 3 phases, the liquid, the solid and an the hexatic phase, while in the 3D case it form only two stable phases and one meta-stable phase corresponds to a non previously reported phase. In contrast, the systems that show a jamming transition have only two states, fluid and jammed, as reported .
In addition, the binding parameter, defined as the number of collisions between the number of neighbors, was measured, and it was observed that this quantity is highly correlated to the orientational order parameters during the phase transition and in the solid phase.
\begin{acknowledgments}
We thank David P. Sanders for useful discussions. The authors appreciate the computing platform provided by the Laboratorio de Cómputo de Alto Rendimiento, under coordination of Departamento de Matemáticas of Facultad de Ciencias, UNAM.
\end{acknowledgments}
\bibliographystyle{apsrev}
|
\section{#1}}
\setcounter{footnote}{1}
\renewcommand{\theequation}{\arabic{section}.\arabic{equation}}
\newcommand{\begin{eqnarray}}{\begin{eqnarray}}
\newcommand{\end{eqnarray}}{\end{eqnarray}}
\newcommand{\displaystyle}{\displaystyle}
\newcommand{ \mbox {diag}}{ \mbox {diag}}
\newcommand{I\!\!\!\:M_k}{I\!\!\!\:M_k}
\newcommand{\varphi}{\varphi}
\newcommand{\cdot}{\cdot}
\newcommand{\sigma}{\sigma}
\newcommand{\sigma_{\rm{T}}}{\sigma_{\rm{T}}}
\newcommand{\sigma_{\rm{pt}}}{\sigma_{\rm{pt}}}
\newcommand{\alpha}{\alpha}
\newcommand{\lambda}{\lambda}
\newcommand{\Lambda}{\Lambda}
\newcommand{\mathcal{A}}{\mathcal{A}}
\newcommand{\mathcal{B}}{\mathcal{B}}
\newcommand{\mathcal{C}}{\mathcal{C}}
\newcommand{\mathcal{D}}{\mathcal{D}}
\newcommand{\mathcal{E}}{\mathcal{E}}
\newcommand{\mathcal{F}}{\mathcal{F}}
\newcommand{\mathcal{G}}{\mathcal{G}}
\newcommand{\mathcal{H}}{\mathcal{H}}
\newcommand{\mathcal{K}}{\mathcal{K}}
\newcommand{\mathcal{L}}{\mathcal{L}}
\newcommand{\mathcal{M}}{\mathcal{M}}
\newcommand{\mathcal{N}}{\mathcal{N}}
\newcommand{\mathcal{O}}{\mathcal{O}}
\newcommand{\mathcal{P}}{\mathcal{P}}
\newcommand{\mathcal{Q}}{\mathcal{Q}}
\newcommand{\mathcal{R}}{\mathcal{R}}
\newcommand{\mathcal{S}}{\mathcal{S}}
\newcommand{\mathcal{T}}{\mathcal{T}}
\newcommand{\mathcal{U}}{\mathcal{U}}
\newcommand{\mathcal{W}}{\mathcal{W}}
\newcommand{\mathcal{X}}{\mathcal{X}}
\newcommand{\mathcal{Y}}{\mathcal{Y}}
\newcommand{\mathcal{Z}}{\mathcal{Z}}
\newcommand{\bm{z}}{\bm{z}}
\newcommand{\bm{w}}{\bm{w}}
\newcommand{\bm{k}}{\bm{k}}
\newcommand{\bm{l}}{\bm{l}}
\newcommand{\bm{T}}{\bm{T}}
\newcommand{\bm{M}}{\bm{M}}
\newcommand{\mathbb{D}}{\mathbb{D}}
\newcommand{\mathcal{L}(\mathcal{H})}{\mathcal{L}(\mathcal{H})}
\newcommand{\mathcal{L}(\mathcal{X})}{\mathcal{L}(\mathcal{X})}
\newcommand{\widehat{\bf A}}{\widehat{\bf A}}
\newcommand{{\bf M_A}}{{\bf M_A}}
\newcommand{\Lmd_n( \clh )}{\Lambda_n( \mathcal{H} )}
\newcommand{\forall}{\forall}
\newcommand{\rightarrow}{\rightarrow}
\newcommand{\Rightarrow}{\Rightarrow}
\newcommand{\tilde{V}}{\tilde{V}}
\newcommand{\tilde{\Pi}}{\tilde{\Pi}}
\newcommand{\mathop{\cap}}{\mathop{\cap}}
\newcommand{\mathop{\oplus}}{\mathop{\oplus}}
\newcommand{\stackrel{\rm def}{=}}{\stackrel{\rm def}{=}}
\newcommand{\subnq}{\begin{array}[t]{c} \subset \\*[-15pt] \scriptstyle\neq
\end{array}}
\newcommand{\supnq}{\begin{array}[t]{c} \supset \\*[-15pt] \scriptstyle\neq
\end{array}}
\newcommand{\vspace{5mm}}{\vspace{5mm}}
\newcommand{\hspace{5mm}}{\hspace{5mm}}
\newcommand{\vspace{1cm}}{\vspace{1cm}}
\def \hfill \vrule height6pt width 6pt depth 0pt {\hfill \vrule height6pt width 6pt depth 0pt}
\def\textmatrix#1\\#3\\{\bigl({#1 \atop #3}\ {#2 \atop #4}\bigr)}
\def\dispmatrix#1\\#3\\{\left({#1 \atop #3}\ {#2 \atop #4}\right)}
\newcommand{\begin{equation}}{\begin{equation}}
\newcommand{\end{equation}}{\end{equation}}
\newcommand{\begin{eqnarray*}}{\begin{eqnarray*}}
\newcommand{\end{eqnarray*}}{\end{eqnarray*}}
\newcommand{\centerline}{\centerline}
\newcommand{\noindent}{\noindent}
\newcommand{\addtocounter{equation}{1}}{\addtocounter{equation}{1}}
\def {\sc Proof}\hspace{.5cm} {{\sc Proof}\hspace{.5cm}}
\newcommand{\begin{itemize}}{\begin{itemize}}
\newcommand{\end{itemize}}{\end{itemize}}
\newcommand{\mbox{diag}}{\mbox{diag}}
\def{\mbox{\boldmath $n$}}{{\mbox{\boldmath $n$}}}
\newcommand\la{{\langle }}
\newcommand\ra{{\rangle}}
\newcommand\lar{\leftarrow}
\newcommand\Lar{\Leftarrow}
\newcommand\rar{\rightarrow}
\newcommand\Rar{\Rightarrow}
\newtheorem{Theorem}{\sc Theorem}[section]
\newtheorem{Lemma}[Theorem]{\sc Lemma}
\newtheorem{Proposition}[Theorem]{\sc Proposition}
\newtheorem{Corollary}[Theorem]{\sc Corollary}
\newtheorem{Note}[Theorem]{\sc Note}
\newtheorem{Question}{\sc Question}
\newtheorem{ass}[Theorem]{\sc Assumption}
\theoremstyle{definition}
\newtheorem{Definition}[Theorem]{\sc Definition}
\newtheorem{Example}[Theorem]{\sc Example}
\newtheorem{Remark}[Theorem]{\sc Remark}
\theoremstyle{plain}
\newtheorem*{bigL}{\sf Lemma}
\newtheorem*{Index}{\sf Index of Notations}
\newtheorem{thm}{Theorem}[section]
\newtheorem{cor}[thm]{Corollary}
\newtheorem{lem}[thm]{Lemma}
\newtheorem{prop}[thm]{Proposition}
\theoremstyle{definition}
\newtheorem{defn}[thm]{Definition}
\newtheorem{rem}[thm]{Remark}
\newtheorem{ex}[thm]{Example}
\numberwithin{equation}{section}
\let\phi=\varphi
\begin{document}
\title[Numerical radius and Berezin number inequality]
{Numerical radius and Berezin number inequality}
\author[Majee]{Satyabrata Majee}
\address{Indian Institute of Technology Roorkee, Department of Mathematics,
Roorkee-247 667, Uttarakhand, India}
\email{<EMAIL>}
\author[Maji]{Amit Maji}
\address{Indian Institute of Technology Roorkee, Department of Mathematics,
Roorkee-247 667, Uttarakhand, India}
\email{<EMAIL>, <EMAIL>}
\author[Manna]{Atanu Manna}
\address{Indian Institute of Carpet Technology, Bhadohi-221401, Uttar Pradesh, India}
\email{ <EMAIL>, <EMAIL>}
\subjclass[2010]
{47A12, 47A63}
\keywords
{Numerical Radius, Berezin number, Isometry, Shift,
Reproducing kernel Hilbert spaces, Hardy's inequality}
\begin{abstract}
We study various inequalities for numerical radius and Berezin number
of a bounded linear operator on a Hilbert space. It is proved that the numerical
radius of a pure two-isometry is $1$ and the Crawford number of a pure
two-isometry is $0$. In particular, we show that for any scalar-valued
non-constant inner function $\theta$, the numerical radius and the
Crawford number of a Toeplitz operator $T_{\theta}$ on a Hardy space
is $1$ and $0$, respectively. It is also shown that numerical radius is
multiplicative for a class of isometries and sub-multiplicative for a
class of commutants of a shift. We have illustrated these results
with some concrete examples.
Finally, some Hardy-type inequalities for Berezin number of certain
class of operators are established with the help of the classical
\textit{Hardy's inequality}.
\end{abstract}
\maketitle
\newsection{Introduction}
The concepts of numerical radius and Berezin number of an operator
have been studied extensively due to their enormous applications
in engineering, quantum computing, quantum mechanics,
numerical analysis, differential equations, etc.
In the early days, one of the main goals for studying Hilbert spaces
was quadratic forms. The fundamental question about quadratic forms
associated with an operator is its numerical range. Firstly, Toeplitz
\cite{Toeplitz} defined the numerical range for matrices in 1918. Later, Wintner
\cite{Wintner} studied the relationship between the numerical range and the
convex hull of the spectrum of a bounded linear operator on a Hilbert space.
We denote $\mathcal{B}(\mathcal{H})$ as the $C^{*}$-algebra of all bounded linear
operators on a Hilbert space $\mathcal{H}$. For any bounded linear operator $A$ on
$\mathcal{H}$ the numerical radius, denoted by $\omega(A)$, yields a norm on
$\mathcal{B}(\mathcal{H})$. Indeed, for $A \in \mathcal{B}(\mathcal{H})$
\[
{\|A\| \over 2} \leq \omega(A) \leq \|A\|.
\]
Therefore, the operator norm and the numerical radius norm are equivalent.
In particular, if $A$ is normal (that is, $A^*A=AA^*$), then
$\omega(A)=\|A\|$. One can show that the numerical radius $\omega(\cdot)$ is
neither multiplicative nor sub-multiplicative on $\mathcal{B}(\mathcal{H})$(see, \cite{Halmos}).
Thus a natural question arises:
\begin{center}
$(Q)$ \textsf{Which class of operators on a Hilbert space $\omega(\cdot)$ is
multiplicative or sub-multiplicative?}
\end{center}
Though numerical radius is not multiplicative or sub-multiplicative
in general, but it satisfies the power inequality. More precisely, for any
positive integer $n$ and $A \in \mathcal{B}(\mathcal{H})$ the following inequality holds:
\begin{center}
$\omega(A^n) \leq \omega(A)^n$.
\end{center}
The above power inequality was first conjectured by Halmos and a delicate
proof was given by Berger (see \cite{BS-Mapping}, \cite{Halmos}). After that,
generalizations for polynomial or analytic functions on the unit disc have been done.
In 1966, Pearcy \cite{PEARCY} gave elementary proof of this. However, the
reverse power inequality does not hold in general. Indeed, for a nilpotent matrix
$
A= \begin{pmatrix}
0 & 0 \\
1 & 0
\end{pmatrix},
$
we have $\omega(A)=\frac{1}{2}$ but $\omega(A^2)=0$.
The reader is referred to \cite{BD-Numerical-I}, \cite{GR-Book} and
references therein for various applications of numerical radius inequalities.
On the other hand, Berezin transform which connects
operators with functions plays an important role in operator theory,
more specifically to study Toeplitz operators, Hankel operators
and composition operators.
Another important notion in operator theory is Berezin number.
The Berezin number of an operator $A$ is denoted by $ber(A)$ and
defined on a reproducing kernel Hilbert space
$H(\Omega)$. Indeed, for any $A \in \mathcal{B}( H(\Omega))$,
$ 0 \leq ber(A) \leq \omega(A) \leq \|A \| $
and if $ber(A)\neq 0$, then the following inequality for $n \in \mathbb{N}$
(see Garayev et al. \cite{GARAGUR})
\[
ber(A^n) \leq (\frac{w(A)}{ber(A)})^n ber(A)^n \quad \mbox{holds}.
\]
A lot of research work has been carried out to find the reverse power inequality
of the Berezin number of operators over the last few years and many researchers
have studied the reverse inequality by using Hardy-Hilbert inequality. Apart from
these studies, Yamanc{\i} et al.\cite{YAMAGUR} considered Berezin number operator
inequalities for continuous convex functions and some certain class of operators.
For more details one can see Karaev(\cite{KARA}, \cite{KARA2}),
Garayev et al. (\cite{GARAGUR}, \cite{GARASAL}),
Yamanc{\i} et al.\cite{YAMA} and references therein.
However, Coburn \cite{COBURN} gave an example of concrete operator
$A$ on the Bergman space such that $ber(A^2)>ber(A)^2$ holds.
Motivated by the earlier studies, we here attempt to explore
the following inequality:
\begin{center}
\textsf{$ ber(A)^n\leq \alpha ber(A^n)$ for $A\in \mathcal{B}(H(\Omega)$
all integer $n>1$ and some constant $\alpha>0$}.
\end{center}
The main guiding tools used in this article are the geometry of
Hilbert spaces, Wold-von Neumann decomposition for pure two-isometry and
isometry. Using the notion of functional calculus, some reverse
power inequalities for Berezin number are also established by using the classical
\emph{discrete Hardy's inequality} (See Section 2, (\ref{Hardy-Inequality})).
\vspace{.1cm}
The paper is organized as follows: in Section 2 we discuss
preliminaries and some basic results. Section 3 deals with
the numerical radius and Crawford number of certain class
of operators and various results on the Berezin number.
In section 4 with the help of \emph{discrete Hardy's inequality}
we develop the Berezin number inequality which improves many earlier results.
\section{Preliminaries and Basic Results}
Let $p>1$ be any real number and $\{a_n\}$ be a sequence of non-negative
real numbers. Then the discrete version of \emph{Hardy's inequality}
(named after G. H. Hardy) is
\begin{align}{\label{Hardy-Inequality}}
\displaystyle\sum_{n=1}^{\infty}\Big(\frac{1}{n}\sum_{k=1}^{n}a_k\Big)^p
\leq \Big(\frac{p}{p-1}\Big)^p\sum_{n=1}^{\infty}{a_n}^p,
\end{align}
and equality holds if $a_n=0$ for all $n$. The constant term
$\Big(\frac{p}{p-1}\Big)^{p}$ in (\ref{Hardy-Inequality}) is the best
possible constant. There are several generalizations and extensions
which have been studied by many researchers in different scientific works
(for more details, see \cite{HARDLITTPOLY}).
For $p=2$ the above inequality (\ref{Hardy-Inequality}) becomes
\begin{align}{\label{Hardy-Inequality-Modified}}
\displaystyle\sum_{n=1}^{\infty} w_n^{H} \left(\sum_{k=1}^{n}a_k \right)^2
\leq \sum_{n=1}^{\infty}{a_n}^2,
\end{align}
where $w_n^{H} = \frac{1}{4n^2}$. We say $w_n^{H}$ is the classical Hardy weight.
Recently, Keller et al. \cite{KELLER} obtained an improved version of discrete
Hardy inequality for $p=2$ as follows
\begin{align}{\label{imph}}
\displaystyle\sum_{n=1}^{\infty}w_n\Big(\sum_{k=1}^{n}a_k\Big)^2\leq\sum_{n=1}
^{\infty}{a_n}^2,
\end{align}
where $w_n = 2-\sqrt{1+\frac{1}{n}}-\sqrt{1-\frac{1}{n}}$ for $n\in \mathbb{N}$.
Clearly, $w_n>\frac{1}{4n^2}=w_n^{H}$ for each $n\in \mathbb{N}$. Also note that
$\displaystyle \sum_{n=1}^{\infty}w_n^{H}= \frac{\pi^2}{24}$ and the series
$\displaystyle \sum_{n=1}^{\infty}w_n$ is convergent and converges to $0.753045$
(approximately).
In what follows, $\mathcal{H}$ stands for separable complex Hilbert space.
The set of all bounded linear operators from $\mathcal{H}$ to itself is denoted
by $\mathcal{B}(\mathcal{H} )$. An operator $A\in \mathcal{B}(\mathcal{H})$ is said
to be an isometry if $A^*A=I_{\mathcal{H}}$ and $A$ is said to be a pure
isometry or a shift if $A^{*n} \rightarrow 0$ as $n \rightarrow \infty$
in strong operator topology (cf. \cite{Halmos}). We say an operator $A$
is a co-isometry if $A^*$,
adjoint of $A$ is an isometry and $A$ is a co-shift if $A^*$ is a shift.
An operator $A \in \mathcal{B}(\mathcal{H})$ is said to be positive if $A$ is self-adjoint,
that is, $A^* = A$ and
\[
\langle Ax, x \rangle \geq 0 \quad (x \in \mathcal{H}).
\]
The numerical range of any $A\in \mathcal{B}(\mathcal{H})$, denoted by
$W(A)$, is defined as
\[
W(A) :=\{\langle Ax,x \rangle : x\in \mathcal{H} ,\|x\|=1 \},
\]
the numerical radius of $A$ and the Crawford number of $A$, denoted by
$\omega(A)$ and $c(A)$, respectively as
\[
\omega(A)=\sup\{ |\langle Ax,x \rangle| : x\in \mathcal{H} ,\|x\|=1 \},
\]
and
\[
c(A)=\inf\{ |\langle Ax,x \rangle| : x\in \mathcal{H} ,\|x\|=1 \}.
\]
We say two operators $A_1$ on $\mathcal{H}_1$ and $A_2$ on $\mathcal{H}_2$ are said
to be unitarily equivalent if there exists a unitary $U: \mathcal{H}_1 \rightarrow
\mathcal{H}_2$ such that $UA_1 = A_2U$. From the definition it readily follows
that the numerical radius and the Crawford number are unitarily invariant.
Indeed, if $A_1$ on $\mathcal{H}_1$ and $A_2$ on $\mathcal{H}_2$ are unitarily equivalent,
then $\omega(A_2)=\omega(UA_1U^{*}) = \omega(A_1)$ and $c(A_2)=c(UA_1U^{*})
= c(A_1)$. Also $\omega(A)= \omega(A^*)$ and $c(A)=c(A^{*})$ for any $A \in \mathcal{B}(\mathcal{H})$.
Let $\Omega$ be a non-empty set. A reproducing kernel Hilbert space (in short rkHs)
is a Hilbert space $H(\Omega)$ of complex-valued functions on $\Omega$
such that for every point $w \in \Omega$ the point evaluation $f \mapsto f(w)$
is a bounded linear functional on $H(\Omega)$. Since for each $w \in \Omega$
the map $f \mapsto f(w)$ is a continuous linear functional on $H(\Omega)$,
there is a unique element $k_w$ of $H(\Omega)$ because of the classical Riesz's
representation theorem such that $f(w)=\langle f, k_w \rangle$ for all
$f\in H(\Omega)$. The map $k: \Omega \times \Omega \rightarrow \mathbb{C} $
defined by
\[
k(z,w) = k_w(z)= \langle k_w, k_z \rangle
\]
is called the reproducing kernel function of $H(\Omega)$. We denote $\hat{k}_w =
\frac{{k}_w}{\|{k}_w\|}$ for $w \in \Omega$ as the normalized reproducing
kernel of $H(\Omega)$ and the set $\{\hat{k}_w: w \in \Omega \}$ is a total
set in $H(\Omega)$. If a sequence $\{ e_n \}$ is an orthonormal basis for
$H(\Omega)$, then the kernel function can be written as
\begin{center}
$k(z, w) =\displaystyle\sum_{n=0}^{\infty}e_n(z)\overline{e_n(w)}$.
\end{center}
For more details and references on rkHs, see \cite{Aronzajn-rkHs},
\cite{PR-rkHs-Book}. Let $H(\Omega)$ be a reproducing kernel
Hilbert space on $\Omega$ and let $A \in \mathcal{B}( H(\Omega))$.
Define a function $\widetilde{A}$ on $\Omega$ as
\[
\widetilde{A}(z)=\langle A\hat{k}_z, \hat{k}_z\rangle, \quad (z \in \Omega).
\]
The function $\widetilde{A}(z)$ is called Berezin transform or Berezin symbol
of $A$ which was firstly introduced and studied by Berezin (\cite{BERE},
\cite{BEREQUAN}). Using Cauchy-Schwarz inequality, one can easily say that
the Berezin transform $\widetilde{A}$ is a bounded function on $\Omega$. Indeed,
\[
|\widetilde{A}(z)|\leq \|A \hat{k}_z\| \|\hat{k}_z\| \leq \|A \| \quad (z \in \Omega).
\]
The Berezin set and Berezin number of an operator $A \in \mathcal{B}( H(\Omega))$,
denoted by $Ber(A)$ and $ber(A)$, respectively is defined as
\begin{align*}
Ber(A)& = \{\widetilde{A}(z): z \in \Omega\},\\
ber(A)& =\displaystyle\sup_{z\in \Omega}|\widetilde{A}(z)|.
\end{align*}
Therefore, one can easily observe that for $A \in \mathcal{B}( H(\Omega))$
\begin{center}
$0 \leq ber(A) \leq w(A)\leq \|A\|$.
\end{center}
From the definition of Berezin number, it readily follows that
$ber(\cdot)$ is a semi-norm on $\mathcal{B}( H(\Omega))$.
Before proceeding further, let us recall the notion of functional
calculus \cite{Conway-Book}. Let $A$ be a normal operator on a Hilbert space $\mathcal{H}$
and $\sigma(A)$ denote the spectrum of $A$. Let $\mathcal{C}(\sigma(A))$
and $B_{\infty}(\sigma(A))$ be the continuous complex-valued functions
and the bounded measurable complex-valued functions on $\sigma(A)
\subseteq \mathbb{C}$, respectively. Then $B_{\infty}(\sigma(A))$
is a $C^*$-algebra with the involution map defined by $f \mapsto \bar{f}$.
Let $\pi: \mathcal{C}(\sigma(A)) \rightarrow \mathcal{B}(\mathcal{H})$ be a $*$-homomorphism
such that $\pi(1)= I_{\mathcal{H}}$, where $1$ is a constant function with value one
and $I_{\mathcal{H}}$ is an identity operator. Then there exists a unique spectral measure
$\mathcal{P}$ in $(\sigma(A), \mathcal{H})$ such that
\[
\pi(f) = \int_{\sigma(A)}fd\mathcal{P}.
\]
Now the continuous functional can be extended by Borel functional calculus
for any $f \in B_{\infty}(\sigma(A))$, where
\[
f(A) = \displaystyle\int_{\sigma(A)}fd\mathcal{P}.
\]
In particular, if $A \in \mathcal{B}(\mathcal{H})$ is a positive operator, then
$\sigma(A)$ is a subset of $[0, \infty)$ and $f(A)$ is a positive
operator for any positive Borel function whose domain contains the
spectrum of $A$.
The following inequalities are useful to prove our results.
\begin{Lemma}(\cite{SIMON-Trace})\label{Macarthy-lemma}
Let $A$ be any positive operator on a Hilbert space $\mathcal{H}$ and $p > 0$
be any real number. Then for $x \in \mathcal{H}$,
\begin{center}
$\langle Ax, x \rangle^p \leq \langle A^{p}x, x \rangle$ whenever $1 \leq p < \infty$
\end{center}
and
\begin{center}
$\langle Ax, x \rangle^p > \langle A^{p}x, x \rangle$ whenever $0 < p < 1$.
\end{center}
\end{Lemma}
\begin{Lemma}(\cite{KATO-Notes})\label{Convex-lemma}
Let $A$ be any bounded linear operator on a Hilbert space $\mathcal{H}$.
Then for any $x, y\in \mathcal{H}$
\begin{center}
$|\langle Ax, y \rangle|^2 \leq \langle |A|^{2\alpha}x, x \rangle
\langle |{A^*}|^{2(1-\alpha)}y, y \rangle$,
\end{center}
where $0\leq \alpha \leq 1$.
\end{Lemma}
\section{Numerical Radius and Berezin number}
In general, it is very difficult to compute Berezin number and numerical
radius of a bounded operator (even for particular classes of operators).
But if we concentrate on the model space, then these values can be
calculated for certain classes of operators. In this section, our treatment
is analytic in nature, and we also discuss some inequalities and concrete
examples to find Berezin number, Crawford number, and numerical radius.
\vspace{.1cm}
Let $A \in \mathcal{B}(\mathcal{H})$. The positive square root of $A$, denoted by $|A|$,
is defined as $|A|=\sqrt{A^*A}$ is a self-adjoint operator on $\mathcal{H}$.
Now for any $x \in \mathcal{H}$,
\[
\| |A| \|^2 = \sup_{\|x \| =1}\||A|x \|^2 = \sup_{\|x \| =1}
|\langle A^*Ax, x \rangle| = \|A^*A \|=\|A\|^2.
\]
Therefore
\[
\|| A | \| = \|A \|= \| A^{*} \| = \| | A^{*} | \|.
\]
Since $|A|$ and $| A^{*} |$ are self-adjoint operators,
\[
\omega(|A|) = \||A|\| = \| A \| = \| | A^{*} | \| =\omega(|A^{*}|).
\]
Hence for any operator $A\in \mathcal{B}(\mathcal{H})$,
\[
\omega(A) \leq \omega(|A|).
\]
Now for any real number $p>0$ and $x \in \mathcal{H}$
with $\|x \| =1$,
\begin{align*}
|\langle Ax, x \rangle|^{p} \leq \|Ax \|^{p} = \langle Ax, Ax \rangle^{p \over 2}
= \langle A^*Ax, x \rangle^{p \over 2}.
\end{align*}
Therefore
\[
\sup_{\|x \|=1} |\langle Ax, x \rangle|^{p} \leq
\sup_{\|x \|=1} \langle A^*Ax, x \rangle^{p \over 2}= \|A^*A \|^{p \over 2}= \|A \|^p
= \||A|\|^p= \||A|^p\|,
\]
where the last equality follows from functional calculus for the positive operator $|A|$.
Hence
\[
\omega(A)^{p} \leq \omega(|A|^{p}).
\]
From the above deliberation we have the following:
\begin{lem}
Let $A \in \mathcal{B}(\mathcal{H})$ and $p>0$ be any real number. Then
\[
\omega(A)^{p} \leq \omega(|A|^{p}).
\]
\end{lem}
\begin{thm}
Let $A_i, X \in \mathcal{B}(\mathcal{H})$ for $i=1, \ldots, n$ and $X$
be any positive operator. Then
\[
\omega({\sqrt{\sum_{i=1}^n A_i^*XA_i}}) = {\sqrt{\omega(\sum_{i=1}^n A_i^*XA_i)}}.
\]
\end{thm}
\begin{proof}
Suppose that $A_i, X \in \mathcal{B}(\mathcal{H})$ for $i=1, \ldots, n$ and $X$
is any positive operator. Then $\sum_{i=1}^n A_i^*XA_i$ is a positive operator
as for any $h \in \mathcal{H}$
\begin{align*}
\langle (\sum_{i=1}^n A_i^*XA_i) h, h \rangle = \sum_{i=1}^n \langle A_i^*XA_i h, h \rangle
= \sum_{i=1}^n \langle XA_i h, A_i h \rangle \geq 0.
\end{align*}
Therefore
\begin{align*}
\omega({\sqrt{\sum_{i=1}^n A_i^*XA_i}}) = \sup_{\|h \|=1}
|\langle {\sqrt{\sum_{i=1}^n A_i^*XA_i}}h, h \rangle|
& = \| {\sqrt{\sum_{i=1}^n A_i^*XA_i}} \| \\
& = \| {\sum_{i=1}^n A_i^*XA_i} \|^{1 \over 2} \\
& = (\sup_{\|h \|=1} |\langle {\sum_{i=1}^n A_i^*XA_i}h, h \rangle|)^{1 \over 2} \\
& = \sqrt{\omega(\sum_{i=1}^n A_i^*XA_i)}.
\end{align*}
Here the above third equality follows from functional calculus
for a positive operator.
This proves the desire inequality.
\end{proof}
The numerical radius $\omega(\cdot)$ is a norm on $\mathcal{B}(\mathcal{H})$ but $\omega(\cdot)$ is
not multiplicative, that is, $\omega(RT) \neq \omega(R)\omega(T)$
(even for normal operators) $R, T \in \mathcal{B}(\mathcal{H})$. For example
we consider $T, R \in \mathcal{B}(\mathbb{C}^2)$, defined as $T(z, w)= (z, 0)$
and $R(z, w)= (0, w)$. Then $\omega(T)=\|T \|=1 =\|R \|=\omega(R)$ but $\omega(RT)=0$.
Since ${\|T \| \over 2} \leq \omega(T) \leq \|T \|$ for $T\in \mathcal{B}(\mathcal{H})$
(see \cite{Halmos}),
\[
\omega(RT) \leq 4 \omega(R) \omega(T)
\]
for any $R, T \in \mathcal{B}(\mathcal{H})$. For a normal operator $T$, $\omega(T) = \|T \|$
and hence if $R, T$ are normal, then
\[
\omega(RT) \leq \omega(R)\omega(T).
\]
Therefore $\omega(\cdot)$ is sub-multiplicative in case of normal operators,
but not in general. Here we attempt to give an answer (partially) to
the natural question raised in Section 1.
We will firstly study model spaces and discuss the classical Wold-von
Neumann decomposition for an isometry (see \cite{NF-Book}, \cite{MSS-PAIRS}).
\begin{thm}\label{thm-Wold} Let $V$ be an isometry on a Hilbert space $\mathcal{H}$.
Then $\mathcal{H}$ decomposes as a direct sum of $V$-reducing subspaces
$\mathcal{H}_s = \displaystyle{\mathop{\oplus}_{m=0}^\infty} V^m \mathcal{W}$ and
$\mathcal{H}_u = \mathcal{H} \ominus \mathcal{H}_s$ and
\[
V = \begin{bmatrix} V_s & 0\\ 0 & V_u
\end{bmatrix} \in \mathcal{B}(\mathcal{H}_s \oplus \mathcal{H}_u),
\]
where $\mathcal{W} = \mathcal{H} \ominus V\mathcal{H}$, $V_s = V|_{\mathcal{H}_s}$ is a shift operator
and $V_u = V|_{\mathcal{H}_u}$ is a unitary operator.
\end{thm}
The \textit{Hardy space}, denoted by $H^2(\mathbb{D})$, is the Hilbert space
of all square summable holomorphic functions on the unit disc $\mathbb{D}$
(cf. \cite{NF-Book}). The Hardy space is also a reproducing
kernel Hilbert space corresponding to the Szeg\"{o} kernel
\[
k(z, w) = \frac{1}{1 - z \bar{w}} \quad \quad (z, w \in \mathbb{D}).
\]
For any Hilbert space $\mathcal{E}$, $H^2_{\mathcal{E}}(\mathbb{D})$ denotes the $\mathcal{E}$-valued
Hardy space with reproducing kernel $k(z, w)I_{\mathcal{E}}$, and
$H^\infty_{\mathcal{B}(\mathcal{E})}(\mathbb{D})$ denotes as the space of $\mathcal{B}(\mathcal{E})$-valued
bounded holomorphic functions on $\mathbb{D}$. The multiplication operator $M_z$
by the coordinate function $z$ on $H^2_{\mathcal{E}}(\mathbb{D})$ is defined by
\[
(M_z f)(w) = w f(w) \quad \quad \quad (f \in H^2_{\mathcal{E}}(\mathbb{D}),
w \in \mathbb{D}).
\]
The Wold-von Neumann construction yields an analytic description
of an isometry as follows: Let $V$ be an isometry on $\mathcal{H}$, and let
$\mathcal{H} = \mathcal{H}_s \oplus \mathcal{H}_u$ be the Wold-von Neumann orthogonal
decomposition of $V$. Define
\[
\Pi : \mathcal{H}_s \oplus \mathcal{H}_u \rightarrow H^2_{\mathcal{W}}(\mathbb{D}) \oplus \mathcal{H}_u
\]
by
\[
\Pi (V^m \eta \oplus f) = z^m \eta \oplus f \quad \quad (m \geq 0,
f \in \mathcal{H}_u, \eta \in \mathcal{W}).
\]
Then $\Pi$ is a unitary and
\[
\Pi (V_s \oplus V_u) = (M_z \oplus V_u)\Pi,
\]
that is, $V$ on $\mathcal{H}$ and $ M_z \oplus V_u $ on $H^2_{\mathcal{W}}(\mathbb{D})
\oplus \mathcal{H}_u$ are unitarily equivalent. In particular, if $V$ is a shift,
then $\mathcal{H}_u =\{0\}$ and hence
\[
\Pi V = M_z\Pi.
\]
Therefore, an isometry $V$ on $\mathcal{H}$ is a shift operator if and only
if $V$ is unitarily equivalent to $M_z$ on $H^2_{\mathcal{E}}(\mathbb{D})$, where
$\dim \mathcal{E} = \dim (\mathcal{H} \ominus V\mathcal{H})$. We call $(\Pi, M_z)$
as the Wold-von Neumann decomposition of the isometry $V$.
Let $C$ be a bounded linear operator on $H^2_{\mathcal{E}}(\mathbb{D})$. Then
$C \in \{M_z\}^{'}$, commutant of $M_z$ (that is, $CM_z = M_z C$),
if and only if (cf. \cite{NF-Book})
\[
C = M_{\Theta},
\]
for some $\Theta \in H^{\infty}_{\mathcal{B}(\mathcal{E})}(\mathbb{D})$, where
$(M_{\Theta}f)(w) = \Theta(w) f(w)$ for all $f \in H^2_{\mathcal{E}}(\mathbb{D})$
and $w \in \mathbb{D}$. Let $V$ be a pure isometry on a Hilbert space $\mathcal{H}$,
and let $C \in \{V\}^{'}$. Suppose that $(\Pi, M_z)$ is the Wold-von
Neumann decomposition of the pure isometry $V$ on $\mathcal{H}$, and
$\mathcal{W} = \mathcal{H} \ominus V\mathcal{H}$. Then $\Pi C \Pi^* \in \mathcal{B}(H^2_{\mathcal{W}}(\mathbb{D}))$
and $(\Pi C \Pi^*) M_z = M_z(\Pi C \Pi^*)$ as $CV=VC$. Therefore
\[
\Pi C \Pi^* = M_{\Theta}
\]
for some $\Theta \in H^{\infty}_{\mathcal{B}(\mathcal{W})}(\mathbb{D})$.
Another important vector-valued reproducing kernel Hilbert space is the
Dirichlet space $D_{\mathcal{E}}(\mu)$ which is defined as the
space of all $\mathcal{E}$-valued holomorphic functions $f$ in the
unit disc $\mathbb{D}$ with the finite norm
\[
\|f\|_{\mu}^2= \|f \|^2_{H^2(\mathbb{D})} + \int_{\mathbb{D}}\langle P[\mu](z)f^{'}(z), f^{'}(z) \rangle dA(z),
\]
where $dA$ stands for the normalized Lebesgue area measure on $\mathbb{D}$
and $ P[\mu]$ is the Poisson integral of the positive $\mathcal{B}(\mathcal{E})$-valued
operator measure on the unit circle. The multiplication operator
$M_z^{D_{\mathcal{E}}(\mu)}$ stands for the Dirichlet shift on the space
$D_{\mathcal{E}}(\mu)$ (see \cite{{Olofsson}} for more details).
An operator $V \in \mathcal{B}(\mathcal{H})$ is said to be a two-isometry if
\[
\|V^2h\|^2 + \|h \|^2= 2\|Vh\|^2 \quad (\forall~ h \in \mathcal{H}).
\]
Thus every isometry is a two-isometry. Let $V$ be a pure two-isometry
on $\mathcal{H}$, that is $\mathcal{H}_u= \cap_{n=0}^{\infty}V^n\mathcal{H} = \{0\}$. Then
the Wold-von Neumann decomposition for the two isometry gives an
analytic representation. More precisely, the unitary
$\tilde{\Pi}: \mathcal{H} \rightarrow D_{\mathcal{E}}(\mu)$ defined by
\[
(\tilde{\Pi}h)(z) = \sum_{n=0}^{\infty}(P_{\mathcal{E}}L^nh)z^n \quad (h \in \mathcal{H}, z \in \mathbb{D}),
\]
where $P_{\mathcal{E}}$ is the projection of $\mathcal{H}$ onto $\mathcal{E} = \mathcal{H} \ominus V\mathcal{H}$,
$L=(V^*V)^{-1}V^*$ is the left inverse of $V$, and $\tilde{\Pi}V=M_z^{D_{\mathcal{E}}(\mu)}\tilde{\Pi}$.
We are now in a position to state our results:
\begin{thm}\label{Shift-Numerical}
Let $V$ be a shift or a co-shift on a Hilbert space $\mathcal{H}$. Then
the Crawford number of $V$ is $0$.
\end{thm}
\begin{proof}
Suppose that $V$ is a shift on a Hilbert space $\mathcal{H}$. We here
prove only for shift case. If $V$ is a co-shift, then we take
adjoint of $V$, $V^*$ which becomes a shift.
Let $(\Pi, M_z)$ be the Wold-von Neumann decomposition of the shift $V$.
That means the map $\Pi: \mathcal{H} \rightarrow H^2_{\mathcal{E}}(\mathbb{D})$, where
$\mathcal{E} =\mathcal{H} \ominus V\mathcal{H}$ is a unitary such that
\[
\Pi V \Pi^* = M_z.
\]
Therefore
\begin{align*}
c(M_z) = c(\Pi V \Pi^*)= c(V) \leq \|V\| =1.
\end{align*}
Now consider the normalized kernel function $\hat{k}(\cdot, w)
= \frac{{k}(\cdot, w)}{\|{k}(\cdot, w)\|}$ of $H^2(\mathbb{D})$. Also
the set $\{\hat{k}(\cdot, w)\eta : w \in \mathbb{D}, \eta \in \mathcal{E} \}$
is a total set in $H^2_{\mathcal{E}}(\mathbb{D})$. Therefore
from the definition of Crawford number of an operator,
we obtain
\begin{align*}
0 \leq c(M_z ) & \leq \inf_{w \in \mathbb{D}, \|\eta\| =1} |\langle M_z\hat{k}
(\cdot, w) \eta, \hat{k}(\cdot, w)\eta \rangle |\\
& = \inf_{w\in \mathbb{D}, \|\eta\| =1} |\langle \hat{k}(\cdot, w)\eta ,
M_z ^{*} \hat{k}(\cdot, w)\eta \rangle |\\
& = \inf_{w \in \mathbb{D}, \|\eta\| =1} |\bar{w} | |\langle \hat{k}(\cdot, w)
\eta, \hat{k}(\cdot, w)\eta \rangle |\\
& = \inf_{w \in \mathbb{D}} |{w} |\\
& =0.
\end{align*}
Thus
\[
c(V^{*}) = c(V) = c(M_z ) = 0.
\]
This completes the proof.
\end{proof}
\begin{rem}
Let $\theta \in H^{\infty}(\mathbb{D})$ be a non-constant inner function.
Then the analytic Toeplitz operator $T_{\theta} \in \mathcal{B}(H^2(\mathbb{D}))$ is a shift
(cf. \cite{KDPS-Partially}). Hence
\[
\omega(T_{\theta}^{*n}) = \omega(T_{\theta}^n) = 1
\]
and
\[
c(T_{\theta}^{*n}) = c(T_{\theta}^n) = 0 \quad (n \in \mathbb{N}).
\]
\end{rem}
\begin{rem}
Suppose $\theta \in H^{\infty}(\mathbb{D})$. If $\theta(z_0)=0$ for
some point $z_0 \in \mathbb{D}$, then
\[
c(T_{\theta}^n) = 0 \quad (n \in \mathbb{N}).
\]
For an example, consider $\theta(z)= 1$ for $z \in \mathbb{D}$. Then
clearly $\theta \in H^{\infty}(\mathbb{D})$ and $\theta(z) \neq 0$ for
any $z$ in $\mathbb{D}$. Also $c(T_{\theta}^n) = 1 $ for any $n \in \mathbb{N}$.
\end{rem}
\begin{thm}\label{two-isometry-Numerical}
Let $V$ be a pure two-isometry on a Hilbert space $\mathcal{H}$. Then
the numerical radius of $V$ is $1$ and the Crawford number of $V$
is $0$.
\end{thm}
\begin{proof}
Suppose that $V$ is a pure two-isometry on $\mathcal{H}$.
Let $(\tilde{\Pi}, M_z^{D_{\mathcal{E}}(\mu)})$ be the Wold-von Neumann
decomposition of $V$. Then
$
\tilde{\Pi} V \tilde{\Pi}^{*} = M_z^{D_{\mathcal{E}}(\mu)}.
$
Thus
\begin{align*}
\omega(M_z^{D_{\mathcal{E}}(\mu)}) = \omega(\tilde{\Pi} V \tilde{\Pi}^{*}).
\end{align*}
Again consider the normalized kernel function $\hat{k}(\cdot, w)
= \frac{{k}(\cdot, w)}{\|{k}(\cdot, w)\|}$ of $D(\mu)$. Also
the set $\{\hat{k}(\cdot, w)\eta : w \in \mathbb{D}, \eta \in \mathcal{E} \}$
is a total set in $D_{\mathcal{E}}(\mu)$. Therefore
\begin{align*}
\omega(M_z^{D_{\mathcal{E}}(\mu)})
& = \sup_{w\in \mathbb{D}, \|\eta\| =1} |\langle M_z^{D_{\mathcal{E}}(\mu)}\hat{k}(\cdot, w)\eta,
\hat{k}(\cdot, w)\eta \rangle |\\
& = \sup_{w \in \mathbb{D}, \|\eta\| =1} |\bar{w} | |\langle \hat{k}(\cdot, w)
\eta, \hat{k}(\cdot, w)\eta \rangle |\\
& = \sup_{w \in \mathbb{D}} |{w} |\\
& =1.
\end{align*}
Hence
\[
\omega(V) = \omega(\tilde{\Pi} V \tilde{\Pi}^{*}) =\omega(M_z^{D_{\mathcal{E}}(\mu)})=1.
\]
For the case of Crawford number, the same lines of the above proof yields
\[
c(V) = c(\tilde{\Pi} V \tilde{\Pi}^{*}) = c(M_z^{D_{\mathcal{E}}(\mu)})= \inf_{w \in \mathbb{D}}|w|=0.
\]
This completes the proof.
\end{proof}
\begin{rem}\label{Isometry-Numerical}
Let $V$ be an isometry on a Hilbert space $\mathcal{H}$. Then
it is a two-isometry with $\|V\|=1$. Now the spectral radius
formula gives that the numerical radius of $V$ is $1$. However, here we
provide a new proof by the help of the analytic structure of an isometry.
Clearly,
\begin{align*}
\omega(V) = \sup_{\|x \| =1}|\langle Vx, x \rangle| \leq \| V \|=1.
\end{align*}
Let $(\Pi, M_z)$ be the Wold-von Neumann decomposition of the isometry $V$.
Then
\[
\Pi V \Pi^* = M_z \oplus U,
\]
where $U$ is the unitary part of $V$. Thus
\begin{align*}
\omega(M_z \oplus U) = \omega(\Pi V \Pi^*)= \omega(V) \leq 1.
\end{align*}
Again consider the normalized kernel function $\hat{k}(\cdot, w)
= \frac{{k}(\cdot, w)}{\|{k}(\cdot, w)\|}$ of $H^2(\mathbb{D})$. Also
the set $\{\hat{k}(\cdot, w)\eta : w \in \mathbb{D}, \eta \in \mathcal{E} \}$
is a total set in $H^2_{\mathcal{E}}(\mathbb{D})$. Therefore
\begin{align*}
\omega(M_z \oplus U)
& \geq \sup_{w\in \mathbb{D}, \|\eta\| =1} |\langle(M_z \oplus U)(\hat{k}(\cdot, w)\eta
\oplus 0), \hat{k}(\cdot, w)\eta \oplus 0 \rangle |\\
& = \sup_{w\in \mathbb{D}, \|\eta\| =1} |\langle \hat{k}(\cdot, w)\eta ,
M_z ^{*} \hat{k}(\cdot, w)\eta \rangle |\\
& = \sup_{w \in \mathbb{D}, \|\eta\| =1} |\bar{w} | |\langle \hat{k}(\cdot, w)
\eta, \hat{k}(\cdot, w)\eta \rangle |\\
& = \sup_{w \in \mathbb{D}} |{w} |\\
& =1.
\end{align*}
Hence
\[
\omega(V) = \omega(\Pi V \Pi^*) = \omega(M_z \oplus U) = 1.
\]
If $V$ is a co-isometry, then $V^*$ is an isometry. Thus from the
above we have
\[
\omega(V) = \omega(V^*)= 1.
\]
The above analytic proof yields that the numerical radius of a two-isometry
with unit norm is $1$.
\end{rem}
\begin{cor}
The numerical radius $\omega(\cdot)$ is multiplicative on the class
of isometries on a Hilbert space.
\end{cor}
\begin{proof}
Let $R, T$ be two isometries on a Hilbert space $\mathcal{H}$. Then
$RT$ is an isometry on $\mathcal{H}$ as
\[
(RT)^*(RT)= T^*(R^*R)T = (T^*I_{\mathcal{H}})T = T^*T = I_{\mathcal{H}}.
\]
Therefore from the above Remark \ref{Isometry-Numerical}, we have
\[
\omega(RT) = 1 ~~~ \mbox{and}~~~ \omega(R)= 1 = \omega(T).
\]
Hence
\[
\omega(RT) = \omega(R) \omega(T).
\]
This finishes the proof.
\end{proof}
\begin{rem}
Let $T \in \mathcal{B}(\mathcal{H})$ be any isometry. Then the above Corollary
gives $\omega(T^n)= \omega(T)^n$ for any $n \in \mathbb{N}$. It
is a noteworthy to mention that for a normal operator $T \in
\mathcal{B}(\mathcal{H})$, $\omega(T^n)= \omega(T)^n$ for any $n \in
\mathbb{N}$ as
\[
\omega(T^n) = \|T^n\| = \|T\|^n =\omega(T)^n.
\]
\end{rem}
\begin{lem}\label{Commutant-Numerical}
Let $T$ be a shift on a Hilbert space $\mathcal{H}$ and
let $R$ be a commutant of $T$. Then the numerical radius
of $R$ is $\|R \|$.
\end{lem}
\begin{proof}
Let $T$ be a shift on a Hilbert space $\mathcal{H}$. Then $T$
is unitarily equivalent to $M_z$ on $H^2_{\mathcal{E}}(\mathbb{D})$, where
$\mathcal{E} =Ker(T^*)$. That means there exists a unitary $\Pi: \mathcal{H}
\rightarrow H^2_{\mathcal{E}}(\mathbb{D})$ such that
\[
\Pi T \Pi^* = M_z.
\]
Now if $R$ is any commutant of $T$, that is $RT=TR$, then
\[
(\Pi R \Pi^*)M_z = M_z(\Pi R \Pi^*).
\]
Thus $\Pi R \Pi^*$ is an analytic Toeplitz operator on $H^2_{\mathcal{E}}(\mathbb{D})$
and hence $\Pi R \Pi^* =M_{\Phi}$ for some $\Phi \in H^{\infty}_{\mathcal{B}(\mathcal{E})}(\mathbb{D})$.
Therefore
\[
\omega(R)= \omega(\Pi R \Pi^*) = \omega(M_{\Phi}) = \sup_{\lambda \in \mathbb{D}}\|\Phi^{*}(\lambda)\|
= \|M_{\Phi} \|= \|R \|.
\]
\end{proof}
The next result gives a partial answer of the question raised in the previous section.
\begin{thm}
Let $T_1, T_2 \in \mathcal{B}(\mathcal{H})$ such that $T_1T_2=T_2T_1$ and $T_1T_2$ be a
shift on $\mathcal{H}$. Then $\omega(T_1T_2) \leq \omega(T_1)\omega(T_2)$.
\end{thm}
\begin{proof}
Let $T=T_1T_2$ be a shift on $\mathcal{H}$ with $T_1T_2=T_2T_1$.
Since $T$ is a shift, Wold decomposition yields a unitary $\Pi: \mathcal{H}
\rightarrow H^2_{\mathcal{E}}(\mathbb{D})$, where $\mathcal{E} = Ker(T^{*})$ such that
\[
\Pi T \Pi^* = M_z.
\]
Now
\[
TT_1 = (T_1T_2)T_1 =T_1(T_1T_2) = T_1T.
\]
Similarly,
\[
TT_2 = T_2T.
\]
Therefore from the above Lemma \ref{Commutant-Numerical}, we have
\[
\omega(T_i)= \| T_i\| \quad (i=1, 2).
\]
Thus
\[
\omega(T)= \omega(T_1T_2) \leq \|T_1 \| \| T_2 \|= \omega(T_1)\omega(T_2).
\]
\end{proof}
Now we discuss some results on Berezin number of an operator on a reproducing
kernel Hilbert space.
Let $H(K, \mathbb{D})$ be a reproducing kernel Hilbert space with kernel function
$K$ defined as $K(\cdot, w)(z)= K(z, w)$ for all $z \in \mathbb{D}$. We say that
$H(K, \mathbb{D})$ is an analytic Hilbert space if the multiplication operator
$M_z$ by the coordinate function $z$ on $H(K, \mathbb{D})$, defined by $M_zf = zf$ for all
$f \in H(K, \mathbb{D})$ is a contraction. Also
\[
M_z^*K(\cdot, w) =\bar{w}K(\cdot, w) \quad (w \in \mathbb{D}).
\]
Let $\hat{K}(\cdot, w)$ for $w \in \mathbb{D}$ be the normalized kernel function.
Then
\begin{align*}
ber(M_z) & = \sup\{|\langle M_z \hat{K}(\cdot, w), \hat{K}(\cdot, w) \rangle|: w \in \mathbb{D} \}\\
& =\sup\{|\langle \hat{K}(\cdot, w), M_z^*\hat{K}(\cdot, w) \rangle|: w \in \mathbb{D} \}\\
& =\sup\{|\langle \hat{K}(\cdot, w), \bar{{w}}\hat{K}(\cdot, w) \rangle|: w \in \mathbb{D} \}\\
& =\sup\{|{{w}}| : w \in \mathbb{D} \}\\
& = 1.
\end{align*}
Again
\begin{align*}
1 \geq \omega(M_z) & =\sup\{|\langle M_z f, f \rangle|: \|f \|=1 \}\\
& \geq \sup\{|\langle M_z \hat{K}(\cdot, w), \hat{K}(\cdot, w) \rangle|: w \in \mathbb{D} \}\\
& = 1.
\end{align*}
To summarize the above, we have the following:
\begin{thm}
Let $H(K, \mathbb{D})$ be an analytic reproducing kernel Hilbert space over the
unit disc $\mathbb{D}$ with the kernel function $K$ and $M_z$ be the multiplication
operator defined by the coordinate function $z$ on $H(K, \mathbb{D})$. Then
$ber(M_z)=1$ and $\omega(M_z)=1$.
\end{thm}
Recall that $H(\Omega)$ be a rkHs on $\Omega$ and $\hat{k}_{\lambda}$
for $\lambda \in \Omega$ normalized kernel function of $H(\Omega)$.
For $T \in \mathcal{B}(H(\Omega))$,
\[
\| T \|_{ber} = \sup_{\lambda \in \Omega} \| T \hat{k}_{\lambda} \|.
\]
Here we have the following result:
\begin{thm}
Let $H(\Omega_i)$ be a reproducing kernel Hilbert space on $\Omega_i$
and $T_i \in \mathcal{B}(H(\Omega_i))$ for $i=1, 2$.Then
$\|T_1 \otimes T_2\|_{ber} =\|T_1 \|_{ber} \| T_2\|_{ber}$.
\end{thm}
\begin{proof}
Suppose $H(\Omega_i)$ is a reproducing kernel Hilbert space on $\Omega_i$
and $T_i \in \mathcal{B}(H(\Omega_i))$ for $i=1, 2$.
Then $T_1 \otimes T_2 \in \mathcal{B}(H(\Omega_1)\otimes H(\Omega_2))$.
Let $\hat{k}_{\lambda}$ for $\lambda \in \Omega_1$ and $\hat{k}_{\mu}$ for $\mu \in \Omega_2$
be the normalized kernel functions for $H(\Omega_1)$ and $H(\Omega_2)$, respectively.
Then $\hat{k}_{\lambda} \otimes \hat{k}_{\mu}$ for $\lambda \in \Omega_1$, $\mu \in \Omega_2$
is the normalized kernel function for $H(\Omega_1)\otimes H(\Omega_2)$. Therefore
\begin{align*}
\|T_1 \otimes T_2\|_{ber} & =
\sup_{\lambda \in \Omega_1, \mu \in \Omega_2} \|(T_1 \otimes T_2)(\hat{k}_{\lambda} \otimes
\hat{k}_{\mu}) \|\\
& =
\sup_{\lambda \in \Omega_1, \mu \in \Omega_2} \|T_1 \hat{k}_{\lambda} \otimes T_2\hat{k}_{\mu} \|\\
& =
(\sup_{\lambda \in \Omega_1} \|T_1 \hat{k}_{\lambda} \|) (\sup_{ \mu \in \Omega_2}\| T_2\hat{k}_{\mu} \|) \\
& = \|T_1 \|_{ber} \| T_2\|_{ber}.
\end{align*}
\end{proof}
\begin{lem}
Let $H(\Omega)$ be any reproducing kernel Hilbert space on $\Omega$ and
let $A, X \in \mathcal{B}(\mathcal{H}(\Omega))$ and $X$ be any positive operator.
Then $ ber({\sqrt{A^*XA}}) < \sqrt{ber(A^*XA})$.
\end{lem}
\begin{proof}
Suppose $A, X \in \mathcal{B}(H(\Omega))$ and $X$ is positive operator.
Then $A^{*}XA $ is a positive operator on $H(\Omega)$.
Let $\hat{k}_{\lambda}$ for $\lambda \in \Omega$ be the normalized
kernel function for $H(\Omega)$. Then
\begin{align*}
ber(\sqrt{A^*XA})) &
= \sup_{\lambda \in \Omega} |\langle \sqrt{A^*XA} \hat{k}_{\lambda},
\hat{k}_{\lambda} \rangle| \\
& < \sup_{\lambda \in \Omega} |\langle {A^*XA} \hat{k}_{\lambda},
\hat{k}_{\lambda} \rangle|^{1 \over 2} \\
& =\sqrt{ber(A^*XA}).
\end{align*}
Here the second inequality comes from Lemma \ref{Macarthy-lemma}.
This proves the desired inequality.
\end{proof}
We will give some concrete operators for which Berezin number, numerical radius,
and Crawford number are calculated.
\begin{ex}
Let $\{e_1, e_2 \}$ be the standard orthonormal basis for $\mathbb{C}^2$.
Consider $\mathbb{C}^2$ as a rkHs on the set $\{1, 2\}$.
Then $e_1, e_2$ (identified a complex pair as a function) are the kernel functions
defined by
\[
e_i(j) = \begin{cases}
1 & ~\mbox{if}~i=j \\
0 & ~\mbox{if}~i\neq j
\end{cases}
\]
for $i, j \in \{1, 2\}$. Let
$U:\mathbb{C}^2 \rightarrow \mathbb{C}^2$ be a linear map defined by
\begin{align*}
U(e_1) & = e_2 \\
U(e_2) & = e_1.
\end{align*}
Then clearly $U$ is a self-adjoint and unitary operator on
the rkHs $\mathbb{C}^2$. From the definition we have
\[
ber(U)= \sup\{|\langle Ue_1, e_1 \rangle|, |\langle Ue_2, e_2 \rangle|\}= 0,
\]
\[
\|U \|_{ber} = \sup\{\| Ue_i \|: i =1, 2 \}= 1,
\]
and
\[
\omega(U) = \|U \|=1, ~~c(U)=0.
\]
\end{ex}
\begin{ex}\label{Example-shift}
Let $\{e_n : n\in \mathbb{Z}_{+} \}$ be a standard orthonormal basis
for $\ell^2(\mathbb{Z}_{+})$ and $\bm{w}=\{w_n\}_{n \in \mathbb{Z}_{+}}$
be a bounded sequence of complex numbers. Consider $\ell^2(\mathbb{Z}_{+})$
as a rkHs on the set $\mathbb{Z}_{+}$. With the identification a sequence
as a function, the kernel function $e_n$ for $n\in \mathbb{Z}_{+}$ defined
as
\[
e_n(m) = \begin{cases}
1 & ~\mbox{if}~n=m \\
0 & ~\mbox{if}~n \neq m
\end{cases}
\]
for $m, n \in \mathbb{Z}_{+}$.
Let
$S_{\bm{w}}:\ell^2(\mathbb{Z}_{+}) \rightarrow \ell^2(\mathbb{Z}_{+})$ be
a weighted right shift operator defined by
\begin{align*}
S_{\bm{w}}(x_0, x_1, x_2, \ldots ) & = (0, w_0x_0, w_1x_1, w_2x_2, \ldots ).
\end{align*}
From the definition one can easily compute
\[
ber(S_{\bm{w}})= \sup\{|\langle S_{\bm{w}}e_i, e_i \rangle|: i \in \mathbb{Z}_{+}\}
= \sup\{|\langle w_ie_{i+1}, e_i \rangle|: i \in \mathbb{Z}_{+}\} = 0,
\]
\[
\|S_{\bm{w}} \|_{ber} = \sup\{ \| S_{\bm{w}}e_i \|: i \in \mathbb{Z}_{+} \}
= \sup_{n}|w_n|= \|S_{\bm{w}} \|.
\]
In particular, if we take the sequence $\bm{w}=\{w_n\}_{n \in \mathbb{Z}_{+}}$
as $w_n =1$ for all $n$. Then the operator $S_{\bm{w}}$ denoted as $S$, is called
a unilateral shift on the rkHs $\ell^2(\mathbb{Z}_{+})$ over the set $\mathbb{Z}_{+} $.
Then we have
\[
ber(S)= \sup\{|\langle Se_i, e_i \rangle|: i \in \mathbb{Z}_{+}\}
= \sup\{|\langle e_{i+1}, e_i \rangle|: i \in \mathbb{Z}_{+}\} = 0,
\]
\[
\|S \|_{ber} = \sup\{\| Se_i \|: i \in \mathbb{Z}_{+} \}= 1 = \|S\|
\]
and by Theorem \ref{Shift-Numerical} \& Remark \ref{Isometry-Numerical},
we have
\[
\omega(S) =1, ~~c(S)=0.
\]
\end{ex}
\begin{ex}
Consider $\ell^2(\mathbb{Z}_{+})$ as rkHs with kernel function
$e_n$ for $n\in \mathbb{Z}_{+}$ as before. Let $\{ \lambda_n \}$ be a bounded
sequence of scalars such that $\lambda_n \rightarrow 0$ and
$D:\ell^2(\mathbb{Z}_{+}) \rightarrow \ell^2(\mathbb{Z}_{+})$ be
a diagonal operator defined by $De_n = \lambda_ne_n$ for
$n\in \mathbb{Z}_{+}$. It is well known that $D$ is a compact
normal operator. Now
\[
ber(D)= \sup\{|\langle De_i, e_i \rangle|: i \in \mathbb{Z}_{+}\}
= \sup\{|\langle \lambda_ie_{i}, e_i \rangle|: i \in \mathbb{Z}_{+}\}
= \sup_{i}{|\lambda_i|},
\]
\[
\|D \|_{ber} = \sup\{\| De_i \|: i \in \mathbb{Z}_{+} \}= \sup_{i}{|\lambda_i|} = \|D \|.
\]
Also
\[
\omega(D) = \|D \|.
\]
and
\begin{align*}
0\leq c(D)& = \inf \{|\langle Dx, x \rangle|: x \in \ell^2(\mathbb{Z}_{+}), \|x \| =1 \} \\
& \leq \inf\{|\langle De_i, e_i \rangle|: i \in \mathbb{Z}_{+}\}\\
&= \inf\{|\langle \lambda_ie_{i}, e_i \rangle|: i \in \mathbb{Z}_{+}\}\\
&= \inf_{i}{|\lambda_i|}= 0.
\end{align*}
Therefore $c(D)=0$.
\end{ex}
\begin{rem}
Let $T\in \mathcal{B}(\mathcal{H})$ be a compact normal operator on an infinite dimensional
Hilbert space $\mathcal{H}$. Then from the spectral theorem (cf.\cite{Conway-Book}),
we have a countable non zero distinct eigenvalues $\{\lambda_n \}$ such that
$\lambda_n \rightarrow 0$ and a sequence of orthonormal eigenvectors $\{f_n \}$ such that
\[
Tx = \sum_{n=1}^{\infty}{\lambda_n}\langle x, f_n\rangle f_n \quad (x \in \mathcal{H}).
\]
We have
\begin{align*}
c(T)& = \inf \{|\langle Tx, x \rangle|: x \in \mathcal{H}, \|x \| =1 \} \\
& \leq \inf\{|\langle Tf_n, f_n \rangle|: n \in \mathbb{N}\}\\
&= \inf\{|\langle \lambda_nf_n, f_n \rangle|: n \in \mathbb{N}\}\\
&= \inf_{n}{|\lambda_n|}= 0.
\end{align*}
Therefore the Crawford number of a compact normal operator $T$ is zero.
\end{rem}
\begin{rem}
It is a noteworthy to mention that the unilateral shift $S$ on
$\ell^2(\mathbb{Z}_{+})$ and the multiplication operator $M_z$ by the the
coordinate function $z$ on $H^2(\mathbb{D})$ are unitarily equivalent.
Therefore $\omega(S)=1=\omega(M_z)$. On the other hand let $\hat{k}(\cdot, w)$
for $w \in \mathbb{D} $ be the normalized Szeg\"{o} kernel function on $H^2(\mathbb{D})$.
Then
\begin{align*}
ber(M_z) & = \sup\{|\langle M_z \hat{k}(\cdot, w), \hat{k}(\cdot, w) \rangle|: w \in \mathbb{D} \}\\
& =\sup\{|{{w}}| : w \in \mathbb{D} \} = 1.
\end{align*}
But from the above Example \ref{Example-shift}, we have
\[
ber(S)=0.
\]
Therefore Berezin number does not satisfy the unitarily invariant property.
\end{rem}
\section{Hardy-Type Inequality for Berezin number}
In this section, we establish some Berezin number inequalities
of a certain class of operators with the help of classical Hardy
inequality and functional calculus.
\begin{thm}{\label{Main-thm}}
Let $p>1$ be any real number and $N$ be any fixed natural number and
let $f$ be a positive continuous function defined on $\Delta \subset (0, \infty)$.
Let $A$ be a positive operator on a Hilbert space $\mathcal{H}$ such that the
spectrum of $A$ lies in $\Delta$. Then for all $x\in \mathcal{H}$
\[
\Big(1+ N^{p-1}\displaystyle\sum_{n= N+1}^{\infty}\frac{1}{n^p}\Big)
\langle f(A)x, x \rangle^p < \Big(\frac{p}{p-1}\Big)^{p} \langle f(A)^px, x \rangle.
\]
\end{thm}
\begin{proof}
Let $N$ be a fixed natural number and let $\{a_n\}$ be a sequence
of non-negative real numbers such that $a_n=0$ for $n> N$. Then the
inequality (\ref{Hardy-Inequality}) yields
\begin{align}{\label{eqn-5}}
& a_1^p + (\frac{1}{2}\displaystyle\sum_{k=1}^{2}a_k )^p+\cdots+
(\frac{1}{N}\displaystyle\sum_{k=1}^{N}a_k )^p +(\displaystyle \sum_{k=1}^{N}a_k )^p
\{\displaystyle\sum_{n={N+1}}^{\infty}\frac{1}{n^p} \}
< (\frac{p}{p-1} )^{p} (\sum_{k=1}^{N}a_{k}^p ).
\end{align}
Since $A \in \mathcal{B}(\mathcal{H})$ is a positive operator and $f$ is a continuous
function on $\Delta \subset (0, \infty)$ with the spectrum of $A$ lies in
$\Delta$, we can use the continuous functional calculus. Therefore $f(A)
\in \mathcal{B}(\mathcal{H})$ makes sense and for any $x \in \mathcal{H}$, $\langle f(A)x, x
\rangle \geq 0$. Now replacing $a_k$ by $\langle f(A)x, x \rangle$ for
$k=1, 2, \ldots, N$ in the above inequality (\ref{eqn-5}), we obtain
\begin{align}{\label{eqn6}}
N \langle f(A)x, x \rangle^p + {N}^p\langle f(A)x, x \rangle^p
\Big\{\displaystyle\sum_{n= N+1}^{\infty}\frac{1}{n^p}\Big\} &
< N\Big(\frac{p}{p-1}\Big)^{p} \langle f(A)x, x \rangle^p.
\end{align}
Applying Lemma \ref{Macarthy-lemma} in the right hand side of
the above inequality (\ref{eqn6}), we have
\begin{align*}
\langle f(A)x, x \rangle^p\Big(1+ N^{p-1}\displaystyle\sum_{n=N+1}^{\infty}
\frac{1}{n^p}\Big) & < \Big(\frac{p}{p-1}\Big)^{p} \langle f(A)^p x, x \rangle.
\end{align*}
This completes the proof.
\end{proof}
In particular, when $p=2$ and $N=2$, that is a sequence $\{a_n\}$
of non-negative real numbers such that $a_n=0$ for $n> 2$ then
from the above theorem we have the following result.
\begin{cor}
Let $f$ be a positive continuous function defined on $\Delta \subset (0, \infty)$
and $A$ be a positive operator on $\mathcal{H}$ such that the spectrum of $A$ lies in
$\Delta$. Then for all $x\in \mathcal{H}$
\[
\langle f(A)x, x \rangle^2 < \frac{24}{2\pi^2 -9}\langle f(A)^2x, x \rangle.
\]
\end{cor}
\begin{rem}
Now if we choose $N=3$, that is first three terms of the sequence $\{a_n\}$
are non-zero, and the rests are zero, then applying the similar techniques
used in Theorem \ref{Main-thm}, the following power inequality is obtained:
\begin{center}
$\Big(2+3^p(\displaystyle\sum_{n=3}^{\infty}1/n^2)\Big)\langle f(A)x, x
\rangle^p< 3(\frac{p}{p-1})^p ~\langle f(A)^px, x \rangle$.
\end{center}
In particular, for $p=2$, we deduce the following inequality
\begin{center}
$\langle f(A)x, x \rangle^2<\frac{48}{6\pi^2-37}~\langle f(A)^2x, x
\rangle\approx 2.1604 ~\langle f(A)^2x, x \rangle$.
\end{center}
\end{rem}
\begin{rem}
For the sake of simplicity, we shall discuss operator inequalities
for Berezin numbers by taking \textit{Hardy's inequality} for a
scalar sequence $\{a_n \}$ with two non-zero positive numbers and
rests are zero, i.e., $a_n =0$ for $n>2$.
\end{rem}
We now focus operators on reproducing kernel Hilbert spaces
$H(\Omega)$ and we obtain the following inequalities for Berezin
number with the help of Berezin transform.
\begin{thm}\label{Berezin-thm}
Let $p>1$ be any real number and let $f$ be a positive continuous
function defined on $\Delta \subset (0, \infty)$. Let $A$ be a
positive operator on a reproducing kernel Hilbert space $H(\Omega)$
such that the spectrum of $A$ lies in $\Delta$. Then the below inequality
\[
\Big(1+ 2^{p-1}\displaystyle
\sum_{n=3}^{\infty}\frac{1}{n^p}\Big)ber^p(f(A))< \Big(\frac{p}{p-1}\Big)
^{p}~ber(f(A)^p) ~holds~ true.
\]
In particular, we have the following inequality for $p=2$
\[
ber^2(f(A))< \frac{24}{2\pi^2 -9}~ber(f(A)^2).
\]
\end{thm}
\begin{proof}
Suppose $p>1$ is any real number and $\{a_n\}$ is a sequence of non-negative
real numbers such that $a_n=0$ for $n> 2$. Then from the above Theorem
\ref{Main-thm} for any $x \in H(\Omega)$, we have
\begin{align}{\label{eqn5}}
\Big(1+ 2^{p-1}\displaystyle\sum_{n= 3}^{\infty}\frac{1}{n^p}\Big)\langle
f(A)x, x \rangle^p< \Big(\frac{p}{p-1}\Big)^{p} \langle f(A)^px, x \rangle.
\end{align}
Take $x=\hat{k}_\lambda$ for $\lambda \in \Omega$, in the above inequality,
we get
\[
\Big(1+ 2^{p-1}\displaystyle\sum_{n= 3}^{\infty}\frac{1}{n^p}\Big)\langle
f(A)\hat{k}_\lambda, \hat{k}_\lambda \rangle^p< \Big(\frac{p}{p-1}\Big)^{p}
\langle f(A)^p\hat{k}_\lambda, \hat{k}_\lambda \rangle.
\]
Hence, we have
\[
\Big(1+ 2^{p-1}\displaystyle\sum_{n= 3}^{\infty}\frac{1}{n^p}\Big)\langle f(A)
\hat{k}_\lambda, \hat{k}_\lambda \rangle^p< \Big(\frac{p}{p-1}\Big)^{p}
\sup_{\lambda \in \Omega } |\langle f(A)^p\hat{k}_\lambda, \hat{k}_\lambda \rangle|.
\]
Therefore by using the definition of Berezin number, we obtain the desired inequality.
Now if we put $p=2$, then the following inequality for Berezin number is obtained
from the above
\begin{center}
$ber^2(f(A))< \frac{24}{2\pi^2-9} ~ber(f(A)^2)\approx 2.2349 ~ber(f(A)^2)$.
\end{center}
\end{proof}
\begin{rem}{\label{remyama}}
Using the Hilbert-Hardy inequality Yamanc{\i} and G\"{u}rdal \cite{YAMA} obtained
a strict inequality for Berezin number as follows:
\begin{center}
$ber^2(f(A))<\frac{36\pi^2}{53}~ber(f(A)^2)\approx 6.7039 ~ber(f(A)^2)$.
\end{center}
\end{rem}
\begin{rem}
Some reverse inequalities for Berezin numbers are obtained by
Garayev et al.\cite{GARAGUR}. Indeed,
they obtain the following inequality (see \cite{GARAGUR}, Proposition 1):
\begin{align*}
ber(f(A))^2 \leq \frac{3(8\pi -3)}{8} ber(f(A)^2).
\end{align*}
Further in another result (in fact Proposition 2 of \cite{GARAGUR}),
the authors presented the better approximate of the above result as follows:
\begin{align*}
ber(A)^2 \leq \frac{24\pi}{17} ber(A^2),
\end{align*}
where $A \in \mathcal{B}(H(\Omega))$ is a self adjoint operator with spectrum
contained in $ \Delta \subset(0, \infty)$.
\end{rem}
\begin{rem}
In another work of Garayev et al. \cite{GARASAL}, the following power
inequality of Berezin number for a positive operator $A$ and a continuous
function $f$ is obtained by using Hilbert-Hardy inequality which is as follows:
\begin{align*}
ber(f(A))^p \leq \alpha ber(f(A)^p),
\end{align*}where $\alpha\equiv \alpha(p, q)=2\Big[\big(\frac{3}{2}\big)^p+1\Big]
^{-1}(pq)^p>1$ and $\frac{1}{p}+\frac{1}{q}=1$ with $p, q>1$. Hence for
$p=2$, we get
\begin{align*}
ber(f(A))^2 \leq \frac{128}{13}ber(f(A)^2).
\end{align*}
\end{rem}
\begin{rem}
Let $A\in \mathcal{B}(\mathcal{H}(\Omega))$ be a self-adjoint operator and the
spectrum of $A$ contained in $\Delta\subset(0, \infty)$. Then for
any positive continuous function $f$ defined on $\Delta$, Garayev
et al. \cite{GARASAL} obtained an inequality given as follows:
\begin{align*}
ber(f(A))^2 \leq 4(pq-1)ber(f(A)^2),
\end{align*}
where $\frac{1}{p}+\frac{1}{q}=1$ with $p, q>1$.
\end{rem}
Before we proceed further we establish an inequality for Berezin number
for operators by using the recently improved version of the \emph{discrete
Hardy's inequality} (\ref{Hardy-Inequality-Modified}). In fact the
statement of our result reads as follows:
\begin{cor}{\label{prop1}}
Let $f$ be a positive continuous function defined on $\Delta \subset
(0, \infty)$. Let $A$ be a positive operator on a reproducing kernel
Hilbert space $H(\Omega)$ such that the spectrum of $A$ lies in $\Delta$.
Then the inequality
\[
ber^2(f(A)) < 1.593852~ber(f(A)^2)~ \mbox{holds}.
\]
\end{cor}
\begin{proof}
Using the improved version of the \emph{discrete Hardy inequality}
(\ref{Hardy-Inequality-Modified}) in the proof of Theorem \ref{Berezin-thm},
we obtain the following inequality
\[
ber^2(f(A))< \displaystyle \frac{2}{w_1+ 4 \sum_{n=1}^{\infty} w_{n+1}} ber(f(A)^2),
\]
where for $n\in \mathbb{N}$, $w_n = 2-\sqrt{1+\frac{1}{n}}-\sqrt{1-\frac{1}{n}}$
and $\displaystyle \sum_{n=1}^{\infty}w_n=0.753045 ~(approx.)$.
This proves the desired inequality.
\end{proof}
Let $H(\Omega)$ be a reproducing kernel Hilbert space and
$A \in \mathcal{B}(H(\Omega))$. Let $x \in H(\Omega)$ with $\|x \|=1$.
Using the Hardy's inequality (\ref{Hardy-Inequality}) and replacing
first two nonzero terms by $|\langle Ax, x \rangle|$ and rest of the
terms are zero, we obtain the following inequality:
\begin{align}{\label{eqn9}}
|\langle Ax, x \rangle|^p {(1+ 2^{p-1}\displaystyle\sum_{n=3}^{\infty}\frac{1}{n^p})}
<(\frac{p}{p-1} )^{p} |\langle Ax, x \rangle|^p.
\end{align}
Applying the mixed Cauchy-Schwartz inequality Lemma \ref{Convex-lemma}
on the right hand side term, we get
\begin{align*}
|\langle Ax, x \rangle|^p
& \leq \Big( \langle |A|^{2\alpha}x, x \rangle^{\frac{1}{2}}
\langle |A^*|^{2(1-\alpha)}x, x \rangle^{\frac{1}{2}}\Big)^p\\ \nonumber
& \leq \Big(\frac{\langle |A|^{2\alpha} x, x \rangle +
\langle |A^*|^{2(1-\alpha)}x, x\rangle}{2}\Big)^p \\ \nonumber
& \leq \frac{1}{2}\Big(\langle |A|^{2\alpha}x, x \rangle^p +
\langle |A^*|^{2(1-\alpha)}x, x \rangle^p\Big) \\ \nonumber
& \leq \frac{1}{2}(\langle |A|^{2p\alpha}x, x \rangle +
\langle |A^*|^{2p(1-\alpha)}x, x \rangle ) \\ \nonumber
& = \frac{1}{2}\langle (|A|^{2p\alpha}+|A^*|^{2p(1-\alpha)}) x, x \rangle,
\end{align*}
where $\alpha \in [0, 1]$. Now take $x = \hat{k}_{\lambda}$, a normalized
kernel function for $\lambda \in \Omega$, we have from the inequality
(\ref{eqn9})
\[
|\langle A\hat{k}_{\lambda}, \hat{k}_{\lambda} \rangle|^p
{(1+ 2^{p-1}\displaystyle\sum_{n=3}^{\infty}\frac{1}{n^p})} <
\frac{1}{2}(\frac{p}{p-1} )^{p} \langle (|A|^{2p\alpha}+|A^*|^{2p(1-\alpha)})
\hat{k}_{\lambda}, \hat{k}_{\lambda} \rangle
\]
From the definition of Berezin number inequality, we obtain
\[
ber^p(A) {(2+ 2^{p}\displaystyle\sum_{n=3}^{\infty}\frac{1}{n^p})}
< (\frac{p}{p-1} )^{p} \left(ber(|A|^{2p\alpha})+ber(|A^*|^{2p(1-\alpha)})\right).
\]
To summarize the above, we have the following Hardy-type Berezin number inequality:
\begin{thm}
Let $p>1$ be any real number and $A$ be any bounded operator
on a reproducing kernel Hilbert space $H(\Omega)$. Then the following
inequality
\[
ber^p(A) {(2+ 2^{p}\displaystyle\sum_{n=3}^{\infty}\frac{1}{n^p})}
<(\frac{p}{p-1} )^{p} \left(ber(|A|^{2p\alpha})+ber(|A^*|^{2p(1-\alpha)})\right)
~\mbox{holds}
\]
for $\alpha \in [0, 1]$.
\end{thm}
\begin{prop}
Let $p>1$ be any real number. Suppose that
$f: \mathbb{R}\rightarrow (0, \infty)$ is a continuous
and convex function and $A$ is a self adjoint operator
on a reproducing kernel Hilbert space $H(\Omega)$. Then
\begin{align}{\label{eqn11}}
f^p(ber A)\Big(1+ 2^{p-1}\displaystyle\sum_{n=3}^{\infty}\frac{1}{n^p}\Big)
& < \Big(\frac{p}{p-1}\Big)^{p}ber(f^p(A)).
\end{align}In particular,
\begin{align}{\label{eqn12}}
f^2(ber A) < \frac{24}{2\pi^2-9}ber(f^2(A)).
\end{align}
\end{prop}
\begin{proof}
Suppose that $p>1$ is any real number and $\{a_n\}$ is a sequence
of non-negative real numbers such that $a_n=0$ for $n> 2$.
Then from the Hardy's inequality and replacing $a_1, a_2$ by
$f(t)$ for $t \in \mathbb{R}$, we get
\begin{align*}
f^p(t)\Big(1+ 2^{p-1}\displaystyle\sum_{n=3}^{\infty}\frac{1}{n^p}\Big)
& < \Big(\frac{p}{p-1}\Big)^{p}f^p(t).
\end{align*}
Since $A$ is a self adjoint operator on $H(\Omega)$,
$\langle A\hat{k}_\lambda, \hat{k}_\lambda \rangle \in \mathbb{R}$, where
$\hat{k}_\lambda$ for $\lambda \in \Omega$ is the normalized kernel vector.
Now choose $t=\langle A\hat{k}_\lambda, \hat{k}_\lambda \rangle=\widetilde{A}(\lambda)$
in the above inequality and using the convexity of $f$, we have
\[
f^p(\widetilde{A}(\lambda))\leq \widetilde{f^p(A)}(\lambda)
\]
which yields
\begin{align*}
f^p(\widetilde{A}(\lambda))\Big(1+ 2^{p-1}\displaystyle\sum_{n=3}^{\infty}\frac{1}{n^p}\Big)
& < \Big(\frac{p}{p-1}\Big)^{p}\widetilde{f^p(A)}(\lambda).
\end{align*}
This proves the desired inequality.
In particular for $p=2$, we obtain
\begin{align}
f^2(ber A) < \frac{24}{2\pi^2-9}ber(f^2(A)).\nonumber
\end{align}
\end{proof}
\begin{rem}
In \cite{YAMAGUR} (Corollary 2.2) and \cite{YAMAGARA} (Theorem 2.1 (ii)),
the authors obtained following inequalities for convex function:
\begin{align}
f^2(ber A) < \Big(\frac{12}{7}\pi-\frac{3}{14}\Big)ber(f^2(A)).\nonumber
\end{align} and
\begin{align}
f^2(ber A) < \frac{15}{4}ber(f^2(A)),\nonumber
\end{align}respectively.
\end{rem}
\begin{rem}
Using the improved discrete Hardy inequality (\ref{imph}) and
Proposition \ref{prop1}, we can obtain improved Hardy-type Berezin number
inequalities (\ref{eqn11}) and (\ref{eqn12}).
\end{rem}
\iffalse
\noindent\textit{Acknowledgement:}
The second author's research work is supported by MATRICS
(SERB), Govt of India (File No: MTR/2021/000695).
\fi
\vspace{1cm}
|
\section{Introduction}
\IEEEPARstart{M}{ulti-agent} reinforcement learning (MARL) employs reinforcement learning to solve the multi-agent system problems. There are a lot of previous works address the cooperative scenarios, such as controlling robot swarms with limited sensing capabilities \cite{Cao2013a, Jiang2019}, mastering multi-agent coordination \cite{Tang2018b, zhu2019lmi, zhu2018control} and micro-management task in real-time strategy (RTS) games \cite{Shao2019, chai2021unmas, Tang2019}, and so on. However, due to the intrinsic problem of multi-agent learning like huge state and action space, credit assignment, and communication efficiency, the MARL algorithms can hardly perform cooperation in large-scale multi-agent system.
To achieve cooperation in multi-agent system, several methods adopt the \emph{centralized training with decentralized execution} (CTDE) framework \cite{Rashid2018}, which is a comprise between independent learning and centralized learning. It provides local autonomy to agents by decentralized execution and avoids the problem of the non-stationary environment by centralized training. However, these methods perform poorly in large-scale multi-agent tasks. Another thread of work is \emph{communication-based method}, which exchanges local information between agents according to a communication protocol to help decision-making. Some works provide the agents with discrete communication channels \cite{foerster2016, kim2019learning}, while the others provide continuous channels \cite{sukhbaatar2016learning}. However, most communication-based methods need to learn the protocol with the training process of MARL. These online-learned protocols strongly depend on the training tasks and lack the multi-task scalability.
Large-scale MARL faces several major challenges, one of which is the problem of huge amount of information exchange between agents, which leads to the \emph{information redundancy} \cite{ding2020advances}. Some works address this problem by providing a specific graph structure for communication, rather than each pair of agents communicating with each other. Some use a learned graph structure \cite{jiang2018learning, jiang2019graph, niu2021multi}, while others use a specific rule-based graph like neighboring communication \cite{luo2019multi, sheng2020learning}. Event-triggered communication is also proposed to communicate effectively with limited bandwidth \cite{dimarogonas2011distributed, zhu2017event, hu2021event}. Besides, some works do not provide direct communication between agents, but let agents communicate with virtual agents through mean-field approximation \cite{luo2020multiagent, yang2018mean}. Although these methods have made some progress, there is still room for improvement due to the training instability of their online-learned protocols.
In cooperative multi-agent tasks, some works provide a team reward for the agents \cite{Sunehag2018, Rashid2018}, which introduce the problem of credit assignment. In credit assignment, the system should evaluate the contribution of each agent, whose difficulty increases significantly with the number of agents. Therefore, other works choose to provide agent-specific rewards for each agent to mitigate this problem directly \cite{zhang2018fully, lin2018efficient, liu2020multi}. However, such methods lack guidance to the team strategy and need to provide theoretical analysis to ensure cooperation.
\subsection{Contribution}
In this article, we focus on the large-scale multi-agent reinforcement learning (MARL) methods, which provides communication between agents. The main contribution is twofold:
1) we propose the \emph{neighboring variational information flow} (NVIF) to improve the communication efficiency. It compresses the information shared by agents into a \emph{latent state} as an auxiliary feature to enrich agent observation. Besides, we implement it by a novel network architecture, so that the agents can make use of the historical information shared by others.
2) we combine NVIF with Proximal Policy Optimization (NVIF-PPO) and Deep Q Network (NVIF-DQN). Both of them provide agent-specific rewards instead of team reward to mitigate the problem of credit assignment. We also give a theoretical analysis to illustrate that NVIF-PPO can promote cooperation.
Finally, we conduct experiments on two large-scale multi-agent tasks with different map sizes, and compare our methods with other related SOTA methods. The results show that NVIF-PPO can perform much better than the other experimental methods in all tasks, especially in tasks with a larger number of agents. In the large-scale maps, only NVIF-PPO can complete the task within a given timesteps. In addition, we conduct extra experiments to show that the learned policies can be better scaled to other unseen tasks.
\subsection{Related Work}
Communication-based MARL methods aim to provide information exchange between agents so that the agents can access more information than their local observations. Some methods directly provide communication between all pair of agents like DIAL \cite{foerster2016} and CommNet \cite{sukhbaatar2016learning}. However, these methods may face extreme \emph{information redundancy}, that is, the agents can hardly determine which information is more important. Therefore, TarMAC \cite{abhishek2019} and ATOC \cite{jiang2018learning} are proposed to determine the message sender or receiver. SchedNet \cite{kim2019learning} and I3CNet \cite{singh2018learning} reduces the communication traffic by training the agents when to communicate. Event-triggered communication is also employed to improve the communication efficiency like ETCNet \cite{hu2021event} and event-based ADP \cite{zhang2016event}. There are also a lot of works based on mean-field approximation to simplify the information exchange between agents like MFQ \cite{yang2018mean} and ACM \cite{zhou2021large}.
Besides, a lot of works provide a specific graph structure for communication to alleviate this problem. Some works use the graph structure learned with the process of MARL. DGN \cite{jiang2019graph}, MAGIC \cite{niu2021multi} and MAGnet \cite{malysheva2018deep} generate an online-learned graph dynamically for communication. However, the online-learned graph may destabilize the training of MARL. Therefore, I2C \cite{ding2020advances} pre-trains a prior network to help agents determine whom to communicate with. Other works adopt rule-based graph for communication. LSC \cite{sheng2020learning} designs a hierarchical mechanism to provide a more effective graph. HAMMER \cite{gupta2021hammer} and CCOMA \cite{su2020counterfactual} adopt a centralized topology to allow a powerful central agent to communicate with the others. GraphComm \cite{yuan2021graphcomm} adopts neighboring communication for communication, which is a more reasonable graph.
Recently, actor-critic methods have achieved satisfactory performance in MARL, especially those based on proximal policy optimization (PPO) \cite{schulman2017proximal}, which is widely used in single agent RL. IPPO \cite{de2020independent} uses PPO to train agents fully independently with team reward. In order to further explore the potential of PPO in multi-agent scenarios, MAPPO \cite{yu2021surprising} summarizes some technologies to improve the performance of IPPO. CoPPO \cite{wu2021coordinated} is proposed to promote cooperation of agents based on MAPPO, and provide some theoretical analysis. However, most of them require team rewards to guide agents, which brings the problem of credit assignment, especially in large-scale multi-agent system. Some methods provide agent-specific rewards for each agent rather than a team reward to reduce the difficulty of credit assignment. Zhang \emph{et al.} \cite{zhang2018fully} propose two fully decentralized actor-critic methods with agent-specific rewards, and provide convergence results under linear approximation. cA2C \cite{lin2018efficient} uses a centralized value network and decentralized policy to tackle the large-scale fleet management. G2ANet \cite{liu2020multi} employs graph neural networks to learn the adaptive and dynamic attention value without team rewards. However, there is still a lack of theoretical analysis to ensure that the algorithms can promote cooperation.
\subsection{Organization}
This article is organized as follows. Section II introduces the problem formulation of MARL with communication. Section III proposes NVIF with its implementation and training algorithm, combines PPO and NVIF with agent-specific rewards, and gives the theoretical analysis of cooperation. Section IV shows the experiments and results, and analyzes the learned strategies. Finally, Section V gives the conclusion.
\section{Problem Formulation}
We consider a fully cooperative multi-agent task with partially observable environment, in which the agents communicate with each other to exchange information. This task can be defined as a tuple $\mathscr{U} = \{\mathbb{S}, \mathbb{A}, \mathbb{T}, \mathbb{O}, \mathbb{R}, n, \gamma\}$, where $\mathbb{S}$ is the global state space, $\mathbb{A}$ is the joint action space, $\mathbb{T}$ is the transition function, $\mathbb{O}$ is the joint action space, $\mathbb{R}$ is the reward function, $n$ is the number of agents, and $\gamma$ denotes the discount factor of \emph{discounted cumulative reward}: $G_{i, t} = \sum_{j=0}^{\infty}\gamma^{j}r_{i, t+j}$.
In the interaction process between the multi-agent system and environment, the system takes the joint action $\textbf{a}_t = \{a_{1, t},...,a_{n, t}\} \in \mathbb{A}$ and gets the immediate reward $\boldsymbol{r}_t = \{r_{1, t},...,r_{n, t}\}$ from environment according to the reward function $R: \mathbb{S} \times \mathbb{U} \rightarrow \mathbb{R}$. If the environment provides team reward, there is $r_{1, t}=...=r_{n ,t}$, otherwise the rewards of each agent are independent. The introduction of team reward will lead to the problem of credit assignment, that is, the contribution of each agent needs to be evaluated, which will reduce the training speed of the method. Finally, by executing the joint action, the next global state $s_{t+1}$ is produced according to $\mathbb{T}$, which specifies Pr$(s_{t+1}|s_t, \textbf{a}_t)$.
In the large-scale multi-agent system, the gap between the local observation of agents and the global state of the system is huge, which limits the cooperation among agents. Therefore, the system requires efficient communication between agents to promote cooperation. The affect of communication is to help the agent know more about the global state $s_t \in \mathbb{S}$ of the whole system at timestep $t$, so we define the \emph{latent state} obtained by each agent $i, (i=1...n)$ through communication as $\hat{s}_{i, t}$. It can be used as an auxiliary feature of agent decision-making. Therefore, each agent can maintain a policy $\pi(a_{i, t}|o_{i, t}, \hat{s}_{i, t})$ to better make decisions, where $a_{i, t}$ is the action, and $o_{i, t}$ is the local observation.
We also provide the definition of the state value function and advantage estimator. The true state value function of each agent given by the global state can be defined as the expected value of the future accumulative rewards under joint policy $\boldsymbol{\pi}$:
\begin{equation}
V_i^{\boldsymbol{\pi}}(s_t) = \mathbb{E}_{\boldsymbol{\pi}}\big[r_{i, t+1} + \gamma r_{i, t+2} + ... | s_t \big]
\end{equation}
where $V_i^{\boldsymbol{\pi}}(s_t)$ is the state value of agent $i$ under the global state $s_t$. Besides, we define the agent-specific advantage estimator by the Generalized Advantage Estimator (GAE) as the definition in PPO \cite{schulman2017proximal}:
\begin{equation}
\begin{aligned}
\label{eq:agent-adv}
&A_i^{\boldsymbol{\pi}} = \delta_{i, t} + (\gamma \lambda) \delta_{i, t+1} + ... + (\gamma \lambda)^{T-t-1}\delta_{i, T-1}\\
&where\ \ \delta_{i, t} = r_{i, t + 1} + \gamma V_i^{\boldsymbol{\pi}}(s_{t+1}) - V_i^{\boldsymbol{\pi}}(s_t)
\end{aligned}
\end{equation}
where $s_{t+1}$ is the next state by executing $\textbf{a}_t\sim \boldsymbol{\pi}(s_t)$, $\delta_{i, t}$ is the temporal difference, $\lambda$ is the hyper-parameter of GAE, and $T$ is the timestep at the end of an episode. They are abbreviated as $V_{i, t}$ and $A_{i, t}$. Since the ground-truth global state is hard to be obtained, the $s_t$ in the above two formulas is replaced by $[o_{i, t}, \hat{s}_{i, t}]$ in practice.
\section{Method}
In this section, we focus on the cooperation of large-scale multi-agent system, and propose a new method called Neighboring Variational Information Flow (NVIF). It adopts \emph{neighboring communication} to alleviate information redundancy and pre-trains a model to compress the information collection recurrently into a \emph{latent state}. This latent state can be provided to agents as an auxiliary feature to get more information about the whole system. This communication mechanism can stabilize the training of MARL and promote cooperation, which is illustrated by the given theoretical analysis.
\subsection{Neighboring Variational Information Flow}
We adopt the neighboring communication, which provides communication only between the agent and its neighbors, to alleviate the problem of information redundancy. Besides, in a large-scale multi-agent system, the huge gap between local observation and global state makes it difficult to achieve cooperation. Therefore, we use the data compression ability of VAE to improve the communication efficiency.
Neighboring communication is a trade-off between fully-communication and non-communication. As shown in Fig. \ref{fig:if}, the information shared by the red agent needs to take several timesteps to be accessed by the blue agent. For each agent, it can obtain the information exchanged by its neighbors, by the second-order neighbors at the last timestep, and so on. Therefore, the collection of information shared to agent $i$ at timestep $t$ can be expressed as follows:
\begin{equation}
\label{eq:info}
h_{i, t + 1} = \mathop{\bigcup} \limits_{k=t:0}\left\{\{\mathcal{I}_{j, k}\}_{j\in\beta_k}, \beta_k=\mathop{\bigcup} \limits_{j\in\beta_{k+1}}\mathcal{N}_k(j)\cup j\right\}
\end{equation}
where $h_{i, t+1}$ is the collection mentioned before, $\mathcal{I}_{i, k}$ is the information shared by agent $i$ at timestep $k$, and $\mathcal{N}_k(i)$ are its neighbors. $\beta_k$ is the collection of agents whose information shared at timestep $k$ can be accessed by agent $i$ now, where $\beta_{t+1}$ is initialized as $\{i\}$. Take $k = t$ as an example, $\beta_t = \{\mathcal{N}_t(i) \cup i\}$ is the first-order neighbors, which contain the neighbors of agent $i$ at timestep $t$ and the agent itself. Furthermore, the second-order neighbors $\beta_{t-1}$ include the neighbors of all agents in $\beta_t$ at last timestep, and so on. We name this process the \emph{neighboring information flow} to denote the flow of information in a multi-agent system.
\begin{figure}[htbp]
\centering
\includegraphics[scale=0.35]{figs/information-flow}
\caption{Information flow for large-scale multi-agent system. 1) The left side shows the process of exchanging information between red agent and blue agent by neighboring communication. The shared information takes several timesteps to be received by each other. 2) The right side shows the local information flow, in which agents exchange their information to their neighbors. }
\label{fig:if}
\end{figure}
Furthermore, the notation of information collection $h_{i, t+1}$ can be simplified in a recurrent way as follows:
\begin{equation}
\begin{aligned}
\label{eq:info-decom}
h_{i, t + 1} &= \mathop{\bigcup} \limits_{k=t-1:0}\left\{\{\mathcal{I}_{j, k}\}_{j\in\beta_k}, \beta_k=\mathop{\bigcup} \limits_{j\in\beta_{k+1}}\mathcal{N}_k(j)\cup j\right\} \\
& \qquad \qquad \ \bigcup \ \{\mathcal{I}_{j, k}\}_{j\in\mathcal{N}_t(i)\cup i}\ , \ \beta_t = \mathcal{N}_t(i)\cup i \\
&= \{h_{j, t}\}_{j\in \mathcal{N}_t(i)\cup i} \ \bigcup \ \{\mathcal{I}_{j, t}\}_{j\in\mathcal{N}_t(i)\cup i}
\end{aligned}
\end{equation}
where $h_{i, t + 1}$ is decomposed into two parts:
\begin{enumerate}
\item Recurrent part: it contains the last information collection of the neighbors of agent $i$ and itself, and the initial value is $h_{i, 0} = \varnothing$. We define it as $\psi_{i, t} = \{h_{j, t}\}_{j\in \mathcal{N}_t(i)\cup i}$.
\item Flow part: it aggregates the information currently shared by the neighbors of agent $i$ and itself through information flow. We define it as $\varphi_{i, t} = \{\mathcal{I}_{j, t}\}_{j\in\mathcal{N}_t(i)\cup i}$.
\end{enumerate}
However, the information contained in $h_{i, t+1}$ may still not be all that the agent needs. We propose a new method called Neighboring Variational Information Flow (NVIF), which employs the VAE module to improve communication efficiency. Its encoder part compresses the information in $h_{i, t+1}$ into a latent state as the auxiliary feature for agent decision-making. In detail, the encoder part can be represented as follows:
\begin{equation}
\hat{s}_{i, t} \sim q(s| \psi_{i, t}, \varphi_{i, t})
\end{equation}
where $q(s| \psi_{i, t}, \varphi_{i, t})$ is the inference distribution whose input is the information collection, $\hat{s}_{i, t}$ indicates the latent state output from the encoder part.
In the decoder part, we measure the compressed latent state by reconstructing the joint observation of agents, rather than learning the communication protocols with the training of MARL. Therefore, the communication protocol trained by NVIF can be scaled to several tasks. The loss function of NVIF is modified from the loss function of VAE. It can be written as follows:
\begin{equation}
\label{eq:loss-var}
\begin{aligned}
\mathcal{L}_{v} &= \frac{1}{n}\sum_{i=1}^n \Big[\mathbb{E}_{\hat{s}_{i, t}\sim q(s|\psi_{i, t}, \varphi_{i, t})}bce\_loss[o_{i, t}, \hat{o}_{i, t}] + \\
&\qquad \qquad \qquad KL[q(s|\psi_{i, t}, \varphi_{i, t}) | p(s)]\Big]
\end{aligned}
\end{equation}
where $\hat{o}_{i, t}$ is the reconstructed observation output by the decoder $\mathcal{D}(\hat{s}_{i, t}, x_{i, t})$, whose inputs are the latent state $\hat{s}_{i, t}$ and the unique information $x_{i, t}$ such as position of agent $i$. It can be a binary cross entropy loss in practice. $p(s)$ is the prior distribution of latent state, which is set as the standard normal distribution $\boldsymbol{N}(\boldsymbol{0}, \boldsymbol{I})$. The first part of this loss function is the reconstruction loss of the joint observation, and the second part is the KL divergence between inference distribution and the prior distribution.
However, training directly with Eq. (\ref{eq:loss-var}) may cause the latent state to degenerate into the current local observation. Therefore, we define an additional consistency loss on the basis of Eq. (\ref{eq:loss-var}):
\begin{equation}
\label{eq:loss-con}
\mathcal{L}_{c} = \frac{1}{n}\sum_{i=1}^n \left(\hat{s}_{i, t} - \frac{1}{n}\sum_{j=1}^n\hat{s}_{j, t}\right)^2.
\end{equation}
This loss function promotes agents to maintain the same latent state, which means that each agent can reconstruct its own local observation according to a same latent state. Therefore, it can be seen as a representation of the global state of the multi-agent system, which contains the information required by all agents. Then, the total loss can be written as:
\begin{equation}
\label{eq:loss-total}
\mathcal{L} = \mathcal{L}_{v} + \alpha \mathcal{L}_{c}
\end{equation}
where $\alpha$ is the coefficient of consistency loss. By minimizing this loss function, each agent can get the latent state with information flow.
\subsection{Training Algorithm of NVIF}
In this section, we propose a novel network architecture to implement NVIF and its training algorithm. As described in Eq. (\ref{eq:info-decom}), the information collection can be decomposed in a recurrent way. In the encoder part, in order to realize information exchange in the neighboring communication graph structure, we employ a Graph Convolutional Network (GCN) to simulate this process. As shown in the Fig. \ref{fig:flownet}, we refer the multi-layer GCN networks as \emph{FlowNet}.
\begin{figure}[htbp]
\centering
\includegraphics[scale=0.3]{figs/flownet}
\caption{Network architecture of FlowNet, which contains multiple GCN layers. Arrows in different colors represent the information exchanged in different layers of GCN, and circles in different colors represent the features extracted by the agent through one layer of GCN. }
\label{fig:flownet}
\end{figure}
The GCN layer in FlowNet aims to encode both graph structure and node features of a graph through the adjacency matrix $G_t$ and original node features $H^{0}_t$. The multi-layer GCN propagation rule is:
\begin{equation}
H^{l+1}_t = ReLU\left(\tilde{B}^{-\frac{1}{2}}_t \tilde{G}_t\tilde{B}^{-\frac{1}{2}}_t H^{l}_t W^{l}\right)
\end{equation}
where $H^{l}_t$ are the features extracted by the $l$-th layer according to the local information flow of agent $i$, and $H^{0}_t = \{o_{i, t}\}_{i=1}^n$ or $\{h_{i, t}\}_{i=1}^n$. If there exists $L$ layers of GCN, then $H_t^{L+1}=\{\varphi_{i, t}\}_{i=1}^n$ or $\{\psi_{i, t}\}_{i=1}^n$. $\tilde{G}_t=G_t+I$ is the local adjacency matrix $G_t$ with self-loop $I$. $\tilde{B}_t = diag(\sum_j \tilde{G}_t[:, j])$ is a diagonal degree matrix whose elements are the sum of each row of $\tilde{A}_t$. $W^l$ is the trainable parameter.
The multiple layers of GCN can be seen as a case of \emph{multi-round communication}, whose rounds number is equal to the layers number. The increase of GCN layers can improve the number of information exchange in a timestep, but it will increase the training difficulty. As shown in Fig. \ref{fig:NVIF}, $FlowNet_o$ and $FlowNet_h$ take observations and hidden states as input respectively and output the corresponding extracted features:
\begin{equation}
\begin{aligned}
\{\varphi_{i, t}\}_{i=1}^n &= FlowNet_o(\{o_{i, t}\}_{i=1}^n) \\
\{\psi_{i, t}\}_{i=1}^n &= FlowNet_h(\{h_{i, t}\}_{i=1}^n)
\end{aligned}
\end{equation}
where $FlowNet_o$ and $FlowNet_h$ process their inputs independently.
\begin{figure}[htbp]
\centering
\includegraphics[scale=0.35]{figs/nvif}
\caption{Network architecture of NVIF. 1) The encoder uses FlowNet to simulate the information exchange process, and uses GRU to realize the recurrent property of hidden state. There are two independent FlowNets to process different inputs. 2) The decoder uses the latent state to reconstruct the observation of each agent. }
\label{fig:NVIF}
\end{figure}
As shown in Fig. \ref{fig:NVIF}, Besides, we introduce a Gated Recurrent Unit (GRU) layer, which is a kind of recurrent network to process sequential inputs, to realize the recurrent property of $h_{i, t+1}$:
\begin{equation}
h_{i, t+1}, (\boldsymbol{\mu}_{i, t}, \boldsymbol{\sigma}_{i, t}) = \textbf{GRU}(\varphi_{i,t}, \psi_{i, t}).
\end{equation}
For each agent, it takes $\varphi_{i, t}$ and $\psi_{i, t}$ extracted by FlowNets as inputs, and outputs the next hidden state. $\boldsymbol{\mu}_{i, t}$ and $\boldsymbol{\sigma}_{i, t}$ are the mean and standard deviation of the inference distribution $\boldsymbol{N}(\boldsymbol{\mu}_{i, t}, \boldsymbol{\sigma}_{i, t})$, which is a normal distribution. By sampling from the inference distribution for each agent, the information contained in $h_{i, t+1}$ are compressed into a latent state:
\begin{equation}
\hat{s}_{i, t} \sim \boldsymbol{N}(\boldsymbol{\mu}_{i, t}, \boldsymbol{\sigma}_{i, t}).
\end{equation}
\begin{algorithm}[htbp]
\caption{Training Algorithm for Neighboring Variational Information Flow}
\label{alg:NVIF}
Collect the memory buffer $\mathcal{M}_{NVIF} = \{\boldsymbol{o}_t, \boldsymbol{x}_t, G_t \}$ using random policy\;
Initialize the parameters\;
\For {$episode = 1 \ to \ b$}
{
Initialize the hidden state $\boldsymbol{h}_0$ as zero vectors\;
\While {$episode \ is \ not \ end$}
{
\For {$each \ alive \ agent \ i$}
{
Extract features $\varphi_{i, t}$ and $\psi_{i, t}$ by FlowNet\;
$h_{i, t+1} = \textbf{GRU}(\varphi_{i, t}; \psi_{i, t})$\;
$\boldsymbol{\mu}_{i, t}, \boldsymbol{\sigma}_{i, t} = f(h_{i, t+1})$\;
Sample latent state $\hat{s}_{i, t}$ from $\boldsymbol{N}(\boldsymbol{\mu}_{i, t}, \boldsymbol{\sigma}_{i, t})$\;
Reconstruct observation $\hat{o}_{i, t} = \mathcal{D}(\hat{s}_{i, t}, x_{i, t})$\;
}
}
Optimize the \emph{Encoder} and \emph{Decoder} modules with the loss function shown in Eq. (\ref{eq:loss-total})\;
}
Execute the above cycle until convergence.
Take the Encoder module as the final model for the information flow.
\end{algorithm}
In the decoder part, we choose the position of agent as the unique information $x_{i, t}$, and concat it and the latent state. As shown in Fig. \ref{fig:NVIF}, we use a fully-connected (FC) network as the decoder part to get the reconstructed observation:
\begin{equation}
\hat{o}_{i, t} = \mathcal{D}(\hat{s}_{i, t}, x_{i, t})
\end{equation}
where $\hat{o}_{i, t}$ is the reconstructed observation of agent $i$, $x_{i, t}$ is its position, and $\mathcal{D}(\cdot)$ is the decoder network.
As shown in Algorithm \ref{alg:NVIF}, we propose a training algorithm to train NVIF. The memory buffer $\mathcal{M}_{NVIF}$ contains the observations $\boldsymbol{o}$, positions $\boldsymbol{x}$ of agents, and the adjacency matrix $G$ of the system. It is collected by executing random polices and interacting with the environment. In the information exchange phase, the FlowNet of encoder part takes the observations $\{o_{i, t}\}_{i=1}^n$, hidden state $\{h_{i, t}\}_{i=1}^n$, and the adjacency matrix $G$ as inputs. After several rounds of communication, it outputs two features $\varphi_{i, t}$ and $\psi_{i, t}$. Then, the GRU layer is employed recurrently to generate the next hidden state $h_{i, t + 1}$ and the inference distribution $\boldsymbol{N}(\boldsymbol{\mu}_{i. t}, \boldsymbol{\sigma}_{i, t})$. Finally, each agent samples a latent state $\hat{s}_{i, t}$ from it.
The decoder part reconstructs the observation of agent $i$ according to its position $x_{i, t}$ and the latent state $\hat{s}_{i, t}$. After calculating the reconstruction $\hat{o}_{i, t}$ of all agents at all times in an episode, we optimize the parameters of NVIF with the loss function shown in Eq. (\ref{eq:loss-total}). After traversing all episodes in $\mathcal{M}_{NVIF}$, the training completes an epoch. Then we repeatedly train several epochs until the loss function converges.
After the training of NVIF, we use its encoder part to achieve our goal, so that each agent compress a large amount of information into the latent state. This model is pre-trained, which means that it can provide stable communication message for the training of MARL and does not rely strongly on a specific task.
\subsection{Multi-Agent Reinforcement Learning with NVIF}
Since the latent state can be seen as a representation of the global state, we can use it to enrich the observation of agents and promote cooperation. Since adopting team reward for agents will face the problem of credit assignment, we combine NVIF and PPO to train agents in the large-scale multi-agent system by providing agent-specific rewards. We refer this algorithm as NVIF-PPO.
In Algorithm \ref{alg:mappo}, We adopt the framework of PPO to train each agent. It provides two networks for each agent: an actor network presenting its policy, and a critic network presenting its value function. Both networks contain only two layers of fully-connected networks, and all agents share the same parameters.
In our method, the communication protocol is pre-trained before the training of MARL, so that the agents can maintain a stable information exchange process. At each timestep $t$, we use the encoder part of NVIF to collect the local observations $o_{i, t}$ and hidden states $h_{i, t}$ from the neighbors of each agent $i$ and itself, and outputs the latent state $\hat{s}_{i, t}$ and next hidden state $h_{i, t+1}$. The agents choose their actions according to $o_{i, t}$ and $\hat{s}_{i, t}$ as follows:
\begin{equation}
a_{i, t} \sim \pi_i(a|\hat{s}_{i, t}, o_{i, t}; \theta)
\end{equation}
where $\theta$ is the parameters of the actor network.
Besides, the agents estimate their state values by accumulating their individual rewards instead of the team reward. Since the ground-truth global state is inaccessible, the critic network is presented as $V_i(\hat{s}_{i, t}, o_{i, t}; \phi)$, where $\phi$ is the parameters of the critic network. Then, the environment executes these actions and feeds back the agent-specific reward $r_{i, t+1}$ for each agent.
For each episode, we store $\{\boldsymbol{o}_t, \hat{\boldsymbol{s}}_t, \boldsymbol{a}_t, \boldsymbol{p}_t, \boldsymbol{r}_t, \boldsymbol{V}_t\}$ into the replay buffer $\mathcal{M}_{ppo}$ in chronological order, where these data include all agents, such as $\boldsymbol{o}_t = \{o_{i, t}\}_{i=1}^n$. $\boldsymbol{p}_t = \{p_{i, t}\}_{i=1}^n$ is the probability that action $a_{i, t}$ is selected by policy $\pi_i(a_{i, t}|\hat{s}_{i, t}, o_{i, t}; \theta)$. $\boldsymbol{V}_t$ is used for the advantage estimator $\boldsymbol{A}_t=\{A_{i, t}\}_{i=1}^n$, which is calculated and stored into the replay buffer at the end of an episode. Furthermore, $\boldsymbol{r}_t = \{r_{i, t}\}_{i=1}^n$ is used to calculate the discounted accumulate reward:
\begin{equation}
\xi_{i, t} = r_{i, t+1} + \gamma r_{i, t+2} + ...
\end{equation}
and $\boldsymbol{\xi}_t=\{\xi_{i, t}\}_{i=1}^n$ is also stored into the replay buffer for future calculation.
At the end of an epoch, we train the actor network by maximizing the following objective:
\begin{equation}
\begin{aligned}
\label{eq:loss-dr}
\mathcal{L}_{ar}(\theta) &= \hat{\mathbb{E}}_t\big[\sum_{i=1}^n\min(\rho_{i, t}A_{i, t}, clip(\rho_{i, t}, 1-\epsilon, 1+\epsilon)A_{i, t})\big] \\
&= \hat{\mathbb{E}}_t\big[\sum_{i=1}^n\alpha_{i, t}A_{i, t}\big]
\end{aligned}
\end{equation}
where $\rho_{i, t} = \frac{\pi_i(a_{i, t}|\hat{s}_{i, t}, o_{i, t}; \theta)}{\pi_i(a_{i, t}|\hat{s}_{i, t}, o_{i, t}; \theta_{old})}$ is the ratio, $\epsilon$ is the clip coefficient, and $\alpha_{i, t}$ is the simplified clipped ratio.
The critic network is updated by minimizing the following loss function:
\begin{equation}
\label{eq:loss-cr}
\mathcal{L}(\phi) = \mathbb{E}_{i, t} \big[(V_i(\hat{s}_{i, t}, o_{i, t}; \phi) - \xi_{i, t})^2\big]
\end{equation}
which is calculated by the data of all agents at all timesteps in an epoch.
\begin{algorithm}[htbp]
\caption{Proximal Policy Optimization with NVIF in Large-Scale Multi-Agent System}
\label{alg:mappo}
Initialize the parameters of the actor network $\theta$ and critic network $\phi$\;
Initialize the replay buffer $\mathcal{M}_{ppo}$\;
\For {$epoch = 1 \ to \ m$}
{
\For {$episode = 1 \ to \ b$}
{
Initialize the hidden state $\boldsymbol{h}_0$ as zero vectors\;
\For {$i = 1 \ to \ T$}
{
Collect joint observation $\boldsymbol{o}_t$ and last hidden state $\boldsymbol{h}_t$\;
Get latent state $\boldsymbol{\hat{s}}_t$ by NVIF\;
Choose actions for agents by actor network\;
Get state values by the critic network\;
Execute joint action $\boldsymbol{a}_t$ and collect rewards $\boldsymbol{r}_t$ for all agents\;
Store $\{\boldsymbol{o}_t, \hat{\boldsymbol{s}}_t, \boldsymbol{a}_t, \boldsymbol{p}_t, \boldsymbol{r}_t, \boldsymbol{V}_t\}$ into $\mathcal{M}_{ppo}$;
}
Compute $A_{i, t}$ and $\xi_{i, t}$ for all agents\;
Store $\{\boldsymbol{A}_t, \boldsymbol{\xi}_t\}$ into the replay buffer\;
}
\For {$Update \ times \ from \ 1 \ to \ k$}
{
Update the parameters of actor network $\theta$ by maximizing Eq. (\ref{eq:loss-dr})\;
Update the parameters of critic network $\phi$ by minimizing Eq. (\ref{eq:loss-cr})\;
}
}
\end{algorithm}
However, since the environment provides agent-specific reward for each agent instead of the team reward, we have to demonstrate that the policy trained by the loss function in Eq. (\ref{eq:loss-dr}) can achieve cooperation, that is, the agents can optimize their team reward. It should be noted that although the policies are trained by agent-specific rewards, there is still a team reward used to evaluate the multi-agent system.
\begin{definition}
Given the team reward $R_t$ of the system, the objective used to train the policy by team reward can be defined as follows:
\begin{equation}
\begin{aligned}
\label{eq:loss-gr}
\mathcal{L}_{tr} &= \hat{\mathbb{E}}\big[\sum_{i=1}^n\min(\rho_{i, t}\tilde{A}_t, clip(\rho_{i, t}, 1-\epsilon, 1+\epsilon)\tilde{A}_t)\big] \\
&= \hat{\mathbb{E}}\big[\sum_{i=1}^n\alpha_{i, t}\tilde{A}_t\big]
\end{aligned}
\end{equation}
where $\tilde{A}_t$ is the abbreviation of $\tilde{A}_t^{\boldsymbol{\pi}}$, which is the advantage estimator calculated by the team reward. Its definition is similar with Eq. (\ref{eq:agent-adv}):
\begin{equation}
\begin{aligned}
&A_t^{\boldsymbol{\pi}} = \delta_{t} + (\gamma \lambda) \delta_{t+1} + ... + (\gamma \lambda)^{T-t-1}\delta_{T-1}\\
&where\ \ \delta_{t} = R_{t + 1} + \gamma \tilde{V}^{\boldsymbol{\pi}}(s_{t+1}) - \tilde{V}^{\boldsymbol{\pi}}(s_t)
\end{aligned}
\end{equation}
where the value function $\tilde{V}^{\boldsymbol{\pi}}(s_t)$ presents the cumulative discount expectation team reward under the joint policy $\boldsymbol{\pi}$:
\begin{equation}
\tilde{V}^{\boldsymbol{\pi}}(s_t) = \hat{\mathbb{E}}_{\boldsymbol{\pi}}\big[R_{t+1} + \gamma R_{t+2} + ... | s_t \big].
\end{equation}
It is abbreviated as $\tilde{V}_t$.
\end{definition}
The experimental results of MAPPO \cite{yu2021surprising} show that the above objective can achieve satisfactory performance in many common multi-agent scenarios with team reward.
\begin{definition}
In a cooperative multi-agent task, if maximizing the agent-specific rewards is equivalent to maximizing the team reward as follows:
\begin{equation}
\label{eq:gr-dr}
R_{t} = \sum_{i=1}^n \omega_i \cdot r_{i, t+1}
\end{equation}
where $\omega_i > 0, \forall i \in [1, n]$, then the task can be called an \textbf{additive task}.
\end{definition}
The additive tasks are very common in multi-agent environments, including StarCraft II micro-management, predator-prey and so on. In an additive task, the relationship between the value function for agent-specific reward and the value function for team reward can be formulated as follows:
\begin{equation}
\tilde{V}_t = \sum_{i=1}^n \omega_i V_{i, t}.
\end{equation}
Similarly, the relationship of the advantage functions can be formulated as:
\begin{equation}
\tilde{A}_t = \sum_{i=1}^n \omega_i A_{i, t}.
\end{equation}
Therefore, the result that the policy gradient calculated by Eq. (\ref{eq:loss-dr}) and Eq. (\ref{eq:loss-gr}) have the same direction is equivalent to the following formula:
\begin{equation}
\begin{aligned}
(\sum_{i=1}^n\alpha_{i, t}\tilde{A}_t)\cdot(\sum_{i=1}^n\alpha_{i, t}A_{i, t}) \ge 0 \\
(\sum_{i=1}^n\alpha_{i, t}\sum_{j=1}^n\omega_j A_{j, t})\cdot(\sum_{i=1}^n\alpha_{i, t}A_{i, t}) \ge 0
\end{aligned}
\end{equation}
$\alpha_{i, t}$ can be rewritten as a proportion $\eta_{i, t} = \frac{\alpha_{i, t}}{\sum_{j=1}^n \alpha_{j, t}}$. In the large-scale multi-agent system, since the value of $\eta_{i, t}$ ranges from 0 to 1 and $\sum_{i=1}^n \eta_{i, t}=1$, we can approximately replace $\eta_{i, t}$ by $1/n$. Therefore, the equivalence condition becomes:
\begin{equation}
(\sum_{i=1}\omega_i A_{i, t})\cdot(\sum_{i=1}^n A_{i, t}) \ge 0
\end{equation}
when $\omega_1=...=\omega_n>0$, the above formula is always true. Therefore, the policy gradient calculated by Eq. (\ref{eq:loss-dr}) and Eq. (\ref{eq:loss-gr}) have the same direction. It should be noted that the $s_t$ here is the ground-truth global state. We use the combination of $\hat{s}_{i, t}$ and $o_{i, t}$ to approximate global state in practice. The above analysis indicates that in the large-scale multi-agent system, if the environment can provide agent-specific reward for each agent and the task is an additive task, NVIF-PPO with agent-specific reward can also promote cooperation.
Besides, we also combine NVIF with DQN, which is referred as NVIF-DQN. Similar with NVIF-PPO, NVIF-DQN also uses the latent state provided by NVIF as auxiliary features, so that we omitted its pseudo code. However, it should be noted that NVIF-DQN do not have any theoretical guarantee to promote cooperation.
\section{Experiments}
\subsection{Experimental Setup}
MAgent\footnote{https://github.com/geek-ai/MAgent} environment \cite{zheng2018magent} is an open-source multi-agent reinforcement learning platform with large population of agents in a grid world, which is widely used by MARL methods such as MFQ \cite{yang2018mean}, DGN \cite{jiang2019graph}, and LSC \cite{sheng2020learning}. It provides appropriate interfaces to design experimental scenarios flexibly. The \emph{Gather} game shown in Fig. \ref{fig:gather-game} is a fully-cooperative multi-agent task, which contains two types of units \emph{omnivore} and \emph{food}. The blue blocks represent the omnivore units and red blocks represent the food units. Each agent controls an omnivore unit to eat food units as much as possible.
\begin{figure}[htbp]
\centering
\subfloat[normal task]{
\begin{minipage}{4cm}
\centering
\includegraphics[scale=0.2]{figs/normal}\label{fig-normal}
\end{minipage}
}
\subfloat[random task]{
\begin{minipage}{4cm}
\centering
\includegraphics[scale=0.2]{figs/random}\label{fig-random}
\end{minipage}
}
\caption{\emph{Gather} game. (a) a fixed scenario, in which the initial position of agents and food is fixed. (b) the initial position of food is random, which requires efficient information exchange between agents. }
\label{fig:gather-game}
\end{figure}
\noindent\textbf{1) Observation}: The agent observation is a local spatial view with 7 channels, which is shown in Fig. \ref{fig:obs-act} (a). The observation contains some important information of omnivores and food units within the observation range, the last two channel represent the position of the agent in the map. It should be noted that the original MAgent provides mini-map features for observations. Since it is equivalent to cheating to obtain part of the global state, we remove it in our experiments. Since the shape of the origin observation limits the information exchange process, we use a pre-trained VAE module to compress it into a one-dimensional feature.
\noindent\textbf{2) Action}: The action space of agent contains two types of actions: \emph{move} and \emph{attack} as shown in Fig. \ref{fig:obs-act} (b). Each agent can perform 33 actions at a timestep. The blue area represents the movement range, the red area represents the attack range, and the green area means that the agent does nothing. At each timestep, the omnivore units can attack a red area within its attack range or move to any position within its movement range, while the food units keep stationary all the time.
\begin{figure}[htbp]
\centering
\subfloat[observation space]{
\begin{minipage}{4cm}
\centering
\includegraphics[scale=0.3]{figs/observation}\label{fig-obs}
\end{minipage}
}
\subfloat[action space]{
\begin{minipage}{4cm}
\centering
\includegraphics[scale=0.3]{figs/action}\label{fig-act}
\end{minipage}
}
\caption{The observation and action space of agent. (a) the agent observation contains all available information within the observation range. (b) the action space that contains two types of actions. }
\label{fig:obs-act}
\end{figure}
\noindent\textbf{3) Reward}: The reward of attack action depends on the attack target. If the target is a food unit, it will get a positive reward, and if it attacks a blank area, it will get a smaller penalty. The attack target can also be other omnivore. In this way, the attacker will get no reward, while the attacked agent will get a larger penalty and may die. Therefore, the agents should learn to eat as much food as possible without attacking and being attacked by other omnivores. Besides, there also exists a smaller penalty that encourages the multi-agent system to complete the task faster.
\noindent\textbf{4) Tasks}: In order to evaluate the performance of proposed method, we design two types of gather tasks: \emph{normal task} and \emph{random task}. They adopt the same unit attribute settings, including hit point (HP), observation range, attack range, movement range, and so on. As shown in Fig. \ref{fig:gather-game}, in the normal task, the initial positions of all units are fixed, so that agents can make decisions only according to their positions and local observations without accessing the global state. In the random task, the initial positions of the food units are changed at the beginning of each episode. It requires efficient communication between agents, so that all agents can move forward to the correct position, that is, the position of food units. Therefore, the random task is much more difficult than the normal task, and can better evaluate the communication efficiency of the proposed method.
\begin{figure*}[htbp]
\centering
\subfloat{
\begin{minipage}{12cm}
\centering
\includegraphics[scale=0.35]{figs/legend}
\end{minipage}
}
\setcounter{subfigure}{0}
\subfloat[normal (small scale)]{
\begin{minipage}{5.5cm}
\centering
\includegraphics[scale=0.325]{figs/normal-24}
\end{minipage}
}
\subfloat[normal (medium scale)]{
\begin{minipage}{5.5cm}
\centering
\includegraphics[scale=0.325]{figs/normal-48}
\end{minipage}
}
\subfloat[normal (large scale)]{
\begin{minipage}{5.5cm}
\centering
\includegraphics[scale=0.325]{figs/normal-96}
\end{minipage}
}
\\
\subfloat[random (small scale)]{
\begin{minipage}{5.5cm}
\centering
\includegraphics[scale=0.325]{figs/random-24}
\end{minipage}
}
\subfloat[random (medium scale)]{
\begin{minipage}{5.5cm}
\centering
\includegraphics[scale=0.325]{figs/random-48}
\end{minipage}
}
\subfloat[random (large scale)]{
\begin{minipage}{5.5cm}
\centering
\includegraphics[scale=0.325]{figs/random-96}
\end{minipage}
}
\caption{Average return for DGN, IPPO, MFQ, NVIF-DQN, and NVIF-PPO. (a)(b)(c) the results in small, medium, and large-scale normal tasks. (d)(e)(f) the results in small, medium, and large-scale random tasks. The evaluation metric is the return, which is the sum of the rewards of all agents in an episode. NVIF completes all tasks and gets the best performance. }
\label{fig:result}
\end{figure*}
\begin{figure}[htbp]
\centering
\includegraphics[scale=0.3]{figs/adjacency}
\caption{The neighbor relationship of a multi-agent system. Each agent chooses the units with smallest distance in the up, down, right and left directions to become its neighbors. }
\label{fig:adj}
\end{figure}
Although we do not provide direct communication for each pair of agents, we should still provide an indirect communication channel between them. Therefore, the information shared by any agent can be received by all other agents. We establish a rule-based neighboring graph structure to achieve this. We define the neighbors as the units with the smallest distance from the agent in the up, down, left, and right directions as shown in Fig. \ref{fig:adj}. It should be noted that the neighbor relationship is bi-directional, and the nearest agents in two directions may be the same one. Therefore, each agent has at least one neighbor and the maximum number is unlimited.
We compare NVIF-DQN and NVIF-PPO with MFQ \cite{yang2018mean}, DGN \cite{jiang2019graph} and IPPO \cite{de2020independent} with agent-specific rewards. MFQ \cite{yang2018mean} aims to figure out the problem of enormous interactions in the large-scale multi-agent system. It uses the mean-field approximation to learn the best response of each agent to the mean effect of its neighbors. The agents use the following Boltzmann policy to make decisions:
\begin{equation}
\pi_i(a_{i, t}|o_{i, t}, \bar{a}_{i, t}) = \frac{\exp(-\kappa Q_i(o_{i, t}, a_{i, t}, \bar{a}_{i, t}))}{\sum_{a} \exp(-\kappa Q_i(o_{i, t}, a, \bar{a}_{i, t}))}
\end{equation}
where $\kappa$ is the temperature coefficient, $\bar{a}_{i, t}$ is the mean action of the neighbors of agent $i$, which is determined by the last mean actions.
DGN \cite{jiang2019graph} uses the graph convolution network to provide information exchange between the multi-agent system. The agents collect the hidden states of all agents with relational kernel to alleviate information redundancy. MAPPO \cite{yu2021surprising} is an efficient MARL method, which achieves excellent performance in the StarCraft II micro-management task. However, its critic module takes the global state of system as input, which is difficult to achieve in the large scale multi-agent system. Therefore, we compare with IPPO \cite{de2020independent}, which only uses the local observation to make decisions and calculate state values for each agent, and employs PPO to update its policy. But we train it by agent-specific rewards instead of team reward. The codes of these algorithms are all open-source, and they have been conducted experiments on some tasks of MAgent.
\begin{table}[ht]
\caption{Detailed Descriptions of Experimental Maps.}
\label{table:maps}
\renewcommand{\arraystretch}{1.1}
\setlength{\tabcolsep}{4mm}
\begin{center}
\begin{tabular}{c|cccc}
\toprule
Type & Scale & Map Size & Omnivores & Food \\ \midrule
\multirow{3}{*}{Normal} & Small & 24 & 27 & 87 \\
& Medium & 48 & 56 & 237 \\
& Large & 96 & 115 & 521 \\ \midrule
\multirow{3}{*}{Random} & Small & 24 & 15 & 17 \\
& Medium & 48 & 29 & 49 \\
& Large & 96 & 49 & 161 \\
\bottomrule
\end{tabular}
\end{center}
\end{table}
We conduct experiments on the normal and random tasks, and provide maps of size 24, 48 and 96 to evaluate the performance of the methods under different population of multi-agent system. The detailed descriptions of maps are shown in Table \ref{table:maps}. The number of omnivore and food units increases with the size of map. In a small-scale map, the observation range is close to the size of map, so that the information exchange is inessential in the decision-making process. However, in a large-scale map, local observation loses a lot of information compared with the global state. Therefore, the agents need efficient information exchange to achieve better performance.
\subsection{Main Results}
Since we train IPPO and our algorithm in a parallel way, while DGN and MFQ are not, we choose the average return under the same number of training timesteps as the evaluation metric to ensure the fairness of comparison. Furthermore, all algorithms use the same hyper-parameters, which have been fine-tuned to improve performance.
\begin{enumerate}[labelsep = .5em, leftmargin = 0em, itemindent = 2em]
\item[1)] \emph{Normal Tasks}: In the normal tasks, the agents do not rely strongly on communication to obtain the position of food units, but can be obtained by training. Therefore, they should pay more attention to learn how to avoid attacking or being attacked by other agents.
\quad As shown in Fig. \ref{fig:result} (a)(b)(c), MFQ, NVIF-DQN, and IPPO perform better on small-scale map, and achieve better convergence speed. However, with the increase of map size and agent number, their performance decreases significantly. DGN can not converge under a given number of training timesteps due to the low training speed of its attention model. NVIF-PPO can achieve the best performance on all sizes of maps. It comes from the auxiliary features provided by the pre-trained communication protocol, which makes MARL training more stable and efficient.
\item[2)] \emph{Random Tasks}: The random tasks are more difficult than the normal tasks. The initial positions of food units are random, which means that only part of agents can observe the food units at the beginning of each episode. Therefore, they need to exchange information efficiently with each other.
\quad As shown in Fig. \ref{fig:result} (d)(e)(f), MFQ and NVIF-DQN can still perform well in small-scale map because there is less gap between the observation range and map size. However, with this gap increasing, MFQ can hardly learn a satisfactory agent policy. DGN and IPPO achieve poor performance and converge slowly. Due to the efficient communication, agents trained by NVIF-PPO can achieve the best performance in larger maps.
\end{enumerate}
Besides, Table. \ref{table:results} shows the average returns and end timesteps of each episode when the algorithms converge. Since an episode terminates when the maximum timestep is reached or all food units are killed, less end timesteps indicates the multi-agent system has stronger cooperation ability to complete the task quickly. In general, the results of NVIF-PPO show that NVIF can provide efficient communication to help agents kill all food units in the shortest timesteps. However, due to the lack of theoretical guarantee of cooperation, the performance of NVIF-DQN is worse than that of NVIF-PPO. With the help of the latent states provided by NVIF, NVIF-DQN can achieve better performance than MFQ in random tasks, which rely more on communication, but performs worse than MFQ in normal tasks.
\begin{table*}[ht]
\caption{Detailed Results of Experiments.}
\label{table:results}
\renewcommand{\arraystretch}{1.25}
\setlength{\tabcolsep}{2.75mm}
\begin{center}
\begin{tabular}{c|cccccc|cccccc}
\hline
\multirow{3}{*}{Method} &
\multicolumn{6}{c|}{Normal Task} &
\multicolumn{6}{c}{Random Task} \\ \cline{2-13}
&
\multicolumn{2}{c|}{24} & \multicolumn{2}{c|}{48} & \multicolumn{2}{c|}{96} & \multicolumn{2}{c|}{24} & \multicolumn{2}{c|}{48} & \multicolumn{2}{c}{96} \\ \cline{2-13}
&
\multicolumn{1}{c|}{Return} & \multicolumn{1}{l|}{Steps} & \multicolumn{1}{c|}{Return} & \multicolumn{1}{l|}{Steps} & \multicolumn{1}{c|}{Return} & \multicolumn{1}{l|}{Steps} &
\multicolumn{1}{c|}{Return} & \multicolumn{1}{l|}{Steps} & \multicolumn{1}{c|}{Return} & \multicolumn{1}{l|}{Steps} & \multicolumn{1}{c|}{Return} & \multicolumn{1}{l}{Steps} \\ \hline
IPPO & \multicolumn{1}{c|}{704.96} & \multicolumn{1}{c|}{23.68} & \multicolumn{1}{c|}{1889.83} & \multicolumn{1}{c|}{42.37} & \multicolumn{1}{c|}{401.86} & 100.00 &
\multicolumn{1}{c|}{132.08} & \multicolumn{1}{c|}{15.19} & \multicolumn{1}{c|}{-102.00} & \multicolumn{1}{c|}{100.00} & \multicolumn{1}{c|}{-288.69} & 100.00 \\ \hline
DGN & \multicolumn{1}{c|}{253.90} & \multicolumn{1}{c|}{80.00} & \multicolumn{1}{c|}{83.96} & \multicolumn{1}{c|}{100.00} & \multicolumn{1}{c|}{-192.01} & 100.00 &
\multicolumn{1}{c|}{42.04} & \multicolumn{1}{c|}{76.29} & \multicolumn{1}{c|}{13.83} & \multicolumn{1}{c|}{100.00} & \multicolumn{1}{c|}{-219.48} & 100.00 \\ \hline
MFQ & \multicolumn{1}{c|}{690.56} & \multicolumn{1}{c|}{47.79} & \multicolumn{1}{c|}{1474.53} & \multicolumn{1}{c|}{100.00} & \multicolumn{1}{c|}{2193.70} & 100.00 &
\multicolumn{1}{c|}{120.97} & \multicolumn{1}{c|}{28.35} & \multicolumn{1}{c|}{233.35} & \multicolumn{1}{c|}{97.99} & \multicolumn{1}{c|}{-4.42} & 100.00 \\ \hline
NVIF-DQN & \multicolumn{1}{c|}{639.50} & \multicolumn{1}{c|}{62.91} & \multicolumn{1}{c|}{1040.68} & \multicolumn{1}{c|}{100.00} & \multicolumn{1}{c|}{1413.48} & 100.00 &
\multicolumn{1}{c|}{125.24} & \multicolumn{1}{c|}{33.01} & \multicolumn{1}{c|}{234.81} & \multicolumn{1}{c|}{90.87} & \multicolumn{1}{c|}{-22.25} & 100.00 \\ \hline
NVIF-PPO & \multicolumn{1}{c|}{\textbf{705.27}} & \multicolumn{1}{c|}{\textbf{23.46}} & \multicolumn{1}{c|}{\textbf{1908.47}} & \multicolumn{1}{c|}{\textbf{35.36}} & \multicolumn{1}{c|}{\textbf{4108.84}} & \textbf{53.04} &
\multicolumn{1}{c|}{\textbf{133.51}} & \multicolumn{1}{c|}{\textbf{13.25}} & \multicolumn{1}{c|}{\textbf{379.30}} & \multicolumn{1}{c|}{\textbf{23.67}} & \multicolumn{1}{c|}{\textbf{1181.66}} & \textbf{59.57} \\ \hline
\end{tabular}
\end{center}
\end{table*}
\begin{figure}[htbp]
\centering
\subfloat{
\begin{minipage}{7cm}
\centering
\includegraphics[scale=0.35]{figs/ablation-legend}
\end{minipage}
}
\\
\setcounter{subfigure}{0}
\subfloat[normal task]{
\begin{minipage}{7cm}
\centering
\includegraphics[scale=0.35]{figs/ablation-normal}
\end{minipage}
}
\\
\subfloat[random task]{
\begin{minipage}{7cm}
\centering
\includegraphics[scale=0.35]{figs/ablation-random}
\end{minipage}
}
\caption{Results of ablation experiments in the medium scale map of (a) normal task and (b) random task. MS takes the mean observation as the auxiliary features for agent decision making to illustrate the efficiency of NVIF. Fully-VIF uses the fully communication instead of neighboring communication to demonstrate the impact of information redundancy. }
\label{fig:ablation}
\end{figure}
\subsection{Ablation Results}
In order to investigate the effect of: 1) the neighboring communication mechanism and 2) the latent state provided by NVIF, we conduct ablation experiments on the medium scale map of the normal and random task.
\begin{enumerate}[leftmargin = 2em]
\item[1)] \emph{Effect of neighboring communication}: We propose an ablation method called Fully-VIF, which provides information exchange between each pair of agents. The neighboring communication mechanism can alleviate information redundancy, whose impact can be proved by this ablation experiment. As shown in Fig. \ref{fig:ablation}, the blue curves indicate the results of Fully-VIF. Its performance is between NVIF-PPO and IPPO, which demonstrates the necessity of neighboring communication.
\item[2)] \emph{Effect of latent state}: We propose an ablation method called MS, which uses the mean observation of all alive agents as the auxiliary observation. It is the simplest way to obtain the information of the whole system. However, it is not as efficient and effective as the latent state provided by NVIF. As shown in Fig. \ref{fig:ablation}, the green curves indicate the results of MS. Since the average observation can not provide efficient information, it affects the training of the algorithm and leads to the decline of convergence speed.
\end{enumerate}
According to the ablation experiments, we demonstrate the necessity of the main contribution of NVIF. The neighboring communication mechanism provides efficient information exchange by avoiding information redundancy. The VAE module of NVIF compresses the information collection into a latent state and retains the important parts.
\subsection{Strategy Analysis}
In order to better understand the difficulties of large-scale multi-agent reinforcement learning, we analyze the replays to find out what strategies help multi-agent system achieve better performance.
\begin{enumerate}[labelsep = .5em, leftmargin = 0em, itemindent = 2em]
\item[1)] \emph{Concentrating Attack}: It is a common strategy that can be learned by all methods. As shown in the bottom right of Fig. \ref{fig:strategy} (a), several agents move around a food unit and attack it together. Since the food units require multiple attacks to be killed, the concentrating attack can help the agents complete the task as quickly as possible.
\begin{figure}[htbp]
\centering
\subfloat[concentrating attack \& crossing obstacles]{
\begin{minipage}{4cm}
\centering
\includegraphics[scale=0.225]{figs/strategy-1}
\end{minipage}
}
\subfloat[gathering]{
\begin{minipage}{4cm}
\centering
\includegraphics[scale=0.225]{figs/strategy-2}
\end{minipage}
}
\caption{Strategies learned by the agents using NVIF-PPO. There are two basic strategies \emph{concentrating attack} and \emph{crossing obstacles}, and one special strategy \emph{gathering}. (a) Top left shows the concentrating attack and bottom right shows the crossing obstacles. (b) The agents gathering directly to the correct position of food units. }
\label{fig:strategy}
\end{figure}
\item[2)] \emph{Crossing Obstacles}: It is an advanced strategy, which can further shorten the timesteps required to complete the task. As described in section IV. A, an agent can move up to 3 grids at a timestep. Therefore, the agents can move through the line made up of food units, which can be seen as an obstacle. Meanwhile, the number of food units will decrease with the attack of agents, which will lead to the aggregation of a large number of agents and cause congestion. As shown in the top left of Fig. \ref{fig:strategy} (a), the omnivore unit crosses the obstacle from the position of the green blocks, which indicates the position of the agent at the last timestep, to the end-point indicated by the black arrow. Therefore, the agent can attack the internal food units in advance to avoid the congestion and improve the attacking efficiency.
\item[3)] \emph{Gathering}: This is a special strategy learned by the agents using NVIF-PPO, which is essential in random tasks. Since the initial positions of food units are not fixed, the agents have to decide where to move according to the information exchanged by other agents. As denoted in Fig. \ref{fig:strategy} (b), all agents gather to the location of the food units. Once an agent receives the information shared from the agents who can observe the food units, it will move directly to true location. Therefore, the agents can move to the correct positions as soon as possible to complete the task.
\end{enumerate}
\subsection{Scalability Experiments}
The training of NVIF does not rely on a specific tasks, so that the communication protocol can help the agent policies scale to unseen tasks and achieve good performance. In order to evaluate the scalability of NVIF, we use the policies trained on different maps by NVIF-PPO to conduct 10 episodes on other maps to obtain the average return. The scalability score shown in Fig. \ref{fig:scale} is the average returns normalized by the maximum return in each task. The score at row $i$ and column $j$ indicates that the policy trained in map $i$ is tested in map $j$. Therefore, these scores can represent the scalability of algorithms, with a higher score indicating that the agents can better adapt to other unseen tasks.
We compare NVIF-PPO with MFQ, which performs better in the experimental algorithms. Since NVIF-PPO can converge to the best performance in all scenarios, the diagonal elements of its score matrix is all 1.0. The closer the color is to yellow, the better the multi-agent system performs in the scalability experiments. As shown in Fig. \ref{fig:scale}, the agents trained by NVIF-PPO have the better scalability than the agents trained by MFQ.
\begin{figure}[htbp]
\centering
\subfloat{
\begin{minipage}{0.5cm}
\centering
\includegraphics[scale=0.5]{figs/scalability-1}
\end{minipage}
}
\setcounter{subfigure}{0}
\subfloat[MFQ]{
\begin{minipage}{3cm}
\centering
\includegraphics[scale=0.5]{figs/scalability-2}
\end{minipage}
}
\subfloat[NVIF-PPO]{
\begin{minipage}{3cm}
\centering
\includegraphics[scale=0.5]{figs/scalability-3}
\end{minipage}
}
\subfloat{
\begin{minipage}{0.5cm}
\centering
\includegraphics[scale=0.45]{figs/colorbar}
\end{minipage}
}
\caption{Scalability score matrix of (a) MFQ and (b) NVIF. Scores represent the scalability performance of agents trained in one task when running in another task. }
\label{fig:scale}
\end{figure}
In general, NVIF-PPO can not only achieve good performance in the same task with different map sizes, but also performs well in different task, while MFQ only has scalability in normal tasks. Scores in Fig. \ref{fig:scale} (b) can demonstrate the tendency of agent policies on each maps. In the small-scale maps, the agents tend to complete the tasks without communication and cooperation, so that the policies can hardly scale to larger maps. Besides, since the small maps are more crowded, the policies trained in larger maps are more likely to mistakenly attack other agents. The type of task also affects scalability. Policies trained in normal tasks are hard to be scaled to random tasks because agents do not tend to use communication to promote cooperation.
\section{Conclusion}
This article proposes NVIF, a novel communication-based MARL method, to improve communication efficiency of large-scale multi-agent system. We adopt neighboring communication to alleviate the problem of information redundancy. The pre-trained NVIF model helps agents to enrich their observations and enhance the stability of the MARL training process. We provide a theoretical analysis of the cooperation in large-scale multi-agent system, which illustrates that the combination of NVIF and PPO can promote cooperation. We also combine NVIF with DQN to test its effectiveness on other RL methods.
We compare NVIF-PPO and NVIF-DQN with MFQ, DGN, and IPPO in two types of tasks with different map sizes, which are modified from MAgent. Experiments show that NVIF improve the communication efficiency and help agents achieve better performance. We conduct ablation experiments to demonstrate the effect of the neighboring communication and the latent state. We also analyze the learned strategies and conduct supplementary experiments to show the good scalability performance of NVIF.
\bibliographystyle{IEEEtran}
|
\section{Introduction}
If $\{A_i\}_{i\in \mathbb{N}}$ is an i.i.d. sequence of random variables on $(0,\infty)$, we build a sequence of power towers by $$
A_1,\hspace{4pt} A_1^{A_2},\hspace{4pt} A_1^{A_2^{A_3}},\hspace{4pt} \dots
$$
In this paper, we address the question of whether this sequence converges and what distributions it converges to. Our main result, Theorem \ref{main}, gives necessary and sufficient conditions for convergence in most cases. We end by asking which distributions arise as a limit of a sequence of power towers. In Theorem \ref{inverse} we prove that if $U\sim\mathrm{Unif}[\alpha,\beta]$ and $r\in\mathbb{R}$, then there exists an i.i.d. sequence $\{A_i\}_{i\in\mathbb{N}}$ such that $U^r\stackrel{d}{=} A_1^{A_2^{\iddots}}$ if and only if $1\in[\alpha,\beta]$ and $r\in[0,\frac1{1+\log \beta}]$.
Infinite non-random power towers, such as $$
\sqrt{2}^{\sqrt{2}^{\sqrt{2}^{\iddots}}}
$$
have been studied for a long time, even as early as Euler \cite{ARTICLE:4} and Eisenstein \cite{ARTICLE:2}, and they are well understood. The infinite expression is not \emph{a priori} well-defined, but we can consider it as the limit of the sequence $$
\sqrt{2}, \hspace{4pt} \sqrt{2}^{\sqrt2}, \hspace{4pt} \sqrt{2}^{\sqrt{2}^{\sqrt{2}}},\hspace{4pt}\dots
$$
\begin{figure}[t]
\centering
\includegraphics[scale=0.54]{pictures-1.pdf}\caption{Iterating exponential functions showing the four possible behaviors: a. Increasing convergence to a fixed point when $c\in[1,e^{\frac1e}]$; b. Increasing to infinity when $c>e^{\frac1e}$; c. Alternating convergence to a fixed point when $c\in[e^{-e},1]$; d. Oscillation in the limit when $c<e^{-e}$.}\label{figure:sqrtower}
\end{figure}
It is natural to view this type of sequence as repeated iteration of a function, in this case $x\to (\sqrt{2})^x$, starting at $x=1$, which turns this into a discrete dynamical system. The theory of dynamical systems is complex and deep; in general their behavior is difficult or impossible to predict. However, this particular system is easy to get a handle on. The iteration of $x\to(\sqrt 2)^x$ forms a sequence that increases to the first fixed point of this function, i.e. $2$ (Figure \ref{figure:sqrtower}).
In general, iterating an increasing function creates sequence that either converges to a fixed point or diverges to infinity. Sequences arising from iterated decreasing functions will either converge to a fixed point, or oscillate in the limit.
Infinite power towers $c, c^c, c^{c^c}, \dots,$ converge in the limit when $c\in[e^{-e}, e^{\frac1e}]$. For larger $c$, the sequence diverges to infinity. For $c\in (0,e^{-e})$, it oscillates, with the even- and odd-indexed subsequences converging to distinct limits (Figure \ref{figure:oscillation}). We will see similar behavior for random infinite power towers.
As in the deterministic case, it is natural to think of random power towers as composing random maps $x\to (A_n)^x$. Composition sequences of random maps has also been studied extensively, for example, see the review by Diaconis and Freedman \cite{ARTICLE:1}, who showed a probabilistic analogue of the Banach fixed point theorem, which may be applied in many diverse instances of random iterated functions. Stated informally, if $f_n$ is a random i.i.d. sequence of functions from some metric space $S$ to itself, and $f_n$ is ``on average" a contraction, then $$
f_1,\hspace{4pt} f_1\circ f_2,\hspace{4pt} f_1\circ f_2\circ f_3,\hspace{4pt} \dots
$$
almost surely converges to a constant function in the limit. This is a powerful result, but it is fairly limited for our question. The best that this can give us is
\begin{cor}[Of Proposition 5.1 in \cite{ARTICLE:1}]
If $\{A_n\}_{n\in\infty}$ is an i.i.d. sequence of random variables on $[0,e^{\frac1e}]$ such that $$
\mathbb{E}\left[\log\left(\max(-\log A_1, e^{\frac{A_1}e}\log A_1)\right)\right] < 0
$$
then the sequence of random power towers $$
A_1,\hspace{4pt} A_1^{A_2},\hspace{4pt} A_1^{A_2^{A_3}},\hspace{4pt} \dots
$$
converges almost surely.
\end{cor}
Note that the expression in the expectation is simply the Lipschitz constant of $A_1$. The condition of the Lipschitz constant having negative expectation was called ``super-contracting" by Steinsaltz \cite{ARTICLE:5}, who also studied infinite iterated function systems, and gave convergence results with weaker assumptions than Diaconis and Freedman's theorem. If we allow the base to exceed $e^{\frac1e}$, then their result is not much help, as $x\to a^x$ is not a Lipschitz map of any subinterval of $[0,\infty)$ to itself. For bases close to $0$, we have the difficulty that $\log|\log a|$ becomes very large, so one might expect the random power tower to have an oscillating limit if most of its weight is near $0$, similar to the behavior of $a^{a^{\iddots}}$ when $a<e^{-e}$.
There are in fact many distributions for $A_1$ that will give rise to an almost-surely-convergent power tower that do not satisfy the ``contracting on average" condition, and indeed that do not satisfy any condition based on Lipschitz constants.
\begin{figure}[t]
\centering
\includegraphics[scale=0.5]{nonrandom.pdf}\caption{Limiting behavior of $c,c^c,c^{c^c},\dots$ for $c$ on either side of $e^{-e}\approx 0.06$}\label{figure:oscillation}
\end{figure}
\section{The main theorem}
Let $\{A_n\}_{n\in \mathbb{N}}$ be an i.i.d. sequence on $(0,\infty)$. We are interested in the limiting behavior of the random power tower $$
T_n = A_1^{A_2^{A_3^{\iddots^{A_n}}}}
$$
The necessary and sufficient conditions for convergence of $T_n$ primarily depend on the support of $A_1$, so it will be convenient to define $a = \inf(\mathrm{supp} (A_1))$ and $b=\sup( \mathrm{supp} (A_1))$, or equivalently, $[a,b]$ is the smallest interval that contains the support of $A_1$.
To state our main result, we must also introduce some notation. Define
$$c\star n = \underbrace{c^{c^{\iddots^c}}}_{n \mbox{ times}}$$ This operation is commonly called ``tetration" and is often denoted ${^n}c$ or $c\uparrow \uparrow n$, but we find this notation easier to read and pronounce (``$c$ star $n$"). We also define the iterated logarithm function $$
\log^\star (x) = \inf\{n\in\mathbb{N} : e\star n \ge x \}
$$
which is a right-inverse of $n \rightarrow e\star n$, i.e. $\log^\star (e\star n) = n$ for $n\in \mathbb{N}$. Additionally, $e\star \log^\star (x) = \floor{x}$. Just as $e\star n$ diverges to infinity extremely rapidly, so $\log^\star (x)$ diverges to infinity extremely slowly. The iterated logarithm function is used in study of algorithms \cite{BOOK:1}.
Also, let $W(z)$ be the principal branch of the Lambert-$W$ function, defined to be the inverse function of $z e^z$ on $\mathbb{C}$. As a real-valued function, $W(z)$ has domain $[-\frac1e,\infty]$ and range $[-1,\infty]$. See \cite{ARTICLE:6} for an in-depth introduction to this function.
The following theorem gives necessary and sufficient conditions for almost-sure convergence of $T_n$ provided that the support of $A_1$ is not an unbounded subset of $[1,\infty]$:
\begin{theorem}\label{main} We have the following different cases, depending on the values of $a$ and $b$:\begin{enumerate}
\item If $[a,b]\subseteq[1,e^{1/e}]$, then $T_n$ converges almost surely.
\item If $1\le a$ and $ b \in (e^{1/e},\infty)$:
Then,$$
\mathbb{E}\left[\inf\{n: A_n \le e^{\frac 1 { e\star n}}\} \right]< \infty\hspace{10pt}\Longleftrightarrow\hspace{10pt}\ilim n T_n <\infty \hspace{6pt}\mathrm{a.s.}$$
\item Let $G:[0,1]\rightarrow[0,1]$ be defined by $$
G(x) =\begin{cases} x& x\ge e^{-e}\\\exp\left(W\left(\frac1{\ln x}\right)\exp\left(-\frac1{W\left(\frac1{\ln x}\right)}\right)\right) & x<e^{-e}\end{cases}
$$
If $b\le1$ and $a<G(b)$, then $T_n$ converges almost surely. Conversely, if $b<e^{-e}$ and $a\ge G(b)$, then $T_n$ diverges by oscillation, with the even and odd subsequences converging to distinct limits.
\item
If $a<1<b\le\infty$, then $T_n$ converges almost surely.
\end{enumerate}
\end{theorem}
For the purposes of checking given a distribution for $A_1$ whether $T_n$ converges, the following corollaries are easier to use:
\begin{cor}[Convergence conditions]\label{conv} If any of the following holds, then $T_n$ converges almost surely:\begin{enumerate}
\item $a=0$
\item $b\in[e^{-e},e^{\frac1e}]$
\item $a<1\le b$
\item $b<e^{-e}$ and $$
a < \exp\left(W\left(\frac1{\ln b}\right)\exp\left(-\frac1{W\left(\frac1{\ln b}\right)}\right)\right)
$$
\item $a=1$ and $b$ is finite and there exists $\alpha\in(0,1)$ such that $$
\mathbb{E} \left[\left(\log^\star(\frac1{A_1 - 1})\right)^\alpha\right] = \infty
$$
\end{enumerate}
\end{cor}
\begin{cor}[Divergence conditions] If any of the following holds, then $T_n$ diverges almost surely:\begin{enumerate}
\item $a>1$ and $b>e^{\frac1e}$
\item $b<e^{-e}$ and $$
a \ge \exp\left(W\left(\frac1{\ln b}\right)\exp\left(-\frac1{W\left(\frac1{\ln b}\right)}\right)\right)
$$
\item $a=1$ and $b>e^{\frac1e}$ and $$
\mathbb{E} \left[\log^\star(\frac1{A_1 - 1})\right] < \infty
$$
\end{enumerate}
\end{cor}
Surprisingly, the particulars of the distribution of $A_1$ are almost completely irrelevant except for the bounds of its support. The other properties of $A_1$ only matter when $a=1$ and $b>e^{\frac1e}$, and then just barely. Since the function $x \rightarrow \log^\star(\frac1{1-x})$ is bounded except in neighborhoods of $1$, the conditions on its expectation being finite or infinite depend only on the distribution of $A_1$ in a neighborhood of $1$. One can also see immediately that this is a much more powerful result than the ``contracting on average" condition from the introduction; indeed $T_n$ converges almost surely when $a=0$ and $b<e^{-e}$, but $x\to (A_n)^x$ is never a contraction.
There is no reason to expect that any ``nice" distribution for $A_1$ should correspond to a nice distribution of $T$, but we do have the following fortuitous example:
\begin{example}\label{ex1}
If $U_n$ and $V_n$ are two independent i.i.d. sequences, uniformly distributed on $(0,1)$, then the sequence $$
U_1V_1, \hspace{4pt} (U_1V_1)^{U_2V_2},\hspace{4pt} (U_1V_1)^{(U_2V_2)^{U_3V_3}},\hspace{2pt}\dots
$$
converges almost surely, and the limit is uniform on $(0,1)$.
\end{example}
Almost sure convergence follows immediately from the first convergence condition of Corollary \ref{conv}, even though this distribution fails to be ``contracting on average".
Example \ref{ex1} follows from the fact that, $(UV)^W \stackrel{d}{=} W$ is uniform on $(0,1)$ when $U,V,$ and $W$ are independent and uniform on $(0,1)$. This may be shown by some simple calculus\begin{eqnarray}
P((UV)^W \le x) &=& \iiint\limits_{\left\{(u,v,w)\in[0,1]^3 \hspace{2px}\vert \hspace{2px}(uv)^w \le x\right\}} 1\hspace{1px}du\hspace{1px}dv\hspace{1px}dw= \iiint\limits_{\left\{(u,v,w)\in[0,1]^3 \hspace{2px}\vert\hspace{2px} uv \le x^{1/w}\right\}} 1\hspace{1px}du\hspace{1px}dv\hspace{1px}dw \nonumber\\
&=& \int_0^1 x^{\frac 1 w}\left(1 - \frac1w \log x\right)dw = \int_0^1 \left(\dd w wx^{\frac 1 w}\right)dw = x \nonumber
\end{eqnarray}
Since $T = (U_1V_1)^{(U_2V_2)^{\iddots}}$ also satisfies $T \stackrel{d}{=} (UV)^T$, it stands to reason that $T$ is uniform on $(0,1)$, and indeed, this may be shown by observing that, for each $n$, $$(U_1V_1)^{(U_2V_2)^{{\dots}^{(U_{2n}V_{2n})^{(U_{2n+1}V_{2n+1})}}}} \le (U_1V_1)^{(U_2V_2)^{{\iddots}^{(U_{2n}V_{2n})^{U_{2n+1}}}}} \le (U_1V_1)^{(U_2V_2)^{{\iddots}^{(U_{2n}V_{2n})}}}$$
The leftmost and rightmost terms both converge to $T$, hence the middle term also converges to $T$. Using the fact that $(UV)^W\stackrel{d}{=} W$, once can also see that the middle term always is uniformly distributed on $(0,1)$, and thus so is $T$.
\section{Proof of Theorem \ref{main}}
As we have seen, we cannot use contraction-type of results to prove Theorem \ref{main}. However, exponential functions do have a different useful property: They are always monotonic. The proof in all different cases relies heavily on this fact, but it works differently when $a\ge 1$ and when $a<1$, because in the former case, $x\to (A_n)^x$ is always nondecreasing, whereas in the latter case it may be instead nonincreasing.
\subsection{Cases 1 and 2 ($a\ge1$)}
Importantly, $a\ge 1$ implies that $T_n$ is a non-decreasing sequence because $$
T_{n+1} = A_1^{A_2^{{\iddots}^{A_n^{(A_{n+1})}}}} \ge A_1^{A_2^{{\iddots}^{A_n^{1}}}} = T_n
$$
Case 1 of Theorem \ref{main} is an immediate consequence:
\begin{prop2} If $[a,b]\subseteq[1,e^{1/e}]$, then $T_n$ converges surely.\end{prop2}
\begin{proof}
Observe that for $c\in[1,e^{1/e}]$ and $x\in [1,e]$, we always have $$
1\le c^x\le (e^{1/e})^e = e$$
which implies that for $b\le e^{1/e}$, $T_n$ is bounded above by $e$. Thus for $1\le a \le b \le e^{1/e}$ we have that $T_n$ is always an increasing and bounded above sequence, hence it converges.\end{proof}
The proof of case 2 similar; we want to find an upper bound for the non-decreasing sequence $T_n$. The following lemma gives us a probabilistic analogue to the fact that bounded non-decreasing sequences are convergent.
\begin{lemma}\label{bounded}
Suppose $\{X_n\}_{n\in\mathbb{N}}$ is an almost surely nondecreasing sequence of nonnegative random variables, and that $\{Y_n\}_{n\in\mathbb{N}}$ is an identically distributed sequence of random variables such that, for all $n$, $X_n\le Y_n<\infty$ almost surely.
Then $
\lim\limits_{n\rightarrow\infty}X_n
$
converges with a nonzero probability.
\end{lemma}
\begin{proof}
Observe that $$
\mathbb{E} \arctan X_n \le \mathbb{E} \arctan Y_n = \mathbb{E} \arctan Y_1 < \frac\pi2
$$
Pick $c \in (\mathbb{E} \arctan Y_1,\frac\pi2)$. Then, by Markov's inequality $$
P(X_n\ge \tan c) = P(\arctan X_n \ge c) \le \frac{\mathbb{E} \arctan Y_1}{c} < 1
$$
for all $n$. Because $X_n$ is increasing, we have $$
P(\sup X_n \ge \tan c) = P(\limsup\limits_{n\rightarrow \infty} X_n \ge \tan c) = \lim_{n\rightarrow\infty} P(X_n \ge \tan c) \le \frac{\mathbb{E} \arctan Y_1}{c} <1
$$
Thus $P(\sup X_n < \tan c) = 1-P(\sup X_n \ge \tan c)>0$. Thus there is a nonzero probability that $X_n$ is bounded. Since $X_n$ is increasing, this implies that there is a nonzero probability that $\ilim n X_n$ converges.
\end{proof}
This allows us to prove case 2, though the construction of an upper bound is fairly involved.
\begin{prop2}If $1\le a$ and $ b \in (e^{1/e},\infty)$:$$
\mathbb{E}\inf\{n: A_n \le e^{\frac 1 { e\star n}}\} < \infty\hspace{10pt}\Longleftrightarrow\hspace{10pt}\ilim n T_n <\infty \hspace{6pt}\mathrm{a.s.}$$
\end{prop2}
\begin{proof} Let $$\mathcal{N} =\inf\{n: A_n \le b^{\frac 1 { b\star n}}\}$$
We start by proving that \begin{equation}\label{weaker}
\mathbb{E}\mathcal{N} < \infty\hspace{10pt}\Longleftrightarrow\hspace{10pt}\ilim n T_n <\infty \hspace{6pt}\mathrm{a.s.}\end{equation}
and then complete the proof by showing that $|\mathcal{N}-\inf\{n: A_n \le e^{\frac 1 { e\star n}}\}|$ is bounded by a constant dependent only on $b$.
Before proving anything, let's break down $\mathcal{N}$'s expectation into something slightly more manageable. Let $p_n = P\left(A_n> b^{\frac1{b\star n}}\right)$. Observe that \begin{eqnarray}
\mathbb{E} \mathcal{N} &=& \sum_{k=1}^\infty P(\mathcal N = k)k = \sum_{k=1}^\infty P(\mathcal{N} \ge k)\nonumber\\
&=&\sum_{k=1}^\infty P\left(A_1> b^{\frac1{b\star 1}} \text{ and }A_2> b^{\frac1{b\star 2}} \text{ and }A_3> b^{\frac1{b\star 3}}\hspace{3pt}\cdots\text{ and } A_{k-1}>b^{\frac1{b\star {(k-1)}}}\right)\nonumber\\
&=&\sum_{k=1}^\infty \prod_{j=1}^{k-1} p_j \label{product}
\end{eqnarray}
so $\mathbb{E} \mathcal{N}<\infty$ is equivalent to summability of $\prod\limits_{j=1}^{k-1} p_j$. Now, to prove (\ref{weaker}):\\
{\textbf{($\mathbf\Longrightarrow$)}} Define a triangular array of random variables $N_{\ell,n}$ on $\mathbb{N}$ with $0\le\ell\le n$ as follows: $N_{0,n}$ are i.i.d. and independent from $\{A_i\}_{i\in \mathbb{Z}}$, each distribution $$
P(N_{0,n}=m) = \frac{\prod\limits_{j=1}^{m-1} p_j}{\sum\limits_{k=1}^\infty \prod\limits_{j=1}^{k-1} p_j}
$$
and for $\ell>0$ recursively defined by $$
N_{\ell+1,n} = \begin{cases}1 & A_{n-\ell} \le b^{\frac1{b\star N_{\ell,n}}}\\ 1+N_{\ell,n} & \text{otherwise}\end{cases}
$$
We will ultimately use $b\star N_{n,n}$ as our bound on $T_n$. First, we show that $N_{\ell,n}$ has identical distribution for all $\ell\in \{0,1,\dots,n\}$ by inducting on $\ell$. Suppose $$
P(N_{\ell,n} = m) = \frac{\prod\limits_{j=1}^{m-1} p_j}{\sum\limits_{k=1}^\infty \prod\limits_{j=1}^{k-1} p_j}
$$
for all $m$. This is true by definition for $\ell = 0$. When $m=1$: \begin{eqnarray}
&&P(N_{\ell+1,n}=1) = P(A_{n-\ell}\le b^{\frac1{b\star N_{\ell,n}}})= \sum_{k=1}^\infty P(N_{\ell,n} = k)P(A_{n-\ell}\le b^{\frac1{b\star N_{\ell,n}}}\mid N_{\ell,n}=k) \nonumber\\
&=& \sum_{k=1}^\infty P(N_{\ell,n}=k) (1-p_k) =\sum\limits_{k=1}^\infty\frac{(1-p_k) \prod\limits_{j=1}^{k-1}p_j}{\sum\limits_{k=1}^\infty \prod\limits_{j=1}^{k-1} p_j} = \frac{\sum\limits_{k=1}^\infty \prod\limits_{j=1}^{k-1} p_j - \sum\limits_{k=1}^\infty p_k \prod\limits_{j=1}^{k-1} p_j}{\sum\limits_{k=1}^\infty \prod\limits_{j=1}^{k-1} p_j}\nonumber\\ &=& \frac{\sum\limits_{k=1}^\infty \prod\limits_{j=1}^{k-1} p_j - \sum\limits_{k=1}^\infty \prod\limits_{j=1}^{k} p_j}{\sum\limits_{k=1}^\infty \prod\limits_{j=1}^{k-1} p_j} = \frac{1+\sum\limits_{k=1}^\infty \prod\limits_{j=1}^{k} p_j - \sum\limits_{k=1}^\infty \prod\limits_{j=1}^{k} p_j}{\sum\limits_{k=1}^\infty \prod\limits_{j=1}^{k-1} p_j} = \frac{1}{\sum\limits_{k=1}^\infty \prod\limits_{j=1}^{k-1} p_j} \nonumber
\end{eqnarray}
For $m>1$, we again have $P(N_{\ell+1,n} = m) = \sum_{k=1}^\infty P(N_{\ell,n} = k)P(N_{\ell+1,n} = m | N_{\ell,n} = k)$. But in these cases, note that $P(N_{\ell+1,n} = m | N_{\ell,n} = k) = 0$ unless $k=m-1$. Hence we have \begin{eqnarray}
P(N_{\ell+1,n} = m) &=& P(N_{\ell,n} = m-1)P(N_{\ell+1,n} = m | N_{\ell,n} = m-1)\nonumber\\ &=& P(N_{\ell,n} = m-1)p_{m-1}=\frac{\prod\limits_{j=1}^{m-2}p_j}{\sum\limits_{k=1}^\infty \prod\limits_{j=1}^{k-1} p_j}(p_{m-1}) = \frac{\prod\limits_{j=1}^{m-1}p_j}{\sum\limits_{k=1}^\infty \prod\limits_{j=1}^{k-1} p_j}\nonumber
\end{eqnarray}
which completes the induction step.
To apply Lemma \ref{bounded} then it suffices to show that $$
T_n \le b\star N_{n,n}
$$
because $N_{n,n}$ all have the same distribution, and $T_n$ is a nondecreasing sequence. In this case, we conclude $P(\ilim n T_n \text{ finite})$. Kolmogorov's 0-1 law implies that it converges almost surely because convergence is a tail event. Define $T_{n}(\ell)$ recursively by $T_n(0) = 1$ and $$
T_n(\ell) = (A_{n-\ell+1})^{T_n(\ell-1)}
$$
Then $T_n(n) = A_1^{A_2^{\iddots^{A_n}}} = T_n$. We can prove inductively (on $\ell$) that $T_n(\ell) \le b\star N_{\ell,n}$. This is trivial for $\ell=0$. Then observe:$$
T_n(\ell+1) = (A_{n-\ell})^{T_n(\ell)}\le (A_{n-\ell})^{b\star N_{\ell,n}}
$$
If $A_{n-\ell} \le b^{\frac1{b\star N_{\ell,n}}}$ then by definition $N_{\ell+1,n} =1$ and we also so $T_n(\ell+1) \le b = b\star N_{\ell+1,n}$. Otherwise, we have $N_{\ell+1,n} = N_{\ell,n} +1$, but still $A_{n-\ell}\le b$, and hence $T_{n}(\ell+1) \le b^{b\star N_{\ell,n}} = b\star N_{\ell+1,n}$. Thus we have for all $\ell$:$$
T_n(\ell) \le b\star N_{\ell,n}
$$
Thus $T_n$ is a nondecreasing sequence with upper bound $b\star N_{n,n}$, which has constant distribution in $n$, and therefore Lemma \ref{bounded} implies that $T_n$ converges almost surely.\\
{\textbf{($\mathbf\Longleftarrow$)}} We suppose that $T_n$ converges almost surely. Let $T_\infty$ be the distribution of the limit and suppose $S$ has the same distribution as $T_\infty$ but is independent from the sequence of $A_n$'s. Then we define $$
S_n = A_n^{A_{n-1}^{\iddots^{A_1^{S}}}}
$$
We have immediately that $S_n \stackrel{d}{=} S_0 = S$ for all $n$. Define $U_n = \min\{U\in \mathbb{N} \mid (b\star U)^3> S_n\}$ and choose $K\in \mathbb{N}$ such that $b\star(K-1) \ge 3$ and such that $P(U_n = K+1)>0$. This exists because $\ilim k b\star k =\infty$, and the support of $U_n$'s distribution is unbounded. Then we define $L_n$ recursively by $L_0 = 0$ and $$
L_{n+1} = \begin{cases}\max\left\{L \mid L\in \{0,\dots,K\} \text{ and } (b\star L)^3 \le S_{n+1} \right\} & L_n<K\\
1+L_n & L_n \ge K \text{ and }A_{n+1}>b^{\frac1{b\star(L_n-1)}}\\
0 & L_n \ge K \text{ and }A_{n+1}\le b^{\frac1{b\star(L_n-1)}}\end{cases}
$$
We claim $L_n\le U_n$ for all $n$, which can be proven by inducting $n$. The base case is trivial as $L_0 = 0 \le 1\le U_0$. It is similarly trivial that $L_{n+1}\le U_{n+1}$ when $L_n\ge K$ and $A_{n+1} \le b^{\frac1{b\star(L_n-1)}}$. If $L_n<K$, then $$
(b\star L_{n+1})^3\le S_{n+1} < (b\star U_{n+1})^3
$$
from the definitions, which implies $L_{n+1}\le U_{n+1}$. In the remaining case, we claim that $U_{n+1}\ge U_n+1$. Observe that if $U_n \ge K$ and $A_{n+1} > b^{\frac1{b\star(U_n-1)}}$, then \begin{eqnarray}
(b\star (U_n-1))^3 &<& S_n\nonumber\\
b^{\frac{(b\star (U_n-1))^3}{b\star(U_n-1)}} < (A_{n+1})^{(b\star (U_n-1))^3} &<& (A_{n+1})^{S_n} = S_{n+1}\nonumber\\
b^{(b\star (U_n-1))(b\star (U_n-1))} &<& S_{n+1}\nonumber\\
\left(b^{b\star (U_n-1)}\right)^{b\star (U_n-1)} &<& S_{n+1}\nonumber\\
(b\star U_n)^{b\star (K-1)}\le(b\star U_n)^{b\star (U_n-1)} &<& S_{n+1}\nonumber\\
(b\star U_n)^3 &<&S_{n+1}\nonumber
\end{eqnarray}
This implies that $U_{n+1}\ge U_n+1$. Therefore, if $U_n\ge L_n$ and $L_n\ge K$ and $A_{n+1} > b^{\frac1{b\star(L_n-1)}}$. Then $U_n\ge L_n \ge K$ and $A_{n+1}> b^{\frac1{b\star(L_n-1)}}\ge b^{\frac1{b\star(U_n-1)}}$, so as we have just shown $U_{n+1} \ge U_n+1$ and hence $$
U_{n+1} \ge U_n+1\ge L_n + 1 = L_{n+1}
$$
in this case. Therefore we have by induction that $L_n\le U_n$ for all $n$.\\
The distribution of $L_n$ will be somewhat similar to that of $N_{\ell,n}$ from the first part of the proof. Observe that for $m\in\mathbb{N}$ we have $P(L_n = K+m\mid L_{n-1} = j) = 0$ except when $j=K+m-1$. Hence\begin{eqnarray}
P(L_n = K+m) &=& \sum\limits_{j=0}^\infty P(L_{n-1} = j)P(L_n=K+m\mid L_{n-1} = j) \nonumber\\
&=& P(L_{n-1} = K+m-1)P(L_n=K+m\mid L_{n-1} = K+m-1)\nonumber\\
&=& P(L_{n-1} = K+m-1)P\left(A_n > b^{\frac1{b\star(K+m-1-1)}}\right)\nonumber\\
&=& P(L_{n-1} = K+m-1) p_{K+m-2}\nonumber
\end{eqnarray}
and thus \begin{eqnarray}
P(L_n = K+m) &=& P(L_{n-1} = K+m-1) p_{K+m-2}\nonumber\\ &=& P(L_{n-2} = K+m-2) p_{K+m-3}p_{K+m-2}\nonumber\\
&=& P(L_{n-m}=K) \prod_{j=K-1}^{K+m-2} p_j\nonumber
\end{eqnarray}
Thus we have $$
P(L_n\ge K) \ge P(L_n\in [K,K+n]) = \sum_{m=0}^n P(L_{n-m}=K) \prod_{j=K-1}^{K+m-2} p_j
$$
Observe that $L_n=K$ is equivalent to $(b\star K)^3\le S_n < (b\star (K+1))^3$, which in turn is equivalent to $U_n=K+1$. Therefore $$
P(L_n\ge K) \ge \sum_{m=0}^n P(L_{n-m}=K) \prod_{j=K-1}^{K+m-2} p_j = \sum_{m=0}^n P(U_{n-m}=K+1) \prod_{j=K-1}^{K+m-2} p_j
$$
Now observe that $U_n$ have the same distribution for all $n$. Therefore, $$
P(L_n\ge K) \ge P(U_1=K+1) \sum_{m=0}^n \prod_{j=K-1}^{K+m-2} p_j
$$
because $U_n\ge L_n$ we even get $$
P(U_1\ge K) = P(U_n\ge K) \ge P(L_n\ge K) \ge P(U_1=K+1) \sum_{m=0}^n \prod_{j=K-1}^{K+m-2} p_j
$$
and thus $$
\sum_{m=0}^n \prod_{j=K-1}^{K+m-2} p_j\le \frac{P(U_1\ge K)}{P(U_1 = K+1)} < \infty
$$
for all $n$ and hence $$
\sum_{m=0}^\infty \prod_{j=K-1}^{K+m-2} p_j \le \frac{P(U_1\ge K)}{P(U_1 = K+1)} < \infty
$$
This essentially completes the proof, but some minor manipulations are left:\begin{eqnarray}
\mathbb{E} \mathcal{N} &=& \sum_{m=1}^\infty \prod_{j=1}^m p_j\nonumber\\ &=& \sum_{m=1}^{K-3} \prod_{j=1}^{m} p_j + \sum_{m=K-2}^{\infty} \prod_{j=1}^{m} p_j \nonumber\\
&=& \sum_{m=1}^{K-3} \prod_{j=1}^{m} p_j + \sum_{m=0}^{\infty} \prod_{j=1}^{m+K-2} p_j\nonumber\\
&=& \sum_{m=1}^{K-3} \prod_{j=1}^{m} p_j + \sum_{m=0}^{\infty} \prod_{j=1}^{K-2}p_j\prod_{j=K-1}^{m+K-2} p_j\nonumber\\
&=& \sum_{m=1}^{K-3} \prod_{j=1}^{m} p_j + \left(\prod_{j=1}^{K-2}p_j\right)\sum_{m=0}^{\infty} \prod_{j=K-1}^{m+K-2} p_j <\infty\nonumber
\end{eqnarray}
It remains to prove the claim that $|\mathcal{N}-\inf\{n: A_n \le e^{\frac 1 { e\star n}}\}|$ is bounded. To do this, we apply this lemma on the growth rate of power towers:
\begin{lemma}\label{growth}
Suppose $s_n$, $t_n$ are two sequences on $(e^{\frac1e},\infty)$ with bounds \begin{eqnarray*}
s_n \le u\star n &\hspace{6pt}\mbox{and}\hspace{6pt}& t_n \le u\star n\\
s_n \ge c &\hspace{6pt}\mbox{and}\hspace{6pt}& t_n \ge c
\end{eqnarray*}
for some $u,c>e^{\frac1e}$. \\
Let $T_n = t_n^{t_{n-1}^{{\iddots^{t_1}}}}$ and $S_n = s_n^{\iddots^{s_1}}$. Then there exists a constant $k\in \mathbb{N}$ such that $$
S_{n-k} \le T_n \le S_{n+k}
$$
for all $n >k$.
\end{lemma}
As a consequence, one can see that for any $b>e^{1/e}$, there exists $k\in\mathbb{N}$ such that $$
b^{\frac1{b\star(n+k)}}\le e^{\frac1{e\star n}} \le b^{\frac1{b\star(n-k)}}
$$
whence we obtain $|\mathcal{N}-\inf\{n: A_n \le e^{\frac 1 { e\star n}}\}| = |\inf\{n: A_n \le b^{\frac 1 {b\star n}}\}-\inf\{n: A_n \le e^{\frac 1 { e\star n}}\}| \le k$
as desired. This completes the proof of Theorem \ref{main} case 2.\qed\\
\textsc{Proof of Lemma \ref{growth}.} We first show the result for $t_n = u$. Pick $\tau > 1$. Then choose $k_\tau\in\mathbb{N}$ large enough such that $$
u\star(k_\tau+1) > s_1^\tau
$$
and that the following holds for all $j\ge k_\tau$: $$
\frac{(u\star j)^{1-\frac1\tau}}{u\star(j-1)} > \tau
$$
Such a $k_\tau$ exists because the LHS of both of these inequalities diverges to infinity as $k_\tau$ goes to infinity, and the RHS is constant in $k_\tau$.\\
We will show inductively that \begin{equation}\label{base1}
u\star n > S_{n-k_\tau}^\tau
\end{equation}
for all $n>k_\tau$. We already have the bases case, i.e. $n=k+1$. Suppose that (\ref{base1}) holds for $n$. Then observe:\begin{eqnarray*}
\frac{(u\star n)^{1-\frac1\tau}}{u\star(n-1)} &>& \tau\\
\frac{(u\star n)^{1-\frac1\tau}}{u\star(n-k_\tau)} &>& \tau\\
\frac{u\star n}{u\star (n-k_\tau)} &>& \tau \left(u\star n\right)^{\frac1\tau}\\
\frac{u\star n}{u\star (n-k_\tau)} &>& \tau S_{n-k_\tau}\\
(\ln u) ({u\star n}) &>& ({u\star (n-k_\tau)})(\ln u) \tau S_{n-k_\tau}\\
\ln\left({u\star (n+1)}\right) &>& \ln \left({u\star (n-k_\tau+1)}\right) \tau S_{n-k_\tau}\\
u\star (n+1) &>& \left(\left({u\star (n-k_\tau+1)}\right)^{S_{n-k_\tau}}\right)^\tau\\
u\star (n+1) &>& \left(\left(s_{n-k_\tau+1}\right)^{S_{n-k_\tau}}\right)^\tau\\
u\star (n+1) &>& \left(S_{n-k_\tau+1}\right)^\tau
\end{eqnarray*}
Since $\tau>1$, we therefore have $$
u\star n > S_{n-k_\tau}
$$
for all $n$.\\
For the other inequality, pick $\beta<\min\{\frac{\ln c}{\ln u},1\}$, then chose $k_\beta\in\mathbb{N}$ large enough so that $$
1 = u\star 0 < \beta S_{k_\beta}
$$
and $$
\frac{-\ln\beta}{\ln c - (\ln u) \beta} < S_{k_\beta}
$$
Then we show inductively that \begin{equation}\label{base2}
u\star n < \beta S_{n+k_\beta}
\end{equation}
for all $n$. We have the base case ($n=0$) already. Note that the second inequality implies $$
(\ln u)\beta S_{n+k_\beta} < \ln \beta + (\ln c) S_{n+k_\beta}
$$
for all $n\ge 0$. Assuming $u\star n < \beta S_{n+k_\beta}$, this implies \begin{eqnarray*}
(\ln u)(u\star n) &<& \ln \beta + (\ln c) S_{n+k_\beta}\\
u\star (n+1) &<& \beta c^{S_{n+k_\beta}}\\
u\star (n+1) &<& \beta (s_{n+k_\beta+1})^{S_{n+k_\beta}}\\
u\star (n+1) &<& \beta S_{n+k_\beta+1}
\end{eqnarray*}
thus we have that (\ref{base2}) holds for all $n\ge 0$. Since $\beta< 1$, we therefore have that $$
u\star n < S_{n+k_\beta}
$$
for all $n\ge 0$.\\
Letting $k=\max(k_\tau,k_\beta)$, we find that $$
S_{n-k} <u\star n < S_{n+k}
$$
for all $n>k$, as desired.\\
Now to prove the general case. Suppose $s_n$ and $t_n$ are two sequences satisfying the theorem's bounds. As we have shown, there exist $k_1,k_2\in \mathbb{N}$ such that \begin{eqnarray*}
T_{n-k_1}<u\star n < T_{n+k_1} &\hspace{6pt}\text{and}\hspace{6pt}& S_{n-k_2}<u\star n < S_{n+k_2}
\end{eqnarray*}
for all $n>\max(k_1,k_2)$. Thus we have $$
S_{n-k_2-k_1} < u\star(n-k_1) < T_n < u\star(n-k_2) < S_{n+k_1+k_2}
$$
so choosing $k=k_1+k_2$ we obtain the desired result.
\end{proof}
\subsection{Cases 3 and 4 ($a<1$)} Because $a<1$, $T_n$ is not a monotonic sequence. A different approach is needed. Our proofs hinge on the following theorem.
\begin{theorem}\label{mono}
Let $f_i:[a,b] \rightarrow [a,b]$ be a sequence of i.i.d. randomly distributed non-decreasing functions, where $[a,b]$ is any totally ordered space containing its minimum and maximum. Let $$
F_n(x) = (f_0 \circ f_1 \circ \cdots \circ f_n)(x)
$$
If $P(f_0(a) \ge f_1(b))>0$ then $F_n(x)$ almost surely converges uniformly to a constant function.
\end{theorem}
Unlike the bulk of previous work on iterated random functions, this theorem makes no continuity assumptions. Furthermore, unlike Lemma \ref{bounded} and the ``contracting on average" results in Diaconis and Freedman, this theorem has no obvious non-probabilistic analogue. It does bring to mind the fact that any non-decreasing function mapping a closed interval to itself must have a fixed point (a consequence of Tarski's lattice-theoretical fixed point theorem \cite{article:3}), but Tarski's theorem has no implications about the dynamics of such a function. Indeed, the iterates of a non-decreasing function of a closed interval need not converge to a fixed point in general.
\begin{proof}Observe that $F_n(a)$ must form a non-decreasing sequence because $f_n(a)\ge a$, and similarly, $F_n(b)$ forms a non-increasing sequence, hence both of these converge almost surely. Call $F_\infty(a)$ and $F_\infty(b)$ their respective limits. Let $f_\omega$ and $f_{\omega+1}$ be i.i.d. with the same distribution as the $f_i$'s but independent of that sequence. We let $X_n = F_n(f_\omega(a))$ and $Y_n = F_n(f_{\omega+1}(b))$. Note that $X_n \stackrel{d}{=} F_{n+1}(a)$ and $Y_n \stackrel{d}{=} F_{n+1}(b)$. We thus have $X_n\stackrel{d}{\rightarrow} F_\infty(a)$ and $Y_n\stackrel{d}{\rightarrow} F_\infty(b)$. We furthermore have convergence in probability: $X_n \ge F_n(a)$, hence $F_\infty(a) - X_n \ge 0$ and $\mathbb{E}(F_\infty(a) - X_n)\rightarrow 0$, which implies $X_n\stackrel{P}{\rightarrow} F_\infty(a)$. Similarly $Y_n\stackrel{P}{\rightarrow} F_\infty(b)$. \\
Since $F_n$ is always nondecreasing, we have \begin{equation*}
P(Y_n \le X_n) = P{\big[}F_n(f_{\omega+1}(b)) \le F_n(f_{\omega}(a)){\big]} \ge P\left(f_{\omega+1}(b) \le f_{\omega}(a)\right) > 0
\end{equation*}
Hence we have a constant, nonzero lower bound on $P(Y_n\le X_n)$. By convergence in probability of $X_n$ and $Y_n$ to $F_\infty(a)$ and $F_\infty(b)$, respectively, we can conclude the same inequality for their limits $$P(F_\infty(b) \le F_\infty(a)) \ge P(f_{\omega+1}(b) \le f_{\omega}(a)) > 0$$
It is clear from the definition that $F_\infty(b) \ge F_\infty(a)$ almost surely, so this implies that there is a nonzero probability $F_\infty(b) = F_\infty(a)$. By monotonicity of $F_n$ for each $n$, $F_\infty(b) = F_\infty(a)$ is equivalent to $F_n$ converging uniformly to a constant function. Thus, we have a nonzero probability of $F_n$ converging to a constant function. Since convergence of $F_n$ to a constant function is a tail event, this implies that the convergence is almost sure since its probability is nonzero.\end{proof}
We will apply Theorem \ref{mono} to both cases 3 and 4 of Theorem \ref{main}.
\begin{prop2}
Let $G:[0,1]\rightarrow[0,1]$ be defined by $$
G(x) =\begin{cases} x& x\ge e^{-e}\\\exp\left(W\left(\frac1{\ln x}\right)\exp\left(-\frac1{W\left(\frac1{\ln x}\right)}\right)\right) & x<e^{-e}\end{cases}
$$
If $b\le1$ and $a<G(b)$, then $T_n$ converges almost surely. Conversely, if $b<e^{-e}$ and $a\ge G(b)$, then $T_n$ diverges by oscillation, with the even an odd subsequences converging to distinct limits.
\end{prop2}
\begin{proof}
Before diving into the proof, we note that for $c\in[0,1]$ function $x\to c^x$ is a non-increasing function from $[0,1]$ to itself, so we can restrict all our attention to this interval as $T_n$ will always be in that interval, and furthermore either $T_n$ converges in the limit, or it diverges by oscillation. We also have that $T_{2n}$ is a non-increasing sequence, and $T_{2n+1}$ is a non-decreasing sequence, which follows from the fact that composing two exponential maps with base less than 1 forms a non-decreasing function.
Now, define the alternating power tower function $\at n(x,y)$ recursively by $\at 0(x,y)=1$ and $$
\at n(x,y) = x^{\at {n-1}(y,x)}
$$
so called because it makes a power tower that alternates between $x$ and $y$, e.g.$$
\at 5(x,y) = x^{y^{x^{y^x}}}
$$
These have the monotonicity properties that for each $n$, $\at n (x,y)$ is increasing in $x$ and decreasing in $y$. Furthermore, for fixed $x,y$, we have that $\at{2n-1}(x,y)$ is an increasing sequence and $\at{2n}(x,y)$ is a decreasing sequence, so we can also define the functions\begin{eqnarray}
\at{\mathrm{e}}(x,y) &=& \ilim n \at{2n}(x,y)\nonumber\\
\at{\mathrm{o}}(x,y) &=& \ilim n \at{2n-1}(x,y)\nonumber
\end{eqnarray}
which obey the relations $$
\mathrm{\textsc{at}}_{\mathrm{e}}(x,y)=x^{\mathrm{\textsc{at}}_{\mathrm{o}}(y,x)} \hspace{24pt} \mathrm{\textsc{at}}_{\mathrm{o}}(x,y)=x^{\mathrm{\textsc{at}}_{\mathrm{e}}(y,x)}
$$
and furthermore, both are fixed points of the map $t\to x^{y^t}$. In fact, $\mathrm{\textsc{at}}_{\mathrm{e}}(x,y)$ is the largest such fixed point, and $\mathrm{\textsc{at}}_{\mathrm{o}}(x,y)$ is the smallest.
As we are iterating functions on a closed interval, we care a lot about fixed points, so it will also be useful to define $C(x)$ for $x\in[0,1]$ to be the unique real solution to $C=x^C$. $C(x)$ is monotonically increasing because it is the inverse function of $x^\frac1x$.
The following lemma relates the functions $\mathrm{\textsc{at}}_{\mathrm{e}},\mathrm{\textsc{at}}_{\mathrm{o}},C$ and $G$.
\begin{lemma}\label{g} $G(x)$ has the following properties:
\begin{enumerate}
\item $G(x) \le x$
\item $G(x) = \inf\{y\in[0,1]\mid \at{\mathrm{o}} (x,y) \le \at{\mathrm{e}}(y,x)\}$.
\item If $G(x)\le y \le x < e^{-e}$ then $\mathrm{\textsc{at}}_{\mathrm{o}}(x,y) < C(y)$.
\end{enumerate}
\end{lemma}
\begin{proof}Part 1 is shown by elementary computation. It is trivial for $x\ge e^{-e}$. For $x\in(0,e^{-e})$, let $w=W\left(\frac1{\ln x}\right)$, or equivalently $x=\exp(\frac1w e^{-w})$. This corresponds to $w\in(-1,0)$. Then we compute \begin{eqnarray}
\exp\left(W\left(\frac1{\ln x}\right)\exp\left(-\frac1{W\left(\frac1{\ln x}\right)}\right)\right) &=& x\nonumber\\
\exp\left(w\exp\left(-\frac1w\right)\right) &=& \exp(\frac1w e^{-w})\nonumber\\
w^2 &=& e^{\frac1w-w}\nonumber
\end{eqnarray}
which fails for all $w\in(-1,0)$. Thus $G(x)\ne x$ for all $x\in(0,e^{-e})$, so by continuity either $x<G(x)$ or $x>G(x)$ on this interval. Computation shows that it is the latter case, and hence $G(x)\le x$ for all $x$.
To show the remaining parts, define $H(x)=\inf\{y\in[0,1]\mid \mathrm{\textsc{at}}_{\mathrm{o}} (x,y) \le C(y)\}$. Note that $H$ is well-defined because $\mathrm{\textsc{at}}_{\mathrm{o}}(x,1) = x \le 1=C(1)$ so the set is always nonempty. Claim 2 is equivalent to $H(x)=G(x)$ because \begin{eqnarray}
&&\inf\{y \mid \mathrm{\textsc{at}}_{\mathrm{o}}(x,y) \le \mathrm{\textsc{at}}_{\mathrm{e}}(y,x)\} = \inf\{y \mid \mathrm{\textsc{at}}_{\mathrm{o}}(x,y) \le y^{\mathrm{\textsc{at}}_{\mathrm{o}}(x,y)}\} \nonumber\\&=& \inf\{y\mid\mathrm{\textsc{at}}_{\mathrm{o}}(x,y)\le C(y)\} = H(x)\label{h}
\end{eqnarray}
In fact, because $\mathrm{\textsc{at}}_{\mathrm{o}}(x,y)$ is nonincreasing in $y$ and $C(y)$ is increasing in $y$, we have that for all $y\ge x$:$$
\mathrm{\textsc{at}}_{\mathrm{o}}(x,y)\le \mathrm{\textsc{at}}_{\mathrm{o}}(x,x) \le \mathrm{\textsc{at}}_{\mathrm{e}}(x,x) \le \mathrm{\textsc{at}}_{\mathrm{e}}(y,x)
$$
Hence for all $x\in[0,1]$, we have that $H(x) \le x$.
We first show part 2 when $x>e^{-e}$. Because $G(x)=x$ in this range and $H(x)\le x$, it suffices to show that $H(x)\ge x$ for $x>e^{-e}$. Note that $x\in(e^{-e},1)$ implies that the map $t\to x^{x^t}$ has exactly one fixed point. Therefore, for all $y<x$, we have $$
\mathrm{\textsc{at}}_{\mathrm{e}}(y,x) =y^{x^{\mathrm{\textsc{at}}_{\mathrm{e}}(y,x)}} < x^{x^{\mathrm{\textsc{at}}_{\mathrm{e}}(y,x)}}\le x^{x^{\mathrm{\textsc{at}}_{\mathrm{e}}(x,x)}} = \mathrm{\textsc{at}}_{\mathrm{e}}(x,x) = \mathrm{\textsc{at}}_{\mathrm{o}}(x,x)\le\mathrm{\textsc{at}}_{\mathrm{o}}(x,y)
$$
Thus $H(x)\ge x$ when $x >e^{-e}$, and claim 2 is proven for this range of $x$.
Next, we deal with the case of $x<e^{-e}$, and show that here $H(x) = G(x)$.
When $x<e^{-e}$ one can see from the oscillating nature of the limit of $n\to x\star n$ that $t\to x^{x^t}$ has at least two attracting fixed points, since each of the limit points of $x\star n$ are attracting fixed points of $t\to x^{x^t}$. We also have the one point $C(x)$ is also a fixed point of $t\to x^{x^t}$, but this is a repelling fixed point. Some elementary calculus shows that for any $x,y\in[0,1]$, the function $t\to x^{y^t}$ has only one inflexion point, and therefore can have at most three fixed points in $\mathbb{R}$. Thus, we conclude that $x^{x^t}$ has exactly three distinct fixed points in $[0,1]$, given by $\mathrm{\textsc{at}}_{\mathrm{e}}(x,x),$ $C(x)$, and $\mathrm{\textsc{at}}_{\mathrm{o}}(x,x)$, and they satisfy the inequality $$
\mathrm{\textsc{at}}_{\mathrm{o}}(x,x) < C(x) < \mathrm{\textsc{at}}_{\mathrm{e}}(x,x)
$$
For $y<x$ in a small enough neighborhood of $x$, we will similarly have that $x^{y^t}$ and $y^{x^t}$ have exactly 3 fixed points in $[0,1]$. Qualitatively, the picture looks like Figure \ref{gpc}.
\begin{figure}[b]
\centering
\includegraphics[scale=0.50]{nice_picture.pdf}
\caption{Comparison of $x^{y^t}$, $y^{x^t}$, and $x^{x^t}$ for $y<x$.}\label{gpc}
\end{figure}
We have for $y\le x<e^{-e}$, $\mathrm{\textsc{at}}_{\mathrm{e}}(x,y) \ge \mathrm{\textsc{at}}_{\mathrm{e}}(x,x) > C(x)$.
We claim now $y=G(x)$ and $t=\exp\left(\frac1{W\left(\frac1{\ln x}\right)}\right)$ is the unique solution to system of equations \begin{eqnarray}
x^{y^t} &=& t\nonumber\\
(\ln x)(\ln y) x^{y^t} y^t &=& 1 \label{eqns}
\end{eqnarray}
such that $t\le C(x)$. We will then show that $y=H(x)$ and $t=\mathrm{\textsc{at}}_{\mathrm{o}}(x,H(x))$ also satisfies this system and satisfies $t\le C(x)$, so by uniqueness we will conclude $G(x)=H(x)$.
The second equation of (\ref{eqns}) is equivalent to $(\ln (x^{y^t}))(\ln y) x^{y^t} = 1$. Substituting $x^{y^t}$ with $t$, we can solve for $y$ as $y =\exp(\frac1{t\ln t})$. This can then be substituted into the first equation:\begin{eqnarray}
x^{y^t} &=& t\nonumber\\
x^{e^{\frac1{\ln t}}} &=& t\nonumber\\
\frac1{\ln t} e^{\frac1{\ln t}} &=& \frac1{\ln x}\nonumber
\end{eqnarray}
Because $\frac1{\ln x}\in (-\frac1e,0)$, this has two real solutions for $t$, given by the two real branches of the Lambert $W$ function. The principle branch maps $(-\frac1e,0)$ to $(-1,0)$ and the other branch maps it to $(-\infty,-1)$. However, $\frac1{\ln t}<-1$ would imply that $t > \frac1e > C(x)$, hence the assumption that $t\le C(x)$ forces us to solve using the principle branch and obtain $$
\frac1{\ln t} = W\left(\frac{1}{\ln x}\right)
$$
or $$
t = \exp\left(\frac1{W\left(\frac{1}{\ln x}\right)}\right)
$$
Using $y=\exp(\frac1{t\ln t})$, we conclude $y=G(x) = \exp\left(W\left(\frac1{\ln x}\right)\exp\left(-\frac1{W\left(\frac1{\ln x}\right)}\right)\right)$, showing that this does in fact satisfy the system. We must still show $t\le C(x)$, which is stronger than $t\le \frac1e$. We note that we certainly cannot have any fixed point of $x^{y^t}$ between $C(x)$ and $\mathrm{\textsc{at}}_{\mathrm{e}}(x,x)$, because for $t$ in this range we have $x^{y^t} > x^{x^t} > t$, thus either $t\le C(x)$ or $$t\ge \mathrm{\textsc{at}}_{\mathrm{e}}(x,x)$$
However, some elementary computation shows that $x^{x^\frac1e}$ is minimized at $x=e^{-e}$, implying that $x^{x^{\frac1e}} > \frac1e$. Since $C(x)<\frac1e$, this implies that $\frac1e\in[C(x),\mathrm{\textsc{at}}_{\mathrm{e}}(x,x)]$, we conclude $\mathrm{\textsc{at}}_{\mathrm{e}}(x,x)\ge\frac1e$, and therefore we cannot have $t\ge \mathrm{\textsc{at}}_{\mathrm{e}}(x,x)$, hence $t\le C(x)$, as claimed, and we conclude that in fact \begin{eqnarray}
t &=& \exp\left(\frac1{W\left(\frac{1}{\ln x}\right)}\right)\nonumber\\
y &=& \exp\left(W\left(\frac1{\ln x}\right)\exp\left(-\frac1{W\left(\frac1{\ln x}\right)}\right)\right)\nonumber
\end{eqnarray}
is the unique solution to the system of equations (\ref{eqns}) such that $t\le C(x)$.
In order to show that $G(x) = H(x)$, we must show that for $t =\exp\left(\frac1{W\left(\frac{1}{\ln x}\right)}\right) $, we have $t=\mathrm{\textsc{at}}_{\mathrm{o}}(x,G(x))$. Observe that $$
\frac d {dt} x^{y^t} = (\ln x)(\ln y)x^{y^t}y^t
$$
hence the second equation being satisfied means that at the fixed point $t=\exp\left(\frac1{W\left(\frac{1}{\ln x}\right)}\right)$, the derivative of $x^{G(x)^t}$ is $1$. Since this function has only one inflexion point, it can only have one more point with derivative $1$, which in turn implies it can have at most one more fixed point. We observe that $\mathrm{\textsc{at}}_{\mathrm{e}}(x,G(x))$ is also a fixed point, and that $$
\mathrm{\textsc{at}}_{\mathrm{e}}(x,G(x)) \ge \mathrm{\textsc{at}}_{\mathrm{e}}(x,x) > C(x) \ge \exp\left(\frac1{W\left(\frac{1}{\ln x}\right)}\right)
$$
hence these are the two distinct fixed points of $t\to x^{y^t}$. Since $\mathrm{\textsc{at}}_{\mathrm{o}}(x,y)$ is the smallest fixed point of this map, this implies $$\exp\left(\frac1{W\left(\frac{1}{\ln x}\right)}\right) = \mathrm{\textsc{at}}_{\mathrm{o}}(x,G(x))$$
We first show $G(x) \le H(x)$. Because $t\to x^{G(x)^t}$ has only one fixed point in $[\mathrm{\textsc{at}}_{\mathrm{o}}(x,x),C(x)]$ and $x^{G(x)^t}$ is greater than $t$ at the endpoints of this interval, we have for all $t\in[\mathrm{\textsc{at}}_{\mathrm{o}}(x,x),C(x)]$ that $$
x^{G(x)^t } \ge t
$$
Thus for all $y<G(x)$, we will have that in the same interval,$$
x^{y^t} > x^{G(x)^t } \ge t
$$
Since $t\to x^{y^t}$ can have no fixed points in $[\mathrm{\textsc{at}}_{\mathrm{o}}(x,x),C(x)]$ (and for $t<\mathrm{\textsc{at}}_{\mathrm{o}}(x,x)$, we also have no fixed points because here $x^{y^t}>x^{x^t}>t$) this implies that $$
\mathrm{\textsc{at}}_{\mathrm{o}}(x,y) > C(x) > C(y)
$$
for all $y<G(x)$. Therefore, $H(x) \le G(x)$.
We next show $G(x) \ge H(x)$. Observe that $\mathrm{\textsc{at}}_{\mathrm{e}}(G(x),x) \ge C(x)$ because $$
x^{\mathrm{\textsc{at}}_{\mathrm{e}}(G(x),x)} = \mathrm{\textsc{at}}_{\mathrm{o}}(x,G(x)) \le C(x) = x^{C(x)}
$$
Therefore $$
G(x)^{\mathrm{\textsc{at}}_{\mathrm{o}}(x,G(x))} =\mathrm{\textsc{at}}_{\mathrm{e}}(G(x),x) \ge C(x) \ge \mathrm{\textsc{at}}_{\mathrm{o}}(x,G(x))
$$
and hence $\mathrm{\textsc{at}}_{\mathrm{o}}(x,G(x)) \le C(G(x))$. We can conclude that $G(x) \ge H(x)$, which completes the proof of part 2 when $x<e^{-e}$. This also gives us part 3: We cannot have $\mathrm{\textsc{at}}_{\mathrm{o}}(x,G(x)) = C(G(x))$ because $$
\mathrm{\textsc{at}}_{\mathrm{o}}(x,G(x)) = x^{G(x)^{\mathrm{\textsc{at}}_{\mathrm{o}}(x,G(x))}} \ne G(x)^{G(x)^{\mathrm{\textsc{at}}_{\mathrm{o}}(x,G(x))}}
$$
hence $\mathrm{\textsc{at}}_{\mathrm{o}}(x,G(x)) < C(G(x))$. The monotonicity of $\mathrm{\textsc{at}}_{\mathrm{o}}(x,y)$ and $C(y)$ implies that this same inequality holds for all $y\ge G(x)$, which proves part 3 of Lemma \ref{g}.
Thus, we have for $x>e^{-e}$ or $x<e^{-e}$ $$
G(x)=H(x) = \inf\{y\mid \mathrm{\textsc{at}}_{\mathrm{o}}(x,y) \le \mathrm{\textsc{at}}_{\mathrm{e}}(y,x)\}
$$
So we just have to show this equality when $x=e^{-e}$ and we're done. Note that \begin{eqnarray}
G(e^{-e}) &\ge& \exp\left(W\left(\frac1{\ln (e^{-e})}\right) \exp\left(-\frac1{W\left(\frac1{\ln (e^{-e})}\right)}\right)\right)\nonumber\\
&=& \exp\left(W\left(-\frac1{e}\right) \exp\left(-\frac1{W\left(-\frac1{e}\right)}\right)\right) = \exp\left(-1\exp(1)\right) = e^{-e}\nonumber
\end{eqnarray}
so $G(x)$ is continuous at $e^{-e}$. We show that $H(x)$ is non-decreasing: Suppose $z > x$. Then, if $\mathrm{\textsc{at}}_{\mathrm{o}}(x,y) > \mathrm{\textsc{at}}_{\mathrm{e}}(y,x)$, then by monotonicity of $\at \ast (\cdot,\cdot)$, we have $\mathrm{\textsc{at}}_{\mathrm{o}}(z,y) > \mathrm{\textsc{at}}_{\mathrm{e}}(y,z)$. This implies $H(z) \ge H(x)$. Because $H(x) = G(x)$ for $x\ne e^{-e}$, and $G(x)$ is continuous, this implies $H(e^{-e}) = G(e^{-e})$ completing the proof of Lemma \ref{g}.\end{proof}
Returning to the proof of case 3 of Theorem \ref{main}: If $G(b) > a$ then, by part 2 of Lemma \ref{g}, $\mathrm{\textsc{at}}_{\mathrm{o}}(b,a) > \mathrm{\textsc{at}}_{\mathrm{e}}(a,b)$, and in particular $\at {2m-1}(b,a) > \at {2m}(a,b)$ for some $m$. Then we define $$
f_n(x) =(A_{2nm+1})^{(A_{2nm+2})^{\iddots^{(A_{2(n+1)m})^x}}}
$$
We will apply theorem \ref{mono} to show that the sequence of functions $$
f_0\circ f_1\circ\cdots \circ f_n(x)
$$
converges uniformly to a constant function. Observe that $f_n(x)$ is a non-decreasing function from $[0,1]$ to itself, because it is a composition of an even number of functions of the form $x\to c^x$ for $c\le1$, each of which is a nonincreasing function from $[0,1]$ to itself. We need to check that there is a nonzero probability that $f_0(0)\ge f_1(1)$. Because $\at {k}(x,y)$ is continuous, $\at {2m-1}(b,a) > \at {2m}(a,b)$ implies there exists $\epsilon>0$ such that $$
\at {2m-1}(b-\epsilon,a+\epsilon) > \at {2m}(a+\epsilon,b-\epsilon)
$$
Because there is a nonzero probability $A_i \ge b-\epsilon$ and a nonzero probability that $A_i \le a+\epsilon$, we get that there is a nonzero probability that \begin{eqnarray}
f_0(0) &=&(A_{1})^{(A_{2})^{\iddots^{(A_{2m})^0}}}\nonumber\\&=& (A_{1})^{(A_{2})^{\iddots^{(A_{2m-1})}}}\ge \at{2m-1}(b-\epsilon,a+\epsilon)\nonumber\\ &>&\at {2m}(a+\epsilon,b-\epsilon)\ge(A_{4m+1})^{(A_{4m+2})^{\iddots^{(A_{6m})^1}}}=f_2(1)\nonumber
\end{eqnarray}
Consequently, Theorem \ref{mono} implies $$
f_0\circ f_1\circ \cdots \circ f_n
$$
converges to a constant function. Observe that $$
f_0\circ f_1\circ \cdots \circ f_n(x) = (A_1)^{(A_2)^{\iddots^{(A_{2(n+1)m})^x}}}
$$
thus $f_0\circ f_1\circ \cdots \circ f_n(0) = T_{2(n+1)m-1}$ and $f_0\circ f_1\circ \cdots \circ f_n(1) = T_{2(n+1)m}$. This composition converges to a constant function, we have that $$
\lim_{n\rightarrow\infty} T_{2(n+1)m-1} = \lim_{n\rightarrow\infty} f_0\circ f_1\circ \cdots \circ f_n(0) = \lim_{n\rightarrow\infty} f_0\circ f_1\circ \cdots \circ f_n(1) = \lim_{n\rightarrow\infty} T_{2(n+1)m}
$$
We also know that $T_{2n}$ and $T_{2n+1}$ are convergent sequences. Since they have subsequences that converge to the same limit, we conclude that $T_n$ itself converges to a limit.
For the converse, suppose $b<e^{-e}$ and $a\ge G(b)$. We apply part 3 of Lemma \ref{g}: \begin{eqnarray}
\inf\limits_n\left(T_{2n} - T_{2n+1}\right) &\ge& \inf\limits_n\left(\at{2n}(a,b) - \at {2n+1}(b,a)\right) \ge \mathrm{\textsc{at}}_{\mathrm{e}}(a,b) - \mathrm{\textsc{at}}_{\mathrm{o}}(b,a) \nonumber \\&=& a^{\mathrm{\textsc{at}}_{\mathrm{e}}(b,a)} - \mathrm{\textsc{at}}_{\mathrm{o}}(b,a)>a^{C(a)} - C(a) = 0\nonumber
\end{eqnarray}
Hence the even- and odd- indexed subsequences must converge to different limits.
\end{proof}
We can do a similar technique to address the case of $a<1<b$.
\begin{prop2}
If $a<1<b\le\infty$, then $T_n$ converges almost surely.
\end{prop2}
\begin{proof}
Let $i_n$ be the subsequence such that $A_{i_n} < 1$. Then define $$
f_n(t) = (A_{i_{2n}})^{(A_{1+i_{2n}})^{\iddots^{\left(A_{(-1+i_{2n+2})}\right)^t}}}
$$
Then we have $f_n:[0,1]\rightarrow [0,1]$, and furthermore $f_n$ is nondecreasing, because it consists of a composition of increasing functions (all the exponentials with base greater than 1) and exactly two decreasing functions, $t\to (A_{i_{2n}})^t$ and $t\to (A_{i_{2n+1}})^t$. We also have that the sequence of functions $f_n(t)$ are i.i.d. We furthermore note that $f_n$ is a monotonic function from $\mathbb{R}$ to $[0,1]$, so we can extend its domain to $[-\infty,\infty]$ by taking limits. Observe that \begin{eqnarray*}
f_i(\infty)&=& (A_{i_{2n}})^{(A_{1+i_{2n}})^{\iddots^{\left(A_{(-1+i_{2n+2})}\right)^\infty}}} = (A_{i_{2n}})^{(A_{1+i_{2n}})^{\iddots^{\left(A_{i_{2n+1}}\right)^\infty}}}\\& =& (A_{i_{2n}})^{(A_{1+i_{2n}})^{\iddots^{\left(A_{(-1+i_{2n+1})}\right)^0}}} = (A_{i_{2n}})^{(A_{1+i_{2n}})^{\iddots^{\left(A_{(-2+i_{2n+1})}\right)}}}
\end{eqnarray*}
and \begin{eqnarray*}
f_i(-\infty)&=& (A_{i_{2n}})^{(A_{1+i_{2n}})^{\iddots^{\left(A_{(-1+i_{2n+2})}\right)^{-\infty}}}} = (A_{i_{2n}})^{(A_{1+i_{2n}})^{\iddots^{\left(A_{(-2+i_{2n+1})}\right)^0}}}\\& =& (A_{i_{2n}})^{(A_{1+i_{2n}})^{\iddots^{\left(A_{(-3+i_{2n+1})}\right)}}}
\end{eqnarray*}
and we can see in a similar way to the previous lemma that there is an overlap of the distributions of $f_0(\infty)$ and $f_1(-\infty)$, hence by Theorem \ref{mono} we must have that $$
F_n(x)=f_0\circ f_1\circ \cdots \circ f_n(x)
$$
almost surely converges uniformly to a constant function on all of $\mathbb{R}$. Observing that $$
T_n = (A_1)^{{\iddots}^{(A_{i_0-1})^{\left(f_0\circ f_1\circ \cdots \circ f_k\left((A_{i_{2k}})^{(A_{1+i_{2k}})^{\iddots^{\left(A_{n}\right)}}}\right)\right)}}}\in (A_1)^{{\iddots}^{(A_{i_0-1})^{\mathrm{im}(F_n)}}}
$$
it follows that $T_n$ must converge almost surely, because the sequence of intervals $\mathrm{im}(F_n)$ are converging to a single point in $[0,1]$.
\end{proof}
\subsection{Proof of Corollaries}
The corollaries follow trivially from Theorem \ref{main} except in the cases where $b>e^{\frac1e}$ and $a\ge 1$, where we have the claim that $T_n$ diverges if $a>1$ or if $\mathbb{E} \left[\log^\star(\frac1{A_1-1})\right] < \infty$, and converges if $\mathbb{E}\left[\log^\star(\frac1{A_1-1})\right]^\alpha = \infty$ for some $\alpha\in(0,1)$. Note that $a>1$ implies $\mathbb{E} \left[\log^\star(\frac1{A_1-1})\right] < \log^\star(\frac1{a-1}) < \infty$. Thus it suffices to prove\\
\begin{lemma}\label{bigger}
$$\mathbb{E} \left[\log^\star\left(\frac1{A_1-1}\right)\right] < \infty \implies \mathbb{E}\inf\{n : A_n \le e^{\frac1{e\star n}}\} = \infty$$
and $$
\mathbb{E} \left[\log^\star\left(\frac1{A_1-1}\right)\right]^\alpha = \infty \text{ for some }\alpha\in(0,1)\implies \mathbb{E}\inf\{n : A_n \le e^{\frac1{e\star n}}\} < \infty
$$
\end{lemma}
\begin{proof}
Before proving either claim, we want to replace $\log^\star(\frac1{A_n -1})$ with $\log^\star(\frac1{\log A_n})$ as this will be easier to work with. To do this, we start by noting that $\abs{\frac{1}{\log x}-\frac1{x-1}} < 1$ on $(1,\infty)$, which may be shown by elementary calculus. We also know that for integers $n\ne m$, $\abs{e\star n -e \star m} > 1$, which implies that if $\abs{x-y} <1$ then $\abs{\log^\star(x)-\log^\star(y)} <1$. Therefore $$
\mathbb{E} \left[\log^\star(\frac1{A_1-1})\right] < \infty \Longleftrightarrow \mathbb{E} \left[\log^\star(\frac1{\log A_1})\right] < \infty
$$
To prove the first implication, we claim that $\mathbb{E} \left[\log^\star(\frac1{A_1-1})\right] < \infty$ implies that $\inf\{n : A_n \le e^{\frac1{e\star n}}\} = \infty$ with nonzero probability, or equivalently there is a nonzero probability that $A_n > e^{\frac1{e\star n}}$ for all $n$.
We observe:\begin{eqnarray}
\mathbb{E} \left[\log^\star(\frac1{\log A_1})\right] &=& \sum_{n\in\mathbb{N}} n P(\log^\star (\frac1{\log A_1}) = n) = \sum_{n\in \mathbb{N}} P(\log^\star (\frac1{\log A_1}) \ge n)\nonumber\\&=&\sum_{n\in\mathbb{N}} P\left(A_1 \le e^{\frac1{e\star n}}\right)\nonumber
\end{eqnarray}
Therefore, we have \begin{eqnarray}
&&\mathbb{E} \left[\log^\star(\frac1{A_1-1})\right] < \infty\nonumber\\
&\implies& \sum_{n\in\mathbb{N}} P\left(A_1 \le e^{\frac1{e\star n}}\right) < \infty\nonumber\\
&\implies& P\left(A_n > e^{\frac1{e\star n}} \text{ for all }n\right) = \prod_{n\in\mathbb{N}}P\left(A_n > e^{\frac1{e\star n}}\right) \nonumber\\&&=\prod_{n\in\mathbb{N}}\left(1-P\left(A_n \le e^{\frac1{e\star n}}\right)\right)= \prod_{n\in\mathbb{N}}\left(1-P\left(A_1 \le e^{\frac1{e\star n}}\right)\right) >0\nonumber\\
&\implies& \mathbb{E}\inf\{n : A_n \le e^{\frac1{e\star n}}\} = \infty\nonumber
\end{eqnarray}
The second claim is slightly more involved. Suppose that, for some $\alpha\in(0,1)$, we have$$
\mathbb{E} \left[\log^\star(\frac1{A_1-1})\right]^\alpha =\infty
$$
or equivalently $\mathbb{E} \left[\log^\star(\frac1{\log A_1})\right]^\alpha =\infty$
This implies that for any $C$, for all $k$ sufficiently large $$
\sum_{n=1}^k n^\alpha P\left(\log^\star(\frac1{A_1-1}) = n\right) \ge C
$$
for all $k$ sufficiently large. We make use of summation by parts to obtain \begin{eqnarray}
C&\le&\sum_{n=1}^k n^\alpha P\left(\log^\star(\frac1{\log A_1}) = n\right)\nonumber\\ &=& 1^\alpha \sum_{n=1}^k P\left(\log^\star(\frac1{\log A_1}) = n\right) + \sum_{j=1}^{k-1} ((j+1)^\alpha - j^\alpha)\sum_{n=j+1}^k P\left(\log^\star(\frac1{\log A_1}) = n\right)\nonumber\\
&=& P\left(\log^\star(\frac1{\log A_1}) \le k\right) + \sum_{j=1}^{k-1} ((j+1)^\alpha - j^\alpha) P\left(j<\log^\star(\frac1{\log A_1}) \le k\right)\nonumber\\
&\le&1 + \sum_{j=1}^{k-1} ((j+1)^\alpha - j^\alpha) P\left(j<\log^\star(\frac1{\log A_1}) \le k\right)\nonumber\\
&\le&1+\left(k^\alpha - (k-1)^\alpha\right)\sum_{j=1}^{k-1} P\left(j<\log^\star(\frac1{\log A_1})\right)\nonumber\\
&\le&1+ \left(k^\alpha - (k-1)^\alpha \right)\sum_{j=1}^{k-1} P\left(j-1<\log^\star(\frac1{\log A_1})\right)\nonumber
\end{eqnarray}
Using elementary calculus, we can show that that $k^\alpha - (k-1)^\alpha \le c k^{\alpha-1}$ for some appropriate constant $c$. Re-indexing the above series, we will therefore have for any constant $C'$ that for all $k$ sufficiently large, we will have $$
C' \le k^{\alpha - 1} \sum_{n=1}^k P\left(n \le \log^\star(\frac1{\log A_1})\right)
$$
or equivalently $$
\sum_{n=1}^k P\left(A_1\le e^{\frac1{e\star n}}\right) \ge C' k^{1-\alpha}
$$
This allows us to bound the expectation of $\inf\{n : A_n \le e^{\frac1{e\star n}}\}$. By similar reasoning to equation (\ref{product}) we have that $$
\inf\{n : A_n \le e^{\frac1{e\star n}}\} = \sum_{k=1}^\infty\prod_{n=1}^k \left(1-P\left(A_1 \le e^{\frac1{e\star n}}\right)\right)
$$
Next we observe \begin{eqnarray}
&&\sum_{k=1}^\infty\prod_{n=1}^k \left(1-P\left(A_1 \le e^{\frac1{e\star n}}\right)\right)\nonumber\\ &=& \sum_{k=1}^\infty\exp\left(\sum_{n=1}^k \log\left(1-P\left(A_1 \le e^{\frac1{e\star n}}\right)\right)\right)\nonumber\\
&\le& \sum_{k=1}^\infty\exp\left(-\sum_{n=1}^k P\left(A_1 \le e^{\frac1{e\star n}}\right)\right)\nonumber
\end{eqnarray}
but for $k$ sufficiently large, we will have that the terms of the series are bounded above by $\exp(-C' k^{1-\alpha})$, which is summable, and hence this series converges to a finite number.
\end{proof}
\section{The Inverse Question}
It is natural to ask, which distributions can be represented as power towers of an i.i.d. sequence? More precisely, given a random variable $T$, does there exist an i.i.d. sequence $\{A_i\}_{i\in\mathbb{N}}$ such that $T \stackrel{d}{=} (A_1)^{(A_2)^{(A_3)^{\iddots}}}
$? If the answer is yes, we will say $T$ has a tower distribution, and the distribution of $A_i$ we will call its inverse tower distribution. We will not answer this question in full generality, but Theorem \ref{inverse} gives the answer in the case that $T = U^r$ for a uniform distribution $U$ and fixed $r\in\mathbb{R}$.
\begin{theorem}\label{inverse}
Let $U\sim\mathrm{Unif}[\alpha,\beta]$ for some $\alpha\ge 0$. Then $U^r$ has a tower distribution if and only if $1\in[\alpha,\beta]$ and $r\in[0,\frac1{1+\log \beta}]$. When these conditions hold, the inverse tower distribution function is given by $$
F(x) = \begin{cases}\frac{x^{\frac{\beta^r}r}}{\beta}(1-\beta^r\log x) - \frac{\alpha}{\beta} + \frac \alpha\beta F\left(x^{\frac{\beta^r}{\alpha^r}}\right)&x\in[a^{r/\beta^r} , \beta^{r/\beta^r})\setminus\{1\}\\
0 & x < \alpha^{r/\beta^r}\\
1 & x \ge \beta^{r/\beta^r}\\
\frac{1-\alpha}{\beta-\alpha} & x = 1\end{cases}
$$
\end{theorem}
This result suggests that the inverse question may be quite difficult for an arbitrary $T$, as it is not clear exactly what ``goes wrong" when the conditions are not met. In the case of $\alpha=0$ and $\beta=1$, this $F$ has a relatively simple form, and we get an interesting generalization of Example \ref{ex1}:
\begin{example}
If $U,V_1,V_2,V_3$ are independent and uniform on $(0,1)$ then $$
T= U^r
$$
has a tower distribution if and only if $r\in[0,1]$. When $r\in(0,1)$, its inverse tower distribution is given by $$
A = \max(V_1^{\frac r {1-r}}, V_2V_3)
$$
\end{example}
In our proof of Theorem \ref{inverse}, we will use the following lemmas, each of which may be useful on its own for checking whether a distribution is a tower distribution:
\begin{lemma}\label{Letac}
Suppose $X,Y$ are independent with almost sure bounds $X\in[0,e]$ and $Y\in[0,e^{\frac1e}]$. If $X \stackrel{d}{=} Y^X$, then $Y$ has a tower distribution, and its inverse tower distribution is $X$.
\end{lemma}
This follows immediately from Letac's principle \cite{Letac}.
\begin{lemma}\label{inv_bounds}
Suppose that $X,Y$ are independent nonnegative, bounded random variables such that $X\stackrel{d}{=} Y^X$. Let $a = \inf(\mathrm{supp} X)$ and $b = \sup(\mathrm{supp} (X))$.
If $b<\infty$, then $$
\inf(\mathrm{supp} (Y)) = \max(a^{\frac1a},a^{\frac1b})
$$
and
$$
\sup(\mathrm{supp} (Y)) = \min(b^{\frac1a},b^{\frac1b})
$$
unless $a=0$ and $b=1$ in which case $\inf(\mathrm{supp}(X)) = 0$ and $\sup(\mathrm{supp} (Y))\le1$. If $a=0$ in other cases, we treat the quantities $a^{\frac1a}$ and $b^{\frac1a}$ as being the limit as $a$ approaches $0$ from above.
\end{lemma}
\begin{proof}
We start by supposing $(a,b) \ne (0,1)$: \begin{eqnarray}
&&P(Y \ge \max(a^{\frac 1a}, a^{\frac1b})) =P(Y^X \ge \max(a^{\frac Xa}, a^{\frac Xb})) \ge P(Y^X \ge a) = P(X\ge a) = 1\nonumber\\
\nonumber&\text{ and }& P(Y \le \min(b^{\frac 1a}, b^{\frac1b})) =P(Y^X \le \min(b^{\frac Xa}, b^{\frac Xb})) \ge P(Y^X \le b) = P(X\ge b) = 1
\end{eqnarray}
Next, we pick $\epsilon>0$. We have that $P(X < a+\epsilon)>0$ and \begin{eqnarray}
&&\nonumber P(Y < \max(({a+\epsilon})^{\frac 1{a}}, {(a+\epsilon)}^{\frac1{b}})) =P(Y^X < \max({(a+\epsilon)}^{\frac {X}{a}}, {(a+\epsilon)}^{\frac { X}b}))\\&&\ge P(Y^X < a+\epsilon) = P(X <a+\epsilon)>0\nonumber
\end{eqnarray}
Since $\epsilon$ can be arbitrarily small, and $\max(\cdot,\cdot)$ is continuous, this implies that $P(Y > c)>0$ for any $c>\max(a^{\frac1a},a^{\frac1b})$ so $\inf(\mathrm{supp}(Y)) = \max(a^{\frac1a},a^{\frac1b})$ as claimed. The proof for the supremum is similar.
If $a=0$ and $b=1$, we have $\inf(\mathrm{supp}(Y)) = 0$ by similar reasoning to the above. We must have $\sup(\mathrm{supp}(Y))\le1$ because $$
1=P(X\le 1) =P(Y^X\le 1)=P(Y\le 1)
$$
but nothing else can be said about $\sup(\mathrm{supp}(Y))$. For example, if $Y\sim\mathrm{Unif}(0,b)$ for $b\in(0,1)$ and we define $X$ to be a power tower of i.i.d. copies of $Y$ (which converges by Theorem \ref{main}), we have $\mathrm{supp}(X) = (0,1)$.
\end{proof}
An interesting consequence of Lemma \ref{inv_bounds} is that $a^{\frac1a} \le b^{\frac1b}$ and $a^a \le b^b$ are necessary conditions for $X$ having a tower distribution. These are not guaranteed by $a\le b$. For instance, if $X$ has support $[\frac15,\frac12]$, then there can be no $Y$ such that $Y^X \stackrel{d}{=} X$ because $(\frac15)^{\frac15} >(\frac12)^{\frac12}$. Another consequence is that if $X$ is bounded, then $Y$ is bounded by $e^{\frac1e}$, which is the maximum of $x^{\frac1x}$ for $x\in\mathbb{R}^+$.
\textsc{Proof of Theorem \ref{inverse}:} Let $T = U^r$. We observe that $P(T \le x) = \frac{x^{\frac1r}-\alpha}{\beta-\alpha}$ and hence the probability density function of $T$ has the form \begin{equation}\label{rearranged}
p_T(x) = \begin{cases}Cx^{p-1} & x\in(a,b)\\ 0 &\text{else}\end{cases}
\end{equation}
with $p=\frac1r$, $a = \alpha^{r}$ and $b = \beta^{r}$ (or the other way around, if $r<0$), and $C$ chosen such that the total integral is $1$. Thus, it suffices to show that a random variable $T$ with a density function of the form given in (\ref{rearranged}) has a tower distribution if and only if $1\in[\alpha,\beta]$ and $\frac1p \in[0,\frac1{1+p\log \beta}]$, which is equivalent to $\beta <e$ and $p\ge \frac1{1-\log \beta}$. In that case, we claim $$
F(x) = \begin{cases}\frac{x^{bp}}{b^p}\left(1-b\log x\right)-\frac{a^p}{b^p} + \frac{a^p}{b^p} F(x^{\frac b a}) & x\in[a^{\frac1b},b^{\frac1b})\setminus\{1\}\\
0 & x < a^{\frac1b}\\
1 & x \ge b^{\frac1b}\\
\frac{1-a^p}{b^p-a^p} & x = 1\end{cases}
$$
By Lemma \ref{Letac}, it suffices to show that if $A$ is a random variable, independent of $T$, with distribution function $F$, then $A^T \stackrel{d}{=} T$.
First, we show that if $b >e$, then $T$ does not have the tower property: By Lemma \ref{inv_bounds}, if $b\in(e,\infty)$ and $A^T\stackrel{d}{=} T$, then $\sup(\mathrm{supp}(A)) = b^{\frac1b} \le e^{\frac1e}$, which by Theorem \ref{main} implies that the infinite power tower formed by an i.i.d. sequence of copies of $A$ converges, but we can also see that the limit of this sequence is bounded above by $e$, so its distribution cannot be $T$. For the case of $b=\infty$, in order for the power tower of $A_i$'s to converge to $T$, we would need $\sup(\mathrm{supp}(A_i)) > e^{\frac1e}$. If $c>e^{\frac1e}$ and $P(A_i > c)>0$, we have $\mathbb{E} (T^{\epsilon}) =\infty$ for all $\epsilon>0$ because \begin{eqnarray}
\mathbb{E} (T^{\epsilon} )&\ge& \sup_{k\in\mathbb{N}}\left((c\star k)^{\epsilon} P(T > c\star k)\right) \ge \sup_{k\in\mathbb{N}}\left((c\star k)^{\epsilon} P(A_i > c \mid i\in\{1,\dots,k+1\})\right) \nonumber\\&=& \sup_{k\in\mathbb{N}}\left((c\star k)^{\epsilon} P(A_1>c)^{k+1}\right) = \infty\nonumber
\end{eqnarray}
Thus, $T$ cannot have a power-law tail, because such a distribution would have $\mathbb{E}( T^\epsilon) < \infty$ for sufficiently small $\epsilon$.
If $b\le e$, then we check whether $T$ has a tower distribution. Let $G(x) = P(T \le x)$ be the distribution function of $T$. We note that, for $x\ne 1$ \begin{eqnarray}
P(A^T \le x) &=& \int_\mathbb{R} P(A^t \le x)p_T(t) dt = C\int_a^b P(A \le x^{\frac1t}) t^{p-1} dt\nonumber\\
&=& C\int_a^b F(x^{\frac1t}) t^{p-1} dt = -C \int_{x^{\frac 1a}}^{x^{\frac1b}} F(u) \frac{(\log x)^p}{u(\log u)^{p+1}} du\nonumber
\end{eqnarray}
In the final step, we make the substitution $u=\frac{\log x}{\log t}$. If $a=0$, we take $x^{\frac 1 a} = \lim\limits_{a\rightarrow0^+} x^{\frac 1 a}$. As we have seen, it suffices to check whether $A^T \stackrel{d}{=} T$. Thus $A$ has the inverse tower distribution of $T$ if and only if its distribution function $F(x)$ satisfies \begin{equation}\label{inv_eq}
G(x) = -C (\log x)^{p}\int_{x^{\frac 1 a}}^{x^{\frac1b}} \frac{F(u) }{u(\log u)^{p+1}} du
\end{equation}
so we begin by looking for solutions to this equation. It is not hard to show that there is no distribution function satisfying the equation for $p=0$, which in turn implies that $\exp(U)$ never has a tower distribution for uniform $U$. However, this is not necessary for our theorem, and is left to the interested reader to check.
Assuming $p\ne 0$, we observe that (\ref{inv_eq}) implies \begin{equation}\label{rec}
F(x) = \frac{p}{Cb^p} G(x^b) - \frac{ x^b \log x}{Cb^{p-1}} G'(x^b) + \frac{a^p}{b^p}F(x^{\frac ba})
\end{equation}
almost everywhere, because
\begin{eqnarray}
\frac{G(x)}{(\log x)^p} &=& -C \int_{x^{\frac1a}}^{x^{\frac1b}} \frac{F(u)}{u(\log u)^{p+1}} du\nonumber\\
\dd x \left(\frac{G(x)}{(\log x)^p}\right) &=& -C\dd x \int_{x^{\frac1a}}^{x^{\frac1b}} \frac{F(u)}{u(\log u)^{p+1}} du\nonumber\\
\frac1{(\log x)^p}G'(x)-\frac{p}{x(\log x)^{p+1}}G(x) &=& - C \frac {x^{\frac1b - 1}}b\frac{ F(x^{\frac1b})}{\frac{x^{\frac1b}}{b^{p+1}}(\log x)^{p+1}} + C\frac{x^{\frac1a - 1}}a \frac{ F(x^{\frac1a})}{\frac{x^{\frac1a}}{a^{p+1}}(\log x)^{p+1}}\nonumber\\
G'(x)-\frac{p}{x\log x}G(x) &=& - \frac{C b^p}{x \log x} F(x^{\frac1b}) + \frac{C a^p}{x \log x} F(x^{\frac1a})\nonumber\\
F(x^{\frac1b}) &=& \frac{p}{C b^p} G(x) - \frac{x \log x}{Cb^p} G'(x) + \frac{a^p}{b^p}F(x^{\frac1a})\nonumber
\end{eqnarray}
We do not necessarily have (\ref{rec}) implies (\ref{inv_eq}) because of the differentiation step. We do, however, have that (\ref{rec}) implies $$
-C \int_{x^{\frac1a}}^{x^{\frac1b}} \frac{F(u)}{u(\log u)^{p+1}} du = K + \frac{G(x)}{(\log x)^p}
$$
We will start by showing that if $p>0$ and $F(x)$ is a distribution function satisfying (\ref{rec}), then $K$ in the above equation is $0$, hence (\ref{inv_eq}) is satisfied by $F$, and we conclude that $F$ is the distribution function for the inverse tower distribution of $T$. Observe that $p>0$ implies $\ilim x \frac{G(x)}{(\log x)^p} = 0$. If $F$ is distribution function, then in particular $|F(x)|\le1$, so we have\begin{eqnarray}
|K| &=& \ilim x\abs{-C \int_{x^{\frac1a}}^{x^{\frac1b}} \frac{F(u)}{u(\log u)^{p+1}} du} \nonumber\\
&\le& |C| \ilim x \int_{x^{\frac1b}}^{x^{\frac1a}} \frac1{u (\log u)^{p+1}} du \nonumber\\
&=& |C| \ilim x \frac{1}{-p}\left(\frac{1}{(\log(x^{\frac1a}))^p} - \frac{1}{(\log(x^{\frac1b}))^p}\right) = |C|\ilim x \frac{b^p-a^p}{p(\log x)^p}\nonumber\\
&=&0\nonumber
\end{eqnarray}
Hence, to prove the theorem it suffices to show that there exists a distribution function satisfying (\ref{rec}) if and only if $0\le a \le a \le b < e$ and $p\ge \frac1{1-\log b}$.
We first show this for $a=0$, then deal with the case of $a>0$. We note that when $a=0$, we must have $p>0$, because otherwise $x^{p-1}$ does not have a finite integral. Then, (\ref{rec}) gives us $F$ in closed form $$
F(x) = \begin{cases}
\frac{x^{bp}}{b^p}(1-b\log x) & x< b^{\frac1b}\\
1 & x \ge b^{\frac1b}\end{cases}
$$
which is the form claimed in the theorem, but is not necessarily a distribution function. If $b<1$, we observe that $$
\lim\limits_{x\rightarrow (b^{\frac1b})^-} F(x) = \frac{b^{\frac1b \cdot bp}}{b^p}(1-b\log b^{\frac1b}) = 1 - \log b > 1
$$
which means that $F(x)>1$ just below $b^{\frac1b}$, and therefore $F$ cannot be a distribution function, so for $a=0$ and $b<1$, $T$ does not have a tower distribution. If $b\ge 1$, we do have $F(x)\in[0,1]$ for all $x$, so it suffices to check whether $F$ is non-decreasing. Looking at the derivative, we can see that for $x\in(0,b^{\frac1b})$ $$
F'(x) = \frac{p x^{bp-1}}{b^{p-1}}(1-b\log x) - \frac{x^{bp-1}}{b^{p-1}} = \frac{x^{bp-1}}{b^{p-1}}(p-1-pb\log x)
$$
so $F$ is non-decreasing if and only if $p-1-pb\log x\ge 0$ for all $x\in(0,b^{\frac1b})$. Since that is a decreasing function, it suffices to check at $x=b^{\frac1b}$, hence $F$ is a distribution function if and only if $$
p-1-p\log b \ge 0 \hspace{6pt}\implies \hspace{6pt} p\ge \frac1{1-\log b}
$$
which is the claim of the theorem.
If $a>0$, then we still have that if $1\notin[a,b]$, $F$ fails to be the inverse tower distribution of $T$. We suppose $a>1$, and show that $F$ fails to satisfy Lemma \ref{inv_bounds}. If $F$ is the inverse tower distribution function for $T$, then $F(x) = 0$ for all $x<a^{\frac1b}$ and $F(x)\ne 0$ for $x>a^{\frac1b}$. However, if we take $x\in(a^{\frac a{b^2}},a^{\frac1b})$, we find that $x^b<a$, hence $G(x^b) = G'(x^b)=0$ so \begin{eqnarray}
0&=&F(x) = -\frac{b}p(1-\frac{a^p}{b^p})x^b (\log x)G'(x^b) + (1-\frac{a^p}{b^p}) G(x^b) + \frac{a^p}{b^p} F(x^{\frac b a}) \nonumber\\&=&\nonumber \frac{a^p}{b^p}F(x^{\frac b a}) > 0
\end{eqnarray}
a contradiction. If $b<1$, we ought to have $F(x) = 1$ for all $x>b^{\frac1a}$ and $F(x) < 1$ for $x<b^{\frac1a}$, but for $x\in(b^{\frac1a},b^{\frac1b})$ we have $$
1 = F(x) = 1-\frac{a^p}{b^p} + \frac{a^p}{b^p}F(x^{\frac b a}) < 1-\frac{a^p}{b^p} + \frac{a^p}{b^p} = 1
$$
Therefore, if $1\notin[a,b]$, $T$ does not have a tower distribution, so we may proceed under the assumption that $1\in[a,b]$. Similarly to the case of $a=0$, we must check that $F(x)$ as defined by (\ref{rec}) is a distribution function. Since $b\ge 1$ and $a\le 1$, Lemma \ref{inv_bounds} implies that $F(x) = 0$ for $x<a^{\frac1b}$ and $F(x) =1$ for $x>b^{\frac1b}$, so we have $$
F(x)=\begin{cases}
\frac{x^{bp}}{b^p}(1-b\log x) - \frac{a^p}{b^p} + \frac{a^p}{b^p}F(x^{\frac b a}) & x\in[a^{\frac1b},b^{\frac1b})\setminus\{1\}\\
0 &x < a^{\frac1b}\\
1 & x\ge b^{\frac1b}\\
\frac{1-a^p}{b^p-a^p} & x = 1
\end{cases}
$$
as claimed. This obviously satisfies (\ref{rec}), so it remains to show that it is a distribution function if and only if $p\ge \frac1{1-\log b}$. Since $F(0)=0$ and $\ilim x F(x) = 1$, we only need to check whether $F(x)$ is non-decreasing. Observe that $$\dd x x^{bp}(1-b\log x) = bx^{bp-1}(p-1-pb\log x) = bx^{bp-1}(-1 + p(1-b\log x))$$
which implies $$
F'(x) = \begin{cases}
bx^{bp-1}(-1 + p(1-b\log x)) + \frac{a^{p+1}}{b^{p+1}} x^{\frac b a - 1} F'(x^{\frac b a}) & x \in (a^{\frac1b}, b^{\frac1b})\setminus\{1\}\\
0 & x \notin[a^{\frac1b},b^{\frac1b}]\\
\text{undefined} & \text{else}
\end{cases}
$$ If $p<0$, then $(-1 + p(1-b\log x))<0$ for all $x<b^{\frac1b}$, and hence $F$ will also have negative derivative, hence we may proceed under the assumption that $p>0$. If $p\ge \frac1{1-\log b}$, then we note that $F'(x) \ge 0$ for all $x$ where the derivative exists. Conversely, if $p< \frac1{1-\log b}$, we can show that $F'(x)<0$ for some $x$. Suppose $b>1$. For $x\in(b^{\frac a{b^2}}, b^{\frac1b})$, we have $$
F(x) = \frac{x^{bp}}{b^p}(1-b\log x)
$$
which is decreasing in a neighborhood of $b^{\frac1b}$ if $p<\frac1{1-\log b}$. The case of $b=1$ and $p< \frac1{1-\log b} = 1$ is a little more difficult. Define $$
M_n = \inf\{F'(x) : F'(x) \text{exists and }x \le a^{a^n}\}
$$
Obviously, if $M_n<0$ for any $n$, then $F'(x)<0$ for some $x\in(0,1)$. We claim that $p<1$ implies $\ilim n M_n<0$. Observe \begin{eqnarray}
M_{n+1} &=& \inf\left( {M_n} \cup \{F'(x) \hspace{2pt}\vert\hspace{2pt} x \in (a^{{a^n}},a^{a^{n+1}})\}\right) \nonumber\\
&=& \inf\left( {M_n} \cup \left\{x^{p-1}(-1 + p(1-\log x)) + a^{p+1} x^{\frac 1 a - 1} F'(x^{\frac 1 a}) \hspace{2pt}\vert\hspace{2pt} x \in (a^{a^n},a^{a^{n+1}})\right\}\right)\nonumber\\
&\le& \sup\left\{x^{p-1}(-1 + p(1-\log x)) \hspace{2pt}\vert\hspace{2pt} x \in (a^{a^n},a^{a^{n+1}})\right\} + \left(a^{p+1} (a^{a^{n+1}})^{\frac 1 a - 1} \right)M_n\nonumber
\end{eqnarray}
and therefore \begin{eqnarray}
&&\nonumber\ilim n M_n \\&\le& \ilim n\left(\sup\left\{x^{p-1}(-1 + p(1-\log x)) \hspace{2pt}\vert\hspace{2pt} x \in (a^{a^n},a^{a^{n+1}})\right\} + \left(a^{p+1} (a^{a^{n+1}})^{\frac 1 a - 1} \right)M_n\right)\nonumber\\ &=&-1 + p + a^{p+1} \ilim n M_n\nonumber
\end{eqnarray}
which can be rearranged to obtain $$
\ilim n M_n \le \frac{-1+p}{1-a^{p+1}}
$$
which is negative if $p< 1 = \frac1{1-\log b}$, which in implies that there exists $x\in (0,1)$ such that $F'(x) < 0$. Hence we have that $F$ is not a distribution if $p<1$, as claimed.
Thus, it remains to see what happens at the points where $F$ is not differentiable. These points are all those of the form $a^{\frac{a^n}{b^{n+1}}}$ or $b^{\frac{a^n}{b^{n+1}}}$ for $n\in \mathbb{N}$. Define $$
F_\pm(x) = \lim\limits_{h\rightarrow0^\pm} F(x+h)
$$
be the left- and right-limits of $F$. By induction, we can show $$
F_+(a^{\frac{a^n}{b^{n+1}}}) \ge F_-(a^{\frac{a^n}{b^{n+1}}})
$$
for all $n$. This is trivial for $n=0$ because $$
F_+(a^{\frac1b}) = \frac{a^p}{b^p}(1-\log a) - \frac{a^p}{b^p} = -\frac {a^p}{b^p}\log a \ge 0 = F_-(a^{\frac1b})
$$
and the recurrence relation for $F$ gives us the inductive step: \begin{eqnarray}
F_+(a^{\frac{a^n}{b^{n+1}}}) &\ge& F_-(a^{\frac{a^n}{b^{n+1}}}) \nonumber\\
\frac{a^{p\frac{a^n}{b^n}}}{b^p} - \frac{a^p}{b^p} + \frac{a^p}{b^p}F_+(a^{\frac{a^n}{b^{n+1}}}) &\ge& \frac{a^{p\frac{a^n}{b^n}}}{b^p} - \frac{a^p}{b^p} + \frac{a^p}{b^p}F_-(a^{\frac{a^n}{b^{n+1}}})\nonumber\\
F_+(a^{\frac{a^{n+1}}{b^{n+2}}}) &\ge& F_-(a^{\frac{a^{n+1}}{b^{n+2}}})\nonumber
\end{eqnarray}
We similarly have $$
F_+(b^{\frac{a^n}{b^{n+1}}}) \ge F_-(b^{\frac{a^n}{b^{n+1}}})
$$
for all $n$, and hence $F$ is non-decreasing in all the cases where $p\ge \frac1{1-\log b}$, as claimed. \qed
\section{Open questions}
There remain many open questions about random power towers. As far as convergence is concerned, Theorem \ref{main} is quite broad. It only leaves out the case of $a=1$ and $b=\infty$. While our condition for convergence when $a=1$ and $b>e^{\frac1e}$ does not involve $b$ in any way, our proof required boundedness of $A_1$. However, there do exist unbounded distributions for $A_1$ such that the corresponding power tower converges.
\begin{example}
Let $\{A_i\}_{i\in\mathbb{N}}$ be an i.i.d. sequence with distribution given by $$
A_1 = \begin{cases}
e\star n & \mathrm{ w.p. }\hspace{3pt}\frac1{2^{n+1}}\hspace{2pt}\text{for }n\in\mathbb{N}\\
e^{\frac1{e\star (16 n)}}&\mathrm{ w.p. }\hspace{3pt}\frac1{2^{n+1}}\hspace{2pt}\text{for }n\in\mathbb{N}
\end{cases}
$$
and let $T_i=(A_1)^{(A_2)^{{\iddots}^{(A_i)}}}$ be the corresponding power tower. Then $T_i$ converges almost surely.
\end{example}
To show convergence of $T_i$, it suffices to show that $\ilim i \mathbb{E} \log^\star(T_i) < \infty$, since this implies that the probability of $T_i$ going to infinity is $0$. Note that $$
\mathbb{E} \log^\star(A_1) = \sum_{n=1}^\infty \frac{n}{2^{n+1}} = 1 < \frac{8(1+\sqrt{1-\log 2})}{\log 2} \approx 17.94...
$$
and we show inductively that $T_i < \frac{8(1+\sqrt{1-\log 2})}{\log 2}$. Assuming this is true for $i$, we prove it for $i+1$ (making use of the fact that $\log^\star(x+y) \le 1 + \log^\star x + \log^\star y$ in the third line):\begin{eqnarray}
&&\mathbb{E} \log^\star(T_{i+1}) = \sum_{n=1}^\infty\frac1{2^{n+1}} \mathbb{E}\log^\star\left((e \star n)^{T_i}\right) + \sum_{n=1}^\infty\frac1{2^{n+1}} \mathbb{E}\log^\star\left(e^{T_i/(e\star (16 n))}\right) \nonumber\\
&=& 1 + \sum_{n=1}^\infty\frac1{2^{n+1}} \mathbb{E}\log^\star\left((e \star (n-2) ) + \log T_i\right) + \frac12 + \sum_{n=1}^\infty\frac1{2^{n+1}} \mathbb{E}\log^\star\left(\frac{T_i}{e\star (16 n)}\right)\nonumber\\
&\le& \frac32 + \sum_{n=1}^\infty\frac1{2^{n+1}}\left(n-2 + \mathbb{E} \log^\star(T_i)\right) + \sum_{n=1}^\infty \frac1{2^{n+1}} \mathbb{E} \log^\star\left(\frac{T_i}{e\star (16 n)}\right)\nonumber\\
&\le& \frac32 + \sum_{n=1}^\infty\frac1{2^{n+1}}\left(n-2 + \mathbb{E} \log^\star(T_i)\right) + \sum_{n=1}^\infty \frac1{2^{n+1}} \left(1+P(T_1\ge e\star (16 n))\mathbb{E} \log^\star(T_i)\right)\nonumber\\
&=& 2 + \frac12\mathbb{E}\log^\star T_i + \sum_{n=1}^\infty\frac{1}{2^{n+1}}P(\log^\star T_1\ge (16 n))\mathbb{E} \log^\star(T_i)\nonumber\\
&\le& 2 + \frac12\mathbb{E}\log^\star T_i + \sum_{n=1}^\infty\frac{1}{2^{n+1}}\frac{(\mathbb{E} \log^\star(T_i))^2}{16 n} = 2 + \frac12\mathbb{E}\log^\star T_i + \frac{\log 2}{32} (\mathbb{E} \log^\star T_i)^2\nonumber\\
&\le& \frac{8(1+\sqrt{1-\log 2})}{\log 2}\nonumber
\end{eqnarray}
This, and other similar examples, suggest that in order to check convergence of $T_i$ for unbounded $A_1$, we need to have some comparison between the weight of the distribution of $A_1$ at $1$ and at infinity. I conjecture that condition 2 from Theorem \ref{main} may be relaxed by replacing $b<\infty$ with $\mathbb{E} \log^\ast A_1 < \infty$.
We also did not touch on questions of convergence rate at all. For the "contracting on average" random power towers, Diaconis and Freedman's results also gives us an exponential convergence rate. Are there cases that do not have an exponential type of convergence? If so, what convergence rates are possible?
We only touched the surface of the inverse question. If $T$ were a mixture of powers of uniform distributions, we should be able to apply similar techniques to those used in the proof of Theorem \ref{inverse}, though the complexity of checking monotonicity increases substantially. Can one tell in general whether $T$ has a tower distribution by approximating it with uniform distributions?
\begin{acks}[Acknowledgments]
I would like to thank Laurent Saloff-Coste, Persi Diaconis, Dan Dalthorp, and Lisa Madsen for their support and helpful comments. I would also like to thank Dan Dalthorp for the figures.
\end{acks}
|
\section{Introduction}\label{sec1}
\IEEEPARstart{D}{eep} Neural Networks (DNNs) gain much success in many real-world applications, spanning image classification~\cite{2016Deep, huang2017densely}, natural language processing~\cite{devlin2018bert}, and object detection~\cite{girshick2015fast, redmon2016you}, to name a few. The success of DNNs highly relies upon their novel architectures. This can be evidenced from state of the arts such as ResNet~\cite{2016Deep}, DenseNet~\cite{huang2017densely}, and Transformer~\cite{vaswani2017attention}. However, the architectures of these DNNs are often manually designed through the trial-and-error process, which is quite labor-intensive and time-consuming, and inevitably limits the diverse applications of DNNs. This greatly promotes the research of Neural Architecture Search (NAS), which can automatically design high-performance DNN architectures without or with little human expertise. On some occasions, the architectures designed by NAS can even surpass the hand-crafted ones in some tasks~\cite{real2019regularized, zoph2018learning}.
In NAS, the architecture design is often formalized as an optimization problem, and then the automation is achieved by solving the optimization problem through well-designed search strategies. Commonly, the NAS problem is difficult to be solved because of facing multiple challenges, such as the desecrate nature, prohibitive computation cost, and also with multi-conflicting objectives~\cite{liu2020survey}. Existing search strategies for NAS mainly covers Evolutionary Computation (EC)~\cite{back1997handbook}, Reinforcement Learning (RL)~\cite{kaelbling1996reinforcement}, and gradient-based algorithms. In principle, no matter which search strategy is used, they all need to evaluate the performance of DNNs. This is because the search strategies require knowing the their current profits, which in turn effectively and efficiently guides the consequence search. However, the evaluation often involves the training of a large number of DNNs, which is a prohibitively high cost. For example, the RegularizedEvo algorithm~\cite{real2019regularized} ran on 450 GPUs for 7 days. The LargeEvo algorithm~\cite{real2017large} performed on 250 GPUs for 11 days. In practice, it is unaffordable for most researchers interested. As a result, how to accelerate the NAS evaluation process has become an important topic in the NAS community~\cite{sun2019surrogate,ning2021evaluating,ren2021comprehensive,yu2020evaluating}.
During past years, some efforts have been dedicated to solving this major issue, and existing methods can be generally divided into four different categories. They are early stopping strategy~\cite{sun2018particle,sun2018experimental,wang2018hybrid}, reduced training set~\cite{sapra2020constrained}, weight-sharing method~\cite{bender2018understanding}, and performance predictor~\cite{sun2019surrogate}. Specifically, the early stopping strategy works based on the observation that the training performance does not increase significantly within a training window, and then the training is terminated with the assumption that the performance would not increase as the training continues. As a result, the early stopping strategy consumes fewer training epochs compared to the originally assigned one, thus the whole training process is accelerated. However, this assumption would not hold because of the use of the scheduled learning rates for modern DNNs in practice, resulting in the observation in early stopping would not happen~\cite{liu2021homogeneous}. The reduced training set method uses a subset as a proxy of the training set, and then the training is performed on the subset instead of the whole training set. Because the number of training samples participating in the training is reduced, the training process is accelerated. However, how to select a proper proxy dataset sufficiently representing the whole dataset is still an open question~\cite{liu2020survey}. In practice, a common way is to construct the proxy by random sampling. However, because of the powerful fitting ability of DNNs, the obtained performance through this strategy often misleads the search strategies~\cite{liu2020survey}. The weight-sharing method is widely used by gradient-based NAS algorithms. It trains a supernet subsuming all candidate DNN architectures. Once a new architecture is generated, it directly employs the weights sharing from the supernet without any further training. This is the reason why the weight-sharing methods could accelerate the NAS. Recent works show that the shared weights often cause the rank disorder problem~\cite{yang2019evaluation}, resulting in the method having similar performance to random search~\cite{yang2019evaluation,yu2020evaluating}. In addition, the use of the weight-sharing method also heavily depends on expertise because of the construction of the supernet in advance. This clearly contrasts with the design motivation of NAS which aims at reducing the manual intervention as much as possible for architecture design.
\begin{figure}[htbp]
\centerline{\includegraphics[width=0.48\textwidth]{comp}}
\caption{The illustration between traditional NAS and performance predictor-based NAS.}\label{fig_comp}
\end{figure}
The performance predictor refers to predicting the performance of DNNs using a predictor which is often a regression model instead of performing the actual evaluation. Compared to the traditional one obtaining DNN performance on a great number of Graphics Processing Units (GPUs) consuming hours to days even on medium-scale datasets, the performance predictor is of great efficiency. In practice, the prediction is often completed within seconds, and also independent of the scales of the target datasets. In addition, the performance predictor has no limitations of the early stopping strategy as well as the reducing training set method. Furthermore, there is no supernet is required for performance predictors. As a result, the performance predictor is theoretically high-fidelity and has sound merit. Fig.~\ref{fig_comp} shows the comparisons between the traditional NAS and performance predictor-based NAS. It can be seen from Fig.~\ref{fig_comp} that the performance predictor can directly estimate the performance of the searched architectures after training on a group of annotated DNN architectures.
The first work focusing on performance predictors can be seen as the Peephole~\cite{deng2017peephole} proposed in the year of 2017. Specifically, Peephole~\cite{deng2017peephole} adopted the Long-Short Term Memory (LSTM)~\cite{hochreiter1997long} model to predict the performance, by considering that the LSTM is suitable for sequential data to which the searched DNN architectures can be processed. However, Peephole evaluated 800 DNNs as the training data of LSTM, which somehow is not suitable for real-world applications because if there are enough GPU resources to obtain the 800 annotated architectures, we would directly run the NAS algorithms on the computation resources. After that, the research efforts on performance predictors move to advanced regression models upon limited DNN architectures annotated. Sun \textit{et. al.} proposed the E2EPP performance predictor~\cite{sun2019surrogate} based on random forest~\cite{breiman2001random}, and the experiments show that E2EPP can double the running speed yet with only 200 annotated DNN architectures as training samples.
ReNAS~\cite{xu2021renas} used a simple LeNet-5 model~\cite{lecun1998gradient} and trained it with 423 labeled architectures. Furthermore, ReNAS used the pairwise ranking loss function instead of the traditional mean squared error (MSE) because the relative ranking of DNNs is crucial for NAS.
With the use of graph convolution network (GCN)~\cite{kipf2016semi}, SSANA~\cite{tang2020semi} proposed to enhance the quality of the extracted features with an additional unsupervised model, which can learn features from unlabeled DNN architectures.
TNASP~\cite{lu2021tnasp} presented a transformer-based predictor~\cite{vaswani2017attention} and designed a self-evolution framework to fully utilize the temporal information, and achieves promising results trained with 1,000 labeled samples.
Despite their success, there are still two limitations. \textbf{First}, these performance predictors did not solve the fundamental problem, i.e., the lacking of labeled DNN architectures. This is because the training process to obtain the performance of DNNs is time-consuming. As a result, a large number of labeled samples are not available for most researchers, and evaluating so many architectures also disobeys the designed principle of performance predictor. Although the works mentioned above proposed the advanced regression models to reduce the number of annotated architectures required, these solutions cannot solve the problem from the root. In contrast, this may lead to the problem of over-fitting due to their employment of advanced regression models but without sufficient annotated architectures~\cite{zhong2020random}. On the other hand, advanced machine learning depends on even more training data than traditional ones. Their utilization of existing performance predictors further intensifies the requirements for a large number of annotated DNN architectures. \textbf{Second}, As can be seen from Fig.~\ref{fig_comp}, the process of ``encoding'' bridges the labeled DNN architectures and the corresponding regression models. However, existing encoding methods are designed only for the specified scenario, which makes the performance predictors unable to be flexibly used by various NAS algorithms. For example, Peephole encoded the DNNs into the representation for every possible operation, and concatenate the representation of all layers as the final encoding of the architecture. However, the encoding method cannot be used when an unknown operation appears. The encoding method designed in E2EPP can only be employed for the AE-CNN NAS algorithm~\cite{sun2019completely}. TNASP designs a Laplacian matrix-based positional encoding strategy which is only designed for the input of transformer model~\cite{vaswani2017attention} and cannot be used in other models. As a result, the encoding methods of these performance predictors lack generality. However, based on the design motivation of performance predictors, they should be an independent research topic and applied by most various NAS algorithms.
In this paper, we aim to develop a Graph Isomorphism-based Architecture Augmentation method (GIAug) for designing performance predictors, which can effectively and efficiently address the above issues of existing performance predictors. Please note that this work is based on our previous preliminary investigation~\cite{liu2021homogeneous}, but with additionally significant contributions as belows:
\begin{itemize}
\item $\textbf{Computational cheapness.}$ The mechanism of graph isomorphism is exploited to augment DNN architectures for the first time, which can greatly benefit generating a large number of annotated architectures yet at a low cost. Specifically, all possible labeling sequences are applied to generate isomorphic graphs, resulting in various architecture representations of the same root of architectures. As a result, there is no need for intensive computation resources during this process, thus the GIAug method is computationally cheap.
\item $\textbf{Applicable generality.}$ A generic encoding method is presented to maximally span various search spaces adopted by the NAS algorithms. This allows GIAug to be flexibly applied to different performance predictors, which can in turn enhance the efficiency of the corresponding NAS algorithms. Specifically, almost all architectures are treated as the directed attribute graph. We use the adjacency matrix to represent the vertical connection and utilize the one-hot strategy to encode the vertice attribution. This helps to be easily embedded into the performance predictor at hand.
\item $\textbf{Superior effectiveness.}$ GIAug can generate sufficient training data from existing data, greatly improving the performance of the performance predictor. Furthermore, GIAug shows its superiority even in conjunction with simple regression models. Specifically, GIAug is investigated on CIFAR-10 and ImageNet datasets, with the search space of NAS-Bench-101, NAS-Bench-201, and DARTS. The results demonstrate the effectiveness of GIAug in improving the performance of the performance predictor.
\end{itemize}
The remainder of this paper is organized as follows. The background and related work are reviewed in Section~\ref{sec_2}. This is followed by the details of the proposed algorithm documented in Section~\ref{sec3}. In order to validate the effectiveness and the efficiency of the proposed method, extensive experiments and the results are presented in Section~\ref{sec_4}. Finally, the conclusion and future work are shown in Section~\ref{sec_5}.
\section{Background and Related Work}\label{sec_2}
In this section, data augmentation is first briefly introduced in Subsection~\ref{relate_Aug}, and then the NAS and performance predictor are presented in Subsection~\ref{related_NAS}. Finally, the existing encoding scheme are reviewed in Subsections~\ref{relate_encoding}.
\subsection{Data Augmentation}\label{relate_Aug}
Data augmentation is a technique to increase the size of training data~\cite{shorten2019survey}, which aims at enhancing the performance of the corresponding learning algorithms. Most data augmentation methods are realized by modifying the copies from existing data or creating data from new. It has been commonly used to solve the problems caused by insufficient annotated training data in deep learning~\cite{lecun2015deep} which often relies on a large amount of training data. In general, the larger volume of training data that can be used, the better the corresponding deep learning model that can be learned. However, it may be challenging to obtain sufficient annotated data due to the prohibitive cost of collecting and labeling data. For instance, in medical image analysis tasks~\cite{esteva2017dermatologist}, such as liver lesion classification or brain scan analysis, many images are gained from computerized tomography and magnetic resonance imaging. These collections are often time-consuming, and the equipment used is expensive. In addition, the obtained images need to be labeled by medical experts, which is also labor-intensive.
Many data augmentation methods have been proposed in the research field of computer vision and natural language processing. For example, flipping and cropping are the most popular augment techniques for computer vision~\cite{shorten2019survey}. Specifically, the flipping operation randomly flips the images horizontally to be a new image, and the cropping operation extracts a random subpatch from the image to be a new image. Furthermore, the color space transformation method~\cite{jurio2010comparison} is another exciting data augmentation method to deal with lighting biases in image recognition problems. It is achieved by altering the color distribution of images. The back-translation method~\cite{sennrich2015improving}, synonym replacement method~\cite{zhang2015character} and G-DAUG method~\cite{yang2020generative} are popular methods for data augmentation in natural language processing. Specifically, the back-translation method first translated the sequence of text into another language, and then backed into the original language to generate data with the same label as the original one. For synonym replacement, a random word was picked from a sentence and then replaced by its synonym word to generate new sentences. G-DAUG used transformer language models pre-trained to augment the most informative and diverse part of the text, and then generated synthetic texts.
Unfortunately, these existing methods cannot be applied to augment the data investigated in this paper, i.e., the DNN architectures. Specifically, the data processed by computer vision or natural language processing are often in the Euclidean space, and the corresponding augmentation methods are also designed for the Euclidean data~\cite{sun2021arctext}. For example, the flipping operation in augmenting image data works upon the fact that the pixels are represented with the measurements designed for Euclidean data. If the Euclidean distance between any two pixels changes after the augmentation, the augmented image will also be invalid. To the best of our knowledge, this is the first work focusing on augmenting DNN architectures. This is mainly because the study of performance predictors is still in its infancy.
\subsection{Neural Architecture Search (NAS) and Performance Predictor}\label{related_NAS}
NAS is composed of three consequential components: search space, search strategy, and performance estimation~\cite{elsken2019neural}. The search space refers to the collection of the candidate architectures, from which the NAS will perform the search. The search strategy corresponds to the employed optimization algorithms for the search. The performance estimation represents the way to evaluate the performance of the architectures searched. Among the three different categories of NAS algorithms, the EC-based and RL-based ones are often more time-consuming than the gradient-based ones~\cite{liu2018darts}. In principle, all types of NAS algorithms consumed a similar computation budget in terms of the three search strategies. Specifically, this bias is from the DARTS~\cite{liu2018darts} algorithm falling into the gradient-based category, which reported only several GPU days for the search upon the fact that the others often consumed hundreds of or even more GPU days. However, this difference is not caused by the gradient-based search strategy, but the performance estimation where the searched architectures in DARTS share the weights from a supernet pre-trained. This is in contrast to the other two types of NAS algorithms, where the weights are often trained from scratch. To be honest, if the search strategies are kept the same among the different types of NAS algorithms, they will consume similar computation costs.
Given the high computation cost caused by the train-from-scratch process in NAS, in addition to the weight-sharing discussed above, there are also some other representatives~\cite{sun2018particle,sun2018experimental,wang2018hybrid,sapra2020constrained}. Among those, the performance predictors have been becoming a hot topic~\cite{sun2019surrogate,wen2020neural,xu2021renas,deng2017peephole,tang2020semi}, which follow a similar protocol in constructing the predictors:
\begin{enumerate}[\textbf{Step} 1]
\item Sample and train some architectures in the predefined search space to serve as training data;
\item Train a performance predictor to map the encoding of architectures and the corresponding performance values;\label{np_step1}
\item Use this trained performance predictor to estimate the performance of architectures newly generated during NAS.
\end{enumerate}
The process of training a performance predictor in \textbf{Step}~\ref{np_step1} is often modeled as a regression task. Specifically, the performance predictor is assumed to be represented by a regression model $R$. The data used to train the predictor is denoted as ${[X,y]}$, where $X=\{X_{1}, X_{2}, \ldots, X_{N}\}$ represents the DNN architectures and $y$ represents the respective performance of the DNN architectures. The training process of $R$ can be mathematically described by Equation~(\ref{eq_PP}):
\begin{equation}\label{eq_PP}
\min _{T_{p}} \frac{1}{N} \sum_{n=1}^{N} \mathcal{L}\left(R\left(T_{p}, Encoder(X_{n})\right), y_{n}\right)
\end{equation}
where $T_{p}$ is the trainable parameters $R$, and $\mathcal{L}(\cdot)$ denotes the loss function. The trained $R$ can by directly used to estimate performance during the NAS. Please note that $Encoder(\cdot)$ denotes the encoding scheme, which is detailed in the next subsection.
\subsection{Encoding Scheme of NAS}\label{relate_encoding}
Based on the type of basic units, the existing search spaces span over the layer-based one, the block-based one, and the cell-based one~\cite{liu2020survey}. In particular, the basic unit in the layer-based search space is mainly the primitive layers of DNNs (e.g., the convolutional layer and the pooling layer), which are often adopted by the early NAS algorithms~\cite{sun2019evolving}. As for the block-based search space, the basic unit is the different combinations of primitive layers, such as the ResNet~\cite{2016Deep} block and the DenseNet~\cite{huang2017densely} block. This kind of search space can often incur better performance than the previous one in practice~\cite{sun2020automatically,wu2019fbnet}. The architectures in the cell-based search space are the repetitions of fixed structures (i.e., the cells). Each fixed structure is often the block in the block-based search space. Each cell can be considered as a micro architecture. The recent state of arts is typically based on this search space, and can often achieve a good balance between the performance and computation cost~\cite{zoph2018learning}. Upon this, there have been increasingly related works largely designed for the cell-based search space, including the encoding scheme.
The existing encoding schemes for cell-based search spaces are mainly composed of sequence-based encoding schemes and graph-based encoding schemes. The first ones typically only encode the specific serialized information of the architectures. For example, the NAO method~\cite{luo2018neural} used a string sequence, which describes different operations in the cell, to encode the whole architecture. Those encoding schemes are straightforward and easy to implement. However, the topological information cannot be fully encoded because it is hard to be represented by string sequence~\cite{white2020study}. Because the topology plays an important part in the architectures, the performance of the performance predictors built upon those encoding schemes will deteriorate. Alternatively, both the information of topology and operations can be treated by the graph-based encoding schemes. To be specific, the serialized information of each operation is encoded as an operation list, and the topological informatiosn is first modeled by a graph and then encoded as an adjacency matrix. Both are collectively used as the whole encoding. For example, ReNAS~\cite{xu2021renas} firstly obtained the vectors of the operations, the floating-point operations per second (FLOP), and the parameters for all nodes in the graph. Then, those vectors were broadcasted into the adjacency matrix to generate the type matrix, the FLOP matrix, and the parameter matrix, respectively. At last, those matrixes were concatenated as the encoding. In this paper, we utilize a simple and general graph-based encoding method that is easy to implement.
\section{The Proposed Algorithm}\label{sec3}
In this section, we first introduce graph isomorphism in Subsection~\ref{sec30}. Then we present the overall framework of the proposed algorithm in Subsection~\ref{sec31}. After that, we detail its core components in Subsections~\ref{sec32} and~\ref{sec33}, respectively.
\subsection{Graph Isomorphism}\label{sec30}
Most architectures can be treated as the directed attributed graph, where vertices correspond to operations and edges represent the connection between vertices.
For a directed attributed graph, the definition of graph isomorphism is as the following:
\begin{definition}\label{thm1}
If a directed attributed graph $G_{1}=\left\{V_{1}, E_{1}\right\}$ with attribute function $L_{1}$ and a directed attributed graph $G_{2}=\left\{V_{2}, E_{2}\right\}$ with attribute function $L_{2}$ are isomorphic, then there exists a bijection $f$ from the set $V_{1}$ to the set $V_{2}$ satisfying the following condition:
(1) if $(u,v) \in E_{1}$, $(f(u),f(v)) \in E_{2}$ and $L_{1}(u) = L_{2}(f(u))$, $L_{1}(v) = L_{2}(f(v))$;
(2) if $(f(u),f(v)) \in E_{2}$, $(u,v) \in E_{1}$ and $L_{2}(f(u)) = L_{1}(u)$, $L_{2}(f(v)) = L_{1}(v)$.
\end{definition}
Obviously, the isomorphic directed attributed graphs essentially have the same vertice connection and vertice attribution, only differ in the position of the vertice which has no influence on the performance of architecture. As a result, isomorphic architectures have the same performance value. Motivated by the observation, we give a rise to the idea that utilizing the graph isomorphism to augment the architectures.
\textbf{Architecture isomorphism detection.} Generally, we can determine if two architectures are isomorphic by identifying if their graphs are isomorphic. It is easy for us to find a finite method to judge if two graphs are isomorphic. Given two graphs $G_{1}$ and $G_{2}$ with $n$ vertices, we can separately label the vertices of $G_{1}$ and $G_{2}$ with $1,2,\dots ,n$. Two graphs are isomorphic if one can be transformed into the other one by relabeling vertices.
In other words, the graph $G_{1}$ and graph $G_{2}$ are isomorphic if and only if a permutation matrix $P$ exists such that $A_{2}=PA_{1} P^{-1}$ and $L_{2}=L_{1}P^{-1}$.
Specifically, $A_{1}$ and $A_{2}$ define the adjacency matrix of $G_{1}$ and $G_{2}$. The adjacency matrix can represent the connection of the graph by its adjacency matrix $A$, defined as:
\begin{eqnarray}
A_{i j} & = & \left\{\begin{array}{ll}
1 & \text { if edge } (i \rightarrow j) \text { exists } \\
0 & \text { if edge } (i \rightarrow j) \text { does not exist}
\end{array}\right.
\end{eqnarray}
Each adjacency matrix is built on the basis of the given labeling of each vertice. For example, a vertice with labeling $l$ indexes at $l$-th row and $l$-th column.
Furthermore, the attribute vectors $L_{1}$ and $L_{2}$ represent the attribute of all vertices in $G_{1}$ and $G_{2}$, respectively. Concretely, the $i$-th element in $L_{1}$ is the attribute type of the vertice labelled $i$. The adjacency matrix and attribute vector correspond to the topological and attribute information, respectively.
Finally, $P$ represents the permutation matrix which is a square binary matrix that has exactly one entry of 1 in each row and each column and 0 elsewhere. The permutation matrix represents the relabeling of the elements. When it is used to multiply another matrix $M$, it results in permuting the rows (when pre-multiplying, to form PM) or columns (when post-multiplying, to form MP) of the matrix $M$. As a result, we can judge if one graph can be transformed by relabeling another graph by using the permutation matrix to multiply.
\begin{figure*}[htbp]
\centerline{\includegraphics[width=1.0\textwidth]{overall}}
\caption{The flowchart of the proposed GIAug. The number of the vertices means the label, while the color of vertices corresponds to the operation. Graph $G$ and all isomorphic graphs represent the architecture $\mathcal{A}$.}\label{fig_overall}
\end{figure*}
\subsection{Overall Framework}\label{sec31}
\begin{algorithm}
\caption{Overall framework}\label{alg_overall}
\KwIn{The architecture dataset $D$.}
\KwOut{The encoded architecture dataset $D'$ after data augmentation.}
$D' \leftarrow \emptyset$ \;
\ForEach {Architecture $\mathcal{A}$ in $D$}
{\label{alg1_main_start}
$G \leftarrow$Build a graph based on $\mathcal{A}$\;\label{alg1_main_line1}
$V=(v_{1}, v_{2},\dots ,v_{n}) \leftarrow$Construct a vertice sequence based on a random topological order\;\label{alg1_main_line2}
$r=(1,2,\dots ,n) \leftarrow$Build a label sequence\;\label{alg1_main_line3}
$A \leftarrow$Construct an adjacency matrix based on $G$, $V$ and $r$\;\label{alg1_main_line4}
$m \leftarrow$ Obtain the attribute vector of $V$\;\label{alg1_main_line5}
$S \leftarrow$Permutate the labeling in $r$ to get all the possible labeling sequences\;\label{alg1_main_line6}
\ForEach {$labeling$ $sequence$ $l$ in S}{
$G' \leftarrow$Get the graph based on \textbf{the proposed isomorphic augmentation method} by $A$, $m$ and $l$\;\label{alg_main_aug}
$\mathcal{E} \leftarrow$Encoding $G'$ by \textbf{the encoding method}\;\label{alg_main_encoding}
\If{$\mathcal{E} \notin D'$}{\label{alg_if}
$D' \leftarrow D'\cup \mathcal{E}$\;} \label{alg_ifnot}
}
}\label{alg1_main_end}
$\textbf{Return}$ $D'.$\label{alg1_end}
\end{algorithm}
Algorithm~\ref{alg_overall} shows the framework of the proposed algorithm. Given the dataset $D$ containing a limited number of annotated DNN architectures, the proposed GIAug algorithm starts to take effect for the architectures in $D$ one by one (Lines~\ref{alg1_main_start}-\ref{alg1_main_end}). Finally, a new dataset $D'$ containing the encoding information of all the augmented architectures is returned for the use of the performance predictor (Line~\ref{alg1_end}). During the process of each architecture $\mathcal{A}$ in $D$, the graph of $\mathcal{A}$, say $G$, is first built by extracting the topological and attribute information (Line~\ref{alg1_main_line1}), and then a vertice sequence $V$ based on a random topological order is obtained (Line~\ref{alg1_main_line2}). Specifically, the topological order is a linear ordering of its vertice, where vertice $u$ comes before vertice $v$ for every edge $(u,v)$ from $u$ to $v$. Next, the labeling sequence $r$ is created to label each vertice in $V$ with $r_{1},r_{2},\dots, r_{N}$ (Line~\ref{alg1_main_line3}). After that, the adjacency matrix $A$ and attribute vector $m$ are constructed based on $G$, $V$ and $r$ (Lines~\ref{alg1_main_line4}-\ref{alg1_main_line5}). Please note that each operation is represented as an integer. Next, all the possible labeling sequences of $V$ are obtained by permuting the elements in $r$ and then stored into $S$ (Line~\ref{alg1_main_line6}).
At last, each graph $G'$ is generated based on the proposed isomorphic augmentation method (Line~\ref{alg_main_aug}), and its information is encoded to $\mathcal{E}$ by the proposed encoding method (Line~\ref{alg_main_encoding}). If $\mathcal{E}$ not exists in $D'$, it will be stored in $D'$ (Lines~\ref{alg_if}-\ref{alg_ifnot}).
Fig.~\ref{fig_overall} shows an example of the proposed GIAug algorithm. Specifically, the example architecture (i.e., Architecture~$\mathcal{A}$) is composed of five nodes and five operations (i.e., input, output, max pooling, 1$\times$1 convolution, and 3$\times$3 convolution). The architecture $\mathcal{A}$ is first represented as a directed attributed graph $G$. Then, all vertices in $G$ are labeled, and the adjacency matrix $A$ and the attribute vector $m$ are obtained based on the labeling. Then, the Isomorphic Augmentation method is used to gain all isomorphic graphs of $G$ by relabeling $G$. At last, each isomorphic graph is represented to a unique encoding, and all encodings are utilized to train the performance predictor to improve its prediction ability.
\subsection{The Proposed Isomorphic Augmentation Method}\label{sec32}
As discussed above, the proposed augmentation method is motivated by the isomorphism in the graphs, which is defined as Definition~\ref{thm1}.
In the isomorphic graphs, the relationships between vertices and the attribution of vertices in each graph keep unchanged, but the labels of the vertices are different. Based on this design motivation, the isomorphism of the graph can be utilized to augment DNN architectures for performance predictors because the topological and attribute information is crucial to such kinds of tasks, while the labeling of the vertices are meaningless. For each given annotated architecture $\mathcal{A}$ to be augmented, all its isomorphic graphs will have the same performance values as that of itself. As a result, the performance predictor can have a large number of annotated architectures. Obviously, this process is computationally cheap.
Algorithm~\ref{algorithm1} shows the details of the proposed augmentation method based on the isomorphism. Generally, the proposed isomorphic augmentation method is composed of two parts: the isomorphic information part (Lines~\ref{alg2_p1_start}-\ref{alg2_p1_end}), the graph generation part (Lines~\ref{alg2_p2_start}-\ref{alg2_p2_end}). The first part, as shown by its name, is mainly for the generation of isomorphic information. Specifically, based on the labeling sequence $l$, the permutation matrix $P$ is created to relabel the vertices (Lines~\ref{alg2_p1_start}-\ref{alg2_p1_p_gene}). Then, the adjacency matrix and the attribute vector after relabeling are calculated by multiplying the permutation matrix $P$. Thus, the topological information (i.e., the adjacency matrix) and the attribute information (i.e., the attribute vector) of the isomorphic graph to be generated are obtained. The third part is designed for the generation of the graph $G'$ using the above available information. In particular, the vertices $V'$ are generated by the adjacency matrix $A'$ (Lines~\ref{create_vertice_begin}-\ref{create_vertice_end}) and the edges $E'$ are built by the attribute vector $m'$ (Lines~\ref{create_edge_begin}-\ref{create_edge_end}). At last, the isomorphic graph $G'$ is created by $V'$ and $E'$. Note that the labeling of the input vertice and output vertice keep unchanged, because the operations of input and output are placeholders and meaningless for the performance of DNNs in performance predictors.
\begin{algorithm}
\caption{The Proposed Augmentation Method}\label{algorithm1}
\KwIn{The adjacency matrix $A$, the attribute vector $m$, and the labeling sequence $l$.}
\KwOut{The isomorphic graph $G'$.}
$N \leftarrow$ Count the number of vertices\;\label{alg2_p1_start}
$P \leftarrow$ Create a empty matrix with size of (N,N)\;
$i = 0$\;
\For{$j$ in $l$}{$P_{ij}=1$\;$i \leftarrow i+1$\;}\label{alg2_p1_p_gene}
$A' = PAP^{-1}$\;
$m' = mP^{-1}$\;\label{alg2_p1_end}
$V' \leftarrow \emptyset$\;\label{alg2_p2_start}
$E' \leftarrow \emptyset$\;
\For {i $\leftarrow$ 1 to $N$}{\label{create_vertice_begin}
$v_i \leftarrow$ Create vertice with attribute $m'_{i}$ \;\label{alg2_p2_l1}
$V' \leftarrow V'\cup v_i$\;
}\label{create_vertice_end}
\For {i $\leftarrow$ 1 to $N$}{ \label{create_edge_begin}
\For {j $\leftarrow$ 1 to $N$}{
\If{$A'_{ij}==1$}{
$e' \leftarrow (V'_{i}, V'_{j})$\;
$E' \leftarrow E'\cup e'$\;
}
}
}\label{create_edge_end}
$G' \leftarrow \{V',E'\}$\;\label{alg2_p2_end}
$\textbf{Return}$ $G'.$
\end{algorithm}
The proposed augmentation method has the following merits. Firstly, it is computationally friendly and there is no need for intensive computation sources to train the augmented DNN architectures for annotation. This is contributed by the isomorphism that could assign the same label of the base architecture to all the augmented architectures. As a result, the proposed augmentation method does not need extra computational resources for the annotation as usual.
Secondly, it can efficiently improve the performance of the performance predictors by generating sufficient data, which in turn enhances the superiority of the DNN architectures designed by the corresponding NAS algorithms. Specifically, the proposed augmentation method is expected to enhance the generalization ability of the performance predictor, thus improving the prediction ability on unseen architectures. The ablation study will prove the ability of the proposed augmentation method and can be checked from Subsection~\ref{exp_ablation_study}.
\subsection{The Encoding Method}\label{sec33}
The augmented architectures in the proposed algorithm are represented by graphs, which cannot efficiently serve as the input of performance predictors, although the graph-based models, such as GNN, can directly process this kind of data structure. The main reason is that graph-based models typically use average methods to accumulate information from each vertice in the graph, and the resulting information cannot be very descriptive~\cite{wu2020comprehensive}. As a result, the performance predictor will deteriorate. As suggested by one of our recent work~\cite{sun2021arctext}, the nature language-like description of DNNs would be more suitable for performance predictors in the context of NAS. Therefore, we propose the encoding method for this purpose. However, different types of architecture are independent of encoding, which requires the designed encoding method to be generic. As discussed in Section~\ref{sec_2}, the existing DNN architectures in NAS (i.e., the search space) can be classified into Operation On Node (OON) and Operation On Edge (OOE). Specifically, for the OON-based DNN architectures, the vertices represent the operation (e.g., 3$\times$3 convolution, 3$\times$3 max-pooling) and the edges represent the connections between vertices. In the OOE-based DNN architectures, the edges represent the operations, and the vertices represent the connections between the operations. In this paper, the OOE-based architectures are transformed to the OON-based architectures following the convention~\cite{liu2021homogeneous}. Furthermore, we propose a simple yet efficient encoding method for the OON-based architectures.
The proposed encoding method is simple and efficient. First, the edges of the graph $G$, representing the topological information of architecture $\mathcal{A}$, are described by an adjacency matrix $A \in {\{0,1\}}^{|V|\times |V|}$ initialized with all zeros. Then, the value of the element at the interaction of $i$-th row and $j$-th column of $M_A$ is specified as one if vertice with labeling $i$ and vertice with labeling $j$ are connected. Next, the attribute vector $m$ of $G$, in which the $i$-th element means the operation of the vertice labeled $i$, is transformed into an attribute matrix with the one-hot method. Finally, the matrix $M_A$ and the one-hotted attribute matrix are concatenated as the encoding of architecture $\mathcal{A}$. Particularly, the last two steps can be summarized by Equation~(\ref{equ_conct_oon}):
\begin{equation}\label{equ_conct_oon}
E(A,m) = concat\{flatten(A),flatten(oh(m))\}
\end{equation}
where $m$ denotes the attribute vector of $G$, $oh(\cdot)$ denotes the one-hot method, and $flatten(\cdot)$ and $concat(\cdot)$ denote the flatting of the matrix and the concatenation of vectors, respectively. Specifically, the adjacency matrix $A$ is flattened into a one-dimension vector. The attribute matrix is also flattened into a one-dimension vector after the use of the one-hot method, and the concatenation is only to connect both vector strings.
\begin{figure}[htbp]
\centerline{\includegraphics[width=0.5\textwidth]{encoding_example}}
\caption{An example of the encoding for OON-based architecture. \textbf{(a)}: the architecture to be represented. \textbf{(b)}: The top section shows the label of these vertices, and the bottom section shows the operation of these vertices. \textbf{(c)}: The top section is the adjacency matrix, and the bottom section is the one-hot vector of the operation list. \textbf{(d)}: the resulted encoding.}\label{fig_example_encoding_oon}
\end{figure}
An example of this encoding process is shown in Fig.~\ref{fig_example_encoding_oon} for a quick glance. Specifically, Fig.~\ref{fig_example_encoding_oon}(a) represents an OON-based architecture to be encoded, which is composed of three operations (a max-pooling vertice, two convolutional vertices with kernel sizes of $1\times 1$ and $3\times3$). In Fig.~\ref{fig_example_encoding_oon}(b), the upper denotes its labeling sequence, and the lower denotes its operation type. Based on this, its adjacency matrix and the attribute matrix transformed by the one-hot method are obtained, which are shown in the upper part and the lower part of Fig.~\ref{fig_example_encoding_oon}(c), respectively. Finally, both are connected as the whole encoding of this architecture, as shown in Fig.~\ref{fig_example_encoding_oon}(d).
\section{Experiments and Analysis}\label{sec_4}
To verify the effectiveness of the proposed GIAug algorithm, a series of experiments are conducted and then be analyzed in this section. Specifically, the search space and the corresponding datasets on which GIAug will be investigated are introduced in Subsection~\ref{sec_search_space}, and then the experiment results are demonstrated in Subsections~\ref{sec4_com_np} to \ref{exp_ablation_study}. In particular, the experiments of GIAug are conducted from three aspects: the comparison against state-of-the-art performance predictors, the comparisons against state-of-the-art NAS algorithms, and the ablation study against itself.
\begin{figure}[!htp]
\centering
\subfloat[Cells in NAS-Bench-101]{\includegraphics[width=0.4\textwidth]{searchspace-1}\label{fig_nas101_example}}
\hfil
\subfloat[Cells in NAS-Bench-201]{\includegraphics[width=0.5\textwidth]{searchspace-2}\label{fig_nas201_example}}
\hfil
\subfloat[Cells in DARTS]{\includegraphics[width=0.4\textwidth]{search-space-darts}\label{fig_darts_example}}
\caption{The cells in the search spaces NAS-Bench-101~\cite{ying2019bench}, NAS-Bench-201~\cite{dong2020bench}, and DARTS~\cite{liu2018darts}.}\label{fig_benchmark_examples}
\end{figure}
\subsection{Search Space}\label{sec_search_space}
As highlighted, existing search spaces are composed of two different categories: the OON and the OOE. In order to extensively demonstrate the superiority and the generalization of the proposed GIAug method, we perform the experiments on both types of search spaces. In this experiment, we adopt the search space of two widely used NAS benchmarks (i.e., the NAS-Bench-101~\cite{ying2019bench} and the NAS-Bench-201~\cite{dong2020bench} ) and the search space of a famous NAS algorithm (i.e., the DARTS algorithm~\cite{liu2018darts}). Specifically, the search space of NAS-Bench-101 follows the OON category, and the search spaces of the NAS-Bench-201 and DARTS follow the OOE category.
\textbf{NAS-Bench-101} is a popular benchmark dataset for NAS algorithms. It provides a large number of CNN architectures that have been exhaustively enumerated and then trained in advance. As a result, the related researchers can computationally cheaply perform experiment comparisons with their own NAS algorithms. Specifically, NAS-Bench-101 released $423,624$ different CNN architectures with performance trained on CIFAR-10 image classification benchmark dataset.
For the search space of NAS-Bench-101, it defines one 3$\times$3 convolution as the initial layer. Then it stacks each cell for three times, followed by a downsampling layer. At last, it repeats this pattern for three times, followed by global average pooling and a dense softmax layer. In addition, each cell in NAS-Bench-101 is limited to seven operations, including both the input and the output, and the possible operations are 1$\times$1 convolution, 3$\times$3 convolution, and the 3$\times$3 max-pooling. Fig.~\ref{fig_nas101_example} shows two examples of the architectures sampled from the search space of NAS-Bench-101, which has five operations and seven operations, respectively. As can be seen from this example, the operations are in the vertices, which follows the category of OON search space.
\textbf{NAS-Bench-201} is also a benchmark dataset similar to NAS-Bench-101 with the difference regarding the OOE search space, containing $15,625$ CNN architectures. Specifically, the skeleton of NAS-Bench-201 is initiated with one 3$\times$3 convolution and a batch normalization layer. The main body of the skeleton includes three stacks of cells, connected by a residual block and ends up with a global average pooling layer. Each cell has four vertices and does not limit the number of edges. Specifically, each edge of NAS-Bench-201 is associated with an operation selected from a predefined operation set including: zeroize, skip connection, 1$\times$1 convolution, 3$\times$3 convolution, an 3$\times$3 average pooling. Unlike NAS-Bench-101, the operations are defined on the edges as shown in the Fig.~\ref{fig_nas201_example}.
\textbf{DARTS} is a famous NAS algorithm based on the gradient descent category. Owing to the effectiveness in terms of the gradient-based algorithms, there have been a large number of DARTS-based variants~\cite{xu2019pc} that use the same search space as that of DARTS. In addition, in contrast to NAS-Bench-101 and NAS-Bench-201 that are mainly investigated on median-scale image classification tasks (e.g., CIFAR-10), the variants based on DARTS are often investigated on the ImageNet~\cite{deng2009imagenet} that is a challenging large-scale image dataset. Specifically, DARTS consists of two types of cells: the normal cell and the reduction cell. All normal cells are constrained to have the same architectures, as the same situations for reduction cells, but the architecture of the normal cells is independent of that of the reduction cells. In addition, every application in the reduction cells is followed by a convolutional operation with the stride of $2$ to reduce the image size, whereas normal cells keep the image size unchanged.
As shown in Fig.~\ref{fig_darts_example}, the normal cell and the reduction cell are with the same two inputs and one output. Each consists of seven vertices, and each edge in the cell is associated with an operation selected from a predefined operation set containing 3$\times$3 separable convolutions, 5$\times$5 separable convolutions, 3$\times$3 dilated separable convolutions, 3$\times$3 max pooling, 3$\times$3 average pooling, identity, and zeroize.
\begin{table*}[htp]
\caption{The results \textbf{(measured by Kendall's Tau)} of GIAug on \textbf{NAS-Bench-101} against chosen performance predictors using training data with proportions of $0.01\%$, $0.03\%$, $0.05\%$, $0.07\%$, $0.1\%$, $0.3\%$, $0.5\%$, $0.7\%$, and $1\%$.}
\setlength\tabcolsep{3pt}
\begin{center}
\begin{tabular}{c|ccccccccc}
\hline
\multirow{1}{*}{}
& 0.01\%(\%) & 0.03\%(\%) & 0.05\%(\%) & 0.07\%(\%) & 0.1\%(\%) & 0.3\%(\%) & 0.5\%(\%) & 0.7\%(\%) & 1\%(\%) \\ \hline
AlphaX~\cite{wang2019alphax} & 12.17 & 32.29 & 32.96 & 36.42 & 41.09 & 41.13& 45.00 & 43.11& 44.86 \\
Peephole~\cite{deng2017peephole} & 10.65 & 7.35 & 19.74 & 15.33 & 14.14 & 11.41& 22.39 & 37.50& 28.47 \\
ReNAS~\cite{xu2021renas} & - & - & - & - & 65.74 & - & - & - & \textbf{81.61} \\
RFGIAug(ours) & \textbf{46.99$\pm$0.31} & \textbf{63.42$\pm$0.33} & \textbf{65.00$\pm$0.17} & \textbf{66.58$\pm$0.14} & \textbf{67.27$\pm$0.30} & \textbf{72.36$\pm$0.10}& \textbf{74.21$\pm$0.07} & \textbf{74.86$\pm$0.05}& 76.41$\pm$0.03 \\ \hline\hline
E2EPP~\cite{sun2019surrogate} & 17.59 & 37.60& 48.98& 52.84 & 52.91 & 64.98& 67.06 & 68.21& 68.82 \\
E2EPP+GIAug(ours) & \textbf{48.35$\pm$0.48} & \textbf{66.29$\pm$0.29} & \textbf{65.98$\pm$0.25} & \textbf{66.76$\pm$0.27} & \textbf{67.58$\pm$0.29} & \textbf{71.60$\pm$0.32}& \textbf{72.21$\pm$0.42} & \textbf{72.71+0.15}& \textbf{73.05$\pm$0.40} \\\hline\hline
NPNAS~\cite{wen2020neural} & 53.06 & 63.77 & 66.29 & 63.36 & 65.47 & 67.40& 68.36 & 70.13& 71.46 \\
NPNAS+GIAug(ours) & \textbf{55.67$\pm$4.62} & \textbf{64.59$\pm$3.99} & \textbf{66.48$\pm$1.27} & \textbf{67.85$\pm$0.70} & \textbf{71.04$\pm$0.30} & \textbf{73.71$\pm$0.27} & \textbf{75.34$\pm$0.27}& \textbf{76.24$\pm$0.34} & \textbf{76.74$\pm$0.15} \\ \hline
\end{tabular}
\end{center}\label{result_pp_101_ktau}
\end{table*}
\subsection{Comparison Against performance predictors}\label{sec4_com_np}
This comparison is conducted on NAS-Bench-101 and NAS-Bench-201, and two popular metrics, i.e., Kendall's Tau~\cite{sen1968estimates} and $N@K$~\cite{ning2020generic}, are used for the quantitative measurement.
Specifically, Kendall's Tau describes the correlation between the orders regarding the predicted value and the ground-truth values, which can be described by Equation~(\ref{eq_Ktau}):
\begin{equation}\label{eq_Ktau}
\text { Kendall's Tau }=2 \times \frac{\text { number of concordant pairs }}{n(n-1) / 2}-1
\end{equation}
where $n$ denotes the number of samples, and the concordant pair means that the rankings of predicted values and the actual values of a given pair are the same. The value of Kendall's Tau ranges between $[-1, 1]$. The closer the value to $1$, the better performance of the predictors. Kendall's Tau has been widely used by existing performance predictors for the comparison~\cite{sun2019surrogate,wen2020neural,xu2021renas,deng2017peephole,tang2020semi}. However, all concordant pairs in Kendall's Tau are treated equally, which also include the poor architectures that are often out of the concerns of NAS algorithms in practice. In complement to this, the $N@K$ metric is also collectively used, which measures the best rank of the top $K$ out of the $N$ architectures predicted by the performance predictors. For example, if there are $N$ architectures in the test dataset, when the performance predictor has been built, the performance of these $N$ architectures are predicted, and then the top $K$ architectures with the highest performance are selected. After that, the ranks of these $K$ architectures with their true performance in the test dataset are collected, and then the best one is selected for the comparison. The smaller the $N@K$ value, the better the performance predictor. The $N@K$ metric is very popular among related works published recently~\cite{ning2020generic,chen2021not}.
\subsubsection{\textbf{Comparisons of Predictors on NAS-Bench-101}}\label{sec_comp_pp_101}
On the NAS-Bench-101 dataset, the state-of-the-art performance predictors chosen for the comparison are AlphaX~\cite{wang2019alphax}, Peephole~\cite{deng2017peephole}, E2EPP~\cite{sun2019surrogate}, ReNAS~\cite{xu2021renas} and NPNAS~\cite{wen2020neural}. Please note that AlphaX used different regression models in its seminal paper for the experiment demonstration, in this paper, we use its implementation based on the MLP for the comparison by following the conventions in~\cite{ning2020generic,chen2021not}. In addition, we implement the proposed GIAug method by using the Random Forest (RF)~\cite{breiman2001random} as the regression model, and named as RFGIAug for the discussion. Specifically, the RF is an ensemble model that often can easily achieve the best performance without too much manual tuning, and is very popular among various challenge competitions (the effectiveness of using RF has also been verified in the ablation study shown in Subsection~\ref{exp_ablation_study}). Furthermore, in order to show the flexibility of the proposed GIAug method, we also embed GIAug into E2EPP and NPNAS for the comparisons, which are named E2EPP+GIAug and NPNAS+GIAug, respectively, for the convenience of the discussion.
By following the conventions of the community~\cite{ning2020generic,chen2021not}, we also use $0.05\%$ and $0.1\%$ of the whole training dataset for the training of the compared performance predictors, and then test them on the remaining dataset for reporting the experiment results in terms of the chosen metrics. In addition, in order to comprehensively investigate the effectiveness of the proposed GIAug method, we additionally add another seven groups with different proportions of training data for the comparison in terms of the Kendall's Tau metric (i.e., $0.01\%$, $0.03\%$, $0.07\%$, $0.3\%$, $0.5\%$, $0.7\%$, and $1\%$). This addition is with the fact that a large amount of data is not available in practice, and this comprehensive investigation can fully reveal the effectiveness of GIAug.
To validate the stability of GIAug, we randomly sample a specified proportion of data from NAS-Bench-101 as training data in each experiment, and repeat the experiment for $10$ times.
In addition, the number of trees in the RF is specified as $230$, and the mean squared error criterion is used as the loss function.
\begin{table}[htp]
\caption{The results (measured by $N@K$ with $K=5$ and $10$) of GIAug on \textbf{NAS-Bench-101} against chosen performance predictors using training data with proportions of $0.05\%$ and $0.1\%$.}
\begin{center}
{
\begin{tabular}{c|cccc}
\hline
\multirow{2}{*}{} & \multicolumn{2}{c|}{0.05\%} & \multicolumn{2}{c}{0.1\%} \\ \cline{2-5}
& N@5 & \multicolumn{1}{c|}{N@10} & N@5 & N@10 \\ \hline
AlphaX~\cite{wang2019alphax} & - & \multicolumn{1}{c|}{-} & 57 & 58 \\
Peephole~\cite{deng2017peephole} & 7794 & \multicolumn{1}{c|}{7794} & 17288 & 17288 \\
RFGIAug (Ours) & \textbf{24} & \multicolumn{1}{c|}{\textbf{24}} & \textbf{14} & \textbf{14} \\ \hline\hline
E2EPP~\cite{sun2019surrogate} & 2430 & \multicolumn{1}{c|}{600} & 384 & 384 \\
E2EPP+GIAug (Ours) & \textbf{311} & \multicolumn{1}{c|}{\textbf{62}} & \textbf{2} & \textbf{2} \\\hline\hline
NPNAS~\cite{wen2020neural} & 22570 & \multicolumn{1}{c|}{5279} & 19487 & 19487 \\
NPNAS+GIAug (Ours) & \textbf{574} & \multicolumn{1}{c|}{\textbf{285}} & \textbf{107} & \textbf{107} \\\hline
\end{tabular}}
\end{center}\label{result_pp_101_NK}
\end{table}
\begin{table*}[htp]
\caption{The results \textbf{(measured by Kendall's Tau)} of GIAug on \textbf{NAS-Bench-201} against chosen performance predictors using training data with proportions of $0.5\%$, $1\%$, $5\%$, $10\%$, $15\%$, $20\%$.}
\begin{center}
\begin{tabular}{c|cccccc}
\hline
\multirow{1}{*}{}
& 0.5\%(\%) & 1\%(\%) & 5\%(\%) & 10\%(\%) & 15\%(\%) & 20\%(\%) \\ \hline
AlphaX~\cite{wang2019alphax} & - & 9.74 & 39.59 & 53.88 & - & - \\
Peephole~\cite{deng2017peephole} & 1.64 & -2.35 & 26.49 & 36.52 & 29.42 & 33.31 \\
RFGIAug(ours) & \textbf{70.02$\pm$0.14} & \textbf{73.56$\pm$0.13} & \textbf{81.86$\pm$0.08} & \textbf{83.64$\pm$0.02} & \textbf{84.52$\pm$0.03} & \textbf{85.93$\pm$0.03} \\ \hline\hline
E2EPP~\cite{sun2019surrogate} & 53.25 & 65.73 & 70.14 & 72.10 & 73.02 & 74.17 \\
E2EPP+GIAug(ours) & \textbf{72.10$\pm$0.45} & \textbf{76.06$\pm$0.23} & \textbf{77.97$\pm$0.18} & \textbf{78.72$\pm$0.08} & \textbf{79.26$\pm$0.34} & \textbf{79.86$\pm$0.09}\\ \hline
NPNAS~\cite{wen2020neural} & 64.19& 75.50 & 76.79 & 77.85 & 79.00& 79.43 \\
NPNAS+GIAug(ours) & \textbf{74.51$\pm$1.16} & \textbf{80.41$\pm$2.34} & \textbf{84.92$\pm$0.12} & \textbf{85.16$\pm$0.22} & \textbf{85.26$\pm$0.37} & \textbf{85.32$\pm$0.27}\\ \hline
\end{tabular}
\end{center}\label{result_pp_201_Ktau}
\end{table*}
The experiment results measured by Kendall's Tau are shown in Table~\ref{result_pp_101_ktau}, which are composed of three parts. The first is the comparison against AlphaX, Peephole, and ReNAS. The second and the third are about the E2EPP and NPNAS with and without the use of GIAug. Please note that the symbols of ``-'' in the table implies there is no result publicly reported in the corresponding literature. As can be seen from the first part, RFGIAug wins the peer competitors on all the proportions of training data, except for $1\%$. Furthermore, with the use of GIAug, the performance of E2EPP improves on all the different numbers of training samples. The same superiority can also be investigated from NPNAS with the use of GIAug, the performance of NPNAS also enhance in the different settings of training samples.
The experiment results in terms of the $N@K$ metric are shown in Table~\ref{result_pp_101_NK}. Specifically, in each specified number of training samples, the values of $K$ in the metric are specified as $5$ and $10$ as suggested in~\cite{ning2020generic,chen2021not}. As can be seen from Table~\ref{result_pp_101_NK}, RFGIAug outperforms all competitors. Particularly, when using $0.05\%$ of the training data, the value of $N@K$ obtained by RFGIAug accounts for less than $1\%$ obtained by Peephole. The superiority of RFGIAug becomes significant when using $0.1\%$ of the training data, where the values of RFGIAug and Peephole are $14$ and $17,288$, respectively. Furthermore, GIAug can also enhance the performance of E2EPP and NPNAS with the different number of training data under both settings of $K$.
\begin{table}
\caption{The comparisons \textbf{(measured by $N@K$)} of the proposed GIAug method on \textbf{NAS-Bench-201} against chosen performance predictors using training data with proportions of $1\%$ and $10\%$ with $K=5$ and $K=10$.}
\begin{center}
{
\begin{tabular}{c|cccc}
\hline
\multirow{2}{*}{} & \multicolumn{2}{c|}{1\%} & \multicolumn{2}{c}{10\%} \\ \cline{2-5}
& N@5 & \multicolumn{1}{c|}{N@10} & N@5 & N@10 \\ \hline
AlphaX~\cite{wang2019alphax} & - & \multicolumn{1}{c|}{-} & 1538 & 224 \\
Peephole~\cite{deng2017peephole} & 1607 & \multicolumn{1}{c|}{1569} & 9981 & 529 \\
RFGIAug(Ours) & \textbf{7} & \multicolumn{1}{c|}{\textbf{4}} & \textbf{1} & \textbf{1} \\ \hline\hline
E2EPP~\cite{sun2019surrogate} & 22 & \multicolumn{1}{c|}{1} & 1 & 1 \\
E2EPP+GIAug(Ours) & \textbf{1} & \multicolumn{1}{c|}{\textbf{1}} & \textbf{1} & \textbf{1} \\
\hline\hline
NPNAS~\cite{wen2020neural} &166 & \multicolumn{1}{c|}{166} & 159 & 3 \\
NPNAS+GIAug(Ours) & \textbf{2} & \multicolumn{1}{c|}{\textbf{1}} & \textbf{1} & \textbf{1} \\ \hline
\end{tabular}}
\end{center}\label{result_pp_201_NK}
\end{table}
\subsubsection{\textbf{Comparisons of Predictors on NAS-Bench-201}}\label{sec_comp_pp_201}
Similar to the experiments on NAS-Bench-101, we use the same regression model for implementing the proposed GIAug method and the same peer competitors for the experiments conducted on NAS-Bench-201, except that the ReNAS is not chosen because there are no corresponding results reported in its seminal paper nor source code publicly available. Furthermore, although the proportions of the training data used are different from those specified for NAS-Bench-101, their particular numbers of training data are nearly the same because NAS-Bench-201 has quite fewer training data than NAS-Bench-101 does.
The experiment results measured by Kendall's Tau are shown in Table~\ref{result_pp_201_Ktau}. As can be seen from the second row of this table, RFGIAug still achieves the best performance with substantial improvement on the six different settings regarding the number of training data. This can also be observed from the comparisons against E2EPP and NPNAS. Especially, when E2EPP and NPNAS are implemented with GIAug, their performance is almost kept unchanged when the number of training data is more than $5\%$. This indicates that GIAug is more suitable to the real scenario of utilizing performance predictors, where there are often few labeled architectures. In addition, with much fewer training data, e.g., $0.5\%$, GIAug increases the Kendall's Tau of E2EPP by $35\%$, and NPNAS by $16\%$, which are significant improvements.
The results measured by $N@K$ is shown in Table~\ref{result_pp_201_NK}. As can be seen, RFGIAug wins AlphaX and Peephole in terms of both settings of $k$ upon different numbers of training samples. Specifically, the values of RFGIAug are all one when using $10\%$ training samples, which indicates that RFGIAug has found the architecture with the best performance, and can completely guide the search of the corresponding NAS algorithm. Furthermore, GIAug can also enhance the performance of E2EPP. Specifically, GIAug improves the value of $N@K$ of E2EPP by $21$ places when the proportion is $1\%$ and $K$ equals $5$. A similar superiority can also be observed upon NPNAS. Specifically, when the proportions are $1\%$, the $N@5$ and $N@10$ of NPNAS are improved by $164$ places and $165$ places, respectively. Besides, GIAug improves the $N@5$ and the $N@10$ to $1$ when the proportion is $10\%$.
\subsection{Comparisons against Neural Architecture Search (NAS)}\label{sec4_com_nas}
Although the effectiveness of GIAug has been verified by the comparisons against the state-of-the-art performance predictors, the ultimate purpose of designing GIAug is to improve the performance of NAS algorithms. As a result, the comparisons against state-of-the-art NAS are also conducted in this section. Specifically, the experiments are conducted on two commonly used datasets: CIFAR-10 and ImageNet. The architectures are tested on CIFAR-10 when searching on NAS-Bench-101 and NAS-Bench-201, and ImageNet when searching on DARTS search space. Please note that the experiment results are measured by different combinations of evaluation metrics, for the purpose of keeping consistent with the NAS algorithms compared. Specifically, the test accuracy (in short named test) is used by all comparisons, while for other metrics, we will detail them in the related comparisons. As for GIAug, we still use the RF as the regression model, and then implement a simple NAS based on the standard genetic algorithm to search for the best architecture.
\subsubsection{\textbf{NAS on NAS-Bench-101}}\label{sec_comp_nas_101}
In this experiment, the peer competitors are the corresponding NAS algorithms using the performance predictors of Peephole, E2EPP, ReNAS, and SSANA~\cite{tang2020semi}, and their results used for comparisons are from references~\cite{xu2021renas,tang2020semi}. For the convenience of the discussion, we still use their names to represent the corresponding NAS algorithms for the comparison. The experiments are carried out on $424$ training samples and $1,000$ training samples to train performance predictors, following the conventions in~\cite{xu2021renas,tang2020semi}. In addition, we also employ the ``rank'' as the additional metric, which reflects the true ranking of the searched architecture in the NAS-Bench-101 dataset, considering its popularity in recent works~\cite{xu2021renas,tang2020semi}. Furthermore, we independently perform each NAS algorithm for $20$ runs and report the best results for the comparison.
\begin{table}
\caption{Test accuracy rate and ranking of the searched architectures on \textbf{NAS-Bench-101} with $424$ and $1,000$ annotated architectures randomly selected to train predictors.}
\begin{center}
{
\begin{tabular}{c|cc|cc}
\hline
\multirow{2}{*}{} & \multicolumn{2}{c|}{424 samples} & \multicolumn{2}{c}{1,000 samples} \\ \cline{2-5}
& test(\%) & rank(\%) & test(\%) & rank(\%) \\ \hline
Peephole~\cite{deng2017peephole} & 92.94 & 12.32 & 93.75 & 1.64 \\
E2EPP~\cite{sun2019surrogate} & 93.91 & 1.23 & 93.90 & 0.15 \\
ReNAS~\cite{xu2021renas} & 94.06 & 0.02 & - & - \\
SSANA~\cite{tang2020semi} & - & - & 94.13 & 0.01 \\ \hline
RFGIAug & \textbf{94.23} & \textbf{0.007} & \textbf{94.20} & \textbf{0.004} \\ \hline
\end{tabular}}
\end{center}\label{result_nas_101}
\end{table}
The results of the experiment are shown in Table~\ref{result_nas_101}. As can be seen, when using $424$ samples for training the corresponding performance predictors, RFGIAug obtains the highest test accuracy of $94.23\%$, while Peephole, E2EPP, and ReNAS are $92.94\%$, $93.91\%$, and $94.06\%$, respectively. In terms of the metric of ``rank'', RFGIAug achieves the value of $0.007\%$, which is one, three, and four orders of magnitude less than Peephole, E2EPP, and ReNAS, respectively. When the number of training samples increases to $1,000$, RFGIAug is still the champion, having the highest test accuracy and the least value measured by the ``rank'' metric.
\subsubsection{\textbf{NAS on NAS-Bench-201}}\label{sec_comp_nas_201}
Most of the peer competitors in this experiment are the NAS algorithms, which are mainly collected from two different categories. The first is from the seminal paper of NAS-Bench-201 and the second is from the NAS literature. In particular, these algorithms include REA~\cite{real2019regularized} and NPENAS~\cite{wei2020npenas} based on evolutionary computation, REINFORCE~\cite{williams1992simple} and ENAS~\cite{pham2018efficient} based on reinforcement learning, and DARTS-V1~\cite{liu2018darts}, DARTS-V2~\cite{liu2018darts}, GDAS~\cite{dong2019searching}, and SETN~\cite{dong2019one} based on gradient-descent algorithms. Furthermore, we also chose the RSPS~\cite{li2020random} algorithm and the BOHB~\cite{falkner2018bohb} algorithm, which are achieved by random search and hyperparameter optimization, and other three performance predictor-based NAS algorithms (i.e., ReNAS~\cite{xu2021renas}, E2EPP~\cite{sun2019surrogate}, NASBOT~\cite{white2020study}), as the peer competitors.
\begin{table}
\caption{Validation accuracy and test accuracy of the searched architectures on \textbf{NAS-Bench-201} for \textbf{CIFAR-10}.}
\begin{center}
\begin{tabular}{c|c|cc}
\hline
& Val(\%) & \multicolumn{1}{c|}{Test(\%)} & seconds \\ \hline
RSPS~\cite{li2020random} & 85.85 & \multicolumn{1}{c|}{91.04} & 7587.12 \\
DARTS-V1~\cite{liu2018darts} & 39.77 & \multicolumn{1}{c|}{54.30} & 10889.87 \\
DARTS-V2~\cite{liu2018darts} & 39.77 & \multicolumn{1}{c|}{54.30} & 29901.67 \\
GDAS~\cite{dong2019searching} & 90.21 & \multicolumn{1}{c|}{93.64} & 28925.91 \\
SETN~\cite{dong2019one} & 87.42 & \multicolumn{1}{c|}{90.82} & 31009.81 \\
ENAS~\cite{pham2018efficient} & 39.77 & \multicolumn{1}{c|}{54.30} & 13314.51 \\ \hline
NPENAS~\cite{wei2020npenas} & 91.19 & \multicolumn{1}{c|}{91.68} & - \\
REA~\cite{real2019regularized} & 91.50 & \multicolumn{1}{c|}{94.22} & 0.02 \\
NASBOT~\cite{white2020study} & - & \multicolumn{1}{c|}{93.87} & - \\
REINFORCE~\cite{williams1992simple} & 91.46 & \multicolumn{1}{c|}{94.22} & 0.12 \\
BOHB~\cite{falkner2018bohb} & 91.35 & \multicolumn{1}{c|}{94.13} & 3.59 \\
ReNAS~\cite{xu2021renas} & 91.21 & \multicolumn{1}{c|}{94.24} & 86.31 \\
E2EPP~\cite{sun2019surrogate} & ~\textbf{91.50} & \multicolumn{1}{c|}{94.14} & 0.06 \\ \hline
RFGIAug & 91.43 & \multicolumn{1}{c|}{\textbf{94.25}} & 0.06 \\ \hline
\end{tabular}
\end{center}\label{result_nas_201}
\end{table}
In addition to the test accuracy, we also report the validation (denoted as val) accuracy and the query time (measured by seconds) for the comparison, which is still based on the available results publicly made by the corresponding literature. Furthermore, $424$ training samples were randomly selected to train RFGIAug, which is the least number among the performance predictor-based peer competitors, and then the best one is picked up for the comparisons after independently repeating $20$ times.
The experiment results are shown in Table~\ref{result_nas_201}. Specifically, RFGIAug outperforms all 13 peer competitors in terms of test accuracy. In addition, although RFGIAug is slightly inferior to REA, REINFORCE, and E2EPP ($0.07\%$, $0.03\%$, and $0.07\%$, respectively), it wins all the remaining 10 peer competitors with the least improvement of $0.08\%$ (BOHB) and the highest improvement of $59.66\%$ (on both DARTS-V1 and DARTS-V2). Furthermore, RFGIAug consumes significantly less query time compared with the peer competitors collected from the seminal paper of NAS-Bench-201, and the competitive query time compared with the algorithms falling into the second category of the chosen peer competitors.
\subsubsection{\textbf{NAS on DARTS}}\label{sec_comp_nas_darts}
The target dataset used in this group of experiments is ImageNet. The peer competitors chosen are the architecture obtained from NASNet-A~\cite{zoph2018learning}, the architecture searched by AmoebaNet-B~\cite{real2019regularized}, and the architecture reported by DARTS, which are all state of arts.
\begin{table}[htp]
\caption{The experiment results on the search space of \textbf{DARTS} for \textbf{ImageNet}.}
\begin{center}
\begin{tabular}{c|ccc}
\hline& GPU days
& \#Parameter & Test(\%) \\ \hline
AmoebaNet-B~\cite{real2019regularized} & 3,150 & 5.3M & 74.0 \\
NASNet-A~\cite{zoph2018learning} & 2,000 & 5.3M & 74.0 \\
DARTS~\cite{liu2018darts} & 4 & 4.7M & 73.3 \\ \hline
RFGIAug & \textbf{1.5} & 4.8M & 73.4 \\ \hline
\end{tabular}
\end{center}\label{result_nas_darts}
\end{table}
Different from the experiments on NAS-Bench-101 and NAS-Bench-201, there are no available labeled architectures sampled from the search space of DARTS, which are used to train GIAug in this experiment. To achieve this, we randomly sampled $100$ architectures from the search space of DARTS, and then trained them one by one to construct an annotated architecture dataset. Specifically, each architecture was trained on CIFAR-10 for $50$ epochs by using the stochastic gradient descent (SGD) algorithm, with an initial learning rate of $0.05$, a momentum of $0.9$, a weight decay of $3.0\times10^{-4}$, and a mini-batch size of $64$. The softmax cross-entropy was used as the loss function. This process consumed $1.5$ GPU days with four NVIDIA 2080TI GPU cards. After the training, these $100$ annotated architectures were used to train GIAug where the RF was still as the regression model. Since DARTS has two different cells, i.e., normal cell and reduction cell, the regression models for these two cells are trained separately. After that, the trained two regression models generated a final model through the model ensemble. With the simply implemented NAS algorithm with GIAug, the best performing cell searched on the CIFAR-10 dataset was then transferred to ImageNet for reporting the experiment results. Please note that this process of transferring is a convention of investigating the performance of NAS algorithms on challenging datasets among the NAS community~\cite{liu2018darts}. Specifically, the architecture was trained on ImageNet for $250$ epochs at an initial learning rate of $0.025$ and a weight decay of $5.0\times 10^{-4}$ with SGD, where the momentum, the loss function, and the mini-batch size were specified as the same as making the annotated architectures above. By following the conventions, the number of parameters regarding the architecture and the GPU day used to obtain the architecture are also used as the metrics in this comparison, in addition to the test accuracy.
The experiment results are reported in Table~\ref{result_nas_darts}. As can be seen from Table~\ref{result_nas_darts}, RFGIAug consumes much fewer GPU days, while still achieving promising test accuracy on ImageNet and also has fewer parameters of the searched architecture. Specifically, RFGIAug uses 1.5 GPU days, while AmoebaNet-B, NASNet-A, and DARTS consume $3,150$ GPU days, $2,000$ GPU days and $4$ GPU days, respectively. In terms of the parameter number, the architecture searched by RFGIAug is slightly larger than that searched by DARTS (4.8M v.s. 4.7M), which are fewer than those searched by NASNet-A and AmoebaNet-B (both are 5.3M). This is in contrast to the test accuracy, where RFGIAug is better than DARTS ($73.4\%$ v.s. $73.3\%$), but inferior to NASNet-A and AmoebaNet-B (both are $74.0\%$). This experiment verifies the effectiveness of the proposed algorithm that primarily aims at improving the efficiency of NAS algorithms without significant performance deterioration based on the non-free-lunch theory.
\begin{table*}[]
\caption{Comparisons \textbf{(measured by Kendall's Tau)} on regression models on \textbf{NAS-Bench-101}. 0.1\% proportions architectures of NAS-Bench-101 are used to train the regression models.}
\begin{center}
\begin{tabular}{c|cccccccccc}
\hline
\multirow{2}{*}{Case} & \multicolumn{9}{c}{Regression Model (with 424 data)} \\ \cline{2-10}
& SVR & MLP & LR & KNN & ExtraTree & Bagging & DT & GBRT & RF \\ \hline
1 & 0.3152 & 0.0477 & 0.3262 & 0.3353 & 0.3339 & 0.4535 & 0.3297 & 0.4939 & 0.5054 \\
2 & 0.3393 & 0.2046 & 0.4916 & 0.4473 & 0.3951 & 0.4904 & 0.3949 & 0.5128 & 0.5151 \\
3 & 0.4266 & 0.3719 & 0.3083 & 0.4045 & 0.5046 & 0.6201 & 0.5119 & 0.5687 & 0.6597 \\
4 & \textbf{0.4341} & \textbf{0.5108} & \textbf{0.5216} & \textbf{0.5094} & \textbf{0.5195} & \textbf{0.6397} & \textbf{0.5245} & \textbf{0.6024} & \textbf{0.6727} \\ \hline
\end{tabular}
\end{center}\label{result_abl_101}
\end{table*}
\begin{table*}[]
\caption{Comparisons \textbf{(measured by Kendall's Tau)} on regression models on \textbf{NAS-Bench-201}. 5\% proportions (781) architectures of training data are used to train the regression models.}
\begin{center}
\begin{tabular}{c|ccccccccc}
\hline
\multirow{2}{*}{Case} & \multicolumn{9}{c}{Regression Model (with 781 data)} \\ \cline{2-10}
& SVR & MLP & LR & KNN & ExtraTree & Bagging & DT & GBRT & RF \\ \hline
1 & 0.4289 & 0.1717 & 0.4059 & 0.5932 & 0.6760 & 0.7313 & 0.6728 & 0.7200 & 0.7318 \\
2 & 0.5576 & 0.3147 & 0.6539 & 0.6550 & 0.6841 & 0.7247 & 0.6793 & \textbf{0.7381} & 0.7334 \\
3 & 0.5718 & 0.7889 & 0.4092 & 0.5929 & 0.7121 & 0.7806 & 0.7281 & 0.6832 & 0.7867 \\
4 & \textbf{0.6525} & \textbf{0.7890} & \textbf{0.6851} & \textbf{0.7316} & \textbf{0.7681} & \textbf{0.8067} & \textbf{0.7643} & 0.7087 & \textbf{0.8189} \\ \hline
\end{tabular}
\end{center}\label{result_abl_201}
\end{table*}
\subsection{Ablation Study}\label{exp_ablation_study}
As highlighted in Section~\ref{sec3}, the proposed encoding method and the architecture augmentation method are the core designs of the proposed GIAug method. To demonstrate the effectiveness of both components, the ablation study is conducted in this section.
To illustrate the capability of the proposed encoding method, the encoding method defined in ReNAS, which has been popularly used by existing algorithms, is chosen as the peer competitor. Specifically, the encoding method of ReNAS uses categorical integers to represent the operation type of vertices. Then, the type vector is broadcasted into the adjacency matrix $M_{A}$ to encode the whole architecture, which can be expressed by Equation~(\ref{eq_renas}):
\begin{equation}\label{eq_renas}
E(A,m) = M_{A} \times strech(integer(m))\}
\end{equation}
where $A$ denotes the adjacency matrix of the given architecture, $m$ denotes the attribute vector and each operation is an integer in $m$ $integer(\cdot)$, and $strech(\cdot)$ stretches a vector into a square matrix.
To further illustrate the generalizability of the proposed GIAug method, multiple popular regression models are also chosen for the study. These regression models are Decision Tree (DT)~\cite{breiman2017classification}, Linear Regression(LR), Support Vector Regression (SVR)~\cite{chang2011libsvm}, K-Nearest Neighbors (KNN), Random Forest (RF)~\cite{breiman2001random}, Gradient Boosted Regression Tree (GBRT)~\cite{friedman2001greedy}, Bagging~\cite{breiman1996bagging}, and ExtraTree~\cite{geurts2006extremely}. We elaborate the four following cases for the comprehensive ablation study:
$\textbf{case 1 (baseline)}$: Using the encoding method of ReNAS and without the proposed data augmentation;
$\textbf{case 2 (encoding method)}$: Using the proposed encoding method and without the proposed data augmentation;
$\textbf{case 3 (augmentation method)}$: Using the encoding method of ReNAS and the proposed augmentation method;
$\textbf{case 4 (augmentation method + encoding method)}$: Using the proposed encoding method and the proposed augmentation method.
This study is performed on both NAS-Bench-101 and NAS-Bench-201, and Kendall's Tau metric is used for measuring the experiment results. Specifically, the proportions of $0.1\%$ and $5\%$ architectures of NAS-Bench-101 and NAS-Bench-201 are randomly selected as the training data for training the regression models (resulting in $424$ and $781$ architectures, respectively), and the reminding for the testing. For \textbf{case 3} and \textbf{case 4}, where the proposed augmentation method is used, there will be $424\times(7-2)!=50,880 $ and $781\times 6!=562,320 $ architectures augmented on NAS-Bench-101 and NAS-Bench-201, respectively. This is because NAS-Bench-101 is based on ONN, and each architecture has five intermediate vertices (exclusive the input and the output vertice), and NAS-Bench-201 is based on OOE, and each architecture has six intermediate edges.
The experiment results on NAS-Bench-101 are shown in Table~\ref{result_abl_101}. As can be seen, all of the nine different regression models investigated in both cases can benefit from the components of the proposed two designs. Specifically, the Kendall's Tau of \textbf{case 2} outperforms that of \textbf{case 1} and the Kendall's Tau of \textbf{case 4} outperforms that of \textbf{case 3}, which reveals the effectiveness of the proposed encoding method. Besides, \textbf{case 3} wins \textbf{case 1} except for the comparison regarding using RF as the regression model, and \textbf{case 4} wins \textbf{case 2} upon all regression models chosen in this study. This demonstrated that the proposed augmentation method can improve the performance of the performance predictors. Furthermore, the situation with both the encoding method and the augmentation method gain the best value of Kendall's Tau, as highlighted in the last row of Table~\ref{result_abl_101}.
The results of the experiments measured by Kendall's Tau on NAS-Bench-201 are shown in Table~\ref{result_abl_201}, which shows similar results to those obtained on NAS-Bench-101. In particular, the encoding method is proved to be effective as can be seen in the comparison between \textbf{case 1} and \textbf{case 2} and the comparison between \textbf{case 3} and \textbf{case 4}. Only in the comparison between \textbf{case 1} and \textbf{case 2} regarding using Bagging as the regression model, the Kendall's Tau of \textbf{case 2} is slightly lower than that of \textbf{case 1}. In addition, \textbf{case 3} wins \textbf{case 1} except for the comparison in terms of KNN and GBRT, and \textbf{case 4} won \textbf{case 2} except for the comparison of GBRT. Furthermore, \textbf{case 4} with the whole GIAug (i.e., both encoding method and the augmentation method) wins other cases except for the comparison in terms of using GBRT as the regression model.
In summary, these $72$ experiment results of the ablation study, conducted on two different datasets with nine different regression models, demonstrate the respective superiority of both designs. In addition, these results also demonstrate the effectiveness of collectively using both designs. Please note, the best results on both datasets are all obtained in terms of using the RF as the regression model. This is also the reason for selecting RF in other experiments.
\section{Conclusions}\label{sec_5}
The goal of this paper was to develop a method to solve the shortage of training data faced by performance predictors. This goal has been achieved by proposing an effective architecture augmentation method (named GIAug). GIAug mainly has three advantages: computational cheapness, applicable generality and superior effectiveness. Specifically, the proposed augmentation method is based on the isomorphism mechanism, which can generate many high-quality DNN architectures labeled yet with negligible computation resources consumed. In addition, a generic encoding method has also been utilized. This made the proposed GIAug method can be embedded in various performance predictors. Furthermore, GIAug was first examined against state-of-the-art performance predictors with various proportions of data from the benchmarks. The results demonstrated the effectiveness of GIAug among comparisons. Finally, GIAug was also investigated against state-of-the-art NAS algorithms on three popular search spaces, and the performance gained by GIAug was also very competitive on different scales of image classification datasets.
With the development of NAS, more and more related work is being proposed for other types of DNNs, such as the recurrent neural network and graph neural network. In the future, we will extend our work for these types of architectures.
\ifCLASSOPTIONcaptionsoff
\newpage
\fi
\bibliographystyle{IEEEtran}
|
\section{Introduction}
Trichomoniasis (or ``trich''), caused by infection with a motile, flagellated protozoan parasite called Trichomonas vaginalis (TV), is likely the most common, non-viral sexually transmitted infection (STI) worldwide.
According to statistics, there are more than 160 million new cases of trichomoniasis in the world each year, with a similar probability of males and females~\cite{harp2011trichomoniasis,vos2016global}.
A number of studies have shown that Trichomonas vaginalis infection is associated with an increased risk of infection with several other STIs, including human papillomavirus (HPV) and human immunodeficiency virus (HIV)~\cite{workowski2012sexually}. The high prevalence of Trichomonas vaginalis infection globally and the frequency of co-infection with other STIs make trichomoniasis a compelling public health concern.
Automatic Trichomonas vaginalis segmentation (TVS) is crucial to the diagnosis of Trichomoniasis.
Recently, deep learning methods have been widely used for medical image segmentation~\cite{hesamian2019deep} and made significant progress, such as brain region and tumor segmentation~\cite{havaei2017brain,zhao2018deep}, liver and tumor segmentation~\cite{zhou2018unet++,tang2020two}, polyp segmentation~\cite{brandao2017fully,fan2020pra,ji2021progressively}, lung infection segmentation~\cite{fan2020inf,liu2021covid} and cell segmentation~\cite{ronneberger2015u,li2021mvdi25k,zhang2021multi}.
Most of these methods are based on the encoder-decoder framework, such as U-Net\cite{ronneberger2015u} and its variants~\cite{siddique2021u} (\textit{e.g.}, U-Net++~\cite{zhou2018unet++}, Unet 3+~\cite{huang2020unet}), and PraNet~\cite{fan2020pra}, or are inspired by some commonly-used natural image segmentation models, \textit{e.g.}, fully convolutional networks (FCN)~\cite{zhao2018deep} and DeepLab~\cite{tang2020two}.
These works have shown great potentials in the segmentation of various organs and lesions from different medical imaging modalities.
To our knowledge, however, deep learning techniques have not yet been well-studied and applied for TVS in microscope images, due to three key factors:
1) The large variation in morphology (\textit{e.g.}, size, appearance and shape) of the Trichomonas is challenging for detection. Besides, Trichomonas are often captured out of focus (blurred appearance) or under occlusion due to their motility, which aggregates the difficulty of accurate segmentation.
2) The high appearance similarity between Trichomonas and other cells (\textit{e.g.}, leukocyte) makes them easily confused with complex surroundings.
Most importantly, 3) the lack of large-scale annotated data restricts the performance of deep models that rely on sufficient training data, thereby hindering further research in this field.
It is worth noting that the above factors also reflect the clear differences in object segmentation between the microscope images of Trichomonas in our work and conventional cells (\textit{e.g.}, HeLa cells~\cite{ronneberger2015u} and blood cells~\cite{li2021robust}).
Furthermore, we noted that recently Wang et al.~\cite{wang2021trichomonas} proposed a two-stage model for video-based Trichomonas vaginalis detection, which utilizes video motion cues (\textit{e.g.}, optical flow) to greatly reduce the detection difficulty. The difference is that this work focuses on image-based Trichomonas vaginalis detection, without motion information, which increases the difficulty of detection. As we know, no one has set foot on this field so far.
Hence, accurate TV segmentation remains a challenging and under-explored task.
To address above issues, we first elaborately construct a novel large-scale microscope images dataset exclusively designed for Trichomonas Vaginalis segmentation, named \textit{TVMI3K}.
Moreover, we develop a simple but effective deep neural network, termed \textit{TVNet}, for TVS.
In a nutshell, our main contributions are threefold: (1) We carefully collect \textbf{\textit{TVMI3K}, a large-scale dataset for TVS}, which consists of 3,158 microscopic images covering Trichomonas of various appearances in diverse backgrounds, with high-quality annotations of object-level labels, object boundaries and challenging attributes. To our knowledge, this is the first large-scale dataset for TVS that can serve as a catalyst for promoting further research in this field in the deep learning era. (2) We proposed \textbf{a novel deep neural network, termed \textit{TVNet}}, which enhances high-level feature representations with edge cues in a high-resolution fusion (HRF) module and then excavates object-critical semantics based on foreground-background attention (FBA) module under the guidance of coarse location map for accurate prediction. (3) Extensive experiments show that our method achieves superior performance and outperforms various cutting-edge segmentation models both quantitatively and qualitatively, making it a promising solution to the TVS task.
The dataset, results and models will be publicly available at: \href{https://github.com/CellRecog/cellRecog}{https://github.com/CellRecog/cellRecog}.
\begin{figure}[t]
\centering
\includegraphics[width=.95\textwidth]{./Imgs/sample02.pdf}
\caption{Various examples of our proposed \textit{TVMI3K}. We provide different annotations, including object-level masks, object edges and challenging attributes. We use red boxes to mark Trichomonas and green boxes to mark leukocyte on images for better visualization. Leukocyte shows high similarity with Trichomonas.}
\label{sample02}
\end{figure}
\section{Proposed Dataset}
To facilitate the research of TVS in deep learning era, we develop the \textit{TVMI3K} dataset, which is carefully collected to cover TV of various appearances in diverse challenging surroundings, \textit{e.g.}, large morphological variation, occlusion and background distractions. Examples can be seen in Fig.~\ref{sample02}.
\subsection{Data Collection}
To construct the dataset, we first collect 80 videos of Trichomonas samples with resolution 3088$\times$2064 from more than 20 cases over seven months. The phase-contrast microscopy is adopted for video collection, which captures samples clearly, even unstained cells, making it more suitable for sample imaging and microscopy evaluation than ordinary light microscopy. We then extract images from these videos to build our \textit{TVMI3K} dataset, which finally contains 3,158 microscopic images (2,524 Trichomonas and 634 background images).
We find that videos are more beneficial for data annotation, because objects can be identified and annotated accurately according to the motion of Trichomonas. Thus, even unfocused objects can also be labeled accurately.
Besides, to avoid data selection bias, we collect 634 background images to enhance generalization ability of models.
It should be noted that images are collected by the microscope devices independently, and we do not collect any patient information, thus the dataset is free from copyright and loyalties.
High-quality annotations are critical for deep model training~\cite{li2021systematic}. During the labeling process, 5 professional annotators are divided into two groups for annotation and cross-validation is conducted between each group to guarantee the quality of annotation. We label each image with accurately object-level masks, object edges and challenging attributes, \textit{e.g.}, occlusions and complex shapes.
Attribute descriptions are shown in Tab.~\ref{Tab:Att}.
\begin{table}[t]
\caption{Attribute Descriptions of Our \textit{TVMI3K}~Dataset}
\centering
\label{Tab:Att}
\begin{tabular}{cp{1.3cm}<{\centering}l}
\toprule
& Attr. &Descriptions \\
\midrule
\multirow{3}*{
\rotatebox{90}{Image-}}
\multirow{3}*{
\rotatebox{90}{level}}
& \textbf{MO} & \textit{Multiple Objects}. Number of objects in each image $\geq$ 2 \\
& \textbf{SO} & \textit{Small Objects}. The ratio of object area to image area $\leq$ 0.1 \\
& \textbf{OV} & \textit{Out of view}. Incomplete objects clipped by image boundary \\
\hline
\multirow{4}*{
\rotatebox{90}{Object-}}
\multirow{4}*{
\rotatebox{90}{level}}
& \textbf{CS} & \textit{Complex Shape}. In diverse shapes with tiny parts (\textit{e.g.}, flagella) \\
& \textbf{OC} & \textit{Occlusions}. Object is partially obscured by surroundings \\
& \textbf{OF} & \textit{Out-of-focus}. Ghosting due to poor focus \\
& \textbf{SQ} & \textit{Squeeze}. The object appearance changes when squeezed \\
\bottomrule
\end{tabular}
\end{table}
\subsection{Dataset Features}
~~~~~$\bullet$ \emph{Image-level Attributes.} As listed in Tab.~\ref{Tab:Att}, our data is collected with several image-level attributes, \textit{i.e.}, multiple objects (MO), small object (SO) and out-of-view (OV), which are mostly caused by Trichomonas size, shooting distance and range.
According to statistics, each image contains $3$ objects averagely, up to $17$ objects. The size distribution ranges from $0.029\%$ to $1.179\%$, with an average of $0.188\%$, indicating that it belongs to a dataset for tiny object detection.
$\bullet$ \emph{Object-level Attributes.} Trichomonas objects show various attributes, including complex shapes (CS), occlusions (OC), out-of-focus (OF) and squeeze (SQ), which are mainly caused by the growth and motion of trichomonas, highly background distraction (\textit{e.g}. other cells) and the shaking of acquisition devices.
These attributes lead to large morphological differences in Trichomonas, which increase the difficulty of detection. In addition, there is a high similarity in appearance between Trichomonas and leukocyte, which can easily confuse the detectors to make false detections. Examples and the details of object-level attributes are shown in Fig.~\ref{sample02} and Tab.~\ref{Tab:Att} respectively.
$\bullet$ \emph{Dataset Splits.} To provide a large amount of training data for deep models, we select 60\% of videos as training set and 40\% as test set. In order to be consistent with practical applications, we select data according to the chronological order of the sample videos from each case instead of random selection, that is, the data collected first for each case is used as the training set, and the data collected later is used as the test set.
Thus, the dataset is finally split into 2,305 images for training and 853 images for testing respectively. Note that 290 background images in the test set are not included in our test experiments.
\section{Method}
\label{method}
\begin{figure}[t]
\centering
\includegraphics[width=0.95\textwidth]{./Imgs/tvnet.png}
\caption{Overview of our proposed \emph{TVNet}, which consists of high-resolution fusion (HRF) module and foreground-background attention (FBA) module. See $\S$~\ref{method} for details.}
\label{net12}
\end{figure}
\subsection{Overview}
Fig.~\ref{net12} illustrates the overall architecture of the proposed \emph{TVNet}.
Specifically, for an input Trichomonas image $I$, the backbone network Res2Net~\cite{gao2019res2net} is adopted to extract five levels of features $\{f_i\}_{i=1}^5$. Then we further explore the high-level features (\textit{i.e.}, $f_3\sim f_5$ in our model) to effectively learn object feature representation and produce object prediction. As shown in Fig.~\ref{net12}, we first design a high-resolution fusion (HRF) module to enhance feature representation by integrating high-resolution edge features and get three refined features ($\{f_i^{'}\}_{i=3}^5$).
Next, we introduce the neighbor connection decoder (NCD)~\cite{fan2021concealed}, a new cutting-edge decoder component which improves the partial decoder component~\cite{wu2019cascaded} with neighbor connection, to aggregate these three refined features and generate the initial prediction map $P_6$. It can capture the relatively coarse location of objects so as to guide the following object prediction. Specially, $\{P_i\}_{i=3}^5$ represents the prediction map of the $i$ layer, which corresponds to the $i$-layer in $\{f_i^{'}\}_{i=3}^5$.
Finally, we propose a foreground-background attention (FBA) module to excavate object critical cues by exploring semantic differences between foreground and background and then accurately predict object masks in a progressive manner.
\subsection{High-resolution Fusion Module}
With the deepening of the neural network, local features, such as textures and edges, are gradually diluted, which may reduce the model's capability to learn the object structure and boundaries.
Considering too small receptive field and too much redundant information of $f_1$ feature, in this paper, we design a high-resolution fusion (HRF) module which adopts the the low-level $f_2$ feature to supplement local details for high-level semantic features and boost feature extraction for segmentation. To force the model to focus more on the object edge information, we first feed feature $f_2$ into a $3\times 3$ convolutional layer to explicitly model object boundaries with the ground-truth edge supervision.
Then we integrate the low-level feature $f_2$ with the high-level features ($f_3\sim f_5$) to enhance representation with channel and spatial attention operations~\cite{woo2018cbam,chen2017sca}, denoted as:
\begin{equation}
\left\{
\begin{aligned}
\Tilde{f}_i & = f_i + \mathcal{G} \left( Cat(f_i;~ \mathcal{G}(\delta_\downarrow^2 (f_2))) \right), i\in \{3,...,5\}, \\
\Tilde{f}_i^{'} & = M_c(\Tilde{f}_i) \otimes \Tilde{f}_i, \\
f_i^{'} & = M_s(\Tilde{f}_i^{'}) \otimes \Tilde{f}_i^{'},
\end{aligned}
\right.
\end{equation}
where $\delta_\downarrow^2(\cdot)$ denotes $\times 2$ down-sampling operation. $\mathcal{G}(\cdot)$ is a $3\times 3$ convolution layer, and $Cat$ is concatenation operation. $M_c(\cdot)$ and $M_s(\cdot)$ represent channel attention and spatial attention respectively. $\otimes$ is the element-wise multiplication operation. After that, a 1$\times$1 convolution is used to adjust the number of channels to ensure the consistent output of each HRF.
\subsection{Foreground-Background Attention Module}
To produce accurate prediction from the fused feature ($f_3^{'}\sim f_5^{'}$) progressively in the decoder, we devise a foreground-background attention (FBA) module to filtrate and enhance object related features using region sensitive map derived from the coarse prediction of the previous layer.
For the fused feature $\{f_i^{'}\}_{i=3}^5$, we first decompose the previous initial prediction $P_{i+1}$ into three regions, \textit{i.e.}, strong foreground region ($\mathcal{F}_{i+1}^{1}$), weak foreground region ($\mathcal{F}_{i+1}^{2}$) and background region ($\mathcal{F}_{i+1}^3$). The decomposition process can refer to~\cite{sun2021deep}. Then each region is normalized into [0,1] as a region sensitive map to extract the corresponding features from $f_i^{'}$.
Noted that $\mathcal{F}^{1}$ provides the location information, and $\mathcal{F}^{2}$ contains the object edge/boundary information. The $\mathcal{F}^3$ denotes the remaining region.
After that, the region sensitive features can be extracted from the fused feature by an element-wise multiplication operation with up-sampled region sensitive maps followed by a 3$\times$3 convolution layer. Next, these features are aggregated by an element-wise summation operation with a residual connection. It can be denoted as:
\begin{equation}
f_{i}^{out} = \sum\nolimits_{k=1}^{3}
\mathcal{G} (\delta_\uparrow^2 (\mathcal{F}_{i+1}^{k}) \otimes f_i^{'}) + f_i^{'}
\end{equation}
where $\delta_\uparrow^2(\cdot)$ denotes $\times 2$ up-sampling operation.
Inspired by~\cite{fan2021concealed}, FBA can also be cascaded multiple times to gradually refine the prediction. For more details please refer to the \textit{Supp.} In this way, FBA can differentially handle regions with different properties and explore region-sensitive features, thereby strengthening foreground features and reducing background distractions.
\section{Experiments and Results}
\subsection{Experimental Settings}
\textbf{Baselines and Metrics.} We compare our \emph{TVNet}~with 9 state-of-the-art medical/natural image segmentation methods, including U-Net++~\cite{zhou2019unetplusplus}, SCRN~\cite{9010954}, U$^2$Net~\cite{qin2020u2}, F$^3$Net~\cite{f3net}, PraNet~\cite{fan2020pra}, SINet~\cite{SINet}, MSNet~\cite{MSNet}, SANet~\cite{wei2021shallow} and SINet-v2~\cite{fan2021concealed}. We collect the source codes of these models and re-train them on our proposed dataset.
We adopt 7 metrics for quantitative evaluation using the toolboxes provided by~\cite{fan2020pra} and~\cite{wei2021shallow}, including structural similarity measure ($S_\alpha$, $\alpha$ = $0.5$)~\cite{fan2017structure}, enhanced alignment measure ($E_\phi^{max}$)~\cite{fan2018enhanced}, $F_\beta$ measure ($F_\beta^w$ and $F_\beta^{mean}$)~\cite{margolin2014evaluate}, mean absolute error (MAE, $\mathcal{M}$)~\cite{perazzi2012saliency}, Sorensen-Dice coefficient (mean Dice, mDice) and intersection-over-union (mean IoU, mIoU)~\cite{fan2020pra}.
\noindent\textbf{Training Protocols.}
We adopt the standard binary cross entropy (BCE) loss for edge supervision, and the weighted IoU loss~\cite{f3net} and the weighted BCE loss~\cite{f3net} for object mask supervision.
During the training stage, the batch size is set to 20. The network parameters are optimized by Adam optimizer~\cite{kingma2014adam} with an initial learning rate of 0.05, a momentum of 0.9 and a weight decay of 5e-4.
Each image is resized to 352$\times$352 for network input. The whole training time is about 2 hours for 50 epochs on a NVIDIA GeForce RTX 2080Ti GPU.
\begin{table*}[t
\caption{Quantitative comparison on our \textit{TVMI3K}~dataset. ``$\uparrow$'' indicates the higher the score the better. ``$\downarrow$'' denotes the lower the score the better.}
\centering
\label{tbl1}
\begin{tabular}{l|c||c|c|c|c|c|c|c}
\toprule
\rowcolor{gray!25}
Methods & Pub.
&$S_\alpha\uparrow$
&$E_\phi^{max}\uparrow$
&~~$F_\beta^w\uparrow$~~
&$F_\beta^{mean}\uparrow$
&$\mathcal{M}\downarrow$
&mDice$\uparrow$
&mIoU$\uparrow$
\\
\midrule
UNet++~\cite{zhou2019unetplusplus} & TMI19
&0.524
&0.731
&0.069
&0.053
&0.006
&0.004
&0.003
\\
SCRN~\cite{9010954} &ICCV19
&0.567
&0.789
&0.145
&0.254
&0.011
&0.201
&0.135
\\
U$^2$Net~\cite{qin2020u2} &PR20
&0.607
&0.845
&0.209
&0.332
&0.013
&0.301
&0.209
\\
F$^3$Net~\cite{f3net} &AAAI20
&\textbf{0.637}
&0.809
&0.320
&0.377
&0.005
&0.369
&0.265
\\
PraNet~\cite{fan2020pra} &MICCAI20
&0.623
&0.792
&0.300
&0.369
&0.006
&0.328
&0.230
\\
SINet~\cite{SINet} &CVPR20
&0.492
&0.752
&0.010
&0.113
&0.104
&0.095
&0.061
\\
MSNet~\cite{MSNet} &MICCAI21
&0.626
&0.786
&0.321
&0.378
&0.005
&0.366
&0.268
\\
SANet~\cite{wei2021shallow} &MICCAI21
&0.612
&0.800
&0.289
&0.361
&0.006
&0.338
&0.225
\\
SINet-v2~\cite{fan2021concealed} &PAMI21
&0.621
&0.842
&0.309
&0.375
&0.005
&0.348
&0.245
\\
\midrule
\textbf{Ours} &-
&0.635
&\textbf{0.851}
&\textbf{0.343 }
&\textbf{0.401}
&\textbf{0.004}
&\textbf{0.376}
&\textbf{0.276}
\\
\toprule
\end{tabular}
\end{table*}
\subsection{Comparison with State-of-the-art}
\textbf{Quantitative comparison.}
Tab.~\ref{tbl1} shows the quantitative comparison between our proposed model and other competitors on our \textit{TVMI3K} dataset. It can be seen that our TVNet significantly outperforms all other competing methods on all metrics except $S_\alpha$ which is also on par with the best one.
Particularly, our method achieves a performance gain of 2.2\% and 2.3\% in terms of $F_\beta^w$ and {\footnotesize $F_\beta^{mean}$}, respectively.
This suggests that our model is a strong baseline for TVS.
\noindent\textbf{Qualitative comparison.} Fig.~\ref{netresult02} shows some representative visual results of different methods. From those results, we can observe that TVNet can accurately locate and segment Trichomonas objects under various challenging scenarios, including cluttered distraction objects, occlusion, varied shape and similarity with other cells.
In contrast, other methods often provide results with a considerable number of missed or false detection, or even failed detection.
\begin{figure}[t]
\centering
\includegraphics[width=0.95\textwidth]{./Imgs/results.pdf}
\caption{Visual comparison of different methods. Obviously, our method provides more accurate predictions than other competitors in various challenging scenarios.}
\label{netresult02}
\end{figure}
\begin{table*}[t]
\centering
\caption{Ablation study for TVNet on the proposed \textit{TVMI3K}~datasets.}
\label{Tab:ablation}
\setlength\tabcolsep{4pt}
\begin{tabular}{cccc||cccccc}
\toprule
\rowcolor{gray!25}
No. & Backbone & HRF &FBA
&$S_\alpha\uparrow$
&~~$F_\beta^w\uparrow$~~
&$F_\beta^{mean}\uparrow$
&$\mathcal{M}\downarrow$
&mDice
&mIoU\\
\midrule
a
& \checkmark& &
&0.593
&0.234
&0.302
&0.005
&0.251
&0.163
\\
\hline
b& \checkmark &\checkmark&
&0.619
&0.291
&0.357
&0.005
&0.328
&0.228
\\
\hline
c& \checkmark&&\checkmark
&0.623
&0.258
&0.330
&\textbf{0.004}
&0.271
&0.185
\\
\hline
d& \checkmark&\checkmark&\checkmark
&\textbf{0.635}
&\textbf{0.343}
&\textbf{0.401}
&\textbf{0.004}
&\textbf{0.376}
&\textbf{0.276}\\
\bottomrule
\end{tabular}
\end{table*}
\subsection{Ablation Study}
\noindent\textbf{Effectiveness of HRF}. From Tab.~\ref{Tab:ablation}, we observe that the HRF module outperforms the baseline model with significant improvement, \textit{e.g.}, 2.6\%, 5.7\%, 5.7\%, 7.7\% and 6.5\% performance improvement in $S_\alpha$, $F_\beta^w$ $F_\beta^{mean}$, $mDice$ and $mIoU$ metrics, respectively. This shows the fusion of local features is beneficial for object boundary localization and segmentation. Note that the adopted explicit edge supervision facilitates the model to focus more on object boundaries and enhance the details of predictions.
\noindent\textbf{Effectiveness of FBA}. We further investigate the contribution of the FBA module. As can be seen in Tab.~\ref{Tab:ablation}, FBA improves the segmentation performance by 3\%, 2.4\% and 2.8\% in $S_\alpha$, $F_\beta^w$ and $F_\beta^{mean}$, respectively. FBA enables our model to excavate object-critical features and reduce background distractions, thus distinguishing TV objects accurately.
\noindent\textbf{Effectiveness of HRF \& FBA}. From Tab.~\ref{Tab:ablation}, the integration of HRF and FBA is generally better than other settings (a$\sim $c). Compared with the baseline, the performance gains are 1.2\%, 5.2\% and 4.4\% in $S_\alpha$, $F_\beta^w$ and $F_\beta^{mean}$ respectively. Besides, our \textit{TVNet} outperforms other recently proposed models, making it an effective framework that can help boost future research in TVS.
\noindent\textbf{Model Complexity}. We observe that the number of parameters and FLOPs of the proposed model are $\sim$155M and $\sim$98GMac, respectively, indicating that there is room for further improvement, which is the focus of our future work.
\section{Conclusion}
This paper provides the first investigation for the segmentation of Trichomonas vaginalis in microscope images based on deep neural networks. To this end, we collect a novel large-scale, challenging microscope image dataset of TV called \textit{TVMI3K}.
Then, we propose a simple but effective baseline, \emph{TVNet}, for accurately segmenting Trichomonas from microscope images.
Extensive experiments demonstrate that our \emph{TVNet}~outperforms other approaches.
We hope our study will offer the community an opportunity to explore more in this field.
\bibliographystyle{splncs04}
|
\section{Introduction}
In the landmark paper \cite{bondal2001reconstruction}, the authors show that the bounded derived category of coherent sheaves $\mathrm{D}^b(X)$ on a smooth projective variety $X$ determines the isomorphism class of $X$ if its anti-canonical divisor $-K_X$ (or its canonical divisor $K_X$) is ample. One of the most important ingredients of the proof is that the \emph{point objects} can be intrinsically defined in the derived category $\mathrm{D}^b(X)$. In the case of smooth Fano threefolds $X$, tremendous work on the semiorthogonal decompositions of $\mathrm{D}^b(X)$ has been done, which enables us to recover geometric information about $X$ from pieces of its derived category. Thus it is natural to ask whether a smooth Fano threefold $X$ can be determined up to isomorphism by a particular piece of $\mathrm{D}^b(X)$. A natural candidate for this is a subcategory $\mathcal{K}u(X)\subset \mathrm{D}^b(X)$ called the \emph{Kuznetsov component} of $\mathrm{D}^b(X)$. This subcategory has been studied extensively, e.g in \cite{kuznetsov2003derived}, \cite{Kuznetsov_2016}, \cite{kuznetsov2009derived}, \cite{kuznetsov2018derived}, \cite{brambilla2011moduli}, \cite{brambilla2013rank}, and \cite{brambilla2014vector}, for many classes of Fano varieties. It has been widely accepted that $\mathcal{K}u(X)$ encodes the most essential information of the birational geometry of $X$. In our previous work \cite{JLLZ}, we show that the Kuznetsov component $\mathcal{K}u(X)$ of a general special GM threefold determines its isomorphism class while for a general ordinary GM threefold, $\mathcal{K}u(X)$ determines its birational isomorphism class. Furthermore, we show that for a general ordinary GM threefold, $\mathcal{K}u(X)$ together with certain extra data $i^!\mathcal{E}$ arising from the tautological sub-bundle $\mathcal{E}$ on $X$ is enough to determine $X$ up to isomorphism. We call this a \emph{refined categorical Torelli theorem}. Therefore, a natural and interesting question is whether such refined categorical Torelli theorems hold for all index one prime Fano threefolds.
On the other hand, in the late 90s, in \cite{mukai02} and \cite{Mukai2001Brill-Nother}, Mukai considered Brill--Noether loci of the moduli space $\mathcal{M}_{\Gamma_g}(2,d)$ of rank two vector bundles on a curve $\Gamma_g$ of genus $g$.
He showed that every index one prime Fano threefold of degree 12 and 16 can be reconstructed as a Brill--Noether locus of the moduli space $\mathcal{M}_{\Gamma_g}(2,d)$ of rank two stable vector bundles and degree $d$, where $\Gamma_g$ is either a curve of genus 7 (for $X_{12}$) or a curve of genus $3$ (for $X_{16}$). It is interesting to note that $\mathcal{K}u(X_{12})\simeq \mathrm{D}^b(\Gamma_7)$ and $\mathcal{K}u(X_{16})\simeq \mathrm{D}^b(\Gamma_3)$ (see \cite{brambilla2013rank},\cite{brambilla2014vector}). Thus the moduli space $\mathcal{M}_{\Gamma_g}(2,d)$ is essentially a Bridgeland moduli space of stable objects in the Kuznetsov components of these Fano threefolds. Therefore it is reasonable to expect that a Brill--Noether reconstruction should work for all index one prime Fano threefolds. In this article, we prove the following theorem which simultaneously generalizes the refined categorical Torelli theorem for GM threefolds (\cite[Theorem 10.2]{JLLZ}) and the Brill--Noether reconstruction of $X_{12}$ and $X_{16}$ (\cite{Mukai2001Brill-Nother}).
Let $X$ be a prime Fano threefold of index one and genus $g\geq 6$. Consider its semiorthogonal decomposition
$$\mathrm{D}^b(X)=\langle\mathcal{K}u(X),\mathcal{E},\oh_X\rangle$$
where $\mathcal{E}$ is the pullback of the tautological sub-bundle on the Grassmannian. Let $i^!$ be the right adjoint to the inclusion functor $i:\mathcal{K}u(X)\hookrightarrow \mathrm{D}^b(X)$ and let $i^*$ be the left adjoint of $i$. We define integers $n_g:=\frac{g}{2}$ when $g$ is even, $n_7=5$ and $n_9=3$. Then our main theorem is:
\begin{Thm}
\label{main_theorem_Brill_Nother_reconstruction}
Let $X$ be a prime Fano threefold of index one and genus $g\geq 6$ and $\sigma$ be a Serre-invariant stability condition on $\mathcal{K}u(X)$. Then
\[ X\cong\mathcal{BN}_g := \{ F \mid \ext^1(F, i^!\mathcal{E}) = n_g \} \subset \mathcal{M}_\sigma(\mathcal{K}u(X), [i^*\oh_x[-1]]), \]
where $\oh_x$ is the skyscraper sheaf supported on a point $x\in X$.
\end{Thm}
Here the stability condition $\sigma$ is unique up to a $\widetilde{\mathrm{GL}}^+(2,\mathbb{R})$-action (c.f. Theorem \ref{all_in_one_orbit}). For the construction of $\sigma$, see Section \ref{sec:BN}.
\begin{Rem}
\label{genus small}
For the other prime Fano threefolds, we show that they are isomorphic to Bridgeland moduli spaces $\mathcal{M}_{\sigma'}(\oh_X^{\perp}, [I_x])$ of stable objects in the Kuznetsov component $\oh_X^{\perp}$ with respect to stability conditions $\sigma'$ in a family $W$. See Section~\ref{sec:genus 2,3,5}.
\end{Rem}
The idea of the proof is the following. In one direction, we show that the projection of the shift of a skyscraper sheaf $i^*\oh_x[-1]:=\mathrm{L}_{\mathcal{E}}\mathrm{L}_{\oh_X}(\oh_x)[-1]$ is $\sigma$-stable. By construction, it fits into the triangle $\mathcal{E}^{n_g}\rightarrow I_x\rightarrow i^*\oh_x[-1]$, from which $\mathrm{ext}^1(i^*\oh_x[-1],i^!\mathcal{E})=n_g$ follows.
We then show that the morphism \[ p: X \rightarrow \mathcal{BN}_g \] induced by the projection functor $i^*$ is a closed embedding (see Proposition \ref{X_embedded_BN}). The other direction is proved by contradiction. We begin with a $\sigma$-stable object $F\in\mathcal{K}u(X)$ satisfying the Brill--Noether condition, and we assume that $F$ is not of the form $i^*\oh_x[-1]$. Then we show that $G:=F[-1]$ is a vector bundle (see Proposition \ref{prop:F is shift of vb}), and form the cone $C$ of the natural map $G=F[-1]\xrightarrow{s}\mathcal{E}^{\oplus n_g}$. Note that the character of $C$ is the same as the ideal sheaf of a point on $X$. Then we show that $C$ is semistable with respect to a suitable weak stability condition, which is the most technical part of our article (see Proposition~\ref{gneq6cone}).
Then by a standard wall-crossing argument, we show that $C$ is a torsion free sheaf and is therefore isomorphic to $I_x$ for a point $x\in X$, which leads to a contradiction (c.f. Section \ref{sec_proof}).
The Brill--Noether reconstruction of $X$ depends on an appropriately chosen induced stability condition $\sigma$ on $\mathcal{K}u(X)$ a priori. In \cite{Pertusi2021serreinv}, the authors show that every induced stability condition on the Kuznetsov component of an index one prime Fano threefold of genus $g\geq 6$ is Serre-invariant (see Definition~\ref{Serre_invariant_stab}). Moreover, in \cite[Theorem 4.25]{JLLZ} and \cite[Theorem 3.1]{FeyzbakhshPertusi2021stab}, the authors show the uniqueness of Serre-invariant stability conditions on $\mathcal{K}u(X)$. Thus if $E\in\mathcal{K}u(X)$ is a stable object for every Serre-invariant stability condition and $\Phi:\mathcal{K}u(X)\simeq\mathcal{K}u(X')$ is an equivalence of Kuznetsov components, then $\Phi(E)$ is also stable with respect to any Serre-invariant stability condition. As a result, we prove \emph{refined categorical Torelli theorems} for all prime Fano threefolds of index one and genus $g\geq 6\colon$
\begin{Thm}
\label{Refined_Torelli}
Let $X$ and $X'$ be prime Fano threefolds of index one and genus $g\geq 6$ such that there is an equivalence $\Phi:\mathcal{K}u(X)\simeq\mathcal{K}u(X')$ with $\Phi(i^!\mathcal{E})\cong i^!\mathcal{E}'$. Then $X\cong X'$.
\end{Thm}
There is a very interesting application of Theorem~\ref{Refined_Torelli}. It is shown in Lemma~\ref{Ku_J(X)_mutually_determined} that the Kuznetsov component $\mathcal{K}u(X)$ and intermediate Jacobian $J(X)$ are mutually determined by each other for index one prime Fano threefolds of genus $g\geq 7$, and this is conjectured for $g=6$. Hence one can determine the fiber of the period map over the intermediate Jacobian $J(X)$ for each of these $g \geq 7$ Fano threefolds by computing the fiber $\mathcal{P}_{\mathrm{cat}}^{-1}([\mathcal{K}u(X)])$ of the ``categorical period map" $\mathcal{P}_{\mathrm{cat}}$ over their Kuznetsov components $\mathcal{K}u(X)$. It is the family of \emph{gluing objects} $i^!\mathcal{E}'\in\mathcal{K}u(X')$ when $X'$ varies but the equivalence class of Kuznetsov components is fixed. Since the object $i^!\mathcal{E}'\in\mathcal{K}u(X')$ is stable (c.f. Proposition~\ref{stability_gluing_data}), this makes the fiber of period map as an open subset of the union of the moduli spaces $\bigcup_{\chi(v,v)=\chi([i^!\mathcal{E}],[i^!\mathcal{E}])}\mathcal{M}_{\sigma}(\mathcal{K}u(X),v)$, where $\chi(-,-)\colon\mathcal{N}(X)\times\mathcal{N}(X)\rightarrow\mathbb{Z}$ is the Euler pairing on the numerical Grothendieck group $\mathcal{N}(X)$ of the Kuznetsov component $\mathcal{K}u(X)$.
As a result, we not only recover classical results on the fiber of the period map, but also reprove new results for $X_{18}$ which were proved in \cite{Faenzi2021genusten} very recently.
\begin{Thm}\label{fiber_period_map}
Let $X$ be a prime Fano threefold of index one and genus $g\geq 7$. Consider all index one prime Fano threefolds $X'$ with the same genus $g$ such that there is an equivalence $\Phi:\mathcal{K}u(X')\simeq\mathcal{K}u(X)$. Then the family of objects $\Phi(i^!\mathcal{E}')$ obtained as $X'$ and $\Phi$ vary is given by
\begin{enumerate}[\normalfont(i)]
\item a unique point if $g=7$;
\item the moduli space $\mathcal{M}_{\mathrm{vb}}\subset M_Y^{\mathrm{inst}}(2,0,2)$ of instanton bundles with minimal charge on a cubic threefold $Y$ if $g=8$;
\item the moduli space of rank two vector bundles over a genus three curve $C$ with a certain special property if $g=9$;
\item the Coble--Dolgachev sextic if $g=10$;
\item the moduli space of plane quartics if $g=12$.
\end{enumerate}
Furthermore, in each case this describes the fiber of the period map.
\end{Thm}
\begin{remark}
One can apply Theorem~\ref{Refined_Torelli} to obtain a description of the fiber of the ``categorical period map" for index one prime Fano threefolds of genus $g=6$, which was previously described in \cite[Theorem 11.3]{JLLZ}.
\end{remark}
\subsection{Related work}
The question of whether $\mathcal{K}u(X)$ determines $X$ up to isomorphism, known as the \emph{Categorical Torelli} question, has been studied for certain cases in the setting of Fano threefolds. There is a nice survey \cite{pertusi2022categorical} on recent results. In the case of index two prime Fano threefolds, in \cite{bernardara2012categorical}, the authors show that the Kuznetsov component completely determines cubic threefolds up to isomorphism. The same result was also verified in \cite{pertusi2020some}. In \cite{bayer2020desingularization}, an alternative proof for this is provided. In \cite{altavilla2019moduli}, it is shown that the Kuznetsov component $\mathcal{K}u(X)$ determines $X$ up to isomorphism if $X$ is a smooth quartic double solid. A weaker version of this result was also shown in \cite{bernardara2013semi}, where the equivalence between the Kuznetsov components is assumed to be Fourier--Mukai. In the case of index one prime Fano threefolds of genus $\geq 6$, $\mathcal{K}u(X)$ usually does not determine the isomorphism class of $X$, while the whole derived category $\mathrm{D}^b(X)$ determines it by \cite{bondal2001reconstruction}. In our paper, we show that the subcategory $\langle\mathcal{K}u(X),\mathcal{E}\rangle\subset \mathrm{D}^b(X)$ does determine the isomorphism class of $X$. Our results not only recover the classical results in \cite{Mukai2001Brill-Nother} and \cite{brambilla2013rank}, but also reprove the very recent results in \cite{Faenzi2021genusten} on reconstruction of $X_{18}$ from the data $(\Gamma_2,\mathcal{V})$, where $\Gamma_2$ is a genus 2 curve and $\mathcal{V}$ is a rank 3 vector bundle with special properties over it. In the very recent work \cite{bayer2022kuznetsov}, the authors compute the fiber of "categorical period map" for Gushel-Mukai threefolds, via a completely different method. In the upcoming work \cite{liuzhang2021brillnoether}, we establish a Brill--Noether reconstruction theorem for index two prime Fano threefolds and give uniform proofs of categorical Torelli theorems for them.
\subsection{Organisation of the article}
In Section \ref{sec:derived categories}, we state some useful results on semiorthogonal decompositions. In section \ref{sec:derivedfano} we introduce semiorthogonal decompositions for all index one prime Fano threefolds, and define \emph{gluing objects} for their Kuznetsov components. In Section \ref{sec:stability conditions}, we recall weak stability conditions, and state the algorithm we frequently use to find and then discard solutions for potential walls in tilt stability. We also summarise results on the existence of Bridgeland stability conditions on Kuznetsov components of index one Fano threefolds. Furthermore, we prove stability of the \emph{gluing object} introduced in Section \ref{sec:derivedfano}. In Section \ref{sec:embedding}, we embed our Fano threefolds into moduli spaces of stable objects in $\mathcal{K}u(X)$ with respect to the numerical classes of projections of skyscraper sheaves. In Section \ref{sec:BN}, we exhibit these embedded Fano threefolds as Brill--Noether loci. We also state the refined categorical Torelli theorem which follows as a corollary. In Section~\ref{sec:genus 2,3,5}, we show that every index one prime Fano threefold is a Bridgeland moduli space of stable objects in $\oh_X^{\perp}$. In Section~\ref{fiber_period_map_section}, we compute the fiber of period map for all prime Fano threefolds of index one and genus $g\geq 6$ via Theorem~\ref{Refined_Torelli}. In Appendix \ref{appA}, we prove several lemmas used in the previous sections.
\subsection*{Notation and conventions} \leavevmode
\begin{itemize}
\item Throughout this article, $g$ and $d$ will mean the genus and degree of a Fano threefold, respectively. If it is relevant, we will state the genus/degree of the threefold we work with. If no assumptions on $X$ are stated, then we will take it to be a smooth index one Picard rank one Fano threefold of genus $g \geq 6$. When $X$ is written with a subscript, the subscript will indicate the degree of $X$.
\item Let $\sigma$ be a weak stability condition. Then the central charge and heart are denoted by $Z_{\sigma}$ and $\mathcal{A}_{\sigma}$, respectively.
\item The \emph{projection functor} is defined by the left adjoint of the inclusion functor $i:\mathcal{K}u(X)\hookrightarrow \mathrm{D}^b(X)$.
\item We denote the phase and slope with respect to $\sigma$ by $\phi_{\sigma}$ and $\mu_{\sigma}$, respectively. The maximal/minimal slope of the HN-factors of a given object will be denoted by $\mu_{\sigma}^+$ and $\mu_{\sigma}^-$, respectively.
\item We denote by $\mathcal{H}_{\sigma}^i$ the $i$-th cohomolgy object with respect to the heart $\mathcal{A}_{\sigma}$. If $\mathcal{A}=\mathrm{Coh}(X)$, we denote the cohomology objects by $\mathcal{H}^i$ for simplicity.
\item We denote the numerical class in the numerical Grothendieck group by $[E]$ for any object $E$. In our setting, giving a numerical class is equivalent to giving a Chern character.
\end{itemize}
\subsection*{Acknowledgements}
We would like to thank Arend Bayer for suggesting this problem to us, and for many very useful discussions on this project. We thank Daniele Faenzi for very stimulating conversations on Torelli-type questions for Fano threefolds. We would like to thank Sasha Kuznetsov, Laurent Manivel, Chunyi Li, Naoki Koseki, Laura Pertusi and Sebastian Schlegel Mejia for useful discussions. Part of this work was finished when the third author was visiting Tianyuan Mathematical Center in Southwest China (TMCSC), Sichuan University. The third author would like to thank professor Xiaojun Chen for the invitation and TMCSC for their hospitality. The first and third authors are supported by ERC Consolidator Grant WallCrossAG, no. 819864. The second author is supported by the research grant ``Geometric structure on the derived category of projective varieties".
\section{Derived categories} \label{sec:derived categories}
In this section, we collect some useful facts/results about semiorthogonal decompositions. Background on triangulated categories and derived categories of coherent sheaves can be found in \cite{huybrechts2006fourier}, for example. From now on, let $\mathrm{D}^b(X)$ denote the bounded derived category of coherent sheaves on $X$, and for $E, F \in \mathrm{D}^b(X)$, define
\[ \RHom^\bullet(E, F) = \bigoplus_{i \in \mathbb{Z}} \Ext^i(E, F)[-i] . \]
\subsection{Exceptional collections and semiorthogonal decompositions}
\begin{Def}
Let $\mathcal{D}$ be a triangulated category and $E \in \mathcal{D}$. We say that $E$ is an \emph{exceptional object} if $\RHom^\bullet(E, E) = k$. Now let $(E_1, \dots, E_m)$ be a collection of exceptional objects in $\mathcal{D}$. We say it is an \emph{exceptional collection} if $\RHom^\bullet(E_i, E_j) = 0$ for $i > j$.
\end{Def}
\begin{Def}
Let $\mathcal{D}$ be a triangulated category and $\mathcal{C}$ a triangulated subcategory. We define the \emph{right orthogonal complement} of $\mathcal{C}$ in $\mathcal{D}$ as the full triangulated subcategory
\[ \mathcal{C}^\bot = \{ X \in \mathcal{D} \mid \Hom(Y, X) =0 \text{ for all } Y \in \mathcal{C} \}. \]
The \emph{left orthogonal complement} is defined similarly, as
\[ {}^\bot \mathcal{C} = \{ X \in \mathcal{D} \mid \Hom(X, Y) =0 \text{ for all } Y \in \mathcal{C} \}. \]
\end{Def}
Recall that a subcategory of $\mathcal{D}$ is called \emph{admissible} if the inclusion functor has both left and right adjoint.
\begin{Def}
Let $\mathcal{D}$ be a triangulated category, and $( \mathcal{C}_1, \dots, \mathcal{C}_m )$ be a collection of full admissible subcategories of $\mathcal{D}$. We say that $\mathcal{D} = \langle \mathcal{C}_1, \dots, \mathcal{C}_m \rangle$ is a \emph{semiorthogonal decomposition} of $\mathcal{D}$ if $\mathcal{C}_j \subset \mathcal{C}_i^\bot $ for all $i > j$, and the subcategories $(\mathcal{C}_1, \dots, \mathcal{C}_m )$ generate $\mathcal{D}$, i.e. the category resulting from taking all shifts and cones of objects in the categories $(\mathcal{C}_1, \dots, \mathcal{C}_m )$ is equivalent to $\mathcal{D}$.
\end{Def}
\begin{Def}
The \emph{Serre functor} $S_{\mathcal{D}}$ of a triangulated category $\mathcal{D}$ is the autoequivalence of $\mathcal{D}$ such that there is a functorial isomorphism of vector spaces
\[ \Hom_{\mathcal{D}}(A, B) \cong \Hom_{\mathcal{D}}(B, S_{\mathcal{D}}(A))^\vee \]
for any $A, B \in \mathcal{D}$.
\end{Def}
\begin{Prop} \label{serre s.o.d. proposition}
If $\mathcal{D} = \langle \mathcal{D}_1 , \mathcal{D}_2 \rangle$ is a semiorthogonal decomposition, then $\mathcal{D} \simeq \langle S_{\mathcal{D}}(\mathcal{D}_2), \mathcal{D}_1 \rangle \simeq \langle \mathcal{D}_2, S^{-1}_{\mathcal{D}}(\mathcal{D}_1) \rangle$ are also semiorthogonal decompositions.
\end{Prop}
\subsection{Mutations} \label{mutations subsection}
Let $\mathcal{C} \subset \mathcal{D}$ be an admissible triangulated subcategory. Then one has both left and right adjoints to the inclusion functor $i : \mathcal{C} \hookrightarrow \mathcal{D}$, denoted by $i^*$ and $i^!$, respectively. Then the \emph{left mutation functor} $\mathrm{L}_{\mathcal{C}}$ through $\mathcal{C}$ is defined as the functor lying in the canonical functorial exact triangle
\[ i i^! \rightarrow \mathrm{id} \rightarrow \mathrm{L}_{\mathcal{C}} \]
and the \emph{right mutation functor} $\mathrm{R}_{\mathcal{C}}$ through $\mathcal{C}$ is defined similarly, by the triangle
\[ \mathrm{R}_{\mathcal{C}} \rightarrow \identity \rightarrow i i^* . \]
When $E \in \mathrm{D}^b(X)$ is an exceptional object, and $F \in \mathrm{D}^b(X)$ is any object, the left mutation $\mathrm{L}_E F$ fits into the triangle
\[ E \otimes \RHom^\bullet(E, F) \rightarrow F \rightarrow \mathrm{L}_E F , \]
and the right mutation $\mathrm{R}_E F$ fits into the triangle
\[ \mathrm{R}_E F \rightarrow F \rightarrow E \otimes \RHom^\bullet(F, E)^\vee . \]
Furthermore, when $(E_1, \dots, E_m)$ is an exceptional collection, for $i=1, \dots, m-1$ the collections \[ (E_1, \dots, E_{i-1}, \mathrm{L}_{E_i} E_{i+1}, E_i, E_{i+2}, \dots, E_m ) \] and \[ (E_1, \dots, E_{i+1}, \mathrm{R}_{E_{i+1}} E_{i}, E_{i+2}, E_{i+3}, \dots, E_m ) \]
are also exceptional.
\begin{Prop}
Let $\mathcal{D} = \langle \mathcal{A}, \mathcal{B} \rangle $ be a semiorthogonal decomposition. Then
\[ S_{\mathcal{B}} = \mathrm{R}_{\mathcal{A}} \circ S_{\mathcal{D}} \, \, \, \text{ and } \, \, \, S_{\mathcal{A}}^{-1} = \mathrm{L}_{\mathcal{B}} \circ S_{\mathcal{D}}^{-1} . \]
\end{Prop}
\section{Index one Prime Fano threefolds and their Kuznetsov components}\label{sec:derivedfano}
A smooth projective variety with ample anticanonical bundle is called \emph{Fano}. A Fano variety is called \emph{prime} if it has Picard number one. For a prime Fano variety $X$, we can choose a unique ample divisor such that $\mathrm{Pic}(X)\cong \mathbb{Z}\cdot H$. The \emph{index} of a prime Fano variety is the least integer $i_X$ such that $-K_X=i_X\cdot H$. The \emph{degree} of a prime Fano threefold is $d_X:=H^3$.
In this paper, we mainly consider prime Fano threefolds of index one. The prime Fano threefolds are classified in \cite{shafa}. We list some of their properties below, see also \cite{KPS}.
\begin{itemize}
\item $X_2$, $g=2$: a double cover of $\mathbb{P}^3$ branched in a surface of degree six;
\item $X_4$, $g=3$: either a quartic threefold, or the double cover of a smooth quadric threefold branched in an intersection with a quartic;
\item $X_6$, $g=4$: a complete intersection of type $(2,3)$;
\item $X_8$, $g=5$: a complete intersection of type $(2,2,2)$;
\item $X^O_{10}$, $g=6$: a section of $\mathrm{Gr}(2,5)\subset \mathbb{P}^9$ by a linear space and a quadric;
\item $X^S_{10}$, $g=6$: a double cover of a linear section of $\Gr(2,5)$ of codimension 3, branched in an anticanonical divisor;
\item $X_{12}$, $g=7$: a linear section of a connected component of the orthogonal Lagrangian Grassmannian $\mathrm{OGr}_+(5,10)\subset \mathbb{P}^{15}$;
\item $X_{14}$, $g=8$: a linear section of $\mathrm{Gr}(2,6)\subset \mathbb{P}^{14}$;
\item $X_{16}$, $g=9$: a linear section of the Lagrangian Grassmannian $\mathrm{LGr}(3,6)\subset \mathbb{P}^{13}$;
\item $X_{18}$, $g=10$: a linear section of the homogeneous space $G_2/P\subset \mathbb{P}^{13}$;
\item $X_{22}$, $g=12$: a zero locus of three sections of the bundle $\wedge^2\mathcal{U}^{\vee}$, where $\mathcal{U}$ is the universal subbundle on $\mathrm{Gr}(3,7)$.
\end{itemize}
A prime Fano threefold of type $X^S_{10}$ is called a \emph{special Gushel--Mukai(GM) threefold}, and a threefold of type $X^O_{10}$ is called an \emph{ordinary Gushel--Mukai(GM) threefold}.
\subsection{Semiorthogonal decompositions} \label{SOD}
A series of works of Bondal--Orlov and Kuznetsov show that the prime Fano threefolds of index one admit the following semiorthogonal decompositions.
\begin{Prop}
Let $X:=X_{2g-2}$ be a prime Fano threefold of index one and genus $g$. Let $\Gamma_{g'}$ be a smooth curve of genus $g'$. Then we have
\begin{itemize}
\item $\mathrm{D}^b(X_{2g-2})=\langle \mathcal{K}u(X_{2g-2}), \mathcal{O}_{X_{2g-2}} \rangle$ for $g<6$;
\item $\mathrm{D}^b(X_{10})=\langle \mathcal{K}u(X_{10}), \mathcal{E}_6, \mathcal{O}_X \rangle$ and $S_{\mathcal{K}u(X_{10})}=\tau[2]$, where $\tau$ is an involution on $\mathcal{K}u(X_{10})$;
\item $\mathrm{D}^b(X_{12})=\langle \mathcal{K}u(X_{12}), \mathcal{E}_7, \mathcal{O}_X \rangle$, where $\mathcal{K}u(X_{12})\simeq \mathrm{D}^b(\Gamma_7)$;
\item $\mathrm{D}^b(X_{14})=\langle \mathcal{K}u(X_{14}), \mathcal{E}_8, \mathcal{O}_X \rangle$ and $S^3_{\mathcal{K}u(X_{14})}=[5]$.
\item $\mathrm{D}^b(X_{16})=\langle \mathcal{K}u(X_{16}), \mathcal{E}_9, \mathcal{O}_X \rangle$, where $\mathcal{K}u(X_{16})\simeq \mathrm{D}^b(\Gamma_3)$;
\item $\mathrm{D}^b(X_{18})=\langle \mathcal{K}u(X_{18}), \mathcal{E}_{10}, \mathcal{O}_X \rangle$, where $\mathcal{K}u(X_{18})\simeq \mathrm{D}^b(\Gamma_2)$;
\item $\mathrm{D}^b(X_{22})=\langle \mathcal{K}u(X_{22}), \mathcal{E}_{12}, \mathcal{O}_X \rangle$, where $\mathcal{K}u(X_{22})\simeq \mathrm{D}^b(\mathrm{Rep}(K(3)))$, where $K(3)$ is the 3-Kronecker quiver.
\end{itemize}
Here $\mathcal{E}_g$ is a stable bundle of rank two when $g\neq 7$ and $9$, rank five when $g=7$, and rank three when $g=9$.
\end{Prop}
When $X_{10}$ is special, $X_{10}$ is the double cover of a prime Fano threefold of index two and degree $5$. Then $\tau$ is induced by the geometric involution on $X_{10}$, which we also denote by $\tau$.
Note that when $g=4$, there is another semiorthogonal decomposition. The existence of stability conditions on this component is unknown, and we will not use this decomposition in our paper.
We call the subcategories $\mathcal{K}u(X_{2g-2})$ \emph{Kuznetsov components} of $X_{2g-2}$. The left adjoint of the inclusion $i:\mathcal{K}u(X)\hookrightarrow \mathrm{D}^b(X)$ is called the \emph{projection functor} and is denoted by $i^*$.
When the genus $g\geq 6$ is even, the rank two bundle $\mathcal{E}_g$ is the pullback of the tautological sub bundle on the Grassmannian $\mathrm{Gr}(2, \frac{g}{2}+2)$. When $g=7$ and $9$, they are also pull-backs of the tautological sub-bundle on the corresponding Grassmannian. The Chern characters of each $\mathcal{E}_g$ are listed below:
\[
\mathrm{ch}(\mathcal{E}_g) = \begin{cases}
(2,-H,L,\frac{1}{3}P), & g=6 \\
(5,-2H,0,P), & g=7 \\
(2,-H,2L,\frac{1}{6}P), & g=8 \\
(3,-H,0,\frac{1}{3} P), & g=9 \\
(2,-H,3L,0), & g=10 \\
(2,-H,4L,- \frac{1}{6}P), & g=12 ,
\end{cases}
\]
where $L$ and $P$ are the classes of a line and a point on $X$ respectively.
If the genus of $X$ is clear, we will use $\mathcal{E}:=\mathcal{E}_g$ for simplicity. When $g\geq 6$ and $g$ is even, by \cite[Proposition 3.9]{kuznetsov2003derived} we know that the numerical Grothendieck group $\mathcal{N}(\mathcal{K}u(X_{2g-2}))$ is a rank two integral lattice and generated by
\begin{equation} \label{v_w}
\mathcal{N}(\mathcal{K}u(X_{2g-2}))=\langle v:=1-\frac{g}{2}L+\frac{g-4}{4}P, w:=H-\frac{3g-6}{2}L+\frac{7g-40}{12}P \rangle
\end{equation}
with Euler form given by
\begin{equation}
\left[
\begin{array}{cc}
1-\frac{g}{2} & -\frac{g}{2} \\
3-g & 1-g \\
\end{array}
\right] .
\end{equation}
When $g=7$, the Todd class of $X$ is given by $\mathrm{td}(X)=1+\frac{1}{2}H+3L+P$. Using Hirzebruch-Riemann-Roch theorem, one can verify with a direct computation that the numerical Grothendieck group is a rank two integral lattice generated by
\[\mathcal{N}(\mathcal{K}u(X_{12}))=\langle v:=2-5L+\frac{1}{2}P, w:=H-6L\rangle\]
with Euler form given by
\begin{equation}
\left[
\begin{array}{cc}
-6 & -5 \\
-7 & -6 \\
\end{array}
\right] .
\end{equation}
When $g=9$, the Todd class of $X$ is given by $\mathrm{td}(X)=1+\frac{1}{2}H+\frac{10}{3}L+P$. The numerical Grothendieck group is a rank two integral lattice generated by
\[\mathcal{N}(\mathcal{K}u(X_{16}))=\langle v:=1-3L+\frac{1}{2}P, w:=H-8L+\frac{2}{3}P\rangle\]
with Euler form given by
\begin{equation}
\left[
\begin{array}{cc}
-2 & -3 \\
-5 & -8 \\
\end{array}
\right] .
\end{equation}
When the genus $g\geq 6$ is even, we will also use another semiorthogonal decomposition
\[\mathrm{D}^b(X_{2g-2})=\langle \mathcal{A}_{X_{2g-2}}, \mathcal{O}_{X_{2g-2}}, \mathcal{E}^{\vee}\rangle . \]
We call $\mathcal{A}_{X_{2g-2}}$ the \emph{alternative Kuznetsov component}. The numerical Grothendieck group $\mathcal{N}(\mathcal{A}_{X_{2g-2}})$ of $\mathcal{A}_{X_{2g-2}}$ is a rank two integral lattice generated by
\[\mathcal{N}(\mathcal{A}_{X_{2g-2}})=\langle s:=1-2L, t:=H-(\frac{g}{2}+1)L-\frac{16-g}{12}P \rangle\]
with Euler form given by
\begin{equation}
\left[
\begin{array}{cc}
-1 & -2 \\
-\frac{g}{2}+1 & -g+1 \\
\end{array}
\right] .
\end{equation}
We call $u\in \mathcal{N}(\mathcal{K}u(X_{2g-2}))$ (or $\mathcal{N}(\mathcal{A}_{2g-2})$) a \emph{$(-r)$-class} if $\chi(u,u)=-r$.
\begin{Rem} \label{rem:equiv kuz components}
When $g\geq 6$ is even, there is an equivalence between $\mathcal{K}u(X)$ and $\mathcal{A}_X$ which is given by $\Xi: E\mapsto\mathbf{L}_{\mathcal{O}_X}(E\otimes\mathcal{O}_X(H))$.
\end{Rem}
\subsection{Gluing objects in Kuznetsov components of even genus prime Fano threefolds}
In this subsection, we define \emph{gluing objects} arising from Kuznetsov components $\mathcal{K}u(X)$ and $\mathcal{A}_X$ with respect to different semiorthogonal decompositions for derived categories of prime Fano threefolds of even genus $g\geq 6$. We furthermore investigate the relationship between the different gluing objects.
Let $\mathcal{D} := \langle \mathcal{K}u(X), \mathcal{E} \rangle$ and $\mathcal{D}' := \langle \mathcal{A}_X, \mathcal{Q}^\vee \rangle $ where $\mathcal{K}u(X)$ and $\mathcal{A}_X$ are the original and alternative Kuznetsov components, respectively and $\mathcal{Q}$ is the tautological quotient bundle. We have the following inclusions $i_{\mathcal{D}} : \mathcal{K}u(X) \hookrightarrow \mathcal{D}$ and $i_{\mathcal{D}'} : \mathcal{A}_X \hookrightarrow \mathcal{D}'$. These inclusions have left adjoints $i_{\mathcal{D}}^* = \mathrm{L}_{\mathcal{E}}, i_{\mathcal{D}'}^* = \mathrm{L}_{\mathcal{Q}^\vee}$, respectively, and right adjoints $i_{\mathcal{D}}^!, i_{\mathcal{D}'}^!$, respectively.
Denote the functor $\langle\mathcal{E}\rangle\hookrightarrow\mathcal{D}$ by $j_*$. The functor $i_{\mathcal{D}}^!j_*[1]$ is called \emph{gluing functor} in the sense of \cite[Definition 2.4]{kuznetsov2015categorical}. We define \emph{gluing objects} for $\mathcal{D}$ and $\mathcal{D}'$ as $i_{\mathcal{D}}^!\mathcal{E}[1]$ and $i_{\mathcal{D}'}^!\mathcal{Q}^{\vee}[1]$, respectively. By \cite[Lemma 2.5]{kuznetsov2015categorical}, $\mathcal{D}\simeq \{(F,V,\phi)~|~ F\in \mathcal{K}u(X), V\in D^b(k); \phi:F\rightarrow i_{\mathcal{D}}^!\mathcal{E}\otimes V\}$, which is glued from $\mathcal{K}u(X)$ and $\mathrm{D}^b(k)$ generated by the exceptional object $\mathcal{E}$.
Recall that $i^!$ and $i'^!$ are the right adjoint of the inclusions $i:\mathcal{K}u(X)\hookrightarrow \mathrm{D}^b(X)$ and $i':\mathcal{A}_X\hookrightarrow \mathrm{D}^b(X)$, respectively. Since $\mathcal{E}\in \mathcal{D}$ and $\mathcal{Q}^{\vee}\in \mathcal{D}'$, we have $i^!\mathcal{E} =i^!_{\mathcal{D}}(\mathcal{E})$ and $i'^!\mathcal{E} =i^!_{\mathcal{D}'}(\mathcal{Q}^{\vee})$.
\begin{Lem} \label{cohomology objects of pi lemma}
The object $i^!\mathcal{E}=i_{\mathcal{D}}^!(\E)$ is given by $\mathrm{L}_{\mathcal{E}} \mathcal{Q}(-H)[1]$. It is a two-term complex with cohomologies
\[ \mathcal{H}^i(i^!(\mathcal{E})) = \begin{cases}
\mathcal{Q} (-H) , & i=-1 \\
\mathcal{E} , & i=0 \\
0 ,& i \neq -1,0 .
\end{cases} \]
\end{Lem}
\begin{proof}
Indeed, by e.g. \cite[Section 2]{kuznetsov2010derivedcubicfourfolds} we have the exact triangle
\[ i_{\mathcal{D}} i_{\mathcal{D}}^! (\mathcal{E}) \rightarrow \mathcal{E} \rightarrow \mathrm{L}_{\mathcal{K}u(X)} \mathcal{E} \rightarrow . \]
But note that $\langle \mathcal{K}u(X) , \mathcal{E} \rangle \simeq \langle S_{\mathcal{D}}(\mathcal{E}), \mathcal{K}u(X) \rangle \simeq \langle \mathrm{L}_{\mathcal{K}u(X)} \mathcal{E}, \mathcal{K}u(X) \rangle$(\cite[Section 2]{kuznetsov2010derivedcubicfourfolds}). Therefore the triangle above becomes $i_{\mathcal{D}} i_{\mathcal{D}}^! (\mathcal{E}) \rightarrow \mathcal{E} \rightarrow S_{\mathcal{D}}(\mathcal{E})$. To find $S_{\mathcal{D}}(\mathcal{E})$ explicitly, note that $S_{\mathcal{D}} \cong \mathrm{R}_{\oh_X(-H)} \circ S_{\mathrm{D}^b(X)}$. Since $\mathrm{R}_{\oh_X(-H)} \mathcal{E}(-H) \cong \mathcal{Q}(-H)[-1]$, we have $S_{\mathcal{D}}(\mathcal{E}) \cong \mathcal{Q}(-H)[2]$. So the triangle above becomes
\[ i_{\mathcal{D}} i_{\mathcal{D}}^!(\mathcal{E}) \rightarrow \mathcal{E} \rightarrow \mathcal{Q}(-H)[2] . \]
Applying $i_{\mathcal{D}}^* = \mathrm{L}_{\mathcal{E}}$ to the triangle and using the fact that $i_{\mathcal{D}}^* i_{\mathcal{D}} \cong \identity$ and $i^* \mathcal{E} = 0$ gives $i_{\mathcal{D}}^!(\mathcal{E}) \cong \mathrm{L}_{\mathcal{E}} \mathcal{Q}(-H)[1]$, as required. Taking the long exact sequence with respect to $\Coh(X)$ gives the cohomology objects.
\end{proof}
\begin{Lem}[{\cite[Lemma 5.5]{JLLZ}}] \label{gluing-data-equi-alter}
The object $i'^!(\mathcal{Q}^{\vee})=i_{\mathcal{D}'}^!(\mathcal{Q}^\vee)$ is given by $\mathrm{L}_{\mathcal{Q}^\vee} \mathcal{E} [1]$. It is a two-term complex with cohomologies
\[ \mathcal{H}^i(i'^!(\mathcal{Q}^\vee)) = \begin{cases}
\mathcal{E} , & i=-1 \\
\mathcal{Q}^\vee , & i=0 \\
0 ,& i \neq -1,0 .
\end{cases} \]
\end{Lem}
\begin{proof}
The proof is completely analogous to the proof of Lemma \ref{cohomology objects of pi lemma}. As before, we have the exact triangle
\[ i_{\mathcal{D}'} i_{\mathcal{D}'}^! (\mathcal{Q}^\vee) \rightarrow \mathcal{Q}^\vee \rightarrow \mathrm{L}_{\mathcal{A}_X} \mathcal{Q}^\vee \rightarrow . \]
But note that $\langle \mathcal{A}_X , \mathcal{Q}^\vee \rangle \simeq \langle S_{\mathcal{D}'}(\mathcal{Q}^\vee), \mathcal{A}_X \rangle \simeq \langle \mathrm{L}_{\mathcal{A}_X} \mathcal{Q}^\vee, \mathcal{A}_X \rangle$. Therefore the triangle above becomes $i_{\mathcal{D}'} i_{\mathcal{D}'}^! (\mathcal{Q}^\vee) \rightarrow \mathcal{Q}^\vee \rightarrow S_{\mathcal{D}'}(\mathcal{Q}^\vee)$. To find $S_{\mathcal{D}'}(\mathcal{Q}^\vee)$ note that $S_{\mathcal{D}'}(\mathcal{Q}^\vee) = \mathrm{R}_{\oh_X}(-H)(\mathcal{Q}^\vee(-H))[3]$. One can check that $\mathrm{R}_{\oh_X} \mathcal{Q}^\vee = \mathcal{E}^\vee[-1]$, so $S_{\mathcal{D}'}(\mathcal{Q}^\vee) \cong \mathcal{E}[2]$. Hence our triangle becomes $i_{\mathcal{D}'} i_{\mathcal{D}'}^! (\mathcal{Q}^\vee) \rightarrow \mathcal{Q}^\vee \rightarrow \mathcal{E}[2]$. Now applying $i_{\mathcal{D}'}^* = \mathrm{L}_{\mathcal{Q}^\vee}$ to the triangle, we get $i_{\mathcal{D}'}^!(\mathcal{Q}^\vee) = \mathrm{L}_{\mathcal{Q}^\vee} \mathcal{E}[1]$, as required.
Since $\RHom^\bullet(\mathcal{Q}^\vee, \mathcal{E}) = k[-2]$, we have the triangle $\mathcal{Q}^\vee[-2] \rightarrow \mathcal{E} \rightarrow \mathrm{L}_{\mathcal{Q}^\vee} \mathcal{E}$. Taking the long exact sequence of this triangle with respect to $\mathcal{H}^*$ gives the required cohomology objects and we have the following triangle: $$\mathcal{E}[1]\rightarrow i_{\mathcal{D}'}^!(\mathcal{Q}^{\vee})\rightarrow\mathcal{Q}^{\vee}.$$
\end{proof}
\begin{Rem}\label{gluing_data_equal}
It is not hard to check that $\Xi(i^!(\mathcal{E})) \cong i'^!(\mathcal{Q}^\vee)[1]$, where $\Xi$ is the equivalence $\mathcal{K}u(X) \simeq \mathcal{A}_X$ from Remark \ref{rem:equiv kuz components}. Indeed, simply apply $\Xi$ to the triangle defining $i^!(\mathcal{E})$. This yields the triangle defining $i'^!(\mathcal{Q}^{\vee})$.
\end{Rem}
\begin{Rem}
The gluing object in the Kuznetsov component of an odd genus prime Fano threefold is defined in a similar way. They were already defined in \cite[Lemma 3.5]{brambilla2013rank} for genus 9 prime Fano threefolds, and in \cite[Lemma 2.9]{brambilla2014vector}. Note that they define the Kuznetsov component $\mathcal{B}_X$ as $^{\perp}\langle\oh_X,\mathcal{E}^{\vee}\rangle$ and $\mathcal{B}_X\simeq \mathcal{A}_X\otimes\oh_X(H)$. It is easy to show that the gluing objects in $\mathcal{B}_X$ and $\mathcal{A}_X$ differ by the equivalence $-\otimes\oh_X(H)$.
\end{Rem}
\section{Bridgeland stability conditions} \label{sec:stability conditions}
In this section, we recall the construction of (weak) Bridgeland stability conditions on $\mathrm{D}^b(X)$, and the notions of tilt stability, double-tilt stability, and stability conditions induced on Kuznetsov components from weak stability conditions on $\mathrm{D}^b(X)$. We follow \cite[\S~2]{bayer2017stability}.
\subsection{Weak stability conditions}
Let $\mathcal{D}$ be a triangulated category, and $K_0(\mathcal{D})$ its Grothendieck group. Fix a surjective morphism $v : K_0(\mathcal{D}) \rightarrow \Lambda$ to a finite rank lattice.
\begin{Def}
The \emph{heart of a bounded t-structure} on $\mathcal{D}$ is an abelian subcategory $\mathcal{A} \subset \mathcal{D}$ such that the following conditions are satisfied:
\begin{enumerate}[(i)]
\item for any $E, F \in \mathcal{A}$ and $n <0$, we have $\Hom(E, F[n])=0$;
\item for any object $E \in \mathcal{D}$ there exist objects $E_i \in \mathcal{A}$ and maps
\[ 0=E_0 \xrightarrow{\phi_1} E_1 \xrightarrow{\phi_2} \cdots \xrightarrow{\phi_m} E_m=E \]
such that $\cone(\phi_i) = A_i[k_i]$ where $A_i \in \mathcal{A}$ and the $k_i$ are integers such that $k_1 > k_2 > \cdots > k_m$.
\end{enumerate}
\end{Def}
\begin{Def}
Let $\mathcal{A}$ be an abelian category and $Z : K_0(\mathcal{A}) \rightarrow \mathbb{C}$ be a group homomorphism such that for any $E \in \mathcal{D}$ we have $\Im Z(E) \geq 0$ and if $\Im Z(E) = 0$ then $\Re Z(E) \leq 0$. Then we call $Z$ a \emph{weak stability function} on $\mathcal{A}$. If furthermore we have for $0\neq E\in \mathcal{A}$ that $\Im Z(E) = 0$ implies that $\Re Z(E) < 0$, then we call $Z$ a \emph{stability function} on $\mathcal{A}$.
\end{Def}
\begin{Def}
A \emph{weak stability condition} on $\mathcal{D}$ is a pair $\sigma = (\mathcal{A}, Z)$ where $\mathcal{A}$ is the heart of a bounded t-structure on $\mathcal{D}$, and $Z \colon \Lambda \rightarrow \mathbb{C}$ is a group homomorphism such that
\begin{enumerate}[(i)]
\item the composition $Z \circ v \colon K_0(\mathcal{A}) \cong K_0(\mathcal{D}) \rightarrow \mathbb{C}$ is a weak stability function on $\mathcal{A}$. From now on, we write $Z(E)$ rather than $Z(v(E))$.
\end{enumerate}
Much like the slope in classical $\mu$-stability, we can define a \emph{slope} $\mu_\sigma$ for $\sigma$ using $Z$. For any $E \in \mathcal{A}$, set
\[
\mu_\sigma(E) := \begin{cases} - \frac{\Re Z(E)}{\Im Z(E)}, & \text{if} ~ \Im Z(E) > 0 \\
+ \infty , & \text{otherwise}.
\end{cases}
\]
We say an object $0 \neq E \in \mathcal{A}$ is $\sigma$-(semi)stable if $\mu_\sigma(F) < \mu_\sigma(E/F)$ (respectively $\mu_\sigma(F) \leq \mu_\sigma(E/F)$) for all proper subobjects $F \subset E$.
\begin{enumerate}[(i), resume]
\item Any object $E \in \mathcal{A}$ has a Harder--Narasimhan filtration in terms of $\sigma$-semistability defined above.
\item There exists a quadratic form $Q$ on $\Lambda \otimes \mathbb{R}$ such that $Q|_{\ker Z}$ is negative definite, and $Q(E) \geq 0$ for all $\sigma$-semistable objects $E \in \mathcal{A}$. This is known as the \emph{support property}.
\end{enumerate}
If the composition $Z \circ v$ is a stability function, then $\sigma$ is a \emph{stability condition} on $\mathcal{D}$.
\end{Def}
For this paper, we let $\Lambda$ be the numerical Grothendieck group $\mathcal{N}(\mathcal{D})$ which is $K_0(\mathcal{D})$ modulo the kernel of the Euler form $\chi(E, F) = \sum_i (-1)^i \ext^i(E, F)$.
\subsection{Tilt stability}
Let $\sigma = (\mathcal{A}, Z)$ be a weak stability condition on a triangulated category $\mathcal{D}$. Now consider the following subcategories of $\mathcal{A}$, where $\langle - \rangle$ denotes the extension closure:
\begin{align*}
\mathcal{T}_\sigma^\mu &= \langle E \in \mathcal{A} \mid E \text{ is } \sigma\text{-semistable with } \mu_\sigma(E) > \mu \rangle \\
\cF_\sigma^\mu &= \langle E \in \mathcal{A} \mid E \text{ is } \sigma\text{-semistable with } \mu_\sigma(E) \leq \mu \rangle.
\end{align*}
Then it is a result of \cite{happel1996tilting} that
\begin{Prop}
The abelian category $\mathcal{A}^\mu_\sigma := \langle \mathcal{T}_\sigma^\mu, \cF_\sigma^\mu[1] \rangle$ is the heart of a bounded t-structure on $\mathcal{D}$.
\end{Prop}
We call $\mathcal{A}^\mu_\sigma$ the \emph{tilt} of $\mathcal{A}$ around the torsion pair $(\mathcal{T}_\sigma^\mu, \cF_\sigma^\mu)$. Let $X$ be an $n$-dimensional smooth projective complex variety. Tilting can be applied to the weak stability condition $(\Coh(X) , Z_H)$ to form the once-tilted heart $\Coh^\beta(X)$, where $Z_H(E):=-c_1(E)H^{n-1}+\mathfrak{i} \rk(E)H^n$ for any $E\in \Coh(X)$. Define for $E \in \Coh^\beta(X)$
\[ Z_{\alpha, \beta}(E) = \frac{1}{2} \alpha^2 H^n \mathrm{ch}_0^\beta(E) - H^{n-2} \mathrm{ch}_2^\beta(E) + \mathfrak{i} H^{n-1} \mathrm{ch}_1^\beta(E). \]
\begin{Prop}[{\cite{bayer2011bridgeland, bayer2016space}}]
Let $\alpha>0$ and $\beta \in \mathbb{R}$. Then the pair $\sigma_{\alpha, \beta} = (\Coh^\beta(X) , Z_{\alpha, \beta})$ defines a weak stability condition on $\mathrm{D}^b(X)$. The quadratic form $Q$ is given by the discriminant
\[ \Delta_H(E) = (H^{n-1} \mathrm{ch}_1(E))^2 - 2 H^n \mathrm{ch}_0(E) H^{n-2} \mathrm{ch}_2(E) . \]
The stability conditions $\sigma_{\alpha, \beta}$ vary continuously as $(\alpha, \beta) \in \mathbb{R}_{>0} \times \mathbb{R}$ varies. Furthermore, for any $v \in \Lambda^2_H$ there is a locally finite wall-and-chamber structure on $\mathbb{R}_{>0} \times \mathbb{R}$ controlling stability of objects with class $v$.
\end{Prop}
We now state a useful lemma which relates 2-Giesesker-stability and tilt stability.
\begin{Lem} [{\cite[Lemma 2.7]{bayer2016space}, \cite[Proposition 4.8]{bayer2020desingularization}}] \label{bms lemma 2.7}
Let $E \in \mathrm{D}^b(X)$ be an object.
If $H^2 \mathrm{ch}_1^\beta(E) > 0$, then $E\in \Coh^{\beta}(X)$ and $E$ is $\sigma_{\alpha, \beta}$-(semi)stable for $\alpha \gg 0$ if and only if $E$ is a 2-Gieseker-(semi)stable sheaf.
\end{Lem}
\subsection{Finding solutions for walls in tilt stability} \label{sec:tilt stability wall algorithm}
In this subsection, we describe a way of finding (potential) walls in tilt stability with respect to objects in the derived category with a given truncated Chern character. This is similar to the method used in e.g. \cite{pertusi2020some} to find walls for certain objects. Let $M \in \Coh^{\beta}(X)$ be the object in question, and let its truncated Chern character be $\mathrm{ch}_{\leq 2}(M) = (m_0, m_1H, \frac{m_2}{d}H^2)$, where $d=\deg X$.
Assume there is a short exact sequence $0 \rightarrow E \rightarrow M \rightarrow F \rightarrow 0$ which makes $M$ strictly semistable. We can assume that $E$ and $F$ are tilt-semistable using the existence of Harder-Narasimhan or Jordan-Holder filtrations. Then the following conditions must be satisfied:
\begin{enumerate}
\item $ \mathrm{ch}_{\leq 2}(M) = \mathrm{ch}_{\leq 2}(E) + \mathrm{ch}_{\leq 2}(F)$;
\item $\mu_{\alpha, \beta}(E) = \mu_{\alpha, \beta}(M) = \mu_{\alpha, \beta}(F)$;
\item $\Delta_H(E) \geq 0$ and $\Delta_H(F) \geq 0$;
\item $\Delta_H(E) \leq \Delta_H(M)$ and $\Delta_H(F) \leq \Delta_H(M)$.
\end{enumerate}
Since $E, F \in \Coh^\beta(X)$, we also must have $\mathrm{ch}_1^\beta(E) \geq 0$ and $\mathrm{ch}_1^\beta(F) \geq 0$. Solving the system of inequalities above gives an even number of solutions of $(m_0, m_1, m_2)\in \mathbb{Z}^{\oplus 3}$; half of them are solutions for the destabilising subobject $E$, and the other half are the corresponding quotients $F$.
\subsection{Stability conditions on Kuznetsov components}
\subsubsection{Double-tilted stability conditions}
Now as in \cite{bayer2017stability}, we pick a weak stability condition $\sigma_{\alpha, \beta}$ and tilt the once-tilted heart $\Coh^\beta(X)$ with respect to the tilt slope $\mu_{\alpha, \beta}$ and some second tilt parameter $\mu$. One gets a torsion pair $(\mathcal{T}_{\alpha, \beta}^\mu, \cF_{\alpha, \beta}^\mu)$ and another heart $\Coh^\mu_{\alpha, \beta}(X)$ of $\mathrm{D}^b(X)$. Now ``rotate" the stability function $Z_{\alpha, \beta}$ by setting
\[ Z_{\alpha, \beta}^\mu := \frac{1}{u} Z_{\alpha, \beta} \]
where $u \in \mathbb{C}$ such that $|u|=1$ and $\mu =-\frac{\Re u}{\Im u}$.
\begin{Prop}[{\cite[Proposition 2.15]{bayer2017stability}}]
The pair $(\Coh^\mu_{\alpha, \beta}(X), Z_{\alpha, \beta}^\mu)$ defines a weak stability condition on $\mathrm{D}^b(X)$.
\end{Prop}
For example, if we choose $\mu=0$, we have
\[ Z^0_{\alpha, \beta}(E) = H^{n-1} \mathrm{ch}_1^\beta(E) + \mathfrak{i} (H^{n-2} \mathrm{ch}_2^\beta(E)-\frac{1}{2} \alpha^2 H^n \mathrm{ch}_0^\beta(E)). \]
Proposition 5.1 in \cite{bayer2017stability} gives a criterion for checking when weak stability conditions on a triangulated category can be used to induce stability conditions on a subcategory. Each of the criteria of this proposition can be checked for $\mathcal{K}u(X) \subset \mathrm{D}^b(X)$ to give stability conditions on $\mathcal{K}u(X)$.
\subsubsection{Stability conditions on Kuznetsov components}
More precisely, let $\mathcal{A}(\alpha, \beta) = \Coh^\mu_{\alpha, \beta}(X) \cap \mathcal{K}u(X)$ and $Z(\alpha, \beta) = Z_{\alpha, \beta}^\mu|_{\mathcal{K}u(X)}$. Furthermore, let $0 < \epsilon \ll 1$, $\beta = -1+\epsilon$ and $0 < \alpha < \epsilon$. Also impose the following condition on the second tilt parameter $\mu$:
\begin{equation}
\mu_{\alpha, \beta}(\mathcal{E}(-H)[1]) < \mu_{\alpha, \beta}(\oh_X(-H)[1]) < \mu < \mu_{\alpha, \beta}(\mathcal{E}) < \mu_{\alpha, \beta}(\oh_X) .
\end{equation}
Then we get the following theorem.
\begin{Thm}[{\cite[Theorem 6.9]{bayer2017stability}}]
Let $X$ be a Fano threefold of genus $6, 8, 10$ or $12$, and let $\epsilon, \alpha, \beta$ and $\mu$ be as above. Then the pair $\sigma(\alpha, \beta)=(\mathcal{A}(\alpha, \beta), Z(\alpha, \beta))$ defines a Bridgeland stability condition on $\mathcal{K}u(X)$.
\end{Thm}
In our paper, we fix $\mu=0$, i.e. $\sigma(\alpha, \beta):=\sigma^0_{\alpha, \beta}|_{\mathcal{K}u(X)}$.
\begin{Prop}
\label{induce_range}
Let $X:=X_{2g-2}$ be a prime Fano threefold of index one and genus $6\leq g\leq 12$. Then $\sigma(\alpha, \beta):=(\mathcal{A}^0_{\alpha, \beta}|_{\mathcal{K}u(X)}, Z^0_{\alpha, \beta}|_{\mathcal{K}u(X)})$ is a stability condition for $(\alpha, \beta)$ listed below:
\begin{itemize}
\item $g=6$: $\beta=-\frac{9}{10}, 0<\alpha<1+\beta$,
\item $g=7$: $\beta=-\frac{5}{6}$ or $-\frac{71}{84}$, $0<\alpha<1+\beta$,
\item $g=8$: $\beta=-\frac{22}{25}$ or $-\frac{122}{125}$, $0<\alpha<1+\beta$,
\item $g=9$: $\beta=-\frac{3}{4}$ or $-\frac{31}{40}$, $0<\alpha<1+\beta$,
\item $g=10$: $\beta=-\frac{22}{25}$ or $-\frac{10}{11}$, $0<\alpha<1+\beta$,
\item $g=12$: $\beta=-\frac{21}{25}$ or $-\frac{19}{22}$, $0<\alpha<1+\beta$.
\end{itemize}
Moreover, $\sigma(\alpha, \beta)$ is Serre-invariant for these $(\alpha, \beta)$.
\end{Prop}
\begin{proof}
It is not hard to see that $\mathcal{E}_g, \mathcal{E}_g(-H)[1], \oh_X, \oh_X(-H)[1]\in \Coh^{\beta}(X)$, and that they satisfy
\[\mu_{\alpha, \beta}(\mathcal{E}(-H)[1]) < \mu_{\alpha, \beta}(\oh_X(-H)[1]) < 0 < \mu_{\alpha, \beta}(\mathcal{E}) < \mu_{\alpha, \beta}(\oh_X) \]
for each $(\alpha, \beta)$ listed above.
First we assume that $g\geq 6$ is even. Then from \cite[Proposition 3.2]{Pertusi2021serreinv} we know that $\sigma(\alpha, \beta)$ is a stability condition for $(\alpha, \beta)$ as above. The Serre-invariance follows from \cite[Theorem 3.18]{Pertusi2021serreinv}.
When $g=7$ or $9$, we know that $\mathcal{K}u(X)$ is equivalent to the derived category of a certain curve with positive genus. Thus if one proves that $\sigma(\alpha, \beta)$ is a stability condition, the Serre-invariance follows from \cite{macri2007stability}. To this end, it is sufficient to show that $\mathcal{E}_g$ and $\mathcal{E}_g(-H)[1]$ are $\sigma_{\alpha, \beta}$-semistable for the $(\alpha, \beta)$ listed above. From Lemma \ref{bms lemma 2.7} we know that $\mathcal{E}_g$ and $\mathcal{E}_g(-H)[1]$ are both $\sigma_{\alpha, \beta}$-semistable for the $\beta$ listed above and for $\alpha \gg 0$. The result then follows from Lemma \ref{g=7wall1}, Lemma \ref{g=7wall2}, Lemma \ref{g=9wall1} and Lemma \ref{g=9wall2}.
\end{proof}
\subsection{Serre-invariance of stability conditions on Kuznestov components}
Recall the universal covering $\widetilde{\mathrm{GL}}^+(2,\mathbb{R})$ of $\mathrm{GL}^+(2, \mathbb{R})$ acts on the space of stability conditions, see \cite[Lemma 8.2]{bridgeland}.
\begin{Def}\label{Serre_invariant_stab}
Let $\sigma$ be a stability condition on the alternative Kuznetsov component $\mathcal{A}_X$. It is called \emph{Serre-invariant} if $S_{\mathcal{A}_X} \cdot \sigma=\sigma \cdot g$ for some $g\in\widetilde{\mathrm{GL}}^+(2,\mathbb{R})$.
\end{Def}
The same definition also applies when we replace $\mathcal{A}_X$ by $\mathcal{K}u(X)$ in the above. We recall several properties of Serre-invariant stability conditions from \cite{pertusi2020some, zhang2020bridgeland} below.
\begin{Prop}\label{ogm homo dim 2}
Let $\sigma$ be a Serre-invariant stability condition on $\mathcal{A}_X$ or $\mathcal{K}u(X)$, where $X$ is a prime Fano threefold of index one and genus $g\geq 6$. Then:
\begin{enumerate}[\normalfont(i)]
\item the heart of $\sigma$ has homological dimension is $\leq 2$,
\item Let $A$ be a non-trivial object in the heart of a stability condition $\sigma$ on $\mathcal{K}u(X_{2g-2})$ for $g\geq 7$. Then \begin{itemize}
\item $\mathrm{ext}^1(A,A)\geq 2$ if $g=6,8,12$ and
\item $\mathrm{ext}^1(A,A)\geq 1$ if $g=7,9,10$.
\end{itemize}
\end{enumerate}
\end{Prop}
\begin{proof}\leavevmode\begin{enumerate}[(i)]
\item If $g=7,9,10$, we have $\mathcal{K}u(X_{2g-2})\simeq \mathrm{D}^b(C)$ for certain curves $C$ of positive genus (see \cite{kuznetsov2005derived}, \cite{kuznetsov2009derived}). Then by \cite{macri2007stability}, the stability condition is given by slope stability on the curve $C$ up to some action of $\widetilde{\mathrm{GL}}^+(2,\mathbb{R})$, whose heart is $\mathrm{Coh}(C)$. So the homological dimension is $1$. If $g=12$, then by \cite[Section 7]{dimitrov2019bridgeland} the heart of a stability condition on $\mathcal{K}u(X_{22})\simeq \mathrm{D}^b(K(3))$ is generated by two exceptional objects, so the homological dimension is $1$. If $g=6$ or $8$, by \cite[Proposition 4.13]{zhang2020bridgeland} and \cite[Lemma 5.10]{pertusi2020some}, the homological dimension is $2$.
\item Since $\chi(A,A)\geq -1$ for every non-trivial object $A$ in $\mathcal{K}u(X_{10})$, $\mathcal{K}u(X_{14})$ and $\mathcal{K}u(X_{22})$, by $(i)$ we have $\mathrm{ext}^1(A,A)\geq 2$, while $\mathrm{ext}^1(A,A)\geq 1$ since $\chi(A,A)\geq 0$ for every non-trivial object $A$ in $\mathcal{K}u(X_{2g-2})$ for $g=7,9$ and $10$.
\end{enumerate}
\end{proof}
To show an object in the Kuznetsov component is stable with respect to a Serre-invariant stability condition, we use the \emph{Weak Mukai Lemma}, written below.
\begin{Lem}[{Weak Mukai Lemma, \cite[Lemma 5.12]{pertusi2020some}, \cite[Lemmas 3.15 and 3.16]{liu2021note}}] \label{weak-mukai-lemma}
Let $X:=X_{2g-2}$ be a prime Fano threefold of index one and genus $g$, and $\sigma=(\mathcal{A}_{\sigma}, Z_{\sigma})$ be a Serre-invariant stability condition on the Kuznetsov component.
\leavevmode\begin{enumerate}
\item $g=8$: Let $A\rightarrow E\rightarrow B$ be an exact triangle in the Kuznetsov component $\mathcal{K}u(X)$ with $\mathrm{Hom}(A,B)=0$ such that the phases of the $\sigma$-semistable factors of $A$ are greater than or equal to the phases of the $\sigma$-semistable factors of $B$. Then $\mathrm{ext}^1(A,A)+\mathrm{ext}^1(B,B)\leq\mathrm{ext}^1(E,E)$.
\item $g=7,9,10,12$: Let $A\rightarrow E\rightarrow B$ be an exact triangle in Kuznetsov component $\mathcal{K}u(X)$ with $A,B\in \mathcal{A}_{\sigma}$ and $\mathrm{Hom}(A,B)=0$. Then $\mathrm{ext}^1(A,A)+\mathrm{ext}^1(B,B)\leq\mathrm{ext}^1(E,E)$.
\item $g=6$: Let $A\rightarrow E\rightarrow B$ be an exact triangle in the Kuznetsov component $\mathcal{K}u(X)$ with $\mathrm{Hom}(A,B)\cong\mathrm{Hom}(A,\tau(B))=0$. Then $\mathrm{ext}^1(A,A)+\mathrm{ext}^1(B,B)\leq\mathrm{ext}^1(E,E)$.
\end{enumerate}
\end{Lem}
Finally, we discuss the uniqueness of Serre-invariant stability conditions on Kuznetsov components of certain Fano threefolds, which will be used frequently.
\begin{Thm}[{\cite[Theorem 4.25]{JLLZ}, \cite[Theorem 3.1]{FeyzbakhshPertusi2021stab}}]
\label{all_in_one_orbit}
Let $X:=X_{4d+2}$ or $Y_{d}$ for all $d\geq 2$. Then all Serre-invariant stability conditions on $\mathcal{K}u(X)$ are in the same $\widetilde{\mathrm{GL}}^+(2,\mathbb{R})$-orbit.
\end{Thm}
\subsection{Stability of the gluing object}
Let $X$ be an index one prime Fano threefold of genus $6 \leq g \leq 10$. In this subsection, we show that the \emph{gluing object} $i^!\mathcal{E}\in\mathcal{K}u(X)$ is $\sigma$-stable with respect to stability conditions on $\mathcal{K}u(X)$ for each Serre-invariant stability condition $\sigma$.
\begin{Prop}
\label{stability_gluing_data}
Let $X$ be a prime Fano threefold of index one and genus $10\geq g\geq 6$, and let $\mathcal{A}_X$ be the alternative Kuznetsov component. Then the \emph{gluing object} $\Xi(i^!\mathcal{E})\in\mathcal{A}_X$ is $\sigma$-stable for each Serre-invariant stability condition $\sigma$ on $\mathcal{A}_X$.
\end{Prop}
\begin{proof}\leavevmode\begin{enumerate}[(i)]
\item $g=6$: $\Xi(i^!\mathcal{E})$ is $\sigma$-stable by \cite[Lemma 5.7]{JLLZ}.
\item $g=7$: Stability of $\Xi(i^!\mathcal{E})$ follows from \cite[Lemma 2.9]{brambilla2014vector}.
\item $g=8$: By Proposition~\ref{ext_group_gluing_data},
$\Xi(i^!\mathcal{E})$ is $\sigma$-stable by exactly the same argument as in \cite[Lemma 7.9]{liu2021note}.
\item $g=9$: Stability of $\Xi(i^!\mathcal{E})$ follows from \cite[Proposition 3.10, Remark 3.12]{brambilla2013rank}.
\item $g=10$: Stability of $\Xi(i^!\mathcal{E})$ follows from \cite[Definition 2.8, Section II.3.3]{Fanezi2013Halbi}.
\end{enumerate}
\end{proof}
\begin{Rem}
By Theorem \ref{all_in_one_orbit}, this also shows the stability of $i^!\mathcal{E}\in \mathcal{K}u(X)$ in these cases.
\end{Rem}
\section{Embedding Fano threefolds into Bridgeland moduli spaces} \label{sec:embedding}
In this section, we will embed our Fano threefolds $X$ into certain moduli spaces of stable objects in $\mathcal{K}u(X)$. The numerical class will be that of the projection of a skyscraper sheaf into $\mathcal{K}u(X)$. In the first subsection, we will give an explicit description of projections of skyscrapers into $\mathcal{K}u(X)$. In the second subsection, we will deal with the stability of these projections with respect to stability conditions on $\mathcal{K}u(X)$. In the third subsection, we will show the existence of a morphism from $X$ to this moduli space, and show that it is in fact an embedding.
\subsection{Projections of skyscraper sheaves into Kuznestov components}
\begin{Prop} \label{projection}
Let $X$ be a prime Fano threefold of genus $g$ and $x\in X$ a point. Let $i^*:\mathrm{D}^b(X)\rightarrow\mathcal{K}u(X)$ be the projection functor. Then $i^*(\oh_x)$ is given by \leavevmode\begin{enumerate}[\normalfont(i)]
\item $\ker(\mathcal{E}^{\oplus \frac{g}{2}} \twoheadrightarrow I_x)[2]$, if $g\geq 6$ and $g$ is even such that $X$ is not a special GM threefold;
\item $\ker(\mathcal{E}^{\oplus 5}\twoheadrightarrow I_x)[2]$, if $g=7$;
\item $\ker(\mathcal{E}^{\oplus 3}\twoheadrightarrow I_x)[2]$, if $g=9$;
\item \leavevmode\begin{enumerate}[\normalfont(1)] \item $\ker(\mathcal{E}^{\oplus 3}\twoheadrightarrow I_{\pi^{-1}(\pi(x))})[2]\rightarrow i^*(\oh_x)\rightarrow\oh_y[1]$, if $X$ is a special GM threefold and $\pi(x)\not\in\mathcal{B}$, where $\pi:X\rightarrow Y_5$ is a double cover with branch locus $\mathcal{B}\subset Y_5$ and $y=\tau(x)$;
\item $\ker(\mathcal{E}^{\oplus 3}\twoheadrightarrow I_{\pi^{-1}(\pi(x))})[2]\rightarrow i^*(\oh_x)\rightarrow\oh_x[1]$, if $X$ is a special GM threefold and $\pi(x)\in\mathcal{B}$.
\end{enumerate}
\end{enumerate}
\end{Prop}
\begin{proof}
First note that since $H^\bullet(X, \oh_x) = k$, we have $\mathrm{L}_{\oh_X} \oh_x \cong I_x[1]$.
\leavevmode\begin{enumerate}[(i)]
\item Suppose $g\geq 6$ is even and $X$ is not a special GM threefold. In this case $X \hookrightarrow \Gr(2, \frac{g}{2}+2)$ is an embedding. Applying $\Hom(\mathcal{E}, -)$ to the short exact sequence $0 \rightarrow I_x \rightarrow \oh_X \rightarrow \oh_x \rightarrow 0$, we get an exact sequence
\begin{equation*}
0 \rightarrow \Hom(\mathcal{E}, I_x) \rightarrow \Hom(\mathcal{E}, \oh_X) \rightarrow \Hom(\mathcal{E}, \oh_x) \rightarrow \Ext^1(\mathcal{E}, I_x) \rightarrow 0 .
\end{equation*}
Note that $\RHom^\bullet(\mathcal{E}, \oh_X) = k^{\frac{g}{2}+2}$ and $\RHom^\bullet(\mathcal{E}, \oh_x)=k^2$.
Then $\mathrm{hom}(\mathcal{E},I_x)\geq\frac{g}{2}$. If $\mathrm{hom}(\mathcal{E},I_x)\geq\frac{g}{2}+1$, then $x$ would be contained in the zero locus of at least $\frac{g}{2}+1$ linearly independent sections of $\mathcal{E}^{\vee}$, which is an empty set. Thus $\mathrm{hom}(\mathcal{E},I_x)=\frac{g}{2}$. Therefore $\RHom^\bullet(\mathcal{E}, I_x) = k^{\frac{g}{2}}$ and we have
\begin{equation*} \label{eq:even genus projection original triangle}
\mathcal{E}^{\oplus \frac{g}{2}} \rightarrow I_x \rightarrow \mathrm{L}_{\mathcal{E}} I_x .
\end{equation*}
We claim that the map $h: \mathcal{E}^{\oplus \frac{g}{2}} \rightarrow I_x$ is surjective. Indeed, $\im(h) = I_D$ where $D$ is the zero locus of $\frac{g}{2}$ linearly independent sections of $\mathcal{E}^{\vee}$ containing the point $x$. For all cases of $g$ that we consider, this zero locus is $\Gr(2,2)$, which is just a point. Since $X \hookrightarrow \Gr(2, \frac{g}{2}+2)$ is an embedding it follows that $\im(h) = I_x$. So $\mathcal{E}^{\oplus \frac{g}{2}} \rightarrow I_x$ is surjective and $\mathrm{L}_{\mathcal{E}} I_x \cong \ker(\mathcal{E}^{\oplus \frac{g}{2}} \rightarrow I_x)[1]$. Hence $i^*(\oh_x) = \mathrm{L}_{\mathcal{E}} I_x[1] = \ker(\mathcal{E}^{\oplus \frac{g}{2}} \rightarrow I_x)[2]$.
\item If $g=7$, $i^*(\oh_x)\cong\mathrm{L}_{\mathcal{E}_5}I_x[1]$. By similar computations, $\mathrm{RHom}^\bullet(\mathcal{E}_5,I_x)\cong k^5$, so that we have
$$\mathcal{E}^{\oplus 5}\rightarrow I_x\rightarrow\mathrm{L}_{\mathcal{E}}I_x.$$
If the map $h:\mathcal{E}^{\oplus 5}\rightarrow I_x$ is not surjective, then $\mathrm{im}(h)$ would be an ideal sheaf $I_D$, where $D$ is zero locus of five linearly independent sections of $\mathcal{E}^{\vee}$. But in this case $D=\mathrm{Gr}(5,5)\cap X$, and since $X\hookrightarrow \mathrm{OGr}_+(5,10)$ is cut out by a linear section, we know that $D=\{x\}$. Hence the map is surjective, so $i^*(\oh_x)\cong\ker(\mathcal{E}^{\oplus 5}\rightarrow I_x)[2]$.
\item If $g=9$, then $X$ is a linear section of the Lagrangian Grassmannian $\mathrm{LGr}(3,6)\subset \mathbb{P}^{13}$. The map $\mathcal{E}^{\oplus 3}\rightarrow I_x$ is surjective by \cite[Lemma 3.6]{brambilla2013rank}. Then $i^*(\oh_x)\cong\ker(\mathcal{E}^{\oplus 3}\rightarrow I_x)[2]$.
\item If $g=6$ and $X$ is a special GM threefold, since $X$ does not embed into $\Gr(2,5)$, the map $\mathcal{E}^{\oplus 3}\xrightarrow{h} I_x$
is no longer a surjective map. Instead its image is $I_{\pi^{-1}(\pi(x))}$. If $\pi(x)\not\in\mathcal{B}$, then $\pi^{-1}(\pi(x))=x\cup\tau(x)$, otherwise $\pi^{-1}(\pi(x))$ is a non-reduced point with multiplicity two. Then the desired result follows.
\end{enumerate}
\end{proof}
We define $n_g:=\frac{g}{2}$ if $g$ is even, $n_7=5$ and $n_9=3$.
\begin{Rem} \label{rem:K shorthand}
In what follows, we will denote the kernels of $h: \mathcal{E}^{\oplus n_g}\to I_x$ by $K_x$. For example, if $g\geq 7$ or if $X$ is an ordinary GM threefold, $i^*(\oh_x)\cong K_x[2]$. It is an easy computation to show that if $g\geq 6$ and $g$ is even, then
\[\mathrm{ch}(i^*\oh_x)=(g-1)v-\frac{g}{2}w =( g-1, -\frac{g}{2}H, \frac{g(g-4)}{4}L, -\frac{1}{24}(g+2)(g-12)P ). \]
If $g=7$, then $\mathrm{ch}(i^*\oh_x)=12v-10w = (24,-10H, 0, 6P)$ and if $g=9$, then $\mathrm{ch}(i^*\oh_x)=8v-3w = (8,-3H,0,2P)$.
\end{Rem}
\subsection{Stability of projections of skyscraper sheaves}
In this subsection, we show that $i^*\oh_x$ is semistable with respect to every Serre-invariant stability condition on $\mathcal{K}u(X)$.
\begin{Lem} \label{Kstable}
Let $X:=X_{2g-2}$ with even genus $g\geq 6$ and $K:=K_x=\ker(\mathcal{E}^{\oplus \frac{g}{2}}\to I_x)$. Then $K$ is a $\mu$-stable reflexive sheaf.
\end{Lem}
\begin{proof}
It is clear that $K$ is reflexive. Assume that $K$ is not $\mu$-semistable, and let $K'\subset K$ be the maximal destabilizing subsheaf. Since $K\subset \mathcal{E}^{\oplus \frac{g}{2}}$ and $\mathcal{E}$ is $\mu$-stable, we know $-\frac{g}{2g-2}<\mu(K')\leq -\frac{1}{2}$. It is not hard to check that the only possible case is $\mu(K')=\mu^+(K)=-\frac{1}{2}$. Now by polystability of $\mathcal{E}^{\oplus \frac{g}{2}}$, $K'$ is contained in a direct summand $\mathcal{E}^{\oplus r}$, where $\rk(K')=2r<g$. Thus we have a commutative diagram
\[\begin{tikzcd}
0 & K' & K & K'' & 0 \\
0 & {\mathcal{E}^{\oplus r}} & {\mathcal{E}^{\oplus \frac{g}{2}}} & {\mathcal{E}^{\oplus \frac{g}{2}-r}} & 0
\arrow[hook, from=1-2, to=2-2]
\arrow[hook, from=1-3, to=2-3]
\arrow[hook, from=1-4, to=2-4]
\arrow[from=1-1, to=1-2]
\arrow[from=1-2, to=1-3]
\arrow[from=1-3, to=1-4]
\arrow[from=1-4, to=1-5]
\arrow[from=2-1, to=2-2]
\arrow[from=2-2, to=2-3]
\arrow[from=2-3, to=2-4]
\arrow[from=2-4, to=2-5]
\end{tikzcd}\]
with the rows being exact, where $K'':=K/K'$. Thus by taking the cokernel, we have a map $\mathcal{E}^{\oplus r}/K'\to \mathcal{E}^{\oplus \frac{g}{2}}/K\cong I_x$ when $X$ is not a special GM threefold, and a map $\mathcal{E}^{\oplus r}/K' \to \mathcal{E}^{\oplus \frac{g}{2}}/K\cong I_{Z}$ when it is. Note that if $\mathcal{E}^{\oplus r}/K'\neq 0$, then it is a torsion sheaf, and therefore from torsion-freeness of $\mathcal{E}^{\oplus \frac{g}{2}}/K$ we have $\Hom(\mathcal{E}^{\oplus r}/K', \mathcal{E}^{\oplus \frac{g}{2}}/K)=0$, which gives a contradiction.
Thus we have $\mathcal{E}^{\oplus r}/K'=0$, i.e. $K'=\mathcal{E}^{\oplus r}$. But this is also impossible, since this implies that $\mathcal{E}\subset K=\ker(\mathcal{E}^{\oplus \frac{g}{2}}\to I_x)$ and this contradicts the construction of the natural map $\mathcal{E}^{\oplus \frac{g}{2}}\to I_x$, which corresponds to the $\frac{g}{2}$ linearly independent sections of $\mathcal{E}^{\vee}$ whose zero locus contains $x$.
\end{proof}
\begin{Rem}
The stability of $K$ in odd genus can be proved by a similar argument as above, but we will not need this result.
\end{Rem}
\begin{Lem} \label{ext of K}
We have
\[
\RHom^\bullet(i^*\oh_x, i^*\oh_x) = \begin{cases}
k\oplus k^6[-1], & \text{if } g=6 \text{ and ordinary} \\
k\oplus k^6[-1] ~\text{or}~k\oplus k^7[-1]\oplus k[-2] , & \text{if } g=6 \text{ and special} \\
k\oplus k^{25}[-1], & \text{if } g=7 \\
k\oplus k^9[-1], & \text{if } g=9 \\
k\oplus k^g[-1], & \text{if } g\geq 8 \text{ and } g \text{ is even}.
\end{cases}
\]
\end{Lem}
\begin{proof}
First we assume that $g\geq 6$ is even. Then we have a triangle $\mathcal{E}^{\oplus \frac{g}{2}}\to I_x\to i^*\oh_x[-1]$. We use the standard spectral sequence, see e.g. \cite[Lemma 2.27]{pirozhkov2020admissible}, to do the computations. The first page is
$$ E^{p,q}_1= \begin{array}{c|cc}
\Ext^3(I_x, \mathcal{E}^{\oplus \frac{g}{2}}) & \Ext^3(\mathcal{E}^{\oplus \frac{g}{2}}, \mathcal{E}^{\oplus \frac{g}{2}})\oplus \Ext^3(I_x, I_x) & \Ext^3(\mathcal{E}^{\oplus \frac{g}{2}},I_x)\\
\Ext^2(I_x, \mathcal{E}^{\oplus \frac{g}{2}}) & \Ext^2(\mathcal{E}^{\oplus \frac{g}{2}}, \mathcal{E}^{\oplus \frac{g}{2}})\oplus \Ext^2(I_x, I_x) & \Ext^2(\mathcal{E}^{\oplus \frac{g}{2}},I_x)\\
\Ext^1(I_x, \mathcal{E}^{\oplus \frac{g}{2}}) & \Ext^1(\mathcal{E}^{\oplus \frac{g}{2}}, \mathcal{E}^{\oplus \frac{g}{2}})\oplus \Ext^1(I_x, I_x) & \Ext^1(\mathcal{E}^{\oplus \frac{g}{2}},I_x) \\
\Hom(I_x, \mathcal{E}^{\oplus \frac{g}{2}}) & \Hom(\mathcal{E}^{\oplus \frac{g}{2}}, \mathcal{E}^{\oplus \frac{g}{2}})\oplus \Hom(I_x, I_x) & \Hom(\mathcal{E}^{\oplus \frac{g}{2}},I_x) \\ \hline
0 & 0 & 0
\end{array}$$
It is not hard to show that the dimensions appearing in the first page are of the form
$$\dim E^{p,q}_1= \begin{array}{c|cc}
0 & 0 & 0\\
g & 3 & 0\\
0 & 3 & 0 \\
0 & \frac{g^2}{4}+1 & \frac{g^2}{4} \\ \hline
0 & 0 & 0
\end{array}$$
The projection $i^*\oh_x\in \mathcal{K}u(X)$, so if we apply $\Hom(\mathcal{E}^{\oplus \frac{g}{2}},-)$ to the triangle $\mathcal{E}^{\oplus \frac{g}{2}}\to I_x\to i^*\oh_x[-1]$, we have a natural isomorphism $\Hom(\mathcal{E}^{\oplus \frac{g}{2}}, \mathcal{E}^{\oplus \frac{g}{2}}) \cong \Hom(\mathcal{E}^{\oplus \frac{g}{2}}, I_x)$. This implies the differential $E^{0,0}_1=k^{\frac{g^2}{4}+1}\to E^{1,0}_1=k^{\frac{g^2}{4}}$ is surjective. Thus we have $E_2^{0,0}=k$ and $E^{1,0}_2=0$.
Next we will compute the differential $d\colon E^{-1,2}_1=k^g\to E^{0,2}_1=k^3$. Since $\Ext^2(\mathcal{E}, \mathcal{E})=0$, the map $d:E^{-1,2}_1=\Ext^2(I_x, \mathcal{E}^{\oplus \frac{g}{2}})\to E^{0,2}_1=\Ext^2(I_x, I_x)$ is the natural map induced by applying $\Hom(I_x,-)$ to the triangle $\mathcal{E}^{\oplus \frac{g}{2}}\to I_x\to i^*\oh_x[-1]$. When $X$ is not a special GM threefold, we have $\Ext^2(I_x,i^*\oh_x[-1])=\Ext^3(I_x, K_g)$. Then by Serre duality and Lemma \ref{Kstable}, we have \[ \Ext^2(I_x,i^*\oh_x[-1])=\Ext^3(I_x, K_g) \cong \Hom(K_g, I_x(-1))=0 . \] This means the natural map $d:E^{-1.2}_1\to E^{0,2}_1$ is surjective. Thus the dimensions of the second page are of the form
$$\dim E^{p,q}_2= \begin{array}{c|cc}
0 & 0 & 0\\
g-3 & 0 & 0\\
0 & 3 & 0 \\
0 & 1 & 0 \\ \hline
0 & 0 & 0
\end{array}$$
This means that when $g$ is even and $X$ is not a special GM threefold, the spectral sequence degenerates at $E_2$ and the desired result follows.
When $X$ is a special GM threefold, first we assume that $\pi(x)$ is in the branch locus $\mathcal{B}$. Then by Proposition \ref{projection}, we have a triangle $K[1]\to i^*\oh_x[-1]\to \oh_x$. In this case we have $\Ext^2(I_x,i^*\oh_x[-1])=\Ext^2(I_x, \oh_x)=k$, thus the dimensions of the second page are of the form
$$\dim E^{p,q}_2= \begin{array}{c|cc}
0 & 0 & 0\\
4 & 1 & 0\\
0 & 3 & 0 \\
0 & 1 & 0 \\ \hline
0 & 0 & 0
\end{array}$$
Therefore the spectral sequence degenerates at $E_2$ and we have $\RHom^\bullet(i^*\oh_x, i^*\oh_x)=k\oplus k^7[-1]\oplus k[-2]$. When $\pi(x)$ is not in the branch locus, we have $\Ext^2(I_x,i^*\oh_x[-1])=\Ext^2(I_x, \oh_{\tau(x)})=0$. Then from the arguments above, we obtain $\RHom^\bullet(i^*\oh_x, i^*\oh_x)=k\oplus k^6[-1]$.
When $g$ is odd, a similar argument shows that $\Hom(i^*\oh_x, i^*\oh_x)=1$. Since the homological dimension of $\mathcal{A}_{\sigma}$ is one, $i^*\oh_x$ is the direct sum of shifts of its cohomology objects with respect to $\mathcal{A}_{\sigma}$. Then from $\mathrm{hom}(i^*\oh_x,i^*\oh_x)=1$, we know that $i^*\oh_x$ is in the heart up to shifts. Hence we have $\Ext^i(i^*\oh_x, i^*\oh_x)=0$ for $i\geq 2$. Finally the dimension of $\Ext^1$ follows from the Euler characteristics.
\end{proof}
\begin{Lem} \label{coho two}
We have
\[\mathcal{H}^i_{\mathrm{Coh}^0_{\alpha, \beta}(X)}(i^*\oh_x)=0, \quad i\neq -2, -1\]
for $(\alpha, \beta)$ as in Proposition \ref{induce_range}.
\end{Lem}
\begin{proof}
By definition of $i^*\oh_x[-1]$, we have a triangle $\mathcal{E}^{\oplus n_g}\to I_x\to i^*\oh_x[-1]$. Since $\mathcal{E}, I_x\in \mathrm{Coh}^0_{\alpha, \beta}(X)$, the result follows from the long exact sequence of cohomology objects.
\end{proof}
\begin{Prop} \label{K in heart}
Let $X:=X_{2g-2}$ with genus $g\geq 6$.
\begin{enumerate}[\normalfont(i)]
\item If $g=6$, then $i^*\oh_x[-1]\in \mathcal{A}(\frac{1}{20}, -\frac{9}{10})$.
\item If $g=8$, then $i^*\oh_x[-1]\in \mathcal{A}(\frac{1}{25}, -\frac{22}{25})$.
\item If $g\neq 6, 8$, then $i^*\oh_x$ is in the heart of every Serre-invariant stability condition $\sigma$ on $\mathcal{K}u(X)$ up to some shifts.
\end{enumerate}
\end{Prop}
\begin{proof}
\leavevmode\begin{enumerate}[(i)]
\item First we assume that $g=6$. Let $\sigma:=\sigma(\frac{1}{20}, -\frac{9}{10})$. As in \cite[Lemma 4.5]{bernardara2012categorical}, we consider the spectral sequence for objects in $\mathcal{K}u(X)$ whose second page is given by
\[E^{p,q}_2=\bigoplus_i \mathrm{Hom}^p(\mathcal{H}^i_{\sigma}(i^*\oh_x), \mathcal{H}^{i+q}_{\sigma}(i^*\oh_x))\Rightarrow \mathrm{Hom}^{p+q}(i^*\oh_x,i^*\oh_x)\]
where the cohomology is taken with respect to the heart $\mathcal{A}(\frac{1}{20}, -\frac{9}{10})$. Let $r$ be the number of non-zero cohomology objects of $i^*\oh_x$ with respect to the heart. Note that since the homological dimension of $\mathcal{A}_{\sigma}$ is equal to 2, we have that $E_2^{1,q}=E^{1,q}_{\infty}$. So if we take $q=0$, by Lemma \ref{ogm homo dim 2} we get
\[\mathrm{ext}^1(i^*\oh_x,i^*\oh_x)\geq \sum_i \mathrm{ext}^1(\mathcal{H}_{\sigma}^i(i^*\oh_x),\mathcal{H}_{\sigma}^i(i^*\oh_x))\geq 2r.\]
If $r\geq 2$, by Lemma \ref{coho two} we know that $r=2$. Recall that in \eqref{v_w} we have $\mathcal{N}(\mathcal{K}u(X))=\langle v, w \rangle$. If we assume that $[\mathcal{H}^{-1}_{\sigma}(i^*\oh_x[1])]=av+bw$ and $[\mathcal{H}^{-2}_{\sigma}(i^*\oh_x)[2]]=cv+dw$ for some $a,b,c,d\in \mathbb{Z}$, then we have following equations:
\begin{enumerate}[(1)]
\item $[\mathcal{H}^{-1}_{\sigma}(i^*\oh_x[1])]+[\mathcal{H}^{-2}_{\sigma}(i^*\oh_x)[2]]=[i^*\oh_x]$, i.e. $a+b=5, c+d=-3$;
\item $\Im Z^0_{\frac{1}{20}, -\frac{9}{10}}(av+bw)\leq 0$, $\Im Z^0_{\frac{1}{20}, -\frac{9}{10}}(cv+dw)\geq 0$;
\item $1-\chi(\mathcal{H}^{-1}_{\sigma}(i^*\oh_x),\mathcal{H}^{-1}_{\sigma}(i^*\oh_x))+1-\chi(\mathcal{H}^{-2}_{\sigma}(i^*\oh_x),\mathcal{H}^{-2}_{\sigma}(i^*\oh_x)) \leq 7$.
\end{enumerate}
Now $(1)$ and $(3)$ imply that the only possible cases are $(a,b,c,d)=(2,-1,3,-2)$, $(a,b,c,d)=(3,-2,2,-1)$, $(a,b,c,d)=(4,-2,1,-1)$ and $(a,b,c,d)=(1,-1,4,-2)$. But it is not hard to check that $\Im\big(Z^0_{\frac{1}{20}, -\frac{9}{10}}(v-w)\big)<0$, $\Im\big(Z^0_{\frac{1}{20}, -\frac{9}{10}}(2v-w)\big)<0$ and $\Im\big(Z^0_{\frac{1}{20}, -\frac{9}{10}}(3v-2w)\big)<0$, which contradicts $(2)$. Therefore we have $r=1$. Now from $\Im\big(Z^0_{\frac{1}{20}, -\frac{9}{10}}(i^*\oh_x[-1])\big)>0$, we obtain that $i^*\oh_x[-1]\in \mathcal{A}(\frac{1}{20}, -\frac{9}{10})$.
\item Next we assume that $g=8$. Let $\sigma:=\sigma(\frac{1}{25}, -\frac{22}{25})$. The method is similar to the case $g=6$. We consider the spectral sequence for objects in $\mathcal{K}u(X)$ whose second page is given by
\[E^{p,q}_2=\bigoplus_i \mathrm{Hom}^p(\mathcal{H}^i_{\sigma}(i^*\oh_x), \mathcal{H}^{i+q}_{\sigma}(i^*\oh_x))\Rightarrow \mathrm{Hom}^{p+q}(i^*\oh_x,i^*\oh_x)\]
where the cohomology is taken with respect to the heart $\mathcal{A}(\frac{1}{25}, -\frac{22}{25})$. Let $r$ be the number of non-zero cohomology objects of $i^*\oh_x$ with respect to the heart. Note that since the homological dimension of $\mathcal{A}_{\sigma}$ is equal to 2, we have that $E_2^{1,q}=E^{1,q}_{\infty}$. So if we take $q=0$, we get
\[\mathrm{ext}^1(i^*\oh_x,i^*\oh_x)\geq \sum_i \mathrm{ext}^1(\mathcal{H}_{\sigma}^i(i^*\oh_x),\mathcal{H}_{\sigma}^i(i^*\oh_x))\geq 2r.\]
If $r\geq 2$, by Lemma \ref{coho two} we know that $r=2$. If we assume that $[\mathcal{H}^{-1}_{\sigma}(i^*\oh_x[1])]=av+bw$ and $[\mathcal{H}^{-2}_{\sigma}(i^*\oh_x)[2]]=cv+dw$ for some $a,b,c,d\in \mathbb{Z}$, then we have following equations:
\begin{enumerate}[(1)]
\item $[\mathcal{H}^{-1}_{\sigma}(i^*\oh_x[1])]+[\mathcal{H}^{-2}_{\sigma}(i^*\oh_x)[2]]=[i^*\oh_x]$, i.e. $a+b=7, c+d=-4$;
\item $\Im Z^0_{\frac{1}{25}, -\frac{22}{25}}(av+bw)\leq 0$, $\Im Z^0_{\frac{1}{25}, -\frac{22}{25}}(cv+dw)\geq 0$;
\item $1-\chi(\mathcal{H}^{-1}_{\sigma}(i^*\oh_x),\mathcal{H}^{-1}_{\sigma}(i^*\oh_x))+1-\chi(\mathcal{H}^{-2}_{\sigma}(i^*\oh_x),\mathcal{H}^{-2}_{\sigma}(i^*\oh_x)) \leq 8$.
\end{enumerate}
Now $(1)$ and $(3)$ imply that the only possible cases are $(a,b,c,d)=(2,-1,5,-3)$, $(a,b,c,d)=(5,-3,2,-1)$, $(a,b,c,d)=(4,-2,3,-2)$ and $(a,b,c,d)=(3,-2,4,-2)$. But it is not hard to check that $\Im\big(Z^0_{\frac{1}{25}, -\frac{22}{25}}(5v-3w)\big)<0$, $\Im\big(Z^0_{\frac{1}{25}, -\frac{22}{25}}(2v-w)\big)<0$ and $\Im\big(Z^0_{\frac{1}{25}, -\frac{22}{25}}(3v-2w)\big)<0$, which contradicts $(2)$. Therefore we have $r=1$. Now from $\Im\big(Z^0_{\frac{1}{20}, -\frac{9}{10}}(i^*\oh_x[-1])\big)>0$, we obtain that $i^*\oh_x[-1]\in \mathcal{A}(\frac{1}{25}, -\frac{22}{25})$.
\item If $g\neq 6, 8$, then the homological dimension of $\mathcal{A}_{\sigma}$ is one. Thus $i^*\oh_x$ is the direct sum of shifts of its cohomology objects with respect to $\mathcal{A}_{\sigma}$. Since $\mathrm{hom}(i^*\oh_x,i^*\oh_x)=1$, we know that $i^*\oh_x$ has only one cohomology object, i.e. $i^*\oh_x$ is in the heart $\mathcal{A}_{\sigma}$ up to a shift.
\end{enumerate}
\end{proof}
Now we prove the main result of this section. First we need a lemma.
\begin{Lem} \label{chi-1}
Let $\mathcal{T}\subset D^b(X)$ be a triangulated subcategory and $\mathcal{A}$ be a heart of $\mathcal{T}$ with homological dimension $\leq 2$. Let $A\to E\to B$ be an exact sequence in $\mathcal{A}$. Suppose that $\Hom(B, A[2])=0$ and $\Hom(E,E)=k$. Then we have $\chi(B,A)\leq -1$.
\end{Lem}
\begin{proof}
First note that $\Ext^1(B,A)\neq 0$, otherwise $E\cong A\oplus B$ which contradicts $\Hom(E,E)=k$.
By assumption we have $\Hom(B, A[i])=0$ for $i\geq 2$. We also have $\Hom(B,A)=0$, otherwise we have a non-zero composition of maps $E\twoheadrightarrow B\to A\hookrightarrow E$, which contradicts $\Hom(E,E)=k$. Therefore we obtain $\chi(B,A)=-\ext^1(B,A)\leq -1$.
\end{proof}
\begin{Thm} \label{thm:skyscraper projection stability}
Let $X$ be a prime Fano threefold of genus $g$ where $g\geq 6$, and $x \in X$ a point. Then $i^*\oh_x[-1]$ is $\sigma$-stable for every Serre-invariant stability condition $\sigma$ on $\mathcal{K}u(X)$.
\end{Thm}
\begin{proof}
By Proposition \ref{induce_range} and Theorem \ref{all_in_one_orbit}, we may assume that $\sigma=\sigma(\alpha_0, \beta_0)$, where
\begin{itemize}
\item $g=6$: $(\alpha_0, \beta_0)=(\frac{1}{20}, -\frac{9}{10})$,
\item $g=7$: $(\alpha_0, \beta_0)=(\frac{1}{12}, -\frac{5}{6})$,
\item $g=8$: $(\alpha_0, \beta_0)=(\frac{1}{25}, -\frac{22}{25})$,
\item $g=9$: $(\alpha_0, \beta_0)=(\frac{1}{8}, -\frac{3}{4})$,
\item $g=10$: $(\alpha_0, \beta_0)=(\frac{1}{25}, -\frac{22}{25})$,
\item $g=12$: $(\alpha_0, \beta_0)=(\frac{1}{25}, -\frac{21}{25})$.
\end{itemize}
When $g\geq 6$, we know that for $(\alpha_0, \beta_0)$ as above, $i^*\oh_x[-1]$ is in the heart $\mathcal{A}(\alpha_0, \beta_0)$ up to some shifts by Proposition \ref{K in heart}. If $i^*\oh_x$ is not $\sigma$-semistable, we can find a triangle in $\mathcal{K}u(X)$
\[A\to i^*\oh_x[-1]\to B\]
such that $A[m], B[m], i^*\oh_x[-1][m]\in \mathcal{A}(\alpha_0, \beta_0)$ for some integer $m$ with slopes $\mu_{\sigma}(A)\geq \mu^-_{\sigma}(A)>\mu^+_{\sigma}(B)\geq \mu_{\sigma}(B)$. Indeed, we can take $A$ to be the first HN factor of $i^*\oh_x[-1]$. By the Weak Mukai Lemma \ref{weak-mukai-lemma}, we have
\[\ext^1(A,A)+\ext^1(B,B)\leq \ext^1(i^*\oh_x,i^*\oh_x) . \]
Note that $1-\chi(A,A)\leq \ext^1(A,A)$. Therefore, we have the following relations:
\begin{enumerate}[(1)]
\item $[A]+[B]=[i^*\oh_x[-1]]$;
\item $\Im Z^0_{\alpha_0, \beta_0}(A)\cdot \Im Z^0_{\alpha_0, \beta_0}(i^*\oh_x[-1])\geq 0$ and $\Im Z^0_{\alpha_0, \beta_0}(B)\cdot \Im Z^0_{\alpha_0, \beta_0}(i^*\oh_x[-1])\geq 0$;
\item $\mu^0_{\alpha_0, \beta_0}(A)>\mu^0_{\alpha_0, \beta_0}(B)$;
\item $1-\chi(A,A)+1-\chi(B,B)\leq \ext^1(i^*\oh_x,i^*\oh_x)$.
\end{enumerate}
Thus if we assume $[A]=av+bw$ and $[B]=cv+dw$, by the results in Section \ref{5.9computation}, we have the following integer solutions for $(a,b,c,d)$:
\begin{enumerate}[(i)]
\item $g=6$ and ordinary: $(a,b,c,d)=(-2,1,-3,2)$;
\item $g=6$ and special: $(a,b,c,d)=(-2,1,-3,2)$ or $(a,b,c,d)=(-4,2,-1,1)$;
\item $g=7$:
there are no solutions;
\item $g=8$: $(a,b,c,d)=(-2,1,-5,3)$ or $(a,b,c,d)=(-4,2,-3,2)$;
\item $g=9$:
there are no solutions;
\item $g=10$:
there are no solutions;
\item $g=12$:
there are no solutions.
\end{enumerate}
Thus if $g\neq 6,8$, we know that $i^*\oh_x[-1]$ is $\sigma(\alpha_0, \beta_0)$-semistable. Next we consider the cases $g=6$ and $8$:
\begin{itemize}
\item Assume that $g=6$ and $X$ is an ordinary GM threefold. In this case $i^*\oh_x[-1]\in \mathcal{A}(\alpha_0, \beta_0)$. The solution $(a,b)=(-2,1)$ gives a potential destablizing subobject $A$ of $i^*\oh_x[-1]$. It is known that $A\cong i^*(E)[1]$ for some $E\in M_{X_{10}}(2,-1,5)$ by \cite[Theorem 8.5]{JLLZ}. Let $K:=\ker(\mathcal{E}^3\to I_x)$. By Lemma \ref{Kstable} and stability, we have $\Hom(E, K)=0$. Since $K=i^*\oh_x[-2]$, by adjointness we have $\Hom(i^*(E)[1], i^*\oh_x[-1])=\Hom(E[1],i^*\oh_x[-1])=\Hom(E, K)=0$, which gives a contradiction. Therefore, $i^*\oh_x[-1]$ is $\sigma(\alpha_0, \beta_0)$-semistable.
\item Assume that $g=6$ and $X$ is a special GM threefold. In this case $i^*\oh_x[-1]\in \mathcal{A}(\alpha_0, \beta_0)$. If $(a,b)=(-2,1)$, then we also have $A\cong i^*(E)[1]$ for some $E\in M_{X_{10}}(2,-1,5)$. By Lemma \ref{Kstable} and stability, we have $\Hom(E, K)=0$. If we apply $\Hom(E,-)$ to the triangle $K[1]\to i^*\oh_x[-1]\to \oh_{\tau(x)}$, from $\Hom(E,K)=\Hom(E, \oh_{\tau(x)}[-1])=0$, we obtain $\Hom(E,i^*\oh_x[-2])=\Hom(A, i^*(\oh_{x})[-1])=0$. This gives a contradiction.
If $(a,b)=(-4,2)$, then we have $\chi(B,A)=0$, which contradicts Lemma \ref{chi-1}. Therefore, $i^*\oh_x[-1]$ is $\sigma(\alpha_0, \beta_0)$-semistable.
\item Assume that $g=8$. In this case $i^*\oh_x[-1]\in \mathcal{A}(\alpha_0, \beta_0)$. If $(a,b)=(-2,1)$, then by \cite[Theorem 1.1]{liu2021note} we know that $A\cong i^*(E)[1]$ for some $E\in M_{X_{14}}(2,-1,6)$. By Lemma \ref{Kstable} and stability, we have $\Hom(E, K)=0$. Since $K=i^*\oh_x[-2]$, by adjointness we have $\Hom(i^*(E)[1], i^*\oh_x[-1])=\Hom(E[1], i^*\oh_x[-1])=\Hom(E, K)=0$, which gives a contradiction.
If $(a,b)=(-4,2)$, then we have $\chi(B,A)=0$, which contradicts Lemma \ref{chi-1}. Therefore, $i^*\oh_x[-1]$ is $\sigma(\alpha_0, \beta_0)$-semistable.
\end{itemize}
When $g\neq 7$, $[i^*\oh_x[-1]]$ is a primitive class, hence $i^*\oh_x[-1]$ is actually $\sigma$-stable.
When $g=7$, the possible JH factors will have numerical class $-6v+5w$. By \cite{kuznetsov2005derived}, there is an equivalence $\Phi: S^{-1}_{\mathrm{D}^b(X_{12})}(\mathcal{K}u(X_{12}))\to \mathrm{D}^b(\Gamma_7)$. Then we have an equivalence $\Theta=\Phi \circ S_{\mathrm{D}^b(X_{12})}^{-1}: \mathcal{K}u(X_{12})\to \mathrm{D}^b(\Gamma_7)$, where $\Gamma_7$ is a smooth projective curve of genus $7$. Moreover, up to some auto-equivalences we have $\Theta(i^!\mathcal{E}_7)\cong \oh_{\Gamma_7}$ by \cite[Lemma 2.9]{brambilla2013rank} or \cite[Lemma 5.6]{kuznetsov2005derived}. It is easy to check that if there is a strictly $\sigma$-semistable object $i^*\oh_x[-1]$, then up to some auto-equivalences, $\Theta$ maps the JH filtration of $i^*\oh_x[-1]$ to an exact sequence
$0\to L_1\to E\to L_2\to 0$ on $\Gamma_7$
where $L_i$ are line bundles of degree $6$, and $h^0(E)=5$.
Then by Lemma \ref{genus7_JH}, the curve $\Gamma_7$ admits a line bundle $L$ with $h^0(L)=2$ and $\deg L=4$. But this contradicts \cite[Theorem 8.1]{Mukai2001Brill-Nother}.
Thus the above argument shows that for every $g\geq 6$, every object $i^*\oh_x[-1]$ is $\sigma$-stable.
\end{proof}
\begin{Lem} \label{genus7_JH}
Let $\Gamma$ be a smooth projective curve of genus $7$. Assume that there is a bundle $E$ on $\Gamma$ with $h^0(E)=5$ and an exact sequence
\begin{equation} \label{g=7JH}
0\to L_1\to E\to L_2\to 0
\end{equation}
such that $L_i$ are line bundles with $\deg L_i=6$ for each $i$. Then $\Gamma$ admits a line bundle $L$ with $h^0(L)=2$ and $\deg L=4$.
\end{Lem}
\begin{proof}
By Riemann-Roch, we know that $h^0(L_i)=h^1(L_i)$ for each $i$. By taking the cohomology long exact sequence of \eqref{g=7JH}, there is at least one $j\in \{1,2\}$ such that $h^0(L_j)=h^1(L_j)\neq 0$. Then applying Clifford's theorem to the line bundle $L_j$, we have $h^0(L_j)\leq 4$. Thus it is easy to see that there is a $k\in \{1,2\}$ such that $h^0(L_k)=4$ or $3$.
If $h^0(L_k)=4$, we take $p\notin \mathrm{Bs}(L_k)$ and $q\notin \mathrm{Bs}(L_k(-p))$. Then $L:=L_k(-p-q)$ has $h^0(L)=2$ and $\deg L=4$.
If $h^0(L_k)=3$ such that $\mathrm{Bs}(L_k)\neq \varnothing$, we take $p\in \mathrm{Bs}(L_k)$ and $q\notin \mathrm{Bs}(L_k(-p))$. Then $L:=L_k(-p-q)$ has $h^0(L)=2$ and $\deg L=4$.
If $h^0(L_k)=3$ such that $\mathrm{Bs}(L_k)= \varnothing$, we know that $L_k$ is not very ample, otherwise $\Gamma$ is a plane curve with degree $6$, which contradicts $g(\Gamma)=7$. Thus there exist points $p,q \in \Gamma$ such that $h^0(L_k)-h^0(L_k(-p-q))<2$. But from $\mathrm{Bs}(L_k)= \varnothing$, we know that $h^0(L_k)-h^0(L_k(-p-q))\geq 1$. Thus $L:=L_k(-p-q)$ has $h^0(L)=2$ and $\deg L=4$.
\end{proof}
\subsection{Embedding $X$ into a Bridgeland moduli space} \label{subsec:embedding}
We first give an outline for the existence of a morphism $X \rightarrow \mathcal{M}_\sigma(\mathcal{K}u(X), [i^*\oh_x[-1]])$. We follow exactly the same arguments as in \cite{bernardara2012categorical}, \cite{altavilla2019moduli} and \cite{zhang2020bridgeland}. First note that the projection functor $i^* : \mathrm{D}^b(X) \rightarrow \mathcal{K}u(X)$ is Fourier--Mukai ( this follows from \cite[Theorem 7.1]{kuznetsov2011base} and \cite[Lemma 3.25]{bayer2021stability} ), which means that $i^* \cong \Phi_N$ where $N \in \mathrm{D}^b(X \times X)$ is some integral kernel. Let $\mathcal{X}$ be the Hilbert scheme of points on $X$ (note that $\mathcal{X} \cong X$), and let $\mathcal{I}$ be the universal ideal sheaf on $X \times \mathcal{X}$. Define the functor
\[ \Phi_{N} \times \identity_{\mathcal{X}} := \Phi_{N \boxtimes \oh_{\Delta_{\mathcal{X}}}} : \mathrm{D}^b(X \times \mathcal{X}) \rightarrow \mathcal{K}u(X \times \mathcal{X}) . \]
The image $\Phi_{N} \times \identity_{\mathcal{X}}(\mathcal{I})$ is a family of objects in $\mathcal{K}u(X)$ parametrised by $\mathcal{X}$, which defines a morphism $p : \mathcal{X} \rightarrow \mathcal{M}_\sigma(\mathcal{K}u(X), [i^*\oh_x[-1]])$. The following lemma shows that for a point $x \in \mathcal{X}$, the image $p(x)$ is identified with $i^*\oh_x[-1]$.
\begin{Lem} \label{lem:identified lemma}
Let the notation be as above, and let $\iota_x : X \times x \rightarrow X \times \mathcal{X}$. Then
\[ \Phi_N(\iota^*_x(\mathcal{I})) \cong \iota^*_x(\Phi_{N} \times \identity_{\mathcal{X}}(\mathcal{I})) . \]
\end{Lem}
\begin{proof}
See \cite[Lemma 6.1]{zhang2020bridgeland}.
\end{proof}
\begin{Prop} \label{lem:tangent injective prop}
For every point $x\in X$, the induced map
\[\Ext^1(\oh_x, \oh_x)\to \Ext^1(i^*\oh_x, i^*\oh_x) \]
is injective.
\end{Prop}
\begin{proof}
Note that $\mathrm{L}_{\oh_X}$ induces an isomorphism $\Ext^1(\oh_x, \oh_x)\cong \Ext^1(I_x, I_x)$. Thus we only need to show that $d_2: \Ext^1(I_x, I_x)\to \Ext^1(\mathrm{L}_{\mathcal{E}} I_x, \mathrm{L}_{\mathcal{E}} I_x)$ is injective.
We consider the defining triangle of $\mathrm{L}_{\mathcal{E}} I_x$ and apply $\Hom(I_x, -)$ to it. Inside the long exact sequence, we have the sequence
\[ \cdots \rightarrow \Ext^1(I_x, \mathcal{E}^{\oplus n_g}) \rightarrow \Ext^1(I_x, I_x) \xrightarrow{d_2} \Ext^1(I_x, \mathrm{L}_{\mathcal{E}} I_x)=\Ext^1(\mathrm{L}_{\mathcal{E}} I_x, \mathrm{L}_{\mathcal{E}} I_x) \rightarrow \cdots . \]
Since $\Ext^1(I_x, \mathcal{E})=0$, we can see from the sequence above that the map $d_2$ is indeed injective.
\end{proof}
\begin{Lem} \label{lem:induced morphism injective}
The induced morphism $p : X\cong \mathcal{X} \rightarrow \mathcal{M}_\sigma(\mathcal{K}u(X), [i^*\oh_x[-1]])$ is injective.
\end{Lem}
\begin{proof}\leavevmode\begin{enumerate}[(i)]
\item If $g\geq 7$ or if $X$ is an ordinary GM threefold, $i^*\oh_x[-2]$ is a reflexive sheaf that is non-locally free only at the point $x$ from Proposition \ref{projection}. Thus $i^*\oh_x\cong i^*\oh_y$ if and only if $x=y$.
\item If $X$ is a special GM threefold, then $\mathcal{H}^0(i^*\oh_x[-1])\cong \mathcal{H}^0(i^*\oh_y[-1])$ if and only if $x=y$ by Proposition \ref{projection}.
\end{enumerate}
\end{proof}
\begin{Thm}\label{closed_embedding_into_modulispace}
For any $x \in X$, $p(x)$ is identified with $i^*\oh_x[-1]$ in the moduli space $\mathcal{M}_\sigma(\mathcal{K}u(X), [i^*\oh_x[-1]])$, and there is a closed embedding $p: X \hookrightarrow \mathcal{M}_\sigma(\mathcal{K}u(X), [i^*\oh_x[-1]])$ induced by $i^*$.
\end{Thm}
\begin{proof}
The discussion at the beginning of Subsection \ref{subsec:embedding} together with Theorem~\ref{thm:skyscraper projection stability} shows that we have a morphism $p$. By Lemma \ref{lem:identified lemma} and \ref{lem:induced morphism injective}, we know that $p$ is injective. By Proposition \ref{lem:tangent injective prop} $p$ is injective at the level of tangent spaces, hence it is an embedding. Note that $X$ and $\mathcal{M}_\sigma(\mathcal{K}u(X), [i^*\oh_x[-1]])$ are both proper, hence $p$ is a closed embedding.
\end{proof}
\section{Fano threefolds as Brill--Noether loci} \label{sec:BN}
In this section, we exhibit $X$ as a Brill--Noether locus inside the moduli space $\mathcal{M}_\sigma(\mathcal{K}u(X), [i^*\oh_x[-1]])$. We first fix some notation. Recall that $n_g:=\frac{g}{2}$ if $g$ is even, $n_7=5$ and $n_9=3$. Let $x \in X$ be a point, and let $i_{\mathcal{D}} : \mathcal{K}u(X) \hookrightarrow \mathcal{D}=\langle \mathcal{K}u(X), \mathcal{E} \rangle$ be the inclusion; this has a left adjoint $i_{\mathcal{D}}^*$ and a right adjoint $i_{\mathcal{D}}^!$. In particular, $i_{\mathcal{D}}^* = \mathrm{L}_{\mathcal{E}}$. Therefore we can rewrite the triangle \ref{eq:even genus projection original triangle} as
\begin{equation*}
\mathcal{E}^{\oplus n_g} \rightarrow I_x \rightarrow i_{\mathcal{D}}^* I_x \rightarrow \mathcal{E}^{\oplus n_g}[1] .
\end{equation*}
\begin{Rem}\label{inside_BN_locus}
We have
\begin{equation*}
\Ext^1_{\mathcal{D}}(i_{\mathcal{D}}^*I_x, \mathcal{E}) = \Ext^1_{\mathcal{D}}(i_{\mathcal{D}}i_{\mathcal{D}}^*I_x, \mathcal{E}) \cong \Ext^1_{\mathcal{K}u(X)}(i_{\mathcal{D}}^*I_x, i^!\mathcal{E})
\end{equation*}
because $i_{\mathcal{D}}^*$ and $i_{\mathcal{D}}^!$ are left and right adjoints to $i_{\mathcal{D}}$, respectively. Therefore, $\Ext^1(i_{\mathcal{D}}^*I_x, i^!\mathcal{E}) \cong \Hom(i_{\mathcal{D}}^*I_x, i^!\mathcal{E}[1])$ is precisely the space of morphisms from $i^*\oh_x[-1]=i_{\mathcal{D}}^*I_x$ to the shift of the gluing object $i^!\mathcal{E}$ by $[1]$.
\end{Rem}
We define $(\alpha_6,\beta_6)=(\frac{1}{20},-\frac{9}{10})$, $(\alpha_7, \beta_7)=(\frac{\sqrt{71}}{84},-\frac{71}{84})$ $(\alpha_8, \beta_8)=(\frac{2\sqrt{79}}{875},-\frac{122}{125})$, $(\alpha_9, \beta_9)=(\frac{\sqrt{31}}{40},-\frac{31}{40})$, $(\alpha_{10},\beta_{10})=(\frac{\sqrt{\frac{5}{3}}}{33},-\frac{10}{11})$, and $(\alpha_{12}, \beta_{12})=(\frac{1}{22},-\frac{19}{22})$. From Proposition \ref{induce_range} we know that $\sigma(\alpha_g, \beta_g)$ is a Serre-invariant stability condition on $\mathcal{K}u(X)$. In this section we fix $\sigma:=\sigma(\alpha_g, \beta_g)$.
\begin{Def}
We define the \emph{Brill--Noether locus} in $\mathcal{M}_\sigma(\mathcal{K}u(X), [i^*\oh_x[-1]])$ with respect to the object $i^!(\mathcal{E})$ as
\begin{equation*}
\mathcal{BN}_g := \{ F \mid \ext^1(F, i^!(\mathcal{E})) = n_g \} \subset \mathcal{M}_\sigma(\mathcal{K}u(X), [i^*\oh_x[-1]]) .
\end{equation*}
\end{Def}
The main theorem we prove in this section is
\begin{Thm} \label{thm: BN = X}
With $\sigma=\sigma(\alpha_g, \beta_g)$, we have
\[ \mathcal{BN}_g \cong X. \]
\end{Thm}
We split the proof of the theorem into a series of propositions and lemmas. First we show that $X$ is embedded in the \emph{Brill-Noether locus} $\mathcal{BN}_g$. Then we show that each object in $\mathcal{BN}_g$ must be $i^*(\oh_x[-1])$. The strategy will be to take an object $F \in \mathcal{BN}_g \setminus p(X)$, and show that it cannot exist.
\begin{Prop}
\label{X_embedded_BN}
Let $X$ be a prime Fano threefold of index one and genus $g\geq 6$. Then there is a closed embedding $p:X\hookrightarrow\mathcal{BN}_g$ induced by $i^*$.
\end{Prop}
\begin{proof}
By Theorem~\ref{closed_embedding_into_modulispace}, the projection functor $i^*$ already induces a closed embedding
\[ p:X\hookrightarrow\mathcal{M}_{\sigma}(\mathcal{K}u(X),[i^*\oh_x[-1]]) . \]
It suffices to check that $i^*\oh_x[-1]$ satisfies the Brill--Noether condition, i.e. that $\mathrm{ext}^1(i^*\oh_x[-1], i^!\mathcal{E})=n_g$ for $g\geq 6$. Note that $i^*\oh_x[-1]\cong\mathrm{L}_{\mathcal{E}}\mathrm{L}_{\oh_X}(\oh_x)[-1]\cong\mathrm{L}_{\mathcal{E}}I_x\cong i_{\mathcal{D}}^*I_x$. There is an exact triangle
$$\mathrm{RHom}^\bullet(\mathcal{E},I_x)\otimes\mathcal{E}\rightarrow I_x\rightarrow\mathrm{L}_{\mathcal{E}}I_x.$$
Then by Proposition~\ref{projection}, the triangle above becomes
$$\mathcal{E}^{\oplus n_g}\rightarrow I_x\rightarrow\mathrm{L}_{\mathcal{E}}I_x.$$
By Remark~\ref{inside_BN_locus}, $\mathrm{Ext}^1(i^*\oh_x[-1],i^!\mathcal{E})\cong\mathrm{Ext}^1(\mathrm{L}_{\mathcal{E}}I_x,\mathcal{E})$. Applying $\mathrm{Hom}(-,\mathcal{E})$ to the triangle above, we get a long exact sequence
$$0\rightarrow\mathrm{Hom}(i_{\mathcal{D}}^*I_x,\mathcal{E})\rightarrow\mathrm{Hom}(I_x,\mathcal{E})\rightarrow\mathrm{Hom}(\mathcal{E},\mathcal{E}^{\oplus n_g})\rightarrow\mathrm{Ext}^1(i_{\mathcal{D}}^*I_x,\mathcal{E})\rightarrow\mathrm{Ext}^1(I_x,\mathcal{E})\rightarrow\cdots$$
It is easy to check $\mathrm{Hom}(I_x,\mathcal{E})=\mathrm{Ext}^1(I_x,\mathcal{E})=0$, so $\mathrm{Ext}^1(i^*I_x,\mathcal{E})\cong\mathrm{Hom}(\mathcal{E},\mathcal{E}^{\oplus n_g})\cong k^{n_g}$.
Then the desired result follows.
\end{proof}
\begin{Prop} \label{prop:F is shift of vb}
Let $F \in \mathcal{BN}_g \setminus p(X)$, where $g\geq 6$. Then $F$ is the shift of a vector bundle by $[1]$.
\end{Prop}
\begin{proof}
We have
\begin{align*}
\Ext^i_{\mathrm{D}^b(X)}(F, \oh_x) &\cong \Ext^{2-i}_{\mathcal{K}u(X)}(i^*\oh_x[-1],F)^\vee \\
&\cong \Ext^{-i}_{\mathcal{K}u(X)}(F[2], S_{\mathcal{K}u(X)}(i^*\oh_x[-1])) .
\end{align*}
where we have used Serre duality in $\mathrm{D}^b(X)$ and adjunction for the first isomorphism, and Serre duality in $\mathcal{K}u(X)$ for the second. Since $F$ and $i^*\oh_x[-1]$ are in the same heart with homological dimension at most two, we have $\Ext^i(F, \oh_x)=0$ for $2<i$ and $i<0$. Since $F\notin p(X)$ by assumption, by stability of $F$ and $i^*\oh_x[-1]$ we have $\Ext^2(F, \oh_x)=\Hom(i^*\oh_x[-1],F)^\vee=0$. Thus $\Ext^i(F, \oh_x)=0$ for $2\geq i$ and $i< 0$.
First we assume that $g\neq 6$. Note that $S_{\mathcal{K}u(X)}(i^*\oh_x[-1])$ is stable in the Kuznetsov component by Serre-invariance of $\sigma$. For $g=8$, we have \[ \Hom(F, \oh_x)=\Ext_{\mathcal{K}u(X)}^2(i^*\oh_x[-1], F) = 0 \] by \cite[Corollary 5.5, Lemma 5.9]{pertusi2020some}, and \[ \Hom(F, \oh_x)=\Ext_{\mathcal{K}u(X)}^2(i^*\oh_x[-1], F) = 0 \] for $g=7,9,10, 12$ since the homological dimensions of the hearts of the stability conditions in these cases are one. This means $\RHom^\bullet(F, \oh_x)=\Ext^1(F, \oh_x)[-1]$. By \cite[Proposition 5.4]{bm99}, $F$ is a vector bundle shifted by one.
Now assume that $g=6$. If $X$ is a special GM threefold and $F \in \mathcal{BN}_g \setminus p(X)$, then
\begin{align*}
\mathrm{Hom}_{\mathrm{D}^b(X)}(F,\oh_x) &\cong \mathrm{Ext}^2_{\mathcal{K}u(X)}(i^*\oh_x[-1],F)^{\vee} \\ &\cong\mathrm{Hom}(F,\tau(i^*\oh_x[-1])) \\ &\cong\mathrm{Hom}(F,i^*(\oh_y)[-1]),
\end{align*}
where $y=\tau(x)$. Then by assumption, $\mathrm{Hom}_{\mathrm{D}^b(X)}(F,\oh_x)=0$. The desired result follows from \cite[Proposition 5.4]{bm99}.
Finally, if $X$ is an ordinary GM threefold and $F \in \mathcal{BN}_g \setminus p(X)$, then \begin{align*}\mathrm{Hom}_{\mathrm{D}^b(X)}(F,\oh_x) &\cong\mathrm{Ext}^2_{\mathcal{K}u(X)}(i^*\oh_x[-1],F)^{\vee} \\ &\cong\mathrm{Hom}(F,\tau(i^*\oh_x[-1])) . \end{align*} We claim that $\mathrm{Hom}(F,\tau(i^*\oh_x[-1]))=0$. Indeed, if $\mathrm{Hom}(F,\tau(i^*\oh_x[-1]))\neq 0$, then $F\cong\tau(i^*\oh_x[-1])$ since $F$ and $\tau(i^*\oh_x[-1])$ are both $\sigma$-stable objects of the same phase in $\mathcal{K}u(X)$. But then this means that $\tau(i^*\oh_x[-1])$ would also be in the Brill--Noether locus $\mathcal{BN}_g$, i.e. $\mathrm{Ext}^1(\tau(i^*\oh_x[-1]),i^!\mathcal{E})=k^3$, which is impossible by Lemma~\ref{Lemma_not_in_BN} below. Therefore $F$ is the shift of vector bundle by one from the same argument as in the previous cases.
\end{proof}
\begin{Lem}
\label{Lemma_not_in_BN}
We have $\mathrm{Ext}^1(\tau(i^*\oh_x[-1]),i^!\mathcal{E})\neq k^3$.
\end{Lem}
\begin{proof}
As $\mathrm{Ext}^1(\tau(i^*\oh_x[-1]),i^!\mathcal{E})\cong\mathrm{Ext}^1(i^*\oh_x[-1], \tau^{-1}(i^!\mathcal{E}))$ and $\tau^{-1}\cong i^*\circ(-\otimes\oh_X(H))[-1]$, we compute $\tau^{-1}(i^!\mathcal{E})$. By Remark~\ref{gluing_data_equal}, the gluing object $i^!\mathcal{E}$ is given by the exact triangle $$\mathcal{Q}(-H)[1]\rightarrow i^!\mathcal{E}\rightarrow\mathcal{E}.$$
Then $\tau^{-1}(i^!\mathcal{E})\cong\mathrm{L}_{\mathcal{E}}\mathcal{Q}^{\vee}$. Thus $\mathrm{Ext}^1(\tau(i^*\oh_x[-1]),i^!\mathcal{E})\cong\mathrm{Ext}^2(i^*\oh_x, \mathrm{L}_{\mathcal{E}}\mathcal{Q}^{\vee})\cong\mathrm{Ext}^2(\oh_x,\mathrm{L}_{\mathcal{E}}\mathcal{Q}^{\vee})$. On the other hand, there is a triangle
$$\mathcal{E}^{\oplus 2}\rightarrow\mathcal{Q}^{\vee}\rightarrow\mathrm{L}_{\mathcal{E}}\mathcal{Q}^{\vee}.$$
Applying $\mathrm{Hom}(\oh_x,-)$ to the triangle above, we get the following part of the long exact sequence:
$$0\rightarrow\mathrm{Ext}^2(\oh_x,\mathrm{L}_{\mathcal{E}}\mathcal{Q}^{\vee})\rightarrow k^4\rightarrow k^3\rightarrow\mathrm{Ext}^3(\oh_x,\mathrm{L}_{\mathcal{E}}\mathcal{Q}^{\vee})\rightarrow 0.$$
Thus $\mathrm{Ext}^1(\tau(i^*\oh_x[-1]),i^!\mathcal{E})=k^3$ if and only if $\mathrm{Ext}^3(\oh_x,\mathrm{L}_{\mathcal{E}}\mathcal{Q}^{\vee})=k^2$. But $\mathrm{Ext}^3(\oh_x,\mathrm{L}_{\mathcal{E}}\mathcal{Q}^{\vee})\cong\mathrm{Hom}(\mathrm{L}_{\mathcal{E}}\mathcal{Q}^{\vee},\oh_x)$. Since $X$ is an ordinary GM threefold, $\mathrm{Hom}(\mathcal{E},\mathcal{Q}^{\vee})=k^2$ and there is a short exact sequence
$$0\rightarrow\mathcal{E}\rightarrow\mathcal{Q}^{\vee}\rightarrow I_C\rightarrow 0$$ for some conic $C\subset X$ (see \cite[Proposition 7.1]{JLLZ}). Then $\mathrm{L}_{\mathcal{E}}\mathcal{Q}^{\vee}\cong\mathrm{L}_{\mathcal{E}}I_C\cong\mathbb{D}(I_C)\otimes\oh_X(-H)[1]$ (see \cite[Lemma 7.8]{JLLZ}), where $\mathbb{D}(-)$ is the derived dual functor.
Therefore $\mathrm{Hom}(\mathrm{L}_{\mathcal{E}}\mathcal{Q}^{\vee},\oh_x)\cong\mathrm{Hom}(\mathbb{D}(I_C)\otimes\oh_X(-H)[1],\oh_x)\cong\mathrm{Hom}(\mathbb{D}(I_C)[1],\oh_x)$.
Note that $\mathbb{D}(I_C)[1]$ is given by the exact triangle
$$\oh_X[1]\rightarrow\mathbb{D}(I_C)[1]\rightarrow\oh_C.$$
Applying $\mathrm{Hom}(-,\oh_x)$, we get $\mathrm{Hom}(\oh_C,\oh_x)\cong\mathrm{Hom}(\mathbb{D}(I_C)[1],\oh_x)$. An easy computation shows that $\mathrm{hom}(\oh_C,\oh_x)$ is either 0 or 1. Then the proof is complete.
\end{proof}
Recall that we define $(\alpha_6,\beta_6)=(\frac{1}{20},-\frac{9}{10})$, $(\alpha_7, \beta_7)=(\frac{\sqrt{71}}{84},-\frac{71}{84})$ $(\alpha_8, \beta_8)=(\frac{2\sqrt{79}}{875},-\frac{122}{125})$, $(\alpha_9, \beta_9)=(\frac{\sqrt{31}}{40},-\frac{31}{40})$, $(\alpha_{10},\beta_{10})=(\frac{\sqrt{\frac{5}{3}}}{33},-\frac{10}{11})$, and $(\alpha_{12}, \beta_{12})=(\frac{1}{22},-\frac{19}{22})$. Note that $\mu^0_{\alpha_g,\beta_g}(F)=+\infty$ when $g\neq 6$.
Let $F\in \mathcal{BN}_g$. By assumption, we have a natural map $F\to \mathcal{E}^{\oplus n_g}[1]$. Since $F$ and $\mathcal{E}\in \Coh^0_{\alpha_g, \beta_g}(X)$, the extension $C$ of $F$ and $\mathcal{E}^{\oplus n_g}$
\[\mathcal{E}^{\oplus n_g}\to C\to F\]
is also in the heart $\Coh^0_{\alpha_g, \beta_g}(X)$. Note that $\mathrm{ch}(C)=\mathrm{ch}(I_x)$. If we apply $\Hom(-, \mathcal{E})$ to this exact sequence, the natural map $\Hom(\mathcal{E}^{\oplus n_g}, \mathcal{E})\to \Ext^1(F, \mathcal{E})$ is bijective by construction. Since $\Ext^1(\mathcal{E}^{\oplus n_g}, \mathcal{E})=0$, we have
\begin{equation} \label{CE=0}
\Hom(C, \mathcal{E})=\Ext^1(C, \mathcal{E})=0.
\end{equation}
\begin{Prop} \label{gneq6cone}
Let $X:=X_{2g-2}$ and $g\geq 6$. Then $C\in \Coh^0_{\alpha_g, \beta_g}(X)$ is $\sigma^0_{\alpha_g, \beta_g}$-semistable.
\end{Prop}
\begin{proof}
We assume that $C\in \Coh^0_{\alpha_g, \beta_g}(X)$ is not $\sigma^0_{\alpha_g, \beta_g}$-semistable. Let $B$ be the minimal destabilizing quotient object of $C$. Then we have an exact sequence in $\Coh^0_{\alpha_g, \beta_g}(X)$
\[0\to A\to C\to B\to 0\]
where $\mu^{0 -}_{\alpha_g, \beta_g}(A)>\mu^0_{\alpha_g, \beta_g}(C)>\mu^0_{\alpha_g, \beta_g}(B)$ and $B$ is $\sigma^0_{\alpha_g, \beta_g}$-semistable. Therefore we have a system of inequalities:
\begin{itemize}
\item $\Im(Z^0_{\alpha_g, \beta_g}(A))\geq 0, \Im(Z^0_{\alpha_g, \beta_g}(B))> 0$,
\item $\mu^0_{\alpha_g, \beta_g}(C)>\mu^0_{\alpha_g, \beta_g}(B)$.
\end{itemize}
Note that $\mu^0_{\alpha_g, \beta_g}(C)=\mu^0_{\alpha_g, \beta_g}(\oh_X)<0$. Since $B\in \Coh^0_{\alpha_g, \beta_g}(X)$ is $\sigma^0_{\alpha_g, \beta_g}$-semistable with slope $\mu^0_{\alpha_g, \beta_g}(B)<\mu^0_{\alpha_g, \beta_g}(C)<0$, we know that $B\in \Coh^{\beta_g}(X)$ is $\sigma_{\alpha_g, \beta_g}$-semistable.
Note that $\oh_X, \oh_X(-1)[2], \mathcal{E}, \mathcal{E}(-1)[2]\in \Coh^0_{\alpha_g, \beta_g}(X)$ and that they are $\sigma^0_{\alpha_g, \beta_g}$-semistable. Then by Serre duality and the definition of heart we know $\Hom(\oh_X, A[n])=\Hom(\mathcal{E}, A[n])=0$ for every $n<0$ and $n\geq 2$ and the same holds for $B$. Also, from $\mu^0_{\alpha_g, \beta_g}(C)=\mu^0_{\alpha_g, \beta_g}(\oh_X)>\mu^0_{\alpha_g, \beta_g}(B)$ we have $\Hom(\oh_X, B)=0$. Therefore, if we apply $\Hom(\oh_X, -)$ and $\Hom(\mathcal{E}, -)$ to the triangle $A\to C\to B$, from $\RHom^\bullet(\oh_X, C)=0$ and $\RHom^\bullet(\mathcal{E}, C)=k^{n_g}$ we obtain $A,B\in \oh^{\perp}_X$, $\RHom^\bullet(\mathcal{E}, B)=\Hom(\mathcal{E}, B)$, $\RHom^\bullet(\mathcal{E}, A)=\Hom(\mathcal{E}, A)\oplus \Hom(\mathcal{E}, A[1])[-1]$, and a long exact sequence
\[0\to \Hom(\mathcal{E}, A)\to \Hom(\mathcal{E}, C)=k^{n_g}\to \Hom(\mathcal{E}, B)\to \Ext^1(\mathcal{E}, A)\to 0.\]
Recall that in \eqref{v_w} we have $\mathcal{N}(\mathcal{K}u(X))=\langle v, w \rangle$. If we assume that $[B]=av+bw+c[\mathcal{E}_g]$ for $a,b,c\in \mathbb{Z}$, from $\chi(\mathcal{E}, B)=\hom(\mathcal{E}, B)\geq 0$ we have $c=\chi(\mathcal{E}, B)\geq 0$.
If we apply the projection functor $i^*$ the the triangle, since $i^*(C)\cong F$, we obtain a triangle
\begin{equation} \label{prABC}
i^*(B)[-1]\to i^*(A)\to F.
\end{equation}
By the definition of projection functor, we have a triangle:
\begin{equation} \label{prB}
i^*(B)[-1]\to \mathcal{E}^{\oplus c}\to B.
\end{equation}
\medskip
\textbf{Claim 1}: $i^*(A)\in \Coh^0_{\alpha_g, \beta_g}(X)$.
Let $t:=\ext^1(\mathcal{E}, A)$. Then $\hom(\mathcal{E}, A)=n_g-c+t$. Therefore we have a triangle $\mathcal{E}^{\oplus n_g-c+t}\oplus \mathcal{E}^{\oplus t}[-1]\to A\to i^*(A)$, and a long exact sequence of cohomologies in the heart $\Coh^0_{\alpha_g, \beta_g}(X)$:
\begin{equation}
0\to \mathcal{H}^{-1}_{\Coh^0_{\alpha_g, \beta_g}(X)}(i^*(A))\to \mathcal{E}^{\oplus n_g-c+t}\to A\to \mathcal{H}^0_{\Coh^0_{\alpha_g, \beta_g}(X)}(i^*(A)) \to \mathcal{E}^{\oplus t}\to 0.
\end{equation}
Since $\mathcal{E}^{\oplus n_g}\subset C$ and $A\subset C$, we know that the natural map $\mathcal{E}^{\oplus n_g-c+t}\to A$ is injective. This implies $\mathcal{H}^0_{\Coh^0_{\alpha_g, \beta_g}(X)}(i^*(A))\cong i^*(A)\in \Coh^0_{\alpha_g, \beta_g}(X)$ and we have an exact sequence in $\Coh^0_{\alpha_g, \beta_g}(X)$:
\begin{equation} \label{prA}
0\to \mathcal{E}^{\oplus n_g-c+t}\to A\to i^*(A) \to \mathcal{E}^{\oplus t}\to 0.
\end{equation}
\medskip
\textbf{Claim 2}: $i^*(B)[-1]\in \Coh(X)$ is torsion free. Thus $a<0$.
From Proposition \ref{prop:F is shift of vb} and the construction of $C$ we have $\mathcal{H}^i(C)=0$ for $i\neq -1,0$. Since $B\in \Coh_{\alpha_g,\beta_g}(X)$, we know that $\mathcal{H}^i(B)=0$ for $i\neq -1,0$.
Thus if we take the cohomology long exact sequence associated to \eqref{prB}
with respect to the standard heart, we have $\mathcal{H}^i(i^*(B)[-1])=0$ for $i\notin \{0,1\}$.
Next note that $i^*(A)\in \Coh^0_{\alpha_g, \beta_g}(X)$ from Claim 1, so we obtain $\mathcal{H}^{\geq 1}(i^*(A))=0$. Hence if we take the cohomology long exact sequence associated to (\ref{prABC})
with respect to the standard heart, since $\mathcal{H}^{-1}(F)\cong G\in \Coh(X)$, we have $\mathcal{H}^{1}(i^*(B)[-1])=0$, i.e. $i^*(B)[-1]\cong \mathcal{H}^{0}(i^*(B)[-1])\in \Coh(X)$. Thus we have a long exact sequence in $\Coh(X)$:
\[0\to \mathcal{H}^{-1}(B)\to i^*(B)[-1] \xrightarrow{\theta} \mathcal{E}^{\oplus c} \to \mathcal{H}^0(B)\to 0.\]
Now we claim that $i^*(B)[-1]\in \Coh(X)$ is a torsion free sheaf. Indeed, if we denote the torsion part of $i^*(B)[-1]$ by $i^*(B)[-1]_{\mathrm{tor}}$, we have $\Hom(i^*(B)[-1]_{\mathrm{tor}}, \mathcal{E})=0$ since $\mathcal{E}$ is a bundle. This implies $i^*(B)[-1]_{\mathrm{tor}}\subset \mathcal{H}^{-1}(B)=\ker(\theta)$, which contradicts with $\mu^+(\mathcal{H}^{-1}(B))\leq \beta_g$. Thus if we assume that $[B]=av+bw+c[\mathcal{E}]$, from $i^*(B)[-1]=-av-bw$, we know that $a\leq 0$. And if $a=0$, then $i^*(B)=0$ from torsion-freeness. This means $B\cong \mathcal{E}^{\oplus c}$ and contradicts with \eqref{CE=0}.
\textbf{Claim 3}: $c>0$ and $\mu^0_{\alpha_g, \beta_g}(B)\geq \mu^0_{\alpha, \beta}(\mathcal{E})$.
Now we claim that $c=\hom(\E, B)\neq 0$, which implies $\mu^0_{\alpha_g, \beta_g}(B)\geq \mu^0_{\alpha_g, \beta_g}(\mathcal{E})$ by $\sigma^0_{\alpha_g, \beta_g}$-stability of $B$ and $\mathcal{E}$. Indeed, if $c=0$, then we have $B\in \mathcal{K}u(X)$ and we obtain an exact sequence in the heart $\mathcal{A}(\alpha_g, \beta_g)$
\[i^*(A)\to F\to B .\]
Since $F$ is $\sigma(\alpha_g, \beta_g)$-stable, we have $\mu^0_{\alpha_g, \beta_g}(B)>\mu^0_{\alpha_g, \beta_g}(F)$, which gives a contradiction since $\mu^0_{\alpha_g, \beta_g}(F)>\mu^0_{\alpha_g, \beta_g}(\oh_X)>\mu^0_{\alpha_g, \beta_g}(B)$.
\medskip
\medskip
Now we are ready to prove our main statement.
\textbf{Case 1}: $g\neq 6$.
We have a triangle $\mathcal{E}^{\oplus c}\xrightarrow{\lambda} B\to i^*(B)$, $\mathcal{H}^{-1}_{\Coh^0_{\alpha_g, \beta_g}(X)}(i^*(B))\cong \ker(\lambda)$, and $\mathcal{H}^0_{\Coh^0_{\alpha_g, \beta_g}(X)}(i^*(B))\cong \cok(\lambda)$. Note that $\mathcal{H}^{-1}_{\Coh^0_{\alpha_g, \beta_g}(X)}(i^*(B)), \mathcal{H}^{0}_{\Coh^0_{\alpha_g, \beta_g}(X)}(i^*(B))\in \mathcal{A}(\alpha_g, \beta_g)$. Taking the cohomology long exact sequence of \eqref{prABC} with respect to the heart $\mathcal{A}(\alpha_g, \beta_g)$, we have an exact sequence in $\mathcal{A}(\alpha_g, \beta_g)$
\[0\to \ker(\lambda)\to i^*(A)\to F\to \cok(\lambda)\to 0.\]
From $F$ is $\sigma(\alpha_g, \beta_g)$-stable with $\mu^0_{\alpha_g, \beta_g}(F)=+\infty$, we know either $\cok(\lambda)\cong F$ or $\cok(\lambda)=0$.
\medskip
\textbf{Case 1.1}: $\cok(\lambda)\cong F$.
In this case, we have $i^*(A)\cong \ker(\lambda)$ and hence we obtain a triangle
\[i^*(A)[1]\to i^*(B)\to F.\]
Note that $\mu^{0 -}_{\alpha_g, \beta_g}(A)>\mu^0_{\alpha_g, \beta_g}(C)>\mu^0_{\alpha_g, \beta_g}(\mathcal{E})$, hence we have $\Hom(A, \mathcal{E})=0$. Then if we apply $\Hom(A[1],-)$ to the triangle $\mathcal{E}^c\to B\to i^*(B)$, we obtain $\Hom(A[1], i^*(B))=\Hom(i^*(A)[1], i^*(B))=0$. Thus we have $i^*(B)\cong \cok(\lambda) \cong F$ and $\ker(\lambda)\cong i^*(A) \cong 0$. Therefore, by \eqref{prA} we know $t=\Ext^1(\mathcal{E}, A)=0$ and $A\cong \mathcal{E}^{n_g-c}$, which contradicts with $\mu^0_{\alpha_g, \beta_g}(A)>\mu^0_{\alpha_g, \beta_g}(C)=\mu^0_{\alpha_g, \beta_g}(\oh_X)$.
\medskip
\textbf{Case 1.2}: $\cok(\lambda)\cong 0$.
In this case, we have $i^*(B)\cong \ker(\lambda)[1]$ and two exact sequences in $\Coh^0_{\alpha_g, \beta_g}(X)$
\[0\to \ker(\lambda)\to i^*(A)\to F\to 0\]
and
\begin{equation} \label{EB}
0\to \ker(\lambda)\xrightarrow{\theta} \mathcal{E}^{\oplus c}\xrightarrow{\lambda} B\to 0.
\end{equation}
Thus if we apply $\Hom(-, \mathcal{E})$ to the sequence \eqref{EB}, by \eqref{CE=0} we obtain that $\Hom(\ker(\lambda), \mathcal{E})\cong \Hom(\mathcal{E}^{\oplus c}, \mathcal{E}) =k^c$. Then $\theta$ is actually the the natural map $\ker(\lambda)\to \mathcal{E}\otimes \Hom(\ker(\lambda), \mathcal{E}) \cong\mathcal{E}^{\oplus c}$. Hence we know that $\mathrm{pr}_i\circ \theta\neq 0$ for any $1\leq i\leq c$, where $\mathrm{pr}_i:\mathcal{E}^{\oplus c}\to \mathcal{E}$ is the projection map of the i-th component.
By Claim 3, we have $\mu^0_{\alpha_g, \beta_g}(B)\geq \mu^0_{\alpha_g, \beta_g}(\mathcal{E})$. If $\mu^0_{\alpha_g, \beta_g}(B)= \mu^0_{\alpha_g, \beta_g}(\mathcal{E})$, since $\mathcal{E}$ is $\sigma^0_{\alpha_g, \beta_g}$-stable and $B$ is the quotient of $\mathcal{E}^{\oplus c}$, we know that $B\cong \mathcal{E}^{\oplus \frac{\rk B}{2}}$, and this contradicts with \eqref{CE=0}. Hence we have $\mu^0_{\alpha_g, \beta_g}(B)> \mu^0_{\alpha_g, \beta_g}(\mathcal{E})$.
Also, from $\sigma^0_{\alpha_g, \beta_g}$-stability of $\mathcal{E}$, we know that $\mu^0_{\alpha_g, \beta_g}(\ker(\lambda))\leq \mu^0_{\alpha_g, \beta_g}(\mathcal{E})$ and hence $\Im(Z^0_{\alpha_g, \beta_g}(\ker(\lambda)))>0$. If $\mu^0_{\alpha_g, \beta_g}(\ker(\lambda))= \mu^0_{\alpha_g, \beta_g}(\mathcal{E})$, then by $\sigma^0_{\alpha_g, \beta_g}$-stability of $\mathcal{E}$ we know that $\ker(\lambda)\cong \mathcal{E}^{\oplus \frac{\rk \ker(\lambda)}{2}}$, which contradicts with $\ker(\lambda)\cong i^*(B)[-1]\in \mathcal{K}u(X)$. Thus the inquality is strict, i.e. $\mu^0_{\alpha_g, \beta_g}(\ker(\lambda))< \mu^0_{\alpha_g, \beta_g}(\mathcal{E})$.
We have:
\begin{itemize}
\item $\Im(Z^0_{\alpha_g, \beta_g}(A))\geq 0, \Im(Z^0_{\alpha_g, \beta_g}(B))> 0$,
\item $\Im(Z^0_{\alpha_g, \beta_g}(\ker(\lambda)))>0$,
\item $\mu^0_{\alpha_g, \beta_g}(\ker(\lambda))<\mu^0_{\alpha_g, \beta_g}(\mathcal{E})$,
\item $\mu^0_{\alpha_g, \beta_g}(C)>\mu^0_{\alpha_g, \beta_g}(B)> \mu^0_{\alpha_g, \beta_g}(\mathcal{E})$,
\item $c>0, a<0$.
\end{itemize}
From Claim 1 we know that $\ker(\lambda)=i^*(B)[-1]$ is a torsion-free sheaf. By Lemma \ref{inequality}, these inequalities imply $\mu(\ker(\lambda))\geq \mu(\mathcal{E})$. If $\mu(\ker(\lambda))=\mu(\mathcal{E})$ and $\ker(\lambda)$ is a $\mu$-semistable sheaf, then by poly-stability of $\mathcal{E}^{\oplus c}$, we know that $\im(\theta)$ is contained in $\mathcal{E}^{\oplus c'}$ for $c'=\frac{\rk(\im(\theta))}{2}$. But we know that $\mathrm{pr}_i\circ \theta\neq 0$ for any $1\leq i\leq c$, which means that the only possible case is $c=c'$, and either $\mathcal{H}^{-1}(B)\cong 0$ and $B\cong \mathcal{H}^{0}(B)$ is a torsion sheaf supported in codimension $\geq 2$, or $\mathcal{H}^{-1}(B)\neq 0$ is a $\mu$-semistable sheaf with $\mu(\mathcal{H}^{-1}(B))=\mu(\mathcal{E})$. But the first case contradicts with $\mu^0_{\alpha_g, \beta_g}(B)<0$ and the second case contradicts with $\mu^+(\mathcal{H}^{-1}(B))\leq \beta_g$. Therefore, we can assume that $\mu^+(\ker(\lambda))>\mu(\mathcal{E})$.
Let $K_1\subset \ker(\lambda)$ be the maximal destabilizing subsheaf of $\ker(\lambda)$. Then we have $\mu(K_1)=\mu^+(\ker(\lambda))>\mu(\mathcal{E})$. Since $\mu^+(\mathcal{H}^{-1}(B))\leq \beta_g<\mu(\mathcal{E})<\mu(K_1)$, we know the composition $K_1\hookrightarrow \ker(\lambda)\xrightarrow{\theta} \mathcal{E}^{\oplus c}$ is non-trivial, which gives a contradiction since from $\mu(K_1)>\mu(\mathcal{E})$ and stability we have $\Hom(K_1, \mathcal{E})=0$.
Therefore, such a minimal destabilizing quotient object $B$ cannot exist, and we can conclude that $C$ is $\sigma^0_{\alpha_g, \beta_g}$-semistable when $g\neq 6$.
\medskip
\medskip
\textbf{Case 2}: $g=6$.
In this case, by the claims above we have a system of inequalities:
\begin{itemize}
\item $\Im(Z^0_{\alpha_g, \beta_g}(A))\geq 0, \Im(Z^0_{\alpha_g, \beta_g}(B))> 0$,
\item $\Im(Z^0_{\alpha_g, \beta_g}(i^*(A)))\geq 0$,
\item $\mu^0_{\alpha_g, \beta_g}(C)>\mu^0_{\alpha_g, \beta_g}(B)\geq \mu^0_{\alpha_g, \beta_g}(\mathcal{E})$,
\item $c>0,a<0$.
\end{itemize}
Now since $\beta_g<\mu(\mathcal{E})$, by the same argument as in the previous cases shows that $\mu(i^*(B)[-1])\leq \mu^+(i^*(B)[-1])\leq \mu(\mathcal{E})$. By Lemma \ref{g=6inequality}, we know that when $\mu(i^*(B)[-1])\leq \mu(\mathcal{E})$, the only possible Chern characters of $i^*(B)[-1]$ are $[i^*(B)[-1]]=v-w$ or $3v-2w$.
\medskip
\textbf{Case 2.1}: $[i^*(B)[-1]]=v-w$.
In this case we know $i^*(B)[-1]$ is a torsion-free sheaf with $\mathrm{ch}(i^*(B)[-1])=\mathrm{ch}(I_C(-H))$, where $C$ is a conic on $X$. Thus $i^*(B)[-1]\cong I_C(-H)$ for some conic $C$ on $X$. But then $\Ext^3(\oh_X, I_C(-H))=\Hom(I_C, \oh_X)\neq 0$, which contradicts with $i^*(B)\in \mathcal{K}u(X)$.
\medskip
\textbf{Case 2.2}: $[i^*(B)[-1]]=3v-2w$.
In this case $i^*(B)[-1]$ is a torsion-free sheaf with rank $3$ and degree $-2$. We claim that $i^*(B)[-1]$ is actually $\mu$-stable. Indeed, if the minimal destabilizing quotient sheaf of $i^*(B)[-1]$ has rank one, then we have $\Hom(i^*(B)[-1], \oh_X(-nH))\neq 0$ for some $n\geq 1$. But $\oh_X(-nH)[1]\in \Coh^{\beta_g}(X)$ is $\sigma_{\alpha_g, \beta_g}$-semistable, hence from $\mu_{\alpha_g, \beta_g}(B)\geq \mu_{\alpha_g, \beta_g}(\mathcal{E})>\mu_{\alpha_g, \beta_g}(\oh_X(-nH)[1])$ we know that $\Hom(B, \oh_X(-nH)[1])=0$ for every $n\geq 1$. Now applying $\Hom(-, \oh_X(-nH))$ to the triangle $i^*(B)[-1]\to \mathcal{E}^c\to B$, and from $\mathcal{E}, B\in \Coh^{\beta_g}(X)$ we have $\Hom(i^*(B)[-1], \oh_X(-nH))=0$, which gives a contradiction. If the maximal destabilizing subsheaf $D_1$ of $i^*(B)[-1]$ has rank one, then we know that $\mu(D_1)\geq 0$. By stability we have $\Hom(D_1, \mathcal{E})=0$, and since $D_1$ is $\mu$-stable, we have $D_1\in \Coh^{\beta_g}(X)$. Thus if we apply $\Hom(D_1,-)$ to the triangle $i^*(B)[-1]\to \mathcal{E}^c\to B$, we obtain $\Hom(D_1, i^*(B)[-1])=0$, which gives a contradiction. Therefore, $i^*(B)[-1]$ is $\mu$-stable.
Now by Lemma \ref{bms lemma 2.7} and Lemma \ref{wall_3v-2w}, we know that $i^*(B)[-1]\in \Coh^{\beta_g}(X)$ is $\sigma_{\alpha, \beta_g}$-semistable for all $\alpha>0$. In particular, $i^*(B)[-1]$ is $\sigma_{\alpha_g, \beta_g}$-semistable, hence $i^*(B)\in \Coh^0_{\alpha_g, \beta_g}(X)$ is $\sigma^0_{\alpha_g, \beta_g}$-semistable, and is also $\sigma(\alpha_g, \beta_g)$-semistable. But by $\sigma(\alpha_g, \beta_g)$-stability of $F$ and $\mu^0_{\alpha_g, \beta_g}(F)>\mu^0_{\alpha_g, \beta_g}(i^*(B))$, we know that $\Hom(F, i^*(B))=0$, which gives a contradiction.
Therefore, such a minimal destabilizing quotient object $B$ cannot exist, and we conclude that $C$ is $\sigma^0_{\alpha_g, \beta_g}$-semistable when $g=6$.
\end{proof}
\subsection{Proof of Theorem \ref{thm: BN = X}} \label{sec_proof}
Let $G=F[-1]$ and consider the map of vector bundles $f : G=F[-1] \rightarrow \mathcal{E}^{\oplus n_g}$ arising from the map $F \rightarrow \mathcal{E}^{\oplus n_g}[1]$.
\begin{Lem}\label{coker_torsion_free}
Let $f : G=F[-1] \rightarrow \mathcal{E}^{\oplus n_g}$ be the natural map in $\Coh(X)$. Then $\mathrm{cone}(f) \cong I_x$ for $x$ a point in $X$.
\end{Lem}
\begin{proof}
Let $C$ be the cone of the map $f$. By Proposition \ref{gneq6cone} we know that $C\in \Coh^0_{\alpha_g, \beta_g}(X)$ is $\sigma^0_{\alpha_g, \beta_g}$-semistable. From $\mu^0_{\alpha_g, \beta_g}(C)<0$, we know that $C\in \Coh_{\alpha_g, \beta_g}(X)$ is $\sigma_{\alpha_g, \beta_g}$-semistable. Since $\Delta(C)=0$, $C$ is actually $\sigma_{\alpha, \beta_g}$-semistable for every $\alpha>0$. Thus $C$ is a torsion free $\mu$-semistable sheaf with $\mathrm{ch}(C)=\mathrm{ch}(I_x)$. From $\Pic(X)\cong \mathbb{Z}$, we conclude that $C\cong I_x$ for a point $x\in X$.
\end{proof}
Now we prove the main theorem of the section.
\begin{proof}[Proof of Theorem \ref{thm: BN = X}]
By the lemma above, $\cok(f) \cong I_x$ so we have a short exact sequence $0 \rightarrow G \rightarrow \mathcal{E}^{\oplus n_g} \rightarrow I_x \rightarrow 0$. Applying $\Hom(\oh_x, -)$ to this gives a long exact sequence containing
\[ \cdots \rightarrow \Ext^1(\oh_x, \mathcal{E}^{\oplus n_g}) \rightarrow \Ext^1(\oh_x, I_x) \rightarrow \Ext^2(\oh_x, G) \rightarrow \cdots . \]
Since $\mathcal{E}$ and $G$ are vector bundles concentrated in degree $0$, the first and last terms of the above vanish. However, $\Ext^1(\oh_x, I_x) \neq 0$ so we have a contradiction, and the assumption that $F \in \mathcal{BN}_g \setminus p(X)$ is false, i.e. there is no such $F$. So $\mathcal{BN}_g= p(X)$ as required.
\end{proof}
Theorem \ref{thm: BN = X} can be used to prove refined categorical Torelli theorems for all index one Fano threefolds of genus $g \geq 6$.
We first introduce a functor on $\mathcal{K}u(X)$, defined by $T(-):=i^*\circ \mathrm{R}\mathcal{H}om(-, \oh_X(-H)[1])$. By \cite[Proposition 3.8]{zhang2020bridgeland}, this functor $T: \mathcal{K}u(X)\to \mathcal{K}u(X)$ is an anti-equivalence with the property $T\circ T\cong \mathrm{id}_{\mathcal{K}u(X)}$. The involution $T$ induces a linear isometry on $\mathcal{N}(\mathcal{K}u(X))$, which we also denote by $T$. When $g=6$, we have $T(v)=-3v+2w$ and $T(w)=-4v+3w$. Note that when $g=6$, there also exists an involution $\mathcal{K}u(X_{10})\rightarrow\mathcal{K}u(X_{10})$, which is $\tau=S_{\mathcal{K}u(X_{10})}[-2]$. The action of $\tau$ on $\mathcal{N}(\mathcal{K}u(X_{10}))$ is the identity.
\begin{Lem} \label{isometry}
Let $g\geq 6$ and $\Phi:\mathcal{N}(\mathcal{K}u(X_{2g-2}))=\langle v, w\rangle \xrightarrow{\cong} \mathcal{N}(\mathcal{K}u(X'_{2g-2}))=\langle v', w'\rangle$ be a linear isometry with respect to the Euler form, such that $\Phi([i^!\mathcal{E}])=[i'^!\mathcal{E}']$. Then $\Phi(v)=v'$ and $\Phi(w)=w'$ if $g \geq 7$. If $g=6$ we have either $\Phi(v)=v'$ and $\Phi(w)=w'$ or $T\circ \Phi(v)=v'$ and $T\circ \Phi(w)=w'$.
\end{Lem}
\begin{proof}
Since $\Phi$ preserves the Euler form and $\Phi([i^!\mathcal{E}])=[i'^!\mathcal{E}']$, an elementary computation shows that $\Phi(v)=v'$ and $\Phi(w)=w'$ if $g\geq 7$. If $g=6$, we have either $\Phi(v)=v'$ and $\Phi(w)=w'$ or $\Phi(v)=-3v'+2w'$ and $\Phi(w)=-4v'+3w'$. Then the result follows from $T(v')=-3v'+2w'$, $T(w')=-4v'+3w'$ and $T\circ T=\mathrm{id}$.
\end{proof}
\begin{Lem} \label{inv_on_data}
Let $X:=X_{10}$. Then $T(i^{!}\mathcal{E})\cong \tau(i^{!}\mathcal{E})$.
\end{Lem}
\begin{proof}
Recall that $i^!\mathcal{E}$ is the unique object that fits into the triangle
\[\mathcal{Q}(-H)[1]\to i^!\mathcal{E}\to \mathcal{E}.\]
Then note that $i^*( \mathrm{R}\mathcal{H}om(\mathcal{Q}(-H)[1], \oh_X(-H)[1]))\cong i^*(\mathcal{Q}^{\vee})$ and $i^*( \mathrm{R}\mathcal{H}om(\mathcal{E}, \oh_X(-H)[1]))=i^*(\mathcal{E}[1])=0$, so we have $T(i^!\mathcal{E})\cong i^*(\mathcal{Q}^{\vee})$. Then the result follows from $\tau\cong \tau^{-1}$, $i^*(\mathcal{Q}^{\vee})=\mathrm{L}_{\mathcal{E}}\mathcal{Q}^{\vee}\cong \tau^{-1}(i^!\mathcal{E})$, and the computations in Lemma~\ref{Lemma_not_in_BN}.
\end{proof}
\begin{Cor}[{Refined categorical Torelli}]\label{Refined categorical Torelli any}
Let $X$ and $X'$ be smooth index one prime Fano threefolds with genus $g \geq 6$, and suppose there is an equivalence $\Phi:\mathcal{K}u(X)\simeq\mathcal{K}u(X')$ such that the gluing object is preserved in the sense that $\Phi(i^!\mathcal{E})\cong i^!\mathcal{E}'$. Then $X\cong X'$.
\end{Cor}
\begin{proof}
First we assume that $g\neq 6$. By Theorem~\ref{thm: BN = X}, $X\cong\mathcal{BN}_g$. Let $F\in\mathcal{BN}_g$. Then $\Phi(F)\in\mathcal{BN}_{g}'$. Indeed, by $\Phi(i^!\mathcal{E})\cong i^!\mathcal{E}'$
and Lemma \ref{isometry} we know $\mathrm{ch}(\Phi(F))=\mathrm{ch}(i^*\oh_x[-1]))$ when $g\neq 6$. As $\mathrm{Ext}^1(\Phi(F),i^!\mathcal{E}')\cong\mathrm{Ext}^1(\Phi(F), \Phi(i^!\mathcal{E})) \cong\mathrm{Ext}^1(F, i^!\mathcal{E})\cong k^{n_g}$, it remains to show that $\Phi(F)$ is a $\sigma'$-stable object in $\mathcal{K}u(X')$ for every Serre-invariant stability condition $\sigma'$. This is from $\Phi(\sigma)$ is Serre-invariant and Theorem \ref{all_in_one_orbit}.
Thus $\Phi$ induces a bijection between the closed points of $\mathcal{BN}_g$ and those of $\mathcal{BN}'_{g}$. On the other hand, it is clear that the Brill--Noether locus $\mathcal{BN}_g$ admits the universal family coming from $X$ (argued similarly as in \cite[Section 5.2]{altavilla2019moduli}). Then the induced morphism $\phi:\mathcal{BN}_g\rightarrow\mathcal{BN}'_{g}$ is an étale morphism and a bijection, thus $\mathcal{BN}_g\cong\mathcal{BN}_{g}'$, which implies that $X\cong X'$.
In the case of GM threefolds ($g=6)$, we first need to show that $X$ and $X'$ must be ordinary GM threefolds or special GM threefolds simultaneously. Indeed, we may assume $X$ is an ordinary GM threefold and $X'$ is a special GM threefold. Then $\mathrm{Ext}^2(i^!\mathcal{E},i^!\mathcal{E})=0$ and $\mathrm{Ext}^2(i^!\mathcal{E}',i^!\mathcal{E}')=k$ (both facts are shown in \cite{JLLZ}), which is impossible since $\Phi$ is an equivalence. Now by Lemma \ref{isometry}, we have either $\mathrm{ch}(\Phi(F))=\mathrm{ch}(i^*\oh_x[-1])$ or $\mathrm{ch}(T\circ \Phi(F))=\mathrm{ch}(\tau \circ T\circ \Phi(F))=\mathrm{ch}(i^*\oh_x[-1])$. If we are in the former case, then the same argument as in the previous cases shows that $X\cong X'$. Otherwise if $\mathrm{ch}(\tau \circ T\circ \Phi(F))=\mathrm{ch}(i^*\oh_x[-1])$, then since $\tau\circ T(i^{!}\mathcal{E})\cong i^!\mathcal{E}$ by Lemma \ref{inv_on_data}, we can replace $\Phi$ by $\Phi':=\tau\circ T\circ \Phi$. Then we have $\Phi'(i^{!}\mathcal{E})=i^{!}\mathcal{E}$ and $\mathrm{ch}(\Phi'(F))=\mathrm{ch}(i^*\oh_x[-1])$. Thus the result follows from the previous argument.
\end{proof}
\section{Reconstruction of Fano threefolds of genus $g<6$}\label{sec:genus 2,3,5}
\begin{Prop} \label{stability on ku 248}
Let $X$ be a prime Fano threefold. Then $\sigma'(\alpha, \beta):=\sigma^0_{\alpha, \beta}|_{\oh_X^{\perp}}$ is a stability condition on $\oh_X^{\perp}$ for all $(\alpha, \beta)\in W$, where
\[W:=\{(\alpha, \beta)\in \mathbb{R}_{\geq 0}\times \mathbb{R}:-\frac{1}{2}\leq \beta<0, \alpha<-\beta, \text{or} -1<\beta<-\frac{1}{2}, \alpha\leq 1+\beta\} . \]
\end{Prop}
\begin{proof}
From \cite[Proposition 2.14]{bayer2017stability} we know $\mathcal{O}_X, \mathcal{O}_X(-1)[1]\in \mathrm{Coh}^{\beta}(X)$ are $\sigma_{\alpha, \beta}$-stable for all $\alpha>0$ and $\beta<0$. Now note that $\mu_{\alpha, \beta}(\mathcal{O}_X(-1))=\frac{\frac{1}{2}+\beta+\frac{1}{2}\beta^2-\frac{1}{2}\alpha^2}{-1-\beta}$ and $\mu_{\alpha, \beta}(\mathcal{O}_X)=\frac{\beta^2-\alpha^2}{-2\beta}$. Thus the set of solutions of $\mu_{\alpha, \beta}(\mathcal{O}_X(-1))<0<\mu_{\alpha, \beta}(\mathcal{O}_X)$ is exactly $W$. Then as in \cite[Theorem 6.7]{bayer2017stability}, $\sigma'(\alpha, \beta)$ is a stability condition on $\mathcal{K}u(X)$.
\end{proof}
\begin{Lem} \label{no wall on beta=0}
Let $I_x$ be the ideal sheaf of a point $x\in X$. Then $I_x\in \mathcal{A}'(\alpha, \beta)$ is $\sigma'(\alpha, \beta)$-semistable for every $(\alpha, \beta)\in W$.
\end{Lem}
\begin{proof}
It is easy to see that $I_x\in \oh_X^{\perp}$. By Lemma \ref{bms lemma 2.7}, $I_x\in \mathrm{Coh}^{\beta}(X)$ is $\sigma_{\alpha, \beta}$-semistable for $\beta<0$ and $\alpha\gg 0$. From $\mathrm{ch}_{\leq 2}(I_x)=\mathrm{ch}_{\leq 2}(\mathcal{O}_X)$ we know there are no walls for $I_x$. Thus $I_x\in \mathrm{Coh}^0_{\alpha, \beta}(X)$ is $\sigma^0_{\alpha, \beta}$-semistable for every $\alpha>0$, and hence it is $\sigma'(\alpha, \beta)$-stable.
\end{proof}
\begin{Prop} \label{wall cross IP}
Let $(\alpha, \beta)\in W$ and $F\in \mathcal{A}'(\alpha, \beta)$ be a $\sigma'(\alpha, \beta)$-stable object with $[F]=[I_x]$. Then $F\cong I_x$ for some point $x\in X$.
\end{Prop}
\begin{proof}
By \cite[Remark 5.12]{bayer2017stability}, we know $F$ is $\sigma^0_{\alpha, \beta}$-semistable. Since $\Delta(F)=0$, $F$ is $\sigma^0_{\alpha, \beta}$-semistable for every $\alpha>0$. Now by the definition of $\mathrm{Coh}^0_{\alpha, \beta}(X)$ we have a triangle $A[1]\to F\to B$ where $A,B\in \Coh^{\beta}(X)$, $\mu^+_{\alpha, \beta}(A)\leq 0$, and $\mu^-_{\alpha, \beta}(B)>0$. Since $F$ is $\sigma^0_{\alpha, \beta}$-semistable with $\mu^0_{\alpha, \beta}(F)<0$, we know $A=0$.
Thus $F\in \mathrm{Coh}^{\beta}(X)$ is $\sigma_{\alpha, \beta}$-semistable for every $\alpha>0$. By Lemma \ref{bms lemma 2.7}, we know that $F$ is a $\mu$-stable sheaf, which implies $F\cong I_x$ for some $x\in X$.
\end{proof}
Now we prove the main result of this section.
\begin{Thm}\label{OX_rec}
Let $X$ be a prime Fano threefold.
Then the functor $i_{\mathcal{D}}^*$ induces an isomorphism
$$X\cong \mathcal{M}_{\sigma'}(\oh_X^{\perp}, [I_x])$$
for $\sigma'\in W$.
\end{Thm}
\begin{proof}
Note that $X$ isomorphic to the moduli space of $\mu$-(semi)stable sheaves with Chern character $1-P$ by \cite[Lemma B.5.6]{KPS}. Thus using Lemma \ref{no wall on beta=0} and Proposition \ref{wall cross IP}, a similar argument as in \cite[Proposition 4.3]{liu2021note} shows that $i_{\mathcal{D}}^*$ induces an étale bijective morphism to $\mathcal{M}_{\sigma'}(\oh_X^{\perp}, [I_x])$, which is an isomorphism.
\end{proof}
\begin{Rem}
The reason that we cannot deduce a refined categorical Torelli theorem from Theorem \ref{OX_rec} is that we do not know whether every equivalence $\oh_X^{\perp}\simeq \oh_{X'}^{\perp}$ preserves the stability conditions in $W$ or the class $[I_x]$.
\end{Rem}
\section{Fibers of the period map via the refined categorical Torelli theorem}\label{fiber_period_map_section}
In the case of Fano threefolds, the Torelli problem asks if the period map $\mathcal{P}_g:\mathcal{M}_g\rightarrow\mathcal{A}_g$ is injective, where $\mathcal{M}_g$ is the moduli space of isomorphism classes of index one genus $g$ prime Fano threefolds, and $\mathcal{A}_g$ is the corresponding moduli space of isomorphism classes of principally polarized abelian varieties. In most cases of index one prime Fano threefolds, $\mathcal{P}_g$ is not injective and the fiber has positive dimension. In this section, we compute the fibers of $\mathcal{P}_g$ over $J(X)$ for each genus $g\geq 6$.
\begin{Lem}
\label{Ku_J(X)_mutually_determined}
Let $X$ be an index one prime Fano threefold of genus $g\geq 7$. Then its intermediate Jacobian $J(X)$ and Kuznetsov component $\mathcal{K}u(X)$ are mutually determined by each other. More precisely, \[J(X)\cong J(X')\Longleftrightarrow\mathcal{K}u(X)\simeq\mathcal{K}u(X') . \]
\end{Lem}
\begin{proof}\leavevmode\begin{enumerate}[(i)]
\item $g=7$: We have $J(X)\cong J(X')\Longleftrightarrow J(\Gamma_7)\cong J(\Gamma_7')\Longleftrightarrow \Gamma_7\cong \Gamma_7'\Longleftrightarrow D^b(\Gamma_7)\simeq D^b(\Gamma_7')\Longleftrightarrow\mathcal{K}u(X)\simeq\mathcal{K}u(X')$, where $\Gamma_7$ and $\Gamma_7'$ are the genus 7 curves associated to $X$ and $X'$, respectively.
\item $g=8$: Assume that $J(X)\cong J(X')$. Then $J(Y)\cong J(Y')$, where $Y$ and $Y'$ are Pfaffian cubics corresponding to $X$ and $X'$, respectively. It follows that $Y\cong Y'$ by the classical Torelli theorem for cubic threefolds. It is known that $\mathcal{K}u(Y)\simeq\mathcal{K}u(X)$ and $\mathcal{K}u(Y')\simeq\mathcal{K}u(X')$ by \cite{kuznetsov2009derived}. Thus $\mathcal{K}u(X)\simeq\mathcal{K}u(X')$. For the other direction, it follows that $\mathcal{K}u(Y)\simeq\mathcal{K}u(Y')$ where $Y$ and $Y'$ are the corresponding Pfaffian cubics of $X$ and $X'$, respectively. Then it follows from \cite{bernardara2012categorical} that $Y\cong Y'$, so $J(X)\cong J(Y)\cong J(Y')\cong J(X')$.
\item $g=9$: $J(X)\cong J(X')\Longleftrightarrow J(\Gamma_3)\cong J(\Gamma_3')\Longleftrightarrow \Gamma_3\cong \Gamma_3'\Longleftrightarrow D^b(\Gamma_3)\simeq D^b(\Gamma_3')\Longleftrightarrow\mathcal{K}u(X)\simeq\mathcal{K}u(X')$, where $\Gamma_3$ and $\Gamma_3'$ are the genus 3 curves associated to $X$ and $X'$, respectively.
\item $g=10$: the argument is the same as for the $g=9$ and $g=7$ cases; it suffices to replace $\Gamma_3$ by a genus 2 curve $\Gamma_2$.
\item $g=12$: the statement is trivial since $J(X)$ is trivial.
\end{enumerate}
\end{proof}
\begin{Rem}\label{Gushel-Mukai_case}
If $g=6$, $X$ is a Gushel--Mukai threefold. It is conjectured that $J(X)$ and $\mathcal{K}u(X)$ are mutually determined by each other. By \cite[Proposition 11.7]{JLLZ}, this is equivalent to the \emph{Debarre-Iliev-Manivel conjecture} stated in \cite{debarre2012period}.
\end{Rem}
\begin{Cor}\label{computing_fiber_via_gluing_data}
The fiber of period map $\mathcal{P}_g$ over $J(X)$ is parametrised by the family of \emph{gluing objects} $i^!\mathcal{E}'\in\mathcal{K}u(X')$ as $X'$ varies.
\end{Cor}
\begin{proof}
This follows from Lemma~\ref{Ku_J(X)_mutually_determined} and Theorem~\ref{Refined_Torelli}.
\end{proof}
Next, we compute the fiber of $\mathcal{P}_g$ over $J(X)$.
\subsection{Genus 6: Gushel--Mukai threefolds}
First, we give another proof of the \emph{categorical Torelli theorem} for general special Gushel--Mukai threefolds via the \emph{refined categorical Torelli Theorem}~\ref{Refined_Torelli}. This was proved in \cite[Theorem 10.9]{JLLZ}.
\begin{Thm}\label{categorical_torelli_SGM}
Let $X,X'$ be two general special GM threefolds such that $\mathcal{K}u(X)\simeq \mathcal{K}u(X')$. Then $X\cong X'$.
\end{Thm}
\begin{proof}
Let $X$ and $X'$ be two smooth general special GM threefolds. Since there is an equivalence $\Xi: \mathcal{K}u(X)\simeq \mathcal{A}_X$, it is enough to show that $\mathcal{A}_X\simeq \mathcal{A}_{X'}$ implies $X\cong X'$. Let $\Phi:\mathcal{A}_X\simeq\mathcal{A}_{X'}$ be an equivalence of the alternative Kuznetsov components. Consider the Bridgeland moduli space $\mathcal{M}_{\sigma}(\mathcal{A}_X,1-2L)$ of $\sigma$-stable objects of class $1-2L$; it is a surface with a unique singular point $[\Xi(i^!\mathcal{E})]$. We claim that $\Phi(\Xi(i^!\mathcal{E}))\cong \Xi(i^!\mathcal{E}')\in\mathcal{A}_{X'}$ up to a shift. First note that the numerical class of $\Phi(\Xi(i^!\mathcal{E}))$ is either $1-2L$ or $2-H+\frac{5}{6}P$ up to sign. It is easy to see $\Phi(\Xi(i^!\mathcal{E}))$ is a stable object in $\mathcal{A}_{X'}$ for every $\tau$-invariant stability condition by the Weak Mukai Lemma~\ref{weak-mukai-lemma}. If $[\Phi(\Xi(i^!\mathcal{E}))]=2-H+\frac{5}{6}P$, then $\Phi(\Xi(i^!\mathcal{E}))$ is a point in the Bridgeland moduli space $\mathcal{M}_{\sigma'}(\mathcal{A}_{X'}, 2-H+\frac{5}{6}P)\cong M_{X'}(2,1,5)$ by \cite[Theorem 11.13]{JLLZ}, which is a smooth irreducible surface. But $\Phi(\Xi(i^!\mathcal{E}))$ is a singular point since $\mathrm{Ext}^2(\Phi(\Xi(i^!\mathcal{E})),\Phi(\Xi(i^!\mathcal{E})))\cong\mathrm{Ext}^2(\Xi(i^!\mathcal{E}),\Xi(i^!\mathcal{E}))=k$ since $\Phi$ is an equivalence. This leads to a contradiction. Thus $[\Phi(\Xi(i^!\mathcal{E}))]=1-2L$. But the moduli space $\mathcal{M}_{\sigma'}(\mathcal{A}_{X'},1-2L)$ is everywhere smooth apart from at the point $[\Xi(i^!\mathcal{E})']$ by \cite[Theorem 7.13]{JLLZ}. Therefore $\Phi(\Xi(i^!\mathcal{E}))\cong \Xi(i^!\mathcal{E}')$. Then we have an equivalence $\Phi':\mathcal{K}u(X)\simeq\mathcal{K}u(X')$ such that $\Phi'(i^!\mathcal{E})\cong i^!\mathcal{E}'$. Hence by the \emph{refined categorical Torelli theorem}~\ref{Refined_Torelli}, $X\cong X'$.
\end{proof}
Next, we recall a result describing the fiber of the ``categorical period map" over the Kuznetsov component of a general ordinary GM threefold, proved in \cite[Theorem 11.3]{JLLZ}. We then study the same problem for \emph{very general} special GM threefolds.
\subsubsection{Ordinary Gushel--Mukai threefolds}
\begin{Thm}[{\cite[Theorem 11.3]{JLLZ}}] \label{fiber_ordinary_GM}
Let $X$ be an ordinary GM threefold. Then all GM threefolds $X'$ such that $\mathcal{K}u(X')\simeq\mathcal{K}u(X)$ in the moduli space $\mathcal{M}_3$ of GM threefolds are parametrised by an open subset of the union of $\mathcal{C}_m(X)/\iota$ and $M_G^X(2,1,5)/\iota'$, where $\iota, \iota'$ are geometrically meaningful involutions. If in addition, we assume that $X$ is general, then all GM threefolds $X'$ such that $\mathcal{K}u(X')\simeq\mathcal{K}u(X)$ are parametrised by $C_m(X)/\iota \cup M_X(2,1,5)/\iota'$.
\end{Thm}
\subsubsection{Special Gushel--Mukai threefolds}
\begin{Lem}
[{\cite[Chapter 16]{huybrechts2016lectures}}]
\label{lemma_picard_number_identification_K3}
Let $S$ and $S'$ be two smooth K3 surfaces such that $\mathrm{D}^b(S)\simeq \mathrm{D}^b(S')$. Then their Picard numbers are equal, i.e. $\rho(S)=\rho(S')$.
\end{Lem}
\begin{Thm}
\label{fiber_period_map_SGM}
Let $X$ be a very general special GM threefold. Then all GM threefolds $X'$ such that $\mathcal{K}u(X')\simeq\mathcal{K}u(X)$ in the moduli space $\mathcal{M}_3$ of GM threefolds form a subvariety of $\mathcal{C}_m(X)/\iota\bigcup M_X(2,1,5)/\iota'$, where $\mathcal{C}_m(X)$ is the contraction of the Fano surface $\mathcal{C}(X)$ of conics on $X$ along one of its irreducible components $\mathbb{P}^2$, and $\iota,\iota'$ are geometric involutions.
\end{Thm}
\begin{proof}
The only possible GM threefold $X'$ with an equivalence $\Phi:\mathcal{K}u(X')\simeq\mathcal{K}u(X)$ is either a special GM threefold such that the Picard number of the branch locus $\mathcal{B'}$ is one, or a non-general ordinary GM threefold. Indeed, $X'$ cannot be a special GM threefold with $\rho(\mathcal{B}')\geq 2$. Otherwise the equivalence $\Phi$ would induce an equivalence of equivariant triangulated categories $\Psi: \mathrm{D}^b(\mathcal{B}')\simeq \mathrm{D}^b(\mathcal{B})$, where $\mathcal{B}$ and $\mathcal{B}'$ are smooth K3 surfaces of degree 10. Then by Lemma~\ref{lemma_picard_number_identification_K3}, their Picard numbers satisfy $\rho(\mathcal{B}')=\rho(\mathcal{B})=1$. In this case, we get $\mathcal{B}\cong\mathcal{B}'$ by \cite[Theorem 1.10]{Oguiso2002} and \cite[Corollary 1.7]{SHOY2002}. Then we get $X'\cong X$, giving a point in the fiber, which is represented by the unique singular point $q$ on $\mathcal{C}_m(X)$. If $X'$ is an ordinary GM threefold such that the moduli space $\mathcal{M}_{\sigma}(\mathcal{A}_{X'},-x)$ is singular but $\mathcal{M}_{\sigma}(\mathcal{A}_{X'},y-2x)$ is smooth, then the equivalence $\Phi$ identifies the moduli space $\mathcal{M}_{\sigma}(\mathcal{A}_{X'},-x)$ with $\mathcal{C}_m(X)$ and $\mathcal{M}_{\sigma}(\mathcal{A}_{X'},y-2x)$ with $M_X(2,1,5)$. If $X'$ is an ordinary GM threefold such that the moduli space $\mathcal{M}_{\sigma}(\mathcal{A}_{X'},-x)$ is smooth but $\mathcal{M}_{\sigma}(\mathcal{A}_{X'},y-2x)$ is singular, then the equivalence $\Phi$ identifies $\mathcal{M}_{\sigma}(\mathcal{A}_{X'},-x)$ with $M_X(2,1,5)$ and $\mathcal{M}_{\sigma}(\mathcal{A}_{X'},y-2x)$ with $\mathcal{C}_m(X)$. By Corollary~\ref{Refined categorical Torelli any}, $X'$ is uniquely determined by the gluing object $\Xi(i^!\mathcal{E})\in\mathcal{A}_{X'}$. Thus the set of such ordinary GM threefolds $X'$ is parametrised by $[\Xi(i^!\mathcal{E})]\in\mathcal{C}_m(X)\cup M_X(2,1,5)$. Note that the point $[\Xi(i^!\mathcal{E})]$ is a smooth point by \cite[Lemma 7.9]{JLLZ}. This means the point $[\Xi(\pi(\mathcal{E}))]$ can be any point in $\mathcal{C}_m(X)\cup M_X(2,1,5)$ except the singular point $q$. Therefore the set of all GM threefolds $X'$ such that $\mathcal{K}u(X')\simeq\mathcal{K}u(X)$ is a subset of $\{q\}\cup (\mathcal{C}_m(X)\setminus\{q\})\cup M_X(2,1,5)=\mathcal{C}_m(X)\cup M_X(2,1,5)$, up to involutions.
\end{proof}
\begin{remark}
If \cite[Theorem 4.1]{guo2022moduli} holds for very general special GM threefolds $X$, then we could show that the set of GM threefolds $X'$ with $\mathcal{K}u(X')\simeq\mathcal{K}u(X)$ is equal to the union $\mathcal{C}_m(X)/\iota\cup M_X(2,1,5)/\iota'$. Indeed, in the upcoming paper \cite{debarre2022gushel}, the authors show that the contraction of the Hilbert scheme of conics on any special GM threefold $X$ along the $\mathbb{P}^2$ as one of its irreducible components is isomorphic to double dual EPW surface $\widetilde{Y}^{\geq 2}_{A^{\perp}}$, where $A:=A(X)\subset\bigwedge^3V_6(X)$ is the Lagrangian subspace associated with $X$. Then the moduli space $\mathcal{M}_{\sigma}(\mathcal{A}_X,-s)\cong \widetilde{Y}^{\geq 2}_{A^{\perp}}$. If in addition $M_X(2,1,5)\cong\mathcal{M}_{\sigma}(\mathcal{A}_X,t-2s)\cong\widetilde{Y}^{\geq 2}_{A}$, then by \cite[Theorem 3.25, Theorem 3.27]{debarre2015gushel} every point in $\mathcal{C}_m(X)/\iota\cup M_X(2,1,5)/\iota'$ corresponds to a period partner $X'$ or period dual $X''$ of $X$ if $X$ is very general. Then by the Duality Conjecture \cite[Theorem 1.6]{kuznetsov2019categorical}, $\mathcal{K}u(X')\simeq\mathcal{K}u(X)\simeq\mathcal{K}u(X'')$.
\end{remark}
\subsection{Genus 8: degree 14 prime Fano threefolds}
The gluing object $\Xi(i^!\mathcal{E})\in\mathcal{A}_X$ in the Kuznetsov component $\mathcal{A}_X$ is a $\sigma_1$-stable object of class $2(1-2L)$ with respect to every Serre-invariant stability condition on $\mathcal{A}_X$ by Proposition~\ref{stability_gluing_data}. Let $Y$ be the Pfaffian cubic associated to $X$. Let $\Psi:\mathcal{A}_X\simeq\mathcal{K}u(Y)$ be the Kuznetsov-type equivalence from \cite{kuznetsov2009derived}. It is known that $\Psi(\Xi(i^!\mathcal{E}))\in\mathcal{K}u(Y)\in \mathcal{M}_{\sigma}(\mathcal{K}u(Y), 2(1-L))\cong M^{\mathrm{inst}}_Y(2,0,2)$ by \cite[Theorem 1.2]{liu2021note}, where $M^{\mathrm{inst}}_Y(2,0,2)$ is the moduli space of stable instanton sheaves on the cubic threefold $Y$. Indeed, we can show that $\Psi(\Xi(i^!\mathcal{E}))\in\mathcal{K}u(Y)$ is a rank two stable instanton bundle.
\begin{Prop}\label{Prop_instanton_bundle}
Let $\Psi:\mathcal{A}_X\simeq\mathcal{K}u(Y)$ be an equivalence of the Kuznetsov component of $X:=X_{14}$ and a corresponding Pfaffian cubic $Y$. Then $\Psi(\Xi(i^!\mathcal{E}))$ is a rank two stable instanton bundle.
\end{Prop}
Before the proof, we prove several lemmas. Recall that $\Xi(i^!\mathcal{E})\in\mathcal{A}_X$ is given by an exact triangle
\[\mathcal{E}[2]\to \Xi(i^!\mathcal{E})\to \mathcal{Q}^{\vee}[1]\]
and the equivalence $\mathcal{A}_X\to \mathcal{K}u(Y)$ is given by the Fourier-Mukai functor $$\Psi:=\Psi_{I_W(H_Y)}: \mathrm{D}^b(X)\rightarrow \mathrm{D}^b(Y)$$ with the kernel being the $\oh_{X\times Y}(H_Y)$ twist of the ideal sheaf $I_W$ of an irreducible subvariety of $X\times Y$ of dimension 4 (see \cite[Remark B.6.5]{KPS} and \cite{kuznetsov2003derived}). Denote by $p_X,p_Y$ the projection maps from $X\times Y$ to $X$ and $Y$, respectively.
\begin{Lem}\label{quartic_curve}
Let $y\in Y$ be a closed point and $X_y:=p_Y^{-1}(y)\cong X$. Then $W_y:=W\cap X_y$ is a rational quartic curve on $X_y$.
\end{Lem}
\begin{proof}
By definition, we know that $W_y$ is an intersection of a linear section of $\Gr(2,6)$ with a Schubert cell corresponding to $(4,1)$ by standard Schubert calculus (see for example \cite{ful96}). In particular, we obtain $\deg W_y=4$. Recall the commutative diagrams defining $W$ below:
\[\begin{tikzcd}
W & {\mathbb{P}_X(\mathcal{U})} &&& W \\
{\mathbb{P}_Y(E^{\vee})} & Q && {X\times Y} & {\mathbb{P}_Y(E^{\vee})\times \mathbb{P}_X(\mathcal{U})} & {\mathbb{P}(A)\times \mathbb{P}_X(\mathcal{U})}
\arrow["\eta"', from=1-1, to=2-1]
\arrow["\psi", from=2-1, to=2-2]
\arrow["\xi", from=1-1, to=1-2]
\arrow["\phi", from=1-2, to=2-2]
\arrow["q", from=1-1, to=2-2]
\arrow["j"', from=1-5, to=2-4]
\arrow["{p_X\times p_Y}", from=2-5, to=2-4]
\arrow["\lambda", from=1-5, to=2-6]
\arrow["{\alpha p_Y\times \mathrm{id}}"', from=2-5, to=2-6]
\arrow["i"', from=1-5, to=2-5]
\end{tikzcd}\]
Then $W_y=(p_Y\circ i)^{-1}(y)=\mathbb{P}^1\times_Q \mathbb{P}_X(\mathcal{U})$. By \cite[Proposition 2.11]{kuznetsov2003derived}, there are the following possible cases of $W_y$:
\begin{enumerate}
\item $\psi(\mathbb{P}^1)=\mathrm{pt}\in C$. In this case $W_y=\mathbb{P}^1\times_Q \mathbb{P}_X(\mathcal{U})\cong \mathbb{P}^1\times \mathbb{P}^1$;
\item If $\psi(\mathbb{P}^1)\cap C=\varnothing$, then we have $W_y=\mathbb{P}^1\times_Q \mathbb{P}_X(\mathcal{U})\cong \mathbb{P}^1\times_{Q-C} \phi^{-1}(Q-C)\cong \mathbb{P}^1$. In this case $W_y$ is a smooth rational quartic curve;
\item $\psi(\mathbb{P}^1)\cap C=\{p_1,...,p_m\}$. In this case $W_y$ is an intersection of $m$ disjoint lines with a line transversally. In this case $W_y$ is a reducible rational quartic curve.
\end{enumerate}
Since $\deg W_y=4$ and $X_y\cong X$ is a prime Fano threefold of index $1$ and degree $14$, case (a) is excluded by the Lefschetz hyperplane section theorem. Thus the only possible cases are (b) and (c), which are both rational quartic curves.
\end{proof}
\begin{Lem} \label{quartic-homo}
Let $C\subset X$ be a rational quartic on $X$. Then we have:
\begin{enumerate}[(1)]
\item $h^2(\mathcal{E}\otimes I_C)=2$ and $h^i(\mathcal{E}\otimes I_C)=0$ for $i\neq 2$;
\item $h^i(\mathcal{E}^{\vee}\otimes I_C)=0$ for all $i$;
\item $h^i(\mathcal{Q}^{\vee}\otimes I_C)=0$ for all $i$.
\end{enumerate}
\end{Lem}
\begin{proof} \leavevmode
\begin{enumerate}[(1)]
\item Applying $\Gamma(X, \mathcal{E}\otimes -)$ to the exact sequence
\[0\to I_C\to \mathcal{O}_X\to \mathcal{O}_C\to 0\]
and using $H^*(\mathcal{E})=0$, we obtain $H^0(\mathcal{E}\otimes I_C)=H^3(\mathcal{E}\otimes I_C)=0$, and $H^{i+1}(\mathcal{E}\otimes I_C)=H^i(\mathcal{E}|_C)$ for all $i$. Since $\mathrm{ch}(\mathcal{O}_C)=4L-P$, we have $\chi(\mathcal{E}|_C)=-2$. By exactly the same argument as in \cite[Lemma B.3.3]{KPS} we show that $h^0(\mathcal{E}|_C)\neq 0$ implies that the span $\langle C\rangle\cong\mathbb{P}^4$ would be contained in $X$, which is impossible. Thus $H^0(\mathcal{E}|_C)=H^1(\mathcal{E}\otimes I_C)=0$, hence $h^2(\mathcal{E}\otimes I_C)=h^1(\mathcal{E}|_C)=2$.
\item Applying $\Gamma(X, \mathcal{E}^{\vee}\otimes - )$ to the exact sequence
\[0\to I_C\to \mathcal{O}_X\to \mathcal{O}_C\to 0\]
and since $h^0(\mathcal{E}^{\vee})=6$ and $0$ in other degrees, we obtain $H^3(\mathcal{E}^{\vee}\otimes I_C)=0$, and $H^i(\mathcal{E}^{\vee}|_C)\cong H^{i+1}(\mathcal{E}^{\vee}\otimes I_C)$ for all $i\geq 1$. Moreover we have an exact sequence
\[0\to H^0(\mathcal{E}^{\vee}\otimes I_C)\to H^0(\mathcal{E}^{\vee})\to H^0(\mathcal{E}^{\vee}|_C)\to H^1(\mathcal{E}^{\vee}\otimes I_C)\to 0 . \]
Since $H^1(\mathcal{E}^{\vee}|_C)=H^0(\mathcal{E}|_C(-1))\subset H^0(\mathcal{E}|_C)=0$, we get $H^2(\mathcal{E}^{\vee}\otimes I_C)=0$. But $\chi(\mathcal{E}^{\vee}|_C)=6$, hence $h^0(\mathcal{E}^{\vee})=h^0(\mathcal{E}^{\vee}|_C)=6$. Therefore $H^0(\mathcal{E}^{\vee}\otimes I_C)=H^1(\mathcal{E}^{\vee}\otimes I_C)=0$.
\item Applying $\Gamma(X, - \otimes I_C)$ to exact sequence
\[0\to \mathcal{Q}^{\vee}\to \mathcal{O}^{\oplus 6}_X\to \mathcal{E}^{\vee}\to 0\]
by $(2)$ we obtain
$h^i(\mathcal{Q}^{\vee}\otimes I_C)=0$ for all $i$.
\end{enumerate}
\end{proof}
We define $\cG:=\Xi(i^!\mathcal{E})$.
\begin{Lem} \label{skyscraper-hom}
$\mathrm{RHom}^\bullet(\oh_y, \Psi_{I_W(H_Y)}(\cG))\cong k^2[-3]$ for any closed point $y\in Y$, where $\cG:=\Xi(i^!\mathcal{E})$
\end{Lem}
\begin{proof}
We know that $\Psi_{I_W(H_Y)}(\cG)=(p_Y)_*(p^*_X\cG\otimes I_W(H_Y))=(p_Y)_*(p^*_X\cG\otimes I_W\otimes p_Y^*\oh_Y(1))$. Then by projection formula we have $\Psi_{I_W(H_Y)}(\cG)=(p_Y)_*(p^*_X\cG\otimes I_W)(H_Y)$. Let $S:=p^*_X\cG\otimes I_W$. Then $\Psi(\cG)=(p_Y)_*(S)(H_Y)$. Thus
\begin{align*}
\mathrm{RHom}^\bullet(\oh_y, \Psi_{I_W(H_Y)}(\cG))&=\mathrm{RHom}^\bullet(\oh_y, (p_Y)_*(S)(H_Y)) \\
&= \mathrm{RHom}^\bullet(\oh_y, (p_Y)_*(S)) = \mathrm{RHom}^\bullet(p_Y^*\oh_y, S) \\
&= \mathrm{RHom}^\bullet(j_{y*}\mathcal{O}_{X_y}, S) = \mathrm{RHom}^\bullet(\mathcal{O}_{X_y}, j_y^!S) \\
&= \mathrm{RHom}^\bullet(\mathcal{O}_{X_y}, \cG\otimes I_{W\cap X_y})[-3] ,
\end{align*}
where $j_y:X_y:=p_Y^{-1}(y)\cong X \hookrightarrow X\times Y$. Here the first equality is from the projection formula, the second is from $\oh_y\otimes \mathcal{O}_Y(-H_Y)\cong \oh_y$, and the fourth and fifth are from adjointness. Hence we only need to compute $\mathrm{RHom}^\bullet(\mathcal{O}_X, \cG\otimes I_{W_y})$. Applying $-\otimes I_W$ to the triangle
\[\mathcal{E}[2]\to \cG\to \mathcal{Q}^{\vee}[1]\]
and taking cohomology, Lemma~\ref{quartic_curve} and Lemma \ref{quartic-homo} give $\mathrm{hom}(\mathcal{O}_X, \cG\otimes I_{W_y})=2$.
\end{proof}
\begin{proof}[Proof of Proposition~\ref{Prop_instanton_bundle}]
It follows from \cite[Proposition 5.4]{bm99} that $\Phi_{I_W(H)}(\cG)$ is a rank 2 vector bundle. Also, $\Psi(\cG)$ is $\sigma$-stable in $\mathcal{K}u(Y)$ with respect to every Serre-invariant stability condition $\sigma$ by Proposition~\ref{stability_gluing_data}. Further note that $\mathrm{ch}(\Psi(\cG))=2(1-L)$. Then by \cite[Theorem 7.6]{liu2021note}, $\Psi(\cG)$ is an instanton sheaf, hence an instanton bundle.
\end{proof}
\begin{Thm}\label{fiber_period_14}
Let $X$ be an index one degree 14 prime Fano threefold. Then all index one prime Fano threefolds $X'$ of degree $14$ such that $\mathcal{A}_{X'}\simeq\mathcal{A}_X$ are parametrised by the moduli space of rank 2 instanton bundles of minimal charge over a cubic threefold $Y$.
\end{Thm}
\begin{proof}
By Proposition~\ref{Prop_instanton_bundle}, all degree 14 index one prime Fano threefolds $X'$ with $\mathcal{A}_{X'}\simeq\mathcal{A}_X$ are parametrised by the family of \emph{gluing objects} $\Psi(\Xi(i^!\mathcal{E}))\in\mathcal{K}u(Y)$, which are rank two instanton bundles on a Pfaffian cubic threefold $Y$ associated to $X:=X_{14}$. On the other hand, any pair $(Y,E')$ such that $E'$ is a rank two instanton bundle on $Y$ uniquely determines an index one prime Fano threefold of degree 14 $X'$ such that $\mathcal{A}_{X'}\simeq\mathcal{K}u(Y)\simeq\mathcal{A}_X$ by \cite[Theorem 2.9]{kuznetsov2003derived}, \cite{markushevich1998abel} and \cite{iliev1999abel}. Moreover, $\Psi(\Xi(i^!\mathcal{E}'))\cong E'$, where $\mathcal{E}'$ is the tautological subbundle on $X'$. Then the desired result follows.
\end{proof}
\subsection{Genus 10: degree 18 prime Fano threefolds}
Let $X$ be an index one prime Fano threefold of degree $18$. Following \cite[Remark B.5.3]{KPS}, we recall some basic properties.
The moduli space of stable sheaves $\mathcal{M}:=M_X(3,-H,9L,-2P)$ consists of only stable vector bundles and $\mathcal{M}$ is isomorphic to a genus 2 curve $\Gamma_2$ admitting a universal family $\mathcal{U}$. Consider the semiorthogonal decomposition $\mathrm{D}^b(X)=\langle\mathcal{A}_X,\mathcal{O}_X,\mathcal{E}^{\vee}\rangle$ where $\mathcal{A}_X=i(\mathrm{D}^b(\Gamma_2))$ and $i:\mathrm{D}^b(\Gamma_2)\rightarrow \mathrm{D}^b(X)$\footnote{By abuse of notation, we still use $i$ to denote the functor} is induced by the family $\mathcal{U}$. Next, we recall the explicit formulae for the functors $i, i^*$ and $i^!$. Let $p$ and $q$ be the projection maps $p:X\times \Gamma_2\rightarrow X$ and $q:X\times \Gamma_2\rightarrow \Gamma_2$:
\begin{align*}
&i: \mathrm{D}^b(\Gamma_2)\rightarrow \mathrm{D}^b(X), \quad i(-)=\mathrm{R}p_*(q^*(-)\otimes\mathcal{U}) \\
&i^!:\mathrm{D}^b(X)\rightarrow \mathrm{D}^b(\Gamma_2), \quad i^!(-)=\mathrm{R}q_*(p^*(-)\otimes\mathcal{U}^*(\omega_{\Gamma_2}))[1] \\
&i^*: \mathrm{D}^b(X)\rightarrow \mathrm{D}^b(\Gamma_2), \quad i^*(-)=\mathrm{R}q_*(p^*(-)\otimes\mathcal{U}^*(-H_X))[3].
\end{align*}
\begin{Lem}
Let $C$ be a twisted cubic on $X$. Then we have
\begin{enumerate}[(1)]
\item $\mathrm{Hom}(\mathcal{E},I_C)=k^2$ and $\mathrm{Ext}^i(\mathcal{E},I_C)=0$ for $i\neq 0$,
\item $h^0(X,\mathcal{E}\otimes\mathcal{O}_C)=0$ and $h^1(X,\mathcal{E}\otimes\mathcal{O}_C)=1$.
\end{enumerate}
\end{Lem}
\begin{proof}\leavevmode\begin{enumerate}[(1)]
\item Consider the standard exact sequence of the twisted cubic $C\subset X$:
$$0\rightarrow I_C\rightarrow\mathcal{O}_X\rightarrow\mathcal{O}_C\rightarrow 0 . $$
Applying $\mathrm{Hom}(\mathcal{E},-)$, we get an exact sequence
$$0\rightarrow\mathrm{Hom}(\mathcal{E},I_C)\rightarrow H^0(\mathcal{E}^{\vee})\rightarrow H^0(\mathcal{E}^{\vee}|_C)\rightarrow\mathrm{Ext}^1(\mathcal{E},I_C)\rightarrow 0 . $$
Note that $H^0(\mathcal{E}^{\vee})=k^7$ and $H^0(\mathcal{E}^{\vee}|_C)=k^5$, hence $\mathrm{hom}(\mathcal{E},I_C)\geq 2$. Assume $\mathrm{hom}(\mathcal{E},I_C)\geq 3$. Then $C$ is contained in the zero locus of at least three independent sections $s\in H^0(\mathcal{E}^{\vee})$, i.e., $C$ is contained in linear sections of $\mathrm{Gr}(2,4)$. Note that $\mathrm{Gr}(2,4)$ is a quardic and $X$ does not contain any planes. Therefore $C$ is contained in a conic, which is impossible. Then $\mathrm{Hom}(\mathcal{E},I_C)=k^2$ and $\mathrm{Ext}^i(\mathcal{E},I_C)=0$ for all $i\neq 0$.
\item A similar argument as in \cite[Lemma B.3.3]{KPS} applies here: $h^0(\mathcal{E}\otimes\mathcal{O}_C)\neq 0$ implies that the linear hull of twisted cubics, which is a $\mathbb{P}^3$, would be contained in $X$. But this is impossible. Thus $h^0(\mathcal{E}\otimes\mathcal{O}_C)=0$. On the other hand $\chi(\mathcal{E}\otimes\mathcal{O}_C)=-1$, so $h^1(\mathcal{E}\otimes\mathcal{O}_C)=1$.
\end{enumerate}
\end{proof}
\begin{Cor}\label{exact-sequence-defining-E}
There is a short exact sequence $$0\rightarrow\mathcal{E}\rightarrow E\rightarrow I_C\rightarrow 0$$ where $E\cong\mathcal{U}_y$ for some $y\in C$, and $E$ is a vector bundle.
\end{Cor}
\begin{proof}
Note that $\mathrm{Ext}^1(I_C,\mathcal{E})\cong\mathrm{Ext}^2(\mathcal{E}^{\vee},I_C)\cong H^1(X,\mathcal{E}\otimes\mathcal{O}_C)=k$. Then up to isomorphism, the extension of $I_C$ and $\mathcal{E}$ (denoted by $E$) is unique, and we have a short exact sequence $$0\rightarrow\mathcal{E}\rightarrow E\rightarrow I_C\rightarrow 0.$$
Note that $\mathcal{E}$ and $I_C$ are both $\mu$-stable with $\mathrm{ch}_{\leq 1}(\mathcal{E})=(2,-H)$ and $\mathrm{ch}_{\leq 1}(I_C)=(1,0)$. Then $E$ is also a $\mu$-stable torsion-free sheaf, hence a Gieseker stable torsion-free sheaf with Chern character $3-H+\frac{1}{2}P$. Thus $E\in M(3,-H,9L,-2P)$ and $E\cong\mathcal{U}_y$ for some point $y\in C$ since $\mathcal{U}$ is the universal family.
\end{proof}
\begin{Lem}\label{local-bundle}
Let $E=\mathcal{U}_y$ in $M(3,-H,9L,-2P)$. Then we have \begin{itemize}
\item $\mathrm{hom}(\mathcal{E},E)=3$ and $\mathrm{Ext}^k(\mathcal{E},E)=0$ for $k\neq 0$,
\item $\mathrm{Ext}^k(\mathcal{E}^{\vee},E)=\mathrm{Ext}^k(E^{\vee},\mathcal{E})=0$ for all $k$.
\end{itemize}
\end{Lem}
\begin{proof}
By Corollary~\ref{exact-sequence-defining-E}, we have an exact sequence $0\rightarrow\mathcal{E}\rightarrow E\rightarrow I_C\rightarrow 0$. Applying $\mathrm{Hom}(\mathcal{E},-)$ to it we get an exact sequence
$$0\rightarrow\mathrm{Hom}(\mathcal{E},\mathcal{E})\rightarrow\mathrm{Hom}(\mathcal{E},E)\rightarrow\mathrm{Hom}(\mathcal{E},I_C)\rightarrow 0.$$ Since $\mathcal{E}$ is an exceptional bundle, $\mathrm{Hom}(\mathcal{E},\mathcal{E})=k$ and thus $\mathrm{Hom}(\mathcal{E},E)=k^3$. A similar computation gives that $\mathrm{Ext}^j(\mathcal{E},E)=0$ for $j\neq 0$.
On the other hand, $E\cong\mathcal{U}_y=i(\mathcal{O}_y)$. Thus $\mathrm{RHom}^{\bullet}(E^{\vee},\mathcal{E})\cong\mathrm{RHom}^{\bullet}(\mathcal{E}^{\vee},i(\mathcal{O}_y))=0$ since $ i(\mathcal{O}_y)\in\mathcal{A}_X$.
\end{proof}
We prove a proposition, which is an analogue of \cite[Proposition 3.10]{brambilla2013rank}.
\begin{Prop}\label{twisted cubics}
Let $X$ be a smooth prime Fano threefold of genus 10. Then the sheaf $\mathcal{V}=q_*(p^*(\mathcal{E}^{\vee})\otimes\mathcal{U})$ is a rank 3 vector bundle over $\Gamma_2$, and we have a natural isomorphism
$$\mathcal{V}^*\cong i^*(\mathcal{E}).$$
\end{Prop}
\begin{proof}
In view of Lemma~\ref{local-bundle}, we have $\mathrm{R}^kq_*(p^*(\mathcal{E}^{\vee}\otimes\mathcal{U})=0$ for $k\geq 1$, and $\mathcal{V}$ is a locally free sheaf over $\Gamma_2$ of rank $h^0(X,\mathcal{E}^{\vee}\otimes\mathcal{U}_y)\cong\mathrm{Hom}(\mathcal{E},E)=3$. By Grothendieck duality, given a sheaf $\mathcal{P}$ on $X\times \Gamma_2$, we have the isomorphism
$$D(\mathrm{R}q_*(\mathcal{P}))\cong\mathrm{R}q_*(\mathcal{O}_X(-H)\otimes D(\mathcal{P}))[3] . $$ Setting $\mathcal{P}=p^*(\mathcal{E}^{\vee})\otimes\mathcal{U}$, we then have
$\mathrm{R}q_*(\mathcal{O}_X(-H)\otimes p^*(\mathcal{E})\otimes\mathcal{U}^{\vee})[3]\cong i^*(\mathcal{E})\cong D(\mathcal{V})\cong \mathcal{V}^*$.
\end{proof}
\begin{Prop}\label{identification of data}
There are natural isomorphisms $\mathcal{V}^*\cong i^*(\mathcal{E})\cong i^!(\mathcal{Q}^{\vee})[-1]$.
\end{Prop}
\begin{proof}
Applying the functor $i^*$ to the triangle in Lemma~\ref{gluing-data-equi-alter}, we get
$$ i^*(\mathcal{E}[1])\rightarrow i^!(\mathcal{Q}^{\vee})\rightarrow i^*(\mathcal{Q}^{\vee}).$$
Note that $i^*(\mathcal{Q}^{\vee})=0$ by semiorthogonality in the semiorthogonal decomposition $\mathrm{D}^b(X)=\langle\mathcal{A}_X,\mathcal{O}_X,\mathcal{E}^{\vee}\rangle$. Then by Proposition~\ref{twisted cubics}, the result follows.
\end{proof}
Now we prove several lemmas and propositions, which are essentially the same as the ones used in \cite{Fanezi2013Halbi}.
\begin{Lem}\label{std_exact_sequence_and_left_mutation}
Let $\mathcal{U}$ be the Fourier--Mukai kernel of $i:\mathrm{D}^b(\Gamma_2)\rightarrow\mathcal{A}_X$ with $\mathcal{A}_X:=\langle\oh_X,\mathcal{E}^{\vee}\rangle^{\perp}$ and let $\widetilde{\mathcal{U}}$ be the Fourier--Mukai kernel of $\Psi:\mathrm{D}^b(\Gamma_2)\rightarrow\mathcal{B}_X$ with $\mathcal{B}_X:={}^{\perp}\langle\oh_X,\mathcal{E}^{\vee}\rangle$. Let $E_y:=\mathcal{U}_y$ and $F_y:=\widetilde{\mathcal{U}}_y$. Then we have the following standard short exact sequences
$$0\rightarrow E^{\vee}_y\rightarrow(\mathcal{E}^{\vee})^3\rightarrow E_y\otimes\oh_X(H)\rightarrow 0$$ and $$0\rightarrow E_y\rightarrow\oh_X^{\oplus 6}\rightarrow E^{\vee}_y\rightarrow 0.$$
\end{Lem}
\begin{proof}
By \cite{Fanezi2013Halbi}, $E_y\cong F_y\otimes\oh_X(-H)$, so the result follows from \cite[Theorem II.1]{Fanezi2013Halbi}
\end{proof}
\begin{Cor}
\label{coro_Theorem2.1}
We have the isomorphisms
$\mathrm{L}_{\mathcal{E}^{\vee}}(E\otimes\oh_X(H))\cong E^{\vee}[-1]$, $\mathrm{L}_{\oh_X}E^{\vee}\cong E[-1]$ and $\mathrm{L}_{\mathcal{E}}E\cong F^{\vee}[-1]$.
\end{Cor}
\begin{Cor}
\label{r3vectorbundle_is_fixed}
The rank 3 vector bundle $\mathcal{V}^*$ over the curve $\Gamma_2$ has the following property: $\iota^*\mathcal{V}\cong\mathcal{V}^*$, where $\iota\colon C\rightarrow C$ is the hyperelliptic involution.
\end{Cor}
\begin{proof}
By Lemma~\ref{gluing-data-equi-alter}, there is a triangle $\mathcal{E}[1]\rightarrow ii^!(\mathcal{Q}^{\vee})\rightarrow \mathcal{Q}^{\vee}$. Applying the anti-involution $\tau$, we get $\tau(\mathcal{Q}^{\vee})\rightarrow\tau(ii^!(\mathcal{Q}^{\vee}))\rightarrow\tau\mathcal{E}[1]$, which is $\mathcal{E}[1]\rightarrow\tau(ii^!(\mathcal{Q}^{\vee}))\rightarrow\mathcal{Q}^{\vee}$. Thus we have $\tau(ii^!(\mathcal{Q}^{\vee})\cong ii^!(\mathcal{Q}^{\vee})$. Then the result follows from Proposition~\ref{first_auto_equivalence}.
\end{proof}
\begin{Prop}
\label{first_auto_equivalence}
The functor $\tau: E\mapsto\mathrm{L}_{\oh_X}\mathrm{R}\mathcal{H}om(E,\oh_X)$ is an anti-autoequivalence of the subcategory $\oh_X^{\perp}$, and $\tau^2(E)\cong E$. Moreover, $\tau$ fixes $i(\mathrm{D}^b(\Gamma_2))$ and $\tau(i(E))\cong i(\mathrm{R}\mathcal{H}om(\iota^*(E),\mathcal{O}_{\Gamma_2}))$, where $i:\mathrm{D}^b(\Gamma_2)\hookrightarrow \mathrm{D}^b(X)$ is the embedding functor.
\end{Prop}
\begin{proof}
Let $E\in\oh_X^{\perp}$. Then $\mathrm{RHom}^{\bullet}(\oh_X,E)=0$, so $\mathrm{RHom}^{\bullet}(E^{\vee},\oh_X)\cong\mathrm{Hom}^{\bullet}(\oh_X, E)=0$. Therefore $E^{\vee}\in^{\perp}\oh_X$. Then $\mathrm{L}_{\oh_X}E^{\vee}\in\oh_X^{\perp}$. To see that $\tau^2$ is the identity, note that there is an exact triangle
$$\mathrm{RHom}^\bullet(\oh_X,E^{\vee})\otimes\oh_X\rightarrow E^{\vee}\rightarrow\mathrm{L}_{\oh_X}E^{\vee}.$$ Dualizing it, we get
$$(\mathrm{L}_{\oh_X}E^{\vee})^{\vee}\rightarrow E\rightarrow\mathrm{RHom}^\bullet(\oh_X,E^{\vee})^*\otimes\oh_X.$$
Applying $\mathrm{L}_{\oh_X}$ to the triangle, we get
$\tau^2(E)\rightarrow\mathrm{L}_{\oh_X}E\rightarrow 0$, since $\mathrm{L}_{\oh_X}\oh_X=0$. Hence $\tau^2(E)\cong E$, since $E\in\oh_X^{\perp}$. Next we show that $\tau$ fixes $i(\mathrm{D}^b(\Gamma_2))$. It suffices to check that $\tau(i(k(x))\cong\tau(\mathcal{U}_x)\in i(\mathrm{D}^b(\Gamma_2))$.
By Corollary~\ref{coro_Theorem2.1}, $\tau(\mathcal{U}_x)=\mathrm{L}_{\oh_X}E^{\vee}\cong E[-1]\cong\mathcal{U}_x[-1]\in i(\mathrm{D}^b(\Gamma_2))$. Further note that $i\cong\Psi\circ(\oh_X(-H)\otimes-)$. Then
\begin{align*}
\tau(i(E)) &\cong \tau(\Psi(E)\otimes\oh_X(-H)) \\
&\cong (\oh_X(-H)\otimes-)\circ\tau'\circ\Psi(E) \\
&\cong \Psi(\mathrm{R}\mathcal{H}om(\iota^*(E),\oh_{\Gamma_2}))\otimes\oh_X(-H) \\
&\cong i(\mathrm{R}\mathcal{H}om(\iota^*(E),\oh_{\Gamma_2}))
\end{align*}
by \cite[Lemma II.7]{Fanezi2013Halbi}, where $\tau'$ is called the first auto-equivalence of $\oh_X(1)^{\perp}$, defined in \cite[Section III.2]{Fanezi2013Halbi}.
\end{proof}
Next we state a proposition proved in \cite[Theorem 2.10]{Fanezi2013Halbi}.
\begin{Prop}\label{fiber-period-X18}
There is a choice of $\xi\in\mathrm{Pic}^2(\Gamma_2)$ such that $\mathcal{V}^*$ is a rank 3 vector bundle over $\Gamma_2$ with trivial determinant, and such that $\theta(\mathcal{V})$ lies in the Coble--Dolgachev sextic, where $\theta\colon \mathcal{M}_{\Gamma_2}(3,\oh_{\Gamma_2})\rightarrow |3\Theta|$ is the map defined in \cite[Section II.1.4]{Fanezi2013Halbi}.
\end{Prop}
\begin{Thm}
\label{fiber_period_X18_thm}
Let $X$ be an index one degree 18 prime Fano threefold. Then the set of all index one degree 18 prime Fano threefolds $X'$ such that $\mathcal{A}_{X'}\simeq\mathcal{A}_X$ is parametrised by the Coble--Dolgachev sextic.
\end{Thm}
\begin{proof}
By Proposition~\ref{fiber-period-X18}, the degree 18 index one prime Fano threefolds $X'$ with $\mathcal{A}_{X'}\simeq\mathcal{A}_X$ are parametrised by the family of \emph{gluing objects} $i^{*}(\Xi(i_{\mathcal{K}u(X)}^!\mathcal{E}))\in \mathrm{D}^b(\Gamma_2)$, which are self dual rank three vector bundles of trivial determinant by Proposition~\ref{twisted cubics}, Corollary~\ref{r3vectorbundle_is_fixed} and Theorem~\ref{fiber-period-X18}. On the other hand, any pair $(\Gamma_2,\mathcal{V})$ of a genus two curve $\Gamma_2$ and a stable vector bundle $\mathcal{V}$ of rank 3 that lies in the Coble--Dolgachev sextic uniquely reconstructs an $X':=X_{18}$ such that $\mathcal{A}_{X'}\simeq \mathrm{D}^b(\Gamma_2)\simeq\mathcal{A}_X$ by \cite[Section 7]{Faenzi2021genusten}. Therefore the desired result follows.
\end{proof}
\subsection{Genus 12: degree 22 prime Fano threefolds}
In this section, we show that the \emph{gluing objects} $i^!\mathcal{E}\in\mathcal{K}u(X)$ cut out the Hilbert scheme $\Sigma(X)$ of lines from a moduli space $M_X(2,-1,8)\cong\mathbb{P}^2$ of semistable sheaves of rank two as a \emph{Brill--Noether locus}.
\begin{Lem}\label{lemma_modulispace218}
The Brigeland moduli space of $\sigma$-stable objects of class $u=2-H+3L+\frac{1}{3}P$ is the moduli space of semistable sheaves $M(2,-1,8)$ for every Serre-invariant stability condition $\sigma$ on $\mathcal{K}u(X)$. They are both isomorphic to the Fano surface $\mathcal{C}(X)$ of conics on $X$.
\end{Lem}
\begin{proof}
Let $E\in M(2,-1,8)$. We show that $\mathrm{RHom}^{\bullet}(\mathcal{O}_X,E)=0$ and $\mathrm{RHom}^{\bullet}(\mathcal{E},E)=0$.\begin{enumerate}
\item If $E$ is locally free, then the first vanishing follows from \cite[Proposition 3.5]{brambilla2014vector}. Note that there is a resolution of $E$ given by the short exact sequence
$$0\rightarrow E\rightarrow\mathcal{E}_5\rightarrow\mathcal{E}_3\rightarrow 0,$$ where $\mathcal{E}_5$ and $\mathcal{E}_3$ are rank 5 and rank 3 vector bundles in a full strong exceptional collection of vector bundles $\langle\mathcal{E},\mathcal{E}_5,\mathcal{E}_3,\mathcal{O}_X\rangle$ on $X_{22}$ (this is actually the foundation of a simple helix in the sense of \cite{polishchuk2011simple}). It is known that $\mathrm{Hom}(\mathcal{E},E)=0$ since $\mathcal{E}$ and $E\in M(2,-1,8)$ are both Gieseker semistable and $p_{\mathcal{E}}(t)>p_E(t)$, where $p(t)$ is the reduced Hilbert polynomial. It is also clear that $\mathrm{Ext}^3(\mathcal{E},E)\cong\mathrm{Hom}(E,\mathcal{E}\otimes\mathcal{O}_X(-H))=0$ by stability. A computation shows that the Euler character $\chi(\mathcal{E},E)=0$. Applying $\mathrm{Hom}(\mathcal{E},-)$ to the short exact sequence above, we get a long exact sequence
$$\cdots\rightarrow\mathrm{Ext}^1(\mathcal{E},E)\rightarrow\mathrm{Ext}^1(\mathcal{E},\mathcal{E}_5)\rightarrow\mathrm{Ext}^1(\mathcal{E},\mathcal{E}_3)\rightarrow\mathrm{Ext}^2(\mathcal{E},E)\rightarrow\mathrm{Ext}^2(\mathcal{E},\mathcal{E}_5)\rightarrow\cdots . $$
Note that $\mathrm{Ext}^1(\mathcal{E},\mathcal{E}_3)=\mathrm{Ext}^2(\mathcal{E},\mathcal{E}_5)=0$. Thus $\mathrm{Ext}^2(\mathcal{E},E)=0$. Then $\mathrm{Ext}^1(\mathcal{E},E)=0$ since $\chi(\mathcal{E},E)=0$. This implies that $E\in\mathcal{K}u(X)$. By \cite[Proposition 4.2]{faenzi2014even}, $M(2,-1,8)\cong\mathcal{C}(X)\cong\mathbb{P}^2$. In particular, $M(2,-1,8)$ is smooth and hence $\mathrm{Ext}^1(E,E)=2$. Hence by \cite[Lemma 3.14]{liu2021note}, $F$ is $\sigma$-stable in $\mathcal{K}u(X)$ with respect to every Serre-invariant stability condition $\sigma$.
\item If $E$ is not locally free, then by \cite[Proposition 3.5]{brambilla2014vector} it fits into the short exact sequence $$0\rightarrow E\rightarrow\mathcal{E}\rightarrow\mathcal{O}_L(-1)\rightarrow 0.$$ Applying $\Hom(\oh_X, -)$ and $\mathrm{Hom}(\mathcal{E},-)$ to it, we get $\mathrm{RHom}^{\bullet}(\mathcal{E},E)=\mathrm{RHom}^{\bullet}(\oh_X,E)=0$. Hence $E\in\mathcal{K}u(X)$. The same argument as in $(1)$ shows that $E$ is $\sigma$-stable. \end{enumerate}
Note that $\mathrm{ch}(E)=2-H+3L+\frac{1}{3}P$ and $\chi(\mathrm{ch}(E\otimes\mathcal{O}_L))=\chi((2-H+3L+\frac{1}{3}P)(L+\frac{1}{2}P))=\chi_0(2L)=1$. This implies that the moduli space $M(2,-1,8)$ admits a universal family by \cite[Theorem 4.6.5]{huybrechts2010geometry}. Then the projection functor $i^*:=\mathrm{L}_{\mathcal{E}}\mathrm{L}_{\mathcal{O}_X}$ induces a morphism $p:M(2,-1,8)\rightarrow\mathcal{M}_{\sigma}(\mathcal{K}u(X), u)$. As in \cite[Section 4]{liu2021note}, it is easy to check that $p$ is an injective, étale and proper morphism, hence a closed and open embedding. On the other hand, because $\chi(u,u)=-1$, by \cite[Corollary 4.2]{liu2021note} the following moduli spaces are isomorphic: $\mathcal{M}_{\sigma}(\mathcal{K}u(X), u)\cong\mathcal{M}_{\sigma'}(\mathcal{K}u(Y),v)\cong\mathbb{P}^2$, where $Y$ is del Pezzo threefold of degree 5, $v=1-L\in\mathcal{N}(\mathcal{K}u(Y))$ and $\sigma'$ is any Serre-invariant stability condition on $\mathcal{K}u(Y)$. Then $\mathcal{M}_{\sigma}(\mathcal{K}u(X), u)$ is irreducible and $\mathcal{M}_{\sigma}(\mathcal{K}u(X),u)\cong M(2,-1,8)$ as required.
\end{proof}
\begin{Prop}
\label{prop_projection_lines_Ku}
The projection $i^*(\mathcal{O}_L(-1))$ is in the Brill--Noether locus \[ \mathcal{BN}:=\{F\in\mathcal{M}_{\sigma}(\mathcal{K}u(X),-u) \mid \mathrm{Ext}^1(F,i^!\mathcal{E})=k\} . \]
Moreover, the projection functor $i^*$ induces an embedding of the Hilbert scheme of lines $\Sigma(X)$ on $X$ into $\mathcal{BN}$.
\end{Prop}
\begin{proof}
Since $\mathrm{RHom}^{\bullet}(\mathcal{O}_X,\mathcal{O}_L(-1))=0$, we have $i^*(\mathcal{O}_L(-1))\cong\mathrm{L}_{\mathcal{E}}\mathcal{O}_L(-1)$. It is given by the exact triangle
$$\mathrm{RHom}^\bullet(\mathcal{E},\mathcal{O}_L(-1))\otimes\mathcal{E}\rightarrow\mathcal{O}_L(-1)\rightarrow\mathrm{L}_{\mathcal{E}}\mathcal{O}_L(-1).$$
Thus $\mathrm{L}_{\mathcal{E}}\mathcal{O}_L(-1)\cong E[1]$, and by \cite[Proposition 3.5]{brambilla2014vector} we have $E\in M(2,-1,8)$. Thus $\mathrm{ch}(\mathrm{L}_{\mathcal{E}}\mathcal{O}_L(-1))=-u$. Applying $\mathrm{Hom}(-,\mathcal{E})$ to this triangle, we get an exact sequence
\begin{align*}
0 &\to \mathrm{Hom}(\mathrm{L}_{\mathcal{E}}\mathcal{O}_L(-1),\mathcal{E}) \rightarrow\mathrm{Hom}(\mathcal{O}_L(-1),\mathcal{E})\rightarrow\mathrm{Hom}(\mathcal{E},\mathcal{E}) \\
&\rightarrow \mathrm{Ext}^1(\mathrm{L}_{\mathcal{E}}\mathcal{O}_L(-1),\mathcal{E}) \to \mathrm{Ext}^1(\mathcal{O}_L(-1),\mathcal{E})\rightarrow\cdots .
\end{align*}
Then we have $\mathrm{Ext}^1(\mathrm{L}_{\mathcal{E}}\mathcal{O}_L(-1),\mathcal{E})\cong\mathrm{Ext}^1(\mathrm{L}_{\mathcal{E}}\mathcal{O}_L(-1),i^!\mathcal{E})=k$.
It is clear that $\mathrm{L}_{\mathcal{E}}\mathcal{O}_L(-1)\cong E[1]$ is $\sigma$-stable by $E\in M(2,-1,8)$ and Lemma~\ref{lemma_modulispace218}. It is also clear that $\Sigma(X)$ admits a universal family. Then by a similar argument as in Lemma~\ref{lemma_modulispace218}, there is a morphism $\Sigma(X)\xrightarrow{p}\mathcal{M}_{\sigma}(\mathcal{K}u(X),-u)$. It is easy to see that $p$ is injective since $i^*(\mathcal{O}_L(-1))$ is uniquely determined by the line $L\subset X$ (cf. \cite[Proposition 3.5]{brambilla2014vector}). Applying $\mathrm{Hom}(\mathcal{O}_L(-1),-)$ to the exact triangle defining $\mathrm{L}_{\mathcal{E}}\mathcal{O}_L(-1)$, we get an exact sequence $$0\rightarrow\mathrm{Ext}^1(\mathcal{O}_L(-1),\mathcal{O}_L(-1))\xrightarrow{dp}\mathrm{Ext}^1(i^*(\mathcal{O}_L(-1)), i^*(\mathcal{O}_L(-1)))\rightarrow \cdots . $$
The map $dp$ is exactly the tangent map of $p: \Sigma(X)\rightarrow\mathcal{M}_{\sigma}(\mathcal{K}u(X),-u)$ at the point $[L]$, and it is injective. Since both moduli spaces are proper, $p$ is a closed embedding.
\end{proof}
\begin{Thm}\label{theorem_lines_BNlocus}
The Hilbert scheme of lines of a degree $22$ prime Fano threefold $X$ of index one can be exhibited as the Brill--Noether locus of the Bridgeland moduli space of stable objects in $\mathcal{K}u(X)$ with respect to $i^!\mathcal{E}\in\mathcal{K}u(X)$, where $i:\mathcal{K}u(X)\hookrightarrow \mathrm{D}^b(X)$ is the inclusion. In other words, we have $\Sigma(X)\cong\mathcal{BN}$.
\end{Thm}
\begin{proof}
It remains to show that if $F\in\mathcal{BN}$, then $F\cong i^*(\mathcal{O}_L(-1))$. Assume that $F\in\mathcal{BN}$. Then $F\in\mathcal{M}_{\sigma}(\mathcal{K}u(X),-u)$. By Lemma~\ref{lemma_modulispace218}, $F\cong E[1]$ for some $E\in M(2,-1,8)$. By \cite[Proposition 4.2]{faenzi2014even}, $E$ is either locally free or non-locally free. If $E$ is locally free, then $\mathrm{Hom}(E,\mathcal{E})=0$. Indeed, there is a resolution of $E$ given by the short exact sequence $0\rightarrow E\rightarrow\mathcal{E}_5\rightarrow\mathcal{E}_3\rightarrow 0$. Now, applying $\mathrm{Hom}(-,\mathcal{E})$ we get a long exact sequence
$$0\rightarrow\mathrm{Hom}(\mathcal{E}_3,\mathcal{E})\rightarrow\mathrm{Hom}(\mathcal{E}_5,\mathcal{E})\rightarrow\mathrm{Hom}(E,\mathcal{E})\rightarrow\mathrm{Ext}^1(\mathcal{E}_3,\mathcal{E})\rightarrow\cdots .$$
But $\mathrm{Hom}(\mathcal{E}_5,\mathcal{E})=\mathrm{Ext}^1(\mathcal{E}_3,\mathcal{E})=0$ since $\langle\mathcal{E},\mathcal{E}_5,\mathcal{E}_3,\mathcal{O}_X\rangle$ is an exceptional collection. Then $\mathrm{Ext}^1(F,i^!\mathcal{E})\cong\mathrm{Hom}(E,i^!\mathcal{E})\cong\mathrm{Hom}_{D^b(X)}(E,\mathcal{E})=0$, which is a contradiction. Therefore $F\cong E[1]$ where $E$ fits into the short exact sequence $$0\rightarrow E\rightarrow\mathcal{E}\rightarrow\mathcal{O}_L(-1)\rightarrow 0,$$ which implies $F\cong i^*(\mathcal{O}_L(-1))$.
\end{proof}
\begin{Thm}
Let $X$ be a general index one degree 22 prime Fano threefold. Then the set of index one degree 22 prime Fano threefolds $X'$ such that $\mathcal{K}u(X)\simeq\mathcal{K}u(X')$ is the moduli space of smooth plane quartic curves.
\end{Thm}
\begin{proof}
All degree 22 index one prime Fano threefolds $X'$ with $\mathcal{K}u(X')\simeq\mathcal{K}u(X)$ are parametrised by the family of \emph{gluing objects} $i^!\mathcal{E}\in\mathcal{K}u(X)$, which gives a Hilbert scheme of lines on $X$ as a plane quartic (by Theorem~\ref{theorem_lines_BNlocus}). On the other hand, every plane quartic given as a Hilbert scheme of lines on a general $X_{22}$ and a theta characteristic on it determines this Fano threefold up to isomorphism by \cite{kuznetsov1997fano} and \cite{mu92fano}. Then the desired result follows.
\end{proof}
\subsection{Odd genus}
In this section, we include results for the fiber of period map for odd genus index one prime Fano threefolds. For details, we refer to the works \cite{brambilla2013rank} and \cite{brambilla2014vector}.
\subsubsection{Genus 7: degree 12 prime Fano threefolds}
By Mukai's theorem \cite{Mukai2001Brill-Nother}, every genus 7 prime Fano threefold $X$ is reconstructed as \emph{Brill--Noether locus} in a moduli space of rank two vector bundles over a genus 7 curve $\Gamma_7$, i.e. $X\cong\{F\in\mathcal{M}_{\Gamma_7}(2,K_{\Gamma_7}) \mid \mathrm{Hom}(\oh_{\Gamma_7},F)=k^5\}$. Thus $X$ is uniquely determined by $\Gamma_7$, so every genus 7 prime Fano threefold $X'$ with $\mathcal{K}u(X')\simeq\mathcal{K}u(X)$ is isomorphic to $X$ since $\mathcal{K}u(X')\simeq \mathrm{D}^b(\Gamma_7')$ and $\mathrm{D}^b(\Gamma_7')\simeq \mathrm{D}^b(\Gamma_7)$ implies that $\Gamma_7'\cong\Gamma_7$. Note that the \emph{gluing object} is given by $\oh_{\Gamma_7}$ by \cite[Lemma 2.9]{brambilla2013rank} or \cite[Lemma 5.6]{kuznetsov2005derived}, so whenever $\mathcal{K}u(X')\simeq\mathcal{K}u(X)$, $\Gamma_7'\cong\Gamma_7$, such a \emph{gluing object} is fixed.
\subsubsection{Genus 9: degree 16 prime Fano threefolds}
By \cite[Proposition 3.10]{brambilla2014vector}
the family of \emph{gluing objects} $i^!\mathcal{E}\in\mathcal{K}u(X)$ is parametrised by a moduli space of rank 2 vector bundles $\mathcal{W}$ over a genus 3 curve $\Gamma_3$ such that any section of ruled surface $\mathbb{P}_{\Gamma_3}(\mathcal{W})$ has self intersection at least 3. On the other hand, by Mukai's theorem \cite{Mukai2001Brill-Nother}, the pair $(\Gamma_3,\mathcal{W})$ determines a degree 16 prime Fano threefold $X'$ up to isomorphism such that $\mathcal{K}u(X')\simeq\mathcal{K}u(X)$.
\begin{appendix}
\section{Computations} \label{appA}
\subsection{Wall-crossing computations for $g=7$ and $9$}
In this subsection, we compute potential walls for $\mathcal{E}_g$ and $\mathcal{E}_g(-H)[1]$. The lemmas here are used in the proof of Proposition \ref{induce_range}.
\begin{Lem} [{\cite[Proposition 3.2]{li2018stability}}] \label{SBGg=7}
Let $X:=X_{12}$ and $F\in \mathrm{D}^b(X)$ be a $\sigma_{\alpha, \beta}$-semistable object for some $\beta$ and $\alpha>0$.
\begin{enumerate}
\item If $|\mu(F)|\leq \frac{1}{2\sqrt{2}}$, then $\frac{H\mathrm{ch}_2(F)}{H^3\mathrm{ch}_0(F)}\leq 0$,
\item If $\frac{1}{2\sqrt{2}} \leq |\mu(F)|\leq 1-\frac{1}{2\sqrt{2}}$, then
$\frac{H\mathrm{ch}_2(F)}{H^3\mathrm{ch}_0(F)}\leq \frac{1}{2}|\mu(F)|^2-\frac{1}{16}$,
\item If $1-\frac{1}{2\sqrt{2}} \leq |\mu(F)|\leq 1+\frac{1}{2\sqrt{2}}$, then $\frac{H\mathrm{ch}_2(F)}{H^3\mathrm{ch}_0(F)}\leq |\mu(F)|-\frac{1}{2}$,
\item If $1+\frac{1}{2\sqrt{2}} \leq |\mu(F)|\leq 2-\frac{1}{2\sqrt{2}}$, then
$\frac{H\mathrm{ch}_2(F)}{H^3\mathrm{ch}_0(F)}\leq \frac{1}{2}|\mu(F)|^2-\frac{1}{16}$.
\end{enumerate}
\end{Lem}
\begin{Lem} \label{g=7wall1}
Let $X:=X_{12}$ and $\beta=-\frac{5}{6}$ or $-\frac{71}{84}$. Let $E\in \Coh^{\beta}(X)$ be a $\sigma_{\alpha, \beta}$-semistable object for some $\alpha>0$ with $\mathrm{ch}_{\leq 2}(E)=\mathrm{ch}_{\leq 2}(\mathcal{E}_7)$. Then $E$ is $\sigma_{\alpha, \beta}$-semistable for all $\alpha>0$.
\end{Lem}
\begin{proof}
We only do computations for $\beta=-\frac{5}{6}$ here. Since $-\frac{71}{84}$ is very close to $-\frac{70}{84}=-\frac{5}{6}$, the argument is almost the same.
We are going to show that there is no wall for $E$ when $\beta=-\frac{5}{6}$. As in Section \ref{sec:tilt stability wall algorithm}, a wall would be given by a short exact sequence
\[0\to A\to E\to B\to 0\]
in $\Coh^{-\frac{5}{6}}(X)$ such that following conditions hold:
\begin{enumerate}
\item $\mu_{\alpha, -\frac{5}{6}}(A)=\mu_{\alpha, -\frac{5}{6}}(E)=\mu_{\alpha, -\frac{5}{6}}(B)$;
\item $\Delta(A)\geq 0$ and $\Delta(B)\geq 0$;
\item $\Delta(A)\leq \Delta(E)$ and $\Delta(B)\leq \Delta(E)$;
\item $\mathrm{ch}_1^{-\frac{5}{6}}(A)\geq 0$ and $\mathrm{ch}_1^{-\frac{5}{6}}(B)=\mathrm{ch}_1^{-\frac{5}{6}}(E)-\mathrm{ch}_1^{-\frac{5}{6}}(A)\geq 0$.
\end{enumerate}
Note that $\mathrm{ch}_1^{-\frac{5}{6}}(E)>0$, thus the inequalities in $(d)$ are actually strict. We can assume that $\mathrm{ch}_{\leq 2}(A)=(a,bH,cL)$ and so $\mathrm{ch}_{\leq 2}(B)=(5-a, (-2-b)H, -cL)$
for some $a,b,c\in \mathbb{Z}$. If we divide the discriminant $\Delta(-)$ by $(H^3)^2$, the conditions above can be rewritten as
\begin{enumerate}
\item $\frac{-36a\alpha^2+25a+60b+6c}{12(5a+6b)}=\frac{5-180\alpha^2}{156}$;
\item $b^2-\frac{ac}{6}\geq 0$ and $(-2-b)^2-\frac{(5-a)(-c)}{6}\geq 0$;
\item $b^2-\frac{ac}{6}\leq 4$ and $(-2-b)^2-\frac{(5-a)(-c)}{6}\leq 4$;
\item $\frac{13}{6}> b+\frac{5}{6}a> 0$.
\end{enumerate}
Since $\alpha^2>0$ and $6b+5a>0$ by $(d)$, $(a)$ implies
\begin{equation} \label{g=7a1}
(50a+125b+13c)(2a+5b)<0.
\end{equation}
Now $(a)$ and $(d)$ imply the following four cases:
\begin{enumerate}[(i)]
\item $a>5$, $-\frac{5}{6}a<b<\frac{13-5a}{6}, c>-\frac{25}{13}(2a+5b)$;
\item $0<a\leq 5$, $-\frac{5}{6}a<b<-\frac{2}{5}a, c>-\frac{25}{13}(2a+5b)$;
\item $0<a\leq 5$, $-\frac{2}{5}a<b<\frac{13-5a}{6}, c<-\frac{25}{13}(2a+5b)$;
\item $a\leq 0$, $-\frac{5}{6}a<b<\frac{13-5a}{6}, c<-\frac{25}{13}(2a+5b)$.
\end{enumerate}
Combined with $(b)$ and $(d)$, each case $(i)$ to $(iv)$ gives the following:
\begin{enumerate}[(i)]
\item $5<a<\frac{169}{5}$, $-\frac{10a}{13}<b\leq -\frac{2}{5}(a+\sqrt{(a-5)a})$, $-\frac{25}{13}(2a+5b)<c\leq \frac{6b^2}{a}$; or $5<a<\frac{169}{5}$, $-\frac{2}{5}(a+\sqrt{(a-5)a})<b< \frac{13-5a}{6}$, $-\frac{25}{13}(2a+5b)<c\leq \frac{6(b+2)^2}{a-5}$
\item $0<a\leq 5$, $-\frac{10a}{13}<b<-\frac{2a}{5}$, $-\frac{25}{13}(2a+5b)<c\leq \frac{6b^2}{a}$;
\item $0<a<5$, $-\frac{2a}{5}<b<-\frac{2(5a-12)}{13}$, $\frac{6(b+2)^2}{a-5}\leq c<-\frac{25}{13}(2a+5b)$;
\item $-\frac{144}{5}<a\leq 0$, $-\frac{5a}{6}<b\leq \frac{2}{5}(-a+\sqrt{(a-5)a})$, $\frac{6b^2}{a}\leq c<-\frac{25}{13}(2a+5b)$; or $-\frac{144}{5}<a\leq 0$, $\frac{2}{5}(-a+\sqrt{(a-5)a})<b<-\frac{2(5a-12)}{13}$, $\frac{6(b+2)^2}{a-5}\leq c<-\frac{25}{13}(2a+5b)$.
\end{enumerate}
Now by a careful computation for each case $(i)$ to $(iv)$, we obtain all possible truncated Chern characters of $A$ and $B$:
\begin{enumerate}[(1)]
\item $(-11, 10H, -54L)$ and $(16, -12H, 54L)$;
\item $(-5, 5H, -29L)$ and $(10, -7H, -29L)$;
\item $(-4, 4H, -24L)$ and $(9, -6H, 24L)$;
\item $(-3, 3H, -18L)$ and $(8, -5H, 18L)$;
\item $(-3, 4H, -27L)$ and $(8, -6H, 27L)$;
\item $(-2, 2H, -12L)$ and $(7, -4H, 12L)$;
\item $(-1, H,-6L)$ and $(6,-3H, 6L)$;
\item $(-1,2H,-16L)$ and $(6,-4H, 16L)$;
\item $(0, H,-10L)$ and $(5,-3H, 10L)$;
\item $(1,0,-6L)$ and $(4,-2H, 6L)$;
\item $(1,0,-5L)$ and $(4,-2H, 5L)$;
\item $(1,0,-4L)$ and $(4,-2H, 4L)$;
\item $(2,-H, 2L)$ and $(3,-H,-2L)$;
\item $(2,-H, 3L)$ and $(3,-H, -3L)$;
\item $(2,0,-8L)$ and $(3,-2H, 8L)$.
\end{enumerate}
Since $A$ and $B$ are both $\sigma_{\alpha, -\frac{5}{6}}$-semistable for some $\alpha>0$, the cases $(13)$ and $(14)$ are ruled out by using Lemma \ref{SBGg=7} on the first character. The other cases are ruled out by using Lemma \ref{SBGg=7} on the second character. This implies that there are no walls when $\beta=-\frac{5}{6}$ for $E$, and $E$ is $\sigma_{\alpha, -\frac{5}{6}}$-semistable for every $\alpha>0$.
When $\beta=-\frac{71}{84}$, the computation argument is similar, and the solutions for $\mathrm{ch}_{\leq 2}(A)$ and $\mathrm{ch}_{\leq 2}(B)$ are the same as those when $\beta=-\frac{5}{6}$. Thus from the same argument using Lemma \ref{SBGg=7}, there are no walls when $\beta=-\frac{71}{84}$ for $E$, and $E$ is $\sigma_{\alpha, -\frac{71}{84}}$-semistable for every $\alpha>0$.
\end{proof}
\begin{Lem} \label{g=7wall2}
Let $X:=X_{12}$ and $\beta=-\frac{5}{6}$ or $-\frac{71}{84}$. Let $E\in \Coh^{\beta}(X)$ be a $\sigma_{\alpha, \beta}$-semistable object for some $\alpha>0$ with $\mathrm{ch}_{\leq 2}(E)=\mathrm{ch}_{\leq 2}(\mathcal{E}_7(-H)[1])$. Then $E$ is $\sigma_{\alpha, \beta}$-semistable for all $\alpha>0$.
\end{Lem}
\begin{proof}
We assume that there is a wall when $\beta=-\frac{5}{6}$ or $-\frac{71}{84}$ for $E$, and that it is given by $A\to E\to B$. Then a similar computation as in Lemma \ref{g=7wall1} shows that all possible truncated Chern characters of $A$ and $B$ are:
\begin{enumerate}[(1)]
\item $(-6,7H, -49L)$ and $(1,0,-5L)$;
\item $(-5, 6H, -43L)$ and $(0,H,-11L)$;
\item $(-4, 5H, -37L)$ and $(-1, 2H,-17L)$;
\item $(-3, 4H, -32L)$ and $(-2, 3H, -22L)$;
\item $(-3, 4H, -31L)$ and $(-2, 3H, -23L)$.
\end{enumerate}
Now using Lemma \ref{SBGg=7} on the first character in each case, all of the cases $(1)$ to $(5)$ are ruled out. This means that there are no walls for $E$ when $\beta=-\frac{5}{6}$ or $-\frac{71}{84}$, and hence $E$ is $\sigma_{\alpha, \beta}$-semistable for every $\alpha>0$.
\end{proof}
\begin{Lem} [{\cite[Proposition 3.2]{li2018stability}}] \label{SBGg=9}
Let $X:=X_{16}$ and $F\in \mathrm{D}^b(X)$ be a $\sigma_{\alpha, \beta}$-semistable object for some $\beta$ and $\alpha>0$. If $\mu(F)=-\frac{1}{2}$, then $\frac{H\mathrm{ch}_2(F)}{H^3\mathrm{ch}_0(F)}\leq \frac{5}{64}$.
\end{Lem}
\begin{Lem} \label{g=9wall1}
Let $X:=X_{16}$ and $\beta=-\frac{3}{4}$ or $-\frac{31}{40}$. Let $E\in \Coh^{\beta}(X)$ be a $\sigma_{\alpha, \beta}$-semistable object for some $\alpha>0$ with $\mathrm{ch}_{\leq 2}(E)=\mathrm{ch}_{\leq 2}(\mathcal{E}_9)$. Then $E$ is $\sigma_{\alpha, \beta}$-semistable for all $\alpha>0$.
\end{Lem}
\begin{proof}
We assume that there is a wall when $\beta=-\frac{3}{4}$ or $-\frac{31}{40}$ for $E$, and that it is given by $A\to E\to B$. Then a similar computation as in Lemma \ref{g=7wall1} shows that all of the possible truncated Chern characters of $A$ and $B$ are:
\begin{enumerate}[(1)]
\item $(-1,H, -6L)$ and $(4,-2H,6L)$;
\item $(1, 0, -3L)$ and $(2,-H,3L)$.
\end{enumerate}
Now using Lemma \ref{SBGg=9} on the second character in each case, both cases $(1)$ and $(2)$ are ruled out. This means that there are no walls for $E$ on $\beta=-\frac{3}{4}$ or $-\frac{31}{40}$, and hence $E$ is $\sigma_{\alpha, \beta}$-semistable for every $\alpha>0$.
\end{proof}
\begin{Lem} \label{g=9wall2}
Let $X:=X_{16}$ and $\beta=-\frac{3}{4}$ or $-\frac{31}{40}$. Let $E\in \Coh^{\beta}(X)$ be a $\sigma_{\alpha, \beta}$-semistable object for some $\alpha>0$ with $\mathrm{ch}_{\leq 2}(E)=\mathrm{ch}_{\leq 2}(\mathcal{E}_9(-H)[1])$. Then $E$ is $\sigma_{\alpha, \beta}$-semistable for all $\alpha>0$.
\end{Lem}
\begin{proof}
We assume that there is a wall when $\beta=-\frac{3}{4}$ or $-\frac{31}{40}$ for $E$, and that it is given by $A\to E\to B$. Then a similar computation as in Lemma \ref{g=7wall1} shows that there are no such truncated Chern characters of $A$ and $B$. This means there are no walls for $E$ when $\beta=-\frac{3}{4}$ or $-\frac{31}{40}$, and hence $E$ is $\sigma_{\alpha, \beta}$-semistable for every $\alpha>0$.
\end{proof}
\subsection{Ext groups of gluing objects}
Let $X$ be an index one prime Fano threefold of even genus $10\geq g\geq 6$. In this subsection, we compute the self-Ext groups of the \emph{gluing object} $i^!\mathcal{E}\in\mathcal{K}u(X)$.
\begin{Prop}\label{ext_group_gluing_data}
Let $X$ be prime Fano threefold of index one and even genus $6 \leq g \leq 10$. Then \leavevmode\begin{enumerate}
\item $g=6: \mathrm{ext}^1(i^!\mathcal{E},i^!\mathcal{E})=2$ or $3$,
\item $g=8: \mathrm{ext}^1(i^!\mathcal{E},i^!\mathcal{E})=5$,
\item $g=10: \mathrm{ext}^1(i^!\mathcal{E},i^!\mathcal{E})=10$.
\end{enumerate}
\end{Prop}
\begin{proof}
If $g=6$, the result follows from \cite[Lemma 5.7]{JLLZ}.
If $g=8$, we consider the triangle
\[\mathcal{Q}^{\vee}[-1]\to \mathcal{E}[1]\to i^!\mathcal{E}[-1]\]
and apply the spectral sequence in \cite[Lemma 2.27]{pirozhkov2020admissible}. We have:
\[
E^{p,q}_1=
\begin{cases}
\Ext^q(\mathcal{E}[1],\mathcal{Q}^{\vee}[-1])=\Ext^{q-2}(\mathcal{E},\mathcal{Q}^{\vee}) , & p=-1 \\
\Ext^q(\mathcal{E},\mathcal{E})\oplus \Ext^q(\mathcal{Q}^{\vee},\mathcal{Q}^{\vee}) , & p=0 \\
\Ext^q(\mathcal{Q}^{\vee}[-1], \mathcal{E}[1])=\Ext^{q+2}(\mathcal{Q}^{\vee},\mathcal{E}) , & p=1 \\
0 , & p \geq 2, p \leq -2
\end{cases}
\]
By convergence of the spectral sequence and Lemma \ref{bundle-ext-X14}, we have $\mathrm{ext}^1(i^!\mathcal{E},i^!\mathcal{E})=5$ and $\mathrm{ext}^2(i^!\mathcal{E},i^!\mathcal{E})=\mathrm{ext}^3(i^!\mathcal{E},i^!\mathcal{E})=0$. Since $i^!\mathcal{E}$ is a $(-4)$-class, we have $\mathrm{hom}(i^!\mathcal{E},i^!\mathcal{E})=1$.
If $g=10$, $\mathrm{ch}(i^!\mathcal{E})=-3(1-2L)$ and $\chi(i^!\mathcal{E},i^!\mathcal{E})=-9$, so $\mathrm{ext}^1(i^!\mathcal{E},i^!\mathcal{E})=\mathrm{hom}(i^!\mathcal{E},i^!\mathcal{E})-\chi(i^!\mathcal{E},i^!\mathcal{E})=10$ since $\mathrm{hom}(i^!\mathcal{E},i^!\mathcal{E})=1$ by a similar computation as in Lemma~\ref{bundle-ext-X14}.
\end{proof}
\begin{Lem} \label{bundle-ext-X14}
Let $X$ be an index one prime Fano threefold of degree 14 and let $\mathcal{E}$ and $\mathcal{Q}$ be the tautological sub and quotient bundles, respectively. Then we have
\begin{enumerate}
\item $\mathrm{hom}(\mathcal{E},\mathcal{Q}^{\vee})=5$ and $\mathrm{ext}^i(\mathcal{E},\mathcal{Q}^{\vee})=0$ for $i\geq 1$;
\item $\mathrm{hom}(\mathcal{E},\mathcal{E})=\mathrm{hom}(\mathcal{Q}^{\vee},\mathcal{Q}^{\vee})=1$ and $\mathrm{ext}^i(\mathcal{E},\mathcal{E})=\mathrm{ext}^i(\mathcal{Q}^{\vee},\mathcal{Q}^{\vee})=0$ for $i\geq 1$;
\item $\mathrm{ext}^2(\mathcal{Q}^{\vee},\mathcal{E})=1$ and $\mathrm{hom}(\mathcal{Q}^{\vee},\mathcal{E})=\mathrm{ext}^1(\mathcal{Q}^{\vee},\mathcal{E})=\mathrm{ext}^3(\mathcal{Q}^{\vee},\mathcal{E})=0$.
\end{enumerate}
\end{Lem}
\begin{proof} \leavevmode
\begin{enumerate}
\item Applying $\mathrm{Hom}(\mathcal{E},- )$ to the standard exact sequence $0\to \mathcal{Q}^{\vee}\to \mathcal{O}_X^{\oplus 6}\to \mathcal{E}^{\vee}\to 0$, we get an exact sequence $$0\rightarrow\mathrm{Hom}(\mathcal{E},\mathcal{Q}^{\vee})\rightarrow H^0(\mathcal{E}^{\vee})^{\oplus 6 }\rightarrow H^0(X,\mathcal{E}^{\vee}\otimes\mathcal{E}^{\vee})\rightarrow H^1(X,\mathcal{E}^{\vee}\otimes \mathcal{Q}^{\vee})\rightarrow 0 . $$
We claim that $H^1(X,\mathcal{E}^{\vee}\otimes \mathcal{Q}^{\vee})=0$ and $H^k(X,\mathcal{E}^{\vee}\otimes\mathcal{E}^{\vee})=0$ for $k\geq 1$. Since $\chi(\mathcal{E},\mathcal{E}^{\vee})=31$ and $\mathrm{h}^0(\mathcal{E}^{\vee})=6$, we get $\mathrm{Hom}(\mathcal{E},\mathcal{Q}^{\vee})=\mathbb{C}^5$. The claim on vanishing of $H^1(X,\mathcal{E}^{\vee}\otimes \mathcal{Q})$ and $H^{k\geq 1}(X,\mathcal{E}^{\vee}\otimes\mathcal{E}^{\vee})=0$ follows from applying the Borel--Bott--Weil theorem to the cohomologies of the vector bundles $\mathcal{E}^{\vee}\otimes\mathcal{E}^{\vee}$ and $\mathcal{E}^{\vee}\otimes \mathcal{Q}^{\vee}$ over $\mathrm{Gr}(2,6)$, via the Koszul complex associated to $X\hookrightarrow\mathrm{Gr}(2,6)$.
\item This follows from the exceptionality of $\mathcal{E}$ and $\mathcal{Q}$.
\item Note that $\mathrm{ext}^i(\mathcal{Q}^{\vee},\mathcal{E})=\mathrm{ext}^{3-i}(\mathcal{E}, \mathcal{Q}^{\vee}(-1))=\mathrm{ext}^{3-i}(\mathcal{E}(1), \mathcal{Q}^{\vee})=\mathrm{ext}^{3-i}(\mathcal{E}^{\vee}, \mathcal{Q}^{\vee})=\mathrm{ext}^{3-i}(\mathcal{Q}, \mathcal{E})$. Applying $\mathrm{Hom}(\mathcal{Q}, -)$ to the tautological short exact sequence, the statement follows from (2).
\end{enumerate}
\end{proof}
\subsection{Inequalities in Theorem \ref{thm:skyscraper projection stability}} \label{5.9computation}
In this subsection, we compute inequalities used in the proof of Proposition \ref{thm:skyscraper projection stability}.
Recall that
\begin{itemize}
\item $g=6$: $(\alpha_0, \beta_0)=(\frac{1}{20}, -\frac{9}{10})$,
\item $g=7$: $(\alpha_0, \beta_0)=(\frac{1}{12}, -\frac{5}{6})$,
\item $g=8$: $(\alpha_0, \beta_0)=(\frac{1}{25}, -\frac{22}{25})$,
\item $g=9$: $(\alpha_0, \beta_0)=(\frac{1}{8}, -\frac{3}{4})$,
\item $g=10$: $(\alpha_0, \beta_0)=(\frac{1}{25}, -\frac{22}{25})$,
\item $g=12$: $(\alpha_0, \beta_0)=(\frac{1}{25}, -\frac{21}{25})$.
\end{itemize}
\begin{Lem}
Let $X:=X_{2g-2}$. If we assume that $[A]=av+bw$ and $[B]=cv+dw$ for $a,b,c,d\in \mathbb{Z}$, then the solutions of inequalities
\begin{enumerate}[(1)]
\item $[A]+[B]=[i^*\oh_x[-1]]$;
\item $\Im Z^0_{\alpha_0, \beta_0}(A)\cdot \Im Z^0_{\alpha_0, \beta_0}(i^*\oh_x[-1])\geq 0$ and $\Im Z^0_{\alpha_0, \beta_0}(B)\cdot \Im Z^0_{\alpha_0, \beta_0}(i^*\oh_x[-1])\geq 0$;
\item $\mu^0_{\alpha_0, \beta_0}(A)>\mu^0_{\alpha_0, \beta_0}(B)$;
\item $1-\chi(A,A)+1-\chi(B,B)\leq \ext^1(i^*\oh_x,i^*\oh_x)$
\end{enumerate}
are listed below:
\begin{enumerate}[(i)]
\item $g=6$ and ordinary: $(a,b,c,d)=(-2,1,-3,2)$;
\item $g=6$ and special: $(a,b,c,d)=(-2,1,-3,2)$ or $(a,b,c,d)=(-4,2,-1,1)$;
\item $g=7$:
there are no solutions;
\item $g=8$: $(a,b,c,d)=(-2,1,-5,3)$ or $(a,b,c,d)=(-4,2,-3,2)$;
\item $g=9$:
there are no solutions;
\item $g=10$:
there are no solutions;
\item $g=12$:
there are no solutions.
\end{enumerate}
\end{Lem}
\begin{proof}
Note that for genus $g= 6, 8$ and $12$, there are only finitely many $(a,b,c,d)\in \mathbb{Z}^{\oplus 4}$ satisfying the conditions $(1)$ and $(4)$. Thus from a simple computation we obtain solutions to $(i), (ii), (iv)$ and $(vii)$.
\begin{itemize}
\item $g=7$: $(1)$ and $(4)$ give
\begin{equation} \label{71}
\frac{1}{6}(-6a-\sqrt{33}-6)\leq b\leq \frac{1}{6}(-6a+\sqrt{33}-6).
\end{equation}
From $(2)$ we obtain
\begin{equation}\label{72}
\frac{1}{12}>\frac{13a+16b}{48}\geq 0.
\end{equation}
The combination of \eqref{71} and \eqref{72} implies $-11\leq a\leq -1$. Then it is not hard to check that the only possible solution $(a,b)$ for \eqref{71} and \eqref{72} is $(a,b)=(-6, 5)$. But this contradicts $(3)$.
\item $g=9$: $(1)$ and $(4)$ give
\begin{equation} \label{91}
\frac{1}{4}(-2a-\sqrt{3}-2)\leq b\leq \frac{1}{4}(-2a+\sqrt{3}-2).
\end{equation}
From $(2)$ we obtain
\begin{equation}\label{92}
\frac{1}{16}>\frac{11a+32b}{128}\geq 0.
\end{equation}
The combination of \eqref{91} and \eqref{92} implies $-7\leq a\leq -1$. Then it is not hard to check that there are no integer solutions $(a,b)$ for \eqref{91} and \eqref{92}.
\item $g=10$: $(1)$ and $(4)$ give
\begin{equation} \label{101}
\frac{1}{6}(-4a-\sqrt{7}-3)\leq b\leq \frac{1}{6}(-4a+\sqrt{7}-3).
\end{equation}
From $(2)$ we obtain
\begin{equation}\label{102}
\frac{167}{1875}>\frac{611a+1200b}{5625}\geq 0.
\end{equation}
The combination of \eqref{101} and \eqref{102} implies $-8\leq a\leq -1$. Then it is not hard to check that there are no integer solutions $(a,b)$ for \eqref{101} and \eqref{102}.
\end{itemize}
\end{proof}
\subsection{Inequalities in Proposition \ref{gneq6cone}}
In this subsection, we compute the inequalities used in the proof of Proposition \ref{gneq6cone}.
\begin{Lem} \label{inequality}
Let the notation and assumptions be as in Case 1.2 of the proof of Proposition \ref{gneq6cone}. If we assume $[B]=av+bw+c[\mathcal{E}]$, then the inequalities
\begin{itemize}
\item $\Im(Z^0_{\alpha_g, \beta_g}(A))\geq 0, \Im(Z^0_{\alpha_g, \beta_g}(B))> 0$,
\item $\Im(Z^0_{\alpha_g, \beta_g}(\ker(\lambda)))>0$,
\item $\mu^0_{\alpha_g, \beta_g}(\ker(\lambda))<\mu^0_{\alpha_g, \beta_g}(\mathcal{E})$,
\item $\mu^0_{\alpha_g, \beta_g}(C)>\mu^0_{\alpha_g, \beta_g}(B)> \mu^0_{\alpha_g, \beta_g}(\mathcal{E})$,
\item $c>0,a<0$.
\end{itemize}
imply that $\frac{b}{a}\geq \mu(\mathcal{E})$ for $g\neq 7$ and $\frac{b}{2a}\geq \mu(\mathcal{E})$ when $g=7$.
\end{Lem}
\begin{proof}
We assume that $\frac{b}{a}< \mu(\mathcal{E}_g)$ for $g\neq 7$ and $\frac{b}{2a}< \mu(\mathcal{E}_g)$ when $g=7$, and we will show that there are no such integers $a,b,c \in \mathbb{Z}$.
Recall that $(\alpha_7, \beta_7)=(\frac{\sqrt{71}}{84},-\frac{71}{84})$, $(\alpha_8, \beta_8)=(\frac{2\sqrt{79}}{875},-\frac{122}{125})$, $(\alpha_9, \beta_9)=(\frac{\sqrt{31}}{40},-\frac{31}{40})$, $(\alpha_{10},\beta_{10})=(\frac{\sqrt{\frac{5}{3}}}{33},-\frac{10}{11})$, and $(\alpha_{12}, \beta_{12})=(\frac{1}{22},-\frac{19}{22})$.
First we assume that $g$ is even.
In this case $\mu(\mathcal{E}_g)=-\frac{1}{2}$ and $\mathrm{ch}_{\leq 2}(B)=(a+2c,(b-c)H,(\frac{g-4}{2}c-\frac{g}{2}a-\frac{3g-6}{2}b)L)$. We have:
\begin{itemize}
\item $0< \frac{(g-4)c-ga-(3g-6)b}{4g-4} -\beta_g(b-c) +\frac{a+2c}{2}(\beta^2_g-\alpha^2_g)\leq \frac{\beta_g^2-\alpha^2_g}{2}$,
\item $0> \frac{-ga-(3g-6)b}{4g-4} -\beta_gb +\frac{a}{2}(\beta^2_g-\alpha^2_g)$,
\item $\frac{\beta_g a-b}{\frac{-ga-(3g-6)b}{4g-4} -\beta_gb +\frac{a}{2}(\beta^2_g-\alpha^2_g)}<\frac{1+2\beta_g}{\frac{g-4}{4g-4}+\beta_g+\beta^2_g-\alpha^2_g}$,
\item $ \frac{2\beta_g}{\beta_g^2-\alpha_g^2}>\frac{\beta_g (a+2c)-(b-c)}{\frac{(g-4)c-ga-(3g-6)b}{4g-4} -\beta_g(b-c) +\frac{a+2c}{2}(\beta^2_g-\alpha^2_g)}>\frac{1+2\beta_g}{\frac{g-4}{4g-4}+\beta_g+\beta^2_g-\alpha^2_g}$,
\item $a<0$,
\item $-\frac{1}{2}a<b$.
\end{itemize}
When $g=8$, we have:
\begin{enumerate}
\item $0< \frac{2332a+4081b+1458c}{12250}\leq \frac{2916}{6125}$,
\item $b<-\frac{4}{7}a$,
\item $-\frac{99632}{303389}a<b<-\frac{4}{7}a$,
\item $-\frac{2989}{1458}> \frac{\frac{-122(a+2c)}{125}-(b-c)}{\frac{2332a+4081b+1485c}{12250}} >-\frac{5831}{729}$,
\item $c>0, a<0$,
\item $-\frac{1}{2}a<b$.
\end{enumerate}
Now $(b), (c),(e)$ and $(f)$ imply
\begin{equation} \label{g=8bcf}
-\frac{1}{2}a<b<-\frac{4}{7}a.
\end{equation}
Also $(a)$ is equivalent to
\begin{equation} \label{g=8a}
-\frac{583(4a+7b)}{1458}<c\leq -\frac{583(4a+7b)-5832}{1458}.
\end{equation}
Thus \eqref{g=8bcf}, \eqref{g=8a} and $(d)$ imply
\begin{align} \label{g=8fin1}
&-\frac{110773008}{11281063}<a\leq -\frac{66479}{9558}, -\frac{a}{2}<b<-\frac{4(2654501a-13846626)}{32517071}, \\ &-\frac{213500a+115559b}{256419}<c\leq -\frac{583(4a+7b)-5832}{1458} \nonumber
\end{align}
or
\begin{equation} \label{g=8fin2}
-\frac{66479}{9558}<a<0, -\frac{a}{2}<b<-\frac{4}{7}a, -\frac{213500a+115559b}{256419}<c\leq -\frac{583(4a+7b)-5832}{1458}.
\end{equation}
Thus we have $-9\leq a<0$, and it is not hard to see that there are no such integers $a,b,c$ satisfying either \eqref{g=8fin1} or \eqref{g=8fin2}.
When $g=10$ or $12$, the computation is similar to the $g=8$ case, so we omit the details.
Now we assume that $g=7$, thus $\mathrm{ch}_{\leq 2}(B)=(2a+5c,(b-2c)H,(-5a-6b)L)$. In this case we have:
\begin{enumerate}
\item $0< \frac{290a+348b+71c}{1008} \leq \frac{335}{1008}$,
\item $b<-\frac{5}{6}a$,
\item $-\frac{3679}{4926}a<b<-\frac{5}{6}a$,
\item $-\frac{2244}{71}<\frac{-\frac{71}{84}(2a+5c)-(b-2c)}{\frac{290a+348b+71c}{1008} }<-\frac{12}{5}$,
\item $c>0, a<0$,
\item $-\frac{4}{5}a<b$.
\end{enumerate}
Now $(b),(c),(e)$ and $(f)$ imply
\begin{equation} \label{g=7bcef}
-\frac{4}{5}a<b<-\frac{5}{6}a.
\end{equation}
Also $(a)$ is equivalent to
\begin{equation} \label{g=7a}
-\frac{58(5a+6b)}{71}<c\leq -\frac{58(5a+6b)-335}{71}.
\end{equation}
Thus \eqref{g=7bcef}, \eqref{g=7a} and $(d)$ imply
\begin{equation} \label{g=7fin1}
-\frac{804}{71}<a<0, -\frac{4}{5}a<b<-\frac{5}{6}a, \frac{-35a-6b}{72}<c\leq -\frac{58(5a+6b)-335}{71}
\end{equation}
or
\begin{equation} \label{g=7fin2}
-\frac{24120}{1309}<a\leq -\frac{804}{71}, -\frac{4}{5}a<b<\frac{4824-3679a}{4926}, \frac{-35a-6b}{72}<c\leq -\frac{58(5a+6b)-335}{71}.
\end{equation}
It is not hard to see that the only possible solution of \eqref{g=7fin1} and \eqref{g=7fin2} is $(a,b,c)=(-11,9,5)$, i.e. $\mathrm{ch}_{\leq 2}(B)=(3,-H,L)$. But since $B$ is $\sigma^0_{\alpha_g, \beta_g}$-semistable, this contradicts Lemma \ref{SBGg=7}.
Finally we assume that $g=9$. Then $\mathrm{ch}_{\leq 2}(B)=(a+3c,(b-c)H,(-3a-8b)L)$. In this case we have:
\begin{enumerate}
\item $0< \frac{33a+88b+31c}{320}\leq \frac{93}{320}$,
\item $b<-\frac{3}{8}a$,
\item $-\frac{509}{3703}a<b<-\frac{3}{8}a$,
\item $-\frac{8}{3}> \frac{-\frac{31}{40}(a+3c)-(b-c)}{\frac{33a+88b+31c}{320}} >-\frac{424}{31}$,
\item $c>0, a<0$,
\item $-\frac{1}{3}a<b$.
\end{enumerate}
Now $(b),(c),(e)$ and $(f)$ imply
\begin{equation} \label{g=9bcef}
-\frac{1}{3}a<b<-\frac{3}{8}a.
\end{equation}
Also $(a)$ is equivalent to
\begin{equation} \label{g=9a}
-\frac{11(3a+8b)}{31}<c\leq -\frac{11(3a+8b)-93}{31}.
\end{equation}
Thus \eqref{g=9bcef}, \eqref{g=9a} and $(d)$ imply
\begin{equation} \label{g=9fin1}
-8<a<0, -\frac{1}{3}a<b<-\frac{3}{8}a, \frac{-15a-8b}{32}<c\leq \frac{-33a-88b+93}{31}
\end{equation}
or
\begin{equation} \label{g=9fin2}
-\frac{2976}{265}<a\leq -8, -\frac{1}{3}a<b<\frac{992-197a}{856}, \frac{-15a-8b}{32}<c\leq \frac{-33a-88b+93}{31}
\end{equation}
Then it is not hard to see that there are no integers $a,b,c$ satisfying either \eqref{g=9fin1} or \eqref{g=9fin2}.
\end{proof}
\begin{Lem} \label{g=6inequality}
Let the notation and assumptions be as in Case 2 of the proof of Proposition \ref{gneq6cone}. If we assume $[B]=av+bw+c[\mathcal{E}]$, then the inequalities
\begin{itemize}
\item $\Im(Z^0_{\alpha_g, \beta_g}(A))\geq 0, \Im(Z^0_{\alpha_g, \beta_g}(B))> 0$,
\item $\Im(Z^0_{\alpha_g, \beta_g}(i^*(A)))\geq 0$,
\item $\mu^0_{\alpha_g, \beta_g}(C)>\mu^0_{\alpha_g, \beta_g}(B)\geq \mu^0_{\alpha_g, \beta_g}(\mathcal{E})$,
\item $c>0, a<0$.
\end{itemize}
imply that $\frac{b}{a}\geq \mu(\mathcal{E})$, or $(a,b)=(-1,1),(-3,2)$.
\end{Lem}
\begin{proof}
We assume that $\frac{b}{a}<\mu(\mathcal{E})$, i.e. $-\frac{1}{2}a<b$. In this case we have $g=6$ and $\mathrm{ch}_{\leq 2}(B)=(a+2c, (b-c)H, (c-3a-6b)L)$. We have:
\begin{enumerate}
\item $0< \frac{83a+240b+6c}{800} \leq \frac{323}{800}$,
\item $b\leq \frac{305-83a}{240}$,
\item $-\frac{720}{323}> \frac{-\frac{9}{10}(a+2c)-(b-c)}{\frac{83a+240b+6c}{800}} \geq -\frac{320}{3}$,
\item $c>0, a<0$,
\item $-\frac{1}{2}a<b$.
\end{enumerate}
Now $(a)$, $(b)$, $(c)$, $(d)$ and $(e)$ imply
\begin{equation}
-5<a<0, -\frac{1}{2}a<b\leq \frac{305-83a}{240}, -\frac{216a+107b}{253}<c\leq -\frac{83a+240b-323}{6}
\end{equation}
or
\begin{equation}
-\frac{253}{32}<a\leq -5, -\frac{1}{2}a<b<\frac{253-61a}{186}, -\frac{216a+107b}{253}<c\leq -\frac{83a+240b-323}{6}.
\end{equation}
It is not hard to see that the only possible values of $a,b \in \mathbb{Z}$ are $(a,b)=(-1,1)$ and $(a,b)=(-3,2)$.
\end{proof}
From a similar computation as in Lemma \ref{g=7wall1}, we have the following lemma:
\begin{Lem} \label{wall_3v-2w}
Let $X:=X_{10}$. Then there are no walls for the class $3v-2w$ on the line $\beta=\beta_6=-\frac{9}{10}$ with respect to $\sigma_{\alpha,-\frac{9}{10}}$.
\end{Lem}
\end{appendix}
\bibliographystyle{alpha}
{\small{ |
\section{Introduction}
\IEEEPARstart{S}{ign} language is a basic communication tool between normal people and hearing-impaired people or between hearing-impaired people\cite{wei2020semantic}. The transmission of sign language information includes not only gestures and hand shapes, but also facial expressions and body postures. Sign language also has its own vocabulary like normal language. In the process of using sign language to communicate, vocabulary information is conveyed among people through one or a group of gesture actions as a bridge of information\cite{rastgoo2021sign}\cite{elakkiya2021machine}.\par
Video-based sign language recognition was used to identify isolated words in sign language in the early days. A video clip corresponds to a sign language word without considering the continuity of sign language. In order to perform sign language recognition more accurately, the researchers conducted a continuous sign language recognition (CSLR) study, the purpose of which was to convert a sign language video into a continuous sign language vocabulary. Due to the huge cost of frame-level annotation when creating continuous sign language video datasets, continuous sign language datasets often only have video-level annotations but no frame-level annotations, which is why researchers usually regard CSLR as weakly supervised learning\cite{koller2017re}. In view of the fact that the dataset has no frame-level annotations in CSLR, many deep learning models have been proposed and applied in CSLR\cite{han2022sign}\cite{khedkar2021analysis}\cite{adaloglou2021comprehensive}\cite{wadhawan2021sign}. According to the methods of spatiotemporal feature extraction in these models, we divide the deep learning-based models for CSLR into two classes: One is the spatial-temporal hierarchical model, which first extracts feature information from frame-level images, then extracts temporal feature information based on continuous frame-level feature sequences, and finally identification and classification are performed. The other type is the non-spatial-temporal hierarchical model, which directly extracts spatial and temporal feature information from the video for identification and classification.\par
\begin{figure*}
\begin{center}
\includegraphics[width=3.5in]{pdf/figures1.pdf}\\
\caption{Example of Autocorrelation Matrix Visualization Plot for Frame-Level Feature Sequences of Video Data.}\label{fig:ljxy1}
\end{center}
\end{figure*}
In the spatial-temporal hierarchical model, the extraction of spatial and temporal information from continuous sign language data is performed in series. Usually, convolutional neural network(CNN)\cite{krizhevsky2012imagenet} is used for spatial embedding, high-dimensional feature information is extracted from low-dimensional image information, and then recurrent neural network(RNN)\cite{cui2019deep}, Transformer\cite{de2020sign} or Long Short Term Memory(LSTM)\cite{tran2020overall} is used for processing in the temporal dimension to obtain high-dimensional sparse semantic information for final recognition and classification. The spatial-temporal hierarchical model has the characteristics of simple model, few parameters and clear layers, etc. It is the mainstream direction of model research in CSLR at present. However, because the spatial and temporal information are extracted and fused separately, there will inevitably be a loss of spatial and temporal information in this process, which will affect the final recognition accuracy. In the non-spatial-temporal hierarchical model, the spatial and temporal information extraction of data is carried out in parallel, that is, the data is processed in the spatial and temporal dimensions at the same time, usually using 3D-CNN\cite{li2020spatio}\cite{huang2018attention}, 2+1D-CNN\cite{koishybay2021continuous}, spatial-temporal Transformer\cite{liu2021st} and other methods. The non-spatial-temporal hierarchical model can obtain more spatial-temporal information, but its model parameters are large and the model is cumbersome. Since reducing the model calculation amount will inevitably lead to the loss of model accuracy, this paper aims to reduce the model calculation amount and improve the real-time performance under a certain range of accuracy loss. This paper mainly focuses on the deep learning-based spatial-temporal hierarchical CSLR model. In our research on the spatial-temporal hierarchical model, we found that: 1) The images between adjacent frames have high similarity in content, as shown in Figure 1, after feature extraction of frame-level images, adjacent feature vectors in the generated autocorrelation matrix have high similarity. 2) In the spatial-temporal hierarchical model, most of the computation of the model is concentrated on the extraction of video frame-level features, and the feature information extraction for each frame of the video is independent of each other. Therefore, this paper reduces the computational complexity of the model by reconstructing the sparse data into dense feature sequences while keeping the original spatial-temporal hierarchical model unchanged.\par
In this paper, a temporal super-resolution network(TSRNet) is proposed to reconstruct the sparse feature sequence into a dense feature sequence, which mainly includes two branches: a detailed descriptor and a rough descriptor, and the two types of features obtained from the two branches are fused as the reconstructed features. The model for CSLR based on this network is on the basis of the spatial-temporal hierarchical CSLR model MSTNet\cite{zhu2022multi} proposed in our previous research. First, the source video data is sparsely sampled to reduce the computational load of the frame-level feature extraction part in the spatial-temporal hierarchical model, and then the dense frame-level feature sequence reconstruction is performed through the TSRNet, and then the CTC loss\cite{graves2006connectionist} is used for training optimization after the time-series feature extraction part. The overall model is trained by the self-generating adversarial method proposed in this paper. The TSRNet is regarded as the generator, and the frame-level processing part and the time series processing part are regarded as the discriminator. The training process is divided into two steps. In addition, this paper also proposes WERD as a new criterion for evaluating the effectiveness of the proposed network. The error rate between the estimated WER and the reference WER obtained respectively by the reconstructed frame-level feature sequence and the complete original frame-level feature sequence is taken as WERD.\par
The main three contributions of this paper are as follows:\par
\begin{itemize}
\item[$\bullet$] A TSRNet is proposed, which greatly reduces the computational complexity of the original spatial-temporal hierarchical CSLR model, and the network can be flexibly inserted into any spatial-temporal hierarchical CSLR model.
\item[$\bullet$] The WERD is proposed as a new criterion to unify the criterion for model accuracy loss under different benchmarks.
\item[$\bullet$] A self-generating adversarial training method is proposed to reduce the final error.
\end{itemize}
\section{Related work}
This section will review related research from two aspects: existing CSLR methods, and related video super-resolution methods.\par
\subsection {Continuous Sign Language Recognition}
Video-based CSLR is the translation of continuous sign language videos into understandable written phrases or spoken words. In the early days of CSLR, methods such as Hidden Markov Model(HMM) were usually used for recognition, but with the development of deep learning, CNNs were introduced into CSLR, and combined with HMM to form a "CNN+HMM" hybrid model\cite{koller2017re}\cite{koller2016deep}. Koller et al.\cite{koller2018deep} embedded a CNN into an HMM end-to-end while interpreting the CNN output in a Bayesian framework, and the hybrid CNN-HMM combines the strong discriminative ability of CNNs with the sequence modeling ability of HMMs. Camgoz et al.\cite{koller2019weakly} follow a hybrid approach to embed a powerful CNN-LSTM model into each HMM stream to discover properties that themselves lack sufficient discriminative power for recognition. With the emergence of RNN and CTC, the hybrid model composed of "CNN+RNN+CTC" using RNN instead of HMM is widely used in continuous sign language recognition\cite{wei2020semantic}\cite{al2021deep}. The hybrid model mainly uses 2D-CNN for frame-level feature extraction, then uses RNN for time series processing, and finally uses CTC for training and decoding. Huang et al.\cite{huang2021boundary} developed a novel boundary-adaptive encoder-based approach for sign language recognition combined with window attention, achieving competitive results on popular benchmarks. Gao et al.\cite{gao2021rnn} proposed an efficient RNN converter-based approach for Chinese sign language processing, and designed a multi-level visual-level transcription network with frame-level, lexical-level and phrase-level BiLstm to explore multi-scale visual-semantic features . Min et al.\cite{min2021visual} proposed visual alignment constraints to enable CSLR networks to be end-to-end trainable by enforcing feature extractors to predict with more alignment supervision to address the overfitting problem of CTC in sign language recognition. These methods can be classified as spatial-temporal hierarchical models and are the most widely used CSLR methods.\par
In addition, some non-spatial-temporal hierarchical models such as "3D-CNN" and "2+1D-CNN" are also used in CSLR. Although the hybrid model of "CNN+RNN+CTC" can effectively recognize continuous sign language, the extraction of spatial-temporal features is separated. In order to extract spatial-temporal features more effectively, the 3D-CNN method is applied in CSLR\cite{sharma2021asl}\cite{han2022efficient}. Ariesta et al.\cite{ariesta2018sentence} proposed a sentence-level sign language method for deep learning combining 3D-CNN and Bi-RNN. Specifically, a 3D-CNN is used to extract features from each video frame, a Bi-RNN is used to extract unique features from the sequential behavior of video frames, and then a possible sentence is generated. Han et al.\cite{han2022sign} used "2+1D-CNN" for feature extraction and proposed a lightweight spatiotemporal channel attention module, including two sub-modules channel temporal attention and spatiotemporal attention, by combining squeeze and excitation attention combined with self-attention enables the network to focus on important information in spatial, temporal, and channel dimensions.\par
This paper mainly conducts research on the basis of the spatial-temporal hierarchical model. First, frame-level feature extraction is performed, then feature reconstruction is performed through a TSRNet, and time-series feature extraction is performed. Finally, CTC loss is used for identification and classification.\par
\subsection {Video Super Resolution}
Video super-resolution is an extension of the image super-resolution task, which restores low-resolution video images into high-resolution video images. It can fully utilize the inter-frame information in the restoration process to obtain better performance. Video super-resolution can be divided into two classes according to whether adjacent frames are aligned with the target frame: alignment methods and non-alignment methods. Alignment methods include motion compensation methods and deformable convolution methods, and non-alignment methods include spatial non-alignment methods and spatial-temporal non-alignment methods\cite{liu2022video}\cite{song2021multi}\cite{song2022learning}\cite{zhu2021video}. These methods are all aimed at restoring the spatial resolution of the video. In video super-resolution, there is another method aimed at restoring the video timing resolution, which is video frame interpolation. This method is different from the method of restoring the video from low resolution to high resolution, in that it needs to make full use of the inter-frame information to restore the current frame in the time dimension. Chen et al.\cite{cheng2021multiple} proposed an enhanced deformable separable network for video frame interpolation by processing adaptive offsets, kernels, masks, and biases learned from information in non-local neighborhoods, which has fewer parameters and improves the performance of kernel-based methods. Kalluri et al.\cite{kalluri2020flavr} propose a fully end-to-end trainable flowless method for multi-frame video interpolation, which aims to implicitly infer nonlinear motion trajectories and complex occlusions from unlabeled videos, and greatly simplifies the process of training, testing, and deploying frame interpolation models. In this study, our proposed method is most similar to the video frame interpolation method, which utilizes the inter-frame feature information to recover adjacent feature information in the temporal dimension using frame interpolation.\par
\begin{figure*}
\begin{center}
\includegraphics[width=5in]{pdf/figures2.pdf}\\
\caption{Overall architecture diagram of continuous sign language recognition model via temporal super-resolution network.}\label{fig:ljxy2}
\end{center}
\end{figure*}
\section{Methodology}
The overall architecture of the CSLR model via TSRNet proposed in this paper is shown in Figure 2. The model mainly consists of three parts: frame-level feature extraction, time series processing and TSRNet. In the model training stage, for the input sign language video, the frame-level feature sequence is first obtained through the frame-level feature extraction part. After down-sampling, a dense frame-level feature sequence is obtained through the TSRNet. Then, the final time series features are obtained through the time series processing part. Finally, the CTC loss is used for training optimization, and the sign language recognition results are obtained. The entire training phase is trained using our proposed self-generating adversarial training method, where the temporal super-resolution network is regarded as the generator, and the frame-level processing part and the temporal processing part are regarded as the discriminator. The network is trained using the down-sampled data of the frame-level feature sequence as the input of the temporal super-resolution network. And the training is divided into two steps, the first step is to train the spatial-temporal hierarchical model, and the second step is to train the TSRNet. In the model testing stage, the position of down-sampling is different from that in the training stage. At this time, the input sign language video is directly down-sampled and then the frame-level feature sequence is obtained through the frame-level feature extraction part. Then a dense frame-level feature sequence is obtained through the temporal super-resolution network TSRNet. Then go through the time series processing part. For the obtained timing features, use CTC to decode to get the final sign language recognition result.\par
The CSLR model via temporal super-resolution network is based on our previous research MSTNet\cite{zhu2022multi}. The frame-level feature extraction part and the time-series feature extraction part of the model are consistent with MSTNet, that is, the frame-level features are based on resnet-34, and the time-series features are extracted using the "1DCNN+Transformer" coding structure. In order to further reduce the computational cost of the model and improve the real-time performance of the model, this paper proposes the TSRNet. The details of the TSRNet will be introduced in section A. The proposed specific training and testing methods will be introduced in detail in section C.\par
\subsection {Temporal Super-Resolution Network}
The temporal super-resolution network mainly includes a detail descriptor and a coarse descriptor, as shown in Figure 3. The main branch is the detail descriptor. For the frame-level feature sequence with unified channel dimensions, the detailed description of the feature sequence is obtained by convolution of multiple 1-D residual blocks and 1-D transpose. Another branch is the rough descriptor, which directly up-samples the frame-level feature sequence to obtain a rough description of the feature sequence. The input of the temporal super-resolution network is the sparse frame-level feature sequence extracted by the spatiotemporal hierarchical model, and the output is the feature sequence obtained by fusing the detailed features and rough features. The feature sequence is the reconstructed dense frame-level feature sequence, which is used as the input of the sequential processing part of the subsequent spatiotemporal hierarchical model.\par
\begin{figure*}
\begin{center}
\includegraphics[width=5in]{pdf/figures3.pdf}\\
\caption{Framework of Temporal Super-Resolution Network.}\label{fig:ljxy3}
\end{center}
\end{figure*}
For an input sign language video $V=(x_1,x_2,...,x_T)=\{{x_t|_1^T\in \mathbb{R}^{T\times c\times h\times w}}\}$ containing $T$ frame, where $x_t$ is the t-th frame image in the video, $h\times w$ is the size of $x_t$, and $c$ is the number of channels. $V$ passes through the frame-level feature extractor $F_s$ of the spatial-temporal hierarchical model, and obtains the feature expression as follows:\par
\begin{equation}
f_1 = F_s(V)\in \mathbb{R}^{T\times c_1}
\end{equation}
where $c_1$ is the number of channels after feature extraction.\par
The dense frame-level feature sequence $f_1$ is down-sampled by $n$ times to obtain a sparse frame-level feature sequence, and then the time dimension and the channel dimension are exchanged to obtain the feature sequence $f_2\in \mathbb{R}^{c_1\times T_1}$, where $T_1=T/n$.\par
At this time, $f_2$ is the sparse feature sequence, which is the input of the temporal super-resolution network. Input $f_2$ to the two branches of the temporal super-resolution network, namely the detail descriptor and the coarse descriptor, respectively.\par
In the detail descriptor branch, the number of channels of the sparse feature sequence is first dimensionally increased by a 1D-CNN, and then batch normalized and activated by the activation function to obtain the sparse feature sequence $f_3\in \mathbb{R}^{c_2\times T_1}$. The activation function $\sigma$ is Relu, and $c_2$ is the number of channels after the ascension. Then the dimension-raising process can be described as:\par
\begin{equation}
f_3 = \sigma(BN(1D-CNN(f_2)))\in \mathbb{R}^{c_2\times T_1}
\end{equation}
Assuming that the entire dimension-raising process is $F_{1DCNN-Relu}$, equation(2) can be described as:\par
\begin{equation}
f_3 = F_{1DCNN-Relu}(f_2)\in \mathbb{R}^{c_2\times T_1}
\end{equation}
Then, for the sparse feature sequence $f_3$, the detailed features are extracted through several 1D-Resblocks to obtain the sparse feature sequence $f_3^{'}$. The number of channels and the time length of $f_3^{'}$ remain unchanged, which is consistent with $f_3$.\par
\begin{equation}
f_3^{'} = F_{Res_m}(f_3)\in \mathbb{R}^{c_2\times T_1}
\end{equation}
where $F_{Res_m}$ indicates that the number of 1D-Resblocks is $m$.\par
After that, use 1-dimensional transposed convolution for the sparse feature sequence $f_3^{'}$ in the time dimension, and up-sampling $n$ times to obtain the dense feature sequence $f_4\in \mathbb{R}^{c_3\times T}$, and the corresponding number of channels is also increased in dimension, $c_3$ is the number of channels after the up-dimension, $T$ is the original video frame length. For $f_4$, the process of formula (4) is performed again, and the dense feature sequence $f_4^{'}=F_{Res_k}(f_4)\in \mathbb{R}^{c_3\times T}$ is obtained by extracting features through $k$ 1D-Resblocks, and the number of channels and time length of $f_4^{'}$ remain unchanged.\par
$f_4^{'}$ is subjected to a 1D-CNN for dimensionality reduction, so that the number of channels is restored to be consistent with the input feature sequence, and then batch normalization is performed to obtain a dense feature sequence $f_5$.\par
\begin{equation}
f_5 = BN(1D-CNN(f_4^{'}))\in \mathbb{R}^{c_1\times T}
\end{equation}
Assuming that the entire dimensionality reduction process is $F_{1DCNN}$, equation (5) can be described as:\par
\begin{equation}
f_5 = F_{1DCNN}(f_4^{'})\in \mathbb{R}^{c_1\times T}
\end{equation}
In the rough descriptor branch, only the nearest neighbor interpolation $F_{nearest}$ is used for the sparse feature sequence $f_2$ to up-sample n times in the time dimension, resulting in a dense feature sequence $f_2^{'}\in \mathbb{R}^{c_1\times T}$\par
\begin{equation}
f_2^{'} =F_{nearest}(f_2)\in \mathbb{R}^{c_1\times T}
\end{equation}
Finally, the dense feature sequences $f_2^{'}$ and $f_5$ obtained by the two branches are fused, and the final output dense feature sequence is obtained through the activation function. $f_{Result}$ is the dense frame-level feature sequence reconstructed by the temporal super-resolution network.\par
\begin{equation}
f_{Result} =\sigma(f_2^{'}+f_5)
\end{equation}
Resblock, an important component in our proposed TSRNet, was originally proposed by He et al.\cite{he2016deep} in 2016, and its purpose is to address the problem of network degradation. That is, as the number of layers of the network deepens, the accuracy of the network decreases instead. The proposal of Resblock effectively addresses this problem, which makes the number of layers of the network increase sharply. Initially, ResBlock was used in classification tasks. Due to its excellent performance, it was introduced into other related fields and achieved excellent results. In the proposed model ConvNeXt, Liu et al.\cite{liu2022convnet} verified that the replacement of ordinary convolution with depth-wise convolution in ResBlock has no effect on model performance, but the amount of parameters is greatly reduced. This paper introduces the ResBlock structure into our model. Because we deal with 1D temporal data, we use 1D depth-wise convolution in 1D-Resblock, and its structure is shown in Figure 4.\par
\begin{figure}
\begin{center}
\includegraphics[width=1in]{pdf/figures4.pdf}\\
\caption{Structure of 1D-ResBlock.}\label{fig:ljxy4}
\end{center}
\end{figure}
Let the 1D-ResBlock map of layer be:
\begin{equation}
y =\sigma(BN(F_d(x)+x)
\end{equation}
where $x$ is the input data, $y$ is the output data, and $F_d(\cdot)$ is the 1D depth-wise convolution.\par
\subsection {Connectionist Temporal Classification}
CSLR belongs to weakly supervised learning. The input video is an unsegmented sequence and lacks a strict correspondence between video frames and labeled sequences. After encoding the input video sequence, it is very appropriate to use CTC as a decoder. CTC was originally designed for speech recognition, mainly to perform end-to-end temporal classification of unsegmented data to address the problem of mismatched lengths of input and output sequences. In recent years, it is often used in CSLR. In the CSLR model via TSRNet proposed in this paper: in the model training stage, for the final dense feature sequence, CTC Loss is used to train and optimize to obtain the optimal model; in the model testing stage, for the final time series features, using CTC decoding to get the final sign language recognition result.\par
CTC introduces a blank label $\{-\}$ to mark unclassified labels during decoding, that is, any words in the input video clip that do not belong to the sign language vocabulary, so that the input and output sequences can be matched, and the dynamic programming method is used for decoding\cite{min2021visual}.\par
For the input video $V$ of $T$ frames, the label of each frame is represented by $\pi=(\pi_1,\pi_2,...,\pi_T)$, where $\pi_T\in v\cup \{-\}$, and $v$ is the sign language vocabulary, then the posterior probability of the label is:\par
\begin{equation}
p(\pi|V)=\prod_{\substack{t=1}}^{\substack{T}}p(\pi_t|V)=\prod_{\substack{t=1}}^{\substack{T}}Y_{t,\pi_t}
\end{equation}
For a given sentence-level label $s=(s_1,s_2,...,s_L)$, where L is the number of words in the sentence. CTC defines a many-to-one mapping B, whose operation is to remove blank labels and duplicate labels (eg, $B(-g-re-e-n-)=B(-gr-e-en-)=green$) in the path, then the conditional probability of label s is the sum of the occurrence probabilities of all corresponding paths:\par
\begin{equation}
p(s|V)=\sum_{\substack{\pi\in B^{-1}(s)}}p(\pi|V)
\end{equation}
Where $B^{-1}(s)=\{\pi|B(\pi)=s\}$ is the inverse mapping of B. CTC loss is defined as the negative log-likelihood of the conditional probability of s.\par
\begin{equation}
L_{CTC}=-\ln p(s|V)
\end{equation}
The final sign language recognition result is obtained by CTC decoding after normalization by Softmax function.\par
\begin{figure}
\begin{center}
\includegraphics[width=2.5in]{pdf/figures5.pdf}\\
\caption{The spatial-temporal hierarchical model architecture.}\label{fig:ljxy5}
\end{center}
\end{figure}
\subsection {Model Training and Testing Process}
The TSRNet proposed in this paper belongs to the super-resolution model. The commonly used training method in super-resolution models is to use L1 loss or L2 loss as the loss function, which reflects the accuracy of the estimated value by judging the distance between the estimated value and the reference value, considering the gap of a single data level\cite{dong2015image}\cite{wang2019end}. However, what this paper wants to reconstruct is the feature vector. If only the gap between the data is considered, the result is bound to be unsatisfactory. Because each feature vector is a whole, it represents the integrated high-dimensional information, and the value may be very small after multiple feature extractions, so the similarity between vectors needs to be considered at this time. This paper draws on the training method of generative adversarial network(GAN)\cite{radford2015unsupervised}, applies it to our model training, and proposes a self-generating adversarial training method to train the temporal super-resolution network, which greatly improves the final error rate. The training and testing process of the self-generating adversarial training method is described in detail below.\par
\emph{Training:} During the training process, we use the self-generating adversarial training method to train the temporal super-resolution network. We consider the temporal super-resolution network as the generator and the spatial-temporal hierarchical model as the discriminator. First, the original sign language video is input into the frame-level feature extraction part of the spatial-temporal hierarchical model to obtain the frame-level feature sequence, and the down-sampling data is used as the input of the temporal super-resolution network to train the network. And the training is divided into two steps, the first step is to train the spatial-temporal hierarchical model, and the second step is to train the TSRNet.\par
\begin{figure*}
\begin{center}
\includegraphics[width=5in]{pdf/figures6.pdf}\\
\caption{Overall model architecture after inserting temporal super-resolution network.}\label{fig:ljxy6}
\end{center}
\end{figure*}
Step 1: Train the spatial-temporal hierarchical model, as shown in Figure 5. The original sign language video data is used as the input of CNN to extract frame-level features, and then the processed time-series features are obtained through the time-series processing module. Finally, the labeled video-level phrases are used as labels, and CTC Loss is used for training, and the final model obtained is used as the discriminator.\par
Step 2: Train the TSRNet, as shown in Figure 6. First, insert the TSRNet between the frame-level feature extraction part and the time-series feature extraction part of the spatial-temporal hierarchical model, freeze the parameters of the spatial-temporal hierarchical model trained in the first step, and only train the TSRNet parameters. Then, using the original sign language video as input, the frame-level feature sequence is obtained through the frame-level feature extraction part of the spatial-temporal hierarchical model, and the frame-level feature sequence is sparse according to the set down-sampling multiple. Then the sparse frame-level feature sequence is input into the temporal super-resolution network for reconstruction, and the reconstructed dense frame-level feature sequence is obtained. Finally, the sequence is input into the time-series processing part of the spatial-temporal hierarchical model to obtain the final time-series features, which are trained using CTC loss according to the phrase annotation.\par
Here, in order to increase the robustness, proportional random sampling is used in the process of sparseness. Assuming that the multiple of down-sampling is 4 and the length of the frame-level feature sequence is T, then the dense frame-level feature sequence slices the sequence with a width of 4 and divides it into $n$ segments, where $n=T/4$. Then a random feature vector is taken from each segment and reconstructed into a sparse feature sequence, which is the input of the TSRNet.\par
\emph{Testing:} During testing, the difference from training is the location of down-sampling. Firstly, the input video data is directly down-sampled to obtain sparse video data, which is input to the frame-level extraction part of the spatial-temporal hierarchical model to obtain frame-level features. Then, a dense frame-level feature sequence is obtained by reconstruction through the TSRNet. The resulting dense frame-level feature sequence is then input into the temporal processing part of the spatial-temporal hierarchical model. Finally, for the obtained timing features, the final recognition result is obtained through CTC decoding, as shown in the test part of Figure 2.\par
\section{Experiment}
In this section, we conduct comprehensive experiments on two widely used sign language recognition datasets to verify the effectiveness of the proposed model. A series of ablation experiments are performed to demonstrate the effect of each component of the proposed model. For the evaluation criteria proposed in this paper, we describe in detail in section C.\par
\subsection {Dataset}
RWTH-PHOENIX-Weather-2014(RWTH) dataset\cite{koller2015continuous}: RWTH is recorded by a public weather radio station in Germany. All presenters wear dark clothing and performed sign language in front of a clean background. The videos in this dataset are recorded by 9 different presenters with a total of 6841 different signed sentences (where the number of sign language word instances is 77321 and the number of vocabulary words is 1232). All videos are preprocessed to a resolution of $210\times 260$, and a frame rate of 25 frames per second (FP/S). The dataset is officially divided into 5,672 training samples, 540 validation samples, and 629 test samples.\par
Chinese Sign Language(CSL) dataset\cite{huang2018video}: CSL is captured using a Microsoft Kinect camera and contains 100 sentences of everyday Chinese language, each sentence demonstrates 5 times by 50 presenters with a vocabulary size of 178. The video resolution is $1280\times 720$ and the frame rate is 30 FP/S. The performance diversity of this dataset is richer because the demonstrators wear different clothes and demonstrate different speeds and ranges of motion. In the absence of official segmentation, we divide the CSL dataset into a training set and a test set according to the 8:2 rule. The training set accounts for 80\% and the test set accounts for 20\%, that is, it is divided into a training set of 20,000 samples and a test set of 5,000 samples, and make sure that the sentences in the training and test sets are the same, but the presenters are different.\par
\begin{table*}[!htbp]
\centering
\caption{Comparison of the experimental results of TSRNet on the RWTH dataset and the other two methods}
\label{tab:aStrangeTable1
\begin{tabular}{c|c|c|c|c|c|c|c|c|c|c|c|c}
\hline
\multirow{3}{*}{Down-sampling factor}& \multicolumn{4}{c|}{TSRNet}& \multicolumn{4}{c|}{Nearest neighbor interpolation}& \multicolumn{4}{c}{Linear interpolation}\\
\cline{2-13}
& \multicolumn{2}{c|}{WER(\%)}& \multicolumn{2}{c|}{WERD(\%)}& \multicolumn{2}{c|}{WER(\%)}& \multicolumn{2}{c|}{WERD(\%)}& \multicolumn{2}{c|}{WER(\%)}& \multicolumn{2}{c}{WERD(\%)}\\
\cline{2-13}
& dev& test& dev& test& dev& test& dev& test& dev& test& dev& test\\
\hline
1& 20.3& 21.4& 0& 0& 20.3& 21.4& 0& 0& 20.3& 21.4& 0& 0\\
\hline
2& 20.7& 21.5& 1.9& 0.5& 21.8& 22.3& 7.0& 4.3& 22.9& 23.4& 12.3& 9.5\\
\hline
3& 21.1& 22.2& 3.8& 3.8& 24.8& 25.5& 21.1& 19.3& 26.2& 26.4& 27.4& 23.4\\
\hline
4& 23.4& 24.7& 14.7& 15.6& 26.3& 27.4& 27.8& 27.8& 29.5& 30.3& 41.2& 40.0\\
\hline
5& 25.4& 25.3& 23.8& 18.4& 30.5& 30.2& 45.1& 39.6& 33.9& 33.5& 57.0& 52.0\\
\hline
6& 28.2& 28.9& 36.0& 34.3& 33.5& 33.9& 55.7& 53.4& 38.3& 38.4& 69.5& 67.0\\
\hline
7& 31.1& 31.5& 47.4& 44.7& 38.5& 38.9& 70.0& 68.3& 44.4& 44.0& 81.7& 79.2\\
\hline
8& 35.3& 34.9& 61.4& 56.7& 43.8& 43.4& 80.8& 78.1& 51.1& 50.3& 89.9.4& 88.0\\
\hline
\end{tabular}
\end{table*}
\subsection {Implementation Rules}
In the overall model of this paper, the Adam optimizer\cite{kingma2014adam} is used for training, the initial learning rate and weight factor are set to $10^{-4}$, and the batch size used is 2. During model training, random cropping and random flipping are used for data augmentation. For random cropping, the frame size of each video sequence is first resized to $256\times 256$, and then randomly cropped to a size of $224\times 224$ to fit the shape of the input. For random flips, set flip probability to 0.5. Flip and crop processing is performed on video sequences. In addition, temporal enhancement processing is performed to randomly increase or shorten the length of the video sequence within $\pm 20\%$. During model testing, only center cropping is used for data enhancement, and the beam search algorithm is used for decoding in the final CTC decoding stage, with a beam width of 10. For the RWTH dataset, there are 30 epochs in the training phase, and the learning rate is reduced by 80\% at the 10th and 20th epochs. For the CSL dataset, there are 15 epochs in the training phase, and the learning rate is reduced by 80\% at the 5th and 10th epochs. The graphics card used in this experiment is RTX2080Ti, the GPU dedicated memory size is 12G, the CPU memory is 8G, and the number of cores is 4.\par
\subsection {Judgment Criteria}
The WER is widely used as a criterion for CSLR\cite{koller2015continuous}. It is the sum of the minimum insertion operations, replacement operations, and deletion operations required to convert the recognition sequence into a standard reference sequence. Lower WER means better recognition performance, which is defined as follows:\par
\begin{equation}
WER=100\%\times \frac{ins+del+sub}{sum}
\end{equation}
where “ins” represents the number of words to be inserted, “del” represents the number of words to be deleted, “sub” represents the number of words to be replaced, and “sum” represents the total number of words in the label.\par
For the evaluation of the performance of the model in this paper, only using WER can represent the recognition performance of the model, but it cannot accurately represent the gap between the recognition results of the model in this paper and the recognition results of the original model. Therefore, this paper proposes WERD to further measure the performance of this model. The frame-level feature sequence reconstructed by the model and the complete original frame-level feature sequence are both processed through the time-series processing part of the spatial-temporal hierarchical model and the final CTC decoding to obtain the final recognition result, and the WER is calculated to obtain the estimated WER and reference WER respectively, and then the error rate between them is calculated as a further evaluation criterion for the model in this paper.\par
\begin{equation}
WERD=100\%\times \frac{1-1.1^{-(WER_E-WER_R)}}{1+1.1^{-(WER_E-WER_R)}}
\end{equation}
where $WER_E$ represents the estimated $WER$ and $WER_R$ represents the reference WER. Because $WER_E$ is a process that approximates $WER_R$, $WER_E$ is greater than or equal to $WER_R$. The smaller the $WERD$, the closer the estimated value is to the reference value, which means that the dense feature sequence reconstructed by the model is more similar to the original feature sequence. Ideally, $WERD=0$, that is, the estimated sequence is equal to the original sequence. When experimenting on the CSL dataset, we treat a single Chinese character as a word.\par
\subsection {Experimental Results}
In this paper, the model MSTNet in our previous study is used as the base model, and the TSRNet is inserted on its basis. The original data of the RWTH dataset and CSL dataset are down-sampled by different multiples as the input of the overall model, and the feature sequence is reconstructed using the proposed TSRNet. The experimental results are presented in Table \RNum{1} and Table \RNum{2}, respectively. The experimental results are compared with the other two methods for data recovery after down-sampling, and the comparison results are also presented in Table \RNum{1} and Table \RNum{2}. To further analyze the experimental data, the experimental results in Tables \RNum{1} and \RNum{2} are presented as graphs, as shown in Figures 7 and 8.\par
\begin{table*}[!htbp]
\centering
\caption{Comparison of the experimental results of TSRNet on the CSL dataset and the other two methods}
\label{tab:aStrangeTable2
\begin{tabular}{c|c|c|c|c|c|c}
\hline
\multirow{2}{*}{Down-sampling factor}& \multicolumn{2}{c|}{TSRNet}& \multicolumn{2}{c|}{Nearest neighbor interpolation}& \multicolumn{2}{c}{Linear interpolation}\\
\cline{2-7}
& WER(\%)& WERD(\%)& WER(\%)& WERD(\%)& WER(\%)& WERD(\%)\\
\hline
1& 0.7& 0& 0.7& 0& 0.7& 0\\
\hline
2& 0.7& 0& 0.7& 0& 0.7& 0\\
\hline
3& 0.7& 0& 0.8& 0.5& 0.8& 0.5\\
\hline
4& 0.7& 0& 0.9& 1.0& 0.9& 1.0\\
\hline
5& 0.7& 0& 0.9& 1.0& 1.0& 1.4\\
\hline
6& 0.8& 0.5& 1.3& 2.9& 1.4& 3.3\\
\hline
7& 0.9& 1.0& 1.8& 5.2& 2.1& 6.7\\
\hline
8& 1.1& 1.9& 2.6& 9.0& 3.1& 11.4\\
\hline
9& 1.5& 3.8& 3.6& 13.7& 4.6& 18.4\\
\hline
10& 1.9& 5.7& 5.4& 22.0& 6.9& 28.7\\
\hline
11& 2.5& 8.6& 7.9& 32.6& 10.0& 41.6\\
\hline
12& 3.8& 14.7& 11.1& 45.9& 13.6& 54.7\\
\hline
13& 5.1& 20.7& 14.4& 57.4& 17.0& 65.1\\
\hline
14& 6.9& 28.7& 17.6& 66.7& 21.3& 75.4\\
\hline
15& 8.4& 35.1& 20.4& 73.5& 24.0& 80.3\\
\hline
16& 10.3& 42.8& 24.0& 80.3& 28.3& 86.6\\
\hline
\end{tabular}
\end{table*}
\begin{figure*}
\begin{minipage}{0.5\textwidth}
\includegraphics[width=3.5in,height=2.33in]{pdf/figures7.pdf}
\caption{Comparison of the WER of TSRNet on the RWTH dataset and the other two methods.}
\label{fig:ljxy7}
\end{minipage}
\hfill
\begin{minipage}{0.5\textwidth}
\includegraphics[width=3.5in,height=2.33in]{pdf/figures8.pdf}
\caption{Comparison of the WER of TSRNet on the CSL dataset and the other two methods.}
\label{fig:ljxy8}
\end{minipage}
\end{figure*}
From Table \RNum{1} and Table \RNum{2}, it can be obtained: Using different methods to reconstruct the down-sampled data under the same down-sampling factor, the final WERD obtained by our proposed temporal super-resolution network is smaller than the nearest neighbor interpolation method and the linear interpolation method, and when the down-sampling factor is larger, the advantage achieved by our method is more obvious.\par
For the RWTH dataset, the reference WER obtained on the validation set and test set, that is, the WER obtained without down-sampling the data, is 20.3\% and 21.4\%, respectively. When the down-sampling factor is 2, the WERD obtained by our method on the validation set and the test set is 1.9\% and 0.5\%, respectively, and the WERD using the nearest neighbor interpolation method is 7.0\% and 4.3\%, compared with our method, the error increased by 5.1\% and 3.8\% respectively, the WERD using the linear interpolation method is 12.3\% and 9.5\%, and the error is increased by 10.4\% and 9\% respectively compared with our method. When the down-sampling factor is 3, the errors on the validation set and test set using the nearest neighbor interpolation method are increased by 17.3\% and 15.5\%, respectively. Compared with our method, the errors obtained by using the linear interpolation method are increased by 23.6\% and 19.6\% respectively. When the down-sampling factor is 4, the errors on the validation set and the test set using the nearest neighbor interpolation method are increased by 13.1\% and 12.2\% respectively compared with our method, and compared with our method, the errors obtained by using the linear interpolation method are respectively increased by 26.5\% and 24.4\%. By analogy, the error is increasing.\par
\begin{table*}[!htbp]
\centering
\caption{Overall performance of continuous sign language recognition model via temporal super-resolution network}
\label{tab:aStrangeTable3
\begin{tabular}{c|c|c|c|c|c|c|c|c}
\hline
Down-sampling factor& 1& 2& 3& 4& 5& 6& 7& 8\\
\hline
\multicolumn{9}{c}{Frame-level feature extraction part}\\
\hline
Params& $23\times 10^6$& $23\times 10^6$& $23\times 10^6$& $23\times 10^6$& $23\times 10^6$& $23\times 10^6$& $23\times 10^6$& $23\times 10^6$\\
\hline
FLOPs(GFlops)& 734.74& 367.37& 242.47& 183.69& 149.95& 121.23& 102.87& 91.84\\
\hline
MemR+W(GByte)& 14.94& 7.47& 4.93& 3.73& 2.99& 2.46& 2.09& 1.87\\
\hline
\multicolumn{9}{c}{Temporal Super-Resolution Network}\\
\hline
Params& -& $61\times 10^6$& $61\times 10^6$& $61\times 10^6$& $61\times 10^6$& $61\times 10^6$& $61\times 10^6$& $61\times 10^6$\\
\hline
FLOPs(GFlops)& -& 11.57& 11.41& 11.25& 11.19& 11.37& 11.28& 11.09\\
\hline
MemR+W(GByte)& -& 0.36& 0.35& 0.34& 0.34& 0.34& 0.34& 0.33\\
\hline
\multicolumn{9}{c}{Time-series feature extraction part}\\
\hline
Params& $97\times 10^6$& $97\times 10^6$& $97\times 10^6$& $97\times 10^6$& $97\times 10^6$& $97\times 10^6$& $97\times 10^6$& $97\times 10^6$\\
\hline
FLOPs(GFlops)& 1.79& 1.79& 1.79& 1.79& 1.79& 1.79& 1.79& 1.79\\
\hline
MemR+W(GByte)& 0.035& 0.035& 0.035& 0.035& 0.035& 0.035& 0.035& 0.035\\
\hline
\multicolumn{9}{c}{Total}\\
\hline
Params& $120\times 10^6$& $181\times 10^6$& $181\times 10^6$& $181\times 10^6$& $181\times 10^6$& $181\times 10^6$& $181\times 10^6$& $181\times 10^6$\\
\hline
FLOPs(GFlops)& 736.53& 380.73& 253.88& 196.73& 159.93& 134.39& 115.94& 104.72\\
\hline
MemR+W(GByte)& 14.94& 7.87& 5.31& 4.11& 3.36& 2.83& 2.46& 2.24\\
\hline
Params MEM(MB)& 458.75& 691.63& 691.63& 691.63& 691.63& 691.63& 691.63& 691.63\\
\hline
Run Time(ms)& 221.57& 137.71& 100.78& 73.5& 63.93& 58.74& 52.08& 48.56\\
\hline
\end{tabular}
\end{table*}
\begin{figure*}
\begin{minipage}{0.5\textwidth}
\includegraphics[width=3.5in,height=2.33in]{pdf/figures9.pdf}
\caption{The relationship between the down-sampling multiple and the overall model calculation amount.}
\label{fig:ljxy9}
\end{minipage}
\hfill
\begin{minipage}{0.5\textwidth}
\includegraphics[width=3.5in,height=2.33in]{pdf/figures10.pdf}
\caption{The relationship between the down-sampling factor and the overall model running time.}
\label{fig:ljxy10}
\end{minipage}
\end{figure*}
For the CSL dataset, the reference WER for the test set is 0.7\%. When the down-sampling multiples are 2, 3, 4, and 5, the WERD obtained by our method on the test set is all 0, that is, there is no error. This is because the frame rate of CSL is 30FPS/s, and the sign language demonstrator is slow to demonstrate sign language, resulting in more redundancy in the continuous sign language dataset. When the down-sampling factor is 6, the WERD obtained by our method on the test set is 0.5\%, and the errors obtained by the nearest neighbor interpolation method and the linear interpolation method are increased by 2.4\% and 2.8\% respectively compared with our method. When the down-sampling factor is 7, the errors obtained by using the nearest neighbor interpolation method and the linear interpolation method are increased by 4.2\% and 5.7\%, respectively, compared with our method. By analogy, the error is increasing.\par
As can be seen from the curves in Figures 7 and 8, as the down-sampling factor increases, the WER obtained on the two datasets using the three methods also increases. And the WER obtained using our method TSRNet is much smaller than the nearest neighbor interpolation method and the linear interpolation method, proving the effectiveness of the TSRNet.\par
As can be seen from Figure 7, for the RWTH dataset, the WER curve of TSRNet increases abruptly after the down-sampling multiple is 3, which indicates that the down-sampling factor of 3 is an inflection point. From the calculation of the experimental results in Table \RNum{1}, it can be seen that the WERD obtained on the validation set and the test set when the down-sampling factor is 2 is 1.9\% and 0.5\% higher than that when the down-sampling factor is 1; When the down-sampling factor is 3, it increases by 1.9\% and 3.3\%, respectively, compared with the down-sampling factor of 2; when the down-sampling multiple is 4, it increases by 11.4\% and 11.7\%, respectively, compared with the down-sampling multiple of 3. This is consistent with the conclusion that the down-sampling factor of 3 is an inflection point obtained in Figure 7, which proves that TSRNet has the best model performance when the down-sampling factor is 3 on the RWTH dataset.\par
As can be seen from Figure 8, for the CSL dataset, the WER curve of TSRNet increases sharply after the down-sampling multiple is 11, which indicates that the down-sampling multiple is 11 is an inflection point. From the calculation of the experimental results in Table \RNum{2}, it can be seen that when the down-sampling multiple is 10, the WERD obtained on the test set is 1.9\% larger than that when the down-sampling multiple is 9; When the down-sampling factor is 11, the WERD increases by 2.9\% compared with the down-sampling factor of 10; When the down-sampling factor is 12, the WERD increases by 6.1\% when the down-sampling factor is 11. This is consistent with the conclusion that the down-sampling factor of 11 is an inflection point obtained in Figure 8, which proves that TSRNet has the best model performance when the down-sampling factor is 11 on the CSL dataset.\par
In order to further analyze the effectiveness and superiority of TSRNet, under different down-sampling times, this paper analyzes the overall model from three aspects: calculation amount, parameter amount, and running time. The original data, that is, the video frame length of 200 and the image size of $224\times 224$, are input into the overall model. The calculation amount, parameter amount and running time of the model under different down-sampling times are shown in Table \RNum{3}. The running time is the average of five consecutive model running times.\par
\begin{table*}[!htbp]
\centering
\caption{Overall model performance comparison of inserting TSRNet into different spatiotemporal hierarchical models}
\label{tab:aStrangeTable4
\begin{tabular}{c|c|c|c|c|c|c|c|c|c|c|c|c}
\hline
\multirow{3}{*}{Down-sampling factor}& \multicolumn{4}{c|}{CNN+BiLSTM+CTC}& \multicolumn{4}{c|}{VAC\cite{min2021visual}}& \multicolumn{4}{c}{MSTNet\cite{zhu2022multi}}\\
\cline{2-13}
& \multicolumn{2}{c|}{WER(\%)}& \multicolumn{2}{c|}{WERD(\%)}& \multicolumn{2}{c|}{WER(\%)}& \multicolumn{2}{c|}{WERD(\%)}& \multicolumn{2}{c|}{WER(\%)}& \multicolumn{2}{c}{WERD(\%)}\\
\cline{2-13}
& dev& test& dev& test& dev& test& dev& test& dev& test& dev& test\\
\hline
1& 26.1& 26.7& 0& 0& 21.8& 22.8& 0& 0& 20.3& 21.4& 0& 0\\
\hline
4& 29.8& 30.4& 17.5& 17.5& 25.1& 26.2& 15.6& 16.1& 23.4& 24.7& 14.7& 15.6\\
\hline
\end{tabular}
\end{table*}
\begin{table*}[!htbp]
\centering
\caption{Overall model performance comparison using different types of 1D-ResBlock}
\label{tab:aStrangeTable5
\begin{tabular}{c|c|c|c}
\hline
\multirow{2}{*}{Types of 1D-ResBlock}& \multicolumn{2}{c|}{WER(\%)}& \multirow{2}{*}{The amount of parameters of TSRNet}\\
\cline{2-3}
& dev& test& \\
\hline
A& 23.7& 24.9& $350\times 10^6$\\
\hline
B& 23.4& 24.9& $230\times 10^6$\\
\hline
C& 23.4& 24.7& $61\times 10^6$\\
\hline
D& 23.8& 24.7& $61\times 10^6$\\
\hline
\end{tabular}
\end{table*}
As can be seen from Table \RNum{3}, for the amount of parameters, the introduction of TSRNet on the basis of MSTNet results in an increase of $61\times 10^6$ in the amount of parameters, and with the increase of the down-sampling multiple, the size of the parameter amount remains unchanged. As for the amount of computation, with the increase of the down-sampling multiple, the amount of computation keeps decreasing. And the model calculation amount is positively correlated with the running time, as the calculation amount decreases, the running time also decreases, as shown in Figures 9 and 10.\par
As can be seen from Table \RNum{3}, for the amount of parameters, the introduction of TSRNet on the basis of MSTNet results in an increase of $61\times 10^6$ in the amount of parameters, and with the increase of the down-sampling multiple, the size of the parameter amount remains unchanged. As for the amount of computation, with the increase of the down-sampling multiple, the amount of computation keeps decreasing. And the model calculation amount is positively correlated with the running time. As the calculation amount decreases, the running time also decreases, as shown in Figures 9 and 10. It can be seen from the previous experiments that TSRNet has the best model performance when the down-sampling multiple is 3 on the RWTH dataset. For Figure 9 and Figure 10, when the down-sampling multiple is 3, the overall calculation of the model is reduced by 65.53\% and the running time was reduced by 54.52\%.\par
Through the above experiments, it can be found that for the spatial-temporal hierarchical model, the calculation amount is mainly concentrated in the frame-level feature extraction part, and most of its parameters are concentrated in the time-series feature extraction part. The introduction of TSRNet greatly reduces the computational complexity of frame-level feature extraction, but increases the overall model parameters.\par
\subsection {Ablation Experiment}
In this section, we conduct ablation experiments on the RWTH dataset to further verify the effectiveness of each component of the model. WER and WERD are used as metrics in ablation experiments, and the down-sampling factor is set to 4.\par
\emph{1) Experiment 1:} Overall model performance of inserting TSRNet into different spatial-temporal hierarchical models. The TSRNet proposed in this paper is inserted into different spatial-temporal hierarchical models as a sub-network to reduce the overall model computation and running time with an acceptable error rate. In this paper, TSRNet is inserted into 4 different spatial-temporal hierarchical models, and the WER and WERD obtained by the overall model are calculated respectively, as shown in Table \RNum{4}.The two models compared in the Table \RNum{4} "CNN+BiLSTM+CTC" and "VAC"\cite{min2021visual} are retrained by us.\par
It can be seen from Table \RNum{4} that under the same down-sampling factor, inserting TSRNet into different spatial-temporal hierarchical models obtains less variation in the WERD of the overall model. It means that TSRNet has good generalization in different spatial-temporal hierarchical models, so that the overall performance of the model remains stable.\par
\emph{2) Experiment 2:} Overall model performance using different types of 1D-ResBlock. This paper introduces 1D-ResBlock in TSRNet, but the overall model performance obtained by using different types of 1D-ResBlock is different. This paper conducts experiments using 4 different types of 1D-ResBlock respectively, and calculates the parameters of WER and TSRNet of the overall model under different types, as shown in Table \RNum{5}. The 4 different types of 1D-ResBlock used are shown in Figure 11.\par
\begin{figure}
\begin{center}
\includegraphics[width=3.5in]{pdf/figures11.pdf}\\
\caption{4 different types of 1D-ResBlock.}\label{fig:ljxy11}
\end{center}
\end{figure}
It can be obtained from Table \RNum{5} that the overall model with 1D-ResBlock type C has the best performance. When 1D-ResBlock types are C and D, the number of parameters is smaller than that when types are A and B, because types C and D use depth-wise convolution 1D-DCONV. For types C and D with the same amount of parameters, type C reduces the WER by 1.7\% on the validation set compared to type D.\par
\emph{3) Experiment 3:} Overall model performance using different down-sampling methods. When down-sampling the data, this paper uses proportional random sampling. The overall model WER obtained when using different down-sampling methods is shown in Table \RNum{6}.\par
\begin{table*}[!htbp]
\centering
\caption{Overall model performance comparison using different down-sampling methods}
\label{tab:aStrangeTable6
\begin{tabular}{c|c|c}
\hline
\multirow{2}{*}{Down-sampling factor}& \multicolumn{2}{c}{WER(\%)}\\
\cline{2-3}
& dev& test\\
\hline
Equally spaced sampling& 23.4& 25.0\\
\hline
Proportional random sampling& 23.4& 24.7\\
\hline
Random sampling& 26.0& 26.5\\
\hline
\end{tabular}
\end{table*}
\begin{table*}[!htbp]
\centering
\caption{Overall model performance comparison using different training methods}
\label{tab:aStrangeTable7
\begin{tabular}{c|c|c}
\hline
\multirow{2}{*}{Training method}& \multicolumn{2}{c}{WER(\%)}\\
\cline{2-3}
& dev& test\\
\hline
Conventional super-resolution network training method& 24.9& 26.1\\
\hline
Self-generating adversarial training method& 23.4& 24.7\\
\hline
\end{tabular}
\end{table*}
It can be seen from Table \RNum{6} that when the proportional random sampling method is used, the WER obtained by the overall model is the lowest and the performance is the best. Compared with the equally spaced sampling method, the WER obtained on the test set is reduced by 1.2\%, and the WER obtained by the random sampling method on the validation set and test set is reduced by 11.1\% and 7.3\%, respectively. Proportional sampling can ensure the integrity of video data as much as possible, and random sampling can make the overall model have better generalization.\par
\emph{4) Experiment 4:} Overall model performance using different training methods. The overall model in this paper is trained using our proposed self-generating adversarial training method. We compare the self-generating adversarial training method with the conventional super-resolution network training method, and the WER of the overall model is shown in Table \RNum{7}. The conventional super-resolution network training method here refers to: down-sample the dense feature sequence and input it into TSRNet, use L2 Loss to train the reconstructed dense feature sequence and the reference dense feature sequence, and then insert the trained model into the spatial-temporal hierarchical model to obtain the WER of the overall model.\par
As can be seen from Table \RNum{7}, the overall model WER obtained by using our proposed self-generating adversarial training method is reduced by 6.4\% and 5.7\% on the validation set and test set, respectively, compared with the conventional super-resolution network training method, proving that the effectiveness of self-generating adversarial training methods. Using conventional super-resolution network training methods only considers gaps between data levels, while ignoring gaps at semantic levels. For CSLR, semantic-level information plays an extremely important role, and the semantic-level information can be better recovered using our proposed self-generating adversarial training method.\par
\section{Conclusion}
A deep learning-based spatial-temporal hierarchical continuous sign language recognition model uses dense sampling when extracting information from raw videos. However, as the video length increases, the amount of computation increases exponentially, making the model unsuitable for processing long video data in practical applications, limiting the real-time application of the model. In response to this problem, this paper proposes a new TSRNet to reduce the computational complexity of the CSLR model and improve real-time performance. The CSLR model via TSRNet mainly consists of three parts: frame-level feature extraction, time-series feature extraction and TSRNet. The TSRNet is located in the middle of the frame-level feature extraction part and the time-series feature extraction part, and mainly includes two branches: the detail descriptor and the rough descriptor. The sparse frame-level features are fused through the features obtained by the two designed branches as the reconstructed dense frame-level feature sequence, and the CTC loss is used for training and optimization after the time-series feature extraction part. In this paper, a self-generating adversarial training method is proposed to train the model. The temporal super-resolution network is regarded as the generator, and the frame-level processing part and the time-series processing part are regarded as the discriminator, which can better restore the semantic-level information and greatly reduce the model error rate. In addition, this paper proposes WERD as a new criterion to unify the criterion for model accuracy loss under different benchmarks. Experiments on two large-scale sign language datasets demonstrate the effectiveness of the proposed model, which greatly reduces the overall model computation load and greatly improves real-time performance under a certain range of accuracy loss. And TSRNet can be flexibly inserted into any spatial-temporal hierarchical model.\par
CSLR is designed to solve the communication problem between hearing-impaired people and normal people, and the computational load and memory footprint of the model need to meet real-time requirements. The network proposed in this paper improves the real-time performance of the original model, but there are two problems, that is, it only optimizes the calculation amount of the frame-level spatial feature extraction part, and increases the memory footprint on the basis of the original model. And the model in this paper is only for the spatial-temporal hierarchical model in the CSLR model, but not involved in the non-spatial-temporal hierarchical model. Therefore, how to design a more lightweight, more real-time and more generalized model is a problem worth studying.\par
\section*{Acknowledgment}
This work was supported in part by the Development Project of Ship Situational Intelligent Awareness System, China under Grant MC-201920-X01, in part by the National Natural Science Foundation of China under Grant 61673129. \par
\ifCLASSOPTIONcaptionsoff
\newpage
\fi
\bibliographystyle{IEEEtran}
|
\section{Introduction}
High-fidelity audio transmission over wireless channels has been increasingly important recently. However, audio packets over the Internet are prone to various types of errors, e.g. random bit errors, packet loss, network congestion and jitters. These errors, if not handled properly, may lead to severe distortion and discontinuity in the received audio. Error resilience is a crucial topic and has been extensively studied in traditional audio coding. Forward error correction (FEC) \cite{hardman1998survey} is a traditional way to protect the compressed bitstream at the sender side. At the same time, modern signal processing based audio coding is typically equipped with a packet loss concealment (PLC) module \cite{stimberg2020waveneteq, stenger1996new} to restore the delayed and missing packets at the receiver side. Numerous studies on adaptive quantizer \cite{simkus2014error}, data partition, unequal error protection \cite{zhou2001error,yang2002error} and PLC algorithms have been proposed to improve the error resilience of the coding.
In recent years, neural audio/speech coding schemes have shown great vitality in providing extremely high coding efficiency, either by using a strong decoder for recovery from acoustic features \cite{wavcodec,Lyra,sampleRNN,generative} or by end-to-end neural coding \cite{VQ-VAE-wavenet,disentangle,soundstream,cascaded,jiang2022end}. They have demonstrated a high audio quality at a very low bitrate, largely outperformed traditional audio codecs like Opus \cite{valin2012definition}. However, these coding schemes target only at coding efficiency without taking error resilience into account. When there are channel noises, the source coding models are extremely sensitive to channel noises according to our experiments. This paper aims to fill in this gap by investigating how to handle packet losses in a neural coding scheme.
Existing PLC algorithms can be partitioned into two groups, i.e. parametric-domain and waveform-domain PLC. Parametric-domain PLC algorithms aim to predict lost parameters at the codec level, which are used to synthesize the waveform audio. One example is NetEQ \cite{stimberg2020waveneteq}, the standard PLC algorithm in WebRTC that uses Linear Prediction Coefficient (LPC) to estimate the voice and unvoiced components of the signal and interpolates samples as the linear combinations of highly-correlated pitch-periods. Waveform-domain PLC algorithms solve this problem by designing a post-processing step on the decoded waveform. Time-scale modification (TSM) techniques such as Waveform Similarity Overlap-and-Add (WSOLA) \cite{stenger1996new} have been widely used for waveform-domain PLC for its capability of extrapolating audio samples in the time domain with good audio quality. These signal processing based methods yield good quality for short packet losses but tend to produce robot-like artifacts for long burst losses.
Comparatively, with the significant breakthroughs made in deep learning and generative models, deep-learning based PLC algorithms have been demonstrated to show superior restoration ability recently, especially for long-term packet loss scenario. Most existing deep PLC algorithms are waveform-domain methods introduced to reconstruct lost packets as a post-processing stage. Generally, they can be divided into auto-regressive networks \cite{lin2021time,stimberg2020waveneteq} and generative adversarial networks (GANs) \cite{binkowski2019high, pascual2021adversarial, wang2021temporal}. Auto-regressive methods use recurrent neural networks like LSTM \cite{lin2021time}, WaveRNN \cite{kalchbrenner2018efficient}, WaveNetEQ \cite{stimberg2020waveneteq} as regression models of waveform samples to perform PLC in a real-time setup. These methods usually need a special tuning of the sampling process to generate audio samples after the lost packet and introduce extra delay by feeding output into the network input. In contrast, GAN-based PLC algorithms can generate speech in a frame-in/frame-out manner without any regression \cite{pascual2021adversarial, wang2021temporal}. They typically employ an adversarial training strategy, taking an auto-encoder architecture as the generator and one or more discriminators as a learnable loss function of the restoration task. They have been verified to outperform both the auto-regressive counterparts and the classical methods. One problem of the post-processing based methods is that they are highly dependent on the codec's output. Models trained on uncompressed speech usually degrade a lot when being used directly on the decoded audio without a finetuning or retraining on the codec output. Also, its maximum potential is limited by the codec's quality.
Thanks to the learning capability of neural audio/speech coding, the error resilience could be optimized jointly with source coding to push the boundary further. In our previous work \cite{jiang2022end}, we show an example of this optimization. In this paper, we dig further into this problem and investigate it in a more systematical way. Specifically, we propose a feature-domain PLC (FD-PLC) for neural audio/speech coding, alike the parametric-domain PLC in traditional audio coding. A light-weight attention-based PLC block is introduced to recover lost feature frames at the decoder. This structure is efficient to capture both local and global correlations along the temporal dimension with different attentiveness to lost/non-lost frames. Furthermore, both a spectrogram-based loss at multiple scales and a hybrid segment-level and frame-level adversarial loss are utilized to achieve a natural and temporally coherent reconstruction quality. Taking the end-to-end neural speech coding network \cite{jiang2022end} for real-time communications as a backbone, our experimental results show that the proposed method largely enhances the output quality under several packet loss patterns.
\section{The Proposed Scheme}
A typical neural speech coding network is composed of an encoder, a vector quantizer and a decoder, as illustrated in Fig. \ref{Fig1}. A single channel recording \(x\in\mathbb{R}^L\) is mapped to a sequence of embeddings \(X^S\in\mathbb{R}^{T\times1\times C}\) with low latency. Then the vector quantizer discretizes the embeddings to quantized features \(X^Q\in\mathbb{R}^{T\times1\times C}\) with a set of finite codebooks to meet the target bitrate. Without considering channel losses, the decoder produces a lossy reconstruction \(\hat{x}\in\mathbb{R}^L\) from \(X^Q\). When the channel suffers from packet losses, only the lossy quantized features \(\tilde{X}^Q=\{\tilde{X}^Q_{non\_lost},\tilde{X}^Q_{lost}\}\) are available. The decoder needs to recover \(\hat{x}\) from \(\tilde{X}^Q\) with both quantization noises and packet losses. To facilitate this recovery, we introduce the FD-PLC module just after the inverse quantization in the feature domain. Let \(\hat{X}^Q\) denote the recovered features by FD-PLC. The decoder follows to reconstruct the whole waveform. The whole network is trained on the decoder part to minimize the distortion $D(x, \hat{x})$ at given bitrate and packet loss rate and pattern. Multiple discriminators are designed for adversarial training to produce a natural and temporally-coherent output quality with high fidelity. The following subsections will describe them in detail.
\subsection{Backbone network}
We take the low-latency neural speech coding network TFNet in our previous work \cite{jiang2022end} as the backbone. It takes the time-frequency spectrum with a 20ms window and a 5ms hop length as input with power-law compressed normalization on the magnitude. The encoder and decoder are composed of causal convolutions and deconvolutions for capturing frequency dependencies and two kinds of causal temporal filtering modules in-between them, i.e. dilated temporal convolution module (TCM) and group-wise gated recurrent unit (G-GRU) for capturing temporal dependencies. The two temporal filtering modules are organized in an interleaved way to efficiently extract both local and long-term temporal dependencies. For vector quantization, the latent embeddings \(X^S\in\mathbb{R}^{T\times1\times C}\) are split into \(N\) groups. For each group, it uses an independent codebook containing \(S\) codewords. At the target bitrate of 6kbps, we combine 4 overlapped frames (corresponding to 20ms new data) into a vector for quantization.
\subsection{FD-PLC module} \label{section:plc}
The FD-PLC module is composed of two kinds of causal modules stacked together, i.e, a group-wise temporal self-attention block (G-TSA) and a TCM module. The G-TSA block is similar to the multi-head self-attention block (MHSA) in transformer \cite{vaswani2017attention} and we turn it into a causal operation along the temporal dimension using a window of \(N\) frames, i.e. each frame only has access to \(N\) past frames without any look-ahead. It captures different attentiveness to different frames thus provides temporal adaptation to the content and the loss/non-loss properties. As shown in Figure \ref{Fig2}, we use a pre-norm residual unit similar to that in \cite{wang2019learning} for the G-TSA block, with two convolutional layers with a kernel size of \(1 \times1\) to reduce and increase the dimensions. The TCM block is similar to that used in the backbone network but with layer normalization preceding the convolutions and GELU as the activation function. Several TCM blocks with increasing dilation rates are stacked together to form a large TCM module with a large receptive field. We use G-TSA to extract the local correlations which is more important to the current frame at a fine granularity and the TCM is used to aggregate the G-TSA output features to catch long-term dependencies at a coarse granularity.
\begin{figure}[bh]
\centering
\includegraphics[width=0.5\textwidth]{LaTeX/TSA_structure.png}
\caption{Group-wise temporal self-attention module (G-TSA).}
\vspace{-0.4cm}
\label{Fig2}
\end{figure}
\subsection{Adversarial training} \label{section:discriminator}
Adversarial training is widely used for restoration tasks to achieve good reconstruction audio quality. We employ two frequency-domain discriminators with discrimination capability at different granularity. They both take the magnitude spectrum, with a window length of \(W=20ms\) and a hop length of \(H=10ms\) as the input. The first is a segment-level discriminator used to judge the overall quality of an audio clip. It consists of four convolutional layers with a kernel size of (3, 3) and a stride of (2, 2), followed by normalization and Leaky Relu activation. The number of channels is progressively increased to 64 with the depth of network. Finally, a fully connected layer is used to aggregate all channels into one and we do an average pooling on both the (down-sampled) time and frequency dimensions to get just one logit at the output. The second discriminator targets at frame-level discrimination. For this purpose, we use a kernel size of (2, 5) with a stride of (1, 2) in convolution blocks so as to down-sample frequency bins while keeping the temporal resolution. Only frequency-dimension average pooling is used to obtain a 1-dimensional logits as the output. In both discriminators, we use spectral normalization \cite{miyato2018spectral} for the first convolution block and instance normalization \cite{ulyanov2016instance} for others for stable training. Sigmoid activation is used on the output.
We take the Binary Cross Entropy (BCE) loss generally used for GAN \cite{goodfellow2014generative}, i.e.
\begin{equation}\label{(4)}
\max\limits_{D}L_{adv}\left(D\right)=\mathbb{E}_x\left[log\left(D\left(x\right)\right)\right]+\mathbb{E}_x\left[log\left(1-D\left(G\left(x\right)\right)\right)\right],
\end{equation}
\begin{equation}\label{(5)}
\min\limits_{G}L_{adv}\left(G\right)=\mathbb{E}_x\left[log\left(1-D\left(G\left(x\right)\right)\right)\right].
\end{equation}
We also use a feature matching loss \cite{kumar2019melgan} as an additional constraint for the generator, which is given by
\vspace{-0.2cm}
\begin{equation}\label{(6)}
L_{fm}(G)=\mathbb{E}_x\left[\sum\limits_{i=1}^T\dfrac{1}{N_i}\left\|D^i(x)-D^i(G(x))\right\|_1\right],
\vspace{-0.1cm}
\end{equation}
where \(T\) denotes the number of layers in the discriminator that are used for the feature loss. \(D^i\) and \(N^i\) denote the features and feature sizes in the \(i\)-th layer of the discriminator, respectively.
\subsection{Training objectives}\label{section:training}
The neural coding network works as the generator in adversarial training. We use a combination of several loss terms in guiding it towards a good decoded audio quality as follows
\begin{equation}\label{(7)}
\begin{split}
L_{G}=\lambda_{plc}L_{plc}(G)+\lambda_{bin}L_{bin}(G)+\lambda_{mel}L_{mel}(G) \\
+\lambda_{adv}L_{adv}(G)+\lambda_{fm}L_{fm}(G),
\end{split}
\end{equation}
where the scalars \(\lambda_{plc},\lambda_{bin},\lambda_{mel},\lambda_{adv},\lambda_{fm}\) are weights to balance different terms and set by \(\lambda_{plc}=1,\lambda_{bin}=1,\lambda_{mel}=0.25,\lambda_{adv}=1e^{-3},\lambda_{fm}=2e^{-5}\) in our implementation. $L_{adv}(G)$ and $L_{fm}(G)$ are adversarial and feature loss terms in Eq. \ref{(5)} and \ref{(6)}.
The first term \(L_{plc}(G)\) adds the supervision on guiding the FD-PLC module to recover the lost frame from \(X^Q\). During training, we add proportional lost frames and non-lost frames to make the data balance. Let $S$ denote this set and the loss term is given by
\vspace{-0.2cm}
\begin{equation}\label{(1)}
\vspace{-0.1cm}
L_{plc}\left(G\right)=\mathbb{E}_x\left[\dfrac{1}{\left|S\right|}\sum\limits_{t\in{S}}\left\|X^Q(t)-\hat{X}^Q(t)\right\|_1\right],
\vspace{-0.1cm}
\end{equation}
where $X^Q(t)$ and $\hat{X}^Q(t)$ are $t$-th frame of $X^Q$ and $\hat{X}^Q$, respectively. $\left|S\right|$ denotes the number of frames in $S$. The L1 loss is used to measure the distance between \(\hat{X}^Q\) and \(X^Q\). In our implementation, we take the error-free baseline as the pretrained model for encoder, the codebook and $X^Q$ and train the FD-PLC and the decoder jointly. More ablation studies on the training algorithm could be found in section 4.2.
The second $L_{bin}(G)$ and the third terms $L_{mel}(G)$ are quality terms at each frequency-bin and mel-band. As shown in \cite{yamamoto2020parallel} that time-frequency distribution can be effectively captured by jointly optimizing multi-resolution spectrum and adversarial loss functions, we use $L_{mel}(G)$ at multiple resolutions to achieve a high perceptual quality, which is given by
\begin{equation}\label{(3)}
L_{mel}\left(G\right)= \mathbb{E}_{x,\hat{x}}\left[\dfrac{1}{R}\sum\limits_{r=1}^{R}\left\|\phi^r(x)-\phi^r(\hat{x})\right\|_1\right].
\end{equation}
$\phi^r(\cdot)$ is the $r$-th mel-scale band. To achieve high-fidelity, we also use the frequency-bin wise quality term $L_{bin}(G)$ by
\vspace{-0.2cm}
\begin{equation}\label{(2)}
L_{bin}\left(G\right)= \mathbb{E}_{x,\hat{x}}\left[\left\|\psi(x)-\psi(\hat{x})\right\|^2_2\right].
\vspace{-0.1cm}
\end{equation}
$\psi(x)$ is the power-law compressed magnitude of $x$. We use L2 distance metric here.
\begin{figure*}[htbp]
\centering
\subfigure[]{
\label{Fig3:a}
\includegraphics[width=7cm]{LaTeX/Mel_cepstral_distortion.png}
}
\subfigure[]{
\label{Fig3:b}
\includegraphics[width=7cm]{LaTeX/NISQA-TTS_MOS.png}
}
\vspace{-0.4cm}
\caption{Quality comparison MCD(left) and NISQA-TTS(right) at packet loss rate 0\% to 50\% on synthetic traces.}
\label{Fig3}
\end{figure*}
\begin{table*}[h!t]
\centering
\caption{Quality comparison on the blind test set with real traces. Except for MCD, the higher the better.}
\begin{tabular}{ |c||c|c|c|c|c| }
\hline
Scheme&MCD[dB]&PLC-MOS&NISQA-MOS&NISQA-Discontinuity&NISQA-TTS\\
\hline
Error-free baseline & 1.859 & 2.461 & 2.799 & 2.844 & 2.85\\
Error-resilient baseline & 1.43 & 3.713 & 3.509 & 3.572 & 2.985\\
Baseline-GAN &1.182 &4.159 &3.875 &4.028 &3.121\\
Atten-GAN &\textbf{1.158} &4.238 &\textbf{3.978} &\textbf{4.174} &3.183\\
Post-PLC &1.502 &\textbf{4.256} &3.663 &3.790 &3.076\\
FD-PLC &1.239 &4.247 &3.957 &4.165 &\textbf{3.325}\\
\hline
\end{tabular}
\label{table:tabel1}
\vspace{-0.2cm}
\end{table*}
\section{Experimental Setup}
\subsection{Datasets and settings}
We use the 16khz raw clean speech data from Deep Noise Suppression Challenge at ICASSP 2021\cite{reddy2021icassp}. It includes multilingual speech and emotional clips. For packet loss, we simulate with a random loss rate from \(\{10\%,20\%,30\%,40\%,50\%\}\), whose maximum burst loss length is \(\{60, 80, 120, 160, 220\}\) milliseconds, respectively. Besides, we simulate WLAN packet loss pattern with three-state Markov models\cite{milner2004analysis}. For training, we synthesized 600 hours of data, 100 hours for each loss rate category. For testing, we use the blind test set from Audio Deep Packet Loss Concealment Challenge at INTERSPEECH 2022\cite{diener_2022}. This test set uses real packet loss traces captured in real Microsoft Teams calls. Its maximum burst loss length is up to 1000 milliseconds. We also use another test sets with synthetic traces with a random loss rate from \(10\%\) to \(50\%\) for a deep investigation.
For training, we use the Adam optimizer\cite{kingma2014adam} for both generator and discriminator. A learning rate of \(4e^{-4}\) is employed for generator while for discriminator the learning rate is decayed by \(0.999\) for every epoch with an initial rate of \(4e^{-4}\). The temporal window size $N$ of the FD-PLC module is set to 32 frames.
The network is trained for 60 epochs with a batch size of 200.
\subsection{Evaluation metrics}
We measure signal quality at various packet loss rates while the bitrate is fixed to 6kbps. For a generative task, speech distortion, perceptual quality and naturalness are important factor to measure the quality. To this end, we employ mel cepstral distortion (MCD; in dBs) \cite{kubichek1993mel} to measure speech disortion which focuses on perceptually relevant speech characteristics of the short-term speech spectrum. To measure the overall quality, we use the PLCMOS, the evaluation tool for the PLC Challenge at INTERSPEECH 2022 \cite{diener_2022} and NISQA\cite{mittag2021nisqa}. NISQA is a deep learning framework for speech quality evaluation covering several sources of degradation, including packet losses and audio compression. We use NISQA-MOS to evaluate the overall quality, NISQA-Discontinuity for the audio continuity, and NISQA-TTS for the naturalness of synthesized speech. Our experiments find that they reasonably match our perception when using the same neural audio codec.
\subsection{Baselines for comparison}
We compare the proposed FD-PLC scheme with several baselines to verify its effectiveness, the error-free baseline, the error-resilient baseline, Baseline-GAN, Atten-GAN, Post-PLC and the FD-PLC as shown in Fig. \ref{Fig3} and Table. \ref{table:tabel1}. The error-free and error-resilience baselines are trained without and with consideration on packet losses. The Baseline-GAN differs from the Error-resilient baseline by adding adversarial training. The Atten-GAN further introduces the FD-PLC module into Baseline-GAN so that it uses the same network as the proposed FD-PLC. It differs from the proposed FD-PLC only in that no $L_{plc}(G)$ loss is used. What's more, the Post-PLC moves the PLC module to waveform domain, acting as a post-processing of Baseline-GAN. The Post-PLC module takes a U-Net structure with causal convolutional encoder and decoder and skip connections between them. TCM and TSA blocks similar to that in FD-PLC are used in-between the encoder and decoder. It is designed with the similar model size as the FD-PLC module but with much larger receptive field.
\vspace{-0.2cm}
\section{Results}
\subsection{Comparison with other schemes}
Fig.\ref{Fig3:a} and \ref{Fig3:b} show the MCD and NISQA-TTS comparison on synthetic traces at different packet loss rates. They measure the signal distortion and the naturalness of the concealed speech, respectively. It can be seen that the Error-free baseline works well when there is no packet losses but the quality drops sharply when there is packet loss, showing its sensitiveness to channel noises. Other error-resilient schemes surpass the error-free baseline not only in loss scenario but also in the non-loss scenario, showing their stronger robustness and restoration capability against the error-free counterpart. Among these error-resilient schemes, except for Error-resilient baseline and Post-PLC, others are comparable in terms of MCD. The proposed FD-PLC scheme achieves relatively lower MCD and highest NISQA-TTS MOS scores consistently over all loss rates. The Post-PLC has much larger MCD, indicating large difference on the signal level.
The Atten-GAN also shows promising results, especially at high packet loss rate. Compared with the model without attention module, we observe that more frequency bins are restored since more attention has been put on the lost part. But the content it generates is not as coherent as the proposed scheme. Similar results can be found in Table \ref{table:tabel1} evaluated on the blind test set with real traces. The proposed FD-PLC scheme achieves best NISQA-TTS MOS and comparable results on other metrics with the top one. It also outperforms the Post-PLC on the signal fidelity and perceptual quality.
\subsection{Ablation study on training algorithms}
Here we investigate several training schemes, the end-to-end training, multi-stage training and the proposed. In multi-stage training, the encoder and codebook are pretrained as that in proposed but it trains the FD-PLC module first in decoding and finetunes the decoder after that. As Table. \ref{table:tabel3} shows, end-to-end training is the worst. This is because the model will be confused by the PLC task when the target quantized features are still at a preliminary stage. The proposed joint training of the FD-PLC and the decoder provides more room for the trade-off between packet loss recovery and quantization loss recovery.
\begin{table}[h!t]
\centering
\caption{Quality comparison on different training algorithms}
\vspace{-0.2cm}
\begin{tabular}{ c|c|c }
\hline
scheme& MCD[dB]&NISQA-TTS\\
\hline
Error-resilient baseline & 1.43 &2.985\\
End-to-end training & \textbf{1.222} & 2.897\\
Multi-stage training & 1.245 & 3.253\\
Proposed & 1.239& \textbf{3.325}\\
\hline
\end{tabular}
\vspace{-0.2cm}
\label{table:tabel3}
\end{table}
\section{Conclusions}
We propose a feature-domain packet loss concealment algorithm for real-time neural speech coding in this paper. Experimental results show that it could achieve both a better signal fidelity and perceptual quality compared with waveform-domain post-PLC. The proposed self-attention based generative network is able to recover a burst loss with a length of up to 120ms and degrade gracefully with longer burst losses. The proposed FD-PLC module can be easily applied to other neural audio/speech coding networks as well.
\bibliographystyle{IEEEtran}
|
\section{Introduction} \label{sect1}
The formulation of quantum mechanics due to de Broglie, Bohm and Bell (dBBB) has many advantages over the
conventional Copenhagen interpretation (cf.~for example refs.~\cite{BohmHiley93,Goldstein21,Barrett19}).
These advantages and benefits hold for the original, causal formulation originally proposed by de Broglie
\cite{deBroglie56} and rediscovered and perfected by Bohm \cite{Bohm52} as well as for the stochastic
version introduced by Bell \cite{BellCh19} and further developed in refs.~\cite{Vink93,Vink18,Vink22}.
The benefits and attractive features notwithstanding, these Bohm-type formulations continue to be criticized.
One of the more fundamental challenges concerns a seemingly ad-hoc assumption that is required to
reconcile the computed probabilities in dBBB formulations with the established probability interpretation
and experimental results of quantum mechanics.
In dBBB formulations, particles always have a well-defined position and move (either causally or stochastically) along
trajectories that are guided by the system's wave function. If the probability distribution of the initial particle locations
is the same as the probability distribution defined by the system's initial wave function, then the particle dynamics
is such that for all future times, the probability distribution of the particle locations is identical to the distribution
defined by the time-dependent wave function.
Recognizing this ad-hoc assumption on the initial particle distribution as a weakness in the formulation, already
Bohm and Hiley proposed \cite{BohmHileyCh9} that it could be avoided if an arbitrary
initial probability distributions would dynamically relax to the quantum ``equilibrium'' distribution.
This was further explored and
substantiated in work by Valentini and others \cite{Valentini92,Valentini01, ValentiniWestman05,ColinStruyve10}
(see also ref.~\cite{DurrEtAl92} for an alternative approach to understand the role of probability in dBBB formulations).
Such a dynamical relaxation to quantum equilibrium is not at all obvious. In the causal Bohm formulation, the same dynamics that ensures that the probability distribution of the ensemble
of particles continues to reproduce the probabilities computed with the system's wave function, also implies
that any deviation from this distribution in the initial state will be preserved for all later times.
Hence, the exact dynamics cannot accommodate a spontaneous relaxation to quantum equilibrium and one
has to invoke a coarse-graining procedure where particle locations are evaluated as averaged values, for example
on a spatial lattice.
Owing to underlying chaotic particle dynamics, these coarse grained locations could be, and in 2D examples studied in
refs.~\cite{Valentini01,ValentiniWestman05,ColinStruyve10} in fact are, found to relax to quantum equilibrium -
with a relaxation time that Valentini argues \cite{Valentini92,Valentini01} scales as
\begin{equation}
t^{eq} \propto m\hbar^2/\varepsilon (\Delta P)^{3}. \label{Eq_teq}
\ee
Here, $m$ is the particle mass, $\varepsilon$ the coarsening scale and $\Delta P$ the momentum spread
in the system's wave function.
Unlike the causal Bohm formulation, Bell's formulation is stochastic, and in the version of refs.~\cite{Vink93,Vink22}
space is discrete with particle locations limited to the sites of a spatial lattice.
Here, the dynamics does not imply that an initial non-equilibrium must persist - in fact, the similarity
of this stochastic formulation to a Markov process might suggest that equilibration could happen without
the need for further modifications of the dynamics.
This is explored in the present paper
using numerical simulations of a 2D quantum system describing a free particle in a box.
In these simulations there is no need to compute large ensembles of trajectories from which the
probability distribution of the particle location must be determined.
Provided the systems are reasonably sized, the time evolution of the
probability distributions can be computed directly, applying the time-dependent transition matrices of the system
to the evolving probability distribution.
The definition of these transition matrices and their features, along with the similarities
and difference between a Markov and a Bell process will be further discussed in section \ref{sect2} below.
The results of these numerical simulations show
rapid and robust relaxation to quantum equilibrium, which by the nature of the (weak) ergodicity of the process
automatically applies to all (non-equilibrium) initial probability distributions.
These simulations can be performed for various values of the particle mass, lattice distance and momentum
spread in the wave functions, with results for the equilibrium time that suggest a slightly different
scaling behavior than proposed in (\ref{Eq_teq}):
\begin{equation}
t^{eq} \propto mL\hbar / a (\Delta P)^2. \label{Eq_teq2}
\ee
Here, $a$ is the lattice distance and $L$ the box dimension. As in Eq.~(\ref{Eq_teq}) this time scale is linear
in the particle mass and linear in the inverse lattice distance - which acts as a natural substitute for
the coarsening scale required in the causal dynamics.
The dependence on momentum spread is less severe, with one (inverse) factor replaced by a factor $L$.
These results confirm that dBBB formulations do not need the additional assumption that the initial distribution
of particle locations has to be identical to the initial probability distribution prescribed by the system's initial
wave function. They moreover suggest that the intrinsically stochastic nature of Bell's formulation, which arguable is
most naturally formulated on an underling discrete space-time, is sufficient to ensure dynamical relaxation
to quantum equilibrium for a large class of quantum systems - without the need to introduce coarse-graining
or any other modification in the formulation.
The remainder of the paper is organized as follows. The next section starts with a review of the discrete
space-time version of the dBBB formulation \cite{Vink22}, followed by a brief summary of Markov processes
and their convergence, after which the discussion is extended to explore properties of the Bell-process
in which the Markovian transition matrices are time-dependent. Section \ref{sect3} begins with the
description of the 2D quantum systems, followed by an overview of the simulation results for the
lattice distance, particle mass and momentum spread dependent equilibrium times and, finally,
section \ref{sect4} contains a summary with concluding remarks.
\section{Markov Processes with Time-dependent Transition Probabilities} \label{sect2}
\subsection{Stochastic Bell Dynamics} \label{sect2sub1}
Bell's stochastic version \cite{BellCh19} of Bohm mechanics in the discrete time version of
ref.~\cite{Vink22} can be formulated as follows.
The system's quantum state evolves according to Schr\"odinger dynamics as
\begin{equation}
\ket{\psi(t+\epsilon)} = \hat{U}\ket{\psi(t)}, \label{Eq_SE}
\ee
where $t$ is the discrete time\footnote{As was briefly discussed in ref.~\cite{Vink22}
the time step size $\epsilon$ could be time (index) dependent, with a magnitude that is self-consistently determined by
the system's dynamics. Here, such a time dependence will be ignored, as it does not materially impact
the results presented below.} that progresses in steps $\epsilon$ and
\begin{equation}
\hat{U}=e^{-i\epsilon \hat{H}} \label{Eq_U}
\ee
is the evolution operator with its usual dependence on the system's (time-independent) Hamiltonian $\hat{H}$.
Also space is discrete and finite such that particle configurations
can be labeled with indices $n=1,\dots,N$; in such a location representation, Eq.~(\ref{Eq_SE}) takes the form
\begin{equation}
\psi_n(t+\epsilon)= \sum_m U_{nm}\psi_m(t), \label{Eq_Psit}
\ee
with $\psi_n(t) = \bra{n}\psi(t)\rangle$ and $U_{nm}=\bra{n}\hat{U}\ket{m}$.
As was shown in ref.~\cite{Vink22}, the time-dependent configuration probabilities obey a discrete-time continuity
equation,
\begin{equation}
P_n(t+\epsilon) = P_n(t) + \sum_m J_{nm}(t), \label{Eq_PJ}
\ee
with
\begin{equation}
P_n(t)=\vert\psi_n(t)\vert^2 \label{Eq_Pt}
\ee
and
\begin{equation}
J_{nm}(t) = \Re(\psi^{*}_n(t+\epsilon)U_{nm}\psi_m(t)) - (n \leftrightarrow m). \label{Eq_Jt}
\ee
Instead of using the recursion defined in Eq.~(\ref{Eq_PJ}), the probability distribution $P_n(t)$, which will
also be referred to as ``quantum equilibrium distribution'', at time $t=k\epsilon$ given an initial state $\psi(0)$
can equally well be directly computed from the Schr\"odinger equation (\ref{Eq_SE}) as
\begin{equation}
P_n(t) = \vert \sum_m(U^k)_{nm}\psi_m(0)\vert^2. \label{Eq_PSE}
\ee
These time-dependent probabilities can also be generated from an ensemble of stochastically evolving configuration
trajectories $\{n_i(t)\}_{i=1}^M$. Here, $n(t)$ is the index for the particle configuration at time $t$, and
$i$ labels the configuration trajectories in the ensemble of size $M$.
The trajectories can be generated using transition probabilities $T_{nm}(t)$ defined as \cite{BellCh19,Vink93}
\begin{equation}
T_{nm}(t) = \theta(J_{nm}(t))J_{nm}(t)/P_m(t), \label{Eq_Tnm}
\ee
\begin{equation}
T_{mm}(t) = 1 - \sum_{n\ne m} T_{nm}(t), \label{Eq_Tmm}
\ee
where $\theta(x)$ is the Heaviside step function and $T_{nm}(t)$ is the probability that configuration
$m=n_i(t)$ at time step $t$ changes to configuration $n=n_i(t+\epsilon)$ at time $t+\epsilon$.
The configuration probabilities can then be computed from the ensemble as
\begin{equation}
P_m(t) = \lim_{M\rightarrow\infty} \sum_{i=1}^M \delta_{m,n_i(t)}/M. \label{Eq_Ptraj}
\ee
Equivalently, the time dependence of the configuration probabilities (\ref{Eq_Ptraj}) can be computed
using the following time dependent Master Equation,
\begin{equation}
P_n(t+\epsilon) = P_n(t) + \sum_m\left( T_{nm}(t)P_m(t) - T_{mn}(t)P_n(t)\right). \label{Eq_ME}
\ee
Since the transition matrices $T(t)$ are stochastic matrices,
\begin{equation}
T_{nm}(t) \ge 0, \forall n,m,t; \;\;\;\; \sum_n T_{nm}(t) = 1, \forall m,t, \label{Eq_Tstoch}
\ee
it follows that $\sum_m T_{mn}(t)P_n(t) = P_n(t)$ and hence Eq.~(\ref{Eq_ME}) can be rewritten in a
more explicitly Markovian form as
\begin{equation}
P(t+\epsilon) = T(t)P(t).
\label{Eq_Ptp1}
\ee
This in turn implies that the probability at time $t$ can be computed directly from the initial
probabilities as
\begin{equation}
P(t) = \tilde{T}(t)P(0),
\label{Eq_PtFromT}
\ee
where the cumulative transition matrix $\tilde{T}(t)$ is defined as the backward product of the preceding transition
matrices $T(t)$,
\begin{equation}
\tilde{T}(t)\equiv T(t-\epsilon)T(t-2\epsilon)\dots T(0). \label{Eq_Tt}
\ee
As was shown in ref.~\cite{Vink22}, $P(t)$ computed from Eq.~(\ref{Eq_PtFromT}) is identical to the quantum
distribution defined in Eq.~(\ref{Eq_PSE}) computed using the Schr\"odinger dynamics (\ref{Eq_SE})
if the distributions at time $0$ are the same, $P_m(0)=\vert\psi^*_m(0)\psi_m(0)\vert^2$, and provided the
time step size $\epsilon$ in Eq.~(\ref{Eq_U}) is sufficiently small to ensure that $T_{mm}(t)$ defined
in Eq.~(\ref{Eq_Tmm}) is always non-negative.
\subsection{Markov Processes} \label{sect2sub2}
To set the stage for exploring if $P(t)$ defined in Eq.~(\ref{Eq_PtFromT}) also converges to the quantum
equilibrium distribution (\ref{Eq_PSE}) for arbitrary $P(0)$, it is worthwhile to review some properties of a
(fixed) stochastic matrix $A$ and the associated Markov process,
\begin{equation}
\pi^{(k+1)} = A\pi^{(k)}. \label{Eq_Markov}
\ee
Since the sum of the matrix elements in every column of $A$ is one, it follows that $u^TA = u^T$ for a unit-elements
vector $ u=(1,1,\dots,1)^T$ and hence $u$ is a left eigenvector of $A$ with eigenvalue $1$.
The Gershgorin circle theorem (see e.g.~\cite{GolubVanLoan83}) applied to the rows of the transposed
matrix $A^T$ then implies that all other eigenvalues have norm less or equal to one.
If $A$ is also primitive, i.e., for a sufficiently large power $k$ all matrix elements of $A^k$ are positive,
then the Perron-Frobenius theorem (see, e.g., \cite{Sternberg96,Seneta81}) states that the eigenvalue
$\lambda^0=1$ is unique and strictly larger than all other eigenvalues $\lambda^s$ (i.e., $\vert\lambda^s\vert < 1-\delta$
with $\delta>0$ and $s>0$).
If this is the case, only the dominant eigenmode remains in the
spectral decomposition of $A^k$ for sufficiently large $k$:
\begin{equation}
\lim_{k\rightarrow\infty} A^k = \pi^{eq}u^T, \label{Eq_Meq}
\ee
where $\pi^{eq}$ is the probability-normed right eigenvector with eigenvalue $1$ associated with $u$,
\begin{equation}
A\pi^{eq} = \pi^{eq}, \;\;\;\; u^T\pi^{eq} = 1.
\ee
This implies that
the Markov process with such a transition matrix converges to the unique equilibrium distribution $\pi^{eq}$,
\begin{equation}
\pi^{eq}= \lim_{k\rightarrow\infty} A^k \pi^{(0)}, \label{Eq_pieq}
\ee
for any initial probability distribution $\pi^{(0)}$.
\subsection{Markov Process with Time-Dependent Transition Matrix} \label{sect2sub3}
The Markov process (\ref{Eq_Markov}) resembles the Bell process (\ref{Eq_Ptp1}),
but besides the formal similarity, there is the important difference that the transition matrices in
(\ref{Eq_Ptp1}) are time dependent. It is therefore not clear how much
one can learn from the spectrum of individual matrices.
However, since every $T(t)$ is a stochastic
matrix, it remains the cases that for all $t$, $T(t)$ has (at least) one eigenvalue $1$ with left eigenvector
$u = (1,\dots,1)^T$ and all other eigenvalues have an absolute value less than or equal to $1$.
It also remains the case that the properties of the spectral decomposition of the cumulative transition matrix,
\begin{equation}
\tilde{T}(t)= \sum_{s=0}^{N-1} \lambda^s(t) v^s(t) \overline{v}^{sT}(t), \label{Eq_OneV}
\ee
determine if
the Bell process (\ref{Eq_Ptp1}) will equilibrate to a late-time behavior that is independent of the initial state.
Here, $v^s(t)$ and $\overline{v}^s(t)$ are the right and left eigenvectors of $\tilde{T}(t)$, with eigenvalue $\lambda^s(t)$.
This equilibration will be established if the process is ``weakly ergodic''\footnote{See ref.~\cite{Seneta81} for the
formal definition of weak (and strong) ergodicity.}, i.e., only a single eigenmode with
eigenvalue $1$ dominates in the cumulative transition matrix for times (much) larger than an equilibrium
time $t^{eq}$:
\begin{equation}
\tilde{T}(t) \rightarrow \lambda^0(t) v^0(t) \overline{v}^{0T}(t) \equiv \pi(t)u^T \;\;\;\; {\rm for} \;\;\;\; t \gg t^{eq}, \label{Eq_Teq}
\ee
with $\overline{v}^0(t)=u$ the constant left eigenvector with eigenvalue $\lambda^0=1$ and $v^0(t)=\pi(t)$ the corresponding
time-dependent right eigenvector.
If this is the case, this right eigenvector $\pi(t)$ necessarily will be equal to the quantum distribution $P(t)$,
because $\tilde{T}(t)\pi(0)=\pi(t)$ for any initial distribution $\pi(0)$ and by construction $\tilde{T}$ produces
the quantum equilibrium distribution $P(t)$ if the initial distribution $\pi(0)=P(0)$.
This shows that it is sufficient that $\tilde{T}(t)$ satisfies the large time behavior (\ref{Eq_Teq})
to obtain a Bell process (\ref{Eq_Tt}) that automatically converges to reproduce quantum dynamics
irrespective of the initial probability distribution.
The late-time behavior (\ref{Eq_Teq}) is also necessary, since the contribution from other modes,
i.e., terms $\lambda^s v^s(t)(\overline{v}^{sT}(t)\pi(0))$ with $s>0$, can only be independent of $\pi(0)$
if $(\overline{v}^{sT}(t)\pi(0))$ is the same for arbitrary $\pi(0)$, which can only be the
case\footnote{More precisely (dropping the argument $(t)$): Suppose $\tilde{T}\pi$ is invariant under an
infinitesimal shift of $\pi$ of the form, $\pi \rightarrow \pi + \delta^j - \delta^{j'}$ with $\delta^j$ a vector which is zero everywhere,
except on location $j$ where it has value $\epsilon$. Then the infinitesimal change of $\tilde{T}$ must be zero for all pairs
$j,j'$, i.e., $\delta(\sum_m\tilde{T}_{nm}\pi_m) = \sum_m\tilde{T}_{nm}(\delta^j_m - \delta^{j'}_m) =
\epsilon \sum_s \lambda^s v^s_n(\overline{v}^s_j - \overline{v}^s_{j'}) = \epsilon(\tilde{T}_{nj} - \tilde{T}_{nj'}) = 0$,
which shows that $\tilde{T}$ must have identical columns, as in Eq.~(\ref{Eq_Teq}). }
if $\overline{v}^s(t)\propto u$.
However, there cannot be additional left eigenvectors proportional to $u$, since they would have to be
orthogonal to the right eigenvector $v^0(t)$.
To establish the result (\ref{Eq_Teq}), it is therefore sufficient to show that the Markov process generating the
cumulative transition matrix $\tilde{T}(t)$ is weakly ergodic.
In practical terms, it is then sufficient to show that
for large $t$ the next-largest eigenvalue $\lambda^1(t)$ (and hence every subsequent eigenvalue)
approaches zero, $\vert\lambda^1(t) \vert \rightarrow 0$ for $t\rightarrow \infty$.
Slightly more specifically and in analogy with the $k$ dependence of the
eigenvalue spectrum of $A^k$ in a Markov process (\ref{Eq_Meq}), it is sufficient that the time dependence
of the eigenvalues can be expressed as,
\begin{equation}
\vert\lambda^s(t)\vert \approx e^{-c(t) w_s}, \label{Eq_Lm}
\ee
with $c(t)$ a positive (real) value that increases with $t$ and $w_s$ a positive weight factor that increase
with increasing eigenvalue index $s$ and $w_0=0$.
Somewhat remarkably, the results of the numerical experiments discussed below can be described with
weights $w_s \approx s$ and coefficients $c(t)$ that grow (approximately) linearly with time,
$ c(t) \approx c_0 t$.
The coefficient $c_0$ then can be taken as a measure for the inverse equilibrium time, $c_0 \approx 1/t^{eq}$.
Before proceeding to the next section, which discusses numerical evaluations of the eigenvalue spectra of $\tilde{T}(t)$,
it is worthwhile to briefly contemplate how much one could learn from the properties of the individual matrices $T(t)$.
Since for a normal Markov process the matrices $A$ must be primitive,
it may be reasonable to assume that also the $T(t)$ matrices (at least predominantly) must be primitive,
or equivalently, have a single eigenvalue $1$ and sub-leading eigenvalues that are well-separated from $1$.
Since matrices $T(t+\epsilon)$ and $T(t)$ are ``almost the same'' (because the time step size $\epsilon$ is very small),
it is then not unreasonable to assume that subdominant eigenmodes will be suppressed in each iteration
by a factor roughly equal to the modulus of their eigenvalue $\vert\lambda^s(t)\vert$.
Interestingly, sequences of slowly varying non-negative primitive matrices have been studied
in ref.~\cite{Artzrouni91}. There, Artzrouni proves that
for a sequence of slowly varying non-negative primitive matrices\footnote{Technically, the matrices must furthermore
be bounded and have non-zero elements well-separated from zero.} $T(t)$ with
$\|T(t+\epsilon)-T(t)\| < \varepsilon_0$, there is an $\varepsilon_0>0$ such that
the backward product $\tilde{T}(t)$ is weakly ergodic. Weak egodicity in this more generic
situation implies that for all $t$ the product matrix $\tilde{T}(t)$ can be written as,
\begin{equation}
\tilde{T}_{nm}(t) = (w_m+\varepsilon_{nm}(t))L_n(t), \label{Eq_wErg}
\ee
with constant, positive weight vector $w$ and time-dependent, positive vector $L(t)$
and $\varepsilon_{nm}(t)\rightarrow 0$ for $t\rightarrow \infty$.
For matrices that
are furthermore stochastic, the columns of $\tilde{T}(t)$ always sum up to one and hence
the weights must be equal, $w_m=w$, such that $wL(t)$ becomes the dominant right
eigenvector of $\tilde{T}(t)$, $wL(t)=v^0(t)$.
This suggests that under suitable, not necesserily very stringent conditions, the Bell process will obtain
weak ergodicity (i.e., the cumulative transition matrix $\tilde{T}(t)$ will assume the form Eq.~(\ref{Eq_Teq}))
and hence it will support the desired relaxation to quantum equilibrium for arbitrary initial probability distributions.
Unfortunately, it is not straightforward to upfront determine if these conditions (primitivity, sufficiently slowly varying)
apply to matrices $T(t)$ associated with a specific quantum system.
Therefore numerical simulations will still be needed to further explore and quantify the large-time
behavior of $\tilde{T}(t)$.
\begin{figure}[tth]
\begin{centering}
\scalebox{0.8}{\includegraphics[height=8.cm]{Fig_1a.png}}
\scalebox{0.8}{\includegraphics[height=8.cm]{Fig_1b.png}}
\end{centering}
\captionW{Contour maps of an initial probability distribution with low $\Delta P$, $N_k=4$ (left) and high
$\Delta P$, $N_k=7$ (right), displayed in the 2D plane.
The box dimension $L$ is set to 1 and is discretized with 45 lattice sites in each direction.
\label{Fig_1}}
\end{figure}
\section{Numerical Experiments} \label{sect3}
\subsection{Model Definition} \label{sect3sub1}
As in refs.~\cite{ValentiniWestman05,ColinStruyve10} the quantum systems investigated in the present
paper describe a free particle in a 2D box. Unlike in this previous work, the space within the box
is a square lattice of size $L\times L$ with $N$ lattice sites in each
direction. The wave functions $\psi_x$ on this lattice have Dirichlet boundary conditions $\psi=0$,
as in a box with impenetrable walls. In order to assess the impact of boundary conditions, also periodic boundary conditions will be briefly considered.
The Hamiltonian for a free particle on this 2D lattice takes the form,\footnote{
Units are such that $\hbar = c = 1$ and the scale is set using the linear box dimension $L$. }
\begin{equation}
H_{x,y} = \frac{1}{2ma^2}\sum_{\mu=1,2}( 2\delta_{x,y} - \delta_{x,y+a\hat{\mu}}-\delta_{x,y-a\hat{\mu}} ),
\label{Eq_Hxy}
\ee
where $a=L/N$ is the lattice distance, $m$ the particle mass; $x$ and $y$ are 2D vectors $(x_1,x_2)^T$
and $(y_1,y_2)^T$ with $x_{1,2}$ and $y_{1,2} \in \{0,a,\dots,Na-a\}$; the $\hat{\mu}$ are unit vectors,
$\hat{1}=(1,0)^T$ and $\hat{2}=(0,1)^T$ and $\delta_{x,y}\equiv \delta_{x_1,y_1}\delta_{x_2,y_2}$ etc., with
Kronecker $\delta_{x_{\mu},y_{\mu}}$.
For a box with impenetrable walls, the wave function at $x_{1,2}=-a$ and $aN$ must be zero. These
Dirichlet boundary conditions imply that Eq.~(\ref{Eq_Hxy}) must be modified at the boundary,
$\delta_{x,y+a\hat{\mu}}\rightarrow \delta_{x,y}$ for $y_{\mu}=aN-a$ and $\delta_{x,y-a\hat{\mu}}\rightarrow \delta_{x,y}$ for $y_{\mu}=0$;
With periodic boundary conditions, the Kronecker deltas at the boundaries are modified by
identifying $y_{\mu}+a\hat{\mu}$ with $0$ if $y_{\mu}=aN-a$
and $y_{\mu}-a\hat{\mu}$ with $aN-1$ if $y_{\mu}=0$.
With Dirichlet boundary conditions the eigenvectors of $H$ are,
\begin{equation}
\psi^{(k)}_{x} = \sin((x_1 +a)k_1 \pi/(L+a))\sin((x_2+a) k_2 \pi/(L+a)),
\ee
with eigenvalues
\begin{equation}
E^{(k)} = [2 - \cos(k_1\pi/(N+1))-\cos(k_2\pi/(N+1))]/ma,
\ee
where $k=(k_1,k_2)^T$ and $k_1,k_2 \in \{1,\dots,N\}$.
As in refs.~\cite{ValentiniWestman05,ColinStruyve10}
the initial wave function consists of a superposition of the $N_k^2$ lowest energy eigenvectors multiplied
with a random phase factor, such that the time dependent wave function is
\begin{equation}
\psi_x(t) = \sum_{k_1,k_2=1}^{N_k} e^{i\phi_k-itE^{(k)}}\psi_x^{(k)}, \label{Eq_Psi0}
\ee
with $\phi_k$ a random phase between $0$ and $2\pi$.
As an example, Figure~\ref{Fig_1} shows contour maps of the probability distribution $\vert\psi(0)\vert^2$
in the 2D box for a low $\Delta P$ and high $\Delta P$ initial state ($N_k=4$ and $N_k=7$ respectively).
In most experiments below, the wave function is a superposition of the 16 lowest-energy states
($N_k = 4$); when exploring the impact of the momentum spread in the wave function, different
ranges of the wave number values will also be used, $N_k=3,\dots,8$.
Given limitations on compute capacity, it was not possible to explore systems in which both the lattice
distance in mass units, $ma$, would be very small and simultaneously the box dimension in mass units, $mL$, very large.
Particle masses will range from $mL=5$ to $40$, with most computations done at $mL=20$ and $mL=5$; lattices with different resolution will be employed with $N$ ranging from $15$ to $60$.
\begin{figure}[tth]
\begin{centering}
\includegraphics[height=7cm]{Fig_2_bw.png}
\captionW{Eigenvalue spectra of $\tilde{T}(t)$ evaluated on a system with Dirichlet boundary conditions, low
$L\Delta P = 8.55$ and $N=30$. The dots in the plot show $\log(\vert \lambda^s\vert)$
for $t/L =40, 120, 240$ and $360$, in order of increasing (negative) slope. The straight
lines are least-square fits to the first 25 data points.
\label{Fig_2}}
\end{centering}
\end{figure}
\begin{figure}[!thh]
\begin{centering}
\scalebox{1}{\includegraphics[height=3.85cm]{Fig_3a_bw.png}}\\[-2mm]
\scalebox{1}{\includegraphics[height=3.85cm]{Fig_3b_bw.png}}\\[-2mm]
\scalebox{1}{\includegraphics[height=3.85cm]{Fig_3c_bw.png}}\\[-2mm]
\end{centering}
\captionW{Density plots of the probability distribution $P(t)$ (left plots), the dominant right-eigenvalue $v^0(t)$
(middle plots) and the difference of $P(t)$ and $v^0(t)$ (right plots). The top, middle and bottom rows are at $t/L=0, 120$ and $360$ respectively.
\label{Fig_3}}
\end{figure}
For a given quantum system it is straightforward to compute $\tilde{T}(t)$: Given the solution of the
Schr\"odinger equation shown in Eq.(\ref{Eq_Psi0}), the
time-dependent transition matrices $T(t)$ are computed from Eqs.~(\ref{Eq_Tnm}) and (\ref{Eq_Tmm}),
after which $\tilde{T}(t)$ follows from Eq.~(\ref{Eq_Tt}).
Both $\psi(t)$ and $\tilde{T}(t)$ are evaluated at discrete times $t=k\epsilon$, with $\epsilon/L = 0.02/N$, such that the
time step size $\epsilon/L$ and lattice distance $a/L$ both
scale as $1/N$.\footnote{To test the impact of the time step size, a few computations were repeated with
$\epsilon/L=0.01/N$, which produced essentially identical results.}
The number of time steps varies per simulation, ranging from $N_t=1000$ (for systems
with fast equilibration) to $50,000$ (for systems with slow equilibration).
In the numerical evaluations of the evolving transition matrix it may happen
that the constraint $\sum_{n\ne m}T_{nm} \le 1$ is violated for one or more columns $m$.
When this happens (very rarely),
the diagonal element for the offending column is put to zero and the off-diagonals are normalized to sum up to 1.
Since this could lead to inaccuracies, it is always checked that the
final probabilities computed using the Schr\"odinger equation (\ref{Eq_PSE}) and using the Markov process
(\ref{Eq_PtFromT}) on the same initial probability are the same. In all cases the two final probabilities are very close:
$\sum_n \vert\psi^*_n(t)\psi_n(t) - (\tilde{T} (t)P(0))_n\vert < 10^{-8}$ (with $P(0)=\vert\psi(0)\vert^2$).
\subsection{Eigenvalue Spectrum of the Cumulative Transition Matrix} \label{sect3sub2}
The objective of this subsection is to explore if the large-time eigenvalue spectrum of the cumulative transition matrix
$\tilde{T}(t)$ defined in Eq.~(\ref{Eq_Tt}) exhibits the desired dominance of the eigenvector with eigenvalue $1$
that is shown in Eq.~(\ref{Eq_Lm}).
Figure \ref{Fig_2} shows an example of the time-dependence of the eigenvalues of $\tilde{T}(t)$, computed on a lattice
with $N=30$. The dots represent $\log(\vert \lambda^s\vert)$ for $s=0,1,\dots,40$ and
the straight lines are least-square fits of the form $ b_0 + b_1 s$, using
the first $25$ eigenvalues. From top to bottom, the spectra are for $t/L=40, 120, 240$ and $360$.
These results confirm first of all that the spectra only have a single eigenvalue $1$. Furthermore,
the absolute values of the eigenvalues decrease roughly exponentially with the eigenvalue
index (as in Eq.~(\ref{Eq_Lm}) with $w_s\approx s$). This suppression of eigenvalues grows with time and
the steepness of the lines in Fig.~\ref{Fig_2} should be a measure for the level of equilibration: the steeper the
slope, the closer the system is to quantum equilibrium.
The gradual approach to quantum equilibrium can also be seen from the evolution of the dominant right eigenvector.
As shown in section~\ref{sect2sub2}, this eigenvector $v^0(t)$ must become equal to the quantum
probability distribution $P(t)$ when $\tilde{T}(t)$ obtains the form shown in Eq.~(\ref{Eq_Teq}).
This gradual evolution can be seen in Fig.~\ref{Fig_3}, which shows
a density plot of the probability distribution $P(t)$ (left plots), the dominant right-eigenvector $v^0(t)$ (middle plots)
and their difference (right plots). The top row is at the initial state, $t/L=0$, the middle and bottom row are at
$t/L=120$ and $360$ respectively.
\subsection{Quantum Equilibrium Times} \label{sect3sub3}
Having established that the eigenvalues $\lambda^s$ with $s>0$ are (approximately) exponentially suppressed,
\begin{equation}
\lambda^s(t) \approx e^{-c(t)s}, \label{Eq_Lms}
\ee
this subsection will
explore the time-dependence of this suppression. This will lead to estimates of the equilibration time scale as a
function of the lattice distance. The dependence of the time scale on particle mass and momentum spread
in the wave function will be discussed in the next subsection.
Figure \ref{Fig_4} shows the time dependence of the slope-coefficients $c(t)$ for the closed box system with $mL=5$
and $L\Delta P = 8.55$ evaluated on lattices with $N=15, 17, 20, 25, 30$ and $45$.
As can be seen from the quality of the fit (which always have
$R^2$ values larger than $0.96$), the suppression of the non-dominant eigenvalue modes progresses to a
good approximation linearly in time. Hence the slope-coefficient can be parameterized as
\begin{equation}
c(t) \approx c_0 + t/t^{eq}, \label{Eq_ct}
\ee
where the coefficient of $t$ is identified with the inverse of the equilibrium time scale $t^{eq}$. The
intercept $c_0$ is small, typically less than $0.1$
As was mentioned in
the introduction,
the coarsening scale that is needed to demonstrate equilibration in the causal Bohm formulation
appears to play the same role as the lattice distance in the stochastic Bell formulation. Consistency
between these two alternative formulations implies that the equilibrium time should diverge towards the
continuum limit $a\rightarrow 0$. Adopting the expression for the equilibrium time, Eq.~(\ref{Eq_teq}) proposed by Valentini \cite{Valentini92,Valentini01,ValentiniWestman05} and equating the coarsening scale $\varepsilon$ with
the lattice distance $a$, $t^{eq}$ is expected to grow linearly with $N = L/a$.
The results in Figure \ref{Fig_5} indeed show that $1/t^{eq}$ is roughly proportional to $1/N$.
The data points in
this figure were obtained from linear fits of $c(t)$ vs.~$t$ in three
different versions of the 2D quantum system: a closed box with Dirichlet boundary conditions and particle mass
$mL=20$ (dots with solid line), a closed box with Dirichlet boundary conditions and particle mass $mL=5$
(diamonds with dashed line), and an open box with periodic boundary condition with $mL=20$
(squares with dotted line). The wave function in the open box consists of a superposition of 9 plane wave energy
eigenvectors, similarly randomized as the eigenvectors in the closed box,
with roughly similar momentum spread.
\begin{figure}[tth]
\begin{centering}
\includegraphics[height=7cm]{Fig_4_bw.png}
\captionW{Time dependence of the slope-coefficients $c(t)$ in Eq.~(\ref{Eq_Lms}), for the closed box model with
$mL=5$ and $L\Delta P = 8.55$, evaluated on lattices with different lattice distances $a=L/N$.
The straight lines are least-square fits to the data. From top to bottom the lines are for
$N=15, 17, 20, 25, 30$ and $45$.
\label{Fig_4}}
\end{centering}
\end{figure}
\begin{figure}[!tht]
\begin{centering}
\includegraphics[height=7cm]{Fig_5_bw.png}
\captionW{Discretization scale dependence of the equilibrium times. The plots
show $L/t^{eq}$ vs. $a/L$ for three quantum systems: closed box with $mL=20$ (dots with
solid line), closed box with $mL=5$ (diamonds with dashed line) and periodic box with $mL=20$
(squares with dotted line). The results of the fits are:
$L/t^{eq} = 0.006(5)+3.0(1)(a/L)$, $L/t^{eq} = 0.004(5)+6.6(1)(a/L)$ and $L/t^{eq} = 0.01(2)+5.4(4)(a/L)$
respectively.
For the periodic box, the superposition of plane-wave energy states
has approximately the same $L\Delta P\approx 9$ as the wave functions in the closed box, which have
$L\Delta P=8.55$. The lines are least-square fits through the data, including the point at the origin.
\label{Fig_5}}
\end{centering}
\end{figure}
The straight lines in Figure \ref{Fig_5} are least square fits to the data points, where the error bars indicate the
standard error\footnote{As can be seen in Figure \ref{Fig_2}, the
exponential suppression of the eigenvalues of $\tilde{T}(t)$ is not strictly linear in the eigenvalue index $s$: the
slope is not quite constant and there are clusters of near degenerate eigenvalues. This introduces additional
uncertainty in the fitted results for $c(t)$ at different values of $1/N$, which is not included in the size
of the error bars.} on the fitted coefficient of $t$ (in Eq.~(\ref{Eq_ct})).
The slopes of the lines are slightly biased,
since also the point at the origin has been included in the fits. However, the trend in the data supports the expected
behavior that $L/t^{eq}\propto a/L$, and hence $t^{eq} \rightarrow \infty$ for $a \rightarrow 0$.
This is also the case for the model in which the box has
periodic boundary conditions. Here, the equilibrium time scales are actually systematically shorter than in the box with
hard wall boundaries (the dotted line in Figure \ref{Fig_4} lies above the solid line). This is somewhat surprising, since
the (rapid) establishment of quantum equilibrium in the causal Bohm approach has been linked to the level of
chaotic behavior of the trajectories computed. One might intuitively think that reflecting boundaries
would be important to promote chaotic behavior.
\subsection{Mass and Momentum Spread Dependence of Equilibrium Times}
As is expressed in the scaling relations (\ref{Eq_teq}) and (\ref{Eq_teq2}), the equilibrium time scale is
expected to grow with increasing particle mass and decrease with increasing momentum spread in the
system's wave function. Figure \ref{Fig_5} indeed shows that $L/t^{eq}$ values for $mL=20$ are smaller
than those for $mL=5$. To further explore the mass dependence of the equilibrium time, $t^{eq}$ is
evaluated for a range of masses on the closed-box system with $L\Delta P=8.55$ and $N=30$.
The results in Figure \ref{Fig_6} convincingly show that $t^{eq}/L$ grows linearly with $mL$,
as expected.
\begin{figure}[tth]
\begin{centering}
\includegraphics[height=7cm]{Fig_6_bw.png}
\captionW{Mass dependence of the equilbrium times $t^{eq}/L$ for the closed box model with
$N=30$ and $L\Delta P = 8.55$. The straight line, $t^{eq}=-0.6(3) + 0.89(2)mL$,
is a least-squares fit of the data, including the point at the origin.
\label{Fig_6}}
\end{centering}
\end{figure}
\begin{figure}[!tth]
\begin{centering}
\includegraphics[height=7cm]{Fig_7_bw.png}
\captionW{Momentum spread dependence of the equilbrium times $t^{eq}/L$ for the closed box model with
$N=30$ and $mL=20$. The wave functions are composed of the $N_k^2$ lowest energy eigenvectors,
with $N_k=4,5,\dots,8$ ($L\Delta P = 8.55, 10.5, 12.4, 14.3$ and $16.2$). The straight line
, $L/t^{eq} = 0.004(4)+ 0.00076(3)(L\Delta P)^2$, is a least-squares fit of the data including the point at the origin.
\label{Fig_7}}
\end{centering}
\end{figure}
In analogy with thermal equilibration, the quantum equilibrium time is expected to also depend on the
momentum or energy spread in the system's wave function \cite{Valentini92,Valentini01}.
This is confirmed by the results in Figure \ref{Fig_7}, which shows the $\Delta P$ dependence of $L/t^{eq}$.
The momentum spread $\Delta P$ is computed from the standard deviation of the
energy: $L\Delta P = L(2m\Delta E)^{1/2}$ with $\Delta E = (\av{H^2}-\av{H}^2)^{1/2}$.
A least-squares fit $L/t^{eq}$ vs.~$(L\Delta P)^3$ (inspired by Eq.~(\ref{Eq_teq})) gives a relatively poor
result ($R^2=0.94$); a linear fit of
$\log(L/t^{eq})$ vs. $\log(\Delta P)$ indicates a lower power of $L\Delta P$, $1.91(9)$ (and $2.0(1)$
if the largest $\Delta P$ value is left out). This suggest to use a power 2 instead of 3, which leads to the
result shown in Figure \ref{Fig_7}, where $R^2=0.99$.
Combining this result with that of the previous subsection, the scaling relation for the quantum equilibrium
time using dimensionless parameters takes the form,
\begin{equation}
t^{eq}/L \propto mL/(a/L)(L\Delta P)^2,
\ee
which in dimensionful parameters is the result anticipated in Eq.~(\ref{Eq_teq2}) of the introduction,
\begin{equation}
t^{eq} \propto mL\hbar/a(\Delta P)^2.
\ee
The factor $m$ is easy to understand, because for a free particle the evolution matrix only
depends on the combination $\epsilon/m$, i.e., time scales are naturally proportional to the particle mass.
Or, in the particle picture, the probability to move to a neighboring location (i.e.,
its typical velocity) is proportional to $\epsilon/am \propto 1/Lm$.
The appearance of a factor $L/a=N$ is not unreasonable
as one would expect that relaxation requires
the particles to travel some system-specific distance, a mean free path lengths in a multi-particle system
or the distance between two low-probability regions in this single-particle example.
Since a particle will hop at most to a neighboring location,
$N$ sets the scale for the number of particle moves that are needed to cover such a distance.
Or, given the sparse nature of the individual transition matrices, which
only have non-zero off-diagonal elements for nearest neighbors (in at most one direction),
it is also clear that at least $N$ multiplications are needed to obtain a cumulative matrix in which all elements
are larger than zero.
Even though it seems reasonable to expect that an initial state with a large momentum or energy spread equilibrates
faster than one with a smaller spread, it is not true that initial states with zero momentum spread cannot equilibrate.
Obviously, an energy eigenstate that is real will never equilibrate, since the transition matrix for such a system
has no off-diagonal elements. As is the case in the causal Bohm formulation,
particles do not move when the system is in a real-valued energy eigenstate. However, on a space with periodic
boundary conditions, where energy eigenstates can be take as complex-valued plane waves, particles do move and
perhaps surprisingly, even a system with a single plane wave as initial state is found to equilibrate. This can happen
owing to the discrete time formulation in which the probability current (\ref{Eq_Jt}) is split over two time
steps. When expanding the transition probabilities in orders of the time step size $\epsilon$, one will find subleading
terms that allow transitions between neighboring locations (in the direction orthogonal to the direction the
particle moves in), even though the wave function values at these locations evaluated at the same
time are equal. In the example of a single plane wave, the equilibrium time scale is found to
increase with decreasing time step size - as expected.
As the above comments already suggest, it is not easy to find initial states that cannot support quantum equilibration,
i.e., states for which the transition matrix is non-primitive.
Wave functions composed of random superpositions of energy states, but such that they possess
a rotation or mirror symmetry that is preserved during time evolution, still
lead to primitive transition matrices and these systems readily equilibrate.
Besides real-valued energy eigenstates, it turns out that initial (Gaussian) states that are sufficiently localized
start out with a transition matrix that has multiple eigenvalues $1$. However, once the wave packet spreads out to
cover enough of the box volume, such that the transition matrix develops off-diagonal elements connecting
neighboring locations everywhere in the system,
also here transition matrices become primitive, only have a single isolated eigenvalue $1$,
and also this system readily equilibrates.
\section{Discusion} \label{sect4}
The stochastic version of the de Broglie-Bohm formulation of quantum mechanics introduced by Bell,
can be rigorously defined on discrete space-time \cite{Vink22}. As was shown in section \ref{sect2},
the dBBB dynamics for the probability distribution of particle locations resembles a Markov process
with transition matrices $T(t)$ that are slowly varying in time.
This analogy with a Markov process, supported by proven properties of the backward product
of such matrices \cite{Artzrouni91} suggests that the dBBB dynamics (for sufficiently small time step sizes)
will be weakly ergodic if the transition matrices are primitive (i.e., if they are such that all matrix elements
of $T^k(t)$ are positive for a sufficiently large power $k$). Weak ergodicity then implies that for large enough times,
the cumulative transition matrix $\tilde{T}(t)$ is dominated by a single eigenmode, as shown in Eqs.~(\ref{Eq_Teq})
and (\ref{Eq_wErg}), which in turn implies that the system will relax to quantum equilibrium irrespective
of the initial probabilities attributed to the particle locations in the ensemble.
Direct calculations of the spectral decomposition of $\tilde{T}(t)$ for
a free particle in a 2D box confirm that this dynamical relaxation to quantum
equilibrium indeed happens for many variations of the system's wave function - in fact, it proves to be
difficult to find (non-static) wave functions for which equilibrium relaxation does not happen.
The example of a spreading Gaussian wave package, which starts to equilibrate once the package has sufficiently
spread out over the box volume, illustrates that a necessary condition for equilibration (i.e., for the system's
transition matrix to be primitive) is that the (non-static) wave function is non-zero everywhere, such that there
is a non-zero transition probability for the particle to move, at every location in the system -- it may well be that this
condition is also sufficient.
The numerical results
furthermore confirm that the equilibrium time scale diverges when the lattice distance approaches zero.
This has to be the case, since in this limit the stochastic Bell dynamics must reproduce \cite{Vink93} the
causal Bohm dynamics for which quantum equilibration cannot happen without introducing
coarse-graining \cite{Valentini92,Valentini01,ValentiniWestman05}. Since the quantum world in the discrete
dBBB formulation is naturally discrete (and finite), such an additional coarse-grainig step,
or interpretation, is not needed.
The computed values of $t^{eq}$ are sufficiently accurate to establish the scaling behavior of equilibrium
times shown in Eq.~(\ref{Eq_teq2}), which has the expected dependence on particle mass and lattice distance.
Unlike in Valentini's proposal shown in Eq.~(\ref{Eq_teq}), there is
an additional dependence on the system size, with a correspondingly
weaker dependence on the momentum spread.
Even though the simulations in this paper were performed on a very simple quantum system, the
proven properties of slowly evolving sequences of transition matrices,
corroborated by these simulation results
are sufficiently encouraging to expect that, for typical quantum systems of interest, the stochastic dBBB dynamics
will, after a system-dependent relaxation time, reproduce the probability distributions computed with quantum
mechanics irrespective of the details of the initial particle distribution.
This dynamical relaxation to quantum equilibrium elegantly counters one of the
more persistent objections against Bohm-type interpretations of quantum mechanics.
\subsection*{Acknowledgements}
I would like to thank Marc Artzrouni for helpful comments and discussion.
|
\section{Introduction}
Mental illness could be a sort of health condition that changes a person’s intellect, feelings, or behavior (or all three) and has been appeared to affect an individual’s physical health \cite{world2001world,marcus2012depression}. Mental health issues including depression,
schizophrenia, attention-deficit hyperactivity disorder (ADHD), autism spectrum disorder (ASD), etc., are highly prevalent today, and it is estimated that around 450 million people worldwide suffer from such problems\cite{world2001world}.
To way better get the mental health conditions and provide care, early detection of mental health problems is a basic step.
Different from the diagnosis of other chronic conditions that depend on research facility tests and measurements, mental illnesses are regularly diagnosed based on an individual’s self-report to particular surveys planned for the detection of specific patterns of feelings or social interactions \cite{hamilton1967development}.
Amid these uncertain times when COVID-19 torments the world, many people have indicated clinical anxiety or depression. This could be due to lockdown, limited social activities, a higher unemployment rate, economic depression, and fatigue related to work. American Foundation for Suicide Anticipation reported that individuals encounter anxiety (53\%) and sadness (51\%) more regularly now as compared to the time before covid-19 widespread.
Within the past decade, social media has changed social interaction. Along with sharing data and news, individuals effectively communicate their day-to-day activities, experiences, hopes, emotions, etc., and generate tons of data online. This textual data gives information that can be utilized to design systems to predict people's mental health. Moreover, the current limited social interaction state has forced people to express their thoughts on social media. It gives people an open stage to share their opinions with others numerous times attempt to find assistance \cite{murarka2021classification}.
A previous study explored the application of Machine Learning (ML) techniques in mental health \cite{shatte2019machine}. They reviewed literature by grouping them into four main application domains, such as detection and diagnosis (ii) prognosis, treatment and support, (iii) public health applications, and (iv) research and clinical administration. Another study explored the emerging area of application of DL techniques in psychiatry. They focused on DL by embedding semantically interpretable computational models of brain dynamics or behavior into a statistical machine learning context \cite{durstewitz2019deep}.
This study uses reddit.com\footnote{\url{https://www.reddit.com/} Last visited: 23-01-2022} user data proposed by Murarka and Radhakrishnan \cite{murarka2021classification} to determine mental illnesses, see sample of dataset instances in Table \ref{tab:dataset-examples}. We applied traditional machine learning, deep learning, and transfer learning approaches to automatically detect mental disorders in social media texts. Our extensive experiments demonstrate that machine learning, deep learning, and transfer learning techniques have the potential to complement clinical procedures in the prediction of mental health between two classes of individuals: those seeking help online and those who are unaware of their condition.
\begin{table}[th!]
\centering
\caption{\textbf{Sample instances of Reddit corpus}}
\setlength{\tabcolsep}{5pt}
\begin{tabular}{|l|p{9cm}|l|}
\hline
\textbf{No.} & \centering\textbf{Reddit Post} & \textbf{Label}\\
\hline
1 & all the ideas that normally disappear as soon as we reach for a writing device will be captured and started. imagine all the projects we will begin and never finish! & adhd\\
2 & i know this is long and i don't know if a lot of people will read this but i really just want to help. i had 2 panic attacks over the end of february and first day of march. i went to the doctor and had my blood work & anxiety\\
3 & for example, did you ever notice that you had manic, hypomanic, depressive, etc. episodes? did you ever notice that sometimes you were "sad" and other times you were "excessively happy"? i'm in a sticky & bipolar\\
4 & i just feel so trapped and i *have* to do something about it. i don't know where i'll go or what i'll do to get by. i just can't stay here any longer. & depression\\
5 & synesthesia. what is synesthesia? according to google, "synesthesia is a condition in which one sense (for example, hearing) is simultaneously perceived as if by one or more additional senses such as sight. & none\\
6 & this is probably going to incite a lot of disagreement, maybe even anger, but that's okay; i'm going to say it anyway. anyone else tired of being told that just talking about your problems will solve your ptsd? & ptsd\\
\hline
\end{tabular}
\label{tab:dataset-examples}
\end{table}
The rest of the paper is organized as follows: section \ref{sec:RW} describes the studies on mental illness in literature. Section \ref{sec:PDD} explain the problem and gives dataset insights. Section \ref{sec:methods} give details of methodology applied to detect mental disorders. Section \ref{sec:results} presents results and their analysis. \ref{sec:conclusion} concludes the paper with possible future work.
\section{Related Work} \label{sec:RW}
In recent years, people have been using social media to communicate and seek advice on mental health issues. This has motivated researchers to take the information and apply a variety of NLP and ML approaches to help individuals who may want assistance. Initially, many researchers have focused on Twitter text \cite{orabi2018deep,benton2017multi,coppersmith2015clpsych}, later on the focus has shifted on Reddit platform \cite{kim2020deep,gkotsis2017characterisation,benton2017multi,zirikly2019clpsych}.
A wide range of approaches has been applied to mental health text analysis, from traditional ML to advanced DP. According to \cite{coppersmith2015clpsych}, they employed character-level language models to see how probable a user with mental health concerns would create a series of characters. \cite{benton2017multi} determined different types of mental health disorders by applying neural MTL, regression, and multi-layer perceptron single-task learning (STL) models. \cite{abusaa2004machine} trained the SVMs to distinguish 200 text messages into two classes: "ADHD or not." The most crucial step was the elimination of the acronym ADHD from the messages before learning, and further information concerning attention disorders was removed from the texts. The goal was to see how well the SVMS learns when keywords and even semantically relevant material are unavailable.
Deep feedforward neural network has outperformed typical ML models in a variety of data mining tasks \cite{amjad2020bend,amjad2021threatening}, and it has been used in the study of clinical and genetic data to predict mental health disorders. To diagnose depression, \cite{orabi2018deep} used word embeddings in combination with a range of neural network models such as CNNs and RNNs. To conduct binary classification on mental health textual posts, \cite{gkotsis2017characterisation} used Feed Forward Neural Networks, CNNs, traditional machine learning such as SVMs, and Linear classifiers. \cite{sekulic2020adapting} detected depression, ADHD, anxiety, and other types of mental illnesses by training a binary classifier for each disease with Hierarchical Attention Networks. The most recent work on this was a CNN-based classification model \cite{kim2020deep}. In which, the team trained a separate binary classifier for each type of mental disorder to conduct the detection. Reference \cite{hu2021explainable} found the potential factors to influence a person’s mental health during the Covid-19 pandemic by applying machine learning classifiers such as Naive Bayes, Logistic Regression, Support Vector Machine, Decision Tree, Random Forest, and Gradient Boosting. They have also presented an analysis of the feature selection technique LIME.
In today's research world, transfer learning is extremely important. By using several types of transformers, researchers attempt to acquire greater accuracy and performance in each research study. The authors of \cite{murarka2021classification} examined three approaches for identifying and diagnosing mental illness on Reddit, including LSTM, BERT, and RoBERTa. Among these three methods, RoBERTa outperformed. Reference \cite{dhanalaxmi2020detection} employed RoBERTa to categorize COVID-19-related informative tweets, and their method yielded the best results.
\section{Problem Description and Dataset} \label{sec:PDD}
Murarka et al. \cite{murarka2021classification} developed a benchmark multi-class dataset from Reddit social media platform for mental illnesses detection.
\subsection{Mental Illness Problem}
This study handles the mental illness problem as a multi-class classification problem. A text post of Reddit platform is given, and task is to classify the post into one of the six following mental disorder classes:
\begin{itemize}
\item \textbf{ADHD (Attention Deficit Hyperactivity Disorder)}: A brain illness that affects how you pay attention, sit still, and control your behavior (common in children)\footnote{\url{https://www.cdc.gov/ncbddd/adhd/facts.html} Last visited: 24-01-2022}.
\item \textbf{Anxiety}: A feeling of uneasiness, fear, and dread\footnote{\url{https://medlineplus.gov/anxiety.html\#:~:text=Anxiety\%20is\%20a\%20feeling\%20of,before\%20making\%20an\%20important\%20decision} Last visited: 24-01-2022}.
\item \textbf{Bipolar}: Extreme mood swings, including emotional highs and lows, are a symptom of a mental health issue \footnote{\url{https://www.mayoclinic.org/diseases-conditions/bipolar-disorder/symptoms-causes/syc-20355955} Last visited: 24-01-2022}.
\item \textbf{Depression}: A widespread and significant medical condition that has a negative impact on how someone feels, thinks, and acts\footnote{\url{https://www.psychiatry.org/patients-families/depression/what-is-depression} Last visited: 24-01-2022}.
\item \textbf{PTSD (Post-traumatic stress disorder)}: A disorder that affects certain people after they have been through a traumatic, frightening, or dangerous incident\footnote{\url{https://www.nimh.nih.gov/health/topics/post-traumatic-stress-disorder-ptsd\#:~:text=Post\%2Dtraumatic\%20stress\%20disorder\%20(PTSD,danger\%20or\%20to\%20avoid\%20it.} Last visited: 24-01-2022}.
\item \textbf{None}: No mental illness.
\end{itemize}
\subsection{Dataset}
Reddit's post dataset is developed to
detect mental disorders into one of the five classes. The dataset
comprises a total of 16,930 posts. The posts were further divided into train, dev, and test groups with 13,726 posts in the training set, 1,716 posts in the dev set, 1,488 posts in the test set. Table \ref{tab:data_states} presents the number of posts for each mental illness class.
\begin{table}[th!]
\centering
\caption{Number of posts for each mental illness class in whole dataset}
\begin{tabular}{|c|c|}
\hline
ADHA & $3,023$\\
Anxiety & $2,973$\\
Bipolar & $2,956$\\
Depression & $3.004$\\
PTSD & $2,499$\\
None & $2,478$\\
\hline
\textbf{Total} & $16,930$\\
\hline
\end{tabular}
\label{tab:data_states}
\end{table}
The dataset was already pre-processed by eliminating URLs or usernames containing sensitive material. However, we lowered-cased the post text,
removed the punctuation marks, removed stop words, and normalized the elongated words \cite{ameer2019cic,siddiqui2019bots,ameer2021author}, these are the most used pre-processing techniques in classification tasks. Figure \ref{fig:data-stats} shows the number of instances of training and test sets according to classes.
\begin{figure}[th!]
\centering
\includegraphics[height=55mm]{Dataset-1.png}
\caption{Mental Illness Dataset Statistics}
\label{fig:data-stats}
\end{figure}
\section{Methods for Mental Illness Classification} \label{sec:methods}
This section describes our machine learning, deep learning, and transfer learning models applied for multi-class mental illness problems.
\subsection{Machine Learning Classifiers}
ML points at creating computational algorithms or statistical models that can consequently gather hidden patterns from the data \cite{pervaz2015identification,sittar2018multi}. For a long time, has seen an increasing number of ML models being created to analyze healthcare data \cite{murphy2012machine,biship2007pattern}. Conventional ML approaches require a significant sum of feature engineering for ideal performance--an essential step for most application scenarios to get excellent performance-- and time \cite{dwyer2018machine}.
Words help to create contextual content. Their sequence and structure can give important insights to classify texts \cite{ameer2019author,ameer2020multi}. In earlier studies, several researchers extracted word n-grams to classify user content on social media. \cite{kim2020deep} used word n-grams to detect mental illness from Reddit posts. Another study \cite{ive2020generation} utilized word n-grams to generate and evaluate artificial mental health records for NLP. We applied four different machine learning classifiers: Random Forest, Linear Support Vector Machine, Multinomial Naive Bayes, and Logistic Regression.
The maximum number of features for each experiment was 1,000, i.e., we used the n-grams with the highest TF-IDF values. For the combination of word n-grams, the length of $N$ was minimum = 1 and maximum = 3 (We also tried $N$ = 1 and 2, and the results were not improved.
\subsection{Deep Learning Methods}
The second type of method is deep learning-based, in which different state-of-the-art neural network models were applied. Series of CLPsych shared task\footnote{\url{https://clpsych.org/} Last visited: 24-01-2022} an important role in development of mental health detection. We noticed that the most widely used models were Convolutional Neural Network, Recurrent Neural Networks, Long short-term memory, and Bidirectional Long short-term memory.
In \cite{murarka2021classification}, authors applied Long short-term memory (LSTM) to detect mental illness from Reddit posts and achieved promising results. In \cite{mathur2020utilizing}, applied LSTM with attention mechanism to estimate suicidal intent by utilizing temporal psycholinguistic. We applied several pre-trained deep learning algorithms for multi-class mental illness detection such as Convolutional Neural Network, Gated recurrent unit (GRU), Bidirectional Gated recurrent units (Bi-GRU), LSTM, and Bidirectional LSTM.
We used Scikit-learn implementation of deep learning models considering the following parameters, which are usually the default: hidden layers = 3, hidden units = 64, no. of epochs = 10, batch size = 64, and dropout = 0.001. The parameters of CNN model are as follows: activation function = Rectified Linear Units (ReLU), optimizer= adam, hidden layers = 3, loss function = sigmoid, no. of epochs = 10, batch size = 64, dropout = 0.001.
\subsection{Transfer Learning Methods}
Bidirectional Encoder Representations from Transformers (BERT) is one of the foremost well-known advanced methods for NLP problems. RoBERTa (Robustly Optimized BERT Pretraining Approach) is another state-of-the-art language model that builds on BERT by modifying key hyperparameters and training on more data. It outperforms BERT on several benchmark tasks and forms the core of our proposed solution. The BERT model provided state-of-the-art performance over different NLP tasks without any critical task-specific design changes \cite{li2020enhancing,devlin2018bert}. \cite{9682721} used the BERT model for classification task on the multi-label text, which is trained by Google \cite{devlin2018bert}. The model was developed to enable transfer learning, which is why it went through a pre-training procedure that included utilizing both the BookCorpus and the English Wikipedia to help the model learn English. This training procedure consumes a lot of resources and time; therefore, fine-tuning a pre-trained model to a specific downstream is more efficient.
The pre-trained uncased version of the BERT base model was used in this study, which means that the text was converted to lowercase before the word tokenization stage. Each of the 12 encoders in the BERT base model has eight levels: four multi-head self-attention layers and four feed-forward layers.
In this study, the pre-trained XLNet was also used. The XLNet base model design consists of 12 transformer levels with 768 hidden layers and 12 attention head layers. To tokenize the sequences, the XLNet tokenizer was utilized. The tokens were then padded, and categorization was completed.
RoBERTa (Robustly Optimized BERT Pretraining Approach) is a cutting-edge language model that improves on BERT by tweaking key hyperparameters and training on additional data. It outperforms BERT on a number of benchmark tasks and serves as the foundation for our suggested solution. We applied a pre-trained RoBERTa base model. The RoBERTa base model design consists of 12 transformer levels with 768 hidden layers and 12 attention head layers. To tokenize the sequences, the RoBERTa tokenizer was utilized. The tokens were then padded, and categorization was completed.
\section{Results and Analysis} \label{sec:results}
Our machine learning, deep learning, and transfer learning results are documented in Table \ref{tab:results}. In this Table, ``ML Algorithms" indicates traditional machine learning algorithms. The ``LinearSVC" indicates to Linear Support Vector Classifier, ``LR" indicates to Logistic Regression, ``NB" indicates to Naive Bayes, ``RF" indicates to Random Forest classifier. The ``DL Algorithms" indicates deep learning algorithms used in this study such as GNN, Bi-GNN, CNN, LSTM, and Bi-LSTM. The ``TL Algorithms" refers to pre-trained transfer learning algorithms applied to evaluate Reddit corpus, i.e., BERT, XLNet, and RoBERTa.
Our pre-trained transfer learning RoBERTa model outperformed other traditional machine learning and deep learning algorithms with an accuracy score of 0.80, which is quite good on this challenging multi-class mental illness detection problem. The performance of the XLNet model is close to the RoBERTa difference of 0.01.
The overall best results using the deep learning algorithm were on Bi-LSTM. This shows that Bi-LSTM is the most suitable algorithm to detect mental illness among deep learning algorithms. Interestingly, Bi-LSTM results are similar to the ones obtained with BERT. This indicates that the BERT model performs equally well on multi-class mental illness detection problems as advanced pre-trained transfer learning models. The accuracy scores of GRU, Bi-GRU, and CNN are not very high, highlighting the fact that multi-class mental illness detection on Reddit post's text is a challenging task.
Using traditional machine learning algorithms, overall, best results are obtained using combination of word n-grams when length of \textit{N} was minimum = 1, maximum = 3 (Accuracy = 0.78, F1 = 0.67). This shows that combinations of word grams (length of \textit{N} = 1-3) were the most suitable features when we trained the model on the Reddit social media platform.
The RoBERTa model's detailed class-wise results are shown in Table \ref{tab:class-wise-results}. The first surprising outcome is the model's ability to recognize non-illness-related postings with high accuracy. The model can categorize the \texttt{none} class with an F1 score of more than 0.98. That gives us the indication that when it comes to detecting mental illness on social media, this model will suffer from very few false positives.
The two highest performing classes among mental disorder are \texttt{adhd} and \texttt{ptsd}, while on the contrary the two poorest performing classes are \texttt{depression} and \texttt{anxiety}.
There are number of factors contribute to the result of \texttt{depression} and \texttt{anxiety} classes. \texttt{depression} and \texttt{anxiety} have the fewest average number of tokens (words) per post among all classes.
\begin{table}[ht!]
\caption{Results obtained by applying various classical machine learning, deep earning and transfer learning techniques}
\centering
\begin{tabular}{|c|c|c|}
\hline
\textbf{ML Algorithms} & \textbf{Accuracy} & \textbf{F1-score}\\
\hline
\multicolumn{3}{|c|}{\textbf{Classical Machine Learning}}\\
\hline
LinearSVC & $0.79$ & $0.80$\\
LR & $0.79$ & $0.80$\\
NB & $0.74$ & $0.75$\\
RF & $0.75$ & $0.76$\\
\hline
\multicolumn{3}{|c|}{\textbf{Deep Learning}}\\
\hline
\textbf{DL Algorithm} & \textbf{Accuracy} & \textbf{F1-score}\\
\hline
GRU & $0.62$ & $0.64$\\
Bi-GRU & $0.63$ & $0.65$\\
CNN & $0.64$ & $0.65$\\
LSTM & $0.76$ & $0.77$\\
Bi-LSTM & $0.78$ & $0.79$\\
\hline
\multicolumn{3}{|c|}{\textbf{Transfer Learning}}\\
\hline
\textbf{DL Algorithm} & \textbf{Accuracy} & \textbf{F1-score}\\
\hline
BERT& $0.78$ & $0.80$\\
XLNet& $0.79$ & $0.80$\\
RoBERTa& $0.83$ & $0.83$\\
\hline
\end{tabular}
\label{tab:results}
\end{table}
For example, when comparing \texttt{depression} and \texttt{ptsd} classes, \texttt{depression} class have around 53\% fewer textual content. Furthermore, researchers demonstrate that \texttt{depression} is frequently associated with another mental disorder, and our findings support this. In 12\% percent of \texttt{ptsd} posts, 12\% percent of \texttt{anxiety} posts, and 31\% of \texttt{bipolar} posts, the term depression appears. Anxiety is present in 12\% of \texttt{adhd} posts, 14\% of \texttt{bipolar} posts, and 20\% of \texttt{ptsd} posts, respectively. This means that, unlike with the rest of the diseases, the model is unable to place a high value on the mention of these class names, making the categorization of these two labels challenging.
\begin{figure}[th!]
\centering
\includegraphics[scale=0.45]{Confusion_matrix_mental_illness-red.png}
\caption{RoBERTa confusion matrix}
\label{fig:cm}
\end{figure}
\begin{table}[ht!]
\caption{RoBERTa class-wise results}
\centering
\begin{tabular}{|c|c|c|c|}
\hline
\textbf{Class} & \textbf{Precision} & \textbf{Recall} & \textbf{F1-score}\\
\hline
adha & $0.85$ & $0.83$ & $0.84$\\
anxiety & $0.73$ & $0.78$ & $0.76$\\
bipolar & $0.83$ & $0.76$ & $0.80$\\
depression & $0.76$ & $0.83$ & $0.70$\\
ptsd & $0.90$ & $0.87$ & $0.88$\\
none & $0.99$ & $0.96$ & $0.98$\\
\hline
\end{tabular}
\label{tab:class-wise-results}
\end{table}
Figure \ref{fig:cm} shows the confusion matrix for RoBERTa model. The terms \texttt{depression} and \texttt{anxiety} are mentioned in more instances in the \texttt{adhd} and \texttt{ptsd} classes than the name these class themselves. One could expect poor outcomes as a result of this, but these classes outperform all others. This exhibits the actual potential of our approach since it does not depend solely on the mention of class names in the post but also has a deep awareness of the post's context.
\section{Conclusion} \label{sec:conclusion}
The present Covid-19 outbreak and globally forced isolation are our primary motivations for multi-class mental illness detection efforts.
We feel that social media platforms have become the most widely used communication medium for individuals, allowing them to express themselves without fear of being judged. We applied state-of-the-art traditional machine learning, deep learning, and transfer learning-based methods for multi-class mental illness detection problem. The best results (see Table \ref{tab:results}) obtained using pre-trained RoBERTa transfer learning model (accuracy = 0.83, F1-score = 0.83).
In the future, we plan to develop a multi-label dataset for mental illness problems, which would be more reflective of the situation than a multi-class dataset, as a post can have more than one mental disease instead of one per post, i.e., depression, anxiety. We can also use the data augmentation technique on top of this existing mental health data \cite{amjad2020data}. We plan to apply other transfer learning-based models such as DistilBERT, etc., in the future. An ensemble modeling would be considered to improve classification performance.
\section*{Acknowledgements}
The work was done with support from the Mexican Government through the grant A1-S-47854 of the CONACYT, Mexico and grants 20211784, 20211884, 20211178 of the Secretaría de Investigación y Posgrado of the Instituto Politécnico Nacional, Mexico, and grants of PAPIIT-UNAM project TA101722. The authors utilize the computing resources brought to them by the CONACYT through the Plataforma de Aprendizaje Profundo para Tecnologías del Lenguaje of the Laboratorio de Supercómputo of the INAOE, Mexico.
\bibliographystyle{splncs04}
|
\section{Introduction}\label{sect:intro}
The study of hypersurfaces varying in a pencil, or more generally, in a linear system of arbitrary dimension, is an active research area. For instance, determining the number of reducible members in a pencil is already a challenging problem \cite{Ste89}, \cite{Vis93}, \cite{PY08}. When the base field is a number field, the study of pencils has deep connections to Diophantine geometry; see, for example \cite{DGH21}. We will be interested in the case when the base field is a finite field. In this direction, concrete questions about linear families parameterizing hypersurfaces over finite fields have been studied by Ballico in \cite{Bal07}, \cite{Bal09}. There is also a version of Bertini's theorem over finite fields applicable to a pencil of hypersurfaces \cite{AG22FFA}.
Let $\mathbb{F}_q$ be a finite field with $q=p^s$ for some prime $p$. Our primary goal in the present paper is to address the following question on the linear families from a recent paper \cite{AG22} by the first two authors:
\begin{question}\label{quest:main}
Let $(n, d, r)$ be any triple of positive integers with $n\geq 2$ and $d\geq 2$. Can we find $r+1$ homogeneous polynomials $F_0, F_1, ..., F_r \in \mathbb{F}_q[x_0, ..., x_n]$ of degree $d$ such that the hypersurface
$$
X_{[a_0:a_1:...:a_r]} = \{a_0 F_0 + a_1 F_1 + ... + a_r F_r = 0\} \subset \mathbb{P}^n
$$
is smooth for every $[a_0:a_1:...:a_r]\in\mathbb{P}^r(\mathbb{F}_q)$?
\end{question}
The question can be rephrased in geometric terms as follows. Recall that $\mathcal{L}=\langle F_0, ..., F_r\rangle$ is called a \emph{linear system} of (projective) dimension $r$. Thus, Question~\ref{quest:main} asks for existence of a linear system $\mathcal{L}$ of prescribed dimension over $\mathbb{F}_q$ such that every $\operatorname{\mathbb{F}}_q$-member of $\mathcal{L}$ is a smooth hypersurface of degree $d$ in $\mathbb{P}^n$.
We show that, under a mild assumption on the characteristic, the maximum value of $r$ for which Question~\ref{quest:main} has a positive answer is $r=n$.
\medskip
\begin{theorem}~\label{thm:main}
Let $\mathbb{F}_q$ be a finite field with $q=p^s$ for some prime $p$ and integer $s$. The following conclusions hold:
\begin{enumerate}
\item \label{main-thm-item-1} If $r\geq n+1$, then Question~\ref{quest:main} has a negative answer.
\item \label{main-thm-item-2} If $r=n$ and $p\nmid \gcd(d, n+1)$, then Question~\ref{quest:main} has a positive answer.
\end{enumerate}
\end{theorem}
Note that \eqref{main-thm-item-1} holds without any assumption on the characteristic. We will show in Section~\ref{sect:quadrics} that the characteristic assumption $p\nmid \gcd(d, p+1)$ \emph{cannot} be removed in general. More precisely, Theorem~\ref{thm:quadrics} will present a non-existence result involving $q=2^s$, $d=2$ and any odd integer $n$.
It is clear that if Question~\ref{quest:main} has a positive answer for $(n, d, r)$ over $\mathbb{F}_q$, then it also has a positive answer for $(n, d, r-1)$ over $\mathbb{F}_q$. In particular, if $p\nmid \gcd(d, n+1)$, then Question~\ref{quest:main} has a positive answer for the case $r=1$, which corresponds to a pencil of hypersurfaces. The hypothesis $p\nmid \gcd(d, n+1)$ is equivalent to asking $p\nmid d$ or $p\nmid (n+1)$. In particular, the latter condition means that for each dimension $n$, the desired result holds for all but finitely many characteristics. Let us call a pencil of hypersurfaces $\mathcal{L}$ a \emph{smooth pencil} if each $\operatorname{\mathbb{F}}_q$-member of $\mathcal{L}$ is smooth. As an illustration, we have that for every value of $d$:
\begin{itemize}
\item There exists a smooth pencil of degree $d$ in $\mathbb{P}^2$ if $\operatorname{char}(\mathbb{F}_q)\neq 3$.
\item There exists a smooth pencil of degree $d$ in $\mathbb{P}^3$ if $\operatorname{char}(\mathbb{F}_q)\neq 2$.
\item There exists a smooth pencil of degree $d$ in $\mathbb{P}^4$ if $\operatorname{char}(\mathbb{F}_q)\neq 5$.
\item There exists a smooth pencil of degree $d$ in $\mathbb{P}^5$ if $\operatorname{char}(\mathbb{F}_q)\neq 2, 3$.
\end{itemize}
As a comparison, the main result \cite{AG22}*{Theorem 1.3} proved the existence of a pencil $\mathcal{L}$ of degree $d$ hypersurfaces in $\mathbb{P}^n$ where each $\mathbb{F}_q$-member of $\mathcal{L}$ is smooth under a different hypothesis:
\begin{align*}
q > \left(\frac{1+\sqrt{2}}{2}\right)^2 \left((n+1)(d-1)^{n}\right)^2 \left((n+1)(d-1)^{n}-1\right)^2\left((n+1)(d-1)^{n}-2\right)^2.
\end{align*}
Note that the result is true for any characteristic, but $q$ needs to be sufficiently large. It is reasonable to believe that smooth pencils exist over every finite field, even though the stronger result Theorem~\ref{thm:main}~\eqref{main-thm-item-2} does not hold when the restriction $p\nmid \gcd(d, n+1)$ on the characteristic is removed; see Section~\ref{sect:quadrics}.
\medskip
\textbf{Acknowledgements.} The first author is supported by a postdoctoral research fellowship from the University of British Columbia and the NSERC PDF award. The second and third authors are supported by NSERC Discovery grants.
\section{Proof of the main result}\label{sect:main-result}
In this section, we give a proof of Theorem~\ref{thm:main}.
As a preparation, let us recall a few facts from algebraic geometry. It is a well-known fact that the space of all degree $d$ hypersurfaces in $\mathbb{P}^n$ naturally forms a projective space $\mathbb{P}^N$ where $N=\binom{n+d}{d}-1$. When we write $F\in\mathbb{P}^N$, we will be referring to the hypersurface $X$ defined by the polynomial $F$. Inside $\mathbb{P}^N$, there is a special hypersurface $\mathcal{D}\subset \mathbb{P}^N$ called the \emph{discriminant}, which parameterizes all singular hypersurfaces of degree $d$.
We begin with a simple lemma on existence of linear subspaces contained in the discriminant.
\begin{lemma}
Let $P\in\mathbb{P}^{n}(\mathbb{F}_q)$ be a point. Consider the locus
$$
H_P = \{ F\in\mathbb{P}^N \ | \ X=\{F=0\} \text{ is singular at the point } P \}
$$
Then $H_P$ is a codimension $n+1$ linear subspace defined over $\mathbb{F}_q$ inside $\mathbb{P}^N$.
\end{lemma}
\begin{proof}
Without loss of generality, we can let $P=[1:0:...:0]$. The condition that $X=\{F=0\}$ is singular at $P$ is equivalent to $F(P)=\frac{\partial F}{\partial x_1}(P) = ... = \frac{\partial F}{\partial x_n}(P)=0$. Each of these $n+1$ relations impose a linear condition on the defining coefficients of the polynomial $F$. It is straightforward to check that these conditions are linearly independent. Thus, $H_P$ has expected codimension $n+1$ in $\mathbb{P}^N$. It is also evident that $H_P$ is a subspace defined over the ground field $\mathbb{F}_q$.
\end{proof}
We are now ready to establish the first half of our result.
\begin{proof}[Proof of Theorem~\ref{thm:main}, part \eqref{main-thm-item-1}:] Consider a linear system $\mathcal{L}$ of dimension $r\geq n+1$ parametrizing degree $d$ hypersurfaces in $\mathbb{P}^n$. Let $P$ be an arbitrary $\mathbb{F}_q$-point in $\mathbb{P}^n$. Since $\dim(\mathcal{L})\geq n+1$ and $\operatorname{codim}(H_P)=n+1$, these two linear spaces must meet non-trivially in $\mathbb{P}^N$. Therefore, the intersection $\mathcal{L}\cap H_P$ must contain an $\mathbb{F}_q$-point, which corresponds to an $\mathbb{F}_q$-member of $\mathcal{L}$ which is singular at $P$. Since $\mathcal{L}$ was arbitrary, this illustrates that Question~\ref{quest:main} has a negative answer when $r\geq n+1$.
\end{proof}
Before we prove the second part, we start with two lemmas on the existence of smooth hypersurfaces of a particular shape.
\begin{lemma}\label{lemma:smoothness-fermat}
Suppose $p\nmid d$. Consider the hypersurface $X=\{c_0 x_0^{d}+ c_1 x_1^{d} + ... + c_n x_n^{d} = 0\}$ where $c_i$ are arbitrary elements of $\overline{\mathbb{F}_q}$. If $\prod_i c_i \neq 0$, then $X$ is smooth.
\end{lemma}
\begin{proof} Let $F=c_0 x_0^{d}+ c_1 x_1^{d} + ... + c_n x_n^{d}$. We have $\frac{\partial F}{\partial x_i}= d c_i x_i^{d-1}$ for each $0\leq i\leq n$. Let $P=[u_0:u_1:...:u_n]\in X=\{F=0\}$ be an arbitrary point. Then $u_j\neq 0$ for some $j$, and together with $c_j\neq 0$, we see that $\frac{\partial F}{\partial x_j}(P)=d c_j u_j^{d-1}\neq 0$. Thus, $X$ is smooth at $P$. \end{proof}
\begin{lemma}\label{lemma:smoothness-klein}
Suppose $p\mid d$ but $p\nmid (n+1)$. Consider the hypersurface $Y = \{c_0 x_0^{d-1} x_1 + c_1 x_1^{d-1} x_2 + ... + c_n x_n^{d-1} x_0=0\}$ where $c_i$ are arbitrary elements of $\overline{\mathbb{F}_q}$. If $\prod_i c_i \neq 0$, then $Y$ is smooth.
\end{lemma}
\begin{proof}
We will divide the proof into two cases, according to whether $d=2$ or $d\neq 2$.
\textbf{Case 1.} $d\neq 2$. \\
Let $F=c_0 x_0^{d-1} x_1 + c_1 x_1^{d-1} x_2 + ... + c_n x_n^{d-1} x_0$. Assume, to the contrary, that $Y=\{F=0\}$ is singular at a point $P=[u_0:u_1:...:u_n]\in\mathbb{P}^n$; without loss of generality, we assume $u_1\ne 0$. Using the hypothesis $p\mid d$, we obtain:
\begin{equation}\label{eq:smoothness-klein-partial}
\frac{\partial{F}}{\partial x_i}(P) = c_{i-1} u_{i-1}^{d-1} - c_i u_i^{d-2} u_{i+1} = 0
\end{equation}
for each $0\leq i\leq n$, where the indices are taken modulo $n+1$. Multiplying the relation \eqref{eq:smoothness-klein-partial} with $u_i$, we get:
\begin{equation}\label{eq:smoothness-klein}
c_{i-1} u_{i-1}^{d-1} u_i = c_i u_i^{d-1} u_{i+1}
\end{equation}
Combining $F(P)=0$ with \eqref{eq:smoothness-klein} for each $0\leq i\leq n$, we see that
$$
0 = F(P) = \sum_{i=0}^{n} c_i u_i^{d-1} u_{i+1} = (n+1) c_0 u_0^{d-1} u_{1}
$$
Since $p\nmid (n+1)$ and $c_0\neq 0$, we get $u_{0}^{d-1}u_1=0$. Since we know that $u_1\ne 0$, we obtain that $u_0=0$. Applying \eqref{eq:smoothness-klein-partial} to $\frac{\partial F}{\partial x_0}(P)=0$, we get $u_{n}=0$. This is the step where we use the assumption that $d\neq 2$. Similarly, applying \eqref{eq:smoothness-klein-partial} to $\frac{\partial F}{\partial x_n}(P)=0$, we get $u_{n-1}=0$. Continuing in this way inductively, we obtain $u_0=u_1=...=u_n=0$, a contradiction.
\textbf{Case 2.} $d=2$. \\
We follow the same reasoning as in Case 1 to get $u_{0}^{d-1}u_1=0$. Again, we get that $u_0=0$ (since we assumed that $u_1\ne 0$). Applying \eqref{eq:smoothness-klein-partial} to $\frac{\partial F}{\partial x_0}(P)=0$, we get $u_{n-1}=0$. Similarly, applying \eqref{eq:smoothness-klein-partial} to $\frac{\partial F}{\partial x_{n-1}}(P)=0$, we get $u_{n-3}=0$. Continuing in this way, we obtain $u_{0}=u_{n-1}=u_{n-3}=...=0$. Since $d=2$, the hypothesis implies that $n=2k$ is even. Thus, after $k$ steps, we get $u_{n-(2k-1)}=u_1=0$, a contradiction. \end{proof}
We are now ready to establish the remaining half of our result:
\begin{proof}[Proof of Theorem~\ref{thm:main}, part \eqref{main-thm-item-2}:] Let us first suppose $p\nmid d$. We will explicitly construct a linear system $\mathcal{L}$ of dimension $r=n$ with the desired property. By the normal basis theorem, we can find an element $\alpha\in \mathbb{F}_{q^{n+1}}$ such that $\alpha, \alpha^q, \alpha^{q^2}, ..., \alpha^{q^n}$ form an $\mathbb{F}_q$-basis for the $(n+1)$-dimensional vector space $\mathbb{F}_{q^{n+1}}$. Let
\begin{align*}
F_0 &= (\alpha x_0 + \alpha^q x_1 + \alpha^{q^2} x_2 + ... + \alpha^{q^i} x_i + ... + \alpha^{q^n}x_n)^{d} \\
F_1 &= (\alpha^q x_0 + \alpha^{q^2} x_1 + \alpha^{q^3} x_2 + ... + \alpha^{q^{i+1}} x_i + ... + \alpha x_n)^{d} \\
F_2 &= (\alpha^{q^2} x_0 + \alpha^{q^3} x_1 + \alpha^{q^4} x_2 + ... + \alpha^{q^{i+2}} x_i + ... + \alpha^q x_n)^{d} \\
&\vdots \\
F_n &= (\alpha^{q^n} x_0 + \alpha^{q} x_1 + \alpha^{q^2} x_2 + ... + \alpha^{q^{i+n}} x_i + ... + \alpha^{q^{n-1}} x_n)^{d}
\end{align*}
Note that each $F_i$ is not defined over $\mathbb{F}_q$. However, the set $\{F_0, F_1, ..., F_n\}$ is invariant under the action of the $q$-th power Frobenius map. Thus, the linear system $\mathcal{L}=\langle F_0, ..., F_n\rangle$ is defined over $\mathbb{F}_q$, that is, one can find a set of new generators $G_0, G_1, ..., G_n$ for $\mathcal{L}$ where \emph{each} $G_i$ is defined over $\mathbb{F}_q$. Furthermore, we claim that $F_0, F_1, ..., F_n$ are linearly independent. To see this, let
\begin{equation}\label{eq:new-coord}
y_j = \alpha^{q^j} x_0 + \alpha^{q^{j+1}} x_1 + \alpha^{q^{j+2}} x_2 + ... + \alpha^{q^{j+i}} x_i + ... + \alpha^{q^{j+n}}x_n
\end{equation}
for each $0\leq j\leq n$, and observe that $F_i=y_i^d$. The linear map $x_i\mapsto y_i$ is a linear automorphism of $\mathbb{P}^n$. Indeed, the matrix of the transformation is known as a \emph{Moore matrix}, which has a non-zero determinant in this case. Thus, $y_i$ are algebraically independent, which in particular implies that $\{F_0, F_1, ..., F_n\}$ is a linearly independent set. Hence, $\mathcal{L}=\langle F_0, F_1, ..., F_n\rangle$ has (projective) dimension $r=n$.
We claim that each $\mathbb{F}_q$-member of $\mathcal{L}$ defines a smooth hypersurface. Suppose that we have a singular hypersurface $X$ which belongs to $\mathcal{L}$:
\begin{equation}\label{eq:checking-singularity}
X = \{ c_0 F_0 + c_1 F_1 + ... + c_n F_n = 0 \}
\end{equation}
for some $c_i\in\overline{\mathbb{F}_q}$ where not all $c_i$ are zero. In the new coordinates $y_i$, we can express \eqref{eq:checking-singularity} as:
\begin{equation*}
X=\{c_0 y_0^d + c_1 y_1^d + ... + c_n y_n^d = 0\}
\end{equation*}
Since $X$ is singular, we can apply Lemma~\ref{lemma:smoothness-fermat} to deduce that $c_i=0$ for some $i$. Without loss of generality, we assume $c_0=0$. By applying the Frobenius map, we see that $X$ is sent to:
\begin{equation*}
X^{\sigma} = \{c_1^q F_2 + ... + c_n^q F_0 = 0 \}
\end{equation*}
We claim that $X$ and $X^{\sigma}$ are distinct. Indeed, their defining equations are not multiple of one another: otherwise, there would exist a constant $b$ such that $c_i^{q}= b\cdot c_{i+1}$ for each $0\leq i\leq n$ taken modulo $n+1$. As $c_0=0$, this would force $c_i=0$ for each $0\leq i\leq n$, which is a contradiction. Thus, $X$ is not defined over $\mathbb{F}_q$. We have shown that each singular member of $\mathcal{L}$ is not defined over $\mathbb{F}_q$ giving us the desired conclusion.
When $p\mid d$ but $p\nmid (n+1)$, we have an analogous construction. Using the same notation as in $\eqref{eq:new-coord}$, we define $F_i=y_i^{q} y_{i+1}$ for $0\leq i\leq n-1$ and $F_n=y_n^{q} y_{0}$. One can check that $\mathcal{L}=\langle F_0, F_1, ..., F_n\rangle$ is a linear subspace of (projective) dimension $n$. By following the same argument as above, except applying Lemma~\ref{lemma:smoothness-klein} instead of Lemma~\ref{lemma:smoothness-fermat}, it follows that each $\mathbb{F}_q$-member of $\mathcal{L}$ is smooth. \end{proof}
\section{Quadrics in characteristic $2$}\label{sect:quadrics}
In this section, we will show that the hypothesis $p\nmid \gcd(d, n+1)$ in our main theorem cannot be removed in general. We will focus on the case $p=d=2$ and odd $n$. Our goal is to prove the following result:
\begin{theorem}\label{thm:quadrics}
Suppose $n$ is an odd positive integer, and $q=2^{s}$ is an even prime power. There does \textbf{not} exist a linear system $\mathcal{L}=\langle F_0, F_1, ..., F_{n}\rangle$ of dimension $n$ over $\mathbb{F}_q$ such that each $\mathbb{F}_q$-member of $\mathcal{L}$ is a smooth quadric hypersurface.
\end{theorem}
As a result, Question~\ref{quest:main} has a negative answer when $q=2^s$, $d=2$ and $r=n$ is an odd integer.
\medskip
We start with a crucial lemma on singular quadric hypersurfaces.
\begin{lemma}\label{lemma:sing-quadrics}
Suppose $q=2^s$ (for some positive integer $s$) and $n$ is odd. Consider a quadric hypersurface $X\subset \mathbb{P}^n$ defined over $\operatorname{\mathbb{F}}_q$ by the following homogeneous polynomial:
$$
F = x_0^2 + G(x_1, x_2, ..., x_n)
$$
where $G$ is a homogeneous polynomial of degree $2$ in the variables $x_1,\dots, x_n$. Then $X$ is singular.
\end{lemma}
\begin{proof}
We claim that the homogeneous system of linear equations $\frac{\partial G}{\partial x_i}=0$ for $i=1, ...,n$ has a common nontrivial solution. It suffices to show that the matrix $M$ of this linear system is singular. Note that the matrix $M$ is the Hessian matrix of $G$; since $G$ is quadratic, the entries of the Hessian matrix are constant. The Hessian matrix $M$ is symmetric and hence also skew-symmetric as the characteristic is $2$. It remains to show that a skew-symmetric square $n \times n$ matrix $M$ over a commutative ring has zero determinant, when $n$ is odd.
It suffices to consider the universal skew-symmetric
matrix $A$ over the polynomial ring $R = \mathbb{Z}[x_{ij} | 1 \leq i < j \leq n]$. By definition, the
$(i, j)$-th entry of $A$ is $x_{ij}$ if $i < j$, $0$ if $i = j$ and $- x_{ij}$ if $i > j$. Taking the determinant on both sides of $A^T = - A$, we obtain $\det(A) = -
\det(A)$ in $R$ and hence, $\det(A) = 0$, because $R$ is an integral domain of characteristic $0$. A simple specialization argument (specializing $x_{ij}$
to the $(i, j)$-th entry of $M$) now shows that $\det(M) = 0$.
Thus, we can find a point $P=[t_1:t_2:...:t_n]\in\mathbb{P}^{n-1}$ such that $\frac{\partial G}{\partial x_i}(P)=0$ for each $i$. Now, we want to add one more coordinate to $P$ so that it belongs to $X=\{F=0\}$. To achieve this goal, we solve for $x_0$ from the equation:
$$
x_0^2 + G(t_1, t_2, ..., t_n) = 0
$$
to get a solution, say $x_0=t_0$. This is possible because every element in $\operatorname{\mathbb{F}}_{2^s}$ has a square root in $\operatorname{\mathbb{F}}_{2^s}$ (for any positive integer $s$). Then $P'=[t_0:t_1:...:t_n]\in\mathbb{P}^n$ clearly satisfies $F(P')=0$ and $\frac{\partial F}{\partial x_i}(P')=0$ for each $0\leq i\leq n$. Thus, $X$ is singular at $P'$.
\end{proof}
\begin{remark} The conclusion of Lemma~\ref{lemma:sing-quadrics} is false when $n=2k$ is even. Indeed, the quadric hypersurface in $\mathbb{P}^n$ defined by the polynomial
$$
x_0^2 + x_1x_2+x_3x_4 + ... + x_{2k-1}x_{2k}=0
$$
is smooth.
\end{remark}
We now proceed with a proof of Theorem~\ref{thm:quadrics}.
\begin{proof}[Proof of Theorem~\ref{thm:quadrics}] Suppose, to the contrary, that $\mathcal{L}=\langle F_0, ..., F_n\rangle$ is a linear system of quadric hypersurfaces of (projective) dimension $n$ where each $\mathbb{F}_q$-member of $\mathcal{L}$ is smooth. Let $\mathcal{L}(\mathbb{F}_q)$ denote the set of $\mathbb{F}_q$-members of the system.
Let us identify $\mathbb{F}_q^{n+1}$ with the quadratic forms involving $x_0$. In other words, $(a_i)_{i=0}^{n}\in\mathbb{F}_q^{n+1}$ is identified with the polynomial $\sum_{i=0}^{n} a_i x_0 x_i$. Consider the map
$$
\Psi: \mathcal{L}(\mathbb{F}_q) \to \mathbb{F}_q^{n+1}
$$
which sends $F\in \mathcal{L}(\mathbb{F}_q)$ to the part of $F$ that only contains the monomials involving $x_0$. Note that $\mathcal{L}(\mathbb{F}_q)$ is an $(n+1)$-dimensional $\mathbb{F}_q$-vector space, and $\Psi$ is an $\mathbb{F}_q$-linear map.
We claim that $\Psi$ is injective. Indeed, if $\Psi(H)=(0,\cdots, 0)$ for some nonzero $H$, then such a polynomial defines a quadric hypersurface which is singular at the point $[1:0:...:0]$, a contradiction.
By dimension count, $\Psi$ must also be surjective. In particular, there exists some $F\in\mathcal{L}(\mathbb{F}_q)$ whose image under $\Psi$ is $x_0^2$. In other words, $F = x_0^2 +G(x_1, ..., x_n)$ for some $G$. By Lemma~\ref{lemma:sing-quadrics}, $F$ defines a singular quadric hypersurface, which again contradicts the assumption that each $\mathbb{F}_q$-member of $\mathcal{L}$ is smooth. We conclude that such an $\mathcal{L}$ does not exist. \end{proof}
We have shown that the hypothesis $p\nmid \gcd(d, n+1)$ cannot be removed in the case $p=2$. It seems very subtle to determine whether our main result Theorem~\ref{thm:main} continues to hold even when we assume $p\mid \gcd(d, n+1)$ for some other primes $p$. We finish the paper by presenting a positive example when $p\mid \gcd(d,n+1)$.
\begin{example} Let $q=d=3$ and $n=2$. Consider the following cubic homogeneous polynomials with coefficients in $\mathbb{F}_3$:
\begin{align*}
F_0 &= x^{3}+x^{2}y-x y^{2}+y^{3}+x^{2} z+x y z+y^{2} z-x z^{2}+z^{3} \\
F_1 &= x^{3}+x^{2} y-x^{2}z-x y z+y^{2} z+z^{3} \\
F_2 &= x^{3}-x^{2}y+x y^{2}+y^{3}+x^{2}z+x y z+y^{2} z-y z^{2}
\end{align*}
One can check with a computer that $aF_0+bF_1+cF_2=0$ defines a smooth plane curve for each of the possible $q^2+q+1=13$ choices $[a:b:c]\in\mathbb{P}^2(\mathbb{F}_3)$. Thus, we have a linear system of dimension $r=n=2$ which satisfies the conclusion of Theorem~\ref{thm:main}~\eqref{main-thm-item-2}, even though $p\mid\gcd(d,n+1)$ holds.
\end{example}
\begin{bibdiv}
\begin{biblist}
\bib{AG22FFA}{article}{
AUTHOR = {Asgarli, Shamil},
AUTHOR = {Ghioca, Dragos},
TITLE = {A {B}ertini type theorem for pencils over finite fields},
JOURNAL = {Finite Fields Appl.},
VOLUME = {77},
YEAR = {2022},
PAGES = {Paper No. 101936, 13},
DOI = {10.1016/j.ffa.2021.101936},
URL = {https://doi.org/10.1016/j.ffa.2021.101936},
}
\bib{AG22}{article}{
AUTHOR = {Asgarli, Shamil},
AUTHOR={Ghioca, Dragos},
TITLE = {Smoothness in pencils of hypersurfaces over finite fields},
journal = {Bull. Aust. Math. Soc. (to appear), arXiv e-prints},
year ={2022},
eprint = {https://arxiv.org/abs/2203.07169},
}
\bib{Bal07}{article}{
AUTHOR = {Ballico, E.},
TITLE = {Bertini's theorem over a finite field for linear systems of
quadrics},
JOURNAL = {Int. J. Pure Appl. Math.},
VOLUME = {35},
YEAR = {2007},
NUMBER = {4},
PAGES = {453--455},
}
\bib{Bal09}{article}{
AUTHOR = {Ballico, E.},
TITLE = {Vanishings and non-vanishings of homogeneous forms over a
finite field},
JOURNAL = {Int. J. Pure Appl. Math.},
VOLUME = {57},
YEAR = {2009},
NUMBER = {2},
PAGES = {219--224},
}
\bib{DGH21}{article}{
AUTHOR = {Dimitrov, Vesselin},
AUTHOR = {Gao, Ziyang},
AUTHOR = {Habegger, Philipp},
TITLE = {Uniform bound for the number of rational points on a pencil of
curves},
JOURNAL = {Int. Math. Res. Not. IMRN},
YEAR = {2021},
NUMBER = {2},
PAGES = {1138--1159},
ISSN = {1073-7928},
DOI = {10.1093/imrn/rnz248},
URL = {https://doi.org/10.1093/imrn/rnz248}
}
\bib{PY08}{article}{
AUTHOR = {Pereira, Jorge Vitório},
AUTHOR={Yuzvinsky, Sergey},
TITLE = {Completely reducible hypersurfaces in a pencil},
JOURNAL = {Adv. Math.},
VOLUME = {219},
YEAR = {2008},
NUMBER = {2},
PAGES = {672--688},
DOI = {10.1016/j.aim.2008.05.014},
URL = {https://doi.org/10.1016/j.aim.2008.05.014},
}
\bib{Ste89}{article}{
AUTHOR = {Stein, Yosef},
TITLE = {The total reducibility order of a polynomial in two variables},
JOURNAL = {Israel J. Math.},
VOLUME = {68},
YEAR = {1989},
NUMBER = {1},
PAGES = {109--122},
DOI = {10.1007/BF02764973},
URL = {https://doi.org/10.1007/BF02764973},
}
\bib{Vis93}{article}{
AUTHOR = {Vistoli, Angelo},
TITLE = {The number of reducible hypersurfaces in a pencil},
JOURNAL = {Invent. Math.},
VOLUME = {112},
YEAR = {1993},
NUMBER = {2},
PAGES = {247--262},
DOI = {10.1007/BF01232434},
URL = {https://doi.org/10.1007/BF01232434},
}
\end{biblist}
\end{bibdiv}
\end{document}
|
\section{Introduction}
\label{sec:introduction}
\paragraph{Context.}
Safety-critical software often includes numerical calculations.
Since most processors now contain a floating-point (FP) unit, these calculations often use FP arithmetic to utilise the speed and precision of FP units.
Those developing safety-critical programs need to provide guarantees that the program behaves in a precisely specified way.
This can be achieved via formal verification, i.e., proving that the program adheres to some specification.
\begin{figure}[tb]
\begin{lstlisting}[caption=Sine function in Ada, language=ada, label={code:adaSineImpl}]
function Taylor_Sin (X : Float) return Float is
(X - ((X * X * X) / 6.0));
\end{lstlisting}
\end{figure}
For example, consider the Ada function in Listing~\ref{code:adaSineImpl} that computes a Taylor approximation of the sine function.
We specify that this function gives a result very close to the exact sine function under some conditions:
\begin{equation}\label{eq:taylor-sine-informal-spec}
X \in [-0.5, 0.5] \implies
|\text{\lstinline{Taylor_Sin'Result}}-\sin(X)| \leq 0.001
\end{equation}
We would like a tool to automatically verify this specification or obtain a counter-example if it is not valid.
This is an example of auto-active verification \cite{leino2010auto-active}, i.e., automated proving of inline specifications such as post-conditions and loop invariants.
To this end, we deploy SPARK technology~\cite{hoang_spark_2015}, which represents the state-of-the-art in industry-standard formal software verification.
Specifically, we use SPARK Pro 22.1 which includes the GNAT Studio IDE and GNATprove.
GNATprove manages Why3 and a selection of bundled SMT solvers as shown in Fig.~\ref{fig:oldGnatprove}.
\begin{figure}[tb]
\centering
\includegraphics[width=0.8\hsize]{figures/SPARK_Toolchain-crop.pdf}
\caption{Overview of Automated Verification via GNATProve (adapted from \cite{fumex_automated_2017})}
\label{fig:oldGnatprove}
\end{figure}
As a language, SPARK is based on Ada with a focus on program verification.
GNATprove translates SPARK programs to WhyML programs using GNAT2Why.
Why3~\cite{bobot_why3_2011} then derives proof obligations in the form of verification conditions (VCs), which are formulas comprising traditional mathematical features such as numbers, numerical functions, and sets, and do not mention programming constructions such as loops and mutable variables.
The VCs imply that the program satisfies the given specification.
Finally, these VCs are sent to various SMT solvers which will attempt to decide them.
Why3 plays a key role in SPARK as well as other toolchains, effectively harnessing available solvers and provers for software verification.
\paragraph{Problem.}
With a SPARK version of the specification~(\ref{eq:taylor-sine-informal-spec}), the toolchain automatically verifies absence of overflow in the \lstinline{Taylor_Sin} function.
This is not difficult since the input \lstinline{X} is restricted to the small domain $[-0.5,0.5]$.
However, the current SPARK toolchain and other frameworks we are aware of are unable to automatically verify that the result of \lstinline{Taylor_Sin(X)} is close to the exact $\sin(\text{\lstinline{X}})$.
Part of the problem is that the VCs feature a mixture of exact real and FP operations.
For example, in the VCs derived from (\ref{eq:taylor-sine-informal-spec}), \lstinline{Taylor_Sin'Result} is replaced with
\[
X \ominus ((X \otimes X \otimes X) \oslash 6.0);
\]
where $\ominus$, $\otimes$, and $\oslash$ are FP subtraction, multiplication. and division, respectively.
Although SPARK has some support for FP verification as described in \cite{fumex_automated_2017}, automatically verifying (\ref{eq:taylor-sine-informal-spec}) requires further work and that is what we set out to do here, building on \cite{fumex_automated_2017}.
\paragraph{Solution.}
To automatically verify functional specifications analogous to the one in equation~(\ref{eq:taylor-sine-informal-spec}), we have designed and implemented an extension of the SPARK proving process, called PropaFP. The following steps are applied to quantifier-free VCs that contain real inequalities:
\begin{enumerate}
\item Derive bounds for variables and simplify the VC.
\item Safely replace FP operations with exact operations.
\item Again simplify the VC.
\item Attempt to decide the resulting VCs with provers for nonlinear real theorems.
\end{enumerate}
PolyPaver~\cite{duracz2014-polypaver} is a nonlinear real theorem prover that integrates with an earlier version of SPARK, but lacks the simplification steps and has much less powerful method of replacing FP operations.
\paragraph*{Paper outline.}
Section~\ref{sec:provingProcess} describes our process in detail, and
Section~\ref{sec:writing-specifications} analyses what constitutes an error bound provable by this process.
Sections~\ref{sec:verifyHeron} and \ref{sec:verifySin} illustrate the process on further examples, featuring a loop, domain reduction using integers, and calling non-trivial subprograms.
Section~\ref{sec:verifyHeron} presents an implementation of Heron's method for approximating the square-root of a number, while
Section~\ref{sec:verifySin} describes a verification of an adapted version of the sine function implementation from an AdaCore library used for safety-critical applications.
Section~\ref{sec:benchmarks} analyses the performance of the new proving process on the examples described in this paper and Section~\ref{sec:conclusion} concludes the paper.
\section{Our Proving Process}\label{sec:provingProcess}
When describing our proving process, we will illustrate its steps using the program \lstinline{Taylor_Sin} from Listing~\ref{code:adaSineImpl}.
Let us first consider its SPARK formal specification
shown in Listing \ref{code:sineSpec}.
To write more intuitive specifications, we use the Ada \lstinline{Big_Real} and \lstinline{Big_Integer} libraries to get rational arithmetic in specifications.
We have created axiomatic definitions of some exact functions, including sine which we call \lstinline{Real_Sin}.
These axiomatic functions have no implementation, only a specification which states that they behave like their analogous exact function.
The listings in this paper have shortened versions of some functions to aid readability.
Functions \lstinline{FC.To_Big_Real}, \lstinline{FLC.To_Big_Real}, and \lstinline{To_Real} respectively embed \lstinline{Floats}, \lstinline{Long_Floats} (doubles), and \lstinline{Integers} to \lstinline{Big_Reals}.
We have shortened these to \lstinline{Rf}, \lstinline{Rlf}, and \lstinline{Ri} respectively.
It should be understood that Why3 treats the \lstinline{Big_Real} type as reals, not rationals.
The post-condition specifies a bound on the total error, i.e., the difference between this Taylor series approximation of sine and the exact sine of \lstinline{X}.
\begin{figure}[t]
\begin{lstlisting}[caption=SPARK formal specification of \lstinline{Taylor_Sin}, language=ada, label={code:sineSpec}]
function Taylor_Sin (X : Float) return Float with
Pre => X >= -0.5 and X <= 0.5,
Post =>
abs(Real_Sin(Rf(X)) - Rf(Taylor_Sin'Result))
<= Ri(25889) / Ri(100000000); -- 0.00025889
\end{lstlisting}
\end{figure}
\begin{figure}[tb]
\centering
\includegraphics[width=0.8\hsize]{figures/Spark_Toolchain_PropaFP-crop.pdf}
\caption{Overview of Automated Verification via GNATprove with PropaFP}
\label{fig:gnatprove}
\end{figure}
\subsection{Generating and processing verification conditions}\label{sec:GeneratingVCs}
As described in the introduction, we use GNATprove/Why3 to generate VCs.
In principle, we could use other programming and specification languages, as long as we can obtain VCs of a similar nature.
If a VC is not decided by the included SMT solvers, we use the Manual Proof feature in GNAT Studio to invoke PropaFP via a custom Why3 driver based on the driver for CVC4. This driver first applies selected Why3 symbolic simplifications and saves the VC in SMT format.
As in this format the VC is a negation of the specification from which it was produced, we shall refer to it as `the negated VC' (NVC).
The VC \lstinline{contextAsConjunction $\implies$ goal} becomes the NVC \lstinline{contextAsConjunction $\wedge$ $\lnot$goal}.
During the process, we may weaken the conjunction of assertions by, for example, dropping assertions.
A model that satisfies the weakened NVC will not necessarily be a counter-example to the original VC or the original specification.
However, if the weakened NVC has no model, then both the original VC and the original specification are correct.
When parsing the SMT files, we
ignore the definitions of basic arithmetic operations and transcendental functions.
Instead of using these definitions, we use each prover's built-in interpretations of such operations and functions.
In more detail, the parsing stage comprises the following steps:
\begin{itemize}
\item Parse the SMT file as a list of symbolic expressions. Drop everything except assertions and variable and function type declarations.
\item Attempt to parse all assertions in the conjunction. If an assertion contains any function not supported by the proving process, we drop the assertion.
\item Functions are interpreted using their names.
\begin{itemize}
\item We rely on each prover's built-in understanding of the supported functions, currently $-,+,\times,\div,\exp, \log, \sin, \cos, \sqrt{\cdot}, \mathrm{mod}$.
\item To increase the safety of this interpretation, we check the return type of some `ambiguous' functions.
\begin{itemize}
\item For example, the output of a function named \lstinline{of_int} depends on the return type, i.e. If the return type of \lstinline{of_int(x)} is a single-precision float, parse this as \lstinline{Float32(x)}.
\item For functions such as \lstinline{fp.add}, the return type is clear from the name of the function. Also, for these functions a type declaration is normally not included in the SMT file.
\end{itemize}
\end{itemize}
\end{itemize}
We use the operands to derive the type of the operation as follows:
\begin{itemize}
\item FP operations are generic in the FP type, e.g., addition is encoded as \lstinline{fp.add param1 param2} for both single and double precision numbers.
\begin{itemize}
\item FP literals are encoded in the SMT file as bits, making it trivial to determine their type.
\item If the FP operation contains variables, use variable declarations to determine the type of each variable.
\item If every literal and every variable in the operation has the same type, we can decide the type of the operation.
\item If an operation has operands of differing types, we cannot determine the type of the FP operation, and drop the assertion.
\end{itemize}
\end{itemize}
\paragraph*{Dealing with $\pi$.}
Similar to \lstinline{Real_Sin}, we have created a function, \lstinline{Real_Pi}, which takes no input, and is specified with axioms to state that it behaves like $\pi$.
Why3 turns this into a function, \lstinline{real_pi}, with one \lstinline{void} input.
To help provers understand that this is the exact $\pi$, we substitute calls to the function \lstinline{real_pi} with $\pi$.
For \lstinline{Taylor_Sin}, the only VC that the SMT solvers included with GNAT Studio cannot solve is the post-condition VC.
The NVC for the post-condition is in Listing~\ref{vc-sine}.
It has been reformatted for better readability by, e.g., removing unneeded brackets, using circles for floating-point operations, and omitting irrelevant statements.
The predicate \lstinline{isFiniteFloat(X)} is short for the inequalities \lstinline{MinFloat <= X, X <= MaxFloat}.
\begin{lstlisting}[float,caption=NVC corresponding to the post-condition from Listing~\ref{code:sineSpec}, label=vc-sine,basicstyle=\fontsize{7.5}{9pt}\tt]
-- assertions regarding axioms for sin and pi omitted
assert to_float(RNA, 1) $=$ 1.0
assert isFiniteFloat(x)
assert (-0.5) $\le$ x $\wedge$ x $\le$ 0.5
assert isFiniteFloat(x$\odot$x)
assert isFiniteFloat((x$\odot$x)$\odot$x)
assert isFiniteFloat(x $\ominus$ (((x$\odot$x)$\odot$x)$\oslash$6.0))
assert
$\neg$((
sin(x) $+$ (-1$\cdot$(x $\ominus$ (((x$\odot$x)$\odot$x)$\oslash$6.0))) $\ge$ 0.0
$\implies$
sin(x) $+$ (-1$\cdot$(x $\ominus$ (((x$\odot$x)$\odot$x)$\oslash$6.0))) $\le$ 25889/100000000
)$\wedge$(
$\neg$(sin(x) $+$ (-1$\cdot$(x $\ominus$ (((x$\odot$x)$\odot$x)$\oslash$6.0))) $\ge$ 0.0)
$\implies$
-1$\odot$(sin(x) $+$ (-1$\cdot$(x $\ominus$ (((x$\odot$x)$\odot$x)$\oslash$6.0)))) $\le$ 25889/100000000
))
\end{lstlisting}
\subsection{Simplifications and bounds derivation}\label{sec:simple-preprocessing}
As some of the tools used by PropaFP require bounds on all variables, we attempt to derive bounds from the assertions in the NVC.
First, we make the following symbolic simplifications to help derive better bounds:
\begin{itemize}
\item Reduce vacuous propositions and obvious tautologies, such as:
\begin{itemize}
\item \lstinline{(NOT $\varphi$ OR true) AND ($\varphi$ OR false)} $\longrightarrow$ \lstinline{$\varphi$}
\item \lstinline{$\varphi$ = $\varphi$} $\longrightarrow$ \lstinline{true}
\end{itemize}
\item Eliminate variables by substitution as follows:
\begin{itemize}
\item Find variable-defining equations in the NVC, except circular definitions.
\item Pick a variable definition and make substitutions accordingly.
\begin{itemize}
\item E.g., pick \lstinline{i=i1+1}, and replace all occurrences of \lstinline{i} with \lstinline{i1+1}.
\end{itemize}
\item If the variable has multiple definitions, pick the shortest one.
\begin{itemize}
\item E.g., if we have both \lstinline{x=1} and \lstinline {x=0+1}, all occurrences of x will be replaced with \lstinline{1}, including \lstinline{x=0+1} $\longrightarrow$ \lstinline{1=0+1}.
\end{itemize}
\end{itemize}
\item Perform simple arithmetic simplifications, such as:
\begin{itemize}
\item \lstinline{$\varphi$ / 1} $\longrightarrow$ \lstinline{$\varphi$}
\item \lstinline{0 + 1} $\longrightarrow$ \lstinline{1}
\item \lstinline{MIN (e, e)} $\longrightarrow$ \lstinline{e}.
\end{itemize}
\item Repeat the above steps until no further simplification can be made.
\end{itemize}
Deriving bounds for variables proceeds as follows:
\begin{itemize}
\item Identify inequalities which contain only a single variable on either side.
\item Iteratively improve bounds by interval-evaluating the expressions given by these inequalities.
\begin{itemize}
\item Initially the bounds for each variable are $-\infty$ and $\infty$.
\item For floating-point rounding $\mathit{rnd}(x)$, we overestimate the rounding error by the interval expression $x\cdot(1\pm\epsilon) \pm \zeta$ where $\epsilon$ is the machine epsilon, and $\zeta$ is the machine epsilon for denormalized numbers for the precision of the rounded operation.
\end{itemize}
\item These variables are assumed to be real unless they are declared integer.
\item For integer variables,
trim their bounds to nearest integers inside the interval.
\end{itemize}
Next, use the derived bounds to potentially further simplify the NVC:
\begin{itemize}
\item Evaluate all formulas in the NVC using interval arithmetic.
\item If an inequality is decided by this evaluation, replace it with \lstinline{True} or \lstinline{False}.
\end{itemize}
Finally, repeat the symbolic simplification steps, e.g., to remove any tautologies that have arisen in the interval evaluation.
Repeat deriving bounds, evaluations, and simplifications until we have no further improvement.
\paragraph{Similarities with Abstract Interpretation}
This process of deriving bounds can be thought of as a simple form of Abstract Interpretation (AI) over the interval domain, but instead of scanning program steps along paths in loops, we scan a set of mutually recursive variable definitions.
A similar iterative fixed-point calculation is used in both approaches.
The NVC arising from \lstinline{Taylor_Sin}, shown in Listing~\ref{vc-sine}, is already almost in its simplest form.
The symbolic steps described in this section applied on this NVC only remove the assertions bounding \lstinline{X} and \lstinline{pi}, and replace \lstinline{pi} with $\pi$.
The resulting NVC is outlined in Listing~\ref{vc-processed-sine}.
\begin{lstlisting}[float=t,caption=\lstinline{Taylor_Sin} NVC after simplification and bounds derivation, label=vc-processed-sine,basicstyle=\fontsize{7.5}{9pt}\tt]
Bounds on variables:
x (real) $\in$ [-0.5, 0.5]
NVC:
assert to_float(RNA, 1) $=$ 1.0
-- The last assertion is unchanged from Listing~\ref{vc-sine} except turning $\geq$s into equivalent $\leq$s.
\end{lstlisting}
\subsection{Eliminating floating-point operations}\label{sec:elim:rounding}
VCs arising from floating-point programs are likely to contain floating-point operations.
As most provers for real inequalities do not natively support floating-point operations, we need to eliminate the floating-point operations before passing the NVCs to a numerical prover.
We propose computing a bound on the size of the overall rounding errors in expressions using a tool specialised in this task,
replacing floating-point operations with exact operations,
and compensating for the loss of rounding by adding/subtracting the computed error bound.
Note that this action weakens the NVCs.
Recall that weakening is safe for proving correctness but may lead to incorrect counter-examples.
Currently, in our implementation we use FPTaylor \cite{solovyev2018-FPTaylor}, which supports most of the operations we need.
In principle, we can use any tool that gives reliable absolute bounds on the rounding error of our floating-point expressions, such as Gappa~\cite{10.1145/1644001.1644003} or Rosa~\cite{darulova2017-Rosa}.
There are expressions containing floating-point operations in the \lstinline{Taylor_Sin} NVC.
The top-level expressions with FP operators are automatically passed to FPTaylor.
Listing \ref{code:fptaylorHeron} shows an example of how the expressions are specified to FPTaylor.
The error bounds computed by FPTaylor for the \lstinline{Taylor_Sin} NVC expressions with floating-point operators are summarised in Table~\ref{table:rounding-errors}.
\begin{table}[ht]
\begin{center}
\begin{tabular}{l@{\kern 1em}l}
\toprule
\fontsize{7}{10pt}\selectfont
\texttt{rnd32(1.0)} & 0 \\
\fontsize{7}{10pt}\selectfont
\texttt{sin(x) + (-1 * rnd32((x - rnd32((rnd32((rnd32((x * x)) * x)) / 6)))))} & 1.769513e-8 \\
\fontsize{7}{10pt}\selectfont
\texttt{-1 * (sin(x) + (-1 * rnd32((x - rnd32((rnd32((rnd32((x * x)) * x)) / 6))))))} & 1.769513e-8 \\
\bottomrule
\end{tabular}
\end{center}
\caption{Error bounds computed by FPTaylor}\label{table:rounding-errors}
\end{table}
\begin{lstlisting}[float=t,caption=FPTaylor file to compute an error bound of the \lstinline{Taylor_Sin} VC,label={code:fptaylorHeron}, language=C]
Variables
real x in [-0.5, 0.5];
Expressions
sin(x) + (-1 * rnd32((x - rnd32((rnd32((rnd32((x*x))*x)) / 6)))));
// Computed absolute error bound: 1.769513e-8
\end{lstlisting}
We can now use these error bounds to safely replace FP operations with exact operations.
Listing~\ref{vc-processed-sine-exact} shows the resulting NVC for \lstinline{Taylor_Sin}.
\begin{lstlisting}[float=t,caption={\lstinline{Taylor_Sin} NVC after removal of FP operations}, label=vc-processed-sine-exact,basicstyle=\fontsize{7.5}{9pt}\tt]
Bounds on variables:
x (real) $\in$ [-0.5, 0.5]
NVC:
assert 1 $\pm$ $\texttt{\uline{0.0}}$ $=$ 1.0
assert
$\neg$((
0.0 $\le$ (sin(x) $+$ (-1$\cdot$(x $-$ ((x$\cdot$x)$\cdot$x$/$6.0))) $+$ $\uline{1.769513\texttt{e}^{-8}}$)
$\implies$
(sin(x) $+$ (-1$\cdot$(x $-$ ((x$\cdot$x)$\cdot$x$/$6.0))) $+$ $\uline{1.769513\texttt{e}^{-8}}$) $\le$ (25889/100000000)
)$\wedge$(
$\neg$ (0.0 $\le$ (sin(x) $+$ (-1$\cdot$(x $-$ ((x$\cdot$x)$\cdot$x$/$6.0))) $-$ $\uline{1.769513\texttt{e}^{-8}}$))
$\implies$
(-1$\cdot$(sin(x) $+$ (-1$\cdot$(x $-$ ((x$\cdot$x)$\cdot$x$/$6.0))) $+$ $\uline{1.769513\texttt{e}^{-8}}$)) $\le$ (25889/100000000)
))
\end{lstlisting}
There may be statements which can be further simplified thanks to the elimination of FP operations.
For example, in Listing~\ref{vc-processed-sine-exact}, we have the trivial tautology $1 \pm 0.0 = 1.0$.
To capitalise on such occurrences, we
could once again interval-evaluate each statement in the NVC.
Instead, we invoke the steps from Section~\ref{sec:simple-preprocessing} again, which not only include interval evaluation, but also make any consequent simplifications.
In Table \ref{table:benchmarks} this NVC is referred to as Taylor\_Sin.
We now have derived bounds for variables and a weakened and simplified NVC with no FP operations, ready for provers. We will call this the `simplified exact NVC'.
\begin{lstlisting}[float=t,caption={\lstinline{Taylor_Sin} simplified exact NVC, ready for provers}, label=vc-processed-sine-exact-s,basicstyle=\fontsize{7.5}{9pt}\tt]
Bounds on variables:
x (real) $\in$ [-0.5, 0.5]
NVC:
-- The last assertion is the same as in Listing~\ref{vc-processed-sine-exact}
\end{lstlisting}
\paragraph{Alternative Methods to Deal with Floating-Point Operations}
Why3 includes a formalization of the FP IEEE-754 standard \cite{noauthor_ieee_2008}.
For SMT solvers that natively support FP operations, this formalization is mapped to the SMT-LIB FP theory, and
for SMT solvers that do not support FP operations, an axiomatization of the formalization is given \cite{fumex_automated_2017}.
This approach is not powerful enough to verify our \lstinline{Taylor_Sin} NVC as well as examples we discuss later.
\section{Deriving Provable Error Bounds}\label{sec:writing-specifications}
The specification in Listing~\ref{code:sineSpec} bounds the difference between \lstinline{Taylor_Sin(X)} and the exact sine function.
Such a bound can be broken down as follows:
\begin{itemize}
\item The \textbf{subprogram specification error}, i.e. the error inherited from the specification of any subprograms that the implementation relies on.
\begin{itemize}
\item If an implementation relies on some subprogram, the specification, not the implementation, of that subprogram would be used in the Why3 VC.
\item For \lstinline{Taylor_Sin} this component is $0$ as it does not call any subprograms.
\end{itemize}
\item The \textbf{maximum model error}, ie the maximum difference between the \emph{model} used in the computation and the exact \emph{intended} result.
\begin{itemize}
\item For \lstinline{Taylor_Sin} this is the difference between the degree 3 Taylor polynomial for the sine function and the sine function.
\end{itemize}
\item The \textbf{maximum rounding error}, i.e. the maximum difference between the \emph{exact model} and the \emph{rounded model} computed with FP arithmetic.
\item A \textbf{rounding analysis cushion} arising when eliminating floating-point operations. This is the difference between the \emph{actual maximum} rounding error and the \emph{bound} on the rounding error calculated by a tool such as FPTaylor as well as over-approximations made when deriving bounds for variables.
\begin{itemize}
\item The derived bounds are imperfect due to the accuracy loss of interval arithmetic as well as the over-approximation of floating-point operations.
\item Imperfect bounds inflate the computed rounding error bound, as more values have to be considered.
\end{itemize}
\item A \textbf{proving cushion} is added so that the specification can be decided by the approximation methods in the provers.
Without this \emph{cushion}, the provers could not decide the given specification within certain bounds on resources, such as a timeout.
\end{itemize}
To justify our specification in Listing~\ref{code:sineSpec}, we estimated the values of all five components.
Our estimates can be seen in Table \ref{table:taylor-sine-components}.
The \textbf{maximum model error} and the \textbf{maximum rounding error} were calculated using the Monte-Carlo method.
We ran a simulation comparing the Taylor series approximation of degree 3 of the sine function and an exact sine function.
This simulation was ran for one million with pseudo-random inputs, giving us an approximate model error.
To estimate the maximum rounding error,
we compared a single precision and a quadruple precision floating-point implementation of the model for one hundred million pseudo-random inputs.
(Floating-point operations are much faster than exact operations.)
We estimated \textbf{rounding analysis cushion} by the difference between the \textbf{rounding errror} and the bound given by FPTaylor ($\sim 1.77E{-}8$).
Note that the actual \textbf{rounding analysis cushion} may be larger due to over approximations made when deriving bounds.
\begin{table}[t]
\begin{center}
\begin{tabular}{l@{\kern 1em}l@{\kern 1em}l}
\toprule
& single precision & double precision \\
\cmidrule(r){2-2}
\cmidrule{3-3}
\textbf{Subprogram Specification Error} & $0$ & $0$\\
\textbf{Maximum Model Error} & $\sim 2.59E{-}4$ & $\sim 2.59E{-}4$ \\
\textbf{Maximum Rounding Error} & $\sim 1.61E{-}8$ & $\sim 2.89E{-}17$ \\
\textbf{Rounding Analysis Cushion} & $\sim 1.57E{-}9$ & $\sim 4.04E{-}18$\\
\textbf{Proving Cushion} & $\sim 2.11E{-}9$ & $\sim 1.80E{-}9$\\
\bottomrule
\end{tabular}
\end{center}
\caption{Error bound components for \lstinline{Taylor_Sin}}\label{table:taylor-sine-components}
\end{table}
The sum of the \textbf{maximum model error}, the \textbf{maximum rounding error}, and the \textbf{rounding analysis cushion}
is around 0.0002588878950.
Raising the specification bound to 0.00025889 enables provers LPPaver and dReal to verify the specification, using a \textbf{proving cushion} of around $2.11E{-}9$.
In this case, most of the error in the program comes from the \textbf{maximum model error}.
If we increased the number of Taylor terms, the \textbf{maximum model error} would become smaller and the \textbf{maximum rounding error} would become larger.
Increasing the input domain would make both the \textbf{maximum model error} and the \textbf{maximum rounding error} larger.
Increasing the precision of the floating-point numbers used is a simple way to reduce both the maximum \textbf{rounding error} and the \textbf{rounding analysis cushion}.
Table~\ref{table:taylor-sine-components} on the right shows estimates for the components in a double-precision version of \lstinline{Taylor_Sin}.
The simplified exact NVC resulting from this example is referred to as Taylor\_Sin\_Double in Table~\ref{table:benchmarks}.
To see how the \textbf{subprogram specification error} affects provable error bounds, consider function \lstinline{SinSin}
given in Listings~\ref{code:sinSinBody} and \ref{code:sinSinSpec}.
\begin{figure}[ht]
\vspace{-2ex}
\begin{lstlisting}[caption=SinSin function definition in SPARK, language=ada, label={code:sinSinBody}]
procedure Taylor_Sin_P (X : Float; R : out Float) is
begin
R := X - ((X * X * X) / 6.0);
end Taylor_Sin_P;
function SinSin (X : Float) return Float is
OneSin, TwoSin : Float;
begin
Taylor_Sin_P(X, OneSin);
Taylor_Sin_P(OneSin, TwoSin);
return TwoSin;
end SinSin;
\end{lstlisting}
\begin{lstlisting}[caption=SinSin function specification in SPARK, language=ada, label={code:sinSinSpec}]
procedure Taylor_Sin_P (X : Float; R : out Float) with
Pre => X >= -0.5 and X <= 0.5,
Post =>
Rf(R) >= Ri(-48) / Ri(100) and -- Helps verification of calling functions
Rf(R) <= Ri(48) / Ri(100) and
abs(Real_Sin(Rf(X)) - Rf(R)) <= Ri(25889) / Ri(100000000);
function SinSin ( X : Float) return Float with
Pre => X >= -0.5 and X <= 0.5,
Post =>
abs(Real_Sin(Real_Sin(Rf(X))) - Rf(SinSin'Result))
<= Ri(51778) / Ri(100000000);
\end{lstlisting}
\end{figure}
\lstinline{Taylor_Sin_P} is the procedure version of the \lstinline{Taylor_Sin} function.
Our implementation currently does not support function calls, but it does support procedure calls. (This limitation is not conceptually significant.)
The specification for \lstinline{Taylor_Sin_P} has two additional inequalities, bounding the output value \lstinline{R} to allow us to derive tight bounds for \lstinline{R} when proving VCs involving calls of this procedure.
Verifying this procedure in GNATprove gives one NVC for our proving process, corresponding to the final post-condition.
This NVC is referred to as and Taylor\_Sin\_P in Table~\ref{table:benchmarks}.
The exact NVC is in folder \href{https://github.com/rasheedja/PropaFP/tree/master/examples/taylor_sine}{\texttt{examples/taylor\_sine}} in \cite{noauthor_rasheedjapropafp_nodate}.
Function \lstinline{SinSin} calls \lstinline{Taylor_Sin_P} with the parameter \lstinline{X}, storing the result in variable \lstinline{OneSin}.
\lstinline{Taylor_Sin_P} is then called again with the parameter \lstinline{OneSin}, storing the result in \lstinline{TwoSin}, which is then returned.
The post-condition for the \lstinline{SinSin} function specifies the difference between our \lstinline{SinSin} implementation and calling the exact sine function on \lstinline{X} twice.
The VC resulting from this post-condition is referred to as SinSin in Table \ref{table:benchmarks}.
Since the steps of \lstinline{SinSin} involve only subprogram calls, there is no \textbf{model error} or \textbf{rounding error}, and thus no \textbf{rounding analysis cushion}.
As the value of \lstinline{SinSin} comes from \lstinline{Taylor_Sin_P} applied twice, and the derivative of $\sin$ has the maximum value $1$, the \textbf{subprogram specification error} is a little below $0.00025889 + 0.00025889 = 0.00051778$.
Experimenting with different bounds, we estimate the
LPPaver \textbf{proving cushion} is around $10^{-13}$.
There is a delicate trade-off between the five components that a programmer would need to manage by a careful choice of the model used, floating-point arithmetic tricks, and proof tools used to obtain a specification for a program that is both accurate and does not require large cushions or specification errors.
It is not our goal to make this type of optimisation for the example programs, rather we have calculated these values to help improve the understanding of how difficult it is to estimate them in practice.
In simple cases, it would be sufficient to tighten and loosen the `bound' in the specification until the proving process succeeds and fails, respectively.
\section{Verification of Heron's Method for Approximating the Square Root Function}\label{sec:verifyHeron}
We used PropaFP to verify an implementation of Heron's method.
This is an interesting case study because it requires the use of loops and loop invariants.
\begin{figure*}[ht]
\vspace{-2ex}
\begin{lstlisting}[caption=Heron's Method Specification, language=ada, label={code:heronSpec},basicstyle=\fontsize{7.5}{9pt}\tt]
function Certified_Heron (X : Float; N : Integer) Return Float with
Pre => X >= 0.5 and X <= 2.0 and N >= 1 and N <= 5,
Post =>
abs(Real_Square_Root(Rf(X)) - Rf(Certified_Heron'Result))
<= (Ri(1) / (Ri(2 ** (2 ** N)))) -- $\smash{\nicefrac{1}{2^{2^{\mathtt{N}}}}}$ model error
+ Ri(3*N)*(Ri(1)/Ri(8388608)); -- $3\cdot\mathtt{N}\cdot \varepsilon$, rounding error bound
\end{lstlisting}
\begin{lstlisting}[caption=Heron's Method Implementation, language=ada, label={code:heronImpl},basicstyle=\fontsize{7.5}{9pt}\tt]
function Certified_Heron (X : Float; N : Integer) return Float is
Y : Float := 1.0;
begin
for i in 1 .. N loop
Y := (Y + X/Y) / 2.0;
pragma Loop_Invariant (Y >= 0.7);
pragma Loop_Invariant (Y <= 1.8);
pragma Loop_Invariant
(abs (Real_Square_Root (Rf(X)) - Rf(Y))
<= (Ri(1) / (Ri(2 ** (2 ** N)))) -- $\smash{\nicefrac{1}{2^{2^{\mathtt{i}}}}}$
+ Ri(3*i)*(Ri(1)/Ri(8388608))); -- $3\cdot\mathtt{i}\cdot \varepsilon$
end loop;
return Y;
end Certified_Heron;
\end{lstlisting}
\vspace{-2ex}
\end{figure*}
In Listing~\ref{code:heronSpec}, the term $3\cdot\mathtt{N}\cdot \varepsilon$ is a bound for the compound rounding error guessed by counting the number of operations.
Note that five iterations are more than enough to get a good approximation of the square root function for X in the range $[0.5, 2]$.
The implementation in Listing \ref{code:heronImpl} contains the loop invariants.
The bounds on Y here help generate easier VCs for the loop iterations and post-loop behaviour.
The main loop invariant is very similar to the post-condition in the specification, except substituting \lstinline{i} for \lstinline{N}, essentially specifying the difference between the exact square root and Heron's method for each iteration of the loop.
Why3 produces 74 NVCs from our implementation of Heron's method.
72 of these NVCs are either trivial or verified by SMT solvers.
PropaFP is required for 2 NVCs that come from the main loop invariant.
One NVC specifies that the loop invariant holds in the initial iteration of the loop, where \lstinline{i} is equal to 1.
Another VC specifies that the loop invariant is preserved from one iteration to the next, where \lstinline{i} ranges from 1 and \lstinline{N}.
We refer to these NVCs as as Heron\_Init and Heron\_Pres in Table \ref{table:benchmarks}.
Note that the third NVC derived from the invariant, i.e., that the invariant on the last iteration implies the postcondition is trivial here.
The corresponding simplified exact NVCs can be found in folder \href{https://github.com/rasheedja/PropaFP/tree/master/examples/heron/txt}{\texttt{examples/heron}} in \cite{noauthor_rasheedjapropafp_nodate}.
\section{Verifying AdaCore's Sine Implementation}\label{sec:verifySin}
With the help of PropaFP, we developed a verified version of an Ada sine implementation written by AdaCore for their high-integrity math library\footnote{We obtained the original code from file \texttt{src/ada/hie/s-libsin.adb} in archive \texttt{gnat-2021-20210519-19A70-src.tar.gz} downloaded from ``More packages, platforms, versions and sources'' at \url{https://www.adacore.com/download}.}.
First, we translated the program from Ada to SPARK, which entailed removing the use of generic types and other SPARK-violating code.
The code consists of several dependent subprograms.
There are functions for computing $\sin(x)$ and $\cos(x)$ for $x$ close to $0$ and functions that extend the domain to $x\in [-802,802]$ by translating $x$ into one of the four basic quadrants near $0$.
There is also a loop that extends the domain further.
We have focused on the code for $x \in [-802,802]$ and postponed the verification of the loop.
We have translated functions into procedures since PropaFP currently does not support function calls.
Next, we discuss all six procedures that we needed to specify and verify.
\subsection{Multiply\_Add}
\begin{figure*}[t]
\vspace{-2ex}
\begin{lstlisting}[caption=Multiply\_Add Implementation, language=ada, label={code:HIEMultiplyAddImpl},basicstyle=\fontsize{7.5}{9pt}\tt]
procedure Multiply_Add (X, Y, Z : Float; Result : out Float) is
begin
Result := (X * Y + Z);
end Multiply_Add;
\end{lstlisting}
\begin{lstlisting}[caption=Multiply\_Add Specification, language=ada, label={code:HIEMultiplyAddSpec},basicstyle=\fontsize{7.5}{9pt}\tt]
procedure Multiply_Add (X, Y, Z : Float; Result : out Float) with
Pre =>
(-3.0 <= X and X <= 3.0) and
(-3.0 <= Y and Y <= 3.0) and
(-3.0 <= Z and Z <= 3.0),
Post =>
(-12.0 <= Result and Result <= 12.0) and
Result = X * Y + Z;
\end{lstlisting}
\vspace{-2ex}
\end{figure*}
The specification in Listing \ref{code:HIEMultiplyAddSpec} restricts the ranges of the input and output to rule out overflows.
We used very small bounds based on how the function is used locally by the other procedures.
\subsection{My\_Machine\_Rounding}
\begin{figure*}[tb]
\vspace{-2ex}
\begin{lstlisting}[caption=My\_Machine\_Rounding Implementation, language=ada, label={code:HIERoundingImpl},basicstyle=\fontsize{7.5}{9pt}\tt]
procedure My_Machine_Rounding (X : Float; Y : out Integer) is
begin
Y := Integer(X); -- rounding to nearest
end My_Machine_Rounding;
\end{lstlisting}
\begin{lstlisting}[caption=My\_Machine\_Rounding Specification, language=ada, label={code:HIERoundingSpec},basicstyle=\fontsize{7.5}{9pt}\tt]
procedure My_Machine_Rounding (X : Float; Y : out Integer) with
Pre =>
(0.0 <= X and X <= 511.0),
Post =>
(0 <= Y and Y <= 511) and
Rf(X) - Ri(Y) >= Ri(-500000001) / Ri(1000000000) and -- -0.500000001
Rf(X) - Ri(Y) <= Ri(500000001) / Ri(1000000000); -- 0.500000001
\end{lstlisting}
\vspace{-2ex}
\end{figure*}
This is a custom procedure that is used to round a floating-point number to the nearest integer.
In the original version of this code, this was done using the SPARK-violating Ada function, \lstinline{Float'Machine_Rounding}.
Again, we specify the ranges of the variables based on the local use of this procedure, to make it easier for our provers to verify the resulting VCs.
The other post-conditions state that the difference between \lstinline{X} and \lstinline{Y} (which is \lstinline{X} rounded to the nearest integer) is, at most, 0.500000001.
We chose this number to avoid any ``touching'' VCs (such as $x > 0 \implies x > 0$), which solvers using interval methods usually cannot prove.
While SMT solvers can usually verify simple touching VCs, here they fail, probably due to the rounding function.
The NVCs resulting from the last two post-conditions are referred to as My\_Machine\_Rounding${}_\ge$ and My\_Machine\_Rounding${}_\le$ in Table \ref{table:benchmarks}.
\subsection{Reduce\_Half\_Pi}
This procedure takes some input value, \lstinline{X}, and subtracts a multiple of $\frac{\pi}{2}$ to translate it into the interval $[-0.26 \otimes \textit{floatingPointPi}, 0.26 \otimes \textit{floatingPointPi}]$.
\begin{figure*}[ht]
\vspace{-2ex}
\begin{lstlisting}[caption=Reduce\_Half\_Pi Implementation, language=ada, label={code:HIEReduceImpl},basicstyle=\fontsize{7.5}{9pt}\tt]
procedure Reduce_Half_Pi (X : in out Float; Q : out Quadrant; R : out Integer)
is
K : constant := Pi / 2.0;
-- Bits\_N : constant := 9;
-- Bits\_C : constant := Float'Machine\_Mantissa - Bits\_N;
C1 : constant Float := 1.57073974609375;
-- Float'Leading\_Part (K, Bits\_C);
C2 : constant Float := 0.0000565797090530395508;
-- Float'Leading\_Part (K - C1, Bits\_C);
C3 : constant Float := 0.000000000992088189377682284;
-- Float'Leading\_Part (K - C1 - C2, Bits\_C);
C4 : constant Float := K - C1 - C2 - C3;
N : Float := (X / K);
begin
My_Machine_Rounding(N, R); -- R is returned for use in the specification
X := (((X - Float(R)*C1) - Float(R)*C2) - Float(R)*C3) - Float(R)*C4;
-- The above is roughly equivalent to X := (X - Float(R)*K);
Q := R mod 4;
end Reduce_Half_Pi;
\end{lstlisting}
\begin{lstlisting}[caption=Reduce\_Half\_Pi Specification, language=ada, label={code:HIEReduceSpec},basicstyle=\fontsize{7.5}{9pt}\tt]
subtype Quadrant is Integer range 0 .. 3;
Max_Red_Trig_Arg : constant := 0.26 * Ada.Numerics.Pi;
Half_Pi : constant := Ada.Numerics.Pi / 2.0;
procedure Reduce_Half_Pi (X : in out Float; Q : out Quadrant; R : out Integer)
with Pre => X >= 0.0 and X <= 802.0,
Post =>
R >= 0 and R <= 511 and
Rf(X'Old / (Pi/2.0)) - Ri(R) >= Ri(-500000001)/Ri(1000000000) and
Rf(X'Old / (Pi/2.0)) - Ri(R) <= Ri(500000001)/Ri(1000000000) and
Q = R mod 4 and
X >= -Max_Red_Trig_Arg and X <= Max_Red_Trig_Arg and
(Rf(X) - (Rf(X'Old) - (Ri(R)*Real_Pi/Rf(2.0)))) >= Ri(-18)/Ri(100000)
and
(Rf(X) - (Rf(X'Old) - (Ri(R)*Real_Pi/Rf(2.0)))) <= Ri(18)/Ri(100000);
\end{lstlisting}
\vspace{-2ex}
\end{figure*}
The implementation, seen in Listing \ref{code:HIEReduceImpl}, has some significant differences to the original implementation.
First, we limited this procedure to \lstinline{X} within $[0, 802]$ and removed a loop that catered for larger values, as mentioned earlier.
Also, we inlined calls to the SPARK-violating function \lstinline{Float'Leading_Part}, which removes a specified number of bits from a floating-point number.
This function was used to define the variables \lstinline{C1}, \lstinline{C2}, and \lstinline{C3}, in effect, giving a higher precision version of $\pi / 2$ using single-precision floating-point variables.
The specification in Listing \ref{code:HIEReduceSpec} uses the new out parameter \lstinline{R}, which was just a local variable in the original implementation.
\lstinline{R} holds the integer multiple of $\frac{\pi}{2}$ used to shift the input value close to $0$.
The final two post-conditions bound the difference between the computed new value of \lstinline{X} and the ideal model result.
Our proving process is needed for the NVCs derived from the last four post-conditions in Listing \ref{code:HIEReduceSpec}.
These four NVCs derived are referred to in Table \ref{table:benchmarks} as Reduce\_Half\_Pi\_X\{${}_\ge$,${}_\le$\} and Reduce\_Half\_Pi\{${}_\ge$,${}_\le$\}, respectively.
\subsection{Approx\_Sin and Approx\_Cos}
\begin{figure*}[p]
\vspace{-2ex}
\begin{lstlisting}[caption=Approx\_Sin and Approx\_Cos Implementation, language=ada, label={code:HIEApproxImpl},basicstyle=\fontsize{7.5}{9pt}\tt]
procedure Approx_Sin (X : Float; Result : out Float) is
Sqrt_Epsilon_LF : constant Long_Float :=
Sqrt_2 ** (1 - Long_Float'Machine_Mantissa);
G : constant Float := X * X;
-- Horner Scheme
H0 : constant Float := (-0.19501_81843E-3);
H1 : Float;
H2 : Float;
begin
Multiply_Add(H0, G, (0.83320_16396E-2), H1);
Multiply_Add(H1, G, (-0.16666_65022), H2);
if abs X <= Float(Long_Float (Sqrt_Epsilon_LF)) then
Result := X;
else
Result := (X * (H2 * G) + X);
end if;
end Approx_Sin;
procedure Approx_Cos (X : Float; Result : out Float) is
G : constant Float := X * X;
-- Horner Scheme
H0 : constant Float := (0.24372_67909E-4);
H1 : Float;
H2 : Float;
H3 : Float;
H4 : Float;
begin
Multiply_Add(H0, G, (-0.13888_52915E-2), H1);
Multiply_Add(H1, G, (0.41666_61323E-1), H2);
Multiply_Add(H2, G, (-0.49999_99957), H3);
Multiply_Add(H3, G, (0.99999_99999), H4);
Result := H4;
end Approx_Cos;
\end{lstlisting}
\begin{lstlisting}[caption=Approx\_Sin and Approx\_Cos Specification, language=ada, label={code:HIEApproxSpec},basicstyle=\fontsize{7.5}{9pt}\tt]
Max_Red_Trig_Arg : constant := 0.26 * Ada.Numerics.Pi;
Sqrt_2 : constant := 1.41421_35623_73095_04880_16887_24209_69807_85696;
procedure Approx_Sin (X : Float; Result : out Float) with
Pre =>
X >= -Max_Red_Trig_Arg and X <= Max_Red_Trig_Arg,
Post =>
Result >= -1.0 and Result <= 1.0 and
(Rf(Result) - Real_Sin(Rf(X))) >= Ri(-58) / Ri(1000000000) and
(Rf(Result) - Real_Sin(Rf(X))) <= Ri(58) / Ri(1000000000);
procedure Approx_Cos (X : Float; Result : out Float) with
Pre =>
X >= -Max_Red_Trig_Arg and X <= Max_Red_Trig_Arg,
Post =>
Result >= -1.0 and Result <= 1.0 and
(Rf(Result) - Real_Cos(Rf(X))) >= Ri(-14) / Ri(100000000) and
(Rf(Result) - Real_Cos(Rf(X))) <= Ri(14) / Ri(100000000);
\end{lstlisting}
\vspace{-2ex}
\end{figure*}
Approx\_Sin and Approx\_Cos in Listing \ref{code:HIEApproxImpl} compute Taylor series approximations of sine and cosine, respectively, using the Horner scheme.
In the original AdaCore implementation, variable \lstinline{X} has a generic type, but
we have fixed the type to \lstinline{Float}.
The original implementation uses arrays and loops to adapt the order of the Taylor series to the precision of the float type.
Since we have fixed the type of X, we perform these computations directly without arrays and loops.
The specifications in Listing \ref{code:HIEApproxSpec} are quite simple.
The pre-conditions restrict the value of \lstinline{X} to be within the interval $[-0.26 \otimes \textit{floatingPointPi}, 0.26 \otimes \textit{floatingPointPi}]$.
The first two post-conditions in both procedures restrict the \lstinline{Result} to be within the interval $[-1,1]$.
The last two post-conditions in both procedures specify the difference between the exact version of Sine/Cosine and Approx\_Sin/Approx\_Cos.
The NVCs corresponding to the last two postconditions in both procedures
are called Approx\_Sin\{${}_\ge$,${}_\le$\} and Approx\_Cos\{${}_\ge$,${}_\le$\} in Table~\ref{table:benchmarks}.
\subsection{Sin}
\begin{figure*}[t]
\vspace{-2ex}
\begin{lstlisting}[caption=Sin Implementation, language=ada, label={code:HIESinImpl},basicstyle=\fontsize{7.5}{9pt}\tt]
procedure Sin (X : Float; FinalResult : out Float) is
Y : Float := (if X < 0.0 then -X else X);
Q : Quadrant;
R : Integer;
Result : Float;
begin
Reduce_Half_Pi (Y, Q, R);
if Q = 0 or Q = 2 then
Approx_Sin (Y, Result);
else -- Q = 1 or Q = 3
Approx_Cos (Y, Result);
end if;
if X < 0.0 then
FinalResult := (-1.0) * (if Q >= 2 then -Result else Result);
else
FinalResult := (1.0) * (if Q >= 2 then -Result else Result);
end if;
end Sin;
\end{lstlisting}
\begin{lstlisting}[caption=Sin Specification, language=ada, label={code:HIESinSpec},basicstyle=\fontsize{7.5}{9pt}\tt]
procedure Sin (X : Float; FinalResult : out Float)
with Pre =>
X >= -802.0 and X <= 802.0,
Post =>
(Rf(FinalResult) - Real_Sin(Rf(X))) >= Ri(-19) / Ri(100000) and
(Rf(FinalResult) - Real_Sin(Rf(X))) <= Ri(19) / Ri(100000);
\end{lstlisting}
\vspace{-2ex}
\end{figure*}
Finally, procedure Sin in Listing~\ref{code:HIESinImpl} approximates the sine function for inputs from $[-802,802]$.
Compared to the original function,
we have replaced uses of the SPARK-violating function \lstinline{Float'Copy_Sign} with code that has the same effect.
Our proving process is needed to verify NVCs arising from the final two post-conditions in Listing \ref{code:HIESinSpec}, and these are referred to as Sin${}_{\{\ge,\le\}}$ in Table \ref{table:benchmarks}.
\subsection{Generated Why3 NVCs}
In total, Why3 derives 158 NVCs from the six procedures we have described.
SMT solvers can verify 146 NVCs.
The 12 remaining NVCs can be verified using our proving process.
This is broken down by procedure in Table~\ref{table:hieVCs}.
\begin{table}[t]
\caption{Why3 NVCs Generated for each Procedure from our Modified AdaCore Sine Implementation}
\label{table:hieVCs}
\centering
\begin{tabular}{l@{\kern1em}r@{\kern1em}r@{\kern1em}r}
\toprule
Procedure & Generated NVCs & Trivial/SMT & Proving
Process \\
\midrule
Multiply\_Add & 4 & 4 & 0 \\
My\_Machine\_Rounding & 16 & 14 & 2 \\
Reduce\_Half\_Pi & 44 & 40 & 4 \\
Approx\_Sin & 33 & 31 & 2 \\
Approx\_Cos & 41 & 39 & 2 \\
Sin & 20 & 18 & 2 \\
\bottomrule
\end{tabular}
\end{table}
We discuss only a few of the more interesting NVCs here.
All NVCs can be found in folder \href{https://github.com/rasheedja/PropaFP/tree/master/examples/hie_sine/txt}{\texttt{examples/hie\_sine}} in \cite{noauthor_rasheedjapropafp_nodate}.
\begin{lstlisting}[caption=Selected Reduce\_Half\_Pi Simplified Exact NVCs, label={code:HIEReduceVCs},basicstyle=\fontsize{7.5}{9pt}\tt,float=tp]
Reduce_Half_Pi_X_${}_\le$
Bounds on variables:
r1 (int) $\in$ [0, 511]
x (real) $\in$ [0, 802]
assert
-500000001 / 1000000000 <=
(((x / (13176795/8388608)) - r1) + (542101/2500000000000000000000000))
assert
(((x / (13176795/8388608)) - r1) - (542101/2500000000000000000000000)) <=
500000001 / 1000000000
assert
$\neg$(
((((x - (r1 * (25735/16384))) - (r1 * (3797/67108864)))
- (r1 * (17453/17592186044416)))
- (r1 * (12727493/2361183241434822606848))) + (1765573/10000000000)
<= 6851933/8388608
)
Reduce_Half_Pi${}_\le$
Bounds on variables:
r1 (int) $\in$ [0, 511]
x (real) $\in$ [0, 802]
assert
-500000001 / 1000000000 <=
(((x / (13176795/8388608)) - r1) + (542101/2500000000000000000000000))
assert
(((x / (13176795/8388608)) - r1) - (542101/2500000000000000000000000)) <=
500000001 / 1000000000
assert
$\neg$(
((((((x - (r1 * (25735/16384))) - (r1 * (3797/67108864)))
- (r1 * (17453 / 17592186044416)))
- (r1 * (12727493 / 2361183241434822606848)))
- (x - ((r1 * $\pi$) / 2)))
+ (/ 1765573 10000000000))
<= 18 / 100000
)
\end{lstlisting}
Listing \ref{code:HIEReduceVCs} shows two of the simplified exact NVCs arising from the post-conditions in Reduce\_Half\_Pi.
In both NVCs, the second and third assertions come from the third and fourth post-conditions and define how the \lstinline{x} and \lstinline{r1} variables are dependent on each other.
In both NVCs, the final assertion comes from the post-condition used to derive the NVC.
The final assertion in the first NVC asserts an upper bound on the new value of \lstinline{X} after calling Reduce\_Half\_Pi.
The final assertion in the second NVC asserts that the difference between the new value of \lstinline{X} after calling Reduce\_Half\_Pi and performing the same number of $\nicefrac{\pi}{2}$ reductions on the original value of \lstinline{X} using the exact $\pi$ is \emph{not} smaller than or equal to $\nicefrac{18}{100000}$.
\begin{lstlisting}[caption=Selected Approx\_Sin NVC, label={code:HIEApproxSinVC},basicstyle=\fontsize{7.5}{9pt}\tt,float=t]
Approx_Sin${}_\le$
Bounds on variables:
result__1 (real) $\in$ [-7639663/8388608, 3819831/4194304] -- $\sim [-0.91072, 0.91072]$
x (real) $\in$ [-6851933/8388608, 6851933/8388608] -- $\sim [-0.81681,0.81681]$
NVC:
assert
(abs(x) <= 1 / 67108864 $\implies$ (x = result__1))
assert
$\neg$ (abs(x) <= 1 / 67108864) $\implies$
(((x*((((((-3350387 / 17179869184)*(x*x)) + (4473217 / 536870912))*(x*x))
- (349525 / 2097152))*(x*x))) + x) - (2263189 / 50000000000000))
<= result__1
$\wedge$
result__1 <=
(((x*((((((-3350387 / 17179869184)*(x*x)) + (4473217 / 536870912))*(x*x))
- (349525 / 2097152))*(x*x))) + x) + (2263189 / 50000000000000))
assert
$\neg$( result__1 - sin(x) <= 58 / 1000000000 )
\end{lstlisting}
The exact NVC in Listing \ref{code:HIEApproxSinVC} comes from the final post-condition from the Approx\_Sin procedure in Listing \ref{code:HIEApproxSpec}.
The second and third assertions specify a dependency on \lstinline{x} and \lstinline{result__1}.
There are two assertions here due to the two if-then-else branches in the implementation of Approx\_Sin in Listing \ref{code:HIEApproxImpl}.
The final assertion specifies that the difference between the result of Approx\_Sin for \lstinline{x} and the value of the exact sine function for \lstinline{x} is not smaller than or equal to $\nicefrac{58}{1000000000}$.
\begin{lstlisting}[caption=Selected Sin NVC, label={code:HIESinVCs},basicstyle=\fontsize{7.5}{9pt}\tt,float=t]
Sin${}_\ge$
Bounds on variables:
finalresult1 (real) $\in$ [-1, 1]
o (real) $\in$ [-802, 802]
r1 (int) $\in$ [0, 511]
result__1 (real) $\in$ [-1, 1]
x (real) $\in$ [-802, 802]
y (real) $\in$ [-6851933/8388608, 6851933/8388608]
-- $6851933/8388608 = \texttt{Max\_Red\_Trig\_Arg} - 0.26 * \texttt{pi}$
NVC:
assert-1 x < 0.0 -> o = -x
assert-2 $\neg$(x < 0.0) -> o = x
assert-3 -500000001 / 1000000000 <= ((o / (13176795 / 8388608)) - r1)
+ (542101 / 2500000000000000000000000)
assert-4 ((o / (13176795 / 8388608)) - r1)
- (542101 / 2500000000000000000000000) <= 500000001 / 1000000000
assert-5 -18.0 / 100000.0 <= (y + (o + (r1 * Pi / 2.0)))
assert-6 (y + (o + (r1 * Pi / 2.0))) <= 18.0 / 100000.0
assert-7 mod r1 4 <= 3.0
assert-8
(mod r1 4 <= 0.0) $\vee$ ($\neg$(mod r1 4 <= 0.0) $\wedge$ (mod r1 4 == 2.0)) ->
-58.0 / 1000000000 <= result__1 - (sin y) $\wedge$
result__1 - (sin y) <= 58.0 / 1000000000
assert-9
$\neg$($\neg$(mod r1 4 <= 0.0) -> mod r1 4 = 2.0) ->
-14.0 / 100000000 <= result__1 - (cos y) $\wedge$
result__1 - (cos y) <= 14.0 / 100000000
assert-10
x < 0 ->
mod r1 4 <= 2 -> finalresult1 = result__1 $\wedge$
$\neg$(mod r1 4 <= 2) -> finalresult1 = -result__1
assert-11
$\neg$(x < 0) ->
mod r1 4 <= 2 -> finalresult1 = -result__1 $\wedge$
$\neg$(mod r1 4 <= 2) -> finalresult1 = result__1
assert-12 $\neg$(-19 / 100000 <= (finalresult1 - (sin x)))
\end{lstlisting}
Finally, the NVC in Listing \ref{code:HIESinVCs} comes from the first post-condition in the procedure Sin in Listing~\ref{code:HIESinImpl}.
This NVC is interesting since the implementation of the Sin procedure depends on the other procedures we have discussed, which results in the derived NVC including assertions derived from specifications of these other procedures.
Assertions 1--2 come from the if statement defining \lstinline{Y}.
Assertions 3--6 come from the Reduce\_Half\_Pi post-conditions as a consequence of calling Reduce\_Half\_Pi in Listing \ref{code:HIESinImpl}.
Assertion 7 comes from the \lstinline{Quadrant} subtype defined in Listing \ref{code:HIEReduceSpec}
Assertions 8--9 contain the final two Approx\_Sin/Approx\_Cos post-conditions as well as corresponding to one of the if-then-else branches after the call to Reduce\_Half\_Pi.
Assertions 10--11 correspond to the different paths from the final if-then-else.
The final assertion clearly comes from the first post-condition in Listing \ref{code:HIESinImpl}.
\section{Benchmarking the Proving Process}\label{sec:benchmarks}
Tables \ref{table:benchmarks} shows
the performance of our implementation of the proving process on the verification examples described earlier.
``VC processing'' is the time it takes PropaFP to process the NVCs generated by GNATprove/Why3.
The remaining columns in Table~\ref{table:benchmarks} show the performance on the following provers applied to the resulting simplified exact NVCs:
\begin{itemize}
\item dReal v4.21.06.2 \cite{gao_dreal_2013} -- solver using numerical branch-and-prune methods.
\item MetiTarski v2.4 \cite{akbarpour_metitarski_2010} -- symbolic theorem prover deciding real inequalities via cylindrical algebraic decomposition (CAD).
\item LPPaver v0.0.1 \cite{noauthor_rasheedjalppaver_nodate} -- our prototype prover that uses methods similar to dReal.
\end{itemize}
In Table \ref{table:benchmarks}, n/s means the NVC contains some operation or number that is not supported by the prover (dReal does not support very large integers)
while g/u means that the prover gave up.
\begin{table}[tb]
\caption{Proving Process on Described Examples}
\label{table:benchmarks}
\centering
\begin{tabular}{l@{\kern1em}r@{\kern1em}r@{\kern1em}r@{\kern1em}r}
\toprule
VC & VC Processing & dReal & MetiTarski & LPPaver \\
\midrule
My\_Machine\_Rounding${}_\ge$ & 0.53s & n/s & n/s & 0.47s \\
My\_Machine\_Rounding${}_\le$ & 0.56s & n/s & n/s & 0.42s \\
Reduce\_Half\_Pi\_X${}_\ge$ & 1.76s & n/s & 0.07s & 0.35s \\
Reduce\_Half\_Pi\_X${}_\le$ & 1.77s & n/s & 0.04s & 0.33s \\
Reduce\_Half\_Pi${}_\ge$ & 65.02s & n/s & g/u & 0.02s \\
Reduce\_Half\_Pi${}_\le$ & 61.32s & n/s & g/u & 0.01s \\
Approx\_Sin${}_\ge$ & 1.85s & 1m08.95s & 0.17s & 5.63s \\
Approx\_Sin${}_\le$ & 1.86s & 1m06.16s & 0.15s & 5.61s \\
Approx\_Cos${}_\ge$ & 0.95s & 3.28s & 0.05s & 1.83s \\
Approx\_Cos${}_\le$ & 1.00s & 1.53s & 0.04s & 1.50s \\
Sin${}_\ge$ & 1.29s & n/s & n/s & 6m34.62s \\
Sin${}_\le$ & 1.30s & n/s & n/s & 6m29.8s \\
Taylor\_Sin & 2.04s & 0.01s & 0.14s & 0.06s \\
Taylor\_Sin\_Double & 2.07s & n/s & 0.11s & 0.05s \\
Taylor\_Sin\_P & 2.05s & 0.01s & 0.14s & 0.06s \\
SinSin & 0.53s & 3m19.81s & g/u & 8.20s \\
Heron\_Init & 2.01s & 0.00s & 0.07s & 0.01s \\
Heron\_Pres & 3.05s & 5m06.14s & g/u & 1m19.99s \\
\bottomrule
\end{tabular}
\end{table}
All of the NVCs were solved by at least one of the provers in a reasonable time frame.
VC processing takes, at most, a few seconds for most of the NVCs.
For the Reduce\_Half\_Pi\{${}_\ge$,${}_\le$\} NVCs, the VC processing step takes around one minute.
Most of this time was spent on the `Eliminating FP operations' step.
This is because FPTaylor takes a while to run its branch-and-bound algorithm on the file that is produced from these NVCs, particularly due to the use of $\pi$ in a non-trivial formula which can be seen in the last two post-conditions in Listing~\ref{code:HIEReduceSpec}.
Some of the NVCs could only be decided by LPPaver due to the following:
\begin{itemize}
\item The My\_Machine\_Rounding NVC contains integer rounding with ties going away from zero.
\begin{itemize}
\item dReal does not support integer rounding.
\item MetiTarski does not support the rounding mode specified in this NVC.
\end{itemize}
\item After our proving process, the bound on the \textbf{maximum rounding error} computed by FPTaylor in the Reduce\_Half\_Pi and the Taylor\_Sin\_Double NVCs are very small.
\begin{itemize}
\item This number is represented as a rational number in the exact NVC, and the denominator is outside the range of integers supported by dReal.
\end{itemize}
\item The Reduce\_Half\_Pi\{${}_\ge$,${}_\le$\} NVCs have a tight bound.
\begin{itemize}
\item Slightly loosening the specification bounds from 0.00018 to 0.0002 allows MetiTarski to verify this.
\begin{itemize}
\item After this loosening, the Sin\{${}_\ge$,${}_\le$\} would need to be loosened from 0.00019 to 0.00021 due to the increased \textbf{subprogram specification error}.
\end{itemize}
\end{itemize}
\item The Sin NVCs contain integer rounding with ties going to the nearest even integer and uses the modulus operator.
\begin{itemize}
\item dReal does not support integer rounding.
\item MetiTarski does not support the modulus operator.
\end{itemize}
\end{itemize}
\subsection{Effect of Specification Bounds on Proving Times}
For numerical provers, the tightness of the specification bound is often correlated with the time it takes for a prover to decide a VC arising from said specification.
This is not normally the case for symbolic solvers, however, a VC arising from a specification that a symbolic solver could not decide may become decidable with a looser bound on the specification.
We illustrate this in Table~\ref{table:benchmarks-spec}.
The `Bound' column states the specification bound for the NVC.
\begin{table}[tb]
\caption{Effect of Specification Bound on Proving Time}
\label{table:benchmarks-spec}
\centering
\begin{tabular}{l@{\kern1em}r@{\kern1em}r@{\kern1em}r@{\kern1em}r@{\kern1em}r}
\toprule
VC & Bound & VC Processing & dReal & MetiTarski & LPPaver \\
\midrule
Approx\_Sin${}_\ge$ & -0.000000058 & 1.85s & 1m08.95s & 0.17s & 5.63s \\
Approx\_Sin${}_\ge$ & -0.000000075 & 1.84s & 28.27s & 0.16s & 3.72s \\
Approx\_Sin${}_\ge$ & -0.0000001 & 1.82s & 15.07s & 0.13s & 2.74s \\
Approx\_Sin${}_\ge$ & -0.00001 & 1.87s & 0.09s & 0.15s & 0.25s \\[1ex]
Approx\_Sin${}_\le$ & 0.000000058 & 1.86s & 1m06.16s & 0.15s & 5.61s \\
Approx\_Sin${}_\le$ & 0.000000075 & 1.85s & 28.73s & 0.16s & 3.72s \\
Approx\_Sin${}_\le$ & 0.0000001 & 1.86s & 15.42s & 0.15s & 2.69s \\
Approx\_Sin${}_\le$ & 0.00001 & 1.85s & 0.09s & 0.15s & 0.25s \\[1ex]
Approx\_Cos${}_\ge$ & -0.00000014 & 0.95s & 3.28s & 0.05s & 1.83s \\
Approx\_Cos${}_\ge$ & -0.0000005 & 0.96s & 0.31s & 0.05s & 0.61s \\
Approx\_Cos${}_\ge$ & -0.000001 & 0.93s & 0.14s & 0.05s & 0.54s \\
Approx\_Cos${}_\ge$ & -0.0001 & 0.96s & 0.00s & 0.06s & 0.07s \\[1ex]
Approx\_Cos${}_\le$ & 0.00000014 & 1.00s & 1.53s & 0.04s & 1.50s \\
Approx\_Cos${}_\le$ & 0.0000005 & 0.94s & 0.29s & 0.04s & 0.60s \\
Approx\_Cos${}_\le$ & 0.000001 & 0.96s & 0.14s & 0.04s & 0.51s \\
Approx\_Cos${}_\le$ & 0.0001 & 0.94s & 0.00s & 0.04s & 0.06s \\[1ex]
SinSin & 0.00051778 & 0.53s & 3m14.06s & g/u & 8.20s \\
SinSin & 0.00052 & 0.57s & 0.12s & g/u & 5.25s \\
SinSin & 0.001 & 0.53s & 0.02s & g/u & 1.34s \\
SinSin & 0.01 & 0.53s & 0.00s & g/u & 0.33s \\
\bottomrule
\end{tabular}
\end{table}
Table \ref{table:benchmarks-spec} shows how, in all of our examples, a looser bound results in quicker proving times for the tested numerical provers.
In some cases, this improvement can be significant, as seen with the `SinSin' NVCs.
The proving time for symbolic provers does not improve with looser bounds.
\subsection{Counter-examples}
When writing specifications, it is not uncommon for a programmer to make a mistake in the specification by, for example, using wrong mathematical operations, setting too tight a bound for a specification, and so on.
When this occurs, it would be useful for a programmer to receive a counter-example for their specification.
Our proving process supports producing counter-examples and, with a custom Why3 driver, these counter-examples can be reported back to Why3, which will send the counter-examples to the programmer's IDE.
It should be understood that counter-examples produced by the proving process are \emph{potential} counter-examples, since `simplified exact' NVCs are weakened versions of original NVCs.
Nevertheless, these \emph{potential} counter-examples can still be \emph{actual} counter-examples and would be useful for a programmer to have.
To demonstrate how the proving process can produce counter-examples, we modify our \lstinline{Taylor_Sin} example, introducing three different mistakes which a programmer may feasibly make:
\begin{enumerate}
\item Replace the \lstinline{-} with \lstinline{+} in the \lstinline{Taylor_Sin} implementation in Listing~\ref{code:adaSineImpl}.
\item Invert the inequality in the \lstinline{Taylor_Sin} post-condition in Listing~\ref{code:sineSpec}.
\item Make our specification bound slightly tighter than the \textbf{maximum model error} + \textbf{maximum rounding error} + \textbf{rounding analysis cushion} in the post-condition from Listing \ref{code:sineSpec}, changing the value of the right hand side of the inequality in the post-condition from 0.00025889 to 0.00025887.
\end{enumerate}
These three `mistakes' are referred to as Taylor\_Sin\_Plus, Taylor\_Sin\_Swap, and Taylor\_Sin\_Tight, respectively, in Table~\ref{table:counter-examples}.
If a specification is incorrect, the resulting NVC must be true or `sat'.
dReal would report a `delta-sat' result, which means the given file was sat with a configurable tolerance, which we set to $1^{-100}$.
This makes models produced by dReal a \emph{potential} model for the NVC.
Models produced by LPPaver are actual models for the given NVC, but for files produced by the proving process, these should still be thought of as \emph{potential} counter-examples due to the weakening of the NVC.
The computed potential counter-examples shown in Table~\ref{table:counter-examples} are all actual counter-examples except those for Taylor\_Sin\_Tight.
\begin{table}[t]
\caption{Proving Process on Described Counter-examples}
\label{table:counter-examples}
\centering
\begin{tabular}{l@{\kern-2em}r@{\kern1em}r@{\kern1em}l@{\kern1em}r@{\kern1em}l}
\toprule
VC & VC Processing & dReal & CE & LPPaver & CE \\
\midrule
Taylor\_Sin\_Plus & 2.05s & 0.00s & $x=-0.166\ldots$ & 0.02s & $x=-0.5$ \\
Taylor\_Sin\_Swap & 2.05s & 0.00s & $x=0.166\ldots$ & 0.03s & $x=0.499\ldots$\\
Taylor\_Sin\_Tight & 2.1s & 0.00s & $x=0.499\ldots $ & 0.03s & $x=0.499\ldots$\\
\bottomrule
\end{tabular}
\end{table}
\section{Conclusion}\label{sec:conclusion}
\paragraph{Summary}
In this paper, we have presented an automated proving process for deciding VCs that arise in the verification of floating-point programs with a strong functional specification.
The proving process combines several existing techniques and tools in its steps (cf., Fig.~\ref{fig:gnatprove}):
\begin{enumerate}
\item Why3 reads a program+specification and produces NVCs (Negated VCs).
\item PropaFP processes the NVCs as follows:
\begin{enumerate}
\item Simplify the NVC using simple symbolic rules and interval evaluation.
\item Derive bounds for all variables in the NVC, interleaving with (a).
\item Derive bounds for rounding errors in expressions with FP operations.
\item Using these bounds, safely replace FP operations with exact operations.
\item Repeat the simplification steps (a--b).
\end{enumerate}
\item Apply nonlinear real provers on the processed NVCs to either prove them or get \emph{potential} counter-examples.
\end{enumerate}
This proving process should, in principle, work with other tools and languages than Why3 and SPARK, as long as one can generate NVCs similar to those generated by GNATprove.
We demonstrated our proving process on three examples of increasing complexity, featuring loops, real-integer interactions and subprogram calls.
Notably, we have contributed the first fully verified SPARK implementations of the sine and square root functions.
The examples demonstrate an improvement on the state-of-the-art in the power of automated FP software verification.
Table \ref{table:benchmarks} indicates that our proving process can automatically and fairly quickly decide certain VCs that are currently considered difficult.
Table \ref{table:benchmarks-spec} demonstrates how the process speeds up when using looser bounds in specifications.
Table \ref{table:counter-examples} shows that our proving process can quickly find potential, often even actual, counter-examples for a range of common incorrect specifications.
Our examples may be used as a suite for benchmarking future FP verification approaches, and our resulting NVCs can be used to benchmarks future nonlinear real provers.
\subsection*{Future work}
We conclude with thoughts on how our process could be further improved.
\paragraph*{Executable exact real specifications.}
We plan to make specifications containing functions such as $\sqrt{\cdot}$ executable via high-accuracy interval arithmetic, allowing the developer or IDE to check whether the {suggested} counter-examples are real.
\paragraph*{Improving the provers.}
We would like the provers we used in this paper to be improved in some ways.
Ideally, the provers will be able to decide all of our examples.
Support for integer rounding could be added to dReal, using methods similar to those used in LPPaver.
It should also not be difficult to add support for larger integers in dReal.
Support for both integer rounding and the modulus operator could be added to MetiTarski.
Adding these features will allow both dReal and MetiTarski to have an attempt at deciding all of our examples.
\paragraph*{Why3 integration.}
Our VC processing could be integrated into Why3.
This would include the symbolic processing, bound derivation, and floating-point elimination.
As Why3 transformations, the VC processing steps would be more accessible for users who are familiar with Why3.
Also, the proving process would thus become easily available to the many tools that support Why3.
\paragraph*{Support function calls.}
Having to manually translate functions into procedures is undesirable.
Support for function calls could be added, e.g.,
by a Why3 transformation that translates functions into procedures.
\paragraph*{Use Abstract Interpretation.}
We currently derive bounds for variables using our own iterative process similar to Abstract Interpretation over the interval domain.
It would be interesting to see if the proving process would improve if we use an established Abstract Interpretation implementation to derive bounds.
If nothing else, such change would reduce the amount of new code that a user would need to trust.
\paragraph*{Verified implementation.}
We would like to formally verify some elements of our process to ensure that the transformation steps are performed correctly.
As PropaFP and LPPaver utilise Haskell and AERN2 \cite{noauthor_aern2_nodate}, rewriting these tools in Coq with coq-aern \cite{konecny_axiomatic_2021} may be a feasible verification route.
\bibliographystyle{splncs04}
|
\section{Introduction}
Graphene has a profound impact in condensed matter physics owing its linear band dispersion around the Dirac point \cite{graphene1,graphene2}. In solids, many properties of the electrons, such as the effective mass, the velocity and their interactions, are rigidly determined by the sample itself \cite{Creating-D}, and it is hardly changed. Consequently, it restricts the potential application of graphene. In recent years, stimulated by the extraordinary properties of graphene, the emulation of graphene-like physics in artificial hexagonal or hexagonal-like lattices systems (artificial graphene) is booming \cite{Artificial-graph}. In progress of the engineering novel optical lattices \cite{engineering-OL} , ultracold atoms in hexagonal-like optical lattices provide an avenue to exploring the novel phenomenon which hardly exists in graphene \cite{Creating-D,hexagonal1,hexagonal2,hexagonal3,hexagonal4,hexagonal5,hexagonal6,hexagonal7,hexagonal8}.
In ultracold systems, bosons in the state-dependent hexagonal optical lattice is the first realization of an artificial graphene system \cite{hexagonal1}. Here the site-offset energy between two sublattice is dependent on the lattice depth and the value of the effective magnetic quantum number $m$ of bosons, moreover its strength can be easily tuned. In this novel optical lattice, the phase diagrams of the single-component quantum gas with various values of $m$ have been numerically studied using cluster Gutzwiller method \cite{hexagonal-Gutzwiller}. Furthermore, the numerical results indicate that the phase diagrams strongly depend on the values of $m$. However, there is still a lack of analytical results for the phase diagrams of Bose gas in state-dependent hexagonal optical lattice.
So far, the phase diagrams of ultracold bosons in complex optical lattice (such as hexagonal, Kagom\'e optical lattice, and optical superlattice induced by dipolar interaction) could have been obtained by several analytical methods, including mean-field theory \cite{SC1}, random-phase approximation \cite{RPA}, strong-coupling expansion (SCE) method \cite{SC1,SC2,SC3}, and the generalized Green's function method \cite{GGF1,GGF2}, the generalized effective-potential Landau theory (GEPLT) \cite{wang,zhi-4,zhi-5}. Although the effect of high-order corrections is more obvious in a system with small coordination number, there are still only two analytical methods, i.e., SCE method and GEPLT, which are easy to calculate the high-order corrections of the phase boundaries.
There are some technical issues \cite{zhi-4} in the former GEPLT \cite{wang,wei}, but fortunately these issues are clarified in our previous work \cite{zhi-4}. We have revealed that the clarified GEPLT is extremely well for obtaining the phase diagrams of ultracold bosons in two different type bipartite superlattices \cite{zhi-4,zhi-5}: one is a bipartite superlattice caused by superlattice structure, and the other one is a bipartite superlattice induced by dipolar interaction (induced bipartite superlattice). More specifically, the phase boundaries of the third-order corrections obtained by the clarified GEPLT are in excellent agreement with the quantum Monte Carlo (QMC) simulations in bipartite superlattice \cite{zhi-4}. In induced bipartite superlattice, the third-order results obtained by the clarified GEPLT are better than the third-order SCE calculations for weak nearest-neighbor repulsion \cite{zhi-4} and these results are also in complete agreement with QMC calculations for second-order phase transition \cite{zhi-5}.
In this paper, with the help of GEPLT, we can study the phase diagrams of single-component quantum gas with different $m$, i.e., $m=0$, $m=0.02$ and $m=0.1$, in state-dependent hexagonal optical lattice. In our previous work \cite{zhi-4}, the phase boundaries of the bosons in the normal bipartite superlattice, in which the site-offset energy $\epsilon$ is independent on the trapping lattice depth, have been analytically calculated by the GEPLT. Compared with QMC simulations of this system, we find that our third-order analytical calculations are in excellent agreement with QMC simulations \cite{zhi-4}. Therefore, we are sure that the GEPLT will be a high-accuracy analytical method for studying the phase diagrams of ultracold bosons in a state-dependent hexagonal optical lattice, in which the site-offset energy $\epsilon$ is dependent on lattice depth and $m$.
\section{the model and method}
The state-dependent hexagonal optical lattice has been realized in the experiment \cite{hexagonal1}, and the total trapping potential \cite{hexagonal1,hexagonal-Gutzwiller,bbm-Gutzwiller} reads
\begin{equation}
V(\textbf{r})=-V_{0}\left[V_{\rm{Hex}}+V_{\rm{pol}}\right],
\end{equation}
where $V_{0}$ is the corresponding lattice depth. Here the state-independent potential reads
\begin{equation}
V_{\rm{Hex}}=6-2\sum_{i}\cos(\mathbf{b}_{i}\mathbf{r}),
\end{equation}
and state-dependent potential for $|F,m_{F}\rangle$ state reads
\begin{equation}
V_{\rm{Hex}}=\sqrt{3}(-1)^F m_{F} cos\alpha \, \eta\sum_{i}\sin(\mathbf{b}_{i}\mathbf{r}),
\end{equation}
with $\mathbf{b}_{1}=2\pi/\lambda(\sqrt{3},0,0)$, $\mathbf{b}_{2}=\pi/\lambda(-\sqrt{3},3,0)$ and $\mathbf{b}_{3}=\pi/\lambda(-\sqrt{3},-3,0)$, where $\alpha$ is the angle between the quantization axis (or orientation of homogeneous magnetic field $\mathbf{B}$) and lattice plane, and $\eta=0.13$ is dimensionless proportionality factor \cite{hexagonal-Gutzwiller}. Here we can define a effective magnetic quantum number $m=(-1)^{F+1}m_{F} cos\alpha$ \cite{hexagonal-Gutzwiller}, and it is clear that the ranging of $m$ can continuously be adjusted from $-m_{F}$ to $m_{F}$. In Ref.~\cite{hexagonal1}, the wavelength of the lattice laser beams is chosen as $\lambda=830$ nm, and the corresponding lattice constant is $a=2\lambda/(3\sqrt3)$.
In Dirk-S\"oren L\"uhmann et al.'s work \cite{hexagonal-Gutzwiller}, the optimal Wannier functions are determined in such a way that the amplitudes
of processes beyond the Hubbard model are minimized. By choosing this optimal Wannier functions, the corresponding Hamiltonian of the state-dependent hexagonal optical lattice can read \cite{hexagonal-Gutzwiller}
\begin{equation}
\hat{H}=-J\!\sum_{\langle i,j\rangle}\!\hat{a}_{i}^{\dagger}\hat{a}_{j}+\!\frac{1}{2}\sum_{i}\!U_{i}\hat{n}_{i}(\hat{n}_{i}-1)+
\sum_{i}(\epsilon_{i}-\mu)\hat{n}_{i}, \label{SBH}
\end{equation}
where $J$ is the nearest-neighbor tunneling, $\hat{a}_{i}$ ($\hat{a}_{i}^{\dagger}$) is the boson annihilation(creation) operator at site $i$, $\hat{n}_{i}= \hat{a}_{i}^{\dagger}\hat{a}_{i}$ is the particle-number operator on $i$-th site, $U_{i}$ denotes the on-site repulsion at site $i$, $\mu$ is the chemical potential, and $\epsilon_{i}$ is the site-offset energy($\epsilon_{A}=0$ and $\epsilon_{B}=\epsilon$ for sublattice A and B).
Since only the site-offset energy $\epsilon$ is approximately linearly dependent on the parameter $m$ \cite{hexagonal-Gutzwiller}, but the other interactions are weak dependent on $m$, i.e., $J(m)\approx J$ and $U_{A}(m)\approx U_{B}(m)\approx U$ (see the Figs. 8 in the ref.~\cite{hexagonal-Gutzwiller}), and therefore the phase boundaries in the ref.~\cite{hexagonal-Gutzwiller} can be obtained by using cluster Gutzwiller method to study the standard Hubbard model, in which the on-site repulsions $U_{A}$ and $U_{B}$ are assumed to be equal.
\begin{figure}[h!]
\centering
\includegraphics[width=1.0\linewidth]{1.pdf}
\caption{The sketch of the state-dependent hexagonal optical lattice with different effective magnetic quantum number $m$, where $m$ are equal to 1, 0 and -1 for (a), (b) and (c). The site-offset energy $\varepsilon$ between the two triangular sublattice A and B is is tunable.}
\label{1}
\end{figure}
Before calculating the phase diagrams, we would like to discuss the possible ground states of the systems in the atomic limit ($J=0$). In this limit, the ground states are determined by the competing between the on-site interaction $U$ and the site-offset energy $\epsilon$. If the Mott lobe $(n_A,n_B)$ with the imbalance $\Delta n=n_{A}-n_{B}$ and the fixed filling $\rho=(n_{A}+n_{B})/2$ is in existence, $\epsilon$ needs to meet the constraint $\Delta n-1<\epsilon/U<\Delta n+1$ obtained by solving the inequations $E_{n_{A}+1,n_{B}-1}>E_{n_{A},n_{B}} <E_{n_{A}-1,n_{B}+1}$, where $n_{B}$ is nonzero. In the case of $n_{B}=0$, the Mott lobe $(1,0)$, i.e., $\Delta n=1$, can always exist in the systems with $\epsilon/U>0$. The site-offset energies $\epsilon(m=0)/U$, $\epsilon(m=0.02)/U$ and $\epsilon(m=0.1)/U$ as a function of the variational trapping lattice depth $V_{0}$ are shown in Fig.~\ref{2}, respectively. In the deep lattice depth, due to the $\epsilon(m=0.02)/U$ in the range of $(0,1)$, therefore the $\Delta n$ for the Mott lobes $(n_A,n_B)$ can take two values $\Delta n=0$ and $\Delta n=1$. For the similar reason, the $\Delta n$ can take three values, i.e., $\Delta n=1$, $\Delta n=2$, and $\Delta n=3$ in the system with $m=0.1$, where we have $2<\epsilon(m=0.1)/U<3$. Taking $m=0.02$ as an example, we will analyse the chemical potential width of the Mott lobes $(n_{A},n_{B})$. In the Mott lobes $(n,n)$ [$(n,n-1)$], the chemical potential should satisfy constraint inequations $E_{n,n-1}\ge E_{n,n} \le E_{n+1,n}$ ($E_{n-1,n-1}\ge E_{n,n-1} \le E_{n,n}$), i.e., $\epsilon +U(n-1)\le \mu \le Un$ [$U(n-1)\le \mu \le \epsilon +U(n-1)$], where the $E_{n,n}$ is the eigenvale of the $\hat{H}(J=0)$. More specifically, the chemical potential widths of the Mott lobes $(1,0)$, $(1,1)$, $(2,1)$, $(2,2)$, $(3,2)$ and $(3,3)$ are $0\le \mu \le \epsilon$, $\epsilon\le \mu \le U$, $U\le \mu \le \epsilon+U$, $\epsilon+U\le \mu \le 2U $, $2U \le \mu \le \epsilon+2U $, and $\epsilon+2U \le \mu \le 3U $, respectively.
\begin{figure}[h!]
\centering
\includegraphics[width=0.9\linewidth]{2.pdf}
\caption{ The site-offset energies $\epsilon/U$ with different effective magnetic quantum number $m$ as function of the lattice depth $V_{0}$, where the red line, the green dashed line and the blue dot-dashed line represents $\epsilon(m=0.1)/U$, $\epsilon(m=0.02)/U$ and $\epsilon(m=0)/U$( sublattice A and B are balanceable), respectively. The data for $\epsilon(m=0.1)/U$ and $\epsilon(m=0.02)/U$ come from the ref.~\cite{hexagonal-Gutzwiller}. Here we do not draw the curve of $\epsilon(m=0.1)/U$ within the regions of $V_{0}\lesssim 9.5$, owing to the fact that these data are not provided in ref.~\cite{hexagonal-Gutzwiller}.}
\label{2}
\end{figure}
We can make a reasonable assumption that the features of the Mott lobes obtained in the limit $J=0$ will not change when we keep $J/U\ll 1$.
Hence, the region of Mott lobes $(n,n)$ will expand with increasing the value of $J/U$ (or decreasing the value of the lattice depth) in the deep lattice ($J/U\ll 1$), owing the fact that $\epsilon$ is decreasing with increasing the value of $J/U$. This feature of Mott lobes $(n,n)$ is in contrast to the feature of Mott lobes $(n,n)$ in normal superlattice system in which the $\epsilon$ is constant (do not change with the lattice depth), and this feature has clearly been shown in Fig.~ \ref{phase-1}(b) [or see the Fig. 9(b) in ref.~\cite{hexagonal-Gutzwiller}].
\begin{figure}[h!]
\centering
\includegraphics[width=1.0\linewidth]{3.pdf}
\caption{The diagrams of the coefficients $\alpha^{(n)}_{2ij}$ for a tunable state-dependent hexagonal optical lattice, where $Z=3$ is the coordination number of the systems. The diagrams of the coefficients $\alpha^{(n)}_{2ij}$ in state-dependent hexagonal lattice are the same with these figures in normal bipartite superlattices \cite{zhi-4,zhi-5}.}
\label{table-1}
\end{figure}
As mentioned above, the features of the Mott lobes have been revealed in the atomic limit ($J=0$). At below, we will introduce the GEPLT to study the phase boundaries of single-component quantum gas in state-dependent hexagonal optical lattice, in which the site-offset energy $\epsilon$ is dependent on lattice depth $V_0$ and effective magnetic quantum number $m$. In our previous work \cite{zhi-4}, we have revealed that the GEPLT is good enough to obtain phase boundaries of bipartite superlattice with the fixed site-offset energy $\Delta \mu $ which is independent on $V_0$. By mapping $\mu\rightarrow \mu +\epsilon$ and $\epsilon \rightarrow \Delta \mu$, then the forms of the Hamiltonian in state-dependent hexagonal optical lattice and the normal bipartite superlattice are the same. Thus, we can directly use the GEPLT, which is established in normal bipartite superlattice system with the fixed site-offset energy $\Delta \mu $, to study the phase diagrams of the state-dependent hexagonal systems. Immediately, we can obtain the first three orders of the phase boundaries $J^{(n)}_{c}$ of single-component quantum gas in state-dependent hexagonal optical lattice, which read
\begin{equation}
J^{(1)}_{c}=\sqrt{\alpha_{2AA}^{(0)}\alpha_{2BB}^{(0)}}/\alpha_{2AB}^{(1)},\label{mean-field}
\end{equation}
\begin{equation}
J^{(2)}_{c}=\frac{2\sqrt{\alpha_{2AA}^{(0)}\alpha_{2BB}^{(0)}}\alpha_{2AB}^{(1)}}{\alpha_{2AA}^{(0)}\alpha_{2BB}^{(2)}+\alpha_{2BB}^{(0)}\alpha_{2AA}^{(2)}},
\label{2-order}
\end{equation}
\begin{equation}
J^{(3)}_{c}=\frac{\alpha_{2AA}^{(0)}\alpha_{2BB}^{(2)}+\alpha_{2BB}^{(0)}\alpha_{2AA}^{(2)}}{2\sqrt{\alpha_{2AA}^{(0)}\alpha_{2BB}^{(0)}}\alpha_{2AB}^{(3)}},
\label{3-order}
\end{equation}
where $\alpha^{(n)}_{2ij}$ are perturbative coefficients for state-dependent hexagonal systems. With the help of Raylieigh-Schr\"{o}dinger perturbation expansion, we can easily calculate the values of these perturbative coefficients $\alpha^{(n)}_{2ij}$. The specific process of calculating the perturbative coefficients $\alpha^{(n)}_{2ij}$ have been clearly demonstrated \cite{santos,zhi-1,wang,zhi-5}.
\section{The ground-state phase diagram}
\begin{figure}[h!]
\centering
\includegraphics[width=1.0\linewidth]{4.pdf}
\caption{The phase diagrams of single-component quantum gas in state-dependent hexagonal optical lattice for effective magnetic quantum number $m=0$(a)\cite{zhi-1}, $m=0.02$(b) and $m=0.1$(c). The red solid lines are the third-order results, the green dashed lines are the second-order calculations, and the pink dot-dashed line are the first-order (mean-field) estimations. Here the blue dots are results obtained by cluster Gutzwiller calculation \cite{hexagonal-Gutzwiller}.}
\label{phase-1}
\end{figure}
With the help of the phase boundaries in Eqs.~(\ref{mean-field})-(\ref{3-order}), we can analytically obtain the first three orders of the phase boundaries with effective magnetic quantum number $m=0$, $m=0.02$ and $m=0.1$, respectively.
\begin{figure}[h!]
\centering
\includegraphics[width=1.0\linewidth]{5.pdf}
\caption{The universal $\epsilon/U$-$J/U$ phase diagrams of single-component quantum gas with arbitrary values of the effective magnetic quantum number $m$ for (a) half-integer and (b) integer filling. Here the blue dots are results obtained by cluster Gutzwiller calculation \cite{hexagonal-Gutzwiller}, and the all solid lines are the third-order results, the all long-dash lines are the second-order calculations, and the all dot-dashed lines are the first-order estimation. The different colours denote the different Mott phases, i.e., the brown represents the Mott phase $(2,1)$, the red represents the Mott phase $(1,0)$, the green describes the Mott phase $(2,0)$, the magenta describes the Mott phase $(2,2)$ and the orange describes the Mott phase $(1,1)$. The pink, purple and brown short-dash line denotes $m=0.1$, $m=0.02$, and $m=0$, respectively.}
\label{phase-2}
\end{figure}
From the Fig.~\ref{phase-1}, it is easy to find that our analytical results are consistent with cluster Gutzwiller simulations for effective magnetic quantum number $m=0$ and $m=0.02$. In the case of $m=0.1$, our analytical results are in good accord with cluster Gutzwiller calculations in the Mott lobe $(2,0)$ for the large interval, and only in small interval $\mu/U\in(1.04,1.15)$, there are some deviations between our analytical results and cluster Gutzwiller simulations \cite{hexagonal-Gutzwiller}. Moreover, it is interesting that the Mott phase $(2,1)$ forms a island in contrast to a normal lobe in the parameter space. In order to obtain the outline of the Mott island, we need to consider at least the contributions of third-order corrections, the first two orders of the calculations do not have ability to obtain this interesting Mott island [See Fig.~\ref{phase-1}(c)]. One of the possible reasons why there are some deviations between our results and cluster Gutzwiller calculations for the Mott island $(2,1)$ and Mott lobe $(2,0)$ in small interval $\mu/U\in(1.04,1.15)$ is that the type of phase transitions from Mott island or lobe to superfluid is dependent on $\mu$. This interesting phenomenon has been revealed in the bipartite lattice system caused by dipolar interaction \cite{Ohgoe}. More specifically, the phase transition is maybe a fist-order or weak fist-order phase transition for Mott lobe $(2,0)$ [Mott island $(2,1)$] with small (large) $\mu$, but the phase transition is second-order phase transition in the other regions.
In order to study the deviations of the tips of Mott phases obtained by these two methods, we also reveal the universal $\epsilon/U$-$J/U$ phase diagrams, in which each point $(\epsilon/U,J/U)$ represents the tip of the Mott phase in $J-\mu-U$ phase diagrams for the fixed $\epsilon/U$. From the Fig.~\ref{phase-2}, it is clear that the values of the tips obtained by our analytical method are perfectly consistent with cluster Gutzwiller simulations, the relative deviations of our third-order results and cluster Gutzwiller calculations are less than $9\%$($5\%$) for Mott insulator with (half-)integer filling.
\section{Conclusion}
The phase diagrams of single-component Bose gas with various values of $m$ in the state-dependent hexagonal optical have been revealed by using the GEPLT. In the case of $m=0.02$, we reveal that the Mott lobes $(n,n)$ will abnormally expand with increasing $J/U$ in deep lattice. The reason why there exists such abnormally expanding phenomenon is that the site-offset energy $\epsilon$ decreases with increasing $J/U$. Furthermore, this interesting phenomenon can be detected in this novel lattice with a harmonic confinement by using in situ imaging techniques \cite{Ott}. In the case of $m=0.1$, we find that our third-order analytical results can well demonstrate that the outline form of the Mott phase $(2,1)$ is island. More generally, the first three orders of the corrections have also been calculated analytically, and our third-order analytical results are in good agreement with the numerical solutions obtained by cluster Gutzwiller method. Besides, the values $J_c/U$ of the tips in the Mott phases as a function of the site-offset energy $\epsilon/U$ have also been calculated analytically. Compared to cluster Gutzwiller simulations, the relative deviations of these tips of our third-order results are less than $9\%$ ($5\%$) for Mott insulator with (half-)integer filling. Thus, the GEPLT as an accurate analytical method, which is easy to obtain higher orders hopping corrections, has tremendous potential especially for studying the second-order quantum phase transition of ultracold bosons in lattices with small coordination numbers, for example, artificial hexagonal-like lattices systems.
\section*{Acknowledgement}
This research is supported by the National Natural Science Foundation of China (NSFC) under Grant Nos.11947102 and 12004005, the Natural Science Foundation of Anhui Province under Grant Nos. 2008085QA26 and 2008085MA16, and the Ph.D. research Startup Foundation of Wenzhou University under Grant No. KZ214001P05, and the open project of state key laboratory of surface physics in Fudan University (Grant No. KF2021$\_$08).
|
\section{Introduction.}\label{intro}
\section{Introduction}
\label{sec:introduction}
E-commerce markets are booming at remarkable rates. Due to an unprecedented series of lockdowns, billions of people stay at home to prevent the spread of the virus. It is reported that the e-commerce revenue saw a 10\% increase in Europe in 2020 due to the pandemic
\footnote{\url{https://www.statista.com/study/42335/ecommerce-report/}}.
At the same time, the expectations of customers in terms of service quality are also increasing. When questioned about the features they would like to obtain from the delivery of online purchases, almost half (48\%) of shoppers mentioned speed, 42\% reduction of the cost of delivery and 41.6\% more reliable information about delivery time\footnote{\url{https://www.statista.com/statistics/1274950/global\%2Donline\%2Dshoppers\%2Dwished\%2Dchanges\%2Don\%2Ddelivery/}}.
By providing an evidence of the clash between SF Express and Alibaba, \cite{cui2020value} show that delivering expensive or less-discounted products in a reliable and timely manner brings better customer experience and thus higher profits.
When it comes to the specific challenges in improving customers' satisfactions on delivery, one of the crucial features is related to
the last-mile delivery leg (\cite{archetti2021recent}). An important feature of last-mile distribution is that its operations start as soon as parcels are delivered to the final logistic center, typically a city distribution center (CDC). Given the short delivery times requested by the customers, delivery operations typically need to start before all parcels expected to arrive during the day are available at the CDC. This raises a question: should the dispatcher wait for more or all parcels to be delivered at the CDC or should he/she start the delivery as soon as there is any available parcel and vehicle?
In this paper, we focus on the sequential decision making problem related to when to deliver parcels and which parcels to deliver under the assumption that the time at which parcels become available at the CDC (called \textit{release dates}) is stochastic and dynamic. We introduce a new problem called the \emph{Orienteering Problem with Stochastic and Dynamic Release Dates} (DOP-rd).
We assume that a single and uncapacitated vehicle is serving customer requests with no time window, so that the vehicle should finish its service before the deadline $T_E$.
The release dates are considered to be uncertain, stochastically and dynamically updated during the sequential decision making process. The objective is to maximize the number of requests served within $T_E$.
This paper presents the following main contribution to the literature:
\begin{enumerate}
\item The DOP-rd shares similarities with the problem studied in \cite{archetti2020dynamic}. The main differences rely on the objective function and deadline. In fact, in \cite{archetti2020dynamic} the objective is minimizing the travel time while ensuring that all parcels are delivered, and no deadline is considered. Instead, in the DOP-rd the objective is maximizing the number of parcels delivered within the deadline. Recent studies highlight the practical importance of focusing on the maximum number of delivered parcels (\cite{voccia2019same}, \cite{hong2018range}, \cite{ulmer2018same}, \cite{behrend2018integration}), as typically, the vehicles have to return to the depot during the working hours and some of the parcels may be left to be distributed the next day or by a third-party carrier. This is a fundamental change in the problem setting, that allows us to develop ad-hoc procedures, like the one \IL{for approximating the value of future states} presented in Section \ref{sec:Batch}.
\item We model the problem as a Markov Decision Process (MDP) and we propose a method to approximate the value of future states based on Monte-Carlo simulation (for scenario generation), and a batch approach that uses continuous approximation from \cite{daganzo1984distance} to estimate the length of future routes. At each decision epoch, the updated information is embedded both in scenario generation and in the approximation approach, thus leading to a reinforcement learning approach.
\item
We propose two novel hybrid approaches to derive a decision-making policy
in the (approximated) decision space. The first is a policy function approximation through a consensus function (PFA) while the second is a look-ahead policy with value function approximation (VFA).
The former one relies on exact solutions of a series of deterministic Integer Linear Programs (ILPs), the latter one uses a two-stage stochastic programming ILP model instead. These ILPs are solved using state-of-the-art branch-and-cut techniques. The obtained solutions are then used to decide when to leave the depot and which customers to serve, while maximizing the expected number of parcels delivered. In addition, we propose a partial characterization of optimal policy, \IL{the conditions of which are checked before applying PFA/VFA.}
\item In an extensive computational study, we compare PFA and VFA against two myopic benchmark approaches. We also provide results of a competitive analysis, in which the upper bounds are calculated by solving to optimality the problem under assumption of having perfect information.
\item The results show the benefit of implementing partial characterization of optimal policy for both approaches. Also, PFA outperforms other methods in solution quality while VFA achieves a better tradeoff between solution quality and computing time.
\end{enumerate}
Most of the existing literature dealing with MDP relies on heuristic look-ahead policies. In this work, we approximate the future states in each decision epoch, and employ exact methods to determine the best action associated with the projection of future states. The aim of this work is to empirically demonstrate the advantage of embedding exact methods inside reinforcement learning framework, to improve sequential decision making processes.
The paper is organized as follows. Section \ref{sec:literature} presents a literature review by focusing on the differences with the current work. Section \ref{sec:problem_formu} contains the problem description and formulation as a Markov Decision Process. Section \ref{sec:ub_pc} presents upper bounds to solution values and a partial characterization of the optimal policy. The solution approaches are introduced in Section \ref{sec:sol_approach} while Section \ref{sec:computational_result} is devoted to computational experiments and results. Finally, we draw conclusions in Section \ref{sec:conclusion} and present more detailed results in Appendix \ref{sec:appendix}.
\section{Literature Review}
\label{sec:literature}
We first focus on the literature related to routing problems with stochastic and dynamic features. Then, we move to problems with release dates and we highlight differences in problem settings and solution approaches compared to the current work.
The literature on stochastic and dynamic routing problems is wide. We focus on pioneering papers and surveys. \cite{psaraftis1988dynamic} introduce the dynamic traveling salesman problem with the dynamicity lying on the customer demands. \cite{bertsimas1991stochastic} generalize the contribution of the former paper and propose a mathematical model for the stochastic and dynamic vehicle routing problems (VRP). Other interesting extensions of stochastic or dynamic settings appear in \cite{savelsbergh1998drive}, \cite{bent2004scenario}, \cite{secomandi2001rollout}, \cite{secomandi2009reoptimization}, \cite{goodson2013rollout}, \cite{subramanyam2021robust}. A recent contribution (\cite{liu2021time}) captures the uncertainty of service time in the last-mile delivery services: with the aim of improving the on-time delivery performance, a framework integrating travel-time predictors with order-assignment optimization is proposed, which aims at improving the on-time delivery performance.
As for surveys on stochastic and dynamic VRPs, we refer to \cite{ritzinger2016survey}, \cite{oyola2018stochastic}, \cite{soeffker2021stochastic}.
The previous studies mainly focus on the uncertainties in terms of demands and travel time. The works on other stochastic and dynamic aspects such as release dates appeared just recently.
The routing problem with release date was firstly introduced in \cite{cattaruzza2016multi}, where the authors define it as a problem where each parcel is associated with a release date indicating the time at which the parcel is available at depot. Release dates are supposed to be known beforehand. The problem is a multi trip vehicle routing problem with release dates and the authors solve it through a population-based algorithm.
In \cite{archetti2015complexity} the Traveling Salesman Problem with release dates (TSP-rd) is considered, i.e., the problem with a single uncapacitated vehicle. The authors analyze the complexity of the problem on two variants - minimizing the total distance traveled with a constraint on the maximum deadline and minimizing the total time needed to complete the distribution without deadline. Later, \cite{reyes2018complexity} extend the results found in \cite{archetti2015complexity} by considering service guarantees on customer-specific delivery deadlines. \cite{shelbourne2017vehicle} consider the VRP with release and due dates where a due date indicates the latest time the order should be delivered to the customer. The objective function is defined as a convex combination of the operational costs and customer service level. The authors propose a path-relinking algorithm to address the problem. More recently, \cite{archetti2018iterated} propose a mathematical programming formulation and present a heuristic approach based on an iterated local search (ILS) for solving the TSP-rd.
All contributions mentioned above study routing problems with deterministic release dates. Recently, there have been several studies related to applications in same-day delivery services, where release dates are stochastic. Among them, \cite{voccia2019same} study a multi-vehicle dynamic pickup and delivery problem with time constraints where requests arrive dynamically from online customers. Each request is associated with a deadline or a time window. The objective is to maximize the expected number of requests that can be delivered on time. The authors first model the problem as an MDP, then, based on sample-scenario planning, they propose a heuristic solution approach. Rather than defining delivery windows at the receiver side, \cite{van2019delivery} consider dispatch windows at the consolidation center.
As in \cite{voccia2019same}, an MDP is defined. To overcome ``the three curses of dimensionality'', the authors propose an approximated dynamic programming (ADP) algorithm including an ILP. In contrast, \cite{archetti2020dynamic} study a single-vehicle problem with no dealine and where the objective is to deliver all parcels as fast as possible. They propose a reoptimization approach which heuristically reduces the number of decision epochs, furthermore, two models are defined to select an action at each reoptimization epoch. While both models aim to minimize the total completion time, the main difference between the two is that the first model is a stochastic mixed-integer program model which considers the full stochastic information on the release dates while the second one is a deterministic model which uses a point estimation for the stochastic release dates.
Based on the work of \cite{archetti2020dynamic}, our paper studies the
DOP-rd considering a single and uncapacitated vehicle serving customer requests with no time window. We assume that the vehicle should finish its service before the deadline $T_E$ and our objective is to maximize the number of requests served within $T_E$. This is consistent with recent works studying applications in same-day delivery services (see, e.g., \cite{voccia2019same}).
The main differences between the current work and \cite{voccia2019same} are the following: in the latter paper, customer locations are unknown and multiple vehicles are available. As for solution approaches, the ones proposed in the current work are innovative not only in the way future information is approximated, but also on how policies are derived through VFA and PFA and in the way the ILP models are constructed.
Another contribution which is very close to the current study is \cite{van2019delivery}. Again, the problem is formulated as an MDP but decision epochs are pre-defined time instants separated by equidistant intervals. A similar assumption is made in \cite{klapp2018one} where these equidistant time intervals are called `waves'. The objective function is to minimize the expected vehicle operating costs and penalties for unserved requests.
The main differences between the current work and the one of \cite{van2019delivery} is the fact that in the latter paper multiple vehicles are considered as well as a third party service provider. Also, Daganzo's formula is used not only to estimate the tour length but also the number of vehicles required to perform the service. In our work instead we consider a single vehicle and we use the Daganzo's formula for inferring how many requests can be fulfilled in future states at each decision epoch.
Finally, another close work is paper \cite{schrotenboer2021fighting}, where the authors study the problem of balancing the consolidation potential and delivery urgency of orders. The problem is a pickup-and-delivery problem with a fleet of vehicles and the objective is to maximize the expected customer satisfaction. The authors propose a cost function approximation approach.
We summarize the major characteristics of the contributions on routing problems with release dates in Table \ref{table:literature} in Appendix \ref{sec:appendix_literature}.
\section{Problem Description}
\label{sec:problem_formu}
The DOP-rd is defined as follows. A company distributes parcels to its customers from a CDC. Parcels are delivered to the CDC by suppliers throughout the day, i.e., eventually after the moment in which the distribution to customers starts. The moment in which parcels are delivered to the CDC is unknown. In case suppliers' vehicles are equipped with GPS, the information about their arrivals to the CDC (also called depot in the following) is constantly updated. The company has a single uncapacitated vehicle to perform the service. The goal is to serve as many parcels as possible within a given deadline.
More formally, let $G = (V, A)$ be a complete graph. The set of vertices $V$ includes vertex $0$, representing the depot, and the set $N$ of customers. Each customer is associated with an arrival time of its parcel to the depot, which is called release date, and a delivery location. Packages arrive throughout the day until a predefined deadline $T_E$, which also corresponds to the time at which the vehicle has to be back to the depot and to finish the service. Release dates are stochastic and dynamically updated throughout the day. Specifically, the stochastic aspect simulates the situation where suppliers' vehicles carrying the parcels to the CDC might encounter unpredicted events. The dynamic aspect is related to the fact that the information about the arrival of the suppliers' vehicles to the CDC evolves over time, as in the case of GPS equipped vehicles. Each arc $(i, j) \in A$ is associated with a traveling time $d_{ij}> 0$ and we assume that the triangle inequality holds.
A single uncapacitated vehicle is available to perform the deliveries. We define a route as a tour starting and ending at the depot and visiting customers in between. The set of routes is denoted as $K = \{1, ..., |K|\}$.
The goal is to maximize the number of requests served within $T_E$.
We now formalize the problem as a Markov Decision Process (MDP). Note that the detailed notation used along the paper is summarized in Table \ref{table:notation} in Appendix \ref{sec:appendix_notation}.
\subsection{The problem as a Markov Decision Process}
At each decision epoch $e$, we distinguish between customers that have already been served (i.e., their parcels have been delivered), $N_e^{served}$, and those that are still unserved, $N_e^{unserved}$, where $N_e^{served} \bigcup N_e^{unserved} = N$.
There are two categories of unserved customers based on the information available for the release date at decision epoch $e$. If the parcel has arrived at the depot, the release date is known and the customer can be served, thus we call this set of customers $N_e^{known}$. On the contrary, $N_e^{unknown}$ denotes the set of customers whose parcels are still to be delivered to the depot. In turn, there are two subsets of $N_e^{unknown}$: customers whose information about the release date is not updated until the parcel arrives at the depot are denoted as $N_e^{static}$; customers whose information about release date is updated thanks to GPS equipped vehicles are denoted as $N_e^{dynamic}$. Note that $N_e^{static} \bigcup N_e^{dynamic} = N_e^{unknown}$.
Finally, we assume that the suppliers' vehicles deliver the parcels to the depot independently from one another, i.e., the release dates are independent.
Let $\widetilde{r}^e_i$ be the random variable associated with the release date of customer $i \in N_e^{unserved}$ at decision epoch $e$. This variable is defined as follows:
\begin{itemize}
\item for $i \in N_e^{known}$, $\widetilde{r}^e_i = r_i$, where $r_i$ is the actual arrival time of the parcel of customer $i$.
\item for $i \in N_e^{static}$, we have $\widetilde{r}^e_i = \widetilde{r}^0_i$, which means that the distribution of the random variable associated with the release date is estimated at time 0 and never updated till the parcel arrives at the depot.
\item for $i \in N_e^{dynamic}$, $\widetilde{r}^e_i$ is a random variable representing release date at decision epoch $e$. It is dynamically updated throughout the day.
\end{itemize}
At each decision epoch $e$, the company has to decide either to wait for more parcels to arrive or to dispatch the vehicle delivering a subset of the parcels available at the depot. No preemptive return is allowed, i.e., the vehicle comes back to the depot only once all parcels on board are delivered to the corresponding customers.
The MDP components are the following:
\begin{itemize}
\item \textit{Decision epochs:}
A decision epoch is denoted as $e \in \{0, ..., E\}$ and the time associated with it is $t_e$. Note that $T_E$ represents the deadline, i.e., the time at which the vehicle has to be back to the depot and no further deliveries are allowed. The first decision epoch $0$ corresponds to the beginning of the delivery operations. At each decision epoch an action is made based on the current information. A decision epoch corresponds to either the arrival of a package at the depot or to the time when the vehicle is back to the depot at the end of a route. If a parcel arrives but the vehicle is out for delivery, or if the vehicle is at the depot but there is no parcel available, the corresponding decision epoch is skipped to the next.
To avoid waiting for too long at the depot without having any new arrival of packages, additional decision epochs are defined at equally distant time intervals $\phi$,
when the action is evaluated according to the updated stochastic information.
\item \textit{States:}
The state $S_e = (t_e, N^{known}_e, \{\widetilde{r}^e_i\}_{i\in N_e^{unknown}})$ includes all information for evaluating an action at decision epoch $e$, i.e., the time of the decision epoch $t_e$, the set $N^{known}_e$ of customers with known release dates (whose parcels have arrived),
and the stochastic information of future release dates $\{\widetilde{r}^e_i\}_{i\in N_e^{unknown}}$.
At decision epoch 0, no customer has been served.
\item \textit{Actions:}
At each decision epoch $e$, the company has to decide to either dispatch a subset of accumulated orders or to wait at the depot for new parcels to arrive. The decision involves action $\mathcal{X}_e$.
Similarly to what has been done in \cite{archetti2020dynamic}, an action consists of a new route serving a subset of the unserved customers if dispatching is decided. However, while in \cite{archetti2020dynamic} customers served in the new route could belong to both sets $N^{known}_e$ and $N^{unknown}_e$, we instead reduce the set of customers to be potentially included in the new route to $N^{known}_e$. This implies that the new route, in case at least one customer is included, will leave immediately from the depot, contrary to \cite{archetti2020dynamic} where the vehicle might have to wait at the depot in case the route includes at least one customer in $N^{unknown}_e$.
Formally, the action space at decision epoch $e$, denoted by $X(S_e)$, includes all possible subsets of $N^{known}_e$, each one associated with the TSP route serving all parcels in the subset.
The set of customer locations visited in the route associated with the action $\mathcal{X}_e$ is denoted as $l(\mathcal{X}_e)$. This set is empty if the route is empty, i.e., the vehicle is not dispatched and the action consists in waiting at the depot.
\item \textit{Transitions:}
After action $\mathcal{X}_e$, a transition is made from state $S_e$ to a new state $S_{e+1}$. The state $S_{e+1}$ is described as $S_{e+1} = (t_{e+1}, N^{known}_{e+1}, \{\widetilde{r}^{e+1}_i\}_{i\in N_{e+1}^{unknown}})$.
We have $t_{e+1} = t_e + t_{route}(\mathcal{X}_e)$ if route is not empty, $t_{e+1} = min(t_p, t_e+\phi)$ otherwise,
where $t_{route}(\mathcal{X}_e)$ is the time associated with the route corresponding to action $\mathcal{X}_e$, $t_p$ is the earliest time when a new parcel arrives while the vehicle is at the depot,
and $\phi$ is the maximum waiting time between two decision epochs as defined earlier. Let $N^{new}_{e+1}$ be customers whose parcels arrived at the depot between decision epochs $e$ and $e+1$.
Correspondingly, the set of customers are updated as $
N_{e+1}^{unknown} := N_{e}^{unknown}\backslash N^{new}_{e+1} \ \text{and}\
N^{known}_{e+1} :=N^{known}_e\symbol{92}l(\mathcal{X}_e)\cup N^{new}_{e+1}.$ We assume parcels arrive sequentially, thus $N^{new}_{e+1}$ is either singleton or empty.
\item \textit{Objective:}
The objective is to maximize the number of requests served within $T_E$. Each action $\mathcal{X}_e$ chosen when the system is in state $S_e$, is guided by a decision rule and brings an \textit{immediate reward}, expressing the number of requests served by the route dispatched at time $t_e$, and a future reward. A sequence of decision rules is defined as a \textit{policy} and the optimal policy is the one that maximizes the expected reward at epoch $E$.
In decision epoch $e$, the goal is to maximize the number of requests served within the time interval $[t_e,T_E]$. The value function is formulated as the following recursive formula:
\begin{equation}\label{eq:value_func_obj}
V_e(S_e) = \max_{\mathcal{X}_e\in X(S_e)}\{C(S_e, \mathcal{X}_e) + \gamma\mathbb{E}[V_{e+1}(S_{e+1})\mid (S_e, \mathcal{X}_e)]\}.
\end{equation}
Here, $C(S_e, \mathcal{X}_e)$ denotes the immediate reward and $\gamma\mathbb{E}\{V_{e+1}(S_{e+1})\mid (S_e, \mathcal{X}_e)\}$ is the expected value associated with decision epoch $e+1$, while $\gamma$ is a discount factor.
The system suffers from the curse of dimensionality in the number of states, stages and actions. In the recent literature, reinforcement learning is frequently used to deal with this issue (see e.g, \cite{powell2009you} and \cite{van2019delivery}). In this work, we propose two reinforcement learning approaches for solving the DOP-rd, one based on a policy function approximation and the second on a value function approximation. Both methods are hybridized with a look-ahead strategy, in which future release dates are sampled in a Monte-Carlo fashion. The two approaches, \IL{who make a good use of branch-and-cut-based exact methods to improve the quality of decisions,} are described in detail in Section \ref{sec:sol_approach}.
\end{itemize}
\section{Upper Bounds and Partial Characterization of Optimal Policy}\label{sec:ub_pc}
In the following, we first discuss valid upper bounds which are useful for competitive analysis. We then provide sufficient conditions under which it is optimal for the vehicle to leave the depot immediately in order to serve a subset of available parcels.
\subsection{Upper Bounds}
A first trivial upper bound for the DOP-rd can be calculated by solving an Orienteering Problem (OP) \IL{assuming that all unserved parcels are available at the depot (see Section \ref{sec:ub_appendix} of the Appendix for further details).} In the following, we instead describe a stronger upper bound obtained \IL{a-posteriori,} when all information is known.
\paragraph{Upper Bound with Perfect Information:}
A tighter upper bound for the DOP-rd can be computed
\IL{in a \emph{wait-and-see} fashion}, using the \IL{perfect information with respect to} realized release dates. Indeed, in this case, the optimal solution is the solution of the OP with Release Dates \IL{(OP-rd)},
a deterministic counterpart of the problem studied in this article.
Let us assume that all release dates, $r_i\ge 0$, $i \in N$ are known. Then, the goal \IL{of OP-rd} is to find the maximum number of parcels that can be served in the interval $[0,T_E]$. A solution consists of up to $|\mathcal{K}|$ trips performed by the vehicle, so that the end time of the last trip \IL{does not exceed} $T_E$. The problem is NP-hard, since the OP can be reduced in polynomial time to it.
We can model the problem as an ILP making use of the following decision variables:
\begin{itemize}
\item $s_i^k$: binary variable indicating whether parcel $i$ is served in trip $k$;
\item $\xi^k_{ij}$: binary variable equal to 1 in case arc $(i,j)$ is traversed in trip $k$;
\item $d_k$: continuous variable representing the starting time of trip $k$.
\end{itemize}
The \IL{ILP formulation for the OP-rd} is then:
\begin{subequations}
\label{eq:base}
\begin{equation}\label{eq:obj_ILP_base}
\hbox{max} \sum_{i \in N}\sum_{k \in \mathcal{K}} s^k_i
\end{equation}
subject to:
\begin{align}
\label{eq:inout_ILP_base}
\sum_{(i, j)\in A}\xi^k_{ij} &= \sum_{(j, i)\in A}\xi^k_{ji} = s_i^k && \quad i \in V, k \in \mathcal{K}\\
\label{eq:subtour_ILP_base}
\sum_{i, j\in S}\xi_{ij}^k & \leq \sum_{i \in S\setminus{\ell}}s_i^k
&& \quad S \subseteq N, \IL{|S|\geq 2,} \ell \in S, k \in \mathcal{K} \\
\label{eq:singleVisit_ILP_base}
\sum_{k \in \mathcal{K}}s_i^k & \leq 1 && \quad i \in N \\
\label{eq:releaseDate_ILP_base}
d_k & \ge r_i s_i^k && \quad i \in N, k \in \mathcal{K} \\
\label{eq:consecutiveTrips_ILP_base}
d_{k+1} & = d_k + \sum_{(i, j)\in A}d_{ij} \xi^k_{ij} && \quad k \in \mathcal{K} \\
\label{eq:finalTrip_ILP_base}
d_{|\mathcal{K}|} & = T_E && \\
\IL{\xi^k_{ij}, s^k_{i}} & \in \{0,1\} && i,j \in V, k \in \mathcal{K}
\end{align}
where \eqref{eq:inout_ILP_base} are degree constraints, \eqref{eq:subtour_ILP_base} are the generalized subtour elimination constraints and \eqref{eq:singleVisit_ILP_base}
fix the number of visits to a customer to be at most one. Constraints \eqref{eq:releaseDate_ILP_base}--\eqref{eq:finalTrip_ILP_base} determine the starting time of each trip. Specifically, \eqref{eq:releaseDate_ILP_base} establish that a trip cannot depart prior to the release date of each customer to be visited, \eqref{eq:consecutiveTrips_ILP_base} fix the starting time of a trip as the ending time of the preceding trip and \eqref{eq:finalTrip_ILP_base} set the ending time of the last trip equal to $T_E$. Note that constraint \eqref{eq:finalTrip_ILP_base}, as well as the equality in constraint \eqref{eq:consecutiveTrips_ILP_base}, is due to the fact that waiting time can be shifted to the beginning of the distribution without affecting the structure and the value of the solution, thus avoiding any waiting time between consecutive trips and at the end, as shown in \cite{archetti2018iterated}.
We also add symmetry breaking constraints
\eqref{symmetry_break} and constraints \eqref{subt0} to strengthen the formulation:
\begin{align}
\sum_{i \in N} s_i^k & \leq |N| s_0^k && \quad k \in \mathcal{K} && \label{subt0}
&& \\
s_0^k & \leq s_0^{k+1} && \quad k \in \mathcal{K}, k\neq|\mathcal{K}|-1. && \label{symmetry_break}
\end{align}
\end{subequations}
The optimal solution of \eqref{eq:base} provides an upper bound to the DOP-rd. In case the optimal solution is not found within a given computation time limit, the upper bound at the end of computation (rounded down to the nearest integer) provides a valid upper bound for the DOP-rd. The model is solved by means of a branch-and-cut algorithm, in which the generalized subtour elimination constraints are separated on the fly. For more details regarding the separation of these constraints, see, e.g., \cite{lucena1993tight}, \cite{lucena2004strong}, \cite{Ljubic21}.
Note that formulation \eqref{eq:base} needs an upper bound on the number of trips $|\mathcal{K}|$ as input. A trivial upper bound is $|\mathcal{K}|=|N|$, which is the one used in \cite{archetti2018iterated}. However, a tighter value can be obtained by solving the following integer linear programming problem. Let us order customers $i \in N$ in increasing order according to the value of release dates (ties are broken arbitrarily). We define $\alpha_i$ as a binary variable equal to 1 if a direct trip, from the depot to customer $i$ and back, is performed, $i \in N$. A valid upper bound on the number of trips is given by the optimal solution of:
\begin{subequations}
\label{eq:UB}
\begin{equation}\label{eq:obj_UB}
\hbox{max} \sum_{i \in N}\alpha_i
\end{equation}
subject to:
\begin{align}\label{eq:cons_UB}
\alpha_i r_i+\sum_{j=i}^{j=|N|}(d_{0j}+d_{j0})\alpha_j &\le T_E
&& \quad i \in N \\
\IL{\alpha_{i}} & \in \{0,1\} && \quad i \in N
\end{align}
\end{subequations}
Formulation \eqref{eq:UB} counts the maximum number of direct trips that can be performed within $T_E$. Let us call $UB_{trip}$ the optimal solution of \eqref{eq:UB}.\\
\begin{prop}
\label{theo:UB}
Given a vector of deterministic release dates $r_i$ and deadline $T_E$:
\begin{enumerate}
\item $UB_{trip}$ is a valid upper bound on the maximum number of trips \IL{$|\mathcal{K}|$ for the OP-rd};
\item
\IL{Any optimal} solution of \eqref{eq:UB} is a feasible solution for \eqref{eq:base}.
\end{enumerate}
\end{prop}
\proof{Proof.} See Section \ref{sec:proof} in the Appendix.
\begin{comment}
\textcolor{red}{Note that problem \eqref{eq:UB} corresponds to a single machine scheduling problem with release dates and a common due date, where the objective is to minimize the number of late jobs.
This problem can be solved in polynomial time through the greedy algorithm presented in Algorithm \ref{algo:greedy}, where the idea is to schedule requests on the basis of an increasing order of ending time of service. In Algorithm \ref{algo:greedy}, $t_i$ denotes the earliest finishing time of service to request $i$, i.e., the time at which the vehicle is back to the depot after serving $i$ assuming it departs as early as possible, according to the release date of $i$ and the ending time of former trips.
}
\begin{algorithm}[H]
\caption{ A greedy algorithm for determining $UB_{trips}$
\label{algo:greedy}}
\begin{algorithmic}[1]
\Require {Release dates and traveling time to depot \{$r_i,d_{i0},d_{0i}$, $i \in N$\}; Deadline
$T_E$;
\Ensure
Upper bound on the number of trips $UB_{trips}$;
}
\State
$UB_{trips} \gets 0$;
$N_{unscheduled} \gets N$;
\State $t_i \gets r_i+d_{i0}+d_{0i}$, for all $i \in N$;
\State Sort the requests from $N_{unscheduled}$ in increasing order of $t_i$; let $first$ be the first request in the ordered list
\While {$t_{first} \le T_E$}\label{line:while_greedy}\\
\state \hspace{0.5cm}$UB_{trips} \gets UB_{trips}+1$; $N_{unscheduled} \gets N_{unscheduled}\backslash \{first\}$;
\For{$i \in N_{unscheduled}$}
\state $t_i \gets \max\{r_i,t_{first}\}+d_{0i}+d_{i0}$
\EndFor
\State Sort the requests from $N_{unscheduled}$ in increasing order of $t_i$; let $first$ be the first request in the ordered list
\EndWhile
\State
\Return $UB_{trips}$
\end{algorithmic}
\end{algorithm}
\textcolor{red}{
\begin{theo}
Algorithm \ref{algo:greedy} provides the optimal value of $UB_{trips}$ and has a complexity of $\mathcal{O}(n^2 log(n))$.
\end{theo}
\begin{proof}
\textbf{Proof.} By contradiction. Let us assume that there exists a solution $s'$ which has a number of trips which is larger than the number of trips associated with the solution $s$ found by Algorithm \ref{algo:greedy}. First, note that $s'$ contains trips serving one request only: in fact, in case there is a trip serving more than one request, we can delete all requests except one without reducing the number of trips in the solution. Then, let $i'_1, i'_2, ..., i'_{l'}$ ($i_1, i_2, ..., i_{l}$) be the ordered set of requests served in $s'$ ($s$), with $l'$ ($l$) being the number of trips in $s'$ ($s$). Let $c$ be the position of the first request in $s'$ differing from solution $s$, i.e., $c=\min\{d|1\leq d \leq l', i'_d \neq i_d\}$. Let $t_{i'_c}$ be the earliest finishing time of request $i'_c$ in solution $s'$. First, in case $c \leq l$, if $t_{i'_c} \geq t_{i_c}$, we can substitute $i'_c$ with $i_c$ in $s'$ without reducing the number of trips. If instead $t_{i'_c} < t_{i_c}$, then, given that $i'_d=i_d$ for $d=1,...,c-1$, then $t_{i'_{c-1}} \geq t_{i_{c-1}}$. This in turns mean that $t_{i'_c} \geq t_{i_{c-1}}+d_{0i'_c}+d_{i'_c0}$. But then, as $i_c=d \in N \backslash\{i_1,...,i_{c-1}\}$ such $t_{i_{c-1}}+d_{0d}+d_{d0}$ is minimum, then we have that $t_{i'_c} \geq t_{i_c}$. This procedure can be repeated up to $c=l$. Let us now consider the case $c=l+1$. Note that the starting time of request $i'_c$ cannot be earlier than $t_{i_l}$. However, this means that the unscheduled request (with respect to the $l$ requests served in $s$) with the earliest finishing time will finish before $T_E$, but this is not possible given condition in line \ref{line:while_greedy} of Algorithm \ref{algo:greedy}.This concludes the proof of validity. As for the complexity, the loop at line \ref{line:while_greedy} is repeated at most $n$ times, and each time a sorting of the requests is made which requires $\mathcal{O}(n log(n))$.
\end{proof}
}\qed
\end{comment}
\subsection{Partial Characterization of Optimal Policy} \label{sec:partial}
The following proposition provides sufficient conditions to partially characterize an optimal policy.
\begin{prop} \label{prop:charact}
\item Let $\ell$ be the largest number of parcels from $N^{unserved}_e$ that can be delivered within $[t_e,T_E]$. If there exists a subset $N_{sol} \subseteq N^{known}_e$ of parcels that can be delivered within $[t_e,T_E]$ such that $|N_{sol}|= \ell$, then the optimal policy is to leave the depot immediately and distribute the parcels from $N_{sol}$.
\end{prop}
\proof{Proof.} Trivial.
Hence, Proposition \ref{prop:charact} provides sufficient conditions under which it is optimal to leave the depot and (partially) distribute the available parcels. Checking these conditions requires solving an NP-hard optimization problem. Indeed, given a decision epoch $e$, and the set of parcels from $N^{unserved}_e$, one has to find an optimal solution of the OP with respect to $N^{unserved}_e$ with maximum route duration equal to $T_E - t_e$ \IL{and with all parcel profits set to one.} In case the value of the optimal solution is \IL{$\ell > |N^{known}_e|$, then it immediately follows that the condition of Proposition \ref{prop:charact}} is not satisfied. Otherwise, one has to solve a new OP on the set \IL{$N^{known}_e$ and the condition of Proposition \ref{prop:charact} holds } if and only if the value $\ell$ of the optimal solution remains unchanged. Note that, in preliminary experiments, we also implemented a different approach for verifying Proposition \ref{prop:charact}, where a single OP was solved on $N^{unserved}_e$ where profits were set to 1 for parcels in $N^{unknown}_e$, and to $1-\epsilon$ for parcels in $N^{known}_e$, with a sufficiently small value of $\epsilon$. However, the \IL{former} approach
turned out to be much more efficient \IL{than the latter one.}
Finally, we note that, for small values of $|N^{known}_e|$ and large values of $[t_e,T_e]$, it is unlikely that Proposition \ref{prop:charact} holds and \IL{in this case we skip checking whether the underlying conditions hold (see the Section \ref{sec:computational_result} for more implementation details).}
\section{Reinforcement Learning Solution Approaches}
\label{sec:sol_approach}
The solution approaches are based on Monte-Carlo simulation, where scenario generation is performed at each decision epoch $e$ according to the state $S_e$, and on an approximation of the value of future states, described in Section \ref{sec:Batch}. Thus, an on-line
\IL{approximation} scheme is developed, which learns from updated information.
According to formula \eqref{eq:value_func_obj}, our goal is to find a policy $\mathcal{X}_e$ that maximizes the sum of the immediate award $C(S_e, \mathcal{X}_e)$, corresponding to the number of parcels delivered in the ``route 0'' (route that starts now), and the expected number of parcels delivered in future states.
To anticipate the value of future states,
at each decision epoch $e$, we generate a set of scenarios $\Omega$ associated with unserved customers predicting their release dates $\tilde r_e$. Then, we approximate the value function of the future states using a batch approach described in Section \ref{sec:Batch}.
This approximation is used in both approaches determining the decision making policy, which are:
\begin{itemize}
\item \emph{Policy Function Approximation through a Consensus Function (PFA):} for each scenario, we run a deterministic ILP model to determine the set of known requests that should be served with a route starting immediately, and the set of requests included in future routes. Then, a consensus function based on the solutions obtained over all scenarios defines the set of known requests that are served immediately (if any), i.e., with a route leaving from the depot at time $t_e$.
\item \emph{Look-Ahead Policy with Value Function Approximation (VFA):} instead of looking at each scenario independently, we now build a two-stage stochastic ILP model in which the first stage consists in determining a route containing requests to deliver at time $t_e$, while the second stage concerns the expected rewards obtained in the future states by integrating all scenarios with equal probability.
\end{itemize}
The two approaches are described in Sections \ref{policyFunc} and \ref{lookAheadFunc}, respectively (an overview of additional notation used is provided in Table \ref{table:notation_sol} in Appendix \ref{sec:appendix_notation}).
Both ILP methods are based on state-of-the-art branch-and-cut techniques. Note that, in both approaches, Proposition \ref{prop:charact} is checked at each decision epoch (before solving the corresponding ILP) and the procedure is stopped in case it is satisfied, as the best policy is identified by the OP solution defined by the proposition.
\begin{comment}
\textcolor{red}{TO revise: explain the diff between deterministic and sto}
To summarize, we can see the differences between the two approaches mainly lie on the following two aspects.
\begin{enumerate}
\item Modelling approach: after creating batches, the first approach continues by solving a deterministic model for each scenario $\omega$ where $\omega \in \Omega$, while the second one is functioned by solving a two-stage stochastic model integrating $N_\omega$ scenarios with equal probability together.
\item Policy class: the first one uses consensus function as the policy function approximation to take into account all the scenarios generated while the second one adopts one-step look-ahead policies achieved with a two-stage stochastic modelling.
\end{enumerate}
\textcolor{red}{TODO: rewrite in the end}
\end{comment}
\subsection{Approximation of the Value Function of Future States}
\label{sec:Batch}
At each decision epoch $e$, we are given the sets of known customers $N_e^{known}$ and unknown customers $N_e^{unknown}$. As for $N_e^{unknown}$, we generate a set of scenarios $\Omega$ where a scenario $\omega \in \Omega$ represents a possible realization of the expected release dates for $i \in N_e^{unknown}$, sampled according to the distribution associated with $\tilde{r}^e_i$. Assume that we are given a scenario $\omega\in\Omega$.
We propose to determine the route serving a subset of requests from $N_e^{known}$ while approximating the rewards obtained from serving the remaining ones from $N_e^{unserved}$ until the deadline.
As for the approximation of future routes serving customers in $N_e^{unserved}$, we use a batch approach
that works as follows.
First, we assume that each future route will serve at most $\rho$ requests. This will allow us to easily obtain an approximation of the duration of future routes. Also, it is reasonable to assume that in practical applications the company will not wait for too long (i.e., it will not wait for more than $\rho$ parcels becoming available at the depot) before dispatching the vehicle. Thus, by a proper tuning of the value of $\rho$ (as shown in Section \ref{sec:sensitivity}), one might obtain a good approximation of the duration of future routes. We apply the formula of \cite{daganzo1984distance} to obtain an estimation of the duration of each future route. This formula is commonly used in the literature thanks to its simplicity and accuracy (\cite{sankaran2007relative}, \cite{jabali2012continuous}, \cite{van2019delivery}). According to the formula, given the Euclidean area $\mathcal{A}$ containing the locations of unserved customers and $\rho$, under the assumption that the locations are scattered uniformly and independently, the expected tour duration $T_D$ is $0.75\sqrt{\mathcal{A}\rho}$.
The input to the batch approach is given by the duration of a batch tour $T_D$ (calculated through the Daganzo's formula mentioned above), the distribution of release dates, and $\rho$, the maximum number of requests served in each future route (represented by a batch). All these parameters, together with $|\Omega|$ (the number of scenarios sampled to approximate the future release dates), are referred to as $\theta$ in the following. Then, for each scenario $\omega \in \Omega$, the batch algorithm works as described in the following. For the ease of reading, we omit the index $\omega$ in the notations.
The algorithm starts by ordering the unserved requests according to their release dates associated with the realizations of scenario $\omega$. {Recall that $\widetilde{r}^e_i$ are random variables representing the release dates for $i \in N_e^{unserved}$. For a given scenario $\omega$ we will denote by $r^e_i$ the realization of expected release dates (ERDs) for $i \in N_e^{unknown}$ and actual release dates for $i \in N_e^{known}$.} The algorithm then divides requests into batches. To serve as many requests as possible, the last route (or batch) is supposed to serve the requests arriving at the latest that can still be feasibly served before the deadline. Thus, the selection is done backwards, i.e., starting from the request with the latest release date, and checking whether it can be included in the last route, i.e., if its release date is not larger than the starting time of the last route, which is $T_E-T_D$. Then, the algorithm proceeds iteratively this way until $\rho$ requests are included in the last route. After that, a new route is created (the second last) associated with a starting time equal to $T_E-2T_D$, and so on. Note that, as the algorithm works backwards, we refer to the last route as route 1 (and so on) in the following.
In order to provide a detailed description of the algorithm, the following notation is introduced:
\begin{itemize}
\item $K$: the set of indices for all the batches created;
\item $K_0$: the set of indices for batches with positive spare capacities ($K_0 \subseteq K$). We say that a batch $k$ has a positive spare capacity if the number of requests in $N_e^{unknown}$ assigned to $k$ is less than $\rho$;
\item $k(i)$: the index of the batch request $i$ is assigned to, $i \in N_e^{unknown}$;
\item $\tau_{start}^k$: the starting time of the route serving batch $k\in K$;
\item $\tau_{end}^k$: the ending time of the route serving batch $k\in K$.
\item $\rho_k$: the number of requests in $N_e^{unknown}$ assigned to the route serving batch $k\in K$.
\end{itemize}
The scheme of the batch algorithm is presented in Algorithm \ref{simu:Pro}.
\begin{algorithm}[h]
\caption{The batch algorithm
\label{simu:Pro}}
\small
\linespread{0.7}\selectfont
\begin{algorithmic}[1]
\Require{Time $t_e$;
Unserved requests $N_e^{unserved}=N_e^{known}\cup N_e^{unknown}$; Release dates \{$r^e_i$, $i \in N_e^{unserved}$\}; Deadline
$T_E$; Maximum number of requests allowed in a batch $\rho$;
Duration of a batch route $T_D$;
\Ensure
Set $K_0$; Number of batches $|K|$;
Batch indices \{$k(i)$, $i \in N_e^{unknown}$\};
\{($\tau_{start}^k, \tau_{end}^k,\rho_k)$, $k \in K$\};
}
\State
$n \gets |N_e^{unserved}|$;
$K \gets \emptyset$; $K_0 \gets \emptyset$;
$k \gets 1$;
$t_k \gets T_E$ - $T_D$; \IL{$\rho_1 \gets 0$}
\State $k(i) \gets 0$, for all $i \in N_e^{unknown}$;
\State Sort the requests from $N_e^{unserved}$ in increasing order of
release dates $r_i^e$;
\State Initialize the number of requests assigned to the $k$-th batch $r \gets 0$;
\For
{$i \gets n$ to $1$}
\IfThen{$t_k \leq t_e$}
\textbf{break}
\If{release date $r^e_i \leq t_k$}
\If{$i \in N_e^{known}$}
$ K_0 \gets K_0 \cup \{k\}$
\Else
\quad $k(i) \gets k$; $\rho_k \gets \rho_k+1$
\EndIf
\State $r \gets r+1$
\If{$r = \rho$ or $i = 1$}
\State $K \gets K \cup$ $\{k\}$
\State $\tau_{start}^k \gets t_k$; $\tau_{end}^k \gets t_k+T_D$
\State $k \gets k + 1$;
$t_k \gets t_k - T_D$; $r \gets 0$; \IL{$\rho_k \gets 0$}
\EndIf
\EndIf
\EndFor
\State
\Return {$K_0, K$, \{$k(i)$, $i \in N_e^{unknown}$\}, and \{$(\tau_{start}^k$, $\tau_{end}^k, \rho_k)\}_{k\in K}$}
\end{algorithmic}
\end{algorithm}
Note that in Algorithm \ref{simu:Pro}, customers in $N_e^{known}$ are treated differently than those in $N_e^{unknown}$. For each customer $i \in N_e^{unknown}$ such that $r_i^e \leq T_E - T_D$ the algorithm determines the unique batch $k(i)\in K$ to which $i$ is assigned. However, the customers in $N_e^{known}$ can be be assigned to any potential batch $k \in K$ which has some spare capacities, i.e., which contains less than $\rho$ unknown requests. The subsets of the batches with spare capacities are denoted by $K_0$ and a unique assignment of a request $i \in N_e^{known}$ to some $k \in K_0$ is obtained through the optimization models proposed in Sections \ref{policyFunc} and \ref{lookAheadFunc}.
\begin{table}[h]
\caption{\IL{Input instance for the batch approach (\textit{ERD
0 means the parcel $i$ is at the depot, i.e., $i \in N_e^{known}$})}}
\label{table:batchTitle}
\centering
\scalebox{0.7}{
\begin{tabular}{|p{50mm}|p{7.20mm}|p{5.50mm}|p{5.50mm}|p{5.50mm}|p{5.50mm}|p{5.50mm}| p{5.50mm}|l|}
\hline
\multirow{2}{*}{\textbf{Total number of requests}} & \multirow{2}{*}{8} & \multicolumn{6}{l|}{\multirow{2}{*}{\textbf{\begin{tabular}[c]{@{}l@{}}Max number of requests\\ in a batch $\rho$\end{tabular}}}} & \multirow{2}{*}{3} \\ & & \multicolumn{6}{l|}{} & \\ \hline
\textbf{Number of batches} & 3 & \multicolumn{6}{l|}{\textbf{Duration of a batch tour $T_D$}} & 1 \\ \hline
\textbf{Returning time of route 0} & \IL{TBD} & \multicolumn{6}{l|}{\textbf{Deadline}} & 16 \\ \hline
\textbf{ID of the requests} & 1 & 2 & 3 & 4 & 5 & 6 & 7 & 8 \\ \hline
\textbf{ERD of the requests} & 0 & 0 & 0 & 14 & 14 & 15 & 15 & 15 \\ \hline
\end{tabular}}
\end{table}
\begin{figure}[H]
\centering
\includegraphics[width=0.5\textwidth]{images/batch2.png}
\caption{The assignment of requests to batches (\textit{a dashed line connects known requests with batches from $K_0$, indicating potential assignments of each $i \in N_e^{known}$ to some $k \in K_0$})}
\label{fig:batch}
\end{figure}
\begin{table}[H]
\centering
\caption{The batches}
\label{table:batchContent}
\scalebox{0.6}{
\begin{tabular}{|l|c|c|c|c|c|c|c|}
\hline
\textbf{Batch number} & \textbf{3} & \multicolumn{3}{c|}{\textbf{2}} & \multicolumn{3}{c|}{\textbf{1}} \\ \hline
\textbf{Unknown requests assigned} & {-} & {-} & 4 & 5 & 6 & 7 & 8 \\ \hline
\textbf{Max ERD served} & 0 & \multicolumn{3}{c|}{14} & \multicolumn{3}{c|}{15} \\ \hline
\textbf{Start time of the tour} & 13 & \multicolumn{3}{c|}{14} & \multicolumn{3}{c|}{15} \\ \hline
\textbf{End time of the tour} & 14 & \multicolumn{3}{c|}{15} & \multicolumn{3}{c|}{16} \\ \hline
\textbf{k(i)} & - & - & $k(4)=2$ & $k(5)=2$ & $k(6)=1$ & $k(7)=1$ & $k(8)=1$ \\ \hline
\textbf{$K_0$} & \checkmark & \multicolumn{3}{c|}{\checkmark} & \multicolumn{3}{c|}{\xmark} \\ \hline
\end{tabular}}
\end{table}
To explain how the batch approach works, a toy example with 8 requests is displayed in Table \ref{table:batchTitle}, \IL{and the output is shown in Table \ref{table:batchContent} and Figure \ref{fig:batch}.}
Note that \IL{in Table \ref{table:batchTitle} we
also consider the ending time of route 0 (whose value is to be defined),} that is the route that leaves immediately from the depot. \IL{The ending time of route 0 will allow to schedule only those batches that can start after the route 0 is completed.} The role of this parameter will become clearer in the following sections where we explain how the output of the batch algorithm is integrated in the two solution approaches. As the deadline is 16, the first batch route should be completed no later than 16. Each route lasts 1 time unit (according to Daganzo's formula) so the three requests with expected release date equal to 15 are assigned to batch 1 (which is mapped as the first future route backward). Correspondingly, the start time of the tour is 15. For batch 2, its ending time is 15 so its starting time is 14. Thus the two requests with expected release dates equal to 14 are assigned to the batch. As batch 2 has a residual capacity of 1, any of the known requests (with ID 1, 2 and 3) can be assigned to it. In addition, requests 1, 2 and 3 can be assigned to batch 3. Table \ref{table:batchContent} describes the content of batches and displays the values of $k(i)$. It also shows that batches 2 and 3 are the ones that can be used to serve known requests (thus, they belong to set $K_0$) with the check mark on the last row. Note that, in case a request $i \in N_e^{unknown}$ is not assigned to any batch (for example, because its release date is larger than the starting time of route 1 or because there are no sufficient batches to include all requests), then $k(i)=0$.
Finally, as shown in the following sections, to evaluate if each future route is executable, we need to check whether the starting time is greater than the ending time of the route leaving immediately from the depot, that is route 0. This is done through the optmization models presented in the following section.
\subsubsection{Optimality Conditions for the Batch Approach}
In the following, we show that under some simplifying conditions, the batch approach given by Algorithm \ref{simu:Pro} provides a polynomial way to calculate an optimal solution.
Let us assume that we are at the decision epoch $e$ and that all the release dates are known with certainty. We denote as $r$ the vector of release dates. In the following proposition, we still use the notation $N_e^{unknown}$ referring to parcels whose release date is greater than $t_e$.
\begin{prop}\label{prop:maxnumber}
If the release dates are deterministic, the duration of each route is $T_D$, independently of the location of the requests served, and the vehicle can deliver up to $\rho$ parcels per route, Algorithm \ref{simu:Pro} finds (in polynomial time):
\begin{enumerate}
\item The maximum number of requests from $N_e^{unknown}$ that can be served within $[t_e,T_E]$, given as $| N_{\mathcal O}|$, where
\begin{align}
N_{\mathcal O} = \{ i \in N_e^{unknown} : k(i) \neq 0 \} . \label{eq:futurenum}
\end{align}
\item The maximum number of all requests from $N_e^{unserved}$ that can be served within the interval $[t_e,T_E]$, given as:
\[
OPT_{\rho,T_D} = \begin{cases}
|N^{known}_e| + |N_\mathcal{O}|, & \text{ if $ |N^{known}_e| < \sum_{k \in K_0} (\rho - \rho_k)$} \\
|K|* \rho, & \text{ otherwise}
\end{cases}
\]
\end{enumerate}
\end{prop}
\proof{Proof.}
We first observe that in case $\rho_k=\rho$ for all $k \in K$, then this is trivially the optimal solution. Thus, in the following we discard this case.
\begin{enumerate}
\item By construction of the solution $ N_{\mathcal O}$, there exists $\tilde{k}$, $1 \le \tilde{k} \le |K|$, such that $\rho_{\tilde{k}}< \rho$, $\rho_k=\rho$ for $k < \tilde{k}$ and $\rho_k =0$ for $k>\tilde{k}$. The batch $\tilde{k}$ is called \textit{critical batch} and corresponds to the only possible batch whose spare capacity is positive but strictly smaller than $\rho$. We call this property \textit{the critical batch property}. Suppose that there exists a solution $N_\mathcal{O'} \subseteq N_e^{unknown}$ such that $|N_\mathcal{O'}| > |N_\mathcal{O}|$ parcels from $N_e^{unknown}$ can be delivered within the interval $[t_e,T_E]$. Without loss of generality, we can shift the starting time of all batches to the latest possible and then reassigning parcels to the latest possible batch in such a way that the solution $N_\mathcal{O'}$ also satisfies the critical batch property. We argue that the number of parcels scheduled in batch $\tilde{k}$ of reordered solution $N_\mathcal{O'}$ cannot be bigger than the one in $N_\mathcal{O}$. Indeed, by contradiction: let us consider a request $i$ served in batch $\tilde{k}$ in $N_\mathcal{O'}$ and not in $N_\mathcal{O}$. In case $i$ is not served in any batch $k<\tilde{k}$ in $N_\mathcal{O}$, then $i$ would have been inserted in batch $\tilde{k}$ in solution $N_\mathcal{O}$ as well. In case, instead, request $i$ is served in one batch $k<\tilde{k}$ in $N_\mathcal{O}$, then it means there exists at least one request $i'$ served in a batch $k<\tilde{k}$ in $N_\mathcal{O'}$ but not in $N_\mathcal{O}$. However, due to the way batches in $N_\mathcal{O}$ are constructed, this means that $r_i^e \geq r_{i'}^e$. Given that $i$ is inserted in batch $\tilde{k}$ in $N_\mathcal{O'}$, this means that $r_{i'}^e \leq \tau_{start}^{\tilde{k}}$, thus $i'$ and $i$ could be swapped in the corresponding batches in $N_\mathcal{O'}$. By repeating iteratively this procedure on all requests in batch $\tilde{k}$ in $N_\mathcal{O'}$, we obtain two identical sets of requests in the critical batch $\tilde{k}$.
\item We notice that $\sum_{k \in K_0} (\rho - \rho_k)$ represents the sum of spare capacities over all routes that can be scheduled within $[t_e,T_E]$. Since the parcels from $N_e^{known}$ are already available at time $t_e$, if their number is smaller than the total spare capacity, all of them can be distributed among the routes determined by $K_0$, hence guaranteeing that $|N^{known}_e| + |N_\mathcal{O}|$ parcels are delivered in total. If, on the contrary, $|N^{known}_e|$ is larger than the total spare capacity, only a subset of them will be delivered, so that for each batch, its maximal capacity is used. We emphasize that, due to the assumption that all routes have the same duration, namely $T_D$, and the same capacity $\rho$, customer locations are irrelevant in this case, and hence, the way how assignment of parcels from $N^{known}_e$ to batches from $K_0$ is done, does not affect the optimal solution.
\end{enumerate}
$\qed$
Hence, by combining scenario generation and the batch approach, we approximate the value of future routes as a one-step look-ahead policy in which future events are condensed in a single step and future actions are evaluated through batch approximation.
\subsection{Policy Function Approximation}
\label{policyFunc}
There are four fundamental ways of deriving policies (\cite{powell2014clearing}), one of which is based on policy function approximations (PFAs). PFA might consist in a set of simple rules, a lookup table, or a parametric model that does not involve solving an optimization problem. Our first solution approach falls into this category and it works according to the following rule:
\begin{equation}\label{eq:value_func}
\tilde X^{PFA}_e(S_e \mid \theta) = \Phi(\tilde{X}^\omega_e)_{\omega \in \Omega}
\end{equation}
where
\begin{equation} \label{eq:determinisic}
\tilde{X}^\omega_e = \arg \max_{\mathcal{X}_e \in X(S_e)}\{C(S_e, \mathcal{X}_e) + \gamma \tilde{V}_{e+1}(\tilde{S}_{e+1} \mid \omega) \}
\end{equation}
is the optimal action for the given value function approximation $\tilde{V}_{e+1}(\tilde{S}_{e+1}\mid \omega)$ ($\tilde{S}_{e+1}$ is the approximation of state at $e+1$ and $\tilde{V}$ is an estimate of the value of being in state $\tilde{S}_{e+1}$
, under the realization of scenario $\omega$.
As defined in Section \ref{sec:Batch}, $\theta$ captures all tunable parameters of the model.
Function $\Phi$ is the consensus function {for determining the action, considering the best actions over all scenarios (see Section \ref{consensus}). Thus, the main idea of the proposed PFA is that, for each scenario $\omega$, the best action $\tilde{X}^\omega_e$ is determined, according to the method described in Section \ref{ILP: model}. This consists in solving a deterministic ILP where the goal is to determine the route that should leave immediately from the depot (which might be empty) by optimizing the function given by the sum of the immediate reward associated with this route plus the estimated value of future routes (determined through the batch approach described in Section \ref{sec:Batch}). Then, a consensus function is applied to determine the best action according to the solution obtained on each of the scenarios. Note that, as we solve an ILP for each scenario independently, there is no uncertainty in the input data to the ILP: indeed, the release dates correspond to the realizations associated with the given scenario, and we refer to this model as \textit{deterministic ILP model} below}.
\subsubsection{Consensus Function}
\label{consensus}
We define the consensus function denoted with $\Phi$ in formula (\ref{eq:value_func}) as the policy to find which requests are served in route 0 while considering all solutions associated with the different scenarios.
The scheme is reported in Algorithm \ref{simu:Consensus} in Appendix \ref{sec:appendix_Consensus}. The function checks solutions $\tilde{X}_e^\omega$ over all scenarios $\omega \in \Omega$, by focusing on the requests in $N_e^{known}$ served in route 0 in each solution. The idea is to determine which subset of these requests should be served in route 0. Specifically, a request $i \in N_e^{known}$ is served if it is included in route 0 in at least $\frac{|\Omega|}{2}$ solutions. If at least one request is included in the route, then a Traveling Salesman Problem (TSP) is solved over all requests included to determine the best sequence. Otherwise, the decision is to wait at the depot until the next decision epoch $e+1$.
\subsubsection{Deterministic ILP Model}
\label{ILP: model}
We now describe the optimization model used to find the optimal policy $\tilde X^\omega_e$ given in \eqref{eq:determinisic}.
The idea is that only the reward of route $0$ (which corresponds to $C(S_e, \mathcal{X}_e)$) is calculated with the detailed routing information (since the route is to be executed immediately in case at least one request is assigned to it), while the value and the duration of future routes are estimated through the batch approach (Section \ref{sec:Batch}).
We define as $K = \{1, ..., \lvert K \rvert\}$ the set of future routes.
The parameters considered are in the following:
\begin{itemize}
\item $\tau_{start}^0$ is a parameter indicating the starting time of the immediate route, thus its value is equal to $t_e$.
\item $A^{known}$, it includes all arcs $(i, j)$ where $i, j \in N_e^{known}\cup \{0\}$ linking customers with known requests and depot.
\end{itemize}
In addition, we have the parameters associated with future batches corresponding to the output of the batch approach (see Section \ref{sec:Batch}).
The decision variables are the following:
\begin{itemize}
\item $x_{ij}^0$: binary arc variable for route $0$, equal to 1 if the route traverses arc $(i, j) \in A^{known}$, 0 otherwise.
\item $y_i^0$: binary variable associated with known requests $ i \in N_e^{known}$, equal to 1 if customer $i$ is served in route $0$, and 0 otherwise.
\item $z_k$: binary variable equal to 1 if future route (batch) $k \in K$ is executed, 0 otherwise.
\item $\tau_{end}^0$: continuous
variable denoting the ending time of the route 0.
\item $w_i^k$: binary variable equal to 1 if known request $i \in N_e^{known}$ is served in batch $k \in K_0$, 0 otherwise.
\end{itemize}
The deterministic ILP model is given as follows.
In line with (\ref{eq:determinisic}), \IL{the first term in the objective function \eqref{eq:obj_ILP}}, namely $\sum_{i\in N^{known}_e}y_i^0$, maps $C(S_e, \mathcal{X}_e)$ representing the number of requests served by action $\mathcal{X}_e$. The sum of the two remaining terms in \eqref{eq:obj_ILP}, namely
\IL{$\sum_{k \in K} \rho_k z_k$} and
$\sum_{k \in K_0} \sum_{i \in N^{known}_e} w_i^k$ maps $\tilde{V}_{e+1}(\tilde{S}_{e+1} \mid \omega)$, representing the approximated number of parcels delivered at future states. Note that in case $\sum_{i\in N^{known}_e}y_i^0=0$, it means that route 0 does not serve any request and the decision is to wait at the depot until the next decision epoch $e+1$. Then for each scenario $\omega$, the corresponding ILP formulation is given as follows:
{\small
\begin{subequations}
\label{eq:deterministic}
\begin{equation}\label{eq:obj_ILP}
\hbox{max}\
\sum_{i\in N^{known}_e}y_i^0 + \gamma \left[
\sum_{k \in K} \rho_k z_k + \sum_{k \in K_0} \sum_{i \in N^{known}_e}w_i^k\right]
\end{equation}
subject to:
\begin{align}\label{eq:inout_ILP}
\sum_{(i, j)\in A^{known}}x_{ij}^0 &= \sum_{(j, i)\in A^{known}}x_{ji}^0 = y_i^0
&& \quad i \in N_e^{known}\cup \{0\} \\
\label{eq:subtour_ILP}
\sum_{i, j\in S}x_{ij}^0 & \leq \sum_{i \in S\setminus{\ell}}y_i^0
&& \quad S \subseteq \IL{N^{known}_e, |S|\geq 2,} \ell \in S \\
\label{eq:endStartRoute_ILP}
\tau_{end}^0 &= \tau_{start}^0 + \sum_{(i, j) \in A^{known}}d_{ij}x_{ij}^0 \\
\label{eq:deadline_ILP}
\tau_{end}^0 &\leq T_E \\
\label{eq:requestLimit_ILP}
\sum_{k \in K_0}w^k_i+y_i^0 &\leq 1 && \quad i \in N^{known}_e \\
\label{eq:wholeBatch_ILP}
\sum_{i \in N^{known}_e} w^k_i &\leq (\rho - \rho_k) z_k && \quad k \in K_0 \\
\label{eq:routeK_ILP}
z_{k+1} &\leq z_k && \quad k = 1, \ldots |K|-1 \\
\label{eq:startK_ILP}
\tau_{end}^0 - \tau_{start}^k &\leq (T_E-\tau_{start}^k)(1-z_k) && \quad k\in K \\
\label{eq:decivars}
y_i^0, w_i^k, x_{ij}^0, z_k &\in \{0, 1\} && \IL{i,j \in N^{known}_e, k \in K}
\end{align}
Besides, we initialize the model with GSECs of size two
and the constraints (\ref{eq:depot_ILP}) to strengthen the formulation:
\begin{align}
\label{eq:size2_ILP}
x_{ij}^0 + x_{ji}^0 &\le y_{i}^0 && \quad i,j \in N^{known}_e
\\
\label{eq:depot_ILP}
\sum_{i \in \IL{N^{known}_e}} y_i^0 & \leq |N| y_0^0 &&
\end{align}
\end{subequations}
}
The objective function (\ref{eq:obj_ILP}) maximizes the total number of requests served by route $0$ plus the number of requests served by future routes, distinguished in unknown and known requests, multiplied by the discounting factor $\gamma$. Constraints (\ref{eq:inout_ILP}), (\ref{eq:subtour_ILP}) guarantee that route $0$ is a circuit connected to the depot and prevent generating subtours. Constraint (\ref{eq:endStartRoute_ILP}) determines the ending time of route 0, which is computed as its starting time plus the traveling time.
Constraints (\ref{eq:deadline_ILP}) ensure that route $0$ finishes within the deadline $T_E$. Constraints (\ref{eq:requestLimit_ILP}) state that the same request cannot be served by both route $0$ and a future route.
Constraints (\ref{eq:wholeBatch_ILP}) guarantee that each future route in $K_0$
does not serve more than $\rho$ requests. Note that these constraints are needed for routes in $K_0$ only, as potentially any request in $N_e^{known}$ can be assigned to each of these routes. Instead, for the routes in $K\backslash K_0$, the constraint is satisfied by construction from the batch approach.
Constraints (\ref{eq:routeK_ILP}) state that if future route $k+1$ is executed, then route $k$ must be executed too (symmetry breaking constraints). Constraints (\ref{eq:startK_ILP}) ensure that future route $k$ can start only after finishing route $0$. Finally, \eqref{eq:decivars} define variables domain.
To solve this model, we implemented a branch-and-cut procedure in which the generalized subtour elimination constraints \eqref{eq:subtour_ILP} are separated in each node of the branching tree (see Section \ref{sec:computational_result} for further details).
\subsection{Look-ahead Policy with Value Function Approximation}
\label{lookAheadFunc}
The second approach we propose is a two-stage stochastic look-ahead model using a value function approximation:
\begin{equation}\label{eq:value_function}
\tilde{X}^{VFA}_e(S_e \mid \theta) = \argmax_{\mathcal{X}_e\in X(S_e)
}\{C(S_e, \mathcal{X}_e) + \gamma\mathbb{E}[\widetilde{V}_{e+1}(\widetilde{S}_{e+1} )\mid (S_e, \mathcal{X}_e)]\}
\end{equation}
where, as before, $\theta$ captures all tuning parameters,
$\widetilde{S}_{e+1}$ is the approximation of state at the epoch $e+1$ and $\widetilde{V}_{e+1}(\widetilde{S}_{e+1})$ represents the approximation of the value function of being in state $\widetilde{S}_{e+1}$.
The action $\tilde{X}^{VFA}_e(S_e \mid \theta)$ is determined through the solution of a two-stage stochastic integer program as presented in the following.
\subsubsection{Two-stage Stochastic Integer Program}
\label{2-stage: model}
The modeling idea is similar to the one presented in Section \ref{ILP: model}, i.e., routing decisions are taken only for route 0 while future routes are approximated with the batch approach. The main difference with respect to the approach presented in Section \ref{policyFunc} is that a single Two-stage Stochastic Integer Program (2-SIP) is solved using all scenarios in $\Omega$, instead of solving $|\Omega|$ deterministic ILPs (separately per scenario). Specifically, each scenario $\omega \in \Omega$ is associated with the realizations of the release dates of the unknown requests $\{\widetilde{r}^e_i\}_{i \in N_e^{unknown}}$, denoted as $\widetilde{r}^{e1}, ..., \widetilde{r}^{e\omega}$. Also, we denote as $p^\omega$ ($0 < p^\omega < 1$) the probability associated with scenario $\omega \in \Omega$ ($\sum_{\omega \in \Omega} p^\omega=1$). We first run the batch algorithm on the realization of each scenario to pre-calculate the following parameters:
\begin{itemize}
\item $K^\omega$ is the set of indices for all the batches created in scenario $\omega$, $\omega \in \Omega$
\item $k^\omega(i)$ is index of the route serving request $i \in N_e^{unknown}$ in scenario $\omega$. As before $k^\omega(i)=0$ means that request $i\in N_e^{unknown}$ is not served in scenario $\omega \in \Omega$ in any of the batches;
\item $K_0^\omega$ is the subset of batches with spare capacities in scenario $\omega \in \Omega$.
\item $\tau^{k\omega}_{start}$ is the starting time of route (batch) $k\in K$ in scenario $\omega\in \Omega$.
\item $\rho_k^\omega$ is the number of unknown requests assigned to batch $k\in K$ in scenario $\omega\in \Omega$.
\end{itemize}
As for the decision variables, we keep variables $x_{ij}^0$, $y_i^0$ and $\tau_{end}^0$ as defined in the deterministic model (\ref{eq:deterministic}).
In addition, we have
the scenario-related variables as follows:
\begin{itemize}
\item $w_i^{k\omega}$: $i \in N_e^{known}, k \in K_0^\omega$, binary variable equal to 1 if known request $i$ is served in batch $k$ in scenario $\omega \in \Omega$, and 0 otherwise.
\item $z_k^\omega$: Binary variable equal to 1 if batch $k\in K$ in scenario $\omega \in \Omega$ is used, and 0 otherwise. For the ease of reading, we will simply write $z_{k(i)}^\omega$ instead of $z_{k^\omega(i)}^\omega$.
\end{itemize}
The first stage decision corresponds to determining route 0. In line with the policy function (\ref{eq:value_function}), the number of requests served by route 0 is determined by $\sum_{i\in N^{known}_e}y_i^0$ and matches the immediate reward $C(S_e, X_e)$.
The second-stage decisions are instead associated with determining the requests served in future routes in each scenario. They correspond to the second term in the objective function \eqref{eq:obj_STO} and match the approximation $\gamma\mathbb{E}[\widetilde{V}_{e+1}(\widetilde{S}_{e+1} )\mid (S_e, \mathcal{X}_e)]$. The 2-SIP is formulated as follows:
\begin{subequations}\label{eq:model_STO}
\begin{align}
\label{eq:obj_STO}
\max_{} \sum_{i\in N^{known}_e}y_i^0 + \gamma\mathbb{E}_{\omega}[\tilde{V}(y^0, \tau_{end}^0, \widetilde{r}^{e\omega})] \\
\text{ s.t. $\qquad (x^0,y^0,\tau_{end}^0)$ satisfies \eqref{eq:inout_ILP}-\eqref{eq:deadline_ILP}, \eqref{eq:size2_ILP}-\eqref{eq:depot_ILP}
} \notag \\
x^0_{ij}, y^0_i \in \{0,1\} && \IL{i,j \in N_e^{known}}
\end{align}
where $\tilde{V}(y^0, \tau_{end}^0, \widetilde{r}^e)$ represents the value of the recourse function associated with the second stage. This value depends on the requests served in route 0 ($y^0$), the duration of the route 0 ($\tau_{end}^0$) and the distribution of uncertain release dates for unserved requests ($\widetilde{r}^{e\omega}, \omega \in \Omega$). Given a route 0 determined by the vector $\bar y^0$, with duration $\bar \tau_{end}^0$ and a realization of $|\Omega|$ scenarios concerning the release dates $\widetilde{r}^e$ (each with probability $p_\omega >0$), the expected value of the recourse function is calculated as the following ILP:
\begin{equation}
\mathbb{E}_\omega[\tilde{V}(\bar y^0, \bar \tau_{end}^0, \widetilde{r}^{e\omega})] := \quad
\max_{w, z}\ \sum_{\omega\in \Omega}p_\omega(\sum_{k \in K^\omega}\rho_k^\omega z_k^\omega + \sum_{k \in K_0^\omega}\sum_{i \in N^{known}_e}w_i^{k\omega})
\label{eq:2decision_epoch}
\end{equation}
\begin{align}
\text{subject to:}
\sum_{k \in K_0^\omega}w^{k\omega}_i &\leq 1 - \bar y_i^0 && \quad \omega \in \Omega, i \in N^{known}_e \label{eq:requestLimit_STO}\\
\sum_{i \in N^{known}_e} w^{k\omega}_i &\leq (\rho-\rho_k^\omega) z_k^\omega && \quad \omega \in \Omega, k \in K_0^\omega \label{eq:wholeBatch_STO}\\
z_k^\omega &\geq z^\omega_{k+1} && \quad \omega \in \Omega, k= 1, \ldots |K^\omega|-1 \label{eq:routek_STO}\\
\tau_{start}^{k\omega} + (T_E-\tau_{start}^{k\omega})(1-z_k^\omega) &\geq \bar \tau_{end}^0 && \quad \omega\in \Omega, k\in K^\omega \label{eq:startK_STO} \\
w_i^{k\omega}, z_k^\omega &\in \{0, 1\} && \IL{\omega \in \Omega, i\in N^{known}_e, k \in K^\omega} \label{eq:decivars11}
\end{align}
\end{subequations}
The objective function \eqref{eq:2decision_epoch} maximizes the expected number of requests
served by future routes. The following constraints till \eqref{eq:startK_STO}
have a similar meaning as in formulation (\ref{eq:deterministic}) with the difference that they are replicated over all scenarios. Finally, \eqref{eq:decivars11} define variables domain.
In order to solve this 2-SIP model, we implement a branch-and-cut procedure, similar to the one of the deterministic ILP model, with a dynamic separation of the generalized subtour elimination constraints \eqref{eq:subtour_ILP}.
\section{Computational Experiments}
\label{sec:computational_result}
In this section, we describe the computational experiments we carry out for validating the performance of the two proposed approaches. The code is developed in Python 3.7 and CPLEX version 20.1.0.0 is used to solve all ILPs, run on a single thread with memory usage limit set to 2GB.
We run the simulations on HP Z4 G4 Workstation with Intel(R)
Xeon(R) W-2255 CPU @ 3.70GHz.
As for parameter values, we set them as follows. The discount rate $\gamma$ is set to 0.9, which is a commonly adopted value
\IL{used for similar approaches in the literature (see, e.g., \cite{volkel2020stochastic}).}
Also, some preliminary experiments showed that, by varying the value of $\gamma$, the performance of the approaches is not significantly affected. The maximum time interval between consecutive decision epochs $\phi$ is set to 10, which is a sufficiently small value to avoid long waiting times at the depot according to the input instances used in the computational campaign (described in Section \ref{sec:instances}). \IL{The number of scenarios $|\Omega|$ generated in each decision epoch is set to 30 and in our preliminary experiments we noticed no significant performance improvements when considering larger values of $|\Omega|$.}
\IL{As for implementation details, we remark the following.
Six branch-and-cut algorithms are implemented: a) to calculate upper bounds with perfect information, b) to check whether the conditions of the partially optimal policy are satisfied, c) to calculate the consenus function of the PFA approach, d) to calculate the value function approximation in the VFA approach, and e) to get the route for the ME approach {described in Section \ref{sec:myopic}}. All these algorithms rely on separation of GSECs which are implemented using lazy cutcallback of the CPLEX solver. To benefit from general-purpose cuts generated by the CPLEX solver, we collect the cuts separated at the root node of the branching tree, and then restart the ILP. We set a time limit for the solution of each branch-and-cut to 5, 10 and 10 minutes for the deterministic, stochastic and myopic ILP model,
respectively. Note that the deterministic model is allocated with a shorter computing time as it is solved for each scenario. All other CPLEX parameters are left at their default values.
The call to partial characterization of optimal policy is skipped in each decision epoch of PFA and VFA when $|N^{known}_e|<0.25|N^{unserved}_e|$ and remaining time $[t_e,T_E] > 0.75T_E$. We consider that for such settings there are small chances that conditions of Proposition \ref{prop:charact} are satisfied.}
Concerning the calculation of upper bounds using the model \eqref{eq:base}, we provide CPLEX with a starting feasible solution corresponding to the solution of model \eqref{eq:UB} and the time limit is set to one hour
The remainder of this section is organized as follows. We first describe the input instances in Section \ref{sec:instances} and the myopic approaches in Section \ref{sec:myopic}. Section \ref{sec:partial_benefit} illustrates the benefit of integrating partial characterization of optimal policy within the PFA and VFA approaches. Finally, Section \ref{sec:final_results} presents the comparison of the two proposed approaches with two myopic approaches.
Additional computational results can be found in the Appendix, where Section \ref{sec:sensitivity} presents a sensitivity analysis on the value of parameter $\rho$, i.e., the maximum number of parcels included in each future route as used in the batch approach.
\subsection{Input Instances}\label{sec:instances}
We use the set of benchmark instances described in \cite{archetti2020dynamic} that are derived from Solomon's instances (\cite{solomon1987algorithms}). Specifically, \IL{instance classes} $C1$, $C2$, $R1$ and $RC1$ are considered. Each instance is associated with three parameters $\beta$, $\delta$ and $T_E$. The first two parameters, $\beta$, $\delta$, define the dispersion of release dates and the percentage of customers with dynamic release dates, respectively. We refer to Section \ref{sec:appendix_instances} in the Appendix and \cite{archetti2020dynamic} for more details.
Parameter $T_E$ is the deadline of the delivery service (that is not defined in the problem studied in \cite{archetti2020dynamic}), which is determined as follows. We first determine the latest actual arrival time of all requests and we denote it as $T_{standard}$. Then, we generate four instances with $T_E$ equal to $c* T_{standard}$, where $c \in \{0.6, 0.8, 1.0, 1.2\}$.
\IL{For each customer input data and each choice of $\beta$, $\delta$ and $c$, five different instances (with different seeds) are generated, thus resulting in a benchmark set of 720 instances.}
\subsection{Two myopic approaches}\label{sec:myopic}
We propose two myopic approaches as a benchmark to compare with. The main idea of both approaches is to dispatch the vehicle immediately in every decision epoch by serving all known requests (if any) that can be feasibly served. The difference among the two lies in how the vehicle route (and eventually the subset of known requests to serve) is determined in each decision epoch. The first approach, denoted as \textit{ME} in the following, works as follows: every time the vehicle is back to the depot, in case there is at least one parcel available, the vehicle is immediately dispatched. All parcels available are served \textcolor{black}{ if the deadline is not violated. In case the deadline is violated, there is a need to select a subset of parcels to deliver. This is done through \IL{exactly} solving an orienteering problem \IL{(via a branch-and-cut method)} to maximize the number of parcels delivered while satisfying the limited route duration}.
\textcolor{black}{The second myopic approach, denoted as \textit{MH}, differs from the first in the way the vehicle route is constructed, which follows the nearest neighbor idea. Specifically, every time the vehicle is at the depot and there is at least one parcel available, the dispatching decision is made by selecting first the closest customer location to the depot then the nearest customer to the one just selected and so on until the remaining time is not enough to serve any new customer or all parcels available are included on the route. The motivation behind the proposal of \textit{MH} as a benchmark is that it mimics practical cases associated with companies that are not equipped with sophisticated optimization tools (like the one needed in \textit{ME}) for decision making.}
\subsection{Benefit of partial characterization of optimal policy}
\label{sec:partial_benefit}
We illustrate the benefit of partial characterization (PC) of optimal policy (see Section \ref{sec:partial}) by comparing the performance of PFA and VFA with and without PC. Results are shown in Table \ref{partial_comparison} where instances are classified according to the value on $\delta$ first, then $\beta$ and finally $c$. For each of the two approaches, the table reports the average computing time (in seconds) with and without PC, the average and maximum percentage improvement in solution value of the approach with PC with respect to the corresponding one without PC, and the number of times the approach with PC improved on the solution of the approach without PC.
In Table \ref{partial_comparison},
we observe that when using PC, the running time doubles in both approaches. However, this is compensated by significant solution improvements, especially when all customers are static ($\delta=0$), release dates are spreaded in a moderate level \IL{($\beta=0.5$)}
and time horizons are large ($c=1, 1.2$).
Overall, we have an improvement of 4.98\% for VFA and 5.55\% for PFA, with maximum improvements being 24\% and 29\%, respectively.
Given the benefits of PC and the fact that computing time remains reasonable, we show the results of PFA and VFA with PC in the following section.
\begin{table}
[h]
\caption{The comparison of VFA and PFA
(with and without partial characterization of optimal policy)
}
\label{partial_comparison}
\centering
\scalebox{0.62}{
\begin{tabular}{lc||cc|ccc||cc|ccc
\hline
\textbf{} & \textbf{} & \multicolumn{5}{c||}{\textbf{VFA}} & \multicolumn{5}{c}{\textbf{PFA}} \\ \hline
\textbf{} & \textbf{} & \multicolumn{2}{c|}{\textbf{t(s)}} & \multicolumn{3}{c||}{\textbf{Improvement}} & \multicolumn{2}{c|}{\textbf{t(s)}} & \multicolumn{3}{c}{\textbf{Improvement}} \\ \hline
\textbf{$\rho$} & \textbf{\#instances} & \textbf{noPC} & \multicolumn{1}{c|}{\textbf{withPC}} & \textbf{AVG(\%)} & \textbf{MAX(\%)} & \textbf{\#impr.} & \textbf{noPC} & \multicolumn{1}{c|}{\textbf{withPC}} & \textbf{AVG(\%)} & \textbf{MAX(\%)} & \textbf{\#impr.} \\ \hline \hline
$\delta= 0$ & 240 & 30.19 & 66.89 & 5.18 & 15.00 & 33 & 42.92 & 78.57 & 5.32 & 15.00 & 31 \\
$\delta= 0.5$ & 240 & 33.28 & 69.73 & 4.21 & 12.00 & 29 & 45.15 & 83.72 & 5.10 & 29.00 & 29 \\
$\delta= 1$ & 240 & 37.75 & 81.89 & 4.93 & 24.00 & 27 & 82.74 & 144.24 & 5.04 & 24.00 & 27 \\ \hline
$\beta= 0.5$ & 240 & 38.76 & 71.11 & 8.17 & 24.00 & 6 & 86.69 & 146.24 & 12.83 & 29.00 & 6 \\
$\beta= 1$ & 240 & 32.07 & 76.60 & 4.66 & 15.00 & 59 & 45.94 & 89.22 & 4.73 & 15.00 & 59 \\
$\beta= 1.5$ & 240 & 30.40 & 70.81 & 4.25 & 8.00 & 24 & 38.18 & 71.07 & 4.23 & 9.00 & 22 \\ \hline
$c= 0.6$ & 180 & 31.37 & 74.45 & 3.57 & 4.00 & 7 & 43.28 & 87.28 & 3.00 & 3.00 & 1 \\
$c= 0.8$ & 180 & 32.27 & 72.69 & 4.80 & 8.00 & 15 & 87.32 & 144.52 & 3.73 & 6.00 & 22 \\
$c= 1$ & 180 & 34.97 & 69.45 & 5.86 & 15.00 & 29 & 49.92 & 87.50 & 6.59 & 15.00 & 29 \\
$c= 1.2$ & 180 & 36.35 & 74.77 & 4.18 & 24.00 & 38 & 47.23 & 89.41 & 4.94 & 29.00 & 35 \\ \hline
\textbf{Avg/MAX} & \textbf{} & \textbf{33.74} & \textbf{72.84} & \textbf{4.98} & \textbf{24.00} & \textbf{26.7} & \textbf{56.94} & \textbf{102.18} & \textbf{5.55} & \textbf{29.00} & \textbf{26.1} \\ \hline
\end{tabular}
}
\end{table}
\subsection{Performance of PFA and VFA}\label{sec:final_results}
In this section, we compare the results of PFA and VFA (with PC) against ME and MH. The goal is to show the benefit of incorporating approximation of future information \IL{into exact solution methods to improve sequential decision making.} Based on the results of sensitivity analysis (see Appendix \ref{sec:sensitivity}), we set the value of $\rho$ to 15 both in PFA and VFA. The KPI used for the comparison is the best solution found over all approaches. In addition, we also report, for each of the four approaches, the gap with respect to the upper bound with perfect information, obtained by solving formulation \eqref{eq:base}. This latter measure is related to the competitive analysis where the focus is on measuring the discrepancy in solution quality due to lack of information.
Results are summarized in Table \ref{4approaches_betadelta}, summarized by values of $\beta$ and $\delta$, and in Figure \ref{fig:4approach_beta} (summarized over $\beta$) and Figure \ref{fig:4approach_delta} (summarized over $\delta$). Detailed results for all values of $\beta$, $\delta$ and $c$ can be found at the link \href{https://github.com/Yuanyuan517/RL-for-OP-with-stochastic-and-dynamic-RD/blob/d2c07ad11caae34d0560c4af5911303caa168565/beta_delta_ts.csv}{DetailedResult}\footnote{\url{https://github.com/Yuanyuan517/RL-for-OP-with-stochastic-and-dynamic-RD/blob/d2c07ad11caae34d0560c4af5911303caa168565/beta\_delta\_ts.csv}}. In addition, summarized results over the value of $c$ can be found in the Appendix, Section \ref{sec:4approaches_timescale}.
For each approach, we report the average gap with respect to the best solution found over all approaches (denoted as $gap\%$), the gap with respect to the upper bound with perfect information ($gap_{ub}\%$), the computational time ($t[s]$) and the number of times the best solution was found, including ties ($freq$). As for $gap\%$, we calculated it as follows. Given an input instance, let $N_{p}$ denote the value of the solution found by approach $p$. The gap with respect to the best solution found over all approaches is calculated as $ 1 - \frac{N_{p}}{\max_{q \in \{VFA,PFA,MH,ME\}} N_{q}}$. Instead, the gap with respect to the upper bound is calculated as $ 1 - \frac{N_{p}}{UB}$, where $UB$ is the value of the upper bound with perfect information.
\begin{table}[hpt]
\caption{Average performance of the four approaches}
\label{4approaches_betadelta}
\centering
\scalebox{0.53}{\begin{tabular}{@{}c|c|c||ccccl|ccccl|ccccl|cccl}
\toprule
\textbf{} & \textbf{} & \textbf{} & \multicolumn{4}{c}{\textbf{VFA}} & & \multicolumn{4}{c}{\textbf{PFA}} & & \multicolumn{4}{c}{\textbf{MH}} & & \multicolumn{4}{c}{\textbf{ME}} \\ \midrule
\textbf{$\beta$} & \textbf{$\delta$} & \textbf{\#instances} & \textbf{gap{[}\%{]}} & \textbf{gap$_{ub}${[}\%{]}} & \textbf{t{[}s{]}} & \textbf{freq} & & \textbf{gap{[}\%{]}} & \textbf{gap$_{ub}${[}\%{]}} & \textbf{t{[}s{]}} & \textbf{freq} & & \textbf{gap{[}\%{]}} & \textbf{gap$_{ub}${[}\%{]}} & \textbf{t{[}s{]}} & \textbf{freq} & & \textbf{gap{[}\%{]}} & \textbf{gap$_{ub}${[}\%{]}} &\textbf{t{[}s{]}} & \textbf{freq}\\
\hline\hline
0.5 & 0 & 80 & 1.75 & 24.36 & 52.05 & 64 & & 1.49 & 24.16 & 70.90 & 70 & & 29.59 & 46.00 & 0.20 & 0 & & 15.61 & 34.93 & 71.03 & 30\\
& 0.5 & 80 & 5.00 & 24.70 & 62.44 & 55 & & 4.83 & 24.57 & 91.23 & 56 & & 24.28 & 38.97 & 0.20 & 7 & & 14.78 & 31.29 & 25.07 & 27\\
& 1 & 80 & 3.97 & 23.57 & 98.82 & 58 & & 3.36 & 23.08 & 276.60 & 66 & & 28.54 & 42.79 & 0.20 & 3 & & 18.28 & 34.47 & 56.39 & 18\\
\hline
\textbf{} & \textbf{AVG} & \textbf{80} & \textbf{3.57} & \textbf{24.21} & \textbf{71.11} & \textbf{59.0} & & \textbf{3.23} & \textbf{23.94} & \textbf{146.24} & \textbf{64.0} & & \textbf{27.47} & \textbf{42.58} & \textbf{0.20} &\textbf{3.3} & & \textbf{16.22} & \textbf{33.56} & \textbf{50.83} & \textbf{25.0} \\
\hline\hline
1 & 0 & 80 & 2.21 & 19.86 & 80.63 & 54 & & 1.49 & 19.22 & 97.54 & 54 & & 16.35 & 30.19 & 0.22 & 0 & & 7.29 & 23.20 & 111.99 & 40 \\
& 0.5 & 80 & 1.46 & 22.05 & 74.51 & 57 & & 1.59 & 22.12 & 86.62 & 57 & & 17.03 & 33.03 & 0.22 & 12 & & 8.60 & 26.98 & 99.95 & 28 \\
& 1 & 80 & 2.09 & 16.47 & 74.66 & 52 & & 1.57 & 16.05 & 83.49 & 54 & & 14.42 & 25.71 & 0.22 & 10 & & 6.33 & 19.51 & 80.52 & 46 \\
\hline
\textbf{} & \textbf{AVG} & \textbf{80} & \textbf{1.92} & \textbf{19.46} & \textbf{76.60} & \textbf{54.3} & & \textbf{1.55} & \textbf{19.13} & \textbf{89.22} & \textbf{55.0} & & \textbf{15.93} & \textbf{29.64} & \textbf{0.22} & \textbf{7.3} & & \textbf{7.41} & \textbf{23.23} & \textbf{97.48} & \textbf{38.0} \\
\hline\hline
1.5 & 0 & 80 & 0.63 & 7.44 & 67.99 & 70 & & 1.19 & 7.86 & 67.25 & 60 & & 7.44 & 12.96 & 0.24 & 30 & & 2.40 & 8.79 & 38.58 & 47\\
& 0.5 & 80 & 1.19 & 14.03 & 72.24 & 56 & & 1.56 & 14.28 & 73.32 & 53 & & 7.82 & 19.37 & 0.22 & 20 & & 3.33 & 15.73 & 4.78 & 49\\
& 1 & 80 & 1.81 & 11.19 & 72.20 & 53 & & 2.01 & 11.35 & 72.64 & 50 & & 5.50 & 14.06 & 0.23 & 30 & & 1.46 & 10.75 & 38.78 & 63 \\
\hline
\textbf{} & \textbf{AVG} & \textbf{80} & \textbf{1.21} & \textbf{10.88} & \textbf{70.81} & \textbf{59.7} & & \textbf{1.59} & \textbf{11.16} & \textbf{71.07} & \textbf{54.3} & & \textbf{6.92} & \textbf{15.47} & \textbf{0.23} & \textbf{26.7} & & \textbf{2.40} & \textbf{11.75} & \textbf{27.38} & \textbf{53.0} \\
\hline\hline
{\textbf{AVG}} & & 80 & \textbf{2.24} & \textbf{18.18} & \textbf{72.84} & \textbf{57.7} & & \textbf{2.12} & \textbf{18.08} & \textbf{102.18} & \textbf{57.8} & & \textbf{16.77} & \textbf{29.23} & \textbf{0.21} & \textbf{12.4} & & \textbf{8.68} & \textbf{22.85} & \textbf{58.57} & \textbf{38.7}
\\ \bottomrule
\end{tabular}
}
\end{table}
\begin{figure}[h]
\centering
\includegraphics[width=0.93\textwidth]{images/beta.png}
\caption{Performance of the approaches based on beta}
\label{fig:4approach_beta}
\end{figure}
\begin{figure}[h]
\centering
\includegraphics[width=0.93\textwidth]{images/delta.png}
\caption{Performance of the approaches based on delta}
\label{fig:4approach_delta}
\end{figure}
Focusing first on the KPIs related to best known solution (gap[\%] and freq) and on the comparison between VFA and PFA, we notice that, on average, the results obtained with PFA are associated with the smallest gaps, being anyway very similar to the ones obtained with VFA. The same holds when considering the number of best solutions found. The only exception is related to the case of $\beta = 1.5$ and $\delta = 0.5$, however, the differences are always marginal. We instead observe a large difference in terms of computing time, with PFA being much slower than VFA, especially for $\beta = 0.5$ and $\delta = 1$. More specifically, when looking at the third row of Table \ref{4approaches_betadelta}, we can notice that the critical case is the one with $\beta = 0.5$ and $\delta = 1$, where the computing time of PFA is almost three times the one of VFA. We argue that this is due to the fact that, when $\beta = 0.5$, due to the lower dispersion of release dates, the number of known requests in each decision epoch increases (as more packages arrive while the vehicle is performing deliveries). Thus, the number of $x$ and $y$ variables in \eqref{eq:deterministic} increases, slowing down the solution of the formulation. This is valid also for \eqref{eq:model_STO}. However, given that in PFA formulation \eqref{eq:deterministic} is solved for each scenario, the computational burden becomes larger. \IL{Moving to the competitive analysis, we notice that both PFA and VFA produce solutions that are between 11\% and 25\% below the upper bound with perfect information. We also notice that gap$_{ub}$[\%] decreases when increasing the value of $\beta$. This might be due to the fact that, when the release dates are more dispersed, the best policy is to let the vehicle leave immediately with a subset of known requests, thus avoiding to wait too long at the depot.}
Instead, when the dispersion is smaller, it becomes more difficult to judge whether it is more convenient to wait or \IL{to start dispatching some parcels.} This is also witnessed by the fact that the performance of both myopic approaches, which are based on the idea of dispatching the vehicle immediately with the largest possible subset of known requests, improves for larger value of $\beta$. Instead, when focusing on the value of $\delta$, the behavior is more flat and there is no clear trend.
Overall, we can conclude that both VFA and PFA largely outperform myopic approaches, the latter ones being considered as proxies of practical policies. The difference in solution quality is marginal and in favor of PFA. However, as VFA is much faster, we believe it is a good compromise between solution quality and computational burden.
\IL{Figures \ref{fig:4approach_beta} and \ref{fig:4approach_delta} provide graphical representation of obtained results.} We observe that when $\beta$ goes from 0.5 to 1.5, for both gap[\%] and gap$_{ub}$[\%], the performance of all approaches improves progressively, especially for ME and MH.
When it comes to the frequency in getting the best solution, we find that the PFA and VFA achieve a significantly better performance when the spread of release dates is the lowest (i.e., $\beta = 0.5$) but the frequency of getting best results becomes higher in the myopic ones when $\beta$ grows bigger. This is consistent with the observation above. As for the effect of $\delta$ (i.e., the percentage of parcels with dynamic release dates), it does not produce a specific trend in general.
Overall, we can see that VFA and PFA serve more requests compared to ME and MH,
and VFA shows a best tradeoff in terms of running time and the solution quality. Still, we can find that the performance of the myopic approaches varies significantly with the values of $\beta$. Another important observation is that in general the results achieved with PFA and VFA are more stable than the two myopic ones. For the comparison on time scale (see Appendix \ref{sec:4approaches_timescale}), we find similar results.
In summary, we can conclude that VFA achieves the best performance tradeoff in terms of objective value and running time.
\section{Conclusion}\label{sec:conclusion}
\IL{To the best of our knowledge, this article is the first to study the orienteering problem with stochastic and dynamic release dates.
For this challenging sequential decision making problem, we propose two reinforcement learning approaches. Both of them rely on MDP with discrete sets of scenarios simulating future realizations of release dates in each decision epoch. They employ the approximation of the value of the future states in two different ways: the PFA approach handles each scenario independently and uses a consensus function to decide on action in each decision epoch. The VFA approach considers all scenarios simultaneously and uses a two-stage stochastic model instead. PFA and VFA are compared with two myopic alternatives, that we consider as proxies of practical policies.
Our empirical study confirms
benefits of incorporating approximation of future information into exact solution methods to improve sequential decision making.
Both PFA and VFA significanlty outperform myopic policies, not only in terms of best obtained gaps with respect to the perfect-information upper bounds, but also in terms of frequency with which the best-quality solutions are obtained.
The difference in solution quality between PFA and VFA is marginal and in favor of PFA. However, as VFA is much faster, we believe it is a good compromise between solution quality and computational burden.
}
This paper shows that exact methods provide benefits in solving complex sequential stochastic and dynamic optimization problems, specifically routing problems, which are known to be extremely difficult even in their deterministic counterpart. This opens up opportunities for applying the same methodology to other more complicated problem settings, involving, for example, vehicle capacity, time windows or multiple vehicles.
\section*{Acknowledgements}
This work was funded by CY Initiative of Excellence (grant ``Investissements d'Avenir" ANR-16-IDEX-0008''). This support is greatly appreciated.
\theendnotes
\bibliographystyle{chicago}
|
\section{Introduction}
Social media has become an integral part of society. Particularly, media outlets such as Twitter, are often used for spreading information, advertising, and curating communities.
Researchers have used Twitter data to make predictions on many scenarios, for instance, election results~\cite{coletto2015electoral}, analyze product opinions~\cite{6726818}, forecast box office revenue~\cite{5616710}, measure public response to COVID-19~\cite{xue2020twitter}, and predict how people move in cities \cite{luca2021survey}.
Another task that commonly leverage{s} Twitter data is sentiment analysis (SA) \cite{birjali2021comprehensive}. SA is a natural language processing (NLP) technique often used to determine whether a text falls into one of three categories: positive, negative, or neutral~\cite{mejova2009sentiment}. As those three sentiments can be quite unspecific, it is important to find ways of extracting a wider range of emotions from text. Additionally, while there have been algorithms developed to accommodate different sized texts, there is limited research on models which extract the overall sentiment of a collective group of independent texts. The current research, seeks to have a deeper understanding of the overarching sentiment of a group of unrelated texts as it adds to the real-life applicability of sentiment analysis and allows for a whole new understanding of attitudes. This practice can be quite useful for industry professionals as it alleviates the clients' responsibility to interpret results or manually adjust the output of a traditional SA model which is limited to predictions on individual tweets.
{Current methodologies, associate to a set of texts discussing the same topic the average predicted emotion. For example, given ten tweets discussing a topic $\mathcal{T}$, with six positive tweets and four negative tweets, will be considered positive.} Such methodologies neglect the impact of potential associations that come out of independent entities that are placed together. Realistically, individuals looking at a group of items will formulate associations between them, even if they do not exist. Similarly, independent items placed next to each other will not be evaluated without bias, but rather an opinion, attitudes, and behaviors are affected by the surrounding environmental information{\cite{cassidy2013environmental}}.
Psychological studies support this claim that individuals can be influenced by the proximity effect, where purchasing behaviours are dependent on an items' relative website positioning \cite{breugelmans2007shelf}. Therefore, the process of analyzing tweets individually and then aggregating the results is not conducive to modeling the correct behavior of the general public. Which is the behavior that is most useful for industries trying to understand the sentiment of their clientele. Take as {another} practical example, if the frequency distribution of labels is 51\% negative and 49\% positive { for a different topic $\mathcal{T}_2$}. Presenting this ratio to a user who has requested the general emotion from a group of tweets is not useful, because the labels are almost evenly distributed, and it does not help the client to understand what the broader group-level sentiment is. Subsequently, if the label were to be returned as negative, that can also be misleading as the emotion intensity of the text is not examined. For example, the 49\% of happy tweets could be extremely positive, whereas a number of the negative tweets could be leaning toward neutral but contain enough negativity to become classified as negative. As stated before, since individuals have a tendency to evaluate using information from the whole set of tweets, this distinction between the emotion intensity can lead a client to believe that the overarching emotion is positive.
As these nuances are difficult to detect and adjust for, it is important to have models capable of formulating a deeper understanding of the relationship between a group of independent tweets. Evaluating how tweets in a set interact with each other in order to give the impression of a certain emotion is different from separately classifying them and then aggregating the results.
In the last decades, graph analysis has been involved in many domains such as: molecular biology\cite{huber2007graphs}, face-to-face interactions \cite{longa2022efficient,longa2022neighbourhood}, for social networks \cite{barnes1969graph,brandes2013social}, {crime \cite{calderoni2020robust, ficara2021criminal}} and many others \cite{luca2021leveraging, cencetti2021digital}.
For NLP problems, graphs are very useful for representing text because the syntactic relationship between words in a sentence can naturally form a graph structure \cite{nastase2015survey}. Furthermore, multi-layer networks (MLN) which are formed by connecting several systems together, can be used to represent inter-dependent aspects of a heterogeneous group of tweets \cite{singh2020sentiment}.
For that reason, the proposed methodology represents a group of unrelated tweets using a multi-layer graph network. The graph structure can help to emulate a number of different tweets of a similar sentiment, as a single entity and makes it possible to understand the underlying associations that lead to a group of tweets sharing an overarching emotion. Additionally, the Tweet-MLNs will resolve many of the practical issues with using social media text, as they will be capable of capturing meaningful relationships from colloquial language and unseen tweet assets such as hashtags, emojis, or mentions because of how the data is structured inside the graph. Furthermore, due to the multi-dimensionality of the MLN different relationships between different features of a tweet can be examined at the same time. For example, the relationship among hashtags that occur within the same tweet, and are repeated in other tweets can be modeled simultaneously with the syntactic relationship between keywords.
In summation, this work uses a MLN graph representation of Twitter data and is passed through a GNN to make group-level predictions of the overall emotion of a group of independent tweets. Additionally, the dataset includes a wider range of emotions: Happy, Angry, Bad, Fearful, Sad, and Surprised.
The rest of the paper is structured as followed. {In Section \ref{sc:rel_work}, we shortly introduce some related work related to sentiment analysis. In section \ref{sec:rw} we introduce useful concepts and notations about graphs and graph neural networks.} Section \ref{sec:implementation} breaks down the steps toward executing the proposed model and also provides an overview of the network architecture. Section \ref{sec:et} details experimental tests used to evaluate the network, while the results of these tests are analyzed in section \ref{sec:r}. Finally, the paper is concluded in section \ref{sec:c}.
{ \section{Related Work}
\label{sc:rel_work}
The rapid diffusion of ubiquitous technologies like mobile phones also came with the unprecedented opportunity for companies to analyze the opinion, sentiments and perceptions of people with respect to a specific product or topic. Sentiment Analysis (SA) is the task consisting of the extraction of such insights. In recent years, several applications have seen success in their ability to perform such classifications to a high degree of accuracy. There are two main branches of SA, one using lexical rules and the other using machine learning techniques (e.g., \cite{medhat2014sentiment,birjali2021comprehensive}). Lexical methods study the semantic information already present inside a piece of text and use statistics to extract features (e.g., \cite{taboada2011lexicon}). Machine learning methods are framed as traditional text classification problems (e.g., \cite{le2015twitter}). Usually, ML-based method leverage datasets \(D = \{(X_1, Y_1), ...,(X_n, Y_n)\}\) where X is a textual resource and Y is a class (positive, negative, or neutral). Then a classification model is trained on the data, and used to predict labels for unseen pieces of text. Hybrid methods combine the two techniques (e.g., \cite{zainuddin2018hybrid}). While there are many deep learning approaches to classify the sentiment of texts \cite{habimana2020sentiment}, in this paper, we focus on the role of transformers.
Recently, transformer networks \cite{vaswani2017attention} reached promising results and are widely adopted to solve NLP and Computer Vision tasks \cite{lin2021survey, khan2021transformers}.
BERT \cite{devlin2018bert} is one of the first transformers aiming to solve Natural Language Understanding problems. It relies on a set of encoders and self-attention mechanisms. While it was pretrained to be a language model and to perform next sentence prediction \cite{devlin2018bert}, it has been widely adopted to solve SA problems achieving significantly high performances \cite{xu2019bert, sun2019utilizing, hoang2019aspect, li2019exploiting, pota2020effective}.
In this paper, we use BERTSent \cite{govindarajan2020help} and XLM-roBERTa \cite{conneau2019unsupervised} as baselines for standard SA and to support the group-level prediction we are proposing.
}
\section{Background}\label{sec:rw}
\subsection{Multi-Layered Networks}
Any graph \(G\) consists of vertices and edges where \(G=(V, E)\) and where \(V = {v_1,...,v_N}\) is connected by edges \(E = {e_,...,e_{|N|}}\). A graph is weighted if there exists a function that assigns weights to edges connecting two nodes in the set of edges ($(u,v) \in E$). Otherwise it is assumed that a graph is unweighted.
A graph is undirected if there is a symmetric relationship between nodes and is direct if there is a no symmetry between nodes. Additionally, in an undirected graph, each node points exclusively to another node.
Graphs are homogeneous if nodes and edges point to one type of entity, and heterogeneous if it contains varying types of nodes and edges.
Multi-layered Networks are a collection of separate graph structures, or "layers". Each layer shares a connection to at least one other layer in the network. In this way, it is possible to illustrate the relationship between independent graphs that are somehow related. Many real-world scenarios are heterogeneous systems that interact with each other rather than one holistic network, which is why MLNs have become increasingly popular in graphical research \cite{boccaletti2014structure}. Since the individual layers can capture nuances of its' own environment but the connections across layers still contain information about the relationship between graph entities, the MLN is a practical way of modeling disjointed information of more realistic and complex problems such as social ties \cite{brodka2012multi}, biological systems \cite{lee2020heterogeneous}, and certain inter-dependent infrastructures \cite{chen2016fascinate}.
Specifically for Twitter data, choosing to reconstruct text into a multi-layered graphical representation can provide many benefits. The multi-layered structure of the graph allows for isolation of tweet-features that are not specifically related to the syntax, such as hashtags. These features can be modeled in their own network representation, but remain connected to the separate graph which models the syntax and key-words in a tweet. Additionally, \cite{singh2020sentiment} found that the graph structure of a tweet can help to improve classification and handle noisy, unspecific and linguistic challenges compared to other tweet-prediction models.
One can define the MLN as a set of {$M$} networks or graphs each depicting a separate interactions within their own graph structure but containing some level of cross-layer dependency or association between nodes in a separate graph layer \cite{medhi2000multi}. Three primary types of MLNs include:
\begin{enumerate}
\item Multiplex
\begin{enumerate}
\item Multiplex Networks creates edges only between repeating nodes in different layers.
\end{enumerate}
\item Multi-slice Network
\begin{enumerate}
\item Multi-slice Networks are temporal networks, where edges are present at specific times \(t\).
\end{enumerate}
\item Networks of Networks
\begin{enumerate}
\item In a Network of Networks each layer is formed by a different set of nodes and at the layer level there is network itself interacting with other networks in other layers.
\end{enumerate}
\end{enumerate}
The current research adapts the Network of Networks type MLN with 3 layers each formed of varying sets of nodes from the same group of tweets. Then a GNN is applied at each layer level whose output interacts with the other layers and eventually returns a single prediction for the group of tweets using information from all 3 layers.
\subsection{Graph Neural Networks}
Compared to other data types such as images, which have a square and fixed structure that can be easily passed through traditional convolutional neural networks (CNN), graph data is more irregular. For example, a graph can contain any number of unordered nodes, and nodes from separate graphs do not have a standardized number of neighbors, making convolutions much more difficult compared to image data which has a fixed neighborhood. Furthermore, instances of nodes are dependent on each other through links that form edges in the graph.
The deep learning model GNN is applied to solve various graph related tasks and handle the issues with irregularity described above. Without having to change the topology of a graph input, the GNN can perform transformations on all graph attributes while maintaining graph connectivity and symmetry \cite{scarselli2008graph}. In order to do so, GNNs start by converting nodes to recurrent units. Additionally, edges are translated into feed forward neural networks. Message passing between all nodes allow for the extraction of different embedding vectors. Then these embedding vectors are aggregated to formulate a single vector. The current paper will apply a GNN to a graph-level classification task. Graph-level classification is a graph task which attempts to predict the label of an entire graph rather than individual nodes. GNNs have shown improved accuracy on graph classification tasks \cite{errica2019fair} and more relevantly, classification of text-graphs \cite{huang2019text}. A number of different variants of the GNN and different graph convolution layers have been developed overtime and can be applied to graph-level classification. { This study focuses on three types of GNN which are explained below. }
\subsubsection{GCNConv}
Graph convolutional networks (GCNs) are computationally efficient and have been shown to extract powerful node representations \cite{kipf2016semi}. Using a similar idea to traditional convolutions used in CNNs for images, but adjusting from the irregular structure of a graph, the GCN extracts information from a certain nodes' neighborhood and then uses an aggregation function which combines that neighborhood information to be put into a neural network. This process is repeated for each node in the graph.
The propagation rule applied in the current paper using the GCNConv is as followed:
\begin{equation}
\mathbf{X}^{\prime} = \mathbf{\hat{D}}^{-1/2} \mathbf{\hat{A}}
\mathbf{\hat{D}}^{-1/2} \mathbf{X} \mathbf{\Theta}
\end{equation}
{where \(\mathbf{X}^{\prime}\) is the convoluted signal matrix,} \(\mathbf{\hat{A}} = \mathbf{A} + \mathbf{I}\) is the adjacency matrix and identity matrix for the current layer in the MLN. Summing the adjacency matrix and identity matrix creates a self-loop that includes the current node into the aggregation function.
\(\hat{D}_{ii} = \sum_{j=0} \hat{A}_{ij}\) is the corresponding diagonal matrix. {\(\mathbf{\Theta}\) is a matrix of filter parameters.}
\subsubsection{GATv2Conv}
Graph Attention Networks (GAT) have convolution layers that place different weights on various nodes features, thus paying “attention” to only the most important features in a specific graph \cite{ velivckovic2017graph} and help us to capture a more accurate representation of graph nodes across the different layers. The GATv2Conv is an improvement on the previous model and fixes the static attention problem present in traditional GAT networks \cite{brody2021attentive}.
GATv2Conv layers were used to extract updated node features \(x_i\), with shape: \((|\mathcal{V}_i|, H * F_{out})\) where \(H\) is number of multi-head attentions and \(i\) is the current layer. This new shape is fed into each subsequent GATv2Conv layer. The current work used 5 heads.
Since the tweet-graphs did not contain edge features the following formula was used to calculate attention coefficients:
\begin{equation}\label{formula:gat}
\alpha_{i,j} =
\frac{
\exp\left(\mathbf{a}^{\top}\mathrm{LeakyReLU}\left(\mathbf{\Theta}
[\mathbf{x}_i \, \Vert \, \mathbf{x}_j]
\right)\right)}
{\sum_{k \in \mathcal{N}(i) \cup \{ i \}}
\exp\left(\mathbf{a}^{\top}\mathrm{LeakyReLU}\left(\mathbf{\Theta}
[\mathbf{x}_i \, \Vert \, \mathbf{x}_k]
\right)\right)}
\end{equation}
{where a is the attention score \(\mathbf{\Theta}\) is a matrix of filter parameters, \(x_i\) is the input feature matrix and \(x_j\) is the output feature matrix.}
\subsubsection{GraphConv}
GraphConv uses information from higher-order graph structures at various different thresholds \cite{morris2019weisfeiler} for graph tasks. The researchers found that this information is useful in both regression and graph classification problems. The formula for the GraphConv operator is as followed:
\begin{equation}
\mathbf{x}^{\prime}_i = \mathbf{W}_1 \mathbf{x}_i + \mathbf{W}_2
\sum_{j \in \mathcal{N}(i)} e_{j,i} \cdot \mathbf{x}_j
\end{equation}
where the edge weight \(e_{j,i}\) goes from the original node \(j\) to
target node \(i\).
\section{Implementation of Tweet-MLN for Group-Level Emotion Analysis} \label{sec:implementation}
The following section provides a detailed breakdown of the proposed Multi-Layered Tweet Analyser (MLTA) used for social media text-classification. It begins by describing how tweets were transformed into their respective multi-layer network representation or Tweet-MLN. Then it maps out embedding techniques used for nodes inside the graph. Finally, the overall architecture of neural networks used for training is detailed.
\subsection{Constructing Multi-Layered Networks Using Tweets}
\Figure[t!](topskip=0pt, botskip=0pt, midskip=0pt){MLN_figure.png}
{Tweet Multi-Layered Graph Structure. On the left is a set of tweets. Each tweet is pre-processed and subsections of the tweet are separated out into different groups for each layer of the MLN. Layer 1 receives all the hashtags present in the set of tweets. Layer 2 receives all key words with hashtags removed. Layer 3 receives the whole set of tweets kept in their original format. After the tweets are organized into their respective groups, graphs are constructed from the group entities. The Layers 1 \& 3 are undirected graphs and Layer 2 is a directed graph. \label{fig:MLN}}
In order to construct the Tweet-MLN, twitter sets are generated which consist of 300 tweets that share the same class label. This number seemed reasonable for practical use of a company in the future, as clients are more likely to analyze large bundles of tweets, if they are searching for an overall general emotion. However, it is not too large that a smaller client would not be able to submit a sufficient number of tweets. Further breakdown of the dataset can be found below in section \ref{sub-dataset}. The following information is extracted from every tweet within a set:
\begin{itemize}
\item Hashtags
\item Key-words (individual words that make up full body text)
\item Full-body text
\end{itemize}
These components are used to formulate nodes in different layers of the Tweet-MLN. Therefore, one cluster of 300 tweets will result in a single Tweet-MLN which holds the above information from all of the individual tweets within that set. The class label that is shared across each individual tweet, becomes the overall class evaluated by the network.
Following traditional graph classification problems each Tweet-MLN is given a single emotion label, and is held in set \(C=\{c_1,c_2,c_3,…,c_n\}\).
The first graph layer \(L1\) is an undirected graph that consists of only hashtags. Nodes are individual hashtags and edges are created between hashtag nodes if they appear in the same tweet or if they appear in a tweet that shares a hashtag.
{Hashtags that contain multiple words such as \emph{\#happybirthday}
are broken down into separate word tokens \emph{happy} and \emph{birthday} for two reasons.
The first being that it enables us to extract more meaningful and accurate word embeddings as individual words in their original format are more likely to be found in a pre-trained embedding corpus. The second being that this graphical architecture allows for the study of a complex relationship between specific words.
While the hashtags \#happybirthday and \#happydays are intended to convey different expressions, the word happy still carries the same practical meaning in both.
Therefore, this structure allows us to see how other words used around the word happy may be related and how a word with one meaning can be intermingled with others.While this may lead to repeated nodes within the current layer and the next, no physical edge information between the two layers is presented to the network, therefore, making it still a Network of Networks MLN.}
The second layer \(L2\) is a directed graph that contains all individual words inside the tweet excluding the hashtags. Each key-word is a node and each directed edge goes from the start of the sentence to the subsequent word until the end of the sentence is reached. If there is a hashtag in the middle of the sentence, then that hashtag is removed and the edge is connected to the word following the hashtag. The third layer \(L3\) is an undirected graph and consists of the entire raw tweet as a node. Edges are placed between tweets that share hashtags. See Figure \ref{fig:MLN} for a visual representation of how tweets were broken down into each layer. { After the Tweet-MLNs were constructed, the text contained inside the graph nodes were converted into word-embeddings, which are detailed in the following subsection \ref{sec:wordemb}}
Let \(M\) represent a single Tweet-MLN object. \(M\) can be defined as \(M= (V,E,\mathcal{L})\) where \(\mathcal{L}\) denotes a set \(\mathcal{L}=\{L1,L2,L3\}\) which holds the three tweet text layers described above. \(V = \{V_1..V_i\}\) where \(V_i\) are the vertices in layer \(i\) and \(E\) denotes the set of edges for each layer and there are no shared vertices between layers. Similar to \cite{singh2020sentiment}, \(M\) includes a mixture of direct and undirected graphs, however rather using a matrix of matrices, the current research keeps each graph layer separated, in order to allow the GNN to extract independent graph features. Then following extraction, features from each graph are concatenated and fed into two fully-connected linear layers which output a prediction based on the conjoined features.
\subsection{Word Embeddings}\label{sec:wordemb}
Word embeddings also known as word vectors are used to translate words into a usable format for NLP problems. A word embedding is an continuous representation of a word in array format. A neural network can be trained to learn these embeddings so that words with a shared meaning are represented in a similar structure. The current work uses 2 different word-embedding models in order to exploit the different encodings of language in each library. By vertically stacking the word representations, a feature matrix is constructed for each layer of the MLN.
The first model used is FastText \cite{bojanowski2017enriching} where words are depicted by the summation of character n-grams. Given a corpus with vocabulary of size \(N\) with indexed words \(w \in \{w_1....w_N\}\). FastText aims to maximize the following log-likelihood model:
\begin{equation}
\sum_{T=1}^{T} \sum_{c\in{C_t}} log \text{ } p(w_c \mid w_t)
\end{equation}
where \(C_t\) is the context of the word given by the set of indices behind and in front of the \(w_t\). The paramaterization of the word vectors is based on the probability of finding \(w_c\) given the current \(w_t\) \cite{bojanowski2017enriching}.
The second model used is GloVE \cite{pennington2014glove} which stands for Global Vectors for Word Representation. In this model, the dot product between two word vectors is equal to the log of co-occurrence frequency (or the total number of instances in which two words appear next to each other in a specific context). Therefore given two words inside a corpus of \(w_i...w_j\) words: \[w_i \cdot w_j = log(P(i \mid j))\]
GloVE takes these co-occurrence probabilities and represents the word embeddings as that ratio and simultaneously captures the global distribution of words \cite{pennington2014glove}.
Together the two models are able to represent information using different encodings and because they were trained using a different corpus, they allow for us to filter through and make sure that we have a proper word-representation for more of the words in our datasets' vocabulary. We first pass a word through the GloVE model and if the word embedding is not present, it is subsequently sent through to the FastText model. One great component of FastText is that it is able to encode words that were not in the training dataset and match it with similar words from its corpus. This means that out of vocabulary (OOV) ngrams will automatically be mapped to a vector that matches the most similar ngram \cite{bojanowski2017enriching}.
\subsection{Overall Network Architecture}
\Figure[t!](topskip=0pt, botskip=0pt, midskip=0pt){graph_flow.png}
{Network Architecture of MLTA. Each layer is inputted into its' own GNN before being concatenated and sent into 2 fully-connected linear layers. \( \mathcal{R}\) is a vector formed by concatenating the extracted features from all 3 layers \label{fig:GATFlow}}
The architecture of the MLTA consists of 3 input layers, one for each layer in the Tweet-MLN, followed by two graph convolution layers, a global mean pooling function, concatenation function, two fully-connected linear layers, and finally one linear output layer. The described architecture of the model is shown in Figure \ref{fig:GATFlow}.
Three feature matrices containing node embeddings for different layers of the MLN were used as inputs. Each had a shape \((|\mathcal{V}_i|, F_{in})\) where \(|\mathcal{V}_i|\) is number of nodes, \(F_{in}\) is the number of node features, and \(i\) as the subscript representing the corresponding layer.
{As node features are the token-embeddings themselves, the number of node features directly corresponds to the size of the word-embedding vector. Which in this case is 300.}
These inputs were passed through graph convolutions to extract updated node features from the separate entities in the Tweet-MLN.
An ablation study was conducted on 3 different types of graph convolutions: GCNConv, GATv2Conv, and GraphConv, in order to determine which type of convolution was most suitable for prediction of the Tweet-MLN using a GNN.
Batched training was used due to the large size of the dataset. Therefore in order to concatenate the extracted features for each layer, we used a global mean pooling function, which outputs a batch-sized value on the graph-level. The function aggregates and averages node features, so that for a single graph \(G_i\) whose output is \(x_{i}\) and shape: \((|\mathcal{V}_i|, F_{out})\), the mean is computed by:
\begin{equation}
\mathbf{r}_i = \mathrm{max}_{n=1}^{N_i} \, |x_{n_i}|
\end{equation}
The \(\mathbf{r}_i\) for each of the layers are concatenated to form one input \(\mathcal{R}\):
\begin{equation}
\mathcal{R} = \mathbf{r}_i + \mathbf{r}_{i+1}... + \mathbf{r}_n
\end{equation}
Concatenation of the node features allows the final layers to learn from the joint information of each graph structure. Previous literature supports that feature concatenation has been able to enhance classification accuracy in a number of different machine learning tasks \cite{8351550}, \cite{doukim2021combining}.
\(\mathcal{R}\) is passed through two fully-connected linear layers. Then finally, these node features are given to a linear output layer that returns a single prediction from the 6 emotion labels.
\subsection{Network Parameters}
Layers 1, 2, \& 3 were each passed through 2 graph convolutions of starting shape 300 and then got reduced to features of sized 128. After each of the graph convolution layers (for each separate Tweet-MLN layer), a Relu activation function was applied, along with a dropout of 0.5 after the last graph convolution layer.
Adam optimizer was used and a learning rate of 0.001 was applied. The Tweet-MLN was coded using Pytorch Geometric and NetworkX and the GNN model was constructed using PyTorch.
As the dataset consists of categorical data we calculated the cross entropy loss between the input and target variables using:
\begin{equation}
\begin{aligned}
&\ell(x, y) = L = \{l_1,\dots,l_N\}^\top, \\
&\quad l_n = - w_{y_n} \log \frac{\exp(x_{n,y_n})}{\sum_{c=1}^C\exp(x_{n,c})}
&\cdot \mathbb{1}\{y_n \not= \text{ignore\_index}\}
\end{aligned}
\end{equation}
{where \(x\) is the input graph and \(y\) is the target class, \(w\) is the weight, \(N\) is the batch dimension and \(c\) is the total number of classes.}
\section{Experimental Tests}\label{sec:et}
\subsection{Twitter Emotion Dataset}\label{sub-dataset}
Data was obtained from the Twitter API using key words related to the 6 primary emotions found in \cite{ekman1992there} with two alterations: Angry, Bad, Fearful, Happy, Sad and Surprised. Bad was added as a primary emotion to serve as broader category for tweets that did not fit into other negative emotions. Additionally, Fearful and Disgusted were combined into one emotion because there is a large body of research that suggests the two emotions are heavily related \cite{neumann2012priming}. Research has also shown that disgust is is enhanced by fear, but the inverse is not always true \cite{edwards2006experimental}. Which is why, the current research uses Fearful as the primary label.
The process for data collection is as followed: using the Twitter API, when searching for Angry tweets in addition to the word, angry, the search included others like frustrated, annoyed, betrayed etc. Derivative of the technique used by \cite{plutchik1980general} in which primary emotions are expanded into secondary and tertiary descriptors using a visual wheel representation, we collected tweets commonly associated with each target label based on a "Wheel of Emotions" that has previously been used to aid emotional expression in therapy \footnote{F. Dhuka, “How to Use ‘Wheel of Emotions’ to Express Better Emotions,” Age of Awareness, May 24, 2020. https://medium.com/age-of-awareness/how-to-use-wheel-of-emotions-to-express-better-emotions-8037255aa661}.
{Tweets have a propensity to contain large amounts of information with minimal context as the tweet length is limited to 280 characters. This encourages individuals to express themselves using:
\begin{enumerate}
\item Hashtags, emoticons, and mentions
\item Misspelling and abbreviations
\item Slang / colloquialisms
\end{enumerate}
There can also be tweets, where no actual words are present, making it quite difficult to encode in a meaningful way for machine learning algorithms. }
Thus, the following steps detail the data-cleaning process using modules Numpy, Pandas, Emoji, and tqdm:
\begin{enumerate}
\item Converted emojis to their Unicode alias
\item Fetched hashtags and created new column to hold groups of hashtags
\item Split contractions into separate words i.e. I'm \(\rightarrow\) I am
\item Removed newlines and trailing and starting spaces
\item Removed re-tweet signals ("RT")
\item Removed @ symbol
\item Made tweets lower-case
\end{enumerate}
{A proportion of tweets may have been given an incorrect emotional label.} For instance, a happy tweet {could} say:
\begin{center}\emph{"I'm not sad, I'm really enjoying myself today."}\end{center}
However, because it contains the word "sad" this tweet could get placed into a negative emotion category by the Twitter API even if the tweet should be classified as happy. Therefore, using this data alone for classification would be problematic.
In order to counteract this issue, all tweets were filtered through 2 pre-trained sentiment analysis networks to ensure that those misnomer tweets were removed from the dataset prior to training. The ability for these SA algorithms to classify into positive, negative, or neutral is not sufficient for the current project, which seeks to expand the set of emotions into 6 broad categories and also to learn the associations between a group of independent tweets. However, such pre-trained networks become extremely useful when leveraged as a pre-processing tool. They illuminate which tweets should be removed from the dataset before construction of the Tweet-MLN. For example, knowing that all tweets inside the Happy class should be positive, means that we simply have to remove any tweets classified as negative.
Therefore, tweets were removed from the dataset if the sentiment label predicted by the networks did not match the current sentiment label of the data shown in Table 1. Additionally, tweets were removed if the SA pre-trained networks classified them as neutral, since that is intuitively more a lack of emotion, and therefore not relevant to the current body of research.
{The two pre-trained models were BERTSent \cite{govindarajan2020help} which was trained on the SemEval 2017 corpus (39k plus tweets) and XLM-roBERTa-base model \cite{conneau2019unsupervised} trained on 198 million tweets.}
Both pre-trained models {were fine-tuned for sentiment analysis and} were variations of the Bidirectional Encoder Representations from Transformers (BERT) networks. BERT was developed by Google in 2018 \cite{devlin2018bert} and is used by many as a base model for sentiment analysis tasks since all the code is open-source \cite{devlin2018open}. BERT uses basic neural networks such as the recurrent neural networks (RNN) and convolution neural networks (CNN) but the encoder-decoder models work together in parallel increasing the speed of training. The structure of BERT is also made so that it can be used flexibly across several different NLP problems. Fine-tuning of pre-trained BERT networks have been used for a variety of different tasks including patent classification \cite{lee2020patent}, innovation detection \cite{chen2021leveraging}, and sentiment analysis of stock data \cite{sousa2019bert}.
\begin{table}[hbt!]
\caption{Labels For Sentiment Analysis}
\label{table:labelsSA}
\centering
\begin{tabular}{p{3cm}p{3cm}}
\toprule
\multicolumn{2}{c}{Sentiment Analysis Pre-processing} \\
\midrule
Tweet Emotion&Sentiment Label\\
\hline
Angry& Negative\\
Bad& Negative\\
Fearful& Negative\\
Happy& Positive\\
Sad& Negative\\
Surprised& Positive\\
\bottomrule
\end{tabular}
\end{table}
In this way, the research leverages traditional sentiment analysis techniques in order to curate a dataset with minimal incorrectly labeled individual tweets, before construction of the Tweet-MLNs.
Additionally, to test the validity of this method, we trained a Long-Term Short-Term Memory (LSTM) network on these sentiment analysis filtered tweets, and beta-tested the model in a real-life scenario, through platform release with PulseTech.io. The LSTM architecture helps to relieve some of the pitfalls with a traditional RNN namely the vanishing gradient problem and has high success when used for text-classification problems \cite{yao2019graph}. The accuracy based on beta-testing response with real people and real tweets was over 90\% providing evidence for the robustness of the dataset used for training the graph networks.
After validating the dataset to ensure that tweets were placed into the correct emotion category, the data was shuffled within its' own class and split into sets of 300 tweets that contained the same class label. In total there were 900,000 tweets, with 150,000 tweets per class and a total of 500 Tweet-MLNs per class, bringing the total number of Tweet-MLNs to 3000. A train-test split of 80-20 was applied. Training and testing was run in Google Cloud Platform (GCP) on a Vertex AI cluster. It was trained for 100 epochs using one NVIDIA Tesla T4 x 1 GPU. The machine type used was n1-highmem-8 (8 vCPUs, 52 GB RAM).
\subsection{Baseline Ablation Study} \label{sub:ablation}
Since, to our knowledge, no other algorithms have been established for group-level prediction of emotions on a set of independent tweets, it is difficult to create a baseline from which to compare validation results of the MLTA.
Additionally, the structure of the Tweet-MLNs is so specifically curated to social media text from Twitter. Meaning we cannot directly compare performances of models that test on regular text datasets. Furthermore, it is not possible to compare results of many high-performing text-classification graphs networks because they make predictions on single graph entities. Therefore, in order to analyse the network and further understand the MLTA, we perform an ablation study, in which we chose three different graph convolution layers to compare the evaluations of the MLTA trained on the Tweet-MLNs.
There are 3 benefits to this ablation study. The first being that we can understand which graph convolution best suits a Tweet-MLN for the graph-level classification task. The second, being that we can analyse the strength of using a MLN and determine whether this architecture is useful for representing social media text. Third, we can establish a new baseline for graph-level classification on MLNs using a social media text dataset for emotion analysis, which can be referenced in the future.
{Moreover, while we are unable to make direct comparisons between the predictions of the MLTA and other models, we can take the output of the MLTA on small subsets of tweets (for example groups of two tweets) and translate them back into their basic sentiment form. For example, taking an "angry" prediction from the MLTA and classifying it as "negative". Then comparing the results against state-of-the-art sentiment analysis models such as the BERT based models using during the filtering stage. In this way we can determine if the model is able to perform at the same level as current sentiment analysis algorithms that make highly accurate predictions on single pieces of text.}
{In order to control such granularity with the MLTA model (i.e we need to know specifically which two tweets go into each Tweet-MLN in order to track the correct sentiment), 200 tweets containing 32-40 tweets per class were manually extracted and pairs of tweets were constructed into small Tweet-MLNs. Then predictive performance for the coupled tweets were compared against state-of-the-art sentiment analysis models (see Table \ref{table:SAComparisions})}
\subsection{Evaluation Metrics}
In order to evaluate quality of prediction, we calculated the F1 score, which is the harmonic mean between the evaluation metrics recall and precision. {Therefore, the F1 score can be calculated using equation \ref{eq:F1}:}
{\begin{equation}\label{eq:F1}
F1 = \frac{2 * Precision * Recall}{Precision + Recall}
\end{equation}}
It takes the number of true positives (TP) where a prediction matches the positive label, true negatives (TN) or when the prediction is negative and the label is negative, false positives (FP), in which the prediction is positive but the label is negative and false negatives (FN) where the prediction is negative but the label is positive. Precision is the ratio of TP over total number of positive labels {as shown below in equation \ref{eq:precision}:}
{\begin{equation}\label{eq:precision}
Precision = \frac{TP}{TP + FP}
\end{equation}}
and recall is the ratio of TP over the sum of TP and FN {in equation \ref{eq:recall}}.
{\begin{equation}\label{eq:recall}
Recall = \frac{TP}{TP + FN}
\end{equation}}
\begin{figure*}[t!]
\includegraphics[height=0.8\textheight,width=\textwidth,keepaspectratio]{training_testing.png}
\caption{Testing \& Training Learning History}
\label{fig:tt}
\end{figure*}
\section{Results}\label{sec:r}
\begin{table}[hbt!]
\caption{Comparison of Graph Convolutions for MLTA.}
\label{table:graphComparisions}
\begin{center}
\begin{tabular}{c c c}
\toprule
Convolution Type & Information & F1 Test Score \\ [0.5ex]
\midrule
GCNConv & 2 Layers & 83\% \\ [1ex]
GATv2Conv & 2 Layers, 5 heads & 98\% \\ [1ex]
GraphConv & 2 Layers & 99\% \\ [1ex]
\bottomrule
\end{tabular}
\end{center}
\end{table}
This study shows evidence that the Tweet-MLN can retain useful information specifically for the domain of sentiment analysis using social media text. Such that the combined feature information of the three layers in the MLN passed though a GNN, can discern the difference between a group of tweets that are in 6 different emotion classes.
This can be see in Table \ref{table:graphComparisions} which demonstrates a high F1 score during evaluation despite which convolutional layers were used to train the MLTA. GraphConv was able to reach a evaluation F1 score of 99\%, and while GATv2Conv obtained a 98\% F1 score, this model was 5xs slower than GraphConv at an average of 37 minutes per epoch compared to GraphConv at an average 7 minutes per epoch. Therefore, GraphConv is the suggested model to use for prediction of future Tweet-MLNs when computational resources are an issue, without having to sacrifice performance. This discovery is useful for future implementations of a similar network architecture, because there are not many studies which evaluate the success of different graph convolutions in relation to prediction of MLNs. {Additionally, a stable learning curve over the duration of the 100 epochs shown in Figure \ref{fig:tt} suggests that the model did not overfit to the training data. While the increase in F1 score after only 20 epochs may seem quick, due to the volume of data the speed at which the model learned is not unreasonable.}
A GCN using the Chebyshev polynomial can help to speed up training time and reduce the computational costs associated. However, GCNs can have trouble capturing higher level interaction between nodes and introduces truncation errors. Therefore, it is possible that due to the complicated architecture of the Tweet-MLN, the GCNConv failed to capture and learn the full spectrum of relationships across the different layers, making it the least successful graph convolution in the ablation study.
Additionally, the attention mechanism present in the GATv2Conv seemed to outperfrom the GCNConv. The attention mechanism was originally invented by \cite{larochelle2010learning} for computer vision with the idea that it is useful to examine different sections of the image to accumulate more information. The same principles can be applied to graph objects where we can look at all the node information, which in turn improves the learning process of the network.
The computation of node information is done implicitly rather than explicitly as it is in the GCNConv. Therefore, using GATv2Conv we can gain a deeper understanding of each node and its' relative performance. However, while the F1 score of the GATv2Conv, was higher than the GCNConv, it was much slower compared to the GraphConv which was also able to achieve a slightly higher performance. This may be a result of the propagation process of information in the MLTA. As the information from the Tweet-MLN is not only related to its first order neighbourhood, but also to its higher order nodes from the other two layers. This makes GraphConv more advantageous for classification since higher order messages are more expressive when using GraphConv compared to other models like GCNConv and GATv2Conv.
{\subsection{Baseline Results}}
{\begin{table}[hbt!]
\caption{Baseline Comparisons of Sentiment Analysis Against MLTA}
\label{table:SAComparisions}
\begin{center}
\begin{tabular}{c c c}
\toprule
Model & Convolution & F1 Score \\ [0.5ex]
\midrule
BERTSent & - & 92\% \\ [1ex]
XML-ro-BERTa-base-model & - & 94\% \\ [1ex]
MLTA & GraphConv & 36\% \\ [1ex]
MLTA & GCNConv & 80\% \\ [1ex]
MLTA & GATv2Conv & 84\% \\ [1ex]
\bottomrule
\end{tabular}
\end{center}
\end{table}}
{The results shown in Table \ref{table:SAComparisions} of the baseline comparison against state-of-the-art sentiment analysis models reveal some interesting characteristics of the different graph convolution layers. Since the MLTA was designed for prediction on sets of 300 tweets, it makes sense that not all models were able to perform optimally after a reduction in graph size. The GraphConv only achieved an F1 score of 36\%, in comparison to the other two graph convolution layers which both received F1 scores of at least 80\% which is closer to the state-of-the-art sentiment analysis models. It seems that the GraphConv in particular does not adapt as well as the GCNConv and GATv2Conv when there are drastic changes to the number of nodes in the MLTA. While the weight placed on the higher order messages may help to increase the model performance on graphs of a similar and larger structure, it may simultaneously hinder the model's capability to be flexible towards smaller sized graphs as the benefit of higher-node information is lost.}
{Therefore, an additionally suggestion for users of the MLTA, is to use the GraphConv given data inputs of a similar size in production, and the GCNConv if the user plans on having a set of tweets with an unknown size as their input.}
{However, the most positive and most relevant finding is that, even with the detriment of reducing the graph size drastically, using a version of the MLTA on smaller subsets of tweets, we are able to achieve high levels of predictive accuracy when determining if a couplet of tweets is either positive or negative. This elucidates the power of the MLTA, as it not only is able to extract group level information, however, on a smaller scale, it can perform the same tasks as other well-supported sentiment analysis models.}
\section{Conclusion}\label{sec:c}
In summation, the MLTA, a novel approach to group-level emotion analysis of Twitter data was developed and was able to achieve high-levels of predictive performance during testing.
{The baseline study conducted in this paper suggests that versions of the MLTA can perform well at traditional sentiment analysis tasks compared to state-of-the-art sentiment analysis models.} However, the MLTA can be seen as an extended branch of SA as it is able to not only classify the overall emotion of a group of independent texts, however it also goes beyond traditional SA categories by predicting six different emotions: Angry, Bad, Fearful, Sad, Happy, and Surprised. Moreover, this paper highlights the strength of using a multi-layered graph representation of social media text. It introduces a Tweet-MLN that is able to capture the nuances of Twitter data and allow for accurate prediction of group-level emotions. Such a network will be useful for future researchers who are looking to model complex relationships such as social media text using graph structures.
An interesting route for future research would be to investigate how group-level classification of independent texts evolve over time. Additionally, looking towards different types of MLNs such as the multi-plex MLN which would have allowed for the three layers to be connected by edges from other layers. This is an interesting development as that means, it would be possible to map the hashtag layer directly back to the text layer. It is important to contribute new studies to field of MLN research as there is lacking use of this complex network, despite its' flexibility and power.
\subsection{Acknowledgements}
We would like to acknowledge the contributions of PulseTech.io which fostered the environment to conduct this research and provided funding.
\bibliographystyle{IEEEtran}
|
\section{Introduction}
We begin with the famous quote by Allan Sandage \cite{ref1} that All the observational cosmological models are in search of
two parameters: Hubble $H_0$ and deceleration parameters $q_0$. The universe is a dynamic system in which its constituents (galaxies)
travel like a disciplined march of soldiers and move away from each other with Hubble's rate. The recent astrophysical measurements of
OHD (Observational Hubble data), SN Ia (Type Ia supernovae) \cite{ref2,ref3}, CMBR (cosmic microwave background radiations) \cite{ref4}
anisotropy and Plank collaboration \cite{ref5} indicated that our universe is expanding at faster rate.
Mysterious dark energy (DE) \cite{ref6,ref7} is one of the cause behind this accelerated expansion. According
the prediction of CMBR, the universe is having flat geometrical shape on a large scale\cite{ref8}.
DE(dark energy) may be the cause of this flatness due to a lack of matter in the cosmos \cite{ref9,ref10,ref11,ref12}.
Many researchers have proposed various hypotheses to explain the occurrence of dark energy \cite{ref13,ref14,ref15,ref16,ref17}.
The Cosmological Constant ($\Lambda$) is thought to be the most effective DE option for describing the universe's expansion.
Various hypotheses have been developed to explain the nature of the cosmological constant \cite{ref19,ref20,ref21,ref22,ref23}. \\
Holographic dark energy (HDE) gets much attention from researchers from many proposed DE models. This is due to its direct relationship
with space-time. This holographic dark energy supports in explanation of cosmic features of vacuum energy. It is normally accepted that
the HDE models with the Hubble radius as the IR (Infra-red) cut-off do not follow the current cosmological accelerated expansion
in FRW metric, while for the event horizon as the IR cut-off, cosmic acceleration of the universe exists \cite{ref24}. Three popular HDE
models, namely the Ricci scale, future event horizon, and Granda-Oliveros (GO) IR cut-offs, are investigated by Akhlaghi \cite{ref25}
showing the accelerated expansion and growth of the universe. In this direction, Ghaffari \cite{ref26} examined the cosmological models of HDE
with GO cut-off. In black hole thermodynamics, when the vacuum energy of a black hole is not greater than its mass, then Horizon length $L$
is chosen as the IR cutoff. And the acquired vacuum energy is identified as HDE \cite{ref27}. The holographic principle states that degrees of
freedom are determined by bounding area rather than volume. \\
It should be noted that the entropy-area relationship of black holes affects the definition and derivation of holographic energy density
($\rho_D = 3 c^2 \frac{M^{2}_p}{L^2} $). Following quantum effects influenced by Loop Quantum Gravity (LQG), the definition of the
entropy-area relationship can be changed. When dealing with the entanglement of quantum fields in and out of the horizon, the power-law correction
is a fascinating modification (correction) of the entropy-area S(A) relation \cite{ref28,ref29}.
The particular form of the power-law corrected entropy-area relation $ S(A)$ is given as follows:
\begin{equation}
\label{1}
S(A) = c_0 \left(\frac{A}{a^{2}_1} \right) \left[1+ c_{1} f(A) \right]
\end{equation}
Here, f(A) is considered by the power-law relation as
\begin{equation}
\label{2}
f(A) = \left(\frac{A}{a^{2}_1} \right)^{-\gamma}
\end{equation}
where $c_0$ and $c_1$ are constants, $a_1$ is the UV cut-off at the horizon, and $\gamma$ is a fractional power dependent on the degree of ground
and excited state mixing. The contribution of the term $f(A)$ to the entropy $S(A)$ may be considered basically minor over a large horizon area
(i.e., for $ A \gg {a^{2}_1}$ ), and the mixed state entanglement entropy asymptotically approaches the ground state (Bekenstein-Hawking) entropy.
The following relation may be used to produce the formulation of the entropy area relation S(A) for power-law corrected entropy:
\begin{equation}
\label{3}
S(A)=\frac{A}{4 G}\left(1-K_{\alpha} A^{1-\alpha / 2}\right)
\end{equation}
with $\alpha$ is a dimensionless constant parameter, the constant $K_\alpha$ is considered as
\begin{equation}
\label{4}
K_{\alpha}=\frac{\alpha(4 \pi)^{\alpha / 2-1}}{(4-\alpha) r_{c}^{2-\alpha}}
\end{equation}
The cross-over scale is indicated by the phrase $r_{c}$. Furthermore, we know that the quantity $A = 4 \pi R_{h}^{2}$ suggest the horizon's
area (with the horizon radius $R_{h}$). The second term in Eq. (3) gives the power-law correction to the entropy-area law. The entropy
remains a well-defined quantity for positive value of parameter $\alpha$ i.e. ($\alpha>0$). Inspired by the relation given in eq. (3), a new
form of HDE (called the Power-Law Entropy-Corrected HDE (PLECHDE) \cite{ref35,ref35a}) model was recently presented as follows:
\begin{equation}
\label{5}
\rho_D=3 n^{2} M_{p}^{2} L^{-2}-\beta M_{p}^{2} L^{-\delta}
\end{equation}
$\delta$ is a positive exponent, and $\beta$ is a dimensionless parameter. The preceding equation provides the well-known holographic
energy density in the exceptional case $\beta = 0$. The value of $\delta$ determines the significance of the corrected term in
distinct locations. When $\delta = 2$, the two terms can be merged, recovering the standard HDE density. Let's look at the $\delta > 2 $ and $\delta<2 $
cases independently. In the first situation, for $\delta > 2$, the corrected term can be comparable to the first term only when $L$ is very small.
The range of $\delta$ was claimed as $2 < \delta < 4$ \cite{ref28}. On satisfaction of the generalized second law of thermodynamics for the universe
with the power-law corrected entropy, the second situation $\delta < 2 $ has been rejected \cite{ref29}. Further, Sheykhi et al.\cite{ref35}
describe the Power-law entropy corrected holographic dark energy model for interacting and non-interacting scenarios. \\
Here, $\beta$ is a dimensionless constant whose precise value need to be determined. Various authors have considered distinct value of
the parameter $\beta$ suitable for their cosmological models. Karami et al.\cite{ref35b} consider the value $\beta = -14.8$ to describe dynamics of
agegraphic dark energy model. Karami and Abdolmaleki \cite{ref35c} have discuss the agegraphic dark energy model in $f(T)$ modified teleparallel
gravity by assuming the values $\beta = 0.1, \beta = -10$ and $\beta = -14.8$. Recently, Jawad et al. \cite{ref35d} developed the Entropy corrected
holographic dark energy models in modified gravity model utilizing $\beta = 0.5$. Following above mentioned analysis, we have described the dynamics
of our model using the value $\beta = 0.001$. \\
The basic behaviour of the PLECHDE model with observational confrontation is investigated in this work.
The authors discuss 28 observational Hubble observations in the region of redshift $0.07 \leq z \leq 2.3 $, see in the reference \cite{ref30}.
For dark energy restrictions, Amirhashchi and Yadav \cite{ref31} listed 31 H(z) observations.
To estimate the model parameter, Amirhashchi et al. \cite{ref32} used 36 H(z) data paired with JLA (Joint Light-curve Analysis) data.
Goswami et al. \cite{ref33} employed observational data from 38 H(z) and 581 SN Ia.
We employed 46 observational Hubble data points in the red-shift region $0 \leq z \leq 2.36$ in this work \cite{ref34,ref34a,ref34b,ref34c}.
\\
The objective of this described model is to consider Power-law entropy corrected Holographic dark energy by assuming IR cut-offs.
Many cosmologists have proposed different parametrization of cosmological parameters, where the model parameters involved in the
parametrization can be constrained by observational data, in order to describe certain phenomena of the universe, such as phase
transition from early inflation era to late acceleration phase.
We examine the Hubble parameter parametrization in the manner \cite{ref34d,ref34e,ref34f}:
$H(a) = \alpha_{1}(1 + a^{-n})$; where $\alpha_{1} > 0$ and $n>0$ are constants. On integration of this parametrization, ewe get an explicit
form of the scale factor as $a(t) = \left(c_{1}e^{n\alpha_{1}t} -1\right)^{1/n}$; where $c_{1} > 0 $ is the constant of integration.
The present explicit form of scale factor is an exponential function containing two model parameters $n$ and $\alpha_{1}$ which describe the dynamics
of the universe. As $t \to 0$, we can have $a(0)= (c_{1} - 1)^{1/n}$, which provides a non-zero initial value of scale factor for $c_{1} \ne 1 $
(or a cold initiation of universe with finite volume).
The manuscript is structured as: Section $2$ presents the field equations of PLECHDE as IR cut-off. In Section $3$,
we proposed the solution of field equations. In Section $4$, we describe an observational confrontation with recent H(z) data on the model parameter.
In subsections $5.1$ and $5.2$, we explain the behavior of deceleration parameter $q$ versus redshift $z$ and Statefinder, respectively. Finally, the
conclusions are summarized in section $6$.
\section{Power law entropy corrected Holographic dark energy as IR cut-off }
Homogeneous and anisotropic FRW metric form as
\begin{equation}
\label{6}
d s^{2}=d t^{2}-a^{2} (t) [d x^{2} + d y^{2} + d z^{2}]
\end{equation}
where a(t) is scale factor and function of $t$.\\
The Einstein’s field equations (EFEs) in General Relativity (GR) can be written as:
\begin{equation}
\label{7}
R^{i}_{j}-{\frac{1}{2}}Rg_{ij} =
-\frac{8 \pi G}{c^4}( T_{ij} + \bar{T_{ij}} ),
\end{equation}
The energy momentum tensor for PLECHDE and matter for physical interpretation can redefined as:
$\bar{T_{ij}} =\left({\rho_{{\Lambda}}} + {p_{{\Lambda}}} \right) u_{i} u_{j} + g_{i j} p_{{\Lambda}} {T_{ij}} = \rho_{m} u_{i} u_{j} $,
where $\rho_{\Lambda}$ and $\rho_{m}$ represents PLECHDE and matter energy densities respectively, and $p_{{\Lambda}}$ is the PLECHDE pressure.\\
The field equations for the discussed metric can be written as:
\begin{equation}
\label{8}
3 \left(\frac{\dot a}{a}\right)^2 = \rho_{m} + \rho_{\Lambda}
\end{equation}
\begin{equation}
\label{9}
\left( 2 \frac{\ddot a}{a} + \left(\frac{\dot a}{a}\right)^2 \right) = - p_{\Lambda},
\end{equation}
The constants for the Einstein equations are assumed as $8 \pi G = 1 = c$. \\
Taking IR cut-off as Hubble horizon, the power-law entropy corrected holographic dark energy (PLECHDE) is defined as:
\begin{equation}
\label{10}
\rho_\Lambda = 3 c^2 {M^{2}_p} H^{2} - \beta {M^{2}_p} H^{\delta} ,
\end{equation}
where $M^2_{p}$ = $\frac{1}{8 \pi G}$ is the reduced plank constant and $3 c^2$ is a numerical constant in the above relation.
For $\delta > 2$, it was shown that the generalized second law of thermodynamics is conformed for the universe with power-law corrected entropy.
As a result, the correction has a physical meaning only in the early cosmos, and it becomes meaningless as the universe grows larger \cite{ref35}.\\
\section{Solutions of the field equations for PLECHDE }
Type-Ia supernova observations \cite{ref2,ref3}, WMAP (Wilkinson Microwave Anisotropic Probe) Collaboration \cite{ref4} and Planck Collaboration \cite{ref5}, have been discussed about time-dependent DP which shows decelerating expansion in past, and accelerated expansion at present i.e. there is transition
from decelerating to accelerating phase. So, to proposed an explicit solution for model of Universe, we have assumed a time dependent scale
factor in the from \\
\begin{equation}
\label{11}
a(t) = (c_{1}e^{n \alpha_1 t} - 1)^{\frac{1}{n}},
\end{equation}
where $n$, $\alpha_1$ and $c_{1}$ are positive constants i.e. ( $n>0$, $\alpha_1 > 0$, $c_{1} \ne 1$).\\
This scale factor suggest a model of transiting universe. The Hubble's and deceleration parameters are determined as
\begin{equation}
\label{12}
H = \frac{\dot{a}}{a} = \alpha_{1} \left( \frac{c_{1}e^{n \alpha_1 t}}{c_{1}e^{n \alpha_1 t } -1 } \right)
\end{equation}
\begin{equation}
\label{13}
q = -\frac{a\ddot{a}}{\dot{a}^2}=-\left( 1+\frac{\dot{H}}{H^2}\right) = -1 + \frac{n}{c_{1}e^{n \alpha_1 t}}
\end{equation}
Eq. (13) shows that the DP is time-dependent, which can take both positive and negative values representing early decelerating phase and
later accelerating phase. From Eq. (13) we can see that $q = -1 + \frac{n}{c_{1}}$ as $t \to 0$, which is constant and positive for
$n>1$ and $c_{1} < n$ and for $c_{1} > n$, DP possesses negative value. This indicates that DP has a signature flipping nature from
positive to negative era with the evaluation.\\
The scale factor and redshift $z$ are linked by the relationship $ a = \frac{a_0}{1+z}$. In terms of redshift $z$, we obtain
the Hubble parameter defines as
\begin{equation}
\label{14}
H = \frac{H_0}{2} [1 + (1+z)^n],
\end{equation}
Deceleration parameter is defined as
\begin{equation}
\label{15}
q= -\frac{\ddot a}{a H^2} = -1 + \frac{(1+z)}{H(z)} \frac{d H(z)}{dz} ,
\end{equation}
which is equivalent to
\begin{equation}
\label{16}
q= -1 - \frac{n (1+z)^{(n-1)}}{\left[1 + (1+z)^n\right]^2} ,
\end{equation}
From Eqs.(\ref{10}) and (\ref{16}), energy density of PLECHDE in term of redshift $z$
\begin{equation}
\label{17}
\rho_\Lambda = 3 c^2 {M^{2}_p} \left[ \frac{H_0}{2} [1 + (1+z)^n] \right]^{2} - \beta {M^{2}_p} \left[ \frac{H_0}{2} [1 + (1+z)^n] \right]^{\delta} ,
\end{equation}
We get matter energy density vs redshift $z$ from Eqs. (\ref{8}) and (\ref{16})
\[\rho_m = 3 \left[\frac{H_0}{2} \left( 1 + (1+z)^n \right) \right]^2 - \rho_\Lambda
\]
\begin{equation}
\label{18}
= (1 + 3 c^2 {M^{2}_P}) \left[ \frac{H_0}{2} [1 + (1+z)^n] \right]^{2} - \beta {M^{2}_P} \left[ \frac{H_0}{2} [1 + (1+z)^n] \right]^{\delta}.
\end{equation}
The conservation for PLECHDE is expressed as $\dot \rho_{\Lambda} + 3H ( \rho_{\Lambda} + p_{\Lambda} ) = 0$. The equation of state
(barotropic) is $p_\Lambda = \omega_{\Lambda} \rho_{\Lambda}$. Using Eq. (\ref{8}), we find $\omega_{\Lambda}$ as :
\begin{equation}
\label{19}
\omega_{\Lambda} = -1 - \frac{\dot H}{3 H^2} \frac{\left( 6 c^2 H^2 - \delta \beta H^{\delta}\right)}{\left( 3 c^2 H^2 - \beta H^{\delta}\right)}
= -1 - \frac{2 n}{3 H_0} \frac{(1+z)^{n-1}}{(1 + (1+z)^n)^2}
\left[ \frac{6 c^2 - \delta \beta \left(\frac{H_0}{2} [1 + (1+z)^n] \right)^{\delta -2}} {3 c^2 - \beta \left(\frac{H_0}{2}
[1 + (1+z)^n] \right)^{\delta - 2} } \right] .
\end{equation}
\section{Observational constraints on the model parameters}
The observational data and statistical methodological analyses used to restrict the model parameters of the generated universe are presented
in this section.\\
{\bf Hubble parameter H(z)} \\
With the help of Hubble Space Telescope (HST) \cite{ref36}, Cepheid variable observations \cite{ref37}, gravitational lensing \cite{ref38}, and
WMAP seven year data \cite{ref39}, many astrophysical researchers \cite{ref40} estimated Hubble constant
$72 \pm 8$, $69.7_{-5.0}^{+4.9}, 71 \pm 2.5,70.4_{-1.4}^{+1.3}, 73.8 \pm 2.4$ and $67 \pm 3.2$. For more information, see Kumar \cite{ref41},
Sharma et al. \cite{ref42}, and Amirhashchi and Yadav \cite{ref31}. For different redshifts, we consider an observed data set of 46 Hubble
parameters $H_{ob}$ with standard deviations $\sigma_i$. \\
In this section, we find constraints on the model parameter $ n $ by bounding the model under consideration with recent 46 points of $ H(z) $
data set ( OHD) in the redshift range $ 0 \leq z \leq 2.36 $ with their corresponding standard deviation $\sigma_{i} $ and compare with the
$\Lambda $CDM model. The mean value of the model parameter n determined by minimizing the corresponding chi-square value, which is equivalent
to the maximum likelihood analysis is given by
\begin{equation}
\label{20}
\chi^{2}_{OHD}\left( n\right)=\sum_{i=1}^{46} {\frac{\left(H_{th}(n,z_{i})-H_{ob}(z_i)\right)^2}{\sigma(i)^2}}.
\end{equation}
Here, $ H_{th} $ and $ H_{obs} $ represent the theoretical and observed value of Hubble parameter $ H $ of our model and $n$ is the model parameter.
\begin{table}[H]
\caption{\small ``The behaviour of Hubble parameter $H(z)$ with redshift}
\begin{center}
\begin{tabular}{|c|c|c|c|c|c|c|c|c|c|}
\hline
\tiny $S.No$ & \tiny $Z$ & \tiny $H (Obs)$ & \tiny $\sigma_{i}$ & \tiny References & \tiny $S.No$ & \tiny $Z$ & \tiny $H (Obs)$ & \tiny $\sigma_{i}$ & \tiny References \\
\hline
\tiny 1 & \tiny 0 &\tiny 67.77 & \tiny 1.30 & \tiny\cite{ref43} & \tiny 24 & \tiny 0.4783 &\tiny 80.9 & \tiny9 & \tiny \cite{ref51} \\
\tiny 2 & \tiny 0.07 &\tiny 69 & \tiny 19.6 & \tiny \cite{ref44} & \tiny 25 & \tiny 0.48 &\tiny 97 & \tiny60 & \tiny \cite{ref46} \\
\tiny 3 & \tiny 0.09 &\tiny 69 & \tiny 12 & \tiny \cite{ref45} & \tiny 26 & \tiny 0.51 &\tiny 90.4 & \tiny1.9 & \tiny\cite{ref50} \\
\tiny 4 & \tiny 0.01 &\tiny 69 & \tiny 12 & \tiny \cite{ref46} & \tiny 27 & \tiny 0.57 &\tiny 96.8 & \tiny3.4& \tiny \cite{ref54} \\
\tiny 5 & \tiny 0.12 &\tiny 68.6 & \tiny26.2 & \tiny \cite{ref44} & \tiny 28 & \tiny 0.593 &\tiny 104 & \tiny 13 & \tiny \cite{ref47} \\
\tiny 6 & \tiny 0.17 &\tiny 83 & \tiny 8 & \tiny \cite{ref46} & \tiny 29 & \tiny 0.60 &\tiny 87.9 & \tiny6.1 & \tiny\cite{ref52} \\
\tiny 7 & \tiny 0.179 &\tiny 75 & \tiny 4 & \tiny \cite{ref47} & \tiny 30 & \tiny 0.61 &\tiny 97.3 & \tiny2.1 & \tiny\cite{ref50} \\
\tiny 8 & \tiny 0.1993 &\tiny 75 & \tiny 5 & \tiny\cite{ref47} & \tiny 31 & \tiny 0.68 &\tiny 92 & \tiny 8 & \tiny\cite{ref47} \\
\tiny 9 & \tiny 0.2 &\tiny 72.9 & \tiny 29.6 & \tiny \cite{ref44} & \tiny 32 & \tiny 0.73 &\tiny 97.3 & \tiny 7 & \tiny \cite{ref52} \\
\tiny 10 & \tiny 0.24 &\tiny 79.7 & \tiny 2.7 & \tiny \cite{ref48} & \tiny 33 & \tiny 0.781 &\tiny 105 & \tiny 12 & \tiny \cite{ref47} \\
\tiny 11 & \tiny 0.27 &\tiny 77 & \tiny 14 & \tiny \cite{ref46} & \tiny 34 & \tiny 0.875 &\tiny 125 & \tiny 17 & \tiny \cite{ref47} \\
\tiny 12 & \tiny 0.28 &\tiny 88.8 & \tiny 36.6 & \tiny \cite{ref44} & \tiny 35 & \tiny 0.88 &\tiny 90 & \tiny 40 & \tiny \cite{ref46} \\
\tiny 13 & \tiny 0.35 &\tiny 82.7 & \tiny 8.4 & \tiny \cite{ref49} & \tiny 36 & \tiny 0.9 &\tiny 117 & \tiny 23 & \tiny \cite{ref46} \\
\tiny 14 & \tiny 0.352 &\tiny 83 & \tiny 14 & \tiny \cite{ref47} & \tiny 37 & \tiny 1.037 &\tiny 154 & \tiny 20 & \tiny \cite{ref47} \\
\tiny 15 & \tiny 0.38 &\tiny 81.5 & \tiny 1.9 & \tiny \cite{ref50} & \tiny 38 & \tiny 1.3 &\tiny 168 & \tiny 17 & \tiny \cite{ref46} \\
\tiny 16 & \tiny 0.3802 &\tiny 83 & \tiny 13.5 & \tiny\cite{ref51} & \tiny 39 & \tiny 1.363 &\tiny 160 & \tiny 33.6 & \tiny \cite{ref55} \\
\tiny 17 & \tiny 0.4 &\tiny 95 & \tiny 17 & \tiny \cite{ref45} & \tiny 40 & \tiny 1.43 &\tiny 177 & \tiny 18 & \tiny \cite{ref46} \\
\tiny 18 & \tiny 0.4004 &\tiny 77 & \tiny10.2 & \tiny\cite{ref51} & \tiny 41 & \tiny 1.53 &\tiny 140 & \tiny 14 & \tiny \cite{ref46} \\
\tiny 19 & \tiny 0.4247 &\tiny 87.1 & \tiny 11.2 & \tiny\cite{ref51} & \tiny 42 & \tiny 1.75 &\tiny 202 & \tiny 40 & \tiny \cite{ref46}\\
\tiny 20 & \tiny 0.43 &\tiny 86.5 & \tiny 3.7 & \tiny\cite{ref46} & \tiny 43 & \tiny 1.965 &\tiny 186.5 & \tiny 50.4 & \tiny \cite{ref55} \\
\tiny 21 & \tiny 0.44 &\tiny 82.6 & \tiny 7.8 & \tiny\cite{ref50} & \tiny 44 & \tiny 2.3 &\tiny 224 & \tiny 8 & \tiny\cite{ref56} \\
\tiny 22 & \tiny 0.44497 &\tiny 92.8 & \tiny 12.9 & \tiny\cite{ref49} & \tiny 45 & \tiny 2.34 &\tiny 222 & \tiny 7 & \tiny\cite{ref57} \\
\tiny 23 & \tiny 0.47 &\tiny 89 & \tiny49.6 & \tiny\cite{ref51} & \tiny 46 & \tiny 2.36 &\tiny 226 & \tiny 8 & \tiny\cite{ref58}'' \\
\hline
\end{tabular}
\end{center}
\end{table}
\begin{figure}[H]
\centering
\includegraphics[width=8cm,height=6cm,angle=0]{fig1a.eps}\\
\includegraphics[width=8cm,height=6cm,angle=0]{fig1b.eps}
\includegraphics[width=8cm,height=6cm,angle=0]{fig1c.eps}
\caption{1-Dimensional marginalized distribution and 2-Dimensional contour plots with best fitted values as $n = 1.457\pm0.037$
and $H_0 = 68.53\pm 1.2$ in the $n - H$ plane.}
\label{fig1}
\end{figure}
Fig.1 shows the two dimensional contours with 68.3 \%, 95.4 \% and 99.7 \% confidence level (CL) in $n-H$ plane. From figure, the best fit
value of parameters are found as $n = 1.457 \pm 0.037$ and $H_0 = 68.53 \pm 1.2 $ .
\begin{figure}[H]
\centering
\includegraphics[width=8cm,height=6cm,angle=0]{fig2.eps}
~~\caption{The behaviour of our model and the $ \Lambda$CDM model with error bar plots of the Hubble data set.}
\label{fig2}
\end{figure}
Fig. 2 depicts the comparison of the best-fitting cosmological model of
OHD data and $ \Lambda$CDM with an error bar of Hubble data. We observe that graph for $\Lambda$CDM raise to a quite better fit.
$H$ increases with the increase of redshift $z$. Here dots signs are 46 observed values of the Hubble constant $(H_{ob})$. The best fit curve
of the resulting model is represented by the solid red line, whereas the dashed black line represents the comparable $\Lambda$CDM model.
It's worth noting that the resulting model's predicted value of $H_0$ closely matches the result of the Plank's collaboration \cite{ref59}.
\section{Physical Behavior of Model}
Here, we have discussed the physical properties of the cosmological model.
\begin{figure}[H]
(a)\includegraphics[width=7.0cm,height=4.0cm,angle=0]{fig3a.eps}
(b)\includegraphics[width=7.0cm,height=4.0cm,angle=0]{fig3b.eps}
\centering
(c)\includegraphics[width=7.0cm,height=4.0cm,angle=0]{fig3c.eps}
\caption{(a) Dark energy density vs redshift $z$ with $\beta = 0.001$, $H_{0} = 68.53$, $n = 1.457$, (b) Matter energy density vs redshift
$z$ with $\beta = 0.001$, $H_{0} = 68.53$, $n = 1.457$,
(c) Density parameters vs redshift $z$ with $\beta = 0.001$, $\delta=3.6092$, $H_{0} = 68.53$, $n = 1.457$.}
\label{fig3}
\end{figure}
Figure $3(a)$ and its corresponding Eq. (\ref{17}) portrays PLECHDE dark energy density ($\rho_\Lambda$) with IR cut-off versus redshift $z$ for
the observational values. It is found to be an increasing function of redshift $z$. For various estimations of $\delta$, dark energy density
$\rho_\Lambda$ indicates the positive behavior throughout the evolution of the universe. Therefore we observe that our model is stable with
recent observations. \\
Figure $3(b)$ shows matter energy density ($\rho_m$) verses redshift (z) for the observational values $n = 1.457 \pm 0.037$ and $H_0 = 68.53 \pm 1.2 $.
The figure shows that matter-energy density $\rho_m$ increases slowly and leads to infinity. it is easy to see that the $\rho_m$ is positive
throughout the region and increases with redshift $z$ for every different value of $\delta$. This result is consistent with observations.
Using the values $n = 1.457$, $\beta = 0.001$, and $H_{0} = 68.53$, in Eq. (\ref{17}), the $\delta$ is constrained as $3.6092$ for
the current observational value $\Omega_{\Lambda} = 0.7$.
Figure $3(c)$ plots the variation of density parameters ($\Omega_{\Lambda}, \Omega_{m}, \Omega $) versus redshift $z$. From this figure,
we observe that the ordinary matter dominates in the early universe, i.e., $\Omega_{m} > \Omega_{\Lambda}$, and it provides a strong physical background
for the earlier decelerating phase of the universe. But after a transition time, the density parameter for cosmological constant dominates
the evolution, i.e., $\Omega_{\Lambda} > \Omega_{m}$ which is probably responsible for the accelerated expansion of the present-day Universe.
The total density parameter ($\Omega$) approaches $1$ for a sufficiently large time, i.e., at the present epoch.
\begin{figure}[H]
\centering
\includegraphics[width=7.0cm,height=4.0cm,angle=0]{fig4.eps}
\caption{ Plot of $\omega_\Lambda$ vs redshift $z$ with $\beta = 0.001$, $H_{0} = 68.53$, $n = 1.457$. }
\label{fig4}
\end{figure}
Figure 4 demonstrates the nature of the equation of state parameter $\omega_\Lambda$ concerning redshift $z$ for PLECHDE. it is observed
that the behavior of the EoS parameter is the same for all values of $\delta$ with the Hubble horizon cut-off. It is rapidly falling at the early stage
while later on tends to constant value approximate $-1.002$. We have also seen that it lies in phantom region ($\omega_D\le{-1} $) for the
observational parameters $n = 1.457 \pm 0.037$ and $H_0 = 68.53 \pm 1.2 $. This result is consistent with the recent observational dataset.
\subsection{Deceleration Parameter }
\begin{figure}[H]
\centering
\includegraphics[width=6.5cm,height=4.0cm,angle=0]{fig5.eps}
~~\caption{Plot of deceleration parameter $q$ versus redshift $ z $ for both H(z) and $\Lambda$CDM models.}
\label{fig5}
\end{figure}
Fig. 5 depicts the deceleration parameter comparing OHD and $\Lambda$CDM data. The solid red line exhibited the best fit curve of the
derived model, and the dashed blue line displayed the corresponding $\Lambda$CDM model. The universe shows an expansion with the change of signature
flipping from decelerating to accelerating phase at the transition redshift $z_t = 0.71165 $. This transition redshift is well consistent
with recent 36 OHD provided redshift range $0.07 \leq z \leq 2.36$ \cite{ref33}. Comparing 740 SN Ia with JLA indicates a redshift range
$0.01 \leq z \leq 1.30$. Thus our results are in good agreement with recent studies mentioned in Refs. \cite{ref31,ref32,ref33,ref34}.
\subsection{Statefinder diagnosis}
The statefinder pairs $\{r,s\}$ are the geometrical quantities that are directly obtained from metrics. This diagnostic is used to distinguish
different dark energy models and hence becomes an important tool in modern cosmology. Alam et al. \cite{ref61} have defined the statefinder
parameters $r$ and $s$ as following
\begin{equation}
\label{21}
r=\frac{\dddot{a}}{a H^3}, \ s=\frac{r-1}{3 (q-\frac{1}{2})}
\end{equation}
A notable feature of the state finder is that these parameters are geometric because they depend on the scale factor and its time
derivative \cite{ref62}. In addition, different dark energy models show different evolutionary trajectories in the $ s-r $ plane.
In addition, the well-known flat $\Lambda CDM$ model corresponds to points $ s = 0 $ and $ r = 1 $ on the $ s-r $ plane. These properties
of the Statefinder allow you to distinguish between different models of dark energy. In the literature, Statefinder diagnostic tools are
often used to distinguish between different dark energy models \cite{ref63,ref64}.\\
The statefinders can also read as
\begin{equation}
\label{22}
r=2 q^{2}+q - \frac{\dot{q}}{H} \quad, \ s=\frac{2}{3}(q+1) - \frac{\dot{q}}{3H(q-\frac{1}{2})}
\end{equation}
At $q=-1$, we observe as $r=1$, $s=0$ and our cosmic model resembles the $\Lambda$CDM model. For values of $q$ in the range $-1\leq q<0.5$,
we get the evolutionary $q-r$, $q-s$, and $s-r$ trajectories for the cosmological model, as illustrated in Figs. 6(a), 6(b), and 6(c).
The flat $\Lambda$CDM model is shown by the black dot in panel (c) at $(s, r)=(0,1)$. The $\Lambda$CDM statefinder pair $(0,1)$ is an attractor
in our cosmological model, which is interesting to note.
\begin{figure}[H]
(a)\includegraphics[width=6.0cm,height=4.0cm,angle=0]{fig6a.eps}
(b)\includegraphics[width=6.0cm,height=4.0cm,angle=0]{fig6b.eps}
\centering
(c)\includegraphics[width=6.0cm,height=4.0cm,angle=0]{fig6c.eps}
\caption{Plots of statefinders in $q-r$ plane (Fig.6a), $q-s$ plane (Fig.6b) and s-r plane (Fig.6c). Here, black dot represents the location of point $(q, r) = (-1, 1)$ in the $q-r$ plane, $(q, s) = (-1, 0)$ and $(s, r) = (0, 1)$ in the $s-r$ plane. The vertical dashed line separates the acceleration and deceleration zones in the Fig.6a and Fig.6c. The arrows indicate the direction of trajectories' evolution as q varies from $0.5$ to $-1$. }
\label{fig6}
\end{figure}
\section{Concluding Summary}
In this paper, we have discussed the transition model of Power-law entropy corrected holographic dark energy in the context of Brans Dicke's theory.
To find the solutions of the field equations, we have precised the energy density of PLECHDE
$\rho_\Lambda = 3 c^2 {M^{2}_p} H^{2} - \beta {M^{2}_p} H^{\delta} $. We have also discussed the evolution of physical and dynamic parameters
of the universe and their cosmological significance. The main highlights of the model are as follows:
\begin{itemize}
\item
Figure 1, depicts one-Dimensional marginalized distribution and two-Dimensional contour plots with best fitted values as
$n = 1.457\pm0.037$ \& $H = 68.53\pm 1.2$ in the $n - H$ plane.
\item
Figure 2 shows the comparison of the best-fitting cosmological model of OHD data and $ \Lambda$CDM with the error bar of Hubble data.
We observe that graph for $\Lambda$CDM raise to a quite better fit. H increases with the increase of redshift z. Here dots signs
are 46 observed values of the Hubble constant $(H_{ob})$. It is worth noting that the derived model estimates $ H_0 $ are in
good agreement with the Plank collaboration results \cite{ref59}.
\item It has been observed from the figures $3(a)$ and $3(b)$ that for different values of $\delta$, dark energy density
$\rho_\Lambda$ and matter energy density $\rho_m$ are increasing function vs redshift $z$ for the observational values
$n = 1.457\pm0.037$ \& $H = 68.53\pm 1.2$.
\item Plot 4, explain EoS parameter $\omega_\Lambda$ for the observational values for power law entropy corrected holographic
dark energy. It has been plotted for three different values of $\delta$ ($2.00, 2.05, 2.10$). It is found to be negative and
lies in phantom region ($\omega_D \leq{-1} $).
\item
Figure 5, explain of deceleration parameter $q$ versus redshift $ z $ for both H(z) and $\Lambda$CDM models. In this derived model,
it has been noted that PLECHDE model exhibits a smooth transition from deceleration to current acceleration phase at the transition
point $z_t = 0.71165$. The filled circle shows the best fit values of the deceleration parameter at transition redshift. The results obtained
in derived are consistent with observational data of modern cosmology, as clearly seen in fig.3.
\item
Figures 6(a), 6(b), and 6(c) show State-finders in the $q-r$ plane, $q-s$ plane, and $s-r$ plane. In the $q–r$ plane, the black dot
represents SS and SCD models respectively, and in the $s-r$ plane, the black dot represents $\Lambda$CDM and SCDM models respectively.
The vertical dashed line separates the acceleration and deceleration zones in the right and left panels. The arrows indicate the
direction of trajectories' evolution as $q$ varies from $0.5$ to $-1$. At $q=-1$, we notice that $r=1$ and $s=0$. As a result,
at $q=-1$, our cosmological model resembles the $\Lambda$CDM model, which is consistent with current data.
\end{itemize}
Hence, our constructed transit PLECHDE model with observational data has good agreement with recent observations.
\section*{Acknowledgement}
A. Pradhan thanks the IUCAA, Pune, India, for providing facilities under the associateship program.
Sincere thanks are due to anonymous reviewers for their constructive comments to enhance the quality of the paper.
\section*{Appendix}
From Eqs. (\ref{12}) and (\ref{13}), we obtain
\begin{equation}
\label{23}
H = \frac{\dot{a}}{a}
\end{equation}
\begin{equation}
\label{24}
q = -\frac{a\ddot{a}}{\dot{a}^2}=-\frac{\dot{H}}{H^2} - 1
\end{equation}
The statefinders are defined as
\begin{equation}
\label{25}
r=\frac{\dddot{a}}{a H^3}= \frac{\ddot{H}}{H^{3}} + 3\frac{\dot{H}}{H^{2}} + 1
\end{equation}
Now from (\ref{24})
\begin{equation}
\label{26}
\frac{\ddot{H}}{H^{3}} = -\frac{\dot{q}}{H} + 2\frac{\dot{H}^{2}}{H^{4}}
\end{equation}
Putting the values of (\ref{24}) and (\ref{26}) in Eq. (\ref{25}), we get
\begin{equation}
\label{27}
r = -\frac{\dot{q}}{H} + 2\frac{\dot{H}^{2}}{H^{4}} - 3(q + 1) + 1
\end{equation}
which reduces to
\begin{equation}
\label{28}
r = q(1 + 2q)-\frac{\dot{q}}{H}
\end{equation}
From Eqs. (\ref{21}) and (\ref{28}), we obtain
\begin{equation}
\label{29}
s = \frac{r - 1}{3(q -\frac{1}{2})} = \frac{2}{3}(q + 1) - \frac{\dot{q}}{3H(q -\frac{1}{2})}
\end{equation}
|
\section*{Methods}
\mysubsection{Non-Abelian MPS simulations.}
MPS simulations have been performed for the one dimensional Hubbard model with $N=3$ colors.
The real time dynamics, generated by the Hamiltonian \eqref{eq:Hamiltonian}
has been simulated using the infinite chain non-Abelian Time Evolving Block Decimation (NA-TEBD)
algorithm~\cite{Werner.2020}, while exploiting the full $\mathrm{SU}(3) \times \mathrm{U}(1)$ symmetry of the model.
We have kept $M_{\mathrm{mult}} = 2500$ multiplets in the NA-MPS, which
corresponds to a usual bond dimension $M\approx 15000$. The time step in the second order
Suzuki-Trotter approximation was set to $J \Delta t = 0.01$.
We have also performed TEBD simulations using the effective trion Hamiltonian \eqref{eq:H_trion}
in the $|V| \rightarrow \infty$ limit, by using the residual $\mathrm{U}(1)$ symmetry of the
effective model. Since the infinitely strong interaction forbids trions to hop next to each other, we could map the strongly interacting limit to free fermions by using
a method of Cheong and Henley \cite{Cheong.2009}.
\mysubsection{Exact Diagonalization at finite T.}
Finite temperature simulations for the $\mathrm{SU}(3)$ Hubbard chain have been
carried out for short chains of length $L=6$ and $L=9$ with periodic boundary conditions.
Corresponding to $\nu=1/3$ filling, we have set the total number of fermions to $n_\mathrm{tot} = L$,
and also restricted the calculations to the color symmetrical subspace with $n_1 = n_2 = n_3$.
We have determined the canonical density matrix $\frac{1}{Z} e^{-\beta {H}}$ by using a Taylor expansion.
The inverse temperature $\beta$ has then been extracted by enforcing $\langle\Xi| {H}|\Xi \rangle\equiv \langle{H} \rangle_T $.
\mysubsection{Derivation of effective $N$-ion Hamiltonian.}
The effective Hamiltonians describing the motion of composite particles can
be constructed by performing perturbation theory in $J$. The effective hopping for an $n$-ion, e.g., can be
estimated in leading order~\cite{Takahashi.1977,MacDonald.1988,Cai.2021} as
$$
- J_n = \langle 0|
\prod_{\alpha = 1}^n \psi_{{\bf{r} }\alpha } \; T_{{\bf{r} },{\bf{r} }'} \left(\frac{1}{E_n^{(0)} - H_U} T _{{\bf{r} },{\bf{r} }'} \right)^{n-1} \prod_{\beta = 1}^n \psi^\dagger_{{\bf{r} }'\beta }
|0\rangle
$$
where ${\bf{r} }$ and ${\bf{r} }'$ are two neighboring sites, $H_U$ denotes the on site energy, and
$ T _{{\bf{r} },{\bf{r} }'} = -J \sum_{\alpha=1}^N \psi^\dagger_{{\bf{r} }\alpha} \psi_{{\bf{r} }'\alpha}$ the hopping operator from ${\bf{r} }'$ and ${\bf{r} }$.
In the intermediate state, where $l$ particles are on ${\bf{r} }$ and $(n-l)$ at site ${\bf{r} }'$ the denominator can be evaluated
as $E_n^{(0)}-E_l^{(0)}-E_{n-l}^{(0)} = U n (n-l)$. The product of the denominators can therefore be evaluated
as $U \;((n-1)!)^2 $, while the order in which particles are
transferred between the two sites amounts in a combinatorial factor, $n!$, yielding the result in the main text.
\mysubsection{Estimation of effective temperature.}
{\parindent = 0pt \emph{Small $U$ limit.} }To estimate the effective temperature for $U\ll J$, we first notice that $\beta$ in this limit is
a very small negative number. We can therefore perform a perturbative calculation in this limit by keeping only the leading order terms
in $\beta$ and $U$, and by taking the expectation value $\langle H_J+H_U\rangle_T$ with the unperturbed density operator,
and equating that with the energy of the initial state. This procedure yields the equation
\begin{equation}
- \nu(1-\nu) \beta \int \mathrm{d}\epsilon\; \epsilon\,\rho(\epsilon) + U \textstyle{\frac {N(N-1)}{2}} \nu^2
\approx \nu \;U \,\frac {N(N-1)}{2}\;,
\label{eq:T_eff}
\ee
where $\rho(\epsilon) $ denotes the single particle density of states of the lattice. The prefactor $(1-\nu) \nu$
in the first integral is associated with the (diverging) chemical potential, $e^{-\beta\mu}\approx (1-\nu)/\nu$.
On a $D$ dimensional cubic lattice Eq.~\eqref{eq:T_eff} yields
\begin{equation}
\beta_\textrm{eff} (U\ll J) \approx - \frac{ (N-1)}{4 D}\, \frac{U}{J^2} \;.
\ee
In $D=1$ dimension and for $N=3$ and $\nu=1/3$, we obtain a prefactor $1/2$, in perfect agreement
with Fig.~\ref{fig:entropy}a.
{\parindent = 0pt \emph{Large $U$ limit.} }In the $U\gg J$ limit, we can consider each site as a grand canonical
subsystem, weakly coupled to the rest of the system, and having a density matrix $\rho \propto e^{-\beta(U n (n-1)/2 - \mu n)}$.
Since $N$-ions are abundant, the chemical potential
of the subsystem must be approximately $\mu\approx U (N-1)/2$. The probability of having a single fermion
is then given by $p_{n=1} \approx (1-\nu) N e^{\beta U (N-1)/2} $, where the prefactor approximates
the inverse partition function.
The value of $p_{n=1} $ can, however, be also estimated quite simply by noticing that the state, where we have
$N$ particles at one site, say at the origin, $|N\rangle$, is not a true $N$-ion state at finite $J/U$. Quantum fluctuations
allow each fermion forming the $N$-ion to move to neighboring sites with probability amplitudes $\approx J/((N-1) U)$.
This implies that a state $|N\rangle$ decomposes to a fermion and an $(N-1)\,$-ion with a probability
$P_{N\to\; (N-1) \textrm{+} 1} \approx z N {J^2}/ [(N-1)^2 U^2]$, yielding
$p_{1} \approx p_{N-1} \approx z \,\nu \,N {J^2} /[{(N-1)^2 U^2}]$.
Comparison with the thermal average then yields
\begin{equation}
\beta_\textrm{eff} (U\gg J) \approx - \frac{4}{(N-1) \,U}\, \ln \Big( \sqrt{\frac{1-\nu}{\nu\, z}}\,\frac {(N-1) U} J \Big)\;,
\ee
with $z=2D$ on a $D$-dimensional cubic lattice.
\mysubsection{Data availability.}
The data that support the findings of this study are available from the corresponding author upon reasonable request.
\bibliographystyle{apsrev4-2}
|
\section{Introduction}
In an earlier paper by Li\~{n}\'{a}n \textit{et. al}~\cite{linan2020taylor} (referred to hereafter as \textbf{I}), the Burke-Schumann diffusion flame embedded in an unsteady mixing layer developing when a fuel tank discharges fuel along a pipe of radius $a$ initially filled with air, was investigated. For a dimensional time $t^*<0$ the fuel in the tank and the air in the pipe \ared{are} separated by a partition or valve at the pipe entrance, \ared{there being} no fluid motion. At $t^*=0$, the partition is removed and the gas mixture is ignited. The pressure difference between the entrance and the open end will cause fluid motion along the pipe.
In the absence of any thermal expansion due to heat release as it was assumed in \textbf{I}, the fluid motion in the fully developed region is \red{dictated} by the Poiseuille law. For times larger than radial diffusion times i.e., $t^*\gg a^2/D_{O\infty}$, where $D_{O\infty}$ is the diffusivity of oxygen at standard temperature (constant properties in the fuel/oxidizer stream is denoted with the subscript $\infty$), \red{the mixing of reactants are governed by Taylor's dispersion processes. An observer moving with the mean pipe velocity, $U$, sees that the mixing variables such as concentrations, temperature etc., show no dependences on the radial coordinate, but evolve axially in time, very much like the normal diffusional spreading. The molecular diffusion coefficients are now, however, replaced by the so-called Taylor diffusion coefficients, which are functions only of the molecular diffusion coefficients and the Peclet number $\Pec=Ua/D_{O\infty}$. These observations are correct as long as the fluid density remains constant. As such, within the thermo-diffusive approximation, it is shown in \textbf{I} that the important flame characteristics (e.g. flame temperature and burning rate) depended on the fuel Lewis number and Peclet number only in a specific combination there defined as the ``effective" Lewis number. }
\ared{Here, we will extend the investigation carried out in \textbf{I} to include the effects of thermal expansion. We will show that the reduced parametric dependence of the solution on the ``effective" Lewis number, characteristic of the thermodiffusive approximation, no longer holds. It should be noted here that effects of thermal expansion have been studied previously~\cite{pearce2014taylor,daou2018taylor} in the context of steadily propagating premixed flames in narrow pipes and channels. There, asymptotic solutions for premixed flames were derived in the limit that the flame thickness becomes large compared with the radius of the pipe. In such cases} \red{the Taylor diffusion coefficients depend on the gas density also. As a result, the structure and the propagation speed of the flame depend significantly on the flow properties.} \ared{An analogous approach is taken here -- and previously in \textbf{I} -- with the thick-flame limit \cite{daou2002thick} for the premixed flame replaced by a thick mixing-layer limit for the diffusion flame in which the mixing of non-premixed reactants and products occurs over distances large compared to the pipe radius. As shown in \textbf{I}, the resulting analysis must account for a thin region encompassing the reaction sheet separating regions of fuel and oxidizer especially when preferential diffusion is present.}
\section{Preliminary considerations}
Firstly, we shall establish that even in the presence of thermal expansion, the prevailing pressure gradient acting on the mixing layer for $t^*\gg a^2/D_{O\infty}$ is still the imposed pressure gradient corresponding to the Poiseuille flow. If $x^*$ is the axial coordinate in the laboratory frame, at time $t^*$, the axial extent of the mixing layer is given by $z^*=x^*-Ut^*\sim \sqrt{D_{O\infty}t^*}$. In the absence of thermal expansion, the imposed pressure gradient is
\begin{equation}
\left(\frac{dp^*}{dz^*}\right)_i = \frac{8\mu U}{a^2} \label{poi}
\end{equation}
where $\mu$ is the constant viscosity. The thermal expansion due to heat release will also generate a pressure gradient in the axial direction. To estimate this, consider the following argument. In the moving frame, a point in the mixing layer will experience a density variation $\Delta \rho^*$, where $\Delta \rho^*$ is the density difference between the burnt and unburnt gas mixture, as a function of time. Similarly, the instantaneous density variations across the moving mixing layer will also be of the order $\Delta \rho^*$. If $U_e$ is the characteristic axial velocity in the moving frame induced by the expansion of the gas, then from the continuity equation, we have
\begin{equation}
\frac{\Delta \rho^*}{t^*}\sim \frac{\Delta \rho^* U_e}{z^*}
\end{equation}
which implies that $U_e\sim \sqrt{D_{O\infty}/t^*}$. The pressure gradient associated with this axial motion is
\begin{equation}
\left(\pfr{p^*}{z^*}\right)_e \sim \frac{\rho_\infty U_e^2}{z^*} \sim \frac{\rho_\infty \sqrt{D_{O\infty}}}{t^*\sqrt{t^*}}. \label{exp}
\end{equation}
At times $t^*\sim a^2/D_{O\infty}$, equations~\eqref{poi} and~\eqref{exp} lead to
\begin{equation}
\left(\frac{dp^*}{dz^*}\right)_i \sim \Pec \left(\pfr{p^*}{z^*}\right)_e
\end{equation}
where we used the relation $\mu=\rho^*\nu^*\sim\rho_\infty \nu_\infty\sim \rho_\infty D_{O\infty}$. This indicates that the pressure gradient developed by thermal expansion is comparable to the imposed pressure gradient for order unity Peclet number. Note that at these times, the mixing layer lies near the entrance region, where the streamwise pressure gradient is not known apriori even \red{when there is no} thermal expansion (a typical feature of developing internal flows). Indeed, Taylor's analysis of dispersion is not valid at these times and we do not address this problem here. On the other hand, when $t^*\gg a^2/D_{O\infty}$, we have
\begin{equation}
\left(\frac{dp^*}{dz^*}\right)_i \gg \Pec \left(\pfr{p^*}{z^*}\right)_e.
\end{equation}
Thus, in the first approximation, the pressure gradient acting on the mixing layer is constant and equal to the imposed pressure gradient \red{along} the pipe. This condition will be used in developing the solution for $t^*\gg a^2/D_{O\infty}$.
\section{Formulation}
Consider a one-step irreversible Arrhenius reaction
\begin{equation}
\ch{F + s O_2 -> P + q}
\end{equation}
where $s$ \red{refers} to the mass of oxygen required to burn unit mass of fuel and $q$ \red{denotes} the amount of heat released per unit mass of fuel consumed. Let the fuel mass fraction $Y_F^*$ in the fuel stream be $Y_{F,\infty}$ and the oxidizer mass fraction $Y_O^*$ in the oxidizer stream be $Y_{O,\infty}$. The temperature of both \ared{streams} are equal, set to $T_\infty$, with corresponding equal densities of $\rho_\infty$ \ared{as follows from the low Mach number equation of state upon neglecting variations in the molecular weight}. The number of moles of fuel burnt per unit volume per unit time \ared{takes the} form $\omega^* = k Y_F^*Y_O^* k^*(T^*)$ \ared{involving the reaction-rate constant $k$ whose dependence on temperature and
pressure need not be specified in our Burke-Schumann analysis.}
Let the coordinates in the frame moving with the mean velocity $U$ be $\vect x^*=(z^*,r^*,\theta^*)$ with associated velocity components $\vect v^*=(u^*,v^*,0)$; far away from the flame surface, the longitudinal velocity component in the moving frame is given by $u^*=U(1-2r^{*2}/a^2)$. We set the thermal diffusivity $D_T^*=D_O^*$, equivalent to setting the oxidizer Lewis number to unity. We shall also assume that $\rho^*\nu^*=\rho_\infty\nu_\infty$, $\rho^*D_F^*=\rho_\infty D_{F\infty}$ and $\rho^*D_O^*=\rho_\infty D_{O\infty}$. Introducing then the following non-dimensional variables and parameters
\begin{align}
& \vect x=\frac{\vect x^*}{a}, \quad t = \frac{t^*}{a^2 /D_{O\infty}}, \quad \vect v=\frac{\vect v^*}{U}, \quad p=\frac{p^*}{\rho_\infty \nu_\infty U /a}, \quad T=\frac{T^*}{T_\infty},\\ &\rho = \frac{\rho^*}{\rho_\infty}, \quad Y_F = \frac{Y_F^*}{Y_{F,\infty}}, \quad Y_O=\frac{Y_O^*}{Y_{O,\infty}}, \quad \omega= \frac{\omega^*}{a^2/(\rho_\infty D_{O\infty})},\\ &S= \frac{s Y_{F,\infty}}{Y_{O,\infty}}, \quad Q= \frac{qY_{F,\infty}}{c_p T_\infty},\quad \Pec = \frac{aU}{D_{O\infty}}, \quad \Lew = \frac{D_O^*}{D_F^*}, \quad \Pra = \frac{\nu^*}{D_O^*},
\end{align}
the governing equations in the low Mach-number approximation become
\begin{align}
&\frac{D\rho}{Dt} + \Pec \rho \nabla\cdot\vect v = 0,\quad
\frac{\rho}{\Pra}\frac{Du}{Dt} = - \nabla p + \nabla^2 \vect v + \frac{1}{3}\nabla (\nabla\cdot\vect v), \\
&\rho \frac{DY_F}{Dt} = \frac{1}{\Lew}\nabla^2 Y_F - \omega,\quad
\rho \frac{DY_O}{Dt} = \nabla^2 Y_O - S\omega,\\
&\rho \frac{DT}{Dt} = \nabla^2 T - Q\omega, \quad \rho T=1
\end{align}
where $D/Dt=\pfi{}{t}+\Pec \vect v\cdot\nabla$ is the material derivative, $\Lew$ is the Lewis of the fuel, $\Pra$ is the Prandtl number and $c_p$ is the specific heat at constant pressure of the gas mixture. Here $\omega= k(T)Y_FY_O$ is the non-dimensional reaction rate in which $k(T)$ is the non-dimensional rate constant.
\ared{We} consider the following initial condition to be imposed at $t=0$,
\begin{equation}
u=1-2r^2, \quad v=0, \quad T=1, \quad Y_F = 1-Y_O= \begin{cases}
1, \quad \text{for}\,\, z<0,\\
0, \quad \text{for}\,\, z>0. \label{init}
\end{cases}
\end{equation}
For $t>0$, we have, as $z\rightarrow \infty$,
\begin{equation}
u = 1-2r^2, \quad v=0, \quad Y_F=0, \quad Y_O=1, \quad T=1
\end{equation}
and as $z\rightarrow -\infty$,
\begin{equation}
u = 1-2r^2, \quad v=0, \quad Y_F=1, \quad Y_O=0, \quad T=1.
\end{equation}
Similarly at $r=0$, we have
\begin{equation}
\pfr{u}{r}=0, \quad v=0, \quad \pfr{Y_F}{r}=0, \quad \pfr{Y_O}{r}=0, \quad \pfr{T}{r}=0
\end{equation}
and at $r=1$, we impose
\begin{equation}
u=-1, \quad v=0, \quad \pfr{Y_F}{r}=0, \quad \pfr{Y_O}{r}=0, \quad \pfr{T}{r}=0
\end{equation}
\ared{corresponding} to impermeable, adiabatic walls.
At times $t\sim 1/\epsilon$ where $\epsilon\rightarrow 0$ is a small parameter, mixing affects a region of axial extent $z\sim 1/\sqrt\epsilon$ and \red{radial extent} $r\sim 1$. \ared{As such, we introduce the order unity variables}
\begin{equation}
\tau = \epsilon t, \quad \xi = \sqrt\epsilon z.
\end{equation}
In these rescaled coordinates, the required equations become
\begin{align}
&\epsilon \pfr{\rho}{\tau} + \Pec\left[\sqrt\epsilon\pfr{}{\xi}(\rho u) + \frac{1}{r}\pfr{}{r}(\rho rv)\right] = 0, \label{conmain}\\
&\epsilon\frac{\rho}{\Pra} \pfr{u}{\tau} + \rho \frac{\Pec}{\Pra}\left(\sqrt\epsilon u\pfr{u}{\xi} + v\pfr{u}{r}\right) =-\sqrt\epsilon\pfr{p}{\xi} + \frac{1}{r}\pfr{}{r}\left(r\pfr{u}{r}\right) + \frac{4\epsilon}{3} \pfr{^2u}{\xi^2} + \frac{\sqrt\epsilon}{3r} \pfr{^2(rv)}{\xi\partial r},\\
&\epsilon\frac{\rho}{\Pra} \pfr{v}{\tau} + \rho \frac{\Pec}{\Pra}\left(\sqrt\epsilon u\pfr{v}{\xi} + v\pfr{v}{r}\right) =-\pfr{p}{r} + \frac{4}{3r}\pfr{}{r}\left(r\pfr{v}{r}\right) - \frac{4v}{3r^2}+ \epsilon \pfr{^2v}{\xi^2} + \frac{\sqrt\epsilon}{3} \pfr{^2 u}{\xi\partial r},\\
&\epsilon \rho \pfr{Y_F}{\tau} + \rho \Pec\left(\sqrt\epsilon u\pfr{Y_F}{\xi} + v\pfr{Y_F}{r}\right) = \frac{1}{\Lew}\left\{\frac{1}{r}\pfr{}{r}\left(r\pfr{Y_F}{r}\right) + \epsilon \pfr{^2Y_F}{\xi^2} \right\} - \omega ,\\
&\epsilon \rho \pfr{Y_O}{\tau} + \rho \Pec\left(\sqrt \epsilon u\pfr{Y_O}{\xi} + v\pfr{Y_O}{r}\right) = \frac{1}{r}\pfr{}{r}\left(r\pfr{Y_O}{r}\right) + \epsilon \pfr{^2Y_O}{\xi^2} - S\omega , \label{Omain}\\
&\epsilon \rho \pfr{T}{\tau} + \rho \Pec\left(\sqrt \epsilon u\pfr{T}{\xi} + v\pfr{T}{r}\right) = \frac{1}{r}\pfr{}{r}\left(r\pfr{T}{r}\right) + \epsilon \pfr{^2T}{\xi^2} + Q \omega \label{Tmain}
\end{align}
An asymptotic solution to the foregoing equations will be derived in the limit $\epsilon\rightarrow 0$. We shall assume that the Burke-Schumann limit $k\rightarrow \infty$ is valid, \ared{leading to the chemical-equilibrium condition $Y_F Y_O = 0$}. In this limit, the \ared{reaction terms become} Dirac delta functions at the flame location. \ared{As shown in \textbf{I}, \red{in this limit} a multi-layered structure emerges \red{for the mixing layer} as $\epsilon \to 0$}. \ared{In the first approximation the flame appears as a plane sheet located at $\xi=\xi_f(\tau)$, separating the fuel and oxidizer. These regions of fuel and oxidizer, characterized by distances from the reaction sheet $|\xi - \xi_f(\tau)| \sim 1$ and concentrations $Y_F\sim Y_O \sim 1$, are referred to as the outer regions which flank a thin flame region, of axial extent $|\xi - \xi_f(\tau)| \sim \sqrt{\epsilon}$, (an axial distance on the order of the pipe radius) where one finds small reactant concentrations on the order of $Y_F\sim Y_O \sim \sqrt{\epsilon}$ }. In \red{the thin inner} region, the flame surface is no longer a plane sheet, but is determined by a nonlinear boundary value problem which describes the radial variations of the flame shape. When the Lewis number of the fuel is unity, there is an explicit expression for the flame shape.
\ared{In addition to describing the flame shape, the inner region provides a jump condition necessary for completing the solution in the outer regions. }
\section{The equations of the outer region}
In the range outside the thin region $\xi-\xi_f(\tau)\sim \sqrt\epsilon$, either the fuel or the oxidizer is identically zero, as mentioned above. The equations \ared{for} the fuel and the oxidizer \ared{regions} can thus be derived separately.
\subsection{Fuel side, $-\infty<\xi<\xi_f(\tau)$}
On the fuel side of the reaction sheet, $Y_O=0$ so that equations~\eqref{conmain}-\eqref{Tmain} reduce to \ared{the reaction-free system}
\begin{align}
\epsilon \pfr{\rho}{\tau} + \Pec\left[\sqrt\epsilon\pfr{}{\xi}(\rho u) + \frac{1}{r}\pfr{}{r}(\rho rv)\right] &= 0, \label{confu}\\
\rho \frac{\Pec}{\Pra}\left(\sqrt\epsilon u\pfr{u}{\xi} + v\pfr{u}{r}\right) &=-\sqrt\epsilon\pfr{p}{\xi} + \frac{1}{r}\pfr{}{r}\left(r\pfr{u}{r}\right) + O(\epsilon),\\
0 &=-\pfr{p}{r} + \frac{4}{3r}\pfr{}{r}\left(r\pfr{v}{r}\right) - \frac{4v}{3r^2} + O(\sqrt\epsilon),\\
\epsilon \rho \pfr{Y_F}{\tau} + \rho \Pec\left(\sqrt\epsilon u\pfr{Y_F}{\xi} + v\pfr{Y_F}{r}\right) &= \frac{1}{\Lew}\left\{\frac{1}{r}\pfr{}{r}\left(r\pfr{Y_F}{r}\right) + \epsilon \pfr{^2Y_F}{\xi^2} \right\},\\
\epsilon \rho \pfr{T}{\tau} + \rho \Pec\left(\sqrt \epsilon u\pfr{T}{\xi} + v\pfr{T}{r}\right) &= \frac{1}{r}\pfr{}{r}\left(r\pfr{T}{r}\right) + \epsilon \pfr{^2T}{\xi^2} \label{Tfu}
\end{align}
For the asymptotic description of the solution with $\tau$ and $\xi$ are of order unity and $\epsilon \to 0$ we shall introduce
\begin{align}
u&=u_0 + \sqrt\epsilon u_1 + \epsilon u_2 + \cdots, \label{uexp}\\
v&=\sqrt\epsilon v_0 + \epsilon v_1 + \epsilon\sqrt\epsilon v_2 + \cdots,\\
p&=p_0/\sqrt\epsilon + p_1 + \sqrt \epsilon p_2 + \cdots,\\
Y_F&= F_0 + \sqrt \epsilon F_1 + \epsilon F_2 + \cdots,\\
T&= T_0 + \sqrt \epsilon T_1 + \epsilon T_2 + \cdots. \label{Texp}
\end{align}
\ared{The density} is given by $\rho=\rho_0 + \sqrt \epsilon \rho_1 + \cdots = 1/T_0 - \sqrt\epsilon T_1/T_0^2+\cdots$ \ared{as follows from the equation of state}. The expansion for $v$ follows from \red {the continuity equation} using the fact that the geometry we examine is slender because $z\sim 1/\sqrt \epsilon \gg r\sim 1$ and $u\sim 1$. The expansion for the pressure \ared{ensures that axial pressure gradients balance radial diffusion at leading order}.
At leading order \ared{we have}
\begin{align}
\pfr{}{\xi}(\rho_0u_0) + \frac{1}{r}\pfr{}{r} (\rho_0 r v_0) &=0, \label{con1}\\
- \pfr{p_0}{\xi} + \frac{1}{r} \pfr{}{r} \left(r\pfr{u_0}{r}\right) &=0,\\
\pfr{p_0}{r} &=0,\\
\frac{1}{\Lew r}\pfr{}{r}\left(r\pfr{F_0}{r}\right)&=0,\\
\frac{1}{ r}\pfr{}{r}\left(r\pfr{T_0}{r}\right) &=0.
\end{align}
Integrating these equations with appropriate boundary conditions including the condition that the pressure gradient is constant and equal to the imposed pressure gradient \ared{(see Section 2) gives}
\begin{align}
u_0 = (1-2r^2),\quad
v_0 = - \frac{1}{2\rho_0}\pfr{\rho_0}{\xi} (r-r^3),\quad
\frac{dp_0}{d\xi}=-8, \label{v0} \\
F_0=F_0(\xi,\tau), \quad T_0=T_0(\xi,\tau), \quad \rho_0=\rho_0(\xi,\tau).
\end{align}
\ared{The e}quations satisfied by the unknown functions $F_0$, $T_0$ and $\rho_0$ will be derived later.
At the next order, \ared{one obtains}
\begin{align}
\pfr{\rho_0}{\tau} + \Pec \left[\pfr{}{\xi} (\rho_0 u_1 + \rho_1 u_0) + \frac{1}{r} \pfr{}{r} (\rho_0 rv_1 + \rho_1 r v_0)\right] =0, \label{con2} \\
\frac{\Pec}{ \Pra}\rho_0 \left( u_0 \pfr{u_0}{\xi} + v_0 \pfr{u_0}{r}\right) = -\pfr{p_1}{\xi} + \frac{1}{r} \pfr{}{r} \left(r\pfr{u_1}{r}\right),\\
0= - \pfr{p_1}{r},\\
\Pec\rho_0 u_0 \pfr{F_0}{\xi} = \frac{1}{\Lew r} \pfr{}{r}\left(r\pfr{F_1}{r}\right),\\
\Pec\rho_0 u_0 \pfr{T_0}{\xi} = \frac{1}{r} \pfr{}{r}\left(r\pfr{T_1}{r}\right).
\end{align}
These equations also can be integrated in a straightforward manner to obtain
\begin{align}
p_1 &= p_1(\xi,\tau), \label{new1}\\
u_1 &= \frac{1}{4}\pfr{p_1}{\xi}(r^2-1) + \frac{\Pec}{2\Pra} \pfr{\rho_0}{\xi}(r^4/4-r^6/9-5/36), \label{u1} \\
F_1 &= F_{1a}(\xi,\tau) + \frac{\Pec\Lew}{4}\rho_0 \pfr{F_0}{\xi} (r^2-r^4/2) ,\\
T_1 &= T_{1a}(\xi,\tau) + \frac{\Pec}{4}\rho_0 \pfr{T_0}{\xi} (r^2-r^4/2),\\
\rho_1 &= - \rho^2 T_{1a} + \frac{\Pec}{4} \rho_0 \pfr{\rho_0}{\xi}(r^2-r^4/2) \label{new2}
\end{align}
\red{The unknown function $p_1(\xi , \tau)$ is obtained as follows. Multiplying \eqref{con2} by $2r dr$ and integrating with respect to $r$ from $0$ to $1$, we obtain the solvability condition}
\begin{equation}
\pfr{\rho_0}{\tau}- \frac{\Pec}{8}\pfr{}{\xi}\left(\frac{\rho_0}{8}\pfr{p_1}{\xi}\right) - \frac{\Pec^2}{48 } \frac{(2+\Pra)}{\Pra}\pfr{}{\xi}\left( \rho_0 \pfr{\rho_0}{\xi}\right) =0 \label{conf}
\end{equation}
\red{after some simplification using the solutions obtained so far.}
Further integration of this equation with respect to $\xi$ \red{and using the condition that the gradients vanish far away from the flame}, we find
\begin{equation}
\frac{\Pec}{8}\pfr{p_1}{\xi} + \frac{\Pec^2}{48} \frac{(2+\Pra)}{\Pra}\pfr{\rho_0}{\xi} = \frac{1}{\rho_0}\int_{-\infty}^\xi\pfr{\rho_0}{\tau}d\xi. \label{dpdx}
\end{equation}
The pressure gradient $\pfi{p_1}{\xi}$ associated with the thermal expansion is thus solved once $\rho_0(\xi,\tau)$ is determined; $p_1$ is solved by integrating the above equation.
At the next order, the equation for $Y_F$ and $T$ provides us
\begin{align}
&\rho_0\pfr{F_0}{\tau} + \Pec \left[(\rho_1u_0 + \rho_0 u_1 )\pfr{F_0}{\xi} + \rho_0 u_0 \pfr{F_1}{\xi} + \rho_0 v_0 \pfr{F_1}{r}\right] = \frac{1}{\Lew}\left\{\frac{1}{r}\pfr{}{r}\left(r\pfr{F_2}{r}\right) + \pfr{^2F_0}{\xi^2}\right\},\\
&\rho_0\pfr{T_0}{\tau} + \Pec \left[(\rho_1u_0 + \rho_0 u_1 )\pfr{T_0}{\xi} + \rho_0 u_0 \pfr{T_1}{\xi} + \rho_0 v_0 \pfr{T_1}{r}\right] = \frac{1}{r}\pfr{}{r}\left(r\pfr{T_2}{r}\right) + \pfr{^2T_0}{\xi^2}.
\end{align}
\ared{Averaging over $r$, and using \eqref{new1}--\eqref{new2} to simplify, one obtains a form similar to that of a one-dimensional unsteady planar mixing layer~\cite{lin1976asymptotic,peters2001turbulent}}
\begin{align}
\pfr{\rho_0}{\tau} + \pfr{}{\xi}(\rho_0u_e) & =0, \label{conff}\\
\rho_0\pfr{T_0}{\tau}+ \rho_0 u_e \pfr{T_0}{\xi} & = \pfr{}{\xi}\left(\rho_0\mathcal{D}\pfr{T_0}{\xi}\right), \label{Tff}\\
\rho_0\pfr{F_0}{\tau}+ \rho_0 u_e \pfr{F_0}{\xi} & = \frac{1}{\Lew}\pfr{}{\xi}\left(\rho_0\mathcal{D}_{F}\pfr{F_0}{\xi}\right) \label{Fff}
\end{align}
where we have introduced
\begin{equation}
\rho_0 \mathcal{D} = 1+\frac{\Pec^2}{48}\rho_0^2\qquad \rho_0 \mathcal{D}_F = 1+ \frac{\Pec^2}{48}\Lew^2 \rho_0^2 \label{Taylor}
\end{equation}
and \ared{an ``effective" axial velocity induced by thermal} expansion\footnote[1]{Combining~\eqref{conff} and~\eqref{Tff} and using the relation $\rho_0T_0=1$ and boundary conditions, we can show that $u_e = \rho_0 \mathcal{D}\pfi{T_0}{\xi}$.}
\begin{equation}
u_e = - \frac{\Pec}{8}\pfr{p_1}{\xi} - \frac{\Pec^2}{48}\frac{(2+\Pra)}{\Pra}\pfr{\rho_0}{\xi}.
\end{equation}
\ared{The first equation follows directly from continuity \eqref{conf} written in terms of the effective velocity $u_e$}. Here $\mathcal{D}$ and $\mathcal{D}_{F}/\Lew$ \ared{may} \red{respectively} be considered as the Taylor diffusivities for \ared{the} oxidizer (or, temperature) and fuel, \red{measured in units of $D_{O\infty}$.} The \ared{diffusivities have been previously identified} for premixed flames~\cite{pearce2014taylor,daou2018taylor} where $\rho_0\mathcal{D}$ and $\rho_0\mathcal{D}_F/\Lew$ (i.e. including $\rho_0$) were termed as the Taylor diffusion coefficients.
When $\Pec = 0$, the definitions \eqref{Taylor} imply that $\rho_0 \mathcal{D} = \rho_0 \mathcal{D}_F = 1$, consistent with the approximations introduced earlier in Section 3.
The continuity equation~\eqref{conff} can be eliminated by replacing $\xi$ with a Lagrangian coordinate
\begin{equation}
\psi = \int_{0}^\xi \rho_0 \, d \xi.
\end{equation}
The energy equation~\eqref{Tff} and fuel mass-fraction equation~\eqref{Fff} become
\begin{align}
\pfr{T_0}{\tau} & = \pfr{}{\psi}\left(\rho_0^2\mathcal{D}\pfr{T_0}{\psi}\right),\\
\pfr{F_0}{\tau} & = \frac{1}{\Lew}\pfr{}{\psi}\left(\rho_0^2\mathcal{D}_F\pfr{F_0}{\psi}\right). \label{Foeq}
\end{align}
These are the required equations for $F_0(\psi,\tau)$ and $T_0(\psi,\tau)$. Since \red{the flame location} $\psi_f(\tau)$ (or, $\xi_f(\tau)$) has to be determined as a part of solution, we can introduce the following expansion
\begin{equation}
\psi_f(\tau) = \psi_{0,f}(\tau) + \sqrt \epsilon \psi_{1,f}+\cdots
\end{equation}
so that boundary conditions for \ared{the} aforementioned problem can be applied at $\psi_{0,f}$ in the first approximation. The boundary conditions for $\tau>0$ are
\begin{equation}
F_0=T_0=1 \quad \text{as} \quad \psi\rightarrow -\infty \quad \text{and} \quad F_0= T_0-T_{0,f}=0 \quad \text{as} \quad \psi\rightarrow \psi_{0,f}^-
\end{equation}
where $T_{0,f}(\tau)$ is the leading-order flame temperature, \ared{to be determined as part of the solution as will be seen later}. The initial conditions are the same as in~\eqref{init}. Once $F_0(\psi,\tau)$ and $T_0(\psi,\tau)$ are solved, the velocity and pressure-gradient corrections $(\sqrt\epsilon u_1, \sqrt\epsilon v_0, \pfi{p_1}{\xi})$ to the Poiseuille flow can be calculated using~\eqref{v0},~\eqref{u1} and~\eqref{dpdx}.
\subsection{Oxidizer side, $\xi_f(\tau)<\xi<\infty$}
\ared{The solution for the oxidizer side proceeds in an analogous manner to that of the fuel side just described. Here the fuel is identically zero $Y_F = 0$ and the oxidizer is expanded as}
\begin{equation}
Y_O = O_0 + \sqrt\epsilon O_1 + \epsilon O_2 + \cdots.
\end{equation}
The development leads to
\begin{align}
\pfr{T_0}{\tau} & = \pfr{}{\psi}\left(\rho_0^2\mathcal{D}\pfr{T_0}{\psi}\right),\\
\pfr{O_0}{\tau} & = \pfr{}{\psi}\left(\rho_0^2\mathcal{D}\pfr{O_0}{\psi}\right), \label{Ooeq}
\end{align}
with boundary conditions
\begin{equation}
O_0=T_0=1 \quad \text{as} \quad \psi\rightarrow \infty \quad \text{and} \quad O_0= T_0-T_{0,f}=0 \quad \text{as} \quad \psi\rightarrow \psi_{0,f}^+
\end{equation}
and initial conditions given by~\eqref{init}.
\subsection{Enthalpy variable}
Since the governing equations for $Y_O$~\eqref{Omain} and $T$~\eqref{Tmain} are similar, we may introduce a conserved scalar
\begin{equation}
H = \frac{1-T}{Q/S} + 1-Y_O \label{H}
\end{equation}
which satisfies a reaction-free transport equation similar to ~\eqref{Omain}. This enthalpy variable \cite{linan2017large} is defined such that $H(\psi\rightarrow-\infty,r,\tau) = 1$, $H(\psi\rightarrow\infty,r,\tau)= 0$ and $H(\psi,r,\tau\rightarrow 0)\rightarrow$ step function. \ared{Expanding as $H=H_0 + \sqrt \epsilon H_1 + \epsilon H_2 + \cdots$, it is straightforward to obtain at leading order}
\begin{equation} \label{HOeq}
\pfr{H_0}{\tau} = \pfr{}{\psi}\left(\rho_0^2\mathcal{D}\pfr{H_0}{\psi}\right).
\end{equation}
\ared{The reaction free nature of $H$ ensures that this} equation is valid everywhere, i.e, for $-\infty<\psi<\infty$. In place of the variable $T_0(\xi,\tau)$ whose derivative is discontinuous at $\psi_{0,f}$, we may solve for $H_0$ which has continuous derivative at the flame location.
\section{The equations of the inner region}
The inner region of thickness $O(\sqrt\epsilon)$ encompassing the flame surface is best described by the stretched coordinate $\eta=[\psi-\psi_f(\tau)]/\sqrt\epsilon$. In the inner region, the \red{departures of the independent variables from their values on the flame surface} are small, i.e. $Y_F\sim Y_O\sim T_f(\tau)-T\sim \rho-\rho_f(\tau)\sim \sqrt\epsilon$. \red{To facilitate the development,} we shall employ the Shvab-Zeldovich-Li{\~n}{\'a}n formulation~\cite{Linan1991structure} by introducing $X=(SY_F-Y_O)/\sqrt\epsilon$ and $\tilde X=(SY_F/\Lew - Y_O)/\sqrt\epsilon$ to describe the inner region, in which $\tilde X$ is a conserved scalar. Substituting the variables defined here into equations~\eqref{conmain}-\eqref{Omain} and collecting the leading-order terms result in
\begin{align}
\rho_f\pfr{u}{\eta} + \frac{1}{r}\pfr{}{r}(rv) &= 0,\\
\rho_f \frac{\Pec}{\Pra}\left( \rho_fu\pfr{u}{\eta} + v\pfr{u}{r}\right) &=-\rho_f\pfr{p}{\eta} + \frac{1}{r}\pfr{}{r}\left(r\pfr{u}{r}\right) + \rho_f^2\pfr{^2u}{\eta^2} ,\\
\rho_f\frac{\Pec}{\Pra}\left(\rho_f u\pfr{v}{\eta} + v\pfr{v}{r}\right) &=-\pfr{p}{r} + \frac{1}{r}\pfr{}{r}\left(r\pfr{v}{r}\right) - \frac{v}{r^2}+ \rho_f^2\pfr{^2v}{\eta^2} ,\\
\rho_f \frac{\Pec}{\Pra}\left(\rho_f u\pfr{X}{\eta} + v\pfr{X}{r}\right) &= \frac{1}{r}\pfr{}{r}\left(r\pfr{\tilde X}{r}\right) + \rho_f^2\pfr{^2\tilde X}{\eta^2}
\end{align}
The equation for $H$ need not be written here as we can easily show that $H$ is conserved in the inner region. The quasi-steady incompressible Navier-Stokes equations must satisfy
\begin{equation}
u=1-2r^2, \quad v=0 \quad \text{at} \quad \eta=\pm\infty,
\end{equation}
consistent with the velocity field found outside the thin region at this order. These boundary conditions are also the solution so that
\begin{equation}
u=1-2r^2, \quad v=0
\end{equation}
is valid everywhere in the inner region. We therefore have
\begin{equation}
\rho_f^2\Pec(1-2r^2) \pfr{X}{\eta} = \frac{1}{r}\pfr{}{r}\left(r\pfr{\tilde X}{r}\right) + \rho_f^2\pfr{^2\tilde X}{\eta^2} \label{Xeq}
\end{equation}
in which the function $X=X(\tilde X)$ can be determined from the equilibrium condition $Y_FY_O=0$ that prevails on the flame surface. \red{Averaging over $r$, we get the solvability condition}
\begin{align}
\pfr{G}{\eta}=0 \quad \text{where} \quad G(\tau) = \int_0^1 2r\left[\Pec (1-2r^2)X - \pfr{\tilde X}{\eta}\right] dr.
\end{align}
The flux $G$ thus remains constant across the inner region. If the flux is evaluated both as $\eta\rightarrow-\infty$ and as $\eta\rightarrow \infty$ using the two-term expansion derived in the outer region, we will find
\begin{align}
G(\tau) &= - \frac{S}{\Lew}\left(1+ \frac{\Pec^2}{48}\Lew^2\rho_{0,f}^2\right) \pfr{F_0}{\psi}\biggr\rvert_{\psi_{0,f}^-} = \left(1+ \frac{\Pec^2}{48}\rho_{0,f}^2\right) \pfr{O_0}{\psi}\biggr\rvert_{\psi_{0,f}^+}. \label{outerbc}
\end{align}
This relation provides the additional boundary condition required for the outer problem to determine $\psi_{0,f}(\tau)$.
\section{The outer problem}
The basic equations and all the boundary conditions required to describe the outer structure are now available. The form of these equations and the initial and boundary conditions permit us to look for solutions that are functions only of $\chi=\psi/\sqrt{4\tau}$. In this self-similar coordinate, the flame location $\chi_{0,f}$ is a constant.
The required equation and boundary conditions for $H_0$ are given by
\begin{equation}
\frac{d}{d\chi}\left(\rho_0^2 \mathcal{D} \frac{dH_0}{d\chi}\right) + 2\chi \frac{dH_0}{d\chi}=0, \qquad H_0(-\infty)-1=H_0(\infty)=0 \label{H0}
\end{equation}
\ared{as follows from \eqref{HOeq}.}
On the fuel side $-\infty <\chi <\chi_{0,f}$, the problem of solving $F_0$ reduces to
\begin{equation}
\frac{d}{d\chi}\left(\rho_0^2 \mathcal{D}_F \frac{dF_0}{d\chi}\right) + 2\Lew \chi \frac{dF_0}{d\chi}=0, \qquad F_0(-\infty)-1=F_0(\chi_{0,f})=0,
\end{equation}
whereas on the oxidizer side $\chi_{0,f}<\chi<\infty$, we have
\begin{equation}
\frac{d}{d\chi}\left(\rho_0^2 \mathcal{D} \frac{dO_0}{d\chi}\right) + 2\chi \frac{dO_0}{d\chi}=0, \qquad O_0(\chi_{0,f})=O_0(-\infty)-1=0,
\end{equation}
obtained from \eqref{Foeq} and \eqref{Ooeq}, respectively. The unknown constant $\chi_{0,f}$ is \ared{obtained} by using the condition~\eqref{outerbc}, that is, at $\chi=\chi_{0,f}$
\begin{equation}
- \frac{S}{\Lew}\mathcal{D}_{F} \frac{dF_0}{d\chi} = \mathcal{D} \frac{dO_0}{d\chi}. \label{jump1}
\end{equation}
In these equations, the function $\rho_0$ appears through $\rho_0^2\mathcal{D}$ and $\rho_0^2\mathcal{D}_F$ \ared{each expressible in terms of $H_0$ and $O_o$ according to
\begin{align}
\rho_0^2\mathcal{D} & = [1+(1-O_0-H_0)Q/S]^{-1} + \frac{\Pec^2}{48} [1+(1-O_0-H_0)Q/S]^{-3}\label{Taylor_1}\\
\rho_0^2\mathcal{D}_F & = [1+(1-O_0-H_0)Q/S]^{-1} + \frac{\Pec^2}{48}\Lew^2 [1+(1-O_0-H_0)Q/S]^{-3}\label{Taylor_2}
\end{align}}
\ared{following from \eqref{Taylor} and \eqref{H}. These expressions take even simpler forms on the fuel side where $O_0 = 0$.} According to \eqref{H0}, since the function $\rho_0^2\mathcal{D}$ has a cusp at $\chi_{0,f}$ (associated with the jump in the temperature-gradient values across the reaction layer), $d^2H_0/d\chi_0^2$ will have a finite jump at that location, although $H_0$ and $dH_0/d\chi_0$ \red{are} continuous everywhere.
\ared{To summarize, the integration proceeds by solving for $F_0$ and $H_0$ in a fuel domain $-\infty \le \chi \leq \chi_{0,f}$ with $F_0 = H_0 = 1$ at $\chi = -\infty$ and $F_0 = H_0 - H_{0,f} = 0$ at $\chi = \chi_{0,f}$, where $H_{0,f}$ is the flame value of the enthalpy function (see below). Similarly one solves for $O_0$ and $H_0$ in the oxidizer domain $\chi_{0,f} \leq \chi \le \infty$ with $O_0 = H_0 - H_{0,f} = 0$ at $\chi = \chi_{0,f}$ and $O_0 -1 = H_0 = 0$ at $\chi = \infty$. The two unknown constants $\chi_{0,f}$ and $H_{0,f}$ are obtained in an iterative manner (e.g using Newton Raphson) once conditions \eqref{jump1} and $({\rm d} H_0/{\rm d}\chi)^+_f -({\rm d} H_0/{\rm d}\chi)^-_f = 0$ (expressing the continuous gradient of $H_0$ at the flame $\chi = \chi_{0,f}$) are satisfied. It is clear from \eqref{H0}--\eqref{Taylor_2} that the solution of the outer problem depends on four parameters, namely $S$, $Q/S$, $\Pec$ and $\Lew$. Sample solutions are described in the following section. }
\begin{figure}
\centering
\includegraphics[width=1\textwidth]{BS.eps}\\
\caption{The Burke-Schumann structure \ared{for $\Pec = Q/S = 10$ and $Z_s=(0.1,0.5,0.9)$. In the top two figures $\Lew = 0.3$ whereas in the bottom two $\Lew = 2.0$.} }
\label{fig:BS}
\end{figure}
\begin{figure}[h!]
\centering
\includegraphics[width=1\textwidth]{fl.eps}\\
\caption{The flame location and the flame temperature are described in the top two figures for $\Lew=0.3$ and the bottom ones for $\Lew=2.0$, both of which are calculated for $Q/S=10$ and for $\Pec=1$ (dot-dashed curves), $\Pec=10$ (dashed curves) and $\Pec=20$ (solid curves).}
\label{fig:fl}
\end{figure}
\ared{
\section{Sample results and parametric dependence of outer problem}}
\ared{In presenting results, of the four controlling parameters} $S$, $Q/S$, $\Pec$ and $\Lew$, we shall fix $Q/S=10$ since this relation approximately holds for hydrocarbon-air and hydrogen-air combustion~\cite{linan2017large}. Values of \ared{the} stoichiometric mixture fraction $Z_s=1/(S+1)$ \ared{are} prescribed instead of $S$. Sample numerical results for three values of $Z_s=(0.1,0.5.0.9)$ and two different Lewis numbers $\Lew=0.3$ and $\Lew=2.0$, representing hydrogen and heavy hydrocarbon fuels, respectively, are shown in Fig.~\ref{fig:BS} \red{for $\Pec=10$}. The adiabatic flame temperature $T_{ad}=1+(1-Z_s)Q/S$ is used to \ared{scale} the temperature field while plotting the results.
\red{When $\Pec=0$, the problem reduces to unsteady, planar diffusion flames which are mathematically identical to the steady, planar, counterflow diffusion flames. In such cases and with equal feed-stream temperatures~\cite{linan2017large}, fuels with $\Lew<1$ exhibit super-adiabatic flame temperatures for all values of $Z_s$ and vice versa for the case where $\Lew>1$. It is already shown in \textbf{I} that such observations are not to be expected in general, especially when the transport (Taylor) coefficients depend on the flow properties. In fact, the trend described above for $\Lew<1$ and $\Lew >1$ are shown to interchange (quite independently of $Z_s$) in the constant-density model once $\Pec$ becomes greater than $\sqrt{48/\Lew}$. Now observing the trend from the results shown in Fig.~\ref{fig:BS}, say for $\Lew=0.3$, we see that the flame temperature is super-adiabatic for $Z_s=0.1$ and $Z_s=0.5$ and sub-adiabatic for $Z_s=0.6$ when the Peclet number $\Pec=10$ still being less than $\sqrt{48/0.3}\approx 12.7$. Similarly, when $\Lew=2$, we see that the flame temperature is still sub-adibatic at $Z_s=0.1$ although the Peclet number $\Pec=10$ exceeded its transition point $\sqrt{48/4}\approx 4.9$. These results clearly indicate 1) that the transition between sub-adiabatic and super-adiabatic flame temperature does not occur at $\Pec=\sqrt{48/\Lew}$ and 2) that this transition does not occur for all values of $Z_s$ at the same time. To better understand these transitions, we plot the flame temperatures as functions of $Z_s$ for different values of $\Pec$.}
The flame location $\chi_{0,f}$ and the departure of the flame temperature
\begin{equation}
T_{0,f} = 1+\frac{Q}{S}(1-H_{0,f})
\end{equation}
from the adiabatic value are shown in Fig.~\ref{fig:fl}. \red{For the two values of $\Lew$ for which results are shown, it is clear from the figure that the Peclet number that causes the transition between super-adiabatic and sub-adiabatic not only depends on $\Lew$, but also on $Z_s$. The non-existence of a simple transition Peclet number (similar to that identified in \textbf{I}) is due to} the fact that the Taylor diffusion coefficients~\eqref{Taylor} depend on the whole functional form of $\rho_0$ and not just on any particular value of it (say, the flame density).
As $\Pec$ is increased, the flame temperatures of hydrogen-like fuels becomes sub-adiabatic initially for large values of $Z_s$ and becomes completely sub-adiabatic for all values of $Z_s$ when $\Pec$ is increased beyond a certain critical value. Similarly, the opposite phenomenon happens for fuels having $\Lew >1$. Both of these transitions as $\Pec$ is increased always initiate near the $Z_s=1$ boundary. \red{This is so because since at higher values of $Z_s$, the deficient reactant is the fuel where the coefficient $\mathcal{D}_F/\Lew$ being the controlling transport coefficient brings about the sub-adiabatic and super-adiabatic transition. On the contrary, these transitions, as $Z_s\rightarrow 0$, occur only at relatively larger values of $\Pec$ since the deficient reactant being the oxygen, whose Lewis number is taken here to be unity, has an opposing effect to such transitions.} As expected, whenever $\Lew=1$, the flame temperature is equal to $T_{ad}$.
\red{\section{The flame shape}}
\red{
Once the outer problem is solved, the nonlinear boundary value problem~\eqref{Xeq} for $\tilde X(\eta,r,\tau)$ can be solved with the boundary conditions
\begin{equation}
\pfr{ \tilde X}{ \eta} \rightarrow \frac{S}{\Lew} \left.\pfr{F_0}{ \psi}\right|_{\psi=\psi_{0,f}^-} \; {\rm as} \; \eta \rightarrow - \infty \quad {\rm and} \quad
\pfr{ \tilde X}{\eta} \rightarrow -\left.\pfr{ O_0}{ \psi}\right|_{\psi=\psi_{0,f}^+} \; {\rm as} \; \eta \rightarrow + \infty
\end{equation}
obtained from matching with the outer expansions and $\pfi{\tilde X}{r}=0 $ at $r=0,1$. The gradients mentioned above are related by the flux $G(\tau)$, defined in~\eqref{outerbc}, carrying the quasi-steady time dependence of $\tilde X$. A time independent problem can be obtained with introduction of the rescaled dependent variables $\tilde \varphi = \tilde X/(G/\mathcal{D}_{F,f})$ and $\varphi = X/(G/\mathcal{D}_{F,f})$, where $\mathcal{D}_{F,f}$ is $\mathcal{D}_F$ [see \eqref{Taylor}] evaluated at the flame surface, functions of $r$ and the rescaled axial coordinate $\zeta = \eta/\rho_{0,f} = x - x_{0,f} + O(\sqrt{\epsilon})$. In terms of these variables the problem reduces to
\begin{equation}
\mathcal{P}(1-2 r^2) \pfr{\varphi}{\zeta}= \frac{1}{r}\pfr{}{r}\left(r\pfr{\tilde\varphi}{r}\right) + \pfr{^2\tilde\varphi}{\zeta^2}, \qquad
\left\{\begin{array}{lll} \varphi=\Lew \tilde{\varphi} & {\rm for} & \tilde{\varphi}>0 \\
\varphi=\tilde{\varphi} & {\rm for} & \tilde{\varphi}<0 \end{array}
\right., \label{varphieq}
\end{equation}
where $\mathcal{P} = \rho_{0,f} Pe$ is a rescaled Peclet number, to be integrated with boundary conditions
\begin{equation}
\tilde{\varphi}(0,0)=0, \quad \pfr{ \tilde{\varphi}}{ r}(\zeta,0)=\pfr{ \tilde{\varphi}}{r}(\zeta,1)=0
\end{equation}
and
\begin{equation}
\pfr{ \tilde{\varphi}}{ \zeta} \rightarrow -1 \; {\rm as} \; \zeta \rightarrow - \infty \quad {\rm and} \quad \pfr{\tilde{\varphi}}{\zeta} \rightarrow - \frac{1+\Lew^2 \mathcal{P}^2/48}{1+\mathcal{P}^2/48} \; {\rm as} \; \zeta \rightarrow + \infty. \label{bcvpt}
\end{equation}
The relation $\varphi=\varphi(\tilde \varphi)$ is obtained in a straightforward manner from the definitions of $X$ and $\tilde X$ using the equilibrium condition $Y_FY_O=0$. Note that the condition at the origin $\tilde \varphi(0,0)=0$ is introduced to eliminate the translational invariance of the problem. Thus the flame shape $\zeta_f=\zeta_f(r)$, identified from the condition $\tilde \varphi(\zeta_f,r)=0$ where $Y_F=Y_O=0$, passes through the origin. The flame shape thus determined from the time-independent problem above depends only on $\Lew$ and $\mathcal{P}$; the dependence of flame shape on $\mathcal{P}$ when $\Lew=1$ has been discussed previously~\cite{pearce2014taylor} for premixed flames.}
The nonlinear boundary problem~\eqref{varphieq}-\eqref{bcvpt} arising here is identical to that found in \textbf{I} for the constant-density model \red{with the Peclet number $\Pec$ replaced by the scaled Peclet number $\mathcal{P}$. It is not hard to show with the help of the condition $\rho^* D_{O}^*=\rho_\infty D_{O\infty}$ introduced in section 2 that $\mathcal{P}$ is just a Peclet number, but one that is defined with respect to the value of oxidizer diffusivity evaluated at the flame temperature. This allows results from the constant-density integrations of \textbf{I} to be applied here in the case of variable density in the following sense. The flame shapes calculated using the constant-density model will yield correct results if the constant density and diffusion coefficients evaluated at the flame temperature are selected as the representative constant values. However, the caveat with this approach is that unless $\Lew=1$ the flame temperature and consequently $\mathcal{P}$ are not known apriori. Thus the outer problem described in section 6 must be solved first before evaluating the flame shape.}
\red{When $\Lew=1$, $\mathcal{P}/\Pec = \rho_{0,f} = 1/[1+(1-Z_s)Q/S]$ which follows directly from the definition of $T_{ad}$. In this case, equations~\eqref{varphieq}-\eqref{bcvpt} admit the solution
\begin{equation}
\tilde \varphi + \zeta =- \mathcal{P}\left(\frac{r^2}{4}-\frac{r^4}{8}\right),
\end{equation}
for which the flame shape takes the simple form
\begin{equation}
\zeta_f(r)=-\mathcal{P}\left(\frac{r^2}{4}-\frac{r^4}{8}\right).
\end{equation}
When $\Pec=0$, the solution is $\tilde\varphi=-\zeta$ which represents planar flames for arbitrary values of $\Lew$. In general, the flame shape depends on $Z_s$, $\Pec$ and $\Lew$ since $\rho_{0,f}$ depends on them. Regardless, the flame shapes predicted by~\eqref{varphieq}-\eqref{bcvpt} for various parametric values are similar to those identified in \textbf{I} and~\cite{pearce2014taylor}, except now that the axial extent of the flame for various cases are different. Thus, a better quantity to study the dependence of the three parameters is the maximum excursion of the flame shape. Since the flame shape always passes through the origin, the maximum excursion can simply be defined as $\zeta_{f,m}=-\zeta_f(1)$. If $\Lew=1$, we have
\begin{equation}
\zeta_{f,m} = \frac{\mathcal{P}}{8} = \frac{\Pec}{8[1+(1-Z_s)Q/S]}. \label{maxexc}
\end{equation}
}
\begin{figure}[h!]
\centering
\includegraphics[width=0.6\textwidth]{max.eps}\\
\caption{Maximum excursions of the flame in the axial direction as functions of $Z_s$ for three different values of $\Lew=(0.3,1.0,2.0)$ and $\Pec=10$. }
\label{fig:max}
\end{figure}
\red{We plot the maximum excursion in Fig.~\ref{fig:max} for three different values of $\Lew$ and $\Pec=10$ as a function of $Z_s$. Since the flame temperature $T_{0,f}$ is a decreasing function of $Z_s$, the flame density $\rho_{0,f}$ is an increasing function of $Z_s$. Thus for the case $\Lew=1$ we can see from~\eqref{maxexc} that the maximum excursion is an increasing function of $Z_s$. The same trend emerges for other values of $\Lew$, but not in the exact form given in~\eqref{maxexc}.}
\section{Concluding remarks}
The study initiated in \textbf{I}, directed towards the understanding of diffusion flames in pipe flows with applications in microcombustion devices, is extended here by including the effects of thermal expansion due to heat release. While the flow field induced by gas expansion is small, density variations associated with the expansion of the gas have significant influences on various quantities of interest such as the flame location and flame temperature of the diffusion flame.
The large-time asymptotic analysis showed that complicated partial differential equations corresponding to the variable-density model can be reduced to coupled nonlinear ordinary differential equations. These equations can be solved to describe the structure of the Burke-Schumann flame, thereby providing details about the flame location, flame temperature, fuel burning rate etc. However, the shape of the flame is still determined by the nonlinear partial differential equation~\eqref{Xeq} \ared{which was shown to reduce to a form equivalent to the constant density version by introduction of a rescaled Peclet number which accounts for the density variations at the flame}. It would be worthwhile in the future to investigate whether such methods can be extended to diffusion flames evolving in turbulent or pulsatile pipe flows \red{as well as under the influences of buoyancy forces. A study in the future concerning the stability of the Taylor-dispersion-controlled diffusion flames similar to that carried out for the premixed flames~\cite{daou2021effect}, especially in two-dimensional geometry, would also be beneficial.} Moreover, since aspects of heat transfer play a vital role in the design of microcombustion devices, it is of interest to see how the flame structure changes if the adiabatic walls are replaced by heat-conducting walls.
\section*{Acknowledgments}
The authors are grateful to Forman A. Williams and Antonio L. S{\'a}nchez for helpful discussion and suggestions. The authors also express thanks to Amable Li{\~n}{\'a}n for initiating this problem.
\bibliographystyle{tfq}
|
\section{Introduction}\label{sec:intro} A polynomial map $f:=(f_1,\ldots,f_n):\C^n\to \C^n$ is \emph{not proper} at $y\in\C^n$ if there is a sequence $\{x_k\}_k\subset \C^n$ satisfying $\Vert x_k\Vert\rightarrow \infty$ and $f(x_k)\rightarrow y$. Investigating the set $\cS(f)$ of points for which $f$ is not proper was initiated by Jelonek in~\cite{Jel93}, where he described its topological properties and provided computational results. He showed that $\cS(f)$ is a \emph{$\C$-uniruled} algebraic hypersurface (i.e. for every $y\in \cS(f)$, there exists a polynomial map $\varphi:\C\to\cS(f)$ with $\varphi(0)=y$), and used this study to solve classical problems on the topology of polynomial maps~\cite{Jel99,Jel99a,jelonek2005effective,Jel10}. These results and others were later extended to polynomial maps over arbitrary algebraically closed fields, as well as over the real numbers~\cite{Jel02,Sta02,Sta05,Tha09,JelLas18,jelonek2020quantitative}. We call $\cS(f)$ the \emph{Jelonek set} of $f$.
Our main result is Theorem~\ref{th:main_corresp}. We establish in it a correspondence relating the Jelonek set to the so-called ``tropical non-properness'' of certain piecewise-affine maps, called \emph{tropical polynomial maps}. Tropical non-properness occurs whenever a preimage under a piecewise-affine map satisfies a particular degeneracy condition (see definition below). In Theorem~\ref{th:main_computation}, we introduce a recipe for recovering the tropical non-properness set. Additionally, we apply our results to complex polynomial maps to recover the $\C$-uniruledness of the Jelonek set and to characterize its Newton polytope (see Theorem~\ref{thm:applications}).
\vspace{-.3cm}
\subsection{Motivation} The study of the Jelonek set ushered new methods to tackle long-standing problems
such as the Jacobian conjecture~\cite{jelonek2016set}, the classification of topological types of polynomial maps~\cite{jelonek2016semi}, and estimating minima in polynomial optimization~\cite{JK03,jelonek2017detecting}. Polynomial maps also appear as ubiquitously in applications such as robotics~\cite{capco2018number,schicho2021and}, computer vision~\cite{Mou94}, algebraic statistics~\cite{LS05} and chemical reaction networks~\cite{feliu2015injectivity}. In each of these applied contexts, a map represents the model of the problem, for which
the Jelonek set describes a subset of points where the input of the problem has a ``critical'' output. Depending on the application, it can describe so-called ``paradoxically moving linkages'', distorted reconstructions of objects, or reaction networks with lower number of steady states.
Computing $\cS(f)$ can be done using standard elimination methods~\cite[Proposition 7]{Jel93}: if $\C^n$ has coordinates $z_1,\ldots,z_n$, then $\cS(f)$ is the zero locus of the product of polynomials $P_1,\ldots,P_n\in \C[w_1,\ldots,w_n]$,
where each $P_i$ multiplies the highest degree in $z_i$ of the polynomial generating the elimination ideal
\begin{equation}\label{eq:elimin_non-properness}
\langle f_1-w_1,\ldots,f_n-w_n\rangle\cap\C[z_i,w_1,\ldots,w_n].
\end{equation} Similar computations can be done for more general polynomial maps and over arbitrary algebraically closed fields~\cite{Sta02}, where elimination techniques remain to be key for a thorough description of the Jelonek set. However, given their inefficiency, these can often
slacken the study of objects related to $\cS(f)$,
especially when the degrees of the polynomials involved are high (c.f.~\cite[Theorem 2.4]{EHT21}).
\vspace{-.2cm}
\subsection{Theoretical framework and main results}\label{sub:int:theoretical-frame}
A polynomial map $f:X\to Y$ between two affine varieties over an algebraically closed field $K$ of characteristic zero, is said to be \emph{finite} if $K[X]$ is integral over $K[Y]$. In particular, the number of preimages (counted with multiplicities) in $X$ remains constant over any point in $Y$~\cite[Ch. I, \S 3]{shafarevich1994basic}. We say that $f$ is \emph{not finite at} $y\in Y$ if there is no Zariski open neighborhood $U$ of $y$ for which $f_{|f^{-1}(U)}:f^{-1}(U)\to U$ is finite. As it coincides with the Jelonek set whenever $K=\C$~\cite{jelonek2001topological,Sta02}, we will keep the terminology and notation from the complex case when referring to the set of points at which $f$ is not finite.
In this paper, we consider locally convergent one-parametric series $c(t):=c_0t^{r_0}+c_1t^{r_1}+\cdots$ with complex coefficients and real exponents $r_0<r_1<\cdots$. These form an algebraically closed field $\K$ of characteristic zero~\cite{markwig2009field}.
It is endowed with a function $\val:\K\to\R\cup\{-\infty\}$ sending zero to $-\infty$ and a non-zero element $c(t)$ above to the real value $-r_0$. The image $\Val(Z)$ under
$\Val:=(\val(\cdot),\ldots,\val(\cdot))$,
also called \emph{tropicalization}, of an algebraic hypersurface $Z$ over $\K$, is a finite rational polyhedral complex of pure dimension $n-1$~\cite{groves1984geometry}.
It is known (see e.g.~\cite{BIMS15,MS15}) that these objects, called \emph{tropical hypersurfaces}, preserve important topological criteria and other geometric invariants of their classical counterparts in the form of combinatorial and polyhedral data.
The first correspondence theorem in tropical geometry was shown in~\cite{MKL06}, stating that the tropicalization of an algebraic hypersurface $\{P = 0\}\subset (\K\setminus 0)^n$ is the locus in $\R^n$ at which the \emph{tropical polynomial} of $P$ is not differentiable.
A tropical polynomial is a function $\R^n\to\R$ of the form $\max(L_1,\ldots,L_r)$, where each $L_1,\ldots,L_r$ is affine with positive integer coefficients.
Tropical polynomials can be constructed from polynomials $\K^n\to\K$
by replacing the coefficients with their valuations, and the addition and multiplication operations with their respective tropical counterparts, defined for any values $a,b\in\R$, as $\max(a,b)$ and $a+b$ respectively. For example, the corner locus of the two tropical polynomials,
\begin{equation}\label{eq:main_example1_trop}
\begin{array}{rl}
F_1:= & \max (b, ~- 5+2b,~ -3+a+2b,~2a+b,~4a+2b),\\
F_2:= & \max (b,~-2+2a+b,~-2+3a+2b,~-4+4a+2b),
\end{array}
\end{equation} is represented as the left-most graph in Figure~\ref{fig:example-th-comput}, where~\eqref{eq:main_example1_trop} are tropicalizations of the two polynomials
\begin{equation}\label{eq:main_example1}
\begin{array}{ll}
f_1:= & v+ t^{5}~ v^2 + t^{3}~uv^2 + 3u^2v -4 u^4v^2,\\[4pt]
f_2:= & -v + 2t^{2}~u^2v -3 t^{2}~u^3v^2 +5t^4~u^4v^2.
\end{array}
\end{equation} In this fashion, any tropical polynomial map $\R^n\to\R^m$ can be obtained from a polynomial map $\K^n\to\K^m$ by replacing the polynomials with their tropical counterparts.
\vspace{-.2cm}
\subsubsection{Correspondence for polynomial maps}\label{sub:intro:corresp}
The \emph{virtual preimage} of a value $b\in\R$ under a tropical polynomial function $\Lambda: \R^n\to\R$, $x\mapsto\max(L_1(x),\ldots,L_r(x))$, is the set of all points in $\R^n$ at which the function $\max(L_1,\ldots,L_r,b)$ is not differentiable. The virtual preimage contains the (standard) preimage $\Lambda^{-1}(b)$ (equality holds only whenever $r=1$), and can be viewed as the tropicalization of the preimage of a polynomial function.
The set $\cT_y(F)$ of a tropical polynomial map $F:=(F_1,\ldots,F_n):\R^n\to\R^n$, is defined as the intersection in $\R^n$ of all virtual preimages of $y_1,\ldots,y_n$, under the respective functions $F_1,\ldots,F_n$. In Figure~\ref{fig:main-example}, the virtual preimage of $a$ under $F$ from~\eqref{eq:main_example1_trop}, for example, contains the union of the orange dot with the half-line (locally represented in the window labeled by $a$), whereas $F^{-1}(a)$ is the half-line.
A half-line $H\subset\R^n$ is said to be \emph{dictritical} if no translation of $H$ is contained in the orthant $(\R_{\leq 0})^n$. In other words, if a vector $\alpha$ positively spans $H$, the $\alpha$ has a positive coordinate.
\begin{definition*}[Tropical non-properness]\label{def:trop-non-properness}
The \emph{tropical non-properness set} $\TJF $ of a tropical polynomial map $F:\R^n\to\R^n$ is the set of all $y\in\R^n$ at which the virtual preimage contains a dicritical half-line.
\end{definition*}
Our paper concerns large families of polynomial maps $\K^n\to \bT$, where $\bT:=(\K \setminus 0)^n$.
The \emph{support} of a polynomial is the set of exponent vectors of its monomials in $\N^n$ appearing with non-zero coefficients. Given a tuple of polynomials $(f_1,\ldots,f_n)$, its \emph{support} is the tuple $A:=(A_1,\ldots,A_n)$ formed by the respective supports of the corresponding polynomials.
All polynomials sharing a support $\sigma$ form a configuration space $\K^{|\sigma|}$ of points, whose coordinates represent the coefficients. In this way, we use $\K[A]$ to denote the space of polynomial maps $\K^n\to \bT$ supported on $A$, where
\[
\K[A] \cong\K^{|A_1|}\times \cdots\times\K^{|A_n|}.
\]
\begin{theorem}\label{th:main_corresp}
Let $A$ be any tuple of $n$ sets in $\N^n\setminus\{ (0,\ldots,0)\} $. Then, there exists a Zariski open subset $\Omega\subset \K[A]$ in which any $f\in\Omega$, representing a polynomial map $\K^n\to \bT$ supported on $A$ satisfies
\[
\Val(\cS(f)) = \TJF,
\] where $F:\R^n\to\R^n$ is the tropical polynomial map corresponding to $f$ (see e.g.,~\eqref{eq:main_example1} and~\eqref{eq:main_example1_trop}).
\end{theorem}
\begin{figure}[h]
\center
\tikzset{every picture/.style={line width=0.75pt}}
\begin{tikzpicture}[x=1.5pt,y=1.5pt,yscale=-1,xscale=1]
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (66.24,139.69) -- (44.59,139.7) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (66.14,119.04) -- (66.24,139.69) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ] (234.88,39.4) -- (227.72,24.67) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (145.01,42.47) -- (144.99,50.58) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=0.2 ] (153.2,80.73) -- (134.14,42.47) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=0.2 ] (131.25,30.9) -- (134.14,42.47) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ] (74.98,81.75) -- (55.48,42.8) ;
\draw [color={rgb, 255:red, 144; green, 19; blue, 254 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (199.8,135.64) -- (221.54,135.64) ;
\draw [color={rgb, 255:red, 144; green, 19; blue, 254 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (199.8,157.38) -- (221.54,135.64) ;
\draw [color={rgb, 255:red, 144; green, 19; blue, 254 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (221.54,135.64) -- (265,113.91) ;
\draw [color={rgb, 255:red, 144; green, 19; blue, 254 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (265,113.91) -- (265,157.38) ;
\draw [color={rgb, 255:red, 144; green, 19; blue, 254 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (286.74,92.18) -- (265,113.91) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ] (55.48,42.8) -- (55.53,50.55) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (66.34,42.8) -- (77.21,53.67) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (77.21,53.67) -- (88.08,75.4) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (77.21,25.8) -- (77.21,53.67) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ] (72.46,76.77) -- (55.48,42.8) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ] (52.58,31.23) -- (55.48,42.8) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (60.78,26.43) -- (66.34,42.8) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=0.2 ] (153.65,157.42) -- (134.14,118.47) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=0.2 ] (134.14,118.47) -- (134.19,152.22) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=0.2 ] (145.21,129.5) -- (145.01,156.33) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (145.01,118.47) -- (155.88,129.33) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (155.88,101.47) -- (155.88,129.33) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ] (155.88,129.33) -- (142.06,101.02) ;
\draw [color={rgb, 255:red, 65; green, 117; blue, 5 } ,draw opacity=0.2 ] (120.84,128.87) .. controls (120.84,113.1) and (133.62,100.31) .. (149.39,100.31) .. controls (165.17,100.31) and (177.95,113.1) .. (177.95,128.87) .. controls (177.95,144.64) and (165.17,157.43) .. (149.39,157.43) .. controls (133.62,157.43) and (120.84,144.64) .. (120.84,128.87) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=0.2 ] (131.25,106.9) -- (134.14,118.47) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (139.45,102.1) -- (145.01,118.47) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=0.2 ] (232.65,81.42) -- (213.14,42.47) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=0.2 ] (213.14,42.47) -- (213.19,76.22) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=0.2 ] (224.01,42.47) -- (224.01,80.33) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=0.2 ] (224.01,42.47) -- (234.88,53.33) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=0.2] (234.88,53.33) -- (245.74,75.07) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=0.2 ] (234.88,25.47) -- (234.88,53.33) ;
\draw [color={rgb, 255:red, 65; green, 117; blue, 5 } ,draw opacity=0.2 ] (199.84,52.87) .. controls (199.84,37.1) and (212.62,24.31) .. (228.39,24.31) .. controls (244.17,24.31) and (256.95,37.1) .. (256.95,52.87) .. controls (256.95,68.64) and (244.17,81.43) .. (228.39,81.43) .. controls (212.62,81.43) and (199.84,68.64) .. (199.84,52.87) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=0.2 ] (210.25,30.9) -- (213.14,42.47) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=0.2 ] (218.45,26.1) -- (224.01,42.47) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ] (74.98,157.42) -- (55.48,118.47) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ] (55.48,118.47) -- (55.53,152.22) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=0.2 ] (66.24,139.69) -- (66.34,156.33) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (66.34,118.47) -- (77.21,129.33) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (77.21,129.33) -- (88.08,151.07) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (77.21,101.47) -- (77.21,129.33) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ] (72.46,152.44) -- (55.48,118.47) ;
\draw [color={rgb, 255:red, 65; green, 117; blue, 5 } ,draw opacity=0.2 ] (42.17,128.87) .. controls (42.17,113.1) and (54.96,100.31) .. (70.73,100.31) .. controls (86.5,100.31) and (99.29,113.1) .. (99.29,128.87) .. controls (99.29,144.64) and (86.5,157.43) .. (70.73,157.43) .. controls (54.96,157.43) and (42.17,144.64) .. (42.17,128.87) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ] (52.58,106.9) -- (55.48,118.47) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (60.78,102.1) -- (66.34,118.47) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=0.2 ] (145.01,42.47) -- (145.01,80.33) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (145.01,42.47) -- (155.88,53.33) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (155.88,53.33) -- (166.74,75.07) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (155.88,25.47) -- (155.88,53.33) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ] (150.74,62.66) -- (133.75,28.69) ;
\draw [color={rgb, 255:red, 65; green, 117; blue, 5 } ,draw opacity=0.2 ] (120.84,52.87) .. controls (120.84,37.1) and (133.62,24.31) .. (149.39,24.31) .. controls (165.17,24.31) and (177.95,37.1) .. (177.95,52.87) .. controls (177.95,68.64) and (165.17,81.43) .. (149.39,81.43) .. controls (133.62,81.43) and (120.84,68.64) .. (120.84,52.87) -- cycle ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (139.45,26.1) -- (145.01,42.47) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (66.34,42.8) -- (66.27,72.18) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (49.4,72.18) -- (66.27,72.18) ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ][fill={rgb, 255:red, 245; green, 166; blue, 35 } ,fill opacity=1 ] (65.54,64.02) .. controls (65.54,63.63) and (65.85,63.31) .. (66.24,63.31) .. controls (66.63,63.31) and (66.95,63.63) .. (66.95,64.02) .. controls (66.95,64.41) and (66.63,64.72) .. (66.24,64.72) .. controls (65.85,64.72) and (65.54,64.41) .. (65.54,64.02) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ] (66.27,72.18) -- (55.34,50.4) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ] (55.34,50.4) -- (42.47,50.4) ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ][line width=1.5] (66.27,72.18) -- (71.4,81.72) ;
\draw [color={rgb, 255:red, 65; green, 117; blue, 5 } ,draw opacity=0.2 ] (42.17,53.21) .. controls (42.17,37.43) and (54.96,24.65) .. (70.73,24.65) .. controls (86.5,24.65) and (99.29,37.43) .. (99.29,53.21) .. controls (99.29,68.98) and (86.5,81.76) .. (70.73,81.76) .. controls (54.96,81.76) and (42.17,68.98) .. (42.17,53.21) -- cycle ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ][fill={rgb, 255:red, 245; green, 166; blue, 35 } ,fill opacity=1 ] (65.23,72.18) .. controls (65.23,71.61) and (65.7,71.15) .. (66.27,71.15) .. controls (66.84,71.15) and (67.31,71.61) .. (67.31,72.18) .. controls (67.31,72.76) and (66.84,73.22) .. (66.27,73.22) .. controls (65.7,73.22) and (65.23,72.76) .. (65.23,72.18) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=0.2 ] (55.48,42.8) -- (55.53,76.55) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=0.2 ] (134.14,42.47) -- (134.19,77.22) ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=0.2 ][fill={rgb, 255:red, 255; green, 255; blue, 255 } ,fill opacity=1 ] (144.2,64.35) .. controls (144.2,63.96) and (144.52,63.64) .. (144.91,63.64) .. controls (145.3,63.64) and (145.61,63.96) .. (145.61,64.35) .. controls (145.61,64.74) and (145.3,65.05) .. (144.91,65.05) .. controls (144.52,65.05) and (144.2,64.74) .. (144.2,64.35) -- cycle ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ][line width=1.5] (159.45,79.85) -- (144.85,50.75) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (120.98,50.75) -- (144.85,50.75) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (221.2,25.42) -- (234.88,39.4) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (234.88,25.47) -- (234.88,39.4) ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ][line width=1.5] (234.88,39.4) -- (250.52,71.04) ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=0.2 ][fill={rgb, 255:red, 255; green, 255; blue, 255 } ,fill opacity=1 ] (223.26,64.23) .. controls (223.26,63.84) and (223.58,63.53) .. (223.97,63.53) .. controls (224.36,63.53) and (224.67,63.84) .. (224.67,64.23) .. controls (224.67,64.62) and (224.36,64.94) .. (223.97,64.94) .. controls (223.58,64.94) and (223.26,64.62) .. (223.26,64.23) -- cycle ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ][line width=1.5] (74.98,157.42) -- (66.24,139.69) ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ][fill={rgb, 255:red, 245; green, 166; blue, 35 } ,fill opacity=1 ] (143.81,50.75) .. controls (143.81,50.18) and (144.28,49.71) .. (144.85,49.71) .. controls (145.42,49.71) and (145.89,50.18) .. (145.89,50.75) .. controls (145.89,51.32) and (145.42,51.79) .. (144.85,51.79) .. controls (144.28,51.79) and (143.81,51.32) .. (143.81,50.75) -- cycle ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ][fill={rgb, 255:red, 245; green, 166; blue, 35 } ,fill opacity=1 ] (233.84,39.4) .. controls (233.84,38.83) and (234.3,38.36) .. (234.88,38.36) .. controls (235.45,38.36) and (235.91,38.83) .. (235.91,39.4) .. controls (235.91,39.97) and (235.45,40.44) .. (234.88,40.44) .. controls (234.3,40.44) and (233.84,39.97) .. (233.84,39.4) -- cycle ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ][fill={rgb, 255:red, 245; green, 166; blue, 35 } ,fill opacity=1 ] (65.2,139.69) .. controls (65.2,139.11) and (65.67,138.65) .. (66.24,138.65) .. controls (66.81,138.65) and (67.28,139.11) .. (67.28,139.69) .. controls (67.28,140.26) and (66.81,140.72) .. (66.24,140.72) .. controls (65.67,140.72) and (65.2,140.26) .. (65.2,139.69) -- cycle ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ][fill={rgb, 255:red, 245; green, 166; blue, 35 } ,fill opacity=1 ] (54.71,139.69) .. controls (54.71,139.3) and (55.03,138.99) .. (55.42,138.99) .. controls (55.81,138.99) and (56.12,139.3) .. (56.12,139.69) .. controls (56.12,140.08) and (55.81,140.4) .. (55.42,140.4) .. controls (55.03,140.4) and (54.71,140.08) .. (54.71,139.69) -- cycle ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ][line width=1.5] (167.37,151.68) -- (155.88,129.33) ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=0.2 ][fill={rgb, 255:red, 255; green, 255; blue, 255 } ,fill opacity=1 ] (144.2,139.95) .. controls (144.2,139.56) and (144.52,139.24) .. (144.91,139.24) .. controls (145.3,139.24) and (145.61,139.56) .. (145.61,139.95) .. controls (145.61,140.34) and (145.3,140.65) .. (144.91,140.65) .. controls (144.52,140.65) and (144.2,140.34) .. (144.2,139.95) -- cycle ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (145.21,129.5) -- (158.52,155.87) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (145.01,118.47) -- (145.21,129.5) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (121.34,129.5) -- (145.21,129.5) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][fill={rgb, 255:red, 0; green, 0; blue, 0 } ,fill opacity=1 ] (65.78,118.47) .. controls (65.78,118.15) and (66.03,117.9) .. (66.34,117.9) .. controls (66.65,117.9) and (66.91,118.15) .. (66.91,118.47) .. controls (66.91,118.78) and (66.65,119.03) .. (66.34,119.03) .. controls (66.03,119.03) and (65.78,118.78) .. (65.78,118.47) -- cycle ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][fill={rgb, 255:red, 0; green, 0; blue, 0 } ,fill opacity=1 ] (76.64,129.33) .. controls (76.64,129.02) and (76.9,128.77) .. (77.21,128.77) .. controls (77.52,128.77) and (77.77,129.02) .. (77.77,129.33) .. controls (77.77,129.65) and (77.52,129.9) .. (77.21,129.9) .. controls (76.9,129.9) and (76.64,129.65) .. (76.64,129.33) -- cycle ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][fill={rgb, 255:red, 0; green, 0; blue, 0 } ,fill opacity=1 ] (144.64,129.5) .. controls (144.64,129.19) and (144.9,128.94) .. (145.21,128.94) .. controls (145.52,128.94) and (145.77,129.19) .. (145.77,129.5) .. controls (145.77,129.81) and (145.52,130.07) .. (145.21,130.07) .. controls (144.9,130.07) and (144.64,129.81) .. (144.64,129.5) -- cycle ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][fill={rgb, 255:red, 0; green, 0; blue, 0 } ,fill opacity=1 ] (144.44,118.47) .. controls (144.44,118.15) and (144.7,117.9) .. (145.01,117.9) .. controls (145.32,117.9) and (145.57,118.15) .. (145.57,118.47) .. controls (145.57,118.78) and (145.32,119.03) .. (145.01,119.03) .. controls (144.7,119.03) and (144.44,118.78) .. (144.44,118.47) -- cycle ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=0.2 ][fill={rgb, 255:red, 0; green, 0; blue, 0 } ,fill opacity=0.3 ] (234.31,53.33) .. controls (234.31,53.02) and (234.56,52.77) .. (234.88,52.77) .. controls (235.19,52.77) and (235.44,53.02) .. (235.44,53.33) .. controls (235.44,53.65) and (235.19,53.9) .. (234.88,53.9) .. controls (234.56,53.9) and (234.31,53.65) .. (234.31,53.33) -- cycle ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=0.2 ][fill={rgb, 255:red, 0; green, 0; blue, 0 } ,fill opacity=0.3 ] (223.44,42.47) .. controls (223.44,42.15) and (223.7,41.9) .. (224.01,41.9) .. controls (224.32,41.9) and (224.57,42.15) .. (224.57,42.47) .. controls (224.57,42.78) and (224.32,43.03) .. (224.01,43.03) .. controls (223.7,43.03) and (223.44,42.78) .. (223.44,42.47) -- cycle ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ][fill={rgb, 255:red, 245; green, 166; blue, 35 } ,fill opacity=1 ] (154.84,129.33) .. controls (154.84,128.76) and (155.3,128.3) .. (155.88,128.3) .. controls (156.45,128.3) and (156.91,128.76) .. (156.91,129.33) .. controls (156.91,129.91) and (156.45,130.37) .. (155.88,130.37) .. controls (155.3,130.37) and (154.84,129.91) .. (154.84,129.33) -- cycle ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][fill={rgb, 255:red, 0; green, 0; blue, 0 } ,fill opacity=1 ] (76.64,53.67) .. controls (76.64,53.35) and (76.9,53.1) .. (77.21,53.1) .. controls (77.52,53.1) and (77.77,53.35) .. (77.77,53.67) .. controls (77.77,53.98) and (77.52,54.23) .. (77.21,54.23) .. controls (76.9,54.23) and (76.64,53.98) .. (76.64,53.67) -- cycle ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][fill={rgb, 255:red, 0; green, 0; blue, 0 } ,fill opacity=1 ] (65.78,42.8) .. controls (65.78,42.49) and (66.03,42.24) .. (66.34,42.24) .. controls (66.65,42.24) and (66.91,42.49) .. (66.91,42.8) .. controls (66.91,43.11) and (66.65,43.36) .. (66.34,43.36) .. controls (66.03,43.36) and (65.78,43.11) .. (65.78,42.8) -- cycle ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][fill={rgb, 255:red, 0; green, 0; blue, 0 } ,fill opacity=1 ] (155.31,53.33) .. controls (155.31,53.02) and (155.56,52.77) .. (155.88,52.77) .. controls (156.19,52.77) and (156.44,53.02) .. (156.44,53.33) .. controls (156.44,53.65) and (156.19,53.9) .. (155.88,53.9) .. controls (155.56,53.9) and (155.31,53.65) .. (155.31,53.33) -- cycle ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][fill={rgb, 255:red, 0; green, 0; blue, 0 } ,fill opacity=1 ] (144.44,42.47) .. controls (144.44,42.15) and (144.7,41.9) .. (145.01,41.9) .. controls (145.32,41.9) and (145.57,42.15) .. (145.57,42.47) .. controls (145.57,42.78) and (145.32,43.03) .. (145.01,43.03) .. controls (144.7,43.03) and (144.44,42.78) .. (144.44,42.47) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=1 ] (54.91,43.36) .. controls (54.91,43.05) and (55.16,42.8) .. (55.48,42.8) .. controls (55.79,42.8) and (56.04,43.05) .. (56.04,43.36) .. controls (56.04,43.68) and (55.79,43.93) .. (55.48,43.93) .. controls (55.16,43.93) and (54.91,43.68) .. (54.91,43.36) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=1 ] (54.96,50.55) .. controls (54.96,50.24) and (55.21,49.99) .. (55.53,49.99) .. controls (55.84,49.99) and (56.09,50.24) .. (56.09,50.55) .. controls (56.09,50.86) and (55.84,51.11) .. (55.53,51.11) .. controls (55.21,51.11) and (54.96,50.86) .. (54.96,50.55) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=1 ] (54.91,118.47) .. controls (54.91,118.15) and (55.16,117.9) .. (55.48,117.9) .. controls (55.79,117.9) and (56.04,118.15) .. (56.04,118.47) .. controls (56.04,118.78) and (55.79,119.03) .. (55.48,119.03) .. controls (55.16,119.03) and (54.91,118.78) .. (54.91,118.47) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=0.1 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=0.3 ] (133.58,42.47) .. controls (133.58,42.15) and (133.83,41.9) .. (134.14,41.9) .. controls (134.45,41.9) and (134.71,42.15) .. (134.71,42.47) .. controls (134.71,42.78) and (134.45,43.03) .. (134.14,43.03) .. controls (133.83,43.03) and (133.58,42.78) .. (133.58,42.47) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=0.2 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=0.3 ] (212.58,42.47) .. controls (212.58,42.15) and (212.83,41.9) .. (213.14,41.9) .. controls (213.45,41.9) and (213.71,42.15) .. (213.71,42.47) .. controls (213.71,42.78) and (213.45,43.03) .. (213.14,43.03) .. controls (212.83,43.03) and (212.58,42.78) .. (212.58,42.47) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=0.2 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=0.3 ] (133.58,118.47) .. controls (133.58,118.15) and (133.83,117.9) .. (134.14,117.9) .. controls (134.45,117.9) and (134.71,118.15) .. (134.71,118.47) .. controls (134.71,118.78) and (134.45,119.03) .. (134.14,119.03) .. controls (133.83,119.03) and (133.58,118.78) .. (133.58,118.47) -- cycle ;
\draw [color={rgb, 255:red, 144; green, 19; blue, 254 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (220.97,135.64) .. controls (220.97,135.33) and (221.22,135.08) .. (221.54,135.08) .. controls (221.85,135.08) and (222.1,135.33) .. (222.1,135.64) .. controls (222.1,135.96) and (221.85,136.21) .. (221.54,136.21) .. controls (221.22,136.21) and (220.97,135.96) .. (220.97,135.64) -- cycle ;
\draw [color={rgb, 255:red, 144; green, 19; blue, 254 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (264.44,113.91) .. controls (264.44,113.6) and (264.69,113.35) .. (265,113.35) .. controls (265.32,113.35) and (265.57,113.6) .. (265.57,113.91) .. controls (265.57,114.22) and (265.32,114.48) .. (265,114.48) .. controls (264.69,114.48) and (264.44,114.22) .. (264.44,113.91) -- cycle ;
\draw [color={rgb, 255:red, 139; green, 87; blue, 42 } ,draw opacity=1 ][fill={rgb, 255:red, 139; green, 87; blue, 42 } ,fill opacity=1 ] (234.22,128.77) .. controls (234.22,128.22) and (234.67,127.76) .. (235.23,127.76) .. controls (235.79,127.76) and (236.24,128.22) .. (236.24,128.77) .. controls (236.24,129.33) and (235.79,129.78) .. (235.23,129.78) .. controls (234.67,129.78) and (234.22,129.33) .. (234.22,128.77) -- cycle ;
\draw [color={rgb, 255:red, 139; green, 87; blue, 42 } ,draw opacity=1 ][fill={rgb, 255:red, 139; green, 87; blue, 42 } ,fill opacity=1 ] (207.22,149.02) .. controls (207.22,148.47) and (207.67,148.01) .. (208.23,148.01) .. controls (208.79,148.01) and (209.24,148.47) .. (209.24,149.02) .. controls (209.24,149.58) and (208.79,150.03) .. (208.23,150.03) .. controls (207.67,150.03) and (207.22,149.58) .. (207.22,149.02) -- cycle ;
\draw [color={rgb, 255:red, 139; green, 87; blue, 42 } ,draw opacity=1 ][fill={rgb, 255:red, 139; green, 87; blue, 42 } ,fill opacity=1 ] (213.08,135.49) .. controls (213.08,134.93) and (213.53,134.48) .. (214.09,134.48) .. controls (214.65,134.48) and (215.1,134.93) .. (215.1,135.49) .. controls (215.1,136.05) and (214.65,136.5) .. (214.09,136.5) .. controls (213.53,136.5) and (213.08,136.05) .. (213.08,135.49) -- cycle ;
\draw [color={rgb, 255:red, 139; green, 87; blue, 42 } ,draw opacity=1 ][fill={rgb, 255:red, 139; green, 87; blue, 42 } ,fill opacity=1 ] (264.08,141.49) .. controls (264.08,140.93) and (264.53,140.48) .. (265.09,140.48) .. controls (265.65,140.48) and (266.1,140.93) .. (266.1,141.49) .. controls (266.1,142.05) and (265.65,142.5) .. (265.09,142.5) .. controls (264.53,142.5) and (264.08,142.05) .. (264.08,141.49) -- cycle ;
\draw [color={rgb, 255:red, 139; green, 87; blue, 42 } ,draw opacity=1 ][fill={rgb, 255:red, 139; green, 87; blue, 42 } ,fill opacity=1 ] (279.79,97.92) .. controls (279.79,97.36) and (280.24,96.91) .. (280.8,96.91) .. controls (281.36,96.91) and (281.81,97.36) .. (281.81,97.92) .. controls (281.81,98.47) and (281.36,98.93) .. (280.8,98.93) .. controls (280.24,98.93) and (279.79,98.47) .. (279.79,97.92) -- cycle ;
\draw (70.73,85.16) node [anchor=north] [inner sep=0.75pt] [font=\tiny] {$a$};
\draw (70.73,160.83) node [anchor=north] [inner sep=0.75pt] [font=\tiny] {$\alpha $};
\draw (149.39,84.83) node [anchor=north] [inner sep=0.75pt] [font=\tiny] {$b$};
\draw (228.39,84.83) node [anchor=north] [inner sep=0.75pt] [font=\tiny] {$c$};
\draw (149.39,160.83) node [anchor=north] [inner sep=0.75pt] [font=\tiny] {$\beta $};
\draw (239.73,162.16) node [anchor=north] [inner sep=0.75pt] [font=\tiny] {$\Val(\cS(f))$};
\draw (263.09,144.89) node [anchor=north east] [inner sep=0.75pt] [font=\tiny] {$\beta $};
\draw (212.09,132.09) node [anchor=south east] [inner sep=0.75pt] [font=\tiny] {$\alpha $};
\draw (210.23,151.41) node [anchor=north west][inner sep=0.75pt] [font=\tiny] {$a$};
\draw (233.23,125.37) node [anchor=south east] [inner sep=0.75pt] [font=\tiny] {$b$};
\draw (279.37,96.73) node [anchor=south east] [inner sep=0.75pt] [font=\tiny] {$c$};
\end{tikzpicture}
\caption{Local illustrations of the virtual preimage under $F$ of some points in the set $\Val(\cS(f))$.
The maps $f$ and $F$ are taken from Example~\ref{ex:main:dim=2}.
}\label{fig:main-example}
\end{figure}
\begin{example}\label{ex:main:dim=2}
Consider the polynomial map~\eqref{eq:main_example1}, whose corresponding tropical polynomial map is~\eqref{eq:main_example1_trop}. The set $\cS(f)$ is given by the polynomial
\[
25t^8~r^2 + 30t^6~r + 40t^4~rs + 16t^4~r - 45t^4~s - 24t^2~s + 16~s^2.
\] It was computed using the Algorithm \textsc{SparseJelonek-2} of~\cite{EHT21}. Its tropical curve $\Val(\cS(f))$ is shown in purple in Figure~\ref{fig:main-example}. For each $y\in\{a,b,c,\alpha,\beta\}\subset \Val(\cS(f))$, the virtual preimage (in orange) $\cT_y(F)$ contains a half-line spanned by the vector $(1,-2)$.
\end{example}
\subsubsection{Tropical non-properness from cell-decompositions} We also provide a description of the tropical non-properness set of tropical maps arising from polynomial maps in the set $\Omega$ of Theorem~\ref{th:main_corresp}. These will be called \emph{face-generic}. A tropical polynomial map $F:\R^n\to\R^n$ induces a polyhedral cell-decomposition
\[
\R^n=\bigsqcup_{\xi\in\Xi}\xi,
\] where every element in $\Xi$ is the relative interior of a convex polytope in $\R^n$, and the restriction $F_{|\xi}$ at each $\xi\subset \R^n$ is an affine map such that if $F_{|\xi}= F_{|\xi'}$, then either $\xi =\xi'$ or its closure (in the Euclidean topology) $\overline{\xi}$ is a face of $\overline{\xi'}$ (c.f~\cite{BB13,grigoriev2022tropical}). For example, the map~\eqref{eq:main_example1_trop}, gives rise to the decompsition of $\R^n$ represented in Figure~\ref{fig:example-th-comput} on the left.
The following result is detailed in~\S\ref{sec:computing}, and provides an effective description of $\TJF $ using finitely-many polyhedra.
\begin{theorem}\label{th:main_computation}
Let $F:\R^n\to\R^n$ be a tropical polynomial map corresponding to a face-generic polynomial map $\K^n\to\TKn$ and let $\Xi$ denote the polyhedral cell-decomposition of $\R^n$ induced by $F$. Then, for any $\xi\in\Xi$ the set
of all $y\in\R^n$, for which $\cT_y(F)$ has a dicritical half-line intersecting $\xi$, is a convex polytope in $\TJF$.
\end{theorem}
\begin{figure}[h]
\begin{tabular}{cc}
\tikzset{every picture/.style={line width=0.75pt}}
\begin{tikzpicture}[x=1pt,y=1pt,yscale=-1,xscale=1]
\draw [color={rgb, 255:red, 255; green, 255; blue, 255 } ,draw opacity=1 ][fill={rgb, 255:red, 189; green, 16; blue, 224 } ,fill opacity=0.17 ] (99.78,216.56) -- (98.74,96.78) -- (80.32,96.78) -- (80.32,177.65) -- cycle ;
\draw [color={rgb, 255:red, 255; green, 255; blue, 255 } ,draw opacity=1 ][fill={rgb, 255:red, 189; green, 16; blue, 224 } ,fill opacity=0.17 ] (67.83,217.61) -- (98.92,215.92) -- (80.32,177.65) -- (67.9,165.22) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ] (74.98,191.75) -- (55.48,152.8) ;
\draw [color={rgb, 255:red, 144; green, 19; blue, 254 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ][line width=1.5] (136.46,162.47) -- (194.87,162.47) ;
\draw [color={rgb, 255:red, 144; green, 19; blue, 254 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ][line width=1.5] (137.94,219.28) -- (195.32,162.47) ;
\draw [color={rgb, 255:red, 144; green, 19; blue, 254 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ][line width=1.5] (195.32,162.47) -- (261.11,129.42) ;
\draw [color={rgb, 255:red, 144; green, 19; blue, 254 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ][line width=1.5] (261.11,129.42) -- (261.11,219.68) ;
\draw [color={rgb, 255:red, 144; green, 19; blue, 254 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ][line width=1.5] (294.24,96.37) -- (261.11,129.42) ;
\draw [color={rgb, 255:red, 144; green, 19; blue, 254 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (194.42,162.47) .. controls (194.42,162.22) and (194.62,162.02) .. (194.87,162.02) .. controls (195.12,162.02) and (195.32,162.22) .. (195.32,162.47) .. controls (195.32,162.72) and (195.12,162.92) .. (194.87,162.92) .. controls (194.62,162.92) and (194.42,162.72) .. (194.42,162.47) -- cycle ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (67.9,165.22) -- (80.32,177.65) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (80.32,177.65) -- (99.78,216.56) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (80.32,96.78) -- (80.32,177.65) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ] (51.69,138.85) -- (55.48,152.8) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (67.9,165.22) -- (67.83,217.61) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ] (55.48,152.8) -- (55.53,216.55) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][fill={rgb, 255:red, 0; green, 0; blue, 0 } ,fill opacity=1 ] (79.76,177.65) .. controls (79.76,177.34) and (80.01,177.08) .. (80.32,177.08) .. controls (80.64,177.08) and (80.89,177.34) .. (80.89,177.65) .. controls (80.89,177.96) and (80.64,178.21) .. (80.32,178.21) .. controls (80.01,178.21) and (79.76,177.96) .. (79.76,177.65) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=1 ] (54.91,152.8) .. controls (54.91,152.49) and (55.16,152.24) .. (55.48,152.24) .. controls (55.79,152.24) and (56.04,152.49) .. (56.04,152.8) .. controls (56.04,153.11) and (55.79,153.36) .. (55.48,153.36) .. controls (55.16,153.36) and (54.91,153.11) .. (54.91,152.8) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ] (39.27,126.43) -- (51.69,138.85) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ] (31.84,126.43) -- (39.27,126.43) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ] (39.27,126.43) -- (39.27,96.01) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ] (51.69,138.85) -- (51.69,96.43) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ] (84.74,211.23) -- (65.23,172.28) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ] (35.87,96.64) -- (67.9,165.22) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][fill={rgb, 255:red, 0; green, 0; blue, 0 } ,fill opacity=1 ] (67.34,165.22) .. controls (67.34,164.91) and (67.59,164.66) .. (67.9,164.66) .. controls (68.21,164.66) and (68.46,164.91) .. (68.46,165.22) .. controls (68.46,165.54) and (68.21,165.79) .. (67.9,165.79) .. controls (67.59,165.79) and (67.34,165.54) .. (67.34,165.22) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ] (89.18,220.15) -- (74.98,191.75) ;
\draw [color={rgb, 255:red, 144; green, 19; blue, 254 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ][line width=1.5] (87.38,216.82) -- (67.92,177.9) ;
\draw [color={rgb, 255:red, 144; green, 19; blue, 254 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ][line width=1.5] (99.78,216.56) -- (80.32,177.65) ;
\draw [color={rgb, 255:red, 255; green, 255; blue, 255 } ,draw opacity=1 ][fill={rgb, 255:red, 255; green, 255; blue, 255 } ,fill opacity=1 ] (54.34,216.26) -- (262.34,216.26) -- (262.34,222.04) -- (54.34,222.04) -- cycle ;
\draw (73.65,200.76) node [anchor=north] [inner sep=0.75pt] [font=\tiny] {$a$};
\draw (84.62,195.18) node [anchor=north] [inner sep=0.75pt] [font=\tiny] {$b$};
\draw (87.69,170.64) node [anchor=south west] [inner sep=0.75pt] [font=\tiny] {$c$};
\draw (87.38,220.22) node [anchor=north] [inner sep=0.75pt] [font=\tiny] {$\alpha $};
\draw (100.92,219.32) node [anchor=north west][inner sep=0.75pt] [font=\tiny] {$\beta $};
\draw (260.91,176.1) node [anchor=north east] [inner sep=0.75pt] [font=\tiny] {$\beta $};
\draw (165.18,164.75) node [anchor=north east] [inner sep=0.75pt] [font=\tiny] {$\alpha $};
\draw (163.75,198.19) node [anchor=north west][inner sep=0.75pt] [font=\tiny] {$a$};
\draw (229.04,143.36) node [anchor=south east] [inner sep=0.75pt] [font=\tiny] {$b$};
\draw (277.2,110.62) node [anchor=south east] [inner sep=0.75pt] [font=\tiny] {$c$};
\end{tikzpicture}
&
\tikzset{every picture/.style={line width=1pt}}
\begin{tikzpicture}[x=.85pt,y=.85pt,yscale=-1,xscale=1]
\draw [color={rgb, 255:red, 65; green, 117; blue, 5 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (178.27,168.78) -- (221.74,104.19) ;
\draw [color={rgb, 255:red, 65; green, 117; blue, 5 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (156.54,158.48) -- (156.54,201.94) ;
\draw [color={rgb, 255:red, 144; green, 19; blue, 254 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (134.8,179.64) -- (156.54,179.64) ;
\draw [color={rgb, 255:red, 144; green, 19; blue, 254 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (156.54,179.64) -- (200,157.91) ;
\draw [color={rgb, 255:red, 144; green, 19; blue, 254 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (200,157.91) -- (200,201.38) ;
\draw [color={rgb, 255:red, 144; green, 19; blue, 254 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (297.79,60.13) -- (200,157.91) ;
\draw [color={rgb, 255:red, 144; green, 19; blue, 254 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (199.44,157.91) .. controls (199.44,157.6) and (199.69,157.35) .. (200,157.35) .. controls (200.32,157.35) and (200.57,157.6) .. (200.57,157.91) .. controls (200.57,158.22) and (200.32,158.48) .. (200,158.48) .. controls (199.69,158.48) and (199.44,158.22) .. (199.44,157.91) -- cycle ;
\draw [color={rgb, 255:red, 65; green, 117; blue, 5 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (134.59,158.48) -- (156.54,158.48) ;
\draw [color={rgb, 255:red, 65; green, 117; blue, 5 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (155.97,158.48) .. controls (155.97,158.16) and (156.22,157.91) .. (156.54,157.91) .. controls (156.85,157.91) and (157.1,158.16) .. (157.1,158.48) .. controls (157.1,158.79) and (156.85,159.04) .. (156.54,159.04) .. controls (156.22,159.04) and (155.97,158.79) .. (155.97,158.48) -- cycle ;
\draw [color={rgb, 255:red, 65; green, 117; blue, 5 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (156.54,158.48) -- (200,115.05) ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (134.65,201.08) -- (156.54,179.64) ;
\draw [color={rgb, 255:red, 65; green, 117; blue, 5 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (178.27,168.78) -- (178.29,203.21) ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (155.97,179.64) .. controls (155.97,179.33) and (156.22,179.08) .. (156.54,179.08) .. controls (156.85,179.08) and (157.1,179.33) .. (157.1,179.64) .. controls (157.1,179.96) and (156.85,180.21) .. (156.54,180.21) .. controls (156.22,180.21) and (155.97,179.96) .. (155.97,179.64) -- cycle ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (156.54,179.64) -- (178.27,168.78) ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (177.71,168.78) .. controls (177.71,168.47) and (177.96,168.21) .. (178.27,168.21) .. controls (178.58,168.21) and (178.83,168.47) .. (178.83,168.78) .. controls (178.83,169.09) and (178.58,169.34) .. (178.27,169.34) .. controls (177.96,169.34) and (177.71,169.09) .. (177.71,168.78) -- cycle ;
\draw [color={rgb, 255:red, 65; green, 117; blue, 5 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (200,115.05) -- (221.74,104.19) ;
\draw [color={rgb, 255:red, 65; green, 117; blue, 5 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (199.44,115.05) .. controls (199.44,114.74) and (199.69,114.49) .. (200,114.49) .. controls (200.32,114.49) and (200.57,114.74) .. (200.57,115.05) .. controls (200.57,115.36) and (200.32,115.62) .. (200,115.62) .. controls (199.69,115.62) and (199.44,115.36) .. (199.44,115.05) -- cycle ;
\draw [color={rgb, 255:red, 65; green, 117; blue, 5 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (134.05,115.05) -- (200,115.05) ;
\draw [color={rgb, 255:red, 65; green, 117; blue, 5 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (221.17,104.19) .. controls (221.17,103.87) and (221.42,103.62) .. (221.74,103.62) .. controls (222.05,103.62) and (222.3,103.87) .. (222.3,104.19) .. controls (222.3,104.5) and (222.05,104.75) .. (221.74,104.75) .. controls (221.42,104.75) and (221.17,104.5) .. (221.17,104.19) -- cycle ;
\draw [color={rgb, 255:red, 65; green, 117; blue, 5 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (133.79,104.19) -- (221.74,104.19) ;
\draw [color={rgb, 255:red, 65; green, 117; blue, 5 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (221.74,104.19) -- (221.76,201.61) ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ][fill={rgb, 255:red, 245; green, 166; blue, 35 } ,fill opacity=1 ] (221.17,136.23) .. controls (221.17,135.91) and (221.42,135.66) .. (221.74,135.66) .. controls (222.05,135.66) and (222.3,135.91) .. (222.3,136.23) .. controls (222.3,136.54) and (222.05,136.79) .. (221.74,136.79) .. controls (221.42,136.79) and (221.17,136.54) .. (221.17,136.23) -- cycle ;
\draw [color={rgb, 255:red, 65; green, 117; blue, 5 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (221.74,104.19) -- (279.25,46.72) ;
\draw [color={rgb, 255:red, 65; green, 117; blue, 5 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (221.74,104.19) -- (258.32,82.24) ;
\draw [color={rgb, 255:red, 65; green, 117; blue, 5 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (131.37,82.24) -- (258.32,82.24) ;
\draw [color={rgb, 255:red, 65; green, 117; blue, 5 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (258.32,82.24) -- (258.34,202.66) ;
\draw [color={rgb, 255:red, 65; green, 117; blue, 5 } ,draw opacity=1 ][fill={rgb, 255:red, 144; green, 19; blue, 254 } ,fill opacity=1 ] (258.32,82.24) -- (287.75,52.81) ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ][fill={rgb, 255:red, 245; green, 166; blue, 35 } ,fill opacity=1 ] (257.74,99.45) .. controls (257.74,99.14) and (257.99,98.89) .. (258.3,98.89) .. controls (258.61,98.89) and (258.87,99.14) .. (258.87,99.45) .. controls (258.87,99.77) and (258.61,100.02) .. (258.3,100.02) .. controls (257.99,100.02) and (257.74,99.77) .. (257.74,99.45) -- cycle ;
\draw [color={rgb, 255:red, 65; green, 117; blue, 5 } ,draw opacity=1 ][fill={rgb, 255:red, 65; green, 117; blue, 5 } ,fill opacity=1 ] (257.76,82.24) .. controls (257.76,81.92) and (258.01,81.67) .. (258.32,81.67) .. controls (258.63,81.67) and (258.88,81.92) .. (258.88,82.24) .. controls (258.88,82.55) and (258.63,82.8) .. (258.32,82.8) .. controls (258.01,82.8) and (257.76,82.55) .. (257.76,82.24) -- cycle ;
\draw [color={rgb, 255:red, 255; green, 255; blue, 255 } ,draw opacity=1 ][fill={rgb, 255:red, 255; green, 255; blue, 255 } ,fill opacity=1 ] (131.46,200.06) -- (274.36,200.06) -- (274.36,204.1) -- (131.46,204.1) -- cycle ;
\draw [color={rgb, 255:red, 255; green, 255; blue, 255 } ,draw opacity=1 ][fill={rgb, 255:red, 255; green, 255; blue, 255 } ,fill opacity=1 ] (131.46,54.72) -- (135.96,54.72) -- (135.96,204.1) -- (131.46,204.1) -- cycle ;
\end{tikzpicture}
\end{tabular}
\caption{From left to right: The decomposition induced by the map from Example~\ref{ex:main:dim=2}, its tropical non-properness set, and its tropical discriminant (see~\cite{hilany2022tropical}).}\label{fig:example-th-comput}
\end{figure}
\begin{example}\label{ex:computation}
Figure~\ref{fig:example-th-comput} illustrates the cell-decomposition $\Xi$ corresponding to the map $\R^2\to\R^2$ with the pair of tropical polynomials from Equation~\eqref{eq:main_example1_trop}. The virtual preimage $\cT_y(F)$ of any $y$ in one of the edges of $\TJF$ with the labeling $a$, $b$ and $c$ has a dicritical half-line in the cell in $\Xi$ with the identical labeling. The same goes for the one-dimensional cells $\alpha$ and $\beta$.
\end{example}
Thanks to the well-known duality between Newton polytopes and tropical hypersurfaces and (see e.g., Proposition~\ref{prop:mixed_subd}), computing $\TJF$ becomes useful for describing the Newton polytope of the Jelonek set of complex polynomial maps. The \emph{face-vector} of a convex polytope $\Pi\subset\R^n$ is the finite integer sequence $(\cF_0,\ldots,\cF_{n-1})$, where the component in position $i$ is the number of $i$-dimensional faces of $\Pi$.
\begin{theorem}\label{thm:applications}
Let $A$ be any tuple of $n$ sets in $\N^n\setminus \{(0,\ldots,0)\}$. Then, there exists a Zariski open subset $\tilde{\Omega}\subset \C[A]$ of complex polynomial maps, in which for any $g\in\tilde{\Omega}$, the face-vector of the Newton polytope in $\R^n$ of $\cS(g)$, together with the slopes of its faces can be recovered by means of Theorems~\ref{th:main_corresp} and~\ref{th:main_computation}.
\end{theorem}
\subsection{Organization}\label{sub:int:main-res}
\S\ref{sec:faces} is devoted to introducing some of the necessary conditions for a polynomial map to be face-generic, called \emph{almost face-generic} (Definition~\ref{def:face-generic}). These conditions apply for any polynomial map over an algebraically-closed field $K$ of characteristic zero. We show in Proposition~\ref{prp:face-generic-open} that almost face-genericity is an open condition in $K[A]$. This will be useful for describing the Jelonek set as a union of \emph{face-resultants} in $\TKn$ (Definition~\ref{def:r-star-gamma} and Proposition~\ref{prop:algebraic_correspondence}). Face-resultants are obtained from square polynomial systems by restricting individual polynomials of the map onto faces of their respective Newton polytopes. Thanks to this description, we re-prove Jelonek's result on $K$-uniruledness for almost face-generic maps over $K$ (Corollary~\ref{cor:k-uniruled}).
In \S\ref{sec:prel} we introduce notations and some classical results from basic tropical algebraic geometry. These will be necessary for proving Theorems~\ref{th:main_corresp} and~\ref{th:main_computation} in \S\ref{sec:correspondence} and \S\ref{sec:computing} respectively. Theorem~\ref{thm:applications} is proven at the end of \S\ref{sec:correspondence}.
\section{Jelonek set from faces of polytopes}\label{sec:faces} The first task in this paper is to relate the Jelonek set of a polynomial map to its face-resultants. We start this section with some notations and definitions. In \S\ref{sub:prelim} we define almost face-generic polynomial maps, and show that they form a Zariski open subset in the space of all maps with the same support. In~\S\ref{sub:pol-restricted}, we describe some relevant properties of face-resultants for almost face-generic maps. We recall in~\S\ref{sub:Bernstein} Bernstein's theorem for polynomial tuples and apply it to determine the topological degree of a plynomial map. The correspondence between face-resultants and the Jelonek set culminates in~\S\ref{sub:non-prop_resultants}. We finish this section by using this description to re-prove $\K$-uniruledness for the Jelonek set.
\vspace{-.2cm}
\subsection{Preliminaries on Newton polytopes}\label{sub:prelim} A \emph{polytope} in $\R^n$ is the intersection of finitely-many closed half-spaces. Recall that a face $\Phi$ of a polytope $\Pi\subset\R^n$ is given by the intersection of $\Pi$ with a hyperplane for which $\Pi$ is contained in one of the two halfspaces determined by the hyperplane. We call this a \emph{supporting} hyperplane of $\Phi$. We say that $\Phi$ is \emph{dicritical} if a normal vector $\alpha:=(\alpha_1,\ldots,\alpha_n)\in\R^n$ of a supporting hyperplane of $\Phi$ is directed outwards of $\Pi$ and has one positive coordinate $\alpha_i$.
Given a tuple of polytopes $\Delta:=(\Delta_1,\ldots,\Delta_n)$, the Minkowski sum of their members is a polytope in $\R^n$, denoted by $\Sigma\Delta$. Here, the \emph{Minkowski sum} of any two subsets $A,B\subset\R^n$ is the coordinate-wise sum $
A+B:=\{a+b~|~a\in A,~b\in B\}$. The sub-tuple $(\Delta_i)_{i\in I}$ is denoted by $I\Delta$ for any $I\subset [n]$. A tuple $\Gamma:=(\Gamma_1,\ldots,\Gamma_n)$ of polytopes in $\R^n$ is said to be a \emph{tuple-face} of $\Delta$ if for any $i=1,\ldots,n$, the subset $\Gamma_i$ is a face of $\Delta_i$ and $\Sigma\Gamma$ is a face of $\Sigma\Delta$. We use the notation $\Gamma\prec\Delta$. When it is clear from the context, we will use the term \emph{face} of $\Delta$ instead of the term ``tuple-face''.
\begin{notation}\label{not:origin}
We use $\unze$ to denote the point $(0,\ldots,0)$.
\end{notation}
\begin{definition}\label{def:dicritical-tupe}
A face $\Gamma$ of a tuple of polytopes in $\R^n$ is said to be \emph{dicritical} if $\Sigma\Gamma$ is dicritical, and for any $i=1,\ldots,n$, no member $\Gamma_i$, coincides with $\unze$.
\end{definition}
\begin{definition}\label{def:face-types}
The cone of $\R^n$, formed by all points with non-negative coordinates is denoted by $\Rnn$. Since this cone emanates from $\unze$, for any polytope $\Pi\subset\Rnn$, either $\unze$ is a vertex of $\Pi$, or $\unze\not\in \Pi$. A face, $\Gamma$, of a tuple of polytopes $\Delta$ is called \emph{origin} if $\unze\in\Sigma\Gamma$. This is equivalent to $\Gamma_i$ containing $\unze$ for all $i\in [n]$. We say that $\Gamma$ is \emph{pre-origin} if $\unze\in\Gamma_i$ for some $i\in [n]$, and \emph{strictly pre-origin} if it is pre-origin, but not origin.
\end{definition}
\begin{figure}
\tikzset{every picture/.style={line width=0.75pt}}
\begin{tikzpicture}[x=0.75pt,y=0.75pt,yscale=-1,xscale=1]
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ] [dash pattern={on 3pt off 1.5pt}] (431.67,262.5) -- (559.67,262.5) ;
\draw [shift={(561.67,262.5)}, rotate = 180] [fill={rgb, 255:red, 245; green, 166; blue, 35 } ,fill opacity=1 ][line width=0.08] [draw opacity=0] (7.2,-1.8) -- (0,0) -- (7.2,1.8) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 74; blue, 74 } ,draw opacity=0.5 ][line width=2.25] [dash pattern={on 3.75pt off 3pt on 7.5pt off 1.5pt}] (431.83,262.5) -- (520.01,242.56) ;
\draw [color={rgb, 255:red, 255; green, 255; blue, 255 } ,draw opacity=1 ][line width=6] (431.42,262.25) -- (481.97,262.48) ;
\draw [color={rgb, 255:red, 255; green, 255; blue, 255 } ,draw opacity=1 ][line width=6] (483.25,250.3) -- (519.93,242.31) ;
\draw [color={rgb, 255:red, 255; green, 255; blue, 255 } ,draw opacity=1 ][line width=6] (519.93,242.31) -- (520.56,227.65) ;
\draw [color={rgb, 255:red, 255; green, 255; blue, 255 } ,draw opacity=1 ][line width=3] (491.58,232.15) -- (531.58,210.15) ;
\draw [color={rgb, 255:red, 255; green, 255; blue, 255 } ,draw opacity=1 ][line width=3.75] (531.58,210.15) -- (571.58,188.15) ;
\draw [color={rgb, 255:red, 247; green, 185; blue, 83 } ,draw opacity=0 ][fill={rgb, 255:red, 98; green, 150; blue, 39 } ,fill opacity=0.4 ] (431.67,262.5) -- (519.85,192.56) -- (572.17,192.79) -- (481.89,262.73) -- cycle ;
\draw [color={rgb, 255:red, 247; green, 185; blue, 83 } ,draw opacity=0 ][fill={rgb, 255:red, 98; green, 150; blue, 39 } ,fill opacity=0.4 ] (79.63,192.32) -- (218.34,122.16) -- (41.67,262.5) -- cycle ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ] [dash pattern={on 3pt off 1.5pt}] (241.83,262.5) -- (368.55,196.16) ;
\draw [shift={(370.33,195.23)}, rotate = 152.37] [fill={rgb, 255:red, 245; green, 166; blue, 35 } ,fill opacity=1 ][line width=0.08] [draw opacity=0] (7.2,-1.8) -- (0,0) -- (7.2,1.8) -- cycle ;
\draw [color={rgb, 255:red, 255; green, 255; blue, 255 } ,draw opacity=1 ][line width=3] (241.83,262.5) -- (279.63,242.32) ;
\draw [color={rgb, 255:red, 74; green, 74; blue, 74 } ,draw opacity=0.5 ][line width=2.25] (241.83,262.5) -- (330.01,242.56) ;
\draw [color={rgb, 255:red, 255; green, 255; blue, 255 } ,draw opacity=1 ][line width=3] (317.58,222.15) -- (348.8,206.24) ;
\draw [color={rgb, 255:red, 74; green, 74; blue, 74 } ,draw opacity=0.5 ][line width=2.25] (431.67,262.5) -- (520.18,192.56) ;
\draw [color={rgb, 255:red, 74; green, 74; blue, 74 } ,draw opacity=0.5 ][line width=2.25] (431.58,262.25) -- (481.97,262.48) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=0.4 ][line width=2.25] [dash pattern={on 3.75pt off 3pt on 7.5pt off 1.5pt}] (520.01,242.56) -- (520.01,192.56) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=0.6 ][line width=2.25] [dash pattern={on 3.75pt off 3pt on 7.5pt off 1.5pt}] (330.01,242.56) -- (317.58,22.15) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=0.6 ][line width=1.5] [dash pattern={on 3.75pt off 3pt on 7.5pt off 1.5pt}] (330.01,240.63) -- (367.97,22.38) ;
\draw [color={rgb, 255:red, 255; green, 255; blue, 255 } ,draw opacity=1 ][line width=6] (317.25,109.46) -- (325.83,103.5) ;
\draw [color={rgb, 255:red, 255; green, 255; blue, 255 } ,draw opacity=1 ][line width=6] (315.22,88.32) -- (323.8,82.35) ;
\draw [color={rgb, 255:red, 255; green, 255; blue, 255 } ,draw opacity=1 ][line width=6] (345.07,120.74) -- (360.99,102.35) ;
\draw [color={rgb, 255:red, 255; green, 255; blue, 255 } ,draw opacity=1 ][line width=6] (354.7,76.78) -- (363.29,70.81) ;
\draw [color={rgb, 255:red, 255; green, 255; blue, 255 } ,draw opacity=1 ][line width=6] (325.03,156.59) -- (324.91,136.21) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=0.4 ][line width=2.25] [dash pattern={on 3.75pt off 3pt on 7.5pt off 1.5pt}] (279.63,142.32) -- (330.01,242.56) ;
\draw [color={rgb, 255:red, 74; green, 74; blue, 74 } ,draw opacity=0.5 ][line width=2.25] (241.83,262.5) -- (279.63,142.32) ;
\draw [color={rgb, 255:red, 74; green, 74; blue, 74 } ,draw opacity=0.5 ][line width=2.25] (41.67,262.5) -- (130.01,192.56) ;
\draw [color={rgb, 255:red, 74; green, 74; blue, 74 } ,draw opacity=0.5 ][line width=2.25] (41.83,262.5) -- (79.63,192.32) ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ] [dash pattern={on 3pt off 1.5pt}] (41.83,262.5) -- (168.55,196.16) ;
\draw [shift={(170.33,195.23)}, rotate = 152.37] [fill={rgb, 255:red, 245; green, 166; blue, 35 } ,fill opacity=1 ][line width=0.08] [draw opacity=0] (7.2,-1.8) -- (0,0) -- (7.2,1.8) -- cycle ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ] [dash pattern={on 3pt off 1.5pt}] (41.83,262.5) -- (169.83,262.5) ;
\draw [shift={(171.83,262.5)}, rotate = 180] [fill={rgb, 255:red, 245; green, 166; blue, 35 } ,fill opacity=1 ][line width=0.08] [draw opacity=0] (7.2,-1.8) -- (0,0) -- (7.2,1.8) -- cycle ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ] [dash pattern={on 3pt off 1.5pt}] (41.67,262.5) -- (41.67,124.5) ;
\draw [shift={(41.67,122.5)}, rotate = 90] [fill={rgb, 255:red, 245; green, 166; blue, 35 } ,fill opacity=1 ][line width=0.08] [draw opacity=0] (7.2,-1.8) -- (0,0) -- (7.2,1.8) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=2.25] (218.34,122.16) -- (130.01,192.56) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=1 ] (128.08,192.56) .. controls (128.08,191.49) and (128.95,190.63) .. (130.01,190.63) .. controls (131.08,190.63) and (131.95,191.49) .. (131.95,192.56) .. controls (131.95,193.63) and (131.08,194.49) .. (130.01,194.49) .. controls (128.95,194.49) and (128.08,193.63) .. (128.08,192.56) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=1 ] (216.26,122.62) .. controls (216.26,121.55) and (217.13,120.68) .. (218.19,120.68) .. controls (219.26,120.68) and (220.13,121.55) .. (220.13,122.62) .. controls (220.13,123.68) and (219.26,124.55) .. (218.19,124.55) .. controls (217.13,124.55) and (216.26,123.68) .. (216.26,122.62) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=1 ] (77.69,192.32) .. controls (77.69,191.26) and (78.56,190.39) .. (79.63,190.39) .. controls (80.69,190.39) and (81.56,191.26) .. (81.56,192.32) .. controls (81.56,193.39) and (80.69,194.26) .. (79.63,194.26) .. controls (78.56,194.26) and (77.69,193.39) .. (77.69,192.32) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=2.25] (218.19,122.62) -- (79.63,192.32) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=0.4 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=0.3 ] (79.63,242.32) -- (218.19,222.62) -- (130.01,242.56) -- cycle ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ] [dash pattern={on 3pt off 1.5pt}] (241.83,262.5) -- (369.83,262.5) ;
\draw [shift={(371.83,262.5)}, rotate = 180] [fill={rgb, 255:red, 245; green, 166; blue, 35 } ,fill opacity=1 ][line width=0.08] [draw opacity=0] (7.2,-1.8) -- (0,0) -- (7.2,1.8) -- cycle ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ] [dash pattern={on 3pt off 1.5pt}] (241.83,262.5) -- (241.83,124.5) ;
\draw [shift={(241.83,122.5)}, rotate = 90] [fill={rgb, 255:red, 245; green, 166; blue, 35 } ,fill opacity=1 ][line width=0.08] [draw opacity=0] (7.2,-1.8) -- (0,0) -- (7.2,1.8) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=1 ] (328.08,242.56) .. controls (328.08,241.49) and (328.95,240.63) .. (330.01,240.63) .. controls (331.08,240.63) and (331.95,241.49) .. (331.95,242.56) .. controls (331.95,243.63) and (331.08,244.49) .. (330.01,244.49) .. controls (328.95,244.49) and (328.08,243.63) .. (328.08,242.56) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=1 ] (570.4,192.79) .. controls (570.4,191.72) and (571.27,190.86) .. (572.34,190.86) .. controls (573.4,190.86) and (574.27,191.72) .. (574.27,192.79) .. controls (574.27,193.86) and (573.4,194.72) .. (572.34,194.72) .. controls (571.27,194.72) and (570.4,193.86) .. (570.4,192.79) -- cycle ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ] [dash pattern={on 3pt off 1.5pt}] (431.67,262.5) -- (431.67,124.5) ;
\draw [shift={(431.67,122.5)}, rotate = 90] [fill={rgb, 255:red, 245; green, 166; blue, 35 } ,fill opacity=1 ][line width=0.08] [draw opacity=0] (7.2,-1.8) -- (0,0) -- (7.2,1.8) -- cycle ;
\draw [dash pattern={on 2.25pt off 1.5pt}] (520.01,242.56) -- (482.22,262.73) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=1 ] (518.08,192.56) .. controls (518.08,191.49) and (518.95,190.63) .. (520.01,190.63) .. controls (521.08,190.63) and (521.95,191.49) .. (521.95,192.56) .. controls (521.95,193.63) and (521.08,194.49) .. (520.01,194.49) .. controls (518.95,194.49) and (518.08,193.63) .. (518.08,192.56) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=2.25] (521.95,192.56) -- (572.34,192.79) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=1 ] (518.25,242.56) .. controls (518.25,241.49) and (519.11,240.63) .. (520.18,240.63) .. controls (521.25,240.63) and (522.11,241.49) .. (522.11,242.56) .. controls (522.11,243.63) and (521.25,244.49) .. (520.18,244.49) .. controls (519.11,244.49) and (518.25,243.63) .. (518.25,242.56) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=2.25] (572.34,192.79) -- (482.22,262.73) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=2.25] (572.34,192.79) -- (520.01,242.56) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=0.4 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=0.3 ] (520.18,242.56) -- (570.57,242.79) -- (482.22,262.73) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=2.25] (520.01,242.56) -- (482.22,262.73) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=2.25] (317.58,22.15) -- (279.63,142.32) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=0.6 ][line width=1.5] (279.63,142.32) -- (418.36,22.62) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=1 ] (277.69,142.32) .. controls (277.69,141.26) and (278.56,140.39) .. (279.63,140.39) .. controls (280.69,140.39) and (281.56,141.26) .. (281.56,142.32) .. controls (281.56,143.39) and (280.69,144.26) .. (279.63,144.26) .. controls (278.56,144.26) and (277.69,143.39) .. (277.69,142.32) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=1 ] (315.65,22.15) .. controls (315.65,21.08) and (316.52,20.22) .. (317.58,20.22) .. controls (318.65,20.22) and (319.52,21.08) .. (319.52,22.15) .. controls (319.52,23.22) and (318.65,24.08) .. (317.58,24.08) .. controls (316.52,24.08) and (315.65,23.22) .. (315.65,22.15) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=1 ] (366.04,22.38) .. controls (366.04,21.32) and (366.9,20.45) .. (367.97,20.45) .. controls (369.04,20.45) and (369.9,21.32) .. (369.9,22.38) .. controls (369.9,23.45) and (369.04,24.32) .. (367.97,24.32) .. controls (366.9,24.32) and (366.04,23.45) .. (366.04,22.38) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=0.6 ][line width=1.5] (279.63,142.32) -- (367.97,22.38) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=1 ] (480.29,262.73) .. controls (480.29,261.67) and (481.15,260.8) .. (482.22,260.8) .. controls (483.29,260.8) and (484.15,261.67) .. (484.15,262.73) .. controls (484.15,263.8) and (483.29,264.67) .. (482.22,264.67) .. controls (481.15,264.67) and (480.29,263.8) .. (480.29,262.73) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=2.25] (79.63,192.32) -- (130.01,192.56) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=1 ] (328.08,190.63) .. controls (328.08,189.56) and (328.95,188.69) .. (330.01,188.69) .. controls (331.08,188.69) and (331.95,189.56) .. (331.95,190.63) .. controls (331.95,191.69) and (331.08,192.56) .. (330.01,192.56) .. controls (328.95,192.56) and (328.08,191.69) .. (328.08,190.63) -- cycle ;
\draw [color={rgb, 255:red, 255; green, 255; blue, 255 } ,draw opacity=1 ][line width=3] (277.58,244.15) -- (317.58,222.15) ;
\draw [color={rgb, 255:red, 255; green, 255; blue, 255 } ,draw opacity=0 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=0.3 ] (317.58,222.15) -- (416.43,222.62) -- (330.01,242.56) -- (279.63,242.32) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=2.25] (520.18,192.56) -- (482.22,262.73) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][fill={rgb, 255:red, 255; green, 255; blue, 255 } ,fill opacity=1 ] (39.02,262.5) .. controls (39.02,261.04) and (40.2,259.85) .. (41.67,259.85) .. controls (43.13,259.85) and (44.32,261.04) .. (44.32,262.5) .. controls (44.32,263.96) and (43.13,265.15) .. (41.67,265.15) .. controls (40.2,265.15) and (39.02,263.96) .. (39.02,262.5) -- cycle ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][fill={rgb, 255:red, 255; green, 255; blue, 255 } ,fill opacity=1 ] (429.18,262.5) .. controls (429.18,261.04) and (430.37,259.85) .. (431.83,259.85) .. controls (433.3,259.85) and (434.48,261.04) .. (434.48,262.5) .. controls (434.48,263.96) and (433.3,265.15) .. (431.83,265.15) .. controls (430.37,265.15) and (429.18,263.96) .. (429.18,262.5) -- cycle ;
\draw [color={rgb, 255:red, 255; green, 255; blue, 255 } ,draw opacity=1 ][line width=6] (296.58,185.82) -- (305.17,179.85) ;
\draw [color={rgb, 255:red, 247; green, 185; blue, 83 } ,draw opacity=0 ][fill={rgb, 255:red, 216; green, 60; blue, 23 } ,fill opacity=0.4 ] (418.28,22.62) -- (329.93,242.56) -- (241.75,262.5) -- cycle ;
\draw [color={rgb, 255:red, 216; green, 60; blue, 23 } ,draw opacity=1 ][line width=1.5] (221.84,124.33) -- (45.48,264.21) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=2.25] (418.36,22.62) -- (330.01,242.56) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=2.25] (418.36,22.62) -- (330.01,142.56) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=1 ] (416.43,22.62) .. controls (416.43,21.55) and (417.29,20.68) .. (418.36,20.68) .. controls (419.43,20.68) and (420.29,21.55) .. (420.29,22.62) .. controls (420.29,23.68) and (419.43,24.55) .. (418.36,24.55) .. controls (417.29,24.55) and (416.43,23.68) .. (416.43,22.62) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=2.25] (317.58,22.15) -- (418.36,22.62) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=1 ] (328.08,142.56) .. controls (328.08,141.49) and (328.95,140.63) .. (330.01,140.63) .. controls (331.08,140.63) and (331.95,141.49) .. (331.95,142.56) .. controls (331.95,143.63) and (331.08,144.49) .. (330.01,144.49) .. controls (328.95,144.49) and (328.08,143.63) .. (328.08,142.56) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 74; blue, 74 } ,draw opacity=0.5 ][line width=2.25] (241.83,262.5) -- (330.01,142.56) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=2.25] (279.63,142.32) -- (330.01,142.56) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=2.25] (330.01,142.56) -- (330.01,242.56) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][fill={rgb, 255:red, 255; green, 255; blue, 255 } ,fill opacity=1 ] (239.18,262.5) .. controls (239.18,261.04) and (240.37,259.85) .. (241.83,259.85) .. controls (243.3,259.85) and (244.48,261.04) .. (244.48,262.5) .. controls (244.48,263.96) and (243.3,265.15) .. (241.83,265.15) .. controls (240.37,265.15) and (239.18,263.96) .. (239.18,262.5) -- cycle ;
\draw [color={rgb, 255:red, 216; green, 60; blue, 23 } ,draw opacity=1 ][line width=1.5] (575.34,195.47) -- (485.22,265.42) ;
\draw [color={rgb, 255:red, 98; green, 150; blue, 39 } ,draw opacity=1 ][line width=1.5] (417.56,18.68) -- (318.8,18.22) ;
\draw (132.01,194.03) node [anchor=north west][inner sep=0.75pt] [font=\tiny] {$( 1,1,1)$};
\draw (79.56,188.92) node [anchor=south east] [inner sep=0.75pt] [font=\tiny] {$( 0,1,1)$};
\draw (216.34,118.76) node [anchor=south east] [inner sep=0.75pt] [font=\tiny] {$( 2,2,2)$};
\draw (332.01,245.96) node [anchor=north west][inner sep=0.75pt] [font=\tiny] {$( 1,1,0)$};
\draw (275.69,138.92) node [anchor=south east] [inner sep=0.75pt] [font=\tiny] {$( 0,1,2)$};
\draw (313.65,18.75) node [anchor=south east] [inner sep=0.75pt] [font=\tiny] {$( 0,2,4)$};
\draw (332.01,145.96) node [anchor=north west][inner sep=0.75pt] [font=\tiny] {$( 1,1,2)$};
\draw (420.36,19.22) node [anchor=south west] [inner sep=0.75pt] [font=\tiny] {$( 2,2,4)$};
\draw (518.01,187.23) node [anchor=south east] [inner sep=0.75pt] [font=\tiny] {$( 1,1,1)$};
\draw (484.22,266.13) node [anchor=north west][inner sep=0.75pt] [font=\tiny] {$( 1,0,0)$};
\draw (576.27,189.39) node [anchor=south west] [inner sep=0.75pt] [font=\tiny] {$( 2,1,1)$};
\end{tikzpicture}
\caption{A triple of polytopes $\Delta^0=(\Delta^0_1,\Delta^0_2,\Delta^0_3)$ in $\R^3$ obtained from Example~\ref{ex:rgamma}.}\label{fig:three_polytopes}
\end{figure}
\begin{example}\label{exp:possibly-origin}
Figure~\ref{fig:three_polytopes} represents a triple $\Delta^0$ of polytopes in $\R^3$. The face $(\Gamma_1,\Gamma_2,\Gamma_3)$ traced in red is strictly pre-origin dicritical. So is the face traced in green. The face obtained by intersecting $\Sigma\Delta^0$ with the horizontal coordinate plane is origin and not dicritical.
\end{example}
Let $K$ be an algebraically closed field of characteristic zero, and let $f$ be a polynomial in $K[z_1,\ldots,z_n]$. Then $f$ is expressed as a linear combination
\[
\sum_{a\in A} c_a z^a
\]
of monomials $z^a:=z_1^{a_1}\cdots z_n^{a_n}$, where $A$ is a finite subset of $\N^n$, and $c_a\in{\!K}\setminus 0$. We call $A$ the \emph{support} of $f$, and its \emph{Newton polytope} is the convex hull of $A$ in $\R^n$. If $\sigma$ is a subset of $A$, the \emph{restriction of $f$ to $\sigma$}, denoted by $f_{|\sigma}$, is the polynomial $\sum_{a\in\sigma}c_az^a$. The notation $\VKa(f)$ will refer to the zero locus $\{z\in \bT~|~f(z)=0\}$. Now, if $f$ is a tuple of polynomials $f_1,\ldots,f_k\in K[z_1,\ldots,z_n]$, we use the same notation $\VKa(f)$ for the intersection $\VKa(f_1)\cap\cdots\cap \VKa(f_k)\subset \bT$.
Let $A:=(A_1,\ldots,A_n)$ be a tuple of subsets in $\N^n\setminus\{\unze\}$, and let $\Delta:=\big(\Delta_1,\ldots,\Delta_n\big)$ be the tuple where $\Delta_i$ is the convex hull of $A_i$ ($i=1,\ldots,n$). Recall that $K[A]$ refers to the space of all tuples of poloynomials supported on $A$, and let $f:=(f_1,\ldots,f_n)$ be a tuple in $K[A]$.
\begin{notation}\label{not:face-restrictions}
For any $\Gamma\prec\Delta$, we use $f_{i\Gamma}$ ($i=1,\ldots,n$) to denote the restricted polynomial $f_{i|\Gamma_i\cap A_i}$. The tuple $ (f_{1\Gamma},\ldots,f_{n\Gamma})$ is denoted by $f_\Gamma$, and for any subset $I\subset [n]$, we use the notation
\[
f_{I\Gamma}:=(f_{i\Gamma})_{i\in I}.
\]
\end{notation}
\subsection{Face-resultants for almost face-generic maps}\label{sub:pol-restricted}
Let $f:=(f_1,\ldots,f_n):K^n\to K^n$ be a dominant polynomial map. Let $\Delta^0(f)$ denote the tuple formed by the Newton polytopes of $(f_1,\ldots,f_n)$ after adding a generic constant to each polynomial. That is, if $A:=(A_1,\ldots,A_n)$ is the support of $f$, then $\Delta^0\!:=\Delta^0(f)$ coincides with the tuple $(\Delta^0_1,\ldots,\Delta^0_n)$ of polytopes in $\Rnn$ defined as
\begin{equation}\label{eq:delta_0}
\Delta_i^0:=\conv\big(\unze\cup\! A_i\big)~\text{for } i =1,\ldots,n.
\end{equation}
\begin{definition}\label{def:face-generic}
The tuple $f$ is said to be \emph{almost face-generic} if for any $\Gamma\prec\Delta^0$ the following three conditions hold:
\begin{enumerate}[topsep=0mm,itemsep=0mm,label=(\alph*),ref=(\alph*)]
\item\label{it:vg_not_vgprime} for any $\Gamma'\prec\Delta^0$ with $\Gamma'\neq \Gamma$ and $\VKa(f_{\Gamma'})\neq \emptyset$, it holds $\VKa(f_{\Gamma})\neq \VKa(f_{\Gamma'})$ ,
\item\label{it:vgi_smooth} for any $I\subset [n]$, the set $\VKa(f_{I\Gamma})$ is a smooth intersection that satisfies
\begin{equation}\label{eq:def:Newton}
\VKa(f_{I\Gamma})\neq\emptyset\Leftrightarrow |I|-\dim \sum_{i\in I}\Gamma_i\leq 0,
\end{equation}
\item\label{it:coordinate_not_non-prop} for any coordinate hyperplane $H$ of $K^n$, it holds $\dim \cS(f)\cap f(H) \leq n-2$.
\end{enumerate}
\end{definition}
\begin{proposition}\label{prp:face-generic-open}
Almost face-generic tuples form a Zariski open subset of $K[A]$.
\end{proposition}
\begin{proof}
Let $\Omega_a$, $\Omega_b$, and $\Omega_c$ be the three subsets consisting of tuples in $K[A]$ satisfying conditions~\ref{it:vg_not_vgprime},~\ref{it:vgi_smooth} and~\ref{it:coordinate_not_non-prop} respectively.
It is enough to show that each of these sets is Zariski open in $K[A]$.
Concerning~\ref{it:vg_not_vgprime}: Up to re-enumeration of indexes, we have $\Gamma_1\neq \Gamma'_1$. For any $a$ in $\Gamma_1\setminus\Gamma_1'$ (the case $a\in \Gamma_1'\setminus\Gamma_1$ is analogous), consider the monomial term $cz^a$ appearing in a tuple $f_\Gamma$, for some $f\in K[A] $. Clearly,
there are at most finitely-many values of $c\in K$ satisfying $\VKa(f_{\Gamma})=\VKa(f_{\Gamma'})$. The latter are given as roots of univariate polynomials. Since this holds true for any choice of $f$, we conclude that $\Omega_a$ is Zariski open in $K[A]$.
Concerning~\ref{it:vgi_smooth}: Consider the projection $P_{I\Gamma}:Z_{I\Gamma}\subset \bT\times K[A]\to K[A]$, where $Z_{I\Gamma}:=\{(z,f)~|~f_{I\Gamma}=\unze \}$. Here, $\Crit P_{I\Gamma} $ forms the collection of all $(z,f)$ for which $\VKa(f_{I\Gamma})$ is not smooth at $z\in\bT$. Bertini-Sard Theorem applied to each $I\subset [n]$ implies that $K[A]\setminus P_{I\Gamma}(\Crit P_{I\Gamma})$ is Zariski open in $K[A]$.
Concerning Equation~\eqref{eq:def:Newton}: The system $f_{I\Gamma} = \unze$ having a solution in $\bT$, implies that $f$ lies in the \emph{multivariate resultant} $\Res_{I\Gamma}\subset K[A]$ corresponding to $\Gamma$ (see~\cite{GKZ94}). This is the set of all tuples $f$ such that $f_{I\Gamma} = \unze$ has a solution in $\bT$. The resultant is an algebraic set in $K[A]$, satisfying the following well-known equality (see also~\cite{St94,Est10})
\begin{equation}\label{eq:resultants}
\cdim \Res_{I\Gamma} = \max_{J\subset I}\big(|J|-\dim \sum_{i\in J}\Gamma_i\big).
\end{equation} Since $\Gamma$ is a proper face of $\Delta^0$, the corresponding resultant belongs to a hypersurface in $K[A]$.
Hence $\Omega_b$ being Zariski open follows from $\Delta^0$ having finitely-many proper faces.
Concerning~\ref{it:coordinate_not_non-prop}: For this proof, we consider the space $M:=K[A_1\cup \{0\},\ldots,A_n\cup \{0\}]$. Similarly to the above item, let $Z$ be the set $\{(z,f)~|~f=\unze \}$, and consider the projection $ \bT\times M\to M$. Let $\mathsf{T}$ be the toric compactification of $\bT$, compatible with $A$ (e.g. the one considered in~\cite[\S4.1]{Est13}), we denote by $\overline{Z}$ the closure of $Z$ inside $\mathsf{T}\times M$, and by $\overline{P}$ the extension of $P$ to $\overline{Z}$ so that $\overline{P}_{|Z} = P$. The boundary $\partial \overline{Z}$ is a normal crossing divisor on $\overline{Z}$ formed by irreducible components $D_1,\ldots,D_r$.
For any tuple $f\in M$, consider the embedding $\eta_f:\bT\hookrightarrow M$ sending $f(K^n)$ onto the linear subspace $L_f:=\{f+c~|~c\in \bT\}$. Then, the Bertini-Sard Theorem shows that there is a Zariski open subset $\cO\subset M$ in which any $f\in \cO$, the set $L_f$ is transversal to the image of each stratum $\overline{P}(D_1),\ldots,\overline{P}(D_r) $ of $\overline{P}(\partial \overline{Z})$. Furthermore, since $\mathsf{T}$ is a compactification of $\bT$, for any $f\in\Omega_c$, the images $\eta_f(\cS(f)),\eta_f(f(\cH))\subset L_f\cap \overline{P}(\partial \overline{Z})$.
To finish the proof, recall that the compactification is toric. Then, each component in the divisor $D\subset \partial \overline{Z}$ corresponds to a face $\Gamma\prec \Delta^0$. Hence, since $f\in \Omega_c$, any top-dimensional stratum $S$ of $\overline{P}(\partial \overline{Z})\cap L_f$ cannot be shared by both $\eta_f(\cS(f))$ and $\eta_f(f(\cH))$. Therefore, $\cS(f)$ and $f(\cH)$ do not share maximal-dimensional components. Therefore, we choose $\Omega_c$ to be the image of $\cO$ under the projection $M\to K[A]$ by removing the constant terms of any tuple $f\in M$.
\end{proof}
\begin{definition}\label{def:r-star-gamma}
Let $\Gamma$ be a proper face of $\Delta^0$, and let $X_\Gamma$ denote the set
\[
\left\{(z,w)\in \bT\times \bT~\left|~(f(z)-w)_\Gamma =0\right\}\right. .
\] The \emph{face-resultant} of the map $f$ at the face $\Gamma$, denoted by $\cR_{\Gamma}(f)$, is the image in $\TKn$ of $X_\Gamma$ under the projection $\pi:~(z,w)\mapsto w$.
\end{definition}
\begin{example}\label{ex:rgamma}
Let $f$ be the below triple of polynomials in three variables $a,b,c$, defined over the field $\K$ of generalized Puiseux series in $t$:
\begin{equation}\label{eq:main_example3}
\begin{array}{ll}
f_1:= & abc + ~ bc +~a^2b^2c^2,\\[4pt]
f_2:= & ab +~ abc^2+~t^7~bc^2+~t^3~b^2c^4+~t^2~ab^2c^4+~t^5~a^2b^2c^4,\\[4pt]
f_3:= & t~a +~ ab+~abc+~a^2bc.
\end{array}
\end{equation} The triple of polytopes $\Delta^0$ in Figure~\ref{fig:three_polytopes} correspond to~\eqref{eq:main_example3}. If $\Gamma\prec\Delta^0$ is the triple in Figure~\ref{fig:three_polytopes}, so that $\Gamma_1=\Delta_1^0$ (highlighted in green), then $\crsg(f)$ is the surface defined by the below polynomial in $\K[u,v,w]$:
\begin{multline*}
t^4( -2 +4t +t^3)+~t(1 -2t -4t^3 +6t^4+2t^6)~u +~t^3( -2 +3t+4 t^2+t^3)~w \\
+~t(1-2t +t^2 -2t^3 +2t^4 +t^6)~u^2
+ (1 -2t -t^2 -2t^3 +8t^5 +t^6)~uw\\
+~t^3( -1 +4 t +t^2 -2t^3 +4t^4 + t^6)~w^2 +~2t(-1 +t^3 +t^4 -t^6 )~uw^2 +~t^4(1 -t^2 +4t^3 )~w^3 +~t^7~w^4.
\end{multline*} This equation is obtained by introducing new variables $(r,s):= (bc,~a)$, and computing
\[
\langle rs + r + s^2r^2 -~u,~t+s + t^3~s^2,~s + rs+s^2r -w,\rangle\cap \Bbbk[u,v,w].
\] If $\Gamma$ is the triple of faces highlighted in red (i.e. $\Gamma_2$ is spanned by the vectors $(1,1,2)$ and $(1,1,0)$), for example, then $\crsg(f)$ is the hyperplane defined by the polynomial $t^2 - t - u$, whose equation is obtained by introducing new variables $(r,s):= (ab,~c)$, and computing the elimination ideal $
\langle rs + r^2s^2 -~u,~r +rs^2 + t^5r^2s^4 - ~v,~ t + rs - ~w \rangle\cap \Bbbk[u,v,w].$
\end{example}
We finish this part by proving two technical properties for the face-resultants.
\begin{lemma}\label{lem:proj-codim>1}
Assume that $f$ is almost face-generic, and let $\Gamma$ be a proper face of $\Delta^0$. Then, the face-resultant $\crsg(f)$ is empty if $\Gamma$ is not pre-origin, and $\dim\crsg(f)\leq n-1$ otherwise. Furthermore, for any other proper face $\Gamma'$ of $\Delta^0$, it holds $\dim\crsg(f)\cap\cR_{\Gamma'}(f)\leq n-2$.
\end{lemma}
\begin{proof}
If $\Gamma$ is not pre-origin, then for any $w\in \bT$, it holds $(f-w)_\Gamma = f_\Gamma $. Equation~\eqref{eq:def:Newton} of Definition~\ref{def:face-generic} shows that $X_\Gamma=\emptyset$, and thus so its projection under $\pi$.
Let $\Gamma$ be a pre-origin face. Now, we show that $\dim\crsg(f)\leq n-1$. Note that if $\dim X_\Gamma\leq n-1$, then $\dim \pi(X_\Gamma)\leq n-1$ and we are done. Assume in what follows that $\Gamma$ is pre-origin, and that $\dim X_\Gamma \geq n$. Then, Definition~\ref{def:face-generic}:\ref{it:vgi_smooth} shows that $\dim X_\Gamma = n$. Since $\Gamma$ is a face of $\Delta^0$, up to multiplying each polynomial by an appropriate monomial, for any $w\in \bT$, the system $(f-w)_\Gamma =\unze$ is formed by quasi-homogeneous polynomials in $z$. Consequently, the fibers under the map $\pi_{|X_\Gamma}:X_\Gamma\to\pi(X_\Gamma) $ have positive dimension $d$. Since $\dim X_\Gamma \geq \dim \pi(X_\Gamma) + d $, we deduce that $\dim\crsg(f)=\dim \pi(X_\Gamma)\leq n-1$. This yields the proof of the first part of the Lemma.
Now we show that $\dim\crsg(f)\cap\cR_{\Gamma'}(f)\leq n-2$. By contradiction, assume that $\crsg(f)$ and $\cR_{\Gamma'}(f)$ share an $(n-1)$-dimensional component. Since $f$ is almost face-generic, both $X_\Gamma$ and $X_{\Gamma'}$ are smooth, and thus irreducible. Consequently we obtain $\crsg(f) =\cR_{\Gamma'}(f)$. Recall that $\pi$ has fibers of positive dimension when restricted to either $X_\Gamma$ or $X_{\Gamma'}$. Therefore, the equality
\[
\dim\cR_\Gamma(f) =\dim\cR_{\Gamma'}(f) =n-1
\] implies that $X_\Gamma =X_{\Gamma'}$. This contradicts Definition~\ref{def:face-generic}~\ref{it:vg_not_vgprime} as $f$ is almost face-generic and $\Gamma\neq\Gamma'$.
\end{proof}
\begin{remark}\label{rem:crstar-resultants}
Lemma~\ref{lem:proj-codim>1} can be proven using known results on multivariate resultants and the set $L_f\subset K[A]$ introduced in the proof of Proposition~\ref{prp:face-generic-open}:
Up to perturbations, the set $L_f\cap\Res_\Gamma$ is a complete intersection. Its codimension inside $L_f$ is equal to the right-hand-side of~\eqref{eq:resultants}. The first statement of Lemma~\ref{lem:proj-codim>1} can be deduced from the fact that the canonical embedding $f(\TKn) \hookrightarrow L_f$ sends $\crsg(f)$ onto $L_f\cap\Res_\Gamma$.
Its second statement can be deduced from other known properties of resultants (see e.g.~\cite[Lemma 2.31]{Est13}).
\end{remark}
Let $\cH$ denote the union of coordinate hyperplanes in $K^n$.
\begin{lemma}\label{lem:resultant_disjoint_from_coordinate}
Let $\Gamma$ be a dicritical face of $\Delta^0$, and let $f\in K[A]$ be almost face-generic. Then, it holds
\[
\dim \cR_\Gamma(f)\cap f(\cH) \leq n-2.
\]
\end{lemma}
\begin{proof}
Let $H$ be a coordinate hyperplane of $K^n$. Then, we have $f(H)=\cR_{\Gamma'}(f)$ for the face $\Gamma'$ of $\Delta^0$ satisfying $\Sigma\Gamma'\subset H$. If $\Gamma'\neq \Gamma$, then the result follows from Lemma~\ref{lem:proj-codim>1}.
Assume that $\Gamma = \Gamma'$. We show that $\dim\crsg(\Gamma)\leq n-2$. Since $\Gamma$ is dicritical satisfying $\Sigma\Gamma\subset H$, we deduce that $\dim\Sigma\Gamma\leq n-2$. Indeed, a dicritical face cannot be spanned by a vector $-e_i$ from the canonical basis $(e_1,\ldots,e_n)$ of $\R^n$. Then, one can perform a change of coordinates $z\to x$ so that $f_\Gamma$ is written as a tuple $g$ of polynomials $g_1,\ldots,g_n\in K[x_1,\ldots,x_k]$, where $k:=\dim \Sigma\Gamma$ (c.f.~\cite{Ber75} or~\cite[\S 4]{Kho16}). This implies that the set of all $w\in \bT$ for which $f - w =\unze$ has a solution in $\bT$ coincides with the set of all $w$ for which $g - w =\unze$ has a solution in $(K\setminus 0)^k$. The latter is the image under the map $g:(K\setminus 0)^k\to \bT$. This image has dimension at most $k\leq n-2$, and coincides with $f(H)$.
\end{proof}
\subsection{Topological degree of a map}\label{sub:Bernstein} If $\Delta$ is a convex body in $\R^n$, we use $\Vol_n(\Delta)$ to denote its Euclidean volume. Let $\Delta_1,\ldots,\Delta_n$ be $n$ convex bodies in $\R^n$. Then the classical notion of \emph{mixed volume} of $\Delta_1,\ldots,\Delta_n$ is defined as
\[
V(\Delta_1,\ldots,\Delta_n):=\frac{1}{n!}\sum_{k=1}^n(-1)^{k+n}\sum_{i_1<\cdots<i_k}\Vol_n(\Delta_{i_1}+\cdots+\Delta_{i_k}),
\] where the summation between polytopes is the Minkowski sum. For example, if $n=2$, we have
\[
V(\Delta_1,\Delta_2)=\Vol_2(\Delta_1+\Delta_2) - \Vol_2(\Delta_1) - \Vol_2(\Delta_2).
\]
We have the following well-known version of Bernstein's Theorem~\cite{Ber75} (see e.g.~\cite{rojas1999toric}).
\begin{theorem}\label{th:Bernstein}
Let $g_1,\ldots,g_n$ be polynomials in $n$ variables $K[z_1,\ldots,z_n]$, such that $V(\Delta_1,\ldots,\Delta_n)\neq 0$, where $\Delta_1,\ldots,\Delta_n$ denote their respective Newton polytopes in $\R^n$, and let $I^*(g)$ denote the number of isolated solutions in $\VKa(g)$, counted with multiplicities. Then, it holds $I^*(g) \leq V(\Delta_1,\ldots,\Delta_n)$, with equality if and only if $g_\Gamma = \unze$ does not have solutions in $\bT$ for any face $\Gamma$ of $\Delta$.
\end{theorem}
Bernstein's theorem determines the topological degree of almost face-generic polynomial maps.
\begin{lemma}\label{lem:preimages}
Let $f$ be a dominant almost face-generic map. Then, there exists a Zariski open subset $W\subset \bT$ containing all $w\in W$ for which the preimage $f^{-1}(w)$ is contained in $\bT$, and has exactly $V(\Delta^0)$ isolated points counted with multiplicities.
\end{lemma}
\begin{proof}
Take $W=f(\bT)\cap (\cR\cup \cS(f))$, where $\cR$ is the union of all face-resultants of $f$. Recall that $f$ is dominant, and the Jelonek set is a hypersurface~\cite{Jel93}. These facts, together with Proposition~\ref{prp:face-generic-open}, imply that $W$ is Zariski open in $\bT$. Since $w\in f(\bT)$, we get $f^{-1}(w)\subset \bT$. By definition, the map is finite outside $\cS(f)$, and thus has a constant number of preimages (counted with multiplicities) $\mu(f)$ that is independent of $w\not\in\cS(f)$ (see e.g.~\S\ref{sub:int:main-res}). In the notation of Theorem~\ref{th:Bernstein}, this shows that $\mu(f) = I^*(f-w)$. Finally, Theorem~\ref{th:Bernstein} shows that for any $w\in W$, it holds $ I^*(f-w)= V(\Delta_1,\ldots,\Delta_n)$, and we are done.
\end{proof}
\subsection{The Jelonek set and face-resultants}\label{sub:non-prop_resultants} We finish this section by proving that the Jelonek set of a map is the union of its face-resultants.
\begin{notation}\label{not:dicritical_set}
For any tuple $\Delta$ of polytopes in $\R^n$, we use $\sF_{\! D}(\Delta)$ to denote the set of all its dicritical faces.
\end{notation}
\begin{proposition}\label{prop:algebraic_correspondence}
Let $f: K^n\to \TKn$ be an almost face-generic map, and let $\Delta^0:=\Delta^0(f)$. Then, it holds
\begin{equation}\label{eq:non-properness=crsg}
\cS(f) = \bigcup_{\Gamma \in\FDinf} \cR_\Gamma(f).
\end{equation}
\end{proposition}
\begin{proof} Recall that $\dim \cS(f) = n-1$ (c.f.~\cite{Jel93}) and $f(K^n)=f(\TKn)\cup f(\cH)$. Then it is enough to show
\begin{equation}\label{eq:alg-corr-1}
\cS(f) \cap f(\TKn) = \bigcup_{\Gamma \in\FDinf}\cR_\Gamma(f)\cap f(\TKn).
\end{equation} This is so thanks to Lemma~\ref{lem:resultant_disjoint_from_coordinate} and Definition~\ref{def:face-generic}~\ref{it:coordinate_not_non-prop}. Indeed, the Zariski closures of the left hand side and the right hand side in the equation~\eqref{eq:alg-corr-1} coincide with their respective analogues in~\eqref{eq:non-properness=crsg}. We only show the inclusion ``$\subset$'' in~\eqref{eq:alg-corr-1} as the other one follows the same steps in reverse.
Let $w\in \cS(f)\cap f(\TKn)$, and let $\mu(f)$ denote the topological degree of $f$. Then, the preimage $f^{-1}(w)$ has less than $\mu(f)$ isolated points in $\bT$ counted with multiplicity. Lemma~\ref{lem:preimages} shows that the number of these preimages is less than $V(\Delta^0(f))$. Then, Theorem~\ref{th:Bernstein} shows that $(f-w)_\Gamma=\unze$ has a solution in $\bT$ for some face $\Gamma$ of $\Delta^0$. This implies that $w\in\crsg(f)$. If $\Gamma$ is not dicritical, then $\crsg(f)\subset f(\cH)$, where $\cH$ is the union of coordinate hyperplanes in $K^n$. Since $w\not\in f(\cH)$, we conclude that $\Gamma$ is dicritical.
\end{proof}
\subsection{Uniruledness} We recall that a set $S\subset \TKn$ is \emph{$K$-uniruled} if for any $w\in S$, there exists a polynomial map $\varphi:\K\to\TKn$ with $\varphi(0) = w$, and $\varphi(\K) \subset\cS(f)$.
\begin{corollary}\label{cor:k-uniruled}
The Jelonek set of any almost face-generic polynomial map $f: K^n\to \TKn$ is $K$-uniruled.
\end{corollary}
\begin{proof}
We retain the notation for $f$ of Proposition~\ref{prop:algebraic_correspondence}. Thanks to~\eqref{eq:non-properness=crsg}, it is enough to show $K$-uniruledness of $\cR_\Gamma(f)$ for each pre-origin face $\Gamma$ of $\Delta^0$. If $\Gamma$ is strictly pre-origin, then $\cR_\Gamma(f)$ is the intersection of $\TKn$ with a set of the form $K^{r}\times X$, where $X$ is an algebraic subset of $K^{n-r}$ (see Definition~\ref{def:r-star-gamma}). Hence, the sets $\cR_\Gamma(f)$ are $K$-uniruled whenever $\Gamma$ is strictly pre-origin.
Assume now that $\Gamma$ is an origin-face of $\delta^0$. Then, Definition~\ref{def:r-star-gamma} shows that $\cR_\Gamma(f)=f_\Gamma(\TKn)$. For every $w\in\cS(f)$, consider the line $L$ given by the parametrization $z_i(t) = t-p_i$ ($i=1,\ldots,n$), where $f_\Gamma(p_1,\ldots,p_n) = w$. Then, the polynomial map $\varphi:=f_\Gamma(z_1(\cdot),\ldots,z_n(\cdot)):K\to\cS(f)$ is well-defined and satisfies $\varphi(0) = w$.
\end{proof}
\section{Preliminaries on tropical geometry}\label{sec:prel} We state in this section some well-known facts about tropical geometry (see e.g.~\cite{BIMS15,richter2005first,MS15}, and the references therein). Some of the exposition and notations here are taken from~\cite{Br-deMe11,BB13,EH18}. We will introduce in \S\ref{sub:base-field} some tropical objects such as tropical hypersurfaces, and illustrate their relation to their classical analogues. A key result in this section is Propositon~\ref{prop:mixed_subd} which relates the common intersection of tropical hypersurfaces to decompositions of the Newton polytopes and their faces.
\subsection{The base field}\label{sub:base-field} A \emph{locally convergent generalized Puiseux series} is a formal series of the form
\[
c(t)=\underset{r\in R}{\sum} c_rt^r,
\] where $R\subset\mathbb{R}$ is a well-ordered set that is bounded from below, for which all $c_r\in\mathbb{C}$. We denote by $\K$ the set of all locally convergent generalized Puiseux series. It is an algebraically-closed field of characteristic 0~\cite{markwig2009field}. The field $\K$ can be equipped with the function
\[
\begin{array}{lccc}
\displaystyle \val: & \mathbb{K} & \longrightarrow & \mathbb{R}\cup\{-\infty\} \\
\displaystyle \ & 0 & \longmapsto & -\infty \\
\displaystyle \ & \underset{r\in R}{\sum} c_rt^r\neq 0 & \longmapsto & -\min_R\{r\ |\ c_r\neq 0\}.
\end{array}
\]
We will call $\val$ the \emph{valuation function} or simply, \emph{valuation}. This extends to a map $\Val:\K^n\rightarrow(\mathbb{R}\cup\{-\infty\})^n$ by evaluating $\val$ coordinate-wise, i.e. $\Val(z_1,\ldots , z_n)=(\val(z_1),\ldots , \val(z_n))$.
\begin{remark}
In the standard literature (c.f.~\cite{efrat2008valuations}), the valuation of an element in $\K$ is defined as $-\val$. Our choice for it to be the opposite was motivated by some of the conventions in tropical geometry.
\end{remark}
Given a a polynomial $f\in\K[z_1,\ldots,z_n]$, its \emph{tropical hypersurface}, denoted by $\VT(f)$, is the subset in $\R^n$ defined as $\Val(\VKb (f))$. Tropical hypersurfaces can be determined combinatorially.
Consider the function
\begin{equation}\label{eq:nuf}
\begin{array}{lccc}
\displaystyle \nu_f: & \mathbb{Z}^n & \longrightarrow & \mathbb{R}\cup\{-\infty\} \\
\displaystyle \ & a & \longmapsto & \begin{cases}
\val(c_a), & \text{if $ a\in A$,} \\
-\infty, & \text{otherwise.}
\end{cases} \\
\end{array}
\end{equation}
Its \emph{Legendre transform} is a piecewise-linear convex function $ \mathcal{L}(\nu_f): \R^n\to\R$
\[
x\mapsto \max_{a\in A}\{\langle x, a\rangle + \nu_f(a)\},
\] where $\langle ~,~\rangle:~\R^n\times\R^n\rightarrow\R$ is the standard Eucledian product. The set of points $p\in\R^n$ at which $\mathcal{L}(\nu_f)$ is not differentiable is called the \emph{corner locus} of $\mathcal{L}(\nu_f)$. We have the famous fundamental theorem of tropical geometry~\cite{MKL06},~\cite[Theorem 3.13]{MS15} that was first announced by Kapranov.
\begin{theorem}[Kapranov]\label{th:Kapranov}
The tropical hypersurface $\VT (f)$ of a polynomial $f$ defined over $\K$ is the corner locus of its Legendre transform $\mathcal{L}(\nu_f)$.
\end{theorem}
\subsection{Subdivisions from tropical polynomials}\label{subs:tropical_polynomials} For any two values $a,b\in\mathbb{T}:=\R\cup\{-\infty\}$, their \emph{tropical summation} $a\oplus b$ is defined as their maximum $\max (a,b)$, and their \emph{tropical multiplication} $a \otimes b$ is their usual sum $a+b$. This gives rise to a \emph{tropical semi-field} $(\mathbb{T},\oplus ,\otimes)$, where $\max(a,-\infty) = a$, and $ -\infty + a = -\infty$. A \emph{tropical polynomial} $F$ is defined over the semifield $(\mathbb{T},\oplus ,\otimes)$, which gives rise to a function
\[
\begin{array}{lccc}
F: & \mathbb{T}^n & \longrightarrow & \mathbb{T} \\
& x & \longmapsto &\displaystyle \max_{a\in A}\{\langle x, a\rangle + \gamma_a\}, \\
\end{array}
\] where $A$ is a finite set containing all $a\in\N^n$ for which $\gamma_a\in\R$. The set $A$ is called the \emph{support} of the tropical polynomial $F$, and the linear terms appearing in $F$ are called the \emph{tropical monomials}.
The \emph{tropicalization} of the polynomial $f$ above is the tropical polynomial
\[
f^{\trop}(x):=\max_{a\in A}\{\langle x, a\rangle +\val(c_a)\}.
\] This coincides with the piecewise-linear convex function $\mathcal{L}(\nu_f)$ defined above, and thus Theorem~\ref{th:Kapranov} asserts that $\VT(f)$ is the corner locus of $f^{\trop}$. Conversely, the corner locus of any tropical polynomial is a tropical hypersurface.
\subsubsection{Regular polyhedral cell-decompositions}\label{subsub:subdivisions} All polytopes in this paper are assumed to be convex.
\begin{definition}\label{def:polyh-subdiv}
A \emph{polyhedral subdivision} of a polytope $\Delta\subset\R^n$ is a set of polytopes $\{\Delta_i\}_{i\in I}$ satisfying $\cup_{i\in I}\Delta_i=\Delta$, and if $i,j\in I$, then $\Delta_i\cap\Delta_j$ is either empty or it is a common face of $\Delta_i$ and $\Delta_j$.
\end{definition}
\begin{definition}\label{def:Regular}
Let $\Delta$ be a polytope in $\R^n$ and let $\tau$ denote a polyhedral subdivision of $\Delta$ consisting of polytopes. We say that $\tau$ is \emph{regular} if there exists a continuous, convex, piecewise-linear function $\varphi:\Delta\rightarrow \R$ such that the polytopes of $\tau$ are exactly the domains of linearity of $\varphi$.
\end{definition}
Let $\Delta$ be an integer polytope in $\R^n$ and let $\varphi:~\Delta~\cap~\mathbb{Z}^n\rightarrow \R$ be a function. We denote by $\hat{\Delta}(\varphi)$ the convex hull of the set
\[
\{(a,~\varphi(a))\in\R^{n+1}~|~a\in\Delta\cap\mathbb{Z}^n\}.
\] Then the polyhedral subdivision of $\Delta$ induced by projecting the union of the lower faces of $\hat{\Delta}(\varphi)$ onto the first $n$ coordinates, is regular.
\begin{example}\label{ex:subdivision}
The blue part of the second polytope, $\Delta^0_2$, appearing in Figure~\ref{fig:three_polytopes} is also a convex polytope. It admits a regular subdivision induced by the function $\varphi$ satisfying $\varphi(1,1,0) = \varphi(1,1,2) = 0$, $\varphi(0,1,2) = 7$, $\varphi(0,2,4) = 3$, $\varphi(1,2,4) = 2$, and $\varphi(2,2,4) = 5$.
\end{example}
\subsubsection{Subdivisions and their duals}\label{subsub:subdivisions2}
Keeping with the same notation as above, the tropical hypersurface $\VT(f)$ is an $(n-1)$-dimensional piecewise-linear polyhedral complex which produces a \emph{polyhedral cell-decomposition} $\Xi$ of $\R^n$.
This is a finite collection of the relative interiors of polyhedra in $\R^n$, whose closures satisfy Definition~\ref{def:polyh-subdiv}.
An element of $\Xi$ is called \emph{cell}. The $n$-dimensional cells of $\Xi$, are the connected components of the complement of $\VT(f)$ in $\R^n$.
All together, cells of dimension less than $n$ form the domains of linearity of $f^{\trop}$ at $\VT(f)$.
The cell-decomposition $\Xi$ induces a regular subdivision $\tau$ of the Newton polytope $\Delta$ of $f$ in the following way (see also~\cite[Section 3]{BB13}). Given a cell $\xi$ of $\VT(f)$ and $x\in\xi$, the set
\[
\mathcal{I}_{\xi}:=\{a\in A~|~f^{\trop}(x)=\langle x,a\rangle + \val(c_a)\}
\] does not depend on $x$. All together the polyhedra $\delta$, defined as the convex hull of $\mathcal{I}_{\xi}$ form a subdivision $\tau$ of $\Delta$ called the \emph{dual subdivision}, and the polyhedron $\delta$ is called the \emph{dual} of $\xi$. The subdivision $\tau$ is regular as the corresponding function $\varphi$ in Definition~\ref{def:Regular} is the same as $\nu_f$ in~\ref{eq:nuf} (c.f. Example~\ref{ex:subdivision}).
An analogous description holds true for any tuple $f$ of polynomials
$f_1,\ldots,f_k\in\mathbb{K}[z_1,\ldots,z_n]$. Let $A_1,\ldots,A_k\subset\mathbb{Z}^n$, $\Delta_1,\ldots,\Delta_k\subset\R^n$, and $T_1,\ldots,T_k\subset\R^n$ be their respective supports, Newton polytopes, and tropical hypersurfaces respectively. The union of these latter defines a polyhedral cell-decomposition $\Xi$ of $\R^n$. Any non-empty cell of $\Xi$ can be written as
\[
\xi=\xi_1\cap\cdots\cap \xi_k
\] with $\xi_i\in\Xi_i$ ($i=1,\ldots,k$), where $\Xi_i$ is the polyhedral cell-decomposition of $\R^n$ produced by $T_i$. Any cell $\xi\in\Xi$ can be uniquely written in this way. Similarly, the polyhedral cell-decomposition induces a \emph{mixed dual subdivision} $\tau$ of the Minkowskii sum $\Delta=\Delta_1 +\cdots+\Delta_k$ in the following way. Any polytope $\delta\in\tau$ is equipped with a unique representation $\delta=\delta_1+\cdots+\delta_k$ with $\delta_i\in\tau_i$ ($i=1,\ldots,k$), where each $\tau_i$ is the dual subdivision of $\Delta_i$. The above duality-correspondence applied to the (tropical) product of the tropical polynomials gives rise to the following well-known fact (see e.g.~\cite[\S3~\&~4]{BB13}).
\begin{proposition}\label{prop:mixed_subd}
There is a one-to-one duality correspondence between $\Xi$ and $\tau$, which reverses the inclusion relations, and such that if $\delta\in\tau$ corresponds to $\xi\in\Xi$, then
\begin{enumerate}[topsep=0mm,itemsep=0mm,label=(\arabic*),ref=(\arabic*)]
\item\label{it:inters=sum} $\xi=\xi_1\cap\cdots\cap\xi_k$ with $\xi_i\in\Xi_i$ for $i=1,\ldots,n$, then $\delta = \delta_1 +\cdots+ \delta_k$ with $\delta_i\in\tau_i$ is the polytope dual to $\xi_i$.
\item\label{it:dimens-compl} $\dim\xi + \dim\delta = n$,
\item\label{it:orthogonality} the cell $\xi$ and the polytope $\delta$ span orthonogonal real affine spaces,
\item\label{it:unboundedness} $\delta$ lies on a proper face $F$ of $\Delta$ if and only if the cell $\xi$ is unbounded and contains a half-line spanned by the outward normal vector to $F$.
\end{enumerate}
\end{proposition}
\begin{proof}
Item~\ref{it:inters=sum} is a consequence of~\cite[Proposition 4.1]{BB13}. Items~\ref{it:dimens-compl}, and~\ref{it:orthogonality} are obtained by applying item (1) and (2) of~\cite[\S3]{BB13} to the tropical hypersurface $T_1\cup\cdots\cup T_k$. Item~\ref{it:unboundedness}, is similarly obtained from Item (3) of~\cite[\S3]{BB13}, and diagram (3.1) in \textit{loc. cit.} .
\end{proof} We say that the above polyhedral cell-decomposition $\Xi$ is \emph{induced by the tuple $f$}.
\begin{figure}
\tikzset{every picture/.style={line width=0.75pt}}
\begin{tikzpicture}[x=0.5pt,y=0.5pt,yscale=-1,xscale=1]
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=1.5] (696.01,227.33) -- (668.56,199.67) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=1.5] (105.34,219.3) -- (55.34,269.3) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=1 ] (103.3,219.3) .. controls (103.3,218.17) and (104.21,217.26) .. (105.34,217.26) .. controls (106.47,217.26) and (107.38,218.17) .. (107.38,219.3) .. controls (107.38,220.43) and (106.47,221.34) .. (105.34,221.34) .. controls (104.21,221.34) and (103.3,220.43) .. (103.3,219.3) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=1.5] (155.34,169.3) -- (105.34,219.3) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=1 ] (53.3,269.3) .. controls (53.3,268.17) and (54.21,267.26) .. (55.34,267.26) .. controls (56.47,267.26) and (57.38,268.17) .. (57.38,269.3) .. controls (57.38,270.43) and (56.47,271.34) .. (55.34,271.34) .. controls (54.21,271.34) and (53.3,270.43) .. (53.3,269.3) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=1 ] (153.3,169.3) .. controls (153.3,168.17) and (154.21,167.26) .. (155.34,167.26) .. controls (156.47,167.26) and (157.38,168.17) .. (157.38,169.3) .. controls (157.38,170.43) and (156.47,171.34) .. (155.34,171.34) .. controls (154.21,171.34) and (153.3,170.43) .. (153.3,169.3) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=1.5] (5.34,269.3) -- (55.34,269.3) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=1.5] (5.34,269.3) -- (155.34,169.3) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=1.5] (5.34,269.3) -- (105.34,219.3) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][fill={rgb, 255:red, 255; green, 255; blue, 255 } ,fill opacity=1 ] (2.69,269.3) .. controls (2.69,267.84) and (3.88,266.65) .. (5.34,266.65) .. controls (6.8,266.65) and (7.99,267.84) .. (7.99,269.3) .. controls (7.99,270.76) and (6.8,271.95) .. (5.34,271.95) .. controls (3.88,271.95) and (2.69,270.76) .. (2.69,269.3) -- cycle ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][line width=1.5] (230.34,219.3) -- (180.34,269.3) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][fill={rgb, 255:red, 0; green, 0; blue, 0 } ,fill opacity=1 ] (228.3,219.3) .. controls (228.3,218.17) and (229.21,217.26) .. (230.34,217.26) .. controls (231.47,217.26) and (232.38,218.17) .. (232.38,219.3) .. controls (232.38,220.43) and (231.47,221.34) .. (230.34,221.34) .. controls (229.21,221.34) and (228.3,220.43) .. (228.3,219.3) -- cycle ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][line width=1.5] (280.34,169.3) -- (230.34,219.3) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][line width=1.5] (280.34,169.3) -- (230.34,169.3) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][fill={rgb, 255:red, 0; green, 0; blue, 0 } ,fill opacity=1 ] (278.3,169.3) .. controls (278.3,168.17) and (279.21,167.26) .. (280.34,167.26) .. controls (281.47,167.26) and (282.38,168.17) .. (282.38,169.3) .. controls (282.38,170.43) and (281.47,171.34) .. (280.34,171.34) .. controls (279.21,171.34) and (278.3,170.43) .. (278.3,169.3) -- cycle ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][line width=1.5] (230.34,169.3) -- (180.34,269.3) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][fill={rgb, 255:red, 0; green, 0; blue, 0 } ,fill opacity=1 ] (228.3,169.3) .. controls (228.3,168.17) and (229.21,167.26) .. (230.34,167.26) .. controls (231.47,167.26) and (232.38,168.17) .. (232.38,169.3) .. controls (232.38,170.43) and (231.47,171.34) .. (230.34,171.34) .. controls (229.21,171.34) and (228.3,170.43) .. (228.3,169.3) -- cycle ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][line width=1.5] (230.34,169.3) -- (230.34,219.3) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][fill={rgb, 255:red, 255; green, 255; blue, 255 } ,fill opacity=1 ] (177.69,269.3) .. controls (177.69,267.84) and (178.88,266.65) .. (180.34,266.65) .. controls (181.8,266.65) and (182.99,267.84) .. (182.99,269.3) .. controls (182.99,270.76) and (181.8,271.95) .. (180.34,271.95) .. controls (178.88,271.95) and (177.69,270.76) .. (177.69,269.3) -- cycle ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][line width=1.5] (796.01,277.33) -- (746.01,227.33) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][fill={rgb, 255:red, 0; green, 0; blue, 0 } ,fill opacity=1 ] (696.01,226.17) .. controls (696.64,226.17) and (697.16,226.69) .. (697.16,227.33) .. controls (697.16,227.97) and (696.64,228.48) .. (696.01,228.48) .. controls (695.37,228.48) and (694.85,227.97) .. (694.85,227.33) .. controls (694.85,226.69) and (695.37,226.17) .. (696.01,226.17) -- cycle ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][line width=1.5] (746.01,227.33) -- (746.01,177.33) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][fill={rgb, 255:red, 0; green, 0; blue, 0 } ,fill opacity=1 ] (746.01,226.17) .. controls (746.64,226.17) and (747.16,226.69) .. (747.16,227.33) .. controls (747.16,227.97) and (746.64,228.48) .. (746.01,228.48) .. controls (745.37,228.48) and (744.85,227.97) .. (744.85,227.33) .. controls (744.85,226.69) and (745.37,226.17) .. (746.01,226.17) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=1.5] (668.56,199.67) -- (668.56,279.67) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=1.5] (642.37,147.37) -- (668.56,199.67) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=1.5] (619.1,112.65) -- (642.37,147.37) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=1.5] (772.83,277.83) -- (642.37,147.37) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=1 ] (642.37,146.21) .. controls (643.01,146.21) and (643.53,146.73) .. (643.53,147.37) .. controls (643.53,148.01) and (643.01,148.53) .. (642.37,148.53) .. controls (641.73,148.53) and (641.21,148.01) .. (641.21,147.37) .. controls (641.21,146.73) and (641.73,146.21) .. (642.37,146.21) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=1 ] (668.56,198.51) .. controls (669.2,198.51) and (669.71,199.03) .. (669.71,199.67) .. controls (669.71,200.31) and (669.2,200.82) .. (668.56,200.82) .. controls (667.92,200.82) and (667.4,200.31) .. (667.4,199.67) .. controls (667.4,199.03) and (667.92,198.51) .. (668.56,198.51) -- cycle ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][line width=1.5] (696.01,227.33) -- (596.01,177.33) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][line width=1.5] (746.01,227.33) -- (696.01,227.33) ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ][line width=3.75] (746.01,277.33) -- (696.01,227.33) ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ][fill={rgb, 255:red, 245; green, 166; blue, 35 } ,fill opacity=1 ] (722.43,225.05) .. controls (723.82,225.05) and (724.94,226.18) .. (724.94,227.57) .. controls (724.94,228.96) and (723.82,230.09) .. (722.43,230.09) .. controls (721.04,230.09) and (719.91,228.96) .. (719.91,227.57) .. controls (719.91,226.18) and (721.04,225.05) .. (722.43,225.05) -- cycle ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ][fill={rgb, 255:red, 245; green, 166; blue, 35 } ,fill opacity=1 ] (668.87,211.23) .. controls (670.26,211.23) and (671.39,212.36) .. (671.39,213.75) .. controls (671.39,215.14) and (670.26,216.27) .. (668.87,216.27) .. controls (667.48,216.27) and (666.35,215.14) .. (666.35,213.75) .. controls (666.35,212.36) and (667.48,211.23) .. (668.87,211.23) -- cycle ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ][fill={rgb, 255:red, 245; green, 166; blue, 35 } ,fill opacity=1 ] (696.01,225.6) .. controls (696.96,225.6) and (697.73,226.38) .. (697.73,227.33) .. controls (697.73,228.28) and (696.96,229.06) .. (696.01,229.06) .. controls (695.05,229.06) and (694.28,228.28) .. (694.28,227.33) .. controls (694.28,226.38) and (695.05,225.6) .. (696.01,225.6) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=1.5] (495.34,69.66) -- (445.34,119.66) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=1.5] (445.34,119.66) -- (395.34,169.66) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=1.5] (295.34,269.66) -- (345.34,269.66) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=1.5] (345.34,169.66) -- (495.34,69.66) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=1.5] (345.34,169.66) -- (445.34,119.66) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][line width=1.5] (345.34,169.66) -- (295.34,269.66) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=1.5] (345.34,169.66) -- (395.34,169.66) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][line width=1.5] (545.34,69.66) -- (495.34,119.66) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][line width=2.25] (396.36,219.66) -- (345.34,269.66) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][line width=1.5] (545.34,69.66) -- (495.34,69.66) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][line width=1.5] (395.34,169.66) -- (345.34,269.66) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][line width=1.5] (495.34,69.66) -- (495.34,119.66) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=1.5] (495.34,119.66) -- (445.34,169.66) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][line width=1.5] (445.34,119.66) -- (445.34,169.66) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=2.25] (445.34,169.66) -- (396.36,219.66) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=1 ] (445.34,117.63) .. controls (446.47,117.63) and (447.38,118.54) .. (447.38,119.66) .. controls (447.38,120.79) and (446.47,121.7) .. (445.34,121.7) .. controls (444.21,121.7) and (443.3,120.79) .. (443.3,119.66) .. controls (443.3,118.54) and (444.21,117.63) .. (445.34,117.63) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=1 ] (445.34,167.63) .. controls (446.47,167.63) and (447.38,168.54) .. (447.38,169.66) .. controls (447.38,170.79) and (446.47,171.7) .. (445.34,171.7) .. controls (444.21,171.7) and (443.3,170.79) .. (443.3,169.66) .. controls (443.3,168.54) and (444.21,167.63) .. (445.34,167.63) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=1 ] (395.34,167.63) .. controls (396.47,167.63) and (397.38,168.54) .. (397.38,169.66) .. controls (397.38,170.79) and (396.47,171.7) .. (395.34,171.7) .. controls (394.21,171.7) and (393.3,170.79) .. (393.3,169.66) .. controls (393.3,168.54) and (394.21,167.63) .. (395.34,167.63) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=1 ] (345.34,167.63) .. controls (346.47,167.63) and (347.38,168.54) .. (347.38,169.66) .. controls (347.38,170.79) and (346.47,171.7) .. (345.34,171.7) .. controls (344.21,171.7) and (343.3,170.79) .. (343.3,169.66) .. controls (343.3,168.54) and (344.21,167.63) .. (345.34,167.63) -- cycle ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][fill={rgb, 255:red, 0; green, 0; blue, 0 } ,fill opacity=1 ] (343.3,269.66) .. controls (343.3,268.54) and (344.21,267.63) .. (345.34,267.63) .. controls (346.47,267.63) and (347.38,268.54) .. (347.38,269.66) .. controls (347.38,270.79) and (346.47,271.7) .. (345.34,271.7) .. controls (344.21,271.7) and (343.3,270.79) .. (343.3,269.66) -- cycle ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][fill={rgb, 255:red, 0; green, 0; blue, 0 } ,fill opacity=1 ] (493.3,119.66) .. controls (493.3,118.54) and (494.21,117.63) .. (495.34,117.63) .. controls (496.47,117.63) and (497.38,118.54) .. (497.38,119.66) .. controls (497.38,120.79) and (496.47,121.7) .. (495.34,121.7) .. controls (494.21,121.7) and (493.3,120.79) .. (493.3,119.66) -- cycle ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][fill={rgb, 255:red, 0; green, 0; blue, 0 } ,fill opacity=1 ] (543.3,69.66) .. controls (543.3,68.54) and (544.21,67.63) .. (545.34,67.63) .. controls (546.47,67.63) and (547.38,68.54) .. (547.38,69.66) .. controls (547.38,70.79) and (546.47,71.7) .. (545.34,71.7) .. controls (544.21,71.7) and (543.3,70.79) .. (543.3,69.66) -- cycle ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][fill={rgb, 255:red, 0; green, 0; blue, 0 } ,fill opacity=1 ] (493.3,69.66) .. controls (493.3,68.54) and (494.21,67.63) .. (495.34,67.63) .. controls (496.47,67.63) and (497.38,68.54) .. (497.38,69.66) .. controls (497.38,70.79) and (496.47,71.7) .. (495.34,71.7) .. controls (494.21,71.7) and (493.3,70.79) .. (493.3,69.66) -- cycle ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][fill={rgb, 255:red, 255; green, 255; blue, 255 } ,fill opacity=1 ] (292.69,269.66) .. controls (292.69,268.2) and (293.88,267.01) .. (295.34,267.01) .. controls (296.8,267.01) and (297.99,268.2) .. (297.99,269.66) .. controls (297.99,271.13) and (296.8,272.31) .. (295.34,272.31) .. controls (293.88,272.31) and (292.69,271.13) .. (292.69,269.66) -- cycle ;
\end{tikzpicture}
\caption{To the left: The subdivisions $\tau_1$, $\tau_2$, and $\tau$ of $\Delta^0_1$, $\Delta^0_2$, and $\Delta^0_1+\Delta^0_2$ respectively. To the right: the corresponding dual cell-decomposition of $\R^2$. All obtained from Example~\ref{ex:virtual_preimage}}\label{fig:subdivision}
\end{figure}
\subsubsection{Transversal cell-decompositions}\label{subsub:proper} In what follows, we introduce a family of polynomial tuples having, whose tropical hypersurfaces have non-degenerate intersections.
\begin{definition}\label{def:Transv} The cell $\xi\in\Xi$ is \emph{transversal} if $\dim(\delta)=\dim(\delta_1 )+\cdots +\dim(\delta_k)$. A polyhedral cell-decomposition is \emph{transversal} if so are all of its cells.
\end{definition}
\begin{notation}
For any $\xi\in\Xi$ as in Proposition~\ref{prop:mixed_subd}, we will use $\delta(\xi)$ to denote the polytope $\delta$, dual to $\xi$ and we use $\delta(\xi_i)$ ($i=1,\ldots,n$) to denote the polytope $\delta_i$, dual to $\xi_i$.
\end{notation}
Applying~\cite[Theorem 1.1]{OP13} recursively on transversal intersections of tropical hypersurfaces in $\R^n$, we obtain the following generalized version of Theorem~\ref{th:Kapranov} (see also~\cite[~Ch. 4,~\S6,~Theorem 4.6.18]{MS15}).
\begin{theorem}\label{thm:Kap-general}
Let $f$ be a tuple of polynomials $f_1,\ldots,f_k\in\K[z_1,\ldots,z_n]$, and assume that the polyhedral cell-decomposition of $\R^n$, induced by $f$ is transversal. Then, it holds
\begin{equation}\label{eq:kap:gen-1}
\Val (\VKb(f))= \VT(f_1)\cap\cdots\cap \VT(f_k) .
\end{equation}
\end{theorem}
\begin{definition}\label{def:tropical_degeneracy}
A polynomial tuple $f\in\K[A]$ is called \emph{face-generic} if it is almost face-generic and if for any $\Gamma\prec\Delta$, and any $I\subset [n]$, the intersection $\cap_{i\in I}\VT(f_{i\Gamma})$ is transversal.
\end{definition}
\begin{lemma}\label{lem:tropical_degeneracy}
Face-generic tuples form a Zariski open subset of $K[A]$.
\end{lemma}
\begin{proof}
Let $m:=|A_1|+\cdots + |A_k|$, let $\K^*[A]$ be the largest torus in $\K[A]$, let $\Gamma$ be a face of $\Delta$, and let $I\subset [n]$. Consider the map $\bVal:\K^*[A]\to\R^m$, $c\mapsto(\val(c_1),\ldots,\val(c_m))$ sending a tuple $f$ onto the point in $\R^m$, whose coordinates form the tuple of valuations of coefficients of $f$.
Note that there are finitely-many possible combinatorial types of cell-decompositions $\Xi$ of $\R^n$, induced by $f_\Gamma$ obtained from points in $\bVal(c)\in\R^m$. Therefore, the set formed by all $\bVal(c)\in\R^m$ for which there exists $f\in\K^*[A]$ satisfying $\bVal (f) = c$ and $\cap_{i\in I}\VT(f_{i\Gamma})$ is not transversal, form a finite union $\bm{H}_{I\Gamma}$ of hyperplanes $H_1,\ldots,H_r\subset\R^m$. Each such hyperplane is given by a linear combination on $\bVal c$, representing a necessary condition for a collection of affine pieces $L_i\subset \VT(f_{i\Gamma})$ ($i\in I$) to intersect non-transversally (in the usual sense). The union $\bm{H}_{I\Gamma}$ of hyperplanes is finite since there is a finite choice of above collections $(L_i)_{i\in I}$ and there are finitely-many combinatorial types for a non-transversal intersection of such a collection.
Finally, notice that the map $\bVal$ is continuous. Therefore, the set $\bVal^{-1}(\K^*[A]\setminus \bm{H})$ is Zariski open in $\K^*[A]$. The proof follows from Proposition~\ref{prp:face-generic-open}.
\end{proof}
\section{Correspondence for the Jelonek set}\label{sec:correspondence} In this section, we prove that the tropical non-properness set $\TJF$ of a tropical polynomial map $F:\R^n\to\R^n$ is the tropicalization of face resultants of the corresponding polynomial map. Then, Theorem~\ref{th:main_corresp} would immediately follow from Proposition~\ref{prop:algebraic_correspondence}. We finish this section by proving Theorem~\ref{thm:applications}, where we show how to describe the Newton polytope of the Jelonek set of complex polynomial maps from its tropical counterpart.
\begin{notation}\label{not:preimages_tropical}
Let $F:\R^n\to\R$ be a tropical polynomial function expressed as $x\mapsto\max_{a\in A}\{\langle x, a\rangle + \gamma_a\}$, where $A$ is the support of $F$, and the values $\gamma_a$ are real. For any value $y\in \R\cup\{-\infty\}$, we use the notation $\cT_y(F)$ for the corner locus of the function
\[
x\mapsto\max_{a\in A}\{\langle x, a\rangle + \gamma_a,~y\}.
\] Similarly, if $F$ is a tropical polynomial map $(F_1,\ldots,F_n):\R^m\to\R^n$, then for any tuple $y:=(y_1,\ldots,y_n)\in(\R\cup\{-\infty\})^n$ we use the notation $\cT_y(F)$ to refer to the intersection $\cT_{y_1}(F_1)\cap\cdots\cap\cT_{y_n}(F_n)$ in $\R^m$.
\end{notation}
\begin{definition}[virtual preimage]\label{def:virtual}
The set $\cT_y(F)$ corresponding to the tropical map $F$ in Notation~\ref{not:preimages_tropical} will be called the \emph{virtual preimage of $y$} under $F$.
\end{definition}
\begin{example}\label{ex:virtual_preimage}
Consider the polynomial map $F:\R^2\to\R^2$ defined by the polynomials
\[
(F_1,~F_2) = \big( \max (a-1,~2a+b + 2,~3a+2b- 5),~\max (a+b,~2a+2b,~a+2b)\big).
\]
The virtual preimage $\cT_{(-2,-1)}(F)$ is represented in Figure~\ref{fig:subdivision} with the thick orange lines.
\end{example}
Let $F:=(F_1,\ldots,F_n):\R^n\to\R^n$ be a tropical polynomial map, let $A_i$ be the support of $F_i$ ($i=1,\ldots,n$). Using this notation, we define $\Delta^0$ to be the same tuple of polytopes in $\R^n$ defined as in~\eqref{eq:delta_0} from \S\ref{sub:pol-restricted}. For the rest of the section we make the following assumption:
\begin{center}
\textit{For every $i=1,\ldots,n$, the tropical polynomial $F_i$ has no constant tropical terms.}
\end{center} This implies that the support $A_i$ does not contain $\{\unze\}$, and thus $\Delta_i^0\setminus \Delta_i = \{\unze\}$ ($i=1,\ldots,n$). Since virtual preimages are intersections of tropical hypersurfaces, for any $y\in\R^n$, the union
\[
\cT_{y_1}(F_1)\cup \cdots\cup \cT_{y_n}(F_n)
\] forms a polyhedral cell-decomposition of $\R^n$, denoted $\Xi(y)$, and induces a mixed subdivision $\tau_y$ of $\Sigma\Delta^0$, dual to $\Xi(y)$ in the sense of Proposition~\ref{prop:mixed_subd} in~\S\ref{subsub:subdivisions2}. Accordingly, the cell-decomposition $\Xi$ of $\R^n$ induced by $F$ is obtained from $\Xi(y)$ by taking $y_i=-\infty$ ($i=1,\ldots,n$). Figure~\ref{fig:subdivision} on the right represents the cell-decomposition $\Xi(-2,-1)$ of $\R^2$ given by the set $\cT_{-2}(F_1)\cup \cT_{-1}(F_2)$, where $F$ is from Example~\ref{ex:virtual_preimage}.
\begin{definition}\label{def:dicritical-cells}
A cell $\xi\in\Xi(y)$ is said to \emph{dicritical} if it contains a dicritical half-line.
\end{definition}
We deduce the following observation from the definitions and Proposition~\ref{prop:mixed_subd}.
\begin{lemma}\label{lem:combined-remarks}
Let $\Gamma\prec\Delta^0$, and let $\xi\in\Xi(y)$, so that $\delta(\xi_i)\subset\Gamma_i$ ($i=1,\ldots,n$). Then, the following holds
\begin{enumerate}[topsep=0mm,itemsep=0mm,label=(\arabic*),ref=(\arabic*)]
\item\label{it:tilted-dicritical} $\xi$ is dicritical if and only if $\Gamma$ is dicritical, and
\item\label{it:preim=cell} $\dim \delta(\xi_i)>0$, for all $i=1,\ldots,n$ if and only if $\xi\subset \cT_y(F)$.
\end{enumerate}
\end{lemma}
Similarly to Notation~\ref{not:face-restrictions} of~\S\ref{sec:faces}, for any $\Gamma\prec\Delta^0$, and any $i\in [n]$, we define the function $F_{i\Gamma}:\R^n\to\R$,
\[
x\mapsto\max_{a\in\Gamma_i}(\langle x, a\rangle + \gamma_a).
\] For any $I\subset [n]$, we define the \emph{restriction of $F$ onto $I\Gamma$} to be the tropical polynomial map
\[
F_{I\Gamma}:=(F_{i\Gamma})_{i\in I}:\R^n\to\R^{|I|}.
\]
\begin{example}\label{ex:subdivision_2}
Consider the polytopes from Figure~\ref{fig:subdivision}, and the map $F$ from Example~\ref{ex:virtual_preimage}. Let $\Gamma=\big(\{ (1,0),~(2,1),~(3,1)\},~\{ (0,0),~(1,1),~(2,2)\},\big)$. Then, $F_{1\Gamma} = F_1$, and $F_{2\Gamma}=\max (a+b,~2a+2b)$.
\end{example}
Recall that $\TJF$ is the set of points in $\R^n$ for which $\cT_y(F)$ has a dicritical half-line in $\R^n$.
\begin{proposition}\label{prop:tropical-and-tilted}
Let $f:=(f_1,\ldots,f_n):\K^n\to \bT$ be a face-generic polynomial map, let $F$ be the tropical polynomial map $(f_1^{\trop},\ldots,f_n^{\trop}):\R^n\to\R^n$, and let $\Delta^0:=\Delta^0(f)$. Then, it holds
\[
\TJF = \bigcup_{\Gamma\in\sF_{D}(\Delta^0)}\Val(\cR_\Gamma(f)).
\]
\end{proposition}
\begin{proof}
The inclusion ``$\supset$'' does not require face-genericity. Hence, we prove it first. Let $\Gamma$ be a dicritical face of $\Delta^0$ for which $\crsg(f)$ is not empty. Let $\bm{\circleddash}$ be the subset of indexes $i\in[n]$ for which $\Gamma_i$ contains the origin $\unze$. Let $w$ be a point in $\cR_\Gamma(f)$ and let $y$ be its valuation in $\R^n$. We use $\Sigma_\Gamma(y)$ to denote the cell-decomposition of $\R^n$, induced by the collection of tropical hypersurfaces $S_1,\ldots,S_n$, where
\[
S_i := \begin{cases}
\cT_{y_i}(F_{i\Gamma}) & \text{if } i\in\bmcd \\[4pt]
\cT_{-\infty}(F_{i\Gamma}) & \text{otherwise}. \\
\end{cases}
\]
The common locus $S_1\cap\cdots\cap S_n$ is non-empty as it contains the set $\Val(\crsg(f))$.
Hence, there exists a cell $\sigma\in\Sigma_\Gamma(y)$ satisfying the conditions of Lemma~\ref{lem:combined-remarks}~\ref{it:preim=cell}. Since $\Gamma$ is a face of $\Delta^0$, the cell-decomposition $\Xi(y)$ contains a cell $\xi\subset\sigma$ satisfying $\delta(\xi_i)=\delta(\sigma_i)$ ($i=1,\ldots,n$) (e.g. if $\Gamma$ and $F$ are as in Example~\ref{ex:subdivision_2}, then $\Sigma_{\Gamma}(-2,-1)$ is represented in Figure~\ref{fig:subdivision_2}). Finally, the cell $\xi$ is dicritical follows from Lemma~\ref{lem:combined-remarks}~\ref{it:tilted-dicritical}.
\begin{figure}
\tikzset{every picture/.style={line width=0.75pt}}
\begin{tikzpicture}[x=0.5pt,y=0.5pt,yscale=-1,xscale=1]
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=0.35 ][line width=1.5] (326.01,227.33) -- (298.56,199.67) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=0.35 ][line width=1.5] (426.01,277.33) -- (376.01,227.33) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][fill={rgb, 255:red, 0; green, 0; blue, 0 } ,fill opacity=1 ] (326.01,226.17) .. controls (326.64,226.17) and (327.16,226.69) .. (327.16,227.33) .. controls (327.16,227.97) and (326.64,228.48) .. (326.01,228.48) .. controls (325.37,228.48) and (324.85,227.97) .. (324.85,227.33) .. controls (324.85,226.69) and (325.37,226.17) .. (326.01,226.17) -- cycle ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=0.35 ][line width=1.5] (376.01,227.33) -- (376.01,177.33) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=0.35 ][fill={rgb, 255:red, 0; green, 0; blue, 0 } ,fill opacity=0.35 ] (376.01,226.17) .. controls (376.64,226.17) and (377.16,226.69) .. (377.16,227.33) .. controls (377.16,227.97) and (376.64,228.48) .. (376.01,228.48) .. controls (375.37,228.48) and (374.85,227.97) .. (374.85,227.33) .. controls (374.85,226.69) and (375.37,226.17) .. (376.01,226.17) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=0.35 ][line width=1.5] (298.56,199.67) -- (298.56,279.67) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=0.35 ][line width=1.5] (272.37,147.37) -- (298.56,199.67) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=0.35 ][line width=1.5] (249.1,112.65) -- (272.37,147.37) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=1 ][line width=1.5] (402.83,277.83) -- (228.38,103.38) ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=0.35 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=0.35 ] (272.37,146.21) .. controls (273.01,146.21) and (273.53,146.73) .. (273.53,147.37) .. controls (273.53,148.01) and (273.01,148.53) .. (272.37,148.53) .. controls (271.73,148.53) and (271.21,148.01) .. (271.21,147.37) .. controls (271.21,146.73) and (271.73,146.21) .. (272.37,146.21) -- cycle ;
\draw [color={rgb, 255:red, 74; green, 144; blue, 226 } ,draw opacity=0.35 ][fill={rgb, 255:red, 74; green, 144; blue, 226 } ,fill opacity=0.35 ] (298.56,198.51) .. controls (299.2,198.51) and (299.71,199.03) .. (299.71,199.67) .. controls (299.71,200.31) and (299.2,200.82) .. (298.56,200.82) .. controls (297.92,200.82) and (297.4,200.31) .. (297.4,199.67) .. controls (297.4,199.03) and (297.92,198.51) .. (298.56,198.51) -- cycle ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=0.35 ][line width=1.5] (326.01,227.33) -- (226.01,177.33) ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=0.35 ][line width=1.5] (376.01,227.33) -- (326.01,227.33) ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=1 ][line width=2.25] (376.01,277.33) -- (201.55,102.88) ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=0.35 ][fill={rgb, 255:red, 245; green, 166; blue, 35 } ,fill opacity=0.35 ] (352.43,225.05) .. controls (353.82,225.05) and (354.94,226.18) .. (354.94,227.57) .. controls (354.94,228.96) and (353.82,230.09) .. (352.43,230.09) .. controls (351.04,230.09) and (349.91,228.96) .. (349.91,227.57) .. controls (349.91,226.18) and (351.04,225.05) .. (352.43,225.05) -- cycle ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=0.35 ][fill={rgb, 255:red, 245; green, 166; blue, 35 } ,fill opacity=0.35 ] (298.87,211.23) .. controls (300.26,211.23) and (301.39,212.36) .. (301.39,213.75) .. controls (301.39,215.14) and (300.26,216.27) .. (298.87,216.27) .. controls (297.48,216.27) and (296.35,215.14) .. (296.35,213.75) .. controls (296.35,212.36) and (297.48,211.23) .. (298.87,211.23) -- cycle ;
\draw [color={rgb, 255:red, 245; green, 166; blue, 35 } ,draw opacity=0.35 ][fill={rgb, 255:red, 245; green, 166; blue, 35 } ,fill opacity=0.35 ] (326.01,225.6) .. controls (326.96,225.6) and (327.73,226.38) .. (327.73,227.33) .. controls (327.73,228.28) and (326.96,229.06) .. (326.01,229.06) .. controls (325.05,229.06) and (324.28,228.28) .. (324.28,227.33) .. controls (324.28,226.38) and (325.05,225.6) .. (326.01,225.6) -- cycle ;
\draw [color={rgb, 255:red, 0; green, 0; blue, 0 } ,draw opacity=1 ][line width=1.5] (426.01,277.33) -- (251.55,102.88) ;
\end{tikzpicture}
\caption{The cell-decompositions $\Xi(-2,-1)$ (in transparent colors) and $\Xi_{\Gamma}(-2,-1)$ (in opaque colors) corresponding to Example~\ref{ex:subdivision_2}}\label{fig:subdivision_2}
\end{figure}
Now, we prove the other direction ``$\subset$''. Assume that $\cT_y(F)$ has a dicritical half-line $L\subset\R^n$ for some $y\in\R^n$. Then, Lemma~\ref{lem:combined-remarks}~\ref{it:preim=cell} shows that there exists a cell $\xi\in\Xi(y)$, satisfying $\dim\delta(\xi_i)>0$ ($i=1,\ldots,n$), and $L\subset \xi$.
Proposition~\ref{prop:mixed_subd}~\ref{it:unboundedness} shows that $\delta(\xi_i)\subset\Gamma_i$ ($i=1,\ldots,n$) for some $\Gamma\prec\Delta^0$, and Lemma~\ref{lem:combined-remarks}~\ref{it:tilted-dicritical} shows that $\Gamma$ is dicritical. Then, for any $x\in\xi$, and any $i\in [n]$, the maximum
\[
\max_{a\in \Gamma_i}(\langle x, a\rangle + \val(c_a(i)),~y_i)
\] is reached twice. Furthermore, if this maximum is reached by $y_i$, then $\unze\in \Gamma_i$. Theorem~\ref{th:Kapranov} shows that for any $w\in \bT$ such that $\Val (w) = y$, it holds
\[
x\in\VT((f_i-w_i)_\Gamma)~\text{for }i=1,\ldots,n.
\] In what follows, we show that $x$ is the valuation of a solution $z\in \bT$ to $
(f-w)_\Gamma =\unze$. This would imply that $w\in\cR_\Gamma(f)$, which will yield $y\in\Val(\cR_\Gamma(f))$.
We retain from the beginning of the proof the notation of $\bmcd$ corresponding to the face $\Gamma$. Then,
we have $(f_i -w_i)_\Gamma = f_{i\Gamma} - w_i$ if $i\in\bmcd$, and $(f_i -w_i)_\Gamma = f_{i\Gamma}$ otherwise. Consequently, it holds
\begin{equation}\label{eq:cases:omega}
\VT((f_i - w_i)_\Gamma)= \begin{cases}
\VT(f_{i\Gamma} - w_i) & \text{if } i\in\bmcd \\[4pt]
\VT(f_{i\Gamma}) & \text{otherwise}. \\
\end{cases}
\end{equation} Pick any of the largest subsets $\bm{\top}\subset [n]$ of indexes containing $[n]\setminus\bmcd $ so that the intersection $\cap_{i\in{\bm{\top}}}\VT((f_i-w_i)_\Gamma)$ is transversal. Such subsets exist thanks to Definition~\ref{def:face-generic}~\ref{it:vgi_smooth}. Then, Theorem~\ref{thm:Kap-general} shows that
\begin{equation}\label{eq:sys:theta}
(f_{i} - w_i)_\Gamma = 0,~i\in{\bm{\top}}
\end{equation} has a solution $z\in\TKn$ satisfying $\Val(z)=x$. In fact, since~\eqref{eq:sys:theta} is quasi-homogeneous,
there are infinitely-many such solutions $z$. Now, we show that $\bm{\top}$ is large enough.
Condition~\ref{it:vgi_smooth} of Definition~\ref{def:face-generic} implies that one such solution $z$ can be chosen so that for any $i\in\bmcd\setminus{\bm{\top}}$, it holds $\val(f_{i\Gamma}(z)) = F_{i\Gamma}(x) = y_i$. This way, given any $w\in\TKn$ satisfying $\Val (w) = y$, we constructed a solution $z\in \bT$ to the system $(f-w)_\Gamma =\unze$.
\end{proof}
\subsection{Proof of Theorem~\ref{thm:applications}}\label{sub:New-pol}
We first show that there exists a polytope $\Pi\subset\Rnn$, and a Zariski open subset $U\subset\C[A]$, such that for any $g\in U$, it holds $\cN(\mathsf{S}_g) = \Pi$, where $\mathsf{S}_g$ is the polynomial realizing $\mathcal{S}(g)$.
Let $K$ be an algebraically closed field of characteristic zero. Then, any point in $K[A]$ is obtained from a collection $h:=(h_1,\ldots,h_n)$ of polynomials $h_i\in\Z[z_1,\ldots,z_n,c_a(i):a\in A_i]$ ($i=1,\ldots,n$), where we substitute the parameters $c_a(i)$ with values in $K$. Accordingly, ~\eqref{eq:elimin_non-properness} shows that the polynomial $\mathsf{S}_h$ is either a constant or is expressed as a finite sum
\[
\sum \phi_\alpha(\bm{c})w^\alpha,
\] where $\bm{c}:=\big((c_a(i))_{a\in A_i}\big)_{i\in [n]}$, $\phi_\alpha\in\Z[\bm{c}]$, and $w^{\alpha}:=w_1^{\alpha_1}\cdots w_n^{\alpha_n}$. If $\mathsf{S}_h\in K$, then any map $K^n\to K^n$, obtained from $K[A]$, is proper. Otherwise, if $P$ is defined as the polynomial $\prod \phi_\alpha$, then for any $f,\tilde{f}\in K[A]\setminus\mathbb{V}_K(P)$, it holds $\phi_\alpha(f)=0$ $\Leftrightarrow$ $\phi_\alpha(\tilde{f})=0$. Therefore, the Newton polytopes of $\mathsf{S}_f$ and $\mathsf{S}_{\tilde{f}}$ coincide in $\R^n$. Thus, it is enough to take $U := \C[A]\setminus\VC(P)$, and $\cN(\mathsf{S}_g) = \Pi$ follows for every $g\in U$.
Next, we show that for any face-generic polynomial map $f\in\K[A]$, it holds $\cN(\cS_f) = \Pi$.
It suffices to show that $\K[A]\setminus\VK(P)$ contains all face-generic polynomial maps. Let $f\in\K[A]$ be a face-generic polynomial map, and let $g$ be a complex polynomial map in $U$. Then, the Newton-Puiseux algorithm implies that
one can make a perturbation $f\to\tilde{f}$ only on the coefficients of the first-order terms, so to get $\phi_\alpha(\tilde{f})\neq 0$ whenever $\phi_\alpha(g)\neq 0$. Then, it holds $\cN(\mathsf{S}_{\tilde{f}}) = \Pi$. As this perturbation does not affect the valuations of the coefficients in $f$, Theorem~\ref{th:main_corresp} shows that $\Val(\cS(f))=\Val(\cS(\tilde{f}))$. Then, Proposition~\ref{prop:mixed_subd} shows that $\cN(\cS_{\tilde{f}}) = \cN(\cS_{f})$. Therefore, the Newton polytope of the Jelonek set of every face-generic polynomial map in $\K[A]$ is equal to $\Pi$.
To finish the proof, note that the face-vector and the slopes of $\Pi$ can be computed using the duality in Proposition~\ref{prop:mixed_subd} between the tropical hypersurface $\TJF$ and the polytope $\Pi$.
\section{The Jelonek set via polyhedral geometry}\label{sec:computing}
Let $f:=(f_1,\ldots,f_n):\K^n\to \bT$ be a face-generic polynomial map, and let $F$ be the tropical polynomial map $(f_1^{\trop},\ldots,f_n^{\trop}):\R^n\to\R^n$.
Fix a face $\Gamma$ of $\Delta^0:=\Delta^0(f)$, and let $\Sigma_\Gamma$ denote the polyhedral cell-decomposition of $\R^n$ induced by the polynomials $f_\Gamma$ (see e.g. Proposition~\ref{prop:mixed_subd}). Since $f$ is face-generic, the cell-decomposition $\Sigma_\Gamma$ is transversal. The proof of Theorem~\ref{th:main_computation} relies on an effective description of the tropical non-properness set through the cell-decomposition of $\Sigma_\Gamma$ for each dicritical face $\Gamma$.
\subsection{Contributing cells} From the proof of Proposition~\ref{prop:tropical-and-tilted}, we retain the notation $\bmcd$ for the subset of indexes $i\in[n]$ for which $\Gamma_i$ contains $\unze$. In what follows, we consider the intersection locus
\[
\tbmcd:=\bigcap_{i\in[n]\setminus\bmcd}\VT(f_{i\Gamma}).
\]
Note that the cell-decomposition $\Sigma_\Gamma$ of $\R^n$ is a refinement of the cell-decomposition induced by\\ $\cup_{i\in[n]\setminus\bmcd}\VT(f_{i\Gamma})$. Indeed, since $\Sigma_\Gamma$ is given by the union $\cup_{i\in[n]}\VT(f_{i\Gamma})$. This justifies the following notion.
\begin{definition}[contributing cells]\label{def:suitable}
For any cell $\sigma=\sigma_1\cap\cdots\cap\sigma_n\in\Sigma_\Gamma$, either $\sigma\subset \tbmcd$, or $\sigma\cap \tbmcd=\emptyset$. In the former case, we say that $\sigma$ is \emph{contributing}.
\end{definition}
Thanks to Theorem~\ref{thm:Kap-general} applied to the transversal intersection $\tbmcd$, we will see that for each $\Gamma$, only contributing cells of $\Sigma_\Gamma$ are taken into account for computing the tropical non-properness set. We will distinguish two types of contributing cells: those who belong to the tropical hypersurface $\VT(f_{i\Gamma})$ for some $i\in\bmcd$, and those who don't. This distinction takes into account the dimensions of the collection of dual cells $\delta(\sigma_1),\ldots,\delta(\sigma_n)$ of a cell $\sigma\in\Sigma_\Gamma$. Namely, we define the subset
\[
\iup:=\{i\in[n]~|~\dim\delta(\sigma_i)>0\}.
\]
\begin{remark}\label{rem:relevant}
If $\sigma$ is a contributing cell, then $[n]\setminus\bmcd\subset \iup$. In other words, for all the members $\Gamma_i$ of $\Gamma$, that do not contain the origin, the dual cell $\delta(\sigma_i)\subset\Gamma_i$ satisfies $\dim\delta(\sigma_i)> 0$.
\end{remark}
For contributing cells $\sigma$, and for each $i\in \bmcd$, it will be useful later to distinguish whether $i\in \iup\cap\bmcd$, or $i\in\bmcd\setminus \iup$.
\begin{notation}\label{not:trsv}
If $\sigma$ is a contributing cell of $\Sigma_\Gamma$, we denote $\Trs(\sigma)$ the subset of all $y\in\R^n$ for which
\begin{equation}\label{eq:trsv_intersec}
\bigcap_{i\in\iup\cap\bmcd} \cT_{y_i}(F_{i\Gamma})\cap \tbmcd
\end{equation} is transversal at $x\in\sigma$. Thanks to Definition~\ref{def:tropical_degeneracy}, we use the convention $\Trs(\sigma)=\R^n$ if $\iup=[n]\setminus \bmcd$.
\end{notation}
\subsection{Tropical non-properness is a union of finitely-many polytopes}\label{sub:proof-the-comp} Several technical results are required in order to prove Theorem~\ref{th:main_computation}.
\begin{lemma}\label{lem:trsv}
If $\sigma$ is contributing, then $\Trs(\sigma)$ equals to
\begin{equation}\label{eq:trsv_open}
\bigcup_{x\in\sigma}\left\lbrace y\in\R^n~\left|~y_i<F_{i\Gamma}(x),~\forall~i\in\iup\cap\bmcd\right\rbrace\right.\!,
\end{equation} and is empty otherwise. Furthermore, if $y$ is outside the closure of the set~\eqref{eq:trsv_open}, then the set~\eqref{eq:trsv_intersec} is empty.
\end{lemma}
\begin{proof}
The emptyness of $\Trs(\sigma)$ can be deduced from the definitions if $\sigma$ is not contributing. Otherwise, let $i$ be an index in $\bmcd\cap\iup$, and let $x$ be a point in $\sigma_i$. Then, it holds $x\in \cT_{y_i}(F_{i\Gamma})$ for any $y_i<F_{i\Gamma}(x)$, where the maximum of $F_i$ is reached exactly twice. Recall that $\Xi$ is transversal and that $\tbmcd$ consists of transversal intersection points. Therefore, the inclusion $\Trs(\sigma)\subset$~\eqref{eq:trsv_open} follows from the definitions.
Now we prove the second inclusion, and the rest of the Lemma. Since $i\in\bmcd\cap\iup$, there are three tropical monomial terms of $y_i\oplus F_i$ reaching the maximum at $x$ if $y_i=F_i(x)$. Hence we get $y\not\in \Trs(\sigma)$. Otherwise, if $y$ is not in the closure of~\eqref{eq:trsv_open} (i.e. $y_i>F_i(x)$ for some $i\in\bmcd\cap\iup$), only one monomial terms of $y_i\oplus F_i$ reaches the maximum. Hence, we get $x\not\in \cT_{y_i}(F_{i\Gamma})$, making the set~\eqref{eq:trsv_intersec} empty. In particular, we get $y\not\in\Trs(\sigma)$.
\end{proof}
\begin{notation}\label{not:y}
For any cell $\sigma\in\Sigma_\Gamma$, we define $Y(\sigma)\subset\R^n$ to be the set
\[
\bigcup_{x\in\sigma}\left\lbrace y\in\R^n~\left|~y_i=F_{i\Gamma}(x),~\forall~i\in\bmcd\setminus\iup\right\rbrace\right.\!.
\]
\end{notation}
\begin{lemma}\label{lem:is-a-polytope}
For any contributing cell $\sigma\in\Sigma_\Gamma$, the set $\overline{\Trs(\sigma)}\cap \overline{Y(\sigma)}$ is either empty or is a polytope in $\R^n$ of dimension at most $n-1$.
\end{lemma}
\begin{proof}
We start by showing that $\dim\Trs(\sigma)\cap Y(\sigma)\leq n-1$. Assuming non-emptyness, we make the following re-enumeration:
\[
\begin{matrix}
\bmcd\setminus\iup = \{1,\ldots,r\}, & \bmcd\cap\iup = \{r+1,\ldots,s\},& \text{and} & [n]\setminus\bmcd = \{s+1,\ldots,n\}.
\end{matrix}
\] Then, we have the following expressions thanks to Lemma~\ref{lem:trsv}
\[
\begin{matrix}
\overline{\Trs(\sigma)}= & \R^{r}\times\prod_{i=r+1}^s\{y_i \leq \varepsilon_i\}\times\R^{n-s}, & \text{and }& Y(\sigma)= & F_{[r]\Gamma}(\sigma)\times\R^{s-r}\times\R^{n-s},
\end{matrix}
\] where $\varepsilon_i = \max_{x\in \sigma } F_{i\Gamma}(x)$ ($i=r+1,\ldots,s$), and $ F_{[r]\Gamma}:=(F_{1\Gamma},\ldots,F_{r\Gamma} ):\R^n\to \R^r $. Then, we obtain
\begin{equation}\label{eq:product-inters}
\overline{\Trs(\sigma)}\cap \overline{Y(\sigma)}= \overline{F_{[r]\Gamma}(\sigma)}\times\prod_{i=r+1}^s\{y_i \leq \varepsilon_i\}\times\R^{n-s}.
\end{equation} Since $F_{[r]\Gamma}$ is continuous, the right-hand-side of the set~\eqref{eq:product-inters} has dimension at most $n-1$ if
\begin{equation}\label{eq:dimension_leq}
\dim F_{[r]\Gamma}(\sigma)\leq r-1.
\end{equation} The transversality of $\Sigma_\Gamma$ implies that
\[
\cdim\sigma = \sum_{i=1}^n\cdim\sigma_i = \sum_{i\in\iup}\cdim\sigma_i\geq |\iup|,
\] where the second equality follows from Proposition~\ref{prop:mixed_subd}~\ref{it:dimens-compl}. Since $[n]\setminus\bmcd\subset\iup$ (see Remark~\ref{rem:relevant}), it holds $\cdim\sigma\leq n-r$. This yields inequality~\eqref{eq:dimension_leq}.
Now we show that $\overline{\Trs(\sigma)}\cap \overline{Y(\sigma)}$ is a polytope. On the one hand, up to re-enumeration, $\overline{\Trs(\sigma)}$ can be expressed as $M\times\R^{n+r-s}$, where $M$ is the Minkowski sum
\[
\overline{F_{(\bmcd\cap\iup)\Gamma}(\sigma)}+ (\R_{\leq 0})^{s-r},
\] and $F_{(\bmcd\cap\iup)\Gamma}$ is the map $(F_{i\Gamma})_{i\in\bmcd\cap\iup}:\R^n\to\R^{s-r}$. Notice that the map $F_{(\bmcd\cap\iup)\Gamma}$ is affine on $\sigma$ as the latter is a cell of $\Sigma_\Gamma$. Since poltopes are closed under product, Minkowski sums, and linear maps, we obtain that $\overline{\Trs(\sigma)}$ is a polytope. On the other hand, recall that $Y(\sigma)=F_{[r]\Gamma}(\sigma)\times\R^{s-r}\times\R^{n-s}$. Similarly here, the map $F_{[r]\Gamma}$ is affine on $\sigma$, and thus $\overline{Y(\sigma)}$ is also a polytope in $\R^n$. Therefore, since polytopes are closed under intersections, the set $\overline{\Trs(\sigma)}\cap \overline{Y(\sigma)}$ is a polytope.
\end{proof}
Let $\Xi(\Gamma)$ be the subset of all cells in $\Xi$ for which $\delta(\xi)\subset\Sigma\Gamma$.
\begin{lemma}\label{lem:bijection}
There is a unique bijection $\varphi:\Xi(\Gamma)\to\Sigma_\Gamma$, sending a cell $\xi$ onto $\varphi(\xi)$ so that $\xi\subset\varphi(\xi)$.
\end{lemma}
\begin{proof}
The function $\varphi$ is well-defined since the cells $\Sigma_\gamma$ are disjoint. Furthermore, as $\Xi$ is a refinement of the cell-decomposition $\Sigma_\Gamma$, we get $\varphi$ is unique and injective. To show surjectivity, recall that $\Xi$ is in bijection with the set of polytopes in the dual subdivision $\tau$ of $\Sigma\Delta^0$ (Proposition~\ref{prop:mixed_subd}). This induces a bijection between $\Xi(\Gamma)$ and the polyhedra in the dual subdivision of $\Sigma\Gamma$ induced by $\tau$. The latter is dual to $\Sigma_\Gamma$. Hence, we get $|\Xi(\Gamma)| = |\Sigma_\Gamma|$, and surjectivity of $\varphi$ follows.
\end{proof}
\begin{definition}\label{def:D-sigma}
Let $\Gamma$ be a tropical polynomial map $G:\R^n\to\R^n$. The \emph{virtual image} of $x\in\R^n$ is the subset of all $y\in\R^n$ for which $\cT_y(G)\cap x\neq \emptyset$. We will denote it by $\cV_\sigma(G)$.
\end{definition}
\begin{remark}\label{rem:D-sigma}
As, in general, it holds $G^{-1}(y)\neq \cT_y(G)$ (c.f. Remark~\ref{rem:preimages_tropical}), we get $\cV_x(G)\neq G(x)$.
\end{remark}
\begin{lemma}\label{lem:if-not-dicr}
If a face $\Gamma\prec\Delta^0$ is not pre-origin, then for any $\sigma\in\Sigma_\Gamma$, it holds $\Trs(\sigma)\cap Y_\sigma=\emptyset$.
\end{lemma}
\begin{proof}
Recall that $F$ is the tropical map corresponding to a face-generic map $f:\K^n\to\bT$. Let $\Gamma\prec\Delta^0$, and let $y\in\Trs(\sigma)\cap Y_\sigma$ for some $\sigma\in\Sigma_\Gamma$. We first prove that $ \Trs(\sigma)\cap Y_\sigma\subset \crsg(f)$.
From the definition of $\Trs(\sigma)$ (see Notation~\ref{not:trsv}), and Theorem~\ref{thm:Kap-general} for transversal tropical intersections, it holds that for any point $w\in\TKn$ satisfying $\Val(w)=y$, there exists a point $z\in\TKn$ satisfying $\Val(z)\in\sigma$ and is a solution to
\begin{equation}\label{eq:sys:trs}
f_{i_1\Gamma} =\cdots = f_{i_r\Gamma} = f_{j_1\Gamma} - w_{j_1} = \cdots =f_{j_s\Gamma} - w_{j_s} = 0,
\end{equation} where $ \{i_1,\ldots,i_r\}=[n]\setminus\bmcd$ and $\{j_1,\ldots,j_s\}=\iup\cap\bmcd$. Moreover, since $y\in Y(\sigma)$, for any $i\in\bmcd\setminus\iup$, we have $x\in F_{i\Gamma}^{-1}(y_i)$. The condition $\dim\delta(\sigma_i)=0$ for $i\in\bmcd\setminus\iup$ implies the equality
\begin{equation}\label{eq:sys:ysigma}
F_{i\Gamma}(\Val(z)) =\val(f_{i\Gamma}(z)),~\text{for } i\in\bmcd\setminus\iup.
\end{equation} Then,~\eqref{eq:sys:trs} and~\eqref{eq:sys:ysigma} show that $y=\Val(w)\in\Val(\crsg(f))$.
To conclude, recall that if $\Gamma$ is not pre-origin, then for any $w\in\bT$, it holds $(f-w)_\Gamma = f_\Gamma$, and thus $\crsg(f)=\emptyset$ whenever $\VK(f_\Gamma)=\emptyset$ (see Definition~\ref{def:r-star-gamma}). Therefore, Definition~\ref{def:face-generic}~\ref{it:vgi_smooth} (applied to $I=[n]$) shows that $\crsg(f)=\emptyset$ if $\Gamma$ is not pre-origin.
\end{proof}
\begin{lemma}\label{lem:S-sigma=points-at-sigma}
Let $F$ be a tropical map $\R^n\to\R^n$ corresponding to a face-generic polynomial map $f:\K^n\to\bT$ with $f(\unze) = \unze$, and let $\Delta^0:=\Delta^0(f)$. Then, for any $\Gamma\prec\Delta^0$, and any $\sigma\in\Sigma_\Gamma$, it holds
\[
\cV_\sigma(F_\Gamma)=\overline{\Trs(\sigma)}\cap \overline{Y(\sigma)}.
\]
\end{lemma}
\begin{proof}
If $\sigma$ is contributing, then the equality follows from the definitions and Lemma~\ref{lem:trsv}. Otherwise, for any $x\in\sigma$, and any $i\in [n]\setminus \bmcd$, it holds $\cT_{y_i}(F_{i\Gamma})\cap \sigma = \emptyset$. This shows that each of $\cV_\sigma(F_\Gamma)$ and $\Trs(\sigma)$ is empty whenever $\sigma$ is not contributing.
\end{proof}
\begin{proof}[Proof of Theorem~\ref{th:main_computation}] Let $\Gamma$ be a face of $\Delta^0$, and let $\xi\in\Xi$ be a cell, so that $\delta(\xi)\subset\Sigma\Gamma$. Let $\cS(\xi)$ denote the set of all points $y\in\R^n$, where $\cT_y(F)$ has a dicritical half-line intersecting $\xi$. Thanks to Lemma~\ref{lem:combined-remarks}, one can easily check that $\cS(\xi)=\cV_\xi(F)$ if $\Gamma$ is dicritical and $\cS(\xi)=\emptyset$ otherwise. Similarly, and thanks to Lemma~\ref{lem:bijection}, we furthermore have $\cV_\xi(F)=\cV_{\varphi(\xi)}(F_\Gamma)$. Therefore, Lemma~\ref{lem:S-sigma=points-at-sigma}, together with Lemma~\ref{lem:if-not-dicr} show that $\cS(\xi) = \overline{\Trs(\sigma)\cap Y_\sigma}$ if $\Gamma$ is a dicritical pre-origin face of $\Delta^0$, and $\cS(\xi)$ is empty otherwise. Finally, Lemma~\ref{lem:is-a-polytope} yields the proof.
\end{proof}
\subsection*{Contact}\ \\
Boulos El Hilany
\\
Institut f\"ur Analysis und Algebra, TU Braunschweig,\\
Universit\"atsplatz 2, 38106 Braunschweig,
\\
{<EMAIL>}
\\
\href{https://boulos-elhilany.com}{boulos-elhilany.com}
\bibliographystyle{abbrv}
\def$'${$'$}
|
\section{Introduction}
Learning a language is a complex task that requires dedication, perseverance and hard work. The basic learning process consists of comprehension of input (i.e.\ hearing or reading), comprehensible output (i.e.\ speaking or writing) and feedback (i.e.\ identifying errors and making changes in response) \cite{nunan1999second, brown1995readings}. Through these processes we learn vocabulary and grammar enhancing our language comprehension and expression abilities.
Expanding one's vocabulary is an essential element of language learning and in vocabulary learning, methods for improving learners' memory play a vital role. Mnemonics is one such effective method, in which the learner attempts to link new learning with prior knowledge through the use of visual and/or acoustic cues. Keywords are one such practical technique in which the learner attempts to create a symbolic link between new and prior knowledge using associations triggered by keywords, a method shown to be particularly effective in prior research~\cite{atkinson1975mnemotechnics}.
Furthermore, previous research shows that learning vocabulary can be enhanced through an encounter with words in context~\cite{pressley1982}.
Existing learning environments include formal learning,
flashcards, use of a dictionary or thesaurus, all leading to practice with new words in context. For example, in formal learning the context is provided by the instructor or the provided instructional materials,
in flashcards it is formed through images depicted on physical cards, in thesaurus it is provided through the provision of synonyms.
Consumer devices such as smartphones, tablets and head mounted displays can be used to enhance existing learning environments or to provide new ones. These systems enable technology driven paradigm shifts such as e-learning~\cite{Nicholson2007, mayes2007learning,mcloughlin2010personalised}, and more recently m-learning (mobile learning)~\cite{kumar2018learning, georgiev2004m, Spitzer2015}. All are capable of enhancement through better provision of learning context and methods for improving learners' memory. Furthermore, these systems are also capable of running Augmented Reality (AR) applications which have the potential to make language learning more intuitive and immersive because of their intrinsic ability to visualise digital information within a real world context. This is particularly important for vocabulary learning because it allows word encounters in real-world context, an important catalyst for vocabulary learning~\cite{santos2016augmented,vazquez2017serendipitous,ibrahim2018arbis}.
Despite the fact that prior work looked at AR for vocabulary learning discovering several benefits, such as better improved retention, higher enjoyment, motivation and engagement,
none provide a direct comparison of AR \rev{applications that run in head-mounted displays} to the same technique within a non-AR interface. Furthermore, to the best of our knowledge, no existing evaluation of vocabulary learning that combines keywords with visualisations exist.
This paper contributes to addressing this gap with VocabulARy, an AR application for vocabulary learning that visually annotates objects in AR, in the user’s surroundings, with the corresponding English (first language) and Japanese (second language) words. In addition to the written and audio description of each word, VocabulARy also presents the user with a keyword and its visualisation to enhance memory retention.
We evaluate the VocabulARy prototype by comparing it to an alternate
AR system that does not show an additional visualisation of the keyword and also, we compare it to two non-AR systems on a tablet,
one with and one without visualising the keyword. The results show that \textsc{ar} outperforms the \textsc{non-ar} (tablet) system regarding short-term retention, mental effort and task-completion time. Additionally, the visualisation approach scored significantly higher than only showing the written keyword with respect to immediate and delayed recall and learning efficiency, mental effort and task-completion time.
\section{Related Work}
\label{sec:relatedWork}
Vocabulary learning can be enhanced through methods for improving learners’ memory~\cite{putnam2015,mastropieri1991} or through an encounter with words in context~\cite{pressley1982}. AR is an emerging technology for learning in real-world context and to scaffold this we structure our related work into: Learning context, Vocabulary learning in AR and Memory enhancement techniques. To better position our work in the context of language learning in AR environments we also classify prior work based on AR devices, learning content, presentation and learning method (\autoref{tab:relatedwork}).
\begin{table}[th]
\caption{Selected prior work related to language learning in AR environments.}
\centering
\begin{tabular}{c}
\includegraphics[width=0.98\columnwidth]{figures/relatedwork.pdf}
\end{tabular}
\label{tab:relatedwork}
\end{table}
\subsection{Learning Context}
It has been shown that people are more motivated to learn, if they can see the importance of the content with respect to the situation or, if they find the content interesting~\cite{pintrich2003motivational}. For example, being in a bar in a foreign country is likely to increase the interest in learning words and sentences required for ordering a coffee. Additionally, the context makes it possible to form associations that help later retrieval in similar circumstances~\cite{yang2018understanding,ibrahim2018arbis,vazquez2017serendipitous,santos2016augmented}. In other words, new words relevant to the learning context are more likely to be recalled than unrelated words~\cite{edge2011micromandarin}.
AR has the ability to provide context-specific information in an interactive manner. In addition, AR can take any situation, location, environment, or experience to a whole new level by combining digital information with real-world contents. Thus, it has the potential to create more engaging and immersive learning environments. There exists a considerable body of previous work on AR systems that support learning in real-world contexts. For instance, there are systems that provide labels of new words corresponding to real-world objects~\cite{santos2016augmented,draxler2020augmented}, while others create imaginary settings to describe and enhance the physical properties of everyday objects~\cite{ibanez2014experimenting,strzys2018physics}.
\subsection{Vocabulary Learning in AR}
\label{sec:relatedWorkAR}
Previous studies have shown that AR offers many advantages for language and vocabulary learning. For instance, some studies reported that AR improved learning achievements and boosted motivation, engagement and collaboration among learners~\cite{hautasaari2019vocabura,santos2016augmented,ibrahim2018arbis,dalim2020using,draxler2020augmented}. \rev{Despite, some technical limitations of using AR for learning should be taken into account such as such as educators' limited proficiency with the relatively new technology \cite{khoshnevisan2021affordances} or the trade-off between connecting the experience to the context of the current location and providing a flexible and portable experience \cite{wu2013current}.}
Fujimoto et al.~\cite{fujimoto2012relation} \rev{have shown that users can memorise AR information better if it is shown within the location of a target object in the real world (e.g. AR information about a country shown over a map within this country). However, the information to be memorised in study did not take the context of the real environment and users' surroundings into account.}
Several studies presented applications for learning vocabulary using hand-held AR devices. Hautasaari et al.~\cite{hautasaari2019vocabura} developed the VocaBura smartphone application for learning vocabulary during dead time. The application tracks a users' GPS locations and presents vocabulary related to the current location via audio. A study comparing this to an audio-only method showed that 7 days after the study, participants could recall significantly more words. Santos et al.~\cite{santos2016augmented} presented a handheld AR system that displays text, images, animation and sound next to corresponding real-world objects to learn Filipino or German. They compared this system to a non-AR tablet application using a flash card method.
Their results indicate that for tests directly after the experiment non-AR users performed better, yet this difference was not detected for long-term retention.
Positive effects of AR technology in the context of increased motivation and enjoyment have also been detected. For example, Dalim et al.~\cite{dalim2020using} presented a system combining desktop-AR and speech recognition (TeachAR) and found that it increases children's knowledge gain and enjoyment. Similarly, Li et al.~\cite{li2014pilot} explored an AR application for language learning and found that it increased motivation in the beginning, yet for most participants motivation decreased at the end of the study.
The existing body of literature also includes applications for learning vocabulary on AR head-mounted devices. While most previous systems used some sort of marker to align virtual content with physical objects, Vazquez et al.~\cite{vazquez2017serendipitous} presented a platform (WordSense) that detects objects in the physical environment and augments them with additional content for language learning including words, sentences, definitions, videos and audio. However, no formal user study was conducted to evaluate the system.
Another example of using AR head-mounted devices for language learning is ARbis Pictus, a system presented by Ibrahim et al.~\cite{ibrahim2018arbis} which labels objects in the user environment with the corresponding vocabulary in the target language. They compared this system to a conventional flashcard-based system and found that AR was more effective and enjoyable and participants could remember words better both shortly after the experiment and four days later. However, the significance of these findings is limited, because the flashcard and AR systems were inherently different. For example, with flashcards the word was shown on the opposite side to the image depicting word meaning thus the image and word were never shown together. This was not the case in the AR condition where word annotations were always visible for all objects in the scene. Therefore it is not clear if AR accounted for the improved performance or the different learning approach.
In contrast to the presented studies we compare our AR prototype to a non-AR system that is as similar as possible to enable us to measure only the effect of AR without confounding variables like the learning method. To our knowledge, such an experiment has not yet been conducted for AR applications that run on head-mounted devices.
\subsection{Memory Enhancement Techniques}
Research on memory and learning has shown that learning performance and retention depend on different strategies and techniques that can be used to process information in learning~\cite{dunlosky2013}. ``Mnemonic'' is one such technique where the memory capabilities are enhanced by connecting new information to prior knowledge through the use of visuals and/or acoustic cues~\cite{putnam2015,mastropieri1991}. Several researchers experimentally showed that ``Mnemonic'' techniques improve
memory and recall, especially in the area of language learning~\cite{raugh1975,paivio1981,cohen1980,amiryousefi2011}.
In the field of language learning, mnemonics have mostly been used for vocabulary learning~\cite{anonthanasap2014mnemonic}.
One such mnemonic method is the ``keyword method'' in which learners connect the sound of a word they want to learn to one they already know in either their first language or the target language.
Through this process learners create a mental image that helps them remember the association~\cite{pressley1982}. For example, the Japanese word for bread is ``sokupan'' which in English sounds like ``Sock + Pan''. As a result, the learner can imagine a sentence that links a mnemonic keyword with the foreign word. For example, ``sokupan'' can be imagined as frying a sock and putting it on a slice of bread.
A wide range of existing studies in the broader literature have explored the effectiveness of the keyword method~\cite{atkinson1975mnemotechnics,raugh1975,anonthanasap2014mnemonic,wei2015does}. In this context, comparing the keyword method against other methods in vocabulary learning is one of the most common research designs. There, the keyword method has been compared with learning words in context or learning words with no given strategy. For example, Pressley et al.~\cite{pressley1982mnemonic} found the keyword method to be significantly more effective in learning over the context method. Also, Sagarra and Alba~\cite{sagarra2006key} compared rehearsal, semantic mapping displays and the keyword method, and found that the keyword method resulted in the best retention. It has also been shown that the keyword method is superior over systematic teaching~\cite{ king1992toward, pressley1982mnemonic}. In 1975, Atkinson and Raugh~\cite{atkinson1975mnemotechnics} found that participants who were given a keyword along with the translation learned more words and also remembered more words after 6 weeks. In the same sense, Raug et al.~\cite{raugh1977teaching} evaluated the use of the keyword method over a long period of 8 to 10 weeks to teach Russian vocabulary and found it to be highly effective.
Altogether, a significant number of research studies have shown that the keyword method of vocabulary learning is highly effective, yet others showed mixed results~\cite{wei2015does,pearlman1990effectiveness}. For example, a study conducted by Zheng Wei~\cite{wei2015does} found no significant differences between the keyword method, the word-part technique (recognizing part of a word) and the self-strategy.
From the perspective of the learning method, VocabulARy builds upon the work of Anonthanasap et al.~\cite{anonthanasap2014mnemonic} in which the authors propose an interactive vocabulary learning system to teach Japanese that automatically creates keywords using phonetic algorithms. There, if the learner selects an image in the system, the phonetically similar words with image representations will gather around the selected image.
Results showed that the keyword-based vocabulary learning system required significantly lower workload than the other compared methods (e.g.\ paper dictionary and static visualisation in a form of an image).
In summary, our work was inspired by Santos et al. \cite{santos2016augmented}, Vazquez et al. \cite{vazquez2017serendipitous} and Ibrahim et al. \cite{ibrahim2018arbis} who already used AR devices to augment real world objects with annotations for vocabulary learning.
We combined this approach of providing context with a keyword method
which has proven to work well in various experiments thus far \cite{atkinson1975mnemotechnics, sagarra2006key,anonthanasap2014mnemonic}. To further advance this learning method we augment keywords with visualisations.
AR provides ideal conditions for that,
because the keyword and its visualisation can be shown in the same
context as the corresponding physical object.
However, in contrast to existing visualisations of keyword approaches we make a careful selection of keywords so that they not only sound simila
, but can also be visualised with an animation in a meaningful way. For example, a Japanese word for bread is ``sokupan'' and sounds similar to keyword ``Sock+Pan'' which can be visualised with an animation of frying a sock in a pan and putting it on a slice of bread.
We do this to uncover if one can improve vocabulary learning
beyond the influence of the traditional keyword method, by augmenting the
keywords with animated visualisations. According to Shapiro and Waters \cite{shapiro2005investigation} the level of visual imagery of a word enhances vocabulary learning suggesting our approach should work, however no formal evaluation of this exists (~\autoref{tab:relatedwork}).
This makes our work both ground breaking and timely.
\section{Augmented Vocabulary Learning / Learning Vocabulary with Visualisations in Real Life Context}
This work presents two prototype systems for vocabulary learning developed on an AR head-mounted-display (HMD) (i.e.\ Microsoft HoloLens 2) and an \rev{$10.5~in$} Android tablet device \rev{(i.e.\ Samsung Galaxy Tab S4)} (\autoref{fig:teaser}). To the best of our knowledge, AR HMD systems for vocabulary learning have not yet been evaluated against comparable non-AR systems (see \autoref{sec:relatedWorkAR}). Both AR and tablet systems combine the keyword method with physical objects. With the AR HMD, our system allows the user to look around a physical room where certain objects are labelled with a button indicating that their translation is available. Upon clicking these buttons with a hand gesture, the English and Japanese word, as well as a keyword with or without visualisation, appears. ~\rev{In addition to the words in both languages and a keyword, an audio of the pronunciation is played. The details of application design and implementation of both prototypes are described in the following sub sections.}
\subsection{Application Design}
\label{sec:application_design}
\rev{In this section we describe key design decisions regarding annotations, animated visualisations and interactions. Careful consideration was given to the selection of annotation and visualisation size. Previous research showed the size of images affects our ability to remember image content during naturalistic exploration~\cite{Shaimaa2022}. However in such exploration individuals are first asked to freely explore an image without any instructions and are then asked about the details observed. As such there is no guarantee that the visual attention is equally distributed across the observed image and as the image gets smaller so does the key information, which makes it easier to miss it. }
\rev{To prevent participants from missing key information we design our application to effectively guide visual attention. The application shows only one word visualisation at a time, which avoids cluttering the scene and overloading participants with too much information. Furthermore, we specifically chose to place AR buttons on the physical surface at close proximity to the object of which word was being memorised. This led users to the appropriate physical location from which AR visualisations are clearly visible as the corresponding annotation and animated visualisation size were appropriated for such viewing. To make the \textsc{non-ar} and \textsc{ar} condition as comparable as possible we made sure that the relative size of annotations and animation was roughly the same in both conditions.}
\rev{Furthermore, in one of the instruction modes, the keyword is also accompanied by its animated visualisation. Such a visualisation consists of a 3D model resembling the keyword and a short animation involving the objects in question. Besides, the user can also listen to the pronunciation of the Japanese word again by clicking a virtual button that is displayed next to the keyword. For example, Figure~\ref{fig:teaser}b shows how the English word ``Postcard" and the corresponding Japanese word ``Hagaki" are displayed. ``Hagaki" sounds like ``Hug + A Key", so it is displayed as a keyword and visualised through ``hugging a key".}
\subsection{Implementation of AR Prototype}
\label{sec:implementation_of_AR}
\rev{The AR prototype was implemented for Microsoft HoloLens~2\footnote{https://www.microsoft.com/en-us/hololens} using the Unity3D game development engine\footnote{https://unity.com/}. For camera pose tracking, the HoloLens inbuilt tracking system was used. To initialise the positions of augmentations in our application, we used Vuforia\footnote{https://developer.vuforia.com/} and our custom-made image markers (see Figure~\ref{fig:markers})}. \rev{We opted for markers in order to support a reliable and accurate detection of physical objects that correspond to the set of vocabulary. These markers were removed from the scene after initialisation.}
\begin{figure}[t]
\includegraphics[width=1\columnwidth]{figures/markers.png}
\caption{Custom-made image markers.}
\label{fig:markers}
\end{figure}
\rev{It would be technically possible to use object recognition techniques to perform object identification and localisation as in~\cite{Castle2009,Salas2013,Salman2018}. Such implementation could support arbitrary environments without prior preparation, which would enable wide implementation of the system.} However, this was not the scope of this work, as we focus on the effect of learning vocabulary using AR and visualisations.
To interact with the virtual contents, we use HoloLens’ built-in hand-tracking and gesture inputs, \rev{which allow the user to interact with virtual content by moving the hands or fingers to content’s corresponding positions. More specifically we chose to use virtual buttons placed on top of planar physical surfaces such as a table or a wall. In this way, touching a surface acted as a tangible feedback making the button press more realistic.}
\subsection{Implementation of Android Prototype}
The Android version of the prototype was also implemented using the Unity 3D development environment, but deployed on a Samsung Galaxy Tab S4~\footnote{https://www.samsung.com/global/galaxy/galaxy-tab-s4/}
tablet device. Its functionality is similar to the AR prototype.
However, instead of seeing the real world environment, an image of an environment is displayed on the screen. In our prototype this was either a kitchen or an office environment. As in the AR prototype certain objects are accompanied with a button. If the user touches the button, the corresponding English and Japanese words, keywords, and animated visualisations appear (Figure~\ref{fig:teaser}c). Visualisations only appear in one instruction mode. \rev{As the size of all objects was adapted to be clearly visible on the screen and to ensure that the relative size of annotations and animation was roughly the same in both conditions (see \autoref{sec:application_design}), we did not provide a feature to zoom into the scene.}
\rev{Compared to the AR implementation, the tablet application can be used anywhere as it can also show scenes that are not related to the real-world environment around the learner. Because all kinds of virtual scenes can be presented, the tablet allows a more flexible use, such as learning words related to a forest while sitting in the living room.}
\subsection{Generating Keywords}
For generating the keywords, we conducted a small informal survey with 7 participants. They were presented with 28 Japanese-English word pairs and were asked to come up with English words sounding similar to the Japanese words.
At the end, we selected 20 words for the study for which the participants could come up with good keywords.
As already mentioned, the process of finding keywords could also be automatized \cite{anonthanasap2014mnemonic}, but for the scope of this study, this was not needed.
\section{Research Method}
This section describes the study conditions, study design, participants’ sampling, study procedure, data collection instruments, and analysis.
\subsection{Study Conditions}
\label{sec:study_conditions}
We designed four study conditions based on two distinct vocabulary learning scenarios. The first scenario displays ten physical objects related to a kitchen environment, while the second shows an office environment with ten relevant physical objects. In each of these scenarios a different
\textsc{instruction mode} is provided. This is either a \textsc{keyword} instruction mode or a \textsc{keyword + visualisation} instruction mode. In the \textsc{keyword} condition, only the written keywords are displayed to support the participants in remembering the word. In the \textsc{keyword + visualisation} condition, an animated 3D visualisation of the keyword is displayed in addition to the written keyword.
These variations are presented to the participants on two different \textsc{Interfaces}, one in \textsc{ar} on a HoloLens2 and one in \textsc{non-ar} on an Android tablet. These study conditions are illustrated in Figure~\ref{fig:design}.
\begin{figure}[t]
\includegraphics[width=1\columnwidth]{figures/designvocab.png}
\caption{Study design and conditions.}
\label{fig:design}
\end{figure}
\subsection{Study Design}
Our study design has two independent variables: \textsc{instruction mode} which is \textsc{keyword} or \textsc{keyword + visualisation} and \textsc{interface} which is either \textsc{ar} or \textsc{non-ar}.
We used a 2 × 2 mixed design (see Figure~\ref{fig:design})
because a within-subjects design would make the study, which is mentally demanding, too long (i.e.\ approximately two hours).
We believe that such a long duration could intensify the fatigue and hinder the performance of the participants. Furthermore, running all 4 conditions in a within-subject design would require 2 additional learning scenarios making it more difficult to counterbalance for scenario effects. Reducing the study length by running the study in several sessions also introduces other biases and practical issues.
Therefore, the \textsc{instruction mode} was evaluated as a within-subjects variable and the \textsc{interface} as a between-subjects variable. This means each participant was either using the \textsc{ar}-prototype or the \textsc{non-ar}-prototype, but all participants experienced the \textsc{keyword} and the \textsc{keyword + visualisation} conditions.
To avoid the ``order effects'', which may have an influence on participants' performance due to the order in which the conditions are presented \cite{schuman1981context}, the order of the \textsc{instruction mode}
as well as the order of the learning scenarios (the kitchen and the office environments) was counter balanced. Special care was given to counterbalance the learning scenario across all independent variables.
\subsection{Participants}
The study was completed by 32 participants, all voluntarily recruited from our university.
None of the participants had any prior knowledge of the Japanese language (identified via a short competency test questionnaire). The between subject sample comprised of 16 participants for the \textsc{ar} condition (10 females) and 16 participants for the \textsc{non-ar} condition (7 females). All the participants were between the age of 19 to 30 years, with the mean of $\overline{x} = 21.6$ and ${SD} = 2.1$.
\rev{All our participants were computer science undergraduate and graduate students. No student had previous experience with AR HMDs. The mean age for the \textsc{ar} group was $\overline{x} = 22.13$ (${SD} = 2.68$), and for \textsc{non-ar} group $\overline{x} = 21.13$ (${SD} = 1.26$). The percentage of females in the \textsc{ar} group was $\overline{x} = 62.5\%$, and in the \textsc{non-ar} group $\overline{x} = 43.75\%$. The groups were comparable. }
\subsection{Procedure}
\rev{On arrival participants were first randomly assigned to one of the two groups (\textsc{ar} or \textsc{non-ar}). Next, we randomly selected which instruction mode would be used first (\textsc{keyword} or \textsc{keyword + visualisation}). Finally, the learning scenario was also randomly chosen (kitchen or office environment). All randomisations were counterbalanced.}
After being assigned to a particular condition, participants were given a consent form to sign, together with the Participant Information Sheet (PIS) outlining the entire research process in simple language. After briefly explaining the vocabulary learning task with the two learning scenarios, they were asked to fill in the Questionnaire on Current Motivation (QCM)~\cite{rheinberg2001qcm}.
Before starting the actual task they completed a five-minute training session on a separate demo application to understand the VocabulARy interface.
Participants were then given up to 15 minutes to complete the first language learning scenario with 10 words. After finishing the first scenario, they filled in the NASA Task Load Index (NASA-TLX) questionnaire~\cite{hart1988development} and, then answered a post-test questionnaire developed by the researchers to assess their immediate recall performance. After taking a 5 minutes break, they were again given up to 15 minutes to complete the second language learning scenario with 10 words. Subsequent to the second scenario, they filled in the same NASA-TLX and the immediate recall questionnaires.
After finishing the experiment, participants were given another two standard questionnaires -- a system usability (SUS)~\cite{lewis2009factor} and a user experience questionnaire (UEQ)~\cite{schrepp2017design}. At the end, participants filled in a short post-questionnaire with demographic questions, questions about previous experience with AR technology and vision problems they might have. The entire experiment took 45 to 60 minutes.
One week later, participants were again requested to answer the same post-test questionnaire developed by the researchers to assess their delayed recall performance as undertaken in prior work \cite{hautasaari2019vocabura}.
\subsection{Data Collection}
\label{subsec:data_collection}
In order to measure the task completion time, the time stamp data (start time and end time) were logged by the system.
To measure the motivation, the short form of Questionnaire on Current Motivation (QCM) with 12 items/questions~\cite{rheinberg2001fam,freund2011measure} was used. Anxiety, challenge, interest, and probability of success were measured on a five-point Likert scale, with the labels ``strongly disagree'' at 1 and ``strongly agree'' at 5. Rather than aiming for constructing sub-dimensions (i.e., anxiety, challenge, interest, and probability of success), we used the mean score of the 12 items as an indicator for the overall motivation.
The NASA Task Load Index (NASATLX)~\cite{hart2006nasa,nasa2006tlx} was used to measure participants’ subjective level of workload/mental effort. Participants rated five of its six dimensions (mental demand, physical demand, temporal demand, effort and frustration) on a 20-point scale ranging from 0 (very low) to 20 (very high). The endpoints of the sixth dimension (own performance) were success and failure. Finally, the overall workload/mental effort was calculated across these six dimensions.
In the retention questionnaires, participants were asked for the Japanese translations of the vocabulary they learned. This was undertaken immediately after interacting with the prototype (Immediate Recall) and after one week (Delayed Recall).
\rev{Learning efficiency was determined based on the ratio of performance to the difficulty of the learning task as proposed in~\cite{paas1993efficiency}. The performance of each study condition was based on the recall scores participants obtained after completing the task. The difficulty of the task was based on the mental effort they invested during the learning phase (see \autoref{subsec:ME}). Performance and task difficulty data were then standardised using Formula~\ref{eq:zscore} where $z$ = Z-score,
$r$ = Raw data score, $M$ = Population mean, and $SD$ = Standard deviation.}
\rev{\begin{equation} \label{eq:zscore}
z = \frac{r-M}{SD}
\end{equation}
\\
}
\rev{Next, the learning efficiency $(E)$ was assessed for each of the four study conditions (\autoref{sec:study_conditions}) using Formula~\ref{eq:2D}~\cite{paas1993efficiency,halabi2006applying,clark2011efficiency} where $E$ = Learning efficiency, $z_P$ = Average performance in Z-scores, and $z_M$ = Average task difficulty in Z-scores. This was done for both immediate recall performance (immediately after participants had completed the task) and delayed recall performance (a week after participants had completed the task). Note that square root of 2 in this formula comes from the general formula for the calculation of distance from a point, $p(x, y)$, to a line, $ax+by+c=0$.}
\rev{\begin{equation} \label{eq:2D}
E = \frac{z_P-z_M}{\sqrt{2}}
\end{equation}
}
To measure the usability of the system, we used the System Usability Scale (SUS), a ten question questionnaire originally created by Brooke, 1996~\cite{brooke1996sus}, on a five-point Likert scale, ranging from ``Strongly'' agree at 1 to ``Strongly disagree'' at 5. For measuring the user experience we used the short version of the User Experience Questionnaire (UEQ-S)~\cite{schrepp2017design,mar2019ueq} with eight items/questions, reported on a 7-point Likert scale. The first four represent pragmatic qualities (Perspicuity, Efficiency and Dependability) and the last four hedonic qualities (Stimulation and Novelty)~\cite{mar2019ueq}.
\subsection{Data Analysis}
The analysis was completed in R studio. Each data set collected in the study was first checked \rev{for mixed ANOVA assumptions. The normality assumption was checked using the Shapiro–Wilk normality test~\cite{sha1965bio}.
Most of the data sets were normally distributed with some of them only approximately normally distributed.
The homogeneity of variance assumption of the between-subject factor (\textsc{interface}) was checked using the Levene’s test~\cite{schultz1985} that confirmed homogeneity of variances for each variable ($p > 0.05$). Finally, the homogeneity of covariances of the between-subject factor (\textsc{interface}) was evaluated using the Box’s M-test of equality of covariance matrices. The test showed homogeneity of covariances for each variable ($p > 0.001$). Considering the fact that some of the data sets were only approximately normally distributed, we used robust statistical methods implemented in the ``WRS2'' R package to conduct the analysis~\cite{mair2020robust}, which is a standard practice in such cases.}
In all statistical analyses we used a significance level $p-value > 0.05$ and a restrictive confidence interval (CI) of 95\%.
For immediate recall, delayed recall, mental effort, task completion time and learning efficiency, the statistical significance was examined using a \rev{robust} two-way mixed ANOVA on the 20\% trimmed means--``bwtrim''~\cite{mair2020robust}.
\rev{For motivation, system usability and user experience, the statistical significance was examined using a Mann–Whitney U test~\cite{sullivan2013}}.
Asterisk notation is used in tables to visualise statistical significance (ns: $p > 0.05$, *: $p < 0.05$, **: $p < 0.01$, and ***: $p < 0.001$).
\rev{To assess the reliability of motivation and mental effort questionnaires, we performed a Cronbach’s alpha test. Estimated reliability for each questionnaire (motivation Cronbach’s $\alpha = 0.77 $ and mental effort $\alpha = 0.85 $) is acceptable for research purposes~\cite{ary2018intro}. To measure the reliability of retention questionnaires, we conducted a Kuder-Richardson 20 test~\cite{kuder1937theory}. The $KR = 0.61 > 0.5$ value indicates that the reliability of the retention questionnaire is also acceptable.}
We also conducted a power analysis to check and validate the results and findings of the study. We calculated the effect size (Cohen's $d$) for each data set collected~\cite{cohen1988stat}, selected the minimum effect size (Cohen's $d = 0.69$) and estimated the statistical power ($1-\beta$) of data to check whether the type II error probability ($\beta$) is within an acceptable range for a given sample size ($n=16$ per group) and a significance level ($\alpha = 0.05$). The estimated power value 0.96 shows that with the given sample size, we can have more than a 90\% chance that we correctly reject the null hypothesis with a significance level of 0.05.
\begin{figure*}[ht]
\centering
\includegraphics[width=2\columnwidth]{Plots/res11.pdf}
\caption{Means with standard deviation and ANOVA results for: (a) immediate recall performance in percentage of correctly remembered words; (b) delayed recall performance in percentage of correctly remembered words; (c) Mental effort.}
\label{fig:set1}
\end{figure*}
\section{Results}
\label{sec:results}
The results and analysis are based on the 32 participants who had completed all the facets of the study, i.e., the motivation questionnaire, the basic training, the vocabulary learning task and the post-questionnaires include mental effort, immediate recall and delayed recall tests. Participants had not undertaken any extra study for the delayed recall test.
\rev{We conducted a statistical analysis including gender as a between-subject factor (2 (\textsc{gender}) x 2 (\textsc{interface}) x 2 (\textsc{instruction mode}) mixed design) in order to exclude possible gender-based differences. The results did not indicate any statistical significant effect of \textsc{gender} on any dependant variable: immediate and delayed recall, mental effort, task completion time and, immediate and delayed learning efficiency.} The results related to these variables are presented in the following subsections.
\subsection{Immediate Recall}
The mean values of immediate recall performance and the ANOVA results across study conditions, i.e., the \textsc{interface} (\textsc{ar} and \textsc{non-ar}) and, the \textsc{instruction mode} (\textsc{keyword} and \textsc{keyword+visualisation}) are shown in Figure~\ref{fig:set1}a.
A significant main effect of \textsc{interface} on immediate recall performance could be detected \rev{($F(1,60) = 7.46$, $p < 0.05$, $n^{2}p = 0.11$)}. Here, participants' immediate recall scores were significantly better in \textsc{ar} condition ($\overline{x} = 88.13\%$, $SD = 10.34$) compared to the \textsc{non-ar} condition ($\overline{x} = 79.38\%$, $SD = 14.67$).
Also, a significant main effect of \textsc{instruction mode} on immediate recall performance could be detected \rev{($F(1,60) = 12.34$, $p < 0.001$, $n^{2}p = 0.17$)}. Results indicated that participants' immediate recall scores in \textsc{keyword + visualisation} ($\overline{x} = 89.38\%$, $SD = 10.75$) were significantly better than in \textsc{keyword} ($\overline{x} = 78.13\%$, $SD = 14.26$). No significant interaction effect could be found between \textsc{interface} and \textsc{instruction mode} \rev{($F(1,60) < 0.001$, $p > 0.05$, $n^{2}p < 0.001$)}.
\subsection{Delayed Recall}
The mean values of delayed recall performance and the ANOVA results across all study conditions, i.e., the \textsc{interface} (\textsc{ar} and \textsc{non-ar}) and, the \textsc{instruction mode} (\textsc{keyword} and \textsc{keyword + visualisation}) are shown in Figure~\ref{fig:set1}b.
No significant main effect was found between \textsc{interface} on delayed recall performance \rev{($F(1,60) = 3.86$, $p > 0.05$, $n^{2}p < 0.001$)}. The significance was only marginally missed. In addition, the mean values for the \textsc{ar} condition ($\overline{x} = 77.50\%$, $SD = 18.50$) were higher than for the \textsc{non-ar} condition ($\overline{x} = 65.30\%$, $SD = 20.00$).
A significant main effect of \textsc{instruction mode} on delayed recall could be detected \rev{($F(1,60) = 20.39$, $p < 0.001$, $n^{2}p = 0.25$)}. Results indicate that participants' delayed recall scores in \textsc{keyword + visualisation} ($\overline{x} = 80.88\%$, $SD = 13.60$) were significantly better than in \textsc{keyword} ($\overline{x} = 61.88\%$, $SD = 19.65$). No significant interaction effect could be found between \textsc{interface} and \textsc{instruction mode} \rev{($F(1,60) = 0.27$, $p > 0.05$, $n^{2}p < 0.001$)}.
\subsection{Mental Effort}
\label{subsec:ME}
The mean values of mental effort (measured by NASA-TLX) invested to carry out the learning task and the ANOVA results over the study conditions are illustrated in Figure~\ref{fig:set1}c.
A significant main effect of \textsc{interface} on mental effort could be detected \rev{($F(1,60) = 57.05$, $p < 0.001$, $n^{2}p = 0.49$)}, such that the mental effort was significantly lower for \textsc{ar} condition ($\overline{x} = 34.36$, $SD = 7.14$) compared to the \textsc{non-ar} condition ($\overline{x} = 47.85$, $SD = 7.02$). Also, a significant main effect of \textsc{instruction mode} on mental effort could be detected \rev{($F(1,60) = 43.83$, $p < 0.001$, $n^{2}p = 0.42$)}. Here, participants' mental effort in \textsc{keyword + visualisation} ($\overline{x} = 35.19$, $SD = 6.42$) was significantly lower than in \textsc{keyword} ($\overline{x} = 47.01$, $SD = 7.73$). No significant interaction effects was found between \textsc{interface} and \textsc{instruction mode} \rev{($F(1,60) = 0.01$, $p > 0.05$, $n^{2}p < 0.001$).}
\begin{figure*}[ht]
\centering
\includegraphics[width=2\columnwidth]{Plots/res22.pdf}
\caption{Means with standard deviation for: (a) Motivation before starting the experiment and \rev{Mann–Whitney U test results}; (b) SUS score and \rev{Mann–Whitney U test results}; (c) UEQ factors (pragmatic and hedonic) and all item/question together (overall) with \rev{Mann–Whitney U test results}.}
\label{fig:set2}
\end{figure*}
\subsection{Motivation}
The mean values of motivation between \textsc{Interfaces} (\textsc{ar} and \textsc{non-ar}) is illustrated in Figure~\ref{fig:set2}a. The data summarised in Figure~\ref{fig:set2}a is analysed using a \rev{Mann–Whitney U test}.
A significant effect was found between \textsc{Interfaces} for participants' motivation \rev{($U(N_{AR} = 16, N_{non-AR} = 16) = 48.50$, $p < 0.001$)}. There, the motivation was significantly higher for the \textsc{ar} condition ($\overline{x} = 3.69$, $SD = 0.36$) compared to the \textsc{non-ar} condition ($\overline{x} = 3.29$, $SD = 0.27$).
\subsection{System Usability}
The answers to System Usability Scale (SUS) questions/items are reported on a 5-point Likert scale. The SUS scores are calculated as follows: for each of the odd numbered questions, subtract one from the user response, while for each of the even numbered questions, subtract their response from five and, add up the converted responses for each user and multiply that total by 2.5. This converts possible values to the range of 0 to 100 instead of 0 to 40. These adjustments are kept throughout the rest of the analysis.
The average SUS scores for \textsc{ar} and \textsc{non-ar} \textsc{Interfaces} are illustrated in Figure~\ref{fig:set2}b.
A Mann–Whitney U test indicated that there was no significant effect between the \textsc{Interfaces} for SUS \rev{($U(N_{AR} = 16, N_{non-AR} = 16) = 91.50$, $p > 0.05$)}.
\subsection{User Experience}
\rev{The UEQ-s questionnaire provides a benchmark to compare user experience between different systems~\cite{hinderks2018}. It measures pragmatic qualities of a system (including efficiency, perspicuity and dependability) and hedonic qualities (including stimulation and novelty). The overall value was calculated from all 5 UEQ scale means. We adapted the standard method as suggested in~\cite{schrepp2017design,mar2019ueq} for calculating the scale means for each factor individually (efficiency, perspicuity, dependability, stimulation and novelty) and to obtain values for pragmatic quality, hedonic quality and overall user experience for both \textsc{ar} and \textsc{non-ar} systems.}
In the \textsc{AR} condition the pragmatic ($\overline{x} = 2.48$) and hedonic ($\overline{x} = 2.41$) qualities, as well as overall user experience ($\overline{x} = 2.45$) were all perceived as \rev{excellent} \rev{(benchmarks for an excellent score: pragmatic $>$ 1.73, hedonic $>$ 1.55, overall $>$ 1.58)}. In the \textsc{non-ar} condition the mean value of pragmatic \rev{quality was perceived as excellent ($\overline{x} = 2.23$), and the} overall experience \rev{as good ($\overline{x} = 1.55$)} \rev{(benchmarks for a good score: pragmatic between 1.55 - 1.73, hedonic between 1.25 - 1.55, overall between 1.4 - 1.58)}. However, the hedonic factor was \rev{perceived as below average ($\overline{x} = 0.88$)} \rev{(benchmarks for below average score: pragmatic between 0.73 - 1.14, hedonic between 0.88 - 1.24, overall between 0.68 - 1.01)}.
\rev{The overall user experience was analysed using a Mann–Whitney U test. The data is presented in \autoref{fig:set2}c. A significant effect was found between \textsc{Interfaces} ($U(N_{AR} = 16, N_{non-AR} = 16) = 16.00$, $p < 0.001$).}
\subsection{Task Completion Time}
The mean values of task completion time across study conditions, i.e., the \textsc{interface} (\textsc{ar} and \textsc{non-ar}) and, the \textsc{instruction mode} (\textsc{keyword} and \textsc{keyword + visualisation}) are shown in Figure~\ref{fig:set3}a. The data summarised in Figure~\ref{fig:set3}a is analysed using a between-within subjects ANOVA on the 20\% trimmed means~\cite{mair2020robust}.
A significant main effect of \textsc{interface} on task completion time could be detected \rev{($F(1,60) = 14.06$, $p < 0.001$, $n^{2}p = 0.19$)}. Here, the completion time was significantly lower for \textsc{ar} condition($\overline{x} = 618.57 s$, $SD = 77.92 s$) compared to the \textsc{non-ar} condition ($\overline{x} = 698.41 s$, $SD = 90.59 s$).
Also, a significant main effect of \textsc{instruction mode} on task completion time could be detected \rev{($F(1,60) = 31.19$, $p < 0.001$, $n^{2}p = 0.34$)}, such that \textsc{keyword + visualisation} ($\overline{x} = 599.04 s$, $SD = 74.99 s$) resulted in a significantly lower completion time than \textsc{keyword} ($\overline{x} = 717.95 s$, $SD = 93.52 s$). There was no significant interaction effect found between \textsc{interface} and \textsc{instruction mode} \rev{($F(1,60) = 0.25$, $p > 0.05$, $n^{2}p < 0.001$)}.
\subsection{Learning Efficiency}
\begin{figure*}[ht]
\centering
\includegraphics[width=2\columnwidth]{Plots/res33.pdf}
\caption{Means with standard deviation and ANOVA results for: (a) Task-completion-time in seconds; (b-c) immediate recall and delayed recall learning efficiency.}
\label{fig:set3}
\end{figure*}
\begin{figure*}[ht]
\centering
\includegraphics[width=2\columnwidth]{Plots/res4.pdf}
\caption{Learning efficiency: (a) immediate recall learning efficiency; (b) delayed recall learning efficiency.}
\label{fig:set4}
\end{figure*}
The average learning efficiencies for immediate recall and delayed recall across study conditions
are shown in Figure~\ref{fig:set3}a and Figure~\ref{fig:set3}b respectively. \rev{For the definition of learning efficiency refer to~\autoref{subsec:data_collection}}. The data summarised in Figure~\ref{fig:set3}a and Figure~\ref{fig:set3}b are analysed using a between-within subjects ANOVA on the 20\% trimmed means~\cite{mair2020robust}.
Statistical analysis in Figure~\ref{fig:set3}b and Figure~\ref{fig:set3}c showed no significant effect of \textsc{interface} for participants' learning efficiency for immediate recall \rev{($F(1,60) = 9e-6$, $p > 0.05$, $n^{2}p < 0.001$)} or delayed recall \rev{($F(1,60) = 9e-5$, $p > 0.05$, $n^{2}p < 0.001$)}. A significant main effect of \textsc{instruction mode} on participants' learning efficiency for immediate recall could be detected \rev{($F(1,60) = 34.14$, $p < 0.001$, $n^{2}p = 0.36$)}. There, the learning efficiency was significantly higher in \textsc{keyword + visualisation} support ($\overline{x} = 0.92$, $SD = 0.23$) compared to the \textsc{keyword} ($\overline{x} = -0.92$, $SD = 0.23$). A significant main effect on participants' learning efficiency for delayed recall also could be detected \rev{($F(1,60) = 41.25$, $p < 0.001$, $n^{2}p = 0.41$)}. There, the learning efficiency was significantly higher in \textsc{keyword + visualisation} instruction mode ($\overline{x} = 1.07$, $SD = 1.15$) compared to the \textsc{keyword} ($\overline{x} = -1.07$, $SD = 1.32$) mode. There was no significant interaction effect found between \textsc{interface} and \textsc{instruction mode} for in immediate recall \rev{($F(1,60) = 0.07$, $p > 0.05$, $n^{2}p < 0.001$)} or delayed recall \rev{($F(1,60) = 0.18$, $p > 0.05$, $n^{2}p < 0.001$)}.
\section{Discussion and future directions}
For this study, we developed an AR system called VocabulARy, that supports learning new Japanese words, but can be expanded to support other languages. The system was used to evaluate user experience, system usability, mental effort, motivation and memory recall
when shown keywords over the objects vs. keywords together with a visualisation of the objects. These were compared in two interfaces: \textsc{ar} (Microsoft HoloLens 2) and a \textsc{non-ar} (Android tablet computer). We used the two interfaces to investigate whether showing keywords and visualisations in context of immediate surrounding compared to the context provided on the virtual scene on the screen results in any performance difference.
\subsection{Usability and User Experience}
The results of the study show that participants evaluated both \textsc{ar} and \textsc{non-ar} prototypes with good usability scores, clearly higher than average (68) and no significant difference between the two could be found. \rev{In addition, during the study we did not observe any readability problems (e.g. none of the users tried to zoom in on the tablet computer in order to make it easier to view presented information and none of the AR HMD users were observed to move very close to augmentations).
This provided a good} basis for further investigation, as we wanted to make the comparison as fair as possible by trying to not influence learning performance with usability issues \rev{as well as by making both conditions as comparable as possible (see \autoref{sec:application_design})}.
It has been shown for example that the unfamiliarity with AR could result in lower performance as has been reported in prior work~\cite{wille2014prolonged}. In addition, the user experience in both conditions has been rated very positively with a higher score for \textsc{ar} regarding the hedonic factors represented by Stimulation and Novelty. This makes sense, as \textsc{ar} is still an exciting and less widely used technology compared to tablet computers for many users.
\rev{A recent study also revealed that the size of images affects our ability to remember image content during naturalistic exploration~\cite{Shaimaa2022}. Although our study did not involve naturalistic exploration, it clearly steered participants’ attention, and we made extra care that both \textsc{ar} and \textsc{non-ar} showed comparable imagery, it would still be interesting to explore if the size of imagery has an effect on the ability to memorise vocabulary words.}
The prolonged use of HMDs in the current form factor can also influence the usability and thus performance of users.
Some studies have already investigated the effects of the HMDs weight, their pressure on the face, latency, image quality and the authenticity of the representation of digital objects~\cite{guo2019mixed, guo2019evaluation, shen2019mental, steinicke2014self}. However, these issues will likely be addressed with future development of HMDs.
\subsection{AR vs Non-AR}
Our results show that immediate recall (a recall of words right after the study) in the \textsc{ar} system is significantly higher compared to the \textsc{non-ar} system. However, no statistical significance was detected for delayed recall (a recall of the same words a week after the study). Nonetheless, it is important to note that significance was only marginally missed for delayed recall. The results can thus not confirm the outcomes of a previous study conducted by Ibrahim et al.~\cite{ibrahim2018arbis} who report a significantly better performance of the \textsc{ar} system compared to \textsc{flashcards} for both immediate and delayed recall. One of the reasons, and also a major difference between this and our study, might be that in the aforementioned work, the learning methods were not identical in both conditions, which could have placed the AR system at an advantage. For example, with flashcards the word was shown on the opposite side to the image depicting word meaning; thus, the image and word were never shown together. This was not the case in our \textsc{ar} condition where the word annotations were always visible for a selected object in the scene. In comparison, we carefully designed our experiment to minimise any such confounding variable that might influence the results.
Furthermore, participants expressed a significantly higher level of motivation in the \textsc{ar} condition. This is in line with previous work~\cite{dalim2020using, li2014pilot} and should be considered when interpreting our results since motivation can be an important factor in learning~\cite{chen2009effect} and technology can play a significant role in this~\cite{lin2017study}. What causes higher motivation falls out of the scope of this study; however, one could hypothesise that the novelty of the AR plays an important role. The observations show that participants were excited about testing the AR HMD compared to using a tablet. This introduces a need for a longitudinal study of using AR in vocabulary learning, \rev{as the influence of motivation might decrease with increasing familiarity with the system}.
Interestingly, the \textsc{ar} condition also outperformed the \textsc{non-ar} condition in task completion time (about 11\% faster). This results show that participants were able to learn all words faster in \textsc{ar} condition compared to the \textsc{non-ar} condition whilst also achieving higher immediate recall scores. This result is also somewhat surprising as \textsc{ar} is at a disadvantage to \textsc{non-ar} for activating objects. That is, target selection in our setup was typically faster on a tablet computer compared to in mid-air tapping on a HMD. Furthermore, a tablet computer also offered instant access to all buttons at the same distance, whereas users need to physically move to activate some of the buttons in AR. \rev{One future direction could involve making users spend the same amount of time in both conditions and explore if this would further improve the performance of \textsc{ar} condition.}
\subsection{Keyword vs. Keyword + Visualisation}
Regarding our second independent variable \textsc{instruction mode}, our results clearly show that vocabulary learning can be improved beyond the traditional keyword method, by augmenting the keywords with animated 3D visualisations. We found overwhelming evidence for this in all metrics, such as immediate and delayed recall, learning efficiency, mental effort, and even task completion time.
This is in line with observations by Shapiro and Waters~\cite{shapiro2005investigation}, who reported that the level of visual imagery of a word enhances vocabulary learning. In this work, we go beyond simple imagery and show that the 3D animated content is potentially an even more effective approach. This opens up another direction for future work involving the necessity for detailed comparison of the effect of different visualisation techniques.
As mentioned, our results showed that providing visualisations for keywords reduced the mental effort for vocabulary learning. However, reducing mental effort in learning scenarios can also result in reduced learning outcomes. For example, Salmon showed that the amount of invested mental effort positively correlates with learning efficiency~\cite{salomon1984television}. Knowing this, we could expect a decline in performance of immediate and delayed recall. One reason why this did not happen in our case might be the fact that enough effort was needed in order to complete the task (moving, tapping, remembering). One way to increase the mental effort would be to require users to come up with their own associations for keywords instead of providing predefined keywords as in our study.
Providing predefined keywords might not be in line with user's mental model, thus making it difficult for the user to (mentally) visualise them. This could have made visualisations in our study more important. However, previous research suggests that users might have difficulties coming up with their own keywords and that predefined keywords lead to better learning outcomes~\cite{atkinson1975mnemotechnics}. Despite, future studies should explore if the difference persists also when personalised keywords are used in learning scenario presented in this study.
\subsection{Implications and design recommendations}
The benefits of the keyword method over other learning techniques are well known~\cite{ king1992toward, pressley1982mnemonic}. We have shown that the keyword method can provide even better results by adding animated visualisations that depict the keyword itself. This is an important implication for designing such applications for vocabulary learning. However, this also opens up several questions. For example, do animations of visualisations of keywords contribute to the learning outcome or would visualisation without an animation result in comparable efficiency?
\rev{One of the most important things to consider in designing such a system is the keywords or words from the language a learner speaks that sound similar to the word being learnt.} In our prototype, we only used a limited set of vocabulary for which we were able to find appropriate keywords and accompanying visualisations.
Finding these keywords and visualisations takes time, which needs to be considered when thinking about applying this method in practice.
And it is no necessary that every word would have an appropriate keyword.
Crowd-sourcing could be one approach to tackle this problem. Additionally, approaches for automating the process of finding keywords already exist~\cite{anonthanasap2014mnemonic}. Also, our future direction will involve investigating the effect of asking users to choose their own keywords and visualisations. A system that would use a combination of these approaches could probably satisfy a variety of learning types.
\rev{Another thing to keep in mind, and we are not aware of any study investigating it, is the fact that the vast number of keywords might be overwhelming for users. One of the unanswered question is thus how many keywords is recommended to provide at one time (in our study only one was shown at the time to direct users).}
\rev{For the purpose of this study we used marker based tracking to initialise the settings in AR. As such, our system was linked to a particular physical space. To enable wider adoption, another space-independent object recognition technique should be used as discussed in \autoref{sec:implementation_of_AR}. Such a system would also need to have a database of objects with the corresponding keywords available upfront so when users look at a physical scene AR visualisations would be fetched on the fly.}
Only two participants used all the available time to learn and all 10 words were correctly remembered in 23\% of immediate and 4\% of delayed recall tests. For immediate recall we might have reached the ceiling effect, and making the task more difficult would highlight even greater changes between the test conditions. This was even more obvious for delayed recall, where only very few users finished the test with no errors. \rev{This could be taken in consideration when building such a system -- during the testing phase the system should try to increase the level of engagement and encourage users to take more time, while and after testing the system should encourage users to rethink about wrong answers.}
\subsection{Limitations}
\rev{As explained in \autoref{sec:results} gender did not have a significant effect on the results of the study. However, future work should look into a possible gender bias in more detail with a higher number of participants, as our result on this is not conclusive.}
\rev{Another thing to consider in our study is age bias. However, the age group studied is highly mobile, spending extended periods of time in foreign countries (for example, the EU Erasmus+ programme alone funds more than half a million exchanges yearly~\cite{Erasmus}). As such, this group could benefit from an improved vocabulary learning system. Nevertheless, the results cannot be generalised over the whole population, and expanding the study to other age groups and exploring the effect of age on the proposed learning system is an important future direction.}
Further, we only used nouns in our prototype. More specifically, all nouns were associated with objects. In fact, a number of studies have shown that concrete terms (e.g., nouns such as bread) are better remembered than abstract terms (e.g., abstract nouns and verbs)~\cite{shepard1967recognition}. The benefits of in-situ learning with AR will therefore be reduced when abstract terms are considered as it becomes difficult to make them relevant to context of users' immediate environment. \rev{ Nevertheless, future studies could focus on exploring the potential of 3D AR animation to make abstract terms visually more accessible.}
As mentioned in the paper, our prototype was only tested for a short time on a limited vocabulary. To further validate our findings, the vocabulary should be expanded and tested over a longer period of time. Especially the effect of higher motivation in \textsc{ar} could wear off as users become more familiar with the system.
Additionally, we only measured the immediate recall (immediately after participants had completed the task) and a delayed recall (a week after participants had completed the task) of the vocabulary learned. Future work should also consider recall after longer periods of several weeks. This could also be combined with repeating the learning phase in certain intervals, as it is normally done when learning vocabulary.
\section{Conclusion}
Learning vocabulary can be enhanced when encountering words in context. This context
can be afforded by the place or activity people are engaged with.
For this purpose we developed VocabulARy, a HMD AR system that
visually annotates objects in the user’s surroundings, with the corresponding English (first language) and Japanese (second language)
words to enhance the language learning process. In addition to the written and audio description of each word, we also present the
user with a keyword and its animated 3D visualisation to enhance memory retention.
We evaluated our prototype by comparing it to an alternate AR
system that does not show any additional visualisation of the keyword, and also, we compare it to two non-AR systems on a tablet, one
with and one without visualising the keyword. Our results indicate that \textsc{ar} outperforms the \textsc{non-ar} system regarding short-term retention,
mental effort and task-completion time. Additionally, the visualisation approach scored significantly higher than only showing the written
keyword with respect to immediate and delayed recall, learning efficiency, mental effort and task-completion time. Visualisation of keywords thus proved more efficient compared with the traditional keyword method only and opens new avenues for future improvements in AR enabled vocabulary learning systems.
\section*{Acknowledgement}
We thank Cuauthli Campos for helping us with preparing the video and all the volunteers who participated in the user study.
This research was supported by European Commission through the InnoRenew CoE project (Grant Agreement 739574) under the Horizon2020 Widespread-Teaming program and the Republic of Slovenia (investment funding of the Republic of Slovenia and the European Union of the European Regional Development Fund). We also acknowledge support from the Slovenian research agency ARRS (program no. BI-DE/20-21-002, P1-0383, J1-9186, J1-1715, J5-1796, and J1-1692).
\balance
\bibliographystyle{abbrv-doi}
\typeout{}
|
\section{Introduction}
To model the relationship between two sets of multivariate data is of great significance in both theory and practice. One commonly used model for two sets of multivariate data is the multivariate regression model, $y = C x + e$, which assumes a linear relationship between the multivariate predictor $ x $ and multivariate response $y$, with a coefficient matrix $C$ and random errors $e$. An additional natural assumption of this model is that the coefficient matrix $C$ has a low-rank structure, which further defines the reduced-rank regression model
\begin{equation}
y = Cx + e,\quad \text{rank}(C) \le k,
\end{equation}
where $k$ is a given integer. Since \citet{anderson1951estimating} proposed the reduced-rank regression model, it has been widely used in biology, econometrics, image science and many other fields \citep{anderson2002reduced,kobak2019sparse,wen2020co}.
Many methods have been proposed to estimate the coefficient matrix in reduced-rank regression. Among them, \citet{bunea2011optimal} proposed a penalized least squares estimator of $C$ with the $l_0$-norm penalty of the singular values of $C$, based on the fact that the rank of a matrix is equal to the number of its non-zero singular values. Motivated by the application of the $l_1$-norm penalty to variable selection, \citet{yuan2007dimension} proposed a penalized least squares estimator of $C$ with the nuclear norm penalty of the coefficient matrix, which is the $l_1$-norm of the singular values of $C$. To reduce estimation bias caused by the nuclear norm penalty, \citet{chen2013reduced} introduced an adaptive nuclear norm penalty and showed that their estimator achieves a flexible bias-variance trade-off: a large singular value receives a small penalty to control bias, and a small singular value receives a large penalty to induce sparsity. Other reduced-rank regression methods include sparse reduced-rank regression that further imposes sparsity on the columns of the coefficient matrix \citep{chen2012sparse} and co-sparse reduced-rank regression that imposes sparsity on both the rows and columns of the coefficient matrix \citep{wen2020co}.
In the study of low-rank matrix estimation, rank determination has always been a key issue \citep{kanagal2010rank,ashraphijuo2017rank,kong2020a}. The influence of rank determination on coefficient estimation has been studied by \citet{anderson2002specification}: when the rank is underestimated, it will lead to estimation bias; when the rank is overestimated, variance of the estimator can be unnecessarily large. To effectively determine the rank of the coefficient matrix, all the aforementioned methods rely on tuning parameters that need to be selected. In fact, theoretical results such as rank estimation consistency have been established \citep{bunea2011optimal,chen2013reduced} when the tuning parameters are chosen to meet certain theoretical conditions. However, these conditions usually involve unknown model parameters and thus are hard to verify in real applications. In practice, it still relies heavily on empirical methods to select tuning parameters, such as information criteria and subsampling methods.
The most well-known information criteria are probably the Akaike Information Criterion (AIC, \citealt{akaike1974a}) and the Bayesian Information Criterion (BIC, \citealt{schwars1978estimating}). They are both widely used in reduced-rank regression \citep{corander2004bayesian,chen2012reduced,bernardini2015macroeconomic}. In addition, generalized cross validation (GCV) and generalized information criterion (GIC), proposed by \citet{golub1979generalized} and \citet{fan2013tuning} respectively for linear models, are also often used in reduced-rank regression \citep{yuan2007dimension, chen2016model}. {\color{blue}\citet{she2017selective} considered a selective reduced-rank regression model that possesses both low-rank and sparse structure, and proposed a predictive information criterion (PIC) for tuning parameter selection. This method can also be applied to reduced-rank regression.} Other information criteria include an extension of BIC for high-dimensional data named BICP \citep{an2008stepwise}. The subsampling methods are represented by cross validation, which has also been widely used in variable selection and reduced-rank regression \citep{mukherjee2011reduced,ulfarsson2013tuning,jiang2016variable}. Although these methods have been repeatedly used, their theoretical properties are largely unknown and still need to be studied. One such effort is \citet{she2019on} that investigated cross validation for sparse reduced-rank regression and found that conventional cross validation may be associated with inconsistent models on different training sets. Instead of cross validating the tuning parameter, \citet{she2019on} proposed to cross validate the sparsity structure to maintain the same model in different trainings and validations.
Another type of subsampling methods for high-dimensional data is called stability approach. Different from cross validation and generalized cross validation that evaluate the prediction accuracy of a model, stability approaches focus on the stability of a model across subsamples. Stability selection \citep{meinshausen2010stability} is the first stability approach proposed for high-dimensional data and has a wide range of applicability, such as variable selection, graphical modelling, and cluster analysis. Furthermore, \citet{liu2010stability} proposed the Stability Approach to Regularization Selection (StARS) method to select the tuning parameter in graphical models. Compared to other tuning parameter selection methods such as AIC, BIC, and cross validation, StARS enjoys both theoretical and empirical advantages in graphical models. Further studies of stability approaches include \citet{shah2013variable}, \citet{yu2013stability}, \citet{sun2013consistent}, among others. Although the stability approach has been shown powerful for variable selection and graphical models, its theoretical and empirical performances have yet to be studied in reduced-rank regression. This is the main motivation of our work.
In this article, we propose a new tuning parameter selection method for reduced-rank regression based on stability approach. To appropriately apply the idea of stability approach, we define a new concept of instability specially for the reduced-rank regression models, that is, the sample variance of the estimated rank from the subsamples. In adjunct with the newly defined instability, we propose a new algorithm to select the tuning parameter based on the behavior of the instability along a grid of increasing tuning parameters. We call the new method the Stability Approach to Regularization Selection for
Reduced-Rank Regression (StARS-RRR). Theoretically, we establish the consistency of rank estimation for StARS-RRR: the estimated rank is equal to the true rank with probability tending to one, a result that is stronger than the partial sparsistency property established for StARS \citep{liu2010stability}. Empirically, we show that StARS-RRR outperforms information criteria and other subsampling methods for both simulated and real data. In simulated data, StARS-RRR recovers the rank correctly in most replications and leads to the smallest bias as long as the signal to noise ratio is not extremely small; in real data, StARS-RRR discovers a reasonable number of relationships between copy number variations and gene expressions among breast cancer patients and results in a smaller prediction error with a random-splitting process than the other methods.
\section{Methodology and Algorithm}\label{secrrr}
\subsection{Adaptive nuclear norm penalization}
In the following subsections, we will introduce the methodology and algorithm for StARS-RRR. As seen later, StARS-RRR is a general framework that can be applied to any reduced-rank regression method. For the purpose of illustration, we will use the adaptive nuclear norm penalization method \citep{chen2013reduced} as an example to introduce StARS-RRR.
Denote $Y=(Y_1,\ldots, Y_n)^T \in \mathbb{R}^{n\times q}$ as the response, $X=(X_1,\ldots, X_n)^T \in \mathbb{R}^{n\times p}$ as the design matrix, and assume that they follow a multivariate linear model
\begin{equation}
Y = X C + E, \label{eqn:mlm}
\end{equation}
where $C \in \mathbb{R}^{p\times q}$ is the coefficient matrix that is often assumed to have a low rank and $E \in \mathbb{R}^{n\times q}$ is the error matrix. The adaptive nuclear norm penalization method aims to estimate the coefficient matrix $C$ by considering the following optimization problem
\begin{equation}
\hat{C}_{\lambda}=\mathop{\arg\min}\limits_{C\in\mathbb{R}^{p\times q}}\left\{\frac{1}{2}\lVert Y-XC\rVert_{F}^{2} + \lambda\lVert XC\rVert_{\ast w}\right\}. \label{eqn:ann}
\end{equation}
In \eqref{eqn:ann}, $\|\cdot\|_F$ denotes the Frobenius norm and $ \| XC \|_{\ast w}=\sum_{i=1}^{p\wedge q}w_{i}d_{i}(XC) $ denotes the adaptive nuclear norm of the matrix $ XC $ with $ w_{i}=d_{i}^{-\gamma}(PY)$, where $ d_{i}(M)$ denotes the $i$-th largest singular value of a matrix $M$, $P = X (X^T X)^- X^T$, and $\gamma\ge 0 $. The above optimization leads to an explicit form for the rank of the estimated coefficient matrix $\hat{C}_{\lambda}$ \citep{chen2013reduced}:
\begin{equation}
\hat{r}_{\lambda}= \max\{r: d_r(PY) > \lambda^{1/(\gamma + 1)}\}.\label{equ:est-r}
\end{equation}
Based on the above explicit form, it was shown that the adaptive nuclear norm penalization method recovers the true rank of $C$ with high probability if the error matrix $E$ has independent $N(0,\sigma^2)$ entries and the tuning parameter $\lambda$ satisfies the condition $\lambda=\left\{(1+\theta) \left(\sqrt{r_\mathrm{x}}+\sqrt{q}\right) \sigma/ \delta\right\}^{\gamma+1}$ for some $\theta>0$, where $r_\mathrm{x}$ is the rank of $X$ and $\delta$ is a constant depending on the singular values of $XC$. However, this theoretical result may not be used to select $\lambda$ in practice because it involves the unknown parameters $\sigma$ and $\delta$. Thus, it is essential to use a practical and data-driven procedure to select the tuning parameter $\lambda$.
\subsection{Tuning parameter selection for reduced-rank regression}
In this subsection, we will review existing methods to select tuning parameters for reduced-rank regression. Roughly, there are two types of tuning parameter selection methods, one based on information criteria and the other based on subsampling technique. Given a tuning parameter $\lambda$, denote the estimator of \eqref{eqn:ann} as $ {\hat C}_{\lambda} $, and the corresponding rank as $\hat r_{\lambda}$. For an information criterion based method, one chooses an optimal $\lambda$ by minimizing a function of the sum of squared error and the degree of freedom. Table~\ref{tab:loss} shows some widely used information criteria.
\iftrue
\begin{table}
\caption{\label{tab:loss}Information criterion based methods for tuning parameter selection in \eqref{eqn:ann}.}
\centering
\begin{tabular}{ll}
\hline
Information Criterion & Mathematical Formula \\
\hline
AIC & $ nq\log\left(\dfrac{\|Y- X {\hat C}_{\lambda} \|_{\mathrm{F}}^2}{nq}\right)+2\hat r_{\lambda}(r_\mathrm{x}+q-\hat r_{\lambda}) $ \\
BIC & $ nq\log\left(\dfrac{\|Y- X {\hat C}_{\lambda} \|_{\mathrm{F}}^2}{nq}\right)+\log(nq)\hat r_{\lambda}(r_\mathrm{x}+q-\hat r_{\lambda}) $ \\
GIC & $ nq\log\left(\dfrac{\|Y- X {\hat C}_{\lambda}\|_{\mathrm{F}}^2}{nq}\right)+\log\log(nq)\log(pq)\hat r_{\lambda}(r_\mathrm{x}+q-\hat r_{\lambda}) $ \\
BICP & $ nq\log\left(\dfrac{\|Y- X {\hat C}_{\lambda} \|_{\mathrm{F}}^2}{nq}\right)+2\log(pq)\hat r_{\lambda}(r_\mathrm{x}+q-\hat r_{\lambda}) $ \\
GCV & $ \dfrac{nq \|Y- X {\hat C}_{\lambda} \|_{\mathrm{F}}^2}{[nq-\hat r_{\lambda}(r_\mathrm{x}+q-\hat r_{\lambda})]^2} $ \\
{\color{blue}PIC} & {\color{blue}$\dfrac{\| Y-X\hat C_\lambda\|^2_F}{nq-2\hat r_\lambda(r_X+q-\hat r_\lambda)}$} \\
\hline
\end{tabular}
\end{table}
\fi
Information criteria play an important role in model selection and model assessment, generally composed of an error term and a degree of freedom term to balance the goodness of fit and the model complexity. They are a popular choice for tuning parameter selection in reduced-rank regression, yet they may not be able to accurately estimate the rank when the true rank is low \citep{velu2013multivariate}. Information criteria like AIC and BIC tend to overestimate the rank and their performance deteriorates with small sample size. In addition to AIC and BIC, other information criterion such as GCV, GIC, and BICP have also been used to estimate rank in reduced-rank regression \citep{yuan2007dimension, chen2016model}, since they were initially proposed for linear models. {\color{blue}Proposed for selective reduced-rank regression models with both low-rank and sparse structures, PIC can also be simplified for reduced-rank regression models to the form in Table~\ref{tab:loss}. For PIC, \citet{she2017selective} established a non-asymptotic oracle inequality for its estimation error rate without assuming an infinite sample size.}
The subsampling methods include cross validation, which is also one of the most popular methods applied in reduced-rank regression \citep{ulfarsson2013tuning, kobak2019sparse}. $K$-fold cross validation randomly divides the data set into $K$ subsets of the same size. Each time one subset is reserved as the test set and the other $K-1$ subsets serve as the training set. Then, the model with a given tuning parameter is trained on the training set and tested on the test set. Last, the average test error of the $K$ models is taken as the cross validation score. The tuning parameter with the smallest cross validation score is taken as the selected parameter. \citet{she2019on} investigated cross validation for sparse reduced-rank regression and found that conventional cross validation may be associated with inconsistent models on different training sets. Instead of cross validating the tuning parameter, \citet{she2019on} proposed to cross validate the sparsity structure to maintain the same model in different trainings and validations.
Although information criteria and subsampling methods have been widely used in reduced-rank regression, their theoretical properties are largely unknown and still need to be studied. A tuning parameter selection method for reduced-rank regression that has a solid theoretical property is imperative for practical use.
\subsection{StARS-RRR} \label{sec:sta}
We hereby propose a novel tuning parameter selection method called StARS-RRR for reduced-rank regression based on the stability approach. The stability approach was originally introduced for variable selection and graphical models \citep{meinshausen2010stability, liu2010stability}. In particular, we borrow the idea from StARS \citep{liu2010stability}. The key ingredient of StARS is to define a measure called instability of an estimator from randomly drawn subsamples of the original data. For instance, \citet{liu2010stability} proposed to use the variance of the Bernoulli indicator of an edge in a graph, averaged over all edges and all estimated graphs from randomly drawn subsamples.
Before presenting the definition of instability for StARS-RRR, we introduce some notation. Let $b = b(n)$ be such that $1 < b(n) < n$. We draw $N$ random subsamples $S_1,\ldots,S_N$ from $\{(X_1,Y_1),\ldots,(X_n,Y_n)\}$ without replacement, each of size $b$. Theoretically, there are $N = \binom{n}{b}$ such subsamples. However, \citet{politis1999subsampling} argues that it suffices in practice to choose a large number $N$ of subsamples at random. Based on the $i$-th subsample $S_i$, we derive the adaptive nuclear norm penalization estimator, $\hat{C}_\lambda(S_i)$, from \eqref{eqn:ann}, with rank $\hat{r}_{\lambda}(S_i)$ for a pre-specified tuning parameter $\lambda > 0$.
As our objective is to select a tuning parameter $\lambda$ so that the estimated rank of $C$ is close to the true rank, a natural definition of instability arises from the variation of the estimated ranks from the subsamples. Therefore, we define the instability corresponding to $\lambda$ as the sample variance of $\{\hat{r}_{\lambda}(S_i): i = 1,\ldots,N\}$:
\begin{equation}\label{eqn:ins}
\hat{D}(\lambda) = S^{2}(\hat{r}_{\lambda}) = \frac{1}{N-1} \left[ \sum_{i=1}^N \hat{r}^2_{\lambda}(S_i) - N \left\{\frac1N \sum_{i=1}^N \hat{r}_{\lambda}(S_i) \right\}^2 \right].
\end{equation}
To see how the instability varies for different values of $\lambda$, we demonstrate via a simulated dataset. The dataset was simulated under the setting that is detailed in Section \ref{sec:sim}, where we note that the true rank of $C$ equals $10$. We draw 100 subsamples to calculate the instability defined in (\ref{eqn:ins}). Figure~\ref{fig:toy} shows the instability $\hat D(\lambda)$ over a range of values of $\log(\lambda)$ as well as the estimated rank $\hat{r}_{\lambda}$ based on the full data, from which we observe the following patterns.
\begin{itemize}
\item[(i)] When $\lambda$ is small such that the estimated rank is larger than the true rank, the instability fluctuates but there is always a substantial gap from 0.
\item[(ii)] In a sub-interval of the values of $\lambda$ where the estimated rank is equal to the true rank, the instability stays at zero.
\item[(iii)] When $\lambda$ is large such that the estimated rank is less than the true rank, the instability fluctuates again and it can decrease to zero at certain values of $\lambda$.
\end{itemize}
The above observations motivate us to search from small to large for the first tuning parameter with which the instability is small enough. To achieve this objective, we consider a sequence of tuning parameters $\Lambda = \{\lambda_1, \ldots, \lambda_K\}$ where $\lambda_1 < \cdots < \lambda_K$. Based on this sequence of tuning parameters, we define the cumulative minimum instability for any $\lambda \in \Lambda$:
\begin{equation}\label{eqn:cmi}
\bar D(\lambda) =\min\{\hat D(\lambda'): \lambda' \in\Lambda,\ \lambda_{1}\leq \lambda' \leq\lambda\}.
\end{equation}
Then, we select the optimal tuning parameter as
\begin{equation*
\hat\lambda = \min\{\lambda \in\Lambda: \bar D(\lambda) \le \eta\},
\end{equation*}
where $\eta$ is a small pre-specified threshold. In Section \ref{sec:the}, we will show that $\eta$ is interpretable as it is an explicit function of a key quantity in the theoretical property of StARS-RRR. Therefore, we are not simply replacing the problem of selecting $\lambda$ with the problem of selecting $\eta$.
\iftrue
\begin{figure}
\centering
\includegraphics[width=\textwidth]{Rplot1}
\caption{\label{fig:toy}The dotted line represents the instability relative to $\log(\lambda)$ and the solid line represents estimated rank from the full data relative to $\log(\lambda)$. In this simulated dataset, SNR is $ 2.047 $ and true rank is $ 10 $.}
\end{figure}
\fi
It is noteworthy that the selection rule in StARS-RRR is different from that in StARS \citep{liu2010stability}. When StARS was applied in graphical models, it starts with a large tuning parameter (or equivalently, an empty graph) and selects the first tuning parameter that achieves an instability lower than a threshold. However, StARS-RRR starts with a small tuning parameter (or equivalently, a high estimated rank) and selects the first tuning parameter that achieves an instability lower than a threshold. The reason why StARS-RRR searches the tuning parameter in a different direction is that, when the tuning parameter is too large so that the rank is underestimated, the estimated rank can still be stable across subsamples due to its discreteness. Therefore, if we start with a large tuning parameter and search for a stable estimated rank, we may select a tuning parameter that is too large and leads to an underestimated rank.
To demonstrate the performance of StARS-RRR, we indicate the selected tuning parameter in the previous simulated dataset as the vertical line in Figure~\ref{fig:toy}. It is seen that StARS-RRR selects $\lambda$ correctly such that the estimated rank is the same as the true rank. To summarize, we present the StARS-RRR method as in Algorithm \ref{alg1}.
\begin{algorithm}
\caption{StARS-RRR}
\label{alg1}
\KwIn{Observations $ \{X_{i},Y_{i}\}_{i=1}^{n}$;
Number of subsamples $N$;
Size of subsample $b$;
Threshold $\eta$;
A list of candidate tuning parameters in an increasing order, $\Lambda = \{\lambda_{1},\ldots,\lambda_{K}\}$;}
\KwOut{Optimal tuning parameter $\hat\lambda$;}
Draw $N$ subsamples $S_j, j=1, \ldots, N$ of size $b$ from $\{X_{i}, Y_{i}\}_{i=1}^{n}$ without replacement\;
\For{each $k=1, \ldots,K$}{
\For{each $j=1, \ldots, N$}{
Apply the adaptive nuclear norm penalization method on data $S_j$ with tuning parameter $\lambda_k$ to obtain $\hat C_{\lambda_{k}}(S_j)$ with rank $\hat{r}_{\lambda_{k}}(S_j)$;
}
Compute the instability $\hat{D}(\lambda_{k})$ and then the cumulative minimum instability $ \bar{D}(\lambda_{k})$ by \eqref{eqn:ins} and \eqref{eqn:cmi}, respectively\;
\If {$\bar{D}(\lambda_{k}) \le \eta$}{
$\hat\lambda=\lambda_{k}$\;
\textbf{break}
}
}
\end{algorithm}
Although our previous discussion is based on the adaptive nuclear norm penalization method for reduced-rank regression, StARS-RRR can be applied to any reduced-rank regression estimation methods that is not limited to this method. Furthermore, the proposed framework is not even limited to the reduced-rank regression model, it can be used for general matrix estimation problems as long as the objective is to determine the rank of a matrix.
\section{Rank Estimation Consistency}\label{sec:the}
In this section, we will show that the estimated rank from StARS-RRR is consistent to the true rank: the estimated rank is equal to the true rank with probability tending to one. In addition, we will show that there is an explicit relationship between the threshold $\eta$ employed in the StARS-RRR algorithm (Algorithm \ref{alg1}) and the probability that the rank is estimated correctly. Therefore, the threshold $\eta$ is an interpretable quantity and we are not simply replacing the problem of choosing $\lambda$ with the problem of choosing $\eta$. Different from the consistency result in the literature that requires a theoretical tuning parameter depending on unknown model parameters \citep{bunea2011optimal,chen2013reduced}, our result is practically more useful as it can be used to determine the tuning parameter in real applications.
Before presenting the consistency of rank estimation for StARS-RRR, we introduce some notation and impose necessary assumptions as follows. For any two real numbers $u$ and $v$, let $u\wedge v = \min(u,v)$ and $u\vee v = \max(u,v)$. Recall that $X$ and $Y$ are the design matrix and responses in the multivariate linear model in \eqref{eqn:mlm}. Further, let $X^b = (X_1,\ldots,X_b)^T$ and $Y^b = (Y_1,\ldots,Y_b)^T$ be the corresponding design matrix and responses from the subsample $\{X_i,Y_i\}_{i=1}^b$. Denote by $r_{\mathrm{x}}$ and $r_{\mathrm{x}^b}$ the ranks of $X$ and $X^b$, respectively, and let $r^\ast$ be the true rank of the coefficient matrix $C$ in \eqref{eqn:mlm}. Finally, let $\hat{r}^b_{\lambda}$ be the estimated rank based on the subsample $\{X_i,Y_i\}_{i=1}^b$ using the adaptive nuclear norm penalization method \citep{chen2013reduced}. In addition, we impose the following assumptions.
\begin{assumption}
\label{Assumption-1}
The error matrix $E$ in (\ref{eqn:mlm}) has independent $N(0, \sigma^2)$ entries.
\end{assumption}
\begin{assumption}
\label{Assumption-2}
For a fixed $\theta > 0$, $d_{r^\ast}(X^b C) \ge 2 (1 + \theta) \sigma (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})$.
\end{assumption}
\begin{assumption}
\label{Assumption-3}
$r^{} \le r_{\mathrm{x}^b} \wedge q$ where $q$ is the number of responses in $Y$.
\end{assumption}
Assumptions \ref{Assumption-1} and \ref{Assumption-2} are almost identical to Assumptions 1 and 2 in \citet{chen2013reduced}, except that Assumption \ref{Assumption-2} is on the singular value of $X^b C$ for the subsample $X^b$ instead of the whole sample $X$. {\color{blue}Assumption \ref{Assumption-2} is a common type of assumption for subsampling based methods such as stability approaches. For example, Assumption (A2) in the original StARS paper \citep{liu2010stability} is also imposed on the subsamples of size $b < n$. It requires that from a subsample of size $b < n$ ``all estimated graphs using regularization parameters $\Lambda \ge \Lambda_0$ contain the true graph with high probability.''} Assumption \ref{Assumption-3} is a moderate assumption as long as $b$ is not too small because it is always true that $r^\ast \le r_{\mathrm{x}} \wedge q$. In practice, it is commonly assumed that $r^\ast$ is low for a reduced-rank regression problem.
As follows, we will establish the consistency of rank estimation for StARS-RRR in a few steps. First, we will show that the true variance of $\hat{r}^b_{\lambda}$ follows the patterns (i) and (ii) as observed from Figure~\ref{fig:toy}, i.e., (i) the true variance of $\hat{r}^b_{\lambda}$ stays away from 0 when $\lambda$ is small such that the rank is overestimated and (ii) the true variance of $\hat{r}^b_{\lambda}$ is very close to zero when the estimated rank is equal to the true rank. This result is summarized in Theorem \ref{Theorem-1}.
\begin{theorem}\label{Theorem-1}
Suppose Assumptions \ref{Assumption-1}--\ref{Assumption-3} hold. For any $\delta \in [\exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}, 1/2)$ with a large enough $r_{\mathrm{x}^b} + q$, there exist $\lambda_l$, $\lambda_m$, $\lambda_h$ with $0 < \lambda_l \le \lambda_m \le \lambda_h \le [(1 + \theta/2) \sigma (\sqrt{r_{\mathrm{x}^b} } + \sqrt{q})]^{\gamma + 1}$ such that
(a) when $\lambda_h \le \lambda \le [(1 + 3\theta/2) \sigma (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})]^{\gamma + 1}$, $P(\hat{r}^b_\lambda = r^\ast) \ge 1 - 2\exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}$ and $\mathrm{var}(\hat{r}^b_{\lambda}) \le 4 (r_{\mathrm{x}^b} \wedge q)^2 \exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}$, and further, $P(\hat{r}^b_\lambda = r^\ast) \to 1$ and $\mathrm{var}(\hat{r}^b_{\lambda}) \to 0$ as $r_{\mathrm{x}^b} + q \to \infty$;
(b) when $\lambda \ge \lambda_m$, $P(\hat{r}^b_\lambda = r^\ast) \ge 1 - \delta - 2\exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}$;
(c) when $0 < \lambda \le \lambda_m$, $P(\hat{r}^b_\lambda \ge r^\ast + 1) \ge \delta$, and when $\lambda_l \le \lambda \le \lambda_m$, $\mathrm{var}(\hat{r}^b_\lambda) \ge \delta (1-\delta)$.
\end{theorem}
On the one hand, part (a) of Theorem \ref{Theorem-1} provides the consistency of the estimated rank from a subsample of the data, which shows the adaptive nuclear norm penalization method is able to identify the correct rank with probability tending to one for an appropriate range of $\lambda$ values. This result is similar to Theorem 3 in \citet{chen2013reduced} with a slight distinction that we identify a range of $\lambda$ values for rank consistency instead of a single value of $\lambda$ as in \citet{chen2013reduced}. It is also obvious that the variance of the estimated rank tends to zero when the rank is correctly identified. On the other hand, the results in parts (b) and (c) provide additional information about the rank estimation when $\lambda$ is smaller. In part (b), when $\lambda \ge \lambda_m$, the adaptive nuclear norm penalization method achieves a slightly weaker result than that in part (a): the probability that the rank is correctly estimated is lowered by $\delta$ compared to part (a), although the estimated rank is still consistent as long as $\delta \to 0$. Part (c) discusses the case when $\lambda$ is even smaller, i.e., $\lambda_l \le \lambda \le \lambda_m$. There are two implications. With the probability at least $\delta$ the rank is overestimated and the variance of the estimated rank has a lower bound so that it stays away from zero. In summary, Theorem \ref{Theorem-1} shows the patterns (i) and (ii) observed in Figure \ref{fig:toy} theoretically for the true variance of the estimated rank from a subsample of the data.
Second, we will show that the sample variance of the estimated ranks from all the subsamples, i.e., the instability as defined in (\ref{eqn:ins}), is very close to the true variance of $\hat{r}^b_{\lambda}$. Hereby, we present this result in Theorem \ref{Theorem-2}.
\begin{theorem}\label{Theorem-2}
For any $\lambda > 0$ such that $E(\hat{r}^b_\lambda) \ge 1/2$ and $t \in [6(r_{\mathrm{x}^b} \wedge q)^2/(N-1), 9(r_{\mathrm{x}} \wedge q)]$,
\begin{equation}
P\left[ \left|S^{2}(\hat{r}^b_{\lambda}) - \mathrm{var}(\hat{r}^b_{\lambda})\right| > t \right] \le 6 \exp[ -n t^2/ \{162(r_{\mathrm{x}} \wedge q)^4 b\} ]. \label{eqn:concentration}
\end{equation}
\end{theorem}
This result is similar to Theorem 1 in \citet{liu2010stability} although our focus is the difference between the sample variance and the true variance while \citet{liu2010stability} concerns the difference between the sample mean and the true mean. From (\ref{eqn:concentration}), it is seen that there is a trade-off between the difference $t$ and the probability on its right-hand side. For example, if $t$ is a fixed quantity, then the probability tends to zero as long as $(r_{\mathrm{x}} \wedge q)^4 b/n \to 0$. However, if one wishes to choose $t$ such that $t \to 0$ in order to achieve an asymptotically negligible difference, then the condition for the probability tending to zero becomes $(r_{\mathrm{x}} \wedge q)^4 b/(nt^2) \to 0$, depending on the convergence rate of $t$.
Combining Theorems \ref{Theorem-1} and \ref{Theorem-2}, we are able to validate the patterns (i) and (ii) as observed in Figure \ref{fig:toy} for the instability, which is presented in the following corollary.
\begin{corollary}\label{Corollary-1}
Suppose Assumptions \ref{Assumption-1}--\ref{Assumption-3} hold and $\Lambda = \{\lambda_1,\ldots,\lambda_K\}$ is a grid of $K$ increasing positive values of $\lambda$. When $r_{\mathrm{x}^b} + q$ is large enough, with probability at least $1 - 6 K \exp[ -n \delta^2 / \{648 C^2 (r_{\mathrm{x}} \wedge q)^4 b \} ]$,
\begin{align}
\min \left\{ \hat{D}(\lambda) : \lambda \in \Lambda \cap [\lambda_l, \lambda_m] \right\} &\ge [(C-1)/C] \delta (1 - \delta), \label{hat.var.lower.bound} \\
\max \left\{ \hat{D}(\lambda) : \lambda \in \Lambda \cap [\lambda_h, \{(1 + 3\theta/2) \sigma (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})\}^{\gamma + 1} ] \right\} &\le (2/C) \delta (1 - \delta), \label{hat.var.upper.bound}
\end{align}
for any fixed $C > 3$ and any $\delta \in [8 C (r_{\mathrm{x}^b} \wedge q)^2 \exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\} \vee 12C (r_{\mathrm{x}^b} \wedge q)^2/(N-1), 1/2)$.
\end{corollary}
In Corollary \ref{Corollary-1}, to ensure the interval for the possible values of $\delta$ is not empty, as $8 C (r_{\mathrm{x}^b} \wedge q)^2 \exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}$ is small with a large enough $r_{\mathrm{x}^b} + q$, one only needs to assume that $(r_{\mathrm{x}^b} \wedge q)^2/N$ is small. Moreover, for a large enough $C$, the lower bound in (\ref{hat.var.lower.bound}) is close to $\delta (1 - \delta)$ and the upper bound in (\ref{hat.var.upper.bound}) is close to 0. This verifies the patterns (i) and (ii) for the instability as observed in Figure \ref{fig:toy}.
Based on Corollary \ref{Corollary-1}, we can choose an appropriate threshold $\eta$ in StARS-RRR so that the optimal $\hat{\lambda}$ lies either in the interval $[\lambda_m, \lambda_h]$ or $[\lambda_h, \{(1 + 3\theta/2) \sigma (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})\}^{\gamma + 1}]$ {\color{blue}as long as the candidate tuning parameters $\Lambda = \{\lambda_1,\ldots,\lambda_K\}$ in StARS-RRR are all larger than $\lambda_l$}. Combining this result with parts (a) and (b) of Theorem \ref{Theorem-1} establishes the rank estimation consistency of StARS-RRR as presented in the following theorem.
\begin{theorem}\label{Theorem-3}
Suppose Assumptions \ref{Assumption-1}--\ref{Assumption-3} hold and $\Lambda = \{\lambda_1,\ldots,\lambda_K\}$ is a grid of $K$ increasing positive values of $\lambda$ {\color{blue}such that $\lambda_1 \ge \lambda_l$ with $\lambda_l$ defined in Theorem \ref{Theorem-1}.} Let $\hat\lambda$ be the optimal tuning parameter selected by StARS-RRR described in Algorithm \ref{alg1} with a threshold $\eta = \delta(1-\delta)/2$ where $\delta \in [32 (r_{\mathrm{x}^b} \wedge q)^2 \exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\} \vee 48 (r_{\mathrm{x}^b} \wedge q)^2/(N-1), 1/2)$, and let $\hat{r}^b_{\hat\lambda}$ be the estimated rank at $\hat\lambda$ from the subsample $X^b$ and $Y^b$. Then,
\begin{equation}
P(\hat{r}^b_{\hat\lambda} = r^\ast) \ge 1 - K \delta - 2 K \exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\} - 6 K \exp[ -n \delta^2 / \{10368 (r_{\mathrm{x}} \wedge q)^4 b \}]. \label{consistency.probability}
\end{equation}
Furthermore, assume that $K$ is a fixed integer, that $r_{\mathrm{x}^b} + q \to \infty$, and that there exist $\alpha > 0$ and $\beta > 0$ such that $(r_{\mathrm{x}^b} \wedge q)^2 \exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2/8\} = o(n^{-\alpha})$ and $(r_{\mathrm{x}} \wedge q)^4 b/n = o(n^{-\beta})$, as $n \to \infty$. Then, we can choose $\delta = n^{-(\alpha \wedge \beta)/2}$ in (\ref{consistency.probability}), which leads to
\[
P(\hat{r}^b_{\hat\lambda} = r^\ast) \to 1, \quad \text{as } n \to \infty.
\]
\end{theorem}
Theorem \ref{Theorem-3} consists of two parts. First, it provides a finite sample lower bound for the probability with which the rank is correctly estimated when the tuning parameter is selected by StARS-RRR. It is interesting that there is an explicit relationship between this lower bound and the threshold $\eta$ used in StARS-RRR because $\eta = \delta(1-\delta)/2$ and the lower bound in (\ref{consistency.probability}) is also a known function of $\delta$. Therefore, this result gives $\eta$ an explicit interpretation by connecting it to the theoretical property of the estimated rank and makes the choice of the threshold meaningful in the StARS-RRR algorithm. Second, under further technical conditions, the estimated rank is asymptotically consistent to the true rank as the above-mentioned lower bound tends to one. While most of these conditions are common and also moderate, we note that the condition $(r_{\mathrm{x}} \wedge q)^4 b/n = o(n^{-\beta})$ imposes an upper bound on $r_{\mathrm{x}} \wedge q$ depending on $b$ and $n$. This condition arises from Theorem \ref{Theorem-2} and thus is similar to the condition that ensures the upper bound of probability in (\ref{eqn:concentration}) converges to zero.
{\color{blue} From the technical proofs of Theorems \ref{Theorem-1}--\ref{Theorem-3} (see the supplementary material), it is seen that our main theoretical result, the rank estimation consistency, is actually not limited to the adaptive nuclear norm penalization method. In fact, any rank estimation method that results in an estimated rank as in (\ref{equ:est-r}) will enjoy the results in Theorem \ref{Theorem-3}. For example, the $L_0$ penalized estimator in \citet{bunea2011optimal} also results in a similar form of the estimated rank:
\begin{equation*}
\hat{r}_{\lambda}= \max\{r: d_r(PY) > \lambda\},
\end{equation*}
with $\lambda$ being the tuning parameter for the $L_0$ penalty. Therefore, the rank estimation consistency would also hold for the $L_0$ penalized estimator in \citet{bunea2011optimal} as long as we replace $\gamma$ in (\ref{equ:est-r}) by $0$.}
Compared to the partial sparsistency property as established for StARS in \citet{liu2010stability}, our result is apparently stronger. The partial sparsistency result shows that with probability tending to one the true edges of a graph belong to the estimated edge set using the optimal tuning parameter selected by StARS on a subsample of size $b$, which is only a ``one-direction'' result. By contrast, our result is a ``two-direction'' result that establishes the rank estimation consistency for StARS-RRR.
In practice, after the optimal tuning parameter is selected by StARS-RRR, one often performs the reduced-rank regression on the full data with this optimal tuning parameter. Thus, we recommend choosing $b$ sufficiently large so that the behavior of the subsample $X^b$ and $Y^b$ is similar to that of the full data. On the other hand, $b$ cannot be too large as implied by the technical condition $(r_{\mathrm{x}} \wedge q)^4 b/n = o(n^{-\beta})$. Therefore, an appropriate size $b$ needs to be selected under a particular setting of $X$, $q$, and $n$. This philosophy is similar to how $b$ is chosen in StARS although our technical condition about $b$ is slightly more complicated than that for StARS. {\color{blue}In our numerical studies in Section \ref{sec:num}, we set $\eta = 0.001$, $b = 0.7n$, and $N = 100$ in Algorithm \ref{alg1} for StARS-RRR.}
\section{Numerical Experiments}\label{sec:num}
\subsection{Simulation}\label{sec:sim}
In this subsection, we compare the finite sample performance of the rank determination via StARS-RRR and other approaches including AIC, BIC, GIC, BICP, GCV and cross validation (CV) on simulated data.
We adopt the same simulation settings from \citet{bunea2011optimal}. Specifically, the coefficient matrix $ C $ is generated by $ C=sC_{1}C_{2}^T $, where $ s>0 $, $ C_{1}\in\mathbb{R}^{p\times r^{\ast}} $, $ C_{2}\in\mathbb{R}^{q\times r^{\ast}} $. All entries in $ C_{1} $ and $ C_{2} $ are drawn randomly from { ${N}(0,1)$}. The design matrix $ X $ is generated by $ X=X_{0}\Gamma^{1/2}$, where $ X_{0}=X_{1}X_{2}^T$, $ X_{1}\in\mathbb{R}^{n\times r_{\mathrm{x}}} $, $ X_{2}\in\mathbb{R}^{p\times r_{\mathrm{x}}} $, and $ \Gamma=(\Gamma_{ij})_{p\times p} $ with $ \Gamma_{ij}=\rho^{\lvert i-j\rvert} $, $i,j=1,\ldots,p$. The response matrix $ Y $ is then generated by $ Y=XC+E $, where the elements of $ E $ are independent random variables from { ${N}(0,1)$}. Thus, the simulation model is characterized by the sample size $ n $, the number of predictors $ p $, the number of responses $ q $, the rank of the design matrix $r_{\mathrm{x}} $, the true model rank $ r^{\ast} $, the correlation coefficient between the adjacent predictors $\rho$, and the signal $s$.
We will explore two different model settings, where Model I is a low-dimensional case with $(n, p, q, r_{\mathrm{x}}, r^\ast) = (500, 25, 25, 15, 10)$ and Model II is a high-dimensional case with $(n, p, q, r_{\mathrm{x}}, r^\ast) = (80, 100, 100, 30, 8)$. In Model I, $p$ and $q$ are relatively small compared with $n$; while in Model II, $p$ and $q$ are relatively large. Although these finite-sample settings may not align perfectly with the technical conditions in our large-sample theory in Section \ref{sec:the}, they still deserve numerical investigations to see how StARS-RRR performs in practice. In addition, for each model, we set $\rho$ to be 0.1, 0.5, or 0.9, which stands for weak, moderate, or strong dependence between the predictors. We consider six different values of $s$ such that the signal-to-noise ratio (SNR) ranges from 1 to 3 roundly. Since the $ r^{\ast}$th largest singular value of $ XC $, i.e., $ d_{r^{\ast}}(XC) $, measures the signal strength and the largest singular value of the projected noise matrix $ \mathrm{PE} =X(X^TX)^{-}X^TE $, i.e., $ d_{ 1 }(\mathrm{PE}) $, measures the noise level, the SNR is defined as $ d_{r^{\ast}}(XC)/d_{ 1 }(\mathrm{PE}) $ \citep{chen2013reduced}.
We apply the reduced-rank regression via the adaptive nuclear norm penalization to fit the full data with the optimal tuning parameter selected by AIC, BIC, GIC, BICP, GCV, CV (5-fold), and StARS-RRR. In StARS-RRR, we set the threshold $\eta$ as 0.0001. For each method, a total of 500 simulation replications are conducted.
To compare the performance of the aforementioned methods, we consider several performance measures. The first measure is the rank recovery ratio, defined as the proportion of $\{\hat{r}=r^{\ast}\} $ over all replications, where $\hat{r}$ is the estimated rank. The method with a higher rank recovery ratio is more effective in rank determination. The second and third measures are the rank overestimate ratio and the rank underestimate ratio, which are defined by the proportion of $\{\hat{r}>r^{\ast}\} $ and $\{\hat{r}<r^{\ast}\} $ over all replications, respectively. The fourth measure is the bias of the estimated rank, defined as the mean difference between the estimated rank and the true rank. A better performing method should have a lower bias in terms of magnitude.
Table \ref{tab:ratios} summarizes the rank recovery, underestimate, and overestimate ratios. For model I, it is clear that StARS-RRR outperforms the other methods in terms of every performance measure when SNR is moderate to high. In particular, the rank recovery ratio of StARS-RRR is at least $10\%$ higher than those of information criterion based methods. When the SNR is low, i.e., $\text{SNR}<1.5$, GCV has the best performance, followed by AIC, CV, and StARS-RRR. In this case, the StARS-RRR estimators from the subsamples might be dominated by the noise, and this leads to underestimation of the rank. In contrast, GCV, CV, and AIC tend to overestimate the rank and result in a more complicate model, which would explain why these methods have good performance when SNR is very low.
For Model II, different from Model I where the sample size is sufficient compared to the dimension, BICP and GIC can rarely recover the true rank. This is probably because that the penalty in BICP and GIC contains the term $\log(pq)$ (Table \ref{tab:loss}), which becomes excessive when the sample size is small and the dimension is high. As a result, the estimated ranks from these two methods are much smaller than the true rank. This can also be observed from Table~\ref{tab:bias}, where the mean biases of the estimated ranks from BICP and GIC are negative. {\color{blue}It is clear that StARS-RRR has a much better performance than BICP and GIC in recovering the true rank among a wide range of SNR.} Regardless of whether the correlation between the predictors is low, medium, or high, StARS-RRR can always achieve a rank recovery ratio of at least $97\%$ when the SNR is greater than $1.4$, a commonly occurred case in practice. StARS-RRR also slightly outperforms CV although the performance of CV in Model II is better than in Model I. In summary, when the sample size is small and the dimension is high, StARS-RRR can obtain a reliable result in determining the rank in a reduced-rank regression model.
\begin{table}
\caption{\label{tab:ratios}Rank recovery (left), underestimate (middle), and overestimate (right) ratios (in percentage) in the simulation study.}
\centering
\resizebox{\textwidth}{!}{
\begin{tabular}{ccccccccc}
\hline
s& SNR & AIC & BIC & GIC & BICP & GCV & CV & StARS-RRR \\
\hline
\hline
\multicolumn{9}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.1$} \\
30 & 1.07 & (81,4,15) & (17,83,0) & (2,98,0) & (4,96,0) & (85,4,12) & (80,5,15) & (63,37,0) \\
45 & 1.6 & (86,1,14) & (62,38,0) & (36,64,0) & (42,58,0) & (87,1,12) & (86,1,13) & (92,8,0) \\
52 & 1.85 & (85,0,14) & (76,24,0) & (53,47,0) & (59,41,0) & (87,0,12) & (87,0,13) & (95,4,0) \\
60 & 2.14 & (86,0,14) & (87,13,0) & (68,32,0) & (74,26,0) & (87,0,13) & (87,0,13) & (98,2,0) \\
70 & 2.49 & (86,0,14) & (94,6,0) & (83,17,0) & (86,14,0) & (87,0,13) & (87,0,13) & (98,1,0) \\
85 & 3.03 & (85,0,15) & (98,2,0) & (93,7,0) & (95,5,0) & (87,0,13) & (87,0,13) & (99,0,0) \\
\hline
\multicolumn{9}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.5$} \\
35 & 1.1 & (83,4,13) & (23,77,0) & (4,96,0) & (6,94,0) & (84,5,11) & (82,4,14) & (63,37,0) \\
40 & 1.26 & (85,2,13) & (36,64,0) & (12,88,0) & (18,82,0) & (86,3,11) & (83,3,14) & (73,26,1) \\
50 & 1.57 & (86,1,13) & (60,40,0) & (35,65,0) & (42,58,0) & (87,1,12) & (85,1,13) & (89,10,1) \\
70 & 2.2 & (86,0,14) & (86,14,0) & (68,32,0) & (73,27,0) & (88,0,12) & (87,0,13) & (97,3,1) \\
80 & 2.52 & (86,0,14) & (93,7,0) & (80,20,0) & (84,16,0) & (88,0,12) & (87,0,13) & (99,1,1) \\
95 & 2.99 & (86,0,14) & (97,3,0) & (90,10,0) & (92,8,0) & (88,0,12) & (86,0,14) & (99,1,1) \\
\hline
\multicolumn{9}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.9$} \\
70 & 1.08 & (78,5,17) & (20,80,0) & (4,96,0) & (8,92,0) & (80,5,14) & (78,6,16) & (63,37,0) \\
80 & 1.24 & (82,3,16) & (33,67,0) & (11,89,0) & (16,84,0) & (84,3,13) & (82,3,15) & (73,27,0) \\
100 & 1.55 & (83,1,16) & (56,44,0) & (32,68,0) & (39,61,0) & (86,1,14) & (84,1,15) & (86,14,0) \\
135 & 2.09 & (85,0,15) & (83,17,0) & (64,36,0) & (70,30,0) & (88,0,12) & (86,0,14) & (97,3,0) \\
175 & 2.71 & (85,0,15) & (94,6,0) & (84,16,0) & (88,12,0) & (87,0,13) & (87,0,13) & (99,1,0) \\
200 & 3.1 & (85,0,15) & (97,3,0) & (91,9,0) & (93,7,0) & (87,0,13) & (86,0,14) & (99,0,0) \\
\hline\hline
\multicolumn{9}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.1$} \\
8 & 1.16 & (43,0,57) & (0,100,0) & (0,100,0) & (0,100,0) & (86,0,14) & (90,1,9) & (77,23,0) \\
10 & 1.45 & (48,0,52) & (12,88,0) & (0,100,0) & (0,100,0) & (91,0,9) & (97,0,3) & (98,2,0) \\
12 & 1.73 & (50,0,50) & (54,46,0) & (0,100,0) & (0,100,0) & (93,0,7) & (99,0,1) & (100,0,0) \\
14 & 2.02 & (50,0,50) & (83,17,0) & (0,100,0) & (0,100,0) & (93,0,7) & (99,0,1) & (100,0,0) \\
18 & 2.6 & (47,0,53) & (99,1,0) & (5,95,0) & (24,76,0) & (93,0,7) & (99,0,1) & (100,0,0) \\
22 & 3.18 & (45,0,55) & (100,0,0) & (65,35,0) & (80,20,0) & (92,0,8) & (99,0,1) & (100,0,0) \\
\hline
\multicolumn{9}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.5$} \\
8 & 1.12 & (42,0,58) & (0,100,0) & (0,100,0) & (0,100,0) & (86,0,14) & (89,0,11) & (69,30,0) \\
10 & 1.4 & (48,0,52) & (5,95,0) & (0,100,0) & (0,100,0) & (89,0,11) & (95,0,5) & (95,4,0) \\
12 & 1.68 & (51,0,49) & (45,55,0) & (0,100,0) & (0,100,0) & (92,0,8) & (98,0,2) & (100,0,0) \\
15 & 2.09 & (52,0,48) & (88,12,0) & (0,100,0) & (0,100,0) & (94,0,6) & (99,0,1) & (100,0,0) \\
18 & 2.51 & (52,0,48) & (99,1,0) & (2,98,0) & (17,83,0) & (93,0,7) & (99,0,1) & (100,0,0) \\
22 & 3.07 & (48,0,52) & (100,0,0) & (55,45,0) & (75,25,0) & (91,0,9) & (100,0,0) & (100,0,0) \\
\hline
\multicolumn{9}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.9$} \\
11 & 1.05 & (41,0,59) & (0,100,0) & (0,100,0) & (0,100,0) & (81,0,19) & (83,1,16) & (58,42,0) \\
13 & 1.24 & (44,0,56) & (3,97,0) & (0,100,0) & (0,100,0) & (85,0,15) & (90,0,10) & (86,14,0) \\
16 & 1.52 & (47,0,53) & (26,74,0) & (0,100,0) & (0,100,0) & (89,0,11) & (96,0,4) & (99,1,0) \\
21 & 2 & (49,0,51) & (82,18,0) & (0,100,0) & (1,99,0) & (91,0,9) & (99,0,1) & (100,0,0) \\
26 & 2.48 & (49,0,51) & (98,2,0) & (15,85,0) & (25,75,0) & (90,0,10) & (99,0,1) & (100,0,0) \\
32 & 3.05 & (47,0,53) & (100,0,0) & (61,39,0) & (74,26,0) & (90,0,10) & (99,0,1) & (100,0,0) \\
\hline
\hline
\end{tabular}}
\end{table}
\begin{table}
\caption{\label{tab:bias}Mean and standard error (in parenthesis) of bias of the estimated rank in the simulation study.}
\centering
\resizebox{\textwidth}{!}{
\begin{tabular}{cccccccc}
\hline\hline
SNR & AIC & BIC & GIC & BICP & GCV & CV & StARS-RRR\\
\hline
\multicolumn{8}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.1$} \\
1.07 & 0.12 (0.45) & -1.11 (0.68) & -1.73 (0.71) & -1.55 (0.7) & 0.09 (0.41) & 0.11 (0.46) & -0.4 (0.65) \\
1.6 & 0.14 (0.39) & -0.4 (0.53) & -0.76 (0.65) & -0.65 (0.6) & 0.12 (0.37) & 0.13 (0.38) & -0.06 (0.37) \\
1.85 & 0.15 (0.39) & -0.24 (0.43) & -0.51 (0.57) & -0.43 (0.54) & 0.13 (0.38) & 0.13 (0.38) & -0.03 (0.32) \\
2.14 & 0.15 (0.39) & -0.13 (0.34) & -0.32 (0.47) & -0.26 (0.45) & 0.13 (0.36) & 0.14 (0.37) & 0 (0.28) \\
2.49 & 0.15 (0.39) & -0.06 (0.23) & -0.17 (0.38) & -0.14 (0.35) & 0.14 (0.37) & 0.13 (0.36) & 0 (0.28) \\
3.03 & 0.16 (0.39) & -0.02 (0.13) & -0.07 (0.26) & -0.05 (0.21) & 0.13 (0.36) & 0.14 (0.37) & 0 (0.19) \\
\hline
\multicolumn{8}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.5$} \\
1.1 & 0.09 (0.43) & -0.98 (0.67) & -1.57 (0.69) & -1.42 (0.68) & 0.06 (0.42) & 0.11 (0.44) & -0.39 (0.63) \\
1.26 & 0.12 (0.4) & -0.74 (0.63) & -1.22 (0.69) & -1.08 (0.68) & 0.09 (0.4) & 0.12 (0.43) & -0.25 (0.58) \\
1.57 & 0.13 (0.39) & -0.42 (0.53) & -0.75 (0.62) & -0.66 (0.62) & 0.11 (0.37) & 0.13 (0.42) & -0.07 (0.48) \\
2.2 & 0.15 (0.41) & -0.14 (0.35) & -0.33 (0.48) & -0.27 (0.45) & 0.12 (0.36) & 0.14 (0.4) & 0 (0.35) \\
2.52 & 0.15 (0.38) & -0.07 (0.26) & -0.2 (0.4) & -0.16 (0.36) & 0.13 (0.37) & 0.14 (0.39) & 0.02 (0.32) \\
2.99 & 0.15 (0.38) & -0.03 (0.18) & -0.1 (0.29) & -0.08 (0.27) & 0.13 (0.37) & 0.15 (0.4) & 0.02 (0.32) \\
\hline
\multicolumn{8}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.9$} \\
1.08 & 0.13 (0.49) & -1 (0.64) & -1.55 (0.7) & -1.39 (0.69) & 0.1 (0.47) & 0.11 (0.52) & -0.42 (0.58) \\
1.24 & 0.15 (0.45) & -0.77 (0.63) & -1.23 (0.67) & -1.09 (0.65) & 0.12 (0.43) & 0.14 (0.48) & -0.29 (0.49) \\
1.55 & 0.17 (0.44) & -0.46 (0.54) & -0.79 (0.62) & -0.69 (0.61) & 0.14 (0.41) & 0.16 (0.46) & -0.14 (0.36) \\
2.09 & 0.17 (0.42) & -0.17 (0.37) & -0.37 (0.51) & -0.31 (0.48) & 0.13 (0.38) & 0.17 (0.46) & -0.02 (0.24) \\
2.71 & 0.16 (0.41) & -0.06 (0.23) & -0.16 (0.37) & -0.12 (0.32) & 0.14 (0.39) & 0.15 (0.43) & 0 (0.2) \\
3.1 & 0.17 (0.42) & -0.03 (0.16) & -0.09 (0.29) & -0.07 (0.25) & 0.14 (0.39) & 0.16 (0.45) & 0 (0.19) \\
\hline\hline
\multicolumn{8}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.1$} \\
1.16 & 1.16 (1.33) & -3.05 (0.85) & -7.63 (0.52) & -7.39 (0.62) & 0.16 (0.41) & 0.09 (0.33) & -0.79 (1.86) \\
1.45 & 1.11 (1.37) & -1.45 (0.83) & -7.1 (0.73) & -6.65 (0.82) & 0.11 (0.36) & 0.03 (0.21) & -0.03 (0.2) \\
1.73 & 1.16 (1.47) & -0.52 (0.61) & -6.52 (0.87) & -5.76 (1.03) & 0.09 (0.34) & 0.02 (0.14) & 0 (0.06) \\
2.02 & 1.21 (1.55) & -0.17 (0.4) & -5.78 (1.15) & -4.61 (1.4) & 0.08 (0.33) & 0.01 (0.12) & 0 (0) \\
2.6 & 1.37 (1.66) & -0.01 (0.09) & -3.24 (1.94) & -1.45 (1.27) & 0.09 (0.35) & 0.01 (0.11) & 0 (0) \\
3.18 & 1.42 (1.67) & 0 (0) & -0.46 (0.75) & -0.22 (0.46) & 0.11 (0.41) & 0.01 (0.15) & 0 (0) \\
\hline
\multicolumn{8}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.5$} \\
1.12 & 1.19 (1.36) & -3.19 (0.84) & -7.54 (0.55) & -7.31 (0.64) & 0.15 (0.41) & 0.11 (0.34) & -0.98 (2.27) \\
1.4 & 1.1 (1.37) & -1.66 (0.83) & -6.97 (0.76) & -6.46 (0.86) & 0.13 (0.38) & 0.06 (0.25) & -0.04 (1.08) \\
1.68 & 1.1 (1.42) & -0.66 (0.68) & -6.34 (0.94) & -5.67 (1.06) & 0.1 (0.34) & 0.02 (0.17) & 0.04 (0.94) \\
2.09 & 1.15 (1.5) & -0.13 (0.35) & -5.2 (1.32) & -3.95 (1.38) & 0.08 (0.33) & 0.01 (0.11) & 0.04 (0.94) \\
2.51 & 1.19 (1.55) & -0.01 (0.11) & -3.4 (1.74) & -1.71 (1.32) & 0.09 (0.36) & 0.01 (0.09) & 0.04 (0.94) \\
3.07 & 1.3 (1.59) & 0 (0) & -0.64 (0.86) & -0.29 (0.54) & 0.11 (0.37) & 0 (0.09) & 0.04 (0.94) \\
\hline
\multicolumn{8}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.9$} \\
1.05 & 1.26 (1.4) & -2.6 (0.73) & -5.92 (0.75) & -5.58 (0.8) & 0.21 (0.48) & 0.16 (0.42) & -0.75 (1.6) \\
1.24 & 1.2 (1.4) & -1.72 (0.73) & -5.38 (0.84) & -4.9 (0.87) & 0.18 (0.45) & 0.11 (0.35) & -0.15 (1.1) \\
1.52 & 1.19 (1.48) & -0.91 (0.66) & -4.47 (0.97) & -3.8 (0.89) & 0.13 (0.4) & 0.05 (0.23) & 0.04 (0.94) \\
2 & 1.23 (1.57) & -0.19 (0.39) & -2.88 (0.98) & -2.2 (0.91) & 0.11 (0.36) & 0.02 (0.14) & 0.04 (0.94) \\
2.48 & 1.3 (1.64) & -0.02 (0.15) & -1.38 (0.88) & -1 (0.75) & 0.12 (0.38) & 0.01 (0.09) & 0.04 (0.94) \\
3.05 & 1.37 (1.67) & 0 (0) & -0.46 (0.62) & -0.28 (0.51) & 0.12 (0.38) & 0.01 (0.1) & 0.04 (0.94) \\
\hline
\hline
\end{tabular}
\end{table}
Table \ref{tab:bias} tabulates the mean and standard error of the bias of the estimated rank over simulation replicates. From this table, we observe that the biases of the estimated ranks from AIC, GCV, and CV are always greater than 0, for both Model I and Model II, which indicates that these three methods tend to yield a more complex model. Furthermore, their biases do not quite vanish when SNR increases in Model I and/or Model II, which means that these methods tend to overestimate the rank of the coefficient matrix regardless of the signal-to-noise ratio. By contrast, BIC, BICP, and GIC tend to underestimate the rank for both Model I and Model II, as evidenced by the negative signs of their mean biases. However, the magnitude of the bias decreases when SNR increases, which implies that these three methods perform better with a higher SNR. Finally, StARS-RRR achieves the smallest or the second smallest magnitude of bias in most settings except for very low SNR's. Overall, StARS-RRR performs the best among all the methods we investigated in rank determination for reduced-rank regression models.
{\color{blue}Based on referee's suggestions, we also conduct additional simulation studies to evaluate the prediction performance of StARS-RRR, as well as sensitivity analyses for the hyperparameters $\eta$, $N$, and $b$ in StARS-RRR. For more details, please refer to Section B of the supplementary material.}
\subsection{Application to breast cancer data}
In this subsection, we apply StARS-RRR to a real dataset to show its effectiveness in rank determination. In particular, we consider the breast cancer data \citep{witten2009a}, consisting of the gene expression measurements and comparative genomic hybridization (CGH) measurements for $n = 89$ patients. This dataset has been studied in previous work \citep{bunea2011optimal,chen2013reduced} and is available in the R package \textit{PMA} \citep{witten2009a}. The question of interest is to investigate the relationship between the DNA copy-number variations and gene expression profiles for the patients. We will use reduced-rank regression to model the copy number variations based on the gene expression profiles \citep{geng2011virtual,zhou2012prediction}. A reduced-rank regression model yields a low-rank coefficient matrix, with the estimated rank representing the number of linear combinations of gene expression measurements that enter into the prediction of CGH measurements. These linear combinations of gene expression measurements can be regarded as biologically functional pathways that affect the DNA copy number variations.
\iffalse
In order to make the estimation more accurate, we adopt a refit strategy in the application. We briefly introduce the multivariate reduced-rank regression
model \cite{rrr3,rrrbook} used in refit. Assume that a random sample of $ n $ observations $ (x_{i},y_{i}) $,$ i = 1,2,...,n $, where $ x $ is the p-vector-valued predictor and $ y $ is q-vector-valued response. Using matrix notation, write them as $Y_{c}=X_{c}C+E,r(C)=k$, where $X=(x_{1},...,x_{n})^{\mathrm{T}}, Y=(y_{1},...,y_{n})^{\mathrm{T}}$, and $ (X_{c},Y_{c}) $ is the centralized version of $ (X,Y) $. The respective covariances of $ x $ and $ y $ and the covariance between them can be estimated as $\hat{\Sigma}_{xx}=n^{-1}X_{c}X_{c}^{\mathrm{T}},\hat{\Sigma}_{yy}=n^{-1}Y_{c}Y_{c}^{\mathrm{T}},\hat{\Sigma}_{yx}=n^{-1}Y_{c}X_{c}^{\mathrm{T}}=\hat{\Sigma}_{xy}.$ The estimator is
\begin{equation}\hat{C}(k)=\Gamma^{-1/2}(\sum_{i=1}^{k}\hat{v}_{i}\hat{v}_{i}^{\mathrm{T}})\Gamma^{1/2}\hat{\Sigma}_{yx}\hat{\Sigma}_{xx}^{-1},\label{rrrest}\end{equation} where $ \hat{v}_{i} $ is the eigenvector associated with the i-th largest eigenvalue of $ \Gamma^{1/2}\hat{\Sigma}_{yx}\hat{\Sigma}_{xx}^{-1}\hat{\Sigma}_{xy}\Gamma^{1/2}$,
$ i = 1,2,...,k $. In many applications, it is not unusual to find that the matrix $ \hat{\Sigma}_{xx} $ and/or the matrix
$ \hat{\Sigma}_{yy} $ are singular, or at least difficult to invert. To avoid the problem, \cite{izenman2008modern} adopted the idea of ridge regression, replacing the estimation of the two covariance matrices with \begin{equation}
\hat{\Sigma}_{xx}=n^{-1}(X_{c}X_{c}^{\mathrm{T}}+tI_{p}), \hat{\Sigma}_{yy}=n^{-1}(Y_{c}Y_{c}^{\mathrm{T}}+tI_{q}),t\textgreater 0.\label{rrrbridge} \end{equation}
\fi
For the purpose of illustration, we analyzed the data on chromosome 13, where there are $ p=319 $ gene expression measurements and $ q=58 $ CGH measurements. The adaptive nuclear norm penalization method was used to estimate the coefficient matrix, and StARS-RRR was applied to determine the optimal rank, together with the other approaches used in the simulation. The estimated ranks are presented in the top panel of Table~\ref{app1}. On the one hand, AIC and GCV estimate the rank as 57 and 26, respectively, which seem to overestimate the number of functional pathways of practical interest. On the other hand, BIC, GIC, BICP and CV estimate the rank as 1 or 2 and haven't revealed enough biological relationships for further investigation. Instead, StARS-RRR reveals three linear combinations of gene expressions that potentially affect copy number variations, which include a reasonable number of biological pathways that deserve further investigation.
To visualize the relationship between the DNA copy-number variations and gene expression profiles, we also plot the estimated coefficient matrix with the tuning parameter selected by StARS-RRR in the form of a heat map in Figure \ref{figapp}. It is visually clear that there are three sets of CGH measurements, each of which follows a similar relationship with the gene profiles. The left 24 CGH measurements have a strong relationship with the genes as the coefficients have the largest magnitude among the three sets and have both positive and negative signs. The middle 3 CGH measurements have a moderate relationship that is similar to the above measurements in terms of signs although the magnitude of the coefficients is much smaller. The right 31 CGH measurements have a weak relationship with the genes as their coefficients are small in magnitude.
\iftrue
\begin{figure}
\centering
\includegraphics[width=\textwidth]{Rplot2_color}
\caption{\label{figapp}The heat map of coefficient matrix obtained by the StARS-RRR for each CGH spot (row) and the gene (column). Genes with all of its coefficients being 0 are not shown.}
\end{figure}
\fi
To provide further insight into the performance of different methods, we carried out the following random-splitting process for 100 times. The data were randomly split into a training set of size $ n_{\text{train}}=79 $ and a test set of size $ n_{\text{test}}=10 $. We first estimate the rank using the aforementioned methods, and then refit the model using a ridge generalization of reduced-rank regression model \citep{izenman2008modern} to derive the final estimated coefficient matrix $\hat{C}$. Finally, we calculate the mean squared prediction error (MSPE) as
$\mathrm{MSPE} = 100\times \lVert Y_{\text{test}}-X_{\text{test}}\hat{C}\rVert_{\mathrm{F}}^{2}/(qn_{\text{test}})$,
where $X_{\text{test}}$ and $Y_{\text{test}}$ are the predictors and responses in the test set.
\begin{table}
\caption{\label{app1}Comparison of the model fits to the real data for various tuning parameter selection methods. The mean squared prediction errors (MSPE) and the estimated ranks (Rank) are reported, with their standard errors in the parentheses.}
\centering
\resizebox{\textwidth}{!}{
\begin{tabular}{lccccccc}
\hline
& AIC & BIC & GIC & BICP & GCV & CV & StARS-RRR \\
\hline
\multicolumn{8}{c}{Full Data} \\
Rank & 57 & 2 & 1 & 2 & 26 & {\color{blue}0} & 3\\
\hline
\multicolumn{8}{c}{Random-Splitting Process}\\
Rank & {\color{blue}56.98 (0.14)} & {\color{blue}49.87 (18.51)} & {\color{blue}1.00 (0.00)} & {\color{blue}1.06 (0.24)} & {\color{blue}30.76 (12.42)} & {\color{blue}0.80 (0.40)} & {\color{blue}2.65 (0.52)} \\
MSPE & {\color{blue}4.32 (0.98)} & {\color{blue}4.20 (1.02)} & {\color{blue}3.71 (1.28)} & {\color{blue}3.71 (1.27)} & {\color{blue}4.25 (0.98)} & {\color{blue}3.84 (1.37)} & {\color{blue}3.41 (0.95)} \\
\hline
\end{tabular}}
\end{table}
Similar to the full-data performance, the bottom panel of Table~\ref{app1} shows that the tuning parameter selection methods can be divided into three groups according to their estimated ranks. The first group consists of AIC, BIC, and GCV, whose estimated ranks are quite large. The coefficient matrix has $58$ columns, so the coefficient matrices estimated by AIC and BIC are of almost full rank. Therefore, these methods result in a complex model that might overfit the data. The second group includes GIC, BICP, and CV, where the average estimated rank is close to 1. This might imply an underestimation of the rank. Underestimation of the rank leads to the lack of information to be extracted, which also explains why they underperform in terms of prediction accuracy. The last group is StARS-RRR, whose average estimated rank is between 2 and 3, a more reasonable rank than the other methods. Moreover, the MSPE of StARS-RRR is lower than all the other methods, which further convinces us that StARS-RRR yields an accurate estimation of rank for this dataset.
\section{Discussion}\label{sec:dis}
In this article, we propose a new method based on the stability approach to select the tuning parameter for reduced-rank regression. To the best of our knowledge, it is the first time that the stability approach is used in this framework. Our main contribution is twofold. First, we set up a general framework of the stability approach for rank determination including a new definition of instability and a new tuning parameter selection rule based on the instability. This framework is generally applicable to any matrix estimation problem and is referred to as StARS-RRR when specifically applied to reduced-rank regression. Second, we show that the rank determined by StARS-RRR is consistent to the true rank when the adaptive nuclear norm penalization is used. In fact, we provide a finite sample lower bound of the probability with which the rank is estimated correctly. Interestingly, there is an explicit relationship between this lower bound and the threshold $\eta$ used to select the tuning parameter in StARS-RRR, giving the method high interpretability.
Although StARS-RRR performs satisfactorily in both simulated and real data, it still has a few {\color{blue}limitations that need attention and/or }deserve further studies. First, the current definition of instability emphasizes the stability of the estimated rank but there could be alternative definitions. For example, if one concerns more the stability of the subspace corresponding to the estimated coefficient matrix instead of its rank, the instability could be defined as the variation of such subspaces estimated from the randomly draw subsamples. We refer to \citet{taeb2020false} for recent development of subspace stability in low-rank matrix estimation. {\color{blue} Second, we established the rank estimation consistency for StARS-RRR, which makes it more theoretically sound than most information criterion methods when applied to reduced-rank regression. However, we must point out that most information criterion methods do not need any assumptions on the design matrix, while StARS-RRR assumes an independent and identically distributed sample. This limitation needs to be taken into consideration in the application of StARS-RRR to dependent or heterogeneous data.}
Third, this article represents only the first effort to apply the stability approach to low-rank matrix estimation and thus there are still many unsolved questions to explore. For example, if both sparsity and low rank are desired as in the sparse reduced-rank regression, it will be an interesting topic to extend StARS-RRR so that variable selection consistency and rank estimation consistency can be achieved simultaneously. Generalization of StARS-RRR to other matrix estimation problems such as low-rank matrix completion also warrants future investigation.
\section*{Acknowledgement}
Wen's research was supported in part by National Science Foundation of China under Grants 12171449 and 11801540; and Natural Science Foundation of Anhui Province under Grant BJ2040170017. Jiang's research was supported in part by the U.S. National Institutes of Health under Grant R01GM126549.
\section*{Supplementary Material}
Supplementary material includes technical proofs of the theoretical results as well as additional numerical results.
\bibliographystyle{apalike}
\section{Technical Proofs}
\renewcommand{\theequation}{A.\arabic{equation}}
\setcounter{equation}{0}
\subsection{Lemmas}
\begin{lemma}\label{Lemma-1}
Suppose Assumption~1 holds. Then for any $t > 0$, $E\{d_1(P^b E^b)\} \le \sigma (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})$ and $P [d_1(P^b E^b) \ge E\{d_1(P^b E^b)\} + \sigma t] \le \exp(-t^2/2)$.
\end{lemma}
\begin{proof}
Lemma \ref{Lemma-1} is identical to Lemma 3 in \citet{bunea2011optimal}.
\end{proof}
\begin{lemma}\label{Lemma-2}
Suppose Assumptions~1--2 hold. For any $\delta$ satisfying that $\exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\} \le \delta < 1/2$ with a large enough $r_{\mathrm{x}^b} + q$, there exist $\lambda_l,\ \lambda_m,\ \lambda_h$ with $0 < \lambda_l \le \lambda_m \le \lambda_h \le [(1 + \theta/2) \sigma (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})]^{\gamma + 1}$ such that $P(d_{r^{\ast} + 1}(P^b Y^b) > \lambda_l^{1/(\gamma + 1)}) = 1 - \delta$, $P(d_{r^{\ast} + 1}(P^b Y^b) > \lambda_m^{1/(\gamma + 1)}) = \delta$, and $P(d_{r^{\ast} + 1}(P^b Y^b) > \lambda_h^{1/(\gamma + 1)}) = \exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}$.
\end{lemma}
\begin{proof}
On the one hand, $d_{r^{\ast} + 1}(P^b Y^b)$ is a continuous function of $P^b Y^b$. Further, $P^b Y^b = X^b C + P^b E^b$ where $E^b$ has independent $N(0, \sigma^2)$ entries, then $d_{r^{\ast} + 1}(P^b Y^b)$ has a continuous distribution. Denote by $q_{\delta}$ and $q_{1-\delta}$ the $\delta$-quantile and $(1-\delta)$-quantile of such a distribution, respectively. Let $\lambda_l = q_{\delta}^{\gamma + 1}$ and $\lambda_m = q_{1-\delta}^{\gamma + 1}$, then
\[P[d_{r^{\ast} + 1}(P^b Y^b) > \lambda_l^{1/(\gamma + 1)}] = 1-\delta \quad \text{and} \quad P[d_{r^{\ast} + 1}(P^b Y^b) > \lambda_m^{1/(\gamma + 1)}] = \delta.\]
On the other hand, based on Weyl’s inequalities on singular values \citep{franklin2012matrix} and observing that $P^b Y^b = X^b C + P^b E^b$, we have
\begin{equation}\label{weyl}
|d_s(P^b Y^b) - d_s(X^b C)| \le d_1(P^b E^b), \quad s = 1, \ldots, b \wedge q.
\end{equation}
When $s = r^{\ast} + 1$, $d_{r^{\ast} + 1}(P^b Y^b) \le d_{r^{\ast} + 1}(X^b C) + d_1(P^b E^b)$ and by Lemma \ref{Lemma-1},
\[P[d_{r^{\ast} + 1}(P^b Y^b) < d_{r^{\ast} + 1}(X^b C) + \sigma (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q}) + \sigma t] \ge 1 - \exp(-t^2/2),\]
for any $t > 0$.
Since $d_{r^{\ast} + 1}(X^b C) = 0$, let $t = \theta (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q}) /2$, we have
\[ P[d_{r^{\ast} + 1}(P^b Y^b) > (1 + \theta/2) \sigma (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q}) ] \le \exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}.\]
Therefore, there exists $\lambda_h \le [(1 + \theta/2) \sigma (\sqrt{r_{\mathrm{x}}} + \sqrt{q})]^{\gamma + 1}$ such that
\begin{equation}\label{dr*+1}
P[d_{r^{\ast} + 1}(P^b Y^b) > \lambda_h^{1/(\gamma + 1)}] = \exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}.
\end{equation}
Finally, $\lambda_l \le \lambda_m$ is implied by the fact that $\delta < 1/2$. In addition, $\lambda_m \le \lambda_h$ is implied by the fact that $\delta \ge \exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}$.
\end{proof}
\subsection{Proof of Theorem 3.1}
For part (a), by the Weyl's inequalities, $d_{r^{\ast}}(P^b Y^b) \ge d_{r^{\ast}}(X^b C) - d_1(P^b E^b)$ and by Lemma \ref{Lemma-1},
\[P[d_{r^{\ast}}(P^b Y^b) > d_{r^{\ast}}(X^b C) - \sigma (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q}) - \sigma t] \ge 1 - \exp(-t^2/2),\]
for any $t > 0$. Similar to the proof of Lemma \ref{Lemma-2}, since $d_{r^{\ast}}(X^b C) \ge 2 (1 + \theta) \sigma (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q}) $,
\[ P[d_{r^{\ast}}(P^b Y^b) > (1 + 2\theta) \sigma (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q}) - \sigma t] \ge 1 - \exp(-t^2/2). \]
Letting $t = \theta (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q}) /2$, we have that
\[ P[d_{r^{\ast}}(P^b Y^b) > (1 + 3\theta/2) \sigma (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q}) ] \ge 1 - \exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}. \]
When $\lambda \le [(1 + 3\theta/2) \sigma (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})]^{\gamma + 1}$, this leads to
\begin{equation}\label{dr*}
P[d_{r^{\ast}}(P^b Y^b) > \lambda^{1/(\gamma + 1)}] \ge 1 - \exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}.
\end{equation}
Since $\lambda_h \le \lambda \le [(1 + 3\theta/2) \sigma (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})]^{\gamma + 1}$, combining (\ref{dr*+1}) and (\ref{dr*}) leads to
\[ P[d_{r^{\ast}+1}(P^b Y^b) \le \lambda^{1/(\gamma + 1)} < d_{r^{\ast}}(P^b Y^b)] \ge 1 - 2\exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}. \]
Since $\hat{r}^b_{\lambda}=\max\{r:d_{r}(P^b Y^b)>\lambda^{1/(\gamma + 1)}\}$ as in (4),
\[ P(\hat{r}^b_{\lambda} = r^{\ast}) \ge 1 - 2\exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}.\]
Furthermore, as $P^b Y^b$ has at most $r_{\mathrm{x}^b} \wedge q$ positive singular values,
\begin{align*}
&\mathrm{var}(\hat{r}^b_{\lambda}) \\= {} & E(\hat{r}^b_{\lambda}) - [E(\hat{r}^b_{\lambda})]^2 \\
\le {} & (r^{\ast})^2 [1 - 2\exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}] + 2 (r_{\mathrm{x}^b} \wedge q)^2 \exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\} \\
& - (r^{\ast})^2 [1 - 2\exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}]^2 \\
= {} & 2 (r^{\ast})^2 \exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\} [1 - 2\exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}] \\
&+ 2 (r_{\mathrm{x}^b} \wedge q)^2 \exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}\\
\le {} & 4 (r_{\mathrm{x}^b} \wedge q)^2 \exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\},
\end{align*}
because $r^{\ast} \le r_{\mathrm{x}^b} \wedge q$ as in Assumption 3.
For part (b), as $\hat{r}^b_{\lambda}$ is a decreasing function of $\lambda$, $P(\hat{r}^b_\lambda \ge r^{\ast}) \ge 1 - 2\exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}$ is implied by the result in part (a). Further, for any $\lambda$ satisfying that $\lambda \ge \lambda_m$,
\[P[d_{r^{\ast} + 1}(P^b Y^b) > \lambda^{1/(\gamma + 1)}] \le \delta, \]
which implies that $P(\hat{r}^b_\lambda \ge r^{\ast} + 1) \le \delta$ from the definition of $\hat{r}^b_{\lambda}$. Thus,
\[P(\hat{r}^b_\lambda = r^{\ast}) = P(\hat{r}^b_\lambda \ge r^{\ast}) - P(\hat{r}^b_\lambda \ge r^{\ast} + 1) \ge 1 - \delta - 2\exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}.\]
For part (c), from Lemma \ref{Lemma-2}, $P(d_{r^{\ast} + 1}(P^b Y^b) > \lambda_m^{1/(\gamma + 1)}) = \delta$. Then, for any $\lambda$ satisfying $0 \le \lambda \le \lambda_m$, $P(d_{r^{\ast} + 1}(P^b Y^b) > \lambda^{1/(\gamma + 1)}) \ge \delta$, which leads to $P(\hat{r}^b_{\lambda} \ge r^{\ast} + 1) \ge \delta$ from the definition of $\hat{r}^b_{\lambda}$.
The estimated rank $\hat{r}^b_{\lambda}$ can be alternatively written as $\hat{r}^b_{\lambda} = \sum_{i=1}^{r_{\mathrm{x}^b} \wedge q} I\{d_{i}(P^b Y^b)>\lambda^{1/(\gamma + 1)}\}$, where $I(\cdot)$ is the indicator function. Therefore,
\begin{align*}
\mathrm{var}(\hat{r}_{\lambda}^{b}) = {} & \sum_{i=1}^{r_{\mathrm{x}^b} \wedge q} \mathrm{var}[ I\{d_{i}(P^b Y^b)>\lambda^{1/(\gamma + 1)}\}] \\
&+ \sum_{i=1}^{r_{\mathrm{x}^b} \wedge q} \sum_{j=1}^{r_{\mathrm{x}^b} \wedge q} \mathrm{cov}[ I\{d_{i}(P^b Y^b)>\lambda^{1/(\gamma + 1)}\}, I\{d_{j}(P^b Y^b)>\lambda^{1/(\gamma + 1)}\}].
\end{align*}
It is noteworthy that, for $1 \le i, j \le r_{\mathrm{x}^b} \wedge q$,
\begin{align*}
& \mathrm{cov}[ I\{d_{i}(P^b Y^b) > \lambda^{1/(\gamma + 1)}\}, I\{d_{j}(P^b Y^b) > \lambda^{1/(\gamma + 1)}\} ] \\
= {} & P[ d_{i}(P^b Y^b) > \lambda^{1/(\gamma + 1)}, d_{j}(P^b Y^b) > \lambda^{1/(\gamma + 1)} ] \\
&- P[ d_{i}(P^b Y^b) > \lambda^{1/(\gamma + 1)} ] P[ d_{j}(P^b Y^b) > \lambda^{1/(\gamma + 1)} ] \\
= {} & P[ d_{i \wedge j}(P^b Y^b) > \lambda^{1/(\gamma + 1)} ] [1 - P\{ d_{i \vee j}(P^b Y^b) > \lambda^{1/(\gamma + 1)} \}] \\
\ge {} & 0.
\end{align*}
Therefore,
\begin{equation*}
\mathrm{var}(\hat{r}^b_{\lambda}) \ge \sum_{i=1}^{r_{\mathrm{x}^b} \wedge q} \mathrm{var}[ I\{d_{i}(P^b Y^b)>\lambda^{1/(\gamma + 1)}\}] \ge \mathrm{var}[ I\{d_{r^{\ast} + 1}(P^b Y^b)>\lambda^{1/(\gamma + 1)}\}].
\end{equation*}
When $\lambda_l \le \lambda \le \lambda_m$, $\delta \le P[d_{r^{\ast} + 1}(P^b Y^b)>\lambda^{1/(\gamma + 1)}] \le 1-\delta$, which leads to that $\mathrm{var}(\hat{r}^b_{\lambda}) \ge \delta (1-\delta)$.
\subsection{Proof of Theorem 3.2}
For any $\lambda > 0$, denote $\mu_2^b(\lambda) = \mathrm{var}(\hat{r}^b_{\lambda})$ as the variance of the estimated rank from the reduced rank regression based on the subsample $(Y_1,X_1),\ldots,(Y_b,X_b)$. The parameter $\mu_2^b(\lambda)$ can be written as $\mu_2^b(\lambda) = m_2^b(\lambda) - \{m_1^b(\lambda)\}^2$, where $m_2^b(\lambda) = \mathrm{E}[(\hat{r}^b_{\lambda})^2]$ and $m_1^b(\lambda) = \mathrm{E}(\hat{r}^b_{\lambda})$. Note that $\hat{m}_1^b(\lambda) = \sum_{i=1}^N \hat{r}_{\lambda}(S_i)/N$ and $\hat{m}_2^b(\lambda) = \sum_{i=1}^N \hat{r}^2_{\lambda}(S_i)/N$ are their corresponding U-statistics of order $b$, and further that $0 \le \hat{r}_{\lambda}(S_i) \le r_{\mathrm{x}} \wedge q$ for $i=1,\ldots,N$. Hence, by Hoeffding's inequality for U-statistics \citep{serfling2009approximation}, we have, for any $t > 0$,
\begin{align}
P\left[\left| \hat{m}_1^b(\lambda) - m_1^b(\lambda) \right| > t\right] & \le 2 \exp[-2 n t^2/\{(r_{\mathrm{x}} \wedge q)^2 b\}], \label{hoeffding.1}\\
P\left[\left| \hat{m}_2^b(\lambda) - m_2^b(\lambda) \right| > t\right] & \le 2 \exp[-2 n t^2/\{(r_{\mathrm{x}} \wedge q)^4 b\}]. \label{hoeffding.2}
\end{align}
In addition, $m_1^b(\lambda) \le r_{\mathrm{x}^b} \wedge q$ and $m_2^b(\lambda) \le (r_{\mathrm{x}^b} \wedge q)^2$ for any $\lambda > 0$ as $P^b Y^b$ has at most $r_{\mathrm{x}^b} \wedge q$ positive singular values. Setting $t = m_1^b(\lambda) $ in (\ref{hoeffding.1}) leads to that
\begin{equation*}
P\left[\hat{m}_1^b(\lambda) \le 2 m_1^b(\lambda) \right] \ge 1 - 2 \exp[-2 n \{m_1^b(\lambda)\}^2/\{(r_{\mathrm{x}} \wedge q)^2 b\}].
\end{equation*}
For any $\lambda > 0$ such that $m_1^b(\lambda) \ge 1/2$, with probability at least $1 - 2 \exp[- n /\{2(r_{\mathrm{x}} \wedge q)^2 b\}]$, $\hat{m}_1^b(\lambda) \le 2(r_{\mathrm{x}^b} \wedge q)$.
From the definition of $S^{2}(\hat{r}_{\lambda})$ in (5), with probability at least $1 - 2 \exp[- n /\{2(r_{\mathrm{x}} \wedge q)^2 b\}]$,
\begin{align*}
& \left|S^{2}(\hat{r}_{\lambda}) - \mu_2^b(\lambda) \right| \\ \le {}& \frac{N}{N-1} \left| \hat{m}_2^b(\lambda) - m_2^b(\lambda) \right| +\frac{N}{N-1} \left| \left\{ \hat{m}_1^b(\lambda) \right\}^2 - \{m_1^b(\lambda)\}^2 \right| + \frac{1}{N-1} \left[m_2^b(\lambda) + \{m_1^b(\lambda)\}^2\right] \notag \\
\le {}& \frac{N}{N-1} \left| \hat{m}_2^b(\lambda) - m_2^b(\lambda) \right| + \frac{N}{N-1} \left| \{ \hat{m}_1^b(\lambda) + m_1^b(\lambda) \} \{ \hat{m}_1^b(\lambda) - m_1^b(\lambda) \} \right| + \frac{2}{N-1} (r_{\mathrm{x}^b} \wedge q)^2 \notag\\
\le {}&\frac{N}{N-1} \left| \hat{m}_2^b(\lambda) - m_2^b(\lambda) \right| + \frac{N}{N-1} \left| 3(r_{\mathrm{x}^b} \wedge q) \{ \hat{m}_1^b(\lambda) - m_1^b(\lambda) \} \right| + \frac{2}{N-1} (r_{\mathrm{x}^b} \wedge q)^2.
\end{align*}
For $t \ge 6(r_{\mathrm{x}^b} \wedge q)^2/(N-1) $,
\[\frac{2}{N-1} (r_{\mathrm{x}^b} \wedge q)^2 \le \frac{t}{3}.\]
Thus, for any $\lambda > 0$ such that $m_1^b(\lambda) \ge 1/2$ and $6(r_{\mathrm{x}^b} \wedge q)^2/(N-1) \le t \le 9 (r_{\mathrm{x}} \wedge q)$,
\begin{align*}
& P\left[\left| S^{2}(\hat{r}_{\lambda}) - \mu_2^b(\lambda) \right| > t \right] \\
\le{}& 2 \exp[- n /\{2(r_{\mathrm{x}} \wedge q)^2 b\}] + P\left[ \frac{N}{N-1} \left| \hat{m}_2^b(\lambda) - m_2^b(\lambda) \right| > \frac{t}{3} \right] \\ &+ P\left[ \frac{N}{N-1} \left|3(r_{\mathrm{x}^b} \wedge q) \{ \hat{m}_1^b(\lambda) - m_1^b(\lambda) \} \right| > \frac{t}{3} \right]\\
\le {}& 2 \exp[- n /\{2(r_{\mathrm{x}} \wedge q)^2 b\}] + P\left[ | \hat{m}_2^b(\lambda) - m_2^b(\lambda) | > \frac{t}{6} \right] \\ &+ P\left[ | \hat{m}_1^b(\lambda) - m_1^b(\lambda) | > \frac{t}{18(r_{\mathrm{x}^b} \wedge q)} \right] \\
\le {}& 2 \exp[- n /\{2(r_{\mathrm{x}} \wedge q)^2 b\}] + 2 \exp[- n t^2/\{(18(r_{\mathrm{x}} \wedge q)^4 b\}] \\& + 2 \exp[ -n t^2/ \{162(r_{\mathrm{x}^b} \wedge q)^2 (r_{\mathrm{x}} \wedge q)^2 b\} ] \\
\le {}& 6 \exp[ -n t^2/ \{162(r_{\mathrm{x}} \wedge q)^4 b\} ].
\end{align*}
\subsection{Proof of Corollary 3.1}
Denote $\lambda_u = [(1 + 3\theta/2) \sigma (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})]^{\gamma + 1}$ for simplicity of notation. Based on Theorem 3.1, for any $\delta \in [\exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}, 1/2)$
\begin{align}
\mu_2^b(\lambda) \ge \delta (1-\delta), & \quad \text{when}\ \lambda_l \le \lambda \le \lambda_m, \label{var.lower.bound} \\
\mu_2^b(\lambda)\le 4 (r_{\mathrm{x}^b} \wedge q)^2 \exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}, & \quad \text{when}\ \lambda_h \le \lambda \le \lambda_u. \label{var.upper.bound.1}
\end{align}
Thus, for any fixed $C > 3$, if $\delta \in [8 C (r_{\mathrm{x}^b} \wedge q)^2 \exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}, 1/2)$ with a large enough $r_{\mathrm{x}^b} + q$, (\ref{var.lower.bound}) still holds and (\ref{var.upper.bound.1}) becomes
\begin{equation}
\mu_2^b(\lambda)\le \delta(1-\delta)/C, \quad \text{when}\ \lambda_h \le \lambda \le \lambda_u. \label{var.upper.bound.2}
\end{equation}
Based on Theorem 3.2, for any $t$ satisfying that $6(r_{\mathrm{x}^b} \wedge q)^2/(N-1) \le t \le 9 (r_{\mathrm{x}} \wedge q)$,
\begin{align*}
& P\left[ \max_{\lambda \in \Lambda: m_1^b(\lambda) \ge 1/2} \left|S^{2}(\hat{r}_{\lambda}) - \mu_2^b(\lambda)\right| > t \right]
\\ \le {} & 6 \sum_{\lambda \in \Lambda: m_1^b(\lambda) \ge 1/2} \exp[ -n t^2/ \{162(r_{\mathrm{x}} \wedge q)^4 b\} ] \\
\le {} & 6 K \exp[ -n t^2 / \{162(r_{\mathrm{x}} \wedge q)^4 b\} ].
\end{align*}
Therefore, when $12C (r_{\mathrm{x}^b} \wedge q)^2/(N-1) \le \delta < 1/2$, we can set $t = (1/C) \delta (1-\delta)$ in the above inequality, which leads to
\begin{align*}
& P\left[ \max_{\lambda \in \Lambda: m_1^b(\lambda) \ge 1/2} \left|S^{2}(\hat{r}_{\lambda}) - \mu_2^b(\lambda)\right| > (1/C) \delta (1-\delta) \right] \\ \le {} & 6 K \exp[ -n \delta^2 (1-\delta)^2 / \{162 C^2 (r_{\mathrm{x}} \wedge q)^4 b \} ] \\
\le {} & 6 K \exp[ -n \delta^2 / \{648 C^2 (r_{\mathrm{x}} \wedge q)^4 b \} ].
\end{align*}
In other words, when $\max[8 C (r_{\mathrm{x}^b} \wedge q)^2 \exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}, 12C (r_{\mathrm{x}^b} \wedge q)^2/(N-1)] \le \delta < 1/2$, with probability at least $1 - 6 K \exp[ -n \delta^2 / \{648 C^2 (r_{\mathrm{x}} \wedge q)^4 b \} ]$,
\begin{equation}
\max_{\lambda \in \Lambda: m_1^b(\lambda) \ge 1/2} \left|S^{2}(\hat{r}_{\lambda}) - \mu_2^b(\lambda)\right| \le (1/C) \delta (1-\delta). \label{var.diff}
\end{equation}
Whenever $\lambda \in [\lambda_l, \lambda_m]$ or $\lambda \in [\lambda_h, \lambda_u]$, $m_1^b(\lambda) = E(\hat{r}^b_\lambda) \ge 1/2$ with a large enough $r_{\mathrm{x}} + q$ based on Theorem 1. Combining (\ref{var.lower.bound}), (\ref{var.upper.bound.2}), and (\ref{var.diff}),
\begin{align*}
\min \left\{ S^{2}(\hat{r}_{\lambda}) : \lambda \in \Lambda \cap [\lambda_l, \lambda_m] \right\} &\ge [(C-1)/C] \delta (1 - \delta), \\
\max \left\{ S^{2}(\hat{r}_{\lambda}) : \lambda \in \Lambda \cap [\lambda_h, \lambda_u] \right\} &\le (2/C) \delta (1 - \delta).
\end{align*}
\subsection{Proof of Theorem 3.3}
In Corollary 3.1, setting $C = 4$ leads to that, for any $\delta$ satisfying $\max[32 (r_{\mathrm{x}^b} \wedge q)^2 \exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}, 48 (r_{\mathrm{x}^b} \wedge q)^2/(N-1)] \le \delta < 1/2$, the following bounds
\begin{align*}
\min \left\{ \hat{D}(\lambda) : \lambda \in \Lambda \cap [\lambda_l, \lambda_m] \right\} & \ge 3\delta(1-\delta)/4 > \eta, \\
\max \left\{ \hat{D}(\lambda) : \lambda \in \Lambda \cap [\lambda_h, \lambda_u] \right\} &\le \delta(1-\delta)/2 = \eta,
\end{align*}
hold with probability at least $1 - 6 K \exp[ -n \delta^2 / \{10368 (r_{\mathrm{x}} \wedge q)^4 b \}]$, which implies that the optimal tuning parameter selected by StARS-RRR $\hat{\lambda}$ must lie in $[\lambda_m, \lambda_h]$ or $[\lambda_h, \lambda_u]$, i.e.,
\[ P(\hat\lambda \in [\lambda_m, \lambda_u]) \ge 1 - 6 K \exp[ -n \delta^2 / \{10368 (r_{\mathrm{x}} \wedge q)^4 b \}]. \]
We can bound the probability of $\{\hat{r}^b_{\hat\lambda} \ne r^{\ast}\}$ as follows:
\begin{align*}
& P(\hat{r}^b_{\hat\lambda} \ne r^{\ast})\\ \le{} & P(\hat{r}^b_{\hat\lambda} \ne r^{\ast}, \hat\lambda \in \Lambda \cap [\lambda_m, \lambda_h]) + P(\hat{r}^b_{\hat\lambda} \ne r^{\ast}, \hat\lambda \in \Lambda \cap [\lambda_h, \lambda_u]) + P(\hat\lambda \notin [\lambda_m, \lambda_u])
\\ \le{}& \sum_{\lambda \in \Lambda \cap [\lambda_m, \lambda_h]} P(\hat{r}^b_{\lambda} \ne r^{\ast}, \hat\lambda = \lambda) + \sum_{\lambda \in \Lambda \cap [\lambda_h, \lambda_u]} P(\hat{r}^b_{\lambda} \ne r^{\ast}, \hat\lambda = \lambda) + P(\hat\lambda \notin [\lambda_m, \lambda_u]).
\end{align*}
From parts (a) and (b) in Theorem 3.1,
\begin{align*}
P(\hat{r}^b_{\lambda} \ne r^{\ast}) \le \delta + 2\exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}, \quad &\text{when } \lambda \in [\lambda_m, \lambda_h]; \\
P(\hat{r}^b_{\lambda} \ne r^{\ast}) \le 2\exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}, \quad &\text{when } \lambda \in [\lambda_h, \lambda_u].
\end{align*}
Let $K_1 = |\Lambda \cap [\lambda_m, \lambda_h]|$ and $K_2 = |\Lambda \cap [\lambda_h, \lambda_u]|$. Then,
\begin{align}
& P(\hat{r}^b_{\hat\lambda} \ne r^{\ast}) \\
\le {} & K_1 (\delta + 2 \exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}) + 2 K_2 \exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\} + P(\hat\lambda \notin [\lambda_m, \lambda_u]) \notag \\
\le {} & K \delta + 2 K \exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\} + 6 K \exp[ -n \delta^2 / \{10368 (r_{\mathrm{x}} \wedge q)^4 b \}],\label{inconsistency.probability}
\end{align}
where $\max[32 (r_{\mathrm{x}^b} \wedge q)^2 \exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}, 48 (r_{\mathrm{x}^b} \wedge q)^2/(N-1)] \le \delta < 1/2$.
Under the conditions that for a given $\alpha > 0$ and a given $\beta > 0$,
\begin{align*}
(r_{\mathrm{x}^b} \wedge q)^2 \exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2/8\} &= o(n^{-\alpha}),\\
(r_{\mathrm{x}} \wedge q)^4 b/n &= o(n^{-\beta}).
\end{align*}
Then, we can choose $\delta = n^{-(\alpha \wedge \beta)/2}$ such that
$\max[32 (r_{\mathrm{x}^b} \wedge q)^2 \exp\{-\theta^2 (\sqrt{r_{\mathrm{x}^b}} + \sqrt{q})^2 /8\}, 48 (r_{\mathrm{x}^b} \wedge q)^2/(N-1)] \le \delta < 1/2$ when $n$ is large enough, and
\[ 6 K \exp[ -n \delta^2 / \{10368 (r_{\mathrm{x}} \wedge q)^4 b \}] \le 6 K \exp[ -n^{1-\beta} /\{10368 (r_{\mathrm{x}} \wedge q)^4 b \} ] \to 0.\]
Therefore, the probability bound in (\ref{inconsistency.probability}) tends to zero when $r_{\mathrm{x}^b} + q \to \infty$ because $K$ is assumed to be fixed.
\section{Additional Simulation Results}
\renewcommand{\thesubsection}{\Alph{section}.\arabic{subsection}}
\subsection{Prediction Performance}
\subsubsection{Impact of rank estimation on prediction}
Rank estimation is the focus of this paper as better rank estimation can indeed lead to better prediction. Hereby, we perform a simulation study to illustrate the impact of rank estimation on prediction. We adopt the same simulation settings in the main text to generate the training and test data sets, where the sample size of the test data is set to be the same as that of the training data. For each setting, we replicate 100 times. Given that the simulation results are similar, we only present the results of three settings for the purpose of illustration, which are:
\begin{itemize}
\item [(1)] $\rho=0.9$ and SNR=1.57 under Model \uppercase\expandafter{\romannumeral1};
\item [(2)] $\rho=0.1$ and SNR=1.15 under Model \uppercase\expandafter{\romannumeral2};
\item [(3)] $\rho=0.5$ and SNR=3.09 under Model \uppercase\expandafter{\romannumeral2}.
\end{itemize}
For each given rank $\hat r$ in $\{1,2,\dots,(p\wedge q)-1\}$, we derive the estimated coefficient matrix $\hat{C}$ using the ridge estimation method \citep{izenman2008modern}. Denoting the test data as $\{\widetilde{X},\widetilde{Y}\}$, we calculate the mean squared prediction error (MSPE) as
$$
\mathrm{MSPE}=100\times\frac{\lVert\widetilde{ Y}-\widetilde{ X}\hat{ C}\rVert_{\mathrm{F}}^{2}}{nq}.
$$
The simulation results are summarized in Figure~\ref{fig:rd_pe}, in which the top, middle, and bottom panels correspond to settings (1)--(3). From Figure~\ref{fig:rd_pe}, it is obvious that a better rank estimate leads to a better prediction. Overall, the true rank estimate always corresponds to the smallest mean MSPE, and the MSPE is larger than the one with the true rank when the rank is under-estimated or over-estimated. In particular, when the estimated rank is smaller than the true rank, the information extracted by the model is insufficient, resulting in a poor prediction accuracy. When the estimated rank is larger than the true rank, the extracted signal is mixed with some noises, resulting in a slightly lower prediction accuracy. Furthermore, as the discrepancy between the estimated rank and the true rank becomes larger, the MSPE increases quickly especially in the underestimation scenario.
\begin{figure}[htbp]
\centering
\includegraphics[width=0.75\textwidth]{rd_pe_plot1} \includegraphics[width=0.75\textwidth]{rd_pe_plot2}
\includegraphics[width=0.75\textwidth]{rd_pe_plot3}
\caption{Line graph of prediction error versus estimated rank. The dots represent the mean value of MSPE corresponding to each estimated rank. The ordinate of the dotdash line represents the minimum value of the mean MSPE, and the dotted line represents the true rank.
}
\label{fig:rd_pe}
\end{figure}
\subsubsection{Prediction performance}
In this subsection, we evaluate the prediction performance of different rank determination methods. We adopt the same simulation settings in the main text to generate the training and test data sets. For each estimated coefficient matrix $\hat{C}$, we calculate the mean squared prediction error (MSPE) on the test data $\{\widetilde{X},\widetilde{Y}\}$ with a refitted estimator \citep{izenman2008modern}. The simulation results are summarized in Table~\ref{tab:pe}. Our method still performs well with the smallest MSPE in most cases although the difference of the MSPE's is small. This is partially because that a slightly overestimated rank may not cause a significant increase of MSPE, while an underestimated rank often leads to a substantial increase of MSPE (see Section B.1.1).
\iftrue
\begin{table}[htbp]
\caption{The prediction performance in the simulation study.}
\label{tab:pe}
\centering
\begin{tabular}{cccccccc}
\hline
\hline
SNR & AIC & BIC & GIC & BICP & GCV & CV & StARS-RRR\\
\hline
\multicolumn{8}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.1$} \\
1.07 & 237.49 & 238.42 & 240.13 & 239.57 & 237.46 & 237.48 & 237.45 \\
1.60 & 404.68 & 405.12 & 406.10 & 405.67 & 404.67 & 404.68 & 404.61 \\
1.85 & 505.66 & 505.88 & 506.75 & 506.48 & 505.65 & 505.66 & 505.56 \\
2.14 & 638.93 & 639.01 & 639.56 & 639.34 & 638.92 & 638.91 & 638.79 \\
2.49 & 832.29 & 832.25 & 832.56 & 832.50 & 832.27 & 832.27 & 832.14 \\
3.03 & 1178.12 & 1177.96 & 1178.14 & 1178.10 & 1178.10 & 1178.10 & 1177.99 \\
\hline
\multicolumn{8}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.5$} \\
1.10 & 236.38 & 237.28 & 239.09 & 238.47 & 236.35 & 236.39 & 236.33 \\
1.26 & 276.80 & 277.57 & 279.08 & 278.54 & 276.78 & 276.81 & 276.65 \\
1.57 & 373.82 & 373.99 & 375.30 & 374.68 & 373.79 & 373.81 & 373.72 \\
2.20 & 632.61 & 632.60 & 633.06 & 632.91 & 632.57 & 632.61 & 632.44 \\
2.52 & 794.34 & 794.27 & 794.64 & 794.53 & 794.32 & 794.34 & 794.19 \\
2.99 & 1077.40 & 1077.28 & 1077.43 & 1077.38 & 1077.38 & 1077.40 & 1077.26 \\
\hline
\multicolumn{8}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.9$} \\
1.08 & 217.00 & 218.01 & 220.14 & 219.43 & 216.96 & 217.01 & 216.97 \\
1.24 & 251.14 & 252.00 & 253.78 & 253.24 & 251.11 & 251.13 & 251.04 \\
1.55 & 333.13 & 333.74 & 334.89 & 334.53 & 333.11 & 333.12 & 333.01 \\
2.09 & 520.52 & 520.53 & 521.52 & 521.08 & 520.47 & 520.51 & 520.26 \\
2.71 & 803.05 & 802.84 & 803.26 & 803.21 & 803.02 & 803.01 & 802.79 \\
3.10 & 1016.65 & 1016.43 & 1016.89 & 1016.60 & 1016.62 & 1016.64 & 1016.41 \\
\hline\hline
\multicolumn{8}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.1$} \\
1.16 & 216.13 & 220.40 & 244.57 & 244.08 & 214.26 & 214.13 & 216.18 \\
1.45 & 276.26 & 277.72 & 322.79 & 319.01 & 274.37 & 274.20 & 274.12 \\
1.73 & 350.09 & 349.45 & 412.87 & 401.34 & 348.09 & 347.90 & 347.87 \\
2.02 & 437.40 & 435.71 & 509.47 & 486.28 & 435.30 & 435.11 & 435.09 \\
2.60 & 652.50 & 649.91 & 705.01 & 666.10 & 650.11 & 649.90 & 649.89 \\
3.18 & 921.15 & 918.44 & 924.64 & 920.76 & 918.70 & 918.46 & 918.44 \\
\hline
\multicolumn{8}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.5$} \\
1.12 & 201.41 & 206.85 & 239.20 & 238.29 & 198.72 & 198.58 & 202.40 \\
1.40 & 251.10 & 253.57 & 311.83 & 305.16 & 248.50 & 248.25 & 248.40 \\
1.68 & 312.25 & 312.04 & 392.34 & 377.91 & 309.57 & 309.31 & 309.26 \\
2.09 & 425.08 & 422.60 & 518.26 & 481.77 & 422.25 & 422.00 & 422.03 \\
2.51 & 563.07 & 559.91 & 631.77 & 587.19 & 560.18 & 559.90 & 559.92 \\
3.07 & 786.30 & 782.79 & 793.90 & 786.27 & 783.17 & 782.80 & 782.84 \\
\hline
\multicolumn{8}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.9$} \\
1.05 & 170.88 & 175.56 & 247.20 & 235.18 & 165.69 & 165.46 & 167.53 \\
1.24 & 188.74 & 191.17 & 277.27 & 257.08 & 183.59 & 183.19 & 183.14 \\
1.52 & 222.05 & 221.85 & 313.44 & 283.26 & 216.62 & 216.08 & 215.89 \\
2.00 & 293.59 & 288.82 & 360.26 & 332.62 & 287.77 & 287.21 & 287.19 \\
2.48 & 384.67 & 378.16 & 415.47 & 400.91 & 378.65 & 378.01 & 378.02 \\
3.05 & 519.68 & 512.57 & 525.72 & 519.54 & 513.33 & 512.62 & 512.66 \\
\hline
\hline
\end{tabular}
\end{table}
\fi
\subsection{Effective Rank}
On the one hand, the true rank of a $p\times q$ matrix $C$ is defined as
$$
r^*=\text{rank}(C)=\sum_{i=1}^{p\wedge q}I(d_i(C) > 0),
$$
where $d_i(C)$ is the $i$th singular value of $C$, $i=1,\ldots,p\wedge q$. On the other hand, according to \cite{bunea2011optimal}, the effective rank of the coefficient matrix $C$ in reduced-rank regression is defined as
$$
s=\sum_{i=1}^{p \wedge q}I(d_i(XC)>d_1(PE)),
$$
where $X$, $P$, and $E$ are the design matrix, projection matrix, and error matrix in reduced-rank regression, respectively.
For any two matrices $A, B$ with suitable dimensions, we have that
$$
\text{rank}(AB)\leq \text{rank}(A)\wedge\text{rank}(B).
$$
Therefore,
$$
s=\sum_{i=1}^{p \wedge q}I(d_i(XC)>d_1(PE))\leq\text{rank}(XC)\leq\text{rank}(C)=r^*.
$$
Furthermore, by the definition of the signal-to-noise ratio: $\text{SNR}=d_{r^*}(XC)/d_1(PE)$, we have $d_{r^*}(XC)>d_1(PE)$ when $\text{SNR}>1 $. Since $d_{i}(XC)\geq d_{r^*}(XC)$ holds for any $i=1,\ldots ,r^*$, we know that $s \ge r^*$ when $\text{SNR}>1 $. In conclusion, the effective rank is equal to the true rank when $\text{SNR}>1$.
However, in the simulation studies of the main text, the effective rank \citep{bunea2011optimal} and the true rank of the coefficient matrix are not necessarily identical. This is because not all simulated data have a $\text{SNR}>1$, although the average SNR across the replicates is reported to be greater than 1 in all simulation settings (see the SNR column in Table 2).
Therefore, we additionally report the effective-rank recovery ratio. Table~\ref{tab:effr}~reports the effective-rank recovery ratio under the same simulations settings as in the main text. We can see that StARS-RRR has the highest effective-rank recovery ratio in all cases.
\iftrue
\begin{table}[htbp]
\caption{The effective-rank recovery ratio in the simulation study.}
\label{tab:effr}
\centering
\begin{tabular}{cccccccc}
\hline
\hline
SNR & AIC & BIC & GIC & BICP & GCV & CV & StARS-RRR\\
\hline
\multicolumn{8}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.1$} \\
1.07 & 0.51 & 0.45 & 0.15 & 0.20 & 0.52 & 0.52 & 0.80 \\
1.60 & 0.78 & 0.72 & 0.45 & 0.51 & 0.80 & 0.79 & 0.93 \\
1.85 & 0.83 & 0.80 & 0.57 & 0.64 & 0.84 & 0.84 & 0.96 \\
2.14 & 0.85 & 0.88 & 0.70 & 0.76 & 0.86 & 0.86 & 0.99 \\
2.49 & 0.85 & 0.95 & 0.84 & 0.87 & 0.87 & 0.87 & 0.99 \\
3.03 & 0.85 & 0.99 & 0.93 & 0.96 & 0.87 & 0.87 & 0.99 \\
\hline
\multicolumn{8}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.5$} \\
1.10 & 0.57 & 0.53 & 0.19 & 0.25 & 0.58 & 0.55 & 0.83 \\
1.26 & 0.64 & 0.60 & 0.29 & 0.37 & 0.65 & 0.64 & 0.88 \\
1.57 & 0.77 & 0.71 & 0.44 & 0.51 & 0.78 & 0.78 & 0.91 \\
2.20 & 0.84 & 0.89 & 0.71 & 0.76 & 0.86 & 0.85 & 0.98 \\
2.52 & 0.86 & 0.94 & 0.81 & 0.85 & 0.87 & 0.87 & 0.99 \\
2.99 & 0.86 & 0.97 & 0.91 & 0.93 & 0.88 & 0.86 & 0.99 \\
\hline
\multicolumn{8}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.9$} \\
1.08 & 0.52 & 0.50 & 0.20 & 0.26 & 0.53 & 0.55 & 0.81 \\
1.24 & 0.62 & 0.58 & 0.27 & 0.34 & 0.64 & 0.64 & 0.86 \\
1.55 & 0.73 & 0.71 & 0.44 & 0.52 & 0.75 & 0.75 & 0.94 \\
2.09 & 0.82 & 0.87 & 0.67 & 0.74 & 0.85 & 0.84 & 0.98 \\
2.71 & 0.85 & 0.95 & 0.85 & 0.89 & 0.87 & 0.87 & 0.99 \\
3.10 & 0.85 & 0.98 & 0.91 & 0.94 & 0.87 & 0.86 & 1.00 \\
\hline
\hline
\multicolumn{8}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.1$} \\
1.16 & 0.37 & 0.00 & 0.00 & 0.00 & 0.71 & 0.75 & 0.75 \\
1.45 & 0.48 & 0.13 & 0.00 & 0.00 & 0.89 & 0.95 & 0.99 \\
1.73 & 0.50 & 0.54 & 0.00 & 0.00 & 0.93 & 0.99 & 1.00 \\
2.02 & 0.50 & 0.83 & 0.00 & 0.00 & 0.93 & 0.99 & 1.00 \\
2.60 & 0.47 & 0.99 & 0.05 & 0.24 & 0.93 & 0.99 & 1.00 \\
3.18 & 0.45 & 1.00 & 0.65 & 0.80 & 0.92 & 0.99 & 1.00 \\
\hline
\multicolumn{8}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.5$} \\
1.12 & 0.35 & 0.01 & 0.00 & 0.00 & 0.69 & 0.71 & 0.71 \\
1.40 & 0.47 & 0.07 & 0.00 & 0.00 & 0.87 & 0.92 & 0.94 \\
1.68 & 0.51 & 0.45 & 0.00 & 0.00 & 0.92 & 0.98 & 1.00 \\
2.09 & 0.52 & 0.88 & 0.00 & 0.00 & 0.94 & 0.99 & 1.00 \\
2.51 & 0.52 & 0.99 & 0.02 & 0.17 & 0.93 & 0.99 & 1.00 \\
3.07 & 0.48 & 1.00 & 0.55 & 0.75 & 0.91 & 1.00 & 1.00 \\
\hline
\multicolumn{8}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.9$} \\
1.05 & 0.26 & 0.02 & 0.00 & 0.00 & 0.51 & 0.53 & 0.63 \\
1.24 & 0.41 & 0.05 & 0.00 & 0.00 & 0.77 & 0.82 & 0.87 \\
1.52 & 0.47 & 0.27 & 0.00 & 0.00 & 0.88 & 0.94 & 0.98 \\
2.00 & 0.49 & 0.82 & 0.00 & 0.01 & 0.91 & 0.99 & 1.00 \\
2.48 & 0.49 & 0.98 & 0.15 & 0.25 & 0.90 & 0.99 & 1.00 \\
3.05 & 0.47 & 1.00 & 0.61 & 0.74 & 0.90 & 0.99 & 1.00 \\
\hline
\hline
\end{tabular}
\end{table}
\fi
\subsection{Sensitivity Analyses}
The choice of hyperparameters is important for StARS-RRR. Suggested by the referees, we conduct sensitivity analyses for the hyperparameters in StARS-RRR, including the threshold $\eta$, the number of subsamples $N$, and the size of subsamples $b$. Below are the values of $\eta$, $N$, and $b$ that are examined in each sensitivity analysis.
\begin{itemize}
\item Sensitivity analysis of $\eta$: $\eta_1=0.001$, $\eta_2=0.01$, $\eta_3=0.02$, $\eta_4=0.05$
\item Sensitivity analysis of $N$: $N_1=25$, $N_2=50$, $N_3=100$, $N_4=200$
\item Sensitivity analysis of $b$:
\begin{itemize}
\item Model I: $b_1=\lfloor 10\sqrt{n}\rfloor$, $b_2=0.5n$, $b_3=0.7n$, $b_4=0.9n$
\item Model II: $b_1=0.4n$, $b_2=0.5n$, $b_3=0.7n$, $b_4=0.9n$
\end{itemize}
\end{itemize}
When one hyperparameter is examined in each sensitivity analysis, the other two hyperparameters are fixed at their values that are used in the main text: $\eta = 0.001$, $b = 0.7n$, and $N = 100$.
Except the choices of $\eta$, $N$, and $b$, the other simulation settings are exactly the same as the simulation studies in the main text.
\subsubsection{Sensitivity analysis for $\eta$}
The results of the sensitivity analysis of $\eta$ are summarzied in Table~\ref{tab:eta}. We find that when SNR is very small, a slightly larger value of $\eta$ could lead to a better rank estimation when the signal-to-noise ratio is very small. A larger value of $\eta$ leads to a smaller tuning parameter, increasing the the possibility of an overestimated rank. The simulation studies in the main text show that StARS-RRR tends to underestimate the rank when the SNR is very small. Therefore, a slightly larger value of $\eta$ could alleviate this tendency, resulting in a more accurately estimated rank. By contrast, when SNR is sufficiently large, the smallest value of $\eta$ seems to outperform the others by a small margin.
In practice when we have no prior knowledge of the signal-to-noise ratio, we recommend using a small value of $\eta$ to be more conservative on the instability measure.
\begin{table}[htbp]
\centering
\caption{Rank recovery (left), underestimate (middle), and overestimate (right) ratios (in percentage) in the sensitive analysis of $ \eta $.}\label{tab:eta}
\begin{tabular}{cccccc}
\hline
\hline
s & SNR & $ \eta_1=0.001 $ & $ \eta_2=0.01 $ & $ \eta_3=0.02 $ & $ \eta_4=0.05 $ \\
\hline
\multicolumn{6}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.1$} \\
40 & 1.42 & (86,14,0) & (90,9,0) & (91,8,1) & (93,5,2) \\
45 & 1.6 & (92,8,0) & (95,5,0) & (96,4,1) & (95,3,2) \\
52 & 1.85 & (95,4,0) & (97,2,0) & (97,2,1) & (96,1,2) \\
60 & 2.14 & (98,2,0) & (98,1,0) & (98,1,1) & (97,1,2) \\
70 & 2.49 & (98,1,0) & (98,1,0) & (98,1,1) & (98,0,2) \\
85 & 3.03 & (99,0,0) & (99,0,1) & (99,0,1) & (98,0,2) \\
\hline
\multicolumn{6}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.5$} \\
35 & 1.1 & (63,37,0) & (70,29,1) & (72,26,1) & (79,18,3) \\
40 & 1.26 & (73,26,1) & (79,20,1) & (81,17,1) & (86,11,3) \\
50 & 1.57 & (89,10,1) & (93,6,1) & (93,6,1) & (93,4,3) \\
70 & 2.2 & (97,3,1) & (97,2,1) & (97,1,1) & (96,1,3) \\
80 & 2.52 & (99,1,1) & (98,1,1) & (98,1,1) & (97,0,3) \\
95 & 2.99 & (99,1,1) & (98,1,1) & (98,0,1) & (97,0,3) \\
\hline
\multicolumn{6}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.9$} \\
70 & 1.08 & (63,37,0) & (67,32,0) & (72,27,1) & (76,19,5) \\
80 & 1.24 & (73,27,0) & (79,21,0) & (82,17,1) & (82,13,5) \\
100 & 1.55 & (86,14,0) & (90,10,0) & (92,7,1) & (91,4,5) \\
135 & 2.09 & (97,3,0) & (97,2,1) & (97,2,1) & (95,1,5) \\
175 & 2.71 & (99,1,0) & (99,0,1) & (98,0,1) & (95,0,5) \\
200 & 3.1 & (99,0,0) & (99,0,1) & (98,0,1) & (95,0,5) \\
\hline
\hline
\multicolumn{6}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.1$} \\
8 & 1.16 & (77,23,0) & (88,12,0) & (91,8,0) & (93,4,3) \\
10 & 1.45 & (98,2,0) & (99,1,0) & (99,1,0) & (97,0,3) \\
12 & 1.73 & (100,0,0) & (100,0,0) & (100,0,0) & (97,0,3) \\
14 & 2.02 & (100,0,0) & (100,0,0) & (100,0,0) & (97,0,3) \\
18 & 2.6 & (100,0,0) & (100,0,0) & (100,0,0) & (97,0,3) \\
22 & 3.18 & (100,0,0) & (100,0,0) & (100,0,0) & (97,0,3) \\
\hline
\multicolumn{6}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.5$} \\
8 & 1.12 & (69,30,0) & (82,17,0) & (89,11,1) & (93,5,2) \\
10 & 1.4 & (95,4,0) & (98,2,0) & (98,1,1) & (98,0,2) \\
12 & 1.68 & (100,0,0) & (100,0,0) & (100,0,0) & (97,0,3) \\
15 & 2.09 & (100,0,0) & (100,0,0) & (100,0,0) & (97,0,3) \\
18 & 2.51 & (100,0,0) & (100,0,0) & (100,0,0) & (97,0,3) \\
22 & 3.07 & (100,0,0) & (100,0,0) & (100,0,0) & (97,0,3) \\
\hline
\multicolumn{6}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.9$} \\
11 & 1.05 & (58,42,0) & (73,27,0) & (77,21,1) & (89,8,3) \\
13 & 1.24 & (86,14,0) & (94,5,1) & (96,2,1) & (96,1,3) \\
16 & 1.52 & (99,1,0) & (99,0,1) & (99,0,1) & (97,0,3) \\
21 & 2 & (100,0,0) & (99,0,1) & (99,0,1) & (96,0,4) \\
26 & 2.48 & (100,0,0) & (99,0,1) & (99,0,1) & (97,0,3) \\
32 & 3.05 & (100,0,0) & (99,0,1) & (99,0,1) & (97,0,3) \\
\hline
\hline
\end{tabular}
\end{table}
\iffalse
\begin{table}[htbp]
\centering
\caption{Mean bias of the estimated rank in the sensitive analysis of $ \eta $.}
\begin{tabular}{ccccc}
\hline
\hline
SNR & $ \eta_1 $ & $ \eta_2 $ & $ \eta_3 $ & $ \eta_4 $ \\
\hline
\multicolumn{5}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.1$} \\
1.42 & -0.13 & -0.08 & -0.06 & 0.02 \\
1.60 & -0.06 & -0.03 & -0.01 & 0.04 \\
1.85 & -0.03 & -0.01 & 0.00 & 0.06 \\
2.14 & 0.00 & 0.00 & 0.01 & 0.06 \\
2.49 & 0.00 & 0.00 & 0.02 & 0.06 \\
3.03 & 0.00 & 0.02 & 0.03 & 0.06 \\
\hline
\multicolumn{5}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.5$} \\
1.10 & -0.39 & -0.27 & -0.22 & -0.07 \\
1.26 & -0.25 & -0.17 & -0.13 & 0.00 \\
1.57 & -0.07 & -0.03 & -0.00 & 0.07 \\
2.20 & -0.00 & 0.02 & 0.04 & 0.10 \\
2.52 & 0.02 & 0.02 & 0.04 & 0.10 \\
2.99 & 0.02 & 0.03 & 0.05 & 0.11 \\
\hline
\multicolumn{5}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.9$} \\
1.08 & -0.42 & -0.33 & -0.27 & -0.04 \\
1.24 & -0.29 & -0.20 & -0.15 & 0.02 \\
1.55 & -0.14 & -0.08 & -0.04 & 0.11 \\
2.09 & -0.02 & 0.00 & 0.02 & 0.15 \\
2.71 & 0.00 & 0.03 & 0.04 & 0.15 \\
3.10 & 0.00 & 0.03 & 0.04 & 0.15 \\
\hline
\hline
\multicolumn{5}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.1$} \\
1.16 & -0.79 & -0.25 & -0.04 & 0.47 \\
1.45 & -0.03 & -0.01 & 0.04 & 0.55 \\
1.73 & -0.00 & -0.00 & 0.04 & 0.59 \\
2.02 & 0.00 & 0.00 & 0.04 & 0.67 \\
2.60 & 0.00 & 0.00 & 0.04 & 0.63 \\
3.18 & 0.00 & 0.00 & 0.04 & 0.59 \\
\hline
\multicolumn{5}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.5$} \\
1.12 & -0.98 & -0.37 & -0.09 & 0.28 \\
1.40 & -0.04 & 0.07 & 0.08 & 0.46 \\
1.68 & 0.04 & 0.08 & 0.08 & 0.55 \\
2.09 & 0.04 & 0.04 & 0.04 & 0.51 \\
2.51 & 0.04 & 0.04 & 0.04 & 0.51 \\
3.07 & 0.04 & 0.04 & 0.04 & 0.51 \\
\hline
\multicolumn{5}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.9$} \\
1.05 & -0.75 & -0.28 & 0.00 & 0.50 \\
1.24 & -0.15 & 0.07 & 0.27 & 0.71 \\
1.52 & 0.04 & 0.16 & 0.29 & 0.71 \\
2.00 & 0.04 & 0.17 & 0.25 & 0.72 \\
2.48 & 0.04 & 0.17 & 0.25 & 0.71 \\
3.05 & 0.04 & 0.17 & 0.25 & 0.71 \\
\hline
\hline
\end{tabular}
\end{table}
\fi
\subsubsection{Sensitivity analysis for $N$}
The results of the sensitivity analysis for $N$ are summarized in Table ~\ref{tab:bags}. We find that the rank estimation is not very sensitive to the choice of $N$ as long as it is not too small, say, 25. We recommend using 50 or 100, which balances the stability of estimating the sample variance of the estimated ranks and the computational cost.
\begin{table}[htbp]
\centering
\caption{Rank recovery (left), underestimate (middle), and overestimate (right) ratios (in percentage) in the sensitive analysis of $ N $.}
\label{tab:bags}
\begin{tabular}{cccccc}
\hline
\hline
s & SNR & $ N_1=25 $ & $ N_2=50 $ & $ N_3=100 $ & $ N_4=200 $ \\
\hline
\multicolumn{6}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.1$} \\
40 & 1.48 & (93,3,4) & (93,7,0) & (89,11,0) & (86,14,0) \\
45 & 1.67 & (92,2,6) & (95,5,0) & (93,7,0) & (93,7,0) \\
52 & 1.93 & (94,1,5) & (99,1,0) & (96,4,0) & (95,5,0) \\
60 & 2.22 & (95,0,5) & (100,0,0) & (100,0,0) & (100,0,0) \\
70 & 2.6 & (93,0,7) & (100,0,0) & (100,0,0) & (100,0,0) \\
85 & 3.15 & (96,0,4) & (100,0,0) & (100,0,0) & (100,0,0) \\
\hline
\multicolumn{6}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.5$} \\
35 & 1.15 & (72,16,12) & (71,29,0) & (64,36,0) & (61,39,0) \\
40 & 1.32 & (82,7,11) & (84,16,0) & (77,23,0) & (74,26,0) \\
50 & 1.65 & (86,4,10) & (93,6,1) & (92,8,0) & (90,10,0) \\
70 & 2.31 & (91,0,9) & (99,0,1) & (98,2,0) & (97,3,0) \\
80 & 2.64 & (90,0,10) & (99,0,1) & (100,0,0) & (100,0,0) \\
95 & 3.13 & (91,0,9) & (100,0,0) & (100,0,0) & (100,0,0) \\
\hline
\multicolumn{6}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.9$} \\
70 & 1.13 & (72,18,10) & (69,31,0) & (66,34,0) & (61,39,0) \\
80 & 1.29 & (76,12,12) & (79,20,1) & (76,24,0) & (70,30,0) \\
100 & 1.62 & (86,5,9) & (89,10,1) & (85,15,0) & (84,16,0) \\
135 & 2.18 & (88,1,11) & (98,1,1) & (98,2,0) & (96,4,0) \\
175 & 2.83 & (89,1,10) & (97,1,2) & (99,1,0) & (99,1,0) \\
200 & 3.23 & (89,0,11) & (98,0,2) & (99,1,0) & (99,1,0) \\
\hline
\hline
\multicolumn{6}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.1$} \\
8 & 1.15 & (91,6,3) & (86,14,0) & (78,22,0) & (67,33,0) \\
10 & 1.44 & (96,0,4) & (97,3,0) & (96,4,0) & (96,4,0) \\
12 & 1.73 & (97,0,3) & (100,0,0) & (100,0,0) & (100,0,0) \\
14 & 2.02 & (97,0,3) & (100,0,0) & (100,0,0) & (100,0,0) \\
18 & 2.59 & (98,0,2) & (100,0,0) & (100,0,0) & (100,0,0) \\
22 & 3.17 & (98,0,2) & (100,0,0) & (100,0,0) & (100,0,0) \\
\hline
\multicolumn{6}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.5$} \\
8 & 1.1 & (90,9,1) & (78,22,0) & (64,36,0) & (51,49,0) \\
10 & 1.38 & (99,0,1) & (98,2,0) & (96,4,0) & (95,5,0) \\
12 & 1.65 & (99,0,1) & (100,0,0) & (100,0,0) & (100,0,0) \\
15 & 2.07 & (99,0,1) & (100,0,0) & (100,0,0) & (100,0,0) \\
18 & 2.48 & (99,0,1) & (100,0,0) & (100,0,0) & (100,0,0) \\
22 & 3.03 & (100,0,0) & (100,0,0) & (100,0,0) & (100,0,0) \\
\hline
\multicolumn{6}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.9$} \\
11 & 1.04 & (81,17,2) & (72,28,0) & (63,37,0) & (49,51,0) \\
13 & 1.23 & (93,4,3) & (91,9,0) & (83,17,0) & (79,21,0) \\
16 & 1.51 & (97,0,3) & (100,0,0) & (98,2,0) & (97,3,0) \\
21 & 1.98 & (97,0,3) & (100,0,0) & (100,0,0) & (100,0,0) \\
26 & 2.45 & (97,0,3) & (100,0,0) & (100,0,0) & (100,0,0) \\
32 & 3.02 & (97,0,3) & (100,0,0) & (100,0,0) & (100,0,0) \\
\hline
\hline
\end{tabular}
\end{table}
\iffalse
\begin{table}[htbp]
\centering
\caption{Mean bias of the estimated rank in the sensitive analysis of $ N $.}
\begin{tabular}{ccccc}
\hline
\hline
SNR & $ N_1 $ & $ N_2 $ & $ N_3 $ & $ N_4 $ \\
\hline
\multicolumn{5}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.1$} \\
1.48 & 0.07 & -0.07 & -0.11 & -0.14 \\
1.67 & 0.10 & -0.05 & -0.07 & -0.07 \\
1.93 & 0.10 & -0.01 & -0.04 & -0.05 \\
2.22 & 0.08 & 0.00 & 0.00 & 0.00 \\
2.60 & 0.13 & 0.00 & 0.00 & 0.00 \\
3.15 & 0.07 & 0.00 & 0.00 & 0.00 \\
\hline
\multicolumn{5}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.5$} \\
1.15 & 0.15 & -0.30 & -0.37 & -0.42 \\
1.32 & 0.22 & -0.16 & -0.23 & -0.27 \\
1.65 & 0.24 & -0.05 & -0.08 & -0.10 \\
2.31 & 0.27 & 0.01 & -0.02 & -0.03 \\
2.64 & 0.27 & 0.01 & 0.00 & 0.00 \\
3.13 & 0.27 & 0.00 & 0.00 & 0.00 \\
\hline
\multicolumn{5}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.9$} \\
1.13 & 0.07 & -0.34 & -0.39 & -0.48 \\
1.29 & 0.15 & -0.18 & -0.26 & -0.33 \\
1.62 & 0.16 & -0.07 & -0.16 & -0.17 \\
2.18 & 0.23 & 0.03 & -0.02 & -0.04 \\
2.83 & 0.21 & 0.07 & -0.01 & -0.01 \\
3.23 & 0.25 & 0.08 & -0.01 & -0.01 \\
\hline
\hline
\multicolumn{5}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.1$} \\
1.15 & 0.55 & -0.33 & -0.84 & -1.40 \\
1.44 & 0.65 & -0.05 & -0.06 & -0.08 \\
1.73 & 0.63 & 0.00 & 0.00 & 0.00 \\
2.02 & 0.63 & 0.00 & 0.00 & 0.00 \\
2.59 & 0.42 & 0.00 & 0.00 & 0.00 \\
3.17 & 0.42 & 0.00 & 0.00 & 0.00 \\
\hline
\multicolumn{5}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.5$} \\
1.10 & 0.09 & -0.62 & -1.23 & -2.31 \\
1.38 & 0.21 & -0.03 & -0.09 & -0.10 \\
1.65 & 0.21 & 0.00 & 0.00 & 0.00 \\
2.07 & 0.21 & 0.00 & 0.00 & 0.00 \\
2.48 & 0.21 & 0.00 & 0.00 & 0.00 \\
3.03 & 0.00 & 0.00 & 0.00 & 0.00 \\
\hline
\multicolumn{5}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.9$} \\
1.04 & 0.18 & -0.45 & -0.79 & -1.08 \\
1.23 & 0.59 & -0.10 & -0.25 & -0.39 \\
1.51 & 0.63 & 0.00 & -0.02 & -0.03 \\
1.98 & 0.63 & 0.00 & 0.00 & 0.00 \\
2.45 & 0.63 & 0.00 & 0.00 & 0.00 \\
3.02 & 0.63 & 0.00 & 0.00 & 0.00 \\
\hline
\hline
\end{tabular}
\end{table}
\fi
\subsubsection{Sensitivity analysis for $b$}
The results of the sensitivity analysis of $b$ are summarized in Table ~\ref{tab:sub}. The accuracy of the rank estimation is closely related to the size of the subsample. From the results, the overall performance of the rank estimation is the best when $b = 0.7n$ considering both Models I and II. In fact, the performance of StARS-RRR is satisfactory as long as $b$ is not too small, such as $b=\lfloor 10\sqrt{n}\rfloor $ or $b = 0.4n$.
\begin{table}[htbp]
\centering
\caption{Rank recovery (left), underestimate (middle), and overestimate (right) ratios (in percentage) in the sensitive analysis of $ b $.}
\label{tab:sub}
\begin{tabular}{cccccc}
\hline
\hline
s & SNR & $ b_1=\lfloor 10\sqrt{n}\rfloor $ & $ b_2=0.5n $ & $ b_3=0.7n $ & $ b_4=0.9n$ \\
\hline
\multicolumn{6}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.1$} \\
40 & 1.48 & (80,19,1) & (78,21,1) & (89,11,0) & (84,1,15) \\
45 & 1.67 & (88,11,1) & (90,10,0) & (93,7,0) & (84,0,16) \\
52 & 1.93 & (95,5,0) & (93,7,0) & (96,4,0) & (87,0,13) \\
60 & 2.22 & (99,1,0) & (99,1,0) & (100,0,0) & (84,0,16) \\
70 & 2.6 & (100,0,0) & (100,0,0) & (100,0,0) & (84,0,16) \\
85 & 3.15 & (100,0,0) & (100,0,0) & (100,0,0) & (86,0,14) \\
\hline
\multicolumn{6}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.5$} \\
35 & 1.15 & (46,53,1) & (50,50,0) & (64,36,0) & (80,10,10) \\
40 & 1.32 & (70,29,1) & (69,31,0) & (77,23,0) & (86,4,10) \\
50 & 1.65 & (87,13,0) & (86,14,0) & (92,8,0) & (88,0,12) \\
70 & 2.31 & (99,1,0) & (99,1,0) & (98,2,0) & (86,0,14) \\
80 & 2.64 & (100,0,0) & (100,0,0) & (100,0,0) & (85,0,15) \\
95 & 3.13 & (100,0,0) & (100,0,0) & (100,0,0) & (87,0,13) \\
\hline
\multicolumn{6}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.9$} \\
70 & 1.13 & (44,54,2) & (53,46,1) & (66,34,0) & (78,10,12) \\
80 & 1.29 & (63,35,2) & (63,36,1) & (76,24,0) & (80,7,13) \\
100 & 1.62 & (79,19,2) & (83,16,1) & (85,15,0) & (87,2,11) \\
135 & 2.18 & (94,4,2) & (95,4,1) & (98,2,0) & (87,1,12) \\
175 & 2.83 & (97,1,2) & (97,2,1) & (99,1,0) & (89,1,10) \\
200 & 3.23 & (97,1,2) & (98,1,1) & (99,1,0) & (90,0,10) \\
\hline
\hline
s & SNR & $ b_1=0.4n $ & $ b_2=0.5n $ & $ b_3=0.7n $ & $ b_4=0.9n$ \\
\hline
\multicolumn{6}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.1$} \\
8 & 1.15 & (0,100,0) & (8,90,2) & (78,22,0) & (97,3,0) \\
10 & 1.44 & (5,94,1) & (47,51,2) & (96,4,0) & (100,0,0) \\
12 & 1.73 & (42,57,1) & (87,11,2) & (100,0,0) & (100,0,0) \\
14 & 2.02 & (74,26,0) & (96,2,2) & (100,0,0) & (100,0,0) \\
18 & 2.59 & (98,2,0) & (98,0,2) & (100,0,0) & (100,0,0) \\
22 & 3.17 & (100,0,0) & (98,0,2) & (100,0,0) & (100,0,0) \\
\hline
\multicolumn{6}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.5$} \\
8 & 1.1 & (0,99,1) & (4,96,0) & (64,36,0) & (98,2,0) \\
10 & 1.38 & (4,95,1) & (39,61,0) & (96,4,0) & (100,0,0) \\
12 & 1.65 & (26,73,1) & (82,18,0) & (100,0,0) & (100,0,0) \\
15 & 2.07 & (80,19,1) & (100,0,0) & (100,0,0) & (99,0,1) \\
18 & 2.48 & (96,3,1) & (100,0,0) & (100,0,0) & (100,0,0) \\
22 & 3.03 & (99,0,1) & (100,0,0) & (100,0,0) & (100,0,0) \\
\hline
\multicolumn{6}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.9$} \\
11 & 1.04 & (1,98,1) & (8,90,2) & (63,37,0) & (91,9,0) \\
13 & 1.23 & (8,91,1) & (21,77,2) & (83,17,0) & (99,1,0) \\
16 & 1.51 & (26,72,2) & (69,29,2) & (98,2,0) & (100,0,0) \\
21 & 1.98 & (75,23,2) & (96,2,2) & (100,0,0) & (100,0,0) \\
26 & 2.45 & (96,2,2) & (98,0,2) & (100,0,0) & (100,0,0) \\
32 & 3.02 & (98,0,2) & (98,0,2) & (100,0,0) & (100,0,0) \\
\hline
\hline
\end{tabular}
\end{table}
\iffalse
\begin{table}[htbp]
\centering
\caption{Mean bias of the estimated rank in the sensitive analysis of $ b $.}
\begin{tabular}{ccccc}
\hline
\hline
SNR & $ b_1 $ & $ b_2 $ & $ b_3 $ & $ b_4 $ \\
\hline
\multicolumn{5}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.1$} \\
1.48 & -0.19 & -0.17 & -0.11 & 0.28 \\
1.67 & -0.10 & -0.10 & -0.07 & 0.29 \\
1.93 & -0.05 & -0.07 & -0.04 & 0.25 \\
2.22 & -0.01 & -0.01 & 0.00 & 0.29 \\
2.60 & 0.00 & 0.00 & 0.00 & 0.29 \\
3.15 & 0.00 & 0.00 & 0.00 & 0.28 \\
\hline
\multicolumn{5}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.5$} \\
1.15 & -0.61 & -0.54 & -0.37 & 0.05 \\
1.32 & -0.28 & -0.34 & -0.23 & 0.10 \\
1.65 & -0.13 & -0.14 & -0.08 & 0.21 \\
2.31 & -0.01 & -0.01 & -0.02 & 0.23 \\
2.64 & 0.00 & 0.00 & 0.00 & 0.26 \\
3.13 & 0.00 & 0.00 & 0.00 & 0.23 \\
\hline
\multicolumn{5}{c}{Model \uppercase\expandafter{\romannumeral1}, $\rho = 0.9$} \\
1.13 & -0.57 & -0.50 & -0.39 & 0.09 \\
1.29 & -0.29 & -0.35 & -0.26 & 0.12 \\
1.62 & -0.12 & -0.12 & -0.16 & 0.16 \\
2.18 & 0.04 & 0.00 & -0.02 & 0.19 \\
2.83 & 0.07 & 0.02 & -0.01 & 0.14 \\
3.23 & 0.07 & 0.03 & -0.01 & 0.15 \\
\hline
\hline
\multicolumn{5}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.1$} \\
1.15 & -6.13 & -5.35 & -0.84 & -0.03 \\
1.44 & -5.64 & -2.81 & -0.06 & 0.00 \\
1.73 & -3.26 & -0.23 & 0.00 & 0.00 \\
2.02 & -1.55 & 0.30 & 0.00 & 0.00 \\
2.59 & -0.11 & 0.42 & 0.00 & 0.00 \\
3.17 & 0.00 & 0.42 & 0.00 & 0.00 \\
\hline
\multicolumn{5}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.5$} \\
1.10 & -5.93 & -6.26 & -1.23 & -0.02 \\
1.38 & -5.61 & -3.94 & -0.09 & 0.00 \\
1.65 & -4.33 & -1.10 & 0.00 & 0.00 \\
2.07 & -0.99 & 0.00 & 0.00 & 0.01 \\
2.48 & 0.02 & 0.00 & 0.00 & 0.00 \\
3.03 & 0.21 & 0.00 & 0.00 & 0.00 \\
\hline
\multicolumn{5}{c}{Model \uppercase\expandafter{\romannumeral2}, $\rho = 0.9$} \\
1.04 & -5.43 & -4.10 & -0.79 & -0.09 \\
1.23 & -5.04 & -3.54 & -0.25 & -0.01 \\
1.51 & -3.72 & -0.85 & -0.02 & 0.00 \\
1.98 & -0.90 & 0.34 & 0.00 & 0.00 \\
2.45 & 0.28 & 0.42 & 0.00 & 0.00 \\
3.02 & 0.42 & 0.42 & 0.00 & 0.00 \\
\hline
\hline
\end{tabular}
\end{table}
\fi
\bibliographystyle{apalike}
|
\section{Introduction}
In the last decade, the development of many robotics applications\textemdash \emph{e.g}\onedot} \def\Eg{\emph{E.g}\onedot autonomous vehicles\textemdash has accelerated due to both academic and industrial research.
The choice of sensors is pivotal for optimizing the perception of a robot's surroundings.
Besides frame-based camera and radar, lidar has become a core perception technology for autonomous robots, drones, and vehicles.
By detecting the reflection of emitted laser pulses, lidars generate 3D point cloud representations of a scene.
More recently, event cameras have been explored as a potential alternative to traditional frame-based cameras, offering advantages in low-power and latency-demanding applications.
Event-based vision derives from neuromorphic engineering, aimed at replicating fundamental, biological neural functions~\cite{Gallego2022}. An event camera asynchronously extracts individual pixel-wise events that correspond to luminosity changes. This contrasts with traditional cameras that capture entire frames at regular intervals, even in fully static scenes.
To maximize performance and robustness, fundamental robot tasks such as perception, localization, and odometry often rely on multiple sensors~\cite{Jusoh2020AApplications}, whose outputs are fused.
Importantly, multiple sensors offer complementary information, \emph{e.g}\onedot} \def\Eg{\emph{E.g}\onedot adverse weather conditions corrupt event camera and lidar signals to different degrees.
This said, a key aspect of enabling these sensors is to accurately calibrate their intrinsic and extrinsic parameters. These parameters specify how each modality represents the environment and how each sensor is positioned relative to the others~\cite{Yeong2021}. Without calibration, sensor fusion methods incorrectly associate spatial features, as seen in Fig.~\ref{fig:calibrated}, which negatively impacts downstream perception.
\begin{figure}[t]
\centering
\includegraphics[width=0.49\columnwidth]{figs/scene34event-uncalibrated_noise.png}
\hfill
\includegraphics[width=0.49\columnwidth]{figs/scene34event-calibrated_noise.png}
\includegraphics[width=0.49\columnwidth]{figs/scene39event-uncalibrated_noise.png}
\hfill
\includegraphics[width=0.49\columnwidth]{figs/scene39event-calibrated_noise.png}
\includegraphics[width=0.49\columnwidth]{figs/scene77event-uncalibrated_noise.png}
\includegraphics[width=0.49\columnwidth]{figs/scene77event-calibrated_noise.png}
\caption{(Left) Uncalibrated scene showing improperly projected lidar points. (Right) Calibrated scene showing improved lidar projection alignment.} \label{fig:calibrated}
\end{figure}
As event cameras represent a still immature technology, methods have yet to be fully explored for the direct extrinsic calibration between them and other perception sensors.
Current event camera calibration methods involve confounding factors such as time synchronization for temporal correction, dynamic target handling introducing elastic deformations~\cite{Hagemann2022ModelingCalibration} and motion artifacts, dynamic scenes requiring ego-motion compensation, or calibration intermediaries introducing propagation errors.
Instead, we argue that reliable and repeatable alignment of physical sensors benefits from \emph{strong environmental controls}\textemdash such as static indoor scenes and temporal decoupling.
Accordingly, we explore extrinsic lidar-event camera calibration in a fully static environment, thereby eliminating potential confounding factors.
Despite the increasing interest in event cameras, few large-scale multi-sensor datasets include event cameras to date.
To the best of our knowledge, there exist only two datasets\textemdash both automotive\textemdash which contain both lidar and event cameras: MVSEC~\cite{Zhu2018ThePerception} and DSEC~\cite{Gehrig2021}. However, neither performs direct calibration between event cameras and lidars.
In this paper we present L2E, an automatic information-based method for calibrating a lidar with respect to an event-based camera. It leverages event-based structured light for static correspondence matching. In particular, we show how a dense lidar scan collected by a RoboSense RS-LiDAR-M1 can be easily and reliably correlated to a series of events registered by a Prophesee GEN4.1 event camera, and how we can achieve robust calibration using accumulated event maps.
Our key contributions can be summarized as follows:
\begin{enumerate}[topsep=6pt,itemsep=3pt,partopsep=3pt, parsep=3pt]
\item We propose a novel approach for synthesizing a static scene representation through accumulated event maps from the lidar-correlated event activity.
\item We present the first direct and temporally-decoupled 6-DoF calibration between an event camera and a lidar using accumulated event maps and lidar point clouds.
\item We investigate how scene selection and scene count affect calibration accuracy, repeatability, and computational performance.
\end{enumerate}
\section{Related Work}
Neuromorphic sensors have rarely been integrated in the perception stack of autonomous robots. They suffer from a lack of maturity in neuromorphic technology. Yet, event cameras offer distinct advantages beyond the current suite of standard sensors.
With their high temporal resolution and dynamic range, these sensors can operate in high-speed and over-saturated environments that may pose problems for frame-based cameras~\cite{Gallego2022}. The event-based paradigm has the potential to reduce data bandwidth in static scenes without sacrificing the advantageous dense representation of imaging technology.
Recently, new datasets have emerged that incorporate event camera systems. There are two datasets containing event cameras and lidar sensors\textemdash both automotive. MVSEC~\cite{Zhu2018ThePerception} uses two DAVIS346 event cameras and a Velodyne VLP-16 lidar. The DAVIS346 camera captures a relatively low spatial resolution (346 \texttimes\ 260). DSEC~\cite{Gehrig2021} uses two Prophesee GEN3.1 event cameras and a Velodyne VLP-16 lidar. The Prophesee GEN3.1 operates at a higher spatial resolution (640 \texttimes\ 480) compared to the DAVIS346 camera, but at a lower spatial resolution than the current GEN4.1 sensors (1280 \texttimes\ 720).
For calibration, MVSEC attempted to use the grayscale image produced by the DAVIS346's Active Pixel Sensor (APS) with the Camera and Range Calibration Toolbox~\cite{Geiger2012AutomaticShot}. The APS design is able to simultaneously act as a monochrome frame-based and event camera. However, the calibration results were found to be inaccurate, and the authors resorted to CAD measurements and manual adjustment for extrinsic parameters. DSEC uses the Prophesee event cameras which do not have the APS. Instead, rotation-only calibration is achieved using stereo methods and indirect calibration. Both datasets take fixed translation parameters from CAD models and solely calibrate for the 3-DoF rotation.
Intrinsic and stereo calibration of cameras is a well-established field with widely available tools such as OpenCV~\cite{opencv_library} or Kalibr~\cite{Oth2013RollingCalibration}.
Extensions of these methods have recently been made for event cameras where state-of-the-art event-to-video reconstruction is used to interpolate frames of moving checkerboard patterns for the purpose of intrinsic and stereo calibration~\cite{Muglikar2021}. DSEC uses this image reconstruction method to employ stereo calibration between the event and frame-based cameras using the Kalibr toolbox. The authors then perform extrinsic calibration between a frame-based camera stereo pair and a lidar sensor by performing modified point-to-plane ICP~\cite{Chen1991ObjectImages} from the stereo point cloud generated by SGM~\cite{Hirschmuller2008StereoInformation} and the lidar point cloud.
Calibration methods have been explored quite intensively between traditional cameras and lidars. These include automatic mutual information maximization schemes~\cite{Pandey2014, Taylor2012}, edge alignment methods~\cite{Zhou2018AutomaticCorrespondences, Kang2020AutomaticModel}, and plane alignment methods~\cite{Geiger2012AutomaticShot, Zhou2018AutomaticCorrespondences}. These methods vary from being completely unstructured, semi-structured~\cite{An2020}, to using manufactured targets, such as standard planar checkerboards~\cite{Zhang2000ACalibration} or custom multi-modal targets~\cite{Domhof2021}.
These methods are designed with traditional camera images in mind and are not directly applicable to an event-based data stream.
Our basic observation is that lidar laser returns can trigger events, generating highly correlated signals in both sensors. Previous work has explored the use of event-based structured light in the visible spectrum using line or raster-pattern scans to generate terrain and 3D reconstruction~\cite{Brandli2014AdaptiveSensor, Muglikar2021ESL:Light}. We can naturally formulate the one-to-one correspondence matching under a mutual information framework, such as the one proposed by Pandey \emph{et al}\onedot~\cite{Pandey2014}.
Our work thus extends the use of mutual information frameworks from traditional cameras to event cameras.
\section{Sensors Overview}
\subsection{Characteristics}
Our experimental sensor setup consists of a RoboSense RS-LiDAR-M1 MEMS lidar~\cite{RoboSense2021RS-LiDAR-M1EN} and a Prophesee GEN4.1 event camera ~\cite{Prophesee2021PropheseeBrochure}. These sensors are mounted on top of a car, facing forward. Their nominal parameters are listed in Table~\ref{tab:sensors} and the sensor installation is shown in Fig.~\ref{fig:mount}.
\begin{table}
\caption{Specifications of the MEMS lidar and event camera.} \label{tab:sensors}
\centering
\renewcommand{\arraystretch}{1.3}
\begin{tabular*}{\columnwidth}{@{\extracolsep{\fill}}lrrrr@{}}
\toprule
Sensor & Resolution & HFoV & VFoV & Freq. \\
\midrule
RS-LiDAR-M1 & 75k points & 120$^\circ$ & 25$^\circ$ & 10\,Hz \\
GEN4.1 & 1280 \texttimes\ 720 & 63$^\circ$ & 38$^\circ$ & 1.06\,Gev/s \\
\bottomrule
\end{tabular*}
\end{table}
\begin{figure}
\centering
\includegraphics[width=\columnwidth]{figs/sensor-frontal-annotated.png}
\caption{Annotated image of the as-built sensor platform.} \label{fig:mount}
\end{figure}
The Prophesee GEN4.1 event-based vision system utilizes a state-of-the-art event vision sensor~\cite{Finateu20201280720Pipeline} and is capable of higher spatial resolution and smaller pixel sizes (4.86 \texttimes\ 4.86\,\si{\micro\m}) than the previous generation (15 \texttimes\ 15\,\si{\micro\m})~\cite{Prophesee2019PropheseeBrief}.
This modern event-driven sensor can operate between 5 and 100,000\,\si{lux}, with a full dynamic range in excess of 110\,dB.
Such silicon-based image sensors are naturally sensitive to wavelengths up to 1000\,\si{nm}~\cite{Gouveia2016AdvancesSensors}. Modern event cameras also utilize IR-correcting lenses as opposed to IR cut filters that would otherwise inhibit the sensor quantum efficiency (QE) and dynamic range. Additional improvement such as back-illumination also improve NIR sensitivity~\cite{Fereyre2012BackVision, Taverni2018FrontComparison}. As the most common industrial lidar wavelength is 905\,\si{nm} due to its robustness in adverse conditions~\cite{Wojtanowski2014ComparisonConditions}, most commercial lidars are capable of direct registration by modern event cameras.
The RS-LiDAR-M1 is a 905\,\si{nm} MEMS lidar that captures a large frontal field-of-view (120° horizontal) while maintaining a very small profile. With an angular resolution of 0.2°, the generated point cloud densely overlaps the event camera view.
The Prophesee GEN4.1 event camera can thus directly register the laser signals generated by the RS-LiDAR-M1.
\subsection{Intrinsic Calibration}
The RoboSense lidar is calibrated by the manufacturer and assumed to be accurate.
For the event camera, we employ the intrinsic calibration process described in~\cite{Muglikar2021}. Accordingly, a moving target is captured as a series of events and then reconstructed as video frames with E2VID~\cite{Rebecq2019Events-to-video:Cameras, Rebecq2021HighCamera}.
The frames enable standard camera calibration using OpenCV~\cite{opencv_library}.
The employed target is a commercially-available metrology-grade checkerboard, with a reported accuracy within 0.1\,\si{mm} + 0.3\,\si{mm/m} (at 20°C).
We calibrate using the standard pinhole camera model and the Brown–Conrady distortion model for calibration. The pinhole model, $\mathbf{K}$, is described by the focal length $(F_x,F_y)$ and principal point $(C_x,C_y)$ parameters.
\section{Event Camera-Lidar Extrinsic Calibration}
In this section, our proposed event camera-lidar extrinsic calibration method\textemdash L2E\textemdash is described in detail.
To represent extrinsic calibrations as homogeneous transformations, we collapse the transformations down to a 6-parameter vector given by the translation parameters $(x,y,z)$ and the rotational vector (axis-angle) representation $(v_1,v_2,v_3)$ where the $\text{norm}\:||\,\boldsymbol{v}\,||$ is the angle of rotation in radians. Thus the full representation of the extrinsic transformation, $\Theta$, is given by $(x, y, z, v_1, v_2, v_3)$. The translation vector will be referred to as $\boldsymbol{t}$. The expanded rotation matrix will be referred to as $\mathbf{R}$.
\subsection{Accumulated Event Map}
The events registered by the event camera are provided in the following format: $(t_e,x,y,\pm)$. Events are recorded with the time of the event, the location of the event, and the polarity of the event\textemdash\emph{i.e}\onedot} \def\Ie{\emph{I.e}\onedot whether the intensity has increased or decreased. Passing over an edge triggers a single positive (dark-to-bright) or negative (bright-to-dark) polarity event. In contrast, a laser pulse triggers both a positive and a negative event. As a lidar continuously scans a scene, we can simply increment the location for every triggered event, regardless of polarity, to get a corresponding accumulated event map, $\mathcal{E}$.
After accumulating events for 3 seconds, we clip the event map such that $\mathcal{E}(x,y) \in [0,127]$ to prevent scaling issues with abnormally high event activity at a pixel location. Additionally, we apply Gaussian smoothing to the event map for smoother optimization. An accumulated event map and its corresponding lidar projection for a sample static scene are shown in Fig.~\ref{fig:78}.
\begin{figure}
\centering
\includegraphics[width=\columnwidth]{figs/scene78.png}
\includegraphics[width=\columnwidth]{figs/scene78lidar.png}
\caption{(Top) Accumulated event map serving as a scene image reconstruction. (Bottom) Cropped projected lidar scans into synthetic image space.} \label{fig:78}
\end{figure}
\subsection{Mutual Information}
As events are directly triggered by the lidar returns, the correlation between the lidar point cloud and accumulated event map can be exploited with mutual information optimization.
Mutual information (MI) is a measure of statistical dependence between random variables, indicating how much information one variable contains regarding the other. MI can be described in multiple ways, but we take the same entropy-based representation used in~\cite{Pandey2014}. MI is defined in terms of the entropy of the random variables $\mathrm{L}$ and $\mathrm{E}$, and their respective joint entropy $\mathrm{H}(\mathrm{L},\mathrm{E})$:
\begin{equation}
\label{eqn:mi}
\mathrm{MI}(\mathrm{L}, \mathrm{E}) = \mathrm{H}(\mathrm{L}) + \mathrm{H}(\mathrm{E}) - \mathrm{H}(\mathrm{L},\mathrm{E})
\end{equation}
The entropy denotes a measure of uncertainty within one variable, while the joint entropy represents the uncertainty present in the event of a co-observation of $\mathrm{L}$ and $\mathrm{E}$. We take the random variables $\mathrm{L}$ and $\mathrm{E}$ to be the lidar return intensities and the event activity in the event map, respectively.
The entropies of random variables $\mathrm{L}$ and $\mathrm{E}$ and their joint entropy are described in Eq.~(\ref{eqn:hx}, \ref{eqn:hy}, \ref{eqn:hxy}).
\begin{equation}
\label{eqn:hx}
\mathrm{H}(\mathrm{L}) = -\sum_{l\in \mathrm{L}}\mathrm{p}_\mathrm{L}(l)\log\,\mathrm{p}_\mathrm{L}(l)
\end{equation}
\begin{equation}
\label{eqn:hy}
\mathrm{H}(\mathrm{E}) = -\sum_{e\in \mathrm{E}}\mathrm{p}_\mathrm{E}(e)\log\,\mathrm{p}_\mathrm{E}(e)
\end{equation}
\begin{equation}
\label{eqn:hxy}
\mathrm{H}(\mathrm{L},\mathrm{E}) = -\sum_{l\in \mathrm{L}}\sum_{e \in \mathrm{E}}\mathrm{p}_\mathrm{LE}(l,e)\log\,\mathrm{p}_\mathrm{LE}(l,e)
\end{equation}
\subsection{Probability Distribution Approximation}
We approximate the probability distribution from the intensity and activity histograms of the lidar scan and event map respectively, as was done in~\cite{Pandey2014}. Let $\mathcal{P} = \{\mathbf{P}_i: i=1,2,...,n\}$ be the set of 3D points in the 3D scan and ${\{\mathrm{L}_i: i=1,2,...,n\}}$ be the set of intensity returns for each point in the set $\mathcal{P}$. The lidar points can be projected into the image space through the searched-for extrinsics ($\mathbf{R}$, $\boldsymbol{t}$) and the known intrinsics $\mathbf{K}$.
\begin{equation}
\label{eqn:proj}
\boldsymbol{p}_i = \mathbf{K}[\mathbf{R}|\boldsymbol{t}]\mathbf{P}_i
\end{equation}
The location of the projected point, $\boldsymbol{p}$, is then used to acquire the associated event activity in the accumulated event map image as shown in Eq.~(\ref{eqn:grayscale}).
\begin{equation}
\label{eqn:grayscale}
\mathrm{E}_i = \mathcal{E}(\boldsymbol{p}_i)
\end{equation}
Through accumulating points, a normalized histogram $\hat{\mathrm{p}}_\mathrm{L}$ is generated from the discretized lidar intensities and the total number of points, $n$, that lie within the valid image region.
\begin{equation}
\label{eqn:hist}
\hat{\mathrm{p}}_\mathrm{L}(\mathrm{l}=k) = \frac{l_k}{n},\qquad k \in [0,255]
\end{equation}
where $l_k$ is the number of lidar points with intensity $k$ that lie within the projected image space. A histogram for the event map is generated in the same way with the associated pixel location for each lidar point. Additionally, a joint 2D histogram is generated from each intensity-activity pair. This process is detailed in Algorithm \ref{alg:hist}.
\begin{algorithm}[h]
\caption{Raw Histogram Generation}\label{alg:hist}
\begin{algorithmic}
\Require 3D point cloud $\mathcal{P}$ and 2D event map $\mathcal{E}$
\Ensure 1D lidar hist, 1D event hist, 2D joint hist
\State Initialize: $\mathrm{hist_L}$, $\mathrm{hist_E}$, and $\mathrm{hist_{LE}}$
\For{$\left(\mathbf{P}_i, \mathrm{L}_i\right) \in \mathcal{P}$} \Comment 3D point \& intensity
\State $\boldsymbol{p} \gets \mathbf{K}[\mathbf{R}|\boldsymbol{t}]\mathbf{P}_i$ \Comment 2D projection
\If{$\boldsymbol{p}$ in image bounds}
\State $\mathrm{E}_i \gets \mathcal{E}(\boldsymbol{p})$
\State $\mathrm{hist_L}(\mathrm{L}_i) \gets \mathrm{hist_L}(\mathrm{L}_i) + 1$
\State $\mathrm{hist_E}(\mathrm{E}_i) \gets \mathrm{hist_E}(\mathrm{E}_i) + 1$
\State $\mathrm{hist_{LE}}(\mathrm{L}_i, \mathrm{E}_i) \gets \mathrm{hist_{LE}}(\mathrm{L}_i, \mathrm{E}_i) + 1$
\EndIf
\EndFor
\end{algorithmic}
\end{algorithm}
Subsequently, these raw histograms are normalized, but still quite noisy. To address this issue, we perform a kernel density estimation (KDE) using Silverman's rule-of-thumb~\cite{silverman1986density}. In practice, we apply Gaussian blurring convolutions, a method that is nearly equivalent to kernel density estimation (KDE) in the case where histogram bins are spaced equivalently to the discretized point values. Gaussian blurring runs orders of magnitude faster than true KDE and is nearly equivalent, except for the marginal difference in finite and infinite support between the approximation and the true KDE.
Fig.~\ref{fig:hist2d} shows the joint probability distribution of the lidar intensities and the event map values.
The smoothed normalized histograms are finally used to get an MI estimate via Eq.~(\ref{eqn:mi})-(\ref{eqn:hxy}).
\begin{figure}
\centering
\includegraphics[width=0.8\columnwidth]{figs/hist_joint_event.png}
\caption{Smoothed joint histogram as the approximate joint probability distribution between the event map and lidar intensities.} \label{fig:hist2d}
\end{figure}
\subsection{Optimization Formulation}
With the formulated MI objective function and our approximations of the probability distributions, we formulate an optimization problem as follows:
\begin{equation}
\label{eqn:opt}
\hat{\Theta} = \arg \max_\Theta \: \mathrm{MI}(\mathrm{L},\mathrm{E};\Theta)
\end{equation}
where $\Theta = (x, y, z, v_1, v_2, v_3)$ and MI is maximized at the correct extrinsic parameters given an arbitrary set of scenes. Effective optimization of this function is aided by greater smoothness and convexity in the objective function. Fig.~\ref{fig:cost-surf} shows the clear optimum in the cost landscape when varying the $x$-$y$ translation parameters.
\begin{figure}
\centering
\includegraphics[width=0.8\columnwidth]{figs/cost-surf-event-axis.png}
\caption{Cost surface of $x$-$y$ translation parameters around the optimal values.} \label{fig:cost-surf}
\end{figure}
\begin{figure*}[t]
\centering
\includegraphics[width=0.32\textwidth]{figs/robustness_tx.png}
\hfill
\includegraphics[width=0.32\textwidth]{figs/robustness_ty.png}
\hfill
\includegraphics[width=0.32\textwidth]{figs/robustness_tz.png}
\includegraphics[width=0.32\textwidth]{figs/robustness_rx.png}
\hfill
\includegraphics[width=0.32\textwidth]{figs/robustness_ry.png}
\hfill
\includegraphics[width=0.32\textwidth]{figs/robustness_rz.png}
\caption{Optimized extrinsic calibration parameters for the translation and rotation where grey squares are the initial seed values.} \label{fig:aa-stable}
\end{figure*}
The optimization process can be theoretically accomplished by any minimization algorithm. In this work, we show that multiple optimizers are effective in converging to the same calibrated values. In particular we find that bounded numeric gradient-based methods are the most effective. Bounding is particularly critical to prevent the ill-posed optimization space where few or no points are projected into the event map. We implement these processes using the SciPy library~\cite{Virtanen2020SciPyPython}.
\section{Experiments}
\subsection{Extrinsic Calibration Dataset}
Our extrinsic calibration dataset consists of indoor static scenes recorded over 3 seconds divided into two major classes: checkerboard scenes and unstructured scenes. All scenes were collected in an underground garage. The checkerboard scenes were taken with the vehicle platform in a set position with a checkerboard target placed in close proximity to both the event camera and lidar. The unstructured scenes do not contain a checkerboard.
Our dataset consists of 35 checkerboard scenes and 58 unstructured scenes for a total of 93 scenes.
\subsection{Convergence Assessment}
We perform noise-induced experiments to evaluate robustness and run-time of the calibration for different optimizers. Specifically, we calculate the mean and standard deviation results of 40 calibrations, where the measured parameters are induced with uniform noise in the range of 0.1\,\si{m} and 0.1\,radians. Unless otherwise specified, 40 scenes are respectively sub-sampled from the total of 93 scenes.
\textbf{Robustness Analysis.}
Some tested optimizers failed to robustly converge. Specifically, the Nelder\penalty\@M-\hskip\z@skip Mead simplex refinement method performed poorly in converging to the consensus translation parameters. Unbounded methods also occasionally converge in the ill-posed portion of the optimization space.
We find that bounded Broyden\penalty\@M-\hskip\z@skip Fletcher\penalty\@M-\hskip\z@skip Goldfarb\penalty\@M-\hskip\z@skip Shanno (L-BFGS-B), bounded Sequential Quadratic Programming (SLSQP), and the gradient-free Powell's Method perform well. Fig.~\ref{fig:aa-stable} shows the convergence robustness to seed errors for these optimizers.
The convergence of calibration results in the presence of significant noise indicates a convergence basin robust against initialization errors. The rotation calibration is highly consistent, converging to results within a standard deviation of 0.0007\,rad (0.04°) against uniformly induced noise of 0.1\,rad (5.7°) for each axis. The translation calibration is also consistent, but exhibits a measurable standard deviation of 3\,\si{mm} against the 100\,\si{mm} of uniform noise induced in each translation axes.
\textbf{Computational Time Analysis.}
We find that of the three optimizers, SLSQP performs significantly faster than L-BFGS-B and Powell's Method. Powell's Method takes up to an order of magnitude longer than SLSQP and multiple times longer than \text{L-BFGS-B}. We thus choose SLSQP as the default optimizer for L2E. A full summary is shown in Table~\ref{tab:speed}.
\begin{table}
\caption{Average and standard deviation of run-times across 40 runs.} \label{tab:speed}
\centering
\renewcommand{\arraystretch}{1.3}
\begin{tabular*}{\columnwidth}{@{\extracolsep{\fill}}lccc@{}}
\toprule
\textbf{Optimizer} & Powell's Method & L-BFGS-B & SLSQP \\
\midrule
\textbf{Time\,(\si{s})} & 934.4 $\pm$ 251.2 & 363.0 $\pm$ 94.2 & 134.2 $\pm$ 25.2 \\
\bottomrule
\end{tabular*}
\end{table}
We can also analyze the computational time in terms of the number of optimized scenes, $m$. More scenes lead to increased robustness, but longer computation. We can theorize that the optimization process has a complexity of $O(m)$, as the expected number of optimization steps should not depend on the scene count. This assumes that the underlying cost landscape structure is independent of the number of scenes used as scene sampling is a random process. Consequently, the computation depends on the mutual information calculation, which must calculate the projection and mutual information for each individual scene. This calculation should scale linearly with the number of scenes used, which is observed in our experiments shown in Fig.~\ref{fig:compute-scenes}.
\begin{figure}
\centering
\includegraphics[width=\columnwidth]{figs/compute_time_2.png}
\caption{Computation time as a function of the number of scenes used in SLSQP optimization.} \label{fig:compute-scenes}
\end{figure}
\textbf{Impact of Number of Scenes.} One of the key components for optimization is the collection of sufficient scenes for optimization. We investigate the number of scenes required for consistent calibration in Fig.~\ref{fig:scene-num}. As expected, increasing the number of scenes used in optimization decreases repeatability variance. The variance in calibration has substantially decreased when using 20 or more scenes in the optimization.
\begin{figure}
\centering
\includegraphics[width=0.49\columnwidth]{figs/scene_robustness_tx.png}
\hfill
\includegraphics[width=0.49\columnwidth]{figs/scene_robustness_rx.png}
\includegraphics[width=0.49\columnwidth]{figs/scene_robustness_ty.png}
\hfill
\includegraphics[width=0.49\columnwidth]{figs/scene_robustness_ry.png}
\includegraphics[width=0.49\columnwidth]{figs/scene_robustness_tz.png}
\hfill
\includegraphics[width=0.49\columnwidth]{figs/scene_robustness_rz.png}
\caption{Calibration results in red from SLSQP optimization for increasing number of scenes from left to right. The grey squares are the initial seeds.} \label{fig:scene-num}
\end{figure}
\subsection{Performance Comparison}
\textbf{Checkerboard \textit{vs.}\ Checkerless Scenes.} We perform repeated experiments using 20 sub-sampled scenes within the full, checkerboard-only, and checkerless subsets. We evaluate the per-scene MI for scenes excluded from calibration. Results from these calibrations are shown in Table~\ref{tab:mi-values}, rows 1-3. We report higher average MI when calibrating using checkerboard-only, compared to using the checkerless subset.
\begin{table}
\caption{Averaged MI scores across different calibration procedures.} \label{tab:mi-values}
\centering
\renewcommand{\arraystretch}{1.3}
\begin{tabular*}{\columnwidth}{@{\extracolsep{\fill}}lrrr@{}}
\toprule
Calibration & Full Eval. & Checker Eval. & Unstruct.\ Eval. \\
\midrule
Mixed Set & \textbf{0.44808} & 0.45331 & 0.43825 \\
Checker-only & 0.44633 & \textbf{0.45547} & 0.43368 \\
Checkerless & 0.44281 & 0.43678 & \textbf{0.44064} \\
Baseline & 0.36672 & 0.36286 & 0.36085 \\
Uncalibrated & 0.29818 & 0.26732 & 0.30998 \\
\bottomrule
\end{tabular*}
\end{table}
\textbf{Two-stage Calibration Comparison.} We compare our method to a two-stage method that first stereo-calibrates the event camera to a standard camera intermediary and then calibrates to the lidar using the Lidar-Camera Toolbox in MATLAB~\cite{Zhou2018AutomaticCorrespondences}. Our method achieves better visual alignment, as evidenced by Fig.~\ref{fig:2calibrated} and Table~\ref{tab:mi-values}, row 4. This two stage-process propagates errors for each calibration process (lidar to camera, camera to event camera), leading to greater errors in the indirectly connected sensors.
\begin{figure}
\centering
\includegraphics[width=0.49\columnwidth]{figs/37mi-crop.png}
\hfill
\includegraphics[width=0.49\columnwidth]{figs/37matlab-crop.png}
\caption{Visual comparison between our method (left) and the baseline (right).} \label{fig:2calibrated}
\end{figure}
\section{Discussion}
\textbf{Considerations in Scene Selection.} L2E can be used in an unstructured environment with any combination of static scenes. However, L2E tends to perform better when observing high-texture objects\textemdash \emph{i.e}\onedot} \def\Ie{\emph{I.e}\onedot our checkerboards. This phenomenon is likely a result of the proximity of the checkerboard targets to both sensors, providing stronger rotation and translation constraints to the optimization. Poorer optimization in outdoor scenes was observed in~\cite{Pandey2014}, where errors were partially attributed to having fewer near-field 3D points in outdoor scenes. Consequently, the use of close-proximity objects with a reasonable amount of texture should have a beneficial effect on the calibration results. We note that precise geometric controls\textemdash \emph{e.g}\onedot} \def\Eg{\emph{E.g}\onedot checkerboard target tolerances\textemdash is not required as is the case of traditional camera calibration methods. In conjunction with sufficient scene variety, L2E is able to achieve robust extrinsic calibration results.
\textbf{Managing NIR Sensitivity.} Our method relies on the registration of lidar laser signals by the event camera. However, NIR sensitivity may be undesirable during standard operation. To address this concern, the Prophesee GEN4.1 contains bias tuning parameters that can eliminate high frequency flicker effects, which we have found to be able to eliminate registration of lidar pulses.
\section{Conclusion}
This work presents L2E, the first direct extrinsic calibration method between event-based cameras and lidars using event-based structured light. L2E offers a flexible automatic approach to extrinsic calibration that leverages direct correlation between the lidar active signals and the corresponding registered events without the need for precise time synchronization or dynamic scenes.
As event-driven vision technology continues to mature, multi-sensor setups with event cameras may become more prominent in the field of robotics. Accordingly, we hope that our direct calibration method will enable further research on event cameras and sensor fusion.
\clearpage
{
\bibliographystyle{IEEEtran}
|
\section{Introduction}
There has been growing interest in combining
radio frequency (RF) sensing, such as RADAR,
with other sensing modalities such as camera or LIDAR
\cite{park2019radar,feng2020deep}.
Camera data have also been proposed to guide communications, such as beamforming at millimeter-wave (mmWave) frequencies \cite{xiang2019computer,alrabeiah2020millimeter}. A basic problem in these
applications is to predict RF propagation
from visual information from cameras or other
sources.
One natural approach to this problem is
to first build a 3D model of the environment from the camera
data.
Numerous RGBD and cloud point cameras, along with
different view synthesis pipeline algorithms, are now widely commercially available for this purpose \cite{li2021igibson, Matterport3D, NavVis}.
Given a complete 3D model, one can then, in principle,
predict the RF propagation between any two
points in the environment with standard
ray tracing tools or other electro-magnetic (EM) solvers
\cite{yun2015ray}.
In this paper, we address a critical problem
that may arise in these applications:
\begin{quote}
\emph{
How do we predict RF propagation when
only a portion of the environment has been observed?}
\end{quote}
An example scenario for this problem is
shown in Fig.~\ref{fig:overview}.
A robot agent explores an unknown indoor environment,
as may occur in search and rescue operations. Using
camera data, it builds a map of the environment
through some form of photogrammetry. The particular
camera data
and partial map shown in Fig.~\ref{fig:overview} are sample output of a state-of-the-art Active Neural simultaneous localization and mapping (SLAM)
module \cite{chaplot2020learning} simulated
on the Gibson AI dataset \cite{xia2018gibson} that we will discuss
in detail below. The agent is also given a hypothetical
wireless transmitter (TX) location. If the full environment
were known, the agent could determine the true receive (RX) power
throughout the environment. For example, the ``True RX power"
in Fig.~\ref{fig:overview} was predicted using a commercial ray tracing
solver \cite{Remcom}, also described in detail below.
The problem we address is how to estimate the propagation
when only a portion of the map has been reconstructed. Importantly,
we wish to estimate the propagation for links where the transmitter (TX) and/or
receiver (RX) are outside the environment that has been observed.
\begin{figure}
\centering
\includegraphics[width=0.9\linewidth]{Figure/overview.pdf}
\caption{Example application: A partial map of an unknown
environment is learned from camera data and robot navigation
using tools such as Active Neural SLAM \cite{chaplot2020learning}.
The problem is to estimate the RF propagation from a
hypothetical transmitter (TX) within the environment.
The propagation should be estimated both in the
observed and unobserved areas.}
\label{fig:overview}
\vspace{-3mm}
\end{figure}
Finding good solutions to this problem is tremendously challenging,
particularly in the mmWave frequencies range,
which is the focus of this work.
In addition to the standard challenges of mmWave ray tracing
\cite{lecci2021accuracy},
propagation prediction with partial information implicitly requires
some model to ``fill in" the environment in the regions
that have not yet been observed. The problem can be seen
as an EM ``inpainting", in analogy to the computer vision problem
where most state-of-the-art algorithms require
extensively trained deep generative models
\cite{yu2018generative}.
As a starting point to understand the problem,
in this work, we consider a simple heuristic solution:
We first run ray tracing on the partial map, where the unexplored
area is treated as free space. We then train
simple machine learning-based estimators to predict link state (LOS, NLOS, or outage) and path gain
from features obtained by partial ray tracing.
We show that the proposed methodology has a useful ``interpolation
property": On the one hand, when the environment is completely
unobserved, the features are sufficient so that the predictor
can default to the form of a standard statistical channel model,
such as those used by 3GPP \cite{3GPP38901}.
On the other hand, as the partial information is built up,
the model can increasingly use the partial ray trace
to obtain more accurate, site-specific predictions.
\section{Problem Formulation}
\subsection{Environments and Partially Observed Environments}
We describe the \emph{environment} as
some function of space, $F({\mathbf{x}})$, where
${\mathbf{x}} \in {\mathbb{R}}^d$ denotes the spatial position with $d=2$
or $d=3$ depending on whether we consider 2D or 3D
representations.
For the purpose
of predicting EM propagation,
at each ${\mathbf{x}}$,
$F({\mathbf{x}})$ could be a binary variable indicating whether or not
a location is occupied or a discrete variable
with one of a finite set of values if there
are multiple types of material. In addition,
$F({\mathbf{x}})$ may indicate the permittivity of
any surfaces and objects in the environment.
Given such an environment function $F({\mathbf{x}})$,
we assume that
one can predict the true wireless channel between any ${\mathbf{x}}^t$ to ${\mathbf{x}}^r$.
Additionally, we assume that the channel is described by a standard multi-path
ray model \cite{heath2018foundations} with parameters:
\begin{equation} \label{eq:path_param}
\theta := \left\{ (a_\ell, \gamma_\ell), \ell = 1,\ldots,L \right\}
\end{equation}
where $L$ is the number of paths,
for each $\ell$, $a_\ell$ is the complex path gain, and $\gamma_\ell \subset {\mathbb{R}}^d$ is the route of the path
in space. We will assume that each route, $\gamma_\ell$,
consists of one or more line segments starting at the TX location,
${\mathbf{x}}^t$, and ending at the RX location, ${\mathbf{x}}^r$. A path is line-of-sight (LOS)
if it consists of a single segment, that is, the path goes
directly from the TX to the RX. Otherwise, it is an non-LOS (NLOS) path.
From the path route, one can obtain the angles of departure,
angles of arrival, and delay, from which the wideband MIMO channel response for arbitrary arrays can be computed \cite{heath2018foundations}.
To model that fact that an environment is partially
observed, we assume there is a known set $A \subset {\mathbb{R}}^d$,
on which the environment has been observed.
We call $A$ the \emph{observed area}. We also
assume that we have (a possibly approximate)
reconstruction of the environment in $A$ through some function,
$\widehat{F}({\mathbf{x}})$ for ${\mathbf{x}} \in A$.
\subsection{Link State and Omni-Directional Path Gain}
The general problem is to estimate some function
of the path parameters \eqref{eq:path_param}
from the partially observed environment.
We will denote this function by:
\begin{equation} \label{eq:path_fun}
z = G( \theta ),
\end{equation}
and we call $z$, a \emph{channel statistic}.
We model the problem probabilistically and treat $z$ as a random
variable with the goal of estimating
a conditional probability distribution:
\begin{equation} \label{eq:pzcond}
p(z | A, \widehat{F} ),
\end{equation}
which represents the conditional distribution of the channel statistic
$z$, given the observed area, $A$, and the estimated environment $\widehat{F}({\mathbf{x}})$.
The randomness arises from the environment in the unobserved area
and noise or errors in the observed area.
Although our methodology is general,
in this work, we focus on estimating the channel statistic:
\begin{equation} \label{eq:zsg}
z = (s, g_{\rm omni}),
\end{equation}
where $s$ is the \emph{link state} and $g_{\rm omni}$ is the
\emph{omni-directional} path gain. For any channel between a
TX and RX pair, we define its link state similar to \cite{akdeniz2014millimeter}.
Therefore, we will denote the link state by $s \in \{\mathrm{LOS},\mathrm{NLOS}, \mathrm{Outage}\}$.
Also, given a set of path parameters \eqref{eq:path_param},
we define the (clipped) omni-directional path gain as:
\begin{equation} \label{eq:omni_gain}
g_{\rm omni} := \max\left\{ 10 \log_{10}\left[ \sum_{\ell=1}^L |a_\ell|^2 \right], g_{\rm min} \right\},
\end{equation}
which represents the average wideband
path gain in dB seen when isotropic antennas are placed at the TX and RX.
To avoid singularities when the path gain is very low or when there are no paths,
we clip the path gain at a minimum value $g_{\rm min}$. For the remainder of the paper
we will use $g_{\rm min} = $\, \SI{-150}{dB}. Path gain values below this level have little
value for communication. We will use the convention that when a link is outage, that is, there are no paths, the omni-directional path gain will also be set to $g_{\rm min}$.
\section{Proposed Algorithm}
\subsection{Overview}
If the environment were completely known (that is, we knew
$F({\mathbf{x}})$ for all ${\mathbf{x}}$), in principle, one can find exactly
the channel parameters $\theta$ in \eqref{eq:path_param}
between any given TX and RX locations
by ray tracing or any other form of EM solver.
Then, given the channel parameters, $\theta$,
theoretically one could exactly determine
any statistic, $z=G(\theta)$.
However, in the case of partial information on the environment,
estimation of the distribution of the statistic, $z$, is, in general, difficult.
Suppose that we have an observed area $A$ and an estimate of the environment, $\widehat{F}({\mathbf{x}})$ for ${\mathbf{x}} \in A$, and we wish
to compute the probability distribution $p(z|A,\widehat{F})$.
In principle, one would need
a probabilistic model, $p(F|A,\widehat{F})$, describing the distribution
of the true environment from the partially observed environment.
From such a distribution, one could theoretically sample $F$ and
compute the true channel parameters $\theta$ from the environment,
and the channel statistic $z=G(\theta)$ from the channel
parameters. However, obtaining a probabilistic model, $p(F|A,\widehat{F})$,
is equivalent to rebuilding the true environment
of the complete environment, $F$, from the partial
environment. Learning such a model would require tremendous
amounts of training data. Moreover, computing the
channel parameters for each potential true environment
would be computationally infeasible.
For the link state and omni-directional path gain,
$z=(s,g_{\rm omni})$,
we thus propose a simple heuristic algorithm.
We first run an approximate ray tracing on the observed
component of the environment, treating the unobserved area
as free space. Then, we extract the key features of the
estimated channel parameters from this partial map. Using these features
we train simple machine learning predictors for the channel
statistics.
We now describe each of these steps.
\subsection{Partial Map Path Prediction}
For the first phase, we extend $\widehat{F}({\mathbf{x}})$ to all of ${\mathbb{R}}^d$ by simply assuming that $F({\mathbf{x}})$
corresponds to free space for all ${\mathbf{x}} \not\in A$. Then, given the TX and RX locations, ${\mathbf{x}}^t$ and ${\mathbf{x}}^r$,
we run ray tracing, or any other EM simulation,
on this partial environment filled with free space to obtain an
initial set of path estimates. This simulation will obtain
a set of path parameters:
\begin{equation} \label{eq:path_fs}
\theta_{\rm FS} := \left\{ (\widehat{a}_\ell, \widehat{\gamma}_\ell), \ell = 1,\ldots,\widehat{L} \right\}
\end{equation}
where $\widehat{L}$ is the number of paths in the free space-filled
environment, and, for each $\ell$, $\widehat{a}_\ell$ is the complex
path gain and $\widehat{\gamma}_\ell \subset {\mathbb{R}}^d$ is the path route
in the space. We call $\theta_{\rm FS}$ the \emph{partial map path estimates}.
\subsection{Feature Extraction}
Our goal is to estimate the conditional probability $P(s,g_{\rm omni}|A,\widehat{F})$ of the
link state $s$ and omni-directional path gain $g_{\rm omni}$ from the observed partial environment and $\theta_{\rm FS}$.
To simplify the prediction, we make the approximation that:
\begin{equation} \label{eq:Pcond_features}
P(s, g_{\rm omni} | A, \widehat{F}) \approx P(s, g_{\rm omni} | \phi),
\end{equation}
where $\phi$ is a set of features extracted from the observed area $A$ and the estimated
environment $\widehat{F}({\mathbf{x}})$ on the observed area, ${\mathbf{x}} \in A$.
In this work, we will explore a simple set of features:
\begin{equation} \label{eq:features}
\phi = (\widehat{s}, d_{\rm unobs}, d, \widehat{g}_{\rm omni})
\end{equation}
where $\widehat{s}$ and $\widehat{g}_{\rm omni}$ represent the estimated link state and omni-directional path gain in the partial environment respectively, $d$ is the distance between TX and RX, and $d_{\rm unobs}$ is the total unobserved distance along the LOS between TX and RX.
Although the features are simple, they are sufficient to provide good models for two extreme cases: when the environment is completely unobserved and when the environment is fully observed.
In the first case, we would expect to use a fully statistical model
such as the 3GPP models in \cite{3GPP38901}. In these models, the LOS probability and the
omni-directional path gain are both simply functions of the TX-RX distance $d$.
In the other case, when the environment
is fully observed, we know that:
\begin{equation}
(s,g_{\rm omni}) = (\widehat{s}, \widehat{g}_{\rm omni})
\end{equation}
Hence, the features \eqref{eq:features} are also sufficient to provide accurate predictions when
the environment is fully observed. Finally, the characteristic $d_{\rm unobs}$ can be seen as a variable that represents the degree to which the relevant component of the environment is observed. A sufficiently rich predictor based on the above features can then interpolate
between the fully observed and fully unobserved cases.
Now, we write the conditional distribution of $(s,g_{\rm omni})$ given the features $\phi$ as:
\begin{equation} \label{eq:psg_two}
P(s,g_{\rm omni}|\phi) = P(s|\phi)P(g_{\rm omni}|s, \phi)
\end{equation}
We call the model that estimates the conditional probability $P(s|\phi)$ the \emph{link state classifier} and the model that estimates the conditional distribution
$p(g_{\rm omni}|s,\phi)$ the \emph{omni-directional path gain predictor}. Both are described in the following subsections.
\subsection{Link State Classifier}
As described above, the link state classifier predicts the conditional probability:
\begin{equation} \label{eq:ls_prob}
P(s|\phi)
\end{equation}
For this model, we obtained the best performance when considering only a subset of the features of \eqref{eq:features}, namely: LOS distance $d$, unobserved LOS distance $d_{\rm unobs}$, and free space-filled link state $\widehat{s}$. Regarding the structure of the model, for each value of $\widehat{s}$, we build a simple logistic classifier based on the two features $d_{\rm unobs}$ and $d$.
\begin{table}[t]
\centering
\caption{Parameters of omni-directional path gain predictors}
\label{tab:path_loss_network}
\begin{tabular}{|>{\raggedright}m{1.3cm}|>{\raggedright}m{1.3cm}|>{\raggedright}m{1.4cm}|>{\raggedright}m{1cm}|>{\raggedright}m{1cm}|}
\hline
Estimated link state $s$ & Partial link state $\widehat{s}$ & Input features & Hidden layers & Hidden units
\tabularnewline \hline
LOS & LOS & $d$, $d_{\rm unobs}$, $\widehat{g}_{\rm omni}$& 2 & 20
\tabularnewline \hline
LOS & NLOS, Out & $d$ & 2 & 10
\tabularnewline \hline
NLOS & NLOS, Out & $d$, $d_{\rm unobs}$, $\widehat{g}_{\rm omni}$ & 2 & 20
\tabularnewline \hline
NLOS & LOS & $d$ & 2 & 10
\tabularnewline \hline
Out & Any & None & None & None
\tabularnewline \hline
\end{tabular}
\end{table}
\subsection{Omni-directional Gain Predictor}
Ideally, the omni-directional gain predictor should estimate the conditional distribution
$p(g_{\rm omni}|\phi,s)$, representing the conditional distribution of the omni-directional path gain
given the features $\phi$ and estimated link state $s$, given by the link state classifier.
To simplify the model, we assume that it is Gaussian distributed. In this way, we can simply predict its mean and logarithmic variance:
\[
\mathbb{E}( g_{\rm omni}|s,\phi), \quad
\log \mathrm{var}(g_{\rm omni}|s,\phi).
\]
When the estimated link state is outage ($s=$ Outage), by convention described above, the path gain is set to the minimum value $g_{\rm min}$. For each of the other four cases as reported in Table~\ref{tab:path_loss_network}, we train a simple neural network depending on the estimated link state $s$ and partial link state $\widehat{s}$. When the partial link state matches the estimated link state, we use the partial map features such as $d_{\rm unobs}$ and $\widehat{g}_{\rm omni}$. However, when they do not match, we simply use $d$, ignoring any non-reliable partial map information.
\iftoggle{conf}{}{
\subsection{Indoor-Outdoor Estimation}
In the training data set, all the TX-RX pairs are
both indoor. However, when an environment is unexplored,
the boundaries of the building are not known, so a given
TX or RX location may be outside.
We briefly discuss how to modify the classifier
when the TX is known to be inside, but the RX is potentially
outside.
Assume the TX is inside and
let $S$ be the event that the RX location is inside.
The previous method trains a classifier
to predict the conditional
probability
\begin{equation} \label{eq:Pscond}
P(s | \widehat{s}, d_{\rm unobs}, S),
\end{equation}
which is the conditional distribution on the true link state,
given the link state on the partial map, and the total
unobserved distance, when the RX is known to be inside.
To compute the conditional probability
when the RX may be outside, we use the total probability,
\begin{align} \label{eq:Pstot}
\MoveEqLeft P(s | \widehat{s}, d_{\rm unobs}) = P(s | \widehat{s}, d_{\rm unobs},S)
P(S| \widehat{s}, d_{\rm unobs}) \nonumber \\
&+ P(s | \widehat{s}, d_{\rm unobs},S^c)
P(S^c| \widehat{s}, d_{\rm unobs}).
\end{align}
We then estimate the conditional probability
\begin{equation} \label{eq:PScond}
P(S|\widehat{s}, d_{\rm unobs})
\end{equation} using a \label{eq:PScond}
Simple logistic classifiers trained on links where
the RX locations are uniformly selected in the map area
and hence have cases where the RX is inside and outside.
This classification does not require running any
ray tracing since all quantities are geometric.
Furthermore, since we focus on the mmWave frequency range,
the indoor-outdoor penetration has minimal \cite{Rappaport2014-mmwbook}. Therefore, as a simplification,
we will assume the outdoor RX locations are in outage.
Therefore,
\begin{equation} \label{eq:Pouts}
P(s=\mathrm{Out} | \widehat{s}, d_{\rm unobs}, S^c) = 1
\end{equation}
fro all values of $\widehat{s}$ and $d_{\rm unobs}$.
Applying \eqref{eq:Pouts} along with the learned distributions
\eqref{eq:Pscond} and \label{eq:PScond},
we can then compute \eqref{eq:Pstot}.
}
\section{Results}
\begin{figure}
\centering
\includegraphics[width=0.9
\linewidth]{Figure/partial_map.png}
\caption{We constructed partial maps by exporting the explored regions of an indoor environment from the Active Neural SLAM procedure. We then fed this map into a ray tracing tool.}
\vspace{-3mm}
\label{fig:partial_map}
\end{figure}
\subsection{Dataset and Training}
The methods are validated on a realistic
simulation of robot navigation and visual
SLAM map construction, used in prior
work \cite{yin2022millimeter}.
We used
the Gibson indoor dataset which contains
a collection of accurate 3D maps
along with camera data \cite{xia2018gibson}.
We used 8 of the environments for training
and 4 for testing.
Within each training environment, we selected
400 random TX-RX location pairs, and within each
test environment.
We performed ray tracing simulations using Remcom Wireless InSite \cite{Remcom} at \SI{28}{GHz} to obtain ground truth values for
the channels in each TX-RX link. Then,
similar to \cite{yin2022millimeter}, we use the
Active Neural SLAM algorithm \cite{chaplot2020learning}
to simulate robot indoor exploration on the AI Habitat platform from visual information~\cite{habitat19iccv}. The
robot explores the environment and gradually builds a simplified 3D map.
As shown in Fig.~\ref{fig:partial_map}, we constructed partial maps by exporting the explored region of an environment from the Active Neural SLAM procedure.
We extracted partial maps from four stages: 50, 100, 150, and 200 steps, where 200 steps generally correspond to approximately 60\% of the total
indoor area.
The higher the step count, the closer we get to observing a complete map. The partial maps along
with the TX and RX locations served as input to the channel prediction algorithms that were trained
to estimate the channel. Links were created
where the TX and RX were both inside and outside
the observed area, and in LOS, NLOS, and outage conditions.
\begin{figure}
\centering
\includegraphics[width=0.6\linewidth]{Figure/Explored.pdf}
\caption{Example of test area from the \emph{Shelbiana} map
in the Gibson dataset \cite{xia2018gibson}. This
map was not in the training data. The displayed area
is $11.4 \times 13.4$\,\si{\meter\squared}.
The TX location is shown in red.}
\label{fig:example_map}
\end{figure}
\begin{figure}
\centering
\subfloat[]{%
\includegraphics[width=\linewidth]{Figure/map_ls.pdf}}
\\ \vspace{-4mm}
\subfloat[]{%
\includegraphics[width=\linewidth]{Figure/map_pl.pdf}}
\caption{(a) True link state (left) for the
test map in Fig.~\ref{fig:example_map} along with predicted
link state using no partial information (center) and the partial information (right).
(b) True omni-directional path gain (left) for the
test map in Fig.~\ref{fig:example_map} along with predicted
path gain using no partial information (center) and the partial information (right).}
\vspace{-3mm}
\label{fig:map_ls_pl}
\end{figure}
\subsection{Example Prediction}
To illustrate the trained propagation predictor, we first
consider an example of test environment shown in Fig.~\ref{fig:example_map}.
This area is one of the maps in the Gibson dataset that
was \emph{not} used during training and is therefore representative of the predictor's ability to generalize to completely new environments.
In this case, the Neural SLAM ran over 150 steps, which led to an observation of 51\% of the interior space.
We ran ray tracing on the full one-layer simplified \emph{Shelbiana} environment from the TX location in Fig.~\ref{fig:example_map}
to 6840 RX locations that are deployed in a grid with \SI{15}{\cm} spacing.
The left panel of Fig.~\ref{fig:map_ls_pl}a shows the true link state (LOS, NLOS, or outage) at each RX location.
The middle panel shows the predicted
link state of the trained model
when there is no partial information. Since the model outputs
a probability, the color shown is the sum of the colors
for the three link states, weighted by their probabilities.
With no information in the environment, the predicted link state
is only a function of the distance from the TX, since there
is no environmental information to use.
The right panel of Fig.~\ref{fig:map_ls_pl}a shows the
predicted link state with the partial information. We see
that the link state is well predicted in the observed area, as expected. As the RX locations move out of the observed area,
uncertainty increases and
the prediction becomes less accurate.
Similarly, Fig.~\ref{fig:map_ls_pl}b depicts the true and predicted
omni-directional path gain. A similar pattern can be observed
with the link state comparing the true omni-directional
path gain with the predictions with and without partial information.
\begin{figure}
\centering
\includegraphics[width=0.85\linewidth]{Figure/ls_pg_step.pdf}
\caption{Blue: Accuracy of the link
state prediction. Orange:
Root mean squared error (RMSE) of the path gain.
Both metrics are plotted as a function of
the number of exploration steps in the environment.}
\vspace{-4mm}
\label{fig:perf_step}
\end{figure}
\subsection{Average Test Performance}
To quantify the average performance,
Fig.~\ref{fig:perf_step} shows the accuracy of link state estimation and the root mean square error of the omni-directional path gain as a function of the number
of steps the robot has explored in the environment. The two metrics are plotted as the average performance on both the 8 training maps and 4 test maps.
The difference in performance between
the training and test data is due to the considerable variations between different interior spaces.
When step $=0$, the environment is completely unexplored and the link state and the path gain must be estimated from the TX-RX distance only.
This type of model is similar to the case of fully statistical
3GPP models \cite{3GPP38901} that do not account for the 3D geometry of the environment.
In this case, we obtain a test RMSE of the path gain of
approximately \SI{18}{dB} and test link state accuracy of only
approximately 65\%.
As the robot explores the environment (steps $=200$), the test RMSE for the path gain reduces to approximately \SI{11}{dB} whereas the link state accuracy peaks at approximately 90\%.
\section{Conclusions}
We have formulated a novel problem of
estimating RF propagation in partially observed environments.
Solutions to this problem may be valuable in scenarios where
mobile agents have access to camera data that can assist RF
communication and sensing, but the environment is not fully
observed. We proposed a simple solution that improves channel prediction and allows us to assess the degree of uncertainty
to guide further exploration.
Future work will investigate more sophisticated
models. For example, the explored area can be
converted into image tensors so that radio propagation can be predicted as an image regression problem using deep convolutional neural networks, as proposed in \cite{zhang2020cellular}.
\bibliographystyle{IEEEtran}
|
\section{Introduction} Considering the following two types of the absolute value equations
(AVEs)
\begin{equation}\label{p1}
Ax-B|x|=b
\end{equation}
and
\begin{equation}\label{eq:2}
Ax-|Bx|=b,
\end{equation}
where $A,B\in \mathbb{R}^{n\times n}$ and $b\in \mathbb{R}^{n}$,
$|\cdot|$ denotes the componentwise absolute value of the vector.
The AVEs (\ref{p1}) and (\ref{eq:2}), respectively, were introduced
in \cite{Rohn04} by Rohn and \cite{Wu21a} by Wu. Clearly, when $B=I$
in (\ref{p1}) and (\ref{eq:2}), where $I$ denotes the identity
matrix, the AVEs (\ref{p1}) and (\ref{eq:2}) reduce to the standard
absolute value equations
\begin{equation}\label{p3}
Ax-|x|=b,
\end{equation}
which was considered in \cite{Mangasarian06} by Mangasarian and
Meyer.
Over these years, the AVEs (\ref{p1}), (\ref{eq:2}) and (\ref{p3})
have excited much interest since they often occur in many significant
mathematical programming problems, including linear programs,
quadratic programs, bimatrix game, linear complementarity problem
(LCP), see \cite{Mangasarian06,Mangasarian07, Rohn89, Prokopyev09}
and references therein. For instance, the AVEs (\ref{p1}) is equal
to the LCP of determining a vector $z\in \mathbb{R}^{n}$ such that
\begin{equation}\label{eq:14}
w=Mz+q\geq0,\ z\geq0 \ \mbox{and}\ z^{T}w=0 \ \mbox{with}\ M\in
\mathbb{R}^{n\times n}\ \mbox{and}\ q\in \mathbb{R}^{n}.
\end{equation}
By using $z=|x|+x$ and $w=|x|-x$ for (\ref{eq:14}), the AVEs
(\ref{p1}) is obtained with $A=I+M$, $B=I-M$ and $b=-q$.
Although the AVEs in \cite{Mangasarian06} is a NP-hard problem, so
far, a large number of theoretical results, numerical methods and
applications have been extensively excavated. For instance, among
the theoretical results, in spite of determining the existence of a
solution to the AVEs in \cite{Mangasarian07,Chen21} is NP-hard, and
checking whether the AVEs has unique or multiple solutions in
\cite{Prokopyev09} is also
NP-complete,
there still exist some very important conclusions, in particular,
some sufficient and necessary conditions for ensuring the existence
and uniqueness of the solutions of the AVEs (\ref{p1}),
(\ref{eq:2}) and (\ref{p3}) were established for any $b\in
\mathbb{R}^{n}$, see \cite{Wu21b, Wu18, Wu21a, Mezzadri20}.
Likewise, solving the AVEs in \cite{Mangasarian07} is NP-hard as
well. It may be due to the fact that the AVEs contains a non-linear
and non-differential absolute value operator. Even so, some
efficient numerical methods have been developed, such as the
generalized Newton method \cite{Mangasarian09}, Newton-based matrix
splitting method \cite{Zhou21}, the exact and inexact
Douglas-Rachford splitting method \cite{Chen22}, the Picard-HSS
method \cite{Salkuyeh14}, the sign accord method \cite{Rohn09}, the
concave minimization method \cite{Mangasarian07b}, the
Levenberg-Marquardt method \cite{Iqbal15}, and so on.
As an important application of the AVEs, for all we know, the AVEs
was first viewed as a very effective tool to gain the numerical
solution of the LCP in \cite{Bokhoven80}, called the modulus method.
At present, this numerical method has achieved rapid development and
its many various versions were proposed, see \cite{Bai10, Wu22} and
references therein. Since the modulus method has the superiorities
of simple construction and quick convergence behavior, it is often
regarded as a top-priority method for solving the large-scale and
sparse complementarity problem (CP).
In addition to the above aspects about the AVEs, another very
important problem is the sensitivity and stability analysis of the
AVEs, i.e., how the solution variation is when the data is
perturbed. More specifically, when $\Delta A, \Delta B
~\mbox{and}~\Delta b$ are the perturbation terms of $A,
B~\mbox{and}~b$ in (\ref{p1}) and (\ref{eq:2}), respectively, how do
we characterize the change in the solution of the perturbed AVEs.
With respect to this regard, to our knowledge, the perturbation
analysis of the AVEs (\ref{p1}) and (\ref{eq:2}) has not been
discussed. In addition, for the error bound of AVEs, under the
assumption of strongly monotone property, a global projection-type
error bound was provided in \cite{Chen21}. Obviously, this kind of
conditional projection-type error bound frequently has great
limitation. Therefore, based on these considerations, in this paper,
we in-depth discuss the error bounds and the perturbation bounds of
the AVEs. Firstly, by introducing a class of the absolute value
functions, the framework of error bounds for the AVEs are presented
without any constraints. Without limiting the matrix type, some
computable estimates for their upper bounds are given. These bounds
are sharper than the existing bounds in \cite{Chen21} under certain
conditions. Secondly, we establish the framework of perturbation
bounds for the AVEs and present some computable upper bounds. It is
pointed out that when the nonlinear term $B|x|$ in (\ref{p1}) is
vanished, the presented perturbation bounds reduce to the classical
perturbation bounds for the linear systems $Ax=b$, including Theorem
1.3 in numerical linear algebra textbooks \cite{Sun01} and Theorem
2.1 \cite{Skeel79}. Thirdly, as another aspect of applications, by
making use of the absolute value equations, we convert the HLCP to
the equal certain absolute value equations, obtain the framework of
error bounds and perturbation bounds for the HLCP, and gain some
computable upper bounds without limiting the matrix type. In
particular, two new equal error bounds for the LCP are exploited,
concomitantly, three new computable upper bounds are obtained and
sharper than that in \cite{Chen06} for the system matrix being an
$H_{+}$-matrix under proper conditions. Further, without the
conditional conditions, we display a new framework of perturbation
bound of the LCP and obtain three new computable upper bounds
advantage over that in \cite{Chen07} for the system matrix being a
symmetric positive definite matrix and an $H_{+}$-matrix. Fourthly,
a new approach for some existing perturbation bounds in
\cite{Chen07} for the LCP is provided as well. Of course, finally,
to show the efficiency of some proposed bounds, some numerical
examples for the AVEs from the LCP are investigated.
The rest of the article is organized as follows. Section 2 provides
the framework of error bounds for the AVEs by introducing a class of
absolute value functions. In Section 3, some perturbation bounds
for the AVEs are provided. In Section 4, the frameworks of error
bounds and perturbation bounds for the HLCP are presented by using
the AVEs. In Section 5, some numerical examples for the AVEs from
the LCP are given to show the feasibility of some perturbation
bounds. Finally, in Section 6, we end up with this paper with some
conclusions.
\vspace{0.3cm} Finally, to end this section, we remind some
notations, definitions and conclusions in \cite{Berman,Wu21a,Wu21b},
which will be used in the later discussion.
Let $A = (a_{ij})$ and $N=\{1,2,\ldots,n\}$. Then we denote
$|A|=(|a_{ij}|)$. $A =(a_{ij})$ is called an $M$-matrix if
$A^{-1}\geq0$ and $a_{ij}\leq0$ ($i\neq j$) for $i,j \in N$; an
$H$-matrix if its comparison matrix $\langle A\rangle$ (i.e.,
$\langle a\rangle_{ii}=|a_{ii}|, \langle a \rangle_{ij}=-|a_{ij}|$
$i\neq j$ for $i,j \in N$) is an $M$-matrix; an $H_{+}$-matrix if
$A$ is an $H$-matrix with $a_{ii} > 0$ for $i\in N$; a $P$-matrix
if all principal minors of $A$ are positive. Let $\rho(\cdot)$,
$\sigma_{\min}$ and $\sigma_{\max}$ denote the spectral radius, the
smallest singular value and the largest singular value of matrix,
respectively. For two vectors $q, e\in \mathbb{R}^{n}$, by $q_{+}$
and $q_{-}$ we denote $q_{+}=\max\{0,q\}$, $q_{-}=\max\{0,-q\}$ and
$e=(1,1,\ldots,1)^{T}$. The norm $\|\cdot\|$ means $p$-norm, i.e.,
$\|\cdot\|_{p}$ with $p\geq1$.
The AVEs (\ref{p1}) has a unique solution for any $b\in
\mathbb{R}^{n}$ if and only if $A-BD$ is nonsingular for any
diagonal matrix $D = diag(d_{i})$ with $d_{i}\in [-1, 1]$, see
Theorem 3.2 in \cite{Wu21b}; the AVEs (\ref{eq:2}) has a unique
solution for any $b\in \mathbb{R}^{n}$ if and only if $A-DB$ is
nonsingular for any diagonal matrix $D = diag(d_{i})$ with $d_{i}\in
[-1, 1]$, see Theorem 3.3 in \cite{Wu21a}.
\section{Error bound} In this section, without further illustration, we always assume that
the matrix $A-BD$ or $A-DB$ is nonsingular for any diagonal matrix
$D = diag(d_{i})$ with $d_{i}\in [-1, 1]$ such that the AVEs
(\ref{p1}) or (\ref{eq:2}) has the unique solution, respectively.
Under this premise, we can give the framework of error bounds on
the distance between the approximate solution and the exact solution
of the AVEs (\ref{p1}) and (\ref{eq:2}).
\subsection{Framework of error bounds for AVEs}
In this subsection, the framework of error bounds for the AVEs is
obtained. To achieve our goal, the following absolute value function
is introduced, see Lemma 2.1.
\begin{lemma}
Let $a=(a_{1},a_{2},\ldots,a_{n})^{T},
b=(b_{1},b_{2},\ldots,b_{n})^{T}$ be any two vectors in
$\mathbb{R}^{n}$. Then there exist $d_{i}\in [-1,1]$ such that
\begin{equation}\label{eq:21}
|a_{i}|-|b_{i}|=d_{i}(a_{i}-b_{i}), i=1,2,\ldots,n.
\end{equation}
\end{lemma}
\begin{proof} Its proof is straightforward, which is omitted.
\end{proof}
Let
\[
r(x)=Ax-B|x|-b.
\]
Clearly, $x^{\ast}$ is a solution of the AVEs (\ref{p1}) if and
only if $r(x^{\ast}) =0$. The function $r(x)$ is called the natural
residual of the AVEs (\ref{p1}). Let $x^{\ast}$ be the unqiue
solution of the AVEs (\ref{p1}). Then from Lemma 2.1 we have
\begin{align*}\label{31}
r(x)=& Ax-B|x|-b-(Ax^{\ast}-B|x^{\ast}|-b)\\
=& A(x-x^{\ast})-B(|x|-|x^{\ast}|)\\
=& A(x-x^{\ast})-B\tilde{D}(x-x^{\ast})\\
=& (A-B\tilde{D})(x-x^{\ast}),
\end{align*}
where $\tilde{D}=diag(\tilde{d}_{i})$ with $\tilde{d}_{i}\in
[-1,1]$, which promptly results in the error bounds for the AVEs
(\ref{p1}), see Theorem 2.2.
\begin{theorem} Let $x^*$ be the unique solution of AVEs (\ref{p1}). Then for any $x\in
\mathbb{R}^{n}$ and $D=diag(d_{i})$ with $d_{i}\in [-1,1]$,
\begin{equation}\label{eq:22}
\frac{1}{\underline{\alpha}} \|r(x)\|\leq\|x-x^{\ast}\|\leq
\overline{\alpha}\|r(x)\|,
\end{equation}
where
\begin{equation*}
\underline{\alpha}=\max\|A-BD\|\ \mbox{and}\
\overline{\alpha}=\max\|(A-BD)^{-1}\|.
\end{equation*}
\end{theorem}
By using the same technique for the AVEs (\ref{eq:2}), we have
\begin{theorem} Let $x^*$ be the unique solution of AVEs (\ref{eq:2}). Then for any $x\in
\mathbb{R}^{n}$ and $D=diag(d_{i})$ with $d_{i}\in [-1,1]$,
\begin{equation}\label{eq:23}
\frac{1}{\underline{\beta}} \|r(x)\|\leq\|x-x^{\ast}\|\leq
\overline{\beta}\|r(x)\|,
\end{equation}
where
\begin{equation*}
\underline{\beta}=\max\|A-DB\|\ \mbox{and}\
\overline{\beta}=\max\|(A-DB)^{-1}\|.
\end{equation*}
\end{theorem}
When $B=I$ in Theorem 2.2 or Theorem 2.3, the error bounds for the
AVEs (\ref{p3}) can be obtained, see Corollary 2.1.
\begin{cor} Let $x^*$ be the unique solution of AVEs (\ref{p3}). Then for any $x\in
\mathbb{R}^{n}$ and $D=diag(d_{i})$ with $d_{i}\in [-1,1]$,
\begin{equation}\label{eq:24}
\frac{1}{\underline{\gamma}} \|r(x)\|\leq\|x-x^{\ast}\|\leq
\overline{\gamma}\|r(x)\|,
\end{equation}
where
\begin{equation*}
\underline{\gamma}=\max\|A-D\|\ \mbox{and}\
\overline{\gamma}=\max\|(A-D)^{-1}\|.
\end{equation*}
\end{cor}
In \cite{Chen21}, with strongly monotone property, Chen et al. also
considered the global error bound of the AVEs (\ref{p3}) and
presented the following result.
\begin{theorem} (Theorem 4.1 in \cite{Chen21}) Let $x^*$ be the unique solution of AVEs (\ref{p3}). Then for any $x\in
\mathbb{R}^{n}$,
\begin{equation}\label{eq:25}
\frac{1}{\underline{C}} \|r(x)\|\leq\|x-x^{\ast}\|\leq
\overline{C}\|r(x)\|,
\end{equation}
where
\begin{equation*}
\underline{C}=\|A +I\|+\|A-I\|\ \mbox{and}\ \overline{C}=\frac{\|A
+I\|+\|A-I\|}{\sigma_{\min}(A)^{2}-1} \ \mbox{with}\
\sigma_{\min}(A)>1.
\end{equation*}
\end{theorem}
Now, we show that the error bounds in Corollary 2.1 are sharper than
that in Theorem 2.4. Here, we consider $\|\cdot\|_{2}$ for
Corollary 2.1 and Theorem 2.4.
\begin{theorem} Let the assumptions of Corollary 2.1 and Theorem 2.4 be
satisfied. Then
\begin{equation}\label{eq:26}
\|A +I\|_{2}+\|A-I\|_{2}\geq\max\|A-D\|_{2}
\end{equation}
and
\begin{equation}\label{eq:27}
\max\|(A-D)^{-1}\|_{2}\leq \frac{\|A
+I\|_{2}+\|A-I\|_{2}}{\sigma_{\min}(A)^{2}-1}.
\end{equation}
\end{theorem}
\begin{proof} Firstly, we prove (\ref{eq:26}). Since
$\max\|A-D\|_{2}$ is a convex polyhedron, its maximum value of is
obtained at the vertex of $D$, i.e.,
\[
\max\|A-D\|_{2}=\max\{\|A +I\|_{2},\|A-I\|_{2}\},
\]
from which we prove (\ref{eq:26}).
Next, we prove (\ref{eq:27}). From $\sigma_{\min}(A)>1$, we know
$\|A^{-1}\|_{2}<1$. Further,
\[
\|A^{-1}\|_{2}\|D\|_{2}<1.
\]
By Banach Perturbation Lemma in \cite{Ortega}, clearly,
\[
\|(A-D)^{-1}\|_{2}\leq\frac{\|A^{-1}\|_{2}}{1-\|A^{-1}\|_{2}\|D\|_{2}}\leq\|A^{-1}\|_{2}.
\]
By the simple computation, we have
\begin{align*}
\|A^{-1}\|_{2}(\sigma_{\min}(A)^{2}-1)=&\|A^{-1}\|_{2}(\frac{1}{\sigma_{\max}(A^{-1})^{2}}-1)\\
=&\|A^{-1}\|_{2}(\frac{1}{\|A^{-1}\|_{2}^{2}}-1)\\
=&\frac{1-\|A^{-1}\|_{2}^{2}}{\|A^{-1}\|_{2}}.
\end{align*}
Since
\[
\|I+A^{-1}\|_{2}+\|I-A^{-1}\|_{2}=\|A^{-1}(I+A)\|_{2}+\|A^{-1}(I-A)\|_{2}\leq\|A^{-1}\|_{2}(\|A
+I\|_{2}+\|A-I\|_{2}),
\]
we only show that
\begin{equation}\label{eq:28}
1-\|A^{-1}\|_{2}^{2}\leq\|I+A^{-1}\|_{2}+\|I-A^{-1}\|_{2}.
\end{equation}
In fact, the inequality (\ref{eq:28}) holds because
\begin{align*}
1-\|A^{-1}\|_{2}^{2}<2=\|2I\|_{2}=\|I+A^{-1}+I-A^{-1}\|_{2}
\leq\|I+A^{-1}\|_{2}+\|I-A^{-1}\|_{2}.
\end{align*}
This proves (\ref{eq:27}). \end{proof}
From the proof of Theorem 2.5, we find some interested results for
the matrix norm, see Proposition 2.1.
\begin{prop} The following statements hold:
\begin{description}
\item $ (1)$ For $A\in \mathbb{R}^{n\times n}$ and $\alpha>0$ in $\mathbb{R}$,
\[
2\alpha-\|A\| \leq\|\alpha I+A\|+\|\alpha I-A\|.
\]
\item $ (2)$ Let $A\in \mathbb{R}^{n\times n}$ and $\alpha\geq0$ in $\mathbb{R}$. Then for $\|A\| \leq \alpha$,
\[
\alpha+\|A\| \leq\|\alpha I+A\|+\|\alpha I-A\|.
\]
\end{description}
\end{prop}
\subsection{Estimations of $\overline{\alpha}$, $\overline{\beta}$ and $\overline{\gamma}$}
In the Section 2.1, we have given some error bounds for the AVEs
(\ref{p1}), (\ref{eq:2}) and (\ref{p3}) in Theorem 2.2, Theorem 2.3,
and Corollary 2.1, respectively. From the proof of Theorem 2.5, it
is not difficult to find that
\[
\underline{\alpha}=\underline{\beta}=\max\{\|A-B\|, \|A+B\|\} \
\mbox{and} \ \underline{\gamma}=\max\{\|A-I\|, \|A+I\|\}.
\]
However, in general, it is difficult to compute quantities
$\overline{\alpha}$, $\overline{\beta}$ and $\overline{\gamma}$
because they contain any $D=diag(d_{i})$ with $d_{i}\in [-1,1]$. To
overcome this disadvantage, in this subsection, we explore some
computable estimations for $\overline{\alpha}$, $\overline{\beta}$
and $\overline{\gamma}$.
In the following, we focus on estimating the value of
$\overline{\alpha}$. For $\overline{\beta}$, its process is
completely analogical, with regard to $\overline{\gamma}$ just for
their special case. To present the reasonable estimations for
$\overline{\alpha}$, here we consider three aspects: (1)
$\rho(|A^{-1}B|)<1$; (2) $\sigma_{\min}(A)>\sigma_{\max}(B)$; (3)
$\sigma_{max}(A^{-1}B)<1$. For these three cases, the AVEs
(\ref{p1}) for any $b\in \mathbb{R}^{n}$ has a unique solution, see
Theorem 2 in \cite{Rohn14} and Theorem 2.1 in \cite{Wu20},
Corollary 3.2 in \cite{Wu21b}. Similarly, for $\overline{\beta}$, we
display three aspects: (1) $\rho(|BA^{-1}|)<1$; (2)
$\sigma_{\min}(A)>\sigma_{\max}(B)$; (3) $\sigma_{max}(BA^{-1})<1$.
For these three cases, the AVEs (\ref{eq:2}) for any $b\in
\mathbb{R}^{n}$ has a unique solution as well, see Corollary 3.3 in
\cite{Wu21a} and Lemma 2.2 in \cite{Li22}, Corollary 3.2 in
\cite{Wu21a}.
\subsubsection{Case I}
Assume that matrices $A$ and $B$ in (\ref{p1}) satisfy
\[
\rho(|A^{-1}B|)<1.
\]
We can present a reasonable estimation for $\overline{\alpha}$, see
Theorem 2.6.
\begin{theorem}
Let $\rho(|A^{-1}B|)<1$ in \emph{(\ref{p1})}. Then
\begin{equation}\label{eq:29}
\overline{\alpha}\leq\|(I-|A^{-1}B|)^{-1}\|\|A^{-1}\|.
\end{equation}
\end{theorem}
\begin{proof} Since $A^{-1}BD\leq |A^{-1}BD| \leq|A^{-1}B|$, by
Theorem 8.1.18 of \cite{Horn}, we get
\[
\rho(A^{-1}BD)\leq\rho(|A^{-1}BD|)\leq\rho(|A^{-1}B|)<1.
\]
So
\begin{align*}
|(I-A^{-1}BD)^{-1}|=&|I+(A^{-1}BD)+(A^{-1}BD)^{2}+...|\\
\leq&I+(|A^{-1}BD|)+(|A^{-1}BD|)^{2}+...\\
\leq&I+(|A^{-1}B|)+(|A^{-1}B|)^{2}+...\\
=&(I-|A^{-1}B|)^{-1}.
\end{align*}
Combining
\[
\|(A-BD)^{-1}\|=\|(I-A^{-1}BD)^{-1}A^{-1}\|\leq\|(I-A^{-1}BD)^{-1}\|\|A^{-1}\|
\]
with
\[
\|(I-A^{-1}BD)^{-1}\|\leq\||(I-A^{-1}BD)^{-1}|\|\leq\|(I-|A^{-1}B|)^{-1}\|,
\]
the desired bound (\ref{eq:29}) can be gained. \end{proof}
Similar to the proof of Theorem 2.6, for $\overline{\beta}$, we
have
\begin{theorem}
Let $\rho(|BA^{-1}|)<1$ in \emph{(\ref{eq:2})}. Then
\[
\overline{\beta}\leq\|A^{-1}\|\|(I-|BA^{-1}|)^{-1}\|.
\]
\end{theorem}
Needless to say, for $\overline{\gamma}$, we have
\begin{cor}
Let $\rho(|A^{-1}|)<1$ in \emph{(\ref{p3})}. Then
\[
\overline{\gamma}\leq\|A^{-1}\|\|(I-|A^{-1}|)^{-1}\|.
\]
\end{cor}
\subsubsection{Case II}
If $\sigma_{\min}(A)>\sigma_{\max}(B)$ in (\ref{p1}), then for
$\overline{\alpha}$ we have Theorem 2.8.
\begin{theorem}
Let $\sigma_{\min}(A)>\sigma_{\max}(B)$ in \emph{(\ref{p1})}. Then
\begin{equation}\label{eq:39}
\overline{\alpha}\leq\frac{1}{\sigma_{\min}(A)-\sigma_{\max}(B)}.
\end{equation}
\end{theorem}
\begin{proof} Since
\[
\sigma_{\min}(A)-\sigma_{\max}(BD)\geq\sigma_{\min}(A)-\sigma_{\max}(B)\sigma_{\max}(D)\geq\sigma_{\min}(A)-\sigma_{\max}(B)
\]
and
\[
\sigma_{\min}(A-BD)\geq\sigma_{\min}(A)-\sigma_{\max}(BD),
\]
we have
\begin{align*}
\|(A-BD)^{-1}\|_{2}=&\sigma_{\max}((A-BD)^{-1})\\
=&\frac{1}{\sigma_{\min}(A-BD)}\\
\leq&\frac{1}{\sigma_{\min}(A)-\sigma_{\max}(BD)}\\
\leq&\frac{1}{\sigma_{\min}(A)-\sigma_{\max}(B)}.
\end{align*}
This completes the proof for Theorem 2.8. \end{proof}
For $\overline{\beta}$, we have the same as the result in Theorem
2.9.
\begin{theorem}
Let $\sigma_{\min}(A)>\sigma_{\max}(B)$ in \emph{(\ref{eq:2})}. Then
\[
\overline{\beta}\leq\frac{1}{\sigma_{\min}(A)-\sigma_{\max}(B)}.
\]
\end{theorem}
\begin{cor}
Let $\sigma_{\min}(A)>1$ in \emph{(\ref{p3})}. Then
\[
\overline{\gamma}\leq\frac{1}{\sigma_{\min}(A)-1}.
\]
\end{cor}
It is easy to see that the upper bound in Corollary 2.3 is still
sharper than that in Theorem 2.4, i.e.,
\[
\frac{1}{\sigma_{\min}(A)-1}\leq \frac{\|A
+I\|_{2}+\|A-I\|_{2}}{\sigma_{\min}(A)^{2}-1},
\]
which is equal to
\[
\sigma_{\min}(A)+1\leq \|A +I\|_{2}+\|A-I\|_{2}.
\]
In fact, by using Proposition 2.1, we have
\[
1+\|A^{-1}\|_{2}\leq\|I+A^{-1}\|_{2}+\|I-A^{-1}\|_{2}\leq\|A^{-1}\|_{2}(\|A
+I\|_{2}+\|A-I\|_{2}).
\]
\begin{remark}
The conditions in Theorems 2.6 and 2.8 are not included each other,
e.g., take
\[
A=\left[\begin{array}{ccc}
1&0\\
0&1\\
\end{array}\right], B=\left[\begin{array}{ccc}
0.9&-0.4\\
0.4&0.9\\
\end{array}\right].
\]
By the simple computation,
\[
\sigma_{\min}(A)=1>\sigma_{\max}(B)=0.9849,
\]
but
\[
\rho(|A^{-1}B|)=1.3>1.
\]
This shows that matrices $A$ and $B$ satisfy the condition in
Theorem 2.8, do not satisfy the condition in Theorem 2.6. Now we
take
\[
A=\left[\begin{array}{ccc}
2&1\\
0&2\\
\end{array}\right],\ B=\left[\begin{array}{ccc}
1.6&0\\
0&1.6\\
\end{array}\right].
\]
By the simple computation,
\[
\rho(|A^{-1}B|)=0.8000<1,
\]
but
\[
\sigma_{\min}(A)= 1.5616<\sigma_{\max}(B)=1.6.
\]
This shows that matrices $A$ and $B$ satisfy the condition in
Theorem 2.6, do not satisfy the condition in Theorem 2.8.
\end{remark}
\subsubsection{Case III}
Here, we consider this case that $B$ is nonsingular and
$\sigma_{max}(A^{-1}B)<1$ in (\ref{p1}). Based on this, for
$\overline{\alpha}$ we have Theorem 2.11.
\begin{theorem}
Let $B$ be nonsingular and $\sigma_{max}(A^{-1}B)<1$ in
\emph{(\ref{p1})}. Then
\begin{equation}\label{eq:211}
\overline{\alpha}\leq\|A^{-1}B\|_{2}\|B^{-1}\|_{2}.
\end{equation}
\end{theorem}
\begin{proof} From Corollary 3.2 in \cite{Wu21b}, $A+BD$ is
nonsingular under the assumptions. So, we have
\[
\|(A-BD)^{-1}\|_{2}=\|(B^{-1}A-D)^{-1}B^{-1}\|_{2}\leq\|(B^{-1}A-D)^{-1}\|_{2}\|B^{-1}\|_{2}.
\]
Noting that $\sigma_{max}(A^{-1}B)<1$ is equal to
$\|A^{-1}B\|_{2}<1$ and
\[
\|A^{-1}BD\|_{2}\leq\|A^{-1}B\|_{2}\|D\|_{2}<1.
\]
Making use of Banach perturbation lemma in \cite{Ortega} leads to
\begin{align*}
\|(B^{-1}A-D)^{-1}\|_{2}\leq&\frac{\|A^{-1}B\|_{2}}{1-\|A^{-1}B\|_{2}\|D\|_{2}}\leq\|A^{-1}B\|_{2}.
\end{align*}
Therefore, the proof of Theorem 2.11 is completed. \end{proof}
For $\overline{\beta}$, we have
\begin{theorem}
Let $B$ be nonsingular and $\sigma_{max}(BA^{-1})<1$ in
\emph{(\ref{eq:2})}. Then
\[
\overline{\beta}\leq\|B^{-1}\|_{2}\|BA^{-1}\|_{2}.
\]
\end{theorem}
\begin{cor}
Let $\sigma_{max}(A^{-1})<1$ in \emph{(\ref{p3})}. Then
\[
\overline{\gamma}\leq\|A^{-1}\|_{2}.
\]
\end{cor}
\begin{remark}
Comparing Theorem 2.8 with Theorem 2.11, it is easy to find that
\[
\sigma_{max}(A^{-1}B)\leq\sigma_{max}(A^{-1})\sigma_{max}(B)=\frac{\sigma_{max}(B)}{\sigma_{min}(A)}.
\]
Whereas, it does not show that Theorem 2.11 is weaker than Theorem
2.8 because Theorem 2.11 asks for $B$ being nonsingular. Besides, we
need to point out that Theorem 2.11 sometimes performs better than
Theorem 2.8, vice versa. To illustrate this, we take
\[
A=\left[\begin{array}{ccc}
2&0\\
0&3\\
\end{array}\right],\ B=\left[\begin{array}{ccc}
1&0\\
0&1.5\\
\end{array}\right].
\]
Obviously, $B$ is nonsingular,
\[
\sigma_{max}(A^{-1}B)=0.5<1, \sigma_{min}(A)=2>\sigma_{max}(B)=1.5.
\]
This shows that the conditions in Theorem 2.8 with Theorem 2.11 are
satisfied. From Theorem 2.8 and Theorem 2.11, we have
\[
\|A^{-1}B\|_{2}\|B^{-1}\|_{2}=
0.5<\frac{1}{\sigma_{min}(A)-\sigma_{\max}(B)}=2,
\]
from which shows that the upper bound in Theorem 2.11 is sharper
than that in Theorem 2.8. Now, we take
\[
A=\left[\begin{array}{ccc}
2&0\\
0&3\\
\end{array}\right],\ B=\left[\begin{array}{ccc}
1&0\\
0&0.4\\
\end{array}\right].
\]
Likewise, $B$ is nonsingular,
\[
\sigma_{max}(A^{-1}B)=0.5<1, \sigma_{min}(A)=2>\sigma_{max}(B)=1.
\]
This implies that the conditions in Theorem 2.8 with Theorem 2.11
are satisfied as well. From Theorem 2.8 and Theorem 2.11, we have
\[
\|A^{-1}B\|_{2}\|B^{-1}\|_{2}=
\frac{5}{4}>\frac{1}{\sigma_{min}(A)-\sigma_{\max}(B)}=1,
\]
which implies that the upper bound in Theorem 2.8 is sharper than
that in Theorem 2.11.
\end{remark}
\section{Perturbation bound}
In this section, we focus on the perturbation analysis of AVEs when
$A, B$ and $b$ are perturbed. For instance, for the AVEs
(\ref{p1}), when $\Delta A$, $\Delta B$ and $\Delta b$ are the
perturbation terms of $ A$, $B$ and $b$, respectively, how do we
characterize the change in the solution of the following perturbed
AVEs (\ref{p4})
\begin{equation}\label{p4}
(A+\Delta A)y-(B+\Delta B)|y|=b+\Delta b.
\end{equation}
For the AVEs (\ref{p1}), firstly, we consider the following special
case
\begin{equation}\label{p5}
Ay-B|y|=b+\Delta b.
\end{equation}
Assume that the AVEs (\ref{p5}) has the unique solution $y^{\ast}$.
Let $x^{\ast}$ be the unique solution of AVEs (\ref{p1}).
Subtracting (\ref{p1}) from (\ref{p5}), we have
\[
Ax^{\ast}-B|x^{\ast}|- (Ay^{\ast}-B|y^{\ast}|)=-\Delta b,
\]
which is equal to
\begin{equation}\label{eq:33}
x^{\ast}-y^{\ast}=-(A-B\tilde{D})^{-1}\Delta b,
\end{equation}
where $\tilde{D}=diag(\tilde{d}_{i})$ with $\tilde{d}_{i}\in
[-1,1]$. Making use of the norm for both sides of (\ref{eq:33}),
noting that
\begin{equation}\label{eq:34}
\|(A-B\tilde{D})^{-1}\|\leq\max \|(A-BD)^{-1}\|
\end{equation}
for any $D=diag(d_{i})$ with $d_{i}\in [-1,1]$, we have
\begin{equation}\label{eq:35}
\|x^{\ast}-y^{\ast}\|\leq\max \|(A-BD)^{-1}\|\|\Delta b\|.
\end{equation}
Moreover, from the AVEs (\ref{p1}) with $x^{\ast}$, it is easy to
check that
\begin{equation}\label{eq:36}
\frac{\|b\|}{\|x^{\ast}\|}\leq\|A\|+\|B\|.
\end{equation}
Combining (\ref{eq:35}) with (\ref{eq:36}), we obtain
\begin{align*}
\frac{\|x^{\ast}-y^{\ast}\|}{\|x^{\ast}\|}\leq&\frac{\max
\|(A-BD)^{-1}\|\|\Delta
b\|}{\|x^{\ast}\|}=\frac{\|(A-BD)^{-1}\|\|\Delta
b\|}{\|b\|}\frac{\|b\|}{\|x^{\ast}\|}\\
\leq& \frac{\max \|(A-BD)^{-1}\|\|\Delta b\|}{\|b\|}(\|A\|+\|B\|),
\end{align*}
from which we immediately get
\begin{theorem}
Let $x^{\ast}$, $y^{\ast}$ be the unique solutions of AVEs
(\ref{p1}) and (\ref{p5}), respectively. Then for any
$D=diag(d_{i})$ with $d_{i}\in [-1,1]$,
\begin{align*}
\frac{\|x^{\ast}-y^{\ast}\|}{\|x^{\ast}\|} \leq \frac{
\max\|(A-BD)^{-1}\|\|\Delta b\|}{\|b\|}(\|A\|+\|B\|).
\end{align*}
\end{theorem}
Similarly, we assume that $y^{\ast}$ is the unique solution of AVEs
(\ref{p4}). The following theorem is the framework of AVEs
(\ref{p1}) perturbation.
\begin{theorem}
Let $x^{\ast}$, $y^{\ast}$ be the unique solutions of AVEs
(\ref{p1}) and (\ref{p4}), respectively. Then for any
$D=diag(d_{i})$ with $d_{i}\in [-1,1]$
\begin{equation}\label{eq:37}
\frac{\|x^{\ast}-y^{\ast}\|}{\|x^{\ast}\|} \leq\max \|(A-BD+(\Delta
A-\Delta BD ))^{-1}\|\Bigg(\frac{\|\Delta
b\|}{\|b\|}(\|A\|+\|B\|)+\|\Delta A\|+\|\Delta B\|\Bigg).
\end{equation}
\end{theorem}
\begin{proof} Based on the assumptions, the AVEs (\ref{p1}) is
equal to
\begin{equation}\label{eq:38}
(A+\Delta A)x^{\ast}-(B+\Delta B)|x^{\ast}|=b+\Delta
Ax^{\ast}-\Delta B|x^{\ast}|.
\end{equation}
Subtracting (\ref{eq:38}) from (\ref{p4}) with $y^{\ast}$, we have
\begin{equation}\label{eq:n39}
(A-B\tilde{D}+(\Delta A-\Delta B\tilde{D}
))(x^{\ast}-y^{\ast})=-\Delta b+\Delta Ax^{\ast}-\Delta B|x^{\ast}|,
\end{equation}
where $\tilde{D}=diag(\tilde{d}_{i})$ with $\tilde{d}_{i}\in
[-1,1]$. Using the norm for (\ref{eq:n39}), similar to
(\ref{eq:34}), results in
\begin{equation}\label{eq:310}
\|x^{\ast}-y^{\ast}\|\leq\max \|(A-BD+(\Delta A-\Delta BD
))^{-1}\|(\|\Delta b\|+(\|\Delta A\|+\|\Delta B\|)\|x^{\ast}\|)
\end{equation}
for any $D=diag(d_{i})$ with $d_{i}\in [-1,1]$. By making use of
(\ref{eq:310}) and (\ref{eq:36}), the desired bound (\ref{eq:37})
can be obtained. \end{proof}
\begin{remark}
Here, a special case is considered, i.e, when $B=0$ in (\ref{p1}),
the AVEs (\ref{p1}) reduces to the linear systems
\[
Ax=b.
\]
It is not difficult to find that from Theorem 3.2 we easily obtain a
classical perturbation bound for the linear systems $Ax=b$, i.e.,
\[\frac{\|x^{\ast}-y^{\ast}\|}{\|x^{\ast}\|}
\leq \frac{\kappa(A)}{1-\frac{\kappa(A)\|\Delta
A\|}{\|A\|}}\Bigg(\frac{\|\Delta b\|}{\|b\|}+\frac{\|\Delta
A\|}{\|A\|}\Bigg)
\]
for $\|A^{-1}\|\|\Delta A\| < 1$, where $\kappa(A)=\|A^{-1}\|\|A\|$,
see Theorem 1.3 in numerical linear algebra textbooks \cite{Sun01}.
\end{remark}
In addition, when $|\Delta A|\leq\epsilon |A|$, $|\Delta
B|\leq\epsilon |B|$ and $|\Delta b|\leq\epsilon |b|$, we have
\begin{theorem}
Let $x^{\ast}$, $y^{\ast}$ be the unique solutions of AVEs
(\ref{p1}) and (\ref{p4}), respectively. Assume that $|\Delta
A|\leq\epsilon |A|$, $|\Delta B|\leq\epsilon |B|$ and $|\Delta
b|\leq\epsilon |b|$. Then
\begin{equation}\label{eq:311}
\frac{\|x^{\ast}-y^{\ast}\|}{\|x^{\ast}\|} \leq
\frac{\epsilon\|\max|(A-BD)^{-1}|(|
b|+(|A|+|B|)|x^{\ast}|)\|}{(1-\epsilon\|\max|(A-BD)^{-1}|(|A|+|B|)\|)\|x^{\ast}\|},
\end{equation}
where $\epsilon\|\max|(A-BD)^{-1}|(|A|+|B|)\|<1$.
\end{theorem}
\begin{proof} From (\ref{eq:n39}), we have
\[
x^{\ast}-y^{\ast}=(A-B\tilde{D})^{-1}(-(\Delta A-\Delta
B\tilde{D})(x^{\ast}-y^{\ast})-\Delta b+\Delta Ax^{\ast}-\Delta
B|x^{\ast}|),
\]
and so
\begin{align*}
|x^{\ast}-y^{\ast}|=&|(A-B\tilde{D})^{-1}(-(\Delta A-\Delta
B\tilde{D})(x^{\ast}-y^{\ast})-\Delta b+\Delta Ax^{\ast}-\Delta
B|x^{\ast}|)|\\
\leq&|(A-B\tilde{D})^{-1}||(\Delta A-\Delta
B\tilde{D})(x^{\ast}-y^{\ast})|+|(A-B\tilde{D})^{-1}|(|\Delta
b|+|\Delta Ax^{\ast}|+|\Delta
B|x^{\ast}|)\\
\leq&\epsilon|(A-B\tilde{D})^{-1}|(|A|+|B|)|x^{\ast}-y^{\ast}|+\epsilon|(A-B\tilde{D})^{-1}|(|
b|+(|A|+|B|)|x^{\ast}|)\\
\leq&\epsilon\max|(A-BD)^{-1}|(|A|+|B|)|x^{\ast}-y^{\ast}|+\epsilon\max|(A-BD)^{-1}|(|
b|+(|A|+|B|)|x^{\ast}|).
\end{align*}
Hence,
\[
\|x^{\ast}-y^{\ast}\|
\leq\epsilon\|\max|(A-BD)^{-1}|(|A|+|B|)\|\|x^{\ast}-y^{\ast}\|+\epsilon\|\max|(A-BD)^{-1}|(|
b|+(|A|+|B|)|x^{\ast}|)\|,
\]
from which we obtain the desired bound (\ref{eq:311}). \end{proof}
\begin{remark}
Similar to Remark 3.3, when $B=0$ in (\ref{p1}), Theorem 3.4 reduces
to another classical perturbation bound for the linear systems
$Ax=b$, i.e.,
\[
\frac{\|x^{\ast}-y^{\ast}\|}{\|x^{\ast}\|} \leq
\frac{\epsilon\||A^{-1}|(|
b|+|A||x^{\ast}|)\|}{(1-\epsilon\||A^{-1}||A|\|)\|x^{\ast}\|}
\]
where $\epsilon\||A^{-1}||A|\|<1$, see Theorem 2.1 \cite{Skeel79}
and Theorem 1.1 in \cite{Wei99}.
\end{remark}
Noting that $|(I-A^{-1}BD)^{-1}|\leq(I-|A^{-1}B|)^{-1}$ for
$\rho(|A^{-1}B|)<1$ from Theorem 2.6, together with Theorem 3.4,
Theorem 3.6 is obtained and its advantage successfully avoids any
diagonal matrix $D=diag(d_{i})$ with $d_{i}\in [-1,1]$.
\begin{theorem}
Let $x^{\ast}$, $y^{\ast}$ be the unique solutions of AVEs
(\ref{p1}) and (\ref{p4}), respectively. Assume that $|\Delta
A|\leq\epsilon |A|$, $|\Delta B|\leq\epsilon |B|$, $|\Delta
b|\leq\epsilon |b|$ and $\rho(|A^{-1}B|)<1$. Then
\begin{equation}\label{eq:312}
\frac{\|x^{\ast}-y^{\ast}\|}{\|x^{\ast}\|} \leq
\frac{\epsilon\|(I-|A^{-1}B|)^{-1}|A^{-1}|(|
b|+(|A|+|B|)|x^{\ast}|)\|}{(1-\epsilon\|(I-|A^{-1}B|)^{-1}|A^{-1}|(|A|+|B|)\|)\|x^{\ast}\|},
\end{equation}
where $\epsilon\|(I-|A^{-1}B|)^{-1}|A^{-1}|(|A|+|B|)\|<1$.
\end{theorem}
\begin{remark} Making use of ``$DB$'' and/or ``$D \Delta B$'' instead of ``$BD$'' and/or ``$ \Delta
BD$'' in Theorems 3.1, 3.2 and 3.4 directly, some perturbation
bounds for the AVEs (\ref{eq:2}) can be obtained. Of course, by
using the simple modifications for Theorem 3.6, its modified vesion
is suit for the AVEs (\ref{eq:2}) as well, which is omitted.
\end{remark}
\begin{remark} It is easy to see that $B=I$ and/or $\Delta B=0$ in Theorems
3.1, 3.2, 3.4 and 3.6, some perturbation bounds for the AVEs
(\ref{p3}) can be obtained as well.
\end{remark}
\begin{remark}
By directly making use of the results in the Section 2.2,
naturally, we can present some computable upper bounds for
$\max\|(A-BD)^{-1}\|$ in Theorem 3.1 and $\max\|(A-BD+(\Delta
A-\Delta BD ))^{-1}\|$ in Theorem 3.2.
\end{remark}
\section{Application in HLCP}
In this section, by making use of the AVEs (\ref{p1}), we can
derive some error bounds and perturbation bounds for the HLCP.
Coincidentally, two new equal forms about the error bounds for LCP
are given. Without constraint conditions, a new perturbation bound
for LCP is obtained, compared with Theorem 3.1 in \cite{Chen07}.
As is known, the horizontal linear complementarity problem is to
determine a pair of vectors $w,z$ in $\mathbb{R}^{n}$ such that
\begin{equation}\label{eq:41}
Mz-Nw= q, z\geq 0,w \geq 0, z^{T}w = 0,
\end{equation}
where $M, N\in \mathbb{R}^{n\times n}$ and $q\in \mathbb{R}^{n}$,
respectively, are given known matrices and the vector, which is
denoted by HLCP and comes from the well-known book \cite{Cottle92}
by Cottle et al. Clearly, when $N=I$, the HLCP (\ref{eq:41}) reduces
to the well-known LCP.
\subsection{Error bound for HLCP}
In this subsection, we will discuss the error bound for HLCP. Our
approach is to display the HLCP (\ref{eq:41}) in the form of
absolute value equations to study the error bound for HLCP. For this
goal, we take $w=\frac{|x|-x}{2}$ and $z=\frac{|x|+x}{2}$ for
(\ref{eq:41}). Under this transformation, the HLCP (\ref{eq:41}) is
equally converted to the following absolute value equations
\begin{equation}\label{eq:42}
\frac{M+N}{2}x-\frac{N-M}{2}|x|=q.
\end{equation}
Obviously, to gain the error bound for the HLCP (\ref{eq:41}) is
equivalent to gain the error bound for the AVEs (\ref{eq:42}). That
is to say, we can discuss the error bound for the HLCP (\ref{eq:41})
from the point of absolute value equations. This approach is
completely different from the published work in \cite{Chen06}.
To help our discussion, the following definition and lemma are
required.
\begin{definition} \cite{Sznajder95}
Matrix $H=\{M,N\}$ has the column $\mathcal{W}$-property if the
determinants of all column representative matrices of $H=\{M,N\}$
are all positive or all negative.
\end{definition}
By using Theorem 2 (b) in \cite{Sznajder95}, Lemma 4.2 can be
obtained, its proof is omitted.
\begin{lemma}
Matrix $H=\{M,N\}$ has the column $\mathcal{W}$-property if and only
if $M(I-T)+NT$ is nonsingular for any nonnegative diagonal matrix
$T=\mbox{diag}(t)$ with $t\in [0,1]^{n}$.
\end{lemma}
\begin{remark} Gabriel and Mor\'{e} in \cite{Gabriel97} proved that $A$ is a
$P$-matrix if and only if $A+T(I- A)$ is nonsingular for any
nonnegative diagonal matrix $T=\mbox{diag}(t)$ with $t\in
[0,1]^{n}$. Clearly, Lemma 4.2 is a generalization of their result.
\end{remark}
From Theorem 2 in \cite{Sznajder95}, we know that the HLCP
(\ref{eq:41}) has the unique solution for $H$ having the column
$\mathcal{W}$-property. Without loss of generality, we always assume
that the block matrix $H$ satisfies the conditions of Lemma 4.2 such
that the HLCP (\ref{eq:41}) has the unique solution
$(w^{\ast},z^{\ast})$. In this case, the corresponding $x^{\ast}$
($x^{\ast}=z^{\ast}-w^{\ast}$) is the unique solution of the AVEs
(\ref{eq:42}).
Let
\[
r_{h}(x)=\frac{M+N}{2}x-\frac{N-M}{2}|x|-q.
\]
By making use of Theorem 2.2 directly and the simple passages, we
present the error bounds for the HLCP (\ref{eq:41}), see Theorem
4.4.
\begin{theorem} Let $x^*$ be the unique solution of AVEs (\ref{eq:42}). Then for any $x\in
\mathbb{R}^{n}$, $D=diag(d_{i})$ with $d_{i}\in [-1,1]$ and
$\Lambda=diag(\lambda_{i})$ with $\lambda_{i}\in [0,1]$,
\begin{equation}\label{eq:43}
\frac{1}{H_{l}} \|r_{h}(x)\|\leq\|x-x^{\ast}\|\leq
H_{u}\|r_{h}(x)\|,
\end{equation}
where
\begin{equation*}
H_{l}=\max\bigg\|\frac{M+N}{2}-\frac{N-M}{2}D\bigg\|\ \mbox{and}\
H_{u}=\max\bigg\|\bigg(\frac{M+N}{2}-\frac{N-M}{2}D\bigg)^{-1}\bigg\|,
\end{equation*}
which is equal to
\begin{equation}\label{eq:44}
\frac{1}{\bar{H}_{l}}\|r_{h}(x)\|\leq\|x-x^{\ast}\|\leq
\bar{H}_{u}\|r_{h}(x)\|,
\end{equation}
with \begin{equation*} \bar{H}_{l}=\max\|N(I-\Lambda)+M\Lambda\|\
\mbox{ and}\ \bar{H}_{u}=\max\|(N(I-\Lambda)+M\Lambda)^{-1}\|.
\end{equation*}
\end{theorem}
It is well known that, if $N$ is nonsingular, the HLCP (\ref{eq:41})
can be equivalently written as the LCP
\[
w =N^{-1}Mz-N^{-1}q, z \geq0, w\geq0, z^{T}w = 0.
\]
If we apply the error bounds of Eq. (2.3) on page 516 in
\cite{Chen06} to such LCP, then we directly obtain
\begin{equation}\label{eq:45}
\frac{1}{C_{l}} \|r(x)\|\leq\|x-x^{\ast}\|\leq C_{u}\|r(x)\|,
\end{equation}
where
\begin{equation*}
C_{l}=\max\|I-\Lambda+\Lambda N^{-1}M\|\ \mbox{ and}\
C_{u}=\max\|(I-\Lambda+\Lambda N^{-1}M)^{-1}\|.
\end{equation*}
Comparing (\ref{eq:44}) with (\ref{eq:45}), the advantages of the
former are obvious. Firstly, the former does not need that $N$ must
be nonsingular matrix; secondly, when using the latter for
calculating the error bounds, the inverse of matrix $N$ has to
address. Whereas, the former successfully prevent this form
happening.
By making use of Theorems 2.6, 2.8 and 2.11, some computable
estimates for $H_{u}$ or $\bar{H}_{u}$ are obtained off-hand, see
Corollary 4.1.
\begin{cor} Let $A=\frac{M+N}{2}$ and $B=\frac{N-M}{2}$.
The following statements hold:
\begin{description}
\item $(i)$ Let $\rho(|A^{-1}B|)<1$. Then
\begin{equation}\label{eq:46}
H_{u}=\bar{H}_{u}\leq\|(I-|A^{-1}B|)^{-1}\|\|A^{-1}\|.
\end{equation}
\item $ (ii)$ Let
$\sigma_{\min}(A)>\sigma_{\max}(B)$. Then
\begin{equation}\label{eq:47}
H_{u}=\bar{H}_{u}\leq\frac{1}{\sigma_{\min}(A)-\sigma_{\max}(B)}.
\end{equation}
\item $ (iii)$ Let $\sigma_{max}(A^{-1}B)<1$. Then
\begin{equation}\label{eq:48}
H_{u}=\bar{H}_{u}\leq\|A^{-1}B\|_{2}\|B^{-1}\|_{2}.
\end{equation}
\end{description}
\end{cor}
Naturally, for $N=I$ in (\ref{eq:42}), combining Theorem 4.4 with
Corollary 4.1, we immediately obtain the error bounds for LCP, see
Corollary 4.2.
\begin{cor} Let $x^*$ be the unique solution of AVEs (\ref{eq:42}) with $N=I$. Then for any $x\in
\mathbb{R}^{n}$, $D=diag(d_{i})$ with $d_{i}\in [-1,1]$ and
$\Lambda=diag(\lambda_{i})$ with $\lambda_{i}\in [0,1]$
\begin{equation}\label{eq:49}
\frac{1}{L_{l}} \|r_{h}(x)\|\leq\|x-x^{\ast}\|\leq
L_{u}\|r_{h}(x)\|,
\end{equation}
where
\begin{equation*}
L_{l}=\max\bigg\|\frac{M+I}{2}-\frac{I-M}{2}D\bigg\|\ \mbox{and}\
L_{u}=\max\bigg\|\bigg(\frac{M+I}{2}-\frac{I-M}{2}D\bigg)^{-1}\bigg\|,
\end{equation*}
which is equal to
\begin{equation}\label{eq:410}
\frac{1}{\bar{L}_{l}} \|r_{h}(x)\|\leq\|x-x^{\ast}\|\leq
\bar{L}_{u}\|r_{h}(x)\|,
\end{equation}
with
\begin{equation*}
\bar{L}_{l}=\max\|I-\Lambda+M\Lambda\|\ \mbox{ and}\
\bar{L}_{u}=\max\|(I-\Lambda+M\Lambda)^{-1}\|.
\end{equation*}
Further, let $\bar{A}=\frac{M+I}{2}$ and $\bar{B}=\frac{I-M}{2}$.
The following statements hold:
\begin{description}
\item $(i)$ Let $\rho(|\bar{A}^{-1}\bar{B}|)<1$. Then
\begin{equation}\label{eq:411}
\bar{L}_{u}=L_{u}\leq\|(I-|\bar{A}^{-1}\bar{B}|)^{-1}\|\|\bar{A}^{-1}\|.
\end{equation}
\item $ (ii)$ Let
$\sigma_{\min}(\bar{A})>\sigma_{\max}(\bar{B})$. Then
\begin{equation}\label{eq:412}
\bar{L}_{u}=L_{u}\leq\frac{1}{\sigma_{\min}(\bar{A})-\sigma_{\max}(\bar{B})}.
\end{equation}
\item $ (iii)$ Let
$\sigma_{max}(\bar{A}^{-1}\bar{B})<1$. Then
\begin{equation}\label{eq:413}
\bar{L}_{u}=L_{u}\leq\|\bar{A}^{-1}\bar{B}\|_{2}\|\bar{B}^{-1}\|_{2}.
\end{equation}
\end{description}
\end{cor}
\begin{remark}
Based on Theorem 2.1 in \cite{Elsner02}, the lower and upper error
bounds in (\ref{eq:410}) are the same as that in (2.3) on page 516
in \cite{Chen06}. In addition, their new equal form, i.e.,
(\ref{eq:49}), is exploited as well. Moreover, from (\ref{eq:49}),
we present some estimates of the upper bounds for three cases: (1)
$\rho(|\bar{A}^{-1}\bar{B}|)<1$; (2)
$\sigma_{\min}(\bar{A})>\sigma_{\max}(\bar{B})$; (3)
$\sigma_{max}(\bar{A}^{-1}\bar{B})<1$, where $\bar{A}=\frac{M+I}{2}$
and $\bar{B}=\frac{I-M}{2}$. These estimates are not limited the
special type of matrix.
\end{remark}
Since in theory it is difficult to compare the upper bounds in
Corollary 4.2 and Theorem 2.1 in \cite{Chen06}, here, we can adopt
some numerical examples to investigate the upper bounds in Corollary
4.2 and Theorem 2.1 in \cite{Chen06}. For the sake of simplicity,
we only list a simple example, see Example 4.1.
\textbf{Example 4.1} Let
\[
M=\left[\begin{array}{ccc}
1&-0.5\\
0.5&1
\end{array}\right].
\]
Obviously, $M$ is an $H_{+}$-matrix. By the simple computations,
from Theorem 2.1 in \cite{Chen06}, we get
\[
\|\langle M\rangle^{-1} \max\{D_{M}, I\}\|_{2}=2,
\]
where $D_{M}$ denotes the diagonal part of $M$.
From Corollary 4.2 (i), we get
\[
\rho(|\bar{A}^{-1}\bar{B}|)= 0.2941<1,\ \mbox{and} \
\|(I-|\bar{A}^{-1}\bar{B}|)^{-1}\|_{2}\|\bar{A}^{-1}\|_{2}=
1.3744<2.
\]
From Corollary 4.2 (ii), we get
\[
\sigma_{\min}(\bar{A})= 1.0308>\sigma_{\max}(\bar{B})= 0.2500, \
\mbox{and} \
\frac{1}{\sigma_{\min}(\bar{A})-\sigma_{\max}(\bar{B})}= 1.2808<2.
\]
From Corollary 4.2 (iii), we get
\[
\sigma_{max}(\bar{A}^{-1}\bar{B})= 0.2425, \ \mbox{and} \
\|\bar{A}^{-1}\bar{B}\|_{2}\|\bar{B}^{-1}\|_{2}=
0.9701<2.
\]
The above results imply that (i), (ii) and (iii) in Corollary 4.2
are sharper than that in Theorem 2.1 in \cite{Chen06} under proper
conditions. This implies that our presented bounds, (i), (ii) and
(iii) in Corollary 4.2, are meaningful in a way, and may advantage
over that in Theorem 2.1 in \cite{Chen06} under certain conditions.
\subsection{Perturbation bound for HLCP}
In this subsection, we fasten on the perturbation analysis of the
HLCP (\ref{eq:41}) when $M, N$ and $q$ are perturbed to $M+\Delta M,
N+\Delta N$ and $q+\Delta q$, respectively. In this case, the
perturbed HLCP is to find a pair of vectors $s,t$ in
$\mathbb{R}^{n}$ such that
\begin{equation}\label{eq:414}
(M+\Delta M)s-(N+\Delta N)t= q+\Delta q, s\geq 0, t\geq 0, s^{T}t=
0.
\end{equation}
Assume that $\{M+\Delta M, N+\Delta N\}$ satisfies the conditions of
Lemma 4.2 such that the perturbed HLCP (\ref{eq:414}) has the unique
solution.
Let
\[
t=\frac{|y|-y}{2} \ \mbox{and}\ s=\frac{|y|+y}{2}.
\]
Then the perturbed HLCP (\ref{eq:414}) is equally transformed into
the following absolute value equations
\begin{equation}\label{eq:415}
\frac{M+N+\Delta M+\Delta N}{2}y-\frac{N-M+\Delta N-\Delta
M}{2}|y|=q+\Delta q.
\end{equation}
By making use of Theorem 3.2 directly and the simple passages,
together with Theorems 2.6, 2.8 and 2.11, and
\[
\frac{\|q\|}{\|x\|}\leq \frac{1}{2}(\|M+N\|+\|M-N\|),
\]
we present the perturbation bound for the HLCP (\ref{eq:41}), see
Theorem 4.6.
\begin{theorem}
Let $x^{\ast}$, $y^{\ast}$ be the unique solutions of AVEs
(\ref{eq:42}) and (\ref{eq:415}), respectively. Then for any
$D=diag(d_{i})$ with $d_{i}\in [-1,1]$ and
$\Lambda=diag(\lambda_{i})$ with $\lambda_{i}\in [0,1]$
\begin{align*}
\frac{\|x^{\ast}-y^{\ast}\|}{\|x^{\ast}\|}
&\leq\overline{\alpha}_{r}\bigg( \frac{\|\Delta
q\|}{\|q\|}\bigg(\frac{\|M+N\|+\|M-N\|}{2}\bigg)+\frac{\|\Delta
M+\Delta N\|+\|\Delta M- \Delta N\|}{2}\bigg),
\end{align*}
with
\[
\overline{\alpha}_{r}=\max\bigg\|\bigg(\frac{M+N+\Delta M+\Delta
N}{2}-\frac{N-M+\Delta N-\Delta M}{2}D\bigg)^{-1}\bigg\|,
\]
or,
\[
\overline{\alpha}_{r}=\max\|(N+\Delta N)(I-\Lambda)+(M+\Delta
M)\Lambda)^{-1}\|.
\]
Moreover, let $\hat{A}=\frac{M+N+\Delta M+\Delta N}{2}$ and
$\hat{B}=\frac{N-M+\Delta N-\Delta M}{2}$. The following statements
hold:
\begin{description}
\item $(i)$ Let $\rho(|\hat{A}^{-1}\hat{B}|)<1$. Then
\begin{equation}\label{eq:416}
\overline{\alpha}_{r}\leq\|(I-|\hat{A}^{-1}\hat{B}|)^{-1}\|\|\hat{A}^{-1}\|.
\end{equation}
\item $ (ii)$ Let
$\sigma_{\min}(\hat{A})>\sigma_{\max}(\hat{B})$. Then
\begin{equation}\label{eq:417}
\overline{\alpha}_{r}\leq\frac{1}{\sigma_{\min}(\hat{A})-\sigma_{\max}(\hat{B})}.
\end{equation}
\item $ (iii)$ Let
$\sigma_{\max}(\hat{A}^{-1}\hat{B})<1$. Then
\begin{equation}\label{eq:418}
\overline{\alpha}_{r}\leq\|\hat{A}^{-1}\hat{B}\|_{2}\|\hat{B}^{-1}\|_{2}.
\end{equation}
\end{description}
\end{theorem}
When $N=I$ and $\Delta N=0$ in Theorem 4.6, we immediately obtain
the corresponding perturbation bound for LCP, see Corollary 4.3.
\begin{cor}
Let $N=I$ and $\Delta N=0$ in Theorem 4.6, and $x^{\ast}$,
$y^{\ast}$ be the unique solutions of AVEs (\ref{eq:42}) and
(\ref{eq:412}), respectively. Then for any $D=diag(d_{i})$ with
$d_{i}\in [-1,1]$ and $\Lambda=diag(\lambda_{i})$ with
$\lambda_{i}\in [0,1]$
\begin{align*}
\frac{\|x^{\ast}-y^{\ast}\|}{\|x^{\ast}\|}
&\leq\overline{\alpha}_{l}\bigg( \frac{\|\Delta
q\|}{\|q\|}\bigg(\frac{\|M+I\|+\|M-I\|}{2}\bigg)+2\|\Delta
M\|\bigg),
\end{align*}
with
\[
\overline{\alpha}_{l}=\max\bigg\|\bigg(\frac{M+I+\Delta
M}{2}-\frac{I-M-\Delta M}{2}D\bigg)^{-1}\bigg\|,
\]
or,
\[
\overline{\alpha}_{l}=\max\|(I-\Lambda+(M+\Delta M)\Lambda)^{-1}\|.
\]
Moreover, let $\tilde{A}=\frac{M+I+\Delta M}{2}$ and
$\tilde{B}=\frac{I-M-\Delta M}{2}$. The following statements hold:
\begin{description}
\item $(i)$ Let $\rho(|\tilde{A}^{-1}\tilde{B}|)<1$. Then
\begin{equation}\label{eq:419}
\overline{\alpha}_{l}\leq\|(I-|\tilde{A}^{-1}\tilde{B}|)^{-1}\|\|\tilde{A}^{-1}\|.
\end{equation}
\item $ (ii)$ Let
$\sigma_{\min}(\tilde{A})>\sigma_{\max}(\tilde{B})$. Then
\begin{equation}\label{eq:420}
\overline{\alpha}_{l}\leq\frac{1}{\sigma_{\min}(\tilde{A})-\sigma_{\max}(\tilde{B})}.
\end{equation}
\item $ (iii)$ Let
$\sigma_{\max}(\tilde{A}^{-1}\tilde{B})<1$. Then
\begin{equation}\label{eq:421}
\overline{\alpha}_{l}\leq\|\tilde{A}^{-1}\tilde{B}\|_{2}\|\tilde{B}^{-1}\|_{2}.
\end{equation}
\end{description}
\end{cor}
Comparing Corollary 4.3 with Theorem 3.1 in \cite{Chen07} (also see
Theorem 4.8 in the following Section 4.3), the perturbation bound in
Corollary 4.3 is more general. Not only that, our perturbation bound
unlike Theorem 3.1 in \cite{Chen07} here does not subject to certain
conditions. In a way, this new perturbation bound for the LCP
perfects the work in \cite{Chen07}. In particular, these computable
estimates of the upper bound in Corollary 4.3 are not limited the
special type of matrix.
\subsection{A new approach for the existing perturbation bounds of LCP}
The approach of the above results gained in the Sections 4.1 and 4.2
is to that the HLCP is equally transformed into the corresponding
absolute value equations by making use of change of variable. As is
known, for the LCP, without making use of change of variable, it is
also transformed into a certain absolute value equations by the fact
that
\[
w=Mz+q, z\geq 0,w \geq 0, z^{T}w = 0 \Leftrightarrow \min\{z,
Mz+q\}=0,
\]
see \cite{Chen06, Zhang09}. Noting that
\[\min\{a,b\}=\frac{1}{2}(a+b-|a-b|)\ \mbox{for}\ \forall a,b \in
\mathbb{R}^{n},
\]
obviously, the LCP $(M,q)$ is equal to the following absolute value
equations
\begin{equation}\label{eq:422}
\frac{1}{2}((M+I)z+q)=\frac{1}{2}|(M-I)z+q|.
\end{equation}
In fact, by making use of the AVEs (\ref{eq:422}), we also obtain
Theorem 2.8 and Theorem 3.1 in \cite{Chen07}. To achieve this goal,
without loss of generality, we consider the relationship between the
solution of the LCP$(A,b)$ and the solution of LCP$(B,p)$. Assume
that $x^{\ast}$ and $y^{\ast}$ are the unique solutions of the
LCP$(A,b)$ and the LCP$(B,p)$, respectively. Then
\begin{equation}\label{eq:423}
\frac{1}{2}((A+I)x^{\ast}+b)=\frac{1}{2}|(A-I)x^{\ast}+b|
\end{equation}
and
\begin{equation}\label{eq:424}
\frac{1}{2}((B+I)y^{\ast}+p)=\frac{1}{2}|(B-I)y^{\ast}+p|.
\end{equation}
Combining (\ref{eq:423}) with (\ref{eq:424}), by the simple
passages, we have
\[
\frac{I+\tilde{D}+(I-\tilde{D})A}{2}(x^{\ast}-y^{\ast})=-\frac{(I-\tilde{D})(A-B)}{2}y^{\ast}-\frac{(I-\tilde{D})(b-p)}{2},
\]
where $\tilde{D}=diag(\tilde{d}_{i})$ with $\tilde{d}_{i}\in
[-1,1]$, which is equal to
\begin{equation}\label{eq:425}
(I-\tilde{\Lambda}+\tilde{\Lambda}
A)(x^{\ast}-y^{\ast})=-\tilde{\Lambda}(A-B)y^{\ast}-\tilde{\Lambda}(b-p),
\end{equation}
where
$\tilde{\Lambda}=\frac{I-\tilde{D}}{2}=diag(\tilde{\lambda}_{i})$
with $\tilde{\lambda}_{i}\in [0,1]$. From (\ref{eq:425}), we have
\begin{align} \label{eq:426}
\|x^{\ast}-y^{\ast}\|=&\|(I-\tilde{\Lambda}+\tilde{\Lambda}
A)^{-1}\tilde{\Lambda}((A-B)y^{\ast}+b-p)\|\nonumber\\
\leq&\|(I-\tilde{\Lambda}+\tilde{\Lambda}
A)^{-1}\tilde{\Lambda}\|\|(A-B)y^{\ast}+b-p\|\nonumber\\
\leq&\|(I-\tilde{\Lambda}+\tilde{\Lambda}
A)^{-1}\tilde{\Lambda}\|(\|A-B\|\|y^{\ast}\|+\|b-p\|)\nonumber\\
\leq&\beta(A)(\|A-B\|\|y^{\ast}\|+\|b-p\|),
\end{align}
where $\beta(A)=\max\{\|(I-\Lambda+\Lambda A)^{-1}\Lambda\|\}$ for
any $\Lambda=diag(\lambda_{i})$ with $\lambda_{i}\in [0,1]$, or
\begin{align} \label{eq:427}
\|x^{\ast}-y^{\ast}\| \leq&\beta(B)(\|A-B\|\|x^{\ast}\|+\|b-p\|),
\end{align}
where $\beta(B)=\max\{\|(I-\Lambda+\Lambda B)^{-1}\Lambda\|\}$ for
any $\Lambda=diag(\lambda_{i})$ with $\lambda_{i}\in [0,1]$.
Noting that 0 is the solution of LCP$(B,p_{+})$, repeating the above
process, we obtain
\begin{equation}\label{eq:428}
\|y^{\ast}\|\leq \beta(B)\|(-p)_{+}\|.
\end{equation}
Furthermore, from $Ax^{\ast}+b\geq0$, we obtain
$(-b)_{+}\leq(Ax^{\ast})_{+}\leq|Ax|$, which implies that
\begin{equation}\label{eq:429}
\frac{1}{\|x^{\ast}\|}\leq\frac{\|A\|}{\|(-b)_{+}\|}.
\end{equation}
Hence, combining (\ref{eq:426}), (\ref{eq:427}), (\ref{eq:428})
with (\ref{eq:429}), we have
\begin{lemma}
Assume that $x^{\ast}$ and $y^{\ast}$ are the unique solutions of
the LCP$(A,b)$ and the LCP$(B,p)$, respectively. Let
$\beta(A)=\max\{\|(I-\Lambda+\Lambda A)^{-1}\Lambda\|\}$ and
$\beta(B)=\max\{\|(I-\Lambda+\Lambda B)^{-1}\Lambda\|\}$ for any
$\Lambda=diag(\lambda_{i})$ with $\lambda_{i}\in [0,1]$. Then
\begin{equation*}\label{eq:430}
\|x^{\ast}-y^{\ast}\| \leq
\beta(A)(\beta(B)\|A-B\|\|(-p)_{+}\|+\|b-p\|)
\end{equation*}
and
\begin{equation*}\label{eq:431}
\frac{\|x^{\ast}-y^{\ast}\| }{\|x^{\ast}\|}\leq
\beta(B)(\|A-B\|+\frac{\|b-p\|\|A\|}{\|(-b)_{+}\|}).
\end{equation*}
\end{lemma}
Let
\begin{equation}\label{eq:432}
\mathcal{ M}:=\{A|\beta(M)\|M-A\|\leq\eta<1\}.
\end{equation}
Then for any $A\in \mathcal{ M}$, we have
\begin{equation}\label{eq:433}
\beta(A)\leq \alpha(M)=\frac{1}{1-\eta}\beta(M),
\end{equation}
see \cite{Chen07}. Together with Lemma 4.7, Theorem 4.8 can be
obtained, i.e., Theorems 2.8 and 3.1 in \cite{Chen07}.
\begin{theorem} (Theorems 2.8 and 3.1 in \cite{Chen07})
Assume that $x^{\ast}$ and $y^{\ast}$ are the unique solutions of
the LCP$(A,b)$ and the LCP$(B,p)$, respectively. Then for any
$A,B\in \mathcal{ M}$, where $\mathcal{ M}$ is defined as in
(\ref{eq:432}),
\begin{equation*}\label{eq:434}
\|x^{\ast}-y^{\ast}\| \leq
\alpha(M)^{2}\|A-B\|\|(-p)_{+}\|+\alpha(M)\|b-p\|,
\end{equation*}
where $\alpha(M)$ is defined in (\ref{eq:433}). Further, let $A=M$,
$B=M+\Delta M$, $b=q$, $p=q+\Delta q$ with $\|\Delta M\|\leq
\epsilon\| M\|$ and $ \|\Delta q\|\leq \epsilon\|(-q)_{+}\|$,
$\epsilon \beta(M)\|M\|=\delta<1$. Then
\begin{equation*}\label{eq:435}
\frac{\|x^{\ast}-y^{\ast}\|
}{\|x^{\ast}\|}\leq\frac{2\delta}{1-\delta}.
\end{equation*}
\end{theorem}
Similarly, here we compare Corollary 4.3 with Theorem 4.8 by a
simple example. For the sake of convenience, we consider two cases
that $M$ is a symmetric positive definite matrix, and also is an
$H_{+}$-matrix. In this case, it's going to be converted to compare
Corollary 3.2 (i) and (ii) in \cite{Chen07} with Corollary 4.3.
Specifically, see Example 4.2.
\textbf{Example 4.2} Assume that $\epsilon$ is a sufficiently small
positive number. Let
\[
M=\left[\begin{array}{ccc}
1.5&0\\
0&1.5
\end{array}\right], q=\left[\begin{array}{ccc}
-1\\
2\sqrt{6}
\end{array}\right].
\]
Obviously, $M$ is a symmetric positive definite matrix, and also is
an $H_{+}$-matrix
Taking $\Delta M=\epsilon M$ with $ \|\Delta q\|\leq
\epsilon\|(-q)_{+}\|$, it is easy to obtain that
\[\kappa_{\infty}(\langle M\rangle)=\kappa_{2}(M)=1,
\]
where $\kappa(\cdot)$ denotes the condition number, see Corollary
3.2 (i) and (ii) in \cite{Chen07}. Hence, we can obtain
\[
\frac{2\delta}{1-\delta}=\frac{2\epsilon}{1-\epsilon}.
\]
From Corollary 4.3 (i), we get
\[
\rho(|\tilde{A}^{-1}\tilde{B}|)=\frac{1+3\epsilon}{5+3\epsilon}<1
\]
and
\[
\|(I-|\tilde{A}^{-1}\tilde{B}|)^{-1}\|_{\infty}\|\tilde{A}^{-1}\|_{\infty}=\frac{5+3\epsilon}{4}\times\frac{2}{2.5+1.5\epsilon}=1.
\]
Further,
\begin{align*}
&\frac{\|\Delta
q\|_{\infty}}{\|q\|_{\infty}}\bigg(\frac{\|M+I\|_{\infty}+\|M-I\|_{\infty}}{2}\bigg)+\epsilon\|M\|_{\infty}\\
\leq&
\frac{\epsilon\|(-q)_{+}\|_{\infty}}{\|q\|_{\infty}}\bigg(\frac{\|M+I\|_{\infty}+\|M-I\|_{\infty}}{2}\bigg)+\epsilon\|M\|_{\infty}\\
=&(\frac{1}{4\sqrt{6}}+\frac{1}{2})3\epsilon.
\end{align*}
Hence,
\begin{align*}
&\|(I-|\tilde{A}^{-1}\tilde{B}|)^{-1}\|_{\infty}\|\tilde{A}^{-1}\|_{\infty}\bigg(\frac{\epsilon\|(-q)_{+}\|_{\infty}}{\|q\|_{\infty}}\bigg(\frac{\|M+I\|_{\infty}+\|M-I\|_{\infty}}{2}\bigg)+\epsilon\|M\|_{\infty}\bigg)\\
=&(\frac{1}{4\sqrt{6}}+\frac{1}{2})3\epsilon.
\end{align*}
It is easy to check that
\[
(\frac{1}{4\sqrt{6}}+\frac{1}{2})3\epsilon<\frac{2\epsilon}{1-\epsilon}.
\]
From Corollary 4.3 (ii), we get
\[
\sigma_{\min}(\tilde{A})=\frac{2.5+1.5\epsilon}{2},
\sigma_{\max}(\tilde{B})=\frac{0.5+1.5\epsilon}{2},
\]
frow which we have
\[
\frac{1}{\sigma_{\min}(\tilde{A})-\sigma_{\max}(\tilde{B})}=1.
\]
Further,
\begin{align*}
&\frac{\|\Delta
q\|_{2}}{\|q\|_{2}}\bigg(\frac{\|M+I\|_{2}+\|M-I\|_{2}}{2}\bigg)+\epsilon\|M\|_{2}\\
\leq&\frac{\epsilon\|(-q)_{+}\|_{2}}{\|q\|_{2}}\bigg(\frac{\|M+I\|_{2}+\|M-I\|_{2}}{2}\bigg)+\epsilon\|M\|_{2}=1.8\epsilon.
\end{align*}
In this case,
\[
\frac{1}{\sigma_{\min}(\tilde{A})-\sigma_{\max}(\tilde{B})}\bigg(
\frac{\epsilon\|(-q)_{+}\|_{2}}{\|q\|_{2}}\bigg(\frac{\|M+I\|_{2}+\|M-I\|_{2}}{2}\bigg)+\epsilon\|M\|_{2}\bigg)=1.8\epsilon.
\]
It is easy to check that
\[
1.8\epsilon<\frac{2\epsilon}{1-\epsilon}.
\]
From Corollary 4.3 (iii), we have
\[
\sigma_{\max}(\tilde{A}^{-1}\tilde{B})=\frac{1+3\epsilon}{5+3\epsilon}<1
\ \mbox{and} \
\sigma_{\max}(\tilde{B}^{-1})=\frac{2}{0.5+1.5\epsilon}.
\]
Likewise, it is easy to check that
\[
\frac{1+3\epsilon}{5+3\epsilon}\times\frac{2}{0.5+1.5\epsilon}\times1.8\epsilon<\frac{2\epsilon}{1-\epsilon}.
\]
The above numerical results show that our presented upper bounds,
(i), (ii) and (iii) in Corollary 4.3, are sharper than Corollary
3.2 (i) and (ii) in \cite{Chen07} under certain conditions. This
implies that our presented upper bounds, (i), (ii) and (iii) in
Corollary 4.3, are significative in a way.
\section{Numerical examples}
In this section, we focus on investigating the feasibility of the
relative perturbation bounds of Theorem 3.2 and Theorem 3.6 in the
Section 3 by making use of some numerical examples. For the sake of
convenience, we consider the AVEs (\ref{p1})
\[
Ax-B|x|=b,\ \mbox{with} \ A=I+M, B=I-M \ \mbox{and}\ b=-q,
\]
which is from the LCP (\ref{eq:14}) by making use of change of
variable $z=|x|+x$ and $w=|x|-x$. For the convenient comparison,
here we introduce some notations, i.e.,
\[
r=\frac{\|x^{\ast}-y^{\ast}\|_{2}}{\|x^{\ast}\|_{2}},
w=\frac{\|\Delta b\|_{2}}{\|b\|_{2}}(\|A\|_{2}+\|B\|_{2})+\|\Delta
A\|_{2}+\|\Delta B\|_{2},
\]
\[
\tau=\|(I-|\mathcal{A}^{-1}\mathcal{B}|)^{-1}\|_{2}\|\mathcal{A}^{-1}\|_{2}w,
\upsilon=\frac{1}{\sigma_{\min}(\mathcal{A})-\sigma_{\max}(\mathcal{B})}w,
\nu=\|\mathcal{A}^{-1}\mathcal{B}\|_{2}\|\mathcal{B}^{-1}\|_{2}w
\]
and
\[
\delta=\frac{\epsilon\|(I-|A^{-1}B|)^{-1}|A^{-1}|(|
b|+(|A|+|B|)|x^{\ast}|)\|_{2}}{(1-\epsilon\|(I-|A^{-1}B|)^{-1}|A^{-1}|(|A|+|B|)\|_{2})\|x^{\ast}\|_{2}},
\]
where $\mathcal{A}=A+\Delta A$ and $\mathcal{B}=B+\Delta B$,
$x^{\ast}$ and $y^{\ast}$ denote the solutions of the corresponding
AVEs and the perturbed AVEs, respectively, which can be obtained by
using the iteration method on page 364 in \cite{Mangasarian06} with
the initial vector being zero and the corresponding absolute error
less than $10^{-6}$. All the computations are done in Matlab R2021b
on an HP PC (Intel@ Celeron@ G4900, 3.10GHz, 8.00 GB of RAM).
\textbf{Example 5.1} \cite{Ahn83} Let
\[
M=\mbox{tridiag}(1,4,-2)\in \mathbb{R}^{n\times n}, q=-4e\in
\mathbb{R}^{n}.
\]
Obviously, $M$ is an $H_{+}$-matrix. This implies that the
corresponding LCP has a unique solution, i.e., the equal AVEs has a
unique solution.
One is interested in the perturbation error for the solution of the
corresponding AVEs (\ref{p1}) caused by small changes in $A$, $B$
and $b$. The perturbation way we do it is
\[
\Delta A=\epsilon\mbox{tridiag}(1,2,-1), \Delta
B=\epsilon\mbox{tridiag}(1,1,1), \Delta b=\epsilon e.
\]
\begin{table}[!htb] \centering
\begin{tabular}
{p{10pt}p{55pt}p{55pt}p{55pt}p{55pt}p{55pt}} \hline
$\epsilon$&0.01&0.015&0.02 &0.025&0.03
\\\hline
$r$& 0.0040 & 0.0061 & 0.0081 & 0.0101 & 0.0122 \\
$\tau$& 0.2845 & 0.4124 & 0.5321 & 0.6442 & 0.7495\\
$\upsilon$& 0.0465 & 0.0692 & 0.0916 & 0.1138 & 0.1356 \\
$\nu$& 0.0305 & 0.0460 & 0.0617 & 0.0774 & 0.0934\\
$\delta$& 0.0048 & 0.0072& 0.0097 & 0.0121 & 0.0146 \\
\hline
\end{tabular}
\\ \caption{Relative perturbation bounds of Example 5.1 with $n=30$.}
\end{table}
\begin{table}[!htb] \centering
\begin{tabular}
{p{10pt}p{55pt}p{55pt}p{55pt}p{55pt}p{55pt}} \hline
$\epsilon$&0.01&0.015&0.02 &0.025&0.03
\\\hline
$r$&0.0041 & 0.0061 & 0.0082 & 0.0102 & 0.0123 \\
$\tau$& 0.2956& 0.4282& 0.5519 & 0.6677 & 0.7762\\
$\upsilon$& 0.0473 & 0.0704 & 0.0932 & 0.1157 & 0.1378\\
$\nu$& 0.0307 & 0.0463& 0.0621& 0.0780 & 0.0940 \\
$\delta$& 0.0046 & 0.0069& 0.0093 & 0.0116& 0.0140 \\
\hline
\end{tabular}
\\ \caption{Relative perturbation bounds of Example 5.1 with $n=40$.}
\end{table}
In Tables 5.1 and 5.2, we list the numerical results for four
relative perturbation bounds with the different size and $\epsilon$,
from which we find that among four relative bounds, $\delta<\nu$,
$\delta<\upsilon$ and $\delta<\tau$, i.e., $\delta$ is closet to the
true relative error. In addition, these numerical results also
illustrate that the proposed bounds are very close to the real
relative value when the perturbation is very small. From Tables 5.1
and 5.2, it is easy to find that the relative perturbation bounds
given by Theorem 3.2 and Theorem 3.6 are feasible and effective
under some suitable conditions.
Next, we investigate another example, which is from \cite{Bai10}.
\textbf{Example 5.2} \cite{Bai10} Let $M=\hat{M}+\mu I$,
$q=-Mz^{\ast}$, where $\mu =4$,
\[\hat{M}=\mbox{blktridiag}(-I,S,-I)\in \mathbb{R}^{n\times n},
S=\mbox{tridiag}(-1,4,-1)\in \mathbb{R}^{m\times m}, n=m^{2}, \] and
$z^{\ast}=(1,2,1,2,\ldots,1,2,\ldots)^{T}\in \mathbb{R}^{n}$ is the
unique solution of the corresponding LCP. Of course, the equal AVEs
has a unique solution as well.
For Example 5.2, the perturbation way we do it is
\[
\Delta A=\epsilon\mbox{tridiag}(-1,2,-1), \Delta
B=\epsilon\mbox{tridiag}(1,-1,1), \Delta b=\epsilon e.
\]
\begin{table}[!htb] \centering
\begin{tabular}
{p{10pt}p{55pt}p{55pt}p{55pt}p{55pt}p{55pt}} \hline
$\epsilon$&0.01&0.015&0.02 &0.025&0.03
\\\hline
$r$& 0.0028& 0.0042& 0.0056& 0.0070& 0.0084 \\
$\tau$& 0.2571 & 0.3870& 0.5177& 0.6493 & 0.7817 \\
$\upsilon$& 0.0422& 0.0631& 0.0839 & 0.1046& 0.1252 \\
$\nu$& 0.0268& 0.0403& 0.0538 & 0.0674 & 0.0810 \\
$\delta$& 0.0055& 0.0083& 0.0111& 0.0139& 0.0167 \\
\hline
\end{tabular}
\\ \caption{Relative perturbation bounds of Example 5.2 with $n= 225$.}
\end{table}
\begin{table}[!htb] \centering
\begin{tabular}
{p{10pt}p{55pt}p{55pt}p{55pt}p{55pt}p{55pt}} \hline
$\epsilon$&0.01&0.015&0.02 &0.025&0.03
\\\hline
$r$& 0.0030 & 0.0045 & 0.0060 & 0.0075 & 0.0090 \\
$\tau$& 0.2798& 0.4212& 0.5637& 0.7071 & 0.8516 \\
$\upsilon$& 0.0466& 0.0697& 0.0927& 0.1155 & 0.1382 \\
$\nu$& 0.0284 & 0.0426& 0.0569& 0.0713 & 0.0857 \\
$\delta$& 0.0055 & 0.0083 & 0.0111 & 0.0139& 0.0167 \\
\hline
\end{tabular}
\\ \caption{Relative perturbation bounds of Example 5.2 with $n=400$.}
\end{table}
Similarly, with the different size and $\epsilon$, Tables 5.3 and
5.4 list these four relative perturbation bounds for Example 5.2.
From Tables 5.3 and 5.4, we can draw the same conclusion. That is
to say, among these four bounds, $\delta$ is optimal, compared with
other three bounds. These numerical results in Tables 5.3 and 5.4
further illustrate that when the perturbation term is very small,
the proposed bounds are very close to the real relative value.
Meanwhile, this further confirms that under some suitable
conditions, Theorem 3.2 and Theorem 3.6 indeed provide some valid
relative perturbation bounds.
\section{Conclusion}
In this paper, by introducing a class of absolute value functions,
the frameworks of error and perturbation bounds of two types of
absolute value equations (AVEs) have been established. After then,
by applying the absolute value equations, the frameworks of error
and perturbation bounds for the horizontal linear complementarity
problem (HLCP) are obtained. Incidentally, some equal new frameworks
of error bounds for linear complementarity problem (LCP) are given
and its more general perturbation bound is presented as well.
Besides, without limiting the matrix type, some computable estimates
for the above upper bounds are given, which are sharper than some
existing results under certain conditions. In addition, some
numerical examples for absolute value equations from the LCP are
given to show the feasibility of the proposed perturbation bounds.
\section*{Data Availability Statement} The data that support the findings
of this study are available from the corresponding author upon
request.
|
\section{Introduction}
\paragraph{Motivation}
Members of marginalized communities are often accused of being \textit{too sensitive} when it comes to supposedly harmless acts of microaggression. Sexist comments are regarded as \textit{locker room talk}. Racist jokes are viewed as \textit{harmless fun}. Misgendering of trans people is downplayed as \textit{a mistake that can happen}.
Microaggressions have been shown to cause significant emotional harm. Nonetheless, victims are often met with incomprehension, defensiveness, or even ridicule when pointing out microaggressions. Stereotypes like the \textit{snowflake liberal} and the \textit{shrill feminist who can't take a joke} paint members of marginalized communities as irrational and dismiss the pain and harm inflicted upon them.
\paragraph{Contribution}
This paper applies computer simulation to the phenomenon of microaggressions. Observing interactions of marginalized and non-marginalized agents in simulated societies with varying prevailing convictions should enable a better understanding of how prejudice against marginalized communities becomes an epistemic belief.
\paragraph{Outline}
The following section highlights notable related research in the fields of computational ethics and the social sciences. Next, the methodological principles for a model are outlined. A prototype for a NetLogo simulation has been implemented and it's behavior is described. Finally, possible directions for future work on this topic are discussed.
\section{Related Work}
\paragraph{Computational Ethics}
Computational ethics makes use of "agent-based simulation [to apply a] a computational perspective to ethics theory" \cite[76]{quigley_computational_2007} by simulating agents capable of adopting malleable ethical principles and observing how interactions impact their ethical principles. Such simulations can provide descriptive\footnote{It can only be concluded how the input relates to the output (descriptive), not what input is required to achieve a certain output (perscriptive) \cite[76]{quigley_computational_2007}.} insights into how individual ethical principles impact societal dynamics.
\begin{figure}[!htb]
\centering
\includegraphics[width=\textwidth]{img/simulated_society.png}
\caption{Computational ethics observes simulated societies consisting of interacting agents with individual ethical principles. Photos (c) 1999 Warner Bros.}
\label{fig:simulated_society}
\end{figure}
\paragraph{Microaggressions}
Microaggressions were initially conceptualized to describe unacknowledged racism experienced by African Americans \cite{pierce_offensive_1970}. Since other marginalized groups are subjected to similar types of discrimination, the definition has been extended and generalized over the years. More recent definitions literature defines microaggressions as "brief and commonplace daily verbal, behavioral, and environmental indignities, whether intentional or unintentional, that communicate hostile, derogatory, or negative racial, gender, sexual orientation, and religious slights and insults to the target person or group" \cite{sue_microaggressions_2010}. Since prevailing biases influence all members of society, even well-intentioned people will unconsciously commit microaggressions. The relentlessness of these unintentional indignities can cause emotional harm comparable to more obvious intentional and outright malicious types of discrimination such as slurs and acts of physical violence \cite{sue_microaggressions_2010} \cite{kapusta_misgendering_2016} \cite{kelly_2021}.
\paragraph{Colorblind Ideology}
Some people, however, profess the idea of a \textit{colorblind ideology} by which they claim to be uninfluenced by societal bias or even deny the existence thereof\cite{eisen_combating_2020}. This kind of ideology provides individuals with numerous ways to downplay and and deny the impact of racism \cite{eisen_combating_2020}. Eisen identifies four types of colorblind racism: abstract liberalism, naturalization, cultural racism, and minimization of racism \cite{eisen_combating_2020}. "By employing these frames, individuals divert their attention away from racism and effectively engage in racialized discourse without appearing racist" \cite{eisen_combating_2020}.
Individuals often react defensively when their beliefs are challenged. As such, reluctance to acknowledge microaggressions is a common reaction \cite{eisen_combating_2020}. Such defensive reactions might include the argument that those affected by microaggressions are just too sensitive. However, people who proffer this argument rarely understand the nature of microaggressions and how constant exposure may affect people. For an unintentional perpetrator being criticized, it might seem that the person is overreacting because they are usually oblivious to the countless other incidents. Closer examination however reveals that "victims of microaggression need not to just develop ‘thick skin’ to overcome the epistemic harm of microaggression but need some form of support or epistemic resources to overcome these disadvantages" \cite[21]{kelly_2021}
\paragraph{Approach}
By a qualitative analysis, one can understand how the microaggressions and prejudices against people pointing them out may emerge on the individual level. Applying a computational ethics simulation might provide further insights into this dynamic on the societal level.
\section{Methodology}
This chapter introduces the conceptual ideas that constitute the model and describes the prototype implementation in the multi-agent simulation framework NetLogo \cite{wilensky_netlogo_1999}.
\subsection{Model}
The model is constructed according to the following principles:
\begin{enumerate}
\item A society consists of a number of agents with individually held believes. We observe how much agents agree with the following two statements:
\begin{enumerate}
\item[1.] "Microaggressions do not constitute a wrong."
\item[2.] "Marginalized agents are overly sensitive."
\end{enumerate}
\item An agent might identify as part of the marginalized community within the society.
\item Agents interact with each other randomly.
\item A microaggression does not need to be targeted towards an individual agent.
\item The decision to commit a microaggression does not have to be conscious, nor does the perpetrator have to be aware that their action constituted a microaggression. Whether or not an agent will commit a microaggression depends on their conviction that microaggressions do not constitute a moral wrong. As such, they may commit a microaggression if and only if their agreement with statement 1 is sufficiently high.
\item An Agent witnessing a microaggression will react positively, neutrally, or negatively based on whether or not they consider microaggressions a moral wrong, i.e., their agreement with statement 1. A perpetrator's conviction may be influenced by the reaction they received, and the reacting agent's convictions might themselves be influenced by the reaction they have given. Negative feedback might be accepted or rejected by the perpetrator. If a perpetrator rejects negative feedback from a marginalized agent, the conviction that marginalized agents are overly sensitive may be reinforced.
\item Consumed media and other background noise might subconsciously influence agents' convictions positively or negatively independent from interactions.
\item For simplicity, only one type of marginalization is observed at a time. Intersectionality\footnote{The concept of intersectionality plays an important role when discussing topics of marginalization, as it enables the analysis of situations where a person is affected by multiple types of marginalization at once. The term was coined by Kimberle Crenshaw in 1989, highlighting that the marginalization experienced by black women "cannot be understood through an analysis of patriarchy rooted in white experience" \cite[156f]{bartlett_demarginalizing_2018}.} is considered out of scope as of now.
\end{enumerate}
\subsection{Simulation} \label{text:simulation}
This section explains the prototype implementation\footnote{The model is available under \url{https://neothethird.gitlab.io/ceth-seminar/model.nlogo}.} of the previously described model in as an agent-based simulation in NetLogo.
\paragraph{Fundamental Principles}
Marginalized and Non-Marginalized agents can be initialized with normal-distributed agreement percentages for two convictions:
\begin{itemize}
\item \texttt{c1}: "microaggressions do not constitute a wrong"
\item \texttt{c2}: "members of the marginalized group are overly sensitive"
\end{itemize}
The simulation runs until one of three possible end conditions is reached:
\begin{enumerate}
\item \texttt{equilibrium: no potential perpetrators}: Microaggressions have effectively been eradicated; there are no agents with \texttt{c1 >= action\_threshold}.
\item \texttt{equilibrium: no negative reactors}: Microaggressions have become so normalized that no-one speaks up against them; there are no agents with \texttt{c1 <= negative\_threshold}.
\item \texttt{deadlock: society is too polarized for change}: All agents either have very strong agreement or disagreement with \texttt{c1}. Change is improbable due to the high polarization.
\end{enumerate}
Agents can interact with one another one-to-one and may commit microaggressions in these interactions. An agent witnessing a microaggression may react positively, negatively, or neutrally. This behavior is configured through thresholds that control Poisson-distributed probability values calculated for every interaction. Example: Suppose the \texttt{action\_threshold} is set to \texttt{75\%}. All agents with \texttt{c1 >= 75} may now theoretically become perpetrators. Whether or not an agent actually commits a microaggression is determined by \texttt{c1 >= individual\_action\_threshold}, where \texttt{individual\_action\_threshold} is a poisson-distributed probability variable with a mean of \texttt{(action\_threshold + (100 - action\_threshold) / 2) = 75 + 12.5 = 87.5}. Thus, the higher the \texttt{c1} of an agent, the higher their chance of becoming a perpetrator.
Reactions are Poisson-distributed as well. Positive reactions are controlled by the \texttt{individual\_positive\_threshold}, a Poisson-distributed probability variable with a mean of \texttt{(positive\_threshold + (100 - positive\_threshold) / 2)}; halfway between \texttt{100} and \texttt{positive\_threshold}. Negative reactions are controlled by \texttt{individual\_negative\_\\threshold}, a poisson-distributed probability variable with a mean halfway between \texttt{0} and \texttt{negative\_threshold}, i.e., \texttt{negative\_threshold / 2}.
\paragraph{Visualization}
Agents are rendered on a a two-dimensional plane (see Figure \ref{fig:simulation}) based on their convictions with the \texttt{x}-axis representing \texttt{c1} and the \texttt{y}-axis representing \texttt{c2}.
\begin{figure}[!htb]
\centering
\includegraphics[scale=.42]{img/simulation.png}
\caption{Screenshot of the NetLogo model's visualized society.}
\label{fig:simulation}
\end{figure}
The \texttt{action\_threshold} is represented by a vertical black line. Agents right of this line are potential perpetrators. The green area represents the \texttt{positive\_threshold}; Agents in this area might react positively to microaggressions. The red area represents the \texttt{negative\_threshold}; Agents in this area might react negatively to microaggressions. The grey area contains agents that will always react neutrally to microaggressions, as their \texttt{c1} is below the \texttt{positive\_threshold} and above the \texttt{negative\_threshold}. Marginalized agents are represented by a \textbf{-}, non-marginalized agents by a \textbf{+}. If an agent is tinted red, it will commit a microaggression in this tick. Otherwise, agents are tinted white. An arrow points from the perpetrator of a microaggression to the reacting agent. A pink arrow indicates a positive reaction to the microaggression; blue indicates neutral, and yellow indicates negative. If a perpetrator receives a negative reaction and accepts the criticism, they will be marked with the label "accept". Otherwise, with the label "reject". The output field beneath the map displays end conditions for the simulation. Monitors reporting values in the form of\texttt{[non\_marginalized + marginalized = total]} (see Figures \ref{fig:general}, \ref{fig:action}, and \ref{fig:reaction}) are used to show how many agents a specific claim applies to at any given time; overall and broken down by whether or not they are marginalized. The user interface also includes various plots (see Section \ref{text:validation}) that are updated in real time.
\vspace{-.25cm}
\paragraph{General Controls}
Sliders \texttt{population} and \texttt{margin\_size} (see Figure \ref{fig:general}) control the number of agents and the percentage of marginalized agents. The \texttt{setup} button will initialize a society based on the current configuration, \texttt{go} will start the simulation. the \texttt{go once} and \texttt{go 5x} buttons can be used for step-by-step execution. Pre-configured scenarios can be loaded using the \texttt{load scenario...} button. Every scenario is explained after selection.
\begin{figure}[!htb]
\centering
\includegraphics[scale=.45]{img/general.png}
\caption{Screenshot of the NetLogo model's general controls. The society consists of 257 agents, 10.5\% (=26) of which are marginalized, leaving 231 non-marginalized agents.}
\label{fig:general}
\end{figure}
\vspace{-.75cm}
\paragraph{Conviction Initialization}
Convictions one (\texttt{c1}) and two (\texttt{c2}) for marginalized (\texttt{m}) and non-marginalized (\texttt{p}) agents are initialized as normal-distributed values with a \texttt{mean} and a \texttt{deviation} using sliders (see Figure \ref{fig:conviction_init}) in the form of \texttt{<p|m>\_<c1|c2>\_<deviation|mean>}.
\begin{figure}[H]
\centering
\includegraphics[scale=.45]{img/conviction_init.png}
\caption{Screenshot of the NetLogo model's conviction sliders.}
\label{fig:conviction_init}
\end{figure}
\paragraph{Action Behavior}
The \texttt{action\_threshold} slider (see Figure \ref{fig:action}) controls the minimum required \texttt{c1} for an agent to commit a microaggression.
\begin{figure}[!htb]
\centering
\includegraphics[scale=.66]{img/action.png}
\caption{Screenshot of the NetLogo model's action controls.}
\label{fig:action}
\end{figure}
\paragraph{Reaction Behavior}
The \texttt{positive\_threshold} (see Figure \ref{fig:reaction}) controls the minimum required \texttt{c1} for an agent to react positively to a microaggression. Similarly, the \texttt{negative\_\\threshold} specifies the maximum allowed \texttt{c1} for an agent to react negatively to a microaggression.
\begin{figure}[!htb]
\centering
\includegraphics[scale=.66]{img/reaction.png}
\caption{Screenshot of the NetLogo model's reaction controls.}
\label{fig:reaction}
\end{figure}
\paragraph{Miscellaneous Controls}
The \texttt{critical\_faculty} slider (see Figure \ref{fig:misc}) allows setting the likelihood of a perpetrator accepting criticism when made aware of a microaggression they committed. The \texttt{stealth} slider enables the simulation of types of marginalization that are less recognizable to other agents by specifying the likelihood of an agent not recognizing another agent as marginalized.
\begin{figure}[!htb]
\centering
\includegraphics[scale=.66]{img/misc.png}
\caption{Screenshot of the NetLogo model's miscellaneous controls.}
\label{fig:misc}
\end{figure}
\paragraph{Reactions}
Changes in convictions one (\texttt{c1}) and two (\texttt{c2}) due to interactions can be set individually for marginalized (\texttt{m}) and non-marginalized (\texttt{p}) agents. If no microaggression occurs in an interaction, the \texttt{idle} value is applied. Otherwise, a \texttt{positive}, \texttt{neutral}, or \texttt{negative} reaction might be given \texttt{to} or received \texttt{from} a marginalized (\texttt{m}) or non-marginalized (\texttt{p}) agent. A received \texttt{negative} reaction might be \texttt{accepted} or \texttt{rejected}.
Sliders (see Figure \ref{fig:reactions}) take the form \texttt{<p|m>\_<c1|c2>\_on\_<idle|<<positive\_<to|from>|\\neutral\_<to|from>|negative\_<to|accepted\_from|rejected\_from>>\_<p|m>>}.
Example: A privileged agent, Bob, commits a microaggression in an interaction with a marginalized agent, Alice, who reacts neutrally. Bob's convictions change based on \texttt{p\_c1\_on\_neutral\_from\_m} and \texttt{p\_c2\_on\_neutral\_from\_m} respectively, while Alice's convictions change based on \texttt{m\_c1\_on\_neutral\_to\_p} and \texttt{m\_c2\_on\_neutral\_to\_p}.
\begin{figure}[!htb]
\centering
\includegraphics[width=\textwidth]{img/reactions.png}
\caption{Screenshot of the NetLogo model's reactions sliders.}
\label{fig:reactions}
\end{figure}
\paragraph{Noise}
Background noise changes to convictions one (\texttt{c1}) and two (\texttt{c2}) for marginalized (\texttt{m}) and non-marginalized (\texttt{p}) agents are modeled as normal-distributed values with a \texttt{mean} and a \texttt{deviation} using sliders in the form of \texttt{<p|m>\_<c1|c2>\_noise\_<deviation|mean>}.
\begin{figure}[!htb]
\centering
\includegraphics[scale=.465]{img/noise.png}
\caption{Screenshot of the NetLogo model's noise sliders.}
\label{fig:noise}
\end{figure}
\section{Basic Validation}\label{text:validation}
This section provides some experimental results generated by the prototype. Note that this is not yet an attempt at full validation of the model and only serves to show how the model behaves. The two simulation runs with different conviction initialization values and otherwise identical configurations are compared to observe potential behavioral differences. The next subsection describes the configuration, followed by an outline of the results and noteworthy observations.
\subsection{Configuration}
The model is configured as follows; the full configuration is provided in Appendix \ref{text:config}. The \texttt{population} consists of 500 agents, with a \texttt{margin\_size} of 10.5\%. The \texttt{stealth} likelihood is negligibly low at 1\%, and \texttt{critical\_faculty} is set to 50\%. Ergo, marginalized agents are almost always read as such, and perpetrators of microaggressions accept criticism in half of the cases. A relatively low \texttt{positive\_threshold} has been chosen at 50\%, allowing agents to commit microaggressions even if they only slightly agree with \texttt{c1}. This is meant to model the unintentional nature of many microaggressions. The \texttt{action\_threshold} is only slightly higher at 66.6\%. Contrarily, the \texttt{negative\_threshold} is fairly low at 15\%, requiring high disagreement with \texttt{c1} for agents to react negatively. Non-marginalized agents are initialized to have generally higher agreements with both convictions, although there is significant variance. Marginalized agents generally have lower agreement with \texttt{c1}, and very low agreement with \texttt{c2}. For trial 1, \texttt{p\_c1\_mean} is set to 45\%; for trial 2, \texttt{p\_c1\_mean} is set to 66.6\%. This models a society where microaggressions are less and more common, respectively.
\subsection{Results}
\paragraph{Trial 1: \texttt{p\_c1\_mean = 45}}
Trial 1 starts out with a fairly balanced \texttt{c1} and \texttt{c2} among non-marginalized agents, and balanced \texttt{c1} and low \texttt{c2} among marginalized agents (see top-left image in Figure \ref{plot:trial}). Both convictions show a mostly steady decline (see top image in \ref{plot:convictions}), resulting in a steadily growing number of negative reactors (see top image in Figure \ref{plot:reactions}). The simulation results in the stop condition \texttt{equilibrium: no potential perpetrators} after 710 ticks (see top-right image in Figure \ref{plot:trial}). At this point, overall average \texttt{c1} is just below the \texttt{negative\_threshold} of 15\%.
\paragraph{Trial 2: \texttt{p\_c1\_mean = 66.6}}
Trial 2 starts out with generally higher \texttt{c1} and balanced \texttt{c2} among non-marginalized agents, and balanced \texttt{c1} and low \texttt{c2} among marginalized agents (see bottom-left image in Figure \ref{plot:trial}). At the start, about 80\% of non-marginalized agents are potential positive reactors. The value quickly rises and stalls at about 99\% (see top-right image in Figure \ref{plot:reactions_groups}). Marginalized agents start out at only about 9.5\% positive reactors, but follow this trend with a small delay and stalling at about 85\% (see bottom-right image in Figure \ref{plot:reactions_groups}). Overall average \texttt{c2} conviction falls and saturates at about 10\% (see bottom image in \ref{plot:convictions}). The simulation results in the stop condition \texttt{deadlock: society is too polarized for change} after 1508 ticks (see bottom-right image in Figure \ref{plot:trial}). At this point, overall average \texttt{c1} is about 97.5\% (see bottom image in Figure \ref{plot:convictions}) with the remaining agents maintaining low \texttt{c1} mostly belonging to the marginalized community (see left column in Figure \ref{plot:convictions_groups}).
\begin{figure}[!htb]
\centering
\includegraphics[width=.49\textwidth]{plots/1/before.png}
\includegraphics[width=.49\textwidth]{plots/1/after.png}
\\[\smallskipamount]
\includegraphics[width=.49\textwidth]{plots/2/before.png}
\includegraphics[width=.49\textwidth]{plots/2/after.png}
\caption{Visualization of the simulated society for trial 1 with \texttt{p\_c1\_mean = 45} on top and trial 2 with \texttt{p\_c1\_mean = 66.6} below at initialization on the left and after reaching the stop condition on the left.}
\label{plot:trial}
\end{figure}
\begin{figure}[!htb]
\centering
\includegraphics[width=\textwidth]{plots/1/convictions.png}
\\[\smallskipamount]
\includegraphics[width=\textwidth]{plots/2/convictions.png}
\caption{The convictions plot depicts the average agreement with \texttt{c1} (grey) and \texttt{c2} (orange) in the simulated society. For orientation, the \texttt{action\_threshold} (black), \texttt{positive\_threshold} (green), and \texttt{negative\_threshold} (red) are visualized as well. The upper plot represents trial 1, the lower plot represents trial 2.}
\label{plot:convictions}
\end{figure}
\begin{figure}[!htb]
\centering
\includegraphics[width=\textwidth]{plots/1/reactions.png}
\\[\smallskipamount]
\includegraphics[width=\textwidth]{plots/2/reactions.png}
\caption{The reactions plot depicts the percentage of agents above the positive threshold (potential positive reactors, green), below the negative threshold (potential negative reactors, red), and in between the thresholds (neutral reactors, grey). The upper plot represents trial 1, the lower plot represents trial 2.}
\label{plot:reactions}
\end{figure}
\section{Discussion}
Intuitively, the behavior seen in the trials seems plausible. Lower initial \texttt{c1}, as seen in trial 1, allows the agents to slowly be convinced of the harmful nature of microaggressions, while the higher initial \texttt{c1} of trial 2 results in a critical mass of agents being so radicalized that the society ends up becoming too polarized for change. This is an acceptable result for a first prototype, but the behavior should be analyzed and refined in future research.
The impact of the \texttt{noise} parameter requires further examination. With the low \texttt{negative\_threshold} and \texttt{positive\_threshold} used in this paper, the potential negative reactors have a much higher chance of being pushed above \texttt{negative\_threshold} than a potential positive reactor has of being pulled below \texttt{positive\_threshold}. Implementing different noise parameters for agents in different threshold ranges would be possible.
With the configuration used in this paper (see Section \ref{text:validation}), overall \texttt{c2} still falls even in frequent perpetrators with high \texttt{c1}. The relevant parameters should be re-evaluated to allow more insights into the dynamic between \texttt{c1} and \texttt{c2}.
Due to NetLogo's simple design, complex constraints like intersectionality (see Section \ref{text:simulation}) can become challenging. Re-implementing the model in a simulation framework that supports an object-oriented class-based approach to dynamically model different types of marginalization might be advised.
\section{Conclusion and Outlook}
\subsection{Future Work}
The model should be improved and possibly re-implemented in a simulation framework that allows for more flexibility than NetLogo. This would make implementing additional configuration options for more granular control easier.
The model's default parameters should be refined and, if possible, validated against real-world empirical data. Different "scenarios" to explore the situation of specific real-world marginalized communities could be researched and pre-configured to be loaded in the model's user interface. Introducing a \texttt{false\_positive\_clock} configuration parameter analog to \texttt{stealth} could be added to model cases where agents might falsely read a non-marginalized agent as marginalized.
There are many possibilities for extending the background logic, such as allowing an agent's \texttt{c1} to influence their \texttt{critical\_faculty}, and introducing interdependency between an agent's \texttt{c2} and \texttt{c1}.
\subsection{Final Remarks}
This paper set out to apply a computational ethics approach to the phenomenon of microaggressions and the prejudices against marginalized communities that arise from it. A basic model has been theorized, and a prototype for a simulation has been implemented in NetLogo. The fundamental viability of the approach has been demonstrated, and possible expansions for future research have been discussed. Readers are encouraged to conduct their own experiments with the model, which has been made available under \url{https://neothethird.gitlab.io/ceth-seminar/model.nlogo}.
|
\section{Introduction}
\label{intro}
The first two decades of the \nth{21} century saw an unusual volume of all kinds of catastrophes worldwide. Some of the unforgettable events included the 9/11 terrorist attacks in 2001, Hurricane Katrina in 2005, the Global Financial Crisis in 2008, Japan's nuclear disaster in 2011, and the Covid-19 pandemic in 2019. Today, catastrophe risk is anything but declining; the frequency and the severity of catastrophes are expected to rise in the future with the rising risk of climate change. Despite that catastrophes, whether they are natural or man-made, have become increasingly common, societies still fail to manage their catastrophe risks and are vulnerable to devastating losses in wealth and lives. Catastrophe risk management can be done in a few ways. A major way, which is the focus of this paper, is to invest in catastrophe insurance. However, empirical evidence shows that catastrophe insurance markets fail to provide adequate levels of protection in many parts of the world \citep{kunreuther2013insurance}. For instance, homeowners in Florida's hurricane-prone areas decided to cut their \textit{subsidized} home insurance as hurricanes became less frequent in the area \citep{kunreuther2013insurance}. Another case was when insurers cut back on their supply of terrorism coverage following al-Qaeda terrorist attack of September 2001 \citep{kunreuther2013insurance}. Finally, and most recently, the Covid-19 pandemic-related business-disruption losses amounted to \$1 trillion per \textit{month} in the U.S. \citep{panrisk}. In contrast, all private U.S. P\&C insurers had a total of the \$800 billion of combined capital by the end of 2019 \citep{panrisk}. The repetitive failures of insurance markets in providing adequate catastrophe protection has invited debate on how should the government intervene.
\subsubsection*{Our Contributions}
In this paper, we aim to contribute to the debate on how and when should the government use its different intervention policies. We make \textit{four} contributions to existing literature on the topic. \textit{First}, we develop a comprehensive sequential repeated game, outlined in Section \ref{timeline}, that includes three types of agents, individuals, insurers, and government, who strategically interact together to optimize behavior under catastrophe risk. Our model is the first model, to the best of our knowledge, that models agents' behavior under catastrophe risk in a sequential repeated game-like setting. We show that this model is reflective of many empirical stylized facts of catastrophe insurance markets, in Section \ref{nogov}. \textit{Second}, we model complex aspects of agents' behavior that were not previously considered under a single model in literature. For example, we incorporate, in our game, individuals' behavioral biases that were reported in literature to affect catastrophe decision-making. We also consider aspects like individuals' consumption and saving decisions under catastrophe risk. On the insurer side, in addition to profit maximization considerations, we look at insurers' market entry and exit and responses to competitive pressures in the catastrophe insurance markets. We also support heterogeneous individual and insurer behavior in our game. \textit{Third}, we allow our government agent to derive optimal intervention in this game by reinforcement learning (RL), a sequential learning family of machine learning (ML) models. An RL model fits very well in solving for optimal government intervention given the complexity of our model. As described above, our model incorporates many aspects of individual and insurer behavior which are characteristic of catastrophe insurance markets. While the consideration of these aspects helps us comprehensively model catastrophe insurance markets, they increase the non-linear behavior of the model and make it complicated to derive a closed-form analytical solution. Certain RL algorithms, like Q-learning, are not only powerful in solving complex systems but also guarantee convergence to a global optimum. Therefore, we employ Q-learning in this paper to derive the optimal government intervention policy by repeated learning or ``trial and error'' (see Section \ref{qlearning} for fitting Q-learning to our model). \textit{Fourth}, we evaluate the quality of policy interventions using the $MVPF$ approach. While the approach is mainly applied for policy evaluation in empirical studies, we apply the $MVPF$ methodology in our theoretic framework. We explain, in Section \ref{observe}, that the $MVPF$ is a great fit for our purposes as the approach measures not only the direct effects of a policy change but also the long-term behavioral responses related to it. As RL models maximize the discounted sum of future rewards, we used the $MVPF$ as the reward function in our Q-learning model to learn more about the long-run implications of policy changes.
\subsubsection*{Problems in Catastrophe Insurance Markets}
In tracing the causes behind the failures of catastrophe insurance markets, economists regularly discuss supply-side and demand-side problems. Supply-side problems denote situations where insurer-related problems result in sub-optimal outcomes in catastrophe insurance markets. For example, many private insurers claim that catastrophe risks are uninsurable \citep*{jaffee2006should}. For a risk to be insurable, it needs to have a large number of exposure units, statistically measurable losses, uncorrelated claims, and affordable premium offers \citep*{panrisk}. Catastrophe risks fail to satisfy all of these conditions at varying degrees \citep*{panrisk}. For example, catastrophe risks tend to have few exposure units. This is because many, if not all, members of a society claim losses simultaneously due to a catastrophe experience. Without a large number of exposure units, the law of large numbers collapses \citep*{charpentier2014natural}. This would make catastrophe risk less diversifiable violating the concept of risk-pooling. Another related issue is that catastrophe losses generate correlated claims \citep*{raykov2015catastrophe}. Risks with correlated claims impose huge capital risks on insurers who may not be able to pay the claim liabilities incurred by a large share of their clients at once
\citep*{cummins2002can}. Furthermore, private insurers can avoid supplying catastrophe insurance completely if they are unable to measure the frequency and severity of catastrophe losses. Without being able to accurately model expected losses, insurers would not be able to charge fair premiums. Finally, due to all the above reasons, catastrophe insurance, when it is privately supplied, is usually offered at exaggerated premiums well beyond the affordability of most individuals \citep*{kousky2012explaining}.
In addition to supply-side problems, demand-side problems also contribute to the failures of catastrophe insurance markets. Demand-side problems denote situations where issues on the consumer side result in deficient demand for catastrophe insurance. Consumers' under-purchase of catastrophe insurance was attributed to both rational and irrational causes. A rational cause for the under-purchase of insurance, when it is supplied, can be because it is being offered at unaffordable premium rates \citep*{kousky2012explaining}. Other rational reasons include consumer’s belief that losses due to catastrophe risks will be covered by the government i.e. the Samaritan Dilemma \citep{kunreuther2013insurance}. Demand deficiency can be also explained by bounded rationality: consumers have limited information about their exposure to catastrophe risks and the marginal cost of them getting the right information may exceed their marginal benefit \citep*{kousky2012explaining}. This may cause consumers to act based on behavioral heuristics resulting in an underestimated perception of individual’s exposure to catastrophic risk \citep*{kousky2012explaining}. \cite{meyer2017ostrich} presented six behavioral biases that prevent individuals from taking the rational catastrophe protection decisions. These biases include myopia, amnesia, optimism, inertia, simplification, and herding. We will discuss the role of these biases in detail in Section \ref{popsetup} when we include them in our game.
\subsubsection*{Possible Government Intervention}
The repeated failures of catastrophe insurance markets has invited debate on the government's role in managing society's catastrophe risk. \cite{bruggeman2012insurance} discussed a free market approach where the government would remove such obstacles that prevent the private market from operating smoothly. Under a minimalist intervention approach, the government would focus on relaxing regulations and reforming legal reserve requirements \citep{bruggeman2012insurance}. Empirical evidence on Bangladesh show that reducing credit market imperfections, thus increasing access to micro-credit, significantly affects catastrophe insurance participation \citep{akter2008determinants}. In addition to minimalist approach, the government can also aim for a higher level of intervention and mandate, for example, that catastrophe insurance be bundled with other types of insurance like car and property insurance.This was adopted in France under its ``code des assurances'' through the Act of July 13, 1982. It was also adopted in Belgium though its Acts of May 21, 2003 and September 17, 2005. Through this policy, 90-95\% of the Belgian population are protected against natural-catastrophe risks \citep{bruggeman2012insurance}. Government intervention can also be in the form of public-private partnerships. For example, the government can act as a ``reinsurer of last resort in the same way the U.S. Federal Government acted under terrorism risk \citep{beider2020federal}. In maximum intervention, the government can also directly offer state-provided catastrophe insurance policies itself. An example includes the National Flood Insurance Program (NFIP) which is managed by the U.S. Federal Emergency Management Agency (FEMA). The NFIP, however, is heavily criticised for being severely indebted and failing to adequately cover many of the homeowners in Florida \citep{cummins2006should}. While the federal government aimed to address the indebtedness and the other inefficiencies of the NFIP, these changes would cause the premiums to rise at least five-folds \citep{forbes}.
Government intervention can also be used to target demand-side failures. For example, a government can provide more information to individuals about their real catastrophe risk and amount they need to insure for full coverage \citep{kunreuther2013insurance}. Especially in developing countries, catastrophe awareness can counter demand deficiency for catastrophe insurance. Empirical evidence by \cite{akter2008determinants} on Bangladesh show that household education and occupation significantly affect their likelihood to purchase catastrophe insurance. Another policy suggestion is to use choice architecture and nudges to convince consumers to get insured against catastrophe losses \citep{kunreuther2013insurance}. Given that individuals' behavioral biases tend to clog their rational decision-making, \cite{meyer2017ostrich} recommended a framework called the \textit{behavioral risk audit} for a systematic method of designing demand-side policy in the presence of those biases in individuals. The \textit{behavioral risk audit} is composed of a four-step process: (1) listing the behavioral biases, (2) describing the impacts each bias has on individuals and insurers, (3) analyzing the manifestation of the biases in risk preparedness, and (4) designing remedies for each bias \citep{meyer2017ostrich}.
We summarize the government interventions outlined in literature in Table \ref{tab:pol}.
\footnotesize
\begin{longtable}{
|p{10cm}|
p{5cm}|
}
\caption{Government interventions to promote catastrophe preparedness}\\
\toprule
\label{tab:pol}
Intervention&Type\\ \midrule
\endfirsthead
\endhead
Relax regulations and reform legal reserve requirements&supply-side\\
Bundle catastrophe insurance with other types of insurance policies&supply-side\\
Act as a reinsurer of last resort&supply-side\\
Offer state-provided insurance policies&supply-side\\
Provide catastrophe awareness sessions&demand-side\\
Use choice architecture and nudges to influence behavior&demand-side\\
Adopt a behavioral risk audit to design remedies for behavioral biases&demand-side\\
Reduce credit market imperfections&demand-side and supply-side\\
\hline
\end{longtable}
\normalsize
\subsection{Related Work}
The question of organizing catastrophe insurance markets and government intervention was extensively analysed in the literature, many of whom we already cited in the preceding section. Particularly related to modeling catastrophe insurance markets, \cite{kousky2012explaining} rely on optimizing solvency-constrained insurers' supply problem and utility-maximizing individuals' demand problem. After solving for market equilibrium, \cite{kousky2012explaining} find that inadequate catastrophe protection can be due to the large gap between insurer premium prices and individuals' willingness to pay. \cite{charpentier2014natural} developed a game-theoretic framework to model agents in catastrophe insurance markets. They concluded that government intervention should emphasize on capital provision to insurers, regulating premium, and promoting catastrophe risk diversification. In the next sections, we will be adopting and adapting these prior modeling attempts.
To better link and contextualize the literature, we will reference and describe the related work in those sections where they are most relevant. The paper is organized as follows: Section \ref{envrionment} introduces and sets up our environment, Section \ref{ind} discusses the individual agent, Section \ref{ins} discusses the insurer agent, Section \ref{gov} describes the government agent, Section \ref{nogov} evaluates the model against some stylized facts of real behavior in free catastrophe insurance markets, Section \ref{qlearning} introduces the Q-learning algorithm used to train the government agent and discusses the learning results, and Section \ref{conclusion} concludes the findings and the contributions of this work. In Section \ref{popsetup} we will talk about the literature on behavioral biases in catastrophe decision making, in Section \ref{risks}, we describe how we incorporate prior results on catastrophe. We also refer to prior work on welfare analysis, particularly the $MVPF$ approach, in Section \ref{gov} and refer to stylised facts on catastrophe insurance markets in Section \ref{nogov}.
\section{The Environment}
\label{envrionment}
In reinforcement learning terminology, an environment is defined as the agent's world in which it exists and interacts. It serves as the medium over which our game is played. The agents repeatedly interact with the environment until a terminal state is reached. A single ``play'' of this environment is called an episode. In this section, we will set up our environment, define its agents, and describe the sequence of events in a single episode of the environment.
\subsection{Setup}
\label{setup}
Our environment is composed of three types of agents: (1) a heterogeneous population exposed to catastrophe risk, (2) heterogeneous insurers that offer catastrophe insurance policies to protect the population from catastrophe losses , and (3) a government or social planner that aims to improve the preparedness of the society against future catastrophes.
We call a single play of the environment an \textit{episode} and it runs for a period of $T$ time-steps (see Section \ref{timeline} for episode timeline). For every time-step $t \in T$, an abstract catastrophe, natural or man-made, can occur in the environment with probability $\theta$, which represents the catastrophe risk likelihood. In our environment design we simplified ideas about increasing catastrophe risks, as noted in \cite{cummins2006should} for example, and assumed that the catastrophe risk, $\theta$, under the environment is constant over time. To further simplify our environment design and agent behavior, we assumed that there are no inflationary pressures in the environment and the nominal values of our variables, to be introduced in subsequent sections, reflect the real values over time.
\subsection{Episode Timeline}
\label{timeline}
In a single episode of our environment, individuals, insurers, and the government interact and take decisions under catastrophe risk. The following algorithm summarizes the events that occur in a single episode of our environment:
\footnotesize
\begin{algorithm}
\caption{Sequence of events in a single episode of the environment}
\begin{algorithmic}[1]
\For{\text{each time-step $t \in T$}}
\State \text{A Bernoulli trial is run with $\theta$ as probability of catastrophe }
\If {\text{Bernoulli trial was successful}}
\State \text{Catastrophe occurs in society}
\State \text{Every individual in the population loses a share of their wealth due to catastrophes}
\State \text{Individuals who are catastrophe-insured file claims to their insurance companies}
\State \text{Insurers pay claims to their customers or exit market if insolvent}
\EndIf
\State \text{Every individual updates their catastrophe risk perception based on personal assessment}
\State \text{Every individual plans their optimal consumption and saving for time-step $t$ and time-step $t+1$}
\State \text{Every individual determines their catastrophe insurance demand and attempts to buy, renew,} \par\text{or cancel catastrophe insurance policies accordingly}
\State \text{Each insurer collects premiums from clients who were subscribed with them for a year}
\State \text{Each insurer updates catastrophe loss model and evaluates financial position, deciding}\par\text{whether to stay or leave the market accordingly}
\EndFor
\end{algorithmic}
\end{algorithm}
\normalsize
\FloatBarrier
In Sections \ref{ind}, \ref{ins}, and \ref{gov}, we will explain in detail how each agent takes decisions at each step of the episode. Because the main goal of the paper is to evaluate different forms of the government intervention in a society under catastrophe risk, we first need to model the individual and the insurer agent. After sufficiently describing the individual agent in Section \ref{ind} and the insurer agent in Section \ref{ins}, we will proceed to discuss government intervention, in Section \ref{gov}, in the presence of those agents. The reader can skip to Section \ref{gov} directly if they wish to read about government intervention directly.
\section{The Individual Agent}
\label{ind}
The first type of agent supported by our environment is the individual. In this section, we outline how we modeled our individual agent. The individual has a set of attributes and privately derives its optimal behavior from the optimization results of various microeconomic models.
\subsection{Population Setup}
\label{popsetup}
The population making up the environment is composed of $n$ heterogeneous individuals indexed by $i$. Every individual $i$ belongs to a social class $c \in \{\text{low}, \text{middle}, \text{upper}\}$. Each individual $i$ earns an annual income $Y_i$ which is dependent on the social class they belong to and it remains constant over time (considering no inflation or income raises as we assumed earlier in Section \ref{setup}). At any time $t$, individual $i$ consumes amount $C_{ti}$ from their annual income $Y_{i}$. The excess of individual $i$'s annual income over consumption at any denotes individuals' savings at time $t$, $S_{ti}$. Individuals start with an initial wealth level, i.e. endowment, $W_{0i}$ at time $0$ which accumulates at an annual constant interest rate $r$. At any time $t$, individual $i$'s wealth, $W_{ti}$, is the accumulated sum of savings plus their initial wealth, $W_{0i}$. This is described in more detail in Section \ref{consav}.
After a catastrophe experience, we define the loss occurring to an individual to be $\lambda_{Ri}W_{ti}$ where $\lambda_{Ri} \in [0,1]$ represents the true proportion of wealth that an individual $i$ loses due to catastrophes. It is important to highlight that we make the distinction between the \textit{real} wealth loss proportion, $\lambda_{Ri}$, and the proportion that the individual \textit{perceives} to lose from their wealth after a catastrophe, $\lambda_{Pi}$ due to inaccurate estimations, we discuss this distinction in detail in Section \ref{demand}. We assume that $\lambda_{Ri}$ is heterogeneous amongst the population to reflect different exposures to risk which is empirically witnessed in societies exposed to catastrophe risk \citep{meyer2017ostrich}. Additionally, we assume that $\lambda_{Ri}$ can change due to individuals' actions. For example, $\lambda_{Ri}$ can increase if individual $i$ behavior becomes less careful due to being insured i.e. a situation of moral hazard.
As was discussed in Section \ref{intro}, individuals tend to under-prepare for catastrophes due to the existence of cognitive behavioral biases that prevent them from making sound rational decisions \citep{meyer2017ostrich}. Related to the discussion on behavioral heuristics, \cite{meyer2017ostrich} identified six behavioral biases that cause individuals to underprepare for catastrophes. These behavioral biases include myopia, amnesia, optimism, inertia, simplification, and herding \citep*{meyer2017ostrich}. Other studies also indicated the existence of the representative heuristic, also called the availability bias or the availability heuristic, in catastrophe insurance decision making \citep{dumm2020representative}. Myopia, amnesia, and optimism biases serve to reduce individuals' risk perception causing them to underestimate catastrophe risk \citep*{meyer2017ostrich}. These biases cause individuals to underestimate the need to get insurance coverage before witnessing a real catastrophe \citep*{meyer2017ostrich}. Inertia, simplification, and herding biases distort catastrophe risk management decision-making \citep{dumm2020representative}. Inertia bias causes individuals to maintain the status-quo or default option such that they forgo purchasing or renewing catastrophe insurance \citep*{meyer2017ostrich}. Simplification bias causes individuals to make decisions based on a subset of the available, often incomplete, information. This causes them to make incorrect judgements about the amount of insurance coverage they would need \citep*{meyer2017ostrich}. Herding bias causes individuals to make decisions by mimicking their peers or reference group, who may be making irrational risk management decisions themselves \citep*{meyer2017ostrich}. Finally, the representative heuristic causes individuals to have an exaggerated risk perception, at least twice the initial perception, right after witnessing a catastrophe experience \citep{dumm2020representative}. This exaggerated risk perception declines over time as the memory of the last catastrophe experience fades by the amnesia and optimism biases.
In our environment, we consider the representative heuristic (u), the optimism and amnesia biases (o), the myopia bias (m), the simplification bias (f), the inertia bias (n), and the herding bias (h). We represent those behavioral biases in our environment by giving every individual $i$ in the population a bias parameter $\beta_{ik}$ such that $k\in \{\text{u},\text{o},\text{m}, \text{f},\text{n},\text{h\}}$. Each $\beta_{ik} \in [0,1]$ represents the likelihood with which the individual $i$'s decision making is affected by the bias $k$. As was discussed in \cite{meyer2017ostrich}, we assume that individuals' bias parameters $\beta_{ik}$ are a part of the individuals' cognitive makeup and cannot be changed overtime i.e. constants. We assume that each $\beta_{ik}$ captures the pure effect of bias $k$ and the $\beta_{ik}$s are independent. We make this assumption because dependence structures between behavioral biases were seldom modelled in literature and is out of the scope of this work. Modelling dependencies between behavioral biases can be an idea for future work on this research.
A final attribute we gave the individual agent is its catastrophe risk perception at time $t$, $\alpha_{ti}$. We assume that each individual $i$ has a different risk perception, $\alpha_{ti}$, based on their social class $c_i$ (where we assumed that belonging to a social class implies differences in educational attainment levels). Individual $i$'s risk perception at time $t$, $\alpha_{ti}$, evolves based on the individuals' catastrophe experience and behavioral biases we described above (we will discuss the determinants of risk perception in more detail in Section \ref{risks}). We assume that the $\alpha_{ti}$ is, in most time-steps, divergent from the true catastrophe risk $\theta$ such that it either underestimates it or, less often, overestimates it.
As a summary, the Table \ref{tab:popsetup} describes the population setup with the relevant notation:
\footnotesize
\begin{longtable}{
p{0.35 cm}
p{9.75 cm} p{6cm}
}
\caption{Population Attributes and Notation}\\
\toprule
\label{tab:popsetup}
&Definition&Variability\\ \midrule
\endfirsthead
\caption[]{Population Setup (Continued)}\\
\toprule
&Definition&Variability\\ \midrule
\endhead
$c_i$&Social class of individual $i$&Constant\\
\midrule
$Y_i$&Annual income of individual $i$&Constant\\
\midrule
$C_{ti}$&Amount of annual income that individual $i$ consumes at time $t$&Varies at each time-step $t$ (see Section \ref{consav})\\
\midrule
$S_{ti}$&Excess of individual $i$'s annual income $Y_i$ over consumption $C_{ti}$&varies as $C_{ti}$ varies\\
\midrule
$W_{ti}$&The accumulated wealth of individual $i$ at time $t$&varies as more savings happen to individual's account\\
\midrule
$\lambda_{Ri}$&The real proportion of wealth that individual $i$ loses due to catastrophes&Can increase due to moral hazard or decrease by investing in catastrophe protection technology\\
\midrule
$\lambda_{Pi}$&Perceived proportion of wealth that is lost due to catastrophes by individual $i$&Changes with changes in $\lambda_{Ri}$\\
\midrule
$\beta_{ik}$&The likelihood that individual $i$ is going to make decisions affected by bias $k$&Constant\\
\midrule
$\alpha_{ti}$&The catastrophe risk perception of individual $i$ at time $t$&Varies due to catastrophe experience\\
\hline
\end{longtable}
\normalsize
\subsection{Individual Behavior}
In this section, we will describe the four sub-models governing individual behavior in the environment: (1) model of catastrophe risk perception $\alpha_{ti}$, (2) model of consumption $C_{ti}$, savings $S_{ti}$, and wealth $W_{ti}$, (3) model of catastrophe insurance demand, and (4) model of insurance catastrophe insurance.
\subsubsection{Modelling Catastrophe Risk Perception}
\label{risks}
It is widely acknowledged in literature that multiple psychological biases affect individuals' risk perception as described in Section \ref{intro}. To our knowledge, incorporation of behavioral biases for the determination of individuals' risk perception was not previously done in literature.
In models of catastrophe insurance markets in literature, ``risk perception" was defined as a probability $p$ that individuals use to get a weighed average of different social outcomes (\citep{kousky2012explaining}, \citep{charpentier2014natural}). However, these models assume that $p$, and its equivalent, are given parameters and do not elaborate as to how it came about.
In this paper, we model individuals' risk perception under two situations: (1) immediately after a catastrophe experience and (2) under no catastrophe experience or when the memory of the last catastrophe faded. Individuals in the environment start with an initial risk perception $\alpha_0$. This risk perception gets updated at every time-step $t$ (see Section \ref{timeline} for a recap episode timeline).
If an individual $i$ just witnessed a catastrophe, their risk perception $\alpha_{t}$ is updated in the next time-step as follows
\begin{equation}\label{eq:ralpha}
\alpha_{t+1}=\alpha_{t}(1+\beta_{\text{u}})
\end{equation}
where $\beta_{u} \in [2,3]$ denotes individual $i$'s representative heuristic parameter (see Section \ref{popsetup} for a recap on population setup).
Equation (\ref{eq:ralpha}) causes the risk perception $\alpha_{t}$ to at least double after being exposed to a catastrophe. This is consistent with observations reported in the literature by \cite{kunreuther2013insurance}, \cite{atreya2015drives}, and \cite{dumm2020representative}.
If the individual does not have any catastrophe experience or has forgotten the damage caused by the last catastrophe experience, $\alpha_{t}$ is updated in the next time-step as shown by Equation (\ref{eq:oalpha}):
\begin{equation}\label{eq:oalpha}
\alpha_{t+1}=\alpha_{t}(1-\beta_{\text{o}})
\end{equation}
where $\beta_{o}$ denotes the combined effect of individual $i$'s optimism and amnesia biases.
Equation (\ref{eq:oalpha}) reflects empirical observations witnessed amongst real populations under catastrophe risk. They tend to underestimate the true catastrophe risk due to optimism or due to a fading memory of past catastrophe experience as discussed in Section \ref{intro}.
\subsubsection{Modelling consumption $C_{ti}$, savings $S_{ti}$, and wealth $W_{ti}$}
\label{consav}
We model individuals' consumption and savings using an intert-temporal consumption-savings model. To the best of our knowledge, our work is the first attempt to integrate consumption and savings to the decision-making of individuals under catastrophe risks. The reason why we allow individuals' to make decisions about consumption and savings is to model changes in individuals' wealth $W_ti$ which is the attribute that is vulnerable to catastrophe shocks. We use a standard multiperiod intertemporal choice model under uncertainty described in many references including \cite{ramsey1928mathematical}, \cite{samuelson1937note}, and \cite{koopmans1960stationary}.
As described in the setup Section \ref{popsetup}, every individual $i$ receives an annual income $Y_i$ and it remains constant over time.
Individuals derive utility from consumption and are assumed to live the entire throughout any given episode of the environment, i.e. from $t=0, 1,...,T$. This causes individual's $i$ lifetime utility to be represented as follows:
\begin{equation}\label{eq:lifetimeutil}
U_i=u(C_{0i})+E(\beta_{m} u(C_{1i}))+....+E(\beta_{m}^T u(C_{Ti}))=u(C_{0i})+\Sigma_{t=1}^T \, E(\beta_{m}^tu(C_{ti}))
\end{equation}
where $\beta_m$ represents the individual's myopia bias, where they generate less utility from consumption expected to occur further ahead in the future.
Each individual $i$ aims to derive optimal consumption at time $t$ such that it maximizes utility $U_i$ from Equation (\ref{eq:lifetimeutil}). This optimization problem is constrained by $T$ budget constraints representing each time period as follows:
\begin{equation}\label{eq:intertemporal}
C_{0i}+S_{0i}=Y_{0i}+W_{0i}
\end{equation}
$$C_{1i}+S_{1i}=Y_{1i}+W_{1i}$$
$$C_{2i}+S_{2i}=Y_{2i}+W_{2i}$$
\begin{centering}
.
.
\end{centering}
$$C_{Ti}=Y_{Ti}+W_{Ti}$$
where $W_{ti}$ for any time $t$ is the accumulated sum of savings of past periods plus initial wealth:
\begin{equation}
W_{ti}=(1+r)^t(W_{0i}+E(S_{0i}))+(1+r)^{t-1}E(S_{1i})+...+(1+r)E(S_{(t-1)i})
\end{equation}
Equations (\ref{eq:lifetimeutil}) and (\ref{eq:intertemporal}) form a constrained optimization problem which can be solved to yield the following optimization condition:
\begin{equation}\label{eq:Euler}
u'(C_{ti})=\beta_m(1+r)E(u'(C_{(t+1)i}))
\end{equation}
The full proof can be found in many references and we encourage the interested reader to refer to \cite{ramsey1928mathematical}, and \cite{hansen1983stochastic}. Equation (\ref{eq:Euler}) denotes the expectational Euler equation used in situations of uncertainties.
In our model, we rely on the work of \cite{ikefuji2015expected} to model individuals' utility as a Pareto family utility function\footnotemark \footnotetext{This named was coined by \cite{ikefuji2015expected} who observed that the utility function can be converted into the cumulative distribution function (cdf) of the Pareto distribution by applying a monotonic linear transformation of $z=W_{ti}+\phi$ on Equation \ref{eq:util}.} where $u'>0$ and $u''<0$. We chose to use this family of utility functions because it was proven, by \cite{ikefuji2015expected}, that Pareto family utility functions are the only type of utility functions that satisfy necessary and sufficient conditions for credible consumption assumptions under catastrophe risks. These assumptions include that consumption, $C_{ti}$, needs to be finite and non-negative at every time-step $t$. Therefore, the Pareto utility function is the most-suitable for our purposes, i.e. modelling consumption and saving under catastrophe risks.
The Pareto family utility function takes the the form described in Equation (\ref{eq:util}).
\begin{equation}\label{eq:util}
U(W_{ti})=1-(1+\frac{W_{ti}}{\phi})^{-k}
\end{equation}
where $\phi$ and $k$ are exogenously determined strictly positive hyperparameters.
We refer the interested reader to the work of \cite{ikefuji2015expected} for more details on how they arrived at their conclusions.
\subsubsection{Deriving Catastrophe Insurance Demand}
\label{demand}
In the environment, we define individual $i$'s demand for catastrophe insurance at time-step $t$ to be the maximum amount they are willing to pay to be \textit{fully covered} against potential catastrophes by a one-year insurance contract.\footnotemark \footnotetext{While we are aware that there is a wide variety of insurance coverage options, we assume, for simplicity, that individuals can only get full insurance coverage against their catastrophe risk. This means, if an individual purchases insurance, the insurance policy will cover the total losses an individual expects due to catastrophes. Partial coverage and other packages are not modelled in this paper.} We will refer to this maximum payable amount for insurance by $P_{ti}^{\text{max}}$.
Individuals in the environment can derive the value for $P_{i}^{\text{max}}$ in two ways, determined by the extent towards which their decision-making is affected by the simplification bias $\beta_f$. If the simplification bias dominates an individual's decision-making, they are more likely to set $P^{\text{max}}_{ti}$ using a subset of the information available to the agent \citep{meyer2017ostrich}.
To determine whether the individual will simplify their decision-making problem, they run a Bernoulli trial where $\beta_f$ is the probability of success. If the Bernoulli trial is successful, the individual chooses to simplify decision-making and sets their $P_{ti}^{\text{max}}$ at time $t$ as follows:
\begin{equation}\label{eq:irrPmax}
P_{(t+1)i}^{\text{max}}=(1-\beta_h)P_{ti}^{\text{max}}+\beta_h \bar P_{t}^{\text{max}}
\end{equation}
where $\bar P_{t}^{\text{max}}$ is the average maximum payable premium by all other individuals in the environment who are of the same social class as individual $i$ and $\beta_h$ represents individual $i$'s herding bias. Through Equation (\ref{eq:irrPmax}) individual $i$ makes an irrational decision about their maximum acceptable premium for catastrophe insurance basing it on their herding bias-weighted average of their maximum premium in the last time-step and the average maximum payable premium by their peers.
If the Bernoulli trial, on the other hand, is unsuccessful, individual $i$ behaves rationally and conducts a rigorous calculation as what would be their maximum payable premium for catastrophe insurance. We rely on classical expected utility theory described in \cite{morgenstern1953theory} and \cite{maccrimon1979utility}. The expected utility theory was used extensively to model demand for catastrophe insurance in literature like in the work of \cite{kousky2012explaining} and \cite{charpentier2014natural}. We adopt ideas from these models and adapt them to suit the setup of our environment.
Under rational decision-making, individuals consider two states of the world and consider their wealth under each state:
\vspace{2pt}
\begin{center}
\begin{tabular}{|c|c|}
\hline
\textbf{State 1: no catastrophes} &\textbf{State 2: catastrophe happens}\\
Wealth: $W_{ti}$ & Wealth: $(1-\lambda_{Pi})W_{ti}$\\
\hline
\end{tabular}
\end{center}
where $\lambda_Pi$ is the individual's perceived loss due to catastrophes computed as follows:
\begin{equation}
\lambda_{Pi}=(1-\beta_{o})\lambda_{Ri}
\end{equation}
where $\beta_{o}$ is the individual's optimism and amnesia biases.
Individuals calculate their expected utility, Equation (\ref{eq:EU}), of their wealth from states 1 and 2 of the world using their risk perception at time step $t$, $\alpha_{ti}$,modelled in Section \ref{risks}.
\begin{equation}\label{eq:EU}
E(U)=(1-\alpha_{ti})\,U(W_{ti})+\alpha_{ti}\,U((1-\lambda_{Pi})W_{ti})
\end{equation}
This is where $U$ in Equation (\ref{eq:EU}) is the \cite{ikefuji2015expected} Pareto Family utility function, Equation (\ref{eq:util}), we introduced towards the end of Section \ref{consav}.
From their expected utility, individuals consider their amount of certain wealth, Equation (\ref{eq:CE}), that would yield them the same level of satisfaction as the expected utility in Equation (\ref{eq:EU}). Individuals also consider and their expected wealth from both states of the world, Equation (\ref{eq:EW}).
\begin{equation}\label{eq:CE}
\text{Certainty Equivalent}=U^{-1}(E(U))
\end{equation}
\begin{equation}\label{eq:EW}
E(W)=(1-\alpha_{ti})W_{ti}+\alpha_{ti}(1-\lambda_{Pi})W_{ti}
\end{equation}
It would only make sense for rational individuals to purchase insurance up to the amount that is equal to the difference between the expected wealth, Equation (\ref{eq:EW}), and certainty equivalent, Equation (\ref{eq:CE}), assuming that this quantity would be non-negative as individuals are assumed to be risk-averse. If individuals pay more in insurance than the difference between expected wealth and certainty equivalent, they are getting less value from insurance as opposed to experiencing losses from a real catastrophe. Therefore, we set each individual $i$'s maximum payable premium for catastrophe insurance at time-step $t$ under rational decision-making as follows:
\begin{equation}\label{eq:Pmax}
P^{\text{max}}_{ti}=E(W)-\text{Certainty Equivalent}
\end{equation}
which represents individual's $i$ demand, or willingness to pay, for catastrophe insurance.
\subsubsection{Purchasing Insurance}
\label{buy}
After determining risk perception $\alpha_{ti}$, wealth $W_{ti}$, and demand for insurance $P^{\text{max}}_{ti}$ at time-step $t$, individual $i$ proceeds to purchase catastrophe insurance as long as there is a suitable offer available with in the catastrophe insurance markets.
Each individual $i$ surveys each insurer $j$ for an insurance policy with an annual premium payment that is at most equal to $P^{\text{max}}_{ti}$. If a suitable offer exists, individual $i$ purchases insurance from the suitable insurer who is willing to provide insurance at a premium that is acceptable by them. When the individual successfully purchases an insurance policy, they get an insurance contract with a term of one time-step. The contract is composed of: (1) the agreed premium rate, and (2) the amount of coverage the insurer promises to pay in the event of a catastrophe.
Therefore, while an individual $i$ is covered by a contract, they are required to pay an annual premium according to Equation (\ref{eq:premium}) in Section \ref{supply}.
Insurance contracts do not automatically renew and if individuals are still interested in coverage at time $t+1$ for time $t+2$, they need to re-purchase insurance policies under new terms considering the updates in $W_{t+1}$, $\alpha_{t+1}$, and $P^{\text{max}}_t$.
While it might be obvious that individuals' decision to renew their insurance coverage at time $t+1$ depends on whether they are able to find an offer that fully covers their wealth at an acceptable premium, we consider situations where individuals fail to renew their coverage simply because they procrastinate to do so and just prefer to "do nothing". The former irrational decision-making is due to individuals' inertia bias, $\beta_n$, that was cited as a possible behavioral explanation as why individuals tend to underinsure \citep{meyer2017ostrich}. When individuals fail to purchase insurance while suitable contracts exist in the environment, it is because of a successful Bernoulli trial that the individual runs before purchasing insurance with $\beta_n$ as the probability of success.
\section{The Insurer Agent}
\label{ins}
The second type of agent in our environment is the insurer. In this section, we will outline how we modeled our insurer agent. Like the individual agent, the insurer agent has a set of attributes and privately determines optimal behavior through underlying models from microeconomic theory.
\subsection{Insurers' Setup}
\label{inssetup}
The environment has $m$ heterogeneous catastrophe insurers, indexed by $j$, who supply insurance policies to protect individuals' wealth from expected losses due to catastrophes. We assume that each insurer $j$ starts with a capital $\kappa_{0j}$. Insurers' capital make up a big part of insurers' assets which they use to supply catastrophe insurance policies (this is described in more detail in Section \ref{supply}). Insurers' capital accumulates at a constant interest rate $r$ per year and the capital gets updated every year as the insurer makes profits or losses. We assume that each insurer $j$ uses proportion $\gamma_j \in [0,1]$ of their assets to supply insurance policies. This assumption was made to reflect heterogeneity in the insurers' internal policies and preferences of the board of directors who may not prefer to use all the assets of the company to supply catastrophe insurance policies. Insurers' $\gamma_j$ is updated after catastrophe exposure as is described in Section \ref{lossmodel}.
We assume that every insurer $j$ has an exit parameter $\epsilon_j \in [0,1]$ which represents the likelihood the insurer would exit the market after experiencing adverse market conditions. If $\epsilon_j$ reaches a value of 1, insurer $j$ exits the market. We also give every insurer a premium loading rate $l_j$ which is used by insurers to load the risk premium rate for profit maximization. We allow insurers' $l_j$ to vary over time to reflect competition with other insurers in the market. Additionally, each insurer $j$ is given a heterogeneous solvency percentile $\rho_j \in [0,1]$ which is used to calculate the reserves required per policy supplied. Finally, to reflect discussions about insurers' irrational behavior in literature, for example in \cite{kunreuther2013insurance} and \cite{smetters2008financing}, we give each insurer $j$ a bias parameter $\beta'_j \in [0,1]$ which dictates the likelihood with which they are likely to restrict supply and increase premium rates right after catastrophes. Like the individual agent, we assumed that the insurers' bias parameter is a part of its cognitive makeup and therefore remains constant over time.
Table \ref{tab:inssetup} summarizes the insurers' setup with the relevant notation:
\footnotesize
\begin{longtable}{
p{0.35 cm}
p{9.75 cm} p{6cm}
}
\caption{Insurers' Attributes and Notation}\\
\toprule
\label{tab:inssetup}
&Definition&Variability\\ \midrule
\endfirsthead
\caption[]{Insurers' Attributes and Notation (Continued)}\\
\toprule
&Definition&Status\\ \midrule
\endhead
$\kappa_{tj}$&Capital Available with insurer $j$ at time $t$&Accumulates every year at rate $r$ and changes as insurer makes profits/losses\\
\midrule
$\gamma_j$&Proportion of assets insurer $j$ can use to supply catastrophe insurance policies&Changes after being exposed to catastrophe experience\\
\midrule
$\epsilon_j$&The likelihood with which an insurer $j$ would exit the catastrophe insurance market&Changes with exposure to adverse market conditions\\
\midrule
$l_j$&Insurer $j$ premium loading that is used to load the risk premium rate of insurance policies&Changes due to competitive pressures in the market\\
\midrule
$\rho_j$&The percentile of the distribution of expected losses insurers are required to keep in reserves per policy for solvency&Changes due to catastrophe experience or government regulation\\
\midrule
$\beta'_j$&The bias parameter which represents the likelihood with which insurers would irrationally behave after a catastrophe&Constant Over Time\\
\hline
\end{longtable}
\normalsize
\subsection{Insurer Behavior}
In this section, we will describe three sub-models governing insurers' behavior: (1) choosing a catastrophe loss model, (2) deriving catastrophe insurance supply, and (3) determining market entry and exit.
\subsubsection{Choosing a Catastrophe Loss Model}
\label{lossmodel}
In real-life, catastrophe insurers often hire a professional risk-modelling firm that would provide them with a loss model for the risk they are intending to insure \citep{ericson2004catastrophe}, \citep{grossi2005catastrophe}, and \citep{heinrich2021simulation}. The loss model gives insurers guidance on premium rates they should charge and the amount they should keep in reserves. In our environment, we allow each active insurer $j$ to choose a loss model at time $0$ from a range of heterogeneous catastrophe risk modellers. We assume that the chosen loss model is composed of two items:
\begin{enumerate}
\item Catastrophe loss probability $p_j$ i.e. risk premium rate
\item Reserve required per insurance policy supplied
\end{enumerate}
To add realism to our model, we assume that each risk modelling firm does not accurately estimate the actual catastrophe probability $\theta$ (see Section \ref{setup} for a recap on environment setup). Risk modelling firms either overestimate or underestimate the true catastrophe loss probability. Therefore, $p_j\neq\theta$ in the majority of the episodes in our environment.
To recommend a reserve amount per policy supplied, risk modellers conduct studies on the wealth of the economy and then compute the aggregate expected catastrophe losses, $\mu_{\lambda_{R}W}$. Each insurer $j$ keeps a reserve amount per policy supplied as follows:
\begin{equation}\label{eq:reserve}
\text{reserve per policy}=F^{-1}(\rho_j)
\end{equation}
where $F$ is the cdf of $N(\mu_{\lambda_{R}W}, \sigma_{\lambda_{R}W})$ and $\rho_j$ is the solvency percentile of insurer $j$ (see Section \ref{inssetup} for a recap on insurer setup).
Only at time $0$, each insurer $j$ pays a fixed cost to the risk-modeller for their services in providing a loss model described above. At subsequent time-steps, insurers update their loss model based on the state of the environment. While no catastrophes occur, each insurer $j$ updates the reserve requirement per policy supplied to reflect changes in societal expected wealth loss using Equation (\ref{eq:reserve}).
\subsubsection*{Response to Catastrophes}
If a catastrophe occurs, however, each insurer $j$ responds by raising their catastrophe loss probability, $p_j$, by their catastrophe bias $\beta'_j$, Equation (\ref{eq:p}). Additionally, each insurer $j$ raises their solvency percentile $\rho_j$, Equation (\ref{eq:rho}), as a reflex response to catastrophes. This will serve to restrict the supply of insurance policies and raise their premium rates as noted in \cite{kunreuther2013insurance} and \cite{smetters2008financing}. Another attribute that responds to catastrophe experience is the insurer's proportion of assets available for insurance, $\gamma_j$, which decreases after a catastrophe experience, Equation (\ref{eq:gamma}). This means that insurers are willing to dedicate less of the total assets toward insurance after a catastrophe experience.
\begin{equation}\label{eq:p}
p_{j}=p_{j}(1+\beta'_j)
\end{equation}
\begin{equation}\label{eq:rho}
\rho_{j}=\rho_{j}(1+\beta'_j)
\end{equation}
\begin{equation}\label{eq:gamma}
\gamma_{j}=\gamma_{j}(1-\beta'_j)
\end{equation}
\subsubsection{Deriving Catastrophe Insurance Supply}
\label{supply}
Given a chosen loss model and the initial level of capital $\kappa_0$, each insurer $j$'s total assets at any time-step $t$ is summation of all its accounts:
\begin{equation}\label{eq:assets}
\text{assets}=\kappa_{tj}+ \text{profits}+ \text{reserves}+\text{reinsurance}
\end{equation}
In determining how much to supply in a given year, insurers use their disposable assets proportion $\gamma_j$, introduced in Section \ref{inssetup}, to determine their insurance supply. Insurance supply is hence calculated as:
\begin{equation}\label{eq:supply}
\text{supply}=\frac{\gamma_j\text{(assets)}}{\text{reserve per policy}}
\end{equation}
Upon selling a catastrophe insurance policy, the insurer collects a premium amount, in each time-step in which the individual is insured, as follows:
\begin{equation}\label{eq:premium}
\text{premium paid}=p_j(1+l_j)(\lambda_{Ri}W_{ti})
\end{equation}
where $p_j$ is the loss probability or the risk premium rate and $l_j$ is insurer $j$'s premium loading, and $\lambda_{Ri}W_{ti}$ is claim amount paid if a catastrophe occured (see Section \ref{popsetup} for a recap on how individuals lost wealth due to catastrophes).
The expected profits from the sale of a policy is computed as:
\begin{equation}\label{eq:profit}
E(\pi)=p_j(1+l_j)X-p_jX-c_j'p_jX
\end{equation}
this is where $c'$ represents the administrative costs paid as a rate of the claim $X=\lambda_{Ri}W_{ti}$. Given Equation (\ref{eq:profit}), insurers maximize profits by setting the premium loading ($l_j$) as high as possible. However, loaded premium rates cannot persistently increase due to demand-side limitations and competitive pressures.
\subsubsection{Market Entry and Exit}
\label{entry}
In our environment, insurers can enter the market and start supplying catastrophe insurance policies as long as existing insurers make profits i.e. there are opportunities in the market. Entry will cease when all the existing insurers make zero-profits, i.e. equilibrium is achieved. On the other hand, if existing insurers make losses, they start exiting the market until incumbent firms make zero profits.
\textbf{The exit parameter:}
The insurer exits the market once the exit parameter, $\epsilon_j$, reaches a value of 1 (see Section \ref{inssetup} for a recap on insurer setup). The exit parameter is incremented if any of the following events occur: (1) the insurer experiences losses in a given year, (2) the insurer experiences no sales in a given year, and (3) insurers constantly need to draw from their capital to fulfill claim liabilities and the reserves are not enough.
Nonetheless, an insurer can immediately exit the market, regardless of the value $\epsilon_j$, if at any point in an episode the insurer becomes insolvent and is unable to pay for claim liabilities.
\section{The Government Agent}
\label{gov}
In this section, we outline how we modeled our government agent. As a reminder to the reader, the government agent is the only RL agent in the environment. This means that it will be modeled to ``learn'' its optimal behavior i.e. intervention by iterative ``trial and error'' based on ``feedback'' it receives from the environment. This approach is contrasted with how we modeled the individual and the insurer agents in Sections \ref{ind} and \ref{ins} respectively. In the latter cases, we assumed underlying microeconomic models dictating agents' behavior. The government agent can be compared to a \textit{multiarmed bandit} agent where each of its arms correspond to a possible intervention policy in the environment.
In the environment, the government agent can take three actions. First, it can \textit{intervene} in the catastrophe insurance market. Second, it can \textit{observe the welfare impact} of its intervention policy. Third, it can \textit{collect taxes} to finance its intervention policies. In this section, we will discuss how we modelled the government agent to take its actions. We assumed that the government perceived the true catastrophe risk in the environment $\theta$ and each individual's true wealth loss rate due to catastrophes $\lambda_R$.
\subsection{Intervening}
\label{intervene}
At any time-step $t$ of the episode length, the government intervened from the following set of allowable interventions. These relate to a bandit's \textit{arms} in a multi-armed bandit context.
\noindent An intervention at time $t$ took the form of a policy change as described below. These interventions are based on the literature we described in Section \ref{intro} and summarized in Table \ref{tab:pol}.
\begin{itemize}
\item Take no action: If the government believes that the environment is well-functioning and additional intervention would not improve welfare impact, it may choose to take no action. We added this intervention to ensure that it is an option for the government not to intervene at all if it wants to.
\item Offer a government-provided insurance policy:
\begin{itemize}
\item Intervention Description: This intervention is based on the discussion in \cite{Jaffee_Russell_2013}, \cite{kunreuther2013insurance},and \cite{smetters2008financing} on the effectiveness of state-provided insurance in the management of catastrophe risk. If the government chose to pursue this intervention policy, it would extend its provision of state-provided insurance to \textit{one} other individual. Government-provided insurance would be offered to the neediest individual, i.e. individual who would be willing to pay the maximum premium for an insurance contract. The neediest individual can occasionally be policyholder under a private insurer. If the latter is the case, the individual becomes the neediest if the difference between the individual's $P^{max}_{ti}$ and the amount they currently pay their private insurer exceeds the $P^{max}_{ti}$ of any other individual.
\item Premium Rates: Once identified, the neediest individual would become a government policyholder paying a premium rate that is the minimum between the fair premium rate, $\theta\lambda_{Ri}W_{ti}$, and the maximum premium the individual is willing to pay $P^{max}_{ti}$. If policyholder pays under the latter option, the government finances the deficit from taxpayers' funds (see Section \ref{taxsystem} for details on government's tax system). As long as an individual is a government-provided policyholder, premiums payable are updated at each time period $t$ for the changes in individual's wealth, catastrophe wealth loss rates and other parameters.
\item Insurance Period: An individual would remain government-insured at any time-period $t$ as long as there are no cheaper offers from private insurers. If there are cheaper private insurers, the individual cancels the government insurance contract and is no longer eligible for government insurance even if they become uninsured at a later time-period.
\end{itemize}
\item Ease insurer solvency requirements: This intervention is based on discussion in \cite{Jaffee_Russell_2013} and \cite{cummins2002can} who questioned insurers' ability to handle the huge losses that come with insuring catastrophes. Through this intervention, the government reduces each insurer's $j$ required reserve per policy, $\rho_j$. However, the $\rho_j$ would not fall below 70\%. This means, with the application of this intervention, no insurer would be required to keep in reserves less than the \nth{70} percentile of the expected losses of his clients (see Section \ref{lossmodel} for details on insurers' solvency requirements).
\item Provide early warnings/awareness campaigns: This intervention is based on a possible remedy described in \cite{meyer2017ostrich}, \cite{kunreuther2013insurance}, and \cite{smetters2008financing}. If the government chose to pursue this policy intervention, it would educate each individual $i$ on the true catastrophe risk, $\theta$, and the true catastrophe wealth loss rate, $\lambda_{Ri}$. The effectiveness of this intervention varied depending on when it was applied. When applied for the first time, the intervention has maximum effectiveness in adjusting individuals' perception of catastrophe risk and expected wealth loss due to catastrophes. However, a \textit{cry-wolf} effect happens when the government kept pursuing this policy without observing a real catastrophe experience that supports the government's warnings (see Section \ref{cost} for details on the cry-wolf effect).
\item Increase subsidies on insurance policy premiums: This intervention is based on the recommendations described in \cite{kunreuther2013insurance} and \cite{smetters2008financing}. Under this policy intervention, the government would pay for a certain share, $s$, of a poliycholder's payable premium. When pursued, this intervention applied to all actual and prospective policyholders in the environment.
\item Increase premium regulations: This intervention is based on the recommendations described in \cite{kunreuther2013insurance} on ensuring that insurance premium rates reflect the true likelihood of catastrophe in society. Under this intervention, the government would impose a premium rate ceil, $p^{reg}$, on private insurers. It also ensures that all private insurers are charged a fair loss premium rate and imposed ceils on premium loadings.
\item Offer a disaster prevention method:
This intervention is inspired by the recommendation presented in \cite{meyer2017ostrich} and \cite{smetters2008financing}. If the government chose to pursue this intervention, it would offer \textit{one} free disaster prevention method to the individual who would need it the most. The disaster prevention method reduces the treated individual's true and perceived catastrophe wealth loss. The neediest individual would be identified as the one who has the highest true catastrophe wealth loss rate, $\lambda_{Ri}$.
\item Offer government reinsurance: This recommendation is based on the policy prescriptions provided in \cite{cummins2002can}, \cite{bruggeman2010government}, \cite{kunreuther2013insurance} where the government acts as a reinsurer of last resort. This intervention policy, when pursued, enables private insurers to get reinsurance contracts from the government at a government-set reinsurance rate. These contracts serve to cover the losses of a private insurer at the risk of defaulting. The intervention policy also allows the government to act as a re-insurer of last resort when a private insurer, be a reinsurance contract holder or not, fails to meet its claim liabilities after a catastrophe.
\end{itemize}
\subsection{Observing Welfare Impact of Policy Intervention}
\label{observe}
After choosing a policy intervention, the government observed its welfare impact for future reference. There are many ways a government could compute the welfare impact of a policy intervention. For our purposes, we adopted the Marginal Value of Public Funds ($MVPF$) approach described in \cite{finkelstein2020welfare} and \cite{hendren2020unified}. Similar to social cost-benefit approaches, the $MVPF$ is computed as:
\begin{equation}\label{eq:45}
MVPF=\frac{\text{Willingness to pay for policy by beneficiaries ($WTP$)}}{\text{Net cost of Government Spending ($G$)}}
\end{equation}
Relying on the $MVPF$ was particularly relevant for our purposes as it allowed us to measure the long-term impact of an intervention policy. This feature made it a strong fit to act as a reward function in the Q-learning algorithm we would be using to allow the government to learn its optimal interventions under various states or 'contexts' of our environment. By design, the Q-learning algorithm maximized the long-run expected reward (see Section \ref{qlearning} for details on the Q-learning algorithm).
We set up the $MVPF$ framework by identifying the WTP and the G of each policy intervention outlined in Section \ref{intervene} above.
\subsubsection{Willingness to Pay (WTP)}
\label{wtp}
We compute the willingness to pay of the intervention policy changes, described above, as follows. Our equations take into consideration the notations we introduced in Sections \ref{setup}, \ref{popsetup}, \ref{inssetup}.
\begin{itemize}
\item Take no action: This policy change has no effect on individuals. Therefore, the WTP of this policy change is always 0.
\item Offering government-provided insurance: The marginal individual, who is selected by the government to receive government insurance, is the one who would be willing to pay for this policy change. The WTP of the marginal individual depends on whether they were already a policyholder or not at time $t$. If the marginal individual was a policyholder, they would not need to switch to government insurance unless it is cheaper. Therefore, their WTP would be the difference between the premium they are paying for their existing policy, $p_j\lambda_pW_{ti}$, and the premium offered by government insurance policies, $g\lambda_pW_{ti}$. If the marginal individual is not a policyholder, their WTP would be the maximum amount they would be willing to pay for catastrophe insurance i.e. $P^{max}_{ti}$. Therefore, the WTP for this policy change can be expressed as:
\begin{equation}\label{eq:WTPpol1}
WTP_1= H_0P^{max}_{ti}+(1-H_0)(p-g)(\lambda_pW_{ti})
\end{equation}
where $H_0$ refers to the indicator variable that indicates whether the marginal individual was a policyholder $(H_0=0)$ or not $(H_0=1)$.
\item Easing Insurer Solvency Requirements: Easing solvency requirements would reduce the amount private insurers need to keep in reserves per policy supplied. This will enable private insurers to supply more catastrophe insurance policies. Non-policyholders at time $t$ who purchase private insurance due to this policy change would be willing to pay, at most, $P^{max}_{ti}$. Therefore, we express the WTP for this policy change as sum of the $P^{max}_{ti}$s of the marginal individuals who would purchase from the marginal catastrophe insurance policies supplied by insurers in response to easing solvency requirements:
\begin{equation}\label{eq:wtppol2}
WTP_2=\sum H_2P^{max}_{ti}
\end{equation}
where $H_2$ refers to the indicator variable that indicates whether the individual $i$ was a marginal individual.
\item Provide early warnings/awareness campaigns: We assumed that this policy change affected all individuals in the environment. The WTP for any individual $i$ is the difference between the maximum premium they would pay under the effects of underestimated risk perceptions, $P^{max}_{ti}$, and the true payable premium under the risk perceptions corrected by the policy, $P^{T'}_{ti}$. Therefore, the $WTP$ can be expressed as:
\begin{equation}\label{eq:wtppol3}
WTP_3=\sum (P^{T'}_{ti} -P^{max}_{ti})
\end{equation}
\item Increase subsidies on insurance policy premiums: This policy change affects two groups of individuals: (1) existing policyholders and (2) marginal non-policyholders who would become policyholders after applying subsidies to premium rates. For the first group, the WTP would be the premium amount they no longer need to pay due to subsidies, i.e. $(p-s)\lambda_PW_{ti}$. For the second group, the WTP would be the difference between the maximum amount they would be willing to pay for insurance and the subsidized premium they end up paying, i.e. $P^{max}_{ti}-(1-s)p\lambda_PW_{ti}$ This rationale can be summarized in the expression below:
\begin{equation}
WTP_5=\sum(H_0(P^{max}_{ti}-(1-s)p\lambda_PW_{ti})+(1-H_0)(p-s)\lambda_PW_{ti})
\end{equation}
where $H_0$ refers to the same indicator variable used in Equation (\ref{eq:WTPpol1}).
\item Increase premium regulations: In a similar construction to $WTP_5$, this policy change affects current policyholders at time $t$ and marginal non-policyholders who become policyholders at time-step $t+1$. Individuals who were policyholders at both time $t$ and $t+1$ would have a WTP that is equal to the difference between the premium paid pre and post regulation. Marginal individuals who would purchase an insurance policy post premium regulation would have a WTP that is equal to the difference between the maximum premium they would be willing to pay and would they pay in their insurance contract. Formally, the $WTP$ can be expressed as:
\begin{equation}\label{eq:wtppol6}
WTP_6=\sum(H_0(P^{max}_{ti}-p^{reg}\lambda_PW_{ti})+(1-H_0)(p-p^{reg})\lambda_PW_{ti})
\end{equation}
where $H_0$ refers to the same indicator variables used in Equation (\ref{eq:WTPpol1}).
\item Offering Disaster Prevention Methods: This policy change only affects the individual who would receive the disaster prevention method. The WTP of this marginal individual would be the amount saved, if a catastrophe happened, due to reducing the ex ante catastrophe wealth loss rate, $\lambda_R$, to the ex post catastrophe wealth loss rate, $\lambda^D_R$. Therefore, the WTP can be expressed as:
\begin{equation}
WTP_7= (\lambda_{Rti}-\lambda^{D}_{Rti})\alpha_{ti}W_{ti}
\end{equation}
This is where $\lambda^{D}_{Rti}$ is the real loss incurred by an individual $i$ due to catastrophes after investing in a disaster prevention method.
\item Increase Reinsurance Funds: Only individuals who are policyholders both at times $t$ and $t+1$ would be willing to pay for this policy change. If the insurer's exit parameter, $\epsilon$, denotes their insolvency risk, policyholders would be willing to insure against their claim default risk \textit{if} a catastrophe happened. Formally, $WTP$ can be expressed as:
\begin{equation}\label{eq:WTPpol8}
WTP_8=\sum ((1-H_0)*(\epsilon_j\alpha_{ti}(\lambda_pW_{ti})))
\end{equation}
where $H_0$ refers to the same indicator variable used in Equation (\ref{eq:WTPpol1}).
\end{itemize}
\subsubsection{Net cost of Government Spending (G)}
\label{cost}
As described by \cite{finkelstein2020welfare}, the Net Cost to Government component of the $MVPF$ is composed of: (1) mechanical cost of policy change and (2) fiscal externalities. In our model, the mechanical cost is financed through taxation (see Section \ref{taxsystem} for the government's tax system). The fiscal externalities are unintended effects that occur due to or in spite of policy changes. These are welfare costs/benefits incurred due to a policy change and for which no one pays for.
\noindent The estimated mechanical cost of each policy change is described in the list below.
\begin{itemize}
\item No Action: This policy change is costless to the government.
\item Offering government-provided insurance: We assumed that the mechanical cost of offering government-provided insurance policies is a fixed value $x$ per policy. This corresponds to the potential administrative and marketing costs that came with the insurance.
\item Easing Insurer Solvency Requirements: We assume that this policy change costs a fixed amount $x$ of administrative costs needed impose this change on private insurers.
\item Provide early warnings/awareness campaigns: The mechanical cost of educating an individual $i$ about their risk exposure depends on their social class, $c$, (see Section \ref{ind} for a recap on individuals' attributes). It costs a fixed amount $x$ to correct the beliefs of a middle class individual. It costs a fixed amount $1.5x$ ($0.5x$) to correct the beliefs of a low (upper) class individual.
\item Increase Government Subsidies on Premium Rates: If the government intends to reduce the premium rates of private insurers by a share $s\in [0,1]$ through subsidies, the cost of the subsidy per individual $i$ of getting insurance from insurer $j$ is $s*p_j\lambda_{Pti}W_{ti}$.
\item Insurance premium regulation: The mechanical cost of imposing premium regulations is a value $x$ representing the required administrative costs to impose this change on existing private insurers.
\item Offering Disaster Prevention Methods: The mechanical cost of this policy change is an amount $x$ for every unit of wealth at risk reduced by disaster prevention methods, $(\lambda_{Rti}-\lambda^D_{Rti})W_{ti}$.
\item Increase Reinsurance Funds: The mechanical cost of this policy change is the amount each insurer expects it would need over and above its current total assets.
\end{itemize}
\noindent In addition to the mechanical cost, the allowable policy interventions above can be associated with the fiscal externalities below:
\begin{enumerate}
\item Crowding Out Private Insurers: If the government charges insurance at lower premium rates than private insurers, individuals are likely to purchase insurance policies from the government. This can crowd out private insurers. We measure this fiscal externality as the sum of the total assets available with a crowded-out insurer. This represents the amount an insurer could have used to supply catastrophe insurance policies but was lost instead.
\item Debt-related Tax Raises: If at any time $t$ the government is required to pay more claim liabilities due to a catastrophe than it has in its funds, it is obliged to borrow money. To pay its interest-bearing debts, the government would be obliged to raise taxes on individuals in the future. We measure costs related to this externality as the unexpected tax raises intended to serve public debt.
\item Private Insurer Insolvency: If the sequence of government interventions until time-step $t$ failed to prevent insurers from becoming insolvent, individuals can be left vulnerable against catastrophe losses. We measure this fiscal externality as the sum of the unmet liabilities insurers were not able to pay due to their insolvency.
\item Cry-Wolf Effect: This externality represents individuals' reduced receptiveness to educational campaigns and early warnings when they fail to see real-evidence of catastrophes. The cry-wolf effect was described a potential caveat in the effectiveness of educational campaigns in \cite{smetters2008financing}. We measure this fiscal externality by measuring an individual's expected risk exposure that went unperceived due to the cry-wolf effect of educational campaigns.
\item Moral Hazard: An undesirable consequence of government intervention happens when it changes individuals' behavior making them more exposed to catastrophe risk, for example by building property in high-risk areas. This change in intentions due to government policy change was described in \cite{smetters2008financing} and \cite{kunreuther2013insurance}. We measure this fiscal externality by measuring the deviation between pre-intervention risk exposure and post-intervention risk exposure at a constant level of wealth.
\item Catastrophe-related losses: If a catastrophe hits the environment, the amount of wealth lost is a loss incurred by society that is captured as a fiscal externality. It indicates government policy failure in preventing wealth losses due to catastrophes on society.
\end{enumerate}
A single policy change may trigger one or more of the above fiscal externalities. Through repeated training over a large number of unique episodes, the government agent would estimate the fiscal externality related to a policy change (see Section \ref{qlearning} for details on the Q-learning algorithm and Section \ref{results} for the $MVPF$ estimates of policy changes).
\subsection{Collecting Taxes}
\label{taxsystem}
At any time-step $t$, the government has to make certain payments including premium subsidies, catastrophe loss claim payments, and surprise reinsurance. To finance these payments, we assumed that the government adopts a progressive income tax system which raised funds from the individuals in the society.
In its tax system, the government's objective is to raise funds that are enough to meet its liabilities yet are socially fair. The progressive tax system divided the individuals in the society into three groups: low, middle, and high income groups. Each individual $i$ in the society would be assigned to a tax rate based on the income group it belonged to and would pay its tax dues out of its constant income, $Y_i$, at any time-step $t$. (See Section \ref{popsetup} for a recap on individual attributes and assumptions related to them.)
\section{Testing the Environment: Allowing No Government Intervention}
\label{nogov}
In this section, we evaluate the extent toward which the environment we developed in Sections \ref{envrionment}, \ref{ind}, \ref{ins} is reflective of stylized facts of real free catastrophe insurance markets i.e. those operating \textit{without government intervention}. We parameterized the attributes defined in Sections \ref{popsetup} and \ref{inssetup} by assuming distributions for them in our environment (see Appendix \ref{parameters} for details on the parameterization of the environment's attributes). We, then, run several episodes of our environment (see Section \ref{timeline} for a recap on episode timeline). We implemented the environment on Python and the assignment of the parameters is discussed in Appendix \ref{parameters}.\footnotemark \footnotetext{A link with the full running code of our model will be provided in the final submission of this paper.}
\subsection{Stylized facts of free catastrophe insurance markets}
\label{numtrend}
According to literature, catastrophe insurance markets exhibit certain characteristics found across a large sample of real catastrophe insurance markets (see Section \ref{intro} for a recap on real examples of failures of free catastrophe insurance markets). We will evaluate the extent towards which our environment is reflective of the following stylized facts:
\begin{enumerate}
\item Free catastrophe insurance markets generate inadequate coverages \citep{charpentier2014natural}.
\item Purchases of catastrophe insurance tend to increase right after the society witnesses a catastrophe experience and while the memory is still there \citep{kunreuther2013insurance}, \citep{gallagher2014learning}, \citep{atreya2015drives}, and \citep{dumm2020representative}.
\item Policyholders tend to cancel their insurance coverages as the memory of past catastrophe fades and the time since the last catastrophe exceeds 5 years \citep{kunreuther2013insurance} and \citep{atreya2015drives}.
\item After a catastrophe experience, many insurers respond by restricting supply and raising premium rates \citep{kunreuther2013insurance} and \citep{smetters2008financing}.
\item Many insurers exit the market right after a catastrophe experience. For example, many private insurers cut their terrorism insurance supply right after 9/11 attacks \citep{cummins2002can} and \citep{kunreuther2013insurance}.
\item Many individuals are willing to purchase catastrophe insurance but they are unable to find insurance at an affordable price \citep{kousky2012explaining}.
\end{enumerate}
\subsection{The Environment in Graphs{\footnotemark}}\footnotetext{All figures in this paper are best analyzed in a colored version of this submission. We strongly recommend the reader to read a colored version of the paper.}
In the subsequent tests, we assumed that our environment was composed of a population of $n=100$ individuals and $m=5$ initial insurers (see Sections \ref{ind} and \ref{ins} for a recap on the individual and insurer agents). An important assumption we also made was that poorer individuals of the environment were more likely to lose more as a proportion of their wealth due to catastrophes, i.e. poorer individuals have a higher $\lambda_{R}$, than richer individuals. We base this assumption on multiple studies which suggested that poorer individuals are likely to be exposed to greater catastrophe risk due to locating in high risk prone areas, and lower re-location abilities \citep{perlin2001residential}, \citep{boustan2012moving}, \citep{boustan2020effect}, and \citep{SMAHSA2020}.
\subsubsection{Proportion of covered losses}
\label{coveredloss}
Without government intervention, we are interested in observing the coverage rate in our environment. We defined the coverage rate as the sum of the expected loss due to catastrophes as a proportion of total expected losses in the environment. Below we document two types of behavior exhibited by selected individuals in our environment. We observed the coverage rate under two different scenarios: (1) no catastrophe experience at all, and (2) more than one catastrophe experience.
\begin{figure}[!ht]
\centering
\subfloat[No Catastrophe Experience]{\includegraphics[width=0.4\textwidth]{coveredno.png}}
\hfill
\subfloat[2 Catastrophe Experiences (Red Lines)]{\includegraphics[width=0.4\textwidth]{cov2ex.png}}
\caption{(a) Covered expected losses as a proportion of total losses show a short-term rise in coverage but falls again to 0\% by the end of the episode. Moreover, the maximum coverage percentage in the episode is little over 1\%, which is inadequate and consistent with stylised fact 1 discussed in Section \ref{numtrend}. (b) Covered expected losses as a proportion of total losses increases with catastrophe experience (red line) but declines as the memory of catastrophe fades with time, consistent with trend 2 in Section \ref{numtrend}. However, the maximum covered percentage is less than 40\% and the episode ends with less than 1\% coverage which is inadequate and consistent with trend 1 in Section \ref{numtrend}.}
\end{figure}
\FloatBarrier
\subsubsection{Evolution of Gini Index}
We explored what happens to the Gini Index in the our environment with and without catastrophe experience. In those experiments, we temporarily assumed that no individual purchased catastrophe insurance at any time-point in the episode. We made this assumption to observe the full effect of catastrophes on wealth equality in the society, without being distorted by those individuals who protect their wealth. We found that the Gini index rises with each catastrophe experience, consistent with studies on the effects of catastrophes on income and wealth distribution \citep{boustan2020effect}.
\begin{figure}[!ht]
\centering
\subfloat[No Catastrophe Experience]{\includegraphics[width=0.4\textwidth]{ginino.png}}
\hfill
\subfloat[5 Catastrophe Experiences]{\includegraphics[width=0.4\textwidth]{gini.png}}
\caption{(a) Gini index declines as all individuals uninterruptedly accumulate savings. (b) Gini index hikes after catastrophe experience (red lines) because catastrophes cause greater losses on the poorer segments of society than the richer segments.}
\end{figure}
\FloatBarrier
\subsubsection{Individuals' Insurance Purchase Behavior}
From our experiments, we present three dominant types of individual agent behavior. The heterogeneity in the behavior of the individual agent was achieved by heterogeneous initialization of their attributes of (see Appendix \ref{parameters} for agent attribute assignment). We present behavior from Episode A in which individuals experienced no catastrophes and Episode B in which individuals experienced two catastrophe experiences.
\begin{figure}[!ht]
\centering
\subfloat[Episode A: Risk Perception ]{\includegraphics[width=0.5\textwidth]{indnocat.png}}
\hfill
\subfloat[Episode A: Wealth ]{\includegraphics[width=0.5\textwidth]{wealth.png}}
\hfill
\subfloat[Episode A: Premium Demanded VS Premium Offered ]{\includegraphics[width=0.5\textwidth]{prems.png}}
\caption{\small (a) Individual's risk perception declines with no evidence of catastrophes occurring, this decline is sustained by individuals' optimism and amnesia biases, (b) Individual's wealth constantly increases as they accumulate savings without catastrophe disruptions, (c) Individual's $P^{\text{max}}$ is far below any premium rate offered by the available insurers in the market. This makes insurance purchase unfeasible and is consistent with stylised fact 6 in Section \ref{numtrend}. Overall, when no catastrophes happen, very few individuals purchase insurance at any point in Episode A.}
\end{figure}
\FloatBarrier
\begin{figure}[!ht]
\centering
\subfloat[Episode B: Risk Perception ]{\includegraphics[width=0.5\textwidth]{ind23rp.png}}
\hfill
\subfloat[Episode B: Wealth]{\includegraphics[width=0.5\textwidth]{ind23wealth.png}}
\hfill
\subfloat[Episode B: Premium Demanded VS Premium Offered ]{\includegraphics[width=0.5\textwidth]{ind23prem.png}}
\caption{(a) Individual risk perception spikes after catastrophe experience, after which they immediately purchase insurance. They remain covered for the time period highlighted by the blue lines. As time since the last witnessed catastrophe increases, individual's risk perception falls until they cancel their insurance coverage. Another catastrophe occurs at time 45 and the individual's risk perception spikes again. The individual re-purchases insurance after the shock. (b) The individual was covered by catastrophe insurance (blue lines) after they witnessed a catastrophe experience, therefore, their wealth was always shocked by the catastrophes, (c) Individual's $P^{\text{max}}$ only exceeded insurers' premium rates after the catastrophe experience. However, it fell below the rates of all other insurers as risk perception fell. All these observations are consistent with stylised facts 2, 3, and 6 from Section \ref{numtrend}}
\end{figure}
\FloatBarrier
\begin{figure}[!ht]
\centering
\subfloat[Episode B: Risk Perception ]{\includegraphics[width=0.5\textwidth]{ind29rp.png}}
\hfill
\subfloat[Episode B: Wealth ]{\includegraphics[width=0.5\textwidth]{ind29wealth.png}}
\hfill
\subfloat[Episode B: Premium Demanded VS Premium Offered ]{\includegraphics[width=0.5\textwidth]{ind29prem.png}}
\caption{(a) This individual's risk perception was relatively high enough, due to heterogeneity in the environment, to allow them to be covered (blue lines) before experiencing a catastrophe experience. However, they cancelled their catastrophe insurance coverage right before a catastrophe happened in society. After the catastrophe happened, their risk perception spiked and they repurchased insurance and remained covered until the end of the episode, (b) Individual's wealth is shocked by the first catastrophe as they were uninsured. After the first catastrophe, they remain insured throughout the episode and their wealth was unaffected by the second catastrophe as opposed to the individual in Figure 6, (c) The individual's pre-catastrophe $P^{\text{max}}$ was higher than some of the active insurers. Post-catastrophe, it remained higher than the rates of all other insurers and this allows them to be insured throughout the entire episode. }
\end{figure}
\FloatBarrier
\subsubsection{Evolution of Insurer Premium Rates}
In our experiments, we found that each catastrophe experience caused insurers to increase premium rates after the shock in an irrational behavior.
\begin{figure}[!ht]
\centering
\subfloat[No Catastrophe Experience]{\includegraphics[width=0.35\textwidth]{inspremnocat.png}}
\hfill
\subfloat[5 Catastrophe Experiences]{\includegraphics[width=0.35\textwidth]{inspremcat.png}}
\hfill
\caption{ \small (a) The insurer premium rate declines as no sales happen and to coverage with the market's average premium rate by competitive pressures. The insurer eventually exits the market. (b) Insurers raise their premium rates, irrationally after catastrophe experiences, consistent with stylised facr 4 in Section \ref{numtrend}. }
\end{figure}
\FloatBarrier
\section{Testing the Environment: Allowing Government Intervention}
\label{qlearning}
Up until this point in the paper, we designed an environment composed of three types of agents: individual, insurer, and government (see Section \ref{envrionment} for a recap on environment setup and Sections \ref{ind}, \ref{ins}, \ref{gov} for a recap on agent design). We also observed, in many experiments, that the environment reflected many stylised facts about real catastrophe insurance markets without government intervention (see Section \ref{nogov} for a recap). In this section, we allow our government agent to intervene in the environment with the goal of maximizing long-term welfare of the individuals under catastrophe risk. We are particularly interested in observing which of the interventions have the highest $MVPF$, marginal value of public funds, under various situations (see Section \ref{intervene} for a recap on the government's allowable interventions and Section \ref{observe} for a discussion on policy $MVPF$). By reinforcement learning, the government agent will “learn”
its optimal behavior, i.e. intervention, by iterative “trial and error” based on “feedback” it receives from
the environment. The reinforcement learning algorithm we will use in this work is Q-learning.
\subsection{Government Intervention: A Q-learning Problem}
A Q-learning algorithm is a model-free\footnotemark \footnotetext{A model-free algorithm is one that does not rely on a transition probability matrix of the underlining environment to solve the problem of deriving the optimal policy intervention. This means model-free algorithms help the agent derive optimal policy with minimal knowledge of the environment.} off-policy\footnotemark \footnotetext{An off-policy learner learns the value of optimal policy independently of the current action taken. This is contrasted with on-policy learning where the learner learns the value of the policy currently pursued.} reinforcement learning algorithm that iteratively learns the quality of taking an action in a given state of the environment. A Q-learning problem is composed of a learning agent, an environment with which the learning agent interacts, an action space which the learning agent uses to intervene in the environment, a reward function which provides the agent with feedback on the quality of the intervention, and a state space which is equivalent to the "context" in reference to contextualized bandits.
For our purposes:
\begin{itemize}
\item \textbf{Learning Agent:} The Government Agent designed in Section \ref{gov}
\item \textbf{Envrionment:} The Environment in Section \ref{timeline}
\item \textbf{Action Space:} The set of allowable policy interventions as defined in Section \ref{intervene}
\item \textbf{Reward:} The Marginal Value of Public Funds (see Section \ref{observe} for recap)
\item \textbf{State Space:} We look at the individuals' \textbf{awareness} of their catastrophe risk exposure, the \textbf{availability} and the \textbf{affordability} of catastrophe insurance policies in the market. We will precisely consider the following states:
\begin{itemize}
\item State 1: low awareness, low supply of catastrophe insurance, affordable premium rates.
\item State 2: low awareness, high supply of catastrophe insurance, affordable premium rates.
\item State 3: low awareness, high supply of catastrophe insurance, unaffordable premium rates.
\item State 4: high awareness, low supply of catastrophe insurance, unaffordable premium rates.
\item State 5: high awareness, high supply of catastrophe insurance, unaffordable premium rates.
\end{itemize}
\end{itemize}
\subsubsection*{Learning the Optimal Policy}
Our government agent, described in Section \ref{gov}, does not have any prior knowledge about the environment it is intervening in. It intervenes in the environment by taking an action via \textbf{exploration} or \textbf{exploitation}. Under exploration, the agent randomly picks an action from the action space to learn more about the underlying environment. Under exploitation, the agent picks the action that has so-far yielded the highest reward in the training process. Exploration and exploitation are two conflicting objectives where the former ensures that the government agent knows sufficiently enough about the environment and the latter speeds up the learning process. In our model, we handle the exploration-exploitation trade-off through an $\epsilon$ greedy strategy i.e. we define the probability with which the agent is likely to explore or exploit.
Once taken by either exploration or exploitation, the action causes the other agents, i.e. the individuals and insurers, to change behavior thus generating a feedback signal observed by the government. The feedback may be in the form of a reward (penalty) that positively (negatively) reinforces the action and makes it more (less) likely to be taken again under similar circumstances. Our aim is to learn the Q-values of all the government's interventions. We define the Q-values, after which Q-learning is named, as the expected reward of an intervention at a given state:
\begin{equation}
\label{eq:bellman}
q(S_t,A_t)=E[R_{t+1}+\gamma q(S_{t+1},A_{t+1})\mid S_t, A_t]
\end{equation}
where $S_t$, $A_t$, $R_t$ denote the environment's state, from the state space, and the government's action, from the action space, and the environment's reward, i.e. the MVPF, respectively.
Since our reward function is the policy's marginal value of public funds, $MVPF$, Equation (\ref{eq:bellman}) can be rewritten as:
\begin{equation}
\label{eq:bellmanmv}
q(S_t,A_t)=E[MVPF_{t+1}+\gamma q(S_{t+1},A_{t+1})\mid S_t, A_t]
\end{equation}
Using \cite{sutton2018reinforcement}, Equation (\ref{eq:bellmanmv}) can be rewritten in an iterative fashion as follows:
\begin{equation}
\label{eq:bellmanit}
q_{old}(S_t,A_t)=(1-\eta) q_{old}(S_t,A_t)+\eta \max_{A_{t+1}} q(S_{t+1},A_{t+1})
\end{equation}
where $\eta$ is the learning rate given to the algorithm as a hyper-parameter.
By repeated interaction over a large number of episodes, the Q-values of all the policy interventions will converge and reveal the expected $MVPF$ at every possible state in the state space and action in the action space. The algorithm below summarizes how the government agent learns.
\footnotesize
\begin{algorithm}
\caption{Government Policy Learning Process (Q-learning)}
\begin{algorithmic}[1]
\For{\text{each episode $\in$ training episodes}}
\State \text{Government agent observes the state of the environment after algorithm in Section \ref{timeline} is played}
\State \text{Government intervenes via exploration or exploitation in an $\epsilon$-greedy strategy}
\If {Government agent chooses to \textbf{explore}}
\State \text{Government intervenes by taking a random action from its action space}
\EndIf
\If {Government agent chooses to \textbf{exploit}}
\State \text{Government intervenes by choosing the action that has the highest Q-value}
\EndIf
\State \text{Government observes the reward/penalty associated with the action taken.}
\State \text{Government updates the Q-value of the chosen action by Equation (\ref{eq:bellmanit}).}
\EndFor
\end{algorithmic}
\end{algorithm}
\normalsize
\FloatBarrier
The Q-learning algorithm guarantees convergence to a global optimum if the government interacts with the environment for an infinitely large number of times \citep{watkins1989learning}, \citep{watkins1992q}. For our purposes, we will train the government agent to derive the optimal intervention policy over 1,000,000 episodes.
\subsection{The Optimal Policy and Policy Insights}
\label{results}
After training, the Q-values, i.e. the expected $MVPF$, of each policy intervention under various states of the environment are shown in Table 5.
Throughout the subsequent analysis, we will code the states of the environment and government intervention actions as follows:
\footnotesize
\begin{singlespace}
\begin{longtable}{
p{1.2cm}
p{15.3 cm}
}
Code&Definition\\ \midrule
\endfirsthead
\endhead
Action 1& Offer state-provided insurance (see Section \ref{intervene} for policy design)\\
Action 2& Ease Solvency Requirements (see Section \ref{intervene} for policy design)\\
Action 3& Provide Awareness Campaigns (see Section \ref{intervene} for policy design)\\
Action 4& Increase Subsidies (see Section \ref{intervene} for policy design)\\
Action 5& Provide Premium Regulations (see Section \ref{intervene} for policy design)\\
Action 6& Offer Disaster Prevention Methods (see Section \ref{intervene} for policy design)\\
Action 7& Increase Reinsurance (see Section \ref{intervene} for policy design)\\
State 1&low awareness,low private supply of cat insurance, affordable premium rates of private insurance\\
State 2&low awareness,high private supply of cat insurance, affordable premium rates of private insurance\\
State 3&low awareness,high private supply of cat insurance, unaffordable premium rates of private insurance\\
State 4&high awareness,low private supply of cat insurance, unaffordable premium rates of private insurance\\
State 5&high awareness,high private supply of cat insurance, unaffordable premium rates of private insurance\\
\midrule
\end{longtable}
\small
\begin{longtable}{
p{1.1 cm}
p{1.8 cm} p{1.5 cm}p{1.5 cm}p{1.5 cm}p{1.5 cm}p{1.5 cm}p{1.5 cm}p{1.5 cm}
}
\caption{Q-values of policy changes under catastrophe risk}\\
\toprule
&No Action&Action 1&Action 2&Action 3&Action 4&Action 5&Action 6&Action 7\\ \midrule
\endfirsthead
\caption[]{Q-values (Continued)}\\
\toprule
&Action 1&Action 2&Action 3&Action 4&Action 5&Action 6&Action 7&Action 8\\ \midrule
\endhead
State 1&3.709&\cellcolor{black!25}5.657&3.861&\cellcolor{black!10}4.356&0.952&2.999&3.902&3.856\\
State 2&\cellcolor{black!10}0.606&0.156&0.047&\cellcolor{black!25}0.686&0&0.414&0.354&0.296\\
State 3&1.308&1.699&1.123&2.170&\cellcolor{black!10}2.239&\cellcolor{black!25}3.307&2.142&1.132\\
State 4&1.052&1.566&\cellcolor{black!10}1.623&0.962&0.639&0.705&1.054&\cellcolor{black!25}1.788\\
State 5&0.476&0.896&0.179&0.439&0.782&\cellcolor{black!25}2.002&\cellcolor{black!10}1.731&0.083\\
\midrule
\end{longtable}
\end{singlespace}
\normalsize
In dark grey we highlighted the actions which yielded the highest expected $MVPF$ in each state. The second best intervention actions are highlighted in light grey. The government's optimal intervention policy would be to adopt the dark grey shaded action of each state of the environment.
\subsubsection*{State 1}
Under State 1, Table 5 shows that offering state-provided insurance is the optimal intervention. A \$1 spent on increasing state-provided insurance will increase welfare by around 5.66. This result is driven by two factors. First, in a situation where privately supplied catastrophe insurance policies are low, the majority of the individuals in the population are likely to be uninsured. This means that the willingness to pay (WTP) for this policy change would be high as the majority of the population would be willing to pay up to their maximum payable premium $P^{max}_{ti}$. If the government combines this policy change with an increase in catastrophe awareness campaigns, which is the next best policy intervention, individuals' willingness to pay would be even higher as their $P^{max}_{ti}$ would be higher due to higher awareness. Second, increasing state-offered insurance, as compared to most of the other policy interventions, does not impose a sustained financial burden on the government. The government is annually paid a premium rate by insured individuals and, at worst, the government would be obliged to cover the losses of the insured individuals in times of catastrophes. The latter liability is not included in the direct costs of providing state catastrophe insurance.
The next best policy intervention, according to Table 5, is to provide catastrophe awareness sessions to educate individuals about their true catastrophe risk. A \$1 spent on each would increase welfare by 4.356. As we described above, providing catastrophe awareness sessions increases individuals' awareness of their risk exposure. In a state of the world like that of State 1, where individuals have low awareness, the deviation between individuals' maximum payable premium, $P^{max}_{ti}$, under low awareness with that under full awareness is expected to be very high. Therefore, according to Equation \ref{eq:wtppol3} in Section \ref{wtp}, the willingness to pay by individuals for this policy change is high. Despite that, it is one of the best policy interventions yet not the best intervention for two reasons. First, the cost of administering catastrophe awareness is high in our model and is dependent on the social class of individuals in our society (see Section \ref{cost} for recap). This causes every unit of welfare generated by this policy change to be associated with a higher cost than many other policy changes. The second reason is because the welfare increases are not sustainable. If the government keeps on investing in catastrophe awareness under State 1, the cry wolf effect starts to limit the effectiveness of the policy (see Section \ref{cost} for recap on cry wolf effect). In addition, even if individuals' catastrophe awareness rises significantly, they may still not be able to manage their catastrophe risks as supply of catastrophe insurance is low under this state of the environment, i.e. demand is constrained by supply.
The worst policy intervention under this state of the environment would be to increase subsidies. According to our model, a \$1 spent on subsidies would increase welfare by 0.952. This is because willingness to pay for this policy change is lower than the cost to the government of administering subsidies. Willingness to pay is low because, under this state, privately supplied catastrophe insurance, when it is available despite its low supply, is affordable. Therefore, willingness to pay for subsidies is not expected to be higher for this policy intervention than other policies. However, the cost to the government of administering this policy is very high. The government would not only have to pay for a part of the premium rates paid by individuals every time they are insured but also bear the consequences of moral hazard. Providing subsidies to individuals gives them the wrong incentives and would further lower their catastrophe awareness. Therefore, the cost to the government of this policy change is higher than individuals' willingness to pay for it.
Another undesirable intervention would be to impose premium regulations on insurers. According to Table 5, a \$1 spent on this policy intervention would increase welfare by 2.99. This is clearly below the welfare increase that would occur to society if the government decided to not intervene at all (3.709 from Table 5). Therefore, a rational government faced with the option of imposing premium regulations and not intervening at all should choose the latter. The reason behind this is that imposing premium regulations are unnecessary under this state as premium rates are affordable and exaggerated premium rates are not the reason why individuals are not buying catastrophe insurance.
\subsubsection*{State 2}
Under State 2, Table 5 shows that the optimal policy intervention is to provide catastrophe awareness sessions. A \$1 spent on providing catastrophe awareness sessions increases welfare by 0.686. The next best action is to take no action at all. A \$1 saved by taking no action instead of intervening with any policy change increases welfare by 0.606.
It is remarkable that the optimal actions under this state both yield less benefit per unit spent making it difficult for the government to make the case for intervention. This observation is due to the fact that, under State 2, conditions are quite favorable and do not invite intervention. Under State 2, while individuals have low catastrophe awareness, there is a high private supply of catastrophe insurance and premium rates are affordable. Under these conditions, individuals can find catastrophe insurance contracts that suit their underestimated understanding of their risk exposure. Therefore, adequate risk management still occurs and the role of government intervention is limited. While investing in catastrophe awareness is the best policy response, conditions pre-intervention were already favorable because not only does every dollar spent increases welfare by less than a dollar but also the welfare generated by the policy intervention is very close to not intervening at all.
In real catastrophe insurance markets, conditions similar to those of State 2 can occur in times of economic booms without any recent history of catastrophes. People's incomes are high enough for them to purchase catastrophe insurance and firms see an opportunity in the market, which witnessed no recent catastrophe, and therefore increase supply of catastrophe insurance (sometimes irrationally). In light of the status quo, government is satisfied with the situation in the market and is perhaps indifferent between further investing in catastrophe awareness or taking no action at all.
\subsubsection*{State 3}
Under State 3, market prospects are promising for insurers to supply catastrophe insurance yet they are unaffordable to most individuals. Such a scenario may occur in societies with high income inequality where catastrophe insurance may be accessible only to the richest segments of society. Under such high inequality, the majority of the population is likely to be poorly educated and, therefore, have low perception of their true catastrophe protection.
According to Table 5, the optimal policy intervention is for the government to impose premium regulations on insurers. A \$1 spent on imposing premium regulations would increase welfare by 3.307. Premium regulations include imposing premium ceils on insurers such that maximum premium charged would be actuarially fair. This policy change would increase individuals' purchase of catastrophe insurance as it would help make the offered premium rates be within their affordability i.e. less than or equal to the maximum payable premiums, $P^{max}_{ti}$, of many individuals. If this policy is combined with the provision of catastrophe awareness, the third best policy intervention under this state, premium regulation would be more effective in improving catastrophe protection of society as individuals' $P^{max}_{ti}$ would be high enough to match the efficient level of their true risk exposure.
The second-best policy intervention, according to Table 5, would be to provide subsidies on catastrophe insurance. A \$1 spent on this policy change would increase welfare by 2.24. This result is driven by the low affordability of catastrophe insurance policy despite their high availability; a combination that hints at high income inequality in society. The low-income households, who may represent a sizeable proportion of households in State 3, may not be able to afford catastrophe insurance even if their premiums are actuarially fair. In such a case, the government would subsidize catastrophe insurance to help low-income households obtain catastrophe insurance. A caveat to this policy intervention, which is the reason why it is not the optimal policy intervention under this state, is that it may provide bad incentives and cause moral hazard. To address this caveat, the government agent can combine this policy change with Action 6, increasing the provision of catastrophe prevention technology, which was the fourth-best policy intervention under State 3. Combining these two interventions reduce the effects of potential moral hazard. This policy suggestion is similar to the suggestion proposed by \cite{jscata} who argued that providing flood insurance should also provide poor individuals with options to lower their risk exposure.
The least desirable interventions under State 3 are easing solvency requirements and increasing reinsurance funds. Table 5 shows that these interventions give less welfare per \$1 spent than deciding not to intervene at all. These policy interventions mainly target increasing catastrophe insurance supply which is already high under State 3.
\subsubsection*{State 4}
Under State 4, despite high catastrophe awareness, private supply of catastrophe insurance is not only scarce but, when available, is unaffordable. This indicates that despite a healthy demand condition, a supply-side problem exists in the market. Therefore, it make sense for optimal interventions, according to Table 5, to be to increase reinsurance funds (best intervention) and to ease solvency requirements (second-best intervention). A \$1 spent on increasing reinsurance funds would increase welfare in the society by 1.788. A \$1 spent on easing insurer solvency requirements would increase welfare by 1.623. Increasing reinsurance funds increase insurers' reinsurance accounts which increase insurers' assets as shown in Equation (\ref{eq:assets}) in Section \ref{lossmodel}. An increase in the assets available with insurers can help increase the supply of catastrophe insurance policies. Easing solvency requirements reduces the amount insurers need to keep in reserves per policy. According to Equation (\ref{eq:supply}) in Section \ref{lossmodel}, supply of catastrophe insurance is inversely related to reserve kept aside per policy. A reduction in the reserve requirement per policy increases the supply of catastrophe insurance. While easing solvency requirements put insurers at a higher risk of insolvency, combining this policy intervention with increasing reinsurance funds helps counter this risk by supplying solvency-constrained insurers with emergency funds when needed.
The third best policy intervention under State 4 is for the government to offer state-provided insurance policies. A \$1 spent on this policy intervention would increase welfare by 1.566. An increase in state-provided catastrophe insurance would increase supply of catastrophe insurance in the society and ameliorates its scarcity under State 4. The fourth best policy intervention, according to Table 5, is to offer disaster prevention technology. A \$1 spent on this policy intervention would increase welfare by 1.054. This result is driven by the fact that disaster prevention technology can help individuals reduce their catastrophe risk exposure and therefore substitute for catastrophe insurance which is scarce under State 4.
The least effective policy intervention, according to Table 5, is to provide subsidies on catastrophe insurance. A \$1 spent on this policy intervention would increase welfare by 0.639 which is lower than the welfare generated by deciding not to intervene at all. While subsidies address the unaffordability of catastrophe insurance, they do not address the scarcity of insurance policies in the market. Increasing subsidies on catastrophe insurance also come at a high cost to the government: the government is not only obliged to bear the cost of the subsidy itself but also deal with the moral hazard that come with insurance policy subsidization (see Section \ref{cost} for a recap on government policy cost and fiscal externalities).
\subsubsection*{State 5}
Under State 5, while individuals have a high awareness of their risk exposure and demand for catastrophe insurance is in a healthy condition, the supply of catastrophe insurance, despite widely available, is unaffordable to most individuals.
According to Table 5, the optimal intervention is for the government to regulate catastrophe insurance premium rates. A \$1 spent on imposing premium regulations would increase welfare in society by 2.002. Like in State 3, imposing premium regulations ensure that insurers do not charge exaggerated premiums and charge the actuarially fair risk premium rate. This policy intervention would make premium rates more affordable, i.e. within the maximum payable premiums, $P^{max}_{ti}$, of most individuals. As opposed to subsidies, imposing premium caps such that they reflect the true catastrophe risk would not cause moral hazard.
The second best policy intervention, according to Table 5, is for individuals to invest in disaster prevention technology. Given the unaffordability of catastrophe insurance under State 5, investing in disaster prevention technology reduces individuals' catastrophe risk exposure. Namely, it reduces the share of wealth they lose due to catastrophes, $\lambda_{Ri}$. This investment would not only help individuals reduce their risk exposure but also reduce the amount they would need to get in insurance. Therefore, individuals would not need to invest a lot of their income in purchasing catastrophe insurance.
Under State 5, the most ineffective actions are easing solvency requirements, providing catastrophe awareness sessions, and increasing reinsurance funds. According to Table 5, these policy interventions increase welfare by less per \$1 spent than not intervening at all. Easing solvency requirements and increasing reinsurance funds help increase catastrophe insurance supply, which is already high under State 5. Providing catastrophe awareness sessions do not help in catastrophe preparedness as individuals already have high awareness under State 5.
\section{Conclusion and Future Work}
\label{conclusion}
The goal of this paper was to (1) develop a sequential repeated game of individuals, insurers, and a government that reflects the trends and behavior in real catastrophe insurance markets and (2) explore the potential of RL algorithms, Q-learning in particular, in providing insights as what could be the optimal government intervention policy. The best (worst) interventions, as derived by Q-learning, were those that generated the highest (lowest) welfare per \$1 spent on them. We summarize our findings in the table below:
\footnotesize
\begin{longtable}{
p{5.7 cm}|
p{5.5cm}| p{5.5 cm}
}
\toprule
\textbf{State of the Environment}&\textbf{Best Interventions}&\textbf{Worst Interventions}\\ \midrule
\endfirsthead
\\
\toprule
\textbf{State of the Environment}&\textbf{Best Interventions}&\textbf{Worst Interventions}\\ \midrule
\endhead
\multirow{3}{5.5 cm}{low catastrophe awareness,\\ low supply of catastrophe insurance, \\unaffordable insurance premium rates}&offer state-provided insurance&increase subsidies on insurance\\
&offer catastrophe awareness campaigns&impose premium regulations\\&&\\
\midrule
\multirow{3}{5.5 cm}{low catastrophe awareness,\\ low supply of catastrophe insurance, \\affordable insurance premium rates}&offer catastrophe awareness campaigns&increase subsidies on insurance\\
&increase reinsurance&impose premium regulations\\&ease solvency requirements&\\
\midrule
\multirow{4}{5.5 cm}{low catastrophe awareness,\\ high supply of catastrophe insurance, \\unaffordable insurance premium rates}&impose premium regulations&ease solvency requirements\\
&increase subsidies on insurance&increase reinsurance funds\\&offer catastrophe awareness campaigns&\\&offer disaster prevention technology&\\
\midrule
\multirow{4}{5.5 cm}{high catastrophe awareness,\\ low supply of catastrophe insurance, \\unaffordable insurance premium rates}&increase reinsurance funds&increase subsidies on insurance\\
&ease solvency requirements&impose premium regulations\\&offer state-provided insurance&\\&offer disaster prevention technology&\\
\midrule
\multirow{3}{5.5 cm}{high catastrophe awareness,\\ high supply of catastrophe insurance, \\unaffordable insurance premium rates}&impose premium regulations&ease solvency requirements\\
&offer disaster prevention technology&offer catastrophe awareness campaigns\\&&increase reinsurance funds\\
\midrule
\end{longtable}
\normalsize
Our results contribute to the extensive literature that debate how should the government intervene in catastrophe insurance markets. We do this by reinforcement learning i.e. learning optimal policy intervention by "trial and error". Nascent to economic applications, the use of reinforcement learning, commonly used in Computer Science to train robots and AI-agents in atari games, not only allowed us to derive optimal intervention in a complex non-linear system of individuals and insurers but also evaluate a range of intervention policies by comparing them against each other.
From a policy stand-point, our work, through the creation of a micro-founded artificial society, can provide insights to policymakers wishing to compare alternative intervention policies. Our work closely relates to the recently proposed decision-making framework outlined in \citep{kunreuther2021evaluating} for evaluating intervention strategies in pandemic insurance markets. \citep{kunreuther2021evaluating} suggested producing a library of the possible "events", equivalent to the "states" in our model, and the consequences of each intervention under each event. In light of this, our study serves to set an example on how a set of intervention policies, in any context, can be compared against each other using one underlying theoretical model in an algorithmic manner.
Our study can also be further extended by estimating the distributions of the model's parameters using real data, which was not available at the time this study was conducted. Future work can also further model phenomena like the dependencies between behavioral biases in agents' design. Additionally, the government action space can be extended to include more intervention actions like choice architecture, and the behavioral risk audit proposed by \cite{meyer2017ostrich}.
\setstretch{0.8}
\bibliographystyle{chicago}
|
\section{Introduction}
\label{sec:introduction}
Video Object Segmentation (VOS) is one of the most attractive video-related research problems in the multimedia area. This work focuses on the semi-supervised setting, which aims to segment one or multiple objects in a video sequence given annotated object masks of reference frames.
In real-world videos, perturbations commonly exist due to signal noise, camera defocus, and fast motion. The model robustness becomes critical for real applications, especially for some safety-aware applications, such as autonomous driving.
However, existing VOS methods have seldom discussed the robustness against perturbations.
According to our pilot study, the performance of current advanced models \cite{cheng2021rethinking,yang2021associating,yang2020collaborative} degrade largely under simple image perturbations, as is shown in \fig{\ref{fig:teaser}}, especially for the scenes where multiple objects exist.
Towards robust VOS, we consider two key factors that matter: 1) a robust object representation extracted from references for building correlations to the target frames; 2) a robust mask calibration process to produce pixel-wise classification conditioning on the referenced object representation.
For the representation of objects in VOS, most previous works ~\cite{oh2019video,seong2020kernelized,lu2020video,cheng2021modular,wang2021swiftnet,xie2021efficient,hu2021learning,liang2020video,yang2020collaborative,hu2018videomatch,10.1145/3394171.3414035,10.1145/3394171.3413942} directly employ pixel-level features. Concretely, pixel-level matching \cite{hu2018videomatch} is utilized to track pixels across frames. Object-related information is only implicitly encoded in the pixel-level feature in terms of limited receptive fields. Such pixel-based representation is often error-prone, leading to noisy results, especially in the cases that similar objects co-exist \cite{liang2020video}. Meanwhile, following the fashion of object-tracking \cite{rt-vos}, some VOS works turn to object-level representations. For instance, objects are represented as box-bounded proposals \cite{voigtlaender2019boltvos,dmn-aoa} generated with an off-the-shelf object detector and predictions are made by correlating object proposals of the current frame with historical templates. Despite these methods can eliminate noisy predictions to some extent, fine-grained correspondences are lost, leading to inaccurate results in details.
For the mask calibration process, some recent works \cite{oh2019video,xie2021efficient} introduce network modulation \cite{huang2017arbitrary,park2019semantic,dumoulin2016learned,wang2018recovering} to conditionally decode the target object masks, which have already achieved successful results. Most methods \cite{oh2019video,xie2021efficient} consider individual objects and neglect interactions between different objects, which often fail in scenes with multiple objects.
We only find a recent method, AOT \cite{yang2021associating}, encoding object-aware interactions using transformer-based association, which demonstrates that such kind of interactions can contribute to a large performance gain. However, AOT could not discriminate similar objects well against perturbations (\fig{\ref{fig:teaser}}).
To achieve the robustness of VOS, we propose a deep network that adaptively calibrates the object representation and masks.
First, we introduce an adaptive object proxy representation to extract object-specific features from the reference. The new representation is constructed from multiple granularities for building robust correlations between the reference and target frames afterward. Then, prototype masks are initially generated from the calculated correlations. After that, we progressively perform the object mask calibration to refine the masks, conditioning on the learned object proxies. The mask calibration is implemented with network modulation, which performs channel-wise reweighting according to the learned conditioning weights. Different from previous methods, we also update the learned conditioning weights to discriminate each object from other co-existing ones during the mask evolving process. Thus, the object representation and mask are calibrated in an interleaving manner.
Our contributions are summarized as follows.
\begin{itemize}
\item We are the first to conduct a comprehensive study of the robustness of VOS models against perturbations. Towards robust VOS, we rethink the problem from the perspective of object representation and mask calibration, and propose a framework with stronger perturbation robustness.
\item We introduce an adaptive object proxy representation for referenced objects robustly, which reduces errors incurred by unstable pixel-level matching.
\item We calibrate the object masks by updating object representation and masks in an interleaving manner progressively, achieving discrimination among co-existing objects.
\end{itemize}
Extensive experiments are conducted on the standard VOS benchmarks and our constructed pilot robustness benchmark.
Our model not only achieves the state-of-the-art results on the standard YouTube-VOS-18/19 and DAVIS benchmarks among existing published methods, but also exhibits superior robustness under perturbations.
\section{Related Work}
\noindent\textbf{Video Object Segmentation.}
Early video object segmentation methods \cite{perazzi2017learning,caelles2017one,khoreva2019lucid,cheng2017segflow,xu2018dynamic,zhang2012video} use online fine-tuning, calculate optical flow at high computational cost, or perform segmentation in a sequence-to-sequence manner.
Recent online VOS methods \cite{10.1145/3394171.3414035} aim at achieving good performance while maintaining a real-time speed, which can be divided into propagation-based and matching-based models. For propagation-based models \cite{perazzi2017learning,caelles2017one,khoreva2019lucid}, the guidance of segmentation masks from past frames are introduced during the process of mask decoding. For matching-based models \cite{chen2018blazingly,hu2018videomatch,zeng2019dmm,yang2020collaborative,lin2019agss,voigtlaender2019feelvos,wang2019ranet,liang2020waternet,hu2018videomatch,duke2021sstvos,mao2021joint,yang2021collaborative,9710441}, an embedding space is learnt for target objects. Recently, STM-based networks \cite{oh2019video,seong2020kernelized,lu2020video,cheng2021modular,wang2021swiftnet,xie2021efficient,hu2021learning,liang2020video,seong2021hierarchical} achieve impressive results with memory networks that memorize and read information from past frames. With adaptive object representation in multiple levels and object mask calibration for multi-object discrimination during mask decoding, our model can enhance model robustness besides better performance.
\input{src/fig_overview}
\noindent\textbf{Model Robustness.} As robustness is crucial for real-world applications with safety concerns, there is a growing trend \cite{classification-robust,detection-robust, Segmentation-robust,10.1145/3474085.3475324,hendrycks2019benchmarking,kamann2020benchmarking} to evaluate and enhance the model robustness against corruptions and perturbations. Previous study \cite{xie2019feature} suggests that adversarial perturbations on images may lead to noise in the features constructed by these networks, thus making the final prediction unstable. To reduce model fragility, many attempts have been proposed to boost the robustness of image-related tasks \cite{robust_classification, robust_HOI}. However, there is no work to study the vulnerability of VOS models against perturbations. This work aims to fill this gap and proposes two components for the robustness enhancement of VOS models.
\section{Adaptive Object Calibration Network for Robust VOS}
We propose the adaptive object calibration network, which improves the robustness of VOS from the two key factors, \textit{i.e.}, the object representation and mask calibration.
\subsection{Overview.}
\label{sec:method/overview}
\fig{\ref{fig:PIPELINE}} illustrates the overview of the proposed network.
Given the target frame $\mathbf{x}_t$ and reference frames $\{\mathbf{x}_{r}\}, r \in \mathcal{S}_{ref}$ with annotated object masks $\{\mathbf{y}_{r}\}$, the goal is to predict the segmentation mask for each object $i\in\{0,1,...,N\}$ ($i$=0 indicates the background). Our basic setting uses the first and previous frame as references, namely, $\mathcal{S}_{ref}=\{1, t-1\}$.
After extracting image features with the backbone, reference features are combined with downsampled reference masks to form basic object-specific embeddings $\{ \mathbf{e}_r^i \}_{i=1}^N$. To robustly build correlations from the reference to the target frames, we introduce an adaptive proxy representation for reference object context. The proxies convey object-specific information at multiple levels, thus reducing feature matching noise. Then, initial proto-maps $\{\mathbf{m}^i\}_{i=1}^N$ of objects are generated from the calculated correlations. Afterwards, the proto-maps are progressively calibrated with condition codes $\{ \mathbf{c}^i \}$ with $N_L$ iterations. In the calibration process, each condition code $\mathbf{c}^i$ of object $i$ evolves to be discriminative from other objects and background, and then serves as channel-wise weights to modulate proto-maps from $\mathbf{m}_{in}^i$ to $\mathbf{m}_{out}^i$ with the conditional decoder.
The final mask $\mathbf{y}_t$ is obtained by merging the output of the last conditional decoder with an {$argmax$} operation.
\subsection{Object Proxy Construction}
\label{sec:method/metric_learning}
The VOS problem is also known as mask tracking, and one of the principles is to build robust correlations from reference to target frames. The first essential step is to construct object-aware representation from the reference frames.
\noindent
\textbf{Object Proxy.}
We denote a representative embedding of each object as object proxy, \latinabbrev{e.g}, $p^i \in \mathbb{R}^{1\times 1 \times C_p}$ is a proxy of object $i$. Each pixel conveys an object proxy for later pixel-wise matching between target and reference frames.
All previous matching-based VOS methods \cite{voigtlaender2019feelvos,yang2020collaborative,oh2019video,seong2020kernelized,lu2020video,cheng2021modular,liang2020video,hu2018videomatch,duke2021sstvos,mao2021joint} employ \textbf{\textit{pixel-level}} proxies, that is, each pixel conveys the feature of itself subject to the specific object mask (column 1 in \fig{\ref{fig:object_representation}} (b)). Let us consider the proxy map $\mathbf{p}^i \in \mathbb{R}^{H\times W \times C_p}$ for an object $i$ from reference frames:
\begin{eqnarray}
\mathbf{p}^i = [...; \mathbf{e}_{r}^i; ...], \quad r \in \mathcal{S}_{ref}, \text{ } \mathbf{e}_{r}^{i}=\mathbf{f}_{r} \odot \mathbbm{1}^i_{r},
\end{eqnarray}
where $[\cdot;\cdot]$ denotes channel-wise concatenation, $\mathbf{e}_r^i$ denotes the basic object-specific embedding, $\mathbf{f}_{r}$ is the extracted feature map from the backbone, $\mathbbm{1}_{r}^i$ is the downsampled object-specific binary mask from $\mathbf{y}_r$, $\odot$ denotes element-wise multiplication.
Obviously, this representation is not robust against cases where similar objects co-exist or object appearances change drastically across frames.
Besides, the effective receptive field~\cite{luo16nipus_erf} of a single pixel-level embedding could not cover large objects or backgrounds, regardless of the global context. These issues make the embedding error-prone for object-aware correlation calculation.
\input{src/fig_object_representation_comparison}
To represent the proxies with object-specific cues, a straightforward practice is to use the global average pooled feature of the object. However, the \textbf{\textit{object-level}} representation could lose details.
\noindent\textbf{Adaptive Object Proxy (AOP).}
\label{sec:adaptove_proxy_representation}
To address the problems with previous object representations, we propose an adaptive proxy representation, which is a learned combination of embeddings from multiple granularities.
We embrace the observation that pixel-level embedding corresponding to semantics can be inherently grouped into meaningful clusters, thus we construct such proxies with clustering algorithms (we use $K$-Means ~\cite{likas2003global} in implementation).
We first cluster the pixel-level feature embeddings $\mathbf{e}_r^i$ and the centroid $p_r^{i,k}$ of each cluster $c_k, k=1,...,K$ serves as a part of the proxy at different level.
Clustering is performed in multiple runs with different cluster numbers $K \in \mathcal{L}_{clu}=[K_1,..., K_{N_k}]$. Thus, the proxy can represent object information at different granularities. The proxy map $\mathbf{p}_r^{i,K}$ is produced by propagating each cluster centroid over the pixels belonging to its cluster.
We construct the final adaptive proxy representation $\mathbf{p}^{i}$ of each object $i$ as the concatenated embeddings of all the object-specific adaptive proxies, namely,
\begin{equation}
\mathbf{p}^i = [...; \mathbf{p}_{r}^{i,K}; ...], \quad r \in \mathcal{S}_{ref}, K \in \mathcal{L}_{clu}.
\end{equation}
Accordingly, representing the objects with proxies constructed with clusters from different granularities can improve the robustness against noises compared to pixel-level ones, and also preserve more semantic details compared to object-level ones.
\fig{\ref{fig:object_representation}} illustrates proxy representation with different levels. The pink dots in \fig{\ref{fig:object_representation}} (b) represents proxies. With different proxies, the calculated correlations between reference and target frames are different. While correlations from pixel-level and object-level are either noisy or over-smoothing, adaptive proxies can generate more robust correlation maps.
\input{src/fig_instance_interaction_module}
\subsection{Object Mask Calibration}
\label{sec:method/relational_modulation_network}
After constructing object representation from reference frames, we initialize prototype object masks (proto-map) with the correlation-based proto-map generation block. The object mask calibration process is performed progressively with $N_L$ iterations. In each iteration, the input proto-map $\mathbf{m}_{in}^i$ of object $i$ with the other $\{\mathbf{m}_{in}^{j}\}_{j\neq i}$ is first used to generate the condition code $\mathbf{c}_i$ for object $i$. $\mathbf{c}_i$ is calibrated to be discriminative from the other objects. Then, $\mathbf{m}_{in}^i$ is further calibrated with network modulation conditioning on $\mathbf{c}_i$ via the conditional decoder. The overall decoded outputs $ \{\mathbf{m}_{out}^i \}_{i=1}^N$ are merged into the final predicted mask $\mathbf{y}_t$.
\noindent\textbf{Preliminaries of Network Modulation.}
The mask calibration is implemented by network modulation, which has already been demonstrated to be effective in existing works~\cite{Yang2018osmn,yang2020collaborative,yang2021collaborative}. Network modulation is an operation to re-weight responses in different channels of a feature map, following the mechanism used in SE-Net~\cite{hu_senet_cvpr2018}, taking the form:
\begin{eqnarray}
\label{eq:modulation}
{z}^m_{out} = {w}^m {z}^m_{in} ,
\end{eqnarray}
where ${z}^m_{in} \in \mathbb{R}^{H \times W \times 1} $ and ${w}^m \in \mathbb{R}$ are the $m$-th channel of feature map $\mathbf{z}_{in} \in \mathbb{R}^{H \times W \times C} $ and object-specific weights $\mathbf{w} \in \mathbb{R}^{1 \times 1 \times C}$ respectively. The modulation operation is defined as:
\begin{eqnarray}
\mathbf{z}_{out} = \mathbf{w} \otimes \mathbf{z}_{in},
\end{eqnarray}
where $\otimes$ denotes channel-wise multiplication.
The modulation weight $\mathbf{w}$, which we call condition code, is usually aggregated as a contextual representation. The condition code is used to calculate channel-wise modulating weight for each object in the mask calibration process.
Previous methods modulate the features $\mathbf{f}_t$ of the current frame with
features $\mathbf{f}_r$ in reference frames according to the cues (\textit{e.g.}, appearance, location) of the specific object, but object-wise interactions have hardly been considered, resulting in failure cases where visually similar objects co-exist.
We propose a discriminative object mask calibration procedure for mask modulation where information of various objects in intermediate decoding layers is exchanged with each other, thus enhancing multi-object discrimination.
\noindent\textbf{Discriminative Object Calibration (DOC).}
\label{sec:method/relational_modulation_network/inter_object_interaction}
To calibrate object mask $\mathbf{m}^i$ to be discriminative from the other $\{ \mathbf{m}^j\}_{j \neq i}$, a prerequisite is to make the condition code $\mathbf{c}^i$ to be discriminative.
Intuitively, we enhance the discrimination of $\mathbf{c}^i$ by suppressing cues existing in the other objects, namely, by first aggregating cues from all $\{ \mathbf{m}^j\}_{j =1}^N$ and then screening out similar cues in $\mathbf{c}^i$.
The detailed operations are illustrated in \fig{\ref{fig:multi-object-discrimination}} (a). The condition code $\mathbf{c}^i$ is calibrated by taking the form:
\begin{equation}
\mathbf{c}^{i}=MLP([CL_1(\mathbf{m}^{i}_{in}); CL_2(\mathcal{A}(\{\mathbf{m}^{j}_{in}\}_{j=1}^N)-\mathbf{m}^{i}_{in});CL_3(\mathbf{p}^{i})]),
\end{equation}
where $\mathcal{A}(\cdot)$ is an order-invariant aggregation layer for multiple inputs with a channel-wise pooling operator to aggregate object cues. Specifically, we use a channel-wise max pooling with a $1\times1$ conv in the implementation. $CL_{*}$ denotes a Conditioning Layer block, which encodes a feature map into a vector ($H\times W$ to $1 \times 1$ in the spatial dimension). Detailed implementation is introduced in Section~\ref{sec:method/relational_modulation_network/conditioning_layer}. In the discriminative object calibrator, we utilize three conditioning layer blocks $CL_1$, $CL_2$ and $CL_3$ to aggregate object information from the target object $\mathbf{m}^i$, the other objects in the current frame $\mathcal{A}(\{ \mathbf{m}^j\}_{j=1}^N)-\mathbf{m}^i$ and target object in reference frames $\mathbf{p}^i$ respectively.
Our motivation for this procedure is to incorporate discrepancy between different objects into object representation, thus reducing ambiguities between objects.
\noindent\textbf{Conditional Decoder.}
\label{sec:method/relational_modulation_network/intra_object_interaction}
We then utilize the more discriminative condition code $\mathbf{c}^i$ to calibrate the object mask $\mathbf{m}^i$ through the conditional decoder $\theta_{dec}$.
We build $\theta_{dec}$ based on a modulation block adopted in \cite{yang2020collaborative,yang2020gated} with an additional residual block.
As is shown in \fig{\ref{fig:multi-object-discrimination}} (b), given a proto-map $\mathbf{m}^{i}$ and the condition code $\mathbf{c}^{i}$, the mask calibration is given by:
\begin{align}
\mathbf{m}^{i}_{out} & = \theta_{dec}( \mathbf{m}^{i}_{in} + \mathbf{m}^{i}_{in} \otimes \mathbf{c}^{i} ).
\end{align}
We cascade $N_{L}$ combinations of discriminative object calibrators and conditional decoders to progressively refine and up-sample the proto-map $\mathbf{m}^i$ for each object $i$. Besides, the proto-maps are concatenated with the low-level features of the current frame from the backbone in the second-to-last conditional decoder, introducing more fine-grained pixel-level image cues for mask calibration. As is shown in \fig{\ref{fig:multi-object-discrimination}} (c), we can find the proto-map evolves to be more discriminative, \latinabbrev{i.e}, cues of other (even similar) objects are substantially suppressed, thus producing a more accurate object mask for the target object.
\input{src/table_ytb_compare}
\subsection{Network Details}
\noindent\textbf{Correlation-based Proto-map Generation.}
Given the overall adaptive object proxy map $\mathbf{p}^i = [...; \mathbf{p}_{r}^{i,K}; ...]$ for each object $i$ as discussed in Sec.{\ref{sec:adaptove_proxy_representation}},
we first calculate the similarity maps between the queries of the current feature map $\mathbf{f}_{t}$ and each element $\mathbf{p}_{r}^{i,K}$ separately.
Then, the proto-map $\mathbf{m}^i$ is generated by translating the concatenation of all the similarity maps and current feature map $\mathbf{f}_{t}$. Formally,
\begin{small}
\begin{equation}
\mathbf{m}^i = \theta_{ens} ([\varphi_s ([...; Sim(\mathbf{f}_t, \mathbf{p}_{r}^{i,K}; ...]),\mathbf{f}_t]), \quad r \in \mathcal{S}_{ref}, K \in \mathcal{L}_{clu}
\end{equation}
\end{small}
where $\theta_{ens}(\cdot)$ consists of the first two stages of bottleneck blocks in the ensembler of \cite{yang2020collaborative}, $\varphi_s$ is a $1\times1$ convolution layer to project the similarity maps in the channel dimension, and $Sim(\cdot,\cdot)$ is a L2-norm-based similarity function.
\noindent\textbf{Conditioning Layer.
\label{sec:method/relational_modulation_network/conditioning_layer} Conditioning Layer ($CL$) is a block in the discriminative object calibrator to calculate the condition code $\mathbf{c}$ from a feature map $\mathbf{z}_{in}$, taking the form:
\begin{small}
\begin{align}
CL(\mathbf{z}_{in}) = MLP (GAP(\mathbf{z}_{in} \odot \pi_{\beta}( \varphi (\mathbf{z}_{in}) )),~
\pi_{\beta}(x) =
\begin{cases}
x & x \ge \beta \\
0 & x < \beta
\end{cases}
\end{align}
\end{small}
where $\varphi (\cdot)$ represents a $1\times 1$ convolution layer with ReLU activation to project the input $\mathbf{z}_{in}$ to a confidence map, $GAP$ denotes global average pooling.
We incorporate a confidence gate $\pi_{\beta}$ in the conditioning layer to filter out unreliable cues in the input feature map, where $\beta$ is chosen as a percentile value in $\varphi(\mathbf{z}_{in})$.
\input{src/table_davis}
\section{Experiment}\label{sec:Experiment}
To evaluate the performance and robustness of our model, we conduct experiments on both standard VOS benchmarks and our constructed perturbed benchmark.
\subsection{Standard Benchmark}
\noindent\textbf{Datasets.}
We evaluate our method on two widely-used multi-object VOS benchmarks,
\textit{i.e.},
YouTube-VOS~\cite{xu2018youtube} and DAVIS17~\cite{pont20172017}. The unseen object categories make YouTube-VOS a good benchmark to
measure the generalization ability of various methods.
Besides,
the comparison between our method and other methods on a single-object VOS benchmark DAVIS16~\cite{perazzi2016benchmark} will also be included.
\noindent\textbf{Metrics.}
We adopt the evaluation metrics from DAVIS~\cite{perazzi2016benchmark},
\textit{i.e.},
the region accuracy $\mathcal{J}$ and boundary accuracy $\mathcal{F}$. $\mathcal{J}$ measures the intersection-over-union (IoU) between the predicted masks and the ground-truth masks,
and $\mathcal{F}$ measures the accuracy of masks on the boundaries via bipartite matching between the boundary pixels.
For both metrics, we will report the performance on seen and unseen categories as $\mathcal{J}_{s}$, $\mathcal{J}_{u}$ and $\mathcal{F}_{s}$, $\mathcal{F}_{u}$ respectively.
\subsection{Pilot Robustness Benchmark}
\label{sec:robustness_benchmark}
\noindent\textbf{Perturbed datasets.}
For a type of perturbation ${\epsilon} \sim E$, we can generate a perturbed dataset $\mathcal{D}_{{\epsilon}}={\epsilon}(\mathcal{D})$. Concretely, we established a pilot validation benchmark, namely \textit{YouTube-VOS-P}, to evaluate VOS robustness against image perturbations based on the clean YouTube-VOS-2019 \cite{xu2018youtube} validation set, which is the largest multi-object VOS dataset. In \textit{YouTube-VOS-P}, we apply 6 types of perturbations on clean data for perturbed dataset construction. The perturbation set is constructed with noises \cite{deledalle2012compare} and blurring \cite{liu2020estimating}, which widely exist in real-world videos. Specifically, perturbation types include \textit{Gaussian blur with $7\times7$ and $9\times9$ kernel}, \textit{salt and pepper noise} with 1$k$ or 5$k$ points, and \textit{Gaussian noise with mean of 0 and standard deviation of 10 or 30}. All perturbations are implemented with OpenCV \cite{bradski2008learning}.
\noindent\textbf{Robustness metrics.}
Following robustness evaluation metrics commonly used in other tasks \cite{hendrycks2019benchmarking,kamann2020benchmarking,laugros2019adversarial,tramer2019adversarial,jin2019bert}, we put forward two metrics for the evaluation of robustness against perturbation for a VOS model as follows.
\noindent\textbf{After-perturbation accuracy ($\mathcal{Q}_p$).} After-perturbation accuracy $\mathcal{Q}_p$ represents the averaged remaining overall performance after perturbation. Specifically, given all the perturbation operation ${\epsilon} \sim E$, the after-perturbation accuracy is defined as
\begin{equation}
\mathcal{Q}_p = \frac{1}{|E|}\sum_{\epsilon \sim E}\mathcal{Q}_{{\epsilon}}.
\end{equation}
\noindent\textbf{Perturbation robustness ($\mathcal{R}_p$).} Given the performance $\mathcal{Q}_c$ on the original clean dataset and the after-perturbation accuracy ($\mathcal{Q}_p$) on the perturbed dataset, we can approximate the overall robustness to perturbation $\mathcal{R}_p$ for a VOS model with the average overall performance drop, which can be formulated as
\begin{equation}
\mathcal{R}_p = \mathcal{Q}_c-\mathcal{Q}_p.
\end{equation}
Here, smaller $\mathcal{R}_p$ indicates better robustness for a VOS model.
\subsection{Implementation Details.}
We use SGD \cite{bottou2010large} with momentum 0.9 as the optimizer and use cross-entropy loss following our baseline setting~\cite{yang2020collaborative}.
For all the experiments, we set the batch size to 8.
For training on YouTube-VOS, we do not use any external data.
The total training iterations is 400$k$. We set
the learning rate as 0.02 for the first half (200$k$) and 0.01 for the rest.
We use the DeepLabv3+~\cite{chen2018encoder} architecture with ResNet-101~\cite{he2016deep} as the backbone of our model. For multi-scale inference,
we apply a scale set of [1.0, 1.15, 1.3, 1.5] as previous works \cite{yang2021collaborative,yang2020collaborative}.
For training on DAVIS~\cite{perazzi2016benchmark},
we finetune the model pre-trained on YouTube-VOS for 40$k$ iterations with learning rate of 0.1 and we use both DAVIS and YouTube-VOS datasets with a sampling ratio of 2:1. An NVIDIA Linux workstation (GPU: 8$\times$ Tesla V100) is used for our experiments. Our codebase is built on PyTorch 1.8.0~\cite{paszke2019pytorch} and
reuses some components implemented in~\cite{yang2020collaborative}.
We set multi-run clustering list $\mathcal{L}_{clu}$ = [1, 16, $|H\times W|$]. The parameter $\beta$ used in the conditioning layer as discussed in
Sec.~\ref{sec:method/relational_modulation_network/conditioning_layer} is $0.3$ through grid search. The number of cascaded mask decoding blocks ${N_L}$ is set to 6.
We set two model variants for a fair comparison with previous methods: (1) \textbf{Ours-Base} is the default setting with the first and previous frame as reference, \textit{i.e.}, $\mathcal{S}_{ref}=\{1,t-1\}$ as mentioned in Section \ref{sec:method/overview}; (2) \textbf{Ours-MF} uses multiple historical frames following ~\cite{oh2019video,yang2021associating}, \textit{i.e.}, $\mathcal{S}_{ref}=\{1, 1+\delta, 1+2\delta, 1+3\delta, ...\}, \delta=5$.
\subsection{Result on Standard VOS Benchmark}
\textbf{Quantitative comparison.}
The comparison between our method and other state-of-the-art methods
on YouTube-VOS 2018 and YouTube-VOS 2019 validation set
is shown in Table~\ref{table:ytb}, which shows
our model outperforms all the previous SOTA methods even without using any external data.
Our method stands out under various evaluation metrics, especially on unseen categories,
which demonstrates the great generalization ability of our method. The comparison on DAVIS is provided in Table~\ref{table:dv}. Our model also achieves the best performance on the challenging DAVIS17 test-dev split.
\noindent\textbf{Qualitative comparison.}
Fig.~\ref{fig:qualitative_comparison} shows the qualitative comparison between previous SOTA methods and our model (Ours-Base) under various hard cases, and our method performs well for all these cases.
The accuracy changes of different methods over time on YouTube-VOS 2019 validation set are illustrated in Fig~\ref{fig:YTB_decay}. Our method has the least performance decay, demonstrating better robustness to suppress error propagation.
\input{src/fig_qualitative_comparison}
\input{src/fig_performance_over_time}
\input{src/table_perturbation_robustness}
\subsection{Analysis on Robustness to Perturbation.}
\noindent In our pilot study on VOS model robustness, the proposed perturbed VOS validation dataset, \textit{YouTube-VOS-P}, is used for robustness evaluation, as introduced in Sec.\ref{sec:robustness_benchmark}. Note that all the models to be evaluated are trained with clean datasets. The results under random perturbations for AOT-B \cite{yang2021associating}, AOT-L \cite{yang2021associating}, and STCN \cite{cheng2021rethinking} (without using external BL30K dataset\cite{cheng2021modular}) are evaluated with their official model checkpoints while CFBI \cite{yang2020collaborative} is retrained by us and the retrained result on the original clean dataset matches the performance reported in their paper. Experiments are averaged for 3 runs for validity. The results are summarized in Table~\ref{tab:robustness} and we provide the insights and discussions as follows.
\noindent\textbf{\textit{Are current VOS models robust to image perturbations?}} No. We notice a clear performance drop for all the VOS models investigated. Noticeably, these models are vulnerable to attack even when the input is injected with simple random Gaussian noise. Meanwhile, we can notice that the after-perturbation performance will drop largely as the severity of perturbations increases.
\noindent\textbf{\textit{Does a model with higher performance on clean benchmarks guarantee better robustness against perturbations?}} Not sure. When making a comparison across various models, the correlation of the average overall performance ($\mathcal{Q}_c$) on the original clean YouTube-VOS dataset and the after-perturbation accuracy ($\mathcal{Q}_p$) is not clear. When making comparisons within a certain model, higher performance for one model also may not ensure stronger robustness because prediction errors and noises may be propagated during correlation calculation for VOS.
\noindent\textbf{\textit{Can the proposed VOS framework help improve perturbation robustness?}} Yes! Our VOS framework with adaptive proxy aggregation and multi-object discrepancy discrimination mechanism stands out in the perturbed dataset setting, achieving higher after-perturbation accuracy $\mathcal{Q}_p$ (82.3 \textit{V.S.} 79.4 in $\mathcal{J}\&\mathcal{F}$) and better perturbation robustness $\mathcal{R}_p$ (1.4 \textit{V.S.} 1.6 in $\mathcal{J}\&\mathcal{F}$) than CFBI which is our baseline model. Though our baseline is strong enough to well handle some cases with multiple similar objects on the original clean datasets, the prediction of our model is more stable and consistent under perturbations, as is shown in Fig.~\ref{fig:qualitative_robust}.
\input{src/fig_robust_qualitative}
\subsection{Ablation Study}
\label{sec:ablation_study}
We make a thorough analysis of various components used in our method.
All the ablation studies
are based on our default setting (\textbf{Ours-Base}) as mentioned in Section \ref{sec:method/overview} and conducted on the YouTube-VOS 2019 validation set.
\input{src/table_component_effectiveness_ablation}
\noindent\textbf{Component effectiveness study.}
Table~\ref{table:component_ablation}
demonstrates the effectiveness of the proposed adaptive object proxy (AOP) representation and
discriminative object calibrator (DOC) for mask decoding.
The first row shows the result of our baseline method ~\cite{yang2020collaborative}
which adopts pixel-level correlation and uses modulation during mask decoding.
\noindent\textbf{Ablation on adaptive object proxy (AOP) representation.}
Compared to the commonly-used pixel-level object representation used in the baseline model, our adaptive proxy representation formed with help of clustering-based aggregation can significantly improve the overall performance, especially for unseen categories (+2.6\% in $\mathcal{J}_u$ and +2.2\% in $\mathcal{F}_u$). Meanwhile, our adaptive proxy representation also performs better than simply aggregating the features grid-to-grid to form grid-sampled proxies (GSPR). Fig.~\ref{fig:clustering_examples} illustrates the segments constructed from K-Means clustering algorithm, as we can observe, each segment corresponds to a meaningful semantic part of an object, which can be aggregated to robust proxies for further correlation calculation across frames.
\noindent\textbf{Ablation on discriminative object calibrator (DOC) for mask decoding.}The multi-object discrimination mechanism help boost the performance from 82.9\% to 83.7\% given the model with adaptive proxy representation. Meanwhile, the confidence gate of the conditioning layer in DOC can also help improve the overall performance (+0.4\% in $\mathcal{J}\&\mathcal{F}$) compared to the setting when disabling the confidence gate ($\beta$=0), which is owing to its de-noising mechanism to filter unreliable cues.
\noindent\textbf{Complexity analysis.} As is shown in the running time and model size ablation study in Table \ref{table:component_ablation}, compared to our baseline, our model achieves much better overall performance (83.7\% \textit{V.S.} 81.0\% in $\mathcal{J}\&\mathcal{F}$) with a negligible cost of inference speed (-0.2 multi-object FPS) and model parameters (+0.6 MB).
\input{src/fig_clustering_examples}
\input{src/fig_failure_case}
\section{Conclusion}
\label{sec:Conclusion}
Our pilot study on model robustness to perturbations for VOS reveals the fragility of current advanced methods. Towards robust VOS, we propose an end-to-end network with two tightly coupled modules to generate adaptive proxy representation and perform object mask calibration with multi-object discrimination considered.
The two modules are demonstrated to help achieve a significant gain on standard VOS benchmarks and better robustness against perturbations compared to the baseline method.
\noindent\textbf{Limitation and discussion.}
Though the performance of our adaptive proxy aggregation with non-parametric $K$-Means clustering is not sensitive to the number of clusters, we consider it is better to design a learning-based way to generate adaptive parts.
Moreover, as perturbations in natural videos are more diverse, such as the smoke and the severe blur shown in Fig.~\ref{fig:failure_case}, perturbation types can be extended to more diverse natural corruptions and adversarial attacks. For the robustness enhancement of VOS models, the data organization part can be further explored.
\section{More Qualitative Results}
More qualitative comparisons to the state-of-the-art models \cite{cheng2021rethinking,yang2020collaborative,oh2019video} and ablation studies on our two main components, our adaptive object proxy representation and discriminative object calibration, are presented in the video.\footnote{The video demo is available at https://youtu.be/3F6n7tcwWkA}
\subsection{Qualitative Results on Video Clips with An Extremely Large Number of Objects}
\input{src/fig_video_scene}
In Fig.~\ref{fig:vspw}, we use our model (Ours-Base) to propagate the masks in two cases where more than 40 objects co-exist. We leverage the video clips from a video scene parsing dataset, VSPW\cite{miao2021vspw}, and use the mask of the first frame as the reference for mask propagation. Even though we only segment each video frame with the guidance from the first frame and the previous frame, we can segment most objects in such a crowded scene well. Notice that we infer the video clip in $480p$ and the given mask in the first frame is not accurate enough especially in the boundary, so it is hard for our model to segment some extremely tiny objects very precisely.
\subsection{Qualitative Results on Extremely Long Video Clips}
\input{src/fig_long_video}
\input{src/fig_long_video_boy}
Considering that the standard large-scale VOS benchmarks, including DAVIS \cite{perazzi2016benchmark} and YouTube-VOS \cite{xu2018youtube}, are tailored for evaluation on short-term video clips, we further evaluate our proposed model (Ours-Base) on two long-term video clips (\textit{blueboy} and \textit{dressage}) from \cite{liang2020video}. These videos contain more than 1000 video frames and include more diverse appearance changes. Specifically, the video clip \textit{blueboy} contains 2406 frames and the video clip \textit{dressage} contains 3589 frames. For the mask propagation in these two video sequences, We use our model (Ours-Base) which is trained only on the YouTube-VOS \cite{xu2018youtube} and only leverages the guidance from the reference (first) and the previous frame.
Even if our model (Ours-Base) only maintains a constant memory bank of reference object proxies from the first frame and the previous frame, it can handle these cases with an extremely large number of video clips and large appearance changes well. The qualitative results of the mask predictions of our model are illustrated in Fig.~\ref{fig:long_video} and Fig.\ref{fig:long_video_boy}. We sample 20 frames here for illustration.
\subsection{More Qualitative Results on Robustness to Perturbations}
We show more qualitative cases to show the performance and the robustness of state-of-the-art models, including CFBI \cite{yang2020collaborative} (our baseline), AOT \cite{yang2021associating}, and STCN \cite{cheng2021rethinking}, and our model (Ours-Base and Ours-MF) when the input video clips are under perturbations. Concretely, we show three cases from YouTube-VOS \cite{xu2018youtube} 2019-version dataset with the perturbation of Gaussian noise, salt and pepper noise, and Gaussian blur in Fig.~\ref{fig:qualitative_robust1}, Fig.~\ref{fig:qualitative_robust2}, and Fig.~\ref{fig:qualitative_robust3} respectively. Our model shows stronger robustness to perturbations compared to other previous strong competitors in these challenging cases.
\subsection{More Cases for Adaptive Object Proxy Representation}
We provide more cases to illustrate the adaptive object proxy representation constructed with $K$-means clustering in Fig.~\ref{fig:clustering_appendix}. Each segment in Fig.~\ref{fig:clustering_appendix} represents a cluster to be aggregated as an adaptive object proxy. For the segments generated via clustering, we can find that regions of similar objects, the same object, or the spatially neighboring areas are clustered into the same group, which decomposes a complex region into several semantically-alike parts. Such an adaptive representation constructs a meaningful candidate pool for a query to do retrieval and calculate correlations for prototypical mask initialization. Meanwhile, due to the de-noising property of representation aggregation, our adaptive object proxies are more robust than the widely-used pixel-level proxies.
\subsection{More Qualitative Results on DAVIS}
Fig.~\ref{fig:qualitative_comparison_test_dev} shows two hard cases of the
qualitative comparison to previous state-of-the-art methods (STM \cite{oh2019video}, CFBI \cite{yang2020collaborative} and MiVOS \cite{cheng2021modular}) on the challenging DAVIS17 ~\cite{ponttuset20182017} test-dev split. In the first case, although our model produces some minor prediction errors in the intermediate frames, errors are reduced in subsequent predictions. The second case shows that our model can handle cases with similar objects or occluded objects.
\input{src/fig_robust_qualitative1}
\input{src/fig_robust_qualitative2}
\input{src/fig_robust_qualitative3}
\input{src/fig_clustering_appendix}
\input{src/fig_qualitative_comparison_davis_test_dev}
\section{More Implementation Details}
For data augmentations, we apply flipping, scaling, and balanced random-crop the same as \cite{yang2020collaborative}. Specifically, the balanced random crop is The input size for the model is $465 \times 465$.
For the training strategy, following \cite{oh2018fast,yang2020collaborative,yang2021collaborative}, the proposed network leverages the sequential training strategy where a clip of consecutive frames is sampled in each iteration. Concretely, a batch of video clips is sampled in each turn. For each video clip, we randomly sample a frame as the reference frame and a continuous $N + 1$ frames as the previous frame, and the current frame sequence with N frames. For the prediction of the reference frame, we use the ground-truth segmentation mask of the previous frame as the previous mask. For the prediction of the following frames, we use the latest prediction as the previous mask.
For the construction of object proxy aggregation, we leverage $K-means$ clustering algorithm for implementation. We do not apply specific strategies for the initialization.
The model is insensitive to the clustering algorithm and simple K-means clustering can already provide good performance.
The deviation of our final model for different initialization of clustering is small (about 0.1\% on YouTube-VOS\cite{xu2018youtube} 2019-version validation set).
|
\section{Supplementary materials}
\input{10.Appendix}
\end{document}
\endinput
\section{Introduction}
Summarization of textual information is an exacting task for humans and the rate of information growth in the era of big data has made summarizing most information manually to be impractical and impossible. This phenomenon is exacerbated when it comes to long form textual documents as the knowledge and human labour effort required to process and summarize it increases exponentially with the length of documents. Inevitably, a significant amount of invaluable information and knowledge have gone unnoticed, presenting an important bottleneck in the progress of social and economic development. In response, there has been a strong demand for exhaustive research in the field of automatic long document summarization \cite{cohan2018discourse,sharma2019bigpatent,beltagy2020longformer,dong2021discourse,manakul2021longspan}.
Automatic text summarization involves a process of shortening a source text efficiently while keeping the main idea intact, which aids in reducing the amount of time required to process information, helps with faster search for information, and makes learning one topic easier \cite{liu2019automatic,liu2018generating}. While the potentiality of developing an effective automatic text summarization system has attracted significant interest and attention from the research community, automatic text summarization remains a challenging task and is not ready for wide practical use in day-to-day lives, particularly when it comes to summarizing long documents \cite{cao2018faithful,kryscinski2019neural,maynez2020faithfulness,kryscinski-etal-2020-evaluating}. Intuitively, long document summarization is harder than short document summarization due to the significant difference in the amount of lexical tokens and breadth of content between short and long documents. As the length increases, the content that would be considered important will also increase, resulting in a more challenging task for an automatic summarization model to capture all salient information in the limited output length \cite{gidiotis2020divide}. Further, short documents are often generic text such as news articles \cite{sandhaus2008new,nallapati2016abstractive,narayan2018don,grusky2018newsroom}, while long documents are commonly domain-specific articles such as scientific papers that contain more complex formulas and terminologies \cite{cohan2018discourse,kornilova2019billsum,huang2021efficient}. Together with other reasons that will be explored in this survey, long document summarization poses a significantly more challenging task than short document summarization.
In general, automatic text summarization can be conceptualized as having three approaches: extractive, abstractive, and hybrid approach \cite{kryscinski-etal-2020-evaluating}. The extractive approach directly copies salient sentences from the source document and combine them as the output \cite{gong2001generic,cheng2016neural}, whereas the abstractive approach imitates human that comprehends a source document and writes a summary output based on the salient concepts of the source document \cite{rush2015neural,see2017get}. The hybrid approach attempts to combine the best of both approaches by rewriting a summary based on a subset of salient content extracted from the source document \cite{hsu2018unified,liu2018generating,gehrmann2018bottom}. Each approach has its advantages and limitations that may suit certain summarization tasks better. For example, extractive summarization may be sufficient in summarizing certain news articles \cite{cheng2016neural,zhang2018abstractiveness} but inadequate to summarize a long dialogue where salient content are sparsely distributed \cite{zhang2021exploratory}. This is because while the extractive summarization approach is always factually consistent with the source document, it does not modify the original text and thus lacks the ability to generate fluent and concise summary \cite{xu2019discourse}.
Historically, to measure the performance of different summarization architectures, ROUGE score \cite{lin2004rouge} has been the modus operandi for researchers in the summarization research field to compare and study the quality of different candidate summaries. The core idea of ROUGE score is to measure the lexical overlaps such as words and phrases between candidate summary and ground truth summary. While it is efficient, recent findings have shown that ROUGE score does not correlate well with how humans assess the quality of a candidate summary \cite{kryscinski2019neural,bhandari2020re,chaganty-etal-2018-price,hashimoto-etal-2019-unifying}. As a result, there is a significant amount of effort in improving the way we measure the quality of candidate summaries and performance of summarization architectures \cite{kryscinski-etal-2020-evaluating,maynez2020faithfulness,zhang2019bertscore,mao2020facet,yuan2021can}. Unfortunately, these efforts have entirely been focusing on the short document domains and the progress in measuring the quality of long document summarization approach has been lacking \cite{pagnoni-etal-2021-understanding,graham2015re,huang2020have,bhandari2020re,peyrard2019studying}.
Nevertheless, there has been a considerable amount of advancement made in the long document summarization research field and the area lacks a comprehensive survey \cite{gambhir2017recent,boorugu2020survey,el2021automatic,shi2021neural}. Our paper fills this gap by providing a comprehensive overview of the research on long document summarization and a systematic evaluation across the three principal components of its research setting: benchmark datasets, summarization models, and evaluation metrics.
\\
The contribution of our paper is as follows:
\textit{Comprehensive Review.} A comprehensive survey of the long document summarization research literature.
\textit{Full-view of summarization research.} Text summarization literature mainly explores the three key aspects of research setting: developing advanced models, releasing new datasets, and proposing alternative evaluation metrics. We empirically provide a detailed review of all three key components within the context of long document summarization.
\textit{Empirical Studies and Thorough Analysis.} To ensure wide coverage of emerging trends, we empirically analyze each component of the long document summarization research setting through fine-grained human analysis and ad-hoc experiments.
\textit{Future Direction.} We discuss the current progress of long document summarization, analyze the limitation of existing methods, and suggest promising future research directions in terms of model designs, quality and diversity of datasets, the practicality of evaluation metrics and, finally, the feasibility of implementing summarization techniques to real-life applications.
The survey is organized as follows: firstly, an overview of the fundamentals of long document summarization in section 2. Secondly, a detailed study of ten summarization benchmark datasets is in section 3. A comprehensive survey on summarization models that are designed specifically or have to ability to summarize long documents in section 4. Then, in section 5, we analyze the performances of models that are representative of the different types of architectures commonly used by researchers through ad-hoc experiments. In section 6, we summarize the advancement in evaluation metrics and their applicability in the long document summarization domain. Section 7 goes into the applications of long document summarization models and Section 8 discusses promising future research direction in this field. Finally, section 9 concludes this survey.
\subsection{Long Document Summarization Systems}
Table \ref{lds_model_summ} details the summary of long document baseline and state-of-the-art summarization systems proposed by previous works in this domain. The "Prior" column illustrates whether inductive bias such as discourse structure information of the original long document is used and the "Trunc" column reflects the total percentage of significant truncation across the five long document benchmark.
\begin{table*}[h]
\resizebox{\textwidth}{!}{%
\begin{tabular}{c|c|l|c|c}
\hline
\multicolumn{1}{l|}{} &
\textbf{Model} &
\multicolumn{1}{c|}{\textbf{Description}} &
\textbf{Prior} &
\textbf{Trunc} \\ \hline
\multirow{4}{*}{\textit{\begin{tabular}[c]{@{}c@{}}Unsupervised \\ Baseline \\ Extractive\end{tabular}}} &
LSA \cite{gong2001generic} &
Singular Value Decomposition + Term Frequency of Sentence Matrix &
- &
- \\
& TextRank \cite{mihalcea2004textrank} & Sentence Graph Centrality (PageRank) + Similarity(common words) & - & - \\
& LexRank \cite{erkan2004lexrank} & Sentence Graph Centrality (PageRank) + Similarity(Tf-Idf) & - & - \\
& SumBasic \cite{vanderwende2007beyond} & Average Word-Occurrence Probability of Sentence & - & - \\ \hline
\multirow{3}{*}{\textit{\begin{tabular}[c]{@{}c@{}}Unsupervised \\ Neural\\ Extractive\end{tabular}}}
& PacSum \cite{zheng2019sentence} & Sentence Graph Centrality + Similarity(BERT) & - & - \\
& HipoRank \cite{dong2021discourse} & Hierarchical Section-Sentence Graph Centrality + Similarity(BERT) & Section & - \\
& FAR \cite{liang2021improving} & Sentence Graph Centrality + Similarity(BERT) + Facet Aware Candidate Search & - & - \\ \hline
\multirow{4}{*}{\textit{\begin{tabular}[c]{@{}c@{}}Supervised \\ Neural \\ Extractive\end{tabular}}} &
Sent-CLF/PTR \cite{pilault2020extractive} &
Bi-LSTM (word \& sentence level) w/o pretraining &
- &
- \\
& GlobalLocal \cite{xiao2019extractive} & GloVe (word/sentence level) + Bi-LSTM (section \& document level) & Section & - \\
& Topic-GraphSum \cite{cui2020enhancing} & BERT (sentence level) + Bipartite GAT (NTM topic-sentence) & - & UNK \\
& SSM-DM \cite{cui2021sliding} & BERT (sentence level) + Sliding Selector Network (Memory Network \& GAT) & - & - \\ \hline
\multirow{6}{*}{\textit{\begin{tabular}[c]{@{}c@{}}Supervised \\ Neural \\ Abstractive\end{tabular}}} &
Discourse-Aware \cite{cohan2018discourse} &
BiLSTM (word- \& section- level) w/o pretraining &
Section &
- \\
& Pegasus \cite{zhang2020pegasus} & Pretraining Summarization Task (GSG) on C4/HugeNews + Data-specific fine-tuning & - & 85\% \\
& CRTLSum \cite{he2020ctrlsum} & Fine-tuned BART with keywords prompt-engineering & - & 85\% \\
& BigBird \cite{zaheer2020big} & Pretrained Pegasus with Sparse Attention (Local + Global + Random) & - & 20\% \\
& Longformer \cite{beltagy2020longformer} & Fine-tuned BART with SparseAttention (Local + Global) & - & - \\
& HEPOS \cite{huang2021efficient} & Fine-tuned BART with Efficient Attentions (LSH/Sinkhorn + Hepos) & - & 2\% \\ \hline
\multirow{4}{*}{\textit{\begin{tabular}[c]{@{}c@{}}Supervised \\ Neural \\ Hybrid \end{tabular}}} &
TLM+Ext \cite{pilault2020extractive} & Bi-LSTM for ContentSelection + Transformer-based Decoder w/o pretraining & - & - \\
& DANCER \cite{gidiotis2020divide} & Pretrained Pegasus Section-by-Section Summarization & Section & - \\
& SEAL \cite{zhao2020seal} & End-to-end Transformer-based Content Selector + Decoder w/o pretraining & - & - \\
& LoBART \cite{manakul2021longspan} & Multi-task RNN for ContentSelection + Fine-tuned BART with SparseAttention (Local) & - & - \\\hline
\end{tabular}%
}
\caption{Summary of Long Document Baseline and State-of-the-Art Summarization Systems.}
\label{lds_model_summ}
\end{table*}
\subsection{Graph-based Ranking Algorithm in Experimental Section}
In general form, given a set of sentences in the original source document, $D = \{s_1, s_2,...,s_m\}$ with the inter-sentential similarity relations represented as $e_{ij} = (s_i,s_j) \in E$ where $i \neq j $, the following equation illustrates the graph-based ranking architecture in computing the scoring for each sentence:
$$centrality(s_i) = \sum_{j \in \{1,...,m\},i\neq j} e_{ij} * Bias(e_{ij})$$
The similarity between each sentence is computed using similarity measures such as cosine similarity after being encoded using a sentence encoder. The graph architecture we implemented is a basic directed graph where the centrality score of each sentence is computed based on the summation of bias-adjusted cosine similarity between other sentences and/or sections. The section node will still be represented by sentences where it is the average of the representations for sentences within the section of interest. In other words, a sentence that has the highest sum of similarity against all the other sentences after adjusting for bias will be ranked as the top sentence.
\paragraph{Tf-Idf Only}
For Tf-Idf encoding, we use scikitlearn Tf-Idf vectorizer to train the encoder using source documents in the arXiv test set (note: this does not include the reference summaries). The preprocessing follows \cite{manakul2021longspan} to ensure consistency and the minimum document frequency is set to be 0.01. As the vector dimension based on original Tf-Idf will be huge, we reduce the dimension to 768 using TruncatedSVD.
\paragraph{BERT-only} For BERT encoding, we utilize SentenceTransformer package (https://www.sbert.net/) where the model used is "bert-base-nli-mean-tokens".
\paragraph{Tf-Idf + Long Document Discourse Bias}
Following the implementation of \cite{dong2021discourse}, the bias is calculated using intra-section bias (or position-level bias within each section) and inter-section bias (or section-level bias). For sentences within the same section, the cosine-similarity between sentences adjusted by intra-section bias, $e_{ij}^{intraB}$, is computed by adjusting the lambda biases, $\lambda_1$ and $\lambda_2$ based on sentence boundary function, $d_b$:
\begin{equation*}
e_{ij}^{intraB} = \left\{
\begin{array}{ll}
sim(s^I_j,s^I_i) * \lambda_1, if \,\, d_b(s^I_i) \geq d_b(s^I_j) \\
sim(s^I_j,s^I_i) * \lambda_2, if \,\, d_b(s^I_i) < d_b(s^I_j)
\end{array}
\right.
\end{equation*}
where the sentence boundary function, $d_b$, will determine sentences $s^I_i$ that are closer to the section $I$ boundaries to be more important. This is computed by:
$$ d_b(s^I_i) = min(x^I_i,\alpha(n^I - x_i^I))$$
$n^I$ is the number of sentences in section $I$ and $ x_i^I $ represents sentence i’s position in section I. Cosine similarity between sentence and section adjusted by inter-section bias is calculated similarly except that the bias is computed based on the section’s position in the document. Finally, the resulting adjusted centrality score for each sentence is:
$$c(s_i^I) = \mu_1 \cdot c_{inter}(s_i^I) + c_{intra}(s_i^I)$$
where $\mu_1$ is a weighting factor for inter-section centrality.
\\
\\
For hyperparameter tuning, we set $\lambda_1 = 0.5$ and $\lambda_2 = 1$. Then, using arXiv validation samples, we adjust $ \alpha \in \{0, 0.5, 0.8, 1.0, 1.2\}$ to control the relative importance of the start and end of a section
of a source document and $\mu_1 \in \{0.5, 1.0, 1.5\}$ to control the weights of intra-section sentence importance versus inter-section sectional importance. Importantly, the original paper uses $\lambda_1 = 0 $ where less important sentences are pruned, while we set $\lambda_1 = 0.5$ to down weight rather than prune the less important sentences. For more details, we refer our reader to the original paper \cite{dong2021discourse} with their codes available on https://github.com/mirandrom/HipoRank.
\paragraph{BERT + Long Document Discourse Bias} Same as Tf-Idf except that the Tf-Idf sentence encoder is replaced by BERT.
\\\\
Lastly, for the implementation of Transformer-based abstractive summarization models, the links to original author's pre-trained weights, codes and implementations are provided in the footnote of our main article.
\subsection{BERT NSP - Assessing Semantic Coherence of Candidate Summaries} \citet{bommasani2020intrinsic} suggested using the general pre-trained BERT model to evaluate the semantic coherence or fluency of a summary without any fine-tuning. We find the general pre-trained BERT model that was not trained on academic papers to have little discriminative ability for the semantic coherence of arXiv-related summaries. Thus, we fine-tune the pre-trained BERT model using positive and negative sentence pairs. Positive sentences are extracted by taking any sentence together with its following sentence in the reference summary and source text of the arXiv dataset. Negative sentences are created by replacing the following sentences with any randomly extracted sentences from either the same or other documents in the arXiv benchmark dataset. We also ensured that the total samples of positive and negative sentence pairs are balanced and an equal amount of sentences are obtained from the reference summary and the source text. The codes of all the metrics used in the main paper, including BERT NSP and intrinsic characteristics of the dataset, are made publicly available on: https://github.com/huankoh/long-doc-summarization.
\subsection{Textual Entailment as Factual Consistency Metric}
\begin{table}[h!]
\small
\resizebox{0.55\textwidth}{!}{%
\begin{tabular}{c|c|c}
\hline
\textbf{Adaptation} & \textbf{Good} & \textbf{Bad} \\ \hline
Ordered R1 & 0.03 /0.10 /0.86 & 0.04 / 0.11 / 0.85 \\
Ordered R2 & 0.05 / 0.11 / 0.84 & 0.04 / 0.13 / 0.83 \\
Ordered RL & 0.04 / 0.12 / 0.84 & 0.04 / 0.13 / 0.83\\
Randomised R1 & 0.04 / 0.25 / 0.71 & 0.04 / 0.30 / 0.66 \\
Randomised R2 & 0.06 / 0.21 / 0.73 & 0.07 / 0.19 / 0.74 \\
Randomised RL & 0.05 / 0.25 / 0.70 & 0.05 / 0.24 / 0.71\\ \hline
\end{tabular}%
}
\caption{Textual Entailment Result (Entail/Contradict/Neutral) on annotated arXiv reference summaries after Long Document Adaptation. The Good column represents the results of reference summaries that are annotated to be high quality and the Bad column for low-quality data.}
\label{tab. fc_table}
\end{table}
Conditional on the source text, the entailment task classifies summary sentences as entails, neutral or contradicts. Ideally, a candidate summary should entail or be neutral to the source text, but never contradict the source text. As BERT textual entailment model without long document adaptation have a token limit of 512, this will not be directly applicable for long document datasets with a token length of at least in the thousands. To use this in our experiment, we attempted to adapt \citet{maynez2020faithfulness}'s textual entailment BERT model by implementing a content selection mechanism to reduce the input size of the source document. The selected subset is constructed using gold label sequences by greedily optimizing the ROUGE score on the ground truth reference summaries, following the algorithm provided by \citet{xiao2019extractive}. As we have different variants of the ROUGE score, we experimented with a greedy selection of Rouge-1, Rouge-2 and Rouge-L in the originally ordered sentences and in the randomized ordered sentences. The aim of randomized ordered sentences is to ensure that the salient contents are extracted more uniformly from the source text. To evaluate the discriminative ability of our adapted model, we use the annotated test data in section 3 to evaluate the discriminative ability of our adapted BERT textual entailment model. As the annotated data has 15\% of the randomly sampled data to be extremely low quality and 30\% to have zero errors in the sentences. A good BERT textual entailment model should then evaluate the 30\% high-quality samples as low contradiction and high entailment or neutrality while evaluating the 15\% low-quality samples with higher contraction and lower entailment or neutrality. From Table \ref{tab. fc_table}, despite trying out various adaptations, our models have almost no discriminative ability and were thus not used in our experimental section in the main article. This is an important limitation of our experiment in section 5 of our main article.
\subsection{Metric-related ACL main conference research papers} Table \ref{tab. metric_paper} next page details the 17 papers published from 2015 to September 2021 in ACL main conferences, including ACL, NAACL, EACL, EMNLP, CoNLL, and AACL.
\begin{table*}[!ht]
\small
\resizebox{0.96\textwidth}{!}{%
\begin{tabular}{c|c}
\hline
\textbf{Paper Title} & \multicolumn{1}{c}{\textbf{Year}} \\
& \\ \hline
\multicolumn{1}{l|}{\textit{I. ACL}} & \\
Studying Summarization Evaluation Metrics in the Appropriate Scoring Range & 2019 \\
Facet-Aware Evaluation for Extractive Summarization & 2020 \\
FEQA: A Question Answering Evaluation Framework for Faithfulness Assessment in Abstractive Summarization & 2020 \\
On Faithfulness and Factuality in Abstractive Summarization & 2020
\\
Improving Factual Consistency of Abstractive Summarization via Question Answering & 2021\\
A Training-free and Reference-free Summarization Evaluation Metric via Centrality-weighted Relevance and Self-referenced Redundancy & 2021\\
GO FIGURE: A Meta Evaluation of Factuality in Summarization & 2021\\
Focus Attention: Promoting Faithfulness and Diversity in Summarization & 2021 \\
Evaluating the Efficacy of Summarization Evaluation across Languages & 2021 \\
\multicolumn{1}{l|}{\textit{II. NAACL}} & \\
Question Answering as an Automatic Evaluation Metric for News Article Summarization & 2019 \\
Understanding Factuality in Abstractive Summarization with FRANK: A Benchmark for Factuality Metrics & 2021 \\
\multicolumn{1}{l|}{\textit{III. EMNLP}} & \\
Re-evaluating Automatic Summarization with BLEU and
192 Shades of ROUGE & 2015 \\
Better Summarization Evaluation with Word Embeddings for ROUGE & 2015 \\
Answers Unite! Unsupervised Metrics for Reinforced Summarization Models & 2019 \\
What Have We Achieved on Text Summarization? & 2020 \\
Evaluating the Factual Consistency of Abstractive Text Summarization & 2020 \\
Re-evaluating Evaluation in Text Summarization & 2020\\
\hline
\end{tabular}%
}
\caption{List of Metric-related ACL Main Conferences Papers. EACL, CoNLL, and AACL do not have metric-related summarization research papers.}
\label{tab. metric_paper}
\end{table*}
\section{Fundamentals of Long Document Summarization}
To make clear the distinction between short and long documents, we conceptualize the summarization task problem from three different fundamental aspects: 1) length of document, 2) breath of content, and 3) degree of coherence.
\subsection{Length of Document}
Documents are commonly classified as "long" because the number of lexical tokens in the source document is enormous and it requires a considerable amount of time for an average human to consume the full text. While this definition makes intuitive sense, in the context of machine learning, a document is considered long when current state-of-the-art models for a normal document cannot be implemented similarly in an effective manner due to hardware and model limitations. For example, previous research \cite{celikyilmaz2018deep} considers CNN/DM and NYT benchmark datasets in the news domain as long documents when in the present research context they are now considered to be short document datasets. Currently, a benchmark dataset with an average source document length that exceeds 3,000 lexical tokens could be well-considered as "long documents" \cite{zaheer2020big,manakul2021longspan} due to the fact that most existing state-of-the-art summarization systems (e.g., pre-trained models) are limited to 512 to 1024 lexical tokens only \cite{devlin2019bert,zhang2020pegasus}. These limitations cannot be easily solved without novel techniques that help in assisting current architectures to reason over a long range of textual inputs \cite{zaheer2020big, manakul2021longspan,meng2021bringing}. Accordingly, this survey adopts a similar definition where a document is only considered as long if current state-of-the-art systems used in the short document cannot be extended and applied to a document with significantly longer text. Despite the potentially confusing definition, this enduring definition ensures that the model architectures implemented by researchers require novel techniques to overcome hardware limitations rather than just a mere replica of previous works.
\subsection{Breadth of Content}
On average, informative content that is non-redundant will increase together with the length of a document. However, despite the fact that reference summary length often increases together with the source document length, the length of a summary is usually constrained by what an average user considered as reasonable \cite{cohan2018discourse,sharma2019bigpatent}. Thus, while it may be sufficient for summaries of a reasonable length to cover the most or even all of the informative aspects for short documents, this is not necessarily true for summaries of long documents. In section 3, we empirically show that the relative length of summary against the source document becomes exponentially shorter as the source document length increases. Due to this elevated constraint, the ground truth summary of a long document will inevitably lose information that is not key to the central narrative of the original author or summary writer \cite{gidiotis2020divide}. Furthermore, recent work \cite{kryscinski2019neural} has also identified that human users could not agree on what should be considered important for a given document in the short document news domain due to the heterogeneity of user preferences and expectations. This issue is exacerbated when it comes to long document summarization as (a) the relative length of summary against the source document is shorter and (b) the chance of users having different preferences and expectations would increase as the breadth of content increases, making the long document summarization task significantly harder than short document.
\subsection{Degree of Coherence}
As compared to short documents, long documents are often structured into sections for the ease of user comprehension \cite{cohan2018discourse,kornilova2019billsum}. The content within each section also differ to a certain extent despite revolving around a key narrative of the long documents. This makes the long document summarization task more burdensome as summarization models cannot concatenate salient texts from different sections without considering its impact on the fluency, redundancy, and semantic coherence of the final summary outputs. \\\\Based on the fundamental aspects, the rest of this paper provides an empirical survey on long document summarization, covering the benchmark datasets, summarization models, and metrics.
\section{Datasets}
Publicly available benchmark datasets have been introduced to evaluate the performance of summarization models. Nonetheless, the benchmark datasets have different intrinsic characteristics that have been found to be crucial in the understanding of model performances \cite{maynez2020faithfulness,tejaswin2021well}, summarization approach suitability (i.e., extractive or abstractive approach) \cite{zhang2018abstractiveness,sharma2019bigpatent} and evaluation metrics effectiveness \cite{gabriel-etal-2021-go,pagnoni-etal-2021-understanding}. Hence, only through a comprehensive understanding of the benchmark datasets, one can assess the underlying performance and applicability of a summarization model in the real-world settings \cite{kryscinski2019neural}. Further, insights drawn from benchmark datasets have led to the introduction of state-of-the-art models across a wide range of natural language processing (NLP) tasks \cite{chen2016thorough,yatskar2019qualitative}, including the text summarization task \cite{gidiotis2020divide, dong2021discourse,manakul2021longspan}. In response, intrinsic dataset evaluation through large-scale automatic evaluation \cite{bommasani2020intrinsic} or more fine-grained human evaluation at a smaller scale \cite{tejaswin2021well} has also been performed to enhance the understanding of various benchmarks. Nevertheless, none of the aforementioned works performed a large-scale automatic evaluation analysis nor a thorough human evaluation of benchmark datasets in the long document text summarization domain. To address this gap, this section explores the basic statistics and intrinsic characteristics of popular benchmarks in short and long document domain through the usage of large-scale automatic evaluation metrics and performs fine-grained human analysis on the arXiv benchmark to encourage a better appreciation of the most widely used long document summarization dataset \cite{zaheer2020big,huang2021efficient,manakul2021longspan}.
\subsection{Corpora}
\paragraph{Short document}
Short-document datasets studied in this survey are CNN-DM, NWS, XSUM, Reddit-TIFU, and WikiHow. The first three news datasets are chosen due to their popularity while Reddit-TIFU and WikiHow are studied to ensure short documents from other domains are also included. The document-summary pairs from CNN-DM, NWS, and XSUM are typical of that in the news domain, where the source document represents news article while the summary represents either human-curated summary \cite{grusky2018newsroom,narayan2018don} or summary created by concatenating bullet-point sentences in the original source document \cite{nallapati2016abstractive}. On the other hand, Reddit-TIFU is a dataset collected from the subreddit r/TIFU \cite{kim2019abstractive}, while the WikiHow benchmark is created using the first sentence of each WikiHow web page's paragraph as the summary and the rest as source text \cite{Koupaee2018WikiHowAL}.
\paragraph{Long document}
For long document summarization research, arXiv, PubMed, BIGPATENT, BillSum, and GovReport have been used in prior research to test and compare novel long document summarization models. arXiv and PubMed \cite{cohan2018discourse} are scientific long document summarization datasets collected from arXiv.org and PubMed.com scientific repository. Both datasets represent the earliest work on large-scale long document summarization datasets. BIGPATENT \cite{sharma2019bigpatent} is an enormous dataset with over 1.3 million document-summary records of U.S. patent documents along with human written abstractive summary. BillSum \cite{kornilova2019billsum} is a dataset on summarizing Congressional and California state bills where the content structures and stylistic features of writing are considerably different from documents in other domains. GovReport \cite{huang2021efficient}, assembled from reports published by U.S. Government Accountability Office, is markedly longer than the other long document datasets. Other long document benchmark datasets that are worth mentioning but are no longer widely used due to the limited amount of document-summary pairs are CL-SciSumm and SciSummNet \cite{jaidka-etal-2016-overview,yasunaga2019scisummnet}. Some other benchmark datasets that are released more recently in the podcast \cite{clifton-etal-2020-100000} and dialogue domains \cite{janin2003icsi,carletta2005ami,rameshkumar-bailey-2020-storytelling,zhu2021mediasum} may also be classified as long document summarization benchmark \cite{manakul2021longspan} but are not explored in this survey as dialogue summarization has been recognized as another sub-domain due to its distinctive features as compared to other document types.
\subsection{Data Metrics} Given a document, $D$, and a corresponding reference summary, $S$, each document will have a sequence of tokens $D_{token} = \{ t_1, t_2, ..., t_n \} $ and each summary will also have a sequence of tokens $ S_{token} = \{ t^*_1, t^*_2, ..., t^*_m \} $. Similarly, each document and summary have $l$ and $o$ sentences as represented by $D_{sent} = \{ s_1, s_2,...,s_{l} \}$ and $S_{sent} = \{ s^*_1, s^*_2,...,s^*_o \}$ respectively. Length of document and summary measured in number of tokens are represented as $|D|$ and $|S|$ while length measured in number of sentences are represented as $||D||$ and $||S||$. Extending on the works in the short document summarization domain \cite{bommasani2020intrinsic, grusky2018newsroom}, the following discusses each of the five metrics used to evaluate the benchmark datasets shown in Table \ref{tab: datasets}: compression ratio, extractive coverage, extractive density, redundancy and uniformity.
\textit{Compression Ratio} measures the ratio of a source document length against its reference summary length. A higher compression ratio indicates larger information loss in the original document after being summarized. Compression ratios are measured based on tokens and sentences:
$$COMPRESSION_{token} = \frac{|D|}{|S|} \quad\text{ and }\quad COMPRESSION_{sent} = \frac{||D||}{||S||}$$
\textit{Extractive Coverage and Extractive Density} are introduced by \citet{grusky2018newsroom} based on the notion of matching fragments. Fragments are obtained by greedily matching the longest shared token sequence where $\mathcal{F}(D,S)$ reflects a set of fragments with each fragment having a length represented by $|f|$. Extractive coverage calculates the percentage of tokens in summary that is a derivation of the original source text, whereas, extractive density relates to the average squared length of the extractive fragments in the summary. The former indicates the need for a model to coin novel tokens that are not in the original source text while the latter measures whether a model can match the ground truth summary merely by extracting from the original source text without rearranging or paraphrasing text.
$$COVERAGE(D,S) = \frac{1}{|S|} \sum_{f \in \mathcal{F}(D,S)} |f| $$
$$DENSITY(D,S) = \frac{1}{|S|} \sum_{f \in \mathcal{F}(D,S)} |f|^2 $$
\textit{Redundancy} relates to the redundancy of ground truth summary by measuring the average ROUGE-L F1-score of all distinct pairs of summary sentences \cite{bommasani2020intrinsic}. As ROUGE-L measures the longest common sub-sequence overlap between two texts \cite{lin2004rouge}, a higher redundancy score would suggest that a candidate summary is more redundant as the sentence pairs in the ground truth summary contain more similar content in each sentence pair. For each summary consisting of m sentences, $\mathbb{S}$, we have a set of distinct pairs of sentences, $\mathbb{S} \times \mathbb{S} $, where the redundancy score is calculated as:
$$ REDUNDANCY(S) = \underset{(x_i,x_j) \in \mathbb{S}\times\mathbb{S},\, x_i \neq x_j}{average} ROUGE(x_i,x_j) $$
\textit{Uniformity} measures whether content that are considered important by the reference summary are uniformly scattered across the entire source document. A higher score indicates that important content are scattered across the entire document with no obvious layout bias to take advantage of. This is calculated based on the normalized entropy of the decile positions of salient unigrams in the source text, where salient unigrams are the top 20 keywords extracted\footnote{We use NLTK-RAKE for keywords extraction.}, excluding stopwords, from the reference summary.
$$UNF(unigram_{pos})= H_{norm}(unigram_{pos}) $$
\subsection{Intrinsic Characteristics of Datasets}
\subsubsection{Short vs Long Document Benchmark Dataset}\,\\
Based on Table \ref{tab: datasets} below, the following discusses the \textbf{findings} of intrinsic characteristics of long document benchmark datasets in comparison to short document benchmark datasets.
\textbf{Finding 1. Length of Long Documents:} A basic yet important finding is that, except for BillSum, all the other long document datasets have an average source document length of at least 3,000 tokens. In contrast, the longest short document dataset, CNN-DM, has an average document length of 774 tokens. This indicates that a vanilla pre-trained Transformer-based models \cite{raffel2020exploring,lewis2020bart,zhang2020pegasus}
which commonly have an input length limit of 1,024 tokens would need to truncate at least half of the source document in the long document benchmark datasets. Thus, if pre-trained models that have proven to work well under short document settings are implemented without any long document adaptations in their architectural settings and mechanisms, they are unlikely to generate high-quality summaries for long documents \cite{maynez2020faithfulness,he2020ctrlsum,rothe-etal-2021-thorough}.
\begin{table*}[!ht]
\centering
\resizebox{\textwidth}{!}{%
\small
\begin{tabular}{c|ccccc|ccccc|c}
\thickhline
\multicolumn{1}{l|}{} & \multicolumn{5}{c|}{\textbf{Short Document Datasets}} & \multicolumn{5}{c|}{\textbf{Long Document Datasets}} & {\textbf{Long vs. Short}}\\ [0.5ex]
\multicolumn{1}{l|}{} & CNN-DM & NWS & XSum & WikiHow & Reddit & ArXiv & PubMed & BigPatent & BillSum & GovReport & Avg. Ratio \\ [0.3ex]
\hline
\textbf{\# doc-summ.} & 278K & 955K & 203K & 231K & 120K & 215K & 133K & 1.34M & 21.3K & 19.5K & - \\
\textbf{summ tokens} & 55 & 31 & 24 & 70 & 23 & 242 & 208 & 117 & 243 & 607 & 6.9x \\
\textbf{doc tokens} & 774 & 767 & 438 & 501 & 444 & 6446 & 3143 & 3573 & 1686 & 9409 & 8.3x \\
\textbf{summ sents} & 3.8 & 1.5 & 1 & 5.3 & 1.4 & 6.3 & 7.1 & 3.6 & 7.1 & 21.4 & 3.7x \\
\textbf{doc sents} & 29 & 31 & 19 & 27 & 22 & 251 & 102 & 143 & 42 & 300 & 6.5x \\ [0.3ex]
\hline
\textbf{Compression\textsubscript{token}} & 14.8 & 31.7 & 19.7 & 7.2 & 18.4 & 41.2 & 16.6 & 36.3 & 12.2 & 18.7 & 1.4x \\
\textbf{Compression\textsubscript{sent}} & 8.3 & 22.4 & 18.9 & 3.3 & 14.5 & 44.3 & 15.6 & 58.7 & 9.7 & 18.1 & 2.2x \\
\textbf{Coverage} & 0.890 & 0.855 & 0.675 & 0.610 & 0.728 & 0.920 & 0.893 & 0.861 & 0.913 & 0.942 & 1.2x \\
\textbf{Density} & 3.6 & 9.8 & 1.1 & 1.1 & 1.4 & 3.7 & 5.6 & 2.1 & 6.6 & 7.7 & 1.5x \\
\textbf{Redundancy} & 0.157 & 0.088 & - & 0.324 & 0.078 & 0.144 & 0.146 & 0.223 & 0.163 & 0.124 & 1.0x \\
\textbf{Uniformity} & 0.856 & 0.781 & 0.841 & 0.813 & 0.777 & 0.894 & 0.896 & 0.922 & 0.903 & 0.932 & 1.2x \\
\thickhline
\end{tabular}%
}
\caption{Comparison of Short and Long Document Summarization Datasets. Intrinsic characteristics are computed based on the average result of test samples. Average Ratios are computed based on the average long over short document statistics.}
\label{tab: datasets}
\end{table*}
\textbf{Finding 2. High Compression Ratio and its Implications:} On average, the token-level and sentence-level compression ratio of the long document summarization datasets is greater than the short document datasets by 1.4 and 2.2 times respectively. For long documents, this suggests that either a) there is a greater information loss in the summaries, b) the salient content is more sparsely distributed across the source documents, and/or c) the source document contains significantly more redundant information. As the high compression ratio of long document benchmark is more likely to be the results of the two former factors, this increases the relative difficulty of the long document summarization task as a model would have to clearly identify the key narrative from the source while excluding the content that are \textit{expected} to be less important by the summary readers. Moreover, if there is a greater information loss in the summary of a long document, the generated summary will inevitably miss an even greater amount of information that is considered important by some readers, diminishing the effectiveness of a generalized summarization approach to satisfy the needs of summary readers. This finding supports the efforts in controllable summarization, where the final generated summaries will be based on the reader's needs and expectations \cite{he2020ctrlsum,wu-etal-2021-controllable}.
\textbf{Finding 3. Abstractiveness and Diversity of Datasets:} With the exception of BIGPATENT, all long document datasets have greater coverage and density values than the short document datasets. This is likely due to the genres of benchmark datasets where long documents are often related to domain-specific articles such as scientific papers that contain more complex formulas and terminologies. Nonetheless, this indicates that a model that merely extracts lexical fragments from the original source text of a long document can still generate a summary that more closely resembles the reference summary. As abstractive summarization models have recently been found to contain factual inconsistencies in up to 30\% of the summary outputs in the short document domain \cite{cao2018faithful,kryscinski-etal-2020-evaluating} while extractive summarization model will faithfully preserve the original content, this finding is encouraging for the development of long document extractive models in the real-world production level settings. Finally, as the abstractiveness of datasets have been found to greatly affect the summarization strategies of a supervised model \cite{zhang2018abstractiveness,xu2020understanding,wilber-etal-2021-point}, efforts to introduce benchmark datasets with greater abstractiveness (low extractive coverage and density value) should be encouraged to improve the diversity of long document benchmark datasets.
\textbf{Finding 4. Lesser Layout Bias in Long Document:} \citet{kryscinski2019neural} found substantial layout bias in the source text where nearly 60\% of important sentences are contained
in the first 30\% of the source articles and argued that such layout bias does not apply to the other domains. Our findings on the uniformity of salient content in Table \ref{tab: datasets} validates their arguments where the salient content of long documents are scattered across the entire source text more uniformly than the short documents. This suggests that unlike practices in the short document summarization domain where models are often benefited by taking advantage of layout biases \cite{see2017get,gehrmann2018bottom,paulus2018deep}, long document models that implement a truncation strategy to process only a small subset of the leading content of the long documents will likely suffer from significant performance degradation.
\begin{figure} [!ht]
\centering
\includegraphics[width=1\textwidth]{SurveyFigure.pdf}\\
\caption{Pairwise Correlations between Metrics (figure 1a) and Facets Covered by ArXiv Ground Truth Summary (figure 1b). For figure 1a, the upper diagonal reflects Pearson correlation coefficient for long document benchmarks while the lower diagonal reflects values for short document benchmarks. Figure 1b's barplot is constructed based on human annotated testset data as described in section 3.5.}
\label{fig: pairwise_corr}
\end{figure}
\textbf{Finding 5. Relationship between Intrinsic Characteristics:}
Other than the intrinsic characteristic measured in Table \ref{tab: datasets}, the statistical relationship between these metrics could yield insights regarding the underlying properties of a benchmark dataset. More importantly, whether the relationship between these metrics differs significantly under short and long document summarization settings should also be of great interest to practitioners. To quantify this, we report the pairwise correlations between each metric pair for both short document (lower diagonal) and long document (upper diagonal) benchmark datasets in figure \ref{fig: pairwise_corr}a. The values reported are calculated using the Pearson correlation coefficient, $\rho$. As represented by darker blue color in figure \ref{fig: pairwise_corr}a, $\rho = 1$ reflects a perfectly positive correlation between the metric pair and $\rho = -1$ when it is perfectly negative (shown in darker red color).
For positive controls, we see a strong positive relationship between the two compression ratios and the two extractive metrics (coverage and density) under short and long document settings. We also see a lack of statistical correlation when uniformity is measured against other metrics as uniformity relates more to the genres of documents rather than the other characteristics. We further observe redundancy to be inversely related to coverage and density, where a more abstractive reference summary often contains more redundant information. This finding is consistent with a human evaluation study by \citet{kryscinski-etal-2020-evaluating} where writers are found to be more verbose and write summary content that do not add information when they are writing unconstrained, abstractive summaries. Intriguingly, we see a weakly positive correlation between the extractive metrics and the compression metrics under the short document setting but a strongly negative correlation under the long document setting. It is hypothesize that when authors have to write a concise summary, they are forced to paraphrase the original content more to ensure that the summary can cover the salient content within the constrained summary length.
\subsubsection{Comparison between Long Document Dataset Benchmarks}\,\\
Looking at the intrinsic characteristics between long document benchmark datasets, arXiv and BIGPATENT have significantly higher compression ratios but lower extractive density values than the others, indicating that two of these datasets require a summarization model to generate a significantly shorter summary that is not written in the same way as the source text. As discussed above, this is likely because for a summary to cover more content within a constrained summary length, one has to paraphrase the original content more. This is also evidenced by the diverging values between extractive coverage and density metric for arXiv benchmark dataset that suggest summaries of arXiv scientific papers have high matching tokens and terminologies with the source document (high coverage) but low matching phrases (low density). Overall, the BIGPATENT dataset is the most suitable benchmark for long document supervised abstractive summarization due to its low coverage and density, substantial training sample pairs to serve as supervisory signals, and high uniformity in salient content. However, only a handful of fully-supervised abstractive long document summarization works \cite{pilault2020extractive,zaheer2020big,zhang2020pegasus} evaluated their models on BIGPATENT, limiting the visibility of current progress on long document summarizers in general applications. This is despite the fact that BIGPATENT was introduced not long after arXiv and PubMed. Encouragingly, with the recent introduction of long document datasets in domains other than scientific papers including financial reports \cite{loukas2021edgarcorpus} and books \cite{kryscinski2021booksum}, the research progress of long document summarization models towards general application should become clearer in the near future.
\subsection{Fine-grained Analysis on ArXiv}
To perform fine-grained human analysis on the arXiv benchmark, this survey implements a stratified random sampling strategy based on the 6 different categories of scientific domains contained in the arXiv.org scientific repository: physics (ph), computer-science (cs), mathematics (math), quantitative-biology (q-bio), quantitative-finance (q-fin) and statistics (stat). In total, we obtain over 700 annotated ground truth summaries with physics having the most samples (369) followed by computer science (140). Based on fine-grained human analysis of 743 ground truth summaries in the arXiv test set, this subsection reports the disturbing data quality results and studies the degree of diversity in formatting style of reference summary.
\paragraph{Noise in arXiv benchmark dataset:}
With the advent of data-hungry neural architectures, there has been an enormous demand for benchmark datasets with document-summary pairs that are at least in the tens of thousands created through heuristic means such as scraping it directly from the web. As a result, depending on the means of extracting these datasets, the quality of benchmark datasets may vary significantly from one another. To this end, \citet{kryscinski2019neural} have quantified the percentage of samples with noise for CNN-DM and Newsroom from the short document summarization datasets to be 4.19\% and 3.17\% using simple heuristic methods. The noises found in the datasets through heuristic means can only suggest a lower bound of what the true amount of noises are as heuristic approaches can only detect obvious structural flaws in the samples. This suggests that the true underlying noises are extremely widespread and often understated. Glaringly, in our experiment, the problem of noisy data affects more than 60\% of the annotated ground truth summaries in the randomly sampled arXiv test set. This is greater than 54\% detected in XSUM dataset \cite{tejaswin2021well}. While many of the errors and noises are minor, more than 15\% of the reference summaries have significant errors where at least half of the summary contains errors, rendering the summaries to be unreadable. Reassuringly, the rest of the test sets with identified noises are not overly significant and often only affect one or two sentences in a benchmark dataset with an average of 10 sentences in the reference summary. To further understand why the noises and errors occurred, we trace the original data based on the arXiv id provided by the benchmark datasets. It was found that many errors occurred such as missing content or sentence breaking after a newline could be due to large-scale scraping of the original data using pandoc \cite{cohan2018discourse}. As neural summarization models may overfit to these problematic noises and contribute to less interpretable benchmarking results, we release the annotated data to allow a better understanding of the common noises and to encourage quality improvement in future benchmark datasets\footnote{The annotated dataset are released: https://github.com/huankoh/long-doc-summarization}.
\paragraph{\hlt{Content Coverage of Reference Summary:}}
Other than analyzing the noises in the arXiv benchmark dataset, we also explore
to what extent the ground truth summary covers various sections or facets of the source article. Figure \ref{fig: pairwise_corr}b shows the average distribution of sections covered by ground truth summaries for different domains. The distribution is plotted based on the assumption that each sentence in the reference summary covers a single facet of the original article and human annotators are asked to identify the section covered by the summary sentences. The facets studied are Introduction, Methodology, Result, Conclusion and Limitation of Research. Interestingly, while the reference summaries in all domains have covered introduction and methodology sections with similar emphasis, we see a negative correlation between contribution and conclusion (i.e., papers that emphasize contributions will write less on conclusions, and vice-versa). Notably, we see scientific papers in the mathematics domain emphasize more on the contribution while papers in the physics domain emphasize more on conclusions. These results make intuitive sense as findings in mathematics often do not lead to a strong substantive conclusion. The trade-off between various sections also illustrates the inevitable information loss when summarizing a long document as the summary can only describe certain aspects of the source document but not all.
\paragraph{\hlt{Style of Writing and External Knowledge:}}
Importantly, except for quantitative-biology, all scientific papers do not discuss the limitations of their research. This is consistent with common practices of writing abstracts to attract readers in reading the original paper by emphasizing on the result findings and contributions of the authors. Nevertheless, most researchers would find a discussion on the limitations of research works to be informative and significant. Whether the abstract itself represents the best possible summary for a summarization architecture to imitate from and learn how to appropriately summarize all the salient content including the limitation discussed in the original paper remains an important question to be answered. Recent progress on summarization approaches that generate user-specific summaries based on the need of readers are also important directions towards general applicability of summarization models in commercial settings \cite{he2020ctrlsum,wu-etal-2021-controllable}. Lastly, to summarize the limitations of a paper often requires more external knowledge outside of the content related to the source document and whether current summarization models are able to infer such knowledge from the benchmark dataset is an interesting study left for future works.
\section{Models}
\subsection{Overview}
The following describes the differences between the extractive, abstractive and hybrid summarization approaches and the general taxonomy of a summarization system.
\begin{figure} [h!]
\centering
\includegraphics[width=0.9\textwidth]{SurveyFigure22.pdf}\\
\caption{Overview of Model Architectures.}
\label{fig: model_architecture}
\end{figure}
\paragraph{A. Extractive, Abstractive and Hybrid Approach}\,\\ The works in automatic text summarization research are traditionally classified into three different summarization approaches: (i) the extractive approach that involves direct extraction of salient fragments such as sentences of the original documents into a summary \cite{gong2001generic,cheng2016neural}, (ii) the abstractive approach imitates human behavior of paraphrasing important parts of a document into a summary \cite{rush2015neural,see2017get} and (iii) the hybrid approach that attempts to combine the best of both approaches \cite{gidiotis2020divide,manakul2021longspan}. Intuitively, the extractive summarization method is an easier machine learning task and can be thought of as a classification and/or ranking problem of extracting lexical fragment units (e.g., sentences) into a summary. Contrastively, abstractive summarization requires paraphrasing important ideas of a document into a summary either by rearranging words and phrases from original text or contriving novel wordings while maintaining the factual consistency of the generated summary with the original document.
Since the extractive summarization approach only extracts and arranges the original text that it believes to be salient and does not alter the original text, it enjoys the benefit of generating summaries that are factually consistent with the source document \cite{cui2021sliding}. Nevertheless, as human-based summarization often involves paraphrasing ideas and concepts into shorter, concise sentences, the extracted sentences of this approach often contain redundant and uninformative phrases \cite{grenander2019countering}. While there exist extractive summarization models that break a source document into lower lexical units than sentences (e.g., elementary discourse units) \cite{xu2019discourse}, they are often not applied in the long document summarization domain due to the extreme length of the input document.
On the other hand, mimicking how humans write summaries, the abstractive summarization approach presents a blue-sky potential of generating summaries that are fluent, concise and relevant to the source document \cite{see2017get}. It can also incorporate external knowledge to the summary depending on the needs of a user \cite{maynez2020faithfulness}. However, at the current stage of development, summaries generated by the state-of-the-art abstractive models often contain a significant amount of content that is factually inconsistent with the source document, limiting its application in commercial settings \cite{cao2018faithful,kryscinski-etal-2020-evaluating}.
Finally, in response to the limitation of current model architectures and designs, the hybrid summarization approach only differs from the abstractive summarization approach in that it takes in a carefully chosen subset of the original input document rather than the entire input document in its original form \cite{pilault2020extractive,gidiotis2020divide}. This extra step reduces the burden on the abstractive summarization models that have to generate an abstract summary and select important content at the same time. This approach is used more often in the long document summarization domain because current models still fail either (a) at reasoning over extremely long texts \cite{meng2021bringing,manakul2021longspan} and/or (b) suffers from memory complexity issues and hardware limitations that prevent it from processing over a long input text \cite{zaheer2020big,huang2021efficient}.
\paragraph{B. General Taxonomy}\,\\
In each long document summarization model, this paper breaks down a model into two different constituents: (i) Main Architecture and (ii) its Mechanisms. The main architecture refers to the core framework structure that a model uses and the mechanisms are the different settings or modifications implemented by a model to the main architecture. Two differing models may use the same main architectures but are implemented with different mechanisms, and vice-versa. For example, models that use graph-based main architecture may use different encoding mechanisms in vectorizing the sentences of an input document. The following describes the various main architectures of the summarization models together with how previous works differ in the mechanisms employed to generate long document summaries.
\subsection{Main Architecture and its Mechanisms}
In the search for optimal architectural settings of summarization systems, the research field started out with many different novel designs of main architectures and mechanisms but often converge towards a few ideas that are often most effective until another ground-breaking idea that leap-frogs the performance of previous systems, and the cycle repeats.
\,\\\,\\
\textit{1. Graph Architecture:}
For the extractive summarization approach, the classic graph architecture involves a two-stage process of mapping a document into a graph network, where the vertices are sentences and the edges are the similarity between these sentences, and extracting the top-$K$ sentences. The sentences are ranked based on the graph centrality scoring of each sentence \cite{mihalcea2004textrank,erkan2004lexrank}. As there are many different ways to (a) encode or vectorize a sentence before calculating the similarity between them and (b) calculate the centrality score of each sentence, research involving this architecture often differs only in these two mechanisms. For example, with respect to the former mechanism, graph architecture in the past \cite{mihalcea2004textrank,erkan2004lexrank} encodes sentences based on word-occurrence or term frequency-inverse document frequency (Tf-Idf) while graph architecture today \cite{zheng2019sentence,liang2021improving} encodes sentences with state-of-the-art pre-trained models. On the other hand, to improve the centrality scoring mechanism, PacSum \cite{zheng2019sentence} and FAR \cite{liang2021improving} adjust the centrality score of a sentence based on whether the other sentences come before or after it, while HipoRank \cite{dong2021discourse} exploits the discourse structure contained in by adjusting the centrality score with positional and sectional bias. In general form, given a set of sentences in the original source document, $D = \{s_1, s_2,...,s_m\}$ with the inter-sentential similarity relations represented as $e_{ij} = (s_i,s_j) \in E$ where $i \neq j $, the following illustrates the aforementioned architecture in computing the scoring for each sentence:
$$centrality(s_i) = \sum_{j \in \{1,...,i-1,i+1,...,m\}} e_{ij} * Bias(e_{ij})$$
The similarity between each sentence is computed using similarity measures such as dot product or cosine similarity, and the sentences are vectorized using Tf-Idf or BERT representation values. The final summary is generated by extracting the top-k sentences ranked by $centrality(s_i)$. Importantly, while there are other classical architectures \cite{gong2001generic,vanderwende2007beyond}, the graph architecture is worth a separate mentioning here due to the fact that (a) it remains as a strong baseline against other advanced architectures, (b) it can effectively incorporate external knowledge as an inductive bias to the calculation of the importance of a sentence and (c) it achieves state-of-the-art result in long document unsupervised extractive summarization setting when integrated with current state-of-the-art pre-trained models \cite{dong2021discourse,liang2021improving}. Lastly, other than the \hlt{multi-sentence compression approach}
\cite{boudin-morin-2013-keyphrase,ju2020monash,zhao2020summpip} that may be extended to long document summarization tasks, there has been no applicable work on classical graph-based architecture for long document \textit{abstractive} summarization.
\,\\\\
\textit{2. Other Classical Architectures:}
In the early work of automated, non-neural text summarization models, past research mostly focused on the extractive summarization approach due to the difficulty of the abstractive summarization task. The main architectures that were tested ranged from support vector machines \cite{chali2009svm, shivakumar2015text}, Bayesian classifiers \cite{kupiec1995trainable}, decision trees \cite{mani1998machine,knight2002summarization} to citation network-based summarization \cite{qazvinian2008scientific}. The ones that remained relevant when comparing model performance across various benchmarks in long document summarization settings are LSA \cite{gong2001generic}, which is based on Singular Value Decomposition (SVD), and SumBasic \cite{vanderwende2007beyond} that ranks sentences by simple average word-occurrence probability \cite{vanderwende2007beyond}.
\,\\\\
\textit{3. Recurrent Neural Networks:}
Extractive summarization that employed neural networks with continuous representations rather than pre-trained word embeddings on traditional techniques \cite{kobayashi2015summarization,yogatama2015extractive} was proposed by \citet{cheng2016neural}. The model implemented an RNN encoder-decoder architecture with attention mechanism to locate the region of focus during sentence extraction process. Nevertheless, due to the lack of a large-scale long document dataset and the RNN's inability in capturing long-range temporal dependencies across a long input text, it wasn't until \citet{xiao2019extractive} that tried implementing LSTM-minus (a variant of RNN) on solving long document summarization task. Typical of a long document summarization system, it incorporates discourse-information (i.e. section structure) of the source document by encoding the section-level and document-level representation into each sentence to significantly boost the model performance. \citet{pilault2020extractive} also suggested two different variants of RNNs on extractive summarization for long document summarization. Rather than utilizing pre-trained word embeddings, they implemented a hierarchical LSTM to encode words and sentences separately.
When it comes to the abstractive summarization approach, \citet{celikyilmaz2018deep} proposed multiple communicating agents to address the task of long document summarization. However, as compared to other simpler architecture, this approach did not gain significant traction after the introduction of the first large-scale dataset on long scientific documents. Together with the contribution of two most commonly used long scientific document datasets, arXiv and PubMed, \citet{cohan2018discourse} presented an LSTM encoder-decoder architecture where the decoder attends to each section of the source document to determine section-level attention weights before attending to each word. While similar architectures have been widely used in prior works, this work effectively incorporates discourse information that suits the long document summarization task well.
\,\\\\
\textit{4. Transformers: }
The Transformer model proposed in 2017 together with the pre-trained Bidirectional Encoder Representation from Transformers (BERT) model that was based on the Transformer model itself have taken the NLP area by storm \cite{vaswani2017attention,devlin2019bert}. Like other NLP tasks, subsequent summarization model architectures have changed significantly to take advantage of these two momentous ideas. Importantly, BERTSum \cite{liu2019text} showed that by modifying the BERT-segmentation embeddings, it can capture not only sentence-pair inputs but multi-sentential inputs. The BERTSum model could effectively solve both extractive and abstractive summarization tasks. The extractive summarization model proposed by BERTSum involves stacking a Transformer-based classifier on top of the fine-tuned BERT to select and extract salient sentences while the abstractive summarization model involves a classic encoder-decoder Transformer framework where the encoder is a fine-tuned BERT and the decoder is a randomly-initialized Transformer that is jointly trained together in an end-to-end manner. While effective, this architecture cannot be implemented to solve long document summarization tasks due to the BERT's input length limit of 512 tokens. In this survey, we define Transformer as the main architecture and settings related to the Transformer model as the mechanisms including the use of different types of pre-trained models. As Transformer has effectively replaced most main architectures in both summarization approaches as state-of-the-art models, the various mechanisms applied in the long document summarization context will be thoroughly discussed in section 4.3.
\subsection{Mechanisms of Transformer-based Architectures}\label{subsec: transformer_mechanism}
Transformer-based model is ubiquitously state-of-the-art across a wide range of tasks in the NLP domain. In line with this development, recent works in the long document summarization models often involve using the same Transformer base architecture but with different proposing mechanisms. These Transformer-based models involve implementing novel mechanisms with long document adaptations to ensure the task of summarizing a document with significantly longer input sequence texts can be effectively addressed. The mechanisms used by extractive, abstractive and hybrid Transformer-based summarization models are described in the following with an overview of mechanisms used by abstractive and hybrid summarization models shown in Figure \ref{fig. transformer_mechanisms}.
\begin{figure} [h!]
\centering
\includegraphics[width=0.77\textwidth]{TransformerMechanism.pdf}\\
\caption{Overview of Transformer-based Abstractive \& Hybrid Summarization Models.}
\label{fig. transformer_mechanisms}
\end{figure}
\paragraph{A. Extractive Transformer}\,\\
As Transformer and its pre-trained models are optimized for short document settings, they may not reason well over long text sequences if not properly fine-tuned. To this end, \citet{cui2020enhancing} proposed combining neural topic modeling together with BERT in learning a topic-enhanced, inter-sentence relationship across the entire document. Nonetheless, the issues of memory complexity and input token length limits were not resolved and significant source text is truncated under this research setting. Recently, \citet{cui2021sliding} proposed a memory network that incorporates graph attention networks and gated recurrent units to dynamically select important sentences through sliding a window along the entire source document. This approach can effectively integrate the pre-trained BERT model for long document summarization task by limiting its usage within each window, where the window size is set to be lower than or equal to 512 tokens.
\paragraph{B. Abstractive Transformer}
\,\\\textit{1) General Sequence-to-Sequence Pre-training Task}\\
Since the advent of BERT \cite{devlin2019bert}, various large-scale models with different pre-training tasks have been introduced. As summarization with the abstractive approach is naturally a sequence-to-sequence task, a pre-trained model with a sequence-to-sequence objective task would suit it better rather than an encoder-only (e.g., BERT/RoBERTa) or a decoder-only (e.g., GPT-2/GPT-3) pre-trained model. In the summarization domain, Bidirectional and Auto-Regressive Transformers (BART) \cite{lewis2020bart} and Text-to-Text Transfer Transformer (T5) \cite{raffel2020exploring} are the two most widely used sequence-to-sequence pre-trained models. BART is pre-trained on a self-supervised task of reconstructing arbitrarily corrupted text while T5 is pre-trained on both unsupervised and supervised objectives, such as token masking, as well as translation and summarization. Interestingly, none of the supervised Transformer models in the long document summarization domain has implemented a summarizer with T5 pre-training task despite its success in the short document domain \cite{rothe-etal-2021-thorough}.
\\
\\
\textit{2) Gap-Sentence Generation (GSG) Pre-training Task}\\
Other than the generalized pre-training task like BART and T5, PEGASUS \cite{zhang2020pegasus} attempted to significantly advance the progress in the abstractive summarization field through large-scale pre-training with objectives that are specific to the summarization task. The proposed model is self-trained on two large scale datasets (C4 and HugeNews) with the gap-sentence generation pretraining task. Gap-sentence generation pretraining task draws a close resemblance with the general summarization task by self-supervising the model to generate sentences that are masked entirely in a given document. At the time of PEGASUS model release, the model effectively achieves state-of-the-art results across 12 different benchmark datasets, including long document arXiv and PubMed dataset.
\\
\\
\textit{3) Efficient Attentions} \\
The vanilla Transformer models that utilize full attention have a memory complexity \(O(n^2)\). This attribute limits its wider usage across many domains, including long document summarization. For example, to circumvent the input tokens limits of PEGASUS, DANCER \cite{gidiotis2020divide} summarizes each section of the long document separately and concatenates each of them to form the final summary. As not all benchmark datasets contain discourse information such as section structures, this limits the model usage in many long document summarization settings. To this end, researchers have proposed various ingenious ideas to reduce the memory and time complexity of Transformer models. The variants of Transformer models that require less memory are often known as efficient Transformers \cite{tay2020efficient,tay2020long} and the mechanism is referred to as efficient attentions \cite{huang2021efficient}.
Longformer \cite{beltagy2020longformer} combines local attention, stride patterns and global memory for fine-tuning pre-trained BART to effectively summarize long documents with a maximum input length of 16,384 tokens as opposed to the 1,024 token limit of the original BART model. The model achieved state-of-the-art results in the long document summarization along with other NLP tasks when the model was introduced. BigBird \cite{zaheer2020big} also implemented the efficient attention mechanism on Transformer-based abstractive summarizer by utilizing the same attention modifications as Longformer with an additional random pattern to achieve matching performance results in terms of ROUGE score. An important work by \citet{huang2021efficient} explores and compares the performance of different variants of efficient transformers in the context of long document summarization.
\begin{figure*} []
\centering
\includegraphics[width=0.8\textwidth]{prompt_engineering.pdf}\\
\caption{How prompt engineered language tasks differ. Classification task example from \cite{gao-etal-2021-making} and summarization task using keywords from original document as language prompt from \cite{he2020ctrlsum}.}
\label{fig. prompt_mechanisms}
\end{figure*}
\,
\\
\textit{4) Prompt-Engineering}\\
The GPT-3 model \cite{brown2020language} has strongly demonstrated that large-scale pre-trained language models can achieve impressive results on numerous downstream language tasks in zero- and few-shots experimental settings. Rather than fine-tuning the language models for specific tasks in a conventional way, natural language prompts and task demonstrations were created for GPT-3 to infer and complete the tasks. Importantly, this is different from the conventional tagging method such as <bos> token for conditional generations or taking [CLS] tag from BERT for classification tasks. Prompt engineering refers to taking the extra step to design a natural language prompt or template that can optimize the pre-trained model for a specific task. Figure \ref{fig. prompt_mechanisms} illustrates this important difference.
Many works have explored the ways of uncovering the right prompt for various downstream language tasks to significantly boost the performance of pre-trained models \cite{gao-etal-2021-making,talmor2020olmpics}. In the long document summarization research area, CRTLSum \cite{he2020ctrlsum} achieves significant improvement on vanilla fine-tuned BART model on arXiv dataset through prompt-engineering. The model attempts to more effectively use the pre-trained BART model with the help of extracted keyword prompts, as shown in Figure \ref{fig. prompt_mechanisms}. Further, the work also showed that, given an optimized language prompt, the implemented BART summarization model can achieve ROUGE score that matches ROUGE score of oracle summaries in the test dataset.
\\\\
\textit{5) Signal Guidance}\\
Unlike a prompt-engineering mechanism that requires an engineered language prompt or template for a given task, the signal guidance mechanism relates to utilizing signals as inputs to lead models in better identifying and summarizing important content of source texts. Using this approach, the GSum \cite{dou2021gsum} model implemented a fine-tuned BART model with dual encoders, one for input document and another for extracted signals, and a decoder that attends to both encoded representations. Similar signal based approach is also used by \citet{ju2021leveraging} to implement an unsupervised pipeline-based long document summarization model.
\\
\\
\textit{6) Discourse Bias}\\
Similar to the signal guidance mechanism, discourse bias involves the inclusion of the discourse structure of a source document such as the section of a sentence as signals for summarization systems to better identify and summarize important content in the original source text \cite{christensen2013towards,yasunaga2017graph}. This mechanism can be classified under signal guidance but is mentioned separately due to its effectiveness and popularity in Transformer \cite{pilault2020extractive,gidiotis2020divide} and non-Transformer \cite{cohan2018discourse,dong2021discourse} based long document summarization models. Unlike short documents, long documents often contain discourse structure information such as table of content, section structures, references and others to guide a human reader in comprehending the original document and previous works have exploited this information to achieve state-of-the-art results. Nonetheless, previous works in the long document summarization domain only utilized discourse information that is made available by the benchmark datasets and did not implement automatic discourse parsing using RST trees \cite{mann1988rhetorical} and coreference mentions due to the difficulties of building an effective representation for a document with extreme input length \cite{ji2014representation,xu2019discourse}.
\paragraph{C. Hybrid Transformer - Content Selection + Abstractive Summarization}\,\\
The hybrid summarization approach only differs from the abstractive approach in that it takes in a carefully chosen subset of the input document rather than the entire input document. This extra step reduces the burden on the neural summarizers that have to generate an abstract summary and select important content at the same time. Some also refer models that utilize the hybrid approach as retrieve-the-summarize model because it involves retrieving a subset of long document text before summarizing it \cite{zhang2021exploratory}. TLM+Ext \cite{pilault2020extractive} first implemented this method by limiting inputs of the scientific articles in arXiv datasets as the introduction of the document, a subset of carefully selected sentences of the original article using extractive summarization approach, and, finally, include the remaining text if there remains extra space for Transformer-based decoder. However, given the effectiveness of sequence-to-sequence neural models, one limitation of this work is that it only utilizes a decoder framework to generate the final summary rather than an encoder-decoder framework that most subsequent works on abstractive and hybrid summarization approach do. Consequently, LoBART \cite{manakul2021longspan}
proposes a hybrid summarization system that completes a summary generation in two separate steps, (i) content selection: using a multi-task RNN, select salient content from the original source document until the total text output reaches the limit of the sequence-to-sequence pre-trained BART model and (ii) abstractive summarization: summarize the carefully selected subset using a pre-trained BART model with efficient transformer mechanism. SEAL \cite{zhao2020seal} presents a generalized encoder-decoder framework for transformer-based long document summarization and proposed an abstractive summarization system that selects salient content and dynamically choose segments of the selected content for the decoder to attend and summarize in an end-to-end manner. The architecture, however, did not attempt in exploiting the large-scale pre-trained models that were used in most summarization research works. Lastly, facing a similar issue, development in the open-domain question-answering and knowledge-intensive language tasks reflect an interesting parallel with the progress in the long document summarization domain \cite{lewis2020retrieval,petroni2021kilt}.
\subsection{Summary of Trends in Long Document Summarization Systems}
\begin{table*}[!ht]
\resizebox{\textwidth}{!}{%
\small
\begin{tabular}{c|c|c|c|c|c}
\thickhline
\multicolumn{1}{l|}{} &
\textbf{Model} &
\multicolumn{1}{c|}{\textbf{Architecture}} &
\textbf{Pre-Train} &
\textbf{Long Document Mechanism} &
\textbf{Max Token} \\ [0.3ex]
\hline
\multirow{4}{*}{\textit{\begin{tabular}[c]{@{}c@{}}Unsupervised \\ Extractive\end{tabular}}}
& PacSum \cite{zheng2019sentence} & Graph & BERT & Discourse Bias & - \\
& HipoRank \cite{dong2021discourse} & Graph & BERT & Discourse Bias & - \\
& FAR \cite{liang2021improving} & Graph & BERT & Facet-Aware Scoring & - \\
& IBSumm \cite{ju2021leveraging} & Pipeline & SciBERT & Signal Guidance & - \\ [0.2ex]
\hline
\multirow{4}{*}{\textit{\begin{tabular}[c]{@{}c@{}}Supervised \\ Extractive\end{tabular}}}
& GlobalLocal \cite{xiao2019extractive} & RNN & - & Discourse Bias \\
& Sent-CLF/PTR \cite{pilault2020extractive} &
RNN & - &
- &
- \\
& Topic-GraphSum \cite{cui2020enhancing} & GAT & BERT & Neural Topic Modelling & - \\
& SSM-DM \cite{cui2021sliding} & DMN & BERT & - & - \\ [0.2ex]
\hline
\multirow{7}{*}{\textit{\begin{tabular}[c]{@{}c@{}}Supervised \\ Abstractive\end{tabular}}} &
Discourse-Aware \cite{cohan2018discourse} &
RNN & - & Discourse Bias &
- \\
& Longformer \cite{beltagy2020longformer} & Transformer & BART & Efficient Attention & 16,384 \\
& BigBird \cite{zaheer2020big} & Transformer & PEGASUS & Efficient Attention & 4,096 \\
& GSUM \cite{dou2021gsum} & Transformer & BART & Signal Guidance & 4,096 \\
& CRTLSum \cite{he2020ctrlsum} & Transformer & BART & Prompt Engineering & 1,024 \\
& HAT-BART \cite{rohde2021hierarchical} & Transformer & BART & Hierarchical Attention & 1,024 \\
& HEPOS \cite{huang2021efficient} & Transformer & BART & Efficient Attention & 10,240 \\ \hline
\multirow{4}{*}{\textit{\begin{tabular}[c]{@{}c@{}}Supervised \\ Hybrid\end{tabular}}} &
TLM+Ext \cite{pilault2020extractive} & Transformer & - & Content Selection + Discourse Bias & - \\
& DANCER \cite{gidiotis2020divide} & Transformer & PEGASUS & Content Selection + Discourse Bias & - \\
& SEAL \cite{zhao2020seal} & Transformer & - & Content Selection w/ Segment-wise Scorer & - \\
& LoBART \cite{manakul2021longspan} & Transformer & BART & Content Selection + Efficient Attention & - \\ [0.2ex]
\thickhline
\end{tabular}%
}
\caption{ Long Document Summarization Models in Chronological Order. Max token represents the maximum input sequence length that the model can process and any text that exceeds this cutoff point will be truncated.}
\label{tab. lds_history}
\end{table*}
Table \ref{tab. lds_history} summarizes the trends and developments in long document summarization models as discussed above. The two standout base architectures that are used in the long document summarization domains are graph-based ranking algorithm for unsupervised extractive models and pre-trained Transformer for supervised abstractive models. While both architectures were initially proposed and tested on short documents, they can be effectively adapted to summarize long documents after incorporating novel mechanisms.\footnote{For a brief description of each model, please refer to the Supplementary Materials.}
\textbf{Finding 1. Graph-based Extractive Models with Discourse Bias:} Classical graph-based unsupervised extractive models have been found to suffer from picking similar sentences that results in a summary with redundant sentences \cite{liang2021improving}. To this end, HipoRank \cite{dong2021discourse} implements the graph-based architecture for unsupervised extractive summarization by including the sectional information of ArXiv/PubMed as inductive bias when calculating centrality scoring to achieve state-of-the-art results. The discourse bias mechanism is commonly incorporated by other proposed summarization models, including models with RNN and Transformer base architectures.
\textbf{Finding 2. Pre-training task for Abstractive Summarization Models:} Interestingly, despite having other pre-trained sequence-to-sequence models such as T5 \cite{raffel2020exploring}, BART and PEGASUS are the only two Transformer-based pre-trained models that were used for long document summarization \cite{lewis2020bart,zhang2020pegasus}. Nevertheless, as both pre-trained models are trained on short documents, they have an input limit of 1,024 tokens. To process long documents that are longer than this limit, the pre-trained Transformers will have to incorporate long document mechanisms to extend the input limits.
\textbf{Finding 3. Long Document Mechanisms for Transformer:} As pre-trained models were often trained on large-scale datasets with input limit length between 512 to 1,024 \cite{devlin2019bert,lewis2020bart}, these Transformer-based pre-trained models were optimized for short document language tasks rather than long documents. Without any long document mechanisms to adapt these models for the long document summarization task, \citet{meng2021bringing} has shown that BART cannot summarize a long document effectively. Other than the discourse bias mechanism, we observe that (a) efficient attention and (b) content selection mechanisms are the two most notable long document mechanisms. As the content selection mechanism requires a separate retriever to extract salient content from the source (i.e., the hybrid approach), we distinguish Transformer models with content selection mechanism as the retrieve-then-summarize model \cite{zhang2021exploratory} and the pure encoder-decoder Transformer without this mechanism as an end-to-end model for the rest of this work. Lastly, it is also important to note that both mechanisms can be jointly implemented within a single architecture, where the content selection mechanism will extract a longer subset of input to be processed by a Transformer with efficient attention \cite{manakul2021longspan}.
\section{Multi-dimensional Analysis of Long Document Summarizers}
Given the important findings in the graph-based unsupervised extractive model and the Transformer-based supervised abstractive model in the previous section, we design an experiment with the aim of thoroughly understanding the reasons behind the popularity of these architectures and its mechanisms. Our experiment tests out the graph-based extractive and Transformer-based abstractive summarization architectures and its mechanisms on the arXiv benchmark dataset. The documents in the arXiv dataset have an average length of 6,446 tokens. Mechanisms of the supervised extractive approach are not examined as the architectures used between the proposed models vary greatly.
\subsection{Implementation}
\subsubsection{Graph - Unsupervised Extractive}\,\\
To investigate the effect of incorporating long document discourse structure information, we experiment with four unsupervised graph models by varying the two following mechanisms:
\begin{description}
\item[$\bullet$ Sentence Encoder Mechanism:] Sentences of source text are encoded either using Term frequency–inverse document frequency (Tf-Idf) \cite{jones1972statistical} or BERT SentenceTransformer \cite{reimers2019sentence}.
\item[$\bullet$ \hlt{Discourse} Bias Mechanism:] For both models that implement Tf-Idf or BERT sentence encoder, we experiment a model with the long document \hlt{discourse} bias mechanism and one without the bias. \hlt{For models without a discourse bias mechanism, the centrality score of each sentence is computed based on the summation of cosine similarity between other sentences. For models with a discourse bias mechanism, the mechanism implemented follows the work of \citet{dong2021discourse}. For each sentence, we adjust centrality score based on the sentence position within each section, $c_{intra}(s_i)$, and the sentence's section position within the document, $c_{inter}(s_i)$. Sentences that are closer to the section and document boundaries will be given higher importance. The "discourse-aware" centrality score for each sentence is:
$$c(s_i) = \mu_1 \cdot c_{inter}(s_i) + c_{intra}(s_i)$$
where $\mu_1$ is a weighting factor for inter-section centrality. Following the original author, we fine-tune the weighting factor based on validation set. To ensure comparability, the maximum length of summary for all unsupervised extractive models is set to be 242 tokens\footnote{Details of implementation are reported in the Supplementary Materials.}.}
\end{description}
\subsubsection{Transformer - Supervised Abstractive}\,\\
To study the current state-of-the-art abstractive neural summarizers, we experiment with two different pre-trained Transformers, BART and PEGASUS. For BART, we analyze the long document mechanisms from the perspective of two common approaches:
\begin{description}
\item[$\bullet$ End-to-End:] We experiment with three end-to-end BART models. Firstly, a vanilla BART model with full self-attention that will truncate any input text that exceed 1,024 tokens. Then, two BART models with efficient longformer attention \cite{beltagy2020longformer} that can extend up to 4,096 and 16,384 input tokens respectively. The main goal of assessing end-to-end BART with and without efficient attention is to assess how the quality of the generated summary is affected when BART is adapted from a short document summarizer into long document summarizer by allowing it to process long input sequences at the cost of full self-attention. For implementation, due to lack of computational resources, we only fine-tuned original BART on arXiv and obtain the weights of longformer that was trained on arXiv from the original author\footnote{https://huggingface.co/allenai/led-large-16384-arxiv}.
\item[$\bullet$ Retrieve-then-summarize] For BART retrieve-then-summarize model, our experiment follows entirely the implementation of LoBART by \cite{manakul2021longspan}\footnote{https://github.com/potsawee/longsum0}. LoBART has two variants: (a) BART with full self-attention that takes in a selected subset of input text with a maximum length of 1,024 tokens and (b) BART with efficient local attention where maximum length of subset input is 4,096 tokens. The only difference between the two variants is the amount of content to be retrieved from the original source text before feeding it into the Transformer BART model. The two main objectives of experimenting with the retrieve-then-summarize BART models are to assess: (1) the effectiveness of content selection mechanism in adapting short document BART to summarize a long document and (2) whether the performance is improved when content selection mechanism is combined with efficient attention mechanism.
\end{description}
As there is no existing framework that applies content selection mechanism on PEGASUS, we only experiment two end-to-end PEGASUS model: original PEGASUS\footnote{https://github.com/google-research/pegasus} and PEGASUS with BigBird efficient attention\footnote{https://github.com/google-research/bigbird}. The models have input token limit of 1,024 and 4,096 respectively. Pre-trained weights for both model variants on arXiv benchmark are obtained directly from the original author.
\subsubsection{Assessing Model Outputs}\,\\
Rather than relying entirely on ROUGE score like most summarization research settings, we use four different metrics to analyse model summary outputs from three important dimensions (D\#): relevance, informativeness and semantic coherence.
\begin{description}
\item[$\bullet$ D1 - Relevance] of a summary is the extent to which a summary contains the main ideas of a source. We use ROUGE \cite{lin2004rouge} and BERTScore \cite{zhang2019bertscore} metrics to measure relevancy of the candidate summary.
\item[$\bullet$ D2 - Informativeness] is the amount of new information and knowledge a summary brings to the reader \cite{peyrard2019simple}. This information may not necessarily be key to the narrative of the source but should add value to readers. For example, limitations of an academic article are not central to the narrative but do add value to readers. This metric tests a model architecture's ability to effectively generate summary that can cover different aspects of the original source text. This is approximated by the percentage of sections that are covered by a candidate summary, where we assume each sentence of the candidate summary covers a particular section and the sentence belongs to the section where it achieves the highest ROUGE-L score.
\item[$\bullet$ D3 - Semantic Coherence] measures whether a summary is fluent and semantically coherent. Following \citet{bommasani2020intrinsic}'s implementation, this is approximated as:
$$SC(S)= \frac{\sum_{i=2}^{||S||} NSP(s_i|s_{i-1})}{||S||} $$ where $NSP(.)$ is BERT NSP function, and $s_i$ denotes the position of a sentence in the candidate summary. However, \citet{bommasani2020intrinsic} did not fine-tune the general pre-trained BERT model while our BERT NSP model is fine-tuned on arXiv using positive and negative sentence-pairs with a final F1-score of 0.92.
\end{description}
\subsubsection{Other Implementation Details}\,\\
For all the model variants implemented, the train, validation and test sample split on the arXiv benchmark dataset are 203,037/6,436/6,440, which is the same for all prior works as they follow the same configuration by the original author \cite{cohan2018discourse}. To ensure consistent preprocessing pipeline, we follow pre-processing of LoBART in all model implementations \cite{manakul2021longspan}. All models that require fine-tuning are trained on the same RTX 3090 GPU with 24 GiB of GPU memory. We use pyrouge package for ROUGE metric.
\subsection{Results and Analysis}
\begin{table*}[!ht]
\resizebox{\textwidth}{!}{%
\small
\begin{tabular}{lcccccc}
\thickhline
\thickhline
\multirow{2}{*}{\textbf{Architecture and its Mechanisms}}&\multicolumn{4}{c}{\textbf{Relevance}}&\multirow{2}{*}{\textbf{Informativeness}}&\multirow{2}{*}{\textbf{Semantic Coherence}} \\
&\textbf{R-1}&\textbf{R-2}&\textbf{R-L}&\textbf{BERTScore}&&\\ [0.3ex]
\thickhline
\multicolumn{7}{c}{\textit{\textbf{Unsupervised Extractive} - Graph}}\\ [0.5ex]
Tf-Idf & 0.344 & 0.095 & 0.285 & \textbf{0.822} & 0.355 & \underline{0.779} \\
BERT & 0.351 & 0.098 & 0.290 & 0.819 & 0.398 & \textbf{0.792} \\
Tf-Idf + \hlt{Discourse Bias} & \underline{0.357} & \textbf{0.113} & \underline{0.311} & 0.820 & \underline{0.447} & 0.677 \\
BERT + \hlt{Discourse Bias} & \textbf{0.361} & \underline{0.112} & \textbf{0.322} & \underline{0.822} & \textbf{0.513} & 0.667 \\ [0.5ex]
\hline
\multicolumn{7}{c}{\textit{\textbf{Supervised Abstractive} - BART Variants}}\\ [0.5ex]
\textit{\textbf{End-to-End (Max Token)}}& && & &&\\
BART-only (1,024) & 0.413 & 0.153 & 0.368 & 0.846 & 0.331 & 0.851 \\
BART+LongformerAttn (4,096) & 0.463 & 0.187 & 0.412 & 0.852 & 0.361 & 0.855 \\
BART+LongformerAttn (16,384) & 0.467 & \underline{0.196} & 0.418 & \textbf{0.865} & \textbf{0.433} & \textbf{0.877} \\ [0.5ex]
\textit{\textbf{Retrieve-then-summarize}}& && & &&\\
BART+CS & \underline{0.472} & 0.193 & \underline{0.419} & 0.837 & 0.403 & 0.812 \\
BART+LocalAttn+CS & \textbf{0.486} & \textbf{0.201} & \textbf{0.422} & 0.845 & \underline{0.427} & 0.835 \\ [0.5ex]
\multicolumn{7}{c}{\textit{\textbf{Supervised Abstractive} - PEGASUS Variants}}\\
\textit{\textbf{End-to-End (Max Token)}}& && & &&\\
PEGASUS (1,024) & 0.439 & 0.171 & 0.381 & \underline{0.857} & 0.333 & 0.863 \\
PEGASUS+BigBirdAttn (4,096) & 0.462 & 0.190 & 0.415 & 0.855 & 0.359 &
\underline{0.869} \\
\thickhline
\thickhline
\end{tabular}%
}
\caption{Experimental Results of Graph-based Unsupervised Extractive and Transformer-based Supervised Abstractive. The best results are in boldface, and the second highest scores are \underline{underlined}. Max token represents the maximum input length where texts that exceed this cutoff point are truncated. \hlt{LocalAttn represents local attention where each token only attends to its neighbouring 1,024 tokens. LongformerAttn and BigBirdAttn represents efficient attention variants proposed by Longformer \cite{beltagy2020longformer} and BigBird \cite{zaheer2020big}.}}
\label{tab. result}
\end{table*}
The following discusses the experimental \textbf{findings} based on the results shown in Table \ref{tab. result}.
\subsubsection{Graph - Unsupervised Extractive}
\,\\
\textbf{Finding 1. Global Word Representation versus Contextual Embedding:} Using BERT as the sentence encoder mechanism boosts the unsupervised summarization model performance in the relevancy and informativeness dimension. We hypothesize this is due to the semantic reasoning capability of BERT in encoding important sentences that are informative but are not worded in the same way as the other important sentences when similarity and centrality scoring are computed. This is particularly important for long document as it has higher compression ratio and a higher chance of having sentences with the exact same information being repeated multiple times in the source text. Thus, not encoding the sentences with semantically rich encoding may result in a summary with more redundancy.
\textbf{Finding 2. Discourse Bias Mechanism boosts Relevance and Informativeness:} The inclusion of positional and sectional bias when computing sentence centrality score greatly improves the architecture's ability in capturing more relevant sentences in the long document and generating a more informative summary, validating our hypothesis in section 4. However, since extractive models merely combine the extracted sentences, these sentences that come from various sections likely caused a drop in the semantic coherence of the final summary outputs.
\subsubsection{Transformer - Supervised Abstractive}
\,\\
\textbf{Finding 1. Diminishing Return of \hlt{PEGASUS} Pre-training:} As compared to the BART-only model, the PEGASUS-only model achieved greater performance across all dimensions, indicating that \hlt{PEGASUS pre-training mechanism} helps a Transformer-based model in writing more relevant, informative and semantically coherent summaries. \hlt{As PEGASUS is pre-trained on a different corpus as compared to BART \cite{lewis2020bart,zhang2020pegasus}, it is not conclusive whether the GSG pre-training task and/or the difference in the pre-training corpus contributed to the superior performance of PEGASUS. Interestingly, the performance gain} is not as obvious when the input sequence length is allowed to be extended to 4,096 with efficient attention. This could be due to the difference in the efficient attention mechanism used or the need for predicting salient content outside the truncated text has diminished.
\textbf{Finding 2. Mixed Results on Retrieve-then-summarize Models:} For both retrieve-then-summarize BART models, we see state-of-the-art result achieved in terms of the standard ROUGE score metric. The result showed improvement across all dimensions when the Transformer model processed a longer subset extracted by the retriever, demonstrating the effectiveness of Transformer in computing pairwise relations between tokens to identify salient content. Except for the BART with longformer attention (16,384), retrieve-then-summarize models also performed better in informativeness as the models are allowed to process the entire source documents in arXiv dataset. However, the retrieve-then-summarize models performed the worst in semantic coherence when compared to the other abstractive summarization models. As the content selection mechanism is not trained in an end-to-end manner, we hypothesize that this is due to the inevitable disconnect between the content selection mechanism and the encoder-decoder Transformer model at the inference stage. Further, it is possible when the retrieved subset extracted by the content selection mechanism are not ordered in its original form, the incoherence of the subset cascade downwards to the final summary output, causing a drop in semantic coherence. This finding also illustrates the importance of measuring model performance in a multi-dimensional way rather than relying entirely on ROUGE score that has found to have important limitations \cite{kryscinski2019neural,bhandari2020re}.
\textbf{Finding 3. Transformer's Reasoning Capability over Long Sequences:}
Holding the pre-trained BART model constant, extending the total input token limits for the pre-trained Transformer improves the summarizer's ability in generating a summary that is more relevant, informative and semantically coherent. This finding is consistent with a human evaluation experiment by \cite{huang2021efficient}, providing confidence to the automatic evaluation metrics used in this work. The impact of processing only 1,024 tokens is particularly obvious when it comes to the informativeness of the summary output where BART (1,024) informativeness score is 10 points lower than BART (16,384). Importantly, ROUGE score again did not fully capture this performance difference, highlighting the limitation of traditional summarization research setting of measuring model performance using only ROUGE score. Lastly, this finding suggests that unlike the result of \citet{meng2021bringing}, our experiment demonstrates that Transformer can reason over long sequences given that the right configuration is made to fine-tuned the model for specific downstream task.
\\\\
Through ad-hoc experiment, we systematically analyze the common approaches in long document summarization domain. The experimental result demonstrated that exploiting explicit discourse structures of long documents in unsupervised models and processing longer inputs with long document adaptation on pre-trained Transformer models can yield promising outcomes for the long document summarization task. The result also showed that retrieve-then-summarize model can achieve state-of-the-art results in terms of ROUGE score but may generate less coherent summaries.
\subsection{Limitation of Experiment}
Recent studies have found that summary outputs of state-of-the-art abstractive summarization models contain factual inconsistency in up to 30\% of summary output \cite{cao2018faithful,kryscinski-etal-2020-evaluating,maynez2020faithfulness}. To address the aforementioned issues, various models and metrics have been proposed to measure the factual consistency of candidate summaries conditioned on the source documents \cite{goyal-durrett-2020-evaluating,durmus2020feqa}. Nonetheless, due to the limitations of the proposed metrics including the input length limit of pre-trained models, difficulty of implementation and performance variation across benchmarks \cite{pagnoni-etal-2021-understanding}, we did not measure the factual consistency of summary outputs and represents an important limitation of the multi-dimensional analysis experiment above. This is despite after trying out various adaptations on the textual entailment approach proposed by \citet{maynez2020faithfulness}, our tested models have almost no discriminative ability and was thus not used. The robustness of the metrics used across the relevance, informativeness and semantic coherence dimensions should also be interpreted with care. Lastly, the experiment was only conducted using the arXiv benchmark dataset as it is the only dataset where all pre-trained weights are publicly available. To encourage similar analysis to be conducted across a wide range of benchmark dataset and model implementation, our evaluation metric toolkit for dataset and model is available at https://github.com/huankoh/long-doc-summarization.
\section{Metrics}
As evaluating generated summary outputs using manual efforts are costly and impractical, the efficient ROUGE metric \cite{lin2004rouge} has long been the standard way of comparing summarization model performance. It measures the lexical overlap between reference and candidate summary and the common n-gram measures are unigram (ROUGE-1), bigram (ROUGE-2) and longest common sub-sequence (ROUGE-L). However, as it is based on exact token matches and overlap between synonymous tokens or phrases will be ignored, the limitation of ROUGE score metrics have been widely explored \cite{kryscinski2019neural,bhandari2020re,chaganty-etal-2018-price,hashimoto-etal-2019-unifying} and many have also attempted to propose more comprehensive content overlap metrics using soft semantic overlap \cite{ganesan2018rouge,zhang2019bertscore}. Further, while content overlap is the fundamental objective of summarization, the quality of a summary, as \citet{gehrmann2018bottom} and \citet{peyrard2019simple} suggested, should be measured in a multi-dimensional way including relevance, factual consistency, conciseness and semantic coherence. Relevance refers to whether the candidate summary contains the main ideas. Factual consistency metric measures whether a candidate summary is factually consistent with the source document. Conciseness measure whether important information is encapsulated in a short and brief manner. Semantic coherence relates to the collective quality and fluency of summary sentences. Based on these quality aspects, the following discusses the research efforts in the wider summarization domain with a focus on the long document summarization research settings at the end of this section.
\subsection{Relevance}\,
\textit{A) Hard Lexical Overlap}\\ As mentioned above, ROUGE score is an efficient way to consider content overlap through hard lexical matching between candidate summary and the ground truth summary. However, as ROUGE only considers exact matching between reference summary and model output, it (a) will penalize models that coin novel wordings and phrases that do not match the wordings in the reference summary, (b) does not consider factual consistency between the model output and the source document and (c) does not directly consider fluency and conciseness of a summary. Finally, ROUGE score also goes against the human approach of clever paraphrasing and summarizing.
\textit{B) Soft Content Overlap}\\ To solve the problem of exact matching of lexical units, \citet{zhang2019bertscore} proposes a model that measures soft overlap between the reference and candidate summary by comparing the contextual BERT embeddings of both summaries. Other variants of this idea include MoverScore \cite{zhao2019moverscore}, Word Mover Similarity and an extension of it, Sentence Mover Similarity \cite{clark2019sentence, kusner2015word}. The soft content overlap metrics often rely substantially on the encoder used to vectorized the candidate and ground truth summary. BERTScore, for example, utilizes BERT as the fundamental pre-trained model to encode its representations. While BERT has been proven to perform amazingly well under many different benchmark settings, its performance under certain domains such as legal or scientific research has not been thoroughly explored. For example, \citet{beltagy2019scibert} fine-tuned BERT on large-scale scientific paper datasets and have found its performance to improve in scientific domains as compared to the BERT-base model. Evidenced by \citet{tejaswin2021well}'s experimental result where BERTScore is found not to discriminate summaries with and without errors well, this questions the use of BERT-base model as the "independent evaluator" of candidate summaries across all domains.
\textit{C) Reference-free Approach}\\
Rather than measuring the quality of candidate summary based on a ground truth summary, reference-free metrics for relevance measure the quality of candidate summary based on pseudo-reference summaries that are generated from source documents. \citet{wu-etal-2020-unsupervised}'s proposed metric requires training samples of high-quality summaries for model supervision while other reference-free metrics can generate metric scores without the use of high-quality summaries as supervisory signals \cite{gao-etal-2020-supert,chen-etal-2021-training}. In section 3 of benchmark datasets, we see that the information covered by a reference summary depends on the data annotation approach as well as the intent of the original authors. We further observe that reference summaries of certain benchmark datasets contain significant noises. If supervised summarization models were to train on datasets with similar issues, they may fit on target summaries that are inconsistent with the expectation and needs of summary readers. A reference-free approach that can bypass the requirement of ground truth summaries would thus be beneficial to the development of models in cases where there is high heterogeneity in summary reader expectation and/or lack of ground truth summary labels. Nevertheless, the use case of reference-free metrics is often limited by the fact that they still require pseudo-reference summaries to be generated by an "independent model". Last but not least, the reference-free approach can also be used to augment the reference-based metrics \cite{hessel-etal-2021-clipscore}.
\subsection{Factual Consistency}
Widespread factual inconsistency in abstractive summarization model outputs greatly limit the potentiality of these abstractive models to be applied in most commercial settings. To this end, automated metrics on factual consistency have been proposed by others \cite{durmus2020feqa, kryscinski-etal-2020-evaluating, maynez2020faithfulness, wang2020asking}, which can be categorized into two different approaches: Entailment Classification and Question Answering.
\textit{A) Entailment Classification Approach}\\ The entailment classification approach evaluates the factual inconsistency of a candidate summary by breaking down the summary into smaller units (e.g., phrases/sentences)
to be verified against the original document. For example, FactCC \cite{kryscinski-etal-2020-evaluating} implements a BERT-based factual consistency classifier that is trained on synthetic data, where the positive data labels are non-paraphrased and paraphrased sentences from the original source document, and the negative labels are artificially corrupted sentences from the source document. At the inference stage, the faithfulness score for a candidate summary is the number of consistent sentences divided by the total number of summary sentences. Similarly, other proposed models implement factual consistency classifiers by incorporating structured knowledge such as OpenIE triples \cite{goodrich2019assessing} or dependency arc \cite{goyal-durrett-2020-evaluating}. For the classifiers to be effective in discriminating the factual consistency of a candidate summary, they often require supervisory signals from factually consistent and inconsistent data \cite{pagnoni-etal-2021-understanding}.
\textit{B) Question-Answering Approach}\\ The Question-Answering (QA) approach employs a question-generation model to generate questions from a given summary output \cite{durmus2020feqa,wang2020asking}. The generated questions are then answered in two different ways: i) answering the question conditioning on the source text and ii) answering the question conditioning on the summary output. If the answers match between the source text and candidate summary, the answer is then considered consistent, otherwise, it is inconsistent. The final score will be based on discrepancies between the answers generated conditional on the candidate summary and the answers generated conditional on the souce document. Recently, QAGen \cite{nan2021improving} proposes to generate questions and answers from a given text concurrently within a single model to evaluate factual consistency to improve the efficiency of this approach.
\textit{Other Important Studies:}\\
It is important to note that the aforementioned works consider factual consistency as a binary outcome. In contrast, FRANK \cite{pagnoni-etal-2021-understanding} advocates for a multi-dimensional approach to evaluate factual consistency based on semantic error, discourse error and content verifiability error. Through substantial human annotation, the study further found that the effectiveness of metrics is found to be extremely dependent on the types of architecture measured and the benchmark dataset used. Similarly, human evaluation experiments from previous works have shown conflicting and varying results in the desired approach of developing factuality metrics \cite{maynez2020faithfulness,nan2021improving}. In response, \citet{gabriel-etal-2021-go} proposed five conditions for the development of an effective factuality metric to encourage better standardization in the factual consistency metric research.
\subsection{Conciseness and Semantic Coherence}
Metrics to measure other aspects of summarization such as conciseness and semantic coherence were also introduced. As they are not as crucial as relevance and factual consistency, these metrics often complement the others to allow a metric or a model to be more holistic and practical. For example, \citet{bommasani2020intrinsic} considers semantic coherence of reference summaries when evaluating single document benchmark datasets while \citet{ju2021leveraging}'s unsupervised model generates fluent summary by utilizing the next sentence prediction task in BERT. Metrics for conciseness are also introduced to measure the quality of summaries \cite{bommasani2020intrinsic,chen-etal-2021-training}.
\subsection{Research Efforts on Metrics in the Long Document Domain}
Many recently proposed metrics incorporate pre-trained architectures to achieve better performances. However, as argued in the model discussion above, these pre-trained architectures cannot be easily extended to long documents. As an illustration, our experiment has attempted various adaptations\footnote{Result details are in the Supplementary Materials.} on a BERT textual entailment model to evaluate arXiv candidate summaries but has found it not effective in discriminating a summary's factual consistency with the source. This is despite \citet{maynez2020faithfulness}'s finding that this model best correlates with the human judgment of factual consistency on the XSUM short document dataset. Furthermore, other than the difficulty of adapting these models on long documents, \citet{nan2021improving} has also identified the issue of resource efficiency, where a competing model would take approximately 4 days to evaluate a CNN-DM test set with an NVIDIA V100 Tensor Core GPU and would likely take significantly longer under any long document benchmark datasets. Consequently, the need of re-designing the proposed evaluation models and the requirement for costly computation resources have likely discouraged the adoption of factual consistency assessment models in the long document summarization domain. Looking at the broader research on evaluation metrics of summarization as a whole, for 17 different research papers related to evaluation metrics published in ACL main conferences\footnote{ACL main conferences are ACL, NAACL, EACL, EMNLP, CoNLL, and AACL. Papers are listed in the Supplementary Materials.} from 2015 to September 2021, there were no discussion on the evaluation metrics in the context of long document summarization datasets. This is important as \citet{pagnoni-etal-2021-understanding} has found that the effectiveness of proposed metrics to vary based on the dataset characteristics. In sum, unlike the quick adoption of short document practices in the model architectures space, research in exploring evaluation metrics within the context of long document summarization is lacking and may potentially hold back the future progression of long document summarization.
\section{Applications}
As the quality of long document summaries generated by state-of-the-art models continues to improve, past works have explored their feasibility in the research and industrial domains. A natural extension for models that were implemented on the scientific paper benchmark, arXiv/PubMed, is to employ it for research purposes. These include writing section-structured \cite{meng2021bringing}, user-specific \cite{he2020ctrlsum} or presentation-based \cite{sun2021d2s} summaries for scientific papers, automating scientific reviewing \cite{yuan2021can}, and even generating literature survey based on multiple biomedical long scientific papers \cite{deyoung-etal-2021-ms}. When it comes to the general industrial applications of long document summarization, the knowledge and techniques learned from the research domain can address numerous commercial tasks. On the surface level, any information that would be expressed in a textual format would benefit from the advancement in this field, which encompasses summarizing any forms of long textual documents \cite{sharma2019bigpatent,loukas2021edgarcorpus}, extracting content as feature snippets for search engines\footnote{https://developers.google.com/search/docs/advanced/appearance/featured-snippets}, writing reviews for long media content \cite{kryscinski2021booksum} and summarizing long dialogues \cite{liu2019automatic,chintagunta2021medically,zhong-etal-2021-qmsum,zhu2021mediasum} and multi-modal content \cite{yu2021vision}. With the development becomes increasingly mature in the real-world settings, summarization models are now commercialized as a Software-as-a-Service (Saas) product in the news\footnote{https://ai.baidu.com/tech/nlp\_apply/news\_summary}, business\footnote{https://quillbot.com/} and consulting\footnote{https://www.datagrand.com/about-us/} domains. Furthermore, as the long document summarization task can be generally understood as identification of important aspects from long sequences, the positive spillover from successful model implementation in this domain can affect a wide range of domains. Long document summarization models, for example, can be utilized for auxiliary tasks such as video captioning \cite{liu2021video}, long document question-answering \cite{lyu2021improving} or multi-modal tasks \cite{li2020maec,narasimhan2021clip}. \citet{liu2018generating} also identified the "unexpected side-effect" of language model reliably learned how to transliterate names between languages, despite the fact that the model was trained to summarize long Wikipedia articles, while BigBird \cite{zaheer2020big} applies Transformer-based models designed for long sequences not only to long document summarization but also to DNA promoter region and chromatin profile prediction tasks in the genomics research domain.
\section{General Challenges and Future Directions}
This section discusses the general challenges of long document summarization that have yet to be solved and pinpoints potential future research directions to attract practitioners' attention and improve our understanding and techniques in the long document summarization domain. Advancement in the long document summarization domain should also give rise to beneficial spillover to closely-related NLP sub-domains such as multi-hop QA, information retrieval and reading comprehension.
\subsection{Neural Models and Long Sequence Reasoning}
While there have been significant efforts in solving the time and memory complexity of a neural architecture such as Transformers to enhance model efficiencies, the understanding of a model's effectiveness in solving different NLP tasks or domains is limited. As shown by our model experiment and result findings of others \cite{zaheer2020big,beltagy2020longformer,huang2021efficient}, fine-tuning pre-trained models using efficient Transformers that can attend to larger input size of tokens can improve the model performances across a wide range of NLP tasks. However, the underlying reasons of the performance improvement is not well understood. For example, while Transformer models have found to outperform RNN models as RNN lacks the ability to reason over long sequences, \citet{pagnoni-etal-2021-understanding} have found that pre-trained Transformer summarization models still make a similar amount of discourse-related errors as the RNN models. Furthermore, research in the effectiveness of various efficient attention mechanisms used by a Transformer to summarize long documents also showed varying results. On the one hand, \citet{huang2021efficient} showed that efficient attention with learnable patterns to significantly outperform the the efficient attention with fixed patterns such as local-only attention mechanism. On the other hand, \citet{manakul2021longspan} have found that extending window size of efficient Transformers to increase number of attended tokens per token do not affect the average distance of attended neighbor, suggesting that local attention to neighboring tokens will be sufficient for the long document summarization task. Altogether, these results highlight the limited understanding on the strategies employed by current neural models to summarize long document and the need of further research to enhance our understanding on this issue.
\subsection{Summarizer with Automatic Discourse Parsers/Annotator}
Our experimental result has demonstrated that the simple unsupervised graph architecture outperforms the other unsupervised models when discourse bias of arXiv section information is included. Nonetheless, information regarding sections of a document may not always be of high quality or available for a summarization model. This limits the implementation of many long doument summarization models that require explicit section-based discourse information. Similar issue has been faced by researchers in the dialogue summarization domain where discourse level information is not provided and past work in this domain have achieved state-of-the-art results by incorporating effective automatic discourse annotators \cite{liu2019automatic,feng-etal-2021-language,wu-etal-2021-controllable}. An architecture that can effectively incorporate automated discourse parsers or annotators would thus be a fruitful direction for long document summarization researchers to explore.
\subsection{End-to-end Neural Summarizer with Content Selection Mechanism}
In the medium term, in spite of the expected progress in computing efficiencies, there exist a significant amount of long documents such as business reports and books that have tokens that exceed hundreds of thousand \cite{loukas2021edgarcorpus,kryscinski2021booksum}. Thus, it is not possible to summarize the entire document using a powerful state-of-the-art model without any long document adaptation, as it will truncates most of the long document source text given the current input length limit. A more practical direction is to explore architectures with a content selection mechanism that has shown to be effective in long document summarization \cite{zhao2020seal,manakul2021longspan}. \citet{zhao2020seal} has proposed an end-to-end long document summarization framework using transformers but did not incorporate powerful pre-trained models and performed slightly worse than other state-of-the-art models. LoBART \cite{manakul2021longspan}, on the other hand, did not design the content selection and abstractive summarizer in an end-to-end manner. Experimental result in this survey has shown that LoBART's disconnection between the retriever and summarizer resulted in less semantically coherent summaries. In the open-domain QA domain, RAG \cite{lewis2020retrieval} achieves state-of-the-art by successfully incorporating content selection mechanism and pre-trained models in an end-to-end manner \cite{petroni2021kilt}, pointing a promising direction for practitioners in the long document summarization domain to explore.
\subsection{Quality and Diversity of Benchmark Dataset}
In section 3 of benchmark datasets, human annotation efforts have been done to measure the quality of the most commonly used long document summarization dataset, arXiv. It was found that 60\% of reference summaries contain some form of errors and 15\% of them have significant errors where at least half of the summary contains errors. This calls for a benchmark dataset with significantly better quality with fewer errors through robust heuristic rules and scraping strategies. Moreover, the long document summarization benchmark datasets are often in the legislative and scientific domain. While these domains are extremely important, many other domains such as financial reports with significant numerical complexity or long-form dialogues of daily conversation in business settings are equally important. Development across different domains could attract even greater attention from a wide range of partners to incentivize greater research efforts in the summarization field. Last but not least, to achieve the original objectives of benchmark datasets, proposed model architectures for long document summarization should also be tested across a diverse set of long document benchmark datasets rather than focusing merely on arXiv/PubMed.
\subsection{Practicality of Summarization Metrics}
The limitation of ROUGE metric that has been widely explored \cite{zhou-etal-2006-paraeval,ng2015better,ganesan2018rouge,kryscinski2019neural} and significant efforts have been made to improve the way we measure candidate summaries from various different aspects. Nonetheless, the proposed methods lack practicality in terms of wide availability for all parties in the research communities. For example, \citet{nan2021improving} found that using a single NVIDIA V100 Tensor Core GPU, a factual consistency metric proposed requires longer than four days to evaluate a single set of candidate summaries in the CNN-DM test dataset. Many metrics proposed also require substantial computing resources to re-train across different benchmark settings \cite{kryscinski-etal-2020-evaluating,wang2020asking,durmus2020feqa}. These issues will be exacerbated when it comes to the long document summarization domain. Moreover, most summarization metrics are only tested in the CNN-DM and XSum datasets but not others. This significantly limits its applicability as \citet{pagnoni-etal-2021-understanding} have found most metrics to lack robustness across different benchmark settings. To ensure effective metrics have wider application, efficiencies and practicality of metrics should be paid with great attention to ensure that sufficient incentive is provided for practitioners to explore the practicality of metrics rather than a mere focus on state-of-the-art metric performances.
\section{Conclusion}
In this survey, we conduct a comprehensive overview of long document summarization and systematically analyze the three key components of its research settings: benchmark datasets, summarization models and evaluation metrics. We first highlight the intrinsic differences of short and long document datasets and show that summarizing long documents requires extra compression of the source text through the identification of key narratives that are more uniformly scattered across the source documents. Nevertheless, long documents are often more extractive in nature and often have explicit discourse structures to take advantage of. For summarization models, we provide a thorough review, comparison and summarization of the model architectures and mechanisms used to generate long document summaries. Through ad-hoc experiment, we also systematically investigate the architectures and mechanisms that are widely applied across various works. We further discuss the current research in evaluation metrics and call attention to the lack of research on metrics that can be easily applied to the long document summarization domain. Finally, we explore the applications of long document summarization models and suggest five future directions for long document summarization research. |
\section{Introduction}
Bacteria create and maintain transmembrane concentration gradients of small metal ions, such as potassium and sodium \cite{galera2021ionobiology, korolev2021potassium}. These ionic concentration gradients are the main source of the electrical and electrochemical potentials that are present across the cell membrane and facilitate a number of crucial cellular processes \cite{bruni2017voltage, anishkin2014feeling, prindle2015ion, mitchell1961coupling,strahl2010membrane, dong2019magnesium, damper1981role}. The processes for separation, concentration and regulation of the inorganic ions by bacteria are made possible by the plasma membrane and the transmembrane proteins embedded in the membrane, as shown in Fig. \ref{fig:figure1}(a). The plasma membrane is a thin but strongly insulating lipid structure, allowing a bacterium to maintain its charge state effectively. The many different transmembrane proteins that are in the bacterial membrane act as channels and pumps for ions \cite{gadsby2009ion}. Figure \ref{fig:figure1}(a) also shows the electrical circuit model \cite{prindle2015ion, dong2019magnesium, yang2020encoding} of a membrane patch. Here, the ion channels and pumps for each ion are modeled as a nonlinear resistor with a conductance that depends on the electrical potential of the membrane, $V_{mem}$, and the Nernst potential, $E_{\rm X}$, for the ion $\rm X$.
A small and insulating system, such as a bacterium, will be particularly susceptible to charge fluctuations \cite{benarroch2020microbiologist, schofield2020bioelectrical,kralj2011electrical}. Thus, charge noise should play an important role in bacterial ion homeostasis. Based on the circuit model [Fig. 1(a)], the charge fluctuations within the cytoplasm are the result of two coupled noisy processes. First, the ionic current through the ion channels is noisy \cite{queralt2020specific}, with the ensuing fluctuations in intracellular ion concentrations causing voltage noise in $V_{mem}$. Second, any noise originating in $V_{mem}$, e.g., due to a random depolarization of a membrane patch or even thermal noise \cite{defelice1981noise,weaver1990response}, will cause fluctuations in the transmembrane current \cite{xie1997fluctuation} and hence the intracellular ion concentrations. Furthermore, these two noise processes will tend to enhance each other. We argue that an equivalent noise voltage, $e_n$, should be imposed on $V_{mem}$ in Fig. \ref{fig:figure1}(a) in order to account for all the electrical fluctuations present.
Our understanding of how a bacterium regulates the concentrations of metal ions in its cytoplasm (i.e., the intracellular metallome) is far from complete. It is generally assumed that the time-averaged intracellular ion concentrations in a bacterium remain roughly constant \cite{endresen2000theory, hund2001ionic}---indicating charge conservation. Average bacterial ion efflux \cite{shabala2001measurements} and influx \cite{shabala2009ion} rates have been determined from concentration measurements in media in which large populations of bacteria are grown. On the other hand, patch clamp measurements on single bacterial ion channels have shown that ion transport is noisy, with the current noise power spectral density (PSD) proportional to $1/f$ at low frequencies \cite{bezrukov2000examining}. While the time-averaged charge state remains constant, bacteria surprisingly modulate their membrane potential on the timescale of seconds---as shown in recent fluorescent microscopy experiments \cite{kralj2011electrical}. Single cells get hyperpolarized and depolarized spontaneously and repeatedly over time. It has been suggested that these charge fluctuations are purposeful, but little is known about their downstream effects. Thus, bacterial ion homeostasis is expected to be highly dynamic \cite{galera2021ionobiology} and dominated by strong charge noise. At the present time, quantitative measurements of electrical fluctuations and noise models of single bacterial cells are missing from the biophysics literature, partly due to a lack of sensitive tools on the size scale of a bacterium \cite{kralj2011electrical}.
\begin{figure*}
\centering
\includegraphics[width=6.75in]{figure1.pdf
\caption{ (a) Illustration of a membrane patch and its circuit model. (b) Microfluidic resistor and the simplified circuit diagram for monitoring its electrical fluctuations. The microchannels in the center of the resistor are filled with non-motile bacteria. The false-colored inverted microscope image shows the electrodes (gold) and the broth medium (light blue) looking from the bottom glass side of the device. The scale bar is 200 $\mu$m. Arrows indicate the direction of the flow. The current source pushes a bias current through the device. The ensuing voltage drop, $V_A-V_B$, is detected by a differential amplifier with gain $G$. (See Fig. \ref{fig:figure2}(a) below for more details.) (c) Close up image of the microchannels filled with \textit{K. pneumoniae} cells. Each microchannel has linear dimensions of $l\times w\times h\approx 100\times 2\times 2 ~\mu \rm m^3$; the cross-section reduces to $800~\rm nm \times 2 ~\mu \rm m$ at the constriction. The scale bar is 5 $\mu$m. }
\label{fig:figure1}
\end{figure*}
To probe the noisy charge dynamics in bacteria with sufficient time resolution and electrical sensitivity, we have combined low-frequency noise analyses from condensed matter physics \cite{scofield1987ac} with microfluidics \cite{yang2020all}. Our overarching hypothesis is that the metabolic activity of bacteria
modulates the concentrations of various ions in the medium, leading to detectable fluctuations in the electrical impedance. In Section \ref{sec:approach}, we present our experimental approach with particular attention to the electrical measurements. The results in Section \ref{sec:results} establish that electrical fluctuations detected from bacteria scale as $1/f^2$, with the characteristics of equilibrium resistance noise \cite{voss1976flicker, dutta1981low, verleg1998resistance, tasserit2010pink, wen2017generalized}. In Section \ref{sec:discussion}, we look at possible noise mechanisms and discuss the possibility of charge noise. Section \ref{sec:conclusion} is reserved for conclusions. In Appendix \ref{app:experimental}, we present further experimental details. In Appendix \ref{app:dimensionless}, we discuss how to consistently remove the superficial effects of the measurement circuit from the noise. In Appendix \ref{app:perturbations}, we present results from our control experiments and discuss perturbations; we also discuss the contribution of another phenomenon, namely the nanomechanical fluctuations of a bacterium, to the observed noise. In Appendix \ref{app:chargenoise}, we present the details of how we estimate various electrical noise quantities.
\section{Experimental Approach}
\label{sec:approach}
\subsection{Device and setup}
\subsubsection{Microfluidic resistor}
We perform our electrical noise measurements in a PDMS microfluidic resistor that sits on an inverted microscope stage. As shown in Fig. \ref{fig:figure1}(b), the device has ten parallel microchannels at its center, each with a nanoscale constriction toward the outlet end [Fig. \ref{fig:figure1}(c)]. The microfluidic resistor is filled with a liquid electrolyte, such as Luria-Bertani (LB) broth medium or phosphate-buffered saline (PBS), and four thin film Cr-Au electrodes allow for electrical contact to the ions in the medium [Fig. \ref{fig:figure1}(b)]. Cr-Au electrodes are a good alternative to AgCl electrodes: they are easy to fabricate and provide satisfactory electrical properties \cite{rocha2016electrochemical,tsutsui2011single,maleki2009nanofluidic}. Unless otherwise noted, the temperature of the media is kept at $37^{\circ}$C by the temperature-controlled inverted microscope stage.
\begin{figure*}
\begin{center}
\includegraphics[width=6.75 in]{figure2.pdf}
\caption{(a) A schematic diagram of the circuit for electrical measurements. The dashed boxes show the lock-in amplifier reference oscillator output (left), the microfluidic resistor (center), and the lock-in amplifier input (right). (b) A simplified equivalent circuit for the measurement, showing the impedances of the microfludic resistor and the lock-in input. The arrows show the current flow directions. (c) Th{\'e}venin equivalent noise circuit showing the thermal noise of the microfluidic resistor and the input noise of the lock-in amplifier. (d) Equivalent circuit showing the excess noise in the microfluidic resistor. }
\label{fig:figure2}
\end{center}
\end{figure*}
\subsubsection{Loading and trapping the bacteria}
The noise measurements are performed on both live and dead bacteria trapped in these parallel microchannels. At the start of each experiment, We load and trap the bacteria using a pressure-driven flow of a bacteria solution from the inlet toward the nanoconstriction with $\Delta p \approx 10~\rm kPa$. The bacteria accumulate in the microchannels in a linear fashion, as shown in Fig. 1(c). Once the bacteria are loaded, we wait for 30 min before starting the electrical measurements. During the measurements, we maintain a constant $\Delta p\approx 0.6~\rm kPa$ to ensure the flow of nutrients to the bacteria in the microchannel region, except in experiments for studying the effects of different $\Delta p$ values. The pressure-driven flow jams the bacteria towards the nanoconstriction and keeps the bacteria from moving; it also prevents the bacteria from oscillating due to the electrokinetic forces.
\subsubsection{ Properties of the bacteria}
We use non-motile Gram-negative bacteria (\textit{Klebsiella pneumoniae}) and Gram-positive bacteria (\textit{Staphylococcus saprophyticus}) in our experiments. \textit{K. pneumoniae} is a rod-shaped microorganism that has a length of $2-3 ~\mu \rm m$ and a cross-sectional area of $ 0.8 ~\mu \rm m^2$ \cite{zhang2021measurement}; \textit{S. saprophyticus} is a spherical microorganism that has a diameter of $ 1 ~\mu \rm m$ \cite{monteiro2015cell}. The average doubling times for \textit{K. pneumoniae} and \textit{S. saprophyticus} in our microfluidic devices at $37^{\circ}$C are 55 min. and 100 min., respectively \cite{yang2020all}. In experiments with dead bacteria, the cells are first killed by adding a small amount of glutaraldehyde into the broth medium, before they are pushed into the microchannels. Glutaraldehyde is a fixative which kills bacteria by impeding essential cellular functions but preserves the cellular morphology and ultrastructure for the period of our experiments ($\sim3$ hours) \cite{mcdonnell1999antiseptics}.
\begin{figure*}[t!]
\begin{center}
\includegraphics[width=6.75 in]{figure3.pdf}
\caption{(a) The $I$-$V$ characteristics of devices filled with live and fixed (dead) \textit{K. pneumoniae} cells. The average value of the phase angle is $-34 \pm 3^{\circ}$. (b) Voltage fluctuations $v(t)$ from live and dead bacteria at a fixed $I\approx 7.74$ nA bias in a (noise) bandwidth of $\Delta f \approx 10 \rm~Hz$ as a function of time. There are $N\approx 300$ bacteria trapped in both devices. (c) Histograms. The dashed lines show Gaussians.}
\label{fig:figure3}
\end{center}
\end{figure*}
\subsection{Electrical measurements}
\label{sec:electricalmeasurments}
\subsubsection{Lock-in amplifier setup}
We employ a four-probe ac measurement using a lock-in amplifier, as shown schematically in Fig. \ref{fig:figure1}(b) and Fig. \ref{fig:figure2}(a). In Fig. \ref{fig:figure2}(a), $V_s$ is the reference oscillator output of the lock-in amplifier, with the reference frequency set to $f_o=160~\rm Hz$; $Z_c$ is the contact impedance at each of the four probes; the impedance $Z_m$ of the microfluidic resistor is modeled as a resistor $R_m$ in parallel with a capacitance $C_m$; and $Z_{in}$ is the equivalent impedance of the lock-in amplifier input, with ${V_{A}}-{V_{B}}$ representing the voltage drop between the two differential inputs $A$ and $B$. A current source is created by connecting the lock-in oscillator output in series with a $100 ~\rm M\Omega$ metal film resistor that has a parasitic capacitance $\le 0.4$ pF. The voltage drop across the microfluidic resistor is measured by the differential voltage detection mode of the lock-in amplifier [Fig. \ref{fig:figure1}(b)].
During the noise measurements, an ac bias current of rms amplitude in the range $ 0.70~{\rm nA} \le {I} \le 16.50~{\rm nA}$ is pushed through the microfluidic resistor, and the voltage fluctuations across the resistor are detected. The time constant and filter roll-off of the lock-in amplifier are $3~\rm ms$ and $18~\rm dB/oct$, respectively, resulting in an equivalent noise bandwidth of $31.25~\rm Hz$. The data are transferred to a computer using a digitizer at a sampling rate of $128~\rm Hz$. Our subsequent numerical filtering only keeps the noise in the frequency interval $0.05~{\rm Hz} \le f \le 10~\rm Hz$. To summarize, our measurements are similar to the ac noise measurements on solid state systems but without the bridge configuration \cite{scofield19851}. One big advantage in our system is that we can establish a background noise level by measurements on fixed (dead) bacteria that lack any metabolic activity.
\subsubsection{Mean voltage drop and estimation of the circuit parameters}
Figure \ref{fig:figure3}(a) shows the rms value of the mean voltage drop, $V_{AB}={V_{A}}-{V_{B}}$, for two devices as a function of the rms bias current $I$ that flows through the devices; the value of the phase angle is $-34 \pm 3^{\circ}$ and stays constant. The devices are nominally identical, but one is filled with live cells and the other with dead cells. To find $I$, $R_m$ and $C_m$ [Figs. \ref{fig:figure2}(a) and \ref{fig:figure2}(b)], we first determine the impedances of the ${100~\rm M \Omega}$ resistor, the contact pads, and the lock-in inputs at $f_o=160~\rm Hz$. We ignore the imaginary component of the $100$ $\rm M \Omega$ resistor. The input impedance $Z_{in}$ of the lock-in amplifier can be modeled \cite{foster1996whole} as a resistor, $R_{in}={10~\rm M \Omega}$, in parallel with a capacitor, $C_{in}={25~\rm pF}$, as shown in Fig. \ref{fig:figure2}(b). This gives an equivalent impedance of $Z_{in}\approx 9.40-j2.36~\rm M\Omega$ at $f_o=160~\rm Hz$. By comparing the results of two-probe measurements to four-probe measurements, we estimate each contact impedance to be $Z_c \approx 60-j60~\rm k\Omega$ and thus negligible. We then calculate $I$ from the rms lock-in reference voltage value $V_s$ using Ohm's Law in the simplified circuit shown in Fig. \ref{fig:figure2}(b). Here, $I$ and $I_{in}$ are the currents that flow through the microfluidic resistor and the amplifier input circuit, respectively. Using these properly determined current values, we then find the values of $R_m$ and $C_m$ by linear fitting, i.e., Ohm's Law, as shown in Fig. \ref{fig:figure3}(a). These fits yield $R_m \approx 3.3~\rm M \Omega$ and $3.2~\rm M \Omega$ for live and dead cells, respectively, and $C_m \approx 0.2~\rm nF$, resulting in $Z_m \approx 2.30-j1.50~\rm M\Omega$ for both cases. This capacitance value is consistent with the parasitic capacitance of the wiring and the cables. We emphasize that the value of $R_m$ depends on the number $N$ of cells trapped in the device \cite{yang2020all}, and $N\approx 300\pm 50$ for both measurements in Fig. \ref{fig:figure3}(a). The $N$ value, however, will be varied in some measurements and its effects will be deconvoluted from the measurements, as described below.
\subsubsection{Johnson-Nyquist noise}
Now, we turn to a typical noise data trace and discuss the general features of noise. Figure \ref{fig:figure3}(b) shows the time-domain voltage fluctuations, $v(t)$, measured across the microfluidic resistor filled with roughly 300 cells in LB for a bias current of $I\approx 7.74$ nA in a (noise) bandwidth of $\Delta f \approx 10 \rm~Hz$. Within the 120 s data trace, the bacteria do not divide or move into and out of the microchannels. The rms value of the voltage noise can be found as $1.55~\mu \rm V$ for live cells (red) and $0.76~\mu \rm V$ for fixed cells (black). The probability distribution of the noise in both cases is nearly Gaussian [Fig. \ref{fig:figure3}(c)].
To understand the origin of this noise, we first estimate the Johnson-Nyquist noise of the microfluidic resistor and the input noise of the lock-in amplifier, which together should result in a white thermal spectrum away from the carrier. The diagram of the Th{\'e}venin equivalent noise circuit is shown in Fig. \ref{fig:figure2}(c). Here, $Z_m$ is the source impedance, $Z_{in}$ is the amplifier input impedance, and $e_{th}$ is the thermal noise voltage generated by the source impedance with a PSD of ${4{k_B}T {\Re}{\{Z_m\}}}$ with ${\Re}$ denoting the real part of the complex impedance. We approximate the noise arising from the amplifier as follows. We assume that the amplifier adds the equivalent input-referred voltage noise ${e_{in}}$ to the thermal noise, as shown in Fig. \ref{fig:figure2}(c). We note that the current noise of the amplifier is also lumped into ${e_{in}}$. Then, the measured voltage noise PSD with respect to the reference nodes $A$ and $B$ in Fig. \ref{fig:figure2}(c) becomes
\begin{equation}
\begin{split}
S_V^{(th)}(f,0) & = {\left[ {4{k_B}T {\Re}{\{Z_m\}}} + { {\left< {{e_{in}}^2} \right>} \over {\Delta f }} \right]} { \left| {Z_{in}} \right|^2 \over {\left| Z_m +Z_{in} \right|}^2}, \\
& = 4{k_B}T R_{n}.
\label{eq:whitepsd}
\end{split}
\end{equation}
Here, $S_V^{(th)}(f,0)$ indicates that the bias current is zero and $\Delta f$ is the measurement bandwidth. The resistance $R_{n}$ is an equivalent noise resistance representing all the white thermal noise sources in the system. To determine ${\left< {{e_{in}}^2} \right>}/\Delta f$ of the lock-in amplifier for our sensitivity setting and source impedance value at 160 Hz, we measure the output noise in separate experiments as a function of source resistance \cite{mancini2003op}. These measurements allow us to find the equivalent input-referred voltage noise PSD and the equivalent input-referred current noise PSD for each amplifier input as approximately $ 1.70 ~\times 10^{-15}~\rm {V^2}/{Hz}$ and $ 2.30~\times 10^{-27}~\rm {A^2}/{Hz}$, respectively. Since the lock-in amplifier is used in the ${V_A}-{V_B}$ mode in our measurements, we calculate the total input-referred noise PSD from the amplifier inputs by adding the noise PSDs from each amplifier input, leading to ${\left< {{e_{in}}^2} \right>}/\Delta f \approx 3.85 \times 10^{-14}~\rm {V^2}/{Hz}$. Finally, by substituting $Z_m \approx 2.30-j1.50~\rm M\Omega$ (for 300 cells), $Z_{in}\approx 9.40-j2.36~\rm M\Omega$ and ${\left< {{e_{in}}^2} \right>}/\Delta f \approx 3.85 \times 10^{-14}~\rm {V^2}/{Hz}$ into Eq. (\ref{eq:whitepsd}), we find the white noise PSD at the output to be approximately $S_V^{(th)}(f,0)\approx 4.80~\times 10^{-14}~\rm {V^2}/{Hz}$. The detectable Johnson-Nyquist voltage noise within a bandwidth of 10 Hz should therefore be $\sqrt{4.80\times 10^{-14}~\rm {V^2}/{Hz} \times 10 ~Hz} \approx 0.70~\rm \mu V$.
Returning to Fig. \ref{fig:figure3}(a), we realize that the rms voltage noise values reported above for both live ($1.55~\rm \mu V$) and dead cells ($0.76~\rm \mu V$) are larger than the Johnson-Nyquist noise voltage ($0.70~\rm \mu V$). This qualitatively suggests that ``excess" $1/f$ noise must be dominating for both live and dead bacteria. What is also remarkable and perhaps unexpected is the enhanced electrical noise of live cells as compared to dead cells. The excess $1/f$ noise will precisely be the topic of our detailed study.
\subsubsection{Excess noise}
\label{sec:excessnoise}
In order to understand the source of the excess voltage noise in the microfluidic resistor, we turn to equilibrium resistance noise. We first derive the dependence of the noise power on bias current. As shown in Fig. \ref{fig:figure2}(d), the applied bias current $I$ is divided into two, ${I_R}$ through $R_m$ and ${I_C}$ through $C_m$, so that $I={I_R}+{I_C}$. For $I_R$, we find $I_R = {I \over (1+j\omega_o {R_m}{C_m}) }$, where ${\omega_o \over 2\pi}= f_o=160~\rm Hz$. In Fig. \ref{fig:figure2}(d), the resistance noise is modeled as being generated by a time-dependent fluctuating resistance $r(t)$ in series with $R_m$ \cite{scofield1987ac}. Under bias current $I$, the resistance fluctuations are turned into voltage fluctuations via Ohm's Law. The PSD of the excess voltage noise from the resistance fluctuations is $ {{I^2 S_R(f)} \over {1+{\omega_o}^2 {R_m}^2 {C_m}^2}}$, where $S_R(f)$ is the PSD of the resistance fluctuations in units of $\rm \Omega^2 /Hz$. Thus, the PSD of the current-dependent excess voltage noise measured between the nodes $A$ and $B$ in Fig. \ref{fig:figure2}(d) can be expressed as
\begin{equation}
\begin{split}
S_V^{(ex)}(f,I) & = I^2 S_R(f) { \left[ { \left|{{Z_{in}}} \right|^2 } \over \left(1+{\omega_o}^2 {R_m}^2 {C_m}^2 \right)^2 {\left| Z_m +Z_{in} \right|}^2 \right] }, \\
& = I^2 S_R(f) {\cal C}.
\end{split}
\label{eq:exPSD}
\end{equation}
Here, the factor ${\cal C}$ is a dimensionless coefficient that quantifies how the noise generated in the microfluidic resistor is attenuated at the output. In our experiments, the factor ${\cal C}$ is assumed to be only a function of $R_m$, since $Z_{in}$ and the capacitance $C_m$ coming mostly from the wiring stay constant. The value of $R_m$ changes with the number $N$ of bacteria in the microchannel and/or the resistivity of the different electrolytes. Using the circuit parameters given above, i.e., $C_m$, $Z_{in}$, and $\omega_o$, we can readily determine ${\cal C}$ as a function of $R_m$ as shown in Appendix \ref{app:dimensionless}.
In the experiments, we measure the total voltage noise PSD as
\begin{equation}
\begin{split}
S_V^{(tot)}(f) & = S_V^{(ex)}(f,I) + S_V^{(th)}(f,0),\\
& = {\cal C}(R_m) I^2 S_R(f) +4k_BTR_n.
\end{split}
\label{eq:totPSD}
\end{equation}
When comparing measurements with different $R_m$ values, it is thus necessary to deconvolute the effects of $R_m$ from the measured noise for consistency. This should be the case, for instance, when comparing data taken in different electrolytes or when the noise power is measured as a function of number $N$ of bacteria in the microchannels. In previous work, we have established that the $R_m$ value depends on $N$ approximately linearly as $R_m(N) \approx 2.5~{\rm M\Omega} + N\times 2.5~{\rm k\Omega}$ for \textit{K. pneumoniae} and as $R_m(N) \approx 2.5~{\rm M\Omega} + N\times 3.5~{\rm k\Omega}$ for \textit{S. saprophyticus} \cite{yang2020all}. To compare noise measurements, one should first subtract from a given $S_V^{(tot)}(f)$ data the thermal noise contribution $S_V^{(th)}(f,0)$. Then by using the ${\cal C}(R_m)$ corresponding to the $R_m$ value of the microfluidic resistor, one can obtain the PSD of the resistance fluctuations as
\begin{equation}
S_R(f)={ S_V^{(tot)}(f)-S_V^{(th)}(f,0) \over {I^2{\cal C}(R_m)} }.
\label{eq:excessPSD}
\end{equation}
The so-called normalized PSD $S(f)$ can then be calculated as \cite{scofield19851}
\begin{equation}
\begin{split}
S(f) & = {S_R(f) \over {R_m}^2},\\
&={ S_V^{(tot)}(f)-S_V^{(th)}(f,0) \over {\cal C}(R_m) I^2 {R_m}^2}.
\end{split}
\label{eq:normalizedPSD}
\end{equation}
\subsection{Data analysis}
\label{sec:dataanalysis}
\begin{figure*}
\begin{center}
\includegraphics[width=6.75in]{figure4.pdf} \\
\caption{(a) Representative time domain $v(t)$ traces from measurements on live \textit{K. pneumoniae} in LB at $37^{\circ}$C under different bias currents $0.77~{\rm nA} \leq I \leq 15.00~{\rm nA}$ with $N\approx 300 \pm 50$ and $\Delta p \approx 0.6~\rm kPa$. The rms values of $I$ are as indicated in the figure. Upper insets show examples of $v(t)$ measured at $I\approx 7.70~\rm nA$, with no artifacts (left), with two bacteria entering the microchannel (center), and with one bacterium escaping from the microchannel (right)---as observed in microscope images. The arrows indicate the instants when the bacteria enter and escape. (b) Representative PSDs $S_V^{(tot)}(f)$ of $v(t)$ for three different $I$ values before and (c) after smoothing. (d) Normalized PSDs $S(f)$ of excess noise. The data show $S(f)$ for each $I$ (small symbols) and average of $S(f)$ over $I$ (large symbols).}
\label{fig:figure4}
\end{center}
\end{figure*}
\subsubsection{Basic steps}
\label{sec:basicsteps}
To recapitulate, we measure the voltage noise, $v(t)$, in time domain as a function of the bias current $I$. We now describe how these data are processed. Figure \ref{fig:figure4}(a) shows representative data traces from our measurements of live \textit{K. pneumoniae} in LB under different bias currents $I$, with $I$ as indicated in the figure. The data are first numerically filtered such that the remaining fluctuations are in the frequency range of $0.05~\rm Hz $ $\leq f$ $\leq 10~\rm Hz$. As seen in the data traces in Fig. \ref{fig:figure4}(a), we measure $v(t)$ over a period of 3 min for each applied $I$. These 3 min traces are thus long enough that various artifacts can be removed consistently but short enough that bacteria do not grow substantially and divide. The artifacts arise because bacteria may randomly enter into or escape from the microchannels; these excursions by bacteria can generate spikes [e.g., Fig. \ref{fig:figure4}(a), center and right insets]. Although rare, these artifacts can change the characteristics of the noise data. We thus remove these spikes from the measured $v(t)$ traces before we calculate the frequency domain PSDs. In summary, we use a 2-min long portion of the $v(t)$ data to calculate the PSDs, $S_V^{(tot)}(f)$. The PSD is calculated by taking a fast Fourier transform (FFT) of the autocorrelation function of a 2-min long $v(t)$ data trace. The PSDs [Fig. \ref{fig:figure4}(b)] are then smoothed [Fig. \ref{fig:figure4}(c)] using an eight-point moving average \cite{smeets2008noise, heerema20151, siwy2002origin}. To analyze the asymptotic low-frequency behavior of the excess noise, we calculate the normalized PSD, $S(f)$, of the excess noise. For this, we first determine $S(f)$ for each $I$ using Eq. (\ref{eq:normalizedPSD}). We then find the average value of $S(f)$ \cite{verleg1998resistance, fleetwood20151}. The small symbols in Fig. \ref{fig:figure4}(d) show $S(f)$ calculated from $S_V^{(tot)}(f)$ at different $I$ values, and the large symbols show the average $S(f)$.
\subsubsection{Averaged excess noise}
Finally, we also analyze the dependence of the excess voltage noise on $I$, $\Delta p$, and $N$ below. To this end, we select a frequency range, where $S_V^{(tot)}(f)$ is significantly above the white (thermal) noise level and determine the PSD of the excess noise from Eq. (\ref{eq:totPSD}), i.e., $S_V^{(ex)}(f)=S_V^{(tot)}(f)-S_V^{(th)}(f,0)$. Here, the PSD of the thermal noise, $S_V^{(th)}(f,0)$, is assumed to be frequency independent. We then average the excess noise over this frequency range as \cite{pal2009resistance, hoogerheide2009probing}
\begin{equation}
{\overline{S_V^{(ex)}(f)}} = {1\over {f_1-f_2}}{\int_{f_1}^{f_2} S_V^{(ex)}(f) df}.
\label{eq:avednPSD}
\end{equation}
The frequency band we use for these averages is $0.05-0.2~\rm Hz$.
\subsection{Control experiments}
In a number of additional measurements, we have characterized the noise in the microchannels without any bacteria. In these experiments, the microchannels are filled with just the electrolyte solutions, LB and PBS. Some experiments are repeated at $23^{\circ}$C. The measurements of the
electrolytes without bacteria are performed with fresh buffers. The experimental approach and data analysis steps are identical to those above.
\section{Results}
\label{sec:results}
\begin{figure*}[ht]
\centering
\includegraphics[width=4.5in]{figure5.pdf
\caption{ (a) Voltage noise PSDs $S_V^{(tot)}(f)$ for different bias $I$ for live and dead (\textit{K. pneumoniae}) cells. There are approximately $300 \pm 50$ cells in both devices, and $R_m$ values are similar. (b) Averaged PSD $\overline{S_V^{(ex)}(f)}$ of the excess voltage noise as a function of $I$. Each data point is the average from three independent experiments with nominally identical devices that have $300 \pm 50$ cells and similar $R_m$ values. The dashed lines are quadratic fits of the form $\overline{S_V^{(ex)}(f)}=\Gamma I^2$, with $\Gamma=1.16\times {10}^{5}~\rm \Omega^2/Hz$ (live) and $7.21\times {10}^{3}~\rm \Omega^2/Hz$ (dead). The symbols $+$ and $\times$ respectively show $\overline{S_V^{(ex)}(f)}$ for live and dead cells at different $\Delta p$ ranging from 0.2 kPa to 3.0 kPa with an increment of 0.4 kPa under $I\approx 7.75 ~\rm nA$. Inset shows the same data on a linear scale; error bars show single standard deviations. (c) Representative $S_V^{(tot)}(f)$ for live and dead cells at three different $\Delta p$ values, with $I\approx 7.75 ~\rm nA$. (d) Averaged PSD $\overline{S_V^{(ex)}(f)}$ as a function of number $N$ of cells in the microchannels. The bias current is $I\approx 7.75 ~\rm nA$ for all. Each data set consists of data points from at least three independent experiments. The line parallel to the $x$-axis corresponds to the excess noise power within the $0.2~\rm Hz$ bandwidth for dead cells. The dashed lines are linear fits with the $y$ intercepts fixed to the excess noise value for the dead cells. Inset shows three representative $S_V^{(tot)}(f)$ curves for live \textit{K. pneumoniae} cells with different $N$ taken using the same bias $I\approx 7.78 ~\rm nA$.}
\label{fig:figure5}
\end{figure*}
We first make observations on the frequency domain characteristics of the measured noise. These observations lead us to the conclusion that the noise is due to equilibrium resistance fluctuations. We then show the scaling behavior of the measured noise by obtaining its normalized PSD $S(f)$.
\subsection{Noise PSD as a function of different parameters}
\subsubsection{Bias current}
Figure \ref{fig:figure5}(a) shows the PSDs of the voltage fluctuations, $S_V^{(tot)}(f)$, measured in microchannels filled with $N \approx 300 \pm 50$ live and dead cells at different bias current values. All the PSDs are obtained from time domain data, such as those in Fig. \ref{fig:figure4} using the steps described in Section \ref{sec:dataanalysis}. As noted above, the time domain data traces do not contain any voltage spikes due to large perturbations, such as bacterial divisions or displacements. Several observations are noteworthy in Fig. \ref{fig:figure5}(a). For each $I$, the PSD exhibits a well-defined frequency $f_w$, where the behavior of the curve changes. For $f>f_w$, the spectrum is white and independent of $I$; the experimentally measured white noise PSD of $5.25 \times 10^{-14}~\rm {V^2}/{Hz}$ is consistent with the amplifier input noise combined with the Johnson-Nyquist noise of the microfluidic device, which we have estimated above in Section \ref{sec:electricalmeasurments} to be $4.80 \times 10^{-14}~\rm {V^2}/{Hz}$. For $f<f_w$, the PSDs increase as frequency decreases, showing typical $1/f$ excess noise characteristics \cite{hooge19941} for both live and dead cells. The value of $f_w$ also appears to increase with $I$.
\begin{figure}[!ht]
\centering
\includegraphics[width=3.375in]{figure6.pdf
\caption{Collapse and scaling of the noise data. Normalized PSDs, $S(f)$, of resistance fluctuations for live \textit{K. pneumoniae} (a) and \textit{S. saprophyticus} (b) in LB and PBS. The black data trace in each plot shows the average $S(f)$ for dead \textit{K. pneumoniae} in LB and dead \textit{S. saprophyticus} in LB. The shaded regions show the error (single standard deviations). Each data trace on live and dead cells in LB are obtained from three independent experiments. The data trace on live cells in PBS is from a single experiment. The black dashed lines are $S(f)={{B} / {f^ \beta}}$, with $B=6.15 \times {10}^{-11}$ and $\beta=1.50$. The solid lines are fits to $S(f)={{A {\tau}^2 } \over {1 + 4{\pi ^2}{f^2}{{\tau} ^2}}}$ using $\tau= {10~\rm s}$ and ${30~\rm s}$ for \textit{K. pneumoniae} (red) and \textit{S. saprophyticus} (blue); the $A$ values for both time constants for \textit{K. pneumoniae} and \textit{S. saprophyticus} are approximately $7.30 \times {10}^{-9}$ and $5.10 \times {10}^{-9}$, respectively.}
\label{fig:figure6}
\end{figure}
We now turn to the dependence of the excess noise on $I$. Here, we compare ${\overline{S_V^{(ex)}(f)}}$ values, as defined in Eq. (\ref{eq:avednPSD}) above, for different $I$ \cite{pal2009resistance, hoogerheide2009probing}. Figure \ref{fig:figure5}(b) shows $\overline{S_V^{(ex)}(f)}$ as a function of $I$. For live cells, the $\overline{S_V^{(ex)}(f)}$ data can be fitted to a quadratic function as $\overline{S_V^{(ex)}(f)} \approx \Gamma_l I^2$, with $\Gamma_l \approx 1.15 \times 10^5~\rm {\Omega^2}/{Hz}$. The noise of dead bacteria in Fig. \ref{fig:figure5}(b) can also be fitted to a quadratic function, $\Gamma_d I^2$---at least for the high current region of the data with $\Gamma_d \approx 7.20 \times 10^3~\rm {\Omega^2}/{Hz}$. The dashed lines in Fig. \ref{fig:figure5}(b) show the quadratic fits. It is important to emphasize that all the data here are consistently taken on $N \approx 300 \pm 50$ cells, and all $R_m$ values remain in the range $R_m \approx 3.10 \pm 0.40~\rm M\Omega$.
Two important conclusions can be made based on the data and fits in Fig. \ref{fig:figure5}(b). The $I^2$ dependence of the excess noise suggests that, in both cases, the noise is induced by ``equilibrium" resistance fluctuations \cite{voss1976flicker, dutta1981low, verleg1998resistance, tasserit2010pink, wen2017generalized}. Live cells exhibit a significantly higher amplitude than dead ones with $\Gamma_l \gg \Gamma_d$, indicating that noise generation is linked to bacterial metabolism. The origin of the noise from dead cells is not entirely clear and will be further addressed in Section \ref{sec:excessnoise} below.
\subsubsection{Hydrodynamic pressure}
Fig. \ref{fig:figure5}(c) shows $S_V^{(tot)}(f)$ for different applied pressures $\Delta p$ across the channel at a fixed bias of $I\approx 7.75 ~\rm nA$. The measured noise remains independent of $\Delta p$, and hence the bulk flow velocity, as $\Delta p$ is varied by more than an order of magnitude. We further note that $\overline{S_V^{(ex)}(f)}$ at $I\approx 7.75 ~\rm nA$ exhibits no dependence on $\Delta p$ [Fig. \ref{fig:figure5}(b)].
During the experiments, we establish a net flow from the inlet to the outlet. The drag force due to this steady flow has a stabilizing effect on the system, with the bacteria snugly jammed in the microchannel toward the nanoconstriction. The electrokinetic and other flow forces in the system do not move the bacteria due to the presence of this net steady flow from the inlet toward the nanoscale constriction. Appendix \ref{app:perturbations} provides more details on the control experiments where we measure the hydrodynamic and electrokinetic forces on the bacteria in our system.
\subsubsection{Number of cells}
We next demonstrate how the number $N$ of cells in the microchannel affects the measured noise characteristics. We increase the number of bacteria in the microchannels via growth for live cells and via trapping from flow for dead cells. We measure $v(t)$ at fixed $I\approx 7.75~\rm nA$ as a function of $N$. The inset of Fig. \ref{fig:figure5}(d) shows $S_V^{(tot)}(f)$ of live cells for three different $N$ values, with the PSD increasing with $N$ in the low-frequency region. The main plot in Fig. \ref{fig:figure5}(d) shows $\overline{S_V^{(ex)}(f)}$ as a function of $N$ obtained from many different data traces such as those in the inset. While $\overline{S_V^{(ex)}(f)}$ increases monotonically with $N$ for live cells, it remains at a constant value (solid line) for dead cells. The increase of $\overline{S_V^{(ex)}(f)}$ with $N$ for live cells indicates that the noise powers from individual cells are additive. The noise power of \textit{K. pneumoniae} appears to be slightly larger than that of \textit{S. saprophyticus}. We note that, since $R_m$ increases with $N$, the fraction of the noise power that is coupled to the amplifier changes with $N$. Thus, the data only provide a qualitative picture.
\subsection{Normalized PSD of the excess noise}
\label{sec:excessnoise}
\subsubsection{Excess noise of live bacteria}
The $I^2$ dependence observed in Fig. \ref{fig:figure5}(b) suggests that the noise is due to equilibrium resistance fluctuations. To analyze the asymptotic low-frequency behavior of the excess noise, we return to Eq. (\ref{eq:normalizedPSD}) and calculate the normalized PSD, $S(f)$, of the excess noise. Normalizing the data this way removes the contribution of the thermal noise and all the ${I}$ and $R_m$ dependences. The data with different bias currents should then collapse onto a single curve \cite{hooge19691}. $S(f)$ of different systems, e.g., dead and live bacteria, can then be directly compared.
The collapsed $S(f)$ data are shown in Fig. \ref{fig:figure6}(a) for \textit{K. pneumoniae} and in Fig. \ref{fig:figure6}(b) for \textit{S. saprophyticus}, both in LB and PBS. For live bacteria in LB, $S(f) \propto {{{A}} {{f^{-2}}}}$. The noise of live cells in PBS is noticeably lower than that in LB. In all these measurements, $N \approx 300 \pm 50$.
\subsubsection{Excess noise of dead bacteria and electrolytes}
The black data traces in Figs. \ref{fig:figure6}(a) and \ref{fig:figure6}(b) show the average $S(f)$ for dead \textit{K. pneumoniae} and dead \textit{S. saprophyticus}, respectively, with the shaded regions corresponding to the error (single standard deviations). For dead bacteria, $S(f) \propto {{{B}} {{f^{-3/2} }}}$.
Microchannels filled with electrolytes (either LB or PBS) with no cells at both $37^{\circ}$C and $23^{\circ}$C show the same noise characteristics and levels as microchannels filled with dead bacteria. This can be seen clearly in the collapsed average $S(f)$ data in Fig. \ref{fig:nodead}. $S(f)$ curves in Fig. \ref{fig:nodead} for no bacteria and dead bacteria also follow the same scaling behavior. In order to obtain these collapse plots, we follow the steps described above in Section \ref{sec:basicsteps} and use ${\cal C}(R_m)$ to correct the measured noise in different electrolytes. This is because the electrical conductance values, and hence the $R_m$ values, for these devices differ significantly: at $37^{\circ}$C, the $R_m$ values for devices filled with LB and PBS are $2.5~\rm M \Omega$ and $1.7~\rm M \Omega$, respectively; at room temperature ($23^{\circ}$C), the $R_m$ value for LB is $3.0~\rm M \Omega$; the electrical conductivity of PBS at $37^{\circ}$C, LB at $37^{\circ}$C and LB at $23^{\circ}$C are approximately 1.47 S/m, 1.00 S/m, and 0.83 S/m, respectively. These conductivity values agree with those reported in the literature \cite{binette2004tetrapolar,prieto2016monitoring,li2018differentiation}.
In summary, the presence or absence of dead cells in the electrolyte does not change the background noise appreciably; nor does interchanging LB with PBS or decreasing the temperature to $23^{\circ}$C. More details are available in the Supplemental Material \cite{yang2021supp}. It may therefore be justifiable to collapse all the background data onto a single curve. All these suggest that the background noise is due to an intrinsic bulk process in the electrolyte---although we cannot conclusively rule out other possibilities, such as contact noise \cite{hassibi2004comprehensive} or extrinsic noise.
\begin{figure}
\centering
\includegraphics[width=3.375in]{figure7.pdf}
\caption{Normalized PSD $S(f)$ of the resistance fluctuations for electrolytes containing no bacteria and dead bacteria. The large symbols show the average values of the experiments with just the electrolyte (green) and with dead bacteria (black); the shaded regions show the error (single standard deviations); the dashed lines are not fits but show the asymptotic behavior and correspond to ${S(f)}={B/f^{\beta}}$, with $B = 4.05 \times {10}^{-11}$ and $\beta = 1.50$ for no bacteria (green) and $B = 6.15 \times {10}^{-11}$ and $\beta = 1.50$ for dead bacteria (black). The inset shows the data sets from independent experiments; the green symbols correspond to data from nine independent experiments, three with PBS at $37^{\circ}$C, three with LB at $37^{\circ}$C, and three with LB at $23^{\circ}$C; the gray symbols show data from six independent experiments three with dead \textit{K. pneumoniae} and three with dead \textit{S. saprophyticus}, both in LB at $37^{\circ}$C.}
\label{fig:nodead}
\end{figure}
\section{Discussion}
\label{sec:discussion}
We first systematically look at possible artifacts, concomitants, and perturbations that may give rise to the observed noise. These include extrinsic noise, measurement artifacts, bacterial movements, flow forces, electrokinetic forces, electrical perturbations, and Joule heating. For each case, we provide estimates or experimental evidence that suggests that the noise does not come from this particular source. (Some of the details are presented in the Appendices.) We then return to our hypothesis that bacterial metabolism is responsible for the observed noise and provide some theoretical support to our experimental observations.
\subsection{Possible artifacts}
We first consider possible artifacts and perturbations that might give rise to the observed excess noise. The fact that we can directly compare results on live and dead cells has convinced us that our measurements are not dominated by extrinsic noise. Our microchannel device is, in principle, capable of transducing bacterial movements into resistance fluctuations \cite{kara2018microfluidic}. We can rule out any inherent rigid body movements of live bacteria (e.g., wiggling) as a noise source because our bacteria are highly non-motile. The steady flow and the electrokinetic flows due to applied fields in the microchannel can also excite and sustain rigid body movements \cite{lissandrello2015noisy}. However, this cannot be the source of the observed noise simply because fixed cells would show the same level of noise [e.g., Fig. \ref{fig:figure2}]. Detailed measurements described in Appendix \ref{app:perturbations} indicate that electrokinetic forces are negligible compared to the steady drag force of the pressure-driven flow, which pushes the bacteria toward the nanoconstriction and jams them. We also investigate a possible temperature increase due to Joule heating and conclude that the increase is negligible. An applied electric field, i.e., the bias, can perturb the bacterial membrane and its proteins \cite{tsong1990electrical,xie1990study,stratford2019electrically}, changing the influx and efflux rates. Our electric field strength is too small to induce any electrical perturbations, and bacteria appear to grow normally in our microchannels during our measurements. We therefore conclude that the observed noise is rooted in bacterial metabolism.
\subsection{Nanomechanical fluctuations of bacteria}
Active random oscillations and movements are commonly observed in many microorganisms and cells \cite{ben2011effective,turlier2016equilibrium,biswas2017mapping,nelson2017vibrational,wu2016quantification,singh2019studying, manneville2001active, willaert2020single}. Due to active biochemical processes in the cytoplasm and cell membrane \cite{longo2013rapid, lissandrello2014nanomechanical}, highly non-motile bacteria are also expected to exhibit random nanomechanical oscillations. During these nanomechanical oscillations, the bacteria go through quasi periodic deformations, which in principle could get converted to electrical noise by our microchannel transducer \cite{kara2018microfluidic}.
In order to get an order of magnitude estimate of nanomechanical fluctuations, we convert the observed electrical noise power into an active effective temperature $T_{eff}$ for the bacteria. To this end, we first numerically calculate the rms thermal amplitude, i.e., nanomechanical thermal equilibrium noise, of a bacterium in several of its eigenmodes; we then convert the nanomechanical noise into electrical resistance noise by considering the change in the geometric cross-section of the microchannel due to the random deformations of $300$ bacteria. Based on the responsivity of our microchannel transducer, the random thermal oscillations of 300 bacteria at the equilibrium temperature of $310~\rm K$ ($37^{\circ}$C) result in resistance noise with an rms value of $\sim 0.8~\Omega$. Experimentally measured rms resistance noise, on the other hand, is $\sim 200~\Omega$. To match the observed noise levels, we estimate that a bacterium ought to attain an effective temperature of $T_{eff}\sim 10^7~\rm K$. While an active system such as a bacterium should have $T_{eff} > 310~\rm K$ \cite{ben2011effective,turlier2016equilibrium,biswas2017mapping,manneville2001active}, this level of activity seems unreasonable. Nanomechanical motion of bacteria is thus an unlikely source for our observations. Details of the simulations, the assumptions made, and a thorough discussion of the results are provided in Appendix \ref{app:perturbations}.
\subsection{Charge noise model}
Our hypothesis is that the source of the fluctuations is electrical. The electrolyte-filled microchannels can be considered as one-dimensional conductors in which the primary charge carriers are $\rm Na^+$ and $\rm Cl^-$ ions. Each microchannel is assumed to be long and uniformly filled with bacteria (i.e., $N\approx 300$). Monovalent ions, such as $\rm K^+$, $\rm Na^+$ and $\rm Cl^-$, move into and out of the bacteria randomly; this causes fluctuations in the number of charged carriers within the conductors and hence resistance noise.
We first construct an electrical noise model of a single cell by assuming that the flux of a certain ion $\rm X$ into or out of the cell is proportional to the number of ions within the cell. For instance, if there are excess $\rm Na^+$ ions in the cell, $\rm Na^+$ ions will be transported out of the cell and \textit{vice versa}. This is expected because the excess $\rm Na^+$ in the cell will change the Nernst potential for $\rm Na^+$ and activate the ion channel conduction in one direction. Thus, for any given ion $\rm X$,
\begin{equation}
{{d { n_{\rm X}} } \over {dt}} = -{\phi}({ n_{\rm X}}),
\end{equation}
where ${ n_{\rm X}}$ is the total number of intracellular $\rm X$ ions and ${\phi}$ is the rate of transport of $\rm X$ ions through the cell membrane as a function of $n_{\rm X}$. The minus sign indicates that when intracellular value of ${ n_{\rm X}}$ is decreasing the ${ n_{\rm X}}$ flux is positive. Expanding around the equilibrium value $n_{\rm X} ={\bar n_{\rm X}} + \Delta n_{\rm X}$, we write
\begin{equation}
{{d {\Delta n_{\rm X}} } \over {dt}} = - {{\Delta n_{\rm X}} \over \tau_{\rm X} } + \xi_{\rm X},
\end{equation}
with $\xi_{\rm X}$ being a white noise term. Here, $\phi({\bar n_{\rm X}})= 0$, and ${\tau _{\rm X}} = {\left( {{{\left. {{{\partial \phi} \over {\partial {n_{\rm X}}}}} \right|}_{{{\bar n}_{\rm X}}}}} \right)^{ - 1}}$ can be regarded as a lifetime for ions or the relaxation time for an ionic perturbation within the cell. From this, we find \cite{van1976noise, mitin2002generation}
\begin{equation}
{S_{n_{\rm X}}}(f) = {4{\overline {{{(\Delta n_{\rm X})}^2}} \tau_{\rm X} } \over {1 + 4{\pi ^2}{f^2}{{\tau_{\rm X}} ^2}}}
\end{equation}
for the PSD for the fluctuations of the number ${ n_{\rm X}}$ of intracellular ions of type $\rm X$ in a single bacterium. Since we are interested in estimating an order of magnitude, we assume that the $\tau_{\rm X}$ for different ions are roughly equal and define an overall effective time constant $\tau$ such that $\tau \sim \tau_{\rm X}$. We also assume that the noise powers generated by bacteria are additive. Then, the PSD of the fluctuations in the total number of charge carriers within our microfluidic resistor containing many bacteria should be expressible in the form
\begin{equation}
{S_{n}}(f) = {4{\overline {{{(\Delta n)}^2}} \tau } \over {1 + 4{\pi ^2}{f^2}{\tau ^2}}},
\end{equation}
where ${\left( {\overline {{{(\Delta n)}^2}} } \right)^{1/2}} = {\Delta n_{rms}}$ is the rms value of the fluctuations in the number of charge carriers. Note that the particle flux at equilibrium is assumed to be zero---as opposed to the case in generation recombination noise in semiconductors \cite{van1976noise}.
For the equivalent microfluidic resistor $R_m$ (with ten microchannels), the relationship between the PSD of the resistance fluctuations, $S_R (f)$, and the PSD of the carrier number fluctuations, $S_n (f)$, is \cite{mitin2002generation}
\begin{equation}
S(f) = {{{S_R}(f)} \over {{{R_m}^2}}} = {{{S_n}(f)} \over {{n}^2}}.
\label{eq:eqpsd}
\end{equation}
Here, $n$ is the total number of charge carriers in the resistor. Under the assumption of spatial uniformity, Eq. (\ref{eq:eqpsd}) holds for a single microchannel (out of the ten) (see Appendix \ref{app:chargenoise}), which has $n\approx 4 \times 10^{10}$ at the $85$ mM NaCl concentration of LB. Thus, there are ${n} \pm { {\Delta n}_{rms}}$ charge carriers within the LB filling the microchannel due to the noise generated by bacteria.
We do not see the corner frequency in our data and thus cannot determine $\tau$ from our experiments. We turn to previous work \cite{kralj2011electrical} for an approximate value of $\tau$. In this remarkable paper \cite{kralj2011electrical}, the autocorrelation functions of spontaneous electrical blinks from single bacterial cells were shown to decay exponentially over a period of $ 10 - 30~\rm s$. This suggests that bacterial membrane potentials and the intracellular ion concentrations relax with a time constant $ 10~{\rm s} \lesssim \tau \lesssim 30~{\rm s}$. For 10 s and 30 s, we obtain the fits shown in Fig. \ref{fig:figure6} with $\left( \overline {{{(\Delta n)}^2}} \right) \sim 5\times 10^{13}$ for 30 cells at equilibrium yielding ${\Delta n^{(1)}_{rms}} \sim 1.3 \times 10^6$ per cell. We have estimated the other relevant time constants in the system due to flow, drift and diffusion, and found that the diffusion time constant in the system is close to 10 s. It is also noteworthy that the noise data in Fig. \ref{fig:figure6} start to deviate from the $1/f^2$ asymptote below 0.06 Hz, suggesting that another noise process might be dominating at our lowest frequencies.
\subsection{Estimation of the membrane potential noise}
To estimate the noise in the membrane potential due to the charge noise, we use two approaches.
In the first, we assume that the noise in the transmembrane ionic current results in fluctuations in the total charge in close proximity of the membrane, i.e., on the plates of the capacitor in the circuit in Fig. \ref{fig:figure1}(a). Then, $e_n \sim {e\Delta n^{(1)}_{rms} \over C} \approx 3.5~\rm V$, with $\Delta n^{(1)}_{rms} \approx 1.3 \times 10^{6}$, $C\approx 6 \times 10^{-14}~\rm F$ and ${e} \approx 1.60 \times 10^{-19}~{\rm C}$ \cite{benarroch2020microbiologist} with $C$ being the membrane capacitance of the cell.
In the second, we estimate $e_n$ from fluctuations in the intracellular ion concentrations. We assume that the ions are distributed uniformly inside (and outside) the cell and that only $\rm K^+$, $\rm Na^+$, and $\rm Cl^-$ ions contribute to the steady-state value of $V_{mem}$. We find the change in the membrane potential with respect to each ion concentration from the Goldman-Hodgkin-Katz equation \cite{benarroch2020microbiologist} and find the total rms change by adding each contribution as
\begin{widetext}
\begin{equation}
\begin{split}
{e_n} \approx {{RT} \over F } {\left({{{\left(p_{\rm K} \Delta [{\rm K^+}]_i\right)^2} +{\left(p_{\rm Na} \Delta [{\rm Na^+}]_i\right)^2} }\over {\left({p_{\rm K}[{\rm K^+}]_i} +{p_{\rm Na}[{\rm Na^+}]_i}+{p_{\rm Cl}[{\rm Cl^-}]_o}\right)^2}} + {{\left(p_{\rm Cl} \Delta [{\rm Cl^-}]_i\right)^2} \over {\left({p_{\rm K}[{\rm K^+}]_o} +{p_{\rm Na}[{\rm Na^+}]_o}+{p_{\rm Cl}[{\rm Cl^-}]_i}\right)^2}} \right)^{1/2}},
\label{eq:eqen}
\end{split}
\end{equation}
\end{widetext}
where $R$ is the universal gas constant, $T$ is the temperature, $F$ is Faraday's constant; $p_{\rm {X}}$ is the relative membrane permeability, and $[{\rm X}]_i$ and $[{\rm X}]_o$ are the uniform intracellular and extracellular concentrations of the ion. The rms fluctuations in intracellular ion concentration for each ion is estimated to be of order, ${\Delta [{\rm X}]_i} \sim {\Delta n^{(1)}_{rms} \over V_b}\sim 10^{24}~{\rm m^{-3}}$, for a cell with volume $V_b \sim 10^{-18}~{\rm m^{3}}$ \cite{benarroch2020microbiologist}. The extracellular ion concentrations are assumed to remain constant. By substituting the ${\Delta [{\rm X}]_i}$ values along with the values of $p_{\rm {X}}$, $[{\rm X}]_i$, and $[{\rm X}]_o$ into Eq. (\ref{eq:eqen}), we find $e_n \sim 1.3~\rm mV$. More details are available in Appendix \ref{app:voltagenoise}.
These two extreme values for the membrane potential fluctuations, i.e., 1.3 mV and 3.5 V, suggest that the fluctuations depend strongly upon how nonuniformities in ion concentrations get dissipated within the ``crowded environment" of the cell. We estimate that an ion would probably diffuse a distance equal to the length scale of a bacterium in $\sim 10$ ms \cite{mcguffee2010diffusion}. This indicates that a more accurate noise model for the membrane potential and the electrical fluctuations of the entire bacterium should take into account intracellular diffusion.
\section{Conclusions}
\label{sec:conclusion}
Our measurements represent a significant step in understanding the role of fluctuations in bacterial ion homeostasis. By carrying out electrical noise measurements on live and dead bacteria, we have shown evidence that the charge state of live bacteria fluctuates over time. A direct consequence of this observation is that intracellular ion concentrations and the membrane potential $V_{mem}$ both have strongly fluctuating components. It is well established that $V_{mem}$ and intracellular ion concentrations in bacteria affect a number of cellular processes in a crucial manner. Among these processes are ATP synthesis \cite{mitchell1961coupling}, cell division \cite{strahl2010membrane}, cell motility \cite{guragain2013calcium}, antibiotic resistance \cite{dong2019magnesium}, environmental sensing \cite{bruni2017voltage, anishkin2014feeling} and electrical communication between cells \cite{prindle2015ion, liu2017coupling}. It is thus reasonable to expect that $V_{mem}$ and the intracellular ion concentrations should practically remain constant over time, because drastic changes and large fluctuations in $V_{mem}$ and ion concentrations would strongly perturb all the above-mentioned cellular processes. More and more experiments, including ours, suggest that the ionic makeup of the cell, and hence $V_{mem}$, fluctuates strongly. It remains to be seen whether bacteria utilize these fluctuations to its advantage or whether there are built in mechanisms of noise evasion.
We have also established time-resolved electrical resistance measurements as a sensitive tool for studying bacteria. Even lower frequencies and higher sensitivities may be achieved in future studies by redesigning the microfluidic resistor, e.g., by incorporating a nulling bridge in the design or and reducing the background fluctuations. It may also be possible, in principle, to do these experiments in larger channels with many more bacteria---provided that any bacteria movements can be suppressed. Our microfluidic resistor is designed to have a source resistance such that efficient coupling of noise can be achieved to a low-frequency high-impedance amplifier. This requirement can be circumvented, for instance, by performing the measurement at high frequency, where a larger channel with a source resistance close to $50~\Omega$ can be used. Finally, understanding the source of the fluctuations in the electrolyte is also a problem of fundamental relevance. To this end, one may perform experiments with different electrodes and in different electrolytes.
\begin{acknowledgements}
This work was supported by NIH (1R21AI133264-01A1). H. G. acknowledges the Boston University Nanotechnology Innovation Center BUnano Cross-Disciplinary Fellowship. The authors thank V. Yakhot and J. Tien for helpful discussions.
K. L. E. discloses a potential of conflict of interest, as he is the cofounder of a company, Fluctuate Diagnostics, which aims to commercialize this technology. No potential
conflicts of interest exist for Y. Y. and H. G.
\end{acknowledgements}
\section{Additional Data}
In this Supplemental Material, we provide additional data plots from control measurements. For the noise data shown in Sections A-E below, we calculate and correct the normalized PSD $S(f)$ for the excess noise using Eq. (5) in the main text. The noise data below for no bacteria, dead bacteria, and live bacteria are structured as follows. In Sections A and B, we show the noise measured in electrolytes with no bacteria, including in LB and PBS at $37^{\circ}$C and LB at $23^{\circ}$C. In Section C, we show the noise measured in electrolytes containing dead bacteria at $37^{\circ}$C. For each plot in Sections A-C, we show $S(f)$ for each current $I$ using small symbols, while we show the average $S(f)$ using large symbols. In Section D, we compare the noise from experiments with no bacteria with those with dead bacteria. Our goal here is to establish that the (background) noise level in just the electrolyte taken with no bacteria is close to the noise level in the electrolyte containing dead bacteria. In Section E, we show the noise measured with live bacteria at $37^{\circ}$C, with small symbols showing $S(f)$ for each $I$ and large symbols showing the average $S(f)$. In Section F, we present values of relevant parameters for different electrolytes in all measurements. In Section G, we show the normalized probability density functions of the voltage fluctuations in LB with no bacteria, dead bacteria, and live bacteria. All the relevant information is given in the captions.
\subsection{Noise in Electrolytes Containing No Bacteria at $37^{\circ}$C}
\begin{figure*}[!h]
\begin{center}
\includegraphics[width=6.75in]{figureS1.pdf} \\
\caption{Normalized PSDs ${S(f)}$ of the resistance fluctuations for LB (a-c) and for PBS (d-f) containing no bacteria at $37^{\circ}$C. Each plot represents one independent experiment. In each plot, the small symbols show the data for each bias current, and the large symbols are the average of the data with different bias currents. The dashed lines correspond to $S(f)=B/f^{\beta}$. The values of $B$ and $\beta$ are given in Table \ref{tab_model_Parameters}.}
\label{fig:figSPSDsno37}
\end{center}
\end{figure*}
\clearpage
\subsection{Noise in Electrolytes Containing No Bacteria at Room Temperature}
\begin{figure*}[!h]
\begin{center}
\includegraphics[width=6.75in]{figureS2.pdf} \\
\caption{(a-c) Normalized PSDs ${S(f)}$ of the resistance fluctuations for LB containing no bacteria at $23^{\circ}$C. Each plot represents one independent experiment. In each plot, the small symbols show the data for each bias current, and the large symbols are the average of the data with different bias currents. The dashed lines correspond to $S(f)=B/f^{\beta}$. The values of $B$ and $\beta$ are given in Table \ref{tab_model_Parameters}.}
\label{fig:figSPSDsno23}
\end{center}
\end{figure*}
\subsection{Noise in Electrolytes Containing Dead Bacteria at $37^{\circ}$C}
\begin{figure*}[!h]
\begin{center}
\includegraphics[width=6.75in]{figureS3.pdf} \\
\caption{Normalized PSDs ${S(f)}$ of the resistance fluctuations for LB containing dead \textit{K. pneumoniae} (a-c) and dead \textit{S. saprophyticus} (d-f) at $37^{\circ}$C. Each plot represents one independent experiment. In each plot, the small symbols show the data for each bias current, and the large symbols are the average of the data with different bias currents. The dashed lines correspond to $S(f)=B/f^{\beta}$. The values of $B$ and $\beta$ are given in Table \ref{tab_model_Parameters}.}
\label{fig:figSPSDsdead}
\end{center}
\end{figure*}
\subsection{Summary of Background Data: Average Noise Curves in Different Electrolytes With and Without Dead Bacteria}
Our experiments show different resistance values for microfluidic resistors filled with different electrolytes (containing no bacteria). At $37^{\circ}$C, the $R_m$ values for LB and PBS are measured as approximately $2.5~\rm M \Omega$ and $1.7~\rm M \Omega$, respectively. At room temperature ($23^{\circ}$C), the measured $R_m$ value for LB is approximately $3.0~\rm M \Omega$. The different $R_m$ values measured in PBS and LB are due to their different resistivities. Based on the analysis in the main text, we use ${\cal C}(R_m)$ to correct the measured noise when making a comparison of the excess noise levels between different electrolytes.
Figure \ref{fig:nodead} shows a comparison between the normalized PSD, $S(f)$, of the noise measured from electrolytes containing no bacteria (green) and dead bacteria (black). Here, the data for no bacteria (at $37^{\circ}$C and $23^{\circ}$C) are the average of $S(f)$ for each $I$ value shown in each plot of Figs. \ref{fig:figSPSDsno37} and \ref{fig:figSPSDsno23}; the data for dead bacteria (at $37^{\circ}$C) are the average of $S(f)$ for each $I$ shown in each plot of Fig. \ref{fig:figSPSDsdead}. We calculate and correct the curve for $S(f)$ in Figs. \ref{fig:figSPSDsno37}-\ref{fig:figSPSDsdead} for each $I$ using Eq. (5) in the main text; the value of ${\cal C}(R_m)$ for each $R_m$ is plotted in Fig. 9 in the main text; the $R_m$ value for each experiment is listed in Table (\ref{tab:tabS2}). We find that the $S(f)$ curves in Fig. \ref{fig:nodead} for no bacteria and dead bacteria exhibit very close noise levels and follow the same scaling behavior of the form ${S(f)}={B/f^{\beta}}$.
\begin{figure}[!h]
\begin{center}
\includegraphics[width=3.375in]{figureS4.pdf}
\caption{Normalized PSD $S(f)$ of the resistance fluctuations for electrolytes containing no bacteria and dead bacteria. The small green symbols show data from nine independent experiments, three each for PBS at $37^{\circ}$C, LB at $37^{\circ}$C, and LB at $23^{\circ}$C. The small gray symbols show data from six independent experiments three with dead \textit{K. pneumoniae} and three with dead \textit{S. saprophyticus}, both in LB at $37^{\circ}$C. The larger symbols show the average values of the experiments with no bacteria (green) and with dead bacteria (black). The dashed lines are not fits but show the asymptotic behavior and correspond to ${S(f)}={B/f^{\beta}}$, with $B = 4.05 \times {10}^{-11}$ and $\beta = 1.50$ for no bacteria (green) and $B = 6.15 \times {10}^{-11}$ and $\beta = 1.50$ for dead bacteria (black).}
\label{fig:nodead}
\end{center}
\end{figure}
\clearpage
\subsection{Noise in Electrolytes Containing Live Bacteria at $37^{\circ}$C}
\begin{figure*}[!h]
\begin{center}
\includegraphics[width=6.75in]{figureS5.pdf} \\
\caption{Normalized PSDs ${S(f)}$ of the resistance fluctuations of LB containing live \textit{K. pneumoniae} (a-c) and live \textit{S. saprophyticus} (d-f), and of PBS with live \textit{K. pneumoniae} (g) and live \textit{S. saprophyticus} (h) at $37^{\circ}$C. Each plot represents one independent experiment. In each plot, the small symbols show the data for each bias current, and the large symbols are the average of the data with different bias currents; the solid curves correspond to $S(f)= {{A \tau ^2 } \over {1 + 4{\pi ^2}{f^2}{{\tau} ^2}}}$, with $\tau=10~\rm s$ (bottom), and with $\tau=30~\rm s$ (top); the values of $A$ corresponding to different $\tau$ values are given in Table \ref{tab_model_Parameters}.}
\label{fig:figSPSDslive}
\end{center}
\end{figure*}
\clearpage
\subsection{ Values of Relevant Parameters for Different Electrolytes}
\begin{table}[!h]
\caption{\label{tab_model_Parameters} Summary of the values of the parameters in all measurements. The first and second columns show the electrolytes and temperatures used in the experiments, respectively. The third column lists the measured bacteria: \textit{K. pneumoniae} (KP) and \textit{S. saprophyticus} (SS). The fourth column shows the values of $R_m$ with $N\approx 300\pm50$ of (dead or live) bacteria in the microchannel. The fifth column shows the values of the electrical conductivity for the electrolytes. The sixth and seventh columns show the values of $A$ and $\tau$ for live bacteria in the formula $S(f) = {{A \tau ^2} \over {1 + 4{\pi ^2}{f^2}{{\tau} ^2}}}$. The last two columns show the values of $B$ and $\beta$ for no bacteria and dead bacteria in the formula $S(f) = B/f^{\beta}$.}
\begin{ruledtabular}
\begin{tabular}{cccccccccc}
Electrolytes & Temperature & Bacteria & Typical $R_m$ & Conductivity & $A$ & $\tau$ & $B$ & $\beta$ \\
& [$^{\circ}$C] & & [$\rm M \Omega$] & [S/m] & [$\times {10}^{-9}$] & [s] & [$\times {10}^{-11}$] & \\
\hline
$\rm LB$ & 37 & - & $2.50\pm0.04$ &1.00& - & - & 3.95, 4.15, 5.45 & 1.50, 1.50, 1.50 \\
$\rm LB$ & 23 & - & $3.00\pm0.04$ &0.83 & - & - & 2.65, 3.15, 2.75 & 1.50, 1.50, 1.50 \\
$\rm PBS$ & 37 & - & $1.70\pm0.002$ &1.47 & - & - & 3.05, 3.05, 3.05 & 1.50, 1.50, 1.50 \\
$\rm LB$ & 37 & dead KP & $3.10\pm0.40$ &- & - & - & 5.05, 5.05, 5.05 & 1.50, 1.50, 1.50 \\
$\rm LB$ & 37 & dead SS & $3.10\pm0.40$ &- & - & - & 6.75, 6.75, 6.75 & 1.50, 1.50, 1.50 \\
$\rm LB$ & 37 & live KP & $3.10\pm0.40$&- & 8.80, 6.80, 6.30 & 10, 30 & - & - \\
$\rm LB$ & 37 & live SS & $3.10\pm0.40$ & & 6.10, 5.40, 3.80 & 10, 30 & - & - \\
$\rm PBS$ & 37 & live KP & 2.15&- & 3.40& 10, 30 & - & - \\
$\rm PBS$ & 37 & live SS & 2.24&- & 2.40& 10, 30 & - & - \\
\label{tab:tabS2}
\end{tabular}
\end{ruledtabular}
\end{table}
\subsection{Probability Density Functions of Voltage Fluctuations}
\begin{figure*}[!h]
\begin{center}
\includegraphics[width=6.75in]{figureS6.pdf} \\
\caption{Normalized probability density functions (PDFs) for the voltage fluctuations plotted in units of the rms values $v_{rms}$ in LB containing no bacteria (a), dead bacteria (b), and live bacteria (c) at $37^{\circ}$C. Here, the voltage fluctuations are all measured using $I\approx 7.80~\rm nA$; the data of live and dead bacteria are \textit{K. pneumoniae}; the gray line in each plot is a Gaussian; the value of $v_{rms}$ for each data set is noted in the figure. For computing the PDFs shown in (a-c), we use four time series of $v(t)$ (each of 120 s) for the same experiment, such as those shown in Fig. 3(b) in the main text. We calculate the values of the normalized $n$-th moments of the PDFs, ${\mu_n} \over {\sigma^n}$, where ${\mu_n}=\langle v^n \rangle$ and ${\sigma}=\langle v^2 \rangle^{1/2}$ (the brackets indicate averages over the PDF) are respectively the $n$-th central moment and the standard deviation of the voltage fluctuations. We find the normalized high-order moments as 3.02 ($n=4$), 15.01 ($n=6$), and 102.17 ($n=8$) for no bacteria (a), 2.98 ($n=4$), 14.48 ($n=6$), and 95.61 ($n=8$) for dead bacteria (b), and 3.05 ($n=4$), 14.76 ($n=6$), and 93.00 ($n=8$) for live bacteria (c).}
\label{fig:figPDFs}
\end{center}
\end{figure*}
\end{document}
|
\section{Coreset Algorithms}
\label{sec:algorithms}
Though the algorithms vary in details, coreset constructions come in one of the following two flavours:
\begin{enumerate}
\item {\bf Movement-based constructions:} Such algorithms compute a coreset $\Omega$ with $T$ points given some input point set $A$ such that $\text{cost}_{\Omega}(C)\ll \text{OPT}$, where $\text{OPT}$ is the cost of an optimal $k$-means clustering of $A$.
The coreset guarantee then follows as a consequence of the triangle inequality. These algorithms all have an exponential dependency on the dimension $d$, and therefore have been overtaken by sampling-based methods. Nevertheless, these constructions are more robust to various constrained clustering formulations~\cite{HuangJV19,SSS19} and continue to be popular. Examples from theory include~\cite{FrahlS2005,HaM04}.
\item {\bf Importance sampling:} Points are sampled proportionate to their impact on the cost of any given candidate solution. The idealized distribution samples proportionate to the sensitivity which for a point $p$ is defined as $sens(p):=\sup_{C} \frac{\min_{c\in C} \text{dist}^2(p,c)}{\text{cost}_A(C)}$ and weighted by their inverse sampling probability. The sensitivities are hard to compute exactly but much work exists on how to find other distributions with very similar properties. In terms of theoretical performance, sensitivity sampling has largely replaced movement-based constructions, see for example~\cite{FeldmanL11,LangbergS10}.
\end{enumerate}
Of course, there exist algorithms that draw on techniques from both, see for example~\cite{Cohen-AddadSS21}. In what follows, we will survey implementations of various coreset constructions that we will evaluate later.
{\bf StreamKM++~\cite{AckermannMRSLS12}:} The popular $k$-means++ algorithm~\cite{ArV07} computes a set of centers $K$ by iteratively sampling a point $p$ in $A$ proportionate to $\min_{q\in K} \text{dist}^2(p,q)$ and adding it to $K$. The procedure terminates once the desired number of centers has been reached. The first center is typically picked uniformly at random.
The StreamKM++ paper runs the $k$-means++ algorithms for $T$ iterations, where $T$ is the desired coreset size. At the end, every point $q$ in $K$ is weighted by the number of points in $A$ closest to it. While the construction has elements of importance sampling, the analysis is largely movement-based. The provable bound required for the algorithm to compute a coreset is $O\left(\frac{k\log n}{\delta^{d/2}\varepsilon^d}\cdot \log^{d/2} \frac{k\log n}{\delta^{d/2}\varepsilon^d}\right)$. Despite its simplicity, its running time compares unfavourably to all other constructions.
{\bf BICO~\cite{FGSSS13}:} BICO combines the very fast, but poor quality clustering algorithm BIRCH~\cite{ZRL97} with the movement-based analysis from~\cite{FrahlS2005,HaM04}. The clustering is organized by way of a hierarchical decomposition: When adding a point $p$ to one of the coreset points $\Omega$ at level $i$, it first finds the closest point $q$ in $\Omega$. If $p$ is too far away from $q$, a new cluster is opened with center at $p$. Otherwise $p$ is either added to the same cluster as $q$, or, if adding $p$ to $q$'s cluster increases the clustering cost beyond a certain threshold, the algorithm attempts to add $p$ to the child-clusters of $q$. The procedure then continues recursively. The provable bound required for the algorithm to compute a coreset is $O\left(k\varepsilon^{-d-2}\log n\right)$.
{\bf Ray Maker~\cite{HaK07}:} The algorithm computes an initial solution with $k$ centers which is a constant factor approximation of the optimal clustering. Around each center, $O(1/\epsilon^{d-1})$ random rays are created which span the hyperplane. Next, each point $p \in A$ is snapped to its closest ray resulting in a set of one-dimensional points associated with each ray. Afterwards, a coreset is created for each ray by computing an optimal 1D clustering with $k^2/\epsilon^2$ centers and weighing each center by the number of points in each cluster. The final coreset is composed of the coresets computed for all the rays.
The provable bound required for the algorithm to compute a coreset is $O(k^3 \cdot \varepsilon^{-d-1})$. The algorithm has recently received some attention due to its applicability to the fair clustering problem~\cite{HuangJV19}.
{\bf Sensitivity Sampling~\cite{FeldmanL11}:} The simplest implementation of sensitivity sampling first computes an $(O(1),O(1))$ bicriteria approximation\footnote{An $(\alpha,\beta)$ bicriteria approximation computes an $\alpha$ approximation using $\beta\cdot k$ many centers.}, for example by running $k$-means++ for $2k$ iterations~\cite{Wei16}. Let $K$ be the $2k$ clustering thus computed and let $K_i$ be an arbitrary cluster of $K$ with center $q_i$. Subsequently, the algorithm picks points proportionate to $\frac{\text{dist}^2(p,q)}{\text{cost}_{K_i}(\{q_i\})} + \frac{1}{|K_i|}$ and weighs any point by its inverse sampling probability. Let $|\hat{K_i}|$ be the estimated number of points in the sample. Finally, the algorithm weighs each $q_i$ by $(1+\varepsilon)\cdot |K_i| - |\hat{K_i}|$. The provable bound required for the algorithm to compute a coreset is $\tilde O\left(kd\varepsilon^{-4}\right)$ (\cite{FeldmanL11}),
$\tilde O\left(k\varepsilon^{-6}\right)$ (\cite{huang2020coresets}), or $\tilde O\left(k^2\varepsilon^{-4}\right)$ (\cite{BravermanJKW21}).
{\bf Group Sampling~\cite{Cohen-AddadSS21}:} First, the algorithm computes an $O(1)$ approximation (or a bicriteria approximation) $K$. Subsequently, the algorithm preprocesses the input into groups such that (1) for any two points $p,p'\in K_i$, their cost is identical up to constant factors and (2) for any two clusters $K_i,K_j$, their cost is identical up to constant factors. In every group, Group Sampling now samples points proportionate to their cost. The authors of~\cite{Cohen-AddadSS21} show that there always exist a partitioning into $\log^2 1/\varepsilon$ groups. Points not contained in a group are snapped to their closest center $q$ in $K$. $q$ is weighted by the number of points snapped to it. The provable bound required for the algorithm to compute a coreset is $\tilde O\left(k\varepsilon^{-2}\min(d,k,\varepsilon^{-2})\right)$ (\cite{CLSS22}). While this improves over sensitivity sampling, it is generally slower and not as easy to implement.
Finally, we note that some of the more popular algorithms in theory have not been mentioned here. For example, Chen's \cite{Chen09} construction is particularly popular among theoreticians. The Group Sampling algorithm by \cite{Cohen-AddadSS21} is an extension and improvement of Chen's method. Thus, the performance of Group Sampling is also indicative of Chen's algorithm.
\paragraph*{Dimension Reduction}
Finally, we also combine coreset constructions with a variety of dimension reduction techniques. Starting with~\cite{DrineasFKVV04}, a series of results \cite{BecchettiBC0S19,BoutsidisMD09,BoutsidisZD10,BoutsidisZMD15,CEMMP15,Cohen-AddadS17,FeldmanSS20,FKW19,KuK10,MakarychevMR19,SohlerW18} explored the possibility of using dimension reduction methods for $k$-clustering, with a particular focus on principal component analysis (PCA) and random projections. The seminal paper by Feldman, Schmidt, and Sohler~\cite{FeldmanSS20} was the first to use dimension reduction to obtain smaller coresets for $k$-means. Movement-based coresets in particular often have an exponential dependency on the dimension, which can be alleviated with some form of dimension reduction, both in theory~\cite{SSS19} and in practice~\cite{KappmeierS015}.
There are essentially two main dimension reduction techniques for coresets.
{\bf Principal Component Analysis:} Feldman, Schmidt, and Sohler~\cite{FeldmanSS20} showed that projecting an input $A$ onto the first $O(k/\varepsilon^2)$ principal components is a coreset. This coreset still consists of $n$ points, but they now lie in low dimension. The analysis was subsequently tightened by~\cite{CEMMP15} and extended to other center-based cost functions by~\cite{SohlerW18}. Although its target dimension is generally worse than those based on random projections and terminal embeddings, there is nevertheless reasons for using PCA regardless: It removes noise and thus may make it easier to compute a high quality coreset. For more applications of PCA to $k$-means clustering, we refer to
{\bf Terminal Embeddings:} Given a set of points $A$ in $\mathbb{R}^D$, a terminal embedding $f:\mathbb{R}^D\rightarrow \mathbb{R}^d$ preserves the pairwise distance between any point $p\in A$ and any point $q\in \mathbb{R}^D$ up to a $(1\pm \varepsilon)$ factor. The statement is related to the famous Johnson-Lindenstrauss lemma but it is stronger as it does not apply to only the pairwise distances of $A$. Nevertheless, the same target dimension is sufficient. Terminal embeddings were studied by~\cite{CherapanamjeriN21,ElkinFN17,MahabadiMMR18,NaN18}, with Narayanan and Nelson \cite{NaN18} achieving an optimal target dimension of $O(\varepsilon^{-2}\log n)$, where $n$ is the number of points. We note that terminal embeddings, combined with an iterative application of the coreset construction from \cite{BravermanJKW21}, can reduce the target dimension to a factor $\tilde{O}(\varepsilon^{-2} \log k)$. This is mainly of theoretical interest, as in practice the deciding factor wrt the target dimension is the precision, rather than dependencies on $\log n$ and $\log k$. For applications to coresets, we refer to \cite{BecchettiBC0S19,Cohen-AddadSS21,huang2020coresets}. For an empirical evaluation of random projections, which form the basis of all known terminal embeddings, we refer to Venkatsubramanian and Wang~\cite{VenkatasubramanianW11}.
\section{Properties of the Benchmark}
\begin{fact}
For $a\neq a'$, we have $d(\mathcal{C}^{a},\mathcal{C}^{a'}) = 1-1/k$.
\end{fact}
\begin{proof}
Consider an arbitrary vector $v_i^{\ell}$. By construction, the positive entries of $v_i^{\ell}$ range from $k^{\ell-1}\cdot i+1$ to $k^{\ell-1}\cdot (i+1)$. Similarly, the positive entries for the vector $v_j^{\ell-1}$ range from range from $k^{\ell-2}\cdot j+1$ to $k^{\ell-2}\cdot (j+1)$. Therefore, concatenating $v_j^{\ell-1}$ $k$ times into a vector $v'$, $v'$ and $v_i^{\ell}$ can share at most one positive coordinate. Inductively, the same holds true for any concatenation of vectors $v_j^{\ell-h}$.
Thus, the two clusters induced by the columns formed by concatenating the vectors $v$ can share only a $1/k$ fraction of the points. Since each cluster consists of exactly $k^{\alpha}/k$ = $k^{\alpha-1}$ points, the confusion matrix $M$ only has entries $\frac{n}{k^2}$ and for any permutation $\pi$, we have $d(\mathcal{C}^{a},\mathcal{C}^{a'}) = 1-1/k$.
\end{proof}
\begin{fact}
\label{fact:cost}
For any $C_j^a$, we have $\text{cost}_{C_j^a}(\{\mu(C_j^a)\}) = (\alpha-1)\cdot k^{\alpha-2}\cdot (k-1)$.
\end{fact}
\begin{proof}
Without loss of generality, we consider $C_1^0$; the proof is analogous for the other choices of $j$ and $a$. We first note that for any point $A_i \in C_1^0$, the coordinates $A_{i,\ell}$ are identical for $\ell <k$. Furthermore for the column $\ell\geq k$, we have by construction $\sum_{A_i\in C_j} A_{i,\ell} = k^{\alpha-1}\cdot \frac{k-1}{k} + (k^{\alpha}-k^{\alpha-1})\frac{1}{k}=k^{\alpha-1}\cdot (\frac{k-1}{k} - (k-1)\frac{1}{k}) = 0.$ Therefore, the mean of $C_1^0$ satisfies $\mu(C_1^0)_{\ell} = \begin{cases}A_{i,\ell} &\text{if }\ell<k \\
0 &\text{else.}\end{cases}$.
Thus, the cost is precisely $(\alpha-1)\cdot k^{\alpha-1}\cdot \left(\left(\frac{k-1}{k}\right)^2 + \left(\frac{1}{k}\right)^2 \right)=(\alpha-1)\cdot k^{\alpha-2}\cdot (k-1)$.
\end{proof}
Finally, we show that the means for the clustering $\mathcal{C}^{a}$ also induce $\mathcal{C}^{a}$.
\begin{fact}
\label{fact:opt}
For a clustering $\mathcal{C}^{a}$, let $\mu(C_j^{a})$ denote the mean of cluster $C_j^a$. Then every point is assigned to its closest center. Moreover, every point $A_i$ of $C_j^a$ has equal distance to any center $\mu(C_h^{a})$ with $h\neq j$.
\end{fact}
\begin{proof}
Again, we assume without loss of generality $a=0$.
Let $A_i$ be an arbitrary point of cluster $C_{h}^{a}$ and consider the mean $\mu(C_j^a)_{\ell} = \begin{cases}A_{i,\ell} &\text{if }\ell<k \\
0 &\text{else.}\end{cases}$ of cluster $C_j^a$. By definition, the positive coordinates of $A_i$ are not equal to the positive coordinates of $\mu(C_j^a)$. The only difference in coordinates between the means of $\mu(C_j^a)$ and $\mu(C_h^a)$ are the first $k$ coordinates, as the rest are $0$.
But here the coordinates of $\mu(C_h^a)$ and $A_i$ are identical, hence $\mu(C_j^a)$ cannot be closer to $A_i$.
To prove that the distances between $A_i$ and any $\mu(C_h^{a})$ with $h\neq j$ are equal, again consider that any difference can only exist among the first $k$ coordinates. Here, we have $\mu(C_h^{a})_h = \frac{k-1}{k}$, and the remaining columns are $-\frac{1}{k}$. Since $A_{i,h} = -\frac{1}{k}$ for any $h\neq j$, the claim follows.
\end{proof}
\section{Hardness of Weak Coreset Evaluation}
Here, we show that it is in general co-NP hard to evaluate whether two point sets $A$ and $B$ are weak coresets of each other. A weak coreset only requires that a $(1+\varepsilon)$ approximation for one point set is a $(1+O(\varepsilon))$ for the other.
\begin{proposition}
\label{prop:hardness}
Given two point sets $A$ and $B$ in $\mathbb{R}^d$ and a sufficiently small (constant) $\varepsilon>0$, it is co-NP hard to decide whether $A$ is a weak coreset of $B$.
\end{proposition}
\begin{proof}
First, we recall that for some $\varepsilon_0$ and candidate clustering cost $V$, it is NP-hard to decide whether there exists a clustering $C$ with cost in $\text{cost}_A(C)\leq V$ and $\text{cost}_B(C)\geq (1+\varepsilon_0)\cdot V$.
Conversely, it is co-NP-hard to decide whether there exists no set of centers $C$ such that $\text{cost}_A(C)\leq V$ and $\text{cost}_B(C) \geq (1+\varepsilon_0)\cdot V$.
\end{proof}
We remark that the possible values for $\varepsilon_0$ are determined by the current APX-hardness results. Assuming NP$\neq$P, $\varepsilon_0\approx 1.07$ and assuming UCG, $\varepsilon_0 \approx 1.17$~\cite{Cohen-AddadSL21,Cohen-AddadS19} for $k$-means in Euclidean spaces.
\paragraph*{Further Extensions}
On the benchmark we considered here, both Sensitivity Sampling, as well as Group Sampling are similar to uniform sampling and, indeed, uniform sampling could be used to construct a good coreset. We can eliminate uniform sampling as a viable algorithm for this instance by combining multiple benchmarks $B_1,\ldots B_t$ with $\sum_{i=1}^t k_i =k$. Each benchmark then has size $\sum_{i=1}^t k_i^{\alpha}$. We then add an additive offset to the coordinates of each benchmark such that they do not interfere. In this case, uniform sampling does not work if the values of the $k_i$ are different enough. Since it is well known that uniform sampling is not a viable coreset algorithm in both theory and practice, we only used the basic benchmark for our evaluations.
\section{Distortions}
\label{sec:distortions-tables}
\input{appendix_distortions_tables.tex}
\section{Costs}
\label{sec:costs-tables}
\input{appendix_costs_tables.tex}
\section{Running Times}
\label{sec:running-times-tables}
\input{appendix_running_times.tex}
\section{Generating Candidate Solutions}
\label{sec:candidate-solution-generation}
As mentioned in~\cref{sec:evaluation-procedure}, it is difficult to construct a candidate solution consisting of $k$ centers which yields a maximal distortion. We experimented with three methods for candidate solution generation; find $k$ centers via $k$-means++, randomly generate $k$ points inside the convex hull (Random CH), and randomly generate $k$ points inside the minimum enclosing ball (Random MEB). Our experiments show that the $k$-means++ method generates candidate solutions which consistently result in large distortions across all algorithms and data sets. The numerical results are presented in~\cref{tab:comparison-solution-generation-all}. Notice that the the numbers in~\cref{tab:comparison-solution-generation-all} are the maximum distortions across $k$ and $m$ because
we are only interesting in determining which of the three methods is superior. \cref{tab:comparison-solution-generation-caltech-bico} shows all the numbers for BICO on the \textit{Caltech} data set. For all the other combinations of algorithms and data sets, the takeaway message is virtually the same; $k$-means++ is the best method for generating candidate solutions.
\begin{longtable}{llrrr}
\toprule
Data set & Algorithm & $k$-means++& Random CH& Random MEB\\
\midrule
Caltech & BICO & 7.499068 & 4.800188 & 2.629218 \\
& Group Sampling & 1.068441 & 1.035997 & 1.006828 \\
& Ray Maker & 7.053856 & 5.442665 & 3.453930 \\
& Sensitivity Sampling & 1.048977 & 1.016564 & 1.029646 \\
& StreamKM++ & 1.202426 & 1.111698 & 1.012216 \\
\midrule
Caltech+PCA & BICO & 2.862242 & 2.411732 & 1.825558 \\
& Group Sampling & 1.058707 & 1.021386 & 1.007735 \\
& Ray Maker & 2.941248 & 2.563131 & 2.053860 \\
& Sensitivity Sampling & 1.040106 & 1.012539 & 1.032113 \\
& StreamKM++ & 1.139141 & 1.073384 & 1.013089 \\
\midrule
Census & BICO & 2.502564 & 1.441889 & 1.040356 \\
& Group Sampling & 1.077525 & 1.032349 & 1.028025 \\
& Ray Maker & 2.483973 & 1.633945 & 1.236878 \\
& Sensitivity Sampling & 1.032978 & 1.088607 & 1.079925 \\
& StreamKM++ & 1.127443 & 1.044656 & 1.003459 \\
\midrule
Census+PCA & BICO & 2.454087 & 1.472404 & 1.030620 \\
& Group Sampling & 1.070332 & 1.036615 & 1.031606 \\
& Ray Maker & 2.456844 & 1.617594 & 1.234714 \\
& Sensitivity Sampling & 1.036155 & 1.086034 & 1.083994 \\
& StreamKM++ & 1.126928 & 1.042801 & 1.003570 \\
\midrule
Covertype & BICO & 1.294620 & 1.146309 & 1.037080 \\
& Group Sampling & 1.094779 & 1.041165 & 1.023978 \\
& Ray Maker & 1.388141 & 1.227148 & 1.121157 \\
& Sensitivity Sampling & 1.044575 & 1.115355 & 1.103073 \\
& StreamKM++ & 1.048912 & 1.019965 & 1.004857 \\
\midrule
Covertype+PCA & BICO & 1.292637 & 1.147499 & 1.037594 \\
& Group Sampling & 1.097391 & 1.038144 & 1.023664 \\
& Ray Maker & 1.385070 & 1.229436 & 1.122238 \\
& Sensitivity Sampling & 1.039479 & 1.097699 & 1.092900 \\
& StreamKM++ & 1.049769 & 1.022796 & 1.006932 \\
\midrule
NYTimes & BICO & 35.319657 & 31.015943 & 28.932553 \\
& Group Sampling & 1.089067 & 1.061821 & 1.033067 \\
& Ray Maker & 28.373678 & 24.930933 & 19.520125 \\
& Sensitivity Sampling & 1.050988 & 1.027549 & 1.012441 \\
& StreamKM++ & 2.039047 & 1.861497 & 1.674643 \\
\midrule
Tower & BICO & 1.199658 & 1.040606 & 1.005894 \\
& Group Sampling & 1.113305 & 1.043449 & 1.030855 \\
& Ray Maker & 1.490978 & 1.286890 & 1.234467 \\
& Sensitivity Sampling & 1.044464 & 1.103949 & 1.075281 \\
& StreamKM++ & 1.051491 & 1.009577 & 1.000630 \\
\bottomrule
\caption{Distortions across experiments on different algorithms and data sets.}
\label{tab:comparison-solution-generation-all}
\end{longtable}
\begin{longtable}{rrlll}
\multicolumn{5}{c}{\textbf{Distortions of BICO on the \textit{Caltech} data set}} \\
\toprule
$k$ & $m$ & $k$-means++ & Random CH & Random MEB \\
\midrule
10 & 50 & 5.12 (0.307) & 4.30 (0.270) & 2.63 (0.166) \\
& 100 & 4.48 (0.284) & 3.91 (0.240) & 2.54 (0.125) \\
& 200 & 4.08 (0.319) & 3.54 (0.236) & 2.46 (0.134) \\
& 500 & 3.41 (0.215) & 3.06 (0.155) & 2.18 (0.080) \\
\midrule
20 & 50 & 6.35 (1.173) & 4.73 (0.632) & 2.63 (0.147) \\
& 100 & 4.65 (0.283) & 3.82 (0.245) & 2.41 (0.104) \\
& 200 & 4.19 (0.384) & 3.49 (0.271) & 2.26 (0.141) \\
& 500 & 3.50 (0.404) & 3.07 (0.301) & 2.10 (0.128) \\
\midrule
30 & 50 & 6.01 (0.335) & 4.32 (0.204) & 2.57 (0.096) \\
& 100 & 5.10 (0.628) & 3.89 (0.340) & 2.35 (0.125) \\
& 200 & 4.29 (0.659) & 3.47 (0.440) & 2.21 (0.170) \\
& 500 & 3.09 (0.138) & 2.69 (0.122) & 1.87 (0.064) \\
\midrule
40 & 50 & 6.24 (0.524) & 4.33 (0.228) & 2.44 (0.076) \\
& 100 & 5.23 (0.874) & 3.86 (0.434) & 2.29 (0.191) \\
& 200 & 4.50 (1.085) & 3.49 (0.595) & 2.16 (0.183) \\
& 500 & 3.38 (0.398) & 2.85 (0.258) & 1.92 (0.111) \\
\midrule
50 & 50 & 7.50 (1.013) & 4.80 (0.449) & 2.47 (0.190) \\
& 100 & 5.21 (0.968) & 3.76 (0.475) & 2.20 (0.149) \\
& 200 & 4.21 (0.296) & 3.35 (0.195) & 2.10 (0.065) \\
& 500 & 3.36 (0.429) & 2.81 (0.288) & 1.86 (0.105) \\
\bottomrule
\caption{The effect of different solution generation approaches on the distortions (see \cref{sec:candidate-solution-generation}).
The distortions are obtained by running BICO on the \textit{Caltech} data set.
}
\label{tab:comparison-solution-generation-caltech-bico}
\end{longtable}
\newpage
\section{Auxiliary Plots}
\begin{figure}[H]
\includegraphics[width=0.9\linewidth]{figures/explained-variance-plot.pdf}
\caption{The cumulative proportion of explained variance by principal components on \textit{Caltech}, \textit{Covertype}, and \textit{Census}.}
\label{fig:explained-variance-pca}
\end{figure}
\begin{figure}[H]
\includegraphics[width=0.9\linewidth]{figures/cost-curves-benchmark.pdf}
\caption{Shows the clustering costs of four instances of the benchmark framework as a function of the number of centers. In contrast to real-world data sets, the costs do not decrease rapidly as more cluster centers are added.
}
\label{fig:cost-curves-benchmark}
\end{figure}
\newpage
\begin{figure}[H]
\includegraphics[width=.67\linewidth]{figures/real-costs-Tower.pdf}
\newline
\subfloat{
\includegraphics[width=.47\textwidth]{figures/real-costs-Covertype.pdf}
}
\subfloat{
\includegraphics[width=.47\linewidth]{figures/real-costs-Covertype+PCA.pdf}
}
\newline\newline
\subfloat{
\includegraphics[width=.47\textwidth]{figures/real-costs-Census.pdf}
}
\subfloat{
\includegraphics[width=.47\linewidth]{figures/real-costs-Census+PCA.pdf}
}
\newline\newline
\subfloat{
\includegraphics[width=.47\textwidth]{figures/real-costs-Caltech.pdf}
}
\subfloat{
\includegraphics[width=.47\linewidth]{figures/real-costs-Caltech+PCA.pdf}
}
\newline\newline
\subfloat{
\includegraphics[width=.47\textwidth]{figures/real-costs-NYTimes.pdf}
}
\subfloat{
\includegraphics[width=.47\linewidth]{figures/real-costs-NYTimes+PCA.pdf}
}
\newline\newline
\subfloat{
\includegraphics[width=0.15\textwidth]{figures/real-costs-Benchmark-k10.pdf}
\includegraphics[width=0.165\textwidth]{figures/real-costs-Benchmark-k20.pdf}
\includegraphics[width=0.16\textwidth]{figures/real-costs-Benchmark-k30.pdf}
\includegraphics[width=0.31\textwidth]{figures/real-costs-Benchmark-k40.pdf}
}
\caption{The average costs (and standard deviations indicated by black bars) of running the evaluated coreset algorithms multiple times on different data sets. In general, the five coreset algorithms are able to compute coresets which result in solutions with comparable costs on the different real-world data sets. The differences in cost is more noticeable on the benchmark instances. Here, Senstivity Sampling is the winner because it seems to be better at capturing the correct ``clusters'' inherent in the benchmark instances.}
\label{fig:real-costs}
\end{figure}
\section{Benchmark Construction}
\label{sec:benchmark}
In this section, we describe our benchmark. We start by describing the aims of the benchmark, followed by giving the construction. Our aim is to generate a data set containing many clusterings with the following properties.
\begin{enumerate}
\item The benchmark has many clusterings that, in a well defined sense, are highly dissimilar. Specifically, we want the overlap between any two clusters of different clusterings to be small.
\item The different clusterings have very similar and low cost. This ensures that despite the solutions being different in terms of composition and center placement, a good coreset has to consider them equally regarding distortion.
\item The clusterings are induced by a minimal cost assignment of input points to a set of centers in $\mathbb{R}^d$. This final property ensures that the coreset guarantee has to apply to these clusterings.
\end{enumerate}
To generate the benchmark, we now use the following construction. The benchmark has a parameter $\alpha$ which controls the number of points and dimensions of the generated data instance.
For a given value of $k$, the benchmark instance consists of $n=k^\alpha$ points and $d=\alpha \cdot k$ dimensions, i.e. we will construct and $n\times d$ matrix $A$ where every row corresponds to an input point and every column corresponds to one of the dimensions.
Let $\mathds{1}_k$ be the $k$-dimensional all-one vector and $v_i^1$ be the $k$-dimensional vector with entries $(v_i^1)_j = \begin{cases}-\frac{1}{k} & \text{if } i\neq j\\
\frac{k-1}{k} & \text{if } i= j\end{cases}$.
For $\ell\leq \alpha$, recursively define the $k^{\ell}$ dimensional vector $v_i^{\ell} = v_i^{\ell-1}\otimes \mathds{1}_k $, where $\otimes$ denotes the Kronecker product, i.e. $ v_i^{\ell-1}\otimes \mathds{1}_k= \begin{bmatrix}
(v_i^{\ell-1})_1 \cdot \mathds{1}_k \\
(v_i^{\ell-1})_2 \cdot \mathds{1}_k \\
\vdots \\
(v_i^{\ell-1})_1 \cdot \mathds{1}_k
\end{bmatrix}$.
Finally, set the $t$-th column of $A$, for $t = a\cdot k + b$, $a\in \{0,\ldots \alpha-1\}$ and $b \in \{1,\ldots k\}$, to be $\mathds{1}_{k^{\alpha-a+1}}\otimes v_b^{a+1}$.
To get a better feel for the construction, we have given two small example instances for $k=2$ and $k=3$ in Figue \cref{fig:benchmark-small-instances}.
\begin{figure*}[h]
\begin{center}
$$
\begin{bmatrix}
\frac{1}{2} & -\frac{1}{2} & \frac{1}{2} & -\frac{1}{2} & \frac{1}{2} & -\frac{1}{2} \\
-\frac{1}{2} & \frac{1}{2} & \frac{1}{2} & -\frac{1}{2} & \frac{1}{2} & -\frac{1}{2} \\
\frac{1}{2} & -\frac{1}{2} & -\frac{1}{2} & \frac{1}{2} & \frac{1}{2} & -\frac{1}{2} \\
-\frac{1}{2} & \frac{1}{2} & -\frac{1}{2} & \frac{1}{2} & \frac{1}{2} & -\frac{1}{2} \\
\frac{1}{2} & -\frac{1}{2} & \frac{1}{2} & -\frac{1}{2} & -\frac{1}{2} & \frac{1}{2} \\
-\frac{1}{2} & \frac{1}{2} & \frac{1}{2} & -\frac{1}{2} & -\frac{1}{2} & \frac{1}{2} \\
\frac{1}{2} & -\frac{1}{2} & -\frac{1}{2} & \frac{1}{2} &-\frac{1}{2} & \frac{1}{2} \\
-\frac{1}{2} & \frac{1}{2} & -\frac{1}{2} & \frac{1}{2} & -\frac{1}{2} & \frac{1}{2} \\
\end{bmatrix} ~~~~~~~~
\begin{bmatrix}
\frac{2}{3} & -\frac{1}{3} & -\frac{1}{3} & \frac{2}{3} & -\frac{1}{3} & -\frac{1}{3} \\
-\frac{1}{3} & \frac{2}{3} & -\frac{1}{3} & \frac{2}{3} & -\frac{1}{3} & -\frac{1}{3} \\
-\frac{1}{3} & -\frac{1}{3} & \frac{2}{3} & \frac{2}{3} & -\frac{1}{3} & -\frac{1}{3} \\
\frac{2}{3} & -\frac{1}{3} & -\frac{1}{3} & -\frac{1}{3} & \frac{2}{3} & -\frac{1}{3} \\
-\frac{1}{3} & \frac{2}{3} & -\frac{1}{3} & -\frac{1}{3} & \frac{2}{3} & -\frac{1}{3} \\
-\frac{1}{3} & -\frac{1}{3} & \frac{2}{3} & -\frac{1}{3} & \frac{2}{3} & -\frac{1}{3} \\
\frac{2}{3} & -\frac{1}{3} & -\frac{1}{3} & -\frac{1}{3} & -\frac{1}{3} & \frac{2}{3} \\
-\frac{1}{3} & \frac{2}{3} & -\frac{1}{3} & -\frac{1}{3} & -\frac{1}{3} & \frac{2}{3} \\
-\frac{1}{3} & -\frac{1}{3} & \frac{2}{3} & -\frac{1}{3} & -\frac{1}{3} & \frac{2}{3} \\
\end{bmatrix}
$$
\end{center}
\caption{Benchmark construction for $k=2$ and $\alpha=3$ (left) and $k=3$ and $\alpha=2$ (right).}
\label{fig:benchmark-small-instances}
\end{figure*}
\paragraph*{Properties of the Benchmark}
We now summarize the key properties of the benchmark.
To this end, we require a few notions.
Let $A$ be the input matrix. We slightly abuse notation and refer to $A_i$ as both the $i$th point as well as the $i$th row of the matrix $A$.
For a clustering $\mathcal{C}=\{C_1,\ldots ,C_k\}$, we define that the $n\times k$ indicator matrix $\tilde X$ induced by $\mathcal{C}$ via $\tilde X_{i,j} = \begin{cases}1 & \text{if } A_i\in C_j \\
0 & \text{else.} \end{cases}$
Furthermore, we will also use the $n\times k$ normalized clustering matrix $ X$ defined as
$X_{i,j} = \begin{cases}\frac{1}{\sqrt{|C_i|}} & \text{if } A_i\in C_j \\
0 & \text{else.} \end{cases}$
We also recall the following lemma which will allow us to express the $k$-means cost of a clustering $\mathcal{C}$ with optimally chosen centers in terms of the cost of $X$ and $A$.
\begin{lemma}[Folklore]
\label{lem:magic}
Let $A$ be an arbitrary set of points and let $\mu(A) = \frac{1}{|A|}\sum_{p\in A} p$ be the mean. Then $ \sum_{p\in A} \|p-c\|^2 = |A|\cdot \|\mu(A)-c\|^2 + \sum_{p\in A} \|p-\mu(A)\|^2$ for any point $c$.
\end{lemma}
This lemma proves that for any given cluster $C_j$, the mean is the optimal choice of center.
We also note that any two distinct columns of $X$ are orthogonal. Furthermore $\frac{1}{n}\mathbf{1}\mathbf{1}^TA$ copies the mean into every entry of $A$. Combining these two observations, we see that the matrix $XX^TA$ maps the $i$th row of $A$ onto the mean of the cluster it is assigned to. Finally, define the Frobenius norm of an $n\times d$ $A$ by $\|A\|_F = \sqrt{\sum_{i=1}^n\sum_{j=1}^d A_{i,j}^2}$. Then the $k$-means cost of the clustering $\mathcal{C}$ is precisely
$\|A-XX^TA\|_F^2.$
We also require the following distance measure on clusterings as proposed by Meila~\cite{Meila05,Meila06}. Given two clusterings $\mathcal{C}$ and $\mathcal{C'}$, the $k\times k$ confusion matrix $M$ is defined as
$ M_{i,j} = |C_i\cap C'_j|.$
Furthermore for the indicator matrices $\tilde X$ and $\tilde X'$ induced by $\mathcal{C}$ and $\mathcal{C'}$ we have the identity $M=\tilde X^T {\tilde X'}$.
Denote by $\Pi_k$ the set of all permutations over $k$ elements. Then the distance between $\mathcal{C}$ and $\mathcal{C'}$ is defined as $d(\mathcal{C},\mathcal{C'}) = 1-\frac{1}{n}\underset{\pi\in \Pi_k}{\max} \sum_{i=1}^k M_{i,\pi(i)}.$
Observe that for clusters that are identical, their distance is $0$. The maximum distance between any two $k$ clusterings is always $\frac{k-1}{k}$.
The solutions we consider are given as follows. For the columns $a\cdot k+1,\ldots (a+1)\cdot k$, we define the clustering $\mathcal{C}^{a} = \{C_1^a,\ldots C_k^a\}$ with
$A_i\in C_j^a$ if and only if $A_{i,j} > 0$. Let $\tilde X^a$ and $X^{a}$ denote the indicator matrix and clustering matrix, respectively, as induced by $\mathcal{C}^{a}$.
These clusterings satisfy the properties we stated at the beginning of this section, that is:
\begin{enumerate}
\item The distance between these clustering is $1-\frac{1}{k}$, i.e. it is maximized.
\item The clusterings have equal cost and the centers in each clustering have equal cost.
\item The clusterings are induced by a set of centers in $\mathbb{R}^d$.
\end{enumerate}
\paragraph*{Benchmark Evaluation}
We now describe how we use the benchmark to measure the distortion of a coreset. Assume for now that the coresets are subsets of the original input points. The extension to coresets that do not consist of input points is described at the end of this section.
Consider the clustering $\mathcal{C}^{a} = \{C_1^a,\ldots C_k^a\}$ for some $a$ and let $\Omega$ with weights $w:\Omega\rightarrow \mathbb{R}_{\geq 0}$ be the coreset and let $\delta>0$ be a parameter.
Note that there are $\alpha$ many such clusterings, for each value of $a$.
We use $w(C_i^a \cap \Omega):=\sum_{p\in C_i^a \cap \Omega} w(p)$ to denote the mass of points of $C_i^a$ in $\Omega$.
For every cluster $C_i^a$ with $w(C_i^a \cap \Omega)\geq |C_i| (1-\delta)$, we place a center at $\mu(C_i^a)$. Conversely, if $w(C_i^a \cap \Omega)< |C_i^a| (1-\delta)$, we do not place a center at $\mu(C_i^a)$. We call such clusters \emph{deficient}. Let $\mathcal{S}$ be the centers of these deficient clusters.
We now compare the cost as computed on the coreset and the true cost of $\mathcal{S}$. Due to \cref{lem:magic} and the fact that all clusters have equal cost, we may write for any deficient cluster $C_i^a$
$\text{cost}_{C_i^a}(\mathcal{S}) = \text{cost}_{C_j^a}(\{\mu(C_j^a)\}) + k^{\alpha-1}\|\mu(C_j^a)-\mu(C_h^a)\|_2^2$, where $C_h^a$ is a non-deficient cluster.
Thus, the cost is $\text{cost}_{C_i^a}(\mathcal{S}) \approx \left(1+\frac{2}{\alpha}\right)\cdot \text{cost}_{C_j^a}(\{\mu(C_j^a)\}).$
Conversely, the cost on the coreset is
\begin{align*}
\text{cost}_{\Omega\cap C_i^a}(\mathcal{S})
\approx \frac{w(C_i^a \cap \Omega)}{ \text{cost}_{C_j^a}(\{\mu(C_j^a)\})}\left(1+\frac{2}{\alpha}\right)\cdot \text{cost}_{C_j^a}(\{\mu(C_j^a)\}).
\end{align*}
Thus for each deficient clustering individually, the distortion will be close to $\frac{k^{\alpha-1}}{w(C_i^a \cap \Omega)} \geq \frac{1}{1-\varepsilon}$.
If there are many deficient clusters, then this will also be the overall distortion.
For all possible (suitably discretized) thresholds for deficiency, i.e. all values of $\delta$, we can now identify the clustering $\mathcal{C}^a$ with a maximum number of deficient clusters and use the aforementioned construction to get a lower bound on the distortion.
To extend this evaluation to coresets where the points are not part of the input, we consider a point $p\in \Omega$ to be in $C_i^a$ if it is closer to $\mu(C_i^a)$ than to to $\mu(C_j^a)$.
\section{Conclusion} \label{sec:conclusion}
In this work, we studied how to assess the quality of $k$-means coresets computed by state-of-the-art algorithms.
Previous work generally measured the quality of optimization algorithms run on the coreset, which we empirically observed to be a poor indicator of coreset quality.
For real-world data sets, we sampled candidate clusterings and evaluated the worst case distortion on them. Complementing this, we also proposed a benchmark framework which generates hard instances for known $k$-means coreset algorithms. Our experiments indicate a general advantage for algorithms based on importance sampling over movement-based methods. Despite movement-based methods running on very efficient code, it is necessary to complement them with rather expensive dimension reduction methods, rendering what efficiency they might have over importance sampling somewhat moot.
Two results bear further investigation. First, the currently known provable coreset sizes for Sensitivity Sampling are worse than those provable via Group Sampling. Empirically, we observed the opposite: While Group Sampling is competitive, Sensitivity Sampling always outperforms it. Since Group Sampling requires somewhat cumbersome computational overhead, practical applications should prefer Sensitivity Sampling. In light of these results, a theoretical analysis for Sensitivity Sampling matching the performance of Group Sampling would be welcome.
The second point of interest focuses on the performance of StreamKM++. The distortion of this algorithm is significantly better than what one would expect from its theoretical analysis.
Empirically, StreamKM++ is notably better than the other movement-based constructions across all data sets, and especially on high dimensional data.
While it is not competitive to the pure importance sampling algorithms, there are several reasons for investigating it further. It essentially only requires running $k$-means++ for additional iterations, which is already a nearly ubiquitous algorithm for the $k$-means problem. Although the other sampling-based coreset algorithms can also be readily implemented, doing so might be cumbersome. In particular, the theoretically (but not empirically) best algorithm Group Sampling requires extensive preprocessing steps.
This begs the question whether there exist a better theoretical analysis for StreamKM++.
In addition, StreamKM++ currently weighs each point by the number of points assigned to it. It may also be possible to improve the performance of the algorithm in both theory and practice by using a different weighting scheme.
We leave this as an open problem for future research.
\section{Experiments} \label{sec:experiments}
In this section, we present how we evaluated different algorithms. First, we propose our evaluation procedure which gauges the quality of coresets. Then, we describe the data sets used for the empirical evaluation and our experimental setup. Finally, we detail the outcome of the experiments and our interpretation of the results.
\subsubsection*{Evaluation Procedure}
\label{sec:evaluation-procedure}
Accurately evaluating a $k$-means coreset of a real-world data set requires constructing a solution (a set of $k$ centers) which results in a maximal distortion. Finding such a solution, however, is difficult. Instead, we can estimate the quality of a given coreset by finding meaningful candidate solutions.
A first attempt can be to randomly generate candidate solutions. It is not readily apparent how to define a distribution of meaningful solutions from which to sample. One could, for instance, generate $k$ random points inside the convex hull or the minimum enclosing ball (MEB) of a coreset $\Omega$. Convex hulls in high dimensions are infeasible to compute, so we sample a center by choosing random convex combination of the centers of the initial bicriteria approximation computed for every coreset.
A better way to generate candidate solutions turns out to be $k$-means++, where we sample $k$ points with respect to the $k$-means++ distribution and use the resulting centers as a solution (see \cref{sec:candidate-solution-generation} in the appendix). The main advantage of this approach is that $k$-means++ can uncover natural cluster structures in the data, which uniform sampling generally does not.
For all variants, we generated $5$ candidate solutions, where the candidate solution with the largest distortion being a lower bound for the true distortion of the coreset.
Given the usefulness of evaluating coresets on real-world data sets, it can be tricky to gauge the general performance of coreset algorithms using only a small selection of data sets. For this reason, we used our benchmark to complement the evaluation on real-world data sets. The benchmark accomplishes two important tasks. First, the benchmark allows us to quickly find a bad solution because both good and bad clusterings are known a priori. It is unclear how to find bad clusterings for real-world data sets. Second, it is easier to make a fair comparison of different coreset constructions because the benchmark is known to generate hard instances for all known coreset algorithms. This cannot be said for real-world data sets. For the benchmark, we computed the distortion following the evaluation procedure described in~\cref{sec:benchmark}.
Every randomized coreset construction was repeated $10$ times. We aggregated the reported maximum distortions for every run by taking the average over all $10$ evaluations.
It is important to not aggregate the distortions here by taking the maximum over all runs: If one run of the coreset algorithm fails but the others succeed, then such an aggregation predicts far worse distortion than what we could typically expect.
\begin{table}
\begin{center
\begin{tabular}{lrr}
\toprule
& Data points
& Dimensions
\\
\midrule
\textit{Caltech}
& 3,680,458
& 128
\\
\textit{Census}
& 2,458,285
& 68
\\
\textit{Covertype}
& 581,012
& 54
\\
\textit{NYTimes}
& 500,000
& 102,660
\\
\textit{Tower}
& 4,915,200
& 3
\\
\bottomrule
\end{tabular}\\
\caption{The sizes of the real-world datasets used for the experimental evaluation}
\label{tab:real-world-datasets-overview}
\end{center}
\end{table}
\begin{table}
\begin{center}
\begin{tabular}{rrrr}
\toprule
$k$
& $\alpha$
& Data points
& Dimensions
\\
\midrule
10
& 6
& 1,000,000
& 60
\\
20
& 5
& 3,200,000
& 100
\\
30
& 4
& 810,000
& 120
\\
40
& 4
& 2,560,000
& 160
\\
\bottomrule
\end{tabular}\\
\end{center}
\caption{The parameter values and the sizes of the benchmark instances used for the experimental evaluation.}
\label{tab:benchmark-instances-overview}
\end{table}
\subsubsection*{Data sets}
We conducted experiments on five real-world data sets
\textit{Census},
\textit{Covertype},
\textit{Tower},
\textit{Caltech},
\textit{NYTimes},
and four instances of our benchmark. Benchmark instances were generated to match approximately the sizes of the real-world data sets.
The sizes of the considered data sets are given in Table \ref{tab:real-world-datasets-overview}.
The \textit{Census}\footnote{\url{https://archive.ics.uci.edu/ml/datasets/US+Census+Data+(1990)}} dataset is a small subset of the Public Use Microdata Samples from 1990 US census. It consists of demographic information encoded as 68 categorical attributes of 2,458,285 individuals.
\textit{Covertype}\footnote{\url{https://archive.ics.uci.edu/ml/datasets/covertype}} is comprised of cartographic descriptions and forest cover type of four wilderness areas in the Roosevelt National Forest of Northern Colorado in the US. It consists of 581,012 records, 54 cartographic variables and one class variable. Although \textit{Covertype} was originally made for classification tasks, it is often used for clustering tasks by removing the class variable~\cite{AckermannMRSLS12}.
The data set with the fewest number of dimensions is \textit{Tower}\footnote{\url{http://homepages.uni-paderborn.de/frahling/coremeans.html}}. This data set consists of 4,915,200 rows and 3 features as it is a 2,560 by 1,920 picture of a tower on a hill where each pixel is represented by a RGB color value.
Inspired by~\cite{FGSSS13}, \textit{Caltech} was created by computing SIFT features from the images in the Caltech101\footnote{\url{http://www.vision.caltech.edu/Image_Datasets/Caltech101/}} image database. This database contains pictures of objects partitioned into 101 categories. Disregarding the categories, we concatenated the 128-dimensional SIFT vectors from each image into one large data matrix with 3,680,458 rows and 128 columns.
\textit{NYTimes}\footnote{\url{https://archive.ics.uci.edu/ml/datasets/bag+of+words}} is a dataset composed of the bag-of-words (BOW) representations of 300,000 news articles from The New York Times. The vocabulary size of the text collection is 102,660. Due to the BOW encoding, \textit{NYTimes} has a very large number of dimensions and is highly sparse. To make processing feasible, we reduced the number of dimensions to 100 using terminal embeddings.
\subsubsection*{Preprocessing \& Experimental Setup}
To understand how denoising effects the quality of the outputted coresets, we applied Principal Component Analysis (PCA) on \textit{Caltech}, \textit{Census}, \textit{Covertype}, and \textit{NYTimes} by using the $k$ singular vectors corresponding to the largest singular values.
We did not perform any preprocessing on \textit{Tower} due to its low dimensionality.
We followed the same experimental procedure with respect to the choice of parameter values for the algorithms as prior works~\cite{AckermannMRSLS12, FGSSS13}. For the target coreset size $T$, we experimented with $T=mk$ for $m = \{50, 100, 200, 500\}$. On \textit{Caltech}, \textit{Census}, \textit{Covertype}, and \textit{NYTimes}, we used values $k$ in $\{10, 20, 30, 40, 50\}$, while for \textit{Tower} we used larger cluster sizes $k \in \{20, 40, 60, 80, 100\}$. On the benchmark, we used $k \in \{10, 20, 30, 40\}$.
We implemented Sensitivity Sampling, Group Sampling, Ray Maker, and StreamKM++ in C++. The source code can be found on GitHub\footnote{\url{https://github.com/sheikhomar/eval-k-means-coresets}}. For BICO, we used the authors' reference implementation\footnote{\url{https://ls2-www.cs.tu-dortmund.de/grav/en/bico}}. The source code was compiled with gcc 9.3.0. The experiments were performed on a machine with Intel Core i9 10940X 3.3GHz 14-Core and 2x DDR4 PC3200 128GB RAM.
\begin{figure*}
\includegraphics[width=.65\linewidth]{figures/distortions-mean-Tower.pdf}
\newline \newline
\subfloat{
\includegraphics[width=.48\textwidth]{figures/distortions-mean-Covertype.pdf}
}
\subfloat{
\includegraphics[width=.48\linewidth]{figures/distortions-mean-Covertype+PCA.pdf}
}
\newline \newline
\subfloat{
\includegraphics[width=.48\textwidth]{figures/distortions-mean-Census.pdf}
}
\subfloat{
\includegraphics[width=.48\linewidth]{figures/distortions-mean-Census+PCA.pdf}
}
\newline \newline
\subfloat{
\includegraphics[width=.48\textwidth]{figures/distortions-mean-Caltech.pdf}
}
\subfloat{
\includegraphics[width=.48\linewidth]{figures/distortions-mean-Caltech+PCA.pdf}
}
\newline \newline
\subfloat{
\includegraphics[width=.48\textwidth]{figures/distortions-mean-NYTimes.pdf}
}
\subfloat{
\includegraphics[width=.48\linewidth]{figures/distortions-mean-NYTimes+PCA.pdf}
}
\newline \newline
\subfloat{
\includegraphics[width=0.165\textwidth]{figures/distortions-mean-Benchmark-k10.pdf}
\includegraphics[width=0.165\textwidth]{figures/distortions-mean-Benchmark-k20.pdf}
\includegraphics[width=0.165\textwidth]{figures/distortions-mean-Benchmark-k30.pdf}
\includegraphics[width=0.331\textwidth]{figures/distortions-mean-Benchmark-k40.pdf}
}
\caption{The average distortions of the evaluated coreset algorithms with coreset size $T=200k$ on five real-world data sets and on four benchmark instances. Black bars indicate standard deviations. Notice that the axis is non-linear as otherwise the bars for Sensitivity Sampling and Group Sampling would disappear on the plots as their distortions are close to 1.}
\label{fig:distortions}
\end{figure*}
\subsubsection*{Outcome of Experiments}
We observed that in the majority of our experiments, varying the coreset sizes does not significantly change the performance profiles of individual algorithms when comparing them against each other. Therefore, in the following sections, we focus on a cross-section of the experiments where $m=200$ i.e., coreset sizes $T=200k$.
For numerical results including variances of all the experiments and tables containing distortions, costs and running times, we refer to \cref{sec:distortions-tables}, \cref{sec:costs-tables} and \cref{sec:running-times-tables} in the appendix.
In~\cref{fig:distortions}, we summarized the distortions of the experiments with coreset sizes $T=200k$. All five algorithms are matched on the \textit{Tower} dataset. The worst distortions across the algorithms are close to 1, and performance between the algorithms is negligible. The performance difference between sampling-based and movement-based methods become more pronounced as the number of dimensions increase. On \textit{Covertype} with its 54 features, Ray Maker performs the worst followed by BICO and Group Sampling while Sensitivity Sampling and StreamKM++ perform the best. Differences in performance are more noticeable on \textit{Census}, \textit{Caltech}, and \textit{NYTimes} where methods based on importance sampling perform much better. Sensitivity Sampling and Group Sampling perform the best, StreamKM++ come in second while BICO and Ray Maker perform the worst across these data sets.
On the \textit{Benchmark}, Ray Maker is the worst while Sensitivity Sampling and Group Sampling are the best. StreamKM++ performs also very well compared to BICO.
\subsubsection*{Interpretation of Experimental Results}
{\bf Optimization versus Compression:}
While all five algorithms are equally matched when optimizing on the candidate coresets, coreset quality performance differ significantly (see~\cref{fig:distortions}).
For all data sets, the obtained costs differed insignificantly for all values of $k$, (see~\cref{sec:costs-tables} and \cref{fig:real-costs} in the appendix), irrespective of the coreset algorithm used, while distortions varied strongly, depending on the coreset algorithm.
Nevertheless, the cost drop with increasing values of $k$ is a predictor for the quality of certain coresets. It is not uncommon for the $k$-means cost of real-world data sets to drop significantly for larger values of $k$.
~\cref{fig:cost-curves-real-world-datasets} illustrates this behavior for several real-world data sets. The more the curve bends, the less of a difference there is between computing a coreset and a clustering with low cost. For data sets with an L-shaped cost curve, a coreset algorithm adding more centers to the coreset will seem to be performing well when evaluating it based on the outcome of the optimization.
\textit{Tower} is a good example of a data set where optimization is very close to compression. Its cost curve bends the most which indicates that adding more centers help reduce the cost. One of the strengths of the benchmark is that there is no way of reducing the cost without capturing the right subclusters within a benchmark instance. This means that the cost does not decrease markedly beyond a certain value of $k$ even if more centers are added, see~\cref{fig:cost-curves-benchmark} in the appendix.
For BICO, Ray Maker, and StreamKM++, there is a correlation between the steepness of the cost curve for a data set and the distortion of the generated coreset.
On data sets where the curve is less steep, we observed higher distortions. The effect is more pronounced for BICO and Ray Maker than for StreamKM++. Importance sampling approaches (Group Sampling and Sensitivity Sampling) seem to be free from this behavior as they consistently generate high quality coresets irrespective of the shape of cost curve.
\begin{figure}
\centering
\includegraphics[width=1\linewidth]{figures/cost-curves-real-world-datasets.pdf}
\caption{Depicts how clustering costs of five real-world data sets decrease as the number of centers increase.
Plotting the cost curve allows us to study whether we can observe a difference between coreset construction and optimization in a data set when evaluating a coreset based on cost.
}
\label{fig:cost-curves-real-world-datasets}
\end{figure}
{\bf Movement-based versus Sampling-based Approaches:}
In general, movement-based constructions perform the worst in terms of coreset quality.
We observed that BICO and Ray Maker have the highest distortions across all data sets including on the benchmark instances. Among the sampling-based algorithms, Sensitive Sampling performs well with Group Sampling generally being competitive. This runs contrary to theory where Group Sampling has the better (currently known) theoretical bounds. StreamKM++ is an interesting case. Like the movement-based methods, its distortion increases with the dimension. Nevertheless, it generally performs significantly better than BICO and Ray Maker. This can be attributed to the fact that the coreset produced by StreamKM++ consists entirely of $k$-means++ centers weighted by the number of points of a minimal cost assignment. This is similar to movement-based algorithms such as BICO. Nevertheless, it also retains some of the performance from pure importance schemes.
In practice as well as in theory, the distortion of movement-based algorithms are affected by the dimension. By comparison, sampling-based algorithms are affected very little. Theoretically, there should not exist a difference, as the sampling bounds are independent of the dimension. What little effect can be observed is likely due to PCA making it easier to find low cost solutions that form the backbone of all coreset constructions. StreamKM++ is an interesting case, as it is still affected by the dimension, though less than the other movement based methods.
A notable exception is the benchmark. Here, sensitivity sampling generally found the lowest cost clustering, with BICO finding the second lowest cost clustering (see \cref{tab:real-cost-mean-std-benchmark} in the appendix).
This happens \emph{despite} BICO generally having a worse distortion than for example Group Sampling or StreamKM++ (see \cref{tab:distortions-mean-std-benchmark} in the appendix).
{\bf Impact of PCA:}
On almost all our data sets, the performance improves when input data is preprocessed with PCA, especially for the movement-based algorithms. Empirically, the more noise is removed (i.e., small $k$ value), the lower the distortion. Notice that $k$ is the number of principal components that the input data is projected on to. The rest of the low variance components are treated as noise and removed. Method utilizing sampling (Group Sampling, Sensitivity Sampling and StreamKM++) are less effected by the preprocessing step. On \textit{Covertype}, PCA does not change the distortions by much because almost all the variance in the data is explained by the first five principal components (see~\cref{fig:explained-variance-pca}).
On \textit{Caltech} and \textit{NYTimes}, the quality of the coresets by BICO and Ray Maker improves greatly because the noise removal is more aggressive. Even if the quality is much better for movement-based coreset constructions due to PCA, importance sampling methods are still superior when it comes to the quality of the compression. Summarizing, all methods benefit from PCA, and in case of movement-based constructions, we consider PCA a necessary preprocessing step. For the sampling-based methods, the computational expense of using PCA in preprocessing does not seem justify the comparatively meager gains in coreset distortion.
\section{Introduction}
The design and analysis of scalable algorithms has become an important research area over the past two decades. This is particularly important in data analysis, where even polynomial running time might not be enough to handle proverbial \emph{big data} sets.
One of the main approaches to deal with the scalability issue is to compress or sketch large data sets into smaller, more manageable ones. The aim of such compression methods is to preserve the properties of the original data, up to some small error, while significantly reducing the number of data points.
Among the most popular and successful paradigms in this line of research are \emph{coresets} \cite{MunteanuS18}. Informally, given a data set $A$, a coreset $\Omega \subset A$ with respect to a given set of queries $Q$ and query function $f: A\times Q \rightarrow \mathbb{R}_{\geq 0}$ approximates the behaviour of $A$ for all queries up to some multiplicative distortion $D$ via $\sup_{q\in Q} \max\left( \frac{f(\Omega,q)}{f(A,q)},\frac{f(A,q)}{f(\Omega,q)}\right) \leq D.$
Coresets have been applied to a number of problems such as computational geometry \cite{AHV05,Chan09}, linear algebra \cite{IndykMGR20,maalouf2019fast}, and machine learning \cite{MMR21,MunteanuSSW18}. But the by far most intensively studied and arguably most successful applications of the coreset framework is the $k$-clustering problem.
Here we are given $n$ points $A$ with (potential unit) weights $w:A\rightarrow \mathbb{R}_{\geq 0}$ in some metric space with distance function $\text{dist}$ and aim to find a set of $k$ centers $C$ such that
\begin{equation*}
\text{cost}_A(C):= \frac{1}{n} \sum_{p\in A} \min_{c\in C} w(p)\cdot \text{dist}^z(p,c)
\end{equation*}
is minimized. The most popular variant of this problem is probably the $k$-means problem in $d$-dimensional Euclidean space where $z=2$ and $\text{dist}(x,y) = \sqrt{\sum_{i=1}^d (x_i-y_i)^2}$.
A $(k,\varepsilon)$-coreset is now a subset $\Omega\subset A$ with weights $w:\Omega\rightarrow \mathbb{R}_{\geq 0}$ such that for any set of $k$ centers $C$
\begin{equation}
\label{eq:coreset}
\sup_{C} \max\left( \frac{\text{cost}_A(C)}{\text{cost}_{\Omega}(C)},\frac{\text{cost}_{\Omega}(C)}{\text{cost}_{A}(C)}\right) \leq 1+\varepsilon.
\end{equation}
The coreset definition in \cref{eq:coreset} provides an upper bound for the distortion of all candidate solutions i.e., all possible sets of $k$ centers.
A \emph{weak coreset} is a relaxed guarantee that holds for optimal or nearly optimal clusterings of $A$ instead of all clusterings.
In a long line of work spanning the last 20 years
\cite{BecchettiBC0S19,BravermanJKW21,Chen09,Cohen-AddadSS21b,Cohen-AddadSS21,FeldmanL11,FeldmanSS20,
HaM04,HaK07,HuangJLW18,huang2020coresets,BravermanJKW21,
LangbergS10,SohlerW18}, the size of coresets has been steadily improved with the current state of the art yielding a coreset with $\tilde{O}(k \varepsilon^{-2} \cdot \min(d,k,\varepsilon^{-2}))$ points for a distortion $D\leq (1+\varepsilon)$ due to \cite{CLSS22}\footnote{We use $\tilde O(x)$ to hide $\log^c x$ terms for any constant $c$.}.
While we have a good grasp of the theoretical guarantees of these algorithms, our understanding of the empirical performance is somewhat lacking. There exist a number of coreset implementations, but it is usually difficult to assess which implementation summarizes the data best. To accurately evaluate a given coreset, we would need to come up with a $k$ clustering $C$ which results in a maximal distortion. Solving this problem is likely difficult: related questions such as deciding whether a 3-dimensional point set $A$ is an $\varepsilon$-net of a set $B$ with respect to convex ranges is co-NP hard \cite{GiannopoulosKWW12}.
It is similarly co-NP hard to decide whether a point set $A$ is a \emph{weak coreset} of a point set $B$ (see \cref{prop:hardness} in the appendix).
Due to this difficulty, a common heuristic for evaluating coresets is as follows~\cite{AckermannMRSLS12,FGSSS13}. First, compute a coreset $\Omega$ with the available algorithm(s) using some input data $A$. Then, run an optimization algorithm on $\Omega$ to compute a $k$ clustering. The \emph{best} coreset algorithm is considered to be the one which yields a clustering with the smallest cost.
This practice has substantial drawbacks.
The first is that this evaluation method conflates the two separate tasks of coreset construction and optimization.
It is important to note that the first step of virtually all coreset algorithms is a low-cost (bicriteria) constant factor approximation, i.e. a solution with $\beta\cdot k$ clusters that costs at most $\alpha\cdot \text{OPT}$, where $\text{OPT}$ is the cost of an optimal $k$ clustering.
Given that this initial solution has an $\alpha$ approximation to the cost, a routine calculation shows that the additive error of the coreset, i.e. the maximum difference
$ \left\vert \text{cost}_A(C) - \text{cost}_B(C) \right\vert $
over all solutions $C$ is at most $O(\alpha)\cdot \text{cost}_A(C)$.
In particular, in the case that the initial bicriteria approximation has $\alpha \ll 2$, which is not too difficult to achieve with more than $k$ centers, any $\gamma$ approximation algorithm will find solutions with approximation factor $O(\gamma + \alpha) \cdot\text{OPT}$. In particular, the distortion may be unbounded, for example if $B$ only consists of the $k$ centers, while simply returning $B$ itself yields a low cost clustering. Thus, it is difficult to measure coreset quality in this way.
The second drawback is that this practice will mainly measure the performance of the optimization algorithm, rather than the performance of the coreset algorithms. During its execution it might simply not consider any solution with high distortion. For example, if the approximation factor $\gamma$ of the solution returned by the algorithm is large then this solution (as well as any even higher cost solution considered during the algorithm’s execution) will have a low distortion.
The third drawback of this evaluation method is that it does not consider the main use cases of coresets, nor the full power of their guarantee. Indeed, if speeding up the computation of an optimization algorithm, one would hardly need a strong coreset; approximating the cost of every candidate solution, as weaker coreset definitions (or indeed a bicriteria approximation) would be suitable as well. A coreset's main and most powerful feature is \emph{composability}, i.e. given two disjoint point sets $X$ and $Y$, the union of a coreset of $X$ and a coreset of $Y$ is a coreset. Composability is what enables coresets to scale to massively parallel computation models and enables simple streaming algorithms via the merge and reduce technique. To which degree a coreset is composable is generally not a property of an optimal clustering of the point set, as optimal solutions $C_X$ of $X$ or $C_Y$ of $Y$ may have little in common with an optimal solution of $X\cup Y$.
The purpose of this study is to systematically evaluate the quality of various coreset algorithms for $k$-means. As such, we develop a new evaluation procedure which estimates the distortion of coreset algorithms. On real-world data sets, we observe that while the evaluated coreset algorithms are generally able to find solutions with comparable costs, there is a stark difference in their distortions. This shows that differences between optimization and compression are readily observable in practice.
As a complement to our evaluation procedure on real-world data sets, we propose a benchmark framework for generating synthetic data sets. We argue why this benchmark has properties that results in hard instances for all known coreset constructions. We also show how to efficiently estimate the distortion of a candidate coreset on the benchmark.
|
\section{Introduction}
\begin{itemize}
\item (1p) background
\begin{itemize}
\item describe speech translation
\item conventional method: cascaded approach
\item e2e method
\begin{itemize}
\item description
\item benefits compared to cascaded approach
\end{itemize}
\item data scarcity issue with e2e method
\item one common solution: pre-train and transfer learning \mich{(set the scene for section 2)}
\begin{itemize}
\item description: pre-train a speech encoder with asr objective (optionally pre-train a text decoder)
\item more recently, xx attach wav2vec 2 and mBart, which essentially leverage abundant ASR and MT data
\end{itemize}
\end{itemize}
\item (1p) problems
\begin{itemize}
\item Yet, a major problem remains: modality difference between speech (speech encoder) and text (text decoder)
\item Characteristics of speech compared to text
\begin{itemize}
\item long
\item variations of speech
\end{itemize}
\end{itemize}
\item (1p) What people have done to solve the problems
\begin{itemize}
\item To bridge the modality differences, there are two lines of research: 1) use of text encoder; 2) length reduction.
\item Use of text encoder: either sequential or parallel to speech encoder
\begin{itemize}
\item related works
\item drawbacks
\end{itemize}
\item length reduction: fixed/dynamic length reduction
\begin{itemize}
\item related works (although some are proposed to address the challenges with speech, they effectively bridge the modality gap between speech and text.)
\item drawbacks
\end{itemize}
\end{itemize}
\item (1p) Our method
\begin{itemize}
\item Purpose
\item Proposed method
\begin{itemize}
\item description of our method
\item benefits of TransLReducer include: 1) allow more precise attention (when and where to attend) from higher-level granularity level via aggregating acoustic features; 2) obtain higher-level semantic information
\end{itemize}
\item results
\item (optional) contributions
\end{itemize}
\end{itemize}
\section{Preliminaries}
\subsection{ST with pre-trained models}
\begin{itemize}
\item (1p) motivation for using pre-trained model
\begin{itemize}
\item description, specific to addressing the data scarcity issue
It is not always possible to train a ST model from scratch successfully, due to limited ST corpora and computation resources.
Using pre-training fine-tuning for ST is a promising direction. In essence, pre-trained models leverage massive amounts of data and thus provide a good initiation point either as an acoustic encoder or as a text decoder. It's particularly beneficial to low-resource ST.
\item
\end{itemize}
\item (1p) description of iwslt-architecture
\begin{itemize}
\item wav2vec 2
\item mBart
\item coupled modules
\end{itemize}
\end{itemize}
\subsection{Transformer Block}
\begin{itemize}
\item multi-head attention
\end{itemize}
In our work, we investigate how to utilise pre-trained models with our novel transformer layer.
\section{Proposed Method: Transformer-based Length Reducer}
\ref{fig:arch}
\begin{figure*}[t]
\centering
\includegraphics[width=0.8\linewidth]{LaTeX/figures/our_arch.png}
\caption{Overview of TransLReducer. A: TransLReducer. B:reduced scaled dot-product attention. C: multi-head reduced attention }
\label{fig:arch}
\end{figure*}
\subsection{Multi-head reduced attention}
\section{Experiments}
\begin{itemize}
\item Data
\item Model settings and evaluation
\item Baselines
\begin{itemize}
\item LNA-E,D (multi-lingual ST)
\item iwslt21 \mich{[iwslt21's architecture is adapted from above baseline]}
\item modified-iwslt21 - replace 3-layer-cnn length adaptor with 3-layer vanilla transformer
\end{itemize}
\item Results
\begin{itemize}
\item Table \ref{tab:focus}
\begin{itemize}
\item major modules in encoder: 1) feature extractor; 2) self attention; 3) layer norm 4) ffn
\item part vs full:
\end{itemize}
\item Table \ref{tab:low}
\item Table \ref{tab:3lang}
\item Table \ref{tab:cnn}
\item \mich{[due to the page limit, most likely we can only have maximum two of table 2,3,4.]}
\end{itemize}
\end{itemize}
\begin{table*}[!t]
\centering
\small
\scalebox{0.5}
{
\begin{tabular}{p{5cm}|p{2cm}||p{2cm}||p{2cm}||p{2cm}||p{2cm}||p{2cm}||p{2cm}||p{5cm}}
\toprule
Model & no. encoder params & no. encoder trained-params & no.layers x no.params per length adapter layer & no. layers x no. trained params per length adapter layer & time & BLEU & loss\# & notes \\
\midrule
\textit{Baselines} \\
w2v-ada-CNN & 331.7M & 318.6M & 1 x 3.1M & 1 x 3.1M & & 26.51 & \url{node2; mustc_only_lna_ed_adapt_1step}\\
w2v-ada-Transformer & 361.6M & 348.5M & 3 x 12.6M & 3 x 12.6M & & training & & \url{mustc_only_ordinary_trans_adapt_1step_3_block_mod} \\
w2v-ada-Conformer & & & & & & & \\
\hline
\textit{full wav2vec 2} \\
24 w2v layers + adapter + 1 mAda - k8s8 & 370.0M & 356.8M & 1 x 46.1M & 1 x 46.1M & & 27.99 & 170.74 &\url{mustc_only_multiscale_adapt_1step_1_1layer_block_mod; did not touch decoder} \\
24 w2v layers + adapter + 3 mAda - k3s2 & & & & & & training unstable - need to train with fp32 & &\url{mustc_only_multiscale_adapt_1step_1_block_mod; did not touch decoder} \\
\hline
\textit{reduced wav2vec 2}\\
16 w2v layers + adapter + 1 mAda -k9s8 & 273.4M & 260.3M & 1 x 50.0M & 1 x 50.0M & & 26.49 & & \url{mustc_only_multiscale_adapt_1step_16+1layer_block_mod} \\
16 w2v layers + adapter + 3 mAda -k3s2 & 298.7M & 285.5M & 3 x 25.2M & 3 x 25.2M & & & & \url{mustc_only_multiscale_adapt_1step_16+3layer_block_mod}\\
16 w2v layers + adapter + 1 mAda -k9s8 + sam\_optimizer \\
16 w2v layers + adapter + 1 mAda -k9s8 + flood \\
\bottomrule
\end{tabular}
}
\caption{configurations: 1) free w2v (except feature extractor), not decoder; 2) train in one step for fair comparison; 3) model tested on the ckp with the best dev loss. \mich{Purpose: 1) keep trained params at the same level; 2) modified-iwslt21-3T even has more params.}
}
\label{tab:free}
\end{table*}
\begin{table*}[!t]
\centering
\small
\scalebox{0.5}
{
\begin{tabular}{p{5cm}|p{2cm}||p{2cm}||p{2cm}||p{2cm}||p{2cm}||p{2cm}||p{2cm}||p{5cm}}
\toprule
Model & no. encoder params & no. of encoder trained-params & no. layer x no. params per length adapter layer & no.layer x no. trained params per length adapter layer & time & BLEU (DE/ES/FR) & loss\# & notes \\
\midrule
\addlinespace[0.3em]
\textit{Baselines} \\
w2v-ada-CNN (replicated) & 331,702,912 & 117,128,192 & 3 x 3,146,752 & 3 x 3,146,752 & & 26.12 & -&- \\
w2v-ada-Transformer &361,623,168 & 147,048,448 & 12,596,224&12,596,224 & & 25.41 & & \url{step1: mustc_only_ordinary_trans_adapt_2step_1_block_mod; step2: mustc_only_ordinary_trans_adapt_2step_2_block_mod} \\
w2v-ada-Conformer & & & & & & & & \\
\hrule
\textit{full w2v - M-adapter - k3s2 or k8s8}\\
24 w2v layers + adapter + 1 mAda & 374,183,552 & 159,608,832& 50,349,056 & 50,349,056 & & & &\url{step1: mustc_only_multiscale_adapt_2step_1_1layer_block_mod; step2: mustc_only_multiscale_adapt_2step_2_1layer_block_mod} \\
24 w2v layers + adapter + 3 mAda & 399,384,192 & 184,809,472 & 25,183,232 & 25,183,232 & & & & \url{step1: mustc_only_multiscale_adapt_2step_1_block_mod; step2: mustc_only_multiscale_adapt_2step_2_block_mod} \\
24 w2v layers + adapter + 3 mAda (part at step1) & & & & & & & & node5; \url{mustc_only_multiscale_adapt_2step_1_block_mod_ms_cnn_only; mustc_only_multiscale_adapt_2step_2_block_mod_ms_cnn_only} \\
24 w2v layers + adapter + 1 mAda (part at step1) & & & & & & running & & node01; \url{bash train_adapter_2steps.sh mustc_only_multiscale_adapt_2step_1_1layer_block_mod_ms_cnn_only; bash train_adapter_2steps.sh ; mustc_only_multiscale_adapt_2step_2_1layer_block_mod_ms_cnn_only 4} \\
\mich{above didn't produce 27 bleu score; above results are based on train step1-full and step2-full} \\
24 w2v layers + adapter + 3 mAda (org: part at step1) & 399,384,192 & 184,809,472& 25,183,232& 25,183,232 & & 27.13 & & node3; \url{step2: mustc_only_multiscale_adapt_2step_2_freeze_less_from2; step2 free ffn, while at the orginal step2, did not free ffn} \\
\hrule
\textit{full w2v - M-adapter (no ffn) - k3s2 or k9s8}\\
24 w2v layers + adapter + 1 mAda & & & & & & & & \\
24 w2v layers + adapter + 3 mAda & & & & & & 26.75 & & \url{mustc_only_multiscale_adapt_2step_2_freeze_less_from2_no_ffn} \\
\hrule
\textit{reduced wav2vec 2}\\
16 w2v layers + adapter + 8 mAda & & & & & & & & node5; fp32, otherwise training unstable; \\
16 w2v layers + adapter + 1 mAda & 273,413,760 & 125,988,864 &50,349,056 & 50,349,056& & 26.51 & 172.928 & \url{step1: mustc_only_multiscale_adapt_2step_1_16+1layer_block_mod; step2: mustc_only_multiscale_adapt_2step_2_16+1layer_block_mod} step1 loss decreases faster\\
16 w2v layers + adapter + 3 mAda & 298,614,400 & & 25,183,232 & 25,183,232 & & - & & \url{step1: mustc_only_multiscale_adapt_2step_1_16+3layer_block_mod_sd612_big_batch; step2: mustc_only_multiscale_adapt_2step_2_16+3layer_block_mod} \url{note: mustc_only_multiscale_adapt_2step_1_16+3layer_block_mod training unstable at 2k updates; change seed} \\
\mich{[above results are based on train step1-full and step2-full.]}
\hrule
\textit{full/part wav2vec 2 - share cnn} \\ \mich{leave till the last. based on the best hyper-params} \\
\bottomrule
\end{tabular}}
\caption{ mAda: M-Adapter layer(s). \# trained params for decoder.
}
\label{tab:focus}
\end{table*}
\begin{table*}[!t]
\centering
\small
\scalebox{1}
{
\begin{tabular}{lccc}
\toprule
& &BLEU \\
Model & High (400hours = 200k) & Mid (80hours = 40k) & Low (20hours = 10k) \\
\midrule
\addlinespace[0.3em] \\
\textit{Baseline} \\
iwslt21 \\
\hline
\textit{Proposed}\\
Model 1 (full w2v) \\
Model 2 (reduced w2v) \\
\bottomrule
\end{tabular}
}
\caption{Performance of proposed methods in high-, mid-, low-resource settings. X hours = X' data points.
}
\label{tab:low}
\end{table*}
\begin{table*}[h]
\centering
\small
\scalebox{1}
{
\begin{tabular}{lccc}
\toprule
& &BLEU \\
Model & DE & Lang2 & Lang3 \\
\midrule
\textit{Baseline} \\
iwslt21 \\
\hline
\textit{Proposed}\\
Model 1 (best) \\
\bottomrule
\end{tabular}
}
\caption{BLEU for EN\rightarrow{DE}, EN\rightarrow{Lang2}, EN\rightarrow{Lang3}
}
\label{tab:3lang}
\end{table*}
\begin{table*}[h]
\centering
\small
\scalebox{1}{
\begin{tabular}{lcccc}
\hline
Kernel & 8 & 9 & & \\
\hline
Stride & 8 & 8 & & \\
\hline
BLEU &27.99 & & & \\
\hline
\hline
\end{tabular}}
\caption{Given mAda=\#(e.g., 1), effects of different degree of compression(i.e., effect of bottleneck constraining the amount of information passing to the decoder.), free w2v or not?.}
\label{tab:cnn}
\end{table*}
\section{Analysis}
\mich{Conduct experiments based on analysis to be done}
\subsection{High-, Mid-, Low-resource settings !!!}
\subsection{Full or partial w2v !!!}
\subsection{Shared cnn pooling module}
\subsection{Use of adapter}
\subsection{Number of TransLReducer layers} \mich{[may leave to future work?]}
\subsection{Fully or partially trained TransLReducer}
\subsection{Compression factor}
$r=|encoder output|/|decoder output|$
\begin{itemize}
\item $r >= 1$
\item $r < 1$
\end{itemize}
\section{results-backups}
\begin{table*}[!t]
\centering
\small
\scalebox{0.5}
{
\begin{tabular}{p{5cm}|p{2cm}||p{2cm}||p{2cm}||p{2cm}||p{2cm}||p{2cm}||p{2cm}||p{5cm}}
\toprule
Model & no. encoder params & no. of encoder trained-params & no. layer x no. params per length adapter layer & no.layer x no. trained params per length adapter layer & time & BLEU (DE/ES/FR) & loss\# & notes \\
\midrule
\addlinespace[0.3em]
\textit{Baselines} \\
W2V2-CNN-mBart (replicated) \mich{iwslt's} & 331.7M & 117.1M & 3 x 3.1M & 3 x 3.1M & & 26.12 & -&- \\
W2V2-TRANS-mBart &361.6M & 147.0M & 3 x 12.6M & 3 x 12.6M & & 26.56 & & \url{step1: mustc_only_ordinary_trans_adapt_2step_1_block_mod; step2: mustc_only_ordinary_trans_adapt_2step_2_block_mod} \\
XSTNet & & & & & & 25.5 & & \\
\hrule
\textit{full w2v - M-adapter - k3s2 or k8s8} \\
24 w2v layers + adapter + 3 mAda (org: part at step1) & 399.4M & 184.9M & 3 x 25.2M& 3 x 25.2M & & 27.13 & & \url{step2: mustc_only_multiscale_adapt_2step_2_freeze_less_from2; step2 free ffn, while at the orginal step2, did not free ffn} replicating with config \url{ms_adapt_2step_2_block_mod}
\\
24 w2v layers + adapter + 1 mAda (org: part at step1) & 367.0M & 147.0M & 1 x 46.1M & 1 x 46.1M & & 27.07 & & 27.07 is based on old ckp. replicating with config \url{} \\
\bottomrule
\end{tabular}}
\caption{ mAda: M-Adapter layer(s). no, trained params for decoder: 50.5M out of 458.7M.
}
\label{tab:focus}
\end{table*}
\begin{table*}[!t]
\centering
\small
\scalebox{0.5}
{
\begin{tabular}{p{5cm}|p{2cm}||p{2cm}||p{2cm}||p{2cm}||p{2cm}||p{2cm}||p{2cm}||p{5cm}}
\toprule
Model & no. encoder params & no. encoder trained-params & no.layers x no.params per length adapter layer & no. layers x no. trained params per length adapter layer & time & BLEU & loss\# & notes \\
\midrule
\textit{Baselines} \\
W2V2-CNN-mBart \mich{iwslt's} & 331.7M & 318.6M & 1 x 3.1M & 1 x 3.1M & & \mich{26.45 (2-step) // 26.51 (1-step)} & &\url{2-step: /mustc_only_lna_ed_adapt_2step_2_free_w2v; 1-step mustc_only_lna_ed_adapt_1step}\\
W2V2-TRANS-mBart & 361.6M & 348.5M & 3 x 12.6M & 3 x 12.6M & & \mich{26.91 (2-step); 1-step unstable } & & \url{mustc_only_ordinary_trans_adapt_2step_2_block_mod_from2_free_w2v} \\
XSTNet & & & & & & & \\
\hline
\textit{full wav2vec 2 - 1 step} \\
24 w2v layers + adapter + 1 mAda - k8s8 & 370.0M & 356.8M & 1 x 46.1M & 1 x 46.1M & & \mich{ 27.60 (2-step) // 27.99 (1-step)} & 170.74 &\url{2-step:rep_m3_full_w2v_amda_mustc_only_multiscale_adapt_1layer_2step_2 // 1-step: mustc_only_multiscale_adapt_1step_1_1layer_block_mod; did not touch decoder} \\
24 w2v layers + adapter + 3 mAda - k3s2 &399.4M & 386.3M& & 3 x 25.0M & 3 x 25.0M & \mich{27.73 (2-step) // if 1-step, unstable} & &\url{mustc_only_multiscale_adapt_2step_2_freeze_less_from2_free_w2v}\\
\hline
\bottomrule
\end{tabular}
}
\caption{configurations: 1) free w2v (except feature extractor), not decoder; 2) train in one step for fair comparison; 3) model tested on the ckp with the best dev loss.
}
\label{tab:free}
\end{table*}
\begin{table}[h]
\centering
\small
\scalebox{1}
{
\begin{tabular}{lccc}
\toprule
& &BLEU \\
Model & DE & ES & FR \\
\midrule
\textit{Baseline} \\
W2V2-CNN-mBart & 26.12 & \mich{filled by Hao} & \mich{filled by Hao} \\
\hline
\textit{Proposed}\\
Model 1 (best) & 27.13 & & \\
\bottomrule
\end{tabular}
}
\caption{
BLEU for EN $\rightarrow$ DE, EN$\rightarrow$ES, EN$\rightarrow$FR
}
\label{tab:3lang}
\end{table}
\begin{table}[!t]
\centering
\small
\scalebox{0.7}
{
\begin{tabular}{lccc}
\toprule
& &BLEU \\
Model & High (400hours = 200k) & Mid (80hours = 40k) & Low (40hours = 20k) \\
\midrule
\addlinespace[0.3em] \\
\textit{Baseline} \\
W2V2-CNN-mBart & 26.12 & \mich{filled by Hao} & \mich{filled by Hao} \\
\hline
\textit{Proposed}\\
Model 1 & 27.13 & 21.89 & training (but won't be good results) \\
\bottomrule
\end{tabular}
}
\caption{Performance of proposed methods in high-, mid-, low-resource settings. X hours = X' data points. \mich{TODO: add extra columns for out-of-domain data, e.g., europarl test data}
}
\label{tab:low}
\end{table}
\begin{table}[h]
\centering
\small
\scalebox{0.8}{
\begin{tabular}{lcccc}
\hline
Kernel & 8 & 8 & 8 & 8 \\
\hline
Stride & 8 & 6 & 4 & 2 \\
\hline
BLEU & 27.07 & 26.79 & 26.51 & 26.10 \\
\hline
\hline
\end{tabular}}
\caption{Given mAda=\#(e.g., 1), effects of different degree of compression(i.e., effect of bottleneck constraining the amount of information passing to the decoder.). partially free w2v
}
\label{tab:comp}
\end{table}
\begin{table}[h]
\centering
\small
\scalebox{0.8}{
\begin{tabular}{lcc}
\hline
Model & BLEU \\
\hline
Ours - mAda & 27.13 \\
\hline
Ours - pooling-start & \\
\hline
Ours - pooling-mid & \\
\hline
Ours - pooling-end & \\
\hline
\hline
\end{tabular}}
\caption{Ablation study
}
\label{tab:abs}
\end{table}
\begin{table}[!t]
\centering
\small
\scalebox{0.7}
{
\begin{tabular}{lcccc}
\toprule
& & &BLEU \\
Zero-out position & \% & W2V2-CNN & W2V2-mAda^\textit{1} & W2V2-mAda^\textit{3} \\
\midrule
signal level
& \begin{tabular}{@{}c@{}}10 \\ 20 \\ 50\end{tabular}
& \begin{tabular}{@{}c@{}} \\ \\ \end{tabular}
& \begin{tabular}{@{}c@{}} 22.68 \\ 20.05 \\ 8.83 \end{tabular}
& \begin{tabular}{@{}c@{}} 22.65 \\ 20.27 \\9.22 \end{tabular} \\
\hline
W2V2 level
& \begin{tabular}{@{}c@{}}10 \\ 20 \\ 50\end{tabular}
& \begin{tabular}{@{}c@{}} \\ \\ \end{tabular}
& \begin{tabular}{@{}c@{}} 26.10 \\ 23.27 \\ 1.10 \end{tabular}
& \begin{tabular}{@{}c@{}} 26.46 \\ 24.89 \\ 9.69 \end{tabular} \\
\bottomrule
\end{tabular}
}
\caption{Perturb data at different levels with various perturbation ratios: signals, W2V2 and adapter.
}
\label{tab:low}
\end{table}
\section{Conclusion}
\end{document}
\section{Acknowledgements}
\clearpage
\bibliographystyle{IEEEtran}
\section{Introduction}
\label{sec:introduction}
Speech-to-text translation (ST) is the task of translating audio signals in one language
to text in a foreign language. It has been conventionally approached with
a cascaded architecture comprising automatic speech recognition (ASR) and machine
translation (MT) components. The more recent end-to-end (E2E) approach has attracted great attentions, which involves an audio encoder taking audio signals as input and a text decoder producing a translated text.
The E2E approach alleviates the issues of error propagation and high latency with
in the cascaded methods
\cite{sperber2020speech, chen2021specrec}. That said, the E2E approach often requires large amounts of paired audios and translated text, which is not available
for most language pairs. A common practice to remedy the data scarcity issue is to pre-train the audio encoder and text decoder, and initialize the ST model with the pre-trained encoder and decoder~\cite{weiss2017sequence,tang2021improving}. Successful developments in this direction were made
by utilizing a pre-trained wav2vec 2 ~\cite{baevski2020wav2vec} as an audio encoder, and the decoder of mBart~\cite{liu2020multilingual} as a text decoder in state-of-the-art (SOTA) ST systems~\cite{gallego2021end, li2020multilingual}.
However,~this method suffers from two inherent bottlenecks mainly due to the modality differences between speech and text:~(i)~Audio signals are several orders of magnitude longer than their transcripts, and they contain lots of redundancy~\cite{zhang2020adaptive}, aggravating the alignment difficulty between speech outputs and text input, and~(ii) compared to text, audio signals exhibit a much higher degree of variations caused by speaker and noise which amounts to learning difficulties. We frame both issues under~\emph{modality gap} between speech and text representations.
There are two lines of research to bridge the modality gap.
On the one hand, prior works propose feature selection modules to compress speech length. \cite{gallego2021end, wang2020fairseq} use convolutional neural networks (CNNs) to collapse a fixed number of adjacent feature vectors into a single one. Yet, CNNs only model local information, thus exposing the risk of information loss \cite{gulati2020conformer}. \cite{zhang2020adaptive, salesky2020phone,gaido2021ctc} propose to select important features dynamically, but they require transcriptions or phonemes, which may not exist for all language pairs \cite{chen2021specrec}.
Alternatively, a text encoder can be attached to an audio encoder in a serial or parallel fashion \cite{xu2021stacked, liu2020bridging, wang2020bridging} or be integrated with an acoustic encoder, forming a unified encoder \cite{ye2021end, tang2021improving, zheng2021fused,han2021learning}. However, this approach is either coupled with a feature selection module, or requires large amounts of ASR and MT data, which makes training inefficient.
\begin{figure}[t]
\centering
\includegraphics[width=0.7\linewidth]{figures/f1a.pdf}
\caption{Overview of M-Adapter.}
\label{fig:arch}
\end{figure}
In this work, we aim to lift the modality gap between speech and text via reducing speech length and generating features more desirable for translation. Considering that Transformer \cite{vaswani2017attention} has achieved huge success in applications in various domains, we are motivated to unleash its potential further by adapting it to be a modality adapter.
We propose M-Adapter, a Transformer-based architecture combined with convolutional layers, which models global and local dependencies of speech features while shrinking speech sequences. Figure \ref{fig:arch} depicts M-Adapter.
The key to M-Adapter is Multi-head Pooled Self-Attention (MPSA), inside which convolution layers pool $Q$, $K$, $V$ matrices, linearly projected from input $X$, to intermediate matrices. An additional pooling module is applied to $X$. Together, they reduce the dimentionality of $X$
as the output of the current layer, mitigating the aformentioned length mismatch issue.
Moreover, Transformer exploits long-range global context, while convolution layer is good at modeling local features; our hypothesis is a combination of the two establishes global and local interactions, which is essential for producing higher-level features desired for ST.
Our main contributions are:
\begin{itemize}
\item This is the first work on utilizing a Transformer architecture to reduce length and adapt features of a speech sequence for ST. We highlight the importance of establishing global and local interactions via self-attention and convolutions, hoping to improve our understanding of feature generation for ST.
\item Without using any additional data, our model outperforms strong baselines across 3 Must-C language pairs, with an average improvement of 0.78 BLEU scores.
\item M-Adapter helps to reduce the performance gap in various resource conditions by a large margin.
\end{itemize}
\section{Preliminaries}
\label{sec:Preliminaries}
\subsection{Transformer}
Transformer \cite{vaswani2017attention} is a highly modularized neural network, consisting of several Transformer blocks. Each block has two main modules, i.e., a multi-head self-attention (MSA) layer and a feedforward layer (FFN). MSA accepts an input sequence from the previous block and considers the relevance of features at other positions while it is being applied to a certain position. FFN performs non-linear transformation on these features to produce an output sequence for the next block. The two modules are wrapped by residual connection and layer normalization. Each Transformer block does not change the output sequence length. We refer readers to the original papers for details.
\subsection{Pre-trained models}
It is not always possible to train a ST model from scratch successfully, due to limited ST corpora and computation resources. Leveraging pre-trained models trained on massive data is a promising direction, as they serve as good initiation points. It is particularly beneficial for low-resource ST. Naturally, this requires a pre-trained acoustic encoder and a pre-trained text decoder.
\textbf{Pre-trained speech encoders.} Pre-trained models have been explored in the speech domain, to encode general-purpose knowledge. Typical methods include generative learning \cite{chorowski2019unsupervised,chen2019audio,ling2020decoar}, multi-task learning \cite{ravanelli2020multi} and discriminative learning \cite{baevski2020wav2vec,oord2018representation}. Theses acoustic models (most are Transformer-based) are trained with well-designed objective functions during the pre-training phase and used as a standalone acoustic encoder for downstream tasks.
\textbf{Pre-trained text decoders.} Pre-training a text decoder can be done independently (e.g., GPT2 \cite{radford2019language}) or jointly with an encoder for sequence-to-sequence tasks (e.g., mT5 \cite{xue2021mt5}, mBart \cite{liu2020multilingual}). With the former approach, after the pre-training phase, the text decoder needs to be fused with additional encoders or adapters \cite{sun2021multilingual}, which increases the complexity of architectures. For the latter approach, the decoder component can usually be used as an individual module without architectural modifications.
\section{Conclusion}
\label{sec:Conclusions}
We propose M-Adapter, a novel Transformer-based architecture to lift the modality gap between speech and text representations.
We demonstrate the importance of reducing speech length and that of establishing global and local interactions via a combination of Transformer and convolution layers in producing high-level speech features that are more suitable for ST. Our method surpasses strong baselines by a large margin.
\section{Analysis}
\label{sec:Analysis}
\subsection{Impact of Length Reduction}\label{sec:len}
Table \ref{tab:comp} demonstrates the impact of the amount of length compression on the final results. To control our settings (e.g., model size), we experiment with W2V2-mAda$_\textit{1}$-mBart, keep the kernel size constant, and vary stride from 2 to 8. We set the compression cap to 8, because beyond 8 the length of a shrunk sequence will be less than that of the corresponding text sequence.~Given the module size, constant improvements in BLEU are observed as stride increases, implying a great deal of redundancy in speech representations and the necessity of compressing them.
\vspace{-1mm}
\begin{table}[h]
\centering
\small
\scalebox{0.8}{
\begin{tabular}{lcccc}
\toprule
Kernel & 8 & 8 & 8 & 8 \\
\midrule
Stride & 8 & 6 & 4 & 2 \\
\midrule
BLEU & 27.00 & 26.79 & 26.51 & 26.10 \\
\bottomrule
\end{tabular}}
\caption{Varied degree of compression for W2V2-mAd$_\textit{1}$-mBart.
}
\vspace{-4mm}
\label{tab:comp}
\end{table}
\subsection{Global and Local Interactions}
We investigate why our method is superior than the baselines.
We hypothesize that M-Adapter does more than length reduction; more fundamentally, it builds good global and local interactions, via a combination of Transformer and convolutional layers in that the former excels at modelling global context and the latter at capturing fine-grained, local features.
\noindent\textbf{Positions of Pooling Modules}: To validate our hypothesis, we conduct ablation study on W2V2-mAda$_\textit{3}$-mBart by changing the positions of the pooling modules inside M-Adapter, i.e., pooling takes place (1) before MAS (b4p); (2) before feedforward (b4f); and 3) after the second layernorm (b4o).
The BLEU scores for these variants are 26.27 (b4p), 25.38 (b4f) and 24.94 (b4o), compared to the current result (27.13).
This suggests that local and global information are well blended at this position.
\noindent\textbf{Removal of Global Capacity}:
To further investigate the global capacity of M-Adapter, we remove MPSA at the inference time and let M-Adapter perform local aggregation only. Our results show that the performance of W2V2-mAda$_\textit{3}$-mBart drops from 27.13 to 26.84, highlighting the significance of considering long-range information in producing better speech features. MPSA, complemented by FFN and other components, performs better than bare CNN layers as in the baseline.
\noindent\textbf{Perturbation on Representations}:
For the purpose of examining the quality of representations, we deliberately perturb speech features at the inference time at two levels, i.e., the output of W2V2 and the outputs of the adapters, at ratios of 10\%, 20\% and 50\%. Table \ref{tab:robust} compares the perturbation effects on W2V2-cnn-mBart and W2V2-mAd$_\textit{3}$-mBart. On the one hand, perturbation at the W2V2-level has bigger impacts on the latter than the former. We conjecture that the reason is that perturbing vectors at this level breaks the global and local linkage established by M-Adapter. On the other hand, perturbation at the adapter-level has less influence on W2V2-mAd$_\textit{3}$-mBart than W2V2-cnn-mBart. We believe this is because each vector produced by M-Adapter contains both local (with convolution layer) and global (with self-attention) information. When vectors are corrupted, the information carried in them can be inferred from the uncorrupted ones.
Effectively, more information is preserved in remaining vectors with M-Adapter than CNN, thus making M-Adapter more robust.
\begin{table}[!t]
\centering
\small
\scalebox{0.8}
{
\begin{tabular}{lccc}
\toprule
& & \multicolumn{2}{c}{Model} \\
Perturb. & \% & W2V2-cnn-mBart & W2V2-mAd$_\textit{3}$-mBart \\
\midrule
none & - & 26.12 & 27.13 \\
\midrule
W2V2
& \begin{tabular}{@{}c@{}} 10 \\ 20 \\ 50\end{tabular}
& \begin{tabular}{@{}c@{}} 25.53 \textcolor{blue}{(2\%)}\\ 24.27 \textcolor{blue}{(7\%)}\\ 12.72 \textcolor{blue}{(51\%)}\\ \end{tabular}
& \begin{tabular}{@{}c@{}} 26.46 \textcolor{blue}{(2\%)} \\ 24.89 \textcolor{blue}{(8\%)}\\ 9.69 \textcolor{blue}{(64\%)} \end{tabular} \\
\midrule
adapter
& \begin{tabular}{@{}c@{}} 10 \\ 20 \\ 50\end{tabular}
& \begin{tabular}{@{}c@{}} 23.78 \textcolor{blue}{(9\%)}\\ 20.08 \textcolor{blue}{(23\%)}\\ 9.58\textcolor{blue}{(63\%)}\\ \end{tabular}
& \begin{tabular}{@{}c@{}} 25.25 \textcolor{blue}{(7\%)} \\ 23.00 \textcolor{blue}{(15\%)}\\ 12.71 \textcolor{blue}{(53\%)} \end{tabular} \\
\bottomrule
\end{tabular}
}
\caption{BLEU scores with perturbation on representations at W2V2 and Adapter outputs, with different ratios.
\textcolor{blue}{$(\downarrow)$} indicates performance drop compared to the original models.
}
\vspace{-4mm}
\label{tab:robust}
\end{table}
\vspace{-1mm}
\subsection{Low-Resource Settings}
We examine the robustness of our model in different resource conditions.
We conjecture that compressed, better quality speech representations bring more data efficiency.
We stimulate high- (408 hours), mid- (204, 82 hours) and low-resources (41 hours) settings. Figure~\ref{fig:resource} shows that in high-, mid-resource conditions, W2V2-mAd$_\textit{3}$-mBart has less degradation in BLEU, compared to W2V2-cnn-mBart, which has validated our hypothesis.
In the low-resource setting, the two models perform similarly, which is expected, as M-Adapter does require sufficient amounts of training data.
\vspace{-1mm}
\input{figures/low-resource}
\vspace{-4mm}
\subsection{Sparsity}
We measure the sparsity of representations produced by above two models, with Hoyer metric \cite{hurley2009comparing}. In essence, Hoyer is a proportion of the $L^2$ over $L^1$ norm; higher Hoyer score indicates more sparsity, less utilization of the representation space. The average Hoyer scores for the two models are 0.7930 and 0.4489, respectively. This indicates that the representations produced by our model make better use of the space.
We speculate this might serve as another indicator measuring an acoustic encoder. We will investigate further on its implications in our future work.
\section{Experiments}
\label{sec:Experiments}
\vspace{-1mm}
\subsection{Data} We experiment with Must-C \cite{cattoni2021must}, a multilingual ST corpus built from Ted talks whose source language is English (EN). We focus on EN$\rightarrow$DE~(German), RO~(Romanian ) and FR~(French). We follow~the instructions in~\cite{gallego2021end}~to preprocess data.~We develop our models on the dev set and report results on the tst-COMMON set. No transcripts or extra ASR/MT data are used.
\vspace{-1mm}
\subsection{Experimental Settings}
\subsubsection{Implementation details}
W2V2 models are pre-trained on large unlableled speech data and can be optionally fine-tuned on ASR data before used for downstream tasks. The model we use has a ``large'' architecture with the quantization module removed, pre-trained on 53.2k-hour of unlabelled data and fine-tuned on 960-hour of labelled data and pseudo-labels. The mBart model\footnote{For the rest of our paper, we refer mBart's decoder as mBart.} we use has 12-layer Transformer blocks for the decoder, fine-tuned with the multilingual MT task (English$\rightarrow$50 languages). Similar with \cite{gallego2021end}, we employ a lightweight adapter (lit-adapter)\footnote{Its main components are two linear layers. We will drop the mention of this adapter since it is used in all experiments, including the baselines we replicated.} before M-Adapter to adapt pre-trained models to new tasks. We deploy $N$ number of M-Adapter blocks. The M-Adapter modules lead to reduced length by stride factors of $s^N$. We implement two variants of our model: i) W2V2-mAda$_\textit{1}$-mBart: it has 1 M-Adapter layer (short for mAda$_\textit{1}$) with 8-stride 1D convolutional pooling modules and kernel size and padding of 8 and 4. ii) W2V2-mAda$_\textit{3}$-mBart: this model has 3 M-Adapter layers (mAda$_\textit{3}$) with kernel size, stride, padding as 3, 2 and 1. Both models shrink an input sequence by 8. We use BLEU\footnote{\url{https://github.com/mjpost/sacreBLEU}} to measure translation quality.
\vspace{-1mm}
\subsubsection{Training strategy}
To train our model, we follow the two-step LayerNorm and Attention training strategy (LNA-2step) used in \cite{li2020multilingual}. In the first step, we train our M-Adapter layers, together with lit-adapter, and keep W2V2 and mBart frozen. In the second step, we fine-tune the adapters and a portion of W2V2 and mBart, including layer normalization, encoder self-attention and encoder-decoder attention.
To further quantify the benefits that our approach bring to W2V2, we experiment with training the entire W2V2 while keeping the mBart frozen. Our models are trained for 32 epochs until early stopping is reached.
\vspace{-1mm}
\subsection{Baselines}
We compare our model with the following baselines:
\setlist[itemize]{align=parleft,left=0pt..1em}
\begin{itemize}
\item \textbf{W2V2-cnn-mBart} \cite{gallego2021end}: It is an E2E ST models using pre-trained models with a similar architecture as ours, except that it uses 3 CNN layers as the length adapter. The same W2V2 and mBart checkpoints are employed. It has the same level of length compression as our model.
\item \textbf{W2V2-tran-mBart}: M-Adapter layers are replaced with 3 Transformer (thus short for ``tran'') layers.
\item \textbf{XSTNet} \cite{ye2021end}: The encoder of the model consists of a wav2vec 2 (base) and convolution layers and one unified Transformer encoder to jointly encode speech and transcript.
\item \textbf{JT-S-MT} \cite{tang2021improving}: It has a unified encoder (initialized with a pre-trained speech encoder and a text encoder) to perform ST and MT tasks. It leverages massive labelled MT data.
\end{itemize}
\vspace{-2mm}
\subsection{Main Results}
Table \ref{tab:focus} shows the results on Must-C EN$\rightarrow$DE in two conditions: decoder fined-tuned and decoder frozen. In the top rows where the decoder is fine-tuned, our models surpass the baselines significantly.~Particularly, our models surpass W2V2-cnn-mBart, the previous SOTA model on this dataset, by a large margin.\footnote{It may appear our performance gain comes from more parameters, but we show that it is not the case in Subsection \ref{sec:len}.} In the bottom rows where the decoder is fixed, while our models still outperform the baselines, our models improve BLEU scores compared to our own models from the top rows by an average of 0.60.
This indicates the effectiveness of our method in unleashing the potential of W2V2.
It also highlights the importance of the quality of speech representation for ST.
Interestingly, with deeper layers, W2V2-mAd$_\textit{3}$-mBart brings a marginal improvement compared to W2V2-mAd$_\textit{1}$-mBart in both settings.
We speculate the reason is that W2V2 produces high-level features \cite{pasad2021layer} and a single M-Adapter layer is sufficient to transform these features to more complex features desired for translation.
We also experiment on Must-C EN$\rightarrow$RO, FR, with 3 M-Adapter layers attached and the decoder fine-tuned. Table \ref{tab:3lang} summarizes the results.\footnote{We expect to see the same trend as in Table 1 for EN $\rightarrow$ RO, FR.} On average, our method improves translation quality by 0.78 in BLEU compared to the baseline.
\section{E2E ST with M-Adapter}
\label{sec:method}
Training a cascaded system with pre-trained models is a sub-optimal option. Not only do the common problems with cascaded approaches remain unsolved, but also it requires intermediate transcripts, which is, again, not always available. Therefore, in this work we investigate how to effectively leverage pre-trained models by addressing the modality mismatch between speech and text. More specifically, we will use wav2vec 2 (W2V2) as an speech encoder and mBart decoder as the text decoder, and integrate them with our proposed M-Adapter.
\subsection{Pre-trained Modules}
\textit{W2V2} is pre-trained on large untranscribed data and it can achieve excellent transcription performance through fine-tuning on a small amount of parallel ASR data. It is pre-trained with a contrastive objective that empowers the model to distinguish a true masked segment and those produced by the model. Its Transformer layers allow the model to encode contextual information surrounding the masked segment. After the training is complete, only its CNN feature extractor and Transformer layers are kept for downstream tasks.
\textit{mBart} is a Transformer-based Seq2Seq denoising auto-encoder model, trained on massive amounts of monolingual and multilingual data. The training objective is to reconstruct an input sequence conditioned on a corrupted version. For our task, we use its decoder component.
\subsection{M-Adapter}
\begin{figure}[t]
\centering
\includegraphics[width=0.7\linewidth]{figures/f2a.pdf}
\caption{Multi-head Self-Attention (left) vs Multi-head Pooled Self-Attention (right)}
\label{fig:attn}
\end{figure}
To adapt speech to text, we propose to replace MSA with MPSA, shown in Figure \ref{fig:attn}. In contrast to MSA which does not modify the sequence length, MPSA pools the sequence to reduce its length. M-Adapter aggregates local fine-grained features via pooling operation while capturing global information via MSA.
It also encourages the model to capture better features for the task at hand via the interactions between MSA and convolutional layers.
\textbf{Multi-head Pooled Self-Attention} Formally, given an input sequence
$\mathbf{X} \in \mathcal{R}^{L \times D}$ where $L$ is the sequence length and $D$ is the embedding dimension, same as MSA, MPSA first linearly projects $\mathbf{X}$ to query, key, and value matrices: $\mathbf{Q} \in \mathcal{R}^{L \times D}, \mathbf{K} \in \mathcal{R}^{L \times D}, \mathbf{V} \in \mathcal{R}^{L \times D}$.
Next, $\mathbf{Q}$, $\mathbf{K}$ and $\mathbf{V}$ are pooled with modules $\operatorname{Pool_Q}$, $\operatorname{Pool_K}$ and $\operatorname{Pool_V}$. Each pooling module consists of a 1D convolutional layer parameterized with kernel size $k$, stride $s$ and padding $p$. Three new matrices are obtained:
\begin{align*}
Q' = \operatorname{Pool_Q}(Q) \hspace{0.5cm} K' = \operatorname{Pool_K}(K) \hspace{0.5cm} V' = \operatorname{Pool_V}(V)
\end{align*}
where $\mathbf{Q'} \in \mathcal{R}^{L' \times D}$, $\mathbf{K'} \in \mathcal{R}^{L' \times D}$ and $\mathbf{V'} \in \mathcal{R}^{L' \times D}$ and $L'$ is the length of the new sequence, which is determined by
\begin{align*}
L'=\left\lfloor\frac{L+2 p - k}{s}\right\rfloor+1
\end{align*}
Attention scores are then calculated based on the new matrices as follows.
$$
\text { Attention }(Q, K, V)=\operatorname{Softmax}\left(Q^{\prime} K^{\prime T} / \sqrt{d}\right) V^{\prime}
$$
where $\sqrt{d}$ normalizes the inner product matrix of $\mathbf{Q'}$ and $\mathbf{K'}$. Practically, we use $h$ attention heads, each of which performs attention operation on a non-overlapping subset of $d$ of the $D$ dimensions of $X$. This yields $h$ sequences which are then concatenated to $\mathbf{H} \in \mathcal{R}^{L' \times D}$.
\textbf{Pooled Input} We cannot add $\mathbf{X}$ and $\mathbf{H}$ directly (see Figure \ref{fig:arch}), as they now have different lengths. To overcome the issue, another 1D convolution pooling layer, $\operatorname{Pool_X}$, is used to convert $\mathbf{X}$ to $\mathbf{X'} \in \mathcal{R}^{L' \times D}$, to allow for subsequent addition and layer norm operations.
Each M-Adapter layer thus reduces the sequence length by a factor of $s$.
|
\section{Introduction}
In 2013, the BESIII collaboration observed
the $Z^{\pm}_c(4025)$ in the $\pi^\mp$ recoil mass spectrum in the process $e^+e^- \to (D^{*} \bar{D}^{*})^{\pm} \pi^\mp$, the measured Breit-Wigner mass and width are $M=(4026.3\pm2.6\pm3.7)\,\rm{MeV}$ and $\Gamma=(24.8\pm5.6\pm7.7)\,\rm{MeV}$, respectively \cite{BES1308}. Two years later, the BESIII collaboration observed its neutral partner $Z^{0}_c(4025)$ in the $\pi^0$ recoil mass spectrum in the process $e^+e^- \to (D^{*} \bar{D}^{*})^{0} \pi^0$, the measured Breit-Wigner mass and width are $M=(4025.5^{+2.0}_{-4.7}\pm3.1)\,\rm{MeV}$ and $\Gamma=(23.0\pm 6.0\pm 1.0)\,\rm{MeV}$, respectively \cite{BES1507}. The masses and widths of the charged structures $Z_c^{\pm}(4025)$ and neutral structure $Z_c^0(4025)$ are consistent with each other.
Also in 2013, the BESIII collaboration observed the $Z_c^\pm(4020)$ in the $\pi^\pm h_c$ mass spectrum in the process $e^+e^- \to \pi^+\pi^- h_c$, the measured Breit-Wigner mass and width are $M=(4022.9\pm 0.8\pm 2.7)\,\rm{MeV}$ and $\Gamma=(7.9\pm 2.7\pm 2.6)\,\rm{MeV}$, respectively \cite{BES1309}. The $Z_c(4020)$ and $Z_c(4025)$ are assigned to be the same particle by the Particle Data Group, and listed in the Review of Particle Physics as $X(4020)$ \cite{PDG}, although the widths differ from each other considerably.
The spin and parity have not been measured yet, the S-wave $D^{*} \bar{D}^{*}$ systems have the quantum numbers $J^{PC}=0^{++}$, $1^{+-}$, $2^{++}$, the S-wave $ \pi^\pm h_c$ systems have the quantum numbers $J^{PC}=1^{--}$, the P-wave $\pi^{\pm} h_c$ systems have the quantum numbers $J^{PC}=0^{++}$, $1^{+-}$, $2^{++}$, we can tentatively assign the quantum numbers $J^{PC}=1^{+-}$ for the $Z_c(4020/4025)$. According to the nearby $D^*\bar{D}^*$ threshold, one maybe expect to assign the $Z_c(4020/4025)$ as the
tetraquark molecular state \cite{Molecule-1,Molecule-2,Molecule-3,Molecule-4,Molecule-5,Molecule-6,Molecule-7,ZhangJR3900}. In the picture of tetraquark states, the $Z_c(4020/4025)$ can be assigned as the $A\bar{A}$-type tetraquark state with the $J^{PC}=1^{+-}$ \cite{Tetraquark-Qiao,WangTetraquarkCTP,Zc4025-EPJC-Mc}, while the $Z_c(3900)$ can be assigned to be the $S\bar{A}-A\bar{S}$ type tetraquark state
according to the calculations via the QCD sum rules \cite{WangHuang-PRD}, where the $S$ and $A$ represent the scalar and axialvector diquark states, respectively.
In 2020, the BESIII collaboration observed a structure $Z_{cs}^-(3985)$ in the $K^{+}$ recoil-mass spectrum with the significance of 5.3 $\sigma$ in the processes of the $e^+e^-\to K^+ (D_s^- D^{*0} + D^{*-}_s D^0)$ \cite{BES3985}. The measured Breit-Wigner mass and width are $M=3985.2^{+2.1}_{-2.0}\pm1.7\,\rm{MeV}$ and $\Gamma=13.8^{+8.1}_{-5.2}\pm4.9\,\rm{MeV}$, respectively \cite{BES3985}.
In 2021, the LHCb collaboration observed two new exotic states $Z_{cs}^+(4000)$ and $Z_{cs}^+(4220)$ in the $J/\psi K^+$ mass spectrum in the process $B^+ \to J/\psi \phi K^+$ \cite{LHCb-Zcs4000}. The most significant state, $Z_{cs}^+(4000)$, has the Breit-Wigner mass and width $M=4003 \pm 6 {}^{+4}_{-14}\,\rm{MeV}$ and $\Gamma=131 \pm 15 \pm 26\,\rm{MeV}$, respectively, and the spin-parity $J^P =1^+$ \cite{LHCb-Zcs4000}. Although in both the pictures of tetraquark states and molecular states, we can reproduce the mass of the $Z_{cs}(3985/4000)$ with the QCD sum rules \cite{Zcs-CFQiao,WZG-Zcs3985-tetra,Zcs3985-Azizi,Ozdem-Zcs-tetra-mole,WZG-Zcs3985-mole,Lee:2008uy,Dias:2013qga,ChenHX-Zcs3985}, direct calculations of the decay widths based on the QCD sum rules support assigning the $Z_{cs}(3985)$ and $Z_{cs}(4000)$ to be the hidden-charm tetraquark state and molecular state with the $J^{PC}=1^{+-}$, respectively, or at least, the $Z_{cs}(3985)$ maybe have large diquark-antidiquark type Fock component, while the $Z_{cs}(4000)$ maybe have large color-singlet-color-singlet type Fock component \cite{WZG-Zcs3985-decay}.
The $Z_c(3900/3885)$ and $Z_{cs}(3985/4000)$ are cousins and have analogous decay modes,
\begin{eqnarray}
Z^{\pm}_c(3900) &\to & J/\psi \pi^\pm \, , \nonumber \\
Z^{+}_{cs}(4000) &\to & J/\psi K^+ \, ,
\end{eqnarray}
\begin{eqnarray}
Z_c^{\pm}(3885)&\to & (D\bar{D}^*)^\pm \, , \nonumber \\
Z_{cs}^{-}(3985) &\to & D_s^- D^{*0}\, , \, D^{*-}_s D^0 \, ,
\end{eqnarray}
we expect that the $Z_{c}(4020/4025)$ also have strange cousins $Z_{cs}$, and they have analogous decay modes, the $Z_{cs}$ states may be observed in the decays to the final states $D^*\bar{D}_s^*$, $D_s^*\bar{D}^*$, $h_cK$, etc. In this work, we tentatively assign the $Z_c(4020/4025)$ as the $A\bar{A}$-type hidden-charm tetraquark state with the $J^{PC}=1^{+-}$, and extend our previous work to study the mass and width of its strange cousin with the QCD sum rules \cite{WZG-Zcs3985-tetra,WZG-Zcs3985-mole,WZG-Zcs3985-decay,WZG-tetra-spectrum}, the predictions can be confronted to the experimental data in the future, and make contribution in disentangling the pictures of tetraquark states and molecular states.
As a byproduct, we obtain the mass of the hidden-strange/charm tetraquark state and the partial decay widths of the $Z_c(4020/4025)$.
The article is arranged as follows: we derive the QCD sum rules for the masses and pole residues of the $A\bar{A}$-type tetraquark states without strange, with strange, and with hidden-strange in section 2; in section 3, we derive the QCD sum rules for the hadronic coupling constants in the decays of the $Z_c$ and $Z_{cs}$ states; section 4 is reserved for our conclusion.
\section{QCD sum rules for the $Z_{c}$, $Z_{cs}$, $Z_{cs\bar{s}}$ tetraquark states with the $J^{PC}=1^{+-}$}
Firstly, we write down the two-point correlation functions $\Pi_{\mu\nu\alpha\beta}(p)$ in the QCD sum rules,
\begin{eqnarray}
\Pi_{\mu\nu\alpha\beta}(p)&=&i\int d^4x e^{ip \cdot x} \langle0|T\left\{J_{\mu\nu}(x)J_{\alpha\beta}^{\dagger}(0)\right\}|0\rangle \, ,
\end{eqnarray}
where $J_{\mu\nu}(x)=J_{\mu\nu}^{u\bar{d}}(x)$, $J_{\mu\nu}^{u\bar{s}}(x)$, $J_{\mu\nu}^{s\bar{s}}(x)$,
\begin{eqnarray}
J^{u\bar{d}}_{\mu\nu}(x)&=&\frac{\varepsilon^{ijk}\varepsilon^{imn}}{\sqrt{2}}\Big\{u^T_j(x) C\gamma_\mu c_k(x) \bar{d}_m(x) \gamma_\nu C \bar{c}^T_n(x) -u^T_j(x) C\gamma_\nu c_k(x) \bar{d}_m(x) \gamma_\mu C \bar{c}^T_n(x) \Big\} \, , \nonumber \\
J^{u\bar{s}}_{\mu\nu}(x)&=&\frac{\varepsilon^{ijk}\varepsilon^{imn}}{\sqrt{2}}\Big\{u^T_j(x) C\gamma_\mu c_k(x) \bar{s}_m(x) \gamma_\nu C \bar{c}^T_n(x) -u^T_j(x) C\gamma_\nu c_k(x) \bar{s}_m(x) \gamma_\mu C \bar{c}^T_n(x) \Big\} \, , \nonumber \\
J^{s\bar{s}}_{\mu\nu}(x)&=&\frac{\varepsilon^{ijk}\varepsilon^{imn}}{\sqrt{2}}\Big\{s^T_j(x) C\gamma_\mu c_k(x) \bar{s}_m(x) \gamma_\nu C \bar{c}^T_n(x) -s^T_j(x) C\gamma_\nu c_k(x) \bar{s}_m(x) \gamma_\mu C \bar{c}^T_n(x) \Big\} \, ,
\end{eqnarray}
where the $i$, $j$, $k$, $m$, $n$ are color indexes, the $C$ is the charge conjugation matrix \cite{Zc4025-EPJC-Mc,WZG-tetra-spectrum}. We choose the currents $J_{\mu\nu}^{u\bar{d}}(x)$, $J_{\mu\nu}^{u\bar{s}}(x)$ and $J_{\mu\nu}^{s\bar{s}}(x)$ to explore the hidden-charm tetraquark states without strange, with strange, and with hidden-strange, respectively.
At the hadronic side, we isolate the ground state contributions of the hidden-charm tetraquark states with the $J^{PC}=1^{+-}$ and $1^{--}$ explicitly, and acquire the results,
\begin{eqnarray}
\Pi_{\mu\nu\alpha\beta}(p)&=&\frac{\lambda_{ Z}^2}{M_{Z}^2-p^2}\left(p^2g_{\mu\alpha}g_{\nu\beta} -p^2g_{\mu\beta}g_{\nu\alpha} -g_{\mu\alpha}p_{\nu}p_{\beta}-g_{\nu\beta}p_{\mu}p_{\alpha}+g_{\mu\beta}p_{\nu}p_{\alpha}+g_{\nu\alpha}p_{\mu}p_{\beta}\right) \nonumber\\
&&+\frac{\lambda_{ Y}^2}{M_{Y}^2-p^2}\left( -g_{\mu\alpha}p_{\nu}p_{\beta}-g_{\nu\beta}p_{\mu}p_{\alpha}+g_{\mu\beta}p_{\nu}p_{\alpha}+g_{\nu\alpha}p_{\mu}p_{\beta}\right) +\cdots \, \, ,
\end{eqnarray}
where the $Z$ and $Y$ denote the tetraquark states with the $J^{PC}=1^{+-}$ and $1^{--}$, respectively, the pole residues $\lambda_{Z}$ and $\lambda_{Y}$ are defined by
\begin{eqnarray}
\langle 0|\eta_{\mu\nu}(0)|Z(p)\rangle &=& \lambda_{Z} \, \varepsilon_{\mu\nu\alpha\beta} \, \zeta^{\alpha}p^{\beta}\, , \nonumber\\
\langle 0|\eta_{\mu\nu}(0)|Y(p)\rangle &=& \lambda_{Y} \left(\zeta_{\mu}p_{\nu}-\zeta_{\nu}p_{\mu} \right)\, ,
\end{eqnarray}
the $\zeta_\mu$ are the polarization vectors of the tetraquark states.
We can rewrite the correlation functions $\Pi_{\mu\nu\alpha\beta}(p)$ into the form,
\begin{eqnarray}
\Pi_{\mu\nu\alpha\beta}(p)&=&\Pi_Z(p^2)\left(p^2g_{\mu\alpha}g_{\nu\beta} -p^2g_{\mu\beta}g_{\nu\alpha} -g_{\mu\alpha}p_{\nu}p_{\beta}-g_{\nu\beta}p_{\mu}p_{\alpha}+g_{\mu\beta}p_{\nu}p_{\alpha}+g_{\nu\alpha}p_{\mu}p_{\beta}\right) \nonumber\\
&&+\Pi_Y(p^2)\left( -g_{\mu\alpha}p_{\nu}p_{\beta}-g_{\nu\beta}p_{\mu}p_{\alpha}+g_{\mu\beta}p_{\nu}p_{\alpha}+g_{\nu\alpha}p_{\mu}p_{\beta}\right) \, ,
\end{eqnarray}
according to Lorentz covariance.
We project out the components $\Pi_Z(p^2)$ and $\Pi_Y(p^2)$ by the tensors $P_{A,p}^{\mu\nu\alpha\beta}$ and $P_{V,p}^{\mu\nu\alpha\beta}$,
\begin{eqnarray}
\widetilde{\Pi}_Z(p^2)&=&p^2\Pi_Z(p^2)=P_{A,p}^{\mu\nu\alpha\beta}\Pi_{\mu\nu\alpha\beta}(p) \, , \nonumber\\
\widetilde{\Pi}_Y(p^2)&=&p^2\Pi_Y(p^2)=P_{V,p}^{\mu\nu\alpha\beta}\Pi_{\mu\nu\alpha\beta}(p) \, ,
\end{eqnarray}
where
\begin{eqnarray}
P_{A,p}^{\mu\nu\alpha\beta}&=&\frac{1}{6}\left( g^{\mu\alpha}-\frac{p^\mu p^\alpha}{p^2}\right)\left( g^{\nu\beta}-\frac{p^\nu p^\beta}{p^2}\right)\, , \nonumber\\
P_{V,p}^{\mu\nu\alpha\beta}&=&\frac{1}{6}\left( g^{\mu\alpha}-\frac{p^\mu p^\alpha}{p^2}\right)\left( g^{\nu\beta}-\frac{p^\nu p^\beta}{p^2}\right)-\frac{1}{6}g^{\mu\alpha}g^{\nu\beta}\, .
\end{eqnarray}
We accomplish the operator product expansion up to the vacuum condensates of dimension 10, and take account of the vacuum condensates $\langle \bar{q}q\rangle$, $\langle \frac{\alpha_s GG}{\pi}\rangle$,
$\langle \bar{q}g_s\sigma Gq\rangle$, $\langle \bar{q}q\rangle^2$,
$ \langle \bar{q}q\rangle \langle \frac{\alpha_s GG}{\pi}\rangle$, $\langle\bar{q}q\rangle\langle \bar{q}g_s\sigma Gq\rangle$,
$\langle \bar{q}g_s\sigma Gq\rangle^2$, $\langle \bar{q}q\rangle^2 \langle \frac{\alpha_s GG}{\pi}\rangle$, where $q=u$, $d$ or $s$, just like in previous works \cite{WangTetraquarkCTP,Zc4025-EPJC-Mc,WangHuang-PRD,WZG-Zcs3985-tetra,WZG-Zcs3985-mole},
and project out the components,
\begin{eqnarray}
\widetilde{\Pi}_Z(p^2)&=&P_{A,p}^{\mu\nu\alpha\beta}\Pi_{\mu\nu\alpha\beta}(p) \, , \nonumber\\
\widetilde{\Pi}_Y(p^2)&=&P_{V,p}^{\mu\nu\alpha\beta}\Pi_{\mu\nu\alpha\beta}(p) \, ,
\end{eqnarray}
at the QCD side. In the present work, we only interest in the component $\widetilde{\Pi}_Z(p^2)$, as we investigate the axialvector tetraquark states. We take
the truncations $n\leq 10$ and $k\leq 1$ in a consistent way,
the operators of the orders $\mathcal{O}( \alpha_s^{k})$ with $k> 1$ are discarded. The operators in the condensates $\langle g_s^3 GGG\rangle$, $\langle \frac{\alpha_s GG}{\pi}\rangle^2$,
$\langle \frac{\alpha_s GG}{\pi}\rangle\langle \bar{q} g_s \sigma Gq\rangle$ are of the orders $\mathcal{O}( \alpha_s^{3/2})$, $\mathcal{O}(\alpha^2_s)$, $\mathcal{O}( \alpha_s^{3/2})$, respectively, and play tiny roles, and can be ignored safely \cite{ZhangJR3900,WangXW-afs-afs}.
We obtain the QCD spectral densities $\rho_Z(s)$ through dispersion relation,
\begin{eqnarray}
\rho_Z(s)&=&\frac{{\rm Im}\widetilde{\Pi}_Z(s)}{\pi}\, ,
\end{eqnarray}
suppose the quark-hadron duality below the continuum thresholds $s_0$ and accomplish Borel transform in regard to
the variable $P^2=-p^2$ to obtain the QCD sum rules:
\begin{eqnarray} \label{QCDSR-two}
\tilde{\lambda}^2_{Z}\, \exp\left(-\frac{M^2_Z}{T^2}\right)= \int_{4m_c^2}^{s_0} ds\, \rho_Z(s) \, \exp\left(-\frac{s}{T^2}\right) \, ,
\end{eqnarray}
where $\tilde{\lambda}_Z=\lambda_{Z}M_{Z}$.
We differentiate Eq.\eqref{QCDSR-two} in regard to $\frac{1}{T^2}$, eliminate the re-defined
pole residues $\tilde{\lambda}_{Z}$, and obtain the QCD sum rules for
the masses of those axialvector hidden-charm tetraquark states,
\begin{eqnarray}
M^2_{Z}&=& \frac{\int_{4m_c^2}^{s_0} ds\,\frac{d}{d \left(-1/T^2\right)}\,\rho_Z(s)\,\exp\left(-\frac{s}{T^2}\right)}{\int_{4m_c^2}^{s_0} ds\, \rho_Z(s)\,\exp\left(-\frac{s}{T^2}\right)}\, .
\end{eqnarray}
We take the standard values of the vacuum condensates,
$\langle
\bar{q}q \rangle=-(0.24\pm 0.01\, \rm{GeV})^3$, $\langle\bar{s}s\rangle=(0.8\pm0.1)\langle\bar{q}q\rangle$,
$\langle\bar{q}g_s\sigma G q \rangle=m_0^2\langle \bar{q}q \rangle$,
$\langle\bar{s}g_s\sigma G s \rangle=m_0^2\langle \bar{s}s \rangle$,
$m_0^2=(0.8 \pm 0.1)\,\rm{GeV}^2$ at the energy scale $\mu=1\, \rm{GeV}$
\cite{SVZ79,Reinders85,Colangelo-Review}, and take the $\overline{MS}$ quark masses $m_{c}(m_c)=(1.275\pm0.025)\,\rm{GeV}$ and $m_s(\mu=2\,\rm{GeV})=(0.095\pm0.005)\,\rm{GeV}$ from the Particle Data Group \cite{PDG}. We set $m_q=m_u=m_d=0$ and take account of
the energy-scale dependence of the input parameters,
\begin{eqnarray}
\langle\bar{q}q \rangle(\mu)&=&\langle\bar{q}q \rangle({\rm 1GeV})\left[\frac{\alpha_{s}({\rm 1GeV})}{\alpha_{s}(\mu)}\right]^{\frac{12}{33-2n_f}}\, , \nonumber\\
\langle\bar{s}s \rangle(\mu)&=&\langle\bar{s}s \rangle({\rm 1GeV})\left[\frac{\alpha_{s}({\rm 1GeV})}{\alpha_{s}(\mu)}\right]^{\frac{12}{33-2n_f}}\, , \nonumber\\
\langle\bar{q}g_s \sigma Gq \rangle(\mu)&=&\langle\bar{q}g_s \sigma Gq \rangle({\rm 1GeV})\left[\frac{\alpha_{s}({\rm 1GeV})}{\alpha_{s}(\mu)}\right]^{\frac{2}{33-2n_f}}\, , \nonumber\\
\langle\bar{s}g_s \sigma Gs \rangle(\mu)&=&\langle\bar{s}g_s \sigma Gs \rangle({\rm 1GeV})\left[\frac{\alpha_{s}({\rm 1GeV})}{\alpha_{s}(\mu)}\right]^{\frac{2}{33-2n_f}}\, , \nonumber\\
m_c(\mu)&=&m_c(m_c)\left[\frac{\alpha_{s}(\mu)}{\alpha_{s}(m_c)}\right]^{\frac{12}{33-2n_f}} \, ,\nonumber\\
m_s(\mu)&=&m_s({\rm 2GeV})\left[\frac{\alpha_{s}(\mu)}{\alpha_{s}({\rm 2GeV})}\right]^{\frac{12}{33-2n_f}} \, ,\nonumber\\
\alpha_s(\mu)&=&\frac{1}{b_0t}\left[1-\frac{b_1}{b_0^2}\frac{\log t}{t} +\frac{b_1^2(\log^2{t}-\log{t}-1)+b_0b_2}{b_0^4t^2}\right]\, ,
\end{eqnarray}
from the renormalization group equation, where $t=\log \frac{\mu^2}{\Lambda_{QCD}^2}$, $b_0=\frac{33-2n_f}{12\pi}$, $b_1=\frac{153-19n_f}{24\pi^2}$, $b_2=\frac{2857-\frac{5033}{9}n_f+\frac{325}{27}n_f^2}{128\pi^3}$, $\Lambda_{QCD}=210\,\rm{MeV}$, $292\,\rm{MeV}$ and $332\,\rm{MeV}$ for the flavors $n_f=5$, $4$ and $3$, respectively \cite{PDG,Narison-mix}, we choose the flavor numbers $n_f=4$ as there are $u$, $d$, $s$ and $c$ quarks.
Just as in our previous works, we acquire the acceptable energy scales of the QCD spectral densities for the hidden-charm tetraquark states according to the energy scale formula,
\begin{eqnarray}
\mu &=&\sqrt{M^2_{X/Y/Z}-(2{\mathbb{M}}_c)^2} \, ,
\end{eqnarray}
with the effective $c$-quark mass ${\mathbb{M}}_c=1.82\,\rm{GeV}$ \cite{Zc4025-EPJC-Mc,WZG-fomula-mole-1,WZG-formula-mole-2,WZG-fromula-tetra}. Furthermore, we take account of the $SU(3)$ mass-breaking effects according to modified energy scale formula,
\begin{eqnarray}
\mu &=&\sqrt{M^2_{X/Y/Z}-(2{\mathbb{M}}_c)^2}-k\,{\mathbb{M}}_s \, ,
\end{eqnarray}
where the ${\mathbb{M}}_s$ is the effective $s$-quark mass and fitted to be $0.2\,\rm{GeV}$ \cite{WZG-Zcs3985-mole}, the $k$ is the number of the valence $s$-quarks.
We search for the suitable Borel parameters $T^2$ and continuum threshold parameters $s_0$ to satisfy the two criteria (pole or ground state dominance and convergence of the operator product expansion) via trial and error. The Borel parameters, continuum threshold parameters, energy scales of the QCD spectral densities, pole contributions and contributions of the vacuum condensates of dimension 10 are shown in Table \ref{Borel-mass}. From the Table, we can see plainly that the modified energy scale formula is satisfied very well. Then we take account of the uncertainties of the input parameters, and acquire the masses and pole residues of the hidden-charm tetraquark states without strange, with strange and with hidden-strange having the quantum numbers $J^{PC}=1^{+-}$, which are also shown in Table \ref{Borel-mass}. In Fig.\ref{mass-Zc-Zcs}, we plot the masses of the $Z_{cs}$ and $Z_{cs\bar{s}}$ with variations of the Borel parameters, from the figure, we can see that there appear platforms in the Borel windows indeed, it is reliable to extract the tetraquark masses.
\begin{table}
\begin{center}
\begin{tabular}{|c|c|c|c|c|c|c|c|c|}\hline\hline
&$T^2 (\rm{GeV}^2)$ &$\sqrt{s_0}(\rm GeV) $ &$\mu(\rm{GeV})$ &pole &$|D(10)|$ &$M_Z(\rm{GeV})$ &$\tilde{\lambda}_Z(10^{-2}\rm{GeV}^5)$ \\ \hline
$Z_c$ &$3.3-3.7$ &$4.6\pm0.1$ &$1.7$ &$(40-59)\%$ &$\ll 1\%$ & $4.02\pm0.09$ &$3.00\pm0.45 $ \\ \hline
$Z_{cs}$ &$3.4-3.8$ &$4.7\pm0.1$ &$1.7$ &$(41-60)\%$ &$\ll 1\%$ & $4.11\pm0.08$ &$3.49\pm0.51$ \\ \hline
$Z_{cs\bar{s}}$ &$3.5-3.9$ &$4.8\pm0.1$ &$1.7$ &$(42-61)\%$ &$\ll 1\%$ & $4.20\pm0.09$ &$4.00\pm0.58$ \\ \hline
\end{tabular}
\end{center}
\caption{ The Borel parameters, continuum threshold parameters, energy scales, pole contributions, contributions of the vacuum condensates of dimension $10$, masses and pole residues for the axialvector tetraquark states. }\label{Borel-mass}
\end{table}
The present prediction $ M_{Z_c}=\left(4.02\pm0.09\right) \, \rm{GeV}$ (also in Ref.\cite{WZG-tetra-spectrum}) is consistent with the experimental values $M_{Z_c^\pm}=(4026.3\pm2.6\pm3.7)\,\rm{MeV}$, $M_{Z_c^\pm}=(4022.9\pm 0.8\pm 2.7)\,\rm{MeV}$, $M_{Z_c^0}=(4025.5^{+2.0}_{-4.7}\pm3.1)\,\rm{MeV}$
from the BESIII collaboration \cite{BES1308,BES1507,BES1309}, which supports assigning the $Z_c(4020/4025)$ to be the $J^{PC}=1^{+-}$ $A\bar{A}$-type tetraquark state. We cannot assign a hadron unambiguously with the mass alone, we have to calculate the partial decay widths and total width to make more robust assignment.
\begin{figure}
\centering
\includegraphics[totalheight=6cm,width=7cm]{mass-ccus.EPS}
\includegraphics[totalheight=6cm,width=7cm]{mass-ccss.EPS}
\caption{ The masses of the tetraquark states with variations of the Borel parameters $T^2$, where the (I) and (II) correspond to the $Z_{cs}$ and $Z_{cs\bar{s}}$, respectively, the regions between the two vertical lines are the Borel windows. }\label{mass-Zc-Zcs}
\end{figure}
\section{Decay widths of the $Z_c$ and $Z_{cs}$ states with the QCD sum rules}
We investigate the two-body strong decays $Z_{cs}\to h_cK$, $J/\psi K$, $\eta_cK^{*}$ with the three-point correlation functions $\Pi_{\alpha\beta\mu\nu}(p,q)$, $\Pi_{\alpha\mu\nu}^{1}(p,q)$ and $\Pi_{\alpha\mu\nu}^{2}(p,q)$, respectively,
\begin{eqnarray}
\Pi_{\alpha\beta\mu\nu}(p,q)&=&i^2\int d^4xd^4y \, e^{ipx}e^{iqy}\, \langle 0|T\left\{J_{\alpha\beta}^{h_c}(x)J_5^{K}(y)J^{u\bar{s}\dagger}_{\mu\nu}(0)\right\}|0\rangle\, , \nonumber \\
\Pi_{\alpha\mu\nu}^{1}(p,q)&=&i^2\int d^4xd^4y \, e^{ipx}e^{iqy}\, \langle 0|T\left\{J_\alpha^{J/\psi}(x)J_5^{K}(y)J^{u\bar{s}\dagger}_{\mu\nu}(0)\right\}|0\rangle \, , \nonumber \\
\Pi_{\alpha\mu\nu}^{2}(p,q)&=&i^2\int d^4xd^4y\, e^{ipx}e^{iqy}\, \langle 0|T\left\{J_5^{\eta_c}(x)J_\alpha^{K^*}(y)J^{u\bar{s}\dagger}_{\mu\nu}(0)\right\}|0\rangle \, ,
\end{eqnarray}
where the currents
\begin{eqnarray}
J_{\alpha\beta}^{h_c}(x)&=&\bar{c}(x)\sigma_{\alpha\beta} c(x) \, ,\nonumber \\
J_\mu^{J/\psi}(x)&=&\bar{c}(x)\gamma_\mu c(x) \, ,\nonumber \\
J_5^{K}(y)&=&\bar{u}(y)i\gamma_5 s(y) \, , \nonumber \\
J_5^{\eta_c}(x)&=&\bar{c}(x)i\gamma_5 c(x) \, ,\nonumber \\
J_\mu^{K^*}(y)&=&\bar{u}(y)\gamma_\mu s(y) \, ,
\end{eqnarray}
interpolate the mesons $h_c$, $J/\psi$, $K$, $\eta_c$ and $K^*$, respectively, with the simple replacement $s\to d$, we obtain the corresponding ones for the
$Z_c$ tetraquark state.
We insert a complete set of intermediate hadronic states having possible (non-vanishing) couplings with the current operators into the three-point correlation functions, and isolate the ground state contributions explicitly,
\begin{eqnarray}\label{Hadron-CT-1}
\Pi^{\alpha\beta\mu\nu}
(p,q)&=& \lambda_K f_{h}\varepsilon^{\alpha\beta\alpha^\prime\beta^\prime} \xi_{\alpha^\prime} p_{\beta^\prime} \lambda_{Z}
\varepsilon^{\mu\nu\mu^\prime\nu^\prime}\zeta^{*}_{\mu^\prime}p^{\prime}_{\nu^\prime} \frac{-iG_{Zh K}\varepsilon^{\rho\sigma\lambda\tau}p_\rho\xi^{*}_\sigma p^{\prime}_\lambda\zeta_\tau}{(M_{Z}^2-p^{\prime2})(M_{h}^2-p^2)(M_{K}^2-q^2)} \nonumber\\
&&+ \lambda_K f_{h}\varepsilon^{\alpha\beta\alpha^\prime\beta^\prime}\xi_{\alpha^\prime}p_{\beta^\prime}\lambda_{Y}
\left(\zeta^{*\mu }p^{\prime\nu }-\zeta^{*\nu }p^{\prime\mu } \right)\frac{-G_{Y h K}\xi^{*} \cdot \zeta }{(M_{Y}^2-p^{\prime2})(M_{h}^2-p^2)(M_{K}^2-q^2)} \nonumber\\
&&+\lambda_K f_{J/\psi}^T\left(\xi^{\alpha}p^{\beta}-\xi^{\beta}p^{\alpha}\right)\lambda_{Z}
\varepsilon^{\mu\nu\mu^\prime\nu^\prime}\zeta^{*}_{\mu^\prime}p^{\prime}_{\nu^\prime} \frac{-G_{ZJ/\psi K}\xi^{*} \cdot \zeta}{(M_{Z}^2-p^{\prime2})(M_{J/\psi}^2-p^2)(M_{K}^2-q^2)} \nonumber\\
&&+\lambda_K f_{J/\psi}^T\left(\xi^{\alpha}p^{\beta}-\xi^{\beta}p^{\alpha}\right)\lambda_{Y}
\left(\zeta^{*\mu }p^{\prime\nu }-\zeta^{*\nu }p^{\prime\mu } \right)\frac{-iG_{YJ/\psi K}\varepsilon^{\rho\sigma\lambda\tau}p_\rho\xi^{*}_\sigma p^{\prime}_\lambda\zeta_\tau}{(M_{Y}^2-p^{\prime2})(M_{J/\psi}^2-p^2)(M_{K}^2-q^2)} \nonumber\\
&&+ \cdots\, ,
\end{eqnarray}
\begin{eqnarray}\label{Hadron-CT-2}
\Pi^{\alpha\mu\nu}_1(p,q)&=& \lambda_K \lambda_{J/\psi}\xi^{\alpha } \lambda_{Z}
\varepsilon^{\mu\nu\mu^\prime\nu^\prime}\zeta^{*}_{\mu^\prime}p^{\prime}_{\nu^\prime} \frac{-G_{ZJ/\psi K}\xi^{*} \cdot \zeta }{(M_{Z}^2-p^{\prime2})(M_{J/\psi}^2-p^2)(M_{K}^2-q^2)} \nonumber\\
&&+\lambda_K \lambda_{J/\psi}\xi^{\alpha } \lambda_{Y}
\left(\zeta^{*\mu }p^{\prime\nu }-\zeta^{*\nu }p^{\prime\mu }\right) \frac{-iG_{Y J/\psi K}\varepsilon^{\rho\sigma\lambda\tau}p_\rho\xi^{*}_\sigma p^{\prime}_\lambda\zeta_\tau }{(M_{Y}^2-p^{\prime2})(M_{J/\psi}^2-p^2)(M_{K}^2-q^2)} \nonumber \\
&&+\cdots \, ,
\end{eqnarray}
\begin{eqnarray}\label{Hadron-CT-3}
\Pi^{\alpha\mu\nu}_2(p,q)&=& \lambda_\eta \lambda_{K^*}\xi^{\alpha } \lambda_{Z}
\varepsilon^{\mu\nu\mu^\prime\nu^\prime}\zeta^{*}_{\mu^\prime}p^{\prime}_{\nu^\prime} \frac{-G_{Z\eta K^*}\xi^{*} \cdot \zeta }{(M_{Z}^2-p^{\prime2})(M_{\eta}^2-p^2)(M_{K^*}^2-q^2)} \nonumber\\
&&+\lambda_\eta \lambda_{K^*}\xi^{\alpha } \lambda_{Y}
\left(\zeta^{*\mu }p^{\prime\nu }-\zeta^{*\nu }p^{\prime\mu }\right) \frac{-iG_{Y \eta K^*}\varepsilon^{\rho\sigma\lambda\tau}q_\rho\xi^{*}_\sigma p^{\prime}_\lambda\zeta_\tau }{(M_{Y}^2-p^{\prime2})(M_{\eta}^2-p^2)(M_{K^*}^2-q^2)} \nonumber \\
&&+\cdots \, ,
\end{eqnarray}
where $\lambda_K=\frac{f_{K}M_{K}^2}{m_u+m_s}$, $\lambda_\eta=\frac{f_{\eta_c}M_{\eta_c}^2}{2m_c}$, $\lambda_{J/\psi}=f_{J/\psi}M_{J/\psi}$, $\lambda_{K^*}=f_{K^*}M_{K^*}$, $p^\prime=p+q$, the decay constants of the mesons $h_c$, $J/\psi$, $K$, $\eta_c$, $K^*$ are defined by,
\begin{eqnarray}
\langle0|J_{\mu\nu}^{h_c}(0)|h_c(p)\rangle&=&f_{h_c} \varepsilon_{\mu\nu\alpha\beta}\xi^\alpha p^\beta \,\, , \nonumber \\
\langle0|J_{\mu\nu}^{h_c}(0)|J/\psi(p)\rangle&=&f_{J/\psi}^T \left(\xi_{\mu} p_\nu-\xi_{\nu} p_\mu\right) \,\, , \nonumber \\
\langle0|J_{\mu}^{J/\psi}(0)|J/\psi(p)\rangle&=&f_{J/\psi}M_{J/\psi}\,\xi_\mu \,\, , \nonumber \\
\langle0|J_{\mu}^{K^*}(0)|K^*(p)\rangle&=&f_{K^*}M_{K^*}\,\xi_\mu \,\, , \nonumber \\
\langle0|J_{5}^{K}(0)|K(p)\rangle&=&\frac{f_{K}M_{K}^2}{m_u+m_s} \,\, , \nonumber \\
\langle0|J_{5}^{\eta_c}(0)|\eta_c(p)\rangle&=&\frac{f_{\eta_c}M_{\eta_c}^2}{2m_c} \,\, ,
\end{eqnarray}
the $\xi$ are polarization vectors of the $h_c$, $J/\psi$ and $K^*$, and the hadronic coupling constants are defined by
\begin{eqnarray}
\langle h_c(p)K(q)|Z_{cs}(p^{\prime})\rangle&=& G_{Zh K}\,\varepsilon^{\rho\sigma\lambda\tau}p_\rho\xi^{*}_\sigma p^{\prime}_\lambda\zeta_\tau \, , \nonumber\\
\langle J/\psi(p)K(q)|Y_{cs}(p^{\prime})\rangle&=& G_{Y J/\psi K}\,\varepsilon^{\rho\sigma\lambda\tau}p_\rho\xi^{*}_\sigma p^{\prime}_\lambda\zeta_\tau \, , \nonumber\\
\langle h_c(p)K(q)|Y_{cs}(p^{\prime})\rangle&=& -iG_{Yh K}\,\xi^{*} \cdot \zeta \, , \nonumber\\
\langle J/\psi(p)K(q)|Z_{cs}(p^{\prime})\rangle&=& -iG_{Z J/\psi K}\,\xi^{*} \cdot \zeta \, , \nonumber\\
\langle\eta_c(p)K^*(q)|Z_{cs}(p^{\prime})\rangle&=&-iG_{Z \eta K^*}\,\xi^{*} \cdot \zeta \, .
\end{eqnarray}
The tensor structures in Eqs.\eqref{Hadron-CT-1}-\eqref{Hadron-CT-3} are enough complex, we have to project out the relevant components with the suitable tensor operators,
\begin{eqnarray}
-\frac{2i}{9}\left(p^2q^2-(p\cdot q)^2 \right)\Pi_{h_cK}(p^{\prime2},p^2,q^2)&=&P_{A,p}^{\alpha\beta\eta\theta}P_{A,p^\prime}^{\mu\nu\phi\omega}\varepsilon_{\eta\theta\phi\omega}\Pi_{\alpha\beta\mu\nu}(p,q)\, , \nonumber \\
-6\left(p^2+q^2+2p\cdot q\right)\Pi_{J/\psi K}(p^{\prime2},p^2,q^2)&=&\varepsilon_{\mu\nu\alpha\sigma}p^{\prime \sigma}\Pi_1^{\alpha\mu\nu}(p,q)\, , \nonumber \\
-6\left(p^2+q^2+2p\cdot q\right)\Pi_{\eta_c K^*}(p^{\prime2},p^2,q^2)&=&\varepsilon_{\mu\nu\alpha\sigma}p^{\prime \sigma}\Pi_2^{\alpha\mu\nu}(p,q)\, ,
\end{eqnarray}
where
\begin{eqnarray}\label{H-Reprisen}
\Pi_{h_cK}(p^{\prime2},p^2,q^2)&=& \frac{G_{Zh K}\lambda_K f_{h} \lambda_{Z}}{(M_{Z}^2-p^{\prime2})(M_{h}^2-p^2)(M_{K}^2-q^2)}+\cdots \, , \nonumber\\
\Pi_{J/\psi K}(p^{\prime2},p^2,q^2)&=& \frac{G_{ZJ/\psi K}\lambda_K \lambda_{J/\psi} \lambda_{Z}}{(M_{Z}^2-p^{\prime2})(M_{J/\psi}^2-p^2)(M_{K}^2-q^2)}+\cdots \, ,\nonumber\\
\Pi_{\eta_c K^*}(p^{\prime2},p^2,q^2)&=& \frac{G_{Z\eta K^*}\lambda_{K^*} \lambda_{\eta} \lambda_{Z}}{(M_{Z}^2-p^{\prime2})(M_{\eta}^2-p^2)(M_{K^*}^2-q^2)}+\cdots \, ,
\end{eqnarray}
which correspond to the two-body strong decays $Z_{cs}\to h_c K$, $J/\psi K$, $\eta_c K^*$, respectively;
the other components in Eqs.\eqref{Hadron-CT-1}-\eqref{Hadron-CT-3} have no contributions or contaminations.
In Eq.\eqref{Hadron-CT-1}, there are four channels, $Z_{cs}\to h_c K$, $Y_{cs}\to h_c K$, $Z_{cs}\to J/\psi K$ and $Y_{cs}\to J/\psi K$, which correspond to four different tensor structures and therefore four different components, we project out the
channel $Z_{cs}\to h_c K$ explicitly. In Eq.\eqref{Hadron-CT-2}, there are two channels $Z_{cs}\to J/\psi K$ and $Y_{cs}\to J/\psi K$, which correspond to two different tensor structures and therefore two different components, we project out the channel $Z_{cs}\to J/\psi K$ explicitly. In Eq.\eqref{Hadron-CT-3}, there are two channels $Z_{cs}\to \eta_cK^*$ and $Y_{cs}\to \eta_cK^*$, which correspond to two different tensor structures and therefore two different components, we project out the channel $Z_{cs}\to \eta_cK^*$ explicitly.
The $\cdots$ in Eq.\eqref{H-Reprisen} stands for the neglected contributions from the higher resonances and continuum states. According to the analysis in Refs.\cite{WZG-Zcs3985-decay,WZG-ZJX-Zc-Decay,WZG-Y4660-Decay,WZG-X4140-decay,WZG-X4274-decay,WZG-Z4600-decay}, we can introduce the parameters $C_{h_cK}$, $C_{J/\psi K}$ and $C_{\eta_cK^*}$ to parameterize the higher resonance and continuum states involving the $Z_{cs}$ channel,
\begin{eqnarray}\label{H-ChcK-etal}
\Pi_{h_cK}(p^{\prime2},p^2,q^2)&=& \frac{G_{Zh K}\lambda_K f_{h} \lambda_{Z}}{(M_{Z}^2-p^{\prime2})(M_{h}^2-p^2)(M_{K}^2-q^2)}+\frac{C_{h_c K}}{(M_{h}^2-p^2)(M_{K}^2-q^2)} \, , \nonumber\\
\Pi_{J/\psi K}(p^{\prime2},p^2,q^2)&=& \frac{G_{ZJ/\psi K}\lambda_K \lambda_{J/\psi} \lambda_{Z}}{(M_{Z}^2-p^{\prime2})(M_{J/\psi}^2-p^2)(M_{K}^2-q^2)}
+\frac{C_{J/\psi K}}{(M_{J/\psi}^2-p^2)(M_{K}^2-q^2)} \, ,\nonumber\\
\Pi_{\eta_c K^*}(p^{\prime2},p^2,q^2)&=& \frac{G_{Z\eta K^*}\lambda_{K^*} \lambda_{\eta} \lambda_{Z}}{(M_{Z}^2-p^{\prime2})(M_{\eta}^2-p^2)(M_{K^*}^2-q^2)}+\frac{C_{\eta_c K^*}}{(M_{\eta}^2-p^2)(M_{K^*}^2-q^2)} \, .
\end{eqnarray}
On the other hand, we perform Fierz re-arrangement both in the color and Dirac-spinor spaces to obtain the result,
\begin{eqnarray}
2\sqrt{2} J_{u\bar{s}}^{\mu\nu} &=&i\bar{s}u\, \bar{c}\sigma^{\mu\nu}c +i\bar{s}\sigma^{\mu\nu}u \,\bar{c}c+i\bar{s}c\, \bar{c}\sigma^{\mu\nu}u +i\bar{s}\sigma^{\mu\nu}c \,\bar{c}u -\frac{i}{2}\varepsilon^{\mu\nu\alpha\beta}\bar{c}\sigma_{\alpha\beta}c\,\bar{s}i\gamma_5u\nonumber\\
&&-\bar{c}i\gamma_5 c\,\bar{s}\sigma^{\mu\nu}\gamma_5u -\bar{c}\sigma^{\mu\nu}\gamma_5u\,\bar{s}i\gamma_5c-\bar{s}i\gamma_5 c\,\bar{c}\sigma^{\mu\nu}\gamma_5u+i\varepsilon^{\mu\nu\alpha\beta}\bar{c}\gamma^\alpha\gamma_5c\, \bar{s}\gamma^\beta u\nonumber\\
&&-i\varepsilon^{\mu\nu\alpha\beta}\bar{c}\gamma^\alpha c\, \bar{s}\gamma^\beta \gamma_5u+i\varepsilon^{\mu\nu\alpha\beta}\bar{c}\gamma^\alpha\gamma_5u\, \bar{s}\gamma^\beta c-i\varepsilon^{\mu\nu\alpha\beta}\bar{c}\gamma^\alpha u\, \bar{s}\gamma^\beta \gamma_5c \, ,
\end{eqnarray}
the component $\frac{i}{2}\varepsilon^{\mu\nu\alpha\beta}\bar{c}\sigma_{\alpha\beta}c\,\bar{s}i\gamma_5u$ leads to the correlation function,
\begin{eqnarray}
\widetilde{\Pi}_{\alpha\beta\mu\nu}(p,q)&=&\frac{i^2\varepsilon_{\mu\nu\lambda\tau}}{4\sqrt{2}}\int d^4xd^4y \, e^{ipx}e^{iqy}\, \langle 0|T\left\{J_{\alpha\beta}^{h_c}(x)J_5^{K}(y)\, \bar{c}(0)\sigma^{\lambda\tau}c(0)\,\bar{u}(0)i\gamma_5s(0)\right\}|0\rangle\, ,\nonumber\\
&\to & \kappa \frac{i^2\varepsilon_{\mu\nu\lambda\tau}}{4\sqrt{2}}\int d^4x \, e^{ipx}\, \langle 0|T\left\{J_{\alpha\beta}^{h_c}(x)\, \bar{c}(0)\sigma^{\lambda\tau}c(0)\right\}|0\rangle \nonumber \\
&&\int d^4y \, e^{iqy}\, \langle 0|T\left\{J_5^{K}(y)\, \bar{u}(0)i\gamma_5s(0)\right\}|0\rangle\, ,
\end{eqnarray}
we introduce a parameter $\kappa$ to represent the possible factorizable contributions at the hadron side, as we choose the local currents, and the conventional mesons and tetraquark states have average spatial sizes of the same order, the $J_{u\bar{s}}^{\mu\nu}(0)$ couples potentially to the tetraquark state rather than to the two-meson scattering states, therefore $\kappa \ll 1$ \cite{WZG-X4140-X4685}, however, such a term makes a contribution to the component $\Pi_{h_cK}(p^{\prime2},p^2,q^2)$,
\begin{eqnarray}
\frac{\widetilde{C}_{h_c K}}{(M_{h}^2-p^2)(M_{K}^2-q^2)}\, ,
\end{eqnarray}
where the coefficient $\widetilde{C}_{h_c K}$ can be absorbed into the coefficient $C_{h_cK}$. We can see confidently that the parameter $C_{h_cK}$ is necessary, the parameters $C_{J/\psi K}$ and $C_{\eta_cK^*}$ are implied in the same way.
We accomplish the operator product expansion up to the vacuum condensates of dimension 5 and neglect the tiny gluon condensate contributions \cite{WZG-Zcs3985-decay,WZG-ZJX-Zc-Decay,WZG-Y4660-Decay,WZG-X4140-decay,WZG-X4274-decay,WZG-Z4600-decay}, then obtain the QCD spectral densities $\rho_{QCD}(p^{\prime2},s,u)$ through double dispersion relation,
\begin{eqnarray}
\Pi_{QCD}(p^{\prime2},p^2,q^2)&=& \int_{\Delta_s^2}^\infty ds \int_{\Delta_u^2}^\infty du \frac{\rho_{QCD}(p^{\prime2},s,u)}{(s-p^2)(u-q^2)}\, ,
\end{eqnarray}
where the $\Delta_s^2$ and $\Delta_u^2$ are the thresholds.
At the hadron side, we obtain the hadronic spectral densities $\rho_H(s^\prime,s,u)$ through triple dispersion relation,
\begin{eqnarray}
\Pi_{H}(p^{\prime2},p^2,q^2)&=&\int_{\Delta_s^{\prime2}}^\infty ds^{\prime} \int_{\Delta_s^2}^\infty ds \int_{\Delta_u^2}^\infty du \frac{\rho_{H}(s^\prime,s,u)}{(s^\prime-p^{\prime2})(s-p^2)(u-q^2)}\, ,
\end{eqnarray}
according to Eq.\eqref{H-Reprisen}, where the $\Delta_{s}^{\prime2}$ are the thresholds.
We match the hadron side with the QCD side bellow the continuum thresholds to acquire rigorous quark-hadron duality \cite{WZG-ZJX-Zc-Decay,WZG-Y4660-Decay},
\begin{eqnarray}
\int_{\Delta_s^2}^{s_{0}}ds \int_{\Delta_u^2}^{u_0}du \frac{\rho_{QCD}(p^{\prime2},s,u)}{(s-p^2)(u-q^2)}&=& \int_{\Delta_s^2}^{s_0}ds \int_{\Delta_u^2}^{u_0}du \left[ \int_{\Delta_{s}^{\prime2}}^{\infty}ds^\prime \frac{\rho_H(s^\prime,s,u)}{(s^\prime-p^{\prime2})(s-p^2)(u-q^2)} \right]\, ,
\end{eqnarray}
where the $s_0$ and $u_0$ are the continuum thresholds, we accomplish the integral over $ds^\prime$ firstly, and introduce some unknown parameters, such as the $C_{h_cK}$, $C_{J/\psi K}$ and $C_{\eta_cK^*}$, to parameterize the contributions involving the higher resonances and continuum states in the $s^\prime$ channel.
We set $p^{\prime2}=p^2$ in the correlation functions $\Pi(p^{\prime 2},p^2,q^2)$, and accomplish the double Borel transform in regard to the variables $P^2=-p^2$ and $Q^2=-q^2$ respectively, then set the Borel parameters $T_1^2=T_2^2=T^2$ to obtain three QCD sum rules,
\begin{eqnarray} \label{ZhcK-SR}
&&\frac{\lambda_{Zh K}G_{Zh K}}{M_{Z}^2-M_{h}^2} \left[ \exp\left(-\frac{M_{h}^2}{T^2} \right)-\exp\left(-\frac{M_{Z}^2}{T^2} \right)\right]\exp\left(-\frac{M_{K}^2}{T^2} \right)+C_{h_c K} \exp\left(-\frac{M_{h}^2+M_{K}^2}{T^2} \right) \nonumber\\
&&=\frac{1}{64\sqrt{2}\pi^4}\int_{4m_c^2}^{s^0_{h}} ds \int_{0}^{s^0_{K}} du \sqrt{1-\frac{4m_c^2}{s}} \left(1-\frac{4m_c^2}{s}\right)\exp\left(-\frac{s+u}{T^2}\right)\nonumber\\
&&+\frac{m_s\left[2\langle \bar{q}q\rangle-\langle\bar{s}s\rangle\right]}{48\sqrt{2}\pi^2 T^2}\int_{4m_c^2}^{s^0_{h}} ds \sqrt{1-\frac{4m_c^2}{s}} \left(1-\frac{4m_c^2}{s}\right)\exp\left(-\frac{s}{T^2}\right)\nonumber\\
&&+\frac{m_s \langle \bar{q} G q \rangle}{96\sqrt{2} \pi^2 T^2} \int_{4m_c^2}^{s^0_{h}} ds \frac{1}{\sqrt{s \left(s-4m_c^2\right)}} \left(1-\frac{2 m_c^2}{s}\right) \exp\left(-\frac{s}{T^2}\right) \nonumber\\
&&+\frac{m_s \langle \bar{q} G q \rangle}{96\sqrt{2} \pi^2 T^2} \int_{4m_c^2}^{s^0_{h}} ds \sqrt{1-\frac{4m_c^2}{s}} \frac{1}{s} \exp\left(-\frac{s}{T^2}\right) \nonumber\\
&&+\frac{m_s \langle \bar{q} G q \rangle}{64 \sqrt{2} \pi^2 T^4} \int_{4m_c^2}^{s^0_{h}} ds \sqrt{1-\frac{4m_c^2}{s}} \left(1-\frac{4m_c^2}{s}\right) \exp\left(-\frac{s}{T^2}\right) \, ,
\end{eqnarray}
\begin{eqnarray} \label{ZJpsiK-SR}
&&\frac{\lambda_{ZJ/\psi K}G_{ZJ/\psi K}}{M_{Z}^2-M_{J/\psi}^2} \left[ \exp\left(-\frac{M_{J/\psi}^2}{T^2} \right)-\exp\left(-\frac{M_{Z}^2}{T^2} \right)\right]\exp\left(-\frac{M_{K}^2}{T^2} \right)+C_{J/\psi K} \exp\left(-\frac{M_{J/\psi}^2+M_{K}^2}{T^2} \right) \nonumber\\
&&=\frac{3}{128\sqrt{2}\pi^4}\int_{4m_c^2}^{s^0_{J/\psi}} ds \int_{0}^{s^0_{K}} du \sqrt{1-\frac{4m_c^2}{s}} \left[2um_c+m_s\left(s+2m_c^2\right)\left(\frac{2}{3}-\frac{u}{9s}\right) \right]\exp\left(-\frac{s+u}{T^2}\right)\nonumber\\
&&-\frac{\langle \bar{q}q\rangle+\langle\bar{s}s\rangle}{24\sqrt{2}\pi^2} \int_{4m_c^2}^{s^0_{J/\psi}} ds \sqrt{1-\frac{4m_c^2}{s}} \left(s+2m_c^2\right) \exp\left(-\frac{s}{T^2}\right) \nonumber\\
&&+\frac{m_s m_c\left[\langle\bar{s}s\rangle-2\langle \bar{q}q\rangle\right]}{16\sqrt{2}\pi^2} \int_{4m_c^2}^{s^0_{J/\psi}} ds \sqrt{1-\frac{4m_c^2}{s}} \exp\left(-\frac{s}{T^2}\right) \nonumber\\
&&+\frac{\langle \bar{q} G q \rangle+\langle \bar{s} G s\rangle}{576\sqrt{2} \pi^2} \int_{4m_c^2}^{s^0_{J/\psi}} ds \frac{s+8 m_c^2}{\sqrt{s \left(s-4m_c^2\right)}} \exp\left(-\frac{s}{T^2}\right) -\frac{\langle \bar{q} G q \rangle+\langle \bar{s} G s\rangle}{576\sqrt{2} \pi^2} \int_{4m_c^2}^{s^0_{J/\psi}} ds \sqrt{1-\frac{4m_c^2}{s}} \exp\left(-\frac{s}{T^2}\right) \nonumber\\
&&+\frac{m_s m_c\langle \bar{q} G q \rangle}{192\sqrt{2} \pi^2} \int_{4m_c^2}^{s^0_{J/\psi}} ds \frac{1}{\sqrt{s \left(s-4m_c^2\right)}} \exp\left(-\frac{s}{T^2}\right) -\frac{m_s m_c\langle \bar{q} G q \rangle}{192\sqrt{2} \pi^2} \int_{4m_c^2}^{s^0_{J/\psi}} ds \sqrt{1-\frac{4m_c^2}{s}} \frac{1}{s} \exp\left(-\frac{s}{T^2}\right) \nonumber\\
&& -\frac{m_s m_c\langle \bar{q} G q \rangle}{16\sqrt{2} \pi^2 T^2} \int_{4m_c^2}^{s^0_{J/\psi}} ds \sqrt{1-\frac{4m_c^2}{s}} \exp\left(-\frac{s}{T^2}\right) \, ,
\end{eqnarray}
\begin{eqnarray}\label{ZetacKV-SR}
&& \frac{\lambda_{Z \eta K^*}G_{Z \eta K^*}}{M_{Z}^2-M_{\eta}^2}\left[ \exp\left(-\frac{M_{\eta}^2}{T^2} \right)-\exp\left(-\frac{M_{Z}^2}{T^2} \right)\right]\exp\left(-\frac{M_{K^*}^2}{T^2} \right)+C_{\eta_c K^*} \exp\left(-\frac{M_{\eta}^2+M_{K^*}^2}{T^2} \right) \nonumber\\
&&=\frac{3}{128\sqrt{2}\pi^4}\int_{4m_c^2}^{s^0_{\eta_c}} ds \int_{0}^{s^0_{K^*}} du \sqrt{1-\frac{4m_c^2}{s}} \left(\frac{10um_c}{9}+m_s s \right)\exp\left(-\frac{s+u}{T^2}\right)\nonumber\\
&&-\frac{\langle \bar{q}q\rangle+\langle\bar{s}s\rangle}{16\sqrt{2}\pi^2} \int_{4m_c^2}^{s^0_{\eta_c}} ds \sqrt{1-\frac{4m_c^2}{s}}\, s\, \exp\left(-\frac{s}{T^2}\right) \nonumber\\
&&+\frac{m_s m_c\left[\langle\bar{s}s\rangle-6\langle \bar{q}q\rangle\right]}{48\sqrt{2}\pi^2} \int_{4m_c^2}^{s^0_{\eta_c}} ds \sqrt{1-\frac{4m_c^2}{s}} \exp\left(-\frac{s}{T^2}\right)\nonumber\\
&&+\frac{\langle \bar{q} G q \rangle+\langle \bar{s} G s\rangle}{576\sqrt{2} \pi^2} \int_{4m_c^2}^{s^0_{\eta_c}} ds \frac{s+2m_c^2}{\sqrt{s \left(s-4m_c^2\right)}} \exp\left(-\frac{s}{T^2}\right) \nonumber\\
&& -\frac{\langle \bar{q} G q \rangle+\langle \bar{s} G s\rangle}{576\sqrt{2} \pi^2} \int_{4m_c^2}^{s^0_{\eta_c}} ds \sqrt{1-\frac{4m_c^2}{s}} \left(1-\frac{12s}{T^2}\right) \exp\left(-\frac{s}{T^2}\right) \nonumber\\
&&+\frac{m_s m_c\langle \bar{q} G q \rangle}{96\sqrt{2} \pi^2} \int_{4m_c^2}^{s^0_{\eta_c}} ds \frac{1}{\sqrt{s \left(s-4m_c^2\right)}} \exp\left(-\frac{s}{T^2}\right) \nonumber\\
&&+\frac{m_s m_c\langle \bar{s} G s \rangle}{288\sqrt{2} \pi^2 T^2} \int_{4m_c^2}^{s^0_{\eta_c}} ds \sqrt{1-\frac{4m_c^2}{s}} \exp\left(-\frac{s}{T^2}\right) \, ,
\end{eqnarray}
where $\langle \bar{q}Gq\rangle=\langle \bar{q}g_s \sigma Gq\rangle$, $\langle \bar{s}Gs\rangle=\langle \bar{s}g_s \sigma Gs\rangle$,
$\lambda_{Zh K}=\lambda_{K}f_{h}\lambda_{Z}$, $\lambda_{ZJ/\psi K}=\lambda_{K}\lambda_{J/\psi}\lambda_{Z}$, $\lambda_{Z\eta K^*}=\lambda_{K^*}\lambda_{\eta}\lambda_{Z}$. We neglect the dependencies of the parameters $C_{h_c K}$, $C_{J/\psi K}$ and $C_{\eta_c K^*}$ on the Lorentz invariants $p^{\prime2}$, $p^2$, $q^2$, take them as free parameters, and search for the best values to
delete the contaminations from the high resonances and continuum states to acquire stable QCD sum rules. The corresponding hadronic coupling constants for the $Z_c(4020/4025)$ state can be obtained with the simple replacement $s \to d$ and are treated in the same way.
At the QCD side, we choose the flavor numbers $n_f=4$ and set the energy scale to be $\mu=1.3\,\rm{GeV}$, just like in previous work on the decays of the $Z_{cs}(3985/4000)$ \cite{WZG-Zcs3985-decay}. At the hadron side, we take the parameters as $M_{K}=0.4937\,\rm{GeV}$, $M_{\pi}=0.13957\,\rm{GeV}$, $M_{K^*}=0.8917\,\rm{GeV}$, $M_{\rho}=0.77526\,\rm{GeV}$,
$M_{J/\psi}=3.0969\,\rm{GeV}$, $M_{\eta_c}=2.9834\,\rm{GeV}$, $M_{h_c}=3.525\,\rm{GeV}$ \cite{PDG}, $f_{K}=0.156\,\rm{GeV}$, $f_{\pi}=0.130\,\rm{GeV}$ \cite{PDG}, $f_{K^*}=0.220\,\rm{GeV}$, $f_{\rho}=0.215\,\rm{GeV}$, $\sqrt{s^0_{K}}=1.0\,\rm{GeV}$, $\sqrt{s^0_{\pi}}=0.85\,\rm{GeV}$, $\sqrt{s^0_{K^*}}=1.3\,\rm{GeV}$, $\sqrt{s^0_{\rho}}=1.2\,\rm{GeV}$ \cite{PBall-decay-Kv},
$f_{h_c}=0.235\,\rm{GeV}$, $f_{J/\psi}=0.418 \,\rm{GeV}$, $f_{\eta_c}=0.387 \,\rm{GeV}$ \cite{Becirevic}, $\sqrt{s^0_{h_c}}=4.05\,\rm{GeV}$, $\sqrt{s^0_{J/\psi}}=3.6\,\rm{GeV}$, $\sqrt{s^0_{\eta_c}}=3.5\,\rm{GeV}$ \cite{PDG}, $\frac{f_{K}M^2_{K}}{m_u+m_s}=-\frac{\langle \bar{q}q\rangle+\langle \bar{s}s\rangle}{f_{K}(1-\delta_K)}$, $\frac{f_{\pi}M^2_{\pi}}{m_u+m_d}=-\frac{2\langle \bar{q}q\rangle}{f_{\pi}}$ from the Gell-Mann-Oakes-Renner relation, $\delta_K=0.50$ \cite{GMOR-fK}.
In calculations, we fit the unknown parameters to be
$C_{h_c K}=0.000064+0.000014\times T^2\,\rm{GeV}^4$,
$C_{h_c \pi}=0.00006+0.000010\times T^2\,\rm{GeV}^4$,
$C_{J/\psi K}=0.00335+0.000096\times T^2\,\rm{GeV}^7$,
$C_{J/\psi \pi}=0.00305+0.000096\times T^2\,\rm{GeV}^7$,
$C_{\eta_c K^*}=0.00368+0.00012\times T^2\,\rm{GeV}^7$ and
$C_{\eta_c \rho}=0.00302+0.00012\times T^2\,\rm{GeV}^7$
to acquire the flat Borel platforms having the interval $T^2_{max}-T^2_{min}=1\,\rm{GeV}^2$, where the max and min represent the maximum and minimum values, respectively.
The Borel windows are $T^2_{h_c K}=(4.0-5.0)\,\rm{GeV}^2$, $T^2_{h_c \pi}=(4.0-5.0)\,\rm{GeV}^2$,
$T^2_{J/\psi K}=(4.3-5.3)\,\rm{GeV}^2$, $T^2_{J/\psi \pi}=(4.1-5.1)\,\rm{GeV}^2$,
$T^2_{\eta_c K^*}=(3.9-4.9)\,\rm{GeV}^2$ and $T^2_{\eta_c \rho}=(3.9-4.9)\,\rm{GeV}^2$, where we add the subscripts $h_cK$, $h_c\pi$ $\cdots$ to denote the corresponding decay channels. In the Borel windows, we require that the uncertainties $\delta G$ originate from the Borel parameters $T^2$ are less than or about $0.01\, (\rm GeV)$, such a strict and powerful constraint plays a decisive role and works well, just like in our previous works \cite{WZG-Zcs3985-decay,WZG-ZJX-Zc-Decay,WZG-Y4660-Decay,WZG-X4140-decay,WZG-X4274-decay,WZG-Z4600-decay}. In Fig.\ref{hadron-coupling}, we plot the hadronic coupling constants $G_{Z_{cs} h_c K}$, $G_{Z_{cs}J/\psi K}$, $G_{Z_{cs}\eta_c K^*}$, $G_{Z_{c} h_c \pi}$, $G_{Z_{c}J/\psi \pi}$ and $G_{Z_{c}\eta_c \rho}$ with variations of the Borel parameters, where we can see explicitly that there appear very flat platforms indeed, it is reliable to extract the hadronic coupling constants.
If we take the symbol $\xi$ to represent the input parameters at the QCD side, then for example, the uncertainties $\bar{\xi} \to \bar{\xi} +\delta \xi$ result in the uncertainties $\bar{f}_{J/\psi}\bar{f}_{K}\bar{\lambda}_{Z}\bar{G}_{ZJ/\psi K} \to \bar{f}_{J/\psi}\bar{f}_{K}\bar{\lambda}_{Z}\bar{G}_{ZJ/\psi K}+\delta\,f_{J/\psi}f_{K}\lambda_{Z}G_{ZJ/\psi K}$, $\bar{C}_{J/\psi K} \to \bar{C}_{J/\psi K}+\delta C_{J/\psi K}$,
where
\begin{eqnarray}\label{Uncertainty-4}
\delta\,f_{J/\psi}f_{K}\lambda_{Z}G_{ZJ/\psi K} &=&\bar{f}_{J/\psi}\bar{f}_{K}\bar{\lambda}_{Z}\bar{G}_{ZJ/\psi K}\left( \frac{\delta f_{J/\psi}}{\bar{f}_{J/\psi}} +\frac{\delta f_{K}}{\bar{f}_{K}}+\frac{\delta \lambda_{Z}}{\bar{\lambda}_{Z}}+\frac{\delta G_{ZJ/\psi K}}{\bar{G}_{ZJ/\psi K}}\right)\, ,
\end{eqnarray}
we add the index \,$\bar{}$\, on all the variables to denote the central values.
In the case of the uncertainty $\delta C_{J/\psi K}$ is small enough to be ignored, error analysis is easy to preform by setting $\frac{\delta f_{J/\psi}}{\bar{f}_{J/\psi}} =\frac{\delta f_{K}}{\bar{f}_{K}}=\frac{\delta \lambda_{Z}}{\bar{\lambda}_{Z}}=\frac{\delta G_{ZJ/\psi K}}{\bar{G}_{ZJ/\psi K}}
$ approximately, on the other hand, if the uncertainty $\delta C_{J/\psi K}$ is considerable, we have to take it into account for every uncertainty $\delta \xi$. We have to adjust the $\delta C_{J/\psi K}$ with fine tuning with the help of trial and error according to the variation $\delta \xi$ to acquire enough flat platforms in the same region, just like in the case of the central values $\bar{\xi}$ and $\bar{C}_{J/\psi K}$. It is a difficult work to perform error analysis. We usually set $\frac{\delta f_{J/\psi}}{\bar{f}_{J/\psi}} =\frac{\delta f_{K}}{\bar{f}_{K}}=\frac{\delta \lambda_{Z}}{\bar{\lambda}_{Z}}=0$ to estimate the uncertainty $\delta G_{ZJ/\psi K}$, in fact, no one has ever proved that such an approximation is proper.
Now let us obtain the hadronic coupling constants routinely according to above error analysis,
\begin{eqnarray} \label{HCC-values}
G_{Z_{cs} h_c K} &=&1.68 \pm 0.10\, , \nonumber\\
G_{Z_{cs}J/\psi K} &=&2.08\pm 0.08\,\rm{GeV}\, , \nonumber\\
G_{Z_{cs}\eta_c K^*} &=&2.84\pm 0.09\,\rm{GeV}\, , \nonumber\\
G_{Z_{c} h_c \pi} &=&1.69\pm 0.09 \, , \nonumber\\
G_{Z_{c}J/\psi \pi} &=&2.08\pm 0.08\,\rm{GeV}\, , \nonumber\\
G_{Z_{c}\eta_c \rho} &=&2.80\pm 0.09\,\rm{GeV}\, ,
\end{eqnarray}
by setting
\begin{eqnarray}\label{Uncertainty-5}
\delta\,f_{J/\psi}f_{K}\lambda_{Z}G_{ZJ/\psi K} &=&\bar{f}_{J/\psi}\bar{f}_{K}\bar{\lambda}_{Z}\bar{G}_{ZJ/\psi K}\frac{4\delta G_{ZJ/\psi K}}{\bar{G}_{ZJ/\psi K}}\, ,
\end{eqnarray}
et al.
If we set
\begin{eqnarray}\label{Uncertainty-6}
\delta\,f_{J/\psi}f_{K}\lambda_{Z}G_{ZJ/\psi K} &=&\bar{f}_{J/\psi}\bar{f}_{K}\bar{\lambda}_{Z}\bar{G}_{ZJ/\psi K}\frac{\delta G_{ZJ/\psi K}}{\bar{G}_{ZJ/\psi K}}\, ,
\end{eqnarray}
the uncertainty $\delta G_{ZJ/\psi K}$ will be four times as large as that given in Eq.\eqref{HCC-values}. Other uncertainties can be understood in the same way. According to Eq.\eqref{HCC-values},
the $SU(3)$ breaking effects in the hadronic coupling constants are rather small.
\begin{figure}
\centering
\includegraphics[totalheight=6cm,width=7cm]{G-hc-K.EPS}
\includegraphics[totalheight=6cm,width=7cm]{G-hc-pi.EPS}
\caption{ The hadronic coupling constants with variations of the Borel parameters $T^2$, where the $A$, $B$, $C$, $D$, $E$ and $F$ correspond to the $G_{Z_{cs} h_c K}$, $G_{Z_{cs}J/\psi K}$, $G_{Z_{cs}\eta_c K^*}$, $G_{Z_{c} h_c \pi}$, $G_{Z_{c}J/\psi \pi}$ and $G_{Z_{c}\eta_c \rho}$, respectively. }\label{hadron-coupling}
\end{figure}
Then it is easy to obtain the partial decay widths by taking the relevant masses from the Particle Data Group \cite{PDG},
\begin{eqnarray} \label{Partial withs}
\Gamma\left(Z_{cs}\to h_c K\right)&=&1.83\pm0.22\,\rm{MeV}\, , \nonumber\\
\Gamma\left(Z_{cs}\to J/\psi K\right) &=&8.05\pm0.62\,\rm{MeV}\, , \nonumber\\
\Gamma\left(Z_{cs}\to \eta_c K^*\right) &=&12.83\pm0.81\,\rm{MeV}\, , \nonumber\\
\Gamma\left(Z_{c} \to h_c \pi\right) &=&6.86\pm0.73\,\rm{MeV}\, , \nonumber\\
\Gamma\left(Z_{c}\to J/\psi \pi\right) &=&8.82\pm0.68\,\rm{MeV}\, , \nonumber\\
\Gamma\left(Z_{c}\to \eta_c \rho\right) &=&13.89\pm0.89\,\rm{MeV}\, ,
\end{eqnarray}
and the total widths,
\begin{eqnarray} \label{Total widths}
\Gamma_{Z_{cs}} &=& 22.71\pm1.65\, ({\rm or}\, \pm 6.60)\,\rm{MeV}\, ,\nonumber\\
\Gamma_{Z_{c}} &=&29.57\pm2.30\, ({\rm or}\, \pm 9.20)\,\,\rm{MeV}\, ,
\end{eqnarray}
the values in the brackets are obtained from Eq.\eqref{Uncertainty-6}.
The prediction $\Gamma_{Z_{c}} =29.57\pm2.30\, ({\rm or}\, \pm 9.20)\,\,\rm{MeV}$ is compatible with the upper bound of the experimental data $\Gamma=(24.8\pm5.6\pm7.7)\,\rm{MeV}$ \cite{BES1308}, $(23.0\pm 6.0\pm 1.0)\,\rm{MeV}$ \cite{BES1507}, $(7.9\pm 2.7\pm 2.6)\,\rm{MeV}$ \cite{BES1309} from the BESIII collaboration, and also supports assigning the $Z_c(4020/4025)$ to be the $A\bar{A}$-type hidden-charm tetraquark states with the $J^{PC}=1^{+-}$. In the present work, we have neglected the decays $Z_c(4020/4025)\to D^*\bar{D}^*$ and $Z_{cs}\to D^*\bar{D}_s^*$, $D_s^*\bar{D}^*$, as the $Z_c$ and $Z_{cs}$ states lie near the corresponding two-meson thresholds, the available phase-spaces are very small, and even lead to the possible assignments of molecular states \cite{Molecule-1,Molecule-2,Molecule-3,Molecule-4,Molecule-5,Molecule-6,Molecule-7,ZhangJR3900}. The most favorable channels are $Z_{cs}\to \eta_c K^*$ and $Z_{c}\to \eta_c \rho$, at the present time, even for the $Z_c(4020/4025)$, the decay $Z_c(4020/4025) \to \eta_c\rho$ has not been observed yet, the observation of this channel can lead to more robust assignment and shed light on the nature of the $Z_c$ states. We can search for the $Z_{cs}$ state in the invariant mass spectrum of the $h_c K$, $J/\psi K$, $\eta_c K^*$, $D^*\bar{D}_s^*$, $D_s^*\bar{D}^*$ in the future.
In the picture of diquark-antidiquark type tetraquark states, the $Z_c(3900)$ and $Z_{cs}(3985)$ can be assigned tentatively as the $S\bar{A}-A\bar{S}$ type hidden-charm tetraquark states, the hadronic coupling constants have the relations $|G_{ZD^*\bar{D}/ZD\bar{D}^*}|\ll |G_{ZJ/\psi\pi/Z\eta_c\rho}|$ and $|G_{ZD^*\bar{D}_s/ZD\bar{D}_s^*}|\ll |G_{ZJ/\psi K/Z\eta_c K^*}|$, furthermore, the allowed phase-spaces in the decays to the open-charm meson pairs are much smaller than that to the meson pairs involving charmonium, the contributions of the decays to the open-charm meson pairs to the total decay widths can be ignored \cite{WZG-Zcs3985-decay,WZG-ZJX-Zc-Decay}. We expect that the conclusion survives in the present work for the $Z_c(4020/4025)$ and $Z_{cs}(4110)$ states, and make a crude estimation of the partial decay widths $\Gamma\left(Z_{c}\to D^* \bar{D}/D \bar{D}^*\right)< 1\,\rm{MeV}$ and $\Gamma\left(Z_{cs}\to D^* \bar{D}_s/D \bar{D}_s^*\right)<1\,\rm{MeV}$ based on the relations between the hadronic coupling constants obtained in Refs.\cite{WZG-Zcs3985-decay,WZG-ZJX-Zc-Decay}, the contributions to the total widths from the decays to the final states $D^* \bar{D}/D \bar{D}^*$ and $D^* \bar{D}_s/D \bar{D}_s^*$ are also ignored.
\section{Conclusion}
In this article, we tentatively assign the $Z_c(4020/4025)$ as the $A\bar{A}$-type hidden-charm tetraquark state with the $J^{PC}=1^{+-}$, construct the $A\bar{A}$-type tensor currents to investigate the tetraquark states without strange, with strange and with hidden-strange together via the QCD sum rules. We take account of the contributions of the vacuum condensates up to dimension-10 in the operator product expansion, then we resort to the modified energy scale formula $\mu=\sqrt{M^2_{X/Y/Z}-(2{\mathbb{M}}_c)^2}-k{\mathcal{M}}_s$ to account for the $SU(3)$ mass-breaking effects to choose the suitable energy scales of the QCD spectral densities, and obtain the tetraquark masses in a self-consistent way. We introduce three-point correlation functions to investigate the hadronic coupling constants in the two-body strong decays of the tetraquark states without strange and with strange together via the QCD sum rules based on rigorous quark-hadron duality, it is the unique feature of our works. The numerical results indicate that the $SU(3)$ breaking effects in the hadronic coupling constants are rather small. Then we obtain the partial decay widths and total widths for the $Z_c$ and $Z_{cs}$ states, the total width $\Gamma_{Z_c}$ is compatible with that of the $Z_c(4020/4025)$ and also supports assigning the $Z_c(4020/4025)$ to be the $J^{PC}=1^{+-}$ $A\bar{A}$-type tetraquark state, more experimental data are still needed to reach more robust assignment, as the $Z_c(4020/4025)$ has not been observed in the $J/\psi \pi$ and $\eta_c\rho$ channels yet.
We can search for the strange cousin $Z_{cs}$ in the $D^*\bar{D}_s^*$, $D_s^*\bar{D}^*$, $h_cK$, $J/\psi K$ and $\eta_c K^*$ invariant mass spectrum in the future, its observation would shed light on the nature of the $Z_c$ states.
\section*{Acknowledgements}
This work is supported by National Natural Science Foundation, Grant Number 12175068.
|
\section{Introduction}
\label{seci}
Several cosmological observations and surveys revealed
that our universe is presently undergoing an accelerated phase of
expansion and a transition from decelerated phase to this accelerated phase happened
during the late time phase of cosmic evolution.
The luminosity distance and redshift measurements of type Ia Supernova
\cite{Riess:1998cb,Perlmutter:1998np,Riess:2006fw} are instrumental in establishing this fact.
Independent observations like Baryon Acoustic Oscillation \cite{Eisenstein:2005su, Percival:2006gs},
Cosmic Microwave Background Radiation \cite{Gawiser:2000az} and Observed Hubble Data (OHD) \cite{OHD}
also reinforce this conclusion.
The cause of acceleration of the present-day cosmic expansion still remains a mystery
and has been presented in literature
\cite{Riess:1998cb,Perlmutter:1998np,Riess:2006fw} as an effect due to presence
of an unclustered form of energy with negative pressure - dubbed `Dark Energy' (DE).
On the other hand, observed rotation curves of spiral galaxies \cite{Sofue:2000jx}, observation of
gravitational lensing \cite{Bartelmann:1999yn}, bullet and other colliding clusters provide
evidences for existence
of non-luminous matter in the universe, called `Dark Matter' (DM), which reveals its presence
only through gravitational effects detected in above mentioned observations.
Results from satellite borne experiments like WMAP \cite{Hinshaw:2008kr} and Planck \cite{Ade:2013zuv} have
estimated that DE and DM together contribute $\sim 96\%$ of total energy density of the
present-day universe, with $\sim$69$\%$ and $\sim$27$\%$ as their respective shares.
The rest 4$\%$ contribution comes from radiation and baryonic matter.
Though a physical theory of dark energy is still lacking, there exist diverse theoretical approaches aiming
construction of models for DE leading to present-day cosmic acceleration.
These include the $\Lambda$-CDM model, where $\Lambda$ refers to cosmological constant and `CDM' corresponds
to cold (non-relativistic) dark matter. This model, though fits well with the present-day
cosmological observations,
is associated with the problems of cosmological coincidence
\cite{Zlatev:1998tr} and fine tuning \cite{Martin:2012bt}
which motivate construction of alternative DE models. One approach of constructing
such models, called modified gravity models \cite{fr1},
involves modification of Einstein tensor in the geometric part of
the Einstein field equations. Another class of models treats DE to be
driven by (scalar) fields with
suitably chosen field theoretic Lagrangians contributing to energy-momentum tensor in Einstein
equations.
The second kind of models, as widely discussed in literature, includes the Quintessence
\cite{Peccei:1987mm,Ford:1987de,Peebles:2002gy,Nishioka:1992sg, Ferreira:1997au,Ferreira:1997hj,Caldwell:1997ii,Carroll:1998zi,Copeland:1997et} and $k$-essence models \cite{Fang:2014qga,ArmendarizPicon:1999rj,ArmendarizPicon:2000ah,ArmendarizPicon:2000dh,ArmendarizPicon:2005nz,Chiba:1999ka,ArkaniHamed:2003uy,Caldwell:1999ew}.
A sub-class of such models involves consideration of interaction between DE and DM
\cite{Szydlowski, calogero, calogero1, calogero2, Haba:2016swv,Ber1,Ber2,Band1,Band2,Band3} to explain the
present-day observed features of cosmic expansion. We have considered such a model
in the context of this paper.\\
To investigate the interacting scenario of DE and DM,
we neglect the radiation and baryonic matter contribution to the total energy
density of universe during its late time phase of cosmic evolution
due to their small share ($\sim 4\%$) in the present-day
energy-content as estimated from WMAP \cite{Hinshaw:2008kr} and Planck \cite{Ade:2013zuv} observations.
In this paper, we consider DE to be represented by a homogeneous scalar field $\phi = \phi(t)$
whose dynamics is driven by a purely kinetic ($k$-essence) Lagrangian with a constant potential. Purely
kinetic scalar field models have been widely discussed in \cite{Scherrer:2004au,ArmendarizPicon:1999rj,ArmendarizPicon:2000ah,Chiba:1999ka,Garriga:1999vw,Armendariz-Picon:2000nqq,Chimento:2003zf,Chimento:2003ta}
and references therein. The DM component of the universe, on the other hand, is chosen to be
a non-relativistic pressure-less fluid (dust). We consider the DE-DM interaction
to be time-dependent and introduce it through a source term $Q(t)$
in the non-conserving continuity equations for DM and DE
(see Eqs.\ (\ref{eq:contdm}) and (\ref{eq:contde}) in Sec.\ \ref{seciii}).
The function $Q(t)$ provides a measure of instantaneous rate of
energy transfer between DE and DM components of the universe.\\
We consider spacetime geometry of the expanding universe, at large scales, to be
isotropic and homogeneous and flat which is described by the
Friedmann - Robertson - Walker (FRW) metric characterised by a time
dependent scale factor $a(t)$ and zero curvature constant.
The evolution of such a universe with its content modelled as
an ideal fluid (characterised by its energy density $\rho(t)$ and pressure $p(t)$)
is governed by the Friedmann equations which connect $a(t)$ and its derivatives
with $\rho(t)$ and $p(t)$.
Using the luminosity distance \textit{vs.} redshift measurements in Supernova Ia (SNe Ia) observations,
the temporal profile of the scale factor, the Hubble parameter $H = \dot{a}/a$ may be extracted.
From this knowledge, the time profile of total energy density and pressure of the universe
may as well be computed, exploiting the Friedmann equations.\\
When we consider DM and DE to be non-interacting,
both the components of total dark fluid
separately satisfy respective continuity equations (Eqs.\ (\ref{eq:contdm}) and
(\ref{eq:contde}) with $Q(t)=0$) implying separate
energy conservation in each individual sector.
In this non-interacting DE-DM scenario, if the
dynamics of DE is considered to be driven by a
scalar field $\phi$ governed by a $k$-essence Lagrangian of form $L = V_0F(X)$
with a constant potential $V_0$
and $X = \frac{1}{2}\nabla^\mu\phi \nabla_\mu\phi = \frac{1}{2}\dot{\phi}^2$,
one obtains a scaling of the form: $X(dF/dX)^2 = Ca^{-6}$
($C$ is a constant) \cite{Scherrer:2004au,dePutter:2007ny}. Separate energy conservation in
the DE sector and the constancy of $k-$essence potential are instrumental
in obtaining such a scaling. This scaling relation connects the scale factor
$a$ and $k$-essence scalar field $\phi$
through its time derivatives appearing in $X$ and $dF/dX$. \\
In this paper we have shown that, even in presence of time-dependent interactions
between DE and DM ($Q(t) \neq 0$) implying continual exchange of
energy between the two sectors,
the constancy of $k-$essence potential may lead to a modified form of
scaling. We have obtained such a scaling,
by parametrising the dependence of source term $Q(t)$ on $a(t)$
as a power law: $Q(t)=Q_0 [a(t)]^k$, where $k$ is a constant and $Q_0$
is the value of $Q(t)$ at present epoch ($a(t)$ is normalised to 1 at present epoch).
In obtaining the form of scaling relation with above parametrisation of
DE-DM interactions, we have taken into consideration the observed feature of temporal
behaviour of the FRW scale factor $a(t)$, probed in the measurement of luminosity distance and
redshift of SNe Ia events. The observational ingredient enters into the
explicit form of scaling relation at different levels of its derivation,
through various constants which encode in them features of the observational data.
The obtained scaling depends on $k$ and $Q_0$, which are the two
parameters of the
model. For computational convenience,
in stead of $Q_0$,
we used a dimensionless parameter $\beta_0 \equiv Q_0/(\rho_{\rm de}^0 + \rho_{\rm dm}^0)$
all through the work.
We also find the region of the corresponding $k - \beta_0$
parameter space that is allowed from SNe Ia data,
in the context of interacting DE-DM model
considered here. \\
The paper is organised as follows. In Sec.\ \ref{secii}, we briefly discussed Joint Light curve Analysis (JLA)
of Supernova Ia data using which we obtain the temporal behaviour of scale factor and its
derivatives. In Sec.\ \ref{seciii}, we presented the theoretical framework of
interacting DE-DM scenario in FRW universe. We obtained temporal behaviour
of equation of state parameter ($\omega = p/\rho$) of the total dark fluid and
the total energy density $\rho$ of the universe
using obtained time profile of the scale factor and its derivatives obtained in Sec.\ \ref{secii}.
In the context of this interacting
DE-DM scenario, temporal behaviour of energy density of individual DE and DM components
($\rho_{\rm de}$ and $\rho_{\rm dm}$) have also been obtained in terms of model-parameters $k$ and $\beta_0$.
In Sec.\ \ref{seciv} we have shown how we derived the corresponding modified scaling relation
for $k-$essence model of DE with a constant
potential. The sensitivity of the modified scaling relation on the parameters $k$ and $\beta_0$
are also graphically
represented for different chosen benchmark values of the parameters within their allowed region.
We summarised the results in the concluding Sec.\ \ref{secv}.
\section{Cosmological parameters from analysis of SNe Ia data}
\label{secii}
As discussed in Sec.\ \ref{seci} the luminosity distance and redshift measurements
of type Ia Supernova is the key observational ingredient in establishing
the transition from decelerated to an accelerated phase of cosmic expansion
during its late time phase of evolution. We have used the observational
data as input, in estimating the behaviour of modified scaling,
on the parameters $k$, $\beta_0$ which parametrises the
time dependent interaction $Q(t)$ between DE and DM.
In this section we describe how we extract the relevant cosmological parameters
from the SNe Ia data to use them as direct inputs into this estimation.
There exist different compilations of the SNe Ia data corresponding
to supernova surveys in different redshift region using diverse probes and measurements.
Small redshift $(z > 0.1)$ projects comprise Harvard-Smithsonian Center for Astrophysics survey (cFa) \cite{ref:Hicken}, the Carnegie Supernova Project (CSP)(\cite{ref:Contreras},\cite{ref:Folatelli},\cite{ref:Stritzinger}), the Lick Observatory Supernova Search (LOSS) \cite{ref:Ganeshalingam} and the Nearby Supernova Factory (SNF) \cite{ref:Aldering}.
SDSS-II supernova surveys (\cite{ref:Frieman},\cite{ref:Kessler},\cite{ref:Sollerman},\cite{ref:Lampeitl},\cite{ref:Campbell}) are mainly focused on the redshift region of ($0.05<z<0.4$). Programmes like Supernova Legacy Survey (SNLS)
(\cite{ref:Astier},\cite{ref:Sullivan}) the ESSENCE project \cite{ref:Wood-Vasey}, the
Pan-STARRS survey (\cite{ref:Tonry},\cite{ref:Scolnic},\cite{ref:Rest}) correspond
to high redshift regime.
More than one thousand SNe Ia events have been discovered through all surveys. However,
in the range between $z \sim 0.01$ and $z \sim 0.7$, luminosity distances have been
measured with a very high statistical precision.
`Joint Light-curve Analysis (JLA) data' (\cite{ref:Scolnic},\cite{ref:Conley},\cite{ref:Suzuki}) contains a total of 740 SNe Ia events from
full three years of SDSS survey, first three seasons of
the five-year SNLS survey and 14 very high redshift $0.7<z<1.4$ SNe Ia from space-based observations with the HST \cite{ref:Riess}.
For the present work, we consider this data set for analysis
where the different systematic uncertainties are taken care of
by compiling the data with flux-averaging
technique whose technical details
have been comprehensively
described in \cite{jla,wang:jcap,wang:prd}. We briefly outline the methodology
of analysis here. The $\chi^2$ function corresponding to JLA data is defined as
\begin{eqnarray}
\chi^2 = \sum_{i,j=1}^{740}(\mu_{\rm obs}^{(i)} - \mu_{\rm th}^{(i)})
(\sigma^{-1})_{ij}
(\mu_{\rm obs}^{(j)} - \mu_{\rm th}^{(j)} ) \,,
\label{eq:jla1}
\end{eqnarray}
where $\mu_{\rm obs}^{(i)}$ and $\mu_{\rm th}^{(i)}$ respectively
denote the observed value and theoretical expression for
distance modulus at red-shift $z_i$. In a flat FRW spacetime,
$\mu_{\rm th}^{(i)}$ is given by
\begin{eqnarray}
\mu_{\rm th}^{(i)} &=&
5\log_{10} [d_L(z_{\rm hel},z_{\rm CMB})/{\rm Mpc})] + 25
\label{eq:rnew1}
\end{eqnarray}
where $d_L$ is the luminosity distance it's given by
\begin{eqnarray}
d_L(z_{\rm hel},z_{\rm CMB}) &=&
(1 + z_{\rm hel}) r(z_{CMB}) \quad \mbox{with} \quad r(z) = cH_0^{-1} \int_0^z \frac{dz^\prime}{E(z^\prime)}\,,
\label{eq:rnew2}
\end{eqnarray}
and $z_{\rm CMB}$ and $z_{\rm hel}$ respectively
refer to CMB rest frame and heliocentric frame
value of SNe IA redshifts. The value of Hubble parameter at present
epoch is denoted by $H_0$. The observed distance modulus $\mu_{\rm obs}^{(i)}$
is expressed in terms of the observed peak magnitude
$m_B^\star$, the time stretching parameter of the light-curve
$X_1$ and supernova color at maximum brightness, $C$ as
\begin{eqnarray}
\mu_{\rm obs}^{(i)} &=& m_B^\star(z_i) - M_B + \alpha X_1(z_i) - \beta C(z_i)
\label{eq:rnew3}
\end{eqnarray}
$\alpha$, $\beta$ being the nuisance parameters and
the absolute magnitude $M_B$ is kept fixed at the value -19. $\sigma_{ij}$
in Eq.\ (\ref{eq:jla1}) is the covariant matrix as given in
Eq.\ (2.16) of \cite{wang:jcap}.
Wang in \cite{wang:jcap} proposed a flux averaging technique
to reduce the effect of systematic uncertainties involved in the covariant matrix
owing to weak lensing of SNe Ia data. We take the result of
redshift($z$)-dependence of the function
$E(z) = H(z)/H_0$ (corresponding to a zero red-shift cut-off $z=0$)
obtained in \cite{wang:jcap}
from the $\chi^2$-marginalisation with respect to $(M_B, \alpha, \beta)$.
The 1$\sigma$ range of $E(z)$ resulting from the analysis
is shown in Fig.\ \ref{fig:EZ}. The mean
of $E(z)$ values for every $z$ in this $1\sigma$ range
is shown by the dashed line in Fig .\ \ref{fig:EZ}.
The temporal behaviour of relevant cosmological quantities
are obtained using this mean $E(z)$ vs $z$
curve as benchmark.
\begin{figure}[H]
\centering
\includegraphics[width=0.7\linewidth]{EZ.pdf}
\caption{Plots of $E$ vs $z$ (Dashed line correspond to the average value of $E(z)$ over
the 1$\sigma$ range of $E(z)$) depicted by shaded region.}
\label{fig:EZ}
\end{figure}
The scale factor $a$, which we have taken
to be normalised to $a=1$ at present epoch, is related to redshift $z$ by the relation
$1/a = 1+z$. Using $H=\dot{a}/a$ we can write
\begin{eqnarray}
dt &=& - \frac{dz}{(1+z)H(z)} = - \frac{dz}{(1+z)H_0E(z)}
\label{eq:jla2}
\end{eqnarray}
which on integration gives
\begin{eqnarray}
\frac{t(z)}{t_0} &=& 1
- \frac{1}{H_0t_0}\int_z^0 \frac{dz^\prime}{(1+z^\prime)E(z^\prime)}
\label{eq:jla3}
\end{eqnarray}
where $t_0$ denotes present epoch. Using $E(z)$ vs $z$ profile as shown in Fig.\ \ref{fig:EZ}
we perform the above integration numerically
to obtain $z$ dependence of $t(z)$. Using Eq.\ (\ref{eq:jla3}) and the relation $1/a = 1+z$,
simultaneous values of $a$ and $t$ at any given redshist $z$ are computed.
This amounts to elimination of $z$ from them to obtain the time profile of $a(t)$
from the analysis of observational data. The obtained profile is shown in left
panel of Fig.\ \ref{fig:avst} and this corresponds to the
redshift range $0 \leqslant z \leqslant 1$ or to the equivalent $t$-range: $0.44 \leqslant t(z) \leqslant 1$
as obtained from Eq.\ (\ref{eq:jla3}). $t$ is also normalised to unity ($t_0 = 1$)
at present epoch $z=0$.
\begin{figure}[H]
\centering
\includegraphics[width=0.7\linewidth]{avst.pdf}
\caption{Plot of $a$ (left panel), $\dot{a}$ (middle panel) and $\ddot{a}$ (right panel) vs $t$
corresponding to the central line of Fig.\ \ref{fig:EZ}.}
\label{fig:avst}
\end{figure}
\section{Framework of interactive Dark energy - Dark matter model}
\label{seciii}
In this section we describe the theoretical framework of interacting DE-DM
scenario in FRW flat spacetime background filled with
an ideal fluid with its components as DE and DM.
We focus only on the late time era of cosmic evolution where we neglect the
contribution to energy density due to baryonic matter and radiation,
as supported by small estimated value of their combined share $(\sim 4\%)$
in present universe based on measurements from
WMAP \cite{Hinshaw:2008kr} and Planck \cite{Ade:2013zuv}
experiments. The conservation
of energy momentum tensor for the total dark fluid
with interactions between its components may be expressed through
the non-conserving continuity equations,
\begin{eqnarray}
\Big{[} \dot{\rho}_{\rm dm} + 3H {\rho}_{\rm dm}\Big{]} &=& Q(t)
\label{eq:contdm}\\
\Big{[} \dot{\rho}_{\rm de} + 3H ( \rho_{\rm de} + p_{\rm de})\Big{]}
&=& -Q(t)
\label{eq:contde}
\end{eqnarray}
where, $\rho_{\rm de}$ and $\rho_{\rm dm}$ denote the instantaneous
energy densities of DE and DM components respectively and
$p_{\rm de}$ is the pressure of DE fluid. Dark matter is considered
to be (non-relativistic) pressure-less dust.
The function $Q(t)$ in the source term of the above equation
gives a measure of instantaneous rate of
energy transfer between DE and DM components.
Eqs.\ (\ref{eq:contdm}) and (\ref{eq:contde}) imply
\begin{eqnarray}
\dot{\rho} + 3H(\rho + p) & = &0
\label{eq:conttot}
\end{eqnarray}
which implies conservation of energy momentum tensor of the total dark fluid with
energy density $\rho = \rho_{\rm de} + \rho_{\rm dm}$ and
pressure $p = p_{\rm de}$. The dot ($\cdot$) represents
derivatives with respect to the dimensionless time parameter
$t$ which is normalised to $t=1$ at present epoch. As discussed
in Sec.\ \ref{secii}, the time profile of $a(t)$ has been
extracted from analysis of observational data over the
late time domain $0.44 \lsim t \leqslant 1$ accessible in SNe Ia observations.
We express the time dependence of the source term $Q(t)$ through the scale
factor $a(t)$ and a constant parameter $k$ as
\begin{eqnarray}
Q(t)=Q_0 \big{[}a(t) \big{]} ^k
\label{eq:qt}
\end{eqnarray}
Where $Q_0$ is the value of $Q(t)$ at present epoch since we
used the normalisation $a(t)=1$ at present epoch.
For convenience, we express time dependences of various quantities
in terms of a time parameter $\eta$ defined as
$\eta \equiv \ln a(t)$ ($\eta=0$ then corresponds to the present epoch and $a = e^{\eta}$).
Eqs.\ (\ref{eq:contdm}) and (\ref{eq:contde}) then take the form
\begin{eqnarray}
\rho_{\rm dm}^\prime + 3\rho_{\rm dm} &=& Q_0\frac{e^{k\eta}}{H}
\label{eq:contetadm}\\
\rho_{\rm de}^\prime + 3(\rho_{\rm de} + p_{\rm de}) &=&
- Q_0\frac{e^{k\eta}}{H}
\label{eq:contetade}
\end{eqnarray}
where all the time-dependent quantities involved,
are regarded as functions of $\eta$ and
$^\prime$ denotes derivative with respect to $\eta$.
Multiplying both sides of Eq.\ (\ref{eq:contetadm}) by $e^{3\eta}$
and writing the right hand side as a total derivative we get
\begin{eqnarray}
\dv{}{\eta} \Big{[} e^{3\eta}\rho_{\rm dm} \Big{]}
&=& Q_0\frac{e^{(k+3)\eta}}{H}
\label{eq:totder}
\end{eqnarray}
which on integration between limits $\eta=0$ and $\eta=\eta$ gives
\begin{eqnarray}
\rho_{\rm dm}(\eta)
&=&
e^{-3\eta}\left[\rho_{\rm dm}^0 + Q_0\int_0^\eta \frac{d\eta_1\
e^{(k+3)\eta_1} }{H(\eta_1)}\right]\,
\label{eq:rhodmeta}
\end{eqnarray}
where, $\rho_{\rm dm}^0$ denotes the DM density at
present epoch. Note that, in absence of any interaction
between DE and DM ($Q_0=0$), we
get $\rho_{\rm dm}(\eta) = e^{-3\eta}\rho_{\rm dm}^0
= a^{-3}\rho_{\rm dm}^0$, which is as expected from $\Lambda$-CDM model.
Dividing both sides by the total dark fluid density at present epoch, $(\rho_{\rm de}^0 + \rho_{\rm dm}^0)$,
we have
\begin{eqnarray}
\frac{\rho_{\rm dm}(\eta;k,\beta_0)}{(\rho_{dm}^0 + \rho_{de}^0)}
&=&
e^{-3\eta}\left[\Omega_{\rm dm}^0
+
\beta_0
\int_0^\eta \frac{d\eta_1\
e^{(k+3)\eta_1} }{H(\eta_1)}
\right]
\label{eq:rhodmeta1a}
\end{eqnarray}
Here, $\beta_0 \equiv Q_0 /(\rho_{\rm dm}^0 + \rho_{\rm de}^0)$ and
$\Omega_{\rm dm}^0 (\equiv \rho_{\rm dm}^0/(\rho_{\rm dm}^0 + \rho_{\rm de}^0))$
denotes fractional content of DM in the present universe whose value
is $\sim 0.268$ from WMAP and PLANCK observations \cite{Hinshaw:2008kr, Ade:2013zuv}.
$k$ and $\beta_0$ are also put in the argument of $\rho_{\rm dm}$ to emphasize the
point that
temporal behaviour of the DM energy density, in this scenario,
depends on values of these parameters. \\
The time profile of the Hubble parameter $H(t)=\dot{a}/a$ may be obtained
from the temporal profile of $a$ and $\dot{a}$ as shown in Fig.\ \ref{fig:avst}.
Numerically eliminating $t$ from the $a(t)$ and $H(t)$
we may express the Hubble parameter as a function
of $a$ or subsequently as a function of $\eta$ as $H(\eta)$
which appear in the right hand side of Eq.\ (\ref{eq:rhodmeta1a}).
We find that the quantity $1/H(\eta)$, thus obtained, corresponding
to the central line in Fig. \ref{fig:EZ}, may be fitted with a polynomial of order
3, which we express as
\begin{eqnarray}
\frac{1}{H(\eta)} = \sum_{m=0}^3 A_m \eta^m \quad
\mbox{where, } A_0 = 1, A_1 = 0.45, A_2 = -0.32, A_3 = -0.15.
\label{eq:onebyh}
\end{eqnarray}
Using Eq.\ (\ref{eq:onebyh}) in the integral appearing in
right hand side of Eq.\ (\ref{eq:rhodmeta1a}) we have
\begin{eqnarray}
\frac{\rho_{\rm dm}(\eta;k,\beta_0)}{(\rho_{dm}^0 + \rho_{de}^0)} &=&
e^{-3\eta}\left[\Omega_{\rm dm}^0 + \beta_0\sum_{m=0}^3A_m I_{k,m}(\eta) \right]
\label{eq:rhodmeta1}
\end{eqnarray}
where
\begin{eqnarray}
I_{k,m}(\eta) & \equiv & \int_0^\eta d\eta_1\ e^{(k+3)\eta_1}{(\eta_1)}^m
\label{eq:Ifunc}
\end{eqnarray}
For $k \neq -3$, the function $I_{k,m}(\eta)$ satisfies the recursion relation
\begin{eqnarray}
I_{k,m}(\eta)
&=& \frac{\eta^m e^{(k+3)\eta}}{k+3}
- \frac{m}{k+3} I_{k,m-1}(\eta)\label{eq:Ifuncrecur} \\
&&\mbox{with} \quad I_{k,0}(\eta) = \int_0^\eta d\eta_1 e^{(k+3)\eta_1}
= \frac{e^{(k+3)\eta}}{k+3} \nonumber
\label{eq:Ifunc0}
\end{eqnarray}
However, for $k = -3$, the exponential term in Eq.\ (\ref{eq:Ifunc}) becomes unity
and we can easily compute the integral as
\begin{eqnarray}
I_{-3,m}(\eta) & \equiv & \int_0^\eta d\eta_1\ {(\eta_1)}^m
= \frac{\eta^{m+1}}{m+1}\,
\label{eq:Ifunckm3}
\end{eqnarray}
where $m$ can take 4 values \textit{viz.} 0, 1, 2, 3 as evident from
Eq.\ (\ref{eq:onebyh}).
Using Eq.\ (\ref{eq:Ifuncrecur}) or (\ref{eq:Ifunckm3}), according as $k \neq -3$ or $k = -3$,
we can write the term $\displaystyle\sum_{m=0}^3A_m I_{k,m}(\eta)$ appearing in right hand side
of Eq.\ (\ref{eq:rhodmeta1}) as
\begin{eqnarray}
\sum_{m=0}^3A_m I_{k,m}(\eta)
&=&
\begin{cases}
(B_{k0} + B_{k1} \eta + B_{k2} \eta^2 + B_{k3} \eta^3 )e^{(k+3)\eta} \quad \mbox{for } k \neq -3\\
A_0\eta + \frac{A_1\eta^2}{2} + \frac{A_2\eta^3}{3} + \frac{A_3\eta^4}{4} \quad \mbox{for } k = -3
\end{cases}
\label{eq:sumterm}
\end{eqnarray}
where, the constants $B_{ki}$'s can be expressed as
\begin{eqnarray*}
B_{k0} &=& \left(\frac{A_0}{k+3} - \frac{A_1}{(k+3)^2} + \frac{2A_2}{(k+3)^3} - \frac{6A_3}{(k+3)^4}\right)\\
B_{k1} &=&\left(\frac{A_1}{k+3} - \frac{2A_2}{(k+3)^2} + \frac{6A_3}{(k+3)^3} \right)\\
B_{k2} &=& \left( \frac{A_2}{k+3} - \frac{3A_3}{(k+3)^2} \right)\\
B_{k3} &=& \left(\frac{A_3}{k+3}\right)
\end{eqnarray*}
With the aid of Eq.\ (\ref{eq:sumterm}) the $\eta$-dependence appearing
in right hand side of Eq.\ (\ref{eq:rhodmeta1})
can be expressed in an algebraic form in terms of parameters $k$ and
$\beta_0$, with known values of all other factors involved in the expression,
\textit{e.g} $A_i$'s and $\Omega_{\rm dm}^0 \sim 0.268$. This allows us
to numerically compute the time($\eta$)-profile of DM energy density term
for any chosen benchmark values of the parameters: $k$ and $\beta_0$.
Note that, determination of values of constants $A_i$'s (and so also $B_{ki}$'s for any given $k$)
uses time profile of scale factor as extracted from analysis of SNe Ia data.
The obtained $\eta$-dependence of DM energy density term
in DE-DM interacting scenario is, therefore, consistent with
the Sne Ia data. The features of the data
are encoded in the corresponding expression through the
constants $A_i$'s. We may now also use
the substitution $\eta = \ln a$ in Eqs.\ (\ref{eq:rhodmeta1}) and (\ref{eq:sumterm})
to express the time dependence in terms of scale factor $a$ itself as
\begin{eqnarray}
\frac{\rho_{\rm dm}(a;k,\beta_0)}{(\rho_{dm}^0 + \rho_{de}^0)} &=&
a^{-3}\left[\Omega_{\rm dm}^0 + \beta_0\sum_{m=0}^3A_m I_{k,m}(\ln a) \right]
\label{eq:rhodmvsa}
\end{eqnarray}
The total energy density $\rho = \rho_{\rm dm}+\rho_{\rm de}$
and pressure $p = p_{\rm de}$
of the dark fluid, on the other hand, are
independent of the parameters $\beta_0$ and $k$, as
the continuity equation of the total dark fluid involves no source term.
We can obtain their temporal behaviour,
directly from the time profile of the scale factor obtained from the analysis
discussed in Sec.\ \ref{secii}. To see this, we write the Friedmann equations
governing late-time cosmic evolution, which in a
flat FRW spacetime background with DE and DM as its primary contents
take the forms
\begin{eqnarray}
H^2
&=& \left(\frac{\dot{a}}{a}\right)^2 = \frac{\kappa^2}{3} (\rho_{\rm dm} + \rho_{\rm de})
\label{eq:fri1}\\
\frac{\ddot{a}}{a}
&=& -\frac{\kappa^2}{6} \Big{[} (\rho_{\rm dm} + \rho_{\rm de}) + 3p_{\rm de}\Big{]}
\label{eq:fri2}
\end{eqnarray}
where $\kappa^2 \equiv 8\pi G$ ($G$ is the Newton’s Gravitational constant).
Using Eqs.\ (\ref{eq:fri1}) and (\ref{eq:fri2}), we may express the
equation of state $w$ of the total dark fluid in terms of the scale factor
and its time derivatives as
\begin{eqnarray}
w & \equiv & \frac{p_{\rm de}}{\rho_{\rm de} + \rho_{\rm dm}}
= -\frac{2}{3}\frac{a\ddot{a}}{\dot{a}^2} - \frac{1}{3}
\label{eq:eostotal}
\end{eqnarray}
From the obtained time profile of scale factor $a(t)$ and its derivatives as shown in
Fig.\ \ref{fig:avst} we can obtain $t-$dependence of $w(t)$.
Numerically eliminating $t$ from the $a(t)$ and $w(t)$
we may express the equation of state parameter $w$ as a function
of $a$ or $\eta$, making use of the substitution $\eta = \ln a$.
We find that, $w(\eta)$ thus obtained, corresponding
to the central line in Fig.\ \ref{fig:EZ}, may be fitted with a polynomial of order 5.
This we express as
\begin{eqnarray}
w(\eta) &=& -1 + \sum_{i=0}W_i \eta^i \label{eq:wetafit}
\end{eqnarray}
with values of the coefficients $W_i$ at best-fit are given by
\begin{eqnarray}
&& W_0 = -0.70\, , W_1 = -0.61\,, W_2 = -0.49\,,
W_3 = -2.29\,, \nonumber\\
&& W_4 = -2.81\,, W_5 = -0.92\,,
\mbox{ and }W_i = 0\, \mbox{ for } i>5
\label{eq:wetacoeff}
\end{eqnarray}
In terms of the parameter $\eta$ the
continuity equation (\ref{eq:conttot}) for the total dark fluid takes the form
\begin{eqnarray}
\frac{d}{d\eta} \ln \Big{(} \rho_{\rm dm} + \rho_{\rm de}\Big{)}
&=& - 3 \Big{(} 1 + w(\eta)\Big{)}
\label{eq:conttoteta}
\end{eqnarray}
which on integration between the limits $\eta=0$ and $\eta=\eta$ gives
\begin{eqnarray}
\frac{(\rho_{\rm de} + \rho_{\rm dm} )_{\eta}}{(\rho_{\rm de}^0 + \rho_{\rm dm})_0}
&=&
\exp\left[-3\int_{0}^\eta \big{(}1 + w(\eta_1)\big{)}d\eta_1 \right]
\label{eq:rhoetacoeff}
\end{eqnarray}
The integral within exponent
can be performed by using Eq.\ (\ref{eq:wetafit}), with $W_i$'s as given
in Eq.\ (\ref{eq:wetacoeff}). This gives
\begin{eqnarray}
\frac{ \rho_{\rm de}(\eta) + \rho_{\rm dm} (\eta) }{(\rho_{\rm de}^0 + \rho_{\rm dm}^0)}
&=&
\exp\left[-3\int_{0}^\eta \left( \sum_{i=0}^5 W_i \eta_1^i \right)d\eta_1 \right]
=
\exp\left[-3\left( \sum_{i=0}^5 \frac{W_i \eta^{i+1}}{i+1} \right) \right]
\label{eq:rhototeta1}
\end{eqnarray}
We may again use the substitution $\eta = \ln a$ in the above
to express the energy density of the total dark fluid $\rho = \rho_{\rm de} + \rho_{\rm dm}$
as a function of scale factor $a$ as,
\begin{eqnarray}
\frac{\rho(a)}{\rho_{\rm de}^0 + \rho_{\rm dm}^0}
&=&
\exp\left[-3\left( \sum_{i=0}^5 \frac{W_i (\ln a)^{i+1}}{i+1} \right) \right]
\label{eq:rhototvsa}
\end{eqnarray}
We find that this scale factor dependence of the total energy density,
thus obtained, can be fitted best with a fourth order polynomial expressed as,
\begin{eqnarray}
\frac{\rho(a)}{\rho_{\rm de}^0 + \rho_{\rm dm}^0}
&=& \sum_{m=0}^4 R_m a^m
\label{eq:rhotot}
\end{eqnarray}
with the best-fit values of coefficients as
\begin{eqnarray}
R_0 = 29.3, \quad R_1 = -120.3, \quad R_2 = 199.96,
\quad R_3 = -151.75, \quad R_4 = 43.8
\label{eq:Rval}
\end{eqnarray}
Note that, the constants $W_i$'s and $R_i$'s
encode the inputs from the observational data
used here. \\
Similarly we may also obtain temporal behaviour of the pressure ($p_{\rm de}$) of
DE. Since dark matter dust has zero
pressure, the equation of state parameter of the dark fluid can be written as
\begin{eqnarray}
w(\eta) &=& \frac{p_{\rm de}(\eta)}{\rho_{\rm de}(\eta) + \rho_{\rm dm}(\eta)}\,,
\end{eqnarray}
from which we may write
\begin{eqnarray}
\frac{p_{\rm de}(\eta)}{ \rho_{\rm de}^0 + \rho_{\rm dm}^0}
&=&
w(\eta) \frac{\rho_{\rm de}(\eta) + \rho_{\rm dm}(\eta)}{ \rho_{\rm de}^0 + \rho_{\rm dm}^0}
\label{eq:pdeform1}
\end{eqnarray}
Using Eqs.\ (\ref{eq:wetafit}) and (\ref{eq:rhototeta1})
in Eq.\ (\ref{eq:pdeform1}) and by making the substitution $\eta = \ln a$
we may express this functional behaviour of the $p_{\rm de}$
in terms of $a$ as
\begin{eqnarray}
\frac{p_{\rm de}(a)}{ \rho_{\rm de}^0 + \rho_{\rm dm}^0}
&=&
\Big{[} -1 + \sum_{i=0}^5 W_i (\ln a)^i \Big{]} \cdot
\exp\left[-3\left( \sum_{i=0}^5 \frac{W_i (\ln a)^{i+1}}{i+1} \right) \right]
\label{eq:pdeform2}
\end{eqnarray}
We find that, this scale factor dependence of $p_{\rm de}$
can be fitted best with a polynomial of order 6 expressed as,
\begin{eqnarray}
\frac{p_{\rm de}(a)}{\rho_{\rm de}^0 + \rho_{\rm dm}^0}
&=& \sum_{m=0}^6 P_m a^m
\label{eq:pdeafit}
\end{eqnarray}
with the best-fit values of coefficients as
\begin{eqnarray}
&& \quad\quad\quad\quad P_0 = -11.84 , \quad P_1 = 90.04,
\quad P_2 = -297.92, \nonumber\\
&& P_3 = 515.97, \quad P_4 = -495.22 , \quad P_5 = 250.83, \quad P_6 = -52.57
\label{eq:Pval}
\end{eqnarray}
The scale factor dependence of $\rho(a)$
and $p_{\rm de}(a)$, thus obtained
using the temporal profile of $a(t)$ from SNe Ia data, are
shown in left panel and right panel of Fig.\ \ref{fig:obs} respectively.\\
\begin{figure}[t]
\centering
\includegraphics[width=0.7\linewidth]{obs.pdf}
\caption{Temporal behaviour of cosmological parameters obtained from SNe Ia observation (Left panel: Total energy density as a function of scale factor, Right panel: Pressure of dark sector as a function of scale factor). }
\label{fig:obs}
\end{figure}
Note that, the density of DE as a function of the scale factor $a$ may now
be expressed as
\begin{eqnarray}
\frac{\rho_{\rm de}(a;k,\beta_0)}{(\rho_{dm}^0 + \rho_{de}^0)}
&=&
\frac{\rho(a)}{(\rho_{dm}^0 + \rho_{de}^0)}
- \frac{\rho_{\rm dm}(a;k,\beta_0)}{(\rho_{dm}^0 + \rho_{de}^0)}\,,
\label{eq:rhodeeta3}
\end{eqnarray}
which involves the parameters $\beta_0$ and $k$, due
to their appearance in $\rho_{\rm dm}(a;k,\beta_0)$. Since
energy density is always a positive quantity and
the scale factor or time dependence
of energy density of total dark fluid has
already been obtained directly from observation
(left panel of Fig.\ \ref{fig:obs}),
the estimated profile of the dark matter density
$\rho_{\rm dm}(a,k,\beta_0)$ computed from
Eq.\ (\ref{eq:rhodmeta1a}) for given values of $k$ and
$\beta_0$ are subject to the constraint
\begin{eqnarray}
0 < \frac{\rho_{\rm dm}(a;k,\beta_0)}{(\rho_{\rm de}^0 + \rho_{\rm dm}^0)}
< \frac{\rho(a)}{(\rho_{\rm de}^0 + \rho_{\rm dm}^0)}
\label{eq:kbeta1}
\end{eqnarray}
for the accessible domain of $a$ ($0.5 \lesssim a < 1$) in SNe Ia observations. Using
Eqs.\ (\ref{eq:rhodmvsa}) and (\ref{eq:rhotot}), we may express the above condition
as
\begin{eqnarray}
0 < a^{-3}\left[\Omega_{\rm dm}^0 + \beta_0\sum_{m=0}^3 A_m I_{k,m}(\ln a) \right] <
\displaystyle\sum_{m=0}^4 R_m a^m
\label{eq:kbeta2}
\end{eqnarray}
where the function $I_{k,m}(\ln a)$ contains the parameter $k$ as
seen from its explicit form in Eq.\ (\ref{eq:sumterm}) with $\eta = \ln a$.
Using the form of $I_{k,m}(\ln a)$ for $k \neq -3$,
we find the range in the parameter space spanned by $k$ and $\beta_0$,
every point ($k,\beta_0$) of which satisfies the condition in
Eq.\ (\ref{eq:kbeta2}). This allowed region
in parameter space has been shown by the shaded
region in Fig.\ \ref{fig:param}. However, for $k=-3$
(when $Q(t) = Q_0 a^{-3})$, we find the range of $\beta_0$
for which the condition in Eq.\ (\ref{eq:kbeta2})
is satisfied, is $-0.2 \leqslant \beta_0 \leqslant 0.42$. \\
\begin{figure}[t]
\centering
\includegraphics[scale=0.3]{param.pdf}
\caption{Range of parameter space of model parameters $k$ vs. $\beta_0$
for which the condition in Eq.\ (\ref{eq:kbeta2}) is satisfied. A black line is drawn at $\beta_0=0$ to reflect the fact that for $\beta_0 = 0$, the parameter $k$ loses its relevance in the context (described in text).}
\label{fig:param}
\end{figure}
\begin{figure}[t]
\centering
\includegraphics[scale=0.5]{ET.pdf}
\caption{Variation of energy density of dark energy and dark matter
with scale factor for chosen benchmark values of the parameters ($k$ and $\beta_0$).}
\label{fig:ET}
\end{figure}
For some benchmark values of $k$ and $\beta_0$
chosen within this allowed region we have also
depicted the variation of the dark energy and dark matter densities
with the scale factor in Fig.\ \ref{fig:ET}. Note from Eq.\ (\ref{eq:qt}) that for $\beta_0 = 0 = Q_0$, the parameter $k$ becomes irrelevant
and corresponding continuity equation for DM (Eq.\ (\ref{eq:contdm})) has no source
term ($Q(t)=0$). This implies $\rho_{\rm dm}(a) = \rho_{\rm dm}^0 a^{-3}$ with
$\rho_{\rm de}(a) = \rho(a) - \rho_{\rm dm}^0 a^{-3}$, where
$\rho(a)$ as directly obtained from observation
has been expressed
thorough a fitted polynomial in Eq.\ (\ref{eq:rhotot}). These profiles
for $\beta_0=0$ (which corresponds to `non interacting DE-DM' scenario) are presented
in left panel of Fig.\ \ref{fig:ET},
and we find that
DM energy density falling as $\sim 1/a^3$ falls below dark energy
density at an epoch corresponding to $a \sim 0.71$.
For $\beta_0=0.5$ and $k=1$ (middle panel of Fig.\ \ref{fig:ET})
the source term $Q(t)$ grows with time having the same profile as that $a(t)$ itself,
and the corresponding DM and DE density profiles
evaluated using Eqs.\ (\ref{eq:rhodmvsa}) and
(\ref{eq:rhodeeta3}) show that DM energy density falls below
that of DE at an epoch when $a \sim 0.75$.
For $\beta_0=0.1$ and $k=-3$
the source term $Q(t)$ falls as $\sim 1/a(t)^3$ as the universe expands,
and the corresponding plots presented in right panel of Fig.\ \ref{fig:ET}
show beginning of dominance of DE density
over that of DM at a relatively earlier epoch marked by $a \sim 0.63$.
\section{$k$-essence model with constant potential and modification of scaling relation in presence of DE-DM interaction}
\label{seciv}
We assume dynamics of dark energy of universe to
be driven by a homogeneous scalar field $\phi = \phi(t)$
governed by non-canonical $k-$essence Lagrangian
of the form $L = V(\phi)F(X)$ where the potential $V(\phi)=V_0$
is considered to be constant and the dynamical term $F(X)$ is a function of $X
\equiv (1/2)g_{\mu\nu}\nabla^\mu\phi\nabla^\nu\phi = (1/2)\dot{\phi}^2$.
The energy density and pressure of DE are identified with the corresponding
quantities in the context of the $k$-essence model
which may be expressed as
\begin{eqnarray}
\rho_{\rm de} &=& V_0 (2XF_X - F) \label{eq:krhode}\\
p_{\rm de} &=& V_0 F(X) \label{eq:kpde}
\end{eqnarray}
where, $F_X \equiv dF/dX$. In the context of
this constant potential $k-$essence model, it has been shown in \cite{Scherrer:2004au,dePutter:2007ny} that,
in the non-interacting DE-DM scenario when the
energy conservation is separately conserved in the DE sector (and also in DM sector) implying
corresponding continuity equation (\ref{eq:contde}) being satisfied
with $Q(t) = 0$,
we have a scaling relation of the form $XF_X^2 = Ca^{-6}$ where $C$ is a constant.
In this section we show that, even in presence of time-dependent interactions
implying continual exchange of energy between the two sectors ($Q(t) \neq 0$),
the constancy of $k$-essence potential may lead to a modified
form of the scaling. Below we discuss how we obtain
the modified form of scaling taking into
consideration observational inputs from SNe Ia data.\\
To obtain this we use Eqs.\ (\ref{eq:krhode}) and (\ref{eq:kpde}) in
Eq.\ (\ref{eq:contde}) with $Q(t)$ parametrised as $Q(t) = Q_0 [a(t)]^k$ (Eq.\ (\ref{eq:qt})) to get
\begin{eqnarray}
\dv{}{t} \Big{[} V_0 (2XF_X - F) \Big{]}
+ 3H (2V_0XF_X) &=& -Q_0 a^k\,.
\end{eqnarray}
Writing $\displaystyle\frac{d}{dt} = \dot{a}\frac{d}{da}$ and $H = \dot{a}/a$, after some rearrangements
the above equation takes the form
\begin{eqnarray}
d \Big{[}\ln\{a^6(XF_X^2)\}\Big{]} &=& - \frac{Q_0}{V_0} \frac{a^{k-1}}{H}\frac{da}{(XF_X)}
\label{eq:sc1}
\end{eqnarray}
where $F_{XX}=d^2F/dX^2$ and the quantities $H$, $X$, $F$ and its derivatives
are regarded as functions of scale factor $a$. Integrating
both sides of Eq.\ (\ref{eq:sc1}) between the limits $a=1$ (present epoch)
and $a=a$ we have,
\begin{eqnarray}
&& \Big{[}\ln\{a^6(XF_X^2)\}\Big{]} - \Big{[}\ln\{(XF_X^2)\}\Big{]}_{a=1}
=
- \frac{Q_0}{V_0}\int_1^a\frac{ f(a')da'}{(XF_X)} \nonumber\\
\mbox{or,} && \quad\quad
XF_X^2 = C a^{-6} \exp\left(- \frac{Q_0}{V_0}\int_1^a\frac{ f(a';k)da'}{(XF_X)} \right)
\label{eq:sc2}
\end{eqnarray}
where, $C \equiv XF_X^2\big{|}_{a=1}$ is a constant and
$f(a;k) \equiv \frac{a^{k-1}}{H(a)}$. In Eq.\ (\ref{eq:onebyh})
we have shown how $H^{-1}$ depends on $\eta = \ln a$, with the help of
a polynomial of $\ln a$, with given of values of coefficients $A_i$'s
encoding the observational inputs extracted from the analysis of JLA data.
We may, equivalently, fit this scale factor dependence of $H^{-1}$
by a polynomial in $a$ (instead of $\ln a$) and found that, the
corresponding
best-fit curve may be given by a second order
polynomial of scale factor $a$ as
\begin{eqnarray}
\frac{1}{H(a)} &=& \sum_{n=0}^2 D_n a^n
\quad
\mbox{with } D_0 = -0.272\,, D_1 = 2.174\,, D_2 = -0.9.
\label{eq:onebyhvsa}
\end{eqnarray}
To perform the integration involved in Eq.\ (\ref{eq:sc2}), we can then
express the function $f(a,k)$ as a polynomial
\begin{eqnarray*}
f(a;k) &=& a^{k-1} (D_0 + D_1 a + D_2 a^2)\,,
\label{eq:fa}
\end{eqnarray*}
and we also need to express $(XF_X)$ as function of $a$.
To do so, we eliminate $F(X)$ from Eqs.\ (\ref{eq:krhode}) and (\ref{eq:kpde})
and write
\begin{eqnarray}
XF_X &=& \frac{1}{2V_0} \Big{[}\rho_{\rm de} + p_{\rm de} \Big{]}
\label{eq:xfx1}
\end{eqnarray}
Using Eq.\ (\ref{eq:rhodeeta3}) and writing all variables and parameters explicitly, we may write the above equation as
\begin{eqnarray}
XF_X &=& \frac{(\rho_{\rm dm}^0 + \rho_{\rm de}^0)}{2V_0}
\Bigg{[} \frac{\rho(a)}{(\rho_{\rm dm}^0 + \rho_{\rm de}^0)}
- \frac{\rho_{\rm dm}(a;k,\beta_0)}{(\rho_{dm}^0 + \rho_{\rm de}^0)}
+ \frac{p_{\rm de}(a)}{(\rho_{\rm dm}^0 + \rho_{\rm de}^0)} \Bigg{]} \nonumber\\
& = &
\frac{(\rho_{\rm dm}^0 + \rho_{\rm de}^0)}{2V_0} g(a;k,\beta_0)
\label{eq:xfx2}
\end{eqnarray}
where
\begin{eqnarray}
g(a; k,\beta_0)
& \equiv &
\Bigg{[} \frac{\rho(a)}{(\rho_{\rm dm}^0 + \rho_{\rm de}^0)}
- \frac{\rho_{\rm dm}(a;k,\beta_0)}{(\rho_{dm}^0 + \rho_{\rm de}^0)}
+ \frac{p_{\rm de}(a)}{(\rho_{\rm dm}^0 + \rho_{\rm de}^0)} \Bigg{]}
\label{eq:g}
\end{eqnarray}
Finally, using Eq.\ (\ref{eq:xfx2}) in Eq.\ (\ref{eq:sc2}) we obtain
\begin{eqnarray}
\frac{XF_X^2}{Ca^{-6}} &=& \exp\left(-2\beta_0\int_1^a\frac{ f(a_1;k)da_1}{g(a_1; k,\beta_0) } \right)
\label{eq:sc3}
\end{eqnarray}
All the three terms in the right hand side of Eq.\ (\ref{eq:g})
have been expressed in algebraic form in Eqs.\ (\ref{eq:rhodmvsa}),
(\ref{eq:rhotot}) and (\ref{eq:pdeafit}), using which
we can numerically compute the function $g(a; k,\beta_0)$ for any
input values of $a, k, \beta_0$.
With this and using the form of the function $f(a;k)$ in Eq.\ (\ref{eq:fa}),
we may numerically evaluate the integral within the exponent appearing
in Eq.\ (\ref{eq:sc3}).
This is the modified scaling relation arising
out of the constancy of the potential $V=V_0$ of $k$-essence model of dark
energy, in presence of interaction between DE and DM
parametrised in terms of $\beta_0$ and $k$.
The inputs from observational data are encoded in the form
of the functions $f(a;k)$ and $g(a; k,\beta_0)$
through the various coefficients $D_i$'s, $A_i$'s, $P_i$'s, $R_i$'s \textit{etc.}
introduced in Secs.\ \ref{seciii} and \ref{seciv},
while establishing connections
with the temporal profile of the scale factor obtained from the
SNe Ia data in Sec.\ \ref{secii}. In the context of this constant
potential $k-$essence model of dark energy in interacting DE-DM scenario, the modified scaling
relation (\ref{eq:sc3}) establishes a connection between
the dynamical terms $X$, $F(X)$ involved in the $k-$essence Lagrangian
and the scale factor $a(t)$ of FRW universe along with the parameters $k$ and $\beta_0$.
The constancy of the $k$-essence potential
is instrumental in establishing the relation.\\
Note that, in absence of any interaction ($\beta_0 = Q_0 / (\rho_{\rm dm}^0 + \rho_{\rm de}^0) = 0$),
the exponential term in Eq.\ (\ref{eq:sc3}) becomes unity and
the modified scaling relation reduces to the usual form $XF_X^2 = Ca^{-6}$ as obtained in \cite{Scherrer:2004au,dePutter:2007ny}.
Therefore, the deviation from unity, of the quantity
$\exp\left(-2\beta_0\int_1^a\frac{ f(a_1;k)da_1}{g(a_1; k,\beta_0) } \right)$
in right hand side of
(Eq.\ (\ref{eq:sc3}) evaluated for any parameter set ($k, \beta_0$)
gives the extent of modification in the scaling relation due to presence
of (time-dependent) interaction between DE and DM
parametrised in terms of ($k, \beta_0$).
The behaviour of modifications in the scaling relation are shown in three panels
Fig. \ref{fig:scaling} for three chosen benchmark values of $k$ \textit{viz.} $k = 0$ (left panel),
$k = 1$ (middle panel) and $k = -3$ (right panel).
In each of the panels, corresponding to a given value of $k$, we have
plotted the quantity $XF_X^2/Ca^{-6}$ as a function of the scale factor, for few
different values of the parameter $\beta_0$ chosen
from the corresponding allowed domain of $k - \beta_0$ parameter space
discussed (and also shown in Fig.\ \ref{fig:param}) in the end of Sec.\ \ref{seciii}.
The benchmark cases: $k=0$, $k=1$ and $k=-3$
respectively correspond to $Q(t)$ = constant, $Q(t) = Q_0 a(t)$ and $Q(t) = Q_0/[a(t)]^{3}$
in the non-conserving continuity equations\ (\ref{eq:contdm}) and (\ref{eq:contde})
of DM and DE sectors.
The plots shown in Fig. \ref{fig:scaling} show
exponential behaviour for $\beta_0 \neq 0$ as evident from Eq.\ (\ref{eq:sc3}).
Since we have assigned the value $(XF_X^2)\Big{|}_{a=1}$
to the constant $C$ the plots of $XF_X^2/Ca^{-6}$
approach unity as the scale factor approaches to its (normalised) value $a=1$ (at present epoch).
The $\beta_0 = 0$ case, corresponds to
non-interacting DE-DM scenario and is represented by
the $XF_X^2/Ca^{-6} = 1$ line in Fig. \ref{fig:scaling}.\\
\begin{figure}[t]
\centering
\includegraphics[width=0.8\linewidth]{ms.pdf}
\caption{Plot of $XF_X^2/Ca^{-6}$ as a function
of scale factor ($a$) for some benchmark values of the model parameters $k$ and $\beta_0$. The plots within the small boxes drawn on the top of each panel depict the same plots of the panel in an appropriately zoomed domain
$0.7 < a < 1$ to bring out a better resolution of each of the distinct
curves corresponding to different $\beta_0$ values in that domain.}
\label{fig:scaling}
\end{figure}
\section{Conclusion}
\label{secv}
In this paper we considered
a scenario of interacting dark matter and dark energy
during the late time evolution of cosmic evolution,
neglecting the contribution due to radiation and baryonic
matter to the total energy density. We describe the dynamics
of DE to be driven by a homogeneous $k-$essence
field ($\phi$) driven by a non-canonical Lagrangian
of the form $L = V(\phi)F(X)$ with a constant potential
$V(\phi)=V_0$, where the dynamical term $F(X)$ is a function of
$X = \frac{1}{2}\nabla_\mu\phi\nabla^\mu\phi = \dot{\phi^2}$
(for homogeneous field). Under such considerations, we
showed existence of a scaling relation in the theory, which
connects the dynamical quantities $X, dF/dX$ (\textit{i.e.} $\dot{\phi}$)
to the FRW scale factor $a(t)$ of the universe along with
two relevant parameters ($\beta_0$ and $k$) of the model.
The time-dependent interaction
between DM and DE has been
incorporated through a function $Q(t)$ in the
continuity equations ((\ref{eq:contdm}) and (\ref{eq:contde})) of the
two fluids. The source term $Q(t)$ is parametrised
in terms of the dimensionless parameters $\beta_0$ and $k$
as $Q(t) = Q_0 [a(t)]^k$ where $Q_0
\equiv \beta_0(\rho_{\rm dm}^0 + \rho_{\rm de}^0)$,
$\rho_{\rm dm}^0$ and $\rho_{\rm de}^0$ being
the present-day observed energy densities of the dark matter
and dark energy respectively. The constancy of the
$k-$essence potential is instrumental in proving
the scaling relation (Eq.\ (\ref{eq:sc3})) in interacting DE-DM scenario.
For $\beta_0=0=Q(t)$, the obtained scaling
relation reduces to the usual scaling relation
$XF_X^2 = Ca^{-6}$ obtained in \cite{Scherrer:2004au,dePutter:2007ny}
for non-interacting DE-DM scenario.\\
We have expressed the modification to the usual scaling relation
due to the effect of DE-DM interaction
in terms of an exponential term of form:
$\exp\left(-2\beta_0\int_1^a\frac{ f(a_1;k)da_1}{g(a_1; k,\beta_0) } \right)$
(see Eq.\ (\ref{eq:sc3})). In obtaining such a form we have taken
into consideration the observed feature of temporal behaviour of the FRW scale factor $a(t)$,
probed in the measurement of luminosity distance and redshift of SNe Ia
events. This key observational ingredient enters
into the above exponential form
at different levels of its derivation,
through various constants
which finally got twined together
in the obtained expressions for the
functions $f(a;k)$ and $g(a_1; k,\beta_0)$. The
modified scaling expressed in Eq.\ (\ref{eq:sc3}),
in the form of the exponential function,
thus encodes in it the features of the SNe Ia data.
The values of parameters $\beta_0$ and $k$, involved
in the scaling,
are also restricted from observed data. This has been imposed
by the condition $0 < \rho_{\rm dm}(a;k,\beta_0) < \rho(a)$, where
$\rho_{\rm dm}(a;k,\beta_0)$
is the dark matter density
at an epoch corresponding to scale factor value $a$ in
the interacting DE-DM scenario and is expressed by Eq.\ ({\ref{eq:rhodmvsa}).
$\rho(a)$ is the profile of energy density of the total dark fluid extracted
from observation and expressed
thorough a fitted polynomial in Eq.\ (\ref{eq:rhotot}).
This constraint puts a bound in the $k - \beta_0$ parameter space
as shown in Fig.\ \ref{fig:param}. We also observe that, the values
of parameters $\beta_0$ and $k$ which determines the time dependence
of the source term $Q(t)$ responsible for DE-DM interactions,
decide the epoch in the past where density of DE starts
dominating over that of DM. This has been demonstrated
in Fig.\ \ref{fig:ET}.\\
This modified form of scaling relation in Eq.\ (\ref{eq:sc3}),
obtained in the context of DE-DM interacting DE-DM scenario,
may also be used to eliminate $F_X$ from Eqs.\ (\ref{eq:xfx2}),
to obtain $X$ in terms of the functions
$f(a;k)$ and $g(a_1; k,\beta_0)$,
along with the parameters $k$ and $\beta_0$. Since for
homogeneous field $\phi$, we have $X = \frac{1}{2}\dot{\phi}^2$,
one may thus obtain the scale factor dependence or
the temporal profile of the
$k-$essence scalar field in the context of DE-DM interacting scenario using the modified scaling.
\paragraph{Acknowledgement}\
A.C. would like to thank Indian Institute of Technology, Kanpur for supporting this work by means of Institute Post-Doctoral Fellowship \textbf{(Ref.No.DF/PDF197/2020-IITK/970)}.
|
\section*{Acknowledgments}
This work was supported in part by the National Science Foundation Division of Materials Research (Grant DMR-1826623) and the National Science Foundation Center for Theoretical Biological Physics (Grant PHY-2019745).
|
\section{Introduction}
Many problems in science and engineering involve the formation and motion of droplets. Common examples include spray painting, sneezing and disease prevention, fire suppression, and spray combustion. In these problems, accurately predicting how the droplets move is important to predicting the efficacy of the engineering system. This work is particularly interested in predicting the motion of large droplets in these problems, as there are theoretical gaps into the behavior of such droplets. Hence it is a topic worth further investigation.
The research motivation for this work is the phenomenon of spray combustion in aviation gas turbine engines. Spray combustion consists a series of complex physical processes, including jet atomization (also called primary atomization), droplet breakup (also called secondary atomization), evaporation, droplet interaction, and combustion. In Figure.\ref{jet}, a 2D simulation is performed to show liquid jet atomizaiton \cite{palmore_interface-capturing_2022}. A liquid jet is injected into the crossflow, and droplets are produced from jet fragmentation of the jet. Although it is technically feasible to perform simulations of high-fidelity simulations of the type used in Fig.\ref{jet}, such simulations are largely restricted to use in specialized codes associated to academic and government research labs \cite{herrmann_detailed_2010,palmore_interface-capturing_2022,wen_atomization_2020}. To simulate droplet motion is too computationally expensive in practice.
An alternative approach looks at reduced order representations of droplets as Lagrangian particles. The common starting assumption for the Lagrangian model is that droplets are perfectly spherical and have no internal flow. This is accurate for the smallest spray droplets, however, in spray, droplets come in a range of sizes. The largest ones are large enough to see significant deformation which can fundamentally affect their behavior including drag \cite{loth_quasi-steady_2008} and evaporation rate \cite{palmore_vaporization_2022}. Therefore, we will need to improve the physical understanding of droplets to better predict the dynamics of droplets represented by Lagrangian particles. More specifically, this work performs a study on how droplet drag coefficient is dependent on relevant parameters is needed.
\begin{figure}[ht]
\centering
\includegraphics[width=0.4\textwidth]{jet.png}
\caption{2D jet cross-flow simulation using parameters of \cite{herrmann_detailed_2010}}
\label{jet}
\end{figure}
The study of droplet drag coefficient has received attention from researchers for decades. The simplest approximation is to use the standard drag curve of rigid spheres. Several empirical correlations have been posed by multiplying a correction factor to Stokes' law $C_d=24/Re$. A review on these correlations can be found in \cite{goossens_review_2019}. For viscous liquid spheres, the droplet internal flow was assumed to be Hill's spherical vortex in \cite{harper_motion_1968}, while the gaseous flow was a potential flow. Based on these approximations, by integrating the surface stress, an analytical drag coefficient correlation of the first order approximation was derived depending on Reynolds number $Re$ and dynamic viscosity ratio $\mu^*=\mu_l/\mu_g$ in \cite{harper_motion_1968}. The subscript $l$ and $g$ represent liquid and gas respectively. For $Re$ up to 200 with arbitrary $\mu^*$, $C_d$ correlation for viscous spherical droplets was found from numerical simulations by the work in \cite{rivkind_flow_1976}, where the flow was considered steady and axisymmetric, and the Navier-Stokes equations were solved by solving the stream function and vorticity equation in a spherical coordinate. In \cite{feng_drag_2001}, a numerical method was developed by introducing a two-layer concept to capture the very thin boundary layer at the liquid-gas interface, and a drag coefficient for viscous spherical droplets was well established for intermediate $\mu^*=\mu_l/\mu_g$. In \cite{loth_quasi-steady_2008}, drag correlation for deformed droplets were found by examining and fitting experimental results in \cite{reinhart_verhalten_1964}. For drag coefficient correlation of deformed droplets, one can refer to \cite{haywood_numerical_1994}. In the work of \cite{haywood_numerical_1994}, a finite-volume method was used in a non-orthogonal adaptive grid system, and the energy equation was solved as well for droplet evaporation. To investigate the effect of droplet internal circulation, it was revealed in \cite{law_theory_1977} by scaling analysis that the multiplication of density ratio $\rho^*=\rho_l/\rho_g$ and dynamic viscosity ratio $\Lambda=\sqrt{\rho^*\mu^*}$ characterizes the coupling between the liquid and gas phases. \cite{helenbrook_quasi-steady_2002} and \cite{feng_deformable_2010} investigated both the effect of deformation and internal circulation of droplets. An arbitrary-Lagrangian-Eulerian mesh movement scheme with unstructured mesh was used in \cite{helenbrook_quasi-steady_2002} to resolve the position of phase interface. In \cite{feng_deformable_2010}, it was found that given $Re$ and Weber number $We$, droplet drag coefficient was dependent only on $\rho^*/\left(\mu^*\right)^2$, which was equivalent to Ohnesorge number $Oh$ in such case. The Navier-Stokes' equations were solved by Galerkin finite-element method in a cylindrical coordinate. Aforementioned works focus on steady droplet. For spherical droplet that is accelerating or decelerating in the gas, in \cite{temkin_droplet_1980}
and \cite{temkin_droplet_1982}, a correlation to $C_d$ was found based on conical-driver shock tube experiment results, and it was dependent on a non-dimensional relative-acceleration parameter. For deformed transient droplets, the $C_d$ correlation can be found in \cite{qu_numerical_2016}, where the ANSYS Fluent was used to solve the Navier-Stokes equations.
For gas turbine combustion, classical droplet models are incomplete, because in the high temperature and pressure environment, droplets are usually highly deformed, and the coupling between gas and liquid phases is enhanced. These phenomena result in different behaviors between droplets in spray and the droplet theory, consequently, a detailed study on the effect of droplet shape and internal circulation effect will be needed. To study their effect on droplet drag coefficient, we perform an in-house code developed by our group \cite{palmore_volume_2019} for interface-capturing DNS of vaporization multiphase flows. The code uses volume-of-fluid method (VOF) to determine the location of phase interface, and solves Navier-Stokes equations in the whole domain in Cartesian coordinate. Transient droplet motion can be calculated by the code directly, and a more accurate drag coefficient calculation is found by correcting the droplet frontal area estimation. The novelty of this study is that the 3D code simulates droplet shape deformation from first principle without any assumption, and it also includes the effect of pressurized gas on the internal circulation of droplets. More details about numerical implementations can be found in Sec.\ref{method}.
\section{Problem formulation}
We simulate droplet deformation in a uniform convective flow in 3D. An initially spherical n-decane droplet with diameter $D$ is centered at a cubic computation domain with size $\left(8D\right)^3$. Dry air flow enters the domain uniformly in a speed of $U_{in}$ from inlet boundary, and leaves the domain freely on the exit boundary, see Fig.\ref{config}. Periodic boundary conditions are applied to other sides of the domain boundaries. We choose the droplet center of mass as the frame of reference, such that the droplet will be stationary at the center in the domain. To achieve this, an artificial gravity will be used to balance the drag force, and the droplet will reach its terminal velocity. The artificial gravity will be discussed with more details in Sec.\ref{gravity}.
\begin{figure}[ht]
\centering
\includegraphics[width=0.4\textwidth]{configuration.pdf}
\caption{2D slice of the computation domain}
\label{config}
\end{figure}
\subsection{Controlling parameters}
Based on the work in \cite{guildenbecher_secondary_2009} and \cite{law_theory_1977}, the following non-dimensional groups are determined to be the controlling parameters in our problem:
\begin{equation}
Re=\frac{\rho_gU_{in}D}{\mu_g},
\end{equation}
\begin{equation}
We=\frac{\rho_gU_{in}^2D}{\sigma},
\end{equation}
\begin{equation}
\Lambda=\sqrt{\frac{\rho_l\mu_l}{\rho_g\mu_g}}.
\end{equation}
The Reynolds number compares the inertial force and viscous force of gas flowing past the droplet. The Weber number compares the inertial of gas and the surface tension of liquid, indicating how strong a droplet can keep itself spherical. $\Lambda$ reveals the strength of internal motion of droplet compared to the freestream gas flow. In a flow, $\Lambda$ will vary due to the changes in temperature and pressure of the liquid and gas. Comparing atmospheric conditions to those in a gas turbine engine, the dominant effect in $\Lambda$ is due to gas density change accompanying the high gas pressurization. With a fixed Reynolds number, we can control droplet shape by changing Weber number or control internal flow by changing liquid-to-gas density.
\subsection{Configurations}\label{setup}
We perform various numerical simulations on droplet falling at its terminal velocity at $Re=70$. To study its deformation and internal circulation, we do not expect droplet to breakup or breakup too fast. In all our cases, Ohnesorge number $Oh$ is less then $0.1$, so that droplet will not breakup for $We<We_{\text{critical}}\approx12$ \cite{suryaprakash_secondary_2019}. Simulation parameter setup are listed in Table.\ref{parameter}. The dynamic viscosity is $2.47425\times10^{-5}\ \text{kg}/\left(\text{m}\cdot\text{s}\right)$ for gas at liquid-gas interface temperature, which is the boiling temperature of n-decane at around 447.3K \cite{noauthor_air_2003}, and $2.0241\times10^{-4}\ \text{kg}/(\text{m}\cdot\text{s})$ \cite{pj_nist} for liquid. The density of liquid is $603.87\ \text{kg}/\text{m}^3$ \cite{pj_nist}, and the density of gas is determined by the density ratio. Surface tension is set to be $0.01024\ \text{kg}/\text{s}^2$ \cite{pj_nist}. Properties of liquid depends weakly on pressure, so we treat liquid properties as constants. Droplet diameter are determined to achieve parameters set in Table.\ref{parameter}, and domain size is determined as well to keep mesh resolution the same in all cases.
\begin{table}[!ht]
\centering
\begin{tabular}{||c|c|c|c||}
\hline
Case & $\rho^*$ & $P^*=P/P_{atm}$ & $We$ \\ [0.4ex]
\hline\hline
a1$\sim$a4 & 20 & 38.2 & 1,\ 3,\ 6,\ 9 \\
b1$\sim$b4 & 20,\ 40,\ 60,\ 160,\ 765 & 38.2,\ 19.1,\ 9.56,\ 4.78,\ 1.0 & 6 \\
[1ex]
\hline
\end{tabular}
\caption{Properties of the gas and liquid}
\label{parameter}
\end{table}
\section{Numerical methods} \label{method}
We employ an in-house code called NGA\cite{desjardins_high_2008} to simulate droplet falling at its terminal velocity. NGA is developed for solving low-Mach number turbulent flows, and is further developed for interface-capturing multiphase flows by \cite{palmore_volume_2019}. The interface is resolved by
volume-of-fluid(VOF) method. A divergence-free velocity field is created for interface transport by using techniques in \cite{aslam_partial_2004}. The pressure Poisson equation is solved by using the Ghost Fluid Method(GFM) \cite{liu_boundary_2000}.
\subsection{Governing equations}
The governing equations for conservation of momentum in both liquid and gas phases are:
\begin{equation}
\frac{\partial\left(\rho\bm{u}\right)}{\partial t}+\nabla\cdot\left(\rho\bm{u}\otimes\bm{u}\right)=-\nabla p+\nabla\cdot{\mu\bm{S}}+\bm{f},\label{momentum}
\end{equation}
where $\bm{S}=\nabla\bm{u}+\nabla\bm{u}^{\top}-\frac{2}{3}\nabla\cdot\bm{u}$, $\bm{f}$ is the external body force used for stabilizing droplet at the center. The conservation of mass is guaranteed by solving the pressure term from pressure Poisson equations. $\rho$ and $\mu$ are effective density and effective viscosity introduced in Sec.\ref{interface} for solving governing equations in one-phase approach.
\subsection{Interface capturing method}\label{interface}
To solve the liquid-gas interface, VOF method is employed. In VOF method, volume fraction $\phi$ is defined in each cell as the volume percentage occupied by the liquid. For cells entirely within the liquid phase, $\phi=1$, and for cells within the gas phase, $\phi=0$. When the phase interface crosses a cell, the volume fraction will be within the range of $\left[0,1\right]$, and the effective density and viscosity in these cells can be defined as:
\begin{equation}
\begin{aligned}
\rho&=\rho_l\phi+\rho_g\left(1-\phi\right),\\
\mu&=\mu_l\phi+\mu_g\left(1-\phi\right).
\end{aligned}
\end{equation}
The effective density and viscosity are used to solve governing equations of the gas and liquid in a one-phase approach \cite{palmore_volume_2019}. In this way, the velocity field of gas and liquid are treated as a union, and the governing equations can be solved only once for one union velocity field. The evolution of the volume fraction scalar field is governed by the following advection equation with the velocity field to be the gas-liquid union velocity field \cite{owkes_computational_2014}:
\begin{equation}
\frac{\partial\phi}{\partial t}+\bm{u}\cdot\nabla\phi=0.
\end{equation}
\subsection{Jump conditions across interface}
To ensure the conservation of mass and momentum at the phase interface, several matching conditions at phase interface should be satisfied. The current simulations are for non-evaporating droplets, the only jumping condition is the pressure jump due to surface tension:
\begin{equation}
P_g-P_l=-\sigma\kappa.
\end{equation}
where $\sigma$ is liquid surface tension, $\kappa$ is the curvature of the droplet surface, and it is defined so that $\kappa>0$ for convexly shaped liquid regions.
\subsection{Artificial gravity}\label{gravity}
The droplet in the computation domain will move due to the drag force. In the desire of studying a stationary droplet, Palmore and Desjardins \cite{palmore_validating_2018} devised a method that mimics the flow over a falling droplet at terminal velocity. In this method, the gravity is fixed and the terminal velocity is converged. However, due to the uncertainty of the drag coefficient caused by droplet deformation, the velocity reached will still be lower than the terminal velocity. To ensure constant terminal velocity was reached, Lin, Setiya and Palmore \cite{setiya_method_2020,lin_numerical_2022} developed a gravity update scheme to balance the changing drag force. Since the drag force is unknown explicitly, their method is based on a feedback control loop:
\begin{equation}
g^{n+1}=g^{n}+k_U U_d+k_X X_d,
\label{setiya_gravity}
\end{equation}
where $U_d$ is the droplet velocity, $X_d$ is the droplet center of mass position in x-direction, $\alpha$ is an arbitrary weighting constant, and $\tau_c$ is the capillary time defined as $\tau_c=\sqrt{\frac{\rho_l+\rho_g}{\sigma}}\left(\frac{D}{2\pi}\right)^{\frac{3}{2}}$. $k_U$ and $k_X$ are gains of $U_d$ and $X_d$, respectively. This approach has higher robustness on inflow boundary conditions compared to \cite{palmore_validating_2018}. For the current setting, we set $k_U=1/\left(2\tau_c\right)$ and $K_X=0$.
\subsection{Quantification of internal circulation}\label{circulation}
Because the increase of pressure in gas turbine can be significant, the gas density will increase proportionally through ideal gas law. On the contrary, the liquid density remains almost constant regardless of the pressure change. Hence, the gas density change represents the physical process of the pressure change. In addition, studies such as \cite{law_theory_1977,feng_deformable_2010,lin_numerical_2022} have revealed that internal circulation is dependent on density ratio. Therefore, we choose the gas density to be the controlling parameter for changing the strength of internal circulation. To quantify the strength of internal circulation, several common physical quantities are considered, including the maximum liquid velocity, the maximum and mean vorticity of the droplet, and the droplet enstropy. Based on our previous work, maximum velocity and vorticity are
not good choices due to their sensitivity to numerical errors, while volume-averaged variables are better in representing internal circulation strength \cite{lin_numerical_2022}. Thus, we only use volume-averaged variables in this study. The definition of vorticity $\bm{\omega}$ and enstrophy $\mathcal{E}$ is:
\begin{align}
\bm{\omega} &= \nabla\times \bm{U}_{L},\\
\mathcal{E} &= \frac{1}{2}\bm{\omega}^2,
\end{align}
where $U_L$ is the liquid phase velocity field. $\omega$ is vorticity, and $\mathcal{E}$ is enstrophy. In addition, a variable we have termed the Hill's constant is also used as a measure of internal circulation strength. The Hill's spherical vortex \cite{panton_incompressible_2013} is the simplest modelling to the droplet internal circulation, and the Hill's constant is a quantity derived from Hill's solution to represent the internal circulation strength. The vorticity magnitude of Hill's vortex is given by \cite{batchelor_introduction_2000}:
\begin{equation}
\left|\bm{\omega}\right|=Ar_\perp,
\end{equation}
where $\bm{r}$ is a vector within the droplet from droplet center, $\theta$ is the angle enclosed by $\bm{r}$ and the x-axis, $r_\perp=\left|\bm{r}\right|\sin\theta$ and $A$ is the Hill's constant representing the vortex strength. In our code, the local Hill's constant is calculated by using the following expression:
\begin{equation}
A=\frac{\bm{\omega}\cdot\hat{\bm{{\varphi}}}}{r_\perp},
\end{equation}
where $\hat{\bm{\varphi}}$ is the unit vector normal to $\bm{r}$ in ${\bm{\varphi}}$ direction, see Fig.\ref{coordinate}.
\begin{figure}[ht]
\centering
\includegraphics[width=0.7\textwidth]{coordinate.pdf}
\caption{Coordinate system of spherical and deformed droplets}
\label{coordinate}
\end{figure}
When calculating the mean vorticity, enstrophy and Hill's constant, we will implement a volume integration over the droplet:
\begin{equation}
\bar{\psi}=\frac{1}{V} \iiint_V \psi \,d\rotatebox[origin=c]{180}{\ensuremath{A}},
\end{equation}
where $V$ is the volume of the droplet, $\psi$ is any variable that need to be volume-averaged, and $\bar{\psi}$ is the volume-averaged variable.
A limitation of numerical strategy for momentum solution is that liquid and gas velocity are solved on one field. For cells near the phase interface, large velocity difference might occur if gas velocity is included. To avoid including gas velocity in the calculation of circulation variables, the liquid phase velocity field $U_L$ is computed as a post processing step at each timestep from the combined velocity. This value is smoothly extrapolated into gas using the technique of \cite{aslam_partial_2004}.
\subsection{Calculation of drag coefficient}
Assume the droplet is stationary in the domain, and the droplet motion is dominated in $x$-direction then drag coefficient $C_d$ can be computed by balancing the drag force and gravity:
\begin{equation}\label{drag_old}
\frac{1}{2}C_d\rho_GU_{in}^2\pi A_p=\left(\rho_L-\rho_G\right)gV,
\end{equation}
where $A_p$ is the projected droplet frontal area calculated by using effective radius $r_{\textrm{eff}}$. $r_{\textrm{eff}}$ is the radius of a spherical droplet which has the same volume with the deformed droplet. Since we are not working on evaporation in the current study, droplet volume and $r_{\textrm{eff}}$ will not change, thus $A_p$ is a constant.
Some further modifications can be made on the drag coefficient estimation. At first approximation, we can assume that the deformed droplet is spheroid \cite{loth_quasi-steady_2008}, and use aspect ratio $e$ of the spheroidal droplet to calculate $A_p$ more accurately. In our study, we define $e$ as the ratio of semi-axis length in $x$ and $y$ directions, i.e. $e=R_x/R_y$, see Fig.\ref{coordinate}. In the code, we estimate the semi-axis length by choosing the maximum summation of volume fraction at each line along the diction. Secondly, if droplet is stationary at the center of the domain as expected, the terminal velocity will be equal to the inlet gaseous velocity. However, after experiencing the initial transient period, droplet will move very slowly in a constant speed even with the gravity update scheme discussed in Sec.\ref{gravity}. We can replace $U_{in}^2$ by $\left(U_{in}-U_d\right)^2$ to improve the accuracy of terminal velocity estimation. Here $U_d$ is the droplet average value of the x-component of $U_L$. Strictly, Eqn.\ref{drag_old} requires the droplet to be non-accelerating. To quantify the effect of the small droplet acceleration, we also include the acceleration term in the calculation of droplet coefficient:
\begin{equation}\label{drag_new}
\begin{aligned}
\frac{1}{2}C_d\rho_G&\left(U_{in}-U_{d}\right)^2A_p\\
=&\left(\rho_L-\rho_G\right)gV+\rho_LaV,
\end{aligned}
\end{equation}
To find an accurate calculation of acceleration $a$, we have tried three different ways to compute it. We label them as $a_1$, $a_2$ and $a_3$: $a_1=dU_d/dt$, $a_2=d^2X_d/dt^2$ and $a_3=d\left(U_d^2\right)/2dX_d$. $X_d$ is the centroid of the droplet. The three potential definition were chosen to control numerical error of the approximation used to compute the acceleration. $a_1$ is the most straightforward definition of the acceleration. However, previous simulations have shown this may not be a perfect representation of droplet motion, because $U_d$ does not exactly represent the motion of the droplet centroid due to errors in the extrapolation process used to define $U_L$. $a_2$ computes the acceleration directly from the droplet position, but is a slightly more noisy value. For example, a pinned droplet that oscillates in place will demonstrate changes in $a_2$ due to slight asymmetries in the interface shape. $a_3$ is borrowed from 1D kinematics of particles. Since it combines $U_d$ and $X_d$, it has the potential to control for errors in either of the other definitions.
The discretized form of each is:
\begin{equation}
a_1^n=\frac{U_d^{n+1}-U_d^{n-1}}{2\Delta t},
\end{equation}
\begin{equation}
a_2^n=\frac{X_d^{n+1}-2X_d^n+X_d^{n-1}}{\Delta t^2},
\end{equation}
\begin{equation}
a_3^n=\frac{\left(U_d^{n+1}\right)^2-\left(U_d^{n-1}\right)^2}{2\left(X_d^{n+1}-X_d^{n-1}\right)},
\end{equation}
where the superscript $n$ denotes for the $n$-th timestep.
\section{Results and discussions}
In this section, based on parameters explored in Sec.\ref{setup}, we will discuss the results of our simulations to see how liquid-to-gas density ratio and Weber number affect droplet deformation and drag coefficient.
\subsection{Grid convergence study}\label{grid}
It will need very fine mesh to resolve the liquid-gas interface and internal flow inside the droplet. Therefore, to eliminated the influence of grid resolution, we will first perform simulations with different grids to determine the suitable mesh resolution. The flow conditions selected for grid convergence study is $We=1$, $Re=70$ and $\rho^*=20$. In this case, since droplet is nearly spherical, droplet internal circulation will not be further affected by droplet deformation, so the mesh size will be the only factor that influences internal flow. We increase grid points from $N=64$ to $N=320$ on each dimension, and examine results of drag coefficient and enstrophy of droplet, see Fig.\ref{grid_study}. At very course meshes, the results vary significantly, however, the results finally converged at $N=224,256,320$, i.e. drag coefficient and enstrophy will not change anymore with increasing grid points for $N>224$. Therefore, we finally chose $N=256$ for our simulations.
\begin{figure}[ht]
\begin{subfigure}{0.44\textwidth}
\includegraphics[width=\textwidth]{grid_enstrophy.png}
\caption{Nondimensionalized volume-averaged enstrophy, nondimensionalization can be found in Fig.\ref{circulation-t}}
\label{grid-enstrophy}
\end{subfigure}
\begin{subfigure}{0.44\textwidth}
\includegraphics[width=\textwidth]{grid_cd_steady.png}
\caption{Drag coefficient calculated by Eqn.\ref{drag_old} with $A_p$ estimated by $r_{\text{eff}}$\newline}
\label{grid-steadCd}
\end{subfigure}
\caption{Enstrophy and drag coefficient in different grid mesh}
\label{grid_study}
\end{figure}
\subsection{Changing $We$ at fixed $\rho^*$}\label{result-We}
To examine how droplet deformation will affect droplet dynamics in high pressure, we compare droplet drag coefficients with different $We$ at fixed $\rho^*=20$. We first examine whether the spheroidal deformation assumption is valid or not by comparing droplet aspect ratio to literature.
\subsubsection{Aspect Ratio}
In \cite{helenbrook_quasi-steady_2002}, the correlation of aspect ratio related to $We$, $Oh$, $\rho^*$ and $\mu^*$ was obtained through fully resolved simulations, while in \cite{loth_quasi-steady_2008}, the correlation was found to be dependent on $We$ only based on experiment data obtained by \cite{reinhart_verhalten_1964}. The comparison is summarized in Table.\ref{E-compare}, and it can be found that our results have good agreement with \cite{helenbrook_quasi-steady_2002,loth_quasi-steady_2008}, except for when $We=9$, droplet is near the onset of breakup and the deformation is too strong.
\begin{table}[ht]
\centering
\begin{tabular}{||c|c|c|c|c||}
\hline
We & 1 & 3 & 6 & 9 \\
\hline\hline
$e$ in simulations & 0.9110 & 0.8007 & 0.5869 & 0.1743 \\
$e$ in \cite{helenbrook_quasi-steady_2002}& 0.8910 & 0.7336 & 0.5332 & 0.3530 \\
$e$ in \cite{loth_quasi-steady_2008} & 0.9178 & 0.7611 & 0.5662 & 0.4320 \\
$error$ to \cite{helenbrook_quasi-steady_2002} & 2.253\% & 9.157\% & 10.07\% & 50.64\% \\
$error$ to \cite{loth_quasi-steady_2008} & 0.741\% & 5.204\% & 3.652\% & 59.66\% \\
\hline
\end{tabular}
\caption{Aspect ratio in different $We$ at $\rho^*=20$, and comparisons to \cite{loth_quasi-steady_2008} and \cite{helenbrook_quasi-steady_2002}}
\label{E-compare}
\end{table}
The deformation has shown an oscillatory behavior, see in Fig.\ref{oscillation}. The period of oscillation are $12.5, 12.9, 13.5$ for $We=1,2,6$ respectively, which are close to theoretical prediction of $12.3$ regardless of $We$ in \cite{ashgriz_handbook_2011}. However, for $We=9$, the deformation is so strong that the oscillation did not happen.
\begin{figure}[ht]
\centering
\includegraphics[width=0.5\textwidth]{AR-t.png}
\caption{The evolution of droplet aspect ratio over time; $t*$ is time normalized by the capillary time scale $\tau_c$}
\label{oscillation}
\end{figure}
\subsubsection{Acceleration}
For drag coefficients estimated by Eqn.\ref{drag_new} with $A_p$ calculated by using $e$, we compare results from different acceleration calculations. When droplet reaches steady state, results with and without acceleration are very close to each other. Their lines are parallel to each other, but deviate a small value because of the slow motion of droplet. During the transient period, drag coefficients calculated with acceleration are smaller than non-accelerating cases. Acceleration calculated by $a_2=\frac{d^2X_d}{dt^2}$ oscillates very frequently when droplet enters from transient to steady state. For acceleration calculated by $a_3=\frac{dU_d^2}{2dX_d}$, the result performs poorly in transient period, because $a$ becomes too sensitive to $dX_d$. The back and forth motion of droplet due to gravity update scheme makes it not a good option for calculating acceleration. Therefore $a_1=\frac{dU_d}{dt}$ is adopted in Eqn.\ref{drag_new} and will used for the rest of the paper.
\begin{figure}[ht]
\begin{subfigure}{0.44\textwidth}
\includegraphics[width=\textwidth]{drag-we1.png}
\caption{$We=1$}
\label{drag-we1}
\end{subfigure}
\begin{subfigure}{0.44\textwidth}
\includegraphics[width=\textwidth]{drag-we3.png}
\caption{$We=3$}
\label{drag-we3}
\end{subfigure}
\begin{subfigure}{0.44\textwidth}
\includegraphics[width=\textwidth]{drag-we6.png}
\caption{$We=6$}
\label{drag-we6}
\end{subfigure}
\begin{subfigure}{0.44\textwidth}
\includegraphics[width=\textwidth]{drag-we9.png}
\caption{$We=9$}
\label{drag-we9}
\end{subfigure}
\caption{Drag coefficient development for different $We$ with $a$ calculated in different ways}
\label{drag-a}
\end{figure}
\subsubsection{Overall Drag Coefficient Prediction}
Drag coefficients calculated from Eqn.\ref{drag_old} and Eqn.\ref{drag_new} are plotted in Fig.\ref{drag-steady} and Fig.\ref{drag-transient} respectively. In Fig.\ref{drag-steady}, the droplets are assumed to be steady, and $C_d$ computed from different estimations of $A_p$ are presented. One of the estimation of $A_p$ is to use $r_\text{eff}$, and the other is to use the aspect ratio $e$ to update a more accurate value of the frontal area and use that instead in the area definition. $C_d$ computed by using $r_\text{rff}$ increases with increasing $We$, but this trend is mild when $C_d$ is computed by using $e$. In Fig.\ref{drag-transient}, the transient behavior of droplets are considered. The transient $C_d$ in the transient time drops faster than the $C_d$ computed by Eqn.\ref{drag_old}.
\begin{figure}[ht]
\centering
\includegraphics[width=0.5\textwidth]{drag-steady.png}
\caption{Drag coefficient calculated by Eqn.\ref{drag_old} with $A_p$ estimated by $r_{\textrm{eff}}$ (dash-dotted lines) and $e$ (solid lines)}
\label{drag-steady}
\end{figure}
\begin{figure}[ht]
\centering
\includegraphics[width=0.5\textwidth]{drag-transient.png}
\caption{Drag coefficient calculated by Eqn.\ref{drag_new} with $A_p$ estimated by $e$}
\label{drag-transient}
\end{figure}
In addition, comparison of drag coefficient to literature have been made, shown in Fig.\ref{compareWe}. There are two set of data for Helenbrook\cite{helenbrook_quasi-steady_2002}, because it has both correlations for $C_d$ and $e$. For green data points, both correlations are used from \cite{helenbrook_quasi-steady_2002}. For downward triangle, points, $e$ is replaced by our simulation results. Blue data points are from correlations in \cite{haywood_numerical_1994,loth_quasi-steady_2008} for deformable liquid droplets, while round data points are only for spherical liquid droplets from \cite{harper_motion_1968,rivkind_flow_1976,feng_drag_2001}. Helenbrook's work considers both deformation and internal circulation. All drag coefficient correlations from literature use $r_{\text{eff}}$ to calculate $C_d$, thus we use drag coefficient calculated by Eqn.\ref{drag_old} for comparison.
In Fig.\ref{compareWe}, we see our data in low $We$ are quite close to others' work. But at $We=9$, since the droplet is highly deformed, the shape of droplet cannot be treated as spheroid. As a result, the evaluation of $e$ is not accurate. Besides, results from literature have no agreement at $We=9$, meaning predictions of $C_d$ in current literature perform bad when droplet is highly deformed and near breakup.
\begin{figure}[ht]
\centering
\includegraphics[width=0.5\textwidth]{drag-compare.png}
\caption{Comparison of drag coefficient to literature}
\label{compareWe}
\end{figure}
\subsection{Changing $\rho^*$ at fixed $We$}
$\rho^*$ is the quantification of internal circulation strength \cite{lin_numerical_2022}, and is correlated to pressure through ideal law, indicating the coupling between liquid and gas phases. This correlation can be found in Fig.\ref{circulation-t}. With increasing $P^*$, i.e. decreasing $\rho^*$, the internal circulating will become stronger regardless of the method used for measuring internal circulation strength.
\begin{figure}[ht]
\begin{subfigure}{0.48\textwidth}
\includegraphics[width=\textwidth]{Om-t.png}
\caption{$\bar{\omega}^*$ vs $t^*$}
\label{ommeanwe6}
\end{subfigure}
\begin{subfigure}{0.48\textwidth}
\includegraphics[width=\textwidth]{en-t.png}
\caption{$\bar{\mathcal{E}}^*$ vs $t^*$}
\label{enstrophywe6}
\end{subfigure}
\begin{subfigure}{0.48\textwidth}
\includegraphics[width=\textwidth]{hill-t.png}
\caption{$\bar{A}^*$ vs $t^*$}
\label{hillwe6}
\end{subfigure}
\caption{Correlation between droplet internal circulation and pressure; the volume-averaged vorticity, enstrophy and Hill's constant are nondimensionalized by: $\bar{\omega}^*=\bar{\omega}/\left(U_{in}/D\right)$, $\bar{\mathcal{E}}^*=\bar{\mathcal{E}}/\left(0.5\left(U_{in}/D\right)^2\right)$, $\bar{A}^*=\bar{A}/\left(U_{in}/D^2\right)$}
\label{circulation-t}
\end{figure}
To consider solely the effect of internal circulation, therefore, we compare drag coefficient in different $\rho^*$ at fixed $We=6$. Again, We examine droplet deformation in time, see Fig.\ref{oscillation-we}. The onset of oscillation of deformation has been observed to have slight phase shift due to internal circulation difference in each case \cite{mashayek_nonlinear_1998}.
\begin{figure}
\centering
\includegraphics[width=0.5\textwidth]{AR-t-pressure.png}
\caption{The evolution of droplet aspect ratio over time}
\label{oscillation-we}
\end{figure}
\begin{figure}
\centering
\includegraphics[width=0.5\textwidth]{drag-rhoratio.png}
\caption{Drag coefficient calculated by Eqn.\ref{drag_old} with $A_p$ estimated by $r_{\textrm{eff}}$ (dash-dotted lines) and $e$ (solid lines)}
\label{drag-pressure}
\end{figure}
The steady-state drag coefficients with different $\rho^*$ are plotted in Fig.\ref{drag-pressure}. Same in Sec.\ref{result-We}, $C_d$ estimated by different $A_p$ are presented. A clear trend is shown in the figure that decreasing density ratio corresponds to larger drag coefficient. This indicates that the enhanced liquid and gas coupling due to high pressure will increase drag coefficient, although it is noted that with corrected computation of $A_p$, the variation of $C_d$ becomes more mild.
\subsection{Scaling analysis on droplet aspect ratio}
We are concerned with what parameters affect the deformation of a droplet in a uniform convective flow for small Weber number cases. Some assumptions are made to simplify the problem. Firstly, the Ohnesorge number ($Oh$) is smaller than 0.1 in the case we are considering, thus the viscous effect can be neglected.\cite{guildenbecher_secondary_2009} Secondly, the deformed droplet is a spheroid. More specifically, it is an oblate spheroid.
For a spherical droplet, due to the shear force on the droplet interface, there will be internal circulation inside the droplet. Therefore, we assume the gas inertial energy $E_{i,g}$ will be converted into the inertial energy of liquid $E_{i,l}$, and also provide the energy change in surface energy $E_\gamma$:
\begin{equation}\label{eqn}
E_{i,g}\sim E_{i,l}+E_\gamma.
\end{equation}
The initial spherical droplet has a diameter $D$, and after the deformation, it becomes a spheroid with semi-major axis length and semi-minor axis length to be $R_y$ and $R_x$ respectively. The aspect ratio is then calculated as $e=R_x/R_y$, which will be smaller than $1$ in our case. A schematic of the spherical and deformed droplets are drown in Fig.\ref{coordinate}.
The inertial energy of gas and liquid are:
\begin{equation}\label{Eig}
E_{i,g}\sim\frac{1}{2}\rho_gU_{in}^2V,
\end{equation}
\begin{equation}\label{Eil}
E_{i,l}\sim\frac{1}{2}\rho_lU_s^2V,
\end{equation}
where $U_s$ is the liquid velocity at droplet surface. From the definition of $e$ and conservation of mass, the relation between $D$ and $R_x$ can be found:
\begin{equation}\label{exy}
e=\frac{R_x}{R_y}\Rightarrow R_y^2=\frac{R_x^2}{e^2},
\end{equation}
\begin{equation}\label{xD}
V=\frac{4}{3}\pi R_xR_y^2=\frac{1}{6}\pi D^2\Rightarrow R_x=\frac{1}{2}D\cdot e^{2/3}.
\end{equation}
The surface energy change is the difference of surface energy between spherical and spheroidal shape:
\begin{equation}\label{Egamma}
E_\gamma=\gamma\left(A_{\text{spheroid}}-A_{\text{sphere}}\right),
\end{equation}
where $A_{\text{spheroid}}=2\pi R_y^2+\pi\frac{R_x^2}{\alpha}\ln\left(\frac{1+\alpha}{1-\alpha}\right)$ with $\alpha=1-e^2$.
Usually, the freestream velocity $U_{in}$ is known, but the droplet surface velocity $U_s$ is unknown. To establish a correlation between $U_{in}$ and $U_s$, the scaling analysis based on the continuity of shear stress at the phase interface in \cite{law_theory_1977} gives:
\begin{equation}\label{UsUinf}
\frac{U_s}{U_{in}}=\left(\rho^*\mu^*\right)^{-1/3}.
\end{equation}
Using above equations and relations, the correlation between Weber number and aspect ratio can be found:
\begin{equation}\label{relation}
We\cdot\left[1-\left(\rho^*/\mu^{*2}\right)^{1/3}\right]\sim2\left(e^{-2/3}-2\right)+\frac{e^{4/3}}{\sqrt{1-e^2}}\ln\left(\left(\frac{1+\sqrt{1-e^2}}{e}\right)^2\right).
\end{equation}
If the deformation is very small, we can further simplify Eqn.\ref{relation} by using Taylor expansion on the RHS at $e=1$, and eliminating higher order terms to get:
\begin{equation}\label{simplify}
\left(1-e\right)^2\sim We\cdot\left(1-\left(\rho^*/\mu^{*2}\right)^{1/3}\right).
\end{equation}
Eqn.\ref{simplify} has a very limited application, because from the observation in our numerical works, the spheroid assumption can only hold at the range around $0.5<e<1$, while Eqn.\ref{simplify} only provides the approximation at one end.
\begin{figure}[!ht]
\begin{subfigure}{0.33\textwidth}
\includegraphics[width=\textwidth]{ifm_we10000.png}
\caption{$We=1$}
\label{drop-we1}
\end{subfigure}
\begin{subfigure}{0.33\textwidth}
\includegraphics[width=\textwidth]{ifm_we30000.png}
\caption{$We=3$}
\label{drop-we3}
\end{subfigure}
\begin{subfigure}{0.33\textwidth}
\includegraphics[width=\textwidth]{ifm_we60000.png}
\caption{$We=6$}
\label{drop-we6}
\end{subfigure}
\begin{subfigure}{0.33\textwidth}
\includegraphics[width=\textwidth]{ifm_we90000.png}
\caption{$We=9$}
\label{drop-we9}
\end{subfigure}
\caption{Droplet deformation at different $We$; pseudo-color to be velocity magnitude}
\label{deformation}
\end{figure}
We use data obtained from our numerical simulations by using the in-house code, together with aspect ratio calculated from correlations in Eqn.\ref{E_loth} from \cite{loth_quasi-steady_2008} and Eqn.\ref{E_helenbrook} from \cite{helenbrook_quasi-steady_2002} to verify the validity of Eqn.\ref{simplify}.
\begin{equation}\label{E_loth}
E=1-0.75\tanh\left(0.07We\right)
\end{equation}
\begin{equation}\label{E_helenbrook}
E=1-0.11We^{0.82}+0.013\left(\rho^*/\mu^{*2}\right)^{0.5}Oh^{0.55}We^{1.1}
\end{equation}
\begin{figure}[!ht]
\centering
\includegraphics[width=0.5\textwidth]{fixRho.png}
\caption{Aspect ratio correlation when $\rho^*/\mu^{*2}$ is fixed}
\label{fixRho}
\end{figure}
In Fig.\ref{fixRho}, $\rho^*/\mu^{*2}$ is fixed at around $0.3$, and the overall trend of the aspect ratio correlation from \cite{loth_quasi-steady_2008} and \cite{helenbrook_quasi-steady_2002} are almost linear. The data point resulted from our simulations at near $We(1-\rho^*/\mu^{*2})^{1/3}\approx3$, which corresponds to $We=9$, is incorrect. The highly deformed droplets may cause the spheroid assumption fail, as can be seen in Fig.\ref{drop-we9}. In Fig.\ref{fixWe}, $We$ is fixed at $6$, and all three curves are linear as well. However, these curves are very flat, indicating a weak dependency on $\rho^*/\mu^{*2}$ in this parameter space. Especially for results from \cite{loth_quasi-steady_2008}, the slope of the curve is always $0$ because the correlation is dependent on Weber number only.
\begin{figure}[!ht]
\centering
\includegraphics[width=0.5\textwidth]{fixWe.png}
\caption{Aspect ratio correlation when $We$ is fixed}
\label{fixWe}
\end{figure}
\section{Conclusions}
In this work, we investigate the effect of deformation and internal circulation on droplet drag coefficient in high pressure environment. We assume drag coefficient to be a function of Weber number and liquid-to-gas density, because they reflect droplet deformation and internal circulation. When calculating droplet drag coefficient, two kinds of estimations are made on the projected frontal area. The first way is to approximate deformed droplet as equal-volume sphere as in many literature do, and the second way is to assume the shape of deformed droplet is spheroid. The second way will fail when droplet is about to breakup. The gravity update scheme should force droplet to be steady, but a transient period still exists at the early stage of development. We applied different calculation for the transient acceleration of droplet, and found acceleration calculated by the time derivative of velocity would be better than the second order time derivative of droplet displacement, the latter oscillating frequently when turning from transient to steady period due to gravity update scheme. Droplet drag coefficient is found to be larger with increasing Weber number, i.e. stronger deformation, although when the aspect ratio is taken into the definition of the area, this effect becomes very weak. In addition, with decreasing liquid-to-gas density ratio corresponding to stronger internal circulation, drag coefficient increases. However, it should be noted that deformation and internal circulation are not totally independent to each other, because when droplet is fixed, it still has different aspect ratio with varying density ratio. We further explored parameters dependencies of aspect ratio, and found it is correlated linearly with Weber number, while the dependency on $\rho^*/\mu^{*2}$ is very weak.
\bibliographystyle{abbrv}
|
\section{Introduction}
Edge \emph{artificial intelligence} (AI) has emerged as a promising technique to support a variety of intelligent applications, such as Metaverse and auto-driving, at the network edge \cite{letaief2021edge,zhu2020toward,park2019wireless,shi2020communication,chen2021communication,wen2022federated}. To enable these intelligent services, it is desirable to deploy well-trained machine learning models and utilize their inference capability for making decisions. This leads to a new research paradigm called edge AI model inference, or \emph{edge inference} \cite{chen2021distributed,wang2020convergence}.
Several techniques have been proposed for efficient implementation of edge inference. The first is called \emph{on-device inference} (see e.g., \cite{han2015deep,howard2017mobilenets,chen2019deep,lee2021decentralized}), in which the inference task is implemented at resource-limited devices. To alleviate the computation loads, in on-device inference we need to design dedicated light models such as MobileNets, or compress the deep models to reduce their sizes by e.g., pruning and quantization. However, as there are various AI tasks with many different models, this technique still has heavy storage and computation cost. To address this challenge, the technique of \emph{on-server inference} has been suggested (see e.g., \cite{yang2020energy,hua2021reconfigurable}). In this scheme, edge devices upload the input data to an edge server, which performs the model inference and sends the results back to the devices. Although on-server inference can significantly alleviate the hardware requirements of the devices, they are prone to data privacy leakage. To tackle this issue, the technique of \emph{split inference} is proposed, which splits the AI model into two submodels (see e.g., \cite{shi2019improving, huang2020dynamic, li2019edge, shao2020communication, jankowski2020joint, shao2021learning, lan2021progressive, yan2022optimal,liu2022resource}), one deployed at the devices for feature extraction, e.g. \emph{principle component analysis} (PCA) and convolutional layers, and the other at the edge server for the remaining inference task. As a result, split inference can preserve privacy by avoiding raw data transmission and reduce the hardware requirements at edge devices by offloading heavy computation loads to the edge server. Here we focus on the split inference technique to exploit these advantages.
\begin{figure}
\centering
\includegraphics[width=0.8\textwidth]{Figures/Integration.pdf}
\caption{Integrated Sensing, Computation, and Communication (ISCC) in Edge AI Inference.}
\vspace{-0.5cm}
\label{fig:integration}
\end{figure}
Existing designs for split inference (see e.g., \cite{shi2019improving, huang2020dynamic, li2019edge, shao2020communication, jankowski2020joint, shao2021learning, lan2021progressive, yan2022optimal,liu2022resource}) mainly focus on reducing the devices' overhead on computation or communication. However, the workflow of split inference consists of three key processes including sensing, computation, and communication, and its full potential can hardly be unleashed by optimization from a single perspective. This thus calls for a joint design from a systematic view integrating sensing, computation, and communication. As shown in Fig. \ref{fig:integration}, the accuracy of split inference depends on the input feature vector's distortion level arising from three processes, i.e., data acquisition (sensing), feature extraction and quantization (computation), and feature transmission to edge server (communication). Particularly, sensing and communication compete for radio resources \cite{liu2022integrated,cui2021integrating}, and the allowed communication resource further determines the required quantization (distortion) level such that the quantized features can be transmitted reliably to the edge server under a delay constraint. Thereby the three processes are highly coupled and need to be jointly considered. Furthermore, the implementation of \emph{integrated sensing, communication and computation} (ISCC) should be designed under a new \emph{task-oriented principle} that concerns the successful completion of the subsequent inference task \cite{xi2021bilimo,neuhaus2021task}. In the context of split inference, the performance metric of interest for the system is no longer throughput, but inference accuracy and latency.
Therefore, a real-time inference-task-oriented ISCC scheme should maximize the inference accuracy by jointly designing sensing, quantization, and transmission, under constraints on low latency and on-device resources.
To achieve task-oriented ISCC design, the employment of the recently proposed technique, called \emph{integrated sensing and communication} (ISAC), is essential as it allows efficient sensing data acquisition and feature offloading with a shared hardware \cite{ma2021spatial}. The efficiency comes from the potentially smaller form factor of the devices due to the use of shared hardware for dual functions, and better management of the shared radio resources like power and bandwidth \cite{liu2022integrated}. As one of the key potential techniques in 6G networks, ISAC has been widely studied in the existing literature, for example, optimal waveform designs for \emph{dual functional radar-and-communication} (DFRC) systems in \cite{liu2018toward,ma2020joint,pritzker2022transmit}, the beamforming designs for ISAC systems in \cite{he2022ris} and \cite{hua2021optimal}, the ISAC assisted \emph{orthogonal time frequency space} (OTFS) modulation for vehicular networks in \cite{yuan2021integrated}, and the integration of ISAC with over-the-air computation in \cite{li2022integrated}. In the aforementioned systems, sensing and communication are designed for separate goals: sensing targets obtaining high-quality localization data and communication aims at throughput maximization. However, in the context of edge AI, sensing (data acquisition) and communication (feature transmission) work together for a common goal, i.e., improving edge AI performance.
Several pioneering works investigated task-oriented ISAC schemes for edge AI. For instance, an ISAC based centralized learning system was proposed in \cite{zhang2021accelerating}, which accelerates the learning process by generating and uploading as many training data as possible from the sensing devices to the edge server. The authors in \cite{liu2022vertical} proposed a vertical federated learning based ISAC system for human motions recognition. However, the prior works above fall short in ignoring the influence of computation, and focusing only on the training phase that can usually be performed in an offline way. There still remains an uncharted area for task-oriented ISCC targeting edge inference, thus motivating the main theme of the current work.
\begin{figure}
\centering
\includegraphics[width=0.5\textwidth]{Figures/Geometry_DG.pdf}
\caption{Geometry of discriminant gain in the feature space.}
\vspace{-1cm}
\label{fig:geometry}
\end{figure}
In this paper, we consider a multi-view ISAC based edge inference system with classification tasks. There are one mobile edge server (e.g., vehicle) and multiple ISAC devices equipped with DFRC systems. In this system, multiple ISAC devices perform radar sensing to obtain multi-view sensing data, and then offload the quantized version of extracted features to a centralized edge server, which conducts the model inference based on the cascaded feature vectors. The objective of this system is to maximize the inference accuracy in a real-time manner, i.e., completing the task under a latency constraint. Efficient implementation of the considered edge inference system relies on the design of ISCC, which faces the following technical challenges. The first main difficulty is the lack of tractable measures for inference accuracy. To address this issue, we adopt a new metric for classification tasks called \emph{discriminant gain}, which is proposed in \cite{lan2021progressive} and derived from the well known \emph{Kullback-Leibler} (KL) divergence \cite{kullback1951information}. The discriminant gain measures the discernibility between two classes in the Euclidean feature space, as shown in Fig. \ref{fig:geometry}. Specifically, the geometric interpretation of discriminant gain between two classes is the distance between the corresponding two classes in the feature space under normalized feature covariance. Thereby, with larger discriminant gain, the classes can be better differentiated, which leads to larger inference accuracy. As discriminant gain can provide theoretical guidance for enhancing inference accuracy, it is adopted in this work as an approximate but tractable measure. However, maximizing the discriminant gain still faces challenges arising from its complicated form of covariance normalized distance, as well as the coupling among sensing, computation, and communication, and the device heterogeneity in terms of channel gain, quantization level, and the feature elements' importance.
To address the challenges above, a non-convex inference accuracy maximization problem is formulated under the constraints of limited on-device resources and low-latency requirement. We then propose an \emph{optimal} ISCC scheme, based on the \emph{sum-of-ratios} method, to jointly determine the transmit power and time allocation at multiple devices for sensing and communication, as well as their quantization bits allocation for computation distortion control. To the best of our knowledge, this work represents the first attempt to design task-oriented ISCC schemes for edge AI inference systems.
The detailed contributions of this work are summarized as follows:
\begin{itemize}
\item {\bf ISCC based Edge Inference System}: A multi-view radar sensing based system is established for real-time inference tasks with concrete modeling of the sensing, computation, and communication processes. Under the system settings, we quantify the influence of sensing noise, quantization distortion, and communication capacity on the inference accuracy measured discriminant gain with a derived closed-form expression.
\item {\bf Inference Accuracy Maximization via ISCC Design}: Targeting maximizing the inference accuracy measured by discriminant gain, an ISCC design problem that concerns joint allocation of sensing and transmit power, communication time, and quantization bits is formulated. We then show that this problem can be transformed into an equivalent problem with the objective being the sum of multiple quasi-linear ratios, subject to a set of convex constraints.
\item{\bf Sum-of-ratios based Optimal Solution}:
We adopt the method of sum-of-ratios to optimally solve the reformulated problem in an iterative manner. In each iteration, a convex problem is solved, which minimizes the sum of weighted sensing and quantization distortion under given discriminant gains of class pairs. Then, the discriminant gains are updated using the previously solved distortion level of sensing and quantization.
\item{\bf Performance Evaluation}:
Extensive simulations over a high-fidelity wireless sensing simulator proposed in \cite{Li2021SPAWC} are conducted to evaluate the performance of our proposed ISCC scheme by considering a concrete task of multi-view human motion recognition with two inference models, i.e., \emph{support vector machine} (SVM) and \emph{multi-layer perception} (MLP) neural network, respectively. It is shown that maximizing the discriminant gain is effective in maximizing the inference accuracy for both models with SVM and MLP neural networks. It is also shown that the proposed optimal ISCC scheme achieves significantly higher inference accuracy than the benchmark schemes, where sensing, quantization, and communication are separately designed or partially optimized. The superiority of multi-view inference over single-view inference is also validated.
\end{itemize}
\section{System Model}
In this section, the models of network, radar sensing and feature generation, quantization, and the metric of AI model inference accuracy are introduced.
\subsection{Network Model}
The multi-view radar sensing based edge inference system is shown in Fig. \ref{Fig:SysModel}. There are one mobile edge server with a single-antenna \emph{access point} (AP) and $K$ single-antenna ISAC devices equipped with DFRC transceivers. In practice, the edge server may correspond to high-mobility vehicles like cars, and the ISAC devices correspond to radar sensors. \emph{Time-division multiple access} (TDMA) is used. The edge server needs to make a real-time decision, such as obstacle detection in the wild, via inferring a well-trained machine learning model. Its features are collected from the ISAC devices. The detailed procedure for data acquisition (sensing), feature extraction and quantization (computation), and feature transmission to the server (communication) at each device is presented in Fig. \ref{Fig:TimeDivisionManner}. Specifically, the server first requests to all devices to sense the environment. Then, the sensing data of each device is processed and quantized locally to a subset of features. Next, all feature subsets are fed back to the edge server via wireless links and are cascaded for completing the reference task. The ISAC devices remain mute to save the energy consumption when there is no request.
\begin{figure}
\centering
\includegraphics[width=0.8\textwidth]{Figures/SystemModel.pdf}
\caption{Edge inference systems with multi-device sensing.}\label{Fig:SysModel}
\vspace{-1cm}
\end{figure}
As shown in Fig. \ref{Fig:TimeDivisionManner}, the DFRC transceiver implements ISAC by switching between the sensing mode and communication mode flexibly in a time-division manner using a shared radio-frequency front-end circuit \cite{han2013joint}\footnote{ Practical implementations of the DFRC transceiver via software-defined radio solution have been demonstrated in \cite{han2013joint,ma2021spatial,ma2021frac}. }. In sensing mode, \emph{frequency-modulated continuous-wave} (FMCW) signal consisting of multiple up-ramp chirps is transmitted \cite{han2013joint}. Then, by processing the received radar echo signals, sensing data that contain the motion information of the sensing target can be attained at the ISAC devices. In communication mode, constant-frequency carrier modulated by communication data using digital modulation scheme (e.g., QAM) is transmitted.
The total permitted time to finish the real-time inference task is denoted as $T$. For an arbitrary device, say the $k$-th, its sensing time is denoted as $T_{r,k}$ and its computation time is denoted as $T_{m,k}$, which both are assumed to be constant.
The communication time to transmit the features is denoted as $T_{c,k}$ and the total communication bandwidth is $B$. The wireless channels are assumed to be static, as the time duration $T$ is short and smaller than the channel coherence time. The channel gain of the link between the $k$-th device and server is denoted as $H_{c,k}$. The AP is assumed to work as a coordinator and can acquire the \emph{global channel state information} (CSI).
\begin{figure}
\centering
\includegraphics[width=0.75\textwidth]{Figures/fig_time_block.pdf}
\caption{Edge inference systems with multi-device sensing.}\label{Fig:TimeDivisionManner}
\vspace{-0.5cm}
\end{figure}
\subsection{Radar Sensing and Feature Generation Model}
In this section, we first model the radar sensing channel for obtaining the sensing data. Then, the signal processing for feature generation is introduced.
\subsubsection{Sensing Signal}
All ISAC devices transmit linear frequency up-ramp chirp sequences as the sensing signals. Consider an arbitrary ISAC device, say the $k$-th. A sensing snapshot consists of $M$ chirps, each of which has a duration of $T_{0}=T_{r,k}/M$. The sensing signal in a snapshot is
\begin{align*}
s_{k}(t)=\sum_{m=0}^{M-1}\text{rect}\left(\frac{t-mT_{0}}{T_{0}}\right) \cdot \cos\left(2 \pi f_{c,k} \left(t-mT_{0}\right) + \pi \mu \left(t-mT_{0}\right)^{2}\right),
\end{align*}
where $\text{rect}(\cdot)$ is the rectangular-shaped pulse function with width of 1 centered at $t = 0$, $f_{c,k}$ is the sensing carrier frequency for the $k$-th ISAC device, $\mu = B_{s}/T_{0}$ is the scope of each chirp, and $B_{s}$ is the bandwidth of the sensing signal.
The echo signal at time $t$ can be written as
\begin{equation}\label{Eq:SensingModel}
r_k(t) = u_k(t)+\sum_{j=1}^{J}v_{k,j}(t)+n_r(t).
\end{equation}
In \eqref{Eq:SensingModel}, $u_k(t)$ is the desired echo signal directly reflected by the target and is given by
\begin{equation}
u_k(t) = H_{r,k}(t) s_k(t-\tau).
\end{equation}
Here, $H_{r,k}(t)$ is the reflection coefficient including the round-trip path-loss, $\tau$ denotes the round-trip delay, $v_{k,j}(t)$ is the echo signal reflected indirectly by the target from the $j$-th indirect reflection path, which is given by
\begin{equation}
v_{k,j}(t) = C_{r,k,j}(t)s_k(t - \tau_{j}),
\end{equation}
where $C_{r,k,j}(t)$ and $\tau_{j}$ are the reflection coefficient from and the signal delay of the $j$-th path respectively, $J$ is the total number of indirect reflection paths, and $n_r(t)$ is the Gaussian noise at the sensing receiver. It is assumed that the values of $H_{r,k}(t)$ and $C_{r,k,j}(t)$ can be estimated before sensing.
\subsubsection{Sensing Signal Processing}
Consider the $k$-th ISAC device, the steps to process the received radar echo signals are as follows:
\textbf{Signal sampling:} For sensing snapshot $m$, the received signal $r_{k}(t)$ in (\ref{Eq:SensingModel}) is sampled into a complex-valued vector $\mathbf{r}_{k,m} \in \mathbb{C}^{MT_{0}f_{s}}$, where $f_{s}$ is the sampling rate. Arrange $\mathbf{r}_{k,m}$ in a two-dimensional data matrix $\mathbf{R}_{k,m} \in \mathbb{C}^{T_{0}f_{s} \times M}$, in which $T_{0}f_{s}$ is the length of the fast-time dimension, and $M$ is the length of the slow-time dimension\footnote{The fast time dimension is referred to as range dimension whose sample intervals can be used for ranging, whereas processing data in the slow-time dimension allows one to estimate the Doppler spectrum at a given fast time dimension.}.
\textbf{Data filtering:} To mitigate the clutter and extract useful information, we apply a \emph{singular value decomposition} (SVD) based linear filter to $\mathbf{R}_{k,m}$ \cite{Li2021SPAWC}. The data matrix after filtering is given by $\tilde{\mathbf{R}}_{k,m} = \sum_{i=r_{1}}^{r_{2}}\sigma_{i}\mathbf{v}_{i}\mathbf{u}_{i}$, where $\sigma_{i}$, $\mathbf{v}_{i}$, and $\mathbf{u}_{i}$ denote the $i$-th singular value, the $i$-th left-singular vector, and the $i$-th right-singular vector of $\mathbf{R}_{k,m}$, respectively, and $r_{1}$ and $r_{2}$ are empirical parameters.
\textbf{Feature extraction:} We extract features in the slow-time dimension for inference. First, we transform $\tilde{\mathbf{R}}_{k,m}$ into vector $\tilde{\mathbf{r}}_{k,m} \in \mathbb{C}^{1 \times M}$, i.e., $\tilde{\mathbf{r}}_{k,m} = \mathbf{1}^{T}\tilde{\mathbf{R}}_{k,m}$. Next, PCA is used to extract the principle feature elements from $\tilde{\mathbf{r}}_{k,m}$, and thus make different feature elements uncorrelated. Note that the principle eigen-space can be obtained during the model training process and is obtained at the AP, which is then broadcast to the ISAC devices. The number of extracted feature elements is denoted as $N_k$. Since all the processing steps are linear, the $n_k$-th feature element, following \eqref{Eq:SensingModel}, is given by
\begin{equation}
\bar{r}_k(n_k) = \bar{u}_k(n_k)+\sum_{j=1}^{J}\bar{v}_{k,j}(n_k)+\bar{n}_r(n_k),
\end{equation}
where $\bar{u}_k(n_k)$ is the desired ground-truth feature, $\bar{v}_k(n_k)$ is additive information in feature element brought by the clutter signal from the $j$-th path, $\bar{n}_r(n_k)$ is the noise in feature element.
Each feature element is normalized by the transmit radar sensing power, say $\sqrt{P_{r,k}}$. Specifically, the $n_k$-th feature element is
\begin{equation}\label{Eq:FeatureModel}
\hat{x}(n_k) = \frac{r_k(n)}{ \sqrt{P_{r,k}} } = x(n_k) + c_{r,k}(n_k) + \dfrac{ n_r(n_k)}{\sqrt{P_{r,k}}},
\end{equation}
where $ x(n_k) = \bar{u}_k(n_k)/\sqrt{P_{r,k}}$ is the ground-true feature and
\begin{equation}
c_{r,k}(n_k) = \sum\limits_{j=1}^J \dfrac{ \bar{v}_{k,j}(n_k)}{ \sqrt{P_{r,k}} },
\end{equation}
is the normalized clutter. From \eqref{Eq:FeatureModel}, one can observe that the sensed feature is polluted by the clutter, say $c_{r,k}(n_k)$, and the sensing noise $n_r(n_k)$. According to the \emph{central limit theorem}, $c_{r,k}(n_k)$ is assumed to follow a Gaussian distribution, as the number of independent reflection paths $J$ is large. Its distribution is given as
\begin{equation}\label{Eq:ClutterDistribution}
c_{r,k}(n_k)\sim \mathcal{N}(0,\sigma_{c,k}^2),
\end{equation}
where $\mathcal{N}(\cdot,\cdot)$ represents the Gaussian distribution and $\sigma_{c,k}^2$ is the constant variance and can be estimated before sensing. The normalized sensing noise also has a Gaussian distribution:
\begin{equation}\label{Eq:SensingNoiseDistribution}
n_r(n_k)/\sqrt{P_{r,k}} \sim \mathcal{N}\left(0,\sigma_r^2/P_{r,k} \right),
\end{equation}
where $\sigma_r^2$ is the noise variance.
The feature subset generated by ISAC device $k$ is
$\hat{\bf x}_k = \{ \hat{x}(n_k), \; 1\leq n_k \leq N_k \}$,
where $N_k$ is the total number of generated feature elements. Furthermore, different feature subsets generated by different ISAC devices are assumed to be independent, as the ISAC devices are sparsely deployed and the corresponding sensing areas are non-overlapping.
\subsection{Quantization Model}
Consider the $k$-th ISAC device, whose feature subset is $\hat{\bf x}_k$. Each feature element is quantized using the same linear quantizer. Specifically, for the $n_k$-th feature element, according to \cite{shlezinger2021deep} and by using high quantization bit range, its quantized version is given by
\begin{equation}\label{Eq:QuantizationModel}
z(n_k) = \sqrt{Q_k} \hat{x}(n_k)+d_k,
\end{equation}
where $\hat{x}(n_k)$ is the original feature element defined in \eqref{Eq:FeatureModel}, $\sqrt{Q_k}$ is the quantization gain, $d_k$ is the approximate Gaussian quantization distortion, given as
\begin{equation}\label{Eq:QunatizationDistortion}
d_k\sim \mathcal{N}(0,\delta_k^2),
\end{equation}
and $\delta_k^2$ is the variance. At the receiver, the quantized feature is recovered as
\begin{equation}\label{Eq:QuantizedFeatureModel}
\tilde{x}(n_k) = \dfrac{z(n_k)}{\sqrt{Q_k}} = \hat{x}(n_k) + \dfrac{d_k}{\sqrt{Q_k}},
\end{equation}
where the notations follow that in \eqref{Eq:QuantizationModel}. Note that in \eqref{Eq:QuantizedFeatureModel}, higher quantization gain, say larger $\sqrt{Q_k}$, can lead to lower quantization distortion in the recovered feature at the receiver. The mutual information of the recovered feature subset $\tilde{\bf x}_k = \{\tilde{x}(1_k), \tilde{x}(2_k),...,\tilde{x}(N_k)\}$ and the generated feature subset $\hat{\bf x}_k$ under the additive Gaussian distortion approximation can be derived as
\begin{equation}\label{Eq:MutualInformation}
I(\tilde{\bf x}_k;\hat{\bf x}_k) = N_k \log_2\left( 1+\dfrac{Q_k}{\delta_k^2} \right), \; 1\leq k \leq K,
\end{equation}
which is also the overhead of device $k$ for transmitting the feature subset to the server.
\subsection{Discriminant Gain}
Following \cite{lan2021progressive}, we adopt discriminant gain, which is derived from the well-known KL divergence proposed in \cite{kullback1951information}, as the inference accuracy metric of the classification task.
First, consider an arbitrary feature element generated by the $k$-th ISAC device $\tilde{x}(n_k)$. By substituting $\hat{x}(n_k)$ in \eqref{Eq:FeatureModel} into $\tilde{x}(n_k)$ in \eqref{Eq:QuantizedFeatureModel}, it can be written as
\begin{equation}
\tilde{x}(n_k) = x(n_k) + c_{r,k}(n_k) + \frac{ n_r(n_k)}{\sqrt{P_{r,k}}} + \dfrac{d_k}{\sqrt{Q_k}},
\end{equation}
where the notations follow that in \eqref{Eq:FeatureModel}, \eqref{Eq:ClutterDistribution}, and \eqref{Eq:QuantizedFeatureModel}.
According to \cite{lan2021progressive}, the ground-truth feature element $x(n_k)$ is assumed to have a mixed Gaussian distribution. Its probability density function is
\begin{equation}\label{Eq:GroundTrueFeatureDistribution}
f\left(x(n_k)\right) = \dfrac{1}{L}\sum\limits_{\ell=1}^L \mathcal{N}\left(\mu_{\ell, n_k}, \sigma_{n_k}^2\right), \; 1\leq n_k \leq N_k, \; 1\leq k \leq K,
\end{equation}
where $L$ is the total number of classes in the inference task, $\mu_{\ell, n_k}$ is the centroid of the $\ell$-th class, and $\sigma_{n_k}^2$ is the variance\footnote{These statistics can be pre-estimated at the AP using the training dataset}. By substituting the distributions of the ground-truth feature in \eqref{Eq:GroundTrueFeatureDistribution}, the clutter distribution in \eqref{Eq:ClutterDistribution}, the normalized sensing noise in \eqref{Eq:SensingNoiseDistribution}, and the quantization distortion in \eqref{Eq:QunatizationDistortion}, into the recovered feature element $\tilde{x}(n_k)$, its distribution can be derived as
\begin{equation}\label{Eq:RecoveredFeatureDistribution}
f\left(\tilde{x}(n_k)\right) = \dfrac{1}{L}\sum\limits_{\ell=1}^L f_{\ell}\left(\tilde{x}(n_k)\right), \; 1\leq n_k \leq N_k, \; 1\leq k \leq K,
\end{equation}
where $f_{\ell}\left(\tilde{x}(n_k)\right)$ is the probability density function of $\tilde{x}(n_k)$ in terms of the $\ell$-th class and is given by
\begin{equation}
f_{\ell}\left(\tilde{x}(n_k)\right)= \mathcal{N}\left(\mu_{\ell, n_k}, \sigma_{n_k}^2 + \sigma_{c,k}^2+\dfrac{\sigma_r^2}{P_{r,k}} + \dfrac{\delta_k^2}{ Q_k }\right), \quad 1\leq \ell \leq L.
\end{equation}
Next, the discriminant gain of $\tilde{x}(n_k)$ can be derived from the well established KL divergence \cite{lan2021progressive}. Specifically, consider an arbitrary class pair, say classes $\ell$ and $\ell^{'}$. Its discriminant gain is
\begin{equation}\label{Eq:PairDG}
\begin{aligned}
G_{\ell,\ell^{'}}\left( \tilde{x}(n_k) \right) & = D_{KL} \left[ f_{\ell}\left(\tilde{x}(n_k)\right) \big\| f_{\ell^{'}}\left(\tilde{x}(n_k)\right) \right] + D_{KL} \left[ f_{\ell}\left(\tilde{x}(n_k)\right) \big\| f_{\ell^{'}}\left(\tilde{x}(n_k)\right) \right] \\
& = \int_{\tilde{x}(n_k)}f_{\ell}\left(\tilde{x}(n_k)\right) \log\left[ \dfrac{f_{\ell}^{'}\left(\tilde{x}(n_k)\right)}{f_{\ell}\left(\tilde{x}(n_k)\right)} \right] + f_{\ell^{'}}\left(\tilde{x}(n_k)\right) \log\left[ \dfrac{f_{\ell}\left(\tilde{x}(n_k)\right)}{f_{\ell^{'}}\left(\tilde{x}(n_k)\right)} \right] {\rm d} \tilde{x}(n_k)\\
& = \dfrac{\left(\mu_{\ell,n_k} - \mu_{\ell^{'},n_k}\right)^2}{\sigma_{n_k}^2 + \sigma_{c,k}^2+ \sigma_r^2/P_{r,k} + \delta_k^2/Q_k }, \quad \forall (\ell,\ell^{'}),
\end{aligned}
\end{equation}
where $D_{KL} \left[ \cdot \| \cdot \right]$ is the KL divergence defined in \cite{kullback1951information}, and the other notations follow that in \eqref{Eq:RecoveredFeatureDistribution}. It follows that the discriminant gain of the whole feature vector $\tilde{\bf x} = \{\tilde{\bf x}_1,\tilde{\bf x}_2,...,\tilde{\bf x}_K \}$, where $\tilde{\bf x}_k = \{\tilde{x}(1_k), \tilde{x}(2_k),...,\tilde{x}(N_k)\}$, in terms of this class pair is given by
\begin{equation}\label{Eq:PairDG}
\begin{aligned}
G_{\ell,\ell^{'}}\left( \tilde{\bf x} \right) & = D_{KL} \left[ f_{\ell}\left(\tilde{\bf x}\right) \big\| f_{\ell^{'}}\left(\tilde{\bf x}\right) \right] + D_{KL} \left[ f_{\ell}\left(\tilde{\bf x}\right) \big\| f_{\ell^{'}}\left(\tilde{\bf x}\right) \right] = \sum\limits_{k=1}^K \sum\limits_{n_k=1}^{N_k} G_{\ell,\ell^{'}}\left( \tilde{x}(n_k) \right),
\end{aligned}
\end{equation}
since different feature elements in $\tilde{\bf x}$ are independent. The overall discriminant gain of $\tilde{\bf x}$ is defined as the average of all class pairs:
\begin{equation}\label{Eq:DiscriminantGainSystem}
G = \dfrac{2}{L(L-1)}\sum\limits_{n_k=1}^{N_k}\sum\limits_{\ell^{'}=1}^L \sum\limits_{\ell<\ell^{'}} G_{\ell,\ell^{'}}\left( \tilde{x}(n_k) \right).
\end{equation}
\section{Problem Formulation \& Simplification}
\subsection{Problem Formulation}
Our objective is to maximize the total discriminant gain in \eqref{Eq:DiscriminantGainSystem} under the constraints on latency, successful transmission, and energy. By substituting \eqref{Eq:PairDG} into \eqref{Eq:DiscriminantGainSystem}, the objective can be written as
\begin{equation}\label{Eq:Objective}
\max\limits_{P_{c,k},P_{r,k},T_{c,k},Q_k}\;\; G = \dfrac{2}{L(L-1)}\sum\limits_{k=1}^K \sum\limits_{n_k=1}^{N_k} \sum\limits_{\ell^{'}=1}^L \sum\limits_{\ell<\ell^{'}}\dfrac{\left(\mu_{\ell,n_k} - \mu_{\ell^{'},n_k}\right)^2}{\sigma_{n_k}^2 + \sigma_{c,k}^2+ \sigma_r^2/P_{r,k} + \delta_k^2/Q_k},
\end{equation}
where the notations follow that in \eqref{Eq:PairDG}. Next, we formulate the various constraints.
\subsubsection{Latency Constraint}
The total allocated sensing, computation, and communication time should be less than the permitted latency of the real-time inference task:
\begin{equation}
\text{(C1)}\quad \sum\limits_{k=1}^{K} ( T_{r,k}+ T_{m,k} + T_{c,k} ) \leq T,
\end{equation}
where $T_{r,k}$, $T_{m,k}$, and $T_{c,k}$ are the constant sensing time, the constant computation time,
and the allocated communication time of ISAC device $k$ respectively, and $T$ is the permitted latency to finish the task.
\subsubsection{Successful Transmission Constraint}
To ensure successful transmission of the quantized feature subset to the receiver, the mutual information between the generated feature subset $\hat {\bf x}_k$ and the recovered one $\tilde {\bf x}_k$ should be less than the channel capacity as formally stated below \cite{Park2013TSP-quantization}:
\begin{equation}\label{Eq:TransmitCondition1}
I(\tilde{\bf x}_k;\hat{\bf x}_k) \leq R_k, \; 1\leq k \leq K,
\end{equation}
where $R_k$ is the channel capacity of ISAC device $k$.
It is given by
\begin{equation}\label{Eq:ChannelCapacity}
R_k = T_{c,k} B \log_2\left(1 + \dfrac{P_{c,k} H_{c,k}}{ \delta_c^2 } \right),\; 1\leq k \leq K,
\end{equation}
where $B$ is the system bandwidth, $\delta_c^2$ is the channel noise power, $T_{c,k}$ is the allocated time slot, $P_{c,k}$ is the transmit power, and $H_{c,k}$ is the channel gain. By substituting the mutual information in \eqref{Eq:MutualInformation} and the data rate in \eqref{Eq:ChannelCapacity} into the transmission constraint in \eqref{Eq:TransmitCondition1}, it can be written as
\begin{equation}\label{Eq:TransmitCondition2}
\text{(C2)}\quad N_k \log_2\left( 1+\dfrac{Q_k}{\delta_k^2} \right) \leq T_{c,k} B \log_2\left(1 + \dfrac{P_{c,k} H_{c,k}}{ \delta_c^2 } \right),\; 1\leq k \leq K.
\end{equation}
\subsubsection{Energy Constraint}
The energy consumption of each ISAC device should be bounded:
\begin{equation}
\text{(C3)}\quad P_{r,k}T_{r,k} + E_{m,k} + P_{c,k}T_{c,k}\leq E_k,\;\; 1\leq k \leq K,
\end{equation}
where $P_{r,k}$, $P_{c,k}$, $T_{r,k} $, $T_{c,k} $, $E_{m,k}$, and $E_k$ are the sensing power, the transmit power, the constant sensing time, the communication time, the constant computation energy consumption,
and the energy threshold of ISAC device $k$, respectively.
Under the three kinds of constraints above, the problem of maximizing discriminant gain is formulated as
\begin{equation}\text{(P1)}\quad
\begin{aligned}
\max\limits_{P_{c,k},P_{r,k},T_{c,k},Q_k}\;\; &G = \dfrac{2}{L(L-1)}\sum\limits_{k=1}^K \sum\limits_{n_k=1}^{N_k} \sum\limits_{\ell^{'}=1}^L \sum\limits_{\ell<\ell^{'}}\dfrac{\left(\mu_{\ell,n_k} - \mu_{\ell^{'},n_k}\right)^2}{\sigma_{n_k}^2 + \sigma_{c,k}^2+ \sigma_r^2/P_{r,k} + \delta_k^2/Q_k},\\
\text{s.t.}\;\; &P_{c,k},P_{r,k},T_{c,k},Q_k \in \mathbb{R}^+ ,\quad 1 \leq k \leq K,\\
& \text{(C1)} \sim \text{(C3)}.
\end{aligned}
\end{equation}
(P1) is a non-convex problem due to the non-convexity of the objective function and Constraints (C2) and (C3) therein. Although the discriminant gain maximization problem is investigated in \cite{lan2021progressive} via progress feature transmission, this work is the first to enhance the inference performance from a systematic view, i.e., the integration of sensing, computation and communication. In the sequel, an equivalent simplified problem is derived.
\subsection{Problem Simplification}
To simplify (P1), the following variable transformations are applied:
\begin{equation}\label{Eq:VariablesTransform}
S_k = \dfrac{\sigma_r^2}{P_{r,k}},\quad D_k = \dfrac{\delta_k^2}{Q_k}, \quad E_{c,k} = P_{c,k}T_{c,k},
\end{equation}
where $S_k$, $D_k$, and $E_{c,k}$ can be interpreted as the normalized sensing noise power, the normalized quantization distortion, and the communication energy consumption of ISAC device $k$, respectively. By substituting \eqref{Eq:VariablesTransform} into (P1), it can be equivalently derived as
\begin{equation}\text{(P2)}\quad
\begin{aligned}
\max\limits_{E_{c,k},S_k,T_{c,k},D_k}\;\; &G = \dfrac{2}{L(L-1)}\sum\limits_{k=1}^K \sum\limits_{n_k=1}^{N_k} \sum\limits_{\ell^{'}=1}^L \sum\limits_{\ell<\ell^{'}}\dfrac{\left(\mu_{\ell,n_k} - \mu_{\ell^{'},n_k}\right)^2}{\sigma_{n_k}^2 + \sigma_{c,k}^2+ S_k + D_k },\\
\text{s.t.}\;\; & P_{c,k},P_{r,k},T_{c,k},Q_k \in \mathbb{R}^+ ,\quad 1 \leq k \leq K,\\
& \sum\limits_{k=1}^{K} ( T_{r,k} + T_{m,k}+ T_{c,k} ) \leq T, \\
& N_k \log_2\left( 1+\dfrac{1}{D_k} \right) \leq T_{c,k} B \log_2\left(1 + \dfrac{E_{c,k} H_{c,k}}{ T_{c,k} \delta_c^2 } \right),\; 1\leq k \leq K, \\
& \dfrac{\sigma_r^2T_{r,k}}{S_k}+ E_{m,k} + E_{c,k}\leq E_k,\;\; 1\leq k \leq K.
\end{aligned}
\end{equation}
In (P2), all constraints are convex but the objective function (in the form of summation over multiple ratios) to be maximized is non-concave, thus making (P2) non-convex. To tackle the problem, the sum-of-ratios method is used in the following.
\section{Optimal ISCC Scheme}
In this section, an optimal ISCC scheme for joint sensing \& transmit power, time, and quantization bits allocation, is proposed to solve (P2). The solution process is presented in Fig. \ref{fig:solutionprocess}. Specifically, (P2) is optimally tackled by an iterative method, called \emph{sum-of-ratios}. In each iteration, the auxiliary variables are first introduced to derive a convex problem from (P2), called \emph{sum of weighted distortion minimization}. Then, the convex problem is addressed by alternately solving the problem of joint power and quantization bits allocation and the problem of communication time allocation.
\begin{figure}
\centering
\includegraphics[width=0.8\textwidth]{Figures/SolutionProcess.pdf}
\caption{Solution Methodology of the ISCC scheme.}
\vspace{-0.5cm}
\label{fig:solutionprocess}
\end{figure}
\subsection{The Sum-of-Ratios Method}
In this part, the sum-of ratios method in \cite{jong2012efficient} is utilized to optimally address (P2) by alternating between two steps: 1) solving a convex sub-problem, that is derived from (P2) to minimize the sum of weighted sensing and quantization distortion under given discriminant gains, and 2) updating the discriminant gains using the solved distortion level of sensing and quantization. These two steps iterate till convergence. The detailed procedure is elaborated in the sequel.
To begin with, we show that the sum-of ratios method can be applied to solve (P2), as shown in the lemma below.
\begin{lemma}\label{Lma:SumOfRatios}
The objective function of (P2) is the sum of multiple quasi-linear ratios. (P2) can be optimally solved using the sum-of-ratios method.
\end{lemma}
\noindent{\emph{Proof:} } See Appendix \ref{Apdx:LmaSumOfRatios}.
Based on Lemma \ref{Lma:SumOfRatios}, the detailed solution process via using the sum-of-ratios method is presented as follows. First, the objective function of (P2) is rewritten as
\begin{equation}\label{Eq:DG11}
G = \sum\limits_{k=1}^K \sum\limits_{n_k=1}^{N_k} \sum\limits_{\ell^{'}=1}^L \sum\limits_{\ell<\ell^{'}} \dfrac{ \mathcal{A}_{\ell,\ell^{'},n_k} }{ \mathcal{B}_{\ell,\ell^{'},n_k}\left( S_k, D_k\right) },
\end{equation}
where $ \mathcal{A}_{\ell,\ell^{'},n_k} $ and $\mathcal{B}_{\ell,\ell^{'},n_k}\left( S_k, D_k\right)$ are
\begin{equation}\label{Eq:Fraction}
\left\{
\begin{aligned}
& \mathcal{A}_{\ell,\ell^{'},n_k} = 1, \\
& \mathcal{B}_{\ell,\ell^{'},n_k}\left( S_k, D_k\right) = \dfrac{L(L-1)(\sigma_{n_k}^2 + \sigma_{c,k}^2+ S_k + D_k) }{2 \left(\mu_{\ell,n_k} - \mu_{\ell^{'},n_k}\right)^2},
\end{aligned}
\right. \quad \forall (\ell,\ell^{'},n_k).
\end{equation}
We then creat the following sub-problem:
\begin{equation}\text{(P3)}\quad
\begin{aligned}
\max_{E_{c,k},S_k,T_{c,k},D_k}\;\;\;\; &\sum\limits_{k=1}^K \sum\limits_{n_k=1}^{N_k} \sum\limits_{\ell^{'}=1}^L \sum\limits_{\ell<\ell^{'}}x_{\ell,\ell^{'},n_k} \left[ \mathcal{A}_{\ell,\ell^{'},n_k} - y_{\ell,\ell^{'},n_k} \mathcal{B}_{\ell,\ell^{'},n_k} \left(S_k,D_k\right) \right],\\
\text{s.t.}\;\; & \text{All constraints in (P2)},
\end{aligned}
\end{equation}
where $\left\{ x_{\ell,\ell^{'},n_k} \right\}$ and $\left\{ y_{\ell,\ell^{'},n_k} \right\}$ are the introduced auxiliary variables, and $\mathcal{A}_{\ell,\ell^{'},n_k}$ and $ \mathcal{B}_{\ell,\ell^{'},n_k} \left(S_k,D_k\right)$ are defined in \eqref{Eq:Fraction}. In (P3), each term in the objective function is a scale of the sum of sensing noise power $\{S_k\}$ and quantization distortion $\{D_k\}$, giving its name of \emph{sum of weighted distortion minimization problem}. It is easy to show that (P3) is convex.
Next, according to \cite{jong2012efficient} and Theorem 1 in \cite{yu2015joint}, (P2) can be optimally addressed by alternating between optimally solving the sub-problem in (P3) under given auxiliary variables $\left\{ x_{\ell,\ell^{'},n_k} \right\}$ and $\left\{ y_{\ell,\ell^{'},n_k} \right\}$, and updating them based on the correspondingly obtained solution. Hence, based on the convexity of (P3), (P2) can be optimally solved by iteratively performing the following two steps till convergence.
\begin{itemize}
\item \emph{Step 1}: Optimally solving (P3) with given auxiliary variables $\left\{ x_{\ell,\ell^{'},n_k} \right\}$ and $\left\{ y_{\ell,\ell^{'},n_k} \right\}$.
\item \emph{Step 2}: Updating the auxiliary variables $\left\{ x_{\ell,\ell^{'},n_k} \right\}$ and $\left\{ y_{\ell,\ell^{'},n_k} \right\}$ as
\begin{equation}
\begin{aligned}
& x_{\ell,\ell^{'},n_k} = \dfrac{1}{\mathcal{B}_{\ell,\ell^{'},n_k} \left(S_k,D_k\right)},\;\forall (\ell,\ell^{'},n_k), \\
& y_{\ell,\ell^{'},n_k} = \dfrac{\mathcal{A}_{\ell,\ell^{'},n_k}}{\mathcal{B}_{\ell,\ell^{'},n_k} \left(S_k,D_k\right)} = \dfrac{1}{\mathcal{B}_{\ell,\ell^{'},n_k} \left(S_k,D_k\right)}, \; \forall (\ell,\ell^{'},n_k),
\end{aligned}
\end{equation}
where $ \mathcal{B}_{\ell,\ell^{'},n_k} \left(S_k,D_k\right)$ is defined in \eqref{Eq:Fraction}. From the above equation, it can be observed that
\begin{equation}\label{Eq:EqualVar}
x_{\ell,\ell^{'},n_k} = y_{\ell,\ell^{'},n_k},
\end{equation}
and they are the discriminant gain of feature $n_k$ between the classes $\ell$ and $\ell^{'}$.
\end{itemize}
The above process can be interpreted as iterating over addressing the sum of weighted distortion minimization problem under given discriminant gain, and updating the discriminant gain using the solved sensing and communication distortion level.
\subsection{An Alternating Method for Solving (P3)}
In this section, an alternating algorithm is proposed to solve the convex sub-problem in (P3) with given auxiliary variables $\left\{ x_{\ell,\ell^{'},n_k} \right\}$ and $\left\{ y_{\ell,\ell^{'},n_k} \right\}$. This allows closed-form solutions with structural properties and can achieve low computational complexity.
Next, the two sub-problems are first introduced, followed by a summary of the alternating algorithm.
\subsubsection{Joint Power and Quantization Bits Allocation}
In this case, the communication time, say $\{T_{c,k}\}$, is given. By substituting \eqref{Eq:EqualVar} and $\mathcal{A}_{\ell,\ell^{'},n_k}$ in \eqref{Eq:Fraction}, (P3) can be written as
\begin{equation}\text{(P4)}\;
\begin{aligned}
\max_{E_{c,k},S_k,D_k}\;\;\;\; &\sum\limits_{k=1}^K \sum\limits_{n_k=1}^{N_k} \sum\limits_{\ell^{'}=1}^L \sum\limits_{\ell<\ell^{'}} \left[ y_{\ell,\ell^{'},n_k} - y_{\ell,\ell^{'},n_k}^2 \mathcal{B}_{\ell,\ell^{'},n_k} \left(S_k,D_k\right) \right],\\
\text{s.t.}\;\; & E_{c,k},S_k,D_k \in \mathbb{R}^+ ,\quad 1 \leq k \leq K,\\
&N_k\log_2\left( 1+\dfrac{1}{D_k} \right)\leq T_{c,k} B \log_2\left( 1+ \dfrac{ E_{c,k} H_{c,k} }{ T_{c,k} \delta_c^2 } \right),\;\; 1\leq k \leq K,\\
&\dfrac{\sigma_r^2T_{r,k}}{S_k} + E_{m,k}+ E_{c,k} \leq E_k,\;\; 1\leq k \leq K,\\
\end{aligned}
\end{equation}
which is a convex problem.
The \emph{Karush-Kuhn-Tucker} (KKT) conditions are used to solve (P4). The Lagrangian is given by
\begin{equation}
\begin{aligned}
\mathcal{L}_{\text{P4}} = &- \sum\limits_{k=1}^K \sum\limits_{n_k=1}^{N_k} \sum\limits_{\ell^{'}=1}^L \sum\limits_{\ell<\ell^{'}} \left[ y_{\ell,\ell^{'},n_k} - y_{\ell,\ell^{'},n_k}^2 \mathcal{B}_{\ell,\ell^{'},n_k} \left(S_k,D_k\right) \right],\\
&+\sum\limits_{k=1}^K\alpha_k \left[ N_k\log_2\left( 1+\dfrac{1}{D_k} \right)- T_{c,k} B \log_2\left( 1+ \dfrac{ E_{c,k} H_{c,k} }{ T_{c,k} \delta_c^2 } \right) \right],\\
&+\sum\limits_{k=1}^K \beta_k \left( \dfrac{T_{r,k}}{S_k} + E_{m,k}+ E_{c,k}- E_k \right),
\end{aligned}
\end{equation}
where $\{\alpha_k\geq 0\}$ and $\{\beta_k\geq 0\}$ are the corresponding Lagrange multipliers, and $\mathcal{B}_{\ell,\ell^{'},n_k} \left(S_k,D_k\right)$ is defined in \eqref{Eq:Fraction}.
The first KKT condition can be written as
\begin{equation}
\dfrac{\partial \mathcal{L}_{\text{P4}} }{\partial S_k } = \sum\limits_{\ell^{'}=1}^L \sum\limits_{\ell<\ell^{'}}\left( y_{\ell,\ell^{'},n_k}^2 \times \dfrac{\partial \mathcal{B}_{\ell,\ell^{'},n_k} }{\partial S_k } \right)- \dfrac{\beta_k T_{r,k}}{S_k^2} = 0,\quad 1\leq k \leq K,
\end{equation}
where, according to \eqref{Eq:Fraction},
\begin{equation}
\dfrac{\partial B_{\ell,\ell^{'},n_k} }{ \partial S_k } = \dfrac{L(L-1) }{2 \left(\mu_{\ell,n_k} - \mu_{\ell^{'},n_k}\right)^2}.
\end{equation}
It follows that
\begin{equation}\label{Eq:SensingNoiseControl}
\dfrac{1}{S_k} = \sqrt{ \sum\limits_{\ell^{'}=1}^L \sum\limits_{\ell<\ell^{'}} \dfrac{L(L-1) y_{\ell,\ell^{'},n_k}^2 }{2 \left(\mu_{\ell,n_k} - \mu_{\ell^{'},n_k}\right)^2} \times \dfrac{1}{ \beta_k T_{r,k} } }.
\end{equation}
By substituting $S_k$ in \eqref{Eq:VariablesTransform} into \eqref{Eq:SensingNoiseControl}, the following optimal sensing power allocation scheme can be obtained.
\begin{lemma}
The optimal sensing power for ISAC device $k$ must satisfy
\begin{equation}\label{Eq:SensingPowerAllocation}
P_{r,k} = \sigma_r^2 \times \sqrt{ \sum\limits_{\ell^{'}=1}^L \sum\limits_{\ell<\ell^{'}} \dfrac{L(L-1) y_{\ell,\ell^{'},n_k}^2 }{2 \left(\mu_{\ell,n_k} - \mu_{\ell^{'},n_k}\right)^2} \times \dfrac{1}{ \beta_k T_{r,k} } },\quad 1\leq k \leq K,
\end{equation}
where $\{\beta_k\}$ are the Lagrangian multipliers.
\end{lemma}
From \eqref{Eq:SensingPowerAllocation}, we conclude the following. Consider an arbitrary ISAC device, say the $k$-th one. First, if the number of classes $L$ is large, or the required discriminant gains $\{y_{\ell,\ell^{'},n_k}\}$ are large, more power should be allocated for sensing. Then, if the centroid distances, say $\{\left(\mu_{\ell,n_k} - \mu_{\ell^{'},n_k}\right)^2\}$, are large, or the sensing noise variance $\sigma_r^2$ is small, the required sensing power can be reduced. In addition, long sensing time, i.e., larger $T_{r,k}$, can also reduce the required sensing power.
The second KKT condition is given by
\begin{equation}
\dfrac{\partial \mathcal{L}_{\text{P4}} }{\partial D_k } = \sum\limits_{\ell^{'}=1}^L \sum\limits_{\ell<\ell^{'}}\left( y_{\ell,\ell^{'},n_k}^2\times \dfrac{\partial \mathcal{B}_{\ell,\ell^{'},n_k} }{\partial D_k } \right)- \dfrac{\alpha_k N_k\ln2 }{D_k(D_k+1)} = 0,\quad 1\leq k \leq K,
\end{equation}
which, by substituting $\mathcal{B}_{\ell,\ell^{'},n_k} \left(S_k,D_k\right)$ in \eqref{Eq:Fraction}, can be derived as
\begin{equation}\label{Eq:QuantizationDistortionControl}
D_k = \sqrt{ \dfrac{1}{4} + \dfrac{ \alpha_k N_k \ln 2}{ \sum\limits_{\ell^{'}=1}^L \sum\limits_{\ell<\ell^{'}} \dfrac{L(L-1) y_{\ell,\ell^{'},n_k}^2 }{2 \left(\mu_{\ell,n_k} - \mu_{\ell^{'},n_k}\right)^2} } } - \dfrac{1}{2},\quad 1\leq k\leq K,
\end{equation}
where $\{\alpha_k\}$ are the Lagrangian multipliers.
By substituting $D_k$ in \eqref{Eq:VariablesTransform} into \eqref{Eq:QuantizationDistortionControl}, we obtain the following lemma.
\begin{lemma}
The optimal quantization gain satisfies
\begin{equation}\label{Eq:QuantiaztionBitsAllocation}
Q_k = \dfrac{\delta_k^2}{D_k}, \quad 1\leq k \leq K,
\end{equation}
where $\delta_k^2$ is the quantization distortion and $D_k$ is defined in \eqref{Eq:QuantizationDistortionControl}.
\end{lemma}
Several observations can be made from \eqref{Eq:QuantiaztionBitsAllocation}. For an arbitrary ISAC device, say the $k$-th, larger number of classes $L$, larger number of feature elements $N_k$, and larger required discriminant gains $\{ y_{\ell,\ell^{'},n_k}\}$, call for greater quantization gain (or level), as it requires more fine-grained feature representations to increase the differentiability among them. In addition, larger centroid distances between classes, say $\{\left(\mu_{\ell,n_k} - \mu_{\ell^{'},n_k}\right)^2\}$, require smaller quantization gain, since different classes are well separated and thus low-resolution feature representation is fine for discriminating them.
The third KKT condition can be written as
\begin{equation}
\dfrac{\partial \mathcal{L}_{\text{P4}} }{\partial E_{c,k} } = -\dfrac{ \alpha_k B T_{c,k} H_{c,k} }{ (E_{c,k}H_{c,k} + T_{c,k}\delta_c^2 )\ln2} + \beta_k = 0.
\end{equation}
It follows that
\begin{equation}\label{Eq:EnergyAllocation}
E_{c,k} = \max\left\{\dfrac{ \alpha_k B T_{c,k}}{\beta_k \ln2} - \dfrac{T_{c,k}\delta_c^2}{H_{c,k}},\quad 0\right\}.
\end{equation}
By substituting $E_{c,k}$ in \eqref{Eq:VariablesTransform} into \eqref{Eq:EnergyAllocation}, we have the following optimal power allocation.
\begin{lemma}
The optimal communication power for each ISAC device should be
\begin{equation}\label{Eq:CommunicationPowerAllocation}
P_{c,k} = \max\left\{\dfrac{\alpha_k B }{ \beta_k \ln2 } - \dfrac{ \delta_c^2 }{ H_{c,k} },\quad 0\right\},\quad 1\leq k \leq K.
\end{equation}
\end{lemma}
Based on the results above, the primal-dual method can be used to solve (P4), as summarized in Algorithm \ref{Alg:PowerQuantizationAllocation}
\begin{algorithm}
\caption{Joint Power and Quantization Bits Allocation}\label{Alg:PowerQuantizationAllocation}
1: {\bf Input:} Channel gains $\{H_{c,k}\}$, auxiliary variables $\{y_{\ell,\ell^{'},n_k}\}$, feature elements' class centroids $\{\mu_{\ell,n_k}\}$ and variances $\{\sigma_{n_k}^2\}$, and the given communication latencies $\{T_{c,k}\}$.
2: {\bf Initialize} $\{\alpha_k^{(0)}\}$, $\{\beta_k^{(0)}\}$, the step sizes $\{\eta_{\alpha_k} \}$ and $\{\eta_{\beta_k} \}$, and $i=0$.
3: {\bf Loop}
4: \quad Solve $\{S_k\}$, $\{D_k\}$, and $\{E_{c,k}\}$ using \eqref{Eq:SensingNoiseControl}, \eqref{Eq:QuantizationDistortionControl}, and \eqref{Eq:EnergyAllocation}, respectively.
5: \quad Update the multipliers as
\begin{equation*}
\left\{
\begin{aligned}
&\alpha_k^{(i+1)} = \max\left\{\alpha_k^{(i)} +\eta_{\alpha_k} \dfrac{ \partial \mathcal{L}_{\text{P4} }}{\partial \alpha_k}, \quad 0\right\}, \;1\leq k \leq K, \\
&\beta_k^{(i+1)} = \max\left\{\beta_k^{(i)} +\eta_{\beta_k} \dfrac{ \partial \mathcal{L}_{\text{P4} }}{\partial \beta_k}, \quad 0\right\}, \;1\leq k \leq K,
\end{aligned}
\right.
\end{equation*}
6: \quad $i=i+1$.
7: {\bf Until Convergence}
8: Calculate $\mathcal{B}_{\ell,\ell^{'},n_k} \left(S_k,D_k\right)$ using \eqref{Eq:Fraction}.
9: {\bf Output:} $\left\{\mathcal{B}_{\ell,\ell^{'},n_k} \left(S_k,D_k\right)\right\}$, $\{S_k\}$, $\{D_k\}$, and $\{E_{c,k}\}$.
\end{algorithm}
\subsubsection{Communication Time Allocation}
In this case, the normalized sensing noise power $\{S_k\}$, communication energy $\{E_{c,k}\}$, and normalized quantization distortion $\{D_k\}$ are first solved by Algorithm \ref{Alg:PowerQuantizationAllocation}. To determine the communication time allocation $\{T_{c,k}\}$, a feasibility problem of (P3) is first derived, as shown in (P5). It obtains the minimum required time, dented as $T^*$, under given weighted distortion determined by $\{S_k\}$, $\{E_{c,k}\}$, and $\{D_k\}$. Then, following the methods used in \cite{wen2020joint} and \cite{wen2021adaptive}, the tractability of (P3) under the current weighted distortion is determined by the comparison between $T^*$ and the permitted latency $T$, as described below.
\begin{itemize}
\item \emph{Case of $T^*>T$:} In this case, the given $\{S_k\}$, $\{D_k\}$, and $\{E_{c,k}\}$ are not in the feasible region of (P3). The reason is that the latency constraint therein cannot be satisfied. To this end, the latency of all ISAC devices should be reduced to satisfy the constraint \footnote{If the initial point is feasible, the solution will not fall into this case by using the sequel algorithm.}.
\item \emph{Case of $T^*<T$:} In this case, more time can be allocated to all ISAC devices to achieve discriminant gain in (P3).
\item \emph{Case of $T^*=T$:} The current time allocation is optimal.
\end{itemize}
Based on the observations above, for the first two cases, a time updating rule is proposed to re-allocate the remaining (exceeding) time $(T-T^*)$ to all devices, which can guarantee (P3) is feasible in the next iterations, and reduce the total weighted distortion. In the sequel, the detailed procedure is described.
First, the feasibility problem is given by
\begin{equation}\text{(P5)}\quad
\begin{aligned}
T^* = \min_{T_{c,k}}\;\; & \sum\limits_{k=1}^{K} (T_{c,k} + T_{m,k}+ T_{r,k}) \\
\text{s.t.}\;\;& T_{c,k} \in \mathbb{R}^+, \quad 1\leq k \leq K,\\
&N_k\log_2\left( 1+\dfrac{1}{D_k} \right)\leq T_{c,k} B\log_2\left( 1+ \dfrac{ E_{c,k} H_{c,k} }{ T_{c,k} \delta_c^2 } \right),\; 1\leq k \leq K.\\
\end{aligned}
\end{equation}
To solve (P5), its Lagrange function is derived as
\begin{equation}
\mathcal{L}_{\text{P5}} = \sum\limits_{k=1}^{K} (T_{c,k} + T_{m,k}+ T_{r,k}) + \sum\limits_{k=1}^{K} \lambda_k \left[ N_k\log_2\left( 1+\dfrac{1}{D_k} \right)- T_{c,k} B\log_2\left( 1+ \dfrac{ E_{c,k} H_{c,k} }{ T_{c,k} \delta_c^2 } \right) \right],
\end{equation}
where $\{\lambda_k\geq 0\}$ are the Lagrangian multipliers. As (P5) is convex, the primal-dual method can be used to obtain the optimal solution, where the optimizer are denoted as $\{T_{c,k}^*\}$.
Then, the communication time updating to re-allocate the remaining (exceeding) time $(T-T^*)$ is designed as follows:
\begin{equation}\label{Eq:CommunicationTimeUpdate}
T_{c,k} = T_{c,k}^* + \dfrac{\gamma_k}{\sum\nolimits_{k=1}^K \gamma_k}\times (T - T^*),\quad 1\leq k \leq K,
\end{equation}
where $T^*$ is the obtained optimal total duration, $T_{c,k}^*$ is the solved optimal communication time of ISAC device $k$, $\gamma_k$ is defined as
\begin{equation}
\gamma_k = \dfrac{\partial \mathcal{L}_{\text{P5}} } {\partial \lambda_k} \bigg|_{\lambda_k =\lambda_k^*} = N_k\log_2\left( 1+\dfrac{1}{D_k} \right) - T_{c,k} B\log_2\left( 1+ \dfrac{ E_{c,k} H_{c,k} }{ T_{c,k}^* \delta_c^2 } \right).
\end{equation}
Several observations can be made from \eqref{Eq:CommunicationTimeUpdate}. First, if the current total weighted distortion is not feasible in the given delay, i.e., $T^*>T$, using the updating rule in \eqref{Eq:CommunicationTimeUpdate} can make (P3) feasible in the next iterations. Then, it is observed $\gamma_k$ represents the \emph{ throughput gap} of device $k$ between the required communication load for reliably transmitting the quantized feature subset and the available channel capacity. If the minimum required latency is less than the permitted one, i.e., $T^*<T$, the updating rule indicates that the device requiring more communication capacity is allocated with more time.
\begin{proposition}[Enhanced Discriminant Gain via Additional Time Allocation]\label{Prop:MonotonicTimeAllocation}
The time updating rule in \eqref{Eq:CommunicationTimeUpdate} leads to smaller weighted distortion level for (P3) and results in enhanced discriminant gain.
\end{proposition}
\noindent{\emph{Proof:} } See Appendix \ref{Apdx:LmaMonotonicTimeAllocation}.
Overall, the primal dual method to solve (P5) and the communication time updating are summarized in Algorithm \ref{Alg:CommunicationTimeAllocation}, where $\eta_{\lambda_k} $ and $\eta_k$ are the step sizes, and
\begin{equation}
\dfrac{ \partial \mathcal{L}_{\text{P5} }}{\partial T_{c,k}} = 1-\lambda_k \left[ B\log_2\left( 1+ \dfrac{ E_{c,k} H_{c,k} }{ T_{c,k} \delta_c^2 } \right) + \dfrac{E_{c,k} H_{c,k} }{ (E_{c,k} H_{c,k} + T_{c,k} \delta_c^2 )\ln2}\right], \;1\leq k \leq K,
\end{equation}
where the notations follow those in \eqref{Eq:ChannelCapacity} and \eqref{Eq:VariablesTransform}.
\begin{algorithm}[!th]
\caption{Communication Time Allocation for solving (P5)}\label{Alg:CommunicationTimeAllocation}
1: {\bf Input:} $\{S_k\}$, $\{E_{c,k}\}$, and $\{D_k\}$.
2: {\bf Initialize} $\{\lambda_k^{(0)}\}$, the step sizes $\{\eta_{\lambda_k}\}$ and $\{\eta_k\}$, and $i=0$.
3: {\bf Loop}
4: \quad Update the multipliers as
$\lambda_k^{(i+1)} = \max\left\{\lambda_k^{(i)} +\eta_{\lambda_k} \dfrac{ \partial \mathcal{L}_{\text{P5} }}{\partial \lambda_k}, \quad 0\right\}, \;1\leq k \leq K.$
5: \quad {\bf Initialize} $T_{c,k}^{(0)}$ and $t=0$.
6: \quad {\bf Loop}
7: \qquad $T_{c,k}^{(t+1)} = \max\left\{ T_{c,k}^{(t)} - \eta_k \dfrac{ \partial \mathcal{L}_{\text{P5} }}{\partial T_{c,k}^{(t)}},\; 0 \right\}$.
8: \qquad $t=t+1$.
9: \quad {\bf Until Convergence}
10: {\bf Until Convergence}
11: $\{T_{c,k}^* = T_{c,k},\;\forall k\}$ and calculate $T^*$.
12: Update the communication time $\{T_{c,k}\}$ using \eqref{Eq:CommunicationTimeUpdate}.
13: {\bf Output}: $\{T_{c,k}\}$.
\end{algorithm}
\subsubsection{Alternating Algorithm for Solving (P3)}
Based on Proposition \ref{Prop:MonotonicTimeAllocation}, the alternating optimization between Algorithms \ref{Alg:PowerQuantizationAllocation} and \ref{Alg:CommunicationTimeAllocation} leads to monotonically decreasing weighted distortion for (P3). Since (P3) is convex, the alternating method can optimally solve (P3), as summarized in Algorithm \ref{Alg:AlternatingMethod}, which suggests a linear convergence rate according to \cite{tran2019federated}.
\begin{algorithm}
\caption{Alternating Algorithm for Solving (P3)}\label{Alg:AlternatingMethod}
1: {\bf Input:} Channel gains $\{H_{c,k}\}$ and auxiliary variables $y_{\ell,\ell^{'},n_k}$.
2: {\bf Initialize} communication time $\{T_{c,k}\}$.
3: {\bf Loop}
4: \quad Solve sensing noise power $\{S_k\}$, quantization distortion $\{D_k\}$, and communication energy $\{E_{c,k}\}$ and discriminant gains $\left\{\mathcal{B}_{\ell,\ell^{'},n_k} \left(S_k,D_k\right)\right\}$, using Algorithm \ref{Alg:PowerQuantizationAllocation}.
5: \quad Solve communication time $\{T_{c,k}\}$ using Algorithm \ref{Alg:CommunicationTimeAllocation}.
6: {\bf Until Convergence}
7: {\bf Output}: $\left\{\mathcal{B}_{\ell,\ell^{'},n_k} \left(S_k,D_k\right)\right\}$, $\{S_k\}$, $\{D_k\}$, $\{E_{c,k}\}$, and $\{T_{c,k}\}$.
\end{algorithm}
\subsection{Solution to (P2)}
Based on the previous results, (P3) can be optimally solved using the method of sum-or-ratios, together with the alternating algorithm in Algorithm \ref{Alg:AlternatingMethod}. The detailed procedure is summarized in Algorithm \ref{Alg:Sum-of-Ratios}. Then, by substituting the solution into the variable transformations in \eqref{Eq:VariablesTransform}, the optimal solution of (P2) can be obtained.
\begin{algorithm}
\caption{Sum-of-Ratios Based Optimal ISCC Scheme for Solving (P2)}\label{Alg:Sum-of-Ratios}
1: {\bf Input:} Channel gains $\{H_{c,k}\}$.
2: {\bf Initialize} auxiliary variables $\{y_{\ell,\ell^{'},n_k}\}$.
3: {\bf Loop}
4: \quad Solve (P3) under given $\{y_{\ell,\ell^{'},n_k}\}$, using Algorithm \ref{Alg:AlternatingMethod}, and get $\{S_k\}$, $\{D_k\}$, $\{E_{c,k}\}$, $\{T_{c,k}\}$, and $\left\{\mathcal{B}_{\ell,\ell^{'},n_k} \left(S_k,D_k\right)\right\}$.
5: \quad Update the auxiliary variables as
$y_{\ell,\ell^{'},n_k} = \dfrac{1}{\mathcal{B}_{\ell,\ell^{'},n_k} \left(S_k,D_k\right)},\; \forall (\ell,\ell^{'},n_k),$
6: {\bf Until Convergence}
7: {\bf Output}: $\left\{\mathcal{B}_{\ell,\ell^{'},n_k} \left(S_k,D_k\right)\right\}$, $\{S_k\}$, $\{D_k\}$, $\{E_{c,k}\}$, and $\{T_{c,k}\}$.
\end{algorithm}
\section{Performance Evaluation}
\subsection{Experiment Setup}
\subsubsection{Communication model} In this experiment, we consider a network of $K=3$ ISAC devices, which are randomly located in a circular area of radius $50$ meters. The distance between the circle center and the AP is $450$ meters. The channel gain $H_{k}$ is modeled as $H_{k} = \left\vert \varphi_{k}h_{k} \right\vert^{2}$, where $\varphi_{k}$ and $h_{k}$ are the large-scale fading propagation coefficient and small-scale fading propagation coefficient, respectively. The large-scale propagation coefficient in dB from device $k$ to the edge server is modeled as $[\varphi_{k}]_{\text{dB}}=-[\text{PL}_{k}]_{\text{dB}} + [\zeta_{k}]_{\text{dB}}$, where $[\text{PL}_{k}]_{\text{dB}} = 128.1+37.6\log_{10}\text{dist}_{k}$ ($\text{dist}_{k}$ is the distance in kilometer) is the path loss in dB, and $[\zeta_{k}]_{\text{dB}}$ accounts for the shadowing in dB. In the simulation, $[\zeta_{k}]_{\text{dB}}$ is Gauss-distributed random variable with mean zero and variance $\sigma^{2}_{\zeta}$. The small-scale fading is assumed to be Rayleigh fading, i.e., $h_{k} \sim \mathcal{CN}(0,1)$.
\subsubsection{Inference task}
In our simulation, we apply the wireless sensing simulator in \cite{Li2021SPAWC} to simulate various high-fidelity human motions and generate human motion datasets. The inference task is to identify four different human motions, i.e., \textit{child walking}, \textit{child pacing}, \textit{adult walking}, and \textit{adult pacing} via the design of ISCC. Similar to the setup in \cite{matlab}, the heights of children and adults are assumed to be uniformly distributed in interval $[0.9\text{m}, 1.2\text{m}]$ and $[1.6\text{m}, 1.9\text{m}]$, respectively. The speed of standing, walking, and pacing are $0$ m/s, $0.5H$ m/s, and $0.25H$ m/s, respectively, where $H$ is the height value. The heading of the moving human is set to be uniformly distributed in $[–180^{\circ}, 180^{\circ}]$.
\subsubsection{Inference model}
Two machine learning models, i.e., SVM and MLP neural network, are considered for inference in the experiments, respectively. The magnitudes of the feature elements are taken as the inputs of the learning models. The neural network model has 2 hidden layers with 80 and 40 neurons, respectively. Both models are trained on 800 data samples without any distortion, i.e., sensing clutter, sensing noise, and quantization distortion. The inference experiments for test accuracy are implemented over 200 data samples with distortion.
Unless specified otherwise, other simulation parameters are stated in Table \ref{tab:sensing-parameters}. All experiments are implemented using Python 3.8 on a Linux server with one NVIDIA\textsuperscript{\textregistered} GeForce\textsuperscript{\textregistered} RTX 3090 GPU 24GB and one Intel\textsuperscript{\textregistered} Xeon\textsuperscript{\textregistered} Gold 5218 CPU.
\begin{table}[tt]
\caption{Simulation Parameters }
\label{tab:sensing-parameters}
\centering
\begin{tabular}{l l l l}
\hline
\bfseries Parameter & \bfseries Value & \bfseries Parameter & \bfseries Value \\
\hline\hline
Number of ISAC devices, $K$ & $3$ & Sensing noise variance, $\sigma_{r}^{2}$ & 1 \\
Clutter variance, $\sigma_{c,k}^{2}$ & 1, 0.1, 0.5 & Quantization variance, $\delta_{k}^{2}$ & 1\\
Number of features after PCA, $N_{K}$ & 50 & Number of classes, $L$ & 4 \\
Permitted latency, $T$ & 1.85 s & Energy threshold, $E_{k}$ & 0.15 Joule \\
Computation time for each device, $T_{m,k}$ & 0.1s & Computation energy for each device, $E_{m,k}$ & 0.01 Joule \\
Variance of shadow fading, $\sigma_{\zeta}^{2}$ & 8 dB & Communication channel noise power, $\delta_{c}^{2}$ & $10^{-12}$ W \\
Bandwidth for communication, $B$ & 200 Hz &
Bandwidth for sensing, $B_{s}$ & $10$ MHz \\
Sensing carrier frequency, $f_{c}$ & $60$ GHz &
Chirp duration, $T_{0}$ & $10$$\mu s$ \\
Unit sensing time, $T_{r,k}$ & $0.5$ s &
Sampling rate, $f_{s}$ & $10$ MHz \\
\hline
\end{tabular}
\end{table}
\subsection{Inference Algorithms}
For comparison, we consider four schemes as follows.
\begin{itemize}
\item \textit{Power-aware allocation}: The sensing power is first allocated randomly and then the other parameters are allocated by the scheme in \textbf{Algorithm 4}.
\item \textit{Time-aware allocation}: The communication time is firstly allocated equally and then the other parameters are allocated by the scheme in \textbf{Algorithm 4}.
\item \textit{Quantization-aware allocation}: The quantization bits is first allocated as $16$ bits for each ISAC device and then the other parameters are allocated by the scheme in \textbf{Algorithm 4}.
\item \textit{Optimal allocation (our proposal)}: All the parameters are allocated by the optimal ISCC scheme in \textbf{Algorithm 4}.
\end{itemize}
\subsection{Experimental Results}
In this part, the relations between the inference accuracy and discriminant gain regarding the two models are first presented. Then, the four algorithms are compared in terms of the SVM model and the neural network, respectively. Finally, the influence of number of participated devices on the inference accuracy is shown.
\begin{figure}[t]
\centering
\includegraphics[width=0.5\textwidth]{Figures/disc_acc.pdf}
\caption{Inference accuracy versus discriminant gain.}
\vspace{-0.5cm}
\label{fig:disc_acc}
\end{figure}
\subsubsection{Inference accuracy v.s. discriminant gain}\label{Sect:Simulation1}
The relations between the inference accuracy and discriminant gain regarding the SVM model and the MLP neural network are shown in Fig. \ref{fig:disc_acc}. It is observed that the inference accuracy increases as the discriminant gain grows for both models. Besides, when the discriminant gain is large, i.e., the distortion of the samples caused by sensing and quantization is small, the SVM outperforms the neural network. This is because the training of the neural network is overfitting as its model is complicated compared to its training dataset size. However, the neural network is more robust than the SVM when the discriminant gain is small, i.e., the distortion is large. It is also observed that when the discriminant gain is too large, the accuracy increases slowly because the centriods of different classes are too far apart in this case, and increasing the discriminant gain does not help much to increase the accuracy.
\begin{figure*}[t]
\centering
\subfloat[Inference accuracy with SVM versus energy threshold]{\includegraphics[width=0.495\textwidth]{Figures/energy_accuracy.pdf}
\label{fig:energy_accuracy_svm}}\hfil
\subfloat[Inference accuracy with SVM versus permitted latency]{\includegraphics[width=0.485\textwidth]{Figures/time_accuracy}
\label{fig:time_accuracy_svm}}
\caption{Performance comparison of the SVM among different schemes.}
\vspace{-0.5cm}
\label{fig:accuracy_svm}
\end{figure*}
\subsubsection{Inference accuracy of SVM}
The inference accuracy of the SVM model is presented in Fig \ref{fig:accuracy_svm}. From the figure, the performance of all schemes increases as the resources, i.e., energy threshold of each device and the permitted latency for the inference task, increase. Besides, the proposed optimal allocation scheme outperforms the other three baseline schemes. Furthermore, in the case of long permitted latency, the performance of the power-aware allocation scheme remains unchanged as the permitted latency continuously increases. The reason is that the sensing noise is dominant in this case.
\subsubsection{Inference accuracy of neural network}
The inference accuracy of the MLP neural network model in terms of the energy threshold and the permitted latency is shown in Fig. \ref{fig:accuracy_mlp}. Again, as more resources are allocated, the performance of all schemes increase. Besides, the proposed optimal allocation scheme achieves the best performance. Furthermore, the longer permitted latency will not lead to better performance for the power-aware allocation scheme when the latency is large, for a similar reason in the scenario of the SVM model.
\begin{figure*}[!t]
\centering
\subfloat[Inference accuracy versus energy threshold]{\includegraphics[width=0.485\textwidth]{Figures/energy_accuracy_mlp.pdf}
\label{fig:energy_accuracy_mlp}}\hfil
\subfloat[Inference accuracy versus permitted latency]{\includegraphics[width=0.49\textwidth]{Figures/time_accuracy_mlp}
\label{fig:time_accuracy_mlp}}
\caption{Performance comparison of the neural network among different schemes.}
\vspace{-0.5cm}
\label{fig:accuracy_mlp}
\end{figure*}
\begin{figure}[t]
\centering
\includegraphics[width=0.5\textwidth]{Figures/bar_accuracy}
\caption{Inference accuracy comparison among different models under different number of ISAC devices.}
\label{fig:num_radars}
\end{figure}
\subsubsection{Inference accuracy v.s. number of ISAC devices}
In Fig. \ref{fig:num_radars}, the inference accuracy of both models in terms of different number of ISAC devices are presented. For both cases, as the number of devices increases, better inference accuracy is achieved. The reason is that providing more features to the inference task can lead to a larger feature space, which can further make the distance, i.e., the discriminant gain, between arbitrary two different classes lager. In addition, the SVM outperforms the MLP, since the training of the neural network is overfitting
The extensive experimental results above show that the proposed optimal ISCC scheme has the best performance and verify our theoretical analysis.
\section{Conclusion}
In this paper, we an optimal task-oriented ISCC scheme for edge AI inference. By jointly allocating the sensing and communication power, quantization bits, and communication time to maximize the discriminant gain of the received features, the accuracy is enhanced for real-time inference tasks.
This work opens several interesting directions for inference-task-oriented designs. One is the ISAC device scheduling, i.e., the feature selection, for inference accuracy maximization when the radio resources, e.g., time and frequency bands, are scarce. Another is to enhance the inference accuracy in the broadband systems with frequency-selective wireless channels
|
\subsection*{Variables}
\EntryHeading{Variables}
\entry{$C, L_\ell, f_1, f_2$}{Trainable neural networks
\end{nomenclature}
\section{INTRODUCTION}\label{sec:intro}
\begin{figure*}
\centering
\includegraphics[width = 0.75\linewidth]{Figures-Journal/main_flowchart.png}
\caption{Flow chart of the proposed generative design framework for ICIs: there are two major components, the design generator and estimator. And both components are formulated based on graph learning algorithms.}
\label{fig:main_flowchart}
\end{figure*}
With the increases in both scale and complexity, interdependent critical infrastructures (ICIs), such as power systems or transportation networks, become more vulnerable to disruptive events. And natural disasters impose great negative impacts on the system reliability, e.g. a winter storm and associated cold waves led to a large-scale blackout event that affected more than five million people in February 2021 in Texas \cite{Sullivan2021}. Such vulnerability, therefore, drives the research efforts that could lead to robust and resilient ICIs. For instance, how to efficiently design a large-scale system that can resist potential external disruptions, or how can the decision-maker evaluate the uncertain dynamic behavior of the ICI undergoing different disruptive events? To quantify the system's performance during disruption, or to comprehend the system's capability toward uncertain disruptive scenarios, researchers have adopted the term "resilience" from the ecology field \cite{DeAngelis1980}. Different from the terminology of system reliability, in which the time-dependent degraded system performance and the possibility of failure are studied, the resilience metric is utilized to complement the analysis of real-time system behavior. Based on the U.S. Department of Defense report, a resilient ICI should not only withstand the impacts of disruptive events but also need to acquire the capability of self-healing from damages \cite{Goerger2014}. Thus, to realize a resilient ICI through design or operational management strategies, the stakeholders need to tackle challenges in three folds: (1) how should the system proactively detect the occurrence of abnormalities with the possible external or internal disruptions; (2) how large is the bandwidth of the ICI for withstanding adversarial impacts; (3) how quick the ICI can self-recover to its nominal state \cite{Walker2004}.
Motivated by the challenges from those three aspects, different frameworks have been proposed to help the ICI establish self-healing capability after system disruptions, therefore, achieving failure resilience. Here, we categorize the research efforts about engineering resilience based on the temporal stages of the proposed frameworks, i.e. before and after the disruptions. During the post-disruption stage, several real-time operational frameworks have been proposed to guide how the system should behave after disruptive events. For instance, researchers try to attain a resilient operational framework by scheduling optimal repair tasks under uncertainties \cite{Ouyang2017, Wu2020, Wu2021a} as well as repair resources \cite{wu2021}, forming self-sustainable microgrids \cite{Chen2016, Ambia2021}, and guided recovery through control strategies \cite{DallAnese2014, Wu2019a, Wu2019}. All aforementioned studies focus on solving the optimal decisions of how to utilize the existing resources or back-ups to recover the ICI, on the promise that set up a contingency plan such as network reconfiguration beforehand. In other words, during the post disruption stage, the self-recovery capability is realized in two steps: appropriate emergency response e.g. system reconfiguration, followed by performing optimal restorations.
Although comprehensive post-disruption frameworks have been proposed to guide how a system should behave after failure events, methodologies for proactively improving the system resilience or quantifying the resilience level of the ICIs are still unknown. And without an appropriate pre-disruption design/planning framework, the stakeholders need to frequently apply the aforementioned contingency plans to ensure system nominal performance, which leads to a more significant cost for the resilience enhancement. As a result, it's required to study suitable strategies to ensure system resilience even during the planning stage and to ease the necessity of adopting post-disruption control efforts.
To improve the system resilience and thus achieve system operations with better quality, however, current engineering resilience design research has been focusing on proposing ad-hoc models. For instance, researchers have proposed different system modeling and analysis methods to quantify and analyze the resilience level of complex engineering systems, e.g. power distribution systems and supply chain networks, undergoing a disruptive event during the pre-disruption stage \cite{Yodo2016b,Sharma2017a}. Besides, various approaches based on mathematical programming models are proposed to solve the best design strategies for ICIs under different operating scenarios \cite{Bourennani2015, Li2021}. Furthermore, probabilistic approaches such as the Bayesian network has been adopted to analyze and quantify the overall system resilience with the presence of disruptions \citep{Yodo2016, Yodo2017}. All aforementioned research have demonstrated their capabilities of quantifying the system resilience and thus finding the best design of the system, e.g. expanding the existing ICI or solving the best layout for a new system. Yet existing methods have their drawbacks: either the model is ad-hoc so that the generalization is not straightforward, or the system models are simplified to have a tractable problem. For example, many optimization-based approaches have assumptions for the underlining physical constraints to derive a solvable model for optimum. Or probabilistic approaches only consider systems with around 30 components to simplify the solving process. As a result, those drawbacks limit the applicability of the existing methods on realistic large-scale ICIs.
To further complicate the pre-disruption design problems for ICIs, the system usually consists of heterogeneous components for satisfying the various needs in the same system. However, these different components add more constraints for solving the optimal design and make the decision-maker use ad-hoc models to evaluate different online scenarios. Moreover, ICIs are usually discrete systems with up to tens of thousands of nodes and edges. Such a highly combinatorial system is nearly impossible to find the best design, without the help of intelligent methods. Thus, in this study, we focus on proposing a robust and intelligent generative framework to realize the design for ICIs that optimizes the resilience level.
The proposed generative design framework for ICIs is a model-free, data-driven method. It utilizes the graph learning algorithm to reconstruct candidate designs based on the input dataset of real-world ICIs. As a result, there is no need to make any assumptions about the ICIs to simplify the system operation constraints. Also, the optimal design does not rely on any specific mathematical model of the ICI. That is, the generative approach can learn the insights from the existing ICIs directly. And throughout the iterative training process, the generated candidates can be optimized towards pre-defined performance criteria, i.e. the system resilience level. As shown in \autoref{fig:main_flowchart}, the framework includes two major components--the generator and the estimator. The design generator is a variational autoencoder (VAE) that directly outputs feasible designs for the ICI, while the estimator is pre-trained to predict the performance of the candidate design efficiently. And an iterative process that blends the generated designs into the training dataset closes the gap of “target” driven generation to bias the generator towards outputting samples with high resilience. Finally adequate post-processing step including more expensive post-disruption simulations pinpoints the best system design.
The contributions of this work are in two aspects: (1) to the authors' best knowledge, there is no “target” (resilience) driven generative algorithm for interconnected systems yet. In the machine learning community, various algorithms, such as graph recurrent neural network (GRNN) \cite{You2018}, graph recurrent attention network (GRAN) \cite{Liao2019}, and graph variational autoencoder (GVAE) \cite{Liu2018} have been proposed to generate synthetic graph/discrete structures. And with the help of the graph neural network (GNN) model, an estimator can be constructed to determine the resilience level of an ICI automatically. Combined with the generative part, the estimator further guides the generation process. (2) It's the first time adopting graph generation algorithms to physical, real-world network systems. A physical system, for instance, the power grid, has much more complicated operational constraints than a social network or molecular structure. Those synthetic systems are the main applications of the generative algorithms proposed in the machine learning field. Thus, how to properly address the physical constraints and information when applying the graph algorithm to ICIs remains as a crucial challenge.
The rest of the paper is organized as follows: \autoref{sec:generator} explains the modeling of the design generator, and \autoref{sec:estimator} presents the formulation of the design estimator in detail. \autoref{sec:postprocessing} discusses the post-processing simulation step for re-evaluating the designs with more expensive metrics. A case study based on the power system design is used to illustrate the applicability of the proposed framework in \autoref{sec:result}. \autoref{sec:conclusion} concludes the study with brief discussions on the effectiveness of the developed design methodology.
\section{Modeling of ICIs and Resilience}
\begin{figure}
\centering
\includegraphics[width = \linewidth]{Figures-Journal/sample_network.png}
\caption{The graph representation of a power grid consists of 123 buses and 180 distribution lines}
\label{fig:sample_network}
\end{figure}
In this study, the ICI is modeled as graphs to indicate the interdependence and inherent network structure of the system. Take the commodity distribution system as an example, the warehouse, transportation hubs, or the final destinations can be modeled as nodes $\{i | i\in \mathbf{V}\}$. And the distribution paths are the edges $\{ij | ij\in \mathbf{E}\}$ between different nodes. Thus, the overall ICI is denoted as a graph $\mathcal{G}:=(\mathbf{V},\mathbf{E})$ as shown in \autoref{fig:sample_network}. Other than the topological information illustrated in the figure, physical systems usually carry much more signals. Take the power grid as an example, each node of the graph can have a specific level of operating voltages, frequencies, and magnitudes of generations/loads. While the edges can have physical constraints for capacities, distance, connection types etc. Thus how to generatively design an ICI satisfying practical operating conditions becomes the major challenge.
On the other hand, to measure the system resilience, a typical resilience curve (real performance curve after disruptions) with four states is illustrated in \autoref{fig:resilience_curve}. Note that the system performance curves could be different due to different strategies during the recovery process.
\begin{figure}
\centering
\includegraphics[width = \linewidth]{Figures-Journal/resilience_curve.png}
\caption{The resilience curve and four states in an ICI after with the disruptive event}
\label{fig:resilience_curve}
\end{figure}
Based on the resilience curve, this study defines the resilience level with respect to changes in the system performance after the disturbance. It can be measured by comparing the resilience curve with the nominal system performance curve. In other words, the resilience metric is derived from the ratio of the area under the resilience curve to the area under the nominal performance curve. The specific formulation is:
\begin{equation}\label{eqn:resilience}
\Phi=\frac{\int_{t_0}^{T}C_R(t)dt}{\int_{t_0}^{T}C_N(t)dt},
\end{equation}
where $\Phi$ denotes the resilience level, $C_R$/$C_N$ are the resilience curve and nominal performance curve respectively. $t_0$ is the initial time before the occurrence of the disruption, while $T$ is the termination time of the recovery process and the system settles at a new stable state. Intuitively this is true since a larger area under the resilience curve generally means a smaller performance loss induced by the disruption, and thus the system is more resilient considering a given disruptive event.
However, the above resilience term can only be measured after simulating a disruption event during the system nominal operation. This type of post-disruption information is hardly accessible during the design stage. Thus in order to bias the generative design process towards a more resilient system, a proxy is needed to represent the resilience level during the design stage. \autoref{sec:result} discusses the selection for the proxy in detail. And the actual resilience levels of the candidate designs become accessible through more expensive simulations during the post-processing stage.
\section{Modeling for Design Generator}\label{sec:generator}
Similar to discriminative methods, generative models have been well established for structured data, for example, the mixture model, the variational autoencoder, and the generative-adversarial network (GAN) \cite{bailey1994fitting, kingma2013auto, goodfellow2014generative}. Different from the traditional discriminative approach, the generative model tries to learn the underlying representation of the training data and tune the parameters of the model to create realistic outputs that are similar to the input structure. And this rationale enables the research of generative methods in the design community. Various research has been proposed to use the deep learning model for generative designs \cite{heyrani2021range, qian2022adaptive, oddiraju2022inverse}.
But it was not until recently that the generative models have been extended to unstructured data inputs i.e. graphs. In this study, we adopt the GVAE model, in which high dimensional representations of the nodes' information are encoded as latent vectors to further reconstruct the original graph. Notice that the focus of this study is on ICIs, and their nodes/edges have physical information representing the operational condition. That information is unique and crucial for reconstructing a physical system.
\subsection{Modeling}
As a VAE model, the GVAE algorithm contains two consecutive steps-the encoding and decoding. Thus following sections discuss the modeling of such an algorithm from those two aspects as well as how to train the corresponding data-driven design model.
\subsubsection{Encoding}
Similar to the standard VAE model, the GVAE first needs to encode the high dimensional node features $\mathbf{X}_v\in\mathbb{R}^f$ into latent vectors $z_v\in\mathbb{R}^d$, where $f$ denotes the number of features. And we use the Gated graph neural network (GGNN) model as the nodes embedder \cite{li2015gated}. The advantage of using the GGNN to embed the nodal information is that it can aggregate the neighborhood information in close proximity and preserve the information from the unique structure of each graph. And with the GGNN model, the input $\mathbf{X}_v$ is mapped into a multivariate diagonal Gaussian distribution in $d$-dimensional latent space, which are parameterized by $\mu_v$ and $\sigma_v$. And the latent representation of each node $z_v$ can be sampled from such a distribution. Following the convention of the standard VAE model, the regularization for encoding is the KL divergence between the latent distribution and the standard Gaussian distribution. Thus the loss term for the encoding step can be formulated as:
\begin{equation}
\mathcal{L}_{encode}=\sum_{v\in G}KL(\mathcal{N}(\mu_v,diag(\sigma_v)^2)||\mathcal{N}(0,\mathbf{I}))
\end{equation}
\subsubsection{Decoding}
Different from the encoding part where the original graph information is embedded into latent vectors, the decoding aims to reconstruct a graph that is similar to the input data based on the encoded $z_v$. As for standard VAE with structured data inputs, the trained neural network for the decoder can automatically reconstruct the output through forwarding propagation. However, to reconstruct a graph, it's unclear how to directly output the whole graph in one single forward propagation process. Several studies have proposed to generate graph structures in an auto-regressive manner: starting from one node $i$, connect $i$ to nodes $j,k,m,...,$ which have the highest probability for connection, then keep growing the graph node by node until termination \cite{Liu2018, Liao2019}. Such an auto-regressive process involves two main decisions at each generation step: which node to connect, and use what type of edge to connect the new node. To answer those two questions, the GVAE model used as the generator takes four steps: node initialization, edge selection, edge labeling, and node updating. And we discuss the formulations of these steps as follows.
During the node generation process, it's crucial to determine which information to be utilized for initializing the node representation. Since the encoding process has already preserved the physical features of each node by mapping them into a latent distribution, only the label information remains to be taken care of. And for physical systems, it's important to consider the type of each node during the reconstruction process. For example, the nodes inside a power system could have three different classes-the generations, the load bus, as well as transmissible node. And the final generated design cannot randomly arrange disparate nodes violating physical constraints: they must follow the same pattern learned from the training dataset. Thus the node representation $h_v$ during the encoding step consists of two parts--the initial latent vector $z_v$ is concatenated with the one-hot class vector $\tau_v\in \mathbb{R}^{c}$ as shown in \autoref{fig:generator_node_init}. $\tau_v=f(z_v)$ where $f(\cdot)$ could be any appropriate nonlinear classifier for deducing the node labels. And in this study, we use a three-layer fully connected neural network as the $f(\cdot)$.
\begin{figure}
\centering
\includegraphics[width = \linewidth]{Figures-Journal/generator_node_init.png}
\caption{Node initialization for the decoding process: the latent vectors $z_v$ has been concatenated with their predicted nodal type, denoting as one-hot vectors.}
\label{fig:generator_node_init}
\end{figure}
Once each candidate node of the graphs has been initialized, the graph generation process can start by establishing edges between nodes. Considering the current starting node is $v_i$, the task is to derive the probability of connecting $v_i$ to all other candidate nodes $v_j$ by using an edge $ij_l$ (selection), where $\ell$ is the type of the connection (labeling). Notice that unlike traditional generative algorithms on graphs, where the edges are indifferent, here the edges in ICIs carry rich physical information. For example, in a power grid, the decision-maker should assign different capacities to edges according to the magnitude of power loads at both ends. And to accomplish the tasks for edge selection and labeling, the feature representation of the candidate edge can first be constructed by concatenating various vectors:
\begin{equation}\label{eqn:edge_representation}
\phi_{i,j}^{(t)}: = [h_i^{(t)},h_j^{(t)},{d_{i,j}},{H_{init}},{H^{(t)}}],
\end{equation}
where $h_i$, $h_j$ are the nodal representations; $d_{i,j}$ is the distance measure between node $i$ and $j$, for instance, the electrical resistance between two buses in a power grid; $H_{init}/H$ is the initial/updated global graph feature, which is defined as the average of all nodal representations in this study:
\begin{equation}\label{eqn:graph_representation}
H^{(t)}:=\frac{1}{n}\sum_{i=1}^n {h_i^{(t)}}.
\end{equation}
\begin{figure}
\centering
\includegraphics[width = \linewidth]{Figures-Journal/generator_edge_update.png}
\caption{Illustration for the edge selection, edge labeling and the node updating process}
\label{fig:generator_edge_update}
\end{figure}
Notice that all vectors in \autoref{eqn:edge_representation} and \autoref{eqn:graph_representation} have an extra index for time step $t$. This is due to the node updating procedure, which is discussed later. \autoref{eqn:edge_representation} shows the advantage of the auto-regressive generation process since the generation result not only depends on local information e.g. $h_v$, but also considers the global state of the graph $H^{(t)}$. Once the feature vector for candidate edge is established, we can start to model the probability of connecting edge $ij$ using type $\ell$ connection. First, given the edge feature vector $\phi_{i,j}^{(t)}\in\mathbb{R}^f$, the distribution of choosing to connect $ij$ via edge type $\ell$ is expressed as the product of the probability of connecting $i$ to $j$ and the probability of using type $\ell$:
\begin{equation}
P(i\xleftrightarrow{\ell}j|\phi_{i,j}^{(t)}) = P(\ell |\phi _{i,j}^{(t)}, i\leftrightarrow j)P(i \leftrightarrow j|\phi_{i,j}^{(t)}).
\end{equation}
These two probability terms can be further calculated by formulating softmax functions:
\begin{equation}\label{eqn:softmax_edge}
P(i \leftrightarrow j|\phi _{i,j}^{(t)}) = \frac{{M_{i \leftrightarrow j}^{(t)}\exp [C(\phi_{i,j}^{(t)})]}}{{\sum\limits_w {M_{i \leftrightarrow w}^{(t)}\exp [C(\phi _{i,w}^{(t)})]} }},
\end{equation}
\begin{equation}\label{eqn:softmax_edgetype}
P(\ell |\phi_{i,j}^{(t)}) = \frac{{m_{i\xleftrightarrow{\ell}j}^{(t)}\exp [{L_\ell }(\phi _{i,j}^{(t)})]}}{{\sum_k {m_{i\xleftrightarrow{k}j}^{(t)}\exp [{L_k}(\phi _{i,j}^{(t)})]} }}.
\end{equation}
In the above two probability terms, $C$ and $L_\ell$ represent two trainable, nonlinear functions, e.g. fully connected neural networks, that map the feature vector to a scalar score. Moreover, additional masking matrices $M_{i \leftrightarrow j}$ and $m_{i\xleftrightarrow{\ell}j}$ enforce any prior knowledge about the generated graph. For example, node $i$ and $j$ cannot be connected because they are from different regions, or node $i$ and $j$ can only be connected by a high capacity edge $\ell$. After obtaining the probability distribution of the edge connection and labeling, new connection $ij_\ell$ can be sampled from the empirical distribution and the graph grows sequentially.
Notice that after choosing to connect node $i$ to node $j$, the graph structure has been changed due to the newly introduced edge and node. This changing in graph structure leads to changes in the node representation $h_i^{(t)}$, since nodes in the proximity of node $i$ are shifting. To update the node representation, GGNN can be used to re-derive $h_i^{(t)}$ in a recursive manner:
\begin{equation}
h_i^{(t)}=GGNN(h_i^{(t-1)}, \sum_{j|ij\in E}h_j^{(t-1)}),
\end{equation}
where the initial node feature vector is $h_i^{(0)}$, and the updating aggregates all the feature vectors of nodes that are adjacent to $i$ in the current candidate graph design. In summary, the aforementioned edge selection, labelling and node updating steps are illustrated in \autoref{fig:generator_edge_update}. And the corresponding decoding loss can be formulated as:
\begin{equation}
\mathcal{L}_{decode}=\sum_{G\in{\mathcal{D}}} \log(P(G|G^{(0)})\cdot P(G^{(0)}|z_v)),
\end{equation}
where the loss term essentially measures the log-likelihood of reconstructing the graph $G$ given in the dataset $\mathcal{D}$, with the initial encoded latent vectors $z_v$.
Due to space limitations, we have omitted some detail of the decoding process, including the termination condition for the graph generation. Readers can refer to \cite{Liu2018} for more in-depth discussion.
\subsection{Performance Aware Generation}\label{sec:performance_training}
\begin{figure}
\centering
\begin{subfigure}[b]{\linewidth}
\centering
\includegraphics[width=\textwidth]{Figures-Journal/generator_encode_decode.png}
\caption{Training the GVAE model with the standard encoding and decoding loss terms}
\label{fig:generator_encode_decode}
\end{subfigure}
\begin{subfigure}[b]{\linewidth}
\centering
\includegraphics[width=\textwidth]{Figures-Journal/generator_performance_aware.png}
\caption{Performance aware generation by utilizing another surrogate $R(z_v)$ and gradient ascent wrt $z_v$}
\label{fig:fig:generator_performance_aware}
\end{subfigure}
\caption{Flow chart for training the GVAE based design generator}
\label{fig:figure5}
\end{figure}
So far, the basic loss terms for the encoding and decoding processes of the GVAE have been discussed. However, the conventional GVAE model with the $\mathcal{L}_{encode}$ and $\mathcal{L}_{decode}$ can only reconstruct candidate designs that are structurally similar to the samples in the input dataset. Since the established two loss terms only focus on quantifying the errors when encoding the latent design spaces and reconstructing from the encoding. To enable a generative design for resilience, the target performance criteria, i.e. the resilience level, needs to be correlated to the ICIs encoded in the structured, latent design space. As a result, another nonlinear mapping between the latent vectors and the performance criteria is constructed as:
\begin{equation}
R(z_v)=\sum_{v} \sigma(f_1(z_v))\cdot f_2(z_v),
\end{equation}
where $f_1$ and $f_2$ are two fully connected neural networks. Notice that this formulation for estimating the performance based on latent vectors of the encoded ICIs adopts the idea from the GGNN regression model \cite{gomez2018automatic}. After training the $f_1$ and $f_2$ by using the training dataset, gradient ascent with respect to the input latent vector $z_v$ for $R(z_v)$ can be performed to find promising new candidate designs. And the loss term for finding the locally optimized $z_v^*$ is defined as:
\begin{equation}\label{eqn:performance_gen_loss}
\mathcal{L}_{Q}=||R(z_v), Q||_2,
\end{equation}
where $Q$ is a predefined performance criterion. In other words, starting from a latent vector of the encoded ICI, the design with better performance can be found by following the direction within the latent space to increase the performance metric, as shown in \autoref{fig:figure5}. Thus, the final design can be decoded from the optimized $z_v^*$ by using the trained decoder model afterwards.
\section{Modeling for Design Estimator}\label{sec:estimator}
Although the performance training enables the generator to output desirable designs that optimize the predefined performance criteria, the candidate designs are still confined to the latent design space of the input dataset. Moreover, the generator only uses a simple fully connected neural network model to predict the performance for efficiency. To further bias the design towards optimal design space and to fine-pick the "good" candidates, a more sophisticated performance estimator is needed. As a design estimator, it needs to learn the mapping between the input information (raw information of the ICI) and the output scalar, i.e., the performance metric. And deep learning framework is well known to have superb performance for predicting numerical labels from high dimensional training data. As a result, in this study, we adopt the graph convolutional network (GCN) \cite{Hammond2011, Defferrard2016, Kipf2017} to construct the performance estimator for the graph-like ICIs.
\subsection{Formulation}
The convolutional neural network (CNN) is well known for its excellent performance on image classification for nearly two decades~\cite{LeCun1998}. However, the application of CNN on 2D Euclidean space is not extended to unstructured topological space until Bruna et al.~\cite{Bruna2014} propose the generalization of CNN to signals defined on the graphical domains. This extension significantly improves the applicability of the convolution process on unstructured data, such as information generated from social networks or chemical compounds. After their work, the research about convolution on graphs diverges into two directions: one is working on the spatial domain of graphs while the other integrates the spectral graph theory into the convolution process. And the breakthrough works in \cite{Hammond2011, Defferrard2016} have greatly increased the potential of the spectral GCN, by proposing an efficient first-order approximation of spectral graph convolutions. This study utilizes the latter approach, i.e., the spectral GCN. And the GCN takes the advantage of the underlying information embedded in the adjacency matrix to perform the learning tasks for networks. Therefore GCN has superb performance for the inference task on graph inputs.
It has been proved that the GCN can be derived from the traditional CNN by studying the spectral graph theory \cite{Hammond2011, Defferrard2016}. GCN can be treated as the generalized case of the CNN on arbitrary, unstructured space. And following the formulation in \cite{Kipf2017}, the propagation rule, or the convolutional operator for graphs requires the degree and weighted adjacency matrix as additional parameters. Different from conventional adjacency matrix with binary entries only, the weighted one can include other values than 0/1 representing the edge weights between different pairs of nodes. This characteristic enables the learning task fulfilled by GCN to take the advantage of the rich graphical information of ICIs. On the other hand, the degree matrix $D$ is diagonal and aggregates the neighborhood information for each node. It can be obtained based on $A$: $D_{ii}=\sum_{j}A_{ij}$. With the degree and adjacency matrix on hand, the GCN propagation rule is defined as:
\begin{equation}\label{eqn:graph_conv}
GCN(X)=D^{-1/2}AD^{-1/2}X\Theta,
\end{equation}
where $\Theta$ are the trainable weights of each convolutional layer. Therefore, the graph inference problem can be solved by constructing a deep neural network (DNN), for instance $q=\sigma(f_2(f_1(GCN_2(GCN_1(X)))))$ where $GCN_1/GCN_2$ are the convolutional layers defined in \autoref{eqn:graph_conv}, and $f_1/f_2$ are adequate nonlinear functions.
\subsection{Training}
\begin{figure}
\centering
\includegraphics[width = \linewidth]{Figures-Journal/estimator_flowchart.png}
\caption{Flow chart for training the GCN based design estimator}
\label{fig:estimator_flowchart}
\end{figure}
As for using the GCN algorithm to evaluate the performance of generated designs, the specific training process needs to be discussed. Like conventional DNNs, the training process for the GCN-based estimator requires gradient information to optimize the trainable parameters as shown in \autoref{fig:estimator_flowchart}. The dataset of ICIs contains the input feature $\mathbf{X}\in\mathbb{R}^{N\times f}$, where $N$ is the number of nodes inside the graph and $f$ is the number of features considered. For instance, for the 123-bus power grid shown in \autoref{fig:sample_network}, $\mathbf{X}$ contains $123$ rows and $6$ columns, that includes the information of the power demand magnitude, generation capacity level, the voltage angle, etc. Whereas the label $y$ used for training the estimator is a numerical value for each training sample. Since the generation process needs to be biased to have a more resilient system design, the label should represent the overall system resilience level. And the choice for the label $y$ is further discussed in \autoref{sec:result}. The loss term used to train the estimator is the mean squared error (MSE) between the estimated label $q$ and the actual performance $Q$. The formulation is similar to \autoref{eqn:performance_gen_loss}. Notice that, unlike the design generator, the estimator can be pretrained on the existing training dataset so that estimating the performance of new designs is computationally cheap during the iterative generating process.
After training a GCN-based design estimator, we can combine the module with the generator to form an iterative process for refining the designs. As shown in \autoref{fig:main_flowchart}, a fixed number of $z_v$ is sampled and are used to generate the corresponding designs. Then the estimator determines the best batch of designs in terms of metric $Q$. If the process is not converged, i.e. the difference between the last best design and the current optimal one is large, then the top $c$ generated designs are mixed with the original dataset to perform another round of generation. To improve gradually the generated samples, the batch of the best designs replace the group of the original training data that has
\section{Post-processing Simulation}\label{sec:postprocessing}
So far the performance criterion $Q$ for training the design generator/estimator has been discussed. And for an efficient training process, the performance of each design is represented by an easy-to-evaluate scalar metric: rather than the actual resilience level, it is a proxy to access the system resilient performance. Recall the system resilience mainly measures the system's capability toward unforeseen disruptions. And it's hard to obtain the resilience level without running experiments for systems undergoing disturbances. As a result, we add a post-processing stage to further evaluate the candidate designs filtered by the surrogate metric $Q$. Since the initial design space has been shrunk from millions of candidates to hundreds through the iterative biasing generation, it becomes tractable for running more complex, simulation based evaluations during the post-processing stage.
Following the convention of the studies for ICI, here the metric used in the post-processing simulation is the expected demand not supplied (EDNS). And it's defined as:
\begin{equation}\label{eqn:EDNS}
EDNS = \sum_{e_i\in S_{e_i}} P_{e_i}C_{e_i},
\end{equation}
where $e_i$ denotes a possible disruptive event and $S_{e_i}$ is the set of all events simulated. $P_{e_i}$ represents the probability of having the event $e_i$, and $C_{e_i}$ is the amount of lost demands after $e_i$. In \autoref{fig:resilience_curve}, the EDNS can be viewed as the area between $C_R$ and $C_N$, which quantifies the capability of the system withholding external disruptions. And the optimal design can be determined as the one with the smallest EDNS after acquiring the post-processing results.
To obtain the $C_{e_i}$ after each $e_i$, we establish meshgrids for mapping each candidate design with geological information. \autoref{fig:mesh_grid_postprocessing} illustrates the mesh view of the IEEE 14-bus system with a disruptive event. Notice that, the mapped mesh-view of the system is helpful for simulating realistic disruptive events. Since external disruptions are usually confined within a specific region. For example, as shown in \autoref{fig:mesh_grid_postprocessing}, a storm with predefined $P_{e_i}$ is simulated to happen at cell (3,5), which leads to the highest probability of failure for node 10 and edge (10,11). Also, the components within the close proximity of cell (3,5), including node 10, 14 and edges around, incur smaller failure probability. Thus based on the information from the meshgrid, the curtailed performance of the ICI caused by random disasters can be simulated. For instance, $C_{e_i}$ from solving the optimal power flow problem for power systems, or obtaining the maximum flow solution for an impacted supply chain network, after disconnecting the damaged components. With each $P_{e_i}$ and the corresponding $C_{e_i}$, the overall EDNS of the candidate design can be found by performing several runs of simulations in a Monte Carlo manner.
\begin{figure}
\centering
\includegraphics[width = \linewidth]{Figures-Journal/mesh_grid_postprocessing.png}
\caption{A small scale power system mapped to an example meshgrid with a disruptive event sampled at cell (3,5)}
\label{fig:mesh_grid_postprocessing}
\end{figure}
\section{CASE STUDIES}\label{sec:result}
To validate the proposed generative design method, experiments about designing different kinds of ICIs are considered. \autoref{sec:synthetic} presents the design results for small-scale synthetic network systems. And \autoref{sec:power_system} further discuss the applicability of the proposed framework on large-scale IEEE test feeders.
\subsection{Synthetic Network Systems}\label{sec:synthetic}
\begin{figure}
\centering
\begin{subfigure}[b]{0.49\linewidth}
\centering
\includegraphics[width=0.85\textwidth]{Figures-Journal/syn_1.png}
\caption{}
\label{fig:syn_1}
\end{subfigure}
\begin{subfigure}[b]{0.49\linewidth}
\centering
\includegraphics[width=0.85\textwidth]{Figures-Journal/syn_2.png}
\caption{}
\label{fig:fig:syn_2}
\end{subfigure}
\begin{subfigure}[b]{0.49\linewidth}
\centering
\includegraphics[width=0.85\textwidth]{Figures-Journal/syn_3.png}
\caption{}
\label{fig:fig:syn_3}
\end{subfigure}
\begin{subfigure}[b]{0.49\linewidth}
\centering
\includegraphics[width=0.85\textwidth]{Figures-Journal/syn_4.png}
\caption{}
\label{fig:fig:syn_4}
\end{subfigure}
\caption{Example small-scale Watts–Strogatz graphs used as the training data}
\label{fig:sample_syn}
\end{figure}
First, we utilize the NetworkX package \cite{SciPyProceedings_11} in Python to randomly generate 10,000 Watts–Strogatz small-world graphs as the design training dataset. This type of random graphs has the small-world properties, which include high clustering and short average path length. Those properties enable researchers to use the Watts-Strogatz model to understand realistic networked systems, for instance, social networks and supply chain systems. \autoref{fig:sample_syn} demonstrates example Watts-Strogatz graphs generated for the case study. Here a small-scale system is considered, which includes 33 nodes and the same number of edges. We can see from \autoref{fig:sample_syn} that the initial graphs used for training has few clusters and several nodes have higher degree comparing to remaining nodes. This is desirable since for a supply chain network, nodes with higher degree can represent transportation hubs, while clusters indicate different coverages for separated communities.
As for designing the ICI, we need to define the physical features of the nodes and edges. And in this case study the nodes have a numerical feature to indicate the magnitude of demands/supplies as well as a categorical feature declaring the type of the node: demand, supply and transfer. This categorical feature is pre-sampled based on the degree of each node. For example, a node with higher degree has much higher probability of being the supply node, while nodes with small degree are likely sampled as demand or transfer nodes. On the other hand, The edges have two numerical feature denoting the capacity and cost of each edge. Like classical network flow problems, the cost is measured in terms of per unit flow on the corresponding edge. And to quickly evaluate the design generated during the iterative process, the performance metric $Q$ is defined as the magnitude of maximum flow with the minimum cost inside the network, denoting as $f_{max}$. Notice that to derive the $f_{max}$, two dummy nodes are added to the sampled Watts–Strogatz graphs to represent the source and destination nodes. Once the training dataset is ready, the estimator can be pretrained for qucikly evaluate the designs during generation. \autoref{fig:estimator_loss} shows the training history of the GCN-based estimator, where the y-axis represents the MSE between the ground-truth and the estimated performance metric.
\begin{figure}
\centering
\includegraphics[width=0.8\linewidth]{Figures-Journal/estimator_loss.png}
\caption{The training history for the estimator on synthetic network system data}
\label{fig:estimator_loss}
\end{figure}
Based on the training dataset, our goal for the design is to come up with a new and optimal design that satisfies the demands within the network while maintains steady performance after disturbances. We set the termination criterion for the training process as reaching 150 iterations. \autoref{fig:syn_result} summarizes the distribution of the performance metric $Q$ of the training dataset and the 500 generated designs, as well as the best design evaluated by the estimator at each iteration. Moreover, to show the performance biasing design process for a resilient system, we also show the distribution of the EDNS of the 500 designs along with the generation metric $Q$. Notice that the in-production generative design process only needs to execute the post-processing step after the training has bee converged. Here to demonstrate the correlation between the training metric $Q$ and the EDNS, we conduct post-processing simulations even during the middle of the generation.
According to the results shown in \autoref{fig:syn_result}, the generative design method successfully biases the candidate designs toward predefined performance metric, especially for the training label $Q$. Though the changes in the resilience index EDNS are not significant at the same level as that of $Q$, there still exists a trend for improvement: the overall EDNS decreases significantly during the first 100 training iterations. On the other hand, take the best design generated at each iteration as an example, the first version of the design contains long branches and few redundant paths. This is not a good practice for designing a resilient ICI like supply chain network. After several iterations' training, the candidate designs become to have clustered communities as well as central hubs along with substations. Those hierarchical components lead to a much smaller EDNS. At the last iteration, the central skeleton of the network changes from a tree structure to a ring shape, which further introduces more redundancy to the already high clustering network. This shifting in design strategies also demonstrate the capability of the proposed framework on learning good proprieties from existing training samples.
\begin{figure*}
\centering
\includegraphics[width = 0.8\linewidth]{Figures-Journal/syn_result.png}
\caption{Snapshots of the empirical distribution of the metric Q of the training data and the best designs generated, as well as the post-processing EDNS metric at different training iterations}
\label{fig:syn_result}
\end{figure*}
\begin{figure*}
\centering
\includegraphics[width=0.8\linewidth]{Figures-Journal/brand_new_design_results.png}
\caption{Illustrations of brand new designs generated as well as their capacity ratios and EDNS}
\label{fig:brand_new_design_results}
\end{figure*}
\subsection{IEEE Power Grids Test Case}\label{sec:power_system}
\begin{figure*}
\centering
\includegraphics[width=0.8\linewidth]{Figures-Journal/expansion_design_results.png}
\caption{The solution of an expansion problem generated from the framework and the specific physical information considered}
\label{fig:expansion_design_results}
\end{figure*}
Despite the small-scale test case based on synthetic networks, we also consider real world dataset about the power systems. In order to train the design estimator and the generator, we first generate a power grid dataset consisting of 138000 sample systems that range from 50 nodes to 150 nodes. The sample system designs are generated by the SynGrid package in MATPOWER \cite{wang2010generating}. And since the exact resilience level of a system design is hard to quantify without knowing the online response during disruptions, here we adopt a surrogate metric, the total capacity ratio of the system. This metric implicitly measures how well the system gonna behave towards external disruptions. And it is defined as:
\begin{equation}
C^R = \frac{\sum_{ij|ij\in{E}}f_{ij}}{\sum_{ij|ij\in{E}}u_{ij}},
\end{equation}
where $f_{ij}$ is the actual flow on edge $ij$ from the optimal power flow (OPF) results; $u_{ij}$ is the capacity assigned to $ij$. A lower capacity ratio means that the design can have more room for unpredictable flows. And this metric can indicate the tolerance to failures for an ICI during disruptive events, e.g. sudden load surges or line outages. However, the final performance metric requires additional compensations to prevent the generated designs from assigning unnecessary large capacity to every edges for obtaining a low $C^R$. Therefore, we take the cost of having large edge capacity into consideration. And the total cost of establishing all edges with capacity $u_{ij}$ is denoted as:
\begin{equation}
C^E=\sum_{ij|ij\in{E}}a\cdot u_{ij},
\end{equation}
where $a$ is a predefined parameter measuring the unit cost of edge capacity. The training label is then defined as:
\begin{equation}
Q=\alpha C^R + (1-\alpha)\frac{C^E}{K},
\end{equation}
where $\alpha$ is the weight hyperparameter, and $K$ is a constant for normalizing. The training task is thus to minimizing $Q$. Notice that the proposed framework is not limited to any specific form of metric, and it can adopt other appropriate resilience-driven metrics by changing the formulation of the $Q$.
To show the applicability of the design framework, we trained the model on the SynGrid dataset and followed the steps depicted in \autoref{sec:performance_training} to generate brand new designs with a low level of capacity ratio. \autoref{fig:brand_new_design_results} shows the samples from the progress of the gradient ascent and the designs decoded from the embedded $z_v$. Here, a mid-scale 57 nodes system and a large-scale 100 nodes system are considered. Although the generative design process only uses a surrogate metric instead of the actual system resilience like EDNS, both the proxy metric used for training and the more expensive resilience index show the similar trend throughout the iterations. This finding suggests that the relatively cheap performance metric $Q$ is suitable for deriving a resilient design via the generative process. Moreover, different from designing a brand new system, the expansion problem sometimes is more prevalent For ICIs. For instance, where to add new buses in an existing power grid to enhance the current service, or how to allocate new transportation hubs in a supply chain network to improve the coverage. In order to solve an expansion problem, we can include the prior knowledge constraints i.e. existing connection information, as masking matrices $M_{i \leftrightarrow j}$ and $m_{i\xleftrightarrow{\ell}j}$ shown in \autoref{eqn:softmax_edge} and \autoref{eqn:softmax_edgetype}. Such an information injection during the generation process is also useful when the stakeholder requires to put hard constraints on the final design.
\autoref{fig:expansion_design_results} illustrates the expansion process for a 120-bus system after adding two additional nodes. Here the physical information in both the original ICI and the expanded system is included. Six types of nodes are considered and the edges have three categories based on their rated capacities. Notice that the generated designs from the GVAE model only contain categorical information for each node and edge, e.g. a node is assigned as a coal-fired power plant and an edge is allocated with high capacity. To conduct OPF simulations in the MATPOWER and to obtain the capacity ratio, we have sampled numerical ratings for generations and edges, based on the statistics in the SynGrid package.
\section{CONCLUSION}\label{sec:conclusion}
In this study, a generative design framework for networked systems has been proposed. Different from traditional model-based, optimization-driven design methods, this generative approach is generalized and requires no explicit model development. The framework utilizes advanced graph learning algorithms, including GCN and GVAE, to realize a model-free, data-driven design schematic. The proposed design framework is capable of mining intelligently useful properties from existing system designs and biasing the candidate designs to meet predefined performance criteria. Moreover, prior knowledge about the system can be included during the generation process to achieve expansion planning through masking information included in the generator module of the framework. And experimental results based on various scales of power systems have shown the applicability of the proposed method. As for future studies, how to directly couple the resilience level with the design performance criteria remains to be a challenge. And the experimental results shown in this study only utilize a proxy for the system resilience, it's noteworthy to analyze more fundamental metrics to evaluate the designs during the generation.
\section*{Acknowledgments}
This research is partially supported the U.S. Department of Energy's Office of Nuclear Energy under Award No. DE-NE0008899 and the National Science Foundation (NSF) Engineering Research Center for Power Optimization of Electro-Thermal Systems (POETS) with cooperative agreement EEC-1449548.
\bibliographystyle{asmeconf}
|
\section{Introduction}
\IEEEPARstart{A}{daptive} morphology is a fascinating natural feature that Robotics struggles with implementing into the existing platforms. Birds~\cite{modelingFlyingBirdChap5}, snakes~\cite{flyingSnake}, and frogs~\cite{morphingFrog,flyingFrog} are only a few examples of the large variety of animals that use adaptive morphology for several goals, ranging from increasing locomotion abilities to augmenting self-defense systems~\cite{salamander}. Although successful attempts of implementing adaptive morphology into robotic platforms exist~\cite{adaptiveMorphologyFloreano2016,morphingQuadrotorScaramuzza2019,roboticSkinBottiglio2019,shah2020shape}, humanoid robots are still
conceived with links having rigid covers, which limit their capacity to adapt to the surrounding environment and to optimize locomotion and manipulation tasks. This article proposes a concept of morphing covers for humanoid robots and addresses the associated fundamental problems of kinematic modeling, actuation positioning, and control design of the morphing system.
Most of humanoid robot design is governed by the idea of having a skeleton enclosed by rigid covers \cite{natale2017icub, atlasArticle, asimo2019, surveyHumanoidRobot2019}.
The covers are the first robot body part that makes contact with the
environment, so they have a pivotal role during any robot \emph{physical} task -- \text{e.g. }, locomotion, human-robot interaction, manipulation, etc.
Consequently, adaptive morphology via morphing covers may lead to unprecedented features of humanoid robots. Morphing feet that optimize locomotion patterns (\text{e.g. } flat feet for balancing and point/rounded feet for walking) and adaptive chest shapes to pass through narrow cavities are only a few leaps forward that morphing covers of humanoid robots would enable.
\change{%
Our long-term vision is to provide future flying humanoid robots the ability to morph their shape to optimize the resulting aerodynamics acting on the robot. We are currently implementing the vision of morphing flying humanoid robots on iRonCub}\cite{ironcubRal,ironcubHumanoids}\change{, a modified version of the iCub robot powered by turbojet engines integrated in the chest and in the arms -- see Fig.~}\ref{fig:iRonCub}.
\begin{figure}[t]
\begin{subfigure}[b]{0.49\columnwidth}
\centering
\includegraphics[width=\textwidth]{figures/iRonCub-rest.eps}
\caption[]{Rest configuration}
\label{fig:iRonCub-rest}
\end{subfigure}
\hfill
\begin{subfigure}[b]{0.49\columnwidth}
\centering
\includegraphics[width=\textwidth]{figures/iRonCub-open.eps}
\caption[]{Morphed configuration}
\label{fig:iRonCub-open}
\end{subfigure}
\caption[]{\change{Conceptual picture of the \emph{iRonCub} robot with a morphing cover integrated in the left thigh. The cover morphs and adapts its shape to optimize aerodynamics. The real \emph{iRonCub} is currently being tested to perform the first flight}~\cite{ironcubHosam}.}
\label{fig:iRonCub}
\end{figure}
\change{The idea of enhancing robot capabilities via cover and link re-design is not new to the Robotics community.
Examples are: the integration of soft materials as robot skin to perceive contacts and absorb collisions} \cite{humanoidRobotSoftSensors,hakozaki1999telemetric,humanoidRobotShockAbs}\change{, or the design of links with an active variable stiffness control~}\cite{morphingRoboticArm2017}.
\change{However, how to implement effectively morphing abilities of humanoid robots is still an open issue although there is an active scientific effort in tackling several problems around the topic -- see, e.g., the problems of shape morphing structures, surface control, and transformation from 2D surfaces into 3D bodies. We briefly review below the main approaches for tackling these problems.}
\change{The ancient art of \emph{origami} gave impetus to researchers in proposing folding mechanisms capable of evolving from $2$-D to $3$-D structures~}\cite{origamiLang1996,rus2018origamiRobotReview}. \change{At the actuation level, the folding feature may be driven by pneumatic actuators} \cite{metaOrigamiPneumoActuated2016,softMorphingOrigami2019}\change{, thread-based mechanisms powered by motors }\cite{origamiBot2014}\change{, smart memory alloys }\cite{origamiActuatedRuss2014}\change{, and heat sources }\cite{walkingOrigamiRus2015}.
\change{\emph{Origami} multi degree-of-freedom ($\dof$) mechanisms can also play the role of actuation mechanisms for \emph{reconfigurable surfaces}} \cite{recSurfOriPixelEPFL2020}.
\change{%
In this case, the resulting \emph{reconfigurable surface} much differs from the classical configuration of having
pixels that can translate only~}\cite{recSurfMouldingPatent,recSurfESA,recSurfFesto, recSurfInForm2013}.
In general, \change{\emph{reconfigurable surfaces} are usually characterized by an actuation system that generates absolute movements of the pixels and the actuator's stators are fixed to ground. Therefore, reconfigurable surfaces little fit the application of morphing covers for humanoid robots.}
\change{\emph{Soft robots} may implement morphing features since they are
often made of hyperelastic materials with Young's modulus in the order of $10^4$ and $10^9$}\cite{softRobotReview2015,softRobotReview2017,softRobotReview2018}.
\change{Examples of soft robots that implement a degree of controllable morphing feature are active textiles with McKibben muscles} \cite{activeTextile2017,activeTextile2019}\change{, silicon-rubber pad} \cite{softRoboticPad2017}\change{, buckling surfaces }\cite{bucklingSoftGel2012}\change{, groove-based mechanism }\cite{morphingPasta2021}\change{, heat-sealing inflatable materials pneumatically activated }\cite{aeroMorph2016}\change{, surfaces textures for camouflage} \cite{camouflageRobot2013,camouflageRobotScience2017,pneUISoftRobot2013}\change{, and underwater morphing robots to optimize hydrodynamic forces} \cite{underwaterWalkingRobot2019}.
\change{Most of these, however, are designed to achieve a unique or a limited range of configurations. A proof of concept to enable a larger spectrum of controllable motions is a morphing surface actuated with liquid crystal elastomers }\cite{softElastometerDaraio2021}.
\change{%
\emph{4D printed variable shaping structures} leverage a new frontier of manufacturing, the $4$-D printing~}\cite{4Dprinting2019}.
\change{\emph{4D printing} consists of $3$-D printed structures that evolve with time when exposed to a predetermined stimulus such as water }\cite{4DprintingWater2014}\change{, temperature }\cite{4DprintingTemperature2019}\change{, magnetic fields}\cite{magneticSoftRobot2018}\change{, etc.}
\change{\emph{Morphing wings} are innovative flight supports capable of changing their shape and adapt to different aerodynamics conditions }\cite{morphingWingReview2010,morphingWingReview2011}\change{. The challenges when designing \emph{morphing wings} are numerous, ranging from mechanism design to the development of deformable skins that shall withstand the aerodynamic loads}\cite{morphingSkins2008}.
\change{\emph{Morphing wings} can, thus, reconfigure the planform~}\cite{planformMorphingWing2004,planformMorphingWing2007,optimalActuatorMorphingWing2006}\change{, perform out-of-plane transformation}\cite{oopMorphingWing2007}\change{, and adjust the airfoil profile}\cite{airfoilMorphingWing2013}.
\emph{Self-reconfigurable robots}
change their shape by rearranging the connectivity of their constitutive parts~\cite{modularRobotReview2007,modularRobotReview2015,morpho2008}. For instance, modular self-folding robots can be composed of
a repetition of triangular modules~\cite{mori2017}. From an actuation standpoint, these modules may be either active or passive, but they are both given with the capability of coupling via a specific actuation mechanism~\cite{moriAutomaticCoupling2019}.
The main characteristic of these self-reconfigurable robots is their \emph{low} thickness that allows the mechanism to fold. Consequently, one can generate $3$-D origami from an initial $2$-D layout.
On one hand, the concept of modular robots leads to a high structural versatility since the repetition of a basic module allows us to obtain
\emph{complex} shapes. Furthermore, the robot design pivots around the basic element to repeat and not around the entire mechanism. On the other hand, self-reconfigurable robots are designed to rearrange their connectivity, so they are not ideal in the case a single connectivity pattern should be kept by the overall platform.
\change{The survey above highlights some of the existing technologies that may be considered when attempting to implement a degree of morphing feature onto a humanoid robot.
Our specific use-case of \emph{morphing covers} for (flying) humanoid robots, however,
introduces dimensional and structural constraints that call for a word of caution.
From the mechanical standpoint, the cover material shall be stiff enough to resist the aerodynamic pressure without deforming or breaking apart, while
the cover
size shall ease its integration in a human-sized robot.
From the functional standpoint, the morphing cover shall have a degree of maneuverability to induce enough variations and benefits in terms of robot shape and aerodynamic loads. Moreover, the cover shall be robust against air pressure and avoid (at most) hysteresis behaviors. The range of achievable shapes shall be various and not limited to bistable states only.
Finally, the cover actuation shall be easily reproducible and of simple integration into the mechanics of the humanoid robot.}
\change{According to these use-case constraints, we believe that none of the existing methods can be applied \emph{as such} for the design of morphing covers for humanoid robots. Rather, we believe that the morphing cover design and control shall combine ideas and principles developed by the \emph{soft} and \emph{self-reconfigurable} robot literature. We, thus, propose a morphing cover composed of a \emph{skeleton}, namely a rigid mechanism that enables the cover to move, and a \emph{soft external membrane}, namely an elastic material that encloses the cover to exploit aerodynamic forces by filling cavities and passively deforms with its motion.
Although the concept of \emph{shape morphing} is usually associated with soft structures,
we refer to as \emph{morphing cover} the proposed rigid skeleton and soft membrane
because the system macroscopically morphs from one shape to another;
once integrated into a humanoid robot, the covers evolution cause a morphological variation of the robot.
The article, however, focuses on the cover skeleton only, and the analysis of the soft membrane will be the subject of future studies.
The cover skeleton
is composed of a repetition of a rigid basic element, called \emph{node}. The node is of square shape and is connected to the four adjacent nodes via spherical joints. Joints can be actuated, and the problem of finding which joint to actuate is also investigated.
Differently from the \emph{self-reconfigurable} literature, our approach is optimized for the case where the connectivity pattern of all nodes does not change.}
\change{At the theoretical level,
this article presents a systematic, model-based, and scalable approach for the modeling, actuation positioning, and control of a morphing system.
The system modeling is approached using maximal coordinates, which allows us to easily tackle kinematics with closed loops. The modeling approach differs from the state of the art related to similar self-reconfigurable robots that use minimal coordinates} ~\cite{moriReconfigurationStrategy2019}. %
\change{Motor positioning is tackled using genetic algorithms, thus defining a minimal set of actuators that enable the design of global stabilizers of
desired $3$-D shapes.
The proposed motor positioning and control design much differ from the existing methods applied to morphing systems that mostly deal with:}
\change{
$i)$ strategies to place active modules optimized for open chain mechanism} \cite{moriOptimalDistributionActiveModules}\change{;
$ii)$ definitions of optimal $2$-D layout to obtain a $3$-D shape relying on origami theory}\cite{moriReconfigurationStrategy2019}\change{;
$iii)$ planning algorithms to define the sequence of foldings}\cite{moriReconfigurationStrategy2019}\change{
.}
More precisely and compactly,
the contributions of this article are as follows:
\begin{enumerate}
\item the design of the morphing cover skeleton and node \change{with the aim of applying it to a humanoid robot};
\item the development of the cover kinematic model;
\item a genetic algorithm for selecting the motor locations so as to obtain a fully actuated cover;
\item the control design for the morphing cover allowing it to track a time-varying desired $3$-D shape;
\item the validation with simulation results verifying the robustness of the approach against noise.
\end{enumerate}
Although the contributions above can also be applied to other natures of robots, we are currently investigating the use of a specific kind of motor that induces a node dimension in the order of $25$ [mm]. In turn, the node size implies an overall cover dimension that fits the anthropometric dimensions of existing humanoid robot covers -- see section \ref{sec:simulations}.
The rest of this article is organized as follows.
Section~\ref{sec:background} introduces notation and recalls the %
basis of genetic algorithms.
Section~\ref{sec:modeling} presents the kinematic model of the proposed morphing cover.
Section~\ref{sec:actuatorChoice} describes a genetic algorithm for motor optimal placing.
Section~\ref{sec:control} presents a framework for the control design of the morphing cover.
Section~\ref{sec:simulations} shows the simulations results.
Finally, Section~\ref{sec:conclusions} concludes this article.
\section{Background} \label{sec:background}
\subsection{Notation}
\begin{itemize}
\item \change{$\SO{3} := \brCurly{ \rotm{}{} \in \R{3 \times 3} \; | \; \rotm{\tr}{} \rotm{}{} = \eye{3}, \, \det \brRound{\rotm{}{}} = 1}$}
\item \change{$\SE{3} := \brCurly{ \begin{bsmallmatrix} \rotm{}{} & \posW{} \\ \zero{} & 1 \end{bsmallmatrix} \in \R{4 \times 4} \; | \; \rotm{}{} \in \SO{3}, \, \posW{} \in \R{3}}$ }
\item $\skw{\boldsymbol{x}} \in \R{3 \times 3}$ is the skew symmetric matrix associated with the cross product in
$\R{3}$, namely, given $\boldsymbol{x}, \boldsymbol{y} \in \R{3}$, then $\boldsymbol{x} \times \boldsymbol{y} = \skw{\boldsymbol{x}} \boldsymbol{y}$.
\item The vectors $\ev{1}$, $\ev{2}$, $\ev{3}$ denote the canonical basis of $\R{3}$
\item $w$ denotes the inertial (or world) frame; $a$, $b$, $c$ are generic body-fixed frames.
\item $\posW{a} \in \R{3}$ denotes the origin of the $a$ frame expressed in the inertial frame $w$.
\item $\rotm{a}{b} \in \SO{3}$ is the rotation matrix that transforms a $3$-D vector expressed with the orientation of the $b$ frame in a $3$-D vector expressed in the $a$ frame, \ie, %
\begin{equation*}
\rotm{a}{b} = \bm{ \versor{x}{a}{b} & \versor{y}{a}{b} & \versor{z}{a}{b}} \quad \text{with} \quad \versor{x}{a}{b} = \rotm{a}{b} \ev{1}
\end{equation*}
$\versor{x}{a}{b}$, $\versor{y}{a}{b}$, and $\versor{z}{a}{b}$ are the unit vectors of the frame axes. %
\item $\quat{a}{b} \in \R{4}$ denotes the unit quaternion representation of the rotation matrix $\rotm{a}{b}$.
\item $\pos{a}{b}{c} \in \R{3}$ is the relative position of $c$ frame \wrt to $b$ frame written in $a$ frame, \ie
$\pos{a}{b}{c} = \rotm{a}{w} \brRound{ \posW{c} - \posW{b} }$. %
\item $\linVel{a}{b}{c} \in \R{3}$ is the linear velocity of $c$ frame \wrt to $b$ frame written in $a$ frame.
\item $\angVel{a}{b}{c} \in \R{3}$ is the angular velocity of $c$ frame \wrt to $b$ frame written in $a$ frame.
\item $\vb \in \R{6}$ is the $6$-D velocity of base link. %
\end{itemize}
\noindent
Given the vectors $\pos{a}{b}{c}$, $\linVel{a}{b}{c}$, $\angVel{a}{b}{c}$, and $\quat{a}{b}$ or the matrix $\rotm{a}{b}$, if one of the terms
$a$, $b$, or $c$ is omitted, it is implicitly assumed to be equal to the inertial frame $w$.
\subsection{A Short Recap of Genetic Algorithms}
Genetic algorithms (GA) are search algorithms inspired by the process of natural selection \cite{goldberg1988genetic}.
Given an initial population composed of a set of candidates, an \emph{evolution process} improves iteratively the characteristics of the populations according to a metric defined by a \emph{fitness function}.
The fitness function is the objective function that we want to maximize (or minimize).
Often, a population member is a scalar number or an array encoded into binary strings.
The evolution of the population is performed using three operators \cite{mitchell1998introduction}: %
$i)$ reproduction;
$ii)$ crossover;
$iii)$ mutation.
\emph{Reproduction} is the selection process of some candidates from the current population. The selection methods are many, \text{e.g. }, \emph{fitness proportionate} defines the probability of selecting a candidate to be proportional to its fitness~\cite{selectionGA}. %
\emph{Crossover} is a stochastic method to generate new population members from an existing one. \emph{Single-point crossover} is a common implementation, where the strings of two candidates are swapped at a specific string location~\cite{crossoverGA}. %
\emph{Mutation} is a process that alters randomly a population member. It enables the algorithms to look for new solutions and to avoid getting stuck into local minima having suboptimal fitness values.
\section{Modeling the Morphing Cover Skeleton} \label{sec:modeling}
\change{This section presents the skeleton of the morphing cover and the associated kinematic modeling.
}
\subsection{Cover Skeleton and Mathematical Preliminaries}
The proposed morphing cover is composed of two main components: a \emph{cover skeleton}, \ie, a rigid mechanism that provides the cover with the ability to move, and a \emph{soft membrane}, \ie, an elastic material that encloses the cover and that passively deforms with its motion.
As mentioned in the introduction, this article focuses on the skeleton design, modeling, and control. In particular, the skeleton is a mechanism composed of a repetition of a rigid element, called \emph{node}. Here, we propose a node of square section that is connected to the adjacent nodes via spherical joints.
For example, Fig.\ref{fig:3by3} shows a morphing cover skeleton composed of $9$ nodes and $12$ joints.
In the reminder, we will often refer to the morphing cover skeleton as \emph{mesh}, or simply as \emph{morphing cover}.
\begin{figure}[t]
\centering
\includegraphics[trim=65 48 55 48, clip, width=0.65\columnwidth]{figures/3by3_matlab.eps}
\caption[]{$3\times3$ morphing cover skeleton. The coordinate frames follow RGB convention. \change{The green-colored node is fixed to the ground.}}
\label{fig:3by3}
\end{figure}
\begin{figure}[t]
\centering
\includegraphics[width=\columnwidth]{figures/sphericalJoint2DCreo.eps}
\caption[]{Connection between node $\nodeij$ and $\nodeijp$.
The point $B$ is the center of the spherical joint. %
}
\label{fig:sphericalJoint2DCreo}
\end{figure}
The following presents mathematical preliminaries, definitions, and assumptions that are used in the rest of this article. %
\begin{assumption}
The morphing cover skeleton is composed of $nm$ nodes, with $n$ and $m$ being two natural numbers.
\end{assumption}
\begin{preliminary}
Each node is uniquely identified with a pair of natural numbers $\nodeij$, with $i \in \brCurly{ 1,2, \cdots, n }$ and $j~\in~\brCurly{ 1,2, \cdots, m }$. The numbers $\nodeij$ are called \emph{row} and \emph{column} indexes, respectively.
\end{preliminary}
\begin{definition}
The node of indexes $\nodeij = \node{1}{1}$ is called \emph{father node}, or \emph{base link}. Being of square section, two orthogonal directions can be associated with the father node, here referred to as \emph{row direction} and \emph{column direction}.
\end{definition}
\noindent For example, the column and row directions may be represented by the red and green arrows in Fig.\ref{fig:sphericalJoint2DCreo}, respectively. Now, we can define how the morphing cover skeleton is built.
\begin{preliminary} \label{preliminary:built-skeleton}
Arrange the nodes so that all their square sections belong to the same plane. Consider the \emph{father node} $\node{1}{1}$ and its row and column directions.
We, then, put the node of indexes $\node{2}{1}$ along the row direction at a distance $2l$ from node $\node{1}{1}$, and we connect the two aforesaid nodes via a spherical joint.
Each joint has three degrees of freedom ($\dof$). We repeat the operations by connecting in series the nodes of indexes $\node{3}{1}$, $\node{4}{1}$, $\cdots$, $\node{n}{1}$ via spherical joints. Then, we go back to the \emph{father node}, and we place the node of indexes $\node{1}{2}$
along the father node column direction. Again, we connect the nodes via a spherical joint. Then, using spherical joints, we connect in series the nodes $\node{2}{2}$, $\node{3}{2}$, $\cdots$, $\node{n}{2}$ along the row direction. This time, however, each node is also connected by columns, \text{e.g. }, the nodes $\node{2}{2}$ and $\node{2}{1}$ are also connected via spherical joints. We repeat the overall procedure by incrementing the row and column indexes accordingly. We stop when all $nm$ nodes are displaced in a \emph{matrix-like} mesh.
\end{preliminary}
At the end of this procedure, we obtain a cover skeleton composed of $nm$ nodes displaced in a matrix-like mesh: all the nodes are connected by spherical joints -- see, \text{e.g. }, Fig.\ref{fig:3by3}. Observe that the total number $\numberSphericalJoints$ of spherical joints in the cover is given by $\numberSphericalJoints = 2nm-n-m$. Finally, we place reference frames in each node composing the morphing cover.
\begin{preliminary}
Each node is associated with a coordinate frame placed at the center of the square section. More precisely, a node of indexes $\nodeij$ is associated with the pair $\brRound{ \posW{\nodeij},\rotmW{\nodeij} }$ \change{$\in \SE{3}$} consisting in: the vector $\posW{\nodeij} \in \R{3}$ representing the origin of the node frame expressed w.r.t. the inertial frame and the node orientation matrix $\rotmW{\nodeij} \in \SO{3}$ composed of unit column vectors expressed w.r.t. the inertial frame. All the node frames have the same orientation when the mesh is \emph{stretched} (namely, when all the square sections belong to the same plane) -- see, \text{e.g. }, Fig.\ref{fig:3by3}.
\end{preliminary}
\subsection{System State}
The morphing cover skeleton obtained by applying the procedure described in Preliminary \ref{preliminary:built-skeleton} is, at all effects and purposes, a mechanical system. Hence, we have to define the \emph{system state}: namely,
a set of relationships from which the position and velocity of each point of the cover can be uniquely determined in the inertial frame.
Classically, this problem is solved by choosing a set of minimum variables representing the system configuration and by computing their time derivative to represent the system velocity. The variables $\statePosRotm, \stateVelRotm \in \R{k}$, for instance, are often used to represent the joint angles and velocities associated with fixed-base manipulators with $k$ rotational/prismatic joints \cite{roboticsHandbook}.
Being a \emph{highly} parallel mechanism, the process of finding a set of minimum variables that uniquely characterize the cover configuration may not be a straightforward task. For this reason, the route we follow to characterize the system state is to consider a \emph{complete} variable representation complemented by a set of constraints. More precisely, the system state is represented by the pair $(\statePosRotm,\nodesAbsVel)$, with:
\begin{IEEEeqnarray}{RCL}
\IEEEyesnumber \phantomsection \label{systemConfiguration}
\statePosRotm &=& \brRound{ \posW{\node{1}{1}},\rotmW{\node{1}{1}} \cdots \posW{\nodeij},\rotmW{\nodeij} \cdots \posW{\node{n}{m}},\rotmW{\node{n}{m}} } \IEEEeqnarraynumspace \IEEEyessubnumber \ \\
\nodesAbsVel &=& \brRound{ \linVelW{\node{1}{1}}, \angVelW{\node{1}{1}} \cdots \linVelW{\nodeij}, \angVelW{\nodeij} \cdots
\linVelW{\node{n}{m}}, \angVelW{\node{n}{m}} } \IEEEeqnarraynumspace \IEEEyessubnumber
\end{IEEEeqnarray}
complemented by the equations that constrain the nodes to move according to the spherical joints that connect them, \ie
\begin{IEEEeqnarray}{RCL}
\IEEEyesnumber
g \brRound{\statePosRotm} &=& \zero{} \IEEEyessubnumber \\
\Jc \brRound{\statePosRotm} \nodesAbsVel &=& \zero{}. \IEEEyessubnumber
\end{IEEEeqnarray}
In other words, the \emph{system state} belongs to the following set:
\begin{equation*}
\resizebox{.98 \columnwidth}{!}{$
\Theta \coloneqq \brCurly{ \brRound{ \statePosRotm,\nodesAbsVel } \in \SE{3}^{nm} \times \R{6nm}
:
g \brRound{\statePosRotm} = \zero{},
\Jc \brRound{\statePosRotm} \nodesAbsVel = \zero{} }
$}
\end{equation*}
\change{where $\SE{3}^{nm}$ is the $nm$-ary Cartesian power of the set $\SE{3}$.}
What follows defines the holonomic and differential constraints $g \brRound{\statePosRotm} = \zero{}$ and $\Jc \brRound{\statePosRotm} \nodesAbsVel = \zero{}$, respectively. The linear map $\Jc \brRound{\statePosRotm}$ is here referred to as the \emph{constraint jacobian}.
\subsection{Holonomic and Differential Constraints}
To define the holonomic constraints $g \brRound{\statePosRotm} {=} \zero{}$, we need to find out the geometric relationships that spherical joints impose on the motion between two nodes.
Now, considering Fig.~\ref{fig:sphericalJoint2DCreo}, observe that the midpoint $B$ in the spherical joint must satisfy the following constraint:
\begin{equation*}
\posW{\nodeij} + \rotmW{\nodeij} \pos{\nodeij}{\nodeij}{B} = \posW{\nodeijp} + \rotmW{\nodeijp} \pos{\nodeijp}{\nodeijp}{B} \: .
\end{equation*}
Note also that $\pos{\nodeij}{\nodeij}{B}$ and $\pos{\nodeijp}{\nodeijp}{B}$ are constant. The former is equal to $\distJointI = \ev{1} l$, while the latter to $-\distJointI$. Therefore, one has
\begin{equation} \label{eq:Spherical Joint Position}
\posW{\nodeij} + \rotmW{\nodeij} \distJointI = \posW{\nodeijp} - \rotmW{\nodeijp} \distJointI \: .
\end{equation}
By repeating the above procedure for all spherical joints, and by moving the terms on the right-hand side of \eqref{eq:Spherical Joint Position} to its left-hand side, we obtain the holonomic constraints $g \brRound{\statePosRotm} {=} \zero{}$.
Now, to obtain the differential constraints $\Jc \brRound{\statePosRotm} \nodesAbsVel = \zero{}$, differentiate
\eqref{eq:Spherical Joint Position} \wrt to time, which leads to
\begin{equation} \label{eq:Shperical joint velocity}
\resizebox{.89 \columnwidth}{!}{$
\linVelW{\nodeij} + \skw{\angVelW{\nodeij}} \rotmW{\nodeij} \distJointI = \linVelW{\nodeijp} - \skw{\angVelW{\nodeijp}} \rotmW{\nodeijp} \distJointI
$} .
\end{equation}
Rearranging the terms of \eqref{eq:Shperical joint velocity} in a matrix form leads to
\begin{equation} \label{eq:Shperical joint velocity Matrix form}
\resizebox{.89 \columnwidth}{!}{$
\bm{ \eye{3} & - \skw{ \rotmW{\nodeij} \distJointI } }
\bm{ \linVelW{\nodeij} \\ \angVelW{\nodeij} } =
\bm{ \eye{3} & \skw{ \rotmW{\nodeijp} \distJointI } }
\bm{ \linVelW{\nodeijp} \\ \angVelW{\nodeijp} }
$} .
\end{equation}
Using two selector matrices $\selm{\nodesAbsVel[\nodeij]}$ and $\selm{\nodesAbsVel[\nodeijp]}$, we can express the above constraint w.r.t the velocity $\nodesAbsVel$, namely
\begin{equation} \label{eq:Spherical joint nodesAbsVel}
\resizebox{.89 \columnwidth}{!}{$
\bm{ \eye{3} & - \skw{ \rotmW{\nodeij} \distJointI } }
\selm{\nodesAbsVel[\nodeij]} \nodesAbsVel =
\bm{ \eye{3} & \skw{ \rotmW{\nodeijp} \distJointI } }
\selm{\nodesAbsVel[\nodeijp]} \nodesAbsVel.
$}
\end{equation}
An analogous constraint can be found for the spherical joint that connects node $\nodeij$ to $\nodeipj$.
Then, by stacking all constraints in a matrix leads to the differential constraints:
\begin{equation} \label{eq:jacobianRelathionshipFloatingBase}
\Jc \nodesAbsVel = \zero{}, \ \Jc\in \R{ 3 \numberSphericalJoints \times 6nm }.
\end{equation}
\subsubsection{Fixed Father Node Constraints}
Besides the holonomic and differential constraints due to the cover spherical joints, we add another constraint that simplifies -- without loss of generality -- the overall modeling task: we assume that the father node does not move in the inertial frame. This translates in additional holonomic constraints, \ie, the father node position $\posW{\node{1}{1}}$ and orientation $\rotmW{\node{1}{1}}$ are constant. Thus
\begin{equation} \label{eq:baseFixed}
\nodesAbsVel[\node{1}{1}] \coloneqq \bm{\linVelW{\node{1}{1}} \\ \angVelW{\node{1}{1}}} \coloneqq \vb = \selm{\nodesAbsVel[\node{1}{1}]} \nodesAbsVel = 0
\end{equation}
where the selector matrix $\selm{\nodesAbsVel[\node{1}{1}]}$ is used to select only the term $\nodesAbsVel[\node{1}{1}]$ from the vector $\nodesAbsVel$. In the language of the floating base system, \eqref{eq:baseFixed} is the so called \emph{fixed-base} assumption and complements the constraints \eqref{eq:jacobianRelathionshipFloatingBase} leading to
\begin{equation} \label{eq:jacobianRelathionship}
\Jc \nodesAbsVel = \zero{}, \ \Jc\in \R{ 3 \numberSphericalJoints +6 \times 6nm }.
\end{equation}
\subsubsection{Constraint Jacobian Properties} \label{subse:Jacobian of constraints}
The rows of the constraint jacobian $\Jc$ are the system's differential constraints. Some of these constraints, however, might be redundant, \ie, the jacobian $\Jc$ may be rank deficient. The jacobian rank indicates the number of active constraints at a given cover configuration $\statePosRotm$. Once the number of active constraints is identified, we can evaluate the \emph{instantaneous} degrees of freedom ($\dof$) of the morphing cover at a given configuration $\statePosRotm$ as follows:
\begin{equation} \label{eq:DoF computation}
\dof = \dimV{\nodesAbsVel} - \rank{\Jc}.
\end{equation}
The rank computation of the constraint jacobian $\Jc$ is performed numerically, and its value may change along with the mesh configuration $\statePosRotm$. The constraint jacobian $\Jc$, however, will provide us with important information. For instance, its null space, the so-called $\nullSpaceMatrix[\nodesAbsVel]$%
, represents the vector space of all feasible cover movements in a given configuration.
\subsection{System Modeling in Relative Coordinates}
Constraints \eqref{eq:baseFixed} and \eqref{eq:jacobianRelathionship} are derived with the state vector $\nodesAbsVel$, which represents the node velocities expressed in the \emph{inertial frame}. Remind that nodes are connected via spherical joints. Since our objective is to actuate the spherical joints, then the relative angular velocities between two nodes will be affected by the joint actuation. Therefore, it is important to have a system state representation in terms of \emph{relative node velocities}.
\begin{definition}
$\nodesRelOmega \in \R{3\numberSphericalJoints}$ is the vector containing all the relative angular velocities between consecutive links, \ie:
\begin{equation}
\resizebox{.87 \columnwidth}{!}{$
\nodesRelOmega = \brRound{
\angVel{\node{1}{1}}{\node{1}{1}}{\node{1}{2}}
\, \cdots \,
\, \angVel{\nodeij}{\nodeij}{\nodeijp} \, ,
\, \angVel{\nodeij}{\nodeij}{\nodeipj}
\, \cdots \, }
$} .
\end{equation}
\end{definition}
\begin{definition}
$\VbAndNodesRelOmega \in \R{6+3\numberSphericalJoints}$ is the vector
of base velocity $\vb$ and relative velocities $\nodesRelOmega$, \ie,:
\begin{equation}
\VbAndNodesRelOmega = \brSquare{\vb \; \text{;} \; \nodesRelOmega} \: .
\end{equation}
\end{definition}
Given the system velocities $\nodesAbsVel$ in the inertial frame, it is straightforward to define a linear transformation $\convm{\VbAndNodesRelOmega}{\nodesAbsVel}$ such that $\VbAndNodesRelOmega = \convm{\VbAndNodesRelOmega}{\nodesAbsVel}\nodesAbsVel$.
The first term $\vb$ is contained in both terms $\nodesAbsVel$ and $\VbAndNodesRelOmega$. All the other terms of $\VbAndNodesRelOmega$ can be computed as
\begin{IEEEeqnarray}{RCL}
\IEEEyesnumber \phantomsection \label{eq:w=Rw}
\angVel{\nodeij}{\nodeij}{\nodeijp} &=& \rotm{\nodeij}{\frameW} \angVel{\frameW}{\nodeij}{\nodeijp} \IEEEeqnarraynumspace \IEEEyessubnumber \label{eq:w=Rw A} \\
\angVel{\frameW}{\nodeij}{\nodeijp} &=& \angVelW{\nodeijp} - \angVelW{\nodeij}. \IEEEeqnarraynumspace \IEEEyessubnumber \label{eq:w=Rw B}
\end{IEEEeqnarray}
Using the selector matrices $\selm{\angVelW{\nodeij}}$ and $\selm{\angVelW{\nodeijp}}$, one has:
\begin{equation} \label{eq:Rw}
\angVel{\frameW}{\nodeij}{\nodeijp} = \selm{\angVelW{\nodeijp}} \nodesAbsVel - \selm{\angVelW{\nodeij}} \nodesAbsVel,
\end{equation}
and substituting \eqref{eq:Rw} into \eqref{eq:w=Rw A} gives:
\begin{equation}
\angVel{\nodeij}{\nodeij}{\nodeijp} = \rotm{\nodeij}{\frameW} \brRound{ \selm{\angVelW{\nodeijp}} - \selm{\angVelW{\nodeij}}} \nodesAbsVel .
\end{equation}
By repeating this procedure for all the spherical joint, we finally get to a linear mapping between $\VbAndNodesRelOmega$ and $\nodesAbsVel$
\begin{equation} \label{eq:convmV2Nu}
\VbAndNodesRelOmega = \convm{\VbAndNodesRelOmega}{\nodesAbsVel} \nodesAbsVel .
\end{equation}
We also apply the transformation to the null space projector $\nullSpaceMatrix[\nodesAbsVel]$, so we can pass from the null space projector expressed in the inertial frame to that expressed in relative coordinates:
\begin{equation} \label{eq:convmZv2Znu}
\nullSpaceMatrix[\VbAndNodesRelOmega] = \convm{\VbAndNodesRelOmega}{\nodesAbsVel} \nullSpaceMatrix[\nodesAbsVel].
\end{equation}
\begin{figure}[t]
\centering
\includegraphics[height=99pt]{figures/6by6_real.eps}
\vspace{5.5mm}
\caption[]{$3$-D printed prototype of a $6\times6$ morphing cover skeleton with passive spherical joints designed with the proposed approach.}
\label{fig:6by6_real}
\end{figure}
\section{Actuation Positioning} \label{sec:actuatorChoice}
In the previous section, we designed the skeleton of the morphing cover concept, and we addressed the kinematic model that characterizes its evolution.
To actuate the cover, we assume that all or some of the three degrees of freedom ($\dof$) of each spherical joint are actuated. This section addresses the problem of defining which $\dof$ of the spherical joints shall be actuated.
In general, actuation positioning for parallel structures is not trivial since the number of (actionable) joints is larger than the number of structure $\dof$. Therefore, a possible criterion is to place a number of actuators equal to the number of the cover degrees of freedom, \ie render the mesh \emph{fully actuated}. However, there may exist a large number of actuation patterns that ensure a fully actuated cover, and this number may change depending on the cover motion. What follows proposes solutions to these motor placement problems using genetic algorithms.
Let us make the following assumptions.
\begin{assumption} \label{ass:motorPosition}
Motors actuate the $3\text{-}\dof$ spherical joints. Therefore, a maximum of three motors can be placed in correspondence of one spherical joint.
\end{assumption}
In practice, we make Assumption~\ref{ass:motorPosition} true
by assuming that a spherical joint is composed of three intersecting revolute joints. Therefore, we may have less than three motors in correspondence of a spherical joint, and in this case, the non-actuated revolute joints remain \emph{passive}.
Under Assumption~\ref{ass:motorPosition}, the overall objective of the genetic algorithm presented below
can be stated as follows:
\begin{itemize}
\item The motors shall actuate a set of revolute joints that ensure \emph{full actuation} %
of the cover in a neighborhood of a cover configuration $\Bar{\statePosRotm}$.
\end{itemize}
An example of the several mechanisms that can actuate the revolute joints is the \emph{Faulhaber} brushless motor 0308H003B ($3$[mm] diameter, $8.4$[mm] length, $0.026$[mNm] holding torque) with a planetary gearheads \emph{Faulhaber} 03A 125:1. We are currently investigating its use and integration in one of the prototypes that we are currently producing, \change{-- see Fig.}~\ref{fig:6by6_real}.
Since the motors actuate all or some of the three joints composing the spherical joint connecting two nodes, we make the following actuation assumption.
\begin{assumption}
\label{ass:motorAngularDefinition}
Consider the spherical joint connecting the nodes ${\nodeij}$ and ${\nodeijp}$. Then, a motor placed at this spherical joint imposes one and only one component of the associated relative angular velocity $\angVel{\nodeij}{\nodeij}{\nodeijp}$.
\end{assumption}
In light of Assumption \ref{ass:motorAngularDefinition}, the problem of positioning the cover motors corresponds to the problem of choosing a set of relative angular velocities that ensures full actuation.
To address the problem, we make use of the following property of the null space projector $\nullSpaceMatrix[\VbAndNodesRelOmega]$.
\begin{corollary} \label{cor:nullspace}
The problem of motor positioning
is equivalent to the problem of finding
the indexes of the linear independent rows of the matrix $\nullSpaceMatrix[\VbAndNodesRelOmega]$ .
\end{corollary}
\noindent
The proof is given in the \hyperlink{labelAppendix}{Appendix}. We now have to find the indexes of the linear independent rows of the matrix~$\nullSpaceMatrix[\VbAndNodesRelOmega]$.
Theoretically, we may address this problem with a \emph{brute force approach}. The number of all possible sets to check is given by the binomial coefficient:
\begin{equation}
\label{number-og-possibility-actuation}
\binom{3 \numberSphericalJoints}{\dof} = \binom{3 \times \text{Number spherical joints}}{\text{Number of motors}}.
\end{equation}
Therefore, the objective is to choose one actuation pattern -- among the numerous possibilities~\eqref{number-og-possibility-actuation} -- that renders the cover fully actuated in a neighborhood of the configuration~$\Bar{\statePosRotm}$.
To give the reader an insight on
the size of the brute force approach, consider a $4 \times 4$ mesh and assuming that we want to place $10$ motors -- \ie a configuration with $10 \dof$. In this case, there are about $10^{11}$ possible actuation patterns to check, among which one has to be chosen. Hence, the brute force approach becomes quickly unusable for large covers, especially when additional logic should be considered when choosing a pattern, \text{e.g. }, to minimize the number of motors at a spherical joint.
To address this problem, we implement a simple genetic algorithm (GA) based on single-point crossover and with a fitness function $f_{GA}$ to be maximized:
\begin{equation} \label{eq:fitnessGA}
f_{GA} \brRound{h} = \bigg| \det{\Big(\nullSpaceMatrix[\VbAndNodesRelOmega]\brRound{h,:}}\Big) \bigg| \, \; f_R \brRound{h} \; f_P \brRound{h},
\end{equation}
where $h$ is a candidate string
that contains the indexes of the selected rows of $\nullSpaceMatrix[\VbAndNodesRelOmega]$.
The term $f_R \brRound{h}$ is a reward added to privilege solutions that place the lower number of motors in correspondence of a single spherical joint.
The term $f_P \brRound{h}$ is a dynamic penalty cost added to maintain population diversity and create a new generation without duplicate strings.
The output of the GA is a population $\mathcal{P}$ composed by strings $h$. Each string contains the indexes of linearly independent rows of the matrix $\nullSpaceMatrix[\VbAndNodesRelOmega]$, and -- thanks to~\cref{cor:nullspace}~-- it corresponds to the sets of optimal motor placement. However, the optimality of the solution is only guaranteed at the specific mesh configuration $\Bar{\statePosRotm}$ considered by the GA.
In order to robustify the cover full actuation in a neighborhood of $\Bar{\statePosRotm}$ \change{and mitigate the dependence on the cover geometry}, we perform a sensitivity analysis to check the variation of the determinant \wrt small changes in the mesh configuration. Define $g_{SA}$
\begin{equation} \label{eq:sensitivity analysis}
g_{SA} \brRound{h} = \sum_ {i \in h} \left( \frac{\partial }{\partial \theta_i} \det{\Big(\nullSpaceMatrix[\VbAndNodesRelOmega]\brRound{h,:}}\Big) \right)^ 2 ,
\end{equation}
where $\theta_i$ is a small angular variation produced by the $i$-th actuator. We compute $g_{SA}$ for all the strings that belong to the population $\mathcal{P}$. The candidate with lower $g_{SA}$ is the solution whose determinant is less affected by changes in the neighbourhood configuration.
In the ideal case of $g_{SA} = 0$, the determinant remains constant in the neighborhood of the configuration, and the motors remain linear independent.
The above genetic algorithm will be applied to locate the motors of several cover examples in section~\ref{sec:simulations}. More precisely, the outputs of the algorithm that will be used in the sections next are defined by the following statements.
\begin{definition} \label{def:nodesRelOmegaAct}
The vector $\nodesRelOmegaAct \in \R{\dof}$ represents the relative angular velocities selected using the GA, and therefore, it represents the vector of motor velocities.%
\end{definition}
\begin{definition}
The submatrix $\nullSpaceMatrix[\text{act}] \in \R{\dof \times \dof}$ is obtained by selecting the linear independent rows of the matrix $\nullSpaceMatrix[\VbAndNodesRelOmega]$.
\end{definition}
In light of the definitions above, we can state the following lemma that is useful to relate the relative angular velocities $\nodesRelOmegaAct$ (motor actions) to the cover velocities $\nu$ and all nodes velocities $ \nodesAbsVel$ expressed in the inertial frame.
\begin{lemma} \label{lem:fromInputTo}
Given $\nodesRelOmegaAct$, the absolute and relative cover velocities $\nodesAbsVel$ and $\VbAndNodesRelOmega$ are evaluated as:
\begin{IEEEeqnarray}{RCL}
\IEEEyesnumber
\VbAndNodesRelOmega &=& \nullSpaceMatrix[\VbAndNodesRelOmega] \nullSpaceMatrix[\text{act}]^{-1} \nodesRelOmegaAct , \IEEEeqnarraynumspace \IEEEyessubnumber \label{eq:fromInputToRelC} \\
\nodesAbsVel &=& \nullSpaceMatrix[\nodesAbsVel] \nullSpaceMatrix[\text{act}]^{-1} \nodesRelOmegaAct . \IEEEeqnarraynumspace \IEEEyessubnumber \label{eq:fromInputToAbsC}
\end{IEEEeqnarray}
\end{lemma}
The GA has been developed using the node angular velocities expressed in relative coordinates because of assumption \ref{ass:motorPosition}. It scales, however, to the case where the cover were given with an actuation mechanism that acts directly the nodes state in the inertial frame. This additional feature, however, is not exploited in this article.
\section{Control Design} \label{sec:control}
In the previous section, we considered a specific cover configuration $\Bar{\statePosRotm}$, and we placed a number of motors equal to the number of the cover degrees of freedom at that configuration. The motor pattern ensures a minimum sensitivity of the cover degrees of freedom, which are, thus, expected not to vary in a (relatively \emph{large}) neighborhood of the cover configuration $\Bar{\statePosRotm}$.
This section presents the control design for the cover motors.
The overall control objective is to allow the cover to morph (or converge) into a desired shape via the application of proper motor velocities, namely, via the relative angular velocities $\angVel{\nodeij}{\nodeij}{\nodeijp}$ -- see Assumption~\ref{ass:motorAngularDefinition}.
More precisely, the desired cover shape is given by the mapping $z = f \brRound{x,y,t}$, which induces the normal
$ \versorW{n}{} \brRound{t} ~{=}~\Big. \nabla f \brRound{x,y,t}$. Concerning the cover desired shape,
we also make the following assumption.
\begin{assumption}
The desired shape $z = f \brRound{x,y,t}$ passes through the constant origin of the father node $(1,1)$. Namely
\begin{equation*}
z_{\node{1}{1}} = f \brRound{ x_{\node{1}{1}}, y_{\node{1}{1}},t } \quad \forall t.
\end{equation*}
\end{assumption}
Now, consider the node $\nodeij$. The control objective for the node $\nodeij$ is here defined as the alignment of its normal $\versorW{z}{\nodeij}~=~\rotmW{\nodeij} \ev{3}$ with the desired shape normal evaluated as:
\begin{equation*}
\versorW{n}{\nodeij} \brRound{t} = \Big. \nabla f \brRound{x,y,t} \Big|_{x_{\nodeij},y_{\nodeij}}
\end{equation*}
where $x_{\nodeij}$ and $y_{\nodeij}$ are the instantaneous position coordinates of the
node $\nodeij$ \wrt the world frame. Note that as soon as the cover moves, the desired normal associated with the node $\nodeij$ varies even if the desired shape does not change versus time.
Concerning the control law to generate an angular velocity $\angVelW{\nodeij}$ that makes $\versorW{z}{\nodeij} = \rotmW{\nodeij} \ev{3}$ converges toward $\versorW{n}{\nodeij} \brRound{t}$, we make use of the following result.
\begin{proposition}[\cite{PUCCI201572} p.75]
\label{proposition-convergence-normal}
Assume that $\angVelW{\nodeij} = \angVelW{\nodeij}^\star$ with:
\begin{equation*}
\resizebox{.95 \columnwidth}{!}{$
\angVelW{\nodeij}^\star = \angVelW{n\nodeij} + \brRound{k_{\nodeij}\brRound{t} + \frac{\dot{\sigma}\brRound{t}}{\sigma\brRound{t}}} \skw{\versorW{z}{\nodeij}} \versorW{n}{\nodeij} + \lambda_{\nodeij} \brRound{t} \versorW{z}{\nodeij}
$},
\end{equation*}
and $\angVelW{n\nodeij} = \skw{ \versorW{n}{\nodeij} } \dversorW{n}{\nodeij}$ the instantaneous angular velocity of $\versorW{n}{\nodeij}$, $\lambda_{\nodeij} \brRound{\cdot}$ any real valued continuous function, $\sigma\brRound{\cdot}$ any smooth positive real-valued function such that $\inf_t \sigma \brRound{t} > 0$, and $k_{\nodeij}\brRound{\cdot}$ any continuous positive real-valued function such that $\inf_t k_{\nodeij}\brRound{t} > 0$, ensures exponential stability of the equilibrium $\versorW{z}{\nodeij} = \versorW{n}{\nodeij}$ with domain of attraction $\brCurly{ \versorW{z}{\nodeij} : \versorW{z}{\nodeij} {}^{\tr} \versorW{n}{\nodeij} \neq -1 }$ at $t=0$.
\end{proposition}
The tracking of the fictitious angular velocity $\angVelW{\nodeij}^\star$ for all nodes is attempted using an instantaneous optimization problem composed by a quadratic cost function and a set of linear constraints where the motors angular velocity $\nodesRelOmegaAct$ are the optimization variable. The problem writes:
\begin{IEEEeqnarray}{LLL}
\IEEEyesnumber \phantomsection \label{eq:QP}
\text{min}_{\nodesRelOmegaAct} \;
& \frac{1}{2} \sum_{i=1}^{n} \sum_{j=1}^{m} \Lambda_{\nodeij} \| \angVelW{\nodeij} - \angVelW{\nodeij}^\star \|_2^2 & \IEEEyessubnumber \label{eq:QPcostFunction} \\
\text{s.t.}:
& \angVelW{\nodeij} = \selm{\angVelW{\nodeij}} \nullSpaceMatrix[\nodesAbsVel] \nullSpaceMatrix[\text{act}]^{-1} \nodesRelOmegaAct & \forall \, i,j \IEEEyessubnumber \label{eq:QPcontrolVariableRelation} \\
& - \nodesRelOmega[max] \le \nodesRelOmegaAct \le \nodesRelOmega[max] & \IEEEyessubnumber \label{eq:QPlimitMaxVelocity} \\
%
& \cos(\alpha) \le \versorW{x}{\nodeij} {}^\tr \versorW{x}{\nodeijp} \le 1 & \forall \, i,j \IEEEyessubnumber \label{eq:QPRoMlimit1} \\
%
& \cos(\alpha) \le \versorW{y}{\nodeij} {}^{\tr} \versorW{y}{\nodeipj} \le 1 & \forall \, i,j \IEEEyessubnumber \label{eq:QPRoMlimit2}
\end{IEEEeqnarray}
The problem \eqref{eq:QP} translates the task of controlling the cover normals thanks to its cost function: it aims at minimizing the difference between the absolute angular velocity of each node and the reference angular velocity $\angVelW{\nodeij}^\star$, which, in turn, ensures convergence in the ideal case of no inequality constraint -- see Proposition~\ref{proposition-convergence-normal}.
Note that the reference angular velocity $\angVelW{\nodeij}^\star$ depends on the input $\nodesRelOmegaAct$ due to the term $\dversorW{n}{\nodeij}$. This dependence induces an algebraic loop. We solve the algebraic loop by discretizing the term $\dversorW{n}{\nodeij}$ so that it no longer depends on the angular velocities, but only on the cover configuration. Although there exist other ways for evaluating the desired shape normals that do not induce algebraic loops, the choice above proves to achieve satisfactory overall tracking performances of a desired shape -- see section~\ref{sec:simulations}.
To \change{regularize} and avoid sharp, possibly discontinuous, variations of the control inputs,
two extra terms may be added to the cost function and minimized: \change{the norm of $\nodesRelOmegaAct$and} the difference between $\nodesRelOmegaAct$ and its value computed at the previous iteration.
\change{The hard constraint} \eqref{eq:QPcontrolVariableRelation} \change{links the control variable and the absolute angular velocity of each node. While the matrix $\selm{\angVelW{\nodeij}}$ extracts $\angVelW{\nodeij}$ from $\nodesAbsVel$.
The matrix inverse of $\nullSpaceMatrix[\text{act}]$ can be computed using a damping factor to mitigate instabilities caused by singularities.}
The inequalities \eqref{eq:QPlimitMaxVelocity}, \eqref{eq:QPRoMlimit1}, and \eqref{eq:QPRoMlimit2} limit the control input according to hardware limitations, such as the maximum motor speed and the range of motion of the spherical joints.
More precisely, the mechanical collision between the stud and the socket of a spherical joint reduces its range of motion. The movements of the stud, in fact, must belong to a cone with semi-aperture equal to $\alpha$.
Since the axis of the stud is always parallel to one of the unit vectors of the frame axis, limiting the relative movement of that versor is equivalent to limit the movements of the stud.
In case of a spherical joint placed in between links $\nodeij$ and $\nodeijp$, the scalar product between $\versorW{x}{\nodeij}$ and $\versorW{x}{\nodeijp}$ must be higher than $\cos{\alpha}$, as stated in \eqref{eq:QPRoMlimit1}.
Substituting $\versorW{x}{\nodeij} = \rotmW{\nodeij} \ev{1}$ into \eqref{eq:QPRoMlimit1}, we obtain
\begin{equation}
\cos(\alpha) \le \ev{1} ^\tr \rotm{\nodeij}{\nodeijp} \ev{1} \le 1 \:
\end{equation}
with $\rotm{\nodeij}{\nodeijp}$ estimated using forward Euler integration, \ie,
\begin{equation}
\resizebox{.88 \columnwidth}{!}{$
\rotm{\nodeij}{\nodeijp} %
= \brSquare{\eye{3} + \skw{\angVel{\nodeij}{\nodeij}{\nodeijp}} dt } \rotm{\nodeij}{\nodeijp}\brRound{k}
$}.
\end{equation}
$\rotm{\nodeij}{\nodeijp}\brRound{k}$ is the measured rotation matrix at iteration $k$, and $dt$ is the time increment.
The same analysis for the spherical joint between the joints $\nodeij$ and $\nodeipj$ leads to~\eqref{eq:QPRoMlimit2}.
\change{The control laws that are obtained as a solution to} \eqref{eq:QP} \change{ensure (quasi) \emph{global} stability as long as $\angVelW{\nodeij} - \angVelW{\nodeij}^\star = \zero{}, \ \forall (i,j)$.
Under this condition, the nodes normals converge toward those of the desired shape \emph{whatever} (but one, \ie, $\versorW{z}{\nodeij} {}^{\tr} \versorW{n}{\nodeij} = -1$) initial condition we set for the morphing cover -- see the stability properties of} \cref{proposition-convergence-normal}\change{. %
The possibility for the control laws to ensure $\angVelW{\nodeij} - \angVelW{\nodeij}^\star = \zero{}, \ \forall (i,j)$ largely depends on the cover mechanical limits and on the actuation abilities to make the skeleton move, either locally or globally.
If we choose the actuators using the algorithm presented in} \cref{sec:actuatorChoice}\change{, then the morphing cover is \emph{locally fully actuated}.
For this reason, the control laws obtained as the solution to} \eqref{eq:QP} \change{ensures local stability under a large variety of conditions and basically independently from the desired (feasible) shape.
Since the actuation positioning ensures the cover to be locally fully actuated, critical conditions for the control laws occur when the morphing cover is initialized \emph{far} from the desired shape. %
In these cases, when converging toward the desired shape, the cover may lose \emph{full actuation} leading to ill-posed, singular control laws.
To mitigate these singularity issues and obtain control laws that are globally defined,
regularization terms can be added in cost functions} \eqref{eq:QPcostFunction}, \change{which can be implemented also by damping the inverse} $\nullSpaceMatrix[\text{act}]$ in \eqref{eq:QPcontrolVariableRelation}.
\change{Although these regularization terms alter the stability properties of the controller, they lead to globally defined laws at the cost of higher tracking errors.}
\change{Another strategy that may be attempted when the cover is initialized \emph{far} from the desired shape $\mathcal{A}$ is that of generating a time-varying desired shape $\Bar{\mathcal{A}}(t)$ that starts close to $\statePosRotm_0$ and converges toward $\mathcal{A}$. The desired time-varying trajectory $\Bar{\mathcal{A}}(t)$ shall ensure that the cover degrees of freedom do not change along itself. This process of generating well-posed trajectories may be addressed by an additional control layer, namely a \emph{trajectory planning} layer, that feeds the control laws presented above. The trajectory planning problem, however, is beyond the scope of this article all the more so because it calls for the development of \emph{ad hoc} numerical techniques that can be seldom used on-line}~\cite{dafarra2020}.
\section{Simulation Results} \label{sec:simulations}
In this section, we first briefly discuss the implementation of the simulation environment and the results obtained using the motor positioning algorithm presented in \cref{sec:actuatorChoice}. Then, we show simulation results of \change{four} different meshes controlled with the control framework presented in \cref{sec:control}, \change{and finally, we discuss the obtained results}.
The investigated meshes are of dimensions $3 \times 3$, \change{$4 \times 8$}, $8 \times 8$, and $20 \times 20$.
\change{The mesh $4 \times 8$ reproduces the \emph{iRonCub} thigh cover integrating the morphing capability.}
\change{The video of the simulations described in this section are shown in the accompanying movie \url{https://youtu.be/kMfXb2xqGn4?t=350}.}
The code to reproduce the results is available at \urlPaper{}.
\subsection{Simulation Environment}
The approach is tested using a custom-made MATLAB environment that integrates the cover kinematics and its constraints \eqref{eq:jacobianRelathionship}. The environment makes use of a vector representation of the system configuration space \eqref{systemConfiguration}. More precisely, we define the following.
\begin{definition}
The state space $\statePosQuat$ and its time derivative is:
\begin{IEEEeqnarray}{RCL}
\IEEEyesnumber
\statePosQuat &=& \brRound{
\posW{\node{1}{1}} \text{,} \quatW{\node{1}{1}} \cdots
\posW{\nodeij} \text{,} \quatW{\nodeij} \cdots
\posW{\node{n}{m}} \text{,} \quatW{\node{n}{m}}}, \IEEEeqnarraynumspace \IEEEyessubnumber \\
\stateVelQuat &=& \brRound{
\linVelW{\node{1}{1}} \text{,} \dquatW{\node{1}{1}} \cdots
\linVelW{\nodeij} \text{,} \dquatW{\nodeij} \cdots
\linVelW{\node{n}{m}} \text{,} \dquatW{\node{n}{m}}}. \IEEEeqnarraynumspace \IEEEyessubnumber
\end{IEEEeqnarray}
\end{definition}
The orientation of the nodes is parameterized using quaternions to avoid singularities generated employing Euler angles.
The system evolution is obtained integrating $\stateVelQuat$ using MATLAB variable step numerical integrator \emph{ode45}.
The optimization problem \eqref{eq:QP} is solved every $0.01$[s] using OSQP~\cite{osqp} via CasADi~\cite{casadi}. Once motors velocity $\nodesRelOmegaAct$ are known, $\stateVelQuat$ is computed using \eqref{eq:fromInputToAbsC} and the quaternion derivative definition, plus an additional term to compensate numerical integration errors and ensure $\| \quat{}{} \|_2 = 1$ (see \cite{Baumgarte} for details).
The code to model and simulate the system evolution of a multibody system with rigid links relying on a maximal coordinate approach is available at \urlMystica{}.
The mesh geometries and characteristics are listed in \cref{tab:Mesh Characteristics}.
\begin{table}[b]
\caption{Mesh dimensions and hardware limits
}
\centering
\begin{tabular}{l c|c}
\toprule
\multicolumn{2}{c}{Characteristics} & Value \\
\midrule
\rowcolor{gray!15}
Node: square length & $L$ & $25$[mm] \\
Node: distance from square center to $B$ & $l$ & $25$[mm] \\
\rowcolor{gray!15}
Motor: Limit angular Velocity & $\nodesRelOmega[max]$ & $5$ $\brSquare{\sfrac{\text{deg}}{\text{s}}}$ \\
Joints: Limit range of motion & $\alpha$ & $50$[deg] \\
\bottomrule
\end{tabular}
\label{tab:Mesh Characteristics}
\end{table}
\subsection{Actuation Positioning}
The algorithm presented in \cref{sec:actuatorChoice} optimizes the motor placement at a given cover configuration $\Bar{\statePosRotm}$. We ran the algorithm using the cover initial configuration. \change{The cover initial configuration is obtained sampling a \emph{paraboloid} curve for the $3 \times 3$, $8 \times 8$, and $20 \times 20$ meshes, and a \emph{cylinder} for the $4 \times 8$ mesh -- see }\cref{fig:iRonCub-rest}.
Once the configuration $\Bar{\statePosRotm}$ is known, thanks to \eqref{eq:DoF computation}, it is possible to compute the number of $\dof$s and, consequently, the number of motors. At the chosen initial configuration, the meshes $3 \times 3$, \change{$4 \times 8$}, $8 \times 8$, and $20 \times 20$ have $12$, \change{$21$}, $42$, and $114$ $\dof$s respectively.
To initialize the genetic algorithm, we created a random population of $100$ candidate strings, while the crossover and mutation probability are set equal to $0.6$ and $0.01$ after a tuning process started from the values adopted in literature \cite{choosingParametersGA}.
\change{The evolutionary algorithm stops once the population is not evolving over the last $10^3$ generations and the fitness function is higher than a desired threshold.}
\change{The algorithm converged in $10^4$ generations for the meshes $3 \times 3$, $4 \times 8$, and $8 \times 8$ and $10^6$ generations for the mesh $20 \times 20$.}
To compute \eqref{eq:sensitivity analysis}, we considered all the configurations generated applying a motor variation of $\pm 5$[deg] from the initial state. In this way, the cover configuration stays in a neighborhood of the initial configurations.
Fig. \ref{fig:GA} shows the optimal motor pattern after the sensitivity minimization for $3 \times 3$ and $8 \times 8$. %
Notice the effectiveness of the term $f_R \brRound{h}$ in \eqref{eq:fitnessGA}: the proposed solutions actuate at most one axis of rotation per spherical joint.
\begin{figure}
\begin{subfigure}[b]{0.49\columnwidth}
\centering
\includegraphics[width=\textwidth]{figures/sim1_GA.eps}
\caption[]{$3 \times 3$ mesh}
\label{fig:sim1_GA}
\end{subfigure}
\hfill
\begin{subfigure}[b]{0.49\columnwidth}
\centering
\includegraphics[width=\textwidth]{figures/sim2_GA.eps}
\caption[]{$8 \times 8$ mesh}
\label{fig:sim2_GA}
\end{subfigure}
\caption[]{Output of the genetic algorithm described in \cref{sec:actuatorChoice}. The sphere color identifies the presence of a motor. When the color is \emph{sky blue}, the spherical joint is passive.
If the color is either \emph{red}, \emph{green}, or \emph{blue}, the corresponding axis of rotation is actuated following the RGB convention, while the others axes remain passive.}
\label{fig:GA}
\end{figure}
\subsection{Control}
Simulations with \change{four} meshes of different sizes are performed to test the controller and validate the ability of the considered meshes to morph into the desired shapes. To test the robustness of the proposed control approach, we also present simulations with noise in the system state used by the control action.
To measure the control performances, instead, we defined two metrics.
The first is the angular error in the alignment between the node normal $\versorW{z}{\nodeij}$ and the desired normal $\versorW{n}{\nodeij}$.
For the node $\nodeij$, the error is defined as:
\begin{equation*}
\normalAlignmentError{\nodeij} = \left| \arccos{\brRound{ \versorW{z}{\nodeij} {}^{\tr} \versorW{n}{\nodeij} }} \right|.
\end{equation*}
The minimization of $\normalAlignmentError{\nodeij}$ is obtained thanks to the task implemented in the cost function \eqref{eq:QPcostFunction}.
The second metric is the node position error, which corresponds to the $z$-distance between the nodes and the curve, \ie,
\begin{equation*}
\nodePositionError{\nodeij} = \left| \ev{3}^{\tr} \posW{\nodeij} - f \brRound{x_{\nodeij},y_{\nodeij}} \right|.
\end{equation*}
Although the position error is not minimized by the optimization problem \eqref{eq:QP}, it is an indicator to understand how far the cover is from the desired shape.
In the next subsections, we present some data and plots analyzing the two metrics, while meshes simulations are shown in the accompanying video.
\change{The matrix inverse of the constraint} \eqref{eq:QPcontrolVariableRelation} \change{is approximated with a damped pseudoinverse to mitigate possible effects due to singularities. In detail, $\nullSpaceMatrix[\text{act}]^{-1} \simeq \brRound{\nullSpaceMatrix[\text{act}]^{\tr} \nullSpaceMatrix[\text{act}] + 10^{-6} \eye{}}^{-1} \nullSpaceMatrix[\text{act}]^{\tr}$.}
\subsubsection{\textbf{Mesh 3x3}} \label{subsec:3x3}
The desired shape that the cover has to track is a function properly scaled and shifted of the form:
\begin{equation*}
f \brRound{x,y} = x y \cos{y}.
\end{equation*}
In \cref{fig:sim1}, we compare two cases: the first, called \emph{ideal}, where the actuation is considered perfect; the second, called \emph{noise}, where we intentionally added Gaussian noise to \textbf{motor velocity}. The noise is generated such that it can only decrease motor speed to emulate friction \change{or the disturbances generated by the elastic soft membrane}. Its amplitude is proportional to motor speed and it can reach maximum $20\%$ of motor velocity.
After \change{$8$}[s], both the \emph{ideal} and \emph{noise} cases decrease the average orientation error and average position error to $4$[deg] and \change{$2$[mm]}.
The presence of actuation noise increases the response time without interfering with the task accomplishment. The high-frequency variations in the motor velocity depicted in \cref{fig:sim1_OmegaAct} are due to the Gaussian noise, however, the output of the optimization problem is less oscillating.
\begin{figure*}
\begin{subfigure}[b]{0.32\linewidth}
\centering
\includegraphics[width=\textwidth]{figures/sim1_AOE.eps}
\caption{Error alignment normal vectors $\normalAlignmentError{\nodeij}$}
\label{fig:sim1_AOE}
\end{subfigure}
\hfill
\begin{subfigure}[b]{0.32\linewidth}
\centering
\includegraphics[width=\textwidth]{figures/sim1_APE.eps}
\caption{Node position error $\nodePositionError{\nodeij}$}
\label{fig:sim1_APE}
\end{subfigure}
\hfill
\begin{subfigure}[b]{0.32\linewidth}
\centering
\includegraphics[width=\textwidth]{figures/sim1_OmegaAct.eps}
\caption{Amplitude Motor Speed $|\nodesRelOmegaAct|$}
\label{fig:sim1_OmegaAct}
\end{subfigure}
\caption[]{Performance %
comparison of an ideal simulation and one with artificial noise in the actuation. The test is performed with $3\text{x}3$ mesh.
The solid lines represent the average values, while the transparent regions are the $10\text{-}90$th percentile range. In (c), the dashed line is the maximum motor speed $\nodesRelOmega[max]$.
}
\label{fig:sim1}
\end{figure*}
\subsubsection{\textbf{Mesh 8x8}} \label{subsec:8x8}
It is tested with a time-varying desired shape properly scaled and shifted in the form of
\begin{equation*}
f \brRound{x,y,t} = \cos{\brRound{x + t}} + \cos{\brRound{x + y + t}}.
\end{equation*}
As done for the previous mesh, we compare two simulations: the first one, called \emph{ideal}, characterized by a state that is perfectly estimated, while the second one, called \emph{noise}, because we intentionally added Gaussian noise in the estimated \textbf{state} used by the controller.
The noise is generated guaranteeing the satisfaction of \eqref{eq:jacobianRelathionship}; in particular, it is applied directly in the actuated joints. However, owing to the closed kinematics, the variations spread in all the joints with a remarkable change in the configuration.
The noise effect is added to emulate measurement errors in the encoders. The maximum amplitude applied to actuated joints was set equal to $0.05$[deg].
Fig.\ref{fig:sim2} shows $40$[s] of simulation; both the \emph{ideal} and \emph{noise} cases decrease the average orientation error and average position error to \change{$9$}[deg] and \change{$8$}[mm].
The presence of state noise increases response time and causes oscillations (see \cref{fig:sim2_OmegaAct}). Yet, the mesh achieves the morphing task with \emph{acceptable} tracking performances according to the aforementioned metrics.
\begin{figure*}
\begin{subfigure}[b]{0.32\linewidth}
\centering
\includegraphics[width=\textwidth]{figures/sim2_AOE.eps}
\caption{Error alignment normal vectors $\normalAlignmentError{\nodeij}$}
\label{fig:sim2_AOE}
\end{subfigure}
\hfill
\begin{subfigure}[b]{0.32\linewidth}
\centering
\includegraphics[width=\textwidth]{figures/sim2_APE.eps}
\caption{Node position error $\nodePositionError{\nodeij}$}
\label{fig:sim2_APE}
\end{subfigure}
\hfill
\begin{subfigure}[b]{0.32\linewidth}
\centering
\includegraphics[width=\textwidth]{figures/sim2_OmegaAct.eps}
\caption{Amplitude Motor Speed $|\nodesRelOmegaAct|$}
\label{fig:sim2_OmegaAct}
\end{subfigure}
\caption[]{Performance %
comparison of an ideal simulation and one with artificial noise in the state. The test is performed with $8 \times 8$ mesh.
The solid lines represent the average values, while the transparent regions are the $10\text{-}90$th percentile range. In (c), the dashed line is the maximum motor speed $\nodesRelOmega[max]$.
}
\label{fig:sim2}
\end{figure*}
\subsubsection{\textbf{Mesh 20x20}} \label{subsec:20x20}
It is tested with a steady desired shape properly scaled and shifted in the form of
\begin{equation*}
f \brRound{x,y} = x^2 - y^2.
\end{equation*}
This simulation permitted us to check the capability of the controller to deal with meshes composed of a higher number of nodes; in particular, the number of links is $400$, the number of spherical joints is $760$, and the dimension of the state space $\statePosQuat$ is $2800$.
The problem complexity increases remarkably the computational time; thus, we decided to analyze only the case with ideal actuation and ideal estimation.
Fig.\ref{fig:sim3} shows \change{$20$[s]} of simulation where the mesh passes from an average initial error of \change{$41$[deg]} and \change{$180$[mm]} to \change{$8$[deg]} and \change{$23$[mm]}. Even here, the mesh achieves the morphing task with \emph{acceptable} tracking performances according to the aforementioned metrics; however, \change{$20$[s]} of simulation took \change{$2$[h]} using a PC with Intel Xeon Gold 6128 $3.40$GHz and RAM $128$GB.
\subsubsection{\textbf{Mesh 4x8}} \label{subsec:4x8}
\change{
This test presents the conceptual idea of integrating a morphing cover in a humanoid robot. We replaced the \emph{iRonCub} thigh cover with a $4\times8$ mesh. Differently from previous experiment, we rigidly constrained four nodes. The initial configuration is a cylinder (see } \cref{fig:iRonCub-rest}\change{). The mesh is tested with a piecewise function properly scaled and shifted in the form of}
\begin{equation*}
f \brRound{x,y,t} =
\begin{cases}
x^2-y^2 & t \leq 10, \\
x^2 & 10 < t \leq 15, \\
y^2 & 15 < t \leq 25, \\
-y^2 & t > 25.
\end{cases}
\end{equation*}
\change{Fig.}\ref{fig:sim4}\change{ shows $35$[s] of an ideal simulation without noise.
The controller reacts to piecewise function discontinuities emulating four different shapes (see }\cref{fig:iCubThigh})\change{.
The \emph{paraboloids} $\pm{y^2}$ are reproduced with an average orientation error lower than $1$[deg] and average position error of $1$[mm].
Instead, the tracking of the function $x^2-y^2$ is achieved with $10$[deg] and $6$[mm] error.
Differently, the mesh was not able to copy the \emph{paraboloids} $x^2$, \ie $20$[deg] and $17$[mm] of error, mainly because the \emph{four} fixed nodes constrained a direction of motion.}
\begin{figure*}
\begin{subfigure}[b]{0.32\linewidth}
\centering
\includegraphics[width=\textwidth]{figures/sim3_AOE.eps}
\caption{Error alignment normal vectors $\normalAlignmentError{\nodeij}$}
\label{fig:sim3_AOE}
\end{subfigure}
\hfill
\begin{subfigure}[b]{0.32\linewidth}
\centering
\includegraphics[width=\textwidth]{figures/sim3_APE.eps}
\caption{Node position error $\nodePositionError{\nodeij}$}
\label{fig:sim3_APE}
\end{subfigure}
\hfill
\begin{subfigure}[b]{0.32\linewidth}
\centering
\includegraphics[width=\textwidth]{figures/sim3_OmegaAct.eps}
\caption{Amplitude Motor Speed $|\nodesRelOmegaAct|$}
\label{fig:sim3_OmegaAct}
\end{subfigure}
\caption[]{Performance %
of an ideal simulation executed with mesh $20 \times 20$.
The solid lines represent the average values, while the transparent regions are the $10\text{-}90$th percentile range. In (c), the dashed line is the maximum motor speed $\nodesRelOmega[max]$.
}
\label{fig:sim3}
\end{figure*}
\begin{figure*}
\begin{subfigure}[b]{0.32\linewidth}
\centering
\includegraphics[width=\textwidth]{figures/sim4_AOE.eps}
\caption{Error alignment normal vectors $\normalAlignmentError{\nodeij}$}
\label{fig:sim4_AOE}
\end{subfigure}
\hfill
\begin{subfigure}[b]{0.32\linewidth}
\centering
\includegraphics[width=\textwidth]{figures/sim4_APE.eps}
\caption{Node position error $\nodePositionError{\nodeij}$}
\label{fig:sim4_APE}
\end{subfigure}
\hfill
\begin{subfigure}[b]{0.32\linewidth}
\centering
\includegraphics[width=\textwidth]{figures/sim4_OmegaAct.eps}
\caption{Amplitude Motor Speed $|\nodesRelOmegaAct|$}
\label{fig:sim4_OmegaAct}
\end{subfigure}
\caption[]{\change{Performance
of an ideal simulation executed with mesh $4 \times 8$.
The solid lines represent the average values, while the transparent regions are the $10\text{-}90$th percentile range. In (c), the dashed line is the maximum motor speed $\nodesRelOmega[max]$.}
}
\label{fig:sim4}
\end{figure*}
\begin{figure}
\begin{subfigure}[b]{0.49\columnwidth}
\centering
\includegraphics[trim=50 50 50 50, clip, width=\textwidth]{figures/sim4_3dView_t10.eps}
\caption[]{$t=10$[s]}
\label{fig:iCubThigh_t10}
\end{subfigure}
\hfill
\begin{subfigure}[b]{0.49\columnwidth}
\centering
\includegraphics[trim=50 50 50 50, clip, width=\textwidth]{figures/sim4_3dView_t15.eps}
\caption[]{$t=15$[s]}
\label{fig:iCubThigh_t15}
\end{subfigure}
\vskip\baselineskip
\begin{subfigure}[b]{0.49\columnwidth}
\centering
\includegraphics[trim=50 50 50 50, clip, width=\textwidth]{figures/sim4_3dView_t25.eps}
\caption[]{$t=25$[s]}
\label{fig:iCubThigh_t25}
\end{subfigure}
\hfill
\begin{subfigure}[b]{0.49\columnwidth}
\centering
\includegraphics[trim=50 50 50 50, clip, width=\textwidth]{figures/sim4_3dView_t35.eps}
\caption[]{$t=35$[s]}
\label{fig:iCubThigh_t35}
\end{subfigure}
\caption[]{\change{Instants of the $4\times8$ cover movement discussed in }\cref{subsec:4x8}. \change{The four green nodes are rigidly fixed to the leg. The light blue surface is the desired shape. The simulation video is attached in the accompanying material} \url{https://youtu.be/kMfXb2xqGn4?t=482}.}
\label{fig:iCubThigh}
\end{figure}
\subsection{Discussion}
\change{Above, we have shown the performances of the proposed approach
in four scenarios, each characterized by a different cover skeleton size, desired shape, and noise source.
The obtained results are satisfactory since the cover tracks a desired time-varying surface with a node-normal alignment error %
less than $10$ [deg] for most of the analyzed shapes.
The presented simulations tend to show that the
node-normal alignment task allows us to indirectly minimize the node position errors %
to a value lower than the node square length $l$ ($25$ [mm]) in most cases. Let us remark, however, that the control laws obtained as solutions to} \eqref{eq:QP} \change{do not, in general, imply a minimization of the node position errors.}
\change{The control problem formulated in }\cref{sec:control} \change{moves the skeleton to emulate a continuous function without specifying the desired node coordinates or where the mesh should lie.
On the one hand, this simplifies the control process since it is not required to tessellate the desired shape and estimate the node coordinates. On the other hand, the tracking of a complex desired shape with multiple curvatures could be hard to achieve since the mesh might emulate the desired shape in a coordinate range different from the expected one.
With the current control strategy, we can only select the fixed-node coordinates, but the skeleton might rotate around the fixed-node for large meshes. This behavior slightly appeared with a $20\times20$ mesh (see the accompanying movie for the simulation video), where the skeleton started to ``slide'' on the desired shape pushed by the minimization of the node-normal alignment.
A desired surface parameterization could be beneficial discouraging mesh movement along unwanted directions.}
\change{The desired shape selection is constrained by physical limitation of the mesh, like the range of motion limits or the position of fixed nodes. The desired shape must belong to a neighbourhood of the mesh configuration, otherwise the controller cannot ensure convergence, unless a trajectory planning layer is introduced.
The mathematical definition of the desired shape is also another drawback since the control problem is only able to track mathematical functions, \ie, binary relations between \emph{domain} and \emph{codomain} that relate each element of the \emph{domain} to exactly one element of the \emph{codomain}. Consequently, owing to a representation reason, the mesh is not able to morph into \emph{non-surjective} functions.}
\change{Concerning the motor positioning algorithm, its result is an optimal solution in a configuration close to the initial one. However the full-actuation is not guaranteed in the whole working space. This geometric dependence does not affect the associated performances since we can assume to work in a configuration near the starting one in most cases. In fact, in all the presented simulations, the meshes did not experience under-actuation and singularity issues.}
\section{Conclusions} \label{sec:conclusions}
This article proposed a solution for providing humanoid robots with adaptive morphology capabilities. We presented a novel type of humanoid robot covers whose shape can be actively controlled.
The proposed morphing cover concept is composed of a skeleton and an elastic membrane. We showed how the skeleton can be obtained as a repetition of basic elements connected by spherical joints, which thus create a parallel mechanism. The design is particularly robust from the mechanical perspective.
To validate its performance, we carried out extensive simulations with the objective for the cover to morph into desired shapes.
\change{The mesh evolution is governed by a kinematic controller that orients the node-normals and indirectly minimizes the node-position errors.
This article also proposed a motor placement strategy aiming to minimize the number of motors without losing \emph{full-actuation}. The optimality is assured in a local configuration, however during the presented simulations the meshes did not experience under-actuation issues.}
The choice of spherical joints allows a wide range of movements. However, it increases the complexity of the mechanical design.
\change{Other limitations are the unmodeled external and self collisions, and the absence of a dynamic model.}
The future work consists in testing other mechanisms to understand if we can decrease the number of $\dof$s without interfering on the mesh performances. For example, we can pass from spherical to universal joints adding further constraints in the kinematic model.
Later we intend to perform simulations with a dynamical model to estimate motor torques: they can be used in the presented genetic algorithm to further improve the actuation position scheme. Finally, we intend to actuate the cover and perform real experiments.
\change{
As for the \emph{soft external membrane}, the design and the integration is planned to start as soon as we produced a fully working rigid skeleton.
}
\section*{Appendix} \hypertarget{labelAppendix}{}
\begin{proofCorollary}
The matrix $\nullSpaceMatrix[\VbAndNodesRelOmega] \in \R{\dof \times 6 + 3\numberSphericalJoints}$ contains the basis of the space of the feasible movements, it is full rank and it has more rows than columns. Assume that the indexes of the linear independent rows are known and the non singular matrix $\nullSpaceMatrix[act]$ has been constructed.
Using a permutation matrix $\permm{\nullSpaceMatrix}$ to change the order of the rows, we have
\begin{equation} \label{eq:Znu partitioned}
\nullSpaceMatrix[\VbAndNodesRelOmega] = \permm{\nullSpaceMatrix} \bm{\nullSpaceMatrix[\text{act}] \\ \nullSpaceMatrix[0]} .
\end{equation}
Given the generic solution $\VbAndNodesRelOmega = \nullSpaceMatrix[\VbAndNodesRelOmega] \boldsymbol{\xi}$, doing a change of variable $\boldsymbol{\xi} = \nullSpaceMatrix[\text{act}]^{-1} \boldsymbol{\psi}$ and substituting \eqref{eq:Znu partitioned},we obtain
\begin{equation} \label{eq:Psi}
\VbAndNodesRelOmega = \permm{\nullSpaceMatrix} \bm{ \eye{\dof} \\ \nullSpaceMatrix[0] \nullSpaceMatrix[\text{act}]^{-1} } \boldsymbol{\psi} =
\permm{\nullSpaceMatrix} \bm{ \boldsymbol{\psi} \\ \nullSpaceMatrix[0] \nullSpaceMatrix[\text{act}]^{-1} \boldsymbol{\psi} } .
\end{equation}
Imposing the values of $\boldsymbol{\psi}$ is equivalent to control the relative angular velocity of some joints that are also decoupled. If we imagine to actuate those joints, we can then fully control our mesh, in a range near to this configuration, with a number of motors equal to $\dof$s.
The term $\boldsymbol{\psi}$ is called $\nodesRelOmegaAct$ in the remainder of this article (see \cref{def:nodesRelOmegaAct}).
\end{proofCorollary}
\begin{proofLemma}
Given \eqref{eq:Psi}, substituting $\nodesRelOmegaAct$ instead of $\boldsymbol{\psi}$, we can prove \eqref{eq:fromInputToRelC}
\begin{equation} \label{eq:proofNU}
\VbAndNodesRelOmega = \nullSpaceMatrix[\VbAndNodesRelOmega] \nullSpaceMatrix[\text{act}]^{-1} \boldsymbol{\psi} = \nullSpaceMatrix[\VbAndNodesRelOmega] \nullSpaceMatrix[\text{act}]^{-1} \nodesRelOmegaAct .
\end{equation}
To proof \eqref{eq:fromInputToAbsC}, we need to recall $\Jc \nodesAbsVel = \zero{}$ and its generic solution $\nodesAbsVel = \nullSpaceMatrix[\nodesAbsVel] \boldsymbol{\xi}$.
Substituting the latter into \eqref{eq:convmV2Nu}, we obtain
\begin{equation} \label{eq:lemmaBEq1}
\VbAndNodesRelOmega = \convm{\VbAndNodesRelOmega}{\nodesAbsVel} \nodesAbsVel = \convm{\VbAndNodesRelOmega}{\nodesAbsVel} \nullSpaceMatrix[\nodesAbsVel] \boldsymbol{\xi}.
\end{equation}
Given \eqref{eq:convmZv2Znu}, we can rewrite \eqref{eq:lemmaBEq1} as $\VbAndNodesRelOmega = \nullSpaceMatrix[\VbAndNodesRelOmega] \boldsymbol{\xi}$. Both the absolute and relative cover velocities $\VbAndNodesRelOmega$ and $\nodesAbsVel$ are written as function of the same vector $\boldsymbol{\xi}$. Consequently, as done in \eqref{eq:Psi} and \eqref{eq:proofNU}, doing a change of variable $\boldsymbol{\xi} = \nullSpaceMatrix[\text{act}]^{-1} \nodesRelOmegaAct$ in the equation $\nodesAbsVel = \nullSpaceMatrix[\nodesAbsVel] \boldsymbol{\xi}$, we prove \eqref{eq:fromInputToAbsC}
\begin{equation}
\nodesAbsVel = \nullSpaceMatrix[\nodesAbsVel] \nullSpaceMatrix[\text{act}]^{-1} \nodesRelOmegaAct.
\end{equation}
\end{proofLemma}
\section*{Multimedia Material}
The code of this project is available at \urlPaper{}.
Additional results can be viewed in this video: \url{https://youtu.be/kMfXb2xqGn4}.
\import{}{1-introduction}
\import{}{2-background}
\import{}{3-modeling}
\import{}{4-actuatorSelection}
\import{}{5-control}
\import{}{6-simulation}
\import{}{7-conclusions}
\import{}{8-appendix}
\addtolength{\textheight}{0cm}
\ifCLASSOPTIONcaptionsoff
\newpage
\fi
\bibliographystyle{IEEEtran}
|
\section{Introduction}
Training robot control policies in simulation for deployment in physical environments and automation tasks has seen increasing success in a broad variety of robotics applications such as robot grasping~\cite{mahler2017dexnet, hand-eye}, deformable manipulation~\cite{hoquevisuospatial, seita2020deep}, and legged locomotion~\cite{rma2021, bipedal2021}. Simulated training enables the collection of diverse experiences for policy learning that may be infeasible to collect on a physical system, creating potential for strong policy generalization and robustness. Additionally, learning policies purely in simulation can limit the risk of encountering suboptimal behaviors on physical robots and can reduce hardware wear-and-tear. However, transferring policies learned in simulation to the real world is challenging, as simulators are imperfect. As a result, learning algorithms must overcome a domain shift~\cite{valassakis2020crossing} between the dynamics and visual appearance of simulations and the physical world. Prior work has addressed a range of methods to enable robust domain adaptation of policies trained in simulation to physical experiments~\cite{Tanwani2020DIRL, James2019SimToReal, rusu2017sim, zhao2020sim, bipedal2021,hofer2021sim2real}. Less attention has been given to the critical challenge of determining when a policy trained in simulation is ready for physical deployment. While deploying policies trained with too little simulation data can lead to low performance on the physical system, policies that are trained excessively in simulation risk overfitting to simulator artifacts. This motivates principled methods to determine when policies trained in simulation are likely most ready for physical deployment.
\begin{figure}[t!]
\centering
\includegraphics[width=\linewidth]{figs/fig1.png}
\caption{\textbf{Physical experiment and simulator setup.} We study sim-to-real switching in a fabric smoothing task, in an environment consisting of an ABB YuMi robot with a single tweezer gripper. An overhead Photoneo Phoxi Camera captures grayscale images. The manipulation workspace border is marked with blue tape, and the fabric is located within the workspace border. The physical workspace is designed to visually emulate the Gym-Cloth simulator~\cite{seita2020deep}, as shown on the left; the top two lefthand images show example starting and ending configurations from an oracle smoothing policy, while the bottom two images show the same observations, processed to resemble the grayscale images taken by the Photoneo Phoxi Camera.}
\label{fig:splash}
\end{figure}
Determining when a policy is ready for physical deployment requires reasoning about its expected performance in physical trials when the policy has only been trained in simulation. One common way to achieve this is to periodically evaluate learned policies in the physical world during simulated training to determine when sufficient performance has been achieved~\cite{DARC, workflow-offline-rl, what-matters-lfd}. However, this poses a number of practical challenges, as performing physical rollouts during training costs significant time and engineering effort, and furthermore may pose safety risks. This motivates using policy rollouts only from simulation to determine when to deploy policies on a physical robot. While this setting is more practical, it is also significantly more difficult, since it is challenging to gain information about expected performance in physical trials at deployment time without access to the physical system prior to deployment.
Our key insight is that the problem of determining when to transfer robotic control policies from simulation to reality bears similarities to the early stopping problem, a well-known technique for reducing overfitting in machine learning \cite{PRECHELT1998761, Mahsereci2017EarlySW, Yao2007}. For instance, \citet{PRECHELT1998761} investigates 14 different early stopping criteria with cross validation, which assesses generalization by measuring performance on a validation dataset unseen by the learner. Meanwhile, other approaches do not rely on the existence of a validation set: \citet{Mahsereci2017EarlySW} derive an early stopping rule based on local gradient statistics and \citet{Yao2007} propose a rule based on the bias-variance tradeoff. While early stopping is well-studied, however, few have explored applying the technique to sim2real transfer. One such work is \citet{Muratore2021AssessingTF}, who propose early stopping in simulation based on an upper confidence bound on the optimality gap during domain randomization.
This work, meanwhile, studies four different mechanisms for switching from simulation to physical experiments and evaluates the degree to which they are predictive of performance during physical deployment.
Specifically, we focus on robot fabric manipulation, a domain that has seen increasing interest~\cite{seita2020deep, lin2022learning, hoquevisuospatial} and applies across many domains such as home robotics, senior care, laundry folding, and manufacturing. In particular, we study how our proposed sim2real switching criteria can be used to determine when to deploy fabric smoothing policies on a physical robotic system.
This paper contributes (1) a detailed empirical study of which metrics are predictive of robust policy transfer from simulation to the physical world and (2) an evaluation of the proposed method for transferring fabric smoothing policies from simulation to deployment on a physical robot. Fabric smoothing experiments suggest that our switching criteria correlate with performance in real, achieving an average final fabric coverage of 88.79\% over all switching conditions.
Furthermore, given a training budget of 200 learning iterations, our confidence-based switching criteria utilize only 55-60\% of total training resources.
\section{Related Work}
\subsection{Sim2Real Transfer for Robot Learning}
There is significant prior work on learning policies in simulation and facilitating transfer to physical experiments. The most common approach is domain randomization~\cite{mahler2017dexnet, tobin2017domain}, which varies dynamical and/or visual properties such as friction, lighting, camera angle, colors, and textures in simulation to enable zero-shot transfer to the physical world. \citet{bipedal2021} apply dynamics randomization according to a curriculum to achieve physical bipedal robot walking. Similarly, Valassakis et al. \cite{valassakis2020crossing} investigate dynamics domain randomization via injecting random forces into simulations. Domain randomization has achieved transfer in a variety of applications such as robot legged locomotion~\cite{bipedal2021}, fabric manipulation~\cite{hoquevisuospatial}, and robotic grasping~\cite{mahler2017dexnet, tobin2017domain}. Recent work has also explored adaptive methods and curricula for domain randomization, such as automatic domain randomization for dexterous manipulation of a Rubik's cube~\cite{akkaya2019solving} and active domain randomization~\cite{Mehta2019ActiveDR}. Other proposed approaches for crossing the reality gap include learning a canonical intermediate representation \cite{James2019SimToReal}, domain adaptation via a small amount of real data \cite{Tanwani2020DIRL}, and ``real2sim2real" tuning of simulation parameters based on real data \cite{Lim2021PlanarRC, Ramos2019BayesSimAD, Du2021AutoTunedST}. Finally, \citet{habitatsim2real20ral} propose a sim2real correlation coefficient for predicting sim2real performance but require real data to compute the coefficient. Despite the significant body of work on simulated training procedures to enable physical deployment, there has been very little research on automatically determining precisely when to stop training in simulation and deploy learned policies in the physical world without any real evaluation. The closest prior work to ours may be \citet{Muratore2021AssessingTF}, who propose early stopping in simulation based on an upper confidence bound on the optimality gap during domain randomization. However, while this work is specific to the reinforcement learning paradigm, we apply our approach to the imitation learning setting, in which algorithms learn from demonstrations. Furthermore, our proposed framework can readily extend to other settings such as reinforcement learning; this could be an interesting direction for future study.
\subsection{Fabric Manipulation}
Fabric manipulation is a challenging open problem for robots, as fabric has an infinite-dimensional configuration space, exhibits complex dynamics, and often self-occludes. There has been significant prior work in leveraging simulators and task demonstrations to learn fabric smoothing and folding policies for zero-shot transfer to the physical world~\cite{seita2020deep, sim2real_deform_2018, jangir2020dynamic, fabric-descriptors, mmgsd}. Other recent works relax the assumption that task demonstrations are available but still leverage simulation to enable zero-shot transfer to real world experiments~\cite{hoquevisuospatial, lin2020softgym, lerrel}. Another approach is to learn fabric manipulation policies entirely from real world interaction~\cite{finn_vf_2017, lee2020learning}. Our work learns
fabric manipulation policies purely in simulation for deployment in the physical world; however, unlike prior work that performs zero-shot transfer to physical experiments after some fixed amount of simulated training, we study how to automatically determine when to stop training policies in simulation to facilitate robust deployment on the physical robot.
\section{Problem Statement}
\label{sec:problem_statement}
This work considers learning a policy $\pi$ for some task given access to only a computational simulation. In particular, we seek to identify the optimal time at which to terminate learning in simulation and deploy the policy in the physical world. We model the task as a Partially Observable Markov Decision Process (POMDP)~\cite{kaelbling1998planning} $\mathcal{M}_\text{sim}^\phi$, parametrized by simulation parameters $\phi$ capturing variables such as visual appearance and simulator dynamics. The objective is to achieve high task performance when this policy is deployed in the physical world, which we model as POMDP $\mathcal{M}_\text{real}$.
More formally, we assume that $\mathcal{M}_\text{sim}^\phi$ and $\mathcal{M}_\text{real}$ have a shared state space $\mathcal{S}$, observation space $\mathcal{O}$, action space $\mathcal{A}$, reward function $R: \mathcal{S} \rightarrow \mathbb{R}$, initial state distribution $\mu$, and episode time horizon $H$, but may have different mappings from states $s \in \mathcal{S}$ to observations $o \in \mathcal{O}$. In this work, we consider grayscale image observations ($\mathcal{O} = \mathbb{R}^{H \times W \times C}$, $C = 1$), but consider settings (as is typical in practice) where observations corresponding to a specific state may have different visual appearances between simulation ($\mathcal{M}_\text{sim}^\phi$) and reality ($\mathcal{M}_\text{real}$). We additionally consider settings in which the state transition dynamics associated with $\mathcal{M}_\text{sim}^\phi$, denoted by $P_\text{sim}: \mathcal{S} \times \mathcal{A} \times \mathcal{S} \rightarrow [0, 1]$, may be different from those associated with $\mathcal{M}_\text{real}$, denoted by $P_\text{real}: \mathcal{S} \times \mathcal{A} \times \mathcal{S} \rightarrow [0, 1]$. This reflects the inability of computational simulations to precisely model the dynamics of the physical world.
We consider a setup in which robot policy $\pirob: \mathcal{O} \rightarrow \mathcal{A}$ is first learned with some policy search algorithm in simulation, using $T_\text{sim}$ total transitions in simulated environment $\mathcal{M}^\phi_\text{sim}$. During this phase, we aim to optimize the following objective based on the attained rewards in simulation:
\begin{align}
\label{eq:sim_obj}
J^{\phi}_\text{sim}(\pirob) = \mathbb{E}_{\pirob , \mathcal{M}^\phi_\text{sim}} \left[\sum_{t=1}^{H} R(s_t)\right],
\end{align}
where the expectation is with respect to observation-action trajectories sampled from policy $\pirob$ in POMDP $\mathcal{M}^\phi_\text{sim}$. The objective in this work is to identify the optimal stopping time $T_\text{sim}$ such that when policy $\pirob$ is evaluated in the physical world, it maximizes the following objective based on the attained rewards in physical trials:
\begin{align}
\label{eq:real_obj}
J_\text{real}(\pirob) = \mathbb{E}_{\pirob, \mathcal{M}_\text{real}} \left[\sum_{t=1}^{H} R(s_t)\right],
\end{align}
where analogously, the expectation is with respect to observation-action trajectories sampled from $\pirob$ in $\mathcal{M}_\text{real}$.
\section{Switching Criteria for Imitation Learning}
\label{sec:methods}
In this work, we consider switching from simulation to real in the case of imitation learning, in which an algorithm learns a policy from sequentially-collected demonstrations. We propose four criteria to determine when to switch from simulated training to physical deployment. In Section~\ref{subsec:method_overview}, we discuss a general framework for evaluating switching criteria, and in Section~\ref{subsec:methods_criteria}, we will describe the two evaluation metrics for switching (reward in simulation and epistemic uncertainty) studied in this work. Then, Section~\ref{sec:stopping} will propose two stopping conditions for identifying switching points (absolute threshold and gradient-based). Pairing the two evaluation metrics and two stopping conditions results in four possible switching criteria, each a combination of a particular switching metric and stopping condition.
\begin{figure*}[t!]
\vspace{4 pt}
\centering
\includegraphics[width=1.0\textwidth]{figs/alg_overview.png}
\caption{\textbf{System Overview.} At each step, our algorithm pipeline collects a new batch of simulation data, performs a model update epoch, and then checks whether a switching condition is satisfied. If the switching criterion is met, then the model is ready to be deployed in real. Otherwise, we continue collecting simulation data to further update the model. We test four switching criteria, which utilize metrics based on a) reward when evaluated in simulation and b) epistemic uncertainty as estimated via an ensemble of policy networks; these metrics are paired with each of two stopping conditions based on 1) absolute thresholding or values, and 2) gradients.
}
\label{fig:alg_overview}
\end{figure*}
\subsection{Switching to Real in Imitation Learning}
\label{subsec:method_overview}
To determine when to switch from learning in simulation to deploying policies in physical experiments, we learn a switching criterion $\psi: \pirob \rightarrow \{0, 1\}$. If $\psi(\pirob) = 1$, we terminate simulated training and deploy $\pirob$ in physical experiments, while otherwise, we continue training $\pirob$. The switching function $\psi$ identifies a switching time $T_\text{sim}$ as a function of the evolving robot policy $\pirob$. While in this work, we specifically study switching criteria in the context of learning from demonstrations, future work includes exploring similar ideas for other possible policy learning algorithms, including model-based planning with system identification and model-free reinforcement learning.
We consider the imitation learning setting, in which the objective is to learn a robot policy $\pirob$ that emulates task demonstrations collected in simulation from some demonstration policy $\pisup$. In principle, $\pisup$ could be a human controlling the robot in simulation via a teleoperation interface or an algorithmic controller defined using privileged state information present only in simulation; we consider the latter. We train $\pirob$ in simulation with \textit{behavior cloning}~\cite{ross2011reduction, seita2020deep,hoque2021thriftydagger}, which aims to minimize the following loss function to encourage the robot's policy $\pirob: \mathcal{S} \to \mathcal{A}$ to match that of the demonstrator ($\pisup$) on a set of demonstration trajectories $\mathcal{D}$:
\begin{align}
\label{eq:IL-objective}
J_{BC}(\pirob) = \mathbb{E}_{(s_t, \pisup(s_t))\sim\mathcal{D}}\left[ \mathcal{L}(\pirob(s_t),\pisup(s_t))\right],
\end{align}
where $\mathcal{L}(\pirob(s),\pisup(s))$ is an action discrepancy measure between $\pirob(s)$ and $\pisup(s)$ (e.g., the squared loss or 0-1 loss; our experiments use the squared loss).
The key objective in this work is to determine how many training iterations in simulation are required to train $\pirob$ before it should be deployed on a physical system. To this end, we train $\pirob$ to minimize the loss in Equation~\eqref{eq:IL-objective} in simulation on trajectories in $\mathcal{D}$ and compute a stopping criterion $\psi: \pirob \rightarrow \{0, 1\}$. If $\psi(\pirob) = 1$, we terminate simulated training and deploy $\pirob$ in physical experiments. Otherwise, we query $\pisup$ for an additional task demonstration in simulation, aggregate this demonstration into $\mathcal{D}$, and continue.
The learning process is described in Algorithm~\ref{alg:main} and illustrated in Figure~\ref{fig:alg_overview}. The procedure alternates between 1) collecting a batch of demonstrations from the demonstration policy $\pisup$, 2) appending the demonstrations to the dataset $\mathcal{D}$, 3) performing a model update epoch to minimize the loss function $J_{BC}(\pirob)$ in Equation~\eqref{eq:IL-objective}, and 4) checking whether the switching criterion $\psi(\pirob)$ is satisfied. If $\psi(\pirob) = 1$, then the process is halted and the final learned policy $\pi$ is deployed on the physical robot system. In practice, our experiments collect a batch of $K = 10$ demonstrations per iteration, where we use $K = 10$ to obtain sufficient granularity of information for determining the switching point. Each model update epoch performs 400 gradient steps on the loss function $J_{BC}(\pirob)$ with a minibatch size of 64. We utilize an Adam optimizer with a learning rate of $2.5 * 10^{-4}$ and L2 regularization of $10^{-5}$.
\begin{algorithm}[t]
\caption{Learned Switching Criteria for Sim2Real}
\label{alg:main}
\footnotesize
\begin{algorithmic}[1]
\Require Maximum number of learning iterations $N$; number of demonstrations $K$ collected between each model update and calculation of the stopping criterion $\psi(\pi)$; demonstration policy $\pi_D$; initialized buffer for demonstration data $\mathcal{D} \leftarrow \emptyset$; randomly initialized robot policy $\pirob$
\For{$i \in \{1,\ldots N\}$}
\State Collect $\tau^{\text{demo}}_j = ((s_t^{(j)}, a_t^{(j)})_{t=1}^{T})$, $j \in \{1, \ldots, K\}$ from $\pisup$
\State $\mathcal{D} = \mathcal{D} \cup \tau^{\text{demo}}_1 \cup \ldots \cup \tau^{\text{demo}}_K$
\State $\pirob \leftarrow \arg\min_{\pirob} \mathbb{E}_{(s_t, \pisup(s_t))\sim\mathcal{D}}\left[\cloningloss\right]$
\If {$\psi(\pi)$}
\State Terminate learning and deploy on physical system
\EndIf
\EndFor
\end{algorithmic}
\end{algorithm}
\subsection{Switching Metrics}
\label{subsec:methods_criteria}
We propose two switching metrics, which are computed after every model update step in Algorithm~\ref{alg:main}.
\textbf{Simulation Reward:} Here we evaluate $\pirob$ in simulation and compute the average total reward over $L$ rollouts to approximate $J_\text{sim}(\pirob)$ from Equation~\eqref{eq:sim_obj}. These trials also serve as the cross-validation dataset $\mathcal{D}_{\rm cross}$ for tuning our reward-based switching conditions via cross-validation in simulation, as detailed below. In practice, our experiments use $L=5$, which we found to provide sufficiently small standard error. Intuitively, performing well in simulation suggests that the policy may transfer well to real.
\textbf{Epistemic Uncertainty:} Here we approximate the epistemic uncertainty of $\pirob$ to characterize the policy's confidence in the actions that it predicts. We estimate epistemic uncertainty by training an ensemble of $E$ policies $\{ \pirob^{(i)} \}_{i=1}^{E}$ on bootstrapped minibatches of the training data $\mathcal{D}$. We then estimate the epistemic uncertainty over a holdout demonstration set $\mathcal{D}_{\text{cross}}$, which is not present during model training. (Note that $\mathcal{D}_{\text{cross}}$ has different definitions for the simulation reward and epistemic uncertainty metrics.) Intuitively, the more consistent (low-variance) the policy's predictions on $\mathcal{D}_{\text{cross}}$ across ensemble members, the higher the probability of policy convergence. Let $\{ a_i(s)\}_{i=1}^{E} \in \mathbb{R}^M$ denote the corresponding actions when each ensemble member is queried at observation $s$. Further, let $a_{ij}(s)$ denote the $j$\textsuperscript{th} component of the action predicted by ensemble member $i$. The epistemic uncertainty is estimated via:
\begin{align}
\label{eq:epistemic}
\mathbb{E}_{s \in \mathcal{D}_{\text{cross}}}\left[ \frac{1}{M}\sum_j \text{Var}_i(a_{ij}(s)) \right],
\end{align}
where $\text{Var}_i(a_{ij}(s))$ denotes the variance over ensemble member $i \in \{1, 2, \hdots E\}$ in action component $j$, and the expectation is taken over observation-action pairs in $\mathcal{D}_{\text{cross}}$.
\subsection{Stopping Conditions}\label{sec:stopping}
We now leverage the two metrics in Section~\ref{subsec:methods_criteria} to propose two stopping conditions for sim2real switching.
\textbf{Value-Based: }
The first stopping condition is an absolute threshold, $A$, which we tune using the cross-validation set, $\mathcal{D}_{\rm cross}$. For the simulation reward metric, $A$ is set to approximately the maximum reward attained in $\mathcal{D}_{\rm cross}$ (on average over the $L$ rollouts in $\mathcal{D}_{\rm cross}$); notably, $A$ is tuned using $\mathcal{D}_{\rm cross}$, an offline dataset in which rewards plateau to stable performance in simulation, so that future online learning can halt early using $A$. For epistemic uncertainty, $A$ is the highest epistemic uncertainty over $\mathcal{D}_{\rm cross}$ that falls within a preset margin of the minimum epistemic uncertainty value.
Specific values of $A$ are provided in the supplemental website~\cite{supplement}. At each evaluation episode $i$, a spline $f(x)$ is fit to the previous $i-1$ data points. We use a spline---rather than raw data---to mitigate noise in the reward and uncertainty-based switching metrics, as seen in Fig.~\ref{fig:switch}. Then, the spline is evaluated at the current episode and compared with the predefined absolute threshold $A$ to determine whether the algorithm should stop training and deploy the policy in real.
\textbf{Gradient-Based: }
The second stopping condition is gradient-based, and determines when the change over time in an evaluation metric falls below a threshold. Similarly to the absolute threshold, we identify the threshold by fitting a spline to the previous $i-1$ data points. Then, finite differences are taken for two points evaluated on the spline to approximate the current gradient of the evaluation metric. If the gradient is within the range $[-\epsilon, \epsilon]$ (tuned for each switching metric as described below), the gradient is considered to be sufficiently close to zero and two counters are potentially incremented: $w_{\rm consec}$ keeps track of the number of consecutive episodes with a sufficiently-small gradient, while $w_{\rm total}$ keeps track of the total number of episodes with a below-threshold gradient. The stopping condition is triggered if either $w_{\rm consec} > U$ or $w_{\rm total} > V$, where $U$ is the maximum number of consecutive low-gradient episodes before stopping and $V$ is the maximum total number of (potentially-nonconsecutive) low-gradient episodes. The parameter $V$ allows training to stop even if there are some aberrations that would reset $w_{\rm consec}$ to zero. However, the $V$ condition alone is insufficient, since if the gradient frequently oscillates near zero due to noise in the switching metric, $w_{\rm total}$ would be incremented even though we may not have converged to acceptable performance, in which case the policy can still learn and should not yet be deployed in real.
Fig~\ref{fig:alg_overview} illustrates this process. In practice, the parameters ($\epsilon, U, V$) of the stopping conditions are tuned via cross-validation in simulation, using the dataset $\mathcal{D}_{\rm cross}$. In particular, $\epsilon$ is empirically set to the largest value such that not many early iterations (which have comparatively larger gradients) are classified as having a below-threshold gradient. $U$ and $V$ are tuned in conjunction so that the stopping condition is triggered as early as possible but not too early (e.g., for an overly-low simulation reward). Specific values for hyperparameters are provided in the supplemental website~\cite{supplement}.
To summarize, our four proposed sim2real switching methods are: 1) simulation reward with the value-based stopping condition, 2) simulation reward with the gradient-based stopping condition, 3) epistemic uncertainty with the value-based stopping condition, and 4) epistemic uncertainty with the gradient-based stopping condition.
\section{Experiments}
The four switching criteria---the two evaluation metrics coupled with each of the two stopping conditions---are each evaluated on a fabric smoothing task, in which we use behavior cloning to learn a policy from demonstrations.
\subsection{Experimental Setup: Fabric Smoothing}
\label{subsec:exp-setup}
\subsubsection{Sequential Fabric Smoothing Problem Statement}
We consider the specific manipulation task of sequential fabric smoothing, a challenging open problem in robotics that has received significant recent interest~\cite{seita2020deep, hoquevisuospatial, fabric-descriptors}. As described in prior work~\cite{seita2020deep}, the objective in sequential fabric smoothing is to find a sequence of robot actions to maximally smooth a fabric from an initially crumpled configuration. Concretely, we consider a square crop of fabric with initial configuration (state) $s_0$ and configuration $s_t$ at time $t$. In both simulation and reality, the algorithm can access only top-down grayscale image observations of the workspace, $\mathbf{o}_t \in \mathcal{O} = \mathbb{R}^{H \times W}$, where $H$ and $W$ are the image height and width respectively. Following prior work~\cite{hoque2021lazydagger}, we assume that each side of the fabric is monochromatic and that the two sides are colored differently, where the colors are distinguishable in grayscale (see supplement~\cite{supplement}). At each timestep $t$, the robot executes a 4D pick-and-place action $a_t$ parameterized by $(x_t, y_t, \Delta x_t, \Delta y_t)$, where $(x_t, y_t)$ is the pick point in pixel space and $(x_t + \Delta x_t, y_t + \Delta y_t)$ is the place point. Through a known pixel-to-world transform, the robot picks and lifts the top layer of fabric at $(x_t, y_t)$, translates by $(\Delta x_t, \Delta y_t)$, and releases. The robot seeks to learn a policy $\pi: \mathcal{O} \rightarrow \mathcal{A}$ that maximizes $R(s_T)$, where $T$ denotes the final step of a fabric smoothing episode and $R(\cdot)$ gives the \textit{coverage} or 2D area covered by the fabric (i.e., the area of fabric visible in the workspace). Following prior work~\cite{seita2020deep}, we assume that each smoothing episode terminates when the fabric reaches a coverage threshold of at least 92\% or a limit of 10 actions (whichever happens first).
\begin{figure*}[t!]
\centering
\includegraphics[width=0.9\textwidth]{figs/iterations.png}
\caption{\textbf{Example rollouts in simulation and physical experiments.} The top row (left to right) depicts a sample trajectory in simulation, while the bottom row similarly depicts a sample trajectory in real.}
\label{fig:iterations}
\end{figure*}
\subsubsection{Fabric Smoothing Simulation Environment}
To collect demonstrations, we use the oracle corner-pulling policy in the Gym-Cloth simulator~\cite{seita2020deep}, which is ideal for fabric manipulation tasks. Gym-Cloth is an OpenAI-Gym-style fabric manipulation environment, which simulates the cloth using structural, shear, and flexion springs. We use this simulator to collect data for training and testing our policies in simulation before switching to deployment in real. The cloth is represented as a 25x25 grid of point masses and is pictured with one light blue side and one dark blue side. The images generated for learning are 224x224 px, of which a completely smooth cloth would occupy 164x164 px. This ratio is reflected in our physical setup. Lastly, when using the Gym-Cloth-simulated data to train fabric smoothing policies, we perform color shifts and augmentations. Specifically, the colors of the background and both sides of the cloth are darkened, converted to gray scale, and blurred by a constant amount to match the images in real. In Fig~\ref{fig:iterations}, rollouts in simulation and real show the simulation images adapted to closely resemble real images. We collect a demonstration dataset $\mathcal{D}$ of 2,000 episodes of the oracle corner-pulling policies in Gym-Cloth for training behavior cloning policies.
\subsubsection{Fabric Smoothing Physical Environment}
The workspace, depicted in Fig.~\ref{fig:splash}, contains a bimanual ABB YuMi robot with a single tweezer gripper on its left arm; we do not use the right arm. Tweezer grippers are ideal for grasping the cloth as they are able to apply fine point pressure, unlike many standard grippers~\cite{seita2020deep}. The manipulation surface is white and foam-padded to avoid end effector damage during any workspace collisions. The manipulation workspace is marked with blue tape (see Fig.~\ref{fig:splash}), so that its size with respect to the cloth size resembles the setup in the Gym-Cloth simulator. We use a double sided 25 cm x 25 cm cloth with one light brown and one dark brown side. The workspace has an overhead PhotoNeo Phoxi Camera that captures grayscale images of resolution 732 x 1142 px, which are later cropped to specifically display the manipulation workspace, enclosed by the blue tape. To ease cloth perception, we also normalize the physical camera images based on a constant affine transformation to create greater contrast between the cloth and background. We further blur the images to remove noise, making them more closely resemble the smooth images seen in the Gym-Cloth simulator.
Our physical experiments evaluate four repetitions of each policy; for repeatability, these utilize a four fixed initial fabric configurations, pictured on the supplemental website~\cite{supplement}. During physical experiments, we project fabric pick points onto a color-segmented mask of the fabric, and project place points within the workspace. Similarly, when evaluating learned policies in the simulator, we project pick points onto a mask of the fabric. Additionally, in simulation, episodes are terminated early if the fabric leaves the workspace.
\subsection{Evaluation Metrics}
\label{subsec:exp-eval}
Our experiments evaluate the following switching criteria introduced in Sec.~\ref{sec:methods} to determine when the behavior cloning policy should stop training and be deployed in real:
\begin{enumerate}
\item (Reward value) Simulation reward with a value-based stopping condition,
\item (Reward gradient) Simulation reward with a gradient-based stopping condition,
\item (Confidence value) Epistemic uncertainty with a value-based stopping condition, and
\item (Confidence gradient) Epistemic uncertainty with a gradient-based stopping condition.
\end{enumerate}
\begin{figure*}[t!]
\vspace{4 pt}
\centering
\includegraphics[width=0.24\textwidth]{figs/Reward_value_stopping.png}
\includegraphics[width=0.24\textwidth]{figs/Reward_grad_stopping.png}
\includegraphics[width=0.24\textwidth]{figs/imgf6.png}
\includegraphics[width=0.24\textwidth]{figs/imgf5.png}
\caption{\textbf{Determining stopping points for various switching criteria.} On all graphs, the dark blue curves are splines fit to the data to mitigate noise when approximating the gradient and determine if the value-based threshold has been met. \textbf{Left two graphs:} The simulation reward comes from evaluating the policy in the Gym-Cloth simulation environment and determining the final fabric coverage in each episode; curves are averaged over 5 episode rollouts in Gym-Cloth. For comparison with real, the orange points correspond to mean performance in real of the behavior cloning policy selected at that iteration. The error bars correspond to the standard error across four runs. The stopping points (red point) are determined to be at iteration 171 for reward value and 153 for the reward gradient.
\textbf{Right two graphs}:
The epistemic uncertainty is calculated at each iteration over a holdout set of 200 demonstration episodes and with five ensemble members. The confidence value determines the stopping point to be 111, while the confidence gradient determines it to be 117.}
\label{fig:switch}
\end{figure*}
We evaluate the performance of these switching criteria via the following metrics, calculated during deployment in physical experiments after switching (averaged over 4 episodes in each case):
\begin{enumerate}
\item Final coverage
\item Improvement ratio (final coverage / initial coverage)
\item Number of actions per episode.
\end{enumerate}
\subsection{Experimental Results}
\label{subsec:exp-results}
\begin{figure*}[t!]
\vspace{4 pt}
\centering
\includegraphics[width=0.39\textwidth]{figs/Coverage_1.png}\hspace{10mm}
\includegraphics[width=0.51\textwidth]{figs/Coverage_2.png}
\caption{\textbf{Performance of learned policies in physical fabric smoothing experiments at various stopping points.} Left: Final physical fabric coverage achieved for each of the four stopping conditions. Right: Comparing the final physical fabric coverage for the confidence value stopping condition to various checkpoints. We see that the stopping conditions are largely competitive with 200 iterations (the maximum iteration number considered), but require significantly less training. Plots show mean $\pm$ standard error over 4 episodes. Note that to plot episodes that reach the target coverage of 92\% in fewer than 10 actions, we repeat the final achieved coverage for the remainder of the 10-action budget.
}
\label{fig:coverage}
\end{figure*}
\begin{table}[!t]
\centering
\begin{tabular}{ l c c c c}
\toprule
Method (iters) & Imp. ratio & Final & Actions \\
\midrule
Rew val (171) & 1.732 $\pm$ 0.104 & 0.875 $\pm$ 0.051 & 8.75 $\pm$ 1.08 \\
Rew grad (153) & 1.568 $\pm$ 0.102 & 0.868 $\pm$ 0.037 & 8.25 $\pm$ 1.24\\
Conf val (111) & 1.964 $\pm$ 0.070 & 0.937 $\pm$ 0.004 & 6.00 $\pm$ 1.27 \\
Conf grad (117) & 1.819 $\pm$ 0.103 & 0.872 $\pm$ 0.032 & 8.75 $\pm$ 1.08 \\
Final (200) & 1.858 $\pm$ 0.040 & 0.880 $\pm$ 0.048 & 7.50 $\pm$ 1.30 \\
\bottomrule
\end{tabular}
\\
\caption{\textbf{Physical experiment results.} We report the final fabric coverage and improvement ratio (final / initial coverage) achieved in physical fabric smoothing experiments by the various switching policies: reward value (rew val), reward gradient (rew grad), confidence value (conf val), and confidence gradient (conf grad). We also compare with the performance after 200 learning iterations, the maximum training budget considered. Results are mean $\pm$ standard error over 4 episodes in each case, and the initial coverage averaged 0.500 $\pm$ 0.026 standard error over all cases reported in the table. We also report the average number of actions (where each trajectory terminates upon reaching 10 actions or 92\% coverage, whichever occurs first).
}
\label{table:phys_exp_results}
\vspace{-2mm}
\end{table}
Fig.~\ref{fig:switch} illustrates the switching calculation, displaying the evaluation metrics and stopping point for each method. Out of a maximum of 200 learning iterations, the stopping points are 111 and 117 for the confidence-based metrics, while they are 171 and 153 for the reward-based metrics. As seen in the figure, the confidence-based switching points occur after fewer learning iterations because the epistemic uncertainty plateaus earlier than the average simulation reward.
Table~\ref{table:phys_exp_results} summarizes the experimental results. We see that the average final coverage achieved across all four stopping criteria is 88.79\%, which exceeds the average initial coverage by a factor of 1.78. Thus, all four switching conditions are well-correlated with performance in real. Plotting fabric coverage over time in Figure~\ref{fig:coverage}, we also see that 200 learning iterations---the maximum number considered---are not necessary to achieve competitive performance. Rather, our switching criteria identify earlier stopping times that yield similar final coverage to the 200-iteration comparison, saving training time.
Comparing results across the switching criteria, we see that the confidence-based metric yields significantly earlier stopping points than the simulation reward metric, which plateaus more slowly. Yet, the reward-based switching points do not result in improved physical fabric coverage relative to the confidence-based switching points. Thus, it may be that the simulation reward metric continues to fit to the simulator beyond the point where such fitting benefits physical task performance.
We also see that the epistemic uncertainty metric yields higher final coverage than the simulation reward for both the value-based and gradient-based stopping conditions. Similarly, the value-based stopping condition shows higher performance than the gradient stopping condition for both the epistemic uncertainty and simulation reward metrics. However,
it is possible that these discrepancies partially reflect noise in the behavior cloning training process, rather than an inherent difference between the switching criteria.
Further comparing the methods, Figure~\ref{fig:switch} suggests that the epistemic uncertainty exhibits less iteration-to-iteration noise than the simulation reward, while the simulation reward is easier to tune and interpret and only requires training a single behavior cloning policy (rather than a policy ensemble). Meanwhile, the value-based stopping condition is easier to tune than the gradient-based method. However, because the gradient-based stopping condition uses a time-based trend rather than individual values, it may yield more stable values and improved generalization compared to the value-based stopping condition. Testing generalizability of the stopping conditions is an interesting direction for future work.
\section{Discussion and Future Work}
This work proposes and evaluates strategies for determining when to switch from training a learning algorithm in simulation to deploying it on a physical robot. We consider metrics based on simulation performance and epistemic uncertainty and suggest stopping conditions based on absolute thresholding and gradient tracking. We apply the method to sim2real transfer for behavior cloning in a fabric smoothing task. Results suggest that our switching criteria correspond well with performance in real and that the proposed switching criteria can save training time by early stopping, which can save compute resources and help to deploy robots in the real world faster. There are many directions for future work. In particular, we will study how the switching criteria generalize across multiple simulators and tasks. We will also consider switching to real based on policy performance when transferring across simulators. Finally, we are also excited about switching to real in other algorithmic contexts, such as model-based planning and model-free reinforcement learning, as well as two-way switching between learning in simulation and in physical experiments.
\section*{Acknowledgment}
The authors would like to thank Mike Danielczuk and Justin Kerr for helpful advice. This research was performed at the AUTOLAB at UC Berkeley in affiliation with the Berkeley AI Research (BAIR) Lab, the CITRIS “People and Robots” (CPAR) Initiative, and the Real-Time Intelligent Secure Execution (RISE) Lab. The authors were supported a CRA Computing Innovation Fellowship and by equipment grants from PhotoNeo, NVidia, and Intuitive Surgical.
\renewcommand*{\bibfont}{\footnotesize}
\printbibliography
\end{document}
|
\section{Introduction}
In this paper we pick up a classic learning algorithm, the support
vector machine (SVM). Despite the impressive successes of deep learning
in particular in the areas of image and language processing, there are
still many applications in which the data does not obey a spatial or
temporal structure. Sometimes, data comes as a large table of
unstructured features. This is where classic methods like ensembles and
large margin classifiers shine. Such problems show up regularly in many
application domains like material science, medicine, bioinformatics, and
many more \cite{byvatov2003,lu2013using,ma2014}.
One of the arguably most successful methods for processing tabular data
is the support vector machine (SVM) \cite{cortes1995SVM}. From a modern
perspective, it is limited by one out of two factors. In its linear
form, training is fast, but models are limited to
linear combinations of features, which often precludes accurate
predictors. In its non-linear or kernelized form, high accuracy can be
achieved at the price of long training times, which scale roughly
quadratic with the number $n$ of data points. Since present-day data
sets are orders of magnitude larger than what was common when SVMs were
developed, this is a serious limiting factor for this otherwise highly
valuable method.
The problem of long training times was a very active research topic for
more than a decade, with considerable progress made. The most
influential SVM implementation is for sure the seminal LIBSVM software
\cite{libsvm}. It implements a variant of the sequential minimal
optimization (SMO) method, a dual subspace ascent solver
\cite{osuna1997}. It is complemented by its spin-off LIBLINEAR
\cite{liblinear}, a conceptually similar solver, specialized in training
linear SVMs. These solvers still represent the state-of-the-art for
sequential SVM training of exact solutions on a single CPU core.
Broadly speaking, there are two types of acceleration techniques going
beyond LIBSVM: approximation schemes and parallel algorithms. Most
approximations are based on the insight that restricting the extremely
rich reproducing kernel Hilbert space induced by the kernel to a much
smaller subspace often works well, in the sense that considerable
computational gains can be achieved while sacrificing only very little
predictive performance \cite{tsang2005core,rahimi2008random}. This is
particularly true if the subspace is picked in a data-driven manner
\cite{dekel2007budget,yang2012nystrom}. As an orthogonal development,
parallel algorithms aim to overcome the inherently sequential nature of
subspace ascent, either by employing primal (mini-batch) training
\cite{eigenpro}, or by resorting to heuristics~\cite{thundersvm}.
In this work, we aim to combine both approaches by designing a GPU-ready
dual coordinate ascent algorithm for approximate SVM training. To this
end, we leverage a low-rank approximation technique combined with a dual
linear SVM solver. We add vectorization, multi-core, and GPU processing
to the picture. We achieve considerable speed-ups by paying attention to
the memory organization of our solver. While several SVM solvers
implement a kernel cache, our low-rank technique combined with the large
amount of RAM available in modern server machines allows for a complete
pre-computation of the relevant matrices. We also implement a simplistic
yet robust and effective shrinking method, as well as proper support for
cross-validation and parameter tuning using warm starts. We present an
extremely fast solver suitable for large-scale SVM training on
multi-core systems with and without GPUs.
In a nutshell, our contributions are
\begin{compactitem}
\item[$\bullet$]
a GPU-ready approximate dual solver for large-scale SVM training in
minutes (instead of hours or days),
\item[$\bullet$]
a significantly better compute/memory trade-off through complete
precomputation of a low-rank matrix factor, and
\item[$\bullet$]
an robust and effective shrinking technique.
\end{compactitem}
After recalling SVMs in the next section, we summarize existing speed-up
techniques. Then we present our method and its fast implementation. We
demonstrate its power through an empirical comparison with existing
solvers, and finally draw our conclusions.
\section{Support Vector Machines}
{
\def,{,}
\catcode`\,=13
\def,{%
\ifmmode%
,\discretionary{}{}{}%
\else%
,%
\fi%
}%
\paragraph{Primal and Dual Form.~~}
An SVM constructs a decision function of the form%
\footnote{
The angle brackets denote the inner product in the kernel-induced
feature space. We drop the bias or offset term \cite{steinwart2011training}.
}
$f(x) \mapsto \langle w, \phi(x) \rangle$. It is directly suitable for
regression tasks, while its sign is considered for binary classification.
Training is based on labeled data
$(x_1, y_1), \dots, (x_n, y_n) \in X \times Y$ and a kernel function
$k : X \times X \to \mathbb{R}$ over the input space $X$. The weight vector
$w^*$ is obtained by solving the (primal) optimization
problem
\begin{align}
\min_{w \in \mathcal{H}} \quad P(w) = \frac{\lambda}{2} \|w\|^2 + \frac{1}{n} \sum_{i=1}^n \ell\big(y_i, f(x_i)\big), \label{eq:primal}
\end{align}
where $\lambda > 0$ is a regularization parameter, $\ell$ is a loss
function (usually convex in $w$, turning problem~\eqref{eq:primal} into
a convex problem), and $\phi : X \to \mathcal{H}$ is an only implicitly
defined feature map into the reproducing kernel Hilbert space
$\mathcal{H}$, fulfilling $\langle \phi(x), \phi(x') \rangle = k(x, x')$.
The representer theorem allows to restrict the solution to the form
$w = \sum_{i=1}^n \alpha_i y_i \phi(x_i)$ with coefficient vector
$\alpha \in \mathbb{R}^n$, yielding $f(x) = \sum_{i=1}^n \alpha_i y_i k(x, x_i)$.
Training points $x_i$ with non-zero coefficients $\alpha_i \not= 0$ are
called support vectors. For further details we refer the reader to the
excellent review~\cite{bottou2007solvers}.
}
For the simplest case of binary classification (with $Y = \{\pm 1\}$),
the equivalent dual problem \cite{bottou2007solvers} becomes
\begin{align}
\max_{\alpha \in [0, C]^n} \quad D(\alpha) = \mathbbm{1}^T \alpha - \frac{1}{2} \alpha^T Q \alpha. \label{eq:dual}
\end{align}
This is a box-constrained quadratic program, with the notations
$\mathbbm{1} = (1, \dots, 1)^T$, $C = \frac{1}{\lambda n}$, and
$Q_{ij} = y_i y_j k(x_i, x_j)$. Corresponding problems for regression
and ranking are of a similar form. Multi-class problems can either be
cast into a larger problem of the same type \cite{mcsvm}, or they are
handled in a one-versus-one manner~\cite{libsvm}.
\paragraph{SVM Training.~~}
Dual decomposition solvers \cite{libsvm,bottou2007solvers} are the
fastest method for training a non-linear SVM to high precision. In each
iteration, they solve a small sub-problem of constant size, which can
amount to coordinate ascent in case of problem~\eqref{eq:dual}.
The sub-problem restricted to a single dual variable $\alpha_i$
(a one-dimensional quadratic program) is solved by the truncated Newton
step
$\alpha_i \leftarrow \max\big\{0, \min\{C, \alpha_i + \frac{1 - Q_i \alpha}{Q_{ii}} \}\big\},$
where $Q_i$ is the $i$-th row of $Q$.
In the simplest case (and in all solvers relevant to
this work), the index $i$ is chosen in a round-robin fashion, possibly
in a randomized order. In elaborate solvers like LIBSVM, considerable
speed-ups can be achieved by a technique called shrinking, which amounts
to temporarily removing variables $\alpha_i$ which remain at the bounds
$0$ or $C$ and hence do not change for a long time. This technique can
reduce the number of active variables to a small subset, in particular
in the late phase of the optimization.
Most alternative solvers operate on the primal
problem~\eqref{eq:primal}. This has advantages and disadvantages. On the
pro side, even simplistic methods like mini-batch stochastic gradient
descent (SGD) \cite{pegasos} can add parallelism in the sense that
multiple data points can enter an update step. This is exploited by the
Eigen-Pro solver \cite{eigenpro}. On the con side, convergence is slow
(although finite-sum acceleration techniques are applicable in some
cases \cite{glasmachers2016finite}), while dual solvers enjoy linear
convergence \cite{lin2001convergence}. Therefore, primal solvers find
rough approximate solutions quickly, while dual methods are the method
of choice when the large margin principle is taken serious, which
requires a rather precise solution.
In any case, the iteration complexity is governed by the computation of
$f(x)$ (or equivalently, by the computation of a partial derivative of
an update of the dual gradient), which is linear in the number of
non-zero coefficients $\alpha_i$. Typically, for each non-zero
coefficient, a kernel computation of cost $\mathcal{O}(p)$ is required, where
$p$ is the dimension of the input space $X \subset \mathbb{R}^p$, or the average
number of non-zeros for sparse data. The resulting complexity of
$\mathcal{O}(n p)$ is a limiting factor for large-scale data, since the
number of support vectors grows linearly with
$n$~\cite{steinwart2003sparseness}. In contrast, for linear SVM solvers,
the iteration complexity is simply $\mathcal{O}(p)$, which is smaller by a
factor of $n$ (often in the order of $10^5$ or more).
\section{Speed-up Techniques}
\label{section:speedup}
\paragraph{Budgeted and Low-Rank Solvers.~~}
The iteration complexity of most primal as well as dual solvers is
tightly coupled to the number of non-zero summands in the weight vector
$w = \sum_{i=1}^n \alpha_i y_i \phi(x_i)$. Most approximate solvers
significantly reduce the number of terms in one way or another.
For a dataset with $n = 10^6$ points, a typical subspace is of dimension
$B=10^3$, where $B$ can be the budget or another parameter controlling
the effective feature space dimension. Such a reduction can be
interpreted as or even constructed through a low-rank approximation of
the kernel matrix~$Q$.
A low-rank method works well if and only if the optimal weight vector
$w^*$ is well preserved by the projection to the low-dimensional
subspace, in the metric induced by $Q$. The fact that low-rank
approximations aim to preserve the eigenspaces corresponding to large
eigenvalues of $Q$ explains why and when such approximations work well,
namely when the spectrum of $Q$ decays sufficiently quickly. For
kernel-induced Gram matrices, this is usually the case, see
\cite{braun2006,eigenpro} and references therein.
Random Fourier Features \cite{rahimi2008random} and related approaches
approximate the most prominent directions of the kernel feature space
$\mathcal{H}$. However, they can be inefficient since the approximation
is performed \textit{a priori}, i.e., without considering the data.
Nyström sampling methods \cite{yang2012nystrom} address this issue by
constructing a data-dependent subspace. In practice, this often amounts
to simply reducing the available basis functions $\phi(x_i)$ to a small
random subset of the training points $\{x_i\}$. Budget methods go even
further by making the subspace adaptive during training
\cite{dekel2007budget,wang2012breaking}. This can be beneficial since in
the end only a single direction needs to be represented in the feature
space, namely the optimal weight vector $w^*$, which is however known
(approximately) only in a late phase of the training process. Budget
methods can be very efficient \cite{qaadan2019}, but they are hard to
parallelize due to their budget maintenance strategy, which usually
amounts to merging support vectors~\cite{wang2012breaking}.
Many different training schemes were designed along these lines. We can
generally differentiate between two-stage methods in which the
construction of the feature space and the training procedure are
separated, and single-stage methods in which the two tasks are performed
simultaneously. This distinction is generally useful, although it
ignores a few variants like lazy learning schemes
\cite{kecman2010locally}. Generally speaking, two-stage methods like
LLSVM \cite{llsvm} put considerable effort into constructing a suitable
subspace and precomputing the projection of the feature vectors into
that subspace. This has the advantage that the second stage reduces to
training a \emph{linear} SVM, which is relatively fast (although with an
iteration complexity of $\mathcal{O}(B)$ instead of $\mathcal{O}(p)$, usually with
$B > p$, but still independent of $n$). In contrast, single-stage
approaches save the initial cost and pay the price of non-linear SVM
training, in the hope that the initial saving amortizes. The latter
strategy is generally applied by budget approaches.
\paragraph{GPU-ready Parallel Solvers.~~}
The first GPU-ready SVM solver with a significant impact was ThunderSVM
\cite{thundersvm}. It is a parallel dual subspace ascent method.
Algorithmically, it simply performs the same computations as LIBSVM, but
it executes many subspace ascent steps in parallel. The steps are damped
in order to avoid overshooting, but since there does not seem to be any
rigorous justification (like a convergence proof) for the method, it
should be considered a heuristic. Yet, in practice, it works very
reliably, and it represents considerable progress over LIBSVM's
sequential solver. To the best of our knowledge, it is the only
GPU-ready SVM solver using a dual training scheme.
The EigenPro method \cite{eigenpro} contrasts ThunderSVM im many
aspects. The solver is based on modern deep learning frameworks (there
are Tensorflow and PyTorch versions). Training is based on SGD on the
primal problem. This naturally leverages opportunities for parallelism
by means of mini-batch gradient descent, which comes with convergence
guarantees, although at a slower rate than dual methods. Moreover,
EigenPro is already an approximate solver. It is based on eigen
decomposition of a sub-matrix of $Q$ (based on a random subset of the
data, see Nyström sampling above). On this matrix it performs a
whitening operation. This brings a decisive speedup, since it removes
most of the ill-conditioning from the resulting optimization problem,
which hence becomes much easier to solve with first order methods like
SGD.
\section{A Low-rank Parallel Dual SVM Solver}
\label{section:method}
We aim to combine three types of approaches: (1) we would like to build
on the fast convergence of dual solvers, (2) we would like to achieve
the fast iteration complexity of budget and low-rank methods, and (3) we
aim for an algorithm with GPU-friendly computations. Any combination of
two out of three goals was already demonstrated in the past, see
\cite{qaadan2019,eigenpro,thundersvm}.
In the design of such a method, the following considerations and
trade-offs need to be taken into account:
\begin{itemize}
\item[$\bullet$]
The matrix $Q$ is of size $n \times n$. For large data sets with
millions of points, it does not fit into the RAM even of high-end
server machines. Therefore, existing solvers either work with a
(row/column-based) kernel cache, or they restrict training to chunks
of data for a while, before moving on to the next chunk. However
with a budget $B \ll n$ in place, a factor $G$ of a low-rank
approximation of $G G^T \approx Q$ is only of size $n \times B$. For
$B \approx 10^3$ and $n \approx 10^6$, such a matrix fits into the
available memory of a laptop with 8~GB RAM. For server machines with
large amounts of RAM, we can even afford two orders of magnitude
more (e.g., $B \approx 10^4$ and $n \approx 10^7$). At the time of
writing (March 2022), our largest server machine is equipped with
512~GB of RAM, while current high-end GPUs come with up to 80~GB of
RAM. In other words, a complete pre-computation of a low-rank factor
$G$ becomes feasible even for large%
\footnote{
These are surely not be the largest data sets in existence, but
they are definitely large by the standards of the SVM literature.}
data sets.
\item[$\bullet$]
As a side effect, whitening the matrix $G G^T$ comes nearly for free
based on the eigen decomposition of a $B \times B$ sub-matrix of
$Q$, which is needed anyway for the computation%
\footnote{
A Cholesky decomposition is an attractive alternative at first
glance, but since kernel matrices can be ill-conditioned, it
regularly runs into numerical problems by requiring \emph{strict}
positive definiteness.}
of the factor $G$. This is akin to the EigenPro method, but less
relevant in our setting, since the dual coordinate ascent solver is
not affected by the bad conditioning of the primal problem. On the
other hand, it is relevant that for some data sets we find a highly
skewed eigenvalue spectrum.
As soon as the eigenvalues fall below a threshold close the machine
precision times the largest eigenvalue, the subspaces are subject to
strong numerical noise while contributing only minimally to the
kernel computation. This allows us to drop such components, which
further reduces the effective dimension (adaptively) and hence
allows us to process even larger data sets.
\item[$\bullet$]
Pre-computing the kernel matrix precludes otherwise effective budget
maintenance techniques like merging of support vectors, since
merging alters $Q$ (and hence $G$) in a non-linear and
kernel-dependent fashion. Therefore we settle on a fixed (yet data
dependent) feature space representation based on a random sample.
This turns out to be equivalent to the second-most attractive budget
maintenance strategy: projection onto the remaining support vectors
\cite{wang2012breaking}. The difference is that all projections are
pre-computed, hence avoiding an $\mathcal{O}(B^3)$ operation per SMO
step.
\item[$\bullet$]
The precomputation of $G$ effectively turns our approach into a
two-stage method. Performing a SMO step followed by a
projection-based budget maintenance operation is exactly equivalent
to performing a SMO step with an approximate kernel, which is given
by $G G^T$ instead of $Q$. The second stage indeed reduces to
solving a linear SVM problem where the original data points are
replaced with the rows of~$G$.
\item[$\bullet$]
The excellent study \cite{liblinear} and also our own experience
clearly indicate that dual methods are generally superior to primal
SGD-based solvers for obtaining SVM solutions of high quality.
Therefore we apply a dual coordinate ascent solver, despite the fact
that it offers fewer opportunities for parallelization. This
decision is made in the expectation that the faster convergence in
combination with additional opportunities for parallelization make
up for it.
\end{itemize}
As indicated above, a large number of approximate SVM training schemes
was already proposed in the literature. Therefore it is not surprising
that we arrived as a solution that is related to existing approaches.
Our solver has conceptual similarity with the low-rank linearization SVM
(LLSVM) \cite{llsvm}, in the sense that it performs the same type of
computations. LLSVM was proposed 10 years ago. Although the two-stage
approach looks quite similar at first glance, there are major and highly
relevant differences:
\begin{compactitem}
\item[$\bullet$]
LLSVM builds a model based on relatively few but carefully selected
``landmark'' points, by default 50. However, in our experience, the
budget size should be in the order of hundreds or better thousands
in order to achieve a sufficiently good approximation.
\item[$\bullet$]
LLSVM performs training by iterating over the data set only once,
where linear SVM training proceeds in chunks of 50,000 points. In
order to make good use of the precomputed kernel values, 30 epochs
are performed within each chunk. Hence, each point is used exactly
30 times, irrespective of the achieved solution accuracy. In
contrast, in our solver, a standard stopping criterion (similar to
\cite{liblinear}) is employed to detect convergence.
\item[$\bullet$]
We remove the concept of chunks altogether and instead demand that
the full matrix $G$ fits into memory. This leverages the
capabilities of today's compute servers, simplifies the design, and
maybe most importantly, it enables fast convergence to the optimal
solution corresponding to the low-rank kernel represented by~$G$ and
the application of a corresponding stopping criterion.
\item[$\bullet$]
We implement all steps of the solver in a multi-core and GPU-ready
fashion.
\end{compactitem}
\paragraph{Algorithm Overview.~~}
The resulting algorithmic steps with their two-stage organization are
depicted in figure~\ref{figure:algo}. We call the resulting algorithm
\emph{low-rank parallel dual (LPD)} SVM. For a GPU implementation, it is
important to design all processing steps in such a way that they work in
a streaming fashion, at least for cases in which $G$ fits into CPU
memory but not into GPU memory (this is similar to but not as
restrictive as the chunking approach of LLSVM). The ability to split all
computations into smaller chunks is also important when leveraging
multi-GPU systems.
The multi-stage approach allows for considerable freedom. To this end,
both stages (computation of $G$ and linear SVM training) can be
performed by CPU and GPU, at the discretion of the user. This also holds
for the prediction step (not shown), which is absent in training, but
active in the prediction, test, and cross-validation modes of our
software.
\begin{figure}[b]
\begin{center}
\psfrag{phase 1}[c][c]{\small phase 1: precomputation of $G$}
\psfrag{phase 2}[c][c]{\small phase 2: linear training}
\psfrag{1a}[l][l]{\scalebox{0.7}{\begin{minipage}{52pt}compute the kernel matrix $K$ of size $B \times B$ on a random subset of the data\end{minipage}}}
\psfrag{1b}[l][l]{\scalebox{0.7}{\begin{minipage}{52pt}compute the eigen decomposition $K = U D U^T$\end{minipage}}}
\psfrag{1c}[l][l]{\scalebox{0.7}{\begin{minipage}{52pt}compute the factor $L = U \sqrt{D^{-1}}$ of the inverse kernel matrix\end{minipage}}}
\psfrag{1d}[l][l]{\scalebox{0.7}{\begin{minipage}{52pt}compute the kernel matrix $Z$ between random subset and all points; set $G = Z L$\end{minipage}}}
\psfrag{2a}[l][l]{\scalebox{0.7}{\begin{minipage}{52pt}compute $f(x_i) = G_i w$\end{minipage}}}
\psfrag{2b}[l][l]{\scalebox{0.7}{\begin{minipage}{52pt}update $\alpha_i$ (truncated Newton step)\end{minipage}}}
\includegraphics[width=\textwidth]{algo.eps}
\end{center}
\caption{
\label{figure:algo}
Algorithm design as a two-stage method.
}
\end{figure}
\paragraph{Shinking.~~}
LIBSVM pays considerable attention to ``details'' like efficient caching
and shrinking. Due to complete precomputation of $G$, we do not have a
need for a kernel cache. However, shrinking plays an important role. The
heuristic implemented in LIBSVM is known to be somewhat brittle, but it
can be very effective when working well. We opt for a simplistic
strategy: if a variable was not changed for $k$ steps in a row (we use
$k=5$) then we remove the variable from the problem, and we dedicate a
fixed fraction $\eta$ of the total computation time (say, $\eta = 5\%$)
to checking whether removed variables should be reconsidered. This
heuristic turns out to be far more robust than LIBSVM's strategy which
lacks a systematic way of re-activating variables. We will see in the
next section that shrinking considerably accelerates the linear SVM
training phase.
\paragraph{Cross Validation, Parameter Tuning, and Multi-Class Training.~~}
In reality, we rarely train a single SVM. Kernel SVMs have parameters
like the kernel bandwidth and the regularization parameter $C$
(or $\lambda$) which absolutely need tuning in order to deliver top
performance. While powerful parameter tuning procedures based on
(Bayesian) optimization are widely available, for low-dimensional
problems like this, a simple grid search does the job. It brings the
additional benefit that multiple SVMs are trained with the same kernel,
which allows to reuse the matrix $G$ and hence the complete first stage
of the solver. The same applies to cross-validation: we simply fix the
feature space representation once for the whole data set, pre-compute
$G$, and only then sub-divide the data into folds.%
\footnote{
While this proceeding may yield a slightly optimistic bias (since some
basis vectors may stem from the validation set), it is perfectly
suitable for parameter tuning (since all parameter settings profit in
the same way), and offers a considerable computational advantage.}
Also, when searching a grid of growing values of $C$, we warm-start the
solver from the optimal solution of the nearest value of $C$ already
completed. None of these techniques is novel, but they are rarely
implemented, although they yield considerable speed-ups. In our solver
their role goes well beyond pure convenience, since many linear training
runs can share the first stage of the computation.
A further important point is the handling of classification problem with
more than two classes. In this regard we follow the design of LIBSVM
\cite{libsvm}, which implements a one-versus-one approach. We do this
for the following reason: one-versus one means that independent SVMs are
trained to separate each pair of classes. What sounds like an immense
burden at first, since the number of pairs grows quadratically with the
number of classes, is more than alleviated by the fact that the
sub-problems are relatively small. Moreover, creating independent
sub-problems is a welcome opportunity for parallelization. For an
in-depth discussion of the pros and cons of this approach we refer the
interested reader to \cite{dogan2016unified}.
In our experiments we demonstrate high efficiency of this scheme on
problems with up to 1000 classes, corresponding to roughly half a
million pairs of classes.
\paragraph{Multi-core and GPU Implementation.~~}
Our implementation uses parallelism at three levels: vectorization
within each single CPU core (implemented by the highly optimized Eigen
C++ library\footnote{\url{https://eigen.tuxfamily.org/}}), multi-core
parallelism (using OpenMP\footnote{\url{https://www.openmp.org/}}),
and GPU parallelism (using CUDA\footnote{\url{https://developer.nvidia.com/}}).
For the latter technology, we distinguish between a single streaming
multiprocessor (SM) and a full GPU. We even implement multi-GPU support
for problems where it makes sense, i.e., if there is sufficient
opportunity for parallelism.
In the first stage of computing $G$, the computationally heavy steps are
batch kernel computation, eigen decomposition, and matrix-matrix
products. All of these are extremely efficient on the GPU, using our own
CUDA kernels, the {cuSOLVER} library, and the {cuBLAS} library,
respectively. On the CPU, we rely on Eigen, and we distribute chunks to
multiple CPU cores using OpenMP. For all of these steps, the GPU turns
out to be far superior to the CPU.
Sadly, ThunderSVM and EigenPro seem to lack proper support for sparse
data, which is commonly encountered in the SVM context. For EigenPro
(relying on deep learning software backends) this is understandable,
since the focus is on images and similar data, which is usually dense.
However, also ThunderSVM converts data to a dense format for kernel
computations. The simple reason is that for most general-purpose kernels
in common use (polynomial, Gaussian and hyperbolic tangent), batch
kernel operations require a matrix-matrix multiplication at their core.
It seems that only specific cases of such products are implemented in
existing GPU libraries, including {cuSPARSE}. In our solver, we
implemented all kernel operations based on efficient sparse matrix
products. For CPU-based processing we rely on the Eigen C++ library,
while for (far more efficient) GPU-based processing, we implemented
sparse matrix products as custom CUDA kernels.
In the second stage of linear SVM training, the trade-offs turn out to
be quite different. In contrast to ThunderSVM, all kernels are
precomputed in the first stage. This is a logical and efficient step,
but it removes most opportunities for parallelism. While ThunderSVM
needs to process $n \cdot p$ floating point values per data points
(where $p$ is the dimension of the input space $X \subset \mathbb{R}^p$), we
only need to handle $B$ values. Although removing opportunities for
parallelism, this is still a great acceleration, since the old wisdom
that the fastest computation is the one that does not run at all still
holds.
As a result, a single SMO (coordinate ascent) step runs extremely fast
on a single CPU in a fully vectorized fashion. The corresponding GPU
implementation is somewhat slowed down by the need for a parallel
reduction operation. Also, the relatively low amount of parallelism
precludes the use of more than one SM on the GPU, since a single SM can
maintain the current weight vector in its fast scratchpad memory, while
the communication cost of multiple SMs would slow down the extremely
fast SMO loop. For current CUDA architectures this means that a total of
``only'' 1024 threads cooperate by computing $B$ summands per data
point or dual variable. To make the orders of magnitude clear: in our
solver, for a realistic value like $B=10^3$, each CPU core performs
several \emph{million} coordinate ascent steps per second. At that pace,
multi-core communication would incur an unacceptable overhead, and the
same holds when communicating between multiple SMs within a GPU.
This leaves us with the (luxury) problem of fully leveraging server
GPUs, which come with more than 100 SMs each. With a single training
run of a binary classification problem this is simply not possible, and
CPU-based training should be preferred. However, when performing even
only a tiny $5 \times 5$ grid search using $10$-fold cross validation on
a 10-class dataset like MNIST, we need to train a total of $5 \times 5
\times 10 \times \binom{10}{2} = 11,250$ binary SVMs: one for each
parameter vector, one for each hold-out set, and one for each pair of
classes. This is far more parallelism than we need to fully exploit even
multiple GPUs at the same time, while the first stage needs to run only
five times (once for each kernel parameter).
Making predictions is relatively fast compared with training. One
decisive difference is that predictions can be computed in parallel, so
that for this task, the GPU is vastly superior to the CPU. Our
implementation therefore defaults to the following behavior: computation
of $G$ and prediction are performed by the GPU and SMO training runs on
the CPU. This is confirmed in the next section as a solid default.
\paragraph{Recipe.~~}
In summary, our approach has conceptually close predecessors in the
existing literature, which we polish up far beyond aesthetics by adding
shrinking, a meaningful stopping criterion, warm starts, and proper
support for cross-validation and parameter tuning. We put considerable
effort into exploiting parallelism in all stages of the solver on CPU
and GPU. Finally, we arrive at quite different trade-offs than older
solvers through a combination of large available memory and memory
saving techniques, in particular the low-rank approach, and by
discarding small eigen values. This is how we arrive at the recipe
\emph{``polishing, parallelism, and more RAM''}
for fast large-scale SVM training.
\section{Experimental Evaluation}
The main evidence for the value of our methodology is of empirical
nature. We present experimental results to answer the following research
questions:
\begin{compactitem}
\item[$\bullet$]
How fast is our approach compared with existing solvers?
\item[$\bullet$]
How scalable is our approach, in particular for multi-class problems?
\item[$\bullet$]
How do the various computational components perform on multi-core
CPUs and on high-end GPUs?
\item[$\bullet$]
How does shrinking impact performance?
\end{compactitem}
\begin{table}
\begin{center}
{\renewcommand{\arraystretch}{1.2}
\begin{tabular}{|@{~}l@{~}|@{~}r@{~}|@{~}r@{~}|@{~}r@{~}|@{~}r@{~}|@{~}c@{~}|@{~}l@{~}|}
\hline
\textbf{data set} & \textbf{file size} & \# \textbf{classes} & \textbf{size} $n$ & \textbf{budget} $B$ & \textbf{regular.} $C$ & \textbf{kernel} $\gamma$ \\
\hline
Adult (a9a) & 2.3~MB & 2 & 32,561 & 1,000 & $2^5$ & $2^{-7}$ \\
Epsilon & 12~GB & 2 & 400,000 & 10,000 & $2^5$ & $2^{-4}$ \\
SUSY & 2.4~GB & 2 & 5,000,000 & 1,000 & $2^5$ & $2^{-7}$ \\
MNIST-8M & 12~GB & 10 & 8,100,000 & 10,000 & $2^5$ & $2^{-22}$ \\
ImageNet & 59~GB & 1000 & 1,281,167 & 1,000 & $2^4$ & $2^{-24}$\\
\hline
\end{tabular}
}
\end{center}
\caption{
\label{table:datasets}
Data sets used in this study, including tuned hyperparameters.
}
\end{table}
\paragraph{Experimental Setup.~~}
We trained SVMs on one mid-sized and four large data sets, see
table~\ref{table:datasets}. The first four data sets are available from
the LIBSVM website.%
\footnote{\url{https://www.csie.ntu.edu.tw/~cjlin/libsvmtools/datasets/}}
The ImageNet data set \cite{imagenet} can be obtained for free for
non-commercial research.%
\footnote{\url{https://www.image-net.org/}}
We turned it into an SVM training problem by propagating the images
through a pre-trained VGG-16 network (shipped with keras) and extracting
the activations of the last convolution layer, which is of dimension
25,088. The resulting feature vectors are sparse due to the ReLU
activation function.
We used the Gaussian kernel $k(x, x') = \exp(-\gamma \|x-x'\|^2)$ in all
experiments. The hyperparameters $C$ and $\gamma$ were tuned with
grid-search and cross-validation.
All timings were measured on a compute server with 512~GB of RAM, two
Intel Xeon 4216 CPUs (up to 64 concurrent threads), and four NVIDIA A100
GPUs (40~GB RAM each).
In the spirit of open and reproducible research, our software is
available under a permissive open-source BSD-3-clause license.%
\footnote{\url{https://github.com/TGlas/LPD-SVM}}
\begin{table}
\begin{center}
{\renewcommand{\arraystretch}{1.2}
\begin{tabular}{|@{~}l@{~}|@{~}l@{~}|@{~}r@{~}|@{~}r@{~}|@{~}r@{~}|@{~}r@{~}|@{~}r@{~}|}
\hline
\textbf{solver} & \textbf{indicator} & \textbf{Adult} & \textbf{Epsilon} & \textbf{SUSY} & \textbf{MNIST-8M} & \textbf{ImageNet} \\
\hline
LLSVM & training & $1.51$ & $48.38$ & $71.93$ & --- & --- \\
& prediction & $0.25$ & $23.84$ & $29.98$ & --- & --- \\
& error & $27.3$ & $50.0$ & $27.52$ & --- & --- \\
\hline
ThunderSVM & training & $2.25$ & $5,315$ & $14,604$ & $7,517$ & $>42$ hours \\
& prediction & $1.42$ & $470.51$ & $5,128$ & $11.07$ & --- \\
& error & $14.92$ & $8.70$ & $19.99$ & $0.95$ & --- \\
\hline
LPD-SVM & training & $2.11$ & $89.86$ & $197.64$ & $868$ & $1,402.86$ \\
& prediction & $1.62$ & $12.94$ & $1.22$ & $2.08$ & $36.22$ \\
& error & $14.77$ & $9.85$ & $20.08$ & $1.20$ & $37.52$ \\
\hline
\end{tabular}
}
\end{center}
\caption{
\label{table:performance}
Performance results of the different solvers: training and prediction time (seconds),
and classification error (in percent). LLSVM is not applicable to data sets with more
than two classes. ThunderSVM training on ImageNet stopped after 42 hours with an
out-of-memory error. At that point, training was about 83\% complete. For LLSVM, we
observed huge random deviations of predictive performance (about $\pm 13.6\%$ for
Adult and about $4.6\%$ for SUSY). In the table, we report mean values. Also the best
values are not competitive compared with the other solvers.
}
\end{table}
\paragraph{Comparison with Existing Solvers.~~}
We aimed to compare with the following solvers:
ThunderSVM,\footnote{\url{https://github.com/Xtra-Computing/thundersvm}}
EigenPro,\footnote{\url{https://github.com/EigenPro}}
and LLSVM.\footnote{\url{https://github.com/djurikom/BudgetedSVM}}
However, we failed to make (the PyTorch version of) EigenPro deliver
meaningful results beyond the built-in MNIST example. On the chosen
data sets, it seems to be quite sensitive data scaling, resulting in
numerical instability. Despite our disappointment, we had to exclude
EigenPro from the comparison. We therefore present performance data for
ThunderSVM, LLSVM, and our own method LPD-SVM in
table~\ref{table:performance}. The same data is displayed graphically
in figure~\ref{figure:performance}.
First of all, while being quite fast (provided that only a single CPU
core is used), LLSVM fails to deliver sufficiently accurate solutions.
On the Epsilon problem, it consistently yields guessing accuracy (50\%
error). This is for its non-adaptive stopping rule, which does not check
for convergence. It is of course easy to be fast if the job is not
complete. This seems to be the case for LLSVM.
In terms of accuracy, LPD-SVM comes quite close to the (nearly exact)
solutions obtained by ThunderSVM. On the Epsilon problem, we pay for the
budget approximation with an increase of the error of a bit more than
one percent, while in the other cases, error rates are quite close. This
slight loss of predictive performance is expected and in line with the
general experience with low-rank approximations in the SVM literature.
\begin{figure}
\begin{center}
\includegraphics[width=0.8\textwidth]{trainingtimes.eps}
\end{center}
\caption{
\label{figure:performance}
Plot of the timing data from table~\ref{table:performance} on a logarithmic scale.
}
\end{figure}
At the same time, LPD-SVM systematically outperforms ThunderSVM in terms
of speed, both at training and at prediction time. This is particularly
true for the large data sets where the low-rank approach makes a
decisive difference by lowering the iteration complexity considerably.
We see experimentally that the net difference is roughly one to two
orders of magnitude. For the simple scenario of training a single SVM
classifier, the GPU cannot be fully utilized during training. Hence, the
speed-up over ThunderSVM is fully attributed to the low-rank approach.
\paragraph{Multi-Class SVM Training.~~}
We did not achieve a competitive error rate on the ImageNet problem (the
VGG-16 network performs better). Here, we are mostly interested in
investigating the scaling of our solver to problems with many classes.
Indeed, it takes LPD-SVM only about 24 minutes to train nearly half a
million large-margin classifiers. This corresponds to less than $3$
milliseconds per binary problem.
It seems safe to conclude that---at least computationally---the
one-versus-one approach is very well suited for training large-scale
SVMs.
\paragraph{CPU vs.\ GPU Performance.~~}
When looking at the specifications of modern server CPUs and GPUs then
one would expect the GPU to clearly dominate. However, despite our
effort of implementing an efficient SMO solver natively on the GPU with
custom CUDA kernels, CPUs are still a better match for the inherently
sequential dual algorithm than GPUs. In our empirical data, the CPU wins
the race on both data sets where $G$ fits into GPU memory, and in the
other three cases GPU-based training is not an option at all. The GPU
cannot play its strengths for the simple reason that the SMO loop is
memory-bound, not compute-bound (it is dominated by computing inner
products of vectors of dimension $B$, which is a far too low dimension
for the GPU). While the GPU has a larger net memory throughput, the CPU
has a faster clock speed, more efficient caches, and a very effective
pre-fetching mechanism.
\begin{figure}
\begin{center}
\includegraphics[width=0.8\textwidth]{breakdown.eps}
\end{center}
\caption{
\label{figure:breakdown}
Timing breakdown into the three stages ``preparation'' (red;
first three steps in figure~\ref{figure:algo}), ``computation of
the matrix $G$'' (green; step four in figure~\ref{figure:algo}),
and ``linear SVM training'' (magenta), on CPU (bright) and GPU
(dark). All durations are in seconds, depicted on a logarithmic
scale. For two data sets, training times on the GPU are
missing since the matrix $G$ does not fit into GPU memory.
}
\end{figure}
That being said, the overall role of the GPU must not be
under-estimated. It vastly reduces the cost for preparing the matrix
$G$, which can otherwise be the dominant cost on the CPU, and it also
speeds up predictions. This way, the two types of processors (CPU and
GPU) contribute jointly to fast training. If any of the two is dropped
then the overall training times increase significantly.
Figure~\ref{figure:breakdown} gives a more detailed picture by breaking
down the timings of the different stages for GPU and CPU. It becomes
clear that the GPU is far more suitable for the preparation of $G$ and
for making predictions, while the CPU outperforms the GPU for SMO
training. This holds true even for the Imagenet problem where all
$4 \times 108 = 432$ GPU processors are running SMO loops in parallel,
as compared with $64$ CPU cores.
It can also be observed that the trade-offs presented by the two-stage
approach differ quite significantly between data sets, and depending on
whether computations are carried out on CPU or GPU. When using the GPU
then the first stage is generally faster than the second stage, which
means that the investment made in the first stage amortizes. However,
when solving the Epsilon problem completely on the CPU, this is not so
clear, since the computation of $G$ takes the lion's share of the time.
\paragraph{Shrinking.~~}
We evaluate our shrinking algorithm by simply turning it on or off and
measuring the optimization time. In order to achieve clean results, we
restrict time measurements to the second phase (SMO training). Based on
prior experience, we expect shrinking to yield a speed-up in general,
but on the other hand, wrong shrinking decision can cost performance. It
turns out that shrinking is a complete game-changer: without shrinking,
the training time for the Adult data increases by factor 220, while for
Epsilon it increases by factor of 350. Due to excessive training times,
we did not perform the test for all data sets. This impressive speed-up
is in part due to the fact that after removing many variable for fine
tuning in the late phase of the optimization, at memory demand for the
relevant sub-matrix of $G$ reduces and the processor cache becomes for
effective.
\paragraph{Parameter Tuning and Cross-Validation.~~}
We tested the ability of our solver to support hyperparameter grid
search and cross-validation as follows. For $\log_2(C)$, we defined the
grid $\{0, 1, \dots, 9\}$, and we varied $\log_2(\gamma)$ in the range
$\{g^*-2, g^*-1, g^*, g^*+1, g^*+2\}$, where $g^* = \log_2(\gamma^*)$ is
the optimal value, see the rightmost column of table~\ref{table:datasets}.
For each hyperparameter setting, we performed 5-fold cross validation.
Hence, we trained a total of $N = 250 \cdot \binom{c}{2}$ binary SVMs,
where $c$ is the number of classes of the problem. The results are found
in table~\ref{table:multiple}. It lists the total time, the time per
binary problem (the first value divided by $N$), and the speed-up, which
is estimated from the training time from table~\ref{table:performance}
divided by the time per binary problem.
\begin{table}
\begin{center}
{\renewcommand{\arraystretch}{1.2}
\begin{tabular}{|@{~}l@{~}|@{~}r@{~}|@{~}r@{~}|@{~}r@{~}|@{~}r@{~}|}
\hline
\textbf{} & \textbf{Adult} & \textbf{Epsilon} & \textbf{SUSY} & \textbf{MNIST-8M} \\
\hline
total time & $247.43$ & $2,837$ & $28,163$ & $84,600$ \\
time per binary problem & $0.99$ & $11.34$ & $112.65$ & $7.52$ \\
speed-up & $\times 2.1$ & $\times 7.3$ & $\times 1.75$ & $\times 2.6$ \\
\hline
\end{tabular}
}
\end{center}
\caption{
\label{table:multiple}
Timings of the hyperparameter search and cross-validation
experiments. All times are in seconds.
}
\end{table}
The speed-up is around a factor of two in most cases, and more than
seven for the Epsilon data. This is in part because the first stage
needs to run only five times (once for each value of $\gamma$), while
previous computations can be reused for the remaining $N-5$ training
runs. This reuse of the precomputation of $G$ is only responsible for
one part of the speed-up, while another part comes from warm-starts
with solutions corresponding to smaller values of~$C$, and from a
better utilization of the compute resources (cores).
\paragraph{Discussion.~~}
Our experimental findings answer our research questions as follows. The
proposed LPD-SVM is extremely fast, with a speed-up of roughly one to
two orders of magnitude over ThunderSVM on large problems. This is
despite the fact that the SMO loop runs on the CPU. LPD-SVM suffers only
a minimal increase of error rates due to the budget approach. It scales
very well to multi-class problems with many classes. We see performance
gains from properly implemented cross-validation and grid search, and
our shrinking algorithm turns out to be extremely effective. We believe
that these results are a valuable addition to the state of the art, and
that our solver provides an interesting alternative existing SVM
software.
\section{Conclusion}
We have presented a GPU-ready SVM solver optimized for compute servers,
called \emph{Low-rank Parallel Dual} (LPD) SVM. It fits into the common
framework of low-rank or budgeted schemes for approximate SVM training.
It takes the typical capabilities of modern server machines into
account: large random access memory, many-core CPUs, and high-end server
GPUs. We demonstrate its potential on a number of large-scale data sets,
achieving state-of-the-art results.
\subsubsection{Acknowledgements}
This work was supported by the Deutsche Forschungsgemeinschaft under
grant number GL 839/7-1.
|
\section{Introduction}
This note discusses a model-free, data-driven
method of managing a portfolio of financial instruments such
as stock, FX, securities and derivatives
with \emph{reinforcement learning} "AI" methods.
It is a dynamic programming ``Bellman" version of our
Deep Hedging approach~\cite{DH}. The key characteristics of our Deep Hedging framework above
several other proposed methods are the ability to hedge with derivatives such as forwards, swaps, futures, options;
incorporation of trading frictions such as trading cost and liquidity constraints;
applicability for any reasonable portfolio of financial instruments; realistic, continuous state and action spaces;
and formal risk-adjusted return objectives. However, our original approach
solved this problem for a given initial portfolio and market state.
That means that it needs to be re-trained, say, daily to reflect changes in our
trading universe or the market.
The method
proposed here, on the other hand, attempts to solve the optimal hedging problem for any portfolio and market state, as long
as they are reasonably close to the data used to train the model.
The work presented here is an extension of
our patent application~\cite{PATENT_DH}.
The main contribution is to provide
a numerical implementation method for the practical problem of being able to represent
arbitrary portfolios of derivatives as states using purely historic data. We also clarify conditions
under which the corresponding Bellman equation is well-posed and
admits finite solutions.
\subsubsection*{Quant Finance 2.0}
The motivation for the work presented in this article -- and of the Deep Hedging framework in
general -- is to build financial risk management models which ``learn" to trade from historic
data and experiences. Today, portfolios of derivatives, securities and other instruments
are managed using the traditional quantitative finance engineering paradigm borne out of the seminal work by
Black, Scholes~\& Merton. However, practical experience on any trading desk is that
such models do not perform sufficiently well to be automated directly. To start with, they
do not take into account trading frictions such as cost and liquidity constraints. Even beyond
that they suffer from the underlying engineering approach which prioritizes a focus on interpolating
hedging instruments such as forwards, options, swaps over realistic market dynamics.
It is an indication of the state of affairs that standard text books on financial engineering
in quantitative finance do not discuss real data out-of-sample performance of the models proposed.
As a result,
the prices and risk management signals (``greeks") are overly simplistic and do not capture
important real-life dynamics. A~typical trader will therefore need to overwrite the prices and
trading signals
from such as standard models with their own heuristics.
Our \emph{Deep Hedging} framework takes a different approach and focuses on robust performance
under real-life dynamics, enabed by the use of modern machine learning techniques.
The current article is the closest attempting to mimicing a trader's real life behaviour
in that here we will give an AI the same historic ``experience" a real trader would have.
Of course, our model will still be limited by the coverage of historic scenarios used
to train it. Hence, human oversight is still required to cater for abrupt changes in
market scenarios or starkly adverse risk scenarios.
The website \texttt{http://deep-hedging.com} gives an overview over available material on the
wider topic.
\subsubsection*{Related Works}
There a few related works concerning the use of machine learning methods for
managing portfolios of financial instruments which include derivatives, starting with our
own~\cite{DH}. However, there we solved the optimal trading problem for a fixed initial portfolio
and a fixed initial market state using \emph{periodic policy search}, a method akin to ``American Monte Carlo".
In~\cite{RITTER_VOL} the authors discuss the use of Bellman methods for this task, namely using DQN
and a number of similar methods. They also use risk-adjusted returns in the form of a mean-variance
objective. However, in their work the state and action spaces are
finite which are not realistic in practise. Moreover, their parametrization of the derivative
portfolio is limited to single vanilla options. They also do not cover derivatives as hedging instruments.
In~\cite{IGOR_DQN} the authors also develop a discrete state approach,
where the problem is solved for each derivative position separately. The authors focus in
their first work on vanilla options and minimize the terminal variance of the delta-hedged position.
In their later~\cite{IGOR_DQN2} the authors present methods to smooth the state space.
In neither account are derivatives as hedging instruments supported.
There is a larger literature on the application of AI methods for managing portfolio risks in the context
of perpetual assets such as stock and FX portfolios which might reasonably be approximated
by normal assets. See the summary~\cite{RITTER_SUMMARY} for an overview, where they also cover
the related topic of trade execution with AI methods.
Underlying our work is the use of \emph{dynamic risk measures}, a topic
with a wide literature. We refer the interested reader to~\cite{CONDCRM} and~\cite{PENNER}
among many others.
\section{Deep Bellman Hedging}
In this note we will use a notation much more similar to standard
reinforcement learning literature, chiefly~\cite{SUTTON}. That means
in particular that we will formulate our approach essentially
as a continuous state Markov Decision Process (MDP) problem. We will make a decision
from some point in time to another. That would typically be intraday or from day to day.
To simplify our discussion we will assume we are making a decision ``today"
and then again ``tomorrow". Variables which are valid tomorrow
will be denoted by~$'$. We will strive to use bold letters for
vectors. A~product of two vectors is element wise, while ``$\cdot$"
represents the dot product. We will strive to use small letters
for instances of data, and capital letters for random variables.\\
We denote by~$\mm$ the \textbf{market state} today. The market contains all information available to us today such as
current market prices, time, past prices, bid/asks, social media feeds and the like. The set of all market states is
denoted by~$\calM\subset \R^N$.
All quantities observed today are a function of the market state.\footnote{
Mathematically, we say that~$\mm$ generates today's $\sig$-algebra.
}
The market tomorrow is a random variable $\mM'$
whose distribution is assumed to only depend on~$\mm$,
and not on our trading activity.\footnote{
See the lecture notes~\cite{LECTURE3} for an example
of incorporating market impact.
}
In terms of notation, think $\mm\equiv \mm_t$ and
$\mM'\equiv \mM_{t+1}$.
The expectation operator of a function~$f$ of $\mM'$ conditional
on $\mm$ is written as~$\E[f(\mM')|m]:=\int f(\mm') \P[d\mm'|\mm]$.
We will trade financial instruments such as securities, OTC derivatives
or currencies. We will loosely refer to them as ``derivatives"
as the most general term, even if we explicitly include primary
asset such as stocks and currencies. We use~$\calX$ to refer to the
space of these instruments.
For~$x\in\calX$ we denote by $r(x,\mm)\in\R$ the cashflows arising from holding~$x$ today, aggregated
into our accounting currency.\footnote{This implies
implies that spot-FX transactions
are frictionless.}
Cashflows here cover everything from expiry settlements, coupons, dividends, to payments
arising from borrowing or lending an asset.
For a vector $\mx$ of instruments we use $
\mr(\mx;\mm)$ to denote the vector of their cashflows.
An~instrument changes with the passage of time: an instrument~$x\in\calX$ today
becomes $x'\in\calX$ tomorrow, representing only cashflows from tomorrow onwards.
If the expiry of the instrument is today, then~$x'=0$.
Every instrument~$x$ we may trade has a \textbf{book value}
which we denote by $B(x,\mm)$.
The book value of a financial instrument is its official
mark-to-market, computed
using the prevailing market data~$\mm$. This could be a simple closing price, a weighted
mid-price, or the result of computing
more complex standard derivative model.
Following our notation $B(x',\mM')$ denotes the book value of the instrument tomorrow.
We use $\mB(\mx,\mm)$ for the vector
of book values if~$\mx$ is a vector of instruments. We like
to stress that contrary to~\cite{NEARMART} here
the book value is with respect to only to
today's and future
cashflows, not past cashflows.
In order to take into account the
value of money across time, we will also assume are given a bank
account -- usually called the \emph{numeraire} - which charges the
same overnight interest rate for
credits and deposits.
The respective one-day discount factor from tomorrow to today
is denoted by~$\beta(\mm)$
and we will assume that there is some
$\beta^*$ such that $\beta(\mm)\leq\beta^*<1$.
Contrary to~\cite{DH} we do not assume that
cashflows are implicitly
discounted using our bank account.
The discounted profit-and-loss (P\&L) for a given instrument~$x\in\calX$
is the random variable
\eq{dB}
dB(x,\mm,\mM') := \underbrace{ \beta(\ms)\, B(x',\mM') - B(x,\mm) }_{\mbox{Change in book value}} + \underbrace{ r(x,\mm) }_{\mbox{Cashflows}} \ .
\eqend
If $\mx\in\calX^n$ is a vector, then $d\mB(\mx,\mm,\mM')$ denotes the vector of P\&Ls.
\subsubsection*{Trading}
A~trader is in charge of a \textbf{portfolio}
$z\in\calX$ -- also called ``book" -- of financial
instruments such as currencies, securities and over-the-counter (OTC) derivatives.
We call the combined~$\ms:=(z,\mm)$ our \textbf{state} today
which takes values in $\ms\in\calX\times \calS$.
We will switch in our notation between writing functions in both variables
$(z,\mm)$ and only in~$(\ms)$ depending on context.
In order to risk manage her portfolio, the trader has access to~$n$
liquid hedging instruments $\mh\equiv \mh(\ms)\in\calX^n$ in each
time step.
These are any liquid instruments such
such as forwards, options, swaps etc.
Across different market states they will usually not be the contractually same fixed-strike fixed-maturity instruments:
instead, they will
usually be defined relative the prevailing market
in terms of time-to-maturities
and strikes relative to at-the-money. See~\cite{DH}
for details.
The \textbf{action} of buying\footnote{Purchasing a negative quantity is a sell.}~$\ma\in\R^n$
units of our hedging instruments
will incur transaction cost $c(\ma;z,\mm)$ on top of the book value.
Making cost dependent on both the current portfolio
and the market allows modelling
trading restrictions based on our current position such as short-sell constraints,
or restrictions based on risk exposure.
Transaction
cost as function of~$\ma$ is assumed to be normalized to $c(0;\ms)=0$, non-negative, and convex.\footnote{Convexity excludes fixed transaction cost.}
The convex set of admissible actions is given
as~$\calA(\ms):=\{\ma\in\R^n: c(\ma;\ms) < \infty\}$.
A~\textbf{trading policy} $\pi$ is a function
$\pi(\ms)\equiv \pi(z,\ms)$
which determines the next action based on our current state,
i.e.~simply $\ma := \pi(\ms)$.
A~trader will usually manage her book by referring to the change in book values
plus any other cashflows, most notably cashflows and the cost of hedging.
The associated \textbf{reward} for taking an action~$\ma$ per time step is given as
\eq{rewards}
R(\ma;z,\mm) := dB(z,\mm,\mM') + \ma \cdot d\mB(\mh,\mm,\mM') - c(\ma,z,\mm) \ .
\eqend
The new joint portfolio tomorrow is given by
\eq{pftomorrow}
z_\ma' := z' + \ma \cdot \mh' \ .
\eqend
The new state tomorrow is a random variable depending on our action which we write as
\[
\mS'_\ma := (z_\ma',\mM') \ .
\]
\subsection{The Bellman Equation for Monetary Utilities}
Standard reinforcement learning as discussed for example
in~\cite{SUTTON} usually aims to maximize
the ``discounted" expected future rewards of running a given policy.
Essentially, the optimal value function $V^*$ is stipulated to satisfy
a Bellman equation
\begin{equation}\label{eq:bell_E}
\left\{
\begin{array}{lcl}
V^*\big(\,
z;\,\mm
\,\big)
& \supstack!= &
TV^*(z,\mm) \\
&&
\\
Tf(z,\mm) & := &
\sup_{\ma\in \calA(z,\mm)}: \
\E\!\left[\ \beta(\mm) \
f\big(\,
z' +\ma\cdot \mh';\,\mM'
\,\big) + R(\ma;z,\mm)
\,\big|\,\mm
\ \right] \ .
\end{array}
\right.
\end{equation}
Instead of using the expectation
it is more natural in finance to
choose an operator~$U$ which takes into account risk aversion:
this
roughly means that if two events have the same expected outcome, then we prefer the
one with the lower uncertainty.
The respective Bellman equation becomes
\begin{equation}\label{eq:bell_U}
\left\{
\begin{array}{lcl}
V^*\big(\,
z;\,\mm
\,\big)
& \supstack!= &
TV^*(z,\mm) \\
&&
\\
Tf(z,\mm) & := &
\sup_{\ma\in \calA(z,\mm)}:\
U\!\left[\ \beta(\mm) \
f\big(\,
z' +\ma\cdot \mh';\,\mM'
\,\big) + R(\ma;z,\mm)
\,\big|\,\mm
\ \right] \ .
\end{array}
\right.
\end{equation}
The action~$\ma$ in above operator has to be found per state $\ms=(z,\mm)$.
\removeblock{
We may therefore write the operator as an optimization over policies
$\pi$ as follows:
\begin{equation}\label{eq:bell_U_pi}
Tf(\,
z;\,\mm
\,\big)
\equiv
\sup_{\pi(z,\ms)\in \calA(z,\mm)}:
U\!\left[\ \beta(\mm) \
f\big(\,
z' +\pi(z,\mm)\cdot \mh';\,\mM'
\,\big) + R(\ma;z,\mm)
\,\big|\,\mm
\ \right] \ .
\end{equation}
}
We would like to stress that the ``value function" here represents the ``excess value"
of a portfolio over its book value. If $V^*$ were zero, that would mean the optimal risk-adjuste
value for a portfolio is given as the book value. Remark~\ref{rem:cashflow_rewards} makes this statement explicit.
There are many different reasonable
risk-adjusted return metrics~$U$ used in finance, most notably mean-volatility, mean-variance
and their downside versions which where all first discussed in the seminal~\cite{MV}.
Mean-volatility in particular remains a popular choice for many practical applications.
However, it is well known that mean-volatility, mean-variance
and their downside variants are not monotone,
which means that even if $f(\ms)\geq g(\ms)$
for all states~$\ms$ it is not guaranteed that $U[ f(\mS' )\geq U[ g(\mS' )]$, c.f.~\cite{SH}. The lack of monotonicity
means that standard convergence proofs for the Bellman
equation do not apply; see section~\ref{sec:proofs}.
We will here take a somewhat more formal route and focus on
\emph{monetary utilities}.
A~functional~$U$ is a \textbf{monetary utility} if it is monotone increasing (more is better),\footnote{
If $f\geq g$ then $U[f(\mS')]\geq U[g(\mS')]$.
}
concave (we are risk averse)\footnote{
For $X=f(\mS'),Y=g(\mS')$ and $\alpha\in[0,1]$ we have $U[\alpha X + (1-\alpha)Y] \geq \alpha U[X]
+ (1-\alpha) U[Y]$.
} and \emph{cash-invariant}. The latter
means that for any function $y(\ms)$
then $U[ f(\mS',\ms) + y(\ms) |\ms] = U[f(\mS',\ms)|\ms] + y(\ms)$.
The intuition behind this property is if we add a cash amount~$y$
to our portfolio, then its monetary utility increases by this amount.\footnote{We have shown in~\cite{SH} that cash-invariance is equivalent
to being able to write-off parts of our portfolio for the worst
possible outcome.} An important implication of cash-invariance is that our optimal actions
do not depend on our current wealth.
The negative
of a monetary utility is also called a \emph{convex risk measure}, c.f.~\cite{FS}. See also~\cite{CONDCRM} on the topic of dynamic
and time-consistent risk measures.
As in~\cite{NEARMART} we will focus on monetary utilities given
as \emph{optimized certainty equivalents} (\textbf{OCE}) of a utility function,
introduced by~\cite{BT}.
A~utility function $u:\R\rightarrow\R$ here is assumed to be $C^1$,
monotone increasing,
and concave. We also normalize it to~$u(0)=0$ and $u'(0)=1$.
The respective OCE monetary utility is then defined by
\[
U\!\left[\ f(\mS') \ \big|\ \ms\ \right]
:=
\sup_{y(\ms)\in\R} \E\!\left[\ u\left(\ f(\mS')
+ y(\ms)\, \right)\ \big|\ \ms\ \right] - y(\ms)
\]
The function~$y$ will be modelled as a neural network.
Examples of COE utility functions are
\begin{itemize}
\item
\textbf{Expectation} (risk-neutral):
$
u(x) := x
$.
\item
\textbf{Worst Case}:
$
u(x) := \inf x
$.
\item
\textbf{CVaR} or \textbf{Expected Short Fall}:
$
u(x) := (1+\lambda)\ \min\{0,X\}
$.
\item
\textbf{Entropy}:
$
u(x) := (1-e^{-\lambda x})/\lambda
$
in which case $U[ f(\mS')|\ms] = - \frac 1\lambda
\E[ \exp(-\lambda f(\mS')) | \ms ]$. The entropy
reduces to mean-variance if
the variables concerned are normal. It has many
other desirable properties, but it also
penalizes losses rather harshly: an unhedgable short position
in a Black\&Scholes stock has negative infinite entropy.
\item
\textbf{Truncated Entropy}: to avoid the harsh penalaties for short
positions imposed by the exponential utility we might instead use
$
u(x) :=
( 1- e^{-\lambda x} ) /\lambda \1[ x > 0 ]
+
( x - \half \lambda x^2 ) \1[x<0]$.
\item
\textbf{Vicky}: the following functional was proposed in~\cite{VICKY}:
$
u(x) := \frac1\lambda \left( 1 + \lambda x - \sqrt{ 1 + \lambda^2 x^2 } \right)
$.
\item
\textbf{Normalized quadratic utility}:
$
u(x) := - \half \lambda (x-\mbox{$\frac1\lambda$})^2\1[x<\mbox{$\frac1\lambda$}] + \frac1{2 \lambda}
$.
\end{itemize}
\noindent
We call a monetary utility \emph{coherent}
if $U[ n(\ms)\,f(\mS' ) | \ms ] = n(\ms) U[ f(\mS') | \ms ]$.
An OCE monetary utility is coherent if $u(n\,x) = n\,u(nx)$.
Coherence is not the most natural property: it says
that the value of risk of a position growths linearly with position
size. Usually, we would assume that it increases superlinearly.
The practical relevance of this property for us is that if~$U$
is coherent, then we can move the discount factor~$\beta$
in and out of our monetary utility: $\beta(\ms)\, U[ f(\mS') | \ms] =
U[ \beta(\ms)\,f(\mS')|\ms]$.
We say $U$ is
\emph{time-consistent}
if iterative application lead to the same monetary utility in the sense that $U[ U[ f(\mS'') | \mS' ] | \ms ] = U( f(\mS'' | \ms )$. The only
time-consistent OCE montary utilities are the entropy and the
expectation, c.f.~\cite{KUPPERSCH}.
\\
\noindent
We may now present the first key result of this article:
we say that any statistical arbitrage is finite if
\[
\sup_{\ma\in\calA(\ms),\ms\in\calS} R(\ma,\ms) <\infty \ .
\]
This can be achieved for example if~$\calA(\ms)$ is bounded.
\begin{theorem}\label{th:convergence}
Assume any statistical arbitrage is finite.
Then the Bellman
equation~\eqref{bell_U}
has a unique finite solution.
\end{theorem}
The proof can be found in section~\ref{sec:proof_convergence}. It relies
on monotonicity
and cash-invariance of the monetary utility.
\begin{remark}[Using only Cashflows as Rewards]\label{rem:cashflow_rewards}
Our definition of our rewards~\eqref{rewards} as the full mark to market of
the hedged portfolio is in so far unusual as the reward term contains
future variables, namely the book value of the hedged book tomorrow.
A~more classic approach would be to let the rewards represent
only actual cashflows, e.g.
\eq{discrewards}
\tilde R(\ma,z,\mm):= \underbrace{ r(z,\mm) }_{
\begin{array}{c}
\mbox{Cashflows from}\\
\mbox{our portfolio}
\end{array}
}
\underbrace{ - \ma \cdot \mB(\mh,\mm) - c(\ma,z,\mm) }_{
\begin{array}{c}
\mbox{Proceeds from}\\
\mbox{trading~$\ma$}
\end{array}
} \ ,
\eqend
The numerical challenge with this formulation is that cashflows are
relatively rare for most hedging instruments: if we trade a 1M vanilla
option, then it only has one cashflow at maturity -- if it ends up in the money
that is. That means that learning the value of future cashflows is harder
when we train with only daily cashflows. Hence, it is numerically
more efficient to solve for the difference between the optimal value
function and the book value of a portfolio.
Theoretically, though, the two are equivalent:
let $\tilde V^*(z,\mm) := V^*(z,\mm) + B(z,\mm)$. Then~$\tilde V^*$
solves the Bellman equation
\eq{alternative}
\tilde V^*(z,\mm) \supstack!= \sup_{\ma\in\calA(\ms)}:
\
U\!\left[ \
\beta(\mm)
\
\tilde V^*(\,z' +\ma\cdot \mh',\mM\,)
+ \tilde R(\ma,z,\mm)
\ \big|\ \ms\ \right] \ .
\eqend
\end{remark}
\begin{remark}[Multiple time steps]\label{rem:multitime}
It is straight forward to formally extend~\eqref{bell_U} to multiple
time steps. Let $\mS^{(1)}:=\ms$ and $\mS^{(i+1)}=\mS^{(i)}{}'$.
We use the same numbering for other variables.
Define
the discount factors
$\beta_i := \prod_{e=1}^i \beta(\mM^{(e-1)})$ and set
\begin{equation}\label{eq:bell_U_multi}
T_n f(z,\mm) :=
\sup_{\pi}:\
U\!\left[\ \beta_n\
f\big(\,
z^{(n)} + \mA^{(n)}\cdot \mH^{(n)};\,\mM^{(n+1)}
\,\big) + \sum_{i=1}^n
\beta_{i-1}\,
R(\mA^{(i)},\mS^{(i)})
\ \big|\ \mm
\ \right]
\end{equation}
where we used $
\mA^{(n)} := \pi(z^{(n)}, \mM^{(n)})$.
Our indexing scheme means that $T_1 = T$.
It is straight forward to
amend the proof of theorem~\ref{th:convergence} to
show that if any statistical arbitrage is finite,
then the associated equation $T_n f = f$ also has a unique finite
solution~$V^*_n$.
However, for $n>1$ in general $V^*_n \not= T^n V^*$ unless
$U$ is the expectation.\footnote{
We show the claim for $n=2$. Let $R^{(n)}:=R(\mA^{(n)},\mS^{(n)} )$
\eqary
T^2f(\ms)
& = & \sup_\pi: U\left[\, \beta(\mS^{(1)})\
\left\{
\sup_{\pi}
\,U\left[\,
\beta(\mS^{(2)})\
f( \pi' \cdots, \mM^{(3)} )
+
R^{(2)}
\,\big|\,\mS^{(1)}\,
\right ]
\right\} + R^{(1)}
\,\big|\,\ms\,
\right]
\\
& = & \sup_\pi: U\left[\, \beta(\mS^{(1)})\
\left\{
\,U\left[\,
\beta(\mS^{(2)})\
f( \cdots, \mM^{(3)} )
+
R^{(2)}
\,\big|\,\mS^{(1)}\,
\right ]
\right\} + R^{(1)}
\,\big|\,\ms\,
\right]
\\
& \supstack{(*)}{\geq/=} & \sup_\pi: U\left[\, \
\,U\left[\,
\beta(\mS^{(1)}) \beta(\mS^{(2)})\
f( \cdots, \mM^{(3)} )
+
R^{(2)}
+ \beta(\mS^{(1)}) R^{(1)}
\,\big|\,\mS^{(1)}\,
\right]
\,\big|\,\ms\,
\right]
\\
& \supstack{(**)}{=} & \sup_\pi U\left[ \cdots |\,\ms\,\right]
\ = \ T_2 f(\ms) \ .
\eqaryend
Here, $(*)$ is an equality for the expectation
or any other coherent monetary utility. For all others
convexity and $U(0)=0$ imply the stated inequality.
The final equality~$(*)$ is only true of $U$ is time-consistent
which means either the entropy or the expectation.
\qed
}
\end{remark}
\section{Numerical Implementation}\label{sec:iterativeDBH}
We now present an algorithm which will iteratively approach an optimal solution of our Bellman equation~\eqref{bell_U}.
This is an extension over the entropy case presented in~\cite{PATENT_DH}.
We first initialize $V^{(0)}(\,\ms\, ) := 0$
for all portfolios and states~$\ms$.\footnote{
It is not a good idea to initialize a network with zero to achieve this as all gradients will look rather the same. Assume $\calN(\theta;x)$ is a neural network initialized by random
weights $\theta_0$. Then use
the \emph{Buehler-zero} network
$N(\theta;x) := \calN(\theta;x) -
\calN(\theta_0;x)$.
}
Then we solve iteratively for each~$n$ the following scheme $(n-1)\rightarrow n$:
\begin{enumerate}
\item \textbf{Actor}: given $V^{(n-1)}$ we wish to find an optimal neural network
policy~$\pi^{(n)}$ which solves for all states $\ms=(z,\mm)\in\calS$
\begin{equation}\label{eq:dhb_it_1}
\sup_{\pi(\ms)}:\ U\!\left[ \, \beta(\ms)\, V^{(n-1)}\big(\,
z_\pi';\, \mM '\,
\big)+
R(\pi;\ms)\,
\Big|\,\ms\,
\right]
\ \ \ \ ( z_\pi := z' + \pi(\ms)\cdot \mh' ) \ .
\end{equation}
(We recall that $c(\ma,\ms)=\infty$
whenever $\ms\not\in\calA(\ms)$.)
In the case of our OCE
monetary utility, we will need to find both a network~$\pi^{(n)}$
and a network~$y^{(n)}$ to satisfy for all states~$\ms$
\begin{equation}
\sup_{\pi,y}: \ \E\!\left[\,\beta (\ms)\,
u\!\left( \, V^{(n-1)}(\, z'_\pi;\, \mM'\, ) + y(\ms)
\right) - y(\ms) + R(\pi;\ms)
\,\Big|\,\ms\,
\right] \ .
\end{equation}
We will approach this by stipulating
that we have a density~$\Q$ over
all sample~$\calS$, for example
a uniform distribution if~$\calS$ is a finite set.
This allows us defining the unconditional expectation operator
$\E[ \cdot ] = \int \Q[d\ms]\, \E[\cdot|\ms]$.
We then solve
\begin{equation}\label{eq:dhb_it_1n}
\sup_{\pi,y}: \ \E\!\left[\
u\!\left( \, \beta (\mS)\ V^{(n-1)}(\, Z'_\pi;\, \mM'\, ) + y(\mS)
\right)
- y(\mS) +
R(\pi;\mS) \
\right] \ \ \ ( Z'_\pi := Z + \pi(\mS)\cdot \mH' ) \ .
\end{equation}
Under~$\Q$
the current market state, the portfolio and the hedging
instrument representation
are random variables, hence we have referred to them
with capital letters.
The existence of~$\Q$ is not trivial: it is meant to represent the
probability of possible portfolio and market state conditions.
We will discuss this later when we comment on implementation.
\item \textbf{Critic (Interpolation)}: as next step, we estimate a new value function~$V^{(n)}$
given~$\pi^{(n)}$ and~$y^{(n)}$.
This means fitting a neural network $V^{(n)}$ such that
\begin{equation}\label{eq:dhb_it_2}
V^{(n)}( z,\mm ) \equiv TV^{(n-1})( z, \mm )
\end{equation}
We note that solving~\eqref{dhb_it_1n} numerically
with packages like TensorFlow or PyTorch will also yield
samples $TV^{(n-1)}(\ms)$ for all $\ms\in\calS$. Assuming this is the case we
may find network weights for~$V^{(n)}$ by solving
the interpolation problem
\[
\inf_V: \E\!\left[
\
\left( - V^{(n)}( Z,\mM ) + TV^{(n-1)}( Z, \mM )
\right)^2 \
\right]
\]
over our discrete sample space.
Instead of using neural networks for the last step we may also
consider classic interpolation techniques such as kernel interpolators.
\end{enumerate}
This scheme is reasonably
intuitive as it iteratively improves the
estimation of the monetary utility $V^{(n)}$ and the optimal
action $a^{(n)}$. There is a question on how many training epochs
to use when solving, in each step, for the action and the value function.
In~\cite{SUTTON} there is a suggestion that using just \emph{one} step is sufficient.
The authors call this the \textbf{actor-critic} method. There are several
other discussions on the viability of such methdos, see also~\cite{A3C}
and the references therein.
\begin{remark}
In some applications we may not be able to
use samples of $TV^{(n-1)}$ to solve~\eqref{dhb_it_2},
but make use of trained $a^{(n)}$ and $y^{(n)}$ directly.
We therefore may solve
\begin{equation}\label{eq:dhb_it_2n}
\inf_V: \E\left[ \left(
- V(\,Z;\,\mM\,) +
\E\! \!\left[\, \beta (\mS)\ u\!\left(
V^{(n-1)}(\, Z_{\pi^{(n)}}', \mM'\, ) + y^{(n)}(\mS) \right) - y^{(n)}(\mS)
+
R(\pi^{(n)},\mS)
\,\Big|\,\mS\,
\right]
\right)^2 \right] \ .
\end{equation}
The nested expectation is numerically suboptimal. In order
to address this, we solve instead the unconditional
\begin{equation}\label{eq:dhb_it_2n2}
\inf_V: \E\left[ \left(
- V(\,Z;\,\mM\,) +
\beta (\mS)\ u\!\left(
V^{(n-1)}(\, Z_{\pi^{(n)}}', \mM'\, ) + y^{(n)}(\mS) \right) - y^{(n)}(\mS)
+
R(\pi^{(n)},\mS)
\right)^2 \right) \ .
\end{equation}
which has the same gradient in~$V$, and therefore the same optimal solution.\footnote{
\begin{proof}
Assume that $V(\ms) \equiv V(\theta;\ms)$ where $\theta$ are our network parameters.
Denote by~$\partial_i$ the derivative with respect to the $i$th parameter.
Our equation then has the form $\inf_\theta f(\theta)$ where
\[
f(\theta) := \E\!\left[ ( V(\theta;\mS)
+ \E[ h(\mS') | \mS ] +g(\mS) )^2 \right]
\]
The gradient is
\[
\partial_{\theta_i} f'(\theta) = 2\, \E\!\left[ \partial_i V(\theta;\mS) ( V(\theta;\mS) + \E[ h(\mS') | \mS ]
+ g(\mS) ) \right]
=
2\, \E\!\left[ \partial_i V(\theta;\mS) ( V(\theta;\mS) + h(\mS')
+ g(\mS) ) \right]
\]
Therefore $f$ has the same gradient as $
\theta \mapsto
\E\!\left[ ( V(\theta;\mS) + h(\mS')
+ g(\mS) )^2 \right]
$.
\end{proof}}
\end{remark}
\subsection{Representing Portfolios}
The most obvious challenge when applying the approach presented in section~\ref{sec:iterativeDBH}
is the need to represent our portfolio is some numerically efficient way.
The following is an extension of the patent~\cite{PATENT_DH}
where we proposed using a more cumbersome signature representation of our trader instruments
a'la~\cite{Lyons2019NonparametricPA}.
Assume that we are given historic market data $\mm_t$
at time points~$\tau_0,\ldots,\tau_N$.
Further assume that at each point $\tau_j$ we had in our book instruments
$\mx^t=(x^{t,1},\ldots, x^{t,m_t})$ with $x^{t,i}\in\calX$.
As~$\mx$ were actual historic instruments,
we have for each $x^{t,i}$
a vector $\mf^{t,i}_t \in \R^F$
of historic risk metrics computed in~$t$, such as the
book value, a range of greeks, scenarios and other
calculations made in~$\tau_t$ to assist humans in their risk management decisions.
We assume that those metrics $\mf^t_t=(\mf^{t,1}_t,\ldots,
\mf^{t,m_t}_t)$
are also available for \emph{the same instruments}
at the next time step~$\tau_{t+1}$, denoted by~$\mf^t_{t+1}$.
Instrument which expire between $\tau_t$ and $\tau_{t+1}$
will have their book value and
all greeks and scenario values set to zero.
It is a reasonable
assumption that those metrics~$\mf$ have decent predictive power for
the behaviour of our instruments; after all this is what
human traders use to do drive their risk management decisions. Hence we will use them as \textbf{instrument
features}. We will here only consider linear features such that
for any weight vector $\mw \in \R^{m_t}$ the feature vector (the greeks, scenarios etc)
of the weighted instrument $\mw \cdot \mx^t$ is correctly given
as $\mw\cdot \mf^t$, so there is no need to recompute it
later.\footnote{We note that this linearity is satisfied for all common risk metric calculations
except VaR and counterparty credit calculations.}
We have referred to such a representation in~\cite{PATENT_DH} as
\emph{Finite Markov Representation}, or short \emph{FMR}.
We further denote by $r^i_t$
the historic aggregated cashflows of $x^{t,i}$
over the period~$[\tau_t,\tau_t)$, all in our accounting currency.
We set $\mr_t := (r^1_t,\ldots,r^{m_t}_t)$. The aggregated cashflows
of a weighted instrument $\mw \cdot \mx^{(t)}$ are~$\mw\cdot \mr_t$.
Similarly, we use $\mB^t_u=(\mB^{t:1}_u,\ldots,\mB^{i,m_t}_u)$
to refer to the book values of our instruments in $u\in\{t,t+1\}$,
respectively.
We also assume that we have for all our hedging instruments access to
their respective feature vectors $\mf^{h:t}_t$ for both~$\tau_t$
and~$\tau_{t+1}$.
It is important to recall that the greeks $\mf^{h:t,i}_{t+1}$
refer to the features of the $i$th hedging instrument traded
at~$\tau_t$, but computed at~$\tau_{t+1}$. That means in particular
$\mf^{h:t,i}_{t+1}\not=\mf^{h:t+1,i}_{t+1}$
as the instrument definition changes between time steps.
We also denote by $\mb^{h:t}_u$ the book values of our hedging instruments
for $u\in\{t,t+1\}$.
In addition to our instrument features, we also assume that we chose a
reasonable subset of \textbf{market features} at each time step~$\tau_t$.
We continue to use the symbol~$\mm$ for those features even though in practise
we will not use the entire available state vector.\\
\noindent
We will now generate random scenarios as follows
\begin{enumerate}
\item Randomly choose $t\in\{0,\ldots,N-1\}$, which determines
the market states~$\mm:=\mm_t$
and $\mm':=\mm_{t+1}$.
\item
Identify the hedging instruments $\mh$ with their
finite Markov representation
\[
\begin{array}{llcl}
\mbox{Terminal FMR of hedging instruments} & \mh' & :=& \mf^{h:t}_{t+1} \\
\mbox{Book values for our hedging instruments} & \mB(\mh,\ms) & :=& \mb^{h:t}_t \\
& \mB(\mh,\ms') & :=& \mb^{h:t}_{t+1} \\
\mbox{Cashflows of the hedging instruments} & \mr(\mh,\mm) & :=& r^{h:t}_t \\
\mbox{Cost} & c(\ma;\ms) & \leftarrow & \ms_t, \mf^h_t
\end{array}
\]
The concrete implementation of the last line depends on the specifics of
the cost function. For example, proportional transaction cost on net
traded feature exposure
are implemented using a weight vector~$\mgamma\in\R^F$
by setting~$c(\ma;\ms) := |\ma \cdot (\mgamma\,\mf^t_t) |$.
\item Choose a random weight vector~$\mw\in\R^{m_t}$
and define a sample portfolio as $z:=\mw \cdot \mx$ with
\[
\begin{array}{llcl}
\mbox{Initial and terminal FMR of the portfolio} & z & :=& \mw\cdot \mf^t_t \\
& z' & :=& \mw\cdot \mf^t_{t+1} \\
\mbox{Book value of our portfolio} & B(z,\ms) & :=& \mw\cdot \mb^t_t\\
& B(z,\ms') & :=& \mw\cdot \mb^t_{t+1} \\
\mbox{Cashflows of the portfolio} & r(z,\mm) & :=& \mw\cdot \mx_t \ .
\end{array}
\]
The construction of a reasonable randomization of the weight
vector is important: if the samples are too different from likely
portfolios, then the resulting model will underperform.
However, if only historic portfolios are used, then the model
is less able to learn handling deviations. More importantly, though,
generating portfolios increases sample size.
\end{enumerate}
\section{Relation to Vanilla Deep Hedging}
We will now discuss the relation of
equation~\eqref{bell_U}
to the solution of a corresponding vanilla Deep Hedging
Problem.
We start by stating our original Deep Hedging problem~\cite{DH}
adapting the notation used here so far.
We fix some initial time~$t=0$
with state~$\ms\equiv \ms_0 \equiv \mS_0$.
Subsequent states are denoted by $\mS_{t-1} := \mS_t'$.
We use a similar notation for all other variables.
We also define the stochastic discount factor to zero
as~$\beta_t:=\beta(\mS_t) \beta_{t-1}$ starting with~$\beta_0:=1$.
For this part we will need to assume that
every hedging instrument has a time-to-maturity less than~$\tau^*$ in the
sense that if we by $\ma\cdot \mh^t$ at time~$t$, then all the book value and all cashflows
from the portfolio are zero beyond $t+\tau^*$. This assumption excludes perpetual assets
such as shares or currencies. We will need to trade those with their respective
forwards in the current setup.
Assume we are starting with an initial portfolio $z$ and follow a trading
policy $\pi$. Let $\mA_t := \pi(Z_t,\mM_t)$. Assume the portfolio has
a maturity~$T^*$.
Then
\eq{discRDH}
\sum_{t=0}^\infty \beta_t
R(\mA_t,\mS_t )
=
\underbrace{
- \mB(z,\ms_0)
+
\sum_{t=0}^{T^*}
\beta_t r(z,\mM_t)
}_{\mbox{P\&L from $z$}}
+
\sum_{t=0}^{\infty}
\beta_t
\underbrace{
\left(
- \mA_t\cdot \mB( \mh^t, \mM_t )
- c(\mA_t,\mS_t)
+
\mA_t\cdot
\sum_{u=t}^{t+\tau^*}
\frac{\beta_u}{\beta_t}
r(\mh^t,\mM_u)
\right)
}
_{\mbox{P\&L from trading $\mA_t\cdot \mh^t$ in~$t$}}
\eqend
If the market is free of statistical arbitrage, then the monetary utility of the
infinite sum is finite since $U[
\sum_{t=0}^\infty \beta_t
R(\mA_t,\mS_t ) ]] \leq \E[ \sum_{t=0}^\infty \beta_t
R(\mA_t,\mS_t ) ] < \infty$.\footnote{
In~\eqref{discRDH} the P\&L from~$z$ is finite since all $x\in\calX$ are integrable.
If we have no statistical arbitrage it means that each expected P\&L
from trading $\mh^t$ in~$t$ has non-positive expectation. Dominance
convergence yields the claim.\qed
}
The \textbf{Vanilla Deep Hedging} problem for an infinite trading
horizon is then defined as
\eq{dh}
U^*(\ms_0) :=
\sup_\pi:\
U\!\left[\
\sum_{t=0}^\infty \beta_{t}
R(\pi,\mS_t )
\ \Big|\ \ms_0\ \right]
\eqend
\removeblock{
Recall that we had assumed that $\beta(\ms)\leq\beta^*<1$. Let $\beta^*_\infty :=
\sum_{t=0}^\infty \beta^*{}^r = 1/(1-\beta^*)<\infty$.
This means $\beta_t \leq \sum_{r=1}^t \beta^*{}^r$
}
If~$U$ is time-consistent -- which means it is the entropy of the expectation --, then $U^*$ satisfies
the dynamic programming equation
\begin{equation}\label{eq:bell_U_DH}
\left\{
\begin{array}{lcl}
\hat U^*\big(\,
z;\,\mm
\,\big)
& \supstack!= &
\hat T\hat U^*(z,\mm) \\
&&
\\
\hat Tf(z,\mm) & := &
\sup_{\ma\in \calA(z,\mm)}:\
U\!\left[\
f\big(\,
z' +\ma\cdot \mh';\,\mM'
\,\big)
\,\big|\,\mm
\ \right] + \hat R(\ma;z,\mm) \ .
\end{array}
\right.
\end{equation}
with discounted cashflow rewards
\[
\hat R(\ma;z,\mm) := \beta_{t(\ms)} \left(\
r(z+\ma \cdot \mh,\mm) - \ma \cdot B(\mh,\mm) - c(\ma,z,\mm)
\ \right) \ .
\]
(We used $t(\ms)$ to extract calendar time from the state~$\ms$.)
This is structurally similar to the cashflow rewards~\eqref{discrewards}.
Since we have discounted all cashflows in~\eqref{bell_U_DH} we must interpret $\hat U^*$
as units of numeraire. In other words, the actual cash value is $U^*(\ms) := \hat U^*(\ms) / \beta_{t(\ms)}$.
Inserting this into our operator yields
\eq{hatT}
U^*(z,\mm) =
\sup_{\ma\in \calA(z,\mm)}:\
\frac1{\beta_{t(\mm)}}\ U\!\left[\ \beta_{t(\mM')}
U^*\big(\,
z' +\ma\cdot \mh';\,\mM'
\,\big)
\,\big|\,\mm
\ \right] + \tilde R(\ma;z,\mm) \ .
\eqend
If $U$ were coherent, we would get
\[
U*(z,\mm) = \sup_{\ma\in \calA(z,\mm)}:\
U\!\left[\ \beta(\mm)\
U^*\big(\,
z' +\ma\cdot \mh';\,\mM'
\,\big)
\,\big|\,\mm
\ \right] + \tilde R(\ma;z,\mm) \ .
\]
which via the discussion in remark~\ref{rem:cashflow_rewards} is equivalent to our
original Bellman equation~\eqref{bell_U}. However, since the entropy is not coherent
it means that this equivalence only holds for the expectation operator.
To summarize:
\begin{prop}
If the market is free of arbitrage, if all hedging instruments have a common finite time-to-maturity,
and if $U=\E$, then the value function of the vanilla Deep Hedging problem satisfies
our Deep Bellman Hedging equation~\eqref{bell_U}.
\end{prop}
\removeblock{
We now take~\eqref{bell_U_DH} as the starting point
and ask when it admits a finite solution for any
be any monetary utility~$U$. The answer is as expected:
\begin{theorem}\label{th:convergence_dh}
Assume the market is free of statistical arbitrage.
Then~\eqref{bell_U_DH} has a finite optimal solution~$U^*$
for any monetary utility~$U$.
If~$U$ is the entropy or the expectation, then the optimal
$U^*$ coincides with~\eqref{dh}.
\end{theorem}
%
The proof can be found in section~\ref{sec:proof_conv_dh}.
}
\section{Existence of Finite Solutions for Deep Bellman Hedging}\label{sec:proofs}\label{sec:proof_convergence}
We will now prove with theorem~\ref{th:convergence}
convergence of our Deep Bellman Hedging
equations. This is easiest understood when the space~$\calZ$ of
future cashflows is parameterized in $\R^{|\calZ|}$
with a finite Markov representation. However, in more generality
we may assume that $\calZ$ represents the set of suitably
integrable
adapted stochastic processes with values in~$\R$.
Therefore, we may
just assume that $(\calS,\Q), \calS=\calZ\times\calM$
is a measure space. In the following we will
consider the function space $F$ by the $\Q$-equivalence
classes of functions $f:\calS\rightarrow \R$.
Let as before
\eq{tf_proof}
(Tf)(z,\mm) := \sup_{\ma\in\calA(z,\mm)}: \
U\!\left[ \beta(\mm) f\big(
z' +\ma\cdot\mh', \mM' \big)
\big|\mm\right]
+ R(\ma,z,\mm)
\eqend
for $\beta(\mm)\leq\beta^*<1$.
Then the Bellman equation $f=Tf$ has a unique, finite
solution.
We will demonstrate the proof for bounded value
functions. See~\cite{UNBOUNDED} on how
to extend results of convergence of Bellman operators
to the unbounded case. The below mimicd the spirit
of the proof of the classic Banach contraction theorem.\\
\begin{proof}[of theorem~\ref{th:convergence}]
\textbf{Step 1:}
equip $F$ with the supremum norm. We wish to
show that for $\|f\|_\infty<\infty$ we have $\| Tf \|<\infty$
We have
\[
Tf \leq T \| f \| = T0 + \| f \|
\]
because of monotonicity and cash-invariance.
Since we assumed
$
\sup_{\ma\in\calA(\ms),\ms}:
R(\ma,\ms) < \infty
$ we find that~$T0<\infty$.
\textbf{Step 2}:
We wish to show that~$Tf$ is a contraction
for bounded~$f$,
i.e.~$\| Tf - Tg \|\leq \beta^* \| f - g \|$
for our $\beta^*<1$. Note that $f(x)-g(x)\leq \| f - g \|$.
Monotonicity and cash invariance of the operator~$T$ yield
\[
(Tf)(x) \leq T\left( g + \| f - g \| \right)(x) \leq Tg(x) + \beta^*\| f-g \|
\]
and, similarly,
\[
(Tg)(x) \leq T\left( f + \| f - g \| \right)(x) \leq Tf(x) + \beta^*\| f-g \| \ .
\]
Jointly this gives
\[
\| Tf - Tg \| \leq \beta^*\| f-g \| \ .
\]
\removeblock{
Alternative proof for the expectation case:
\eqary
\| Tf - Tg \|
& = &
\left\|\
\sup_{\ma\in\calA(z,\ms)}
\left\{
\beta\,\E_{\ms'\sim \ms}\left[ f\big(
\zeta(\ma,z), \ms' \big)
\right]
+ R(\ma,z,\ms)
\right\}
-
\sup_{\mb\in\calA(z,\ms)}
\left\{
\beta\,\E_{\ms'\sim \ms}\left[ g\big(
\zeta(\mb,z), \ms' \big)
\right]
+ R(\mb,z,\ms)
\right\}
\ \right\|
\\
& \leq &
\left\|\
\sup_{\ma\in\calA(z,\ms)}
\left|
\beta\,\E_{\ms'\sim \ms}\left[ f\big(
\zeta(\ma,z), \ms' \big)
\right]
+ R(\ma,z,\ms)
-
\beta\,\E_{\ms'\sim \ms}\left[ g\big(
\zeta(\ma,z), \ms' \big)
\right]
+ R(\ma,z,\ms)
\right|
\ \right\|
\\
& = &
\left\|\
\sup_{\ma\in\calA(z,\ms)}\beta\,
\left|
\E_{\ms'\sim \ms}\left[ f\big(
\zeta(\ma,z), \ms' \big)
- g\big(
\zeta(\ma,z), \ms' \big)
\right]
\right|
\ \right\|
\\
& \leq &
\beta \| f - g \|_\infty \ .
\eqaryend
}
\noindent \textbf{Step 3}
Chose $f_0$ and
let $f_n := Tf_{n-1}$
such that $f_n = T^n f_0$.
We know that $\| Tf_1 - Tf_0 \|
\leq \beta^* \| f_1 - f_0 \|
$
and therefore iteratively
$\| Tf_n - Tf_{n-1} \|
\leq \beta^*{}^n \| f_n - f_{n-1} \|
$.
Trianlge inequality implies $\| Tf_n - Tf_m \|
\leq \sum_{i=m+1}^n
\| Tf_i - Tf_{i-1} \|
\leq \| f_1 - f_0 \| \sum_{i=m+1}^n \beta^*{}^i
\downarrow 0$. This means $Tf_n$ is a Cauchy
sequence and therefore converges to a unique point
$f_n\rightarrow f$.\\
\noindent \textbf{Step 4}
To show that $f$ is a fixed point
note that $\| Tf - f | \leq \| Tf - f_n \|
+ \| f_n - f \|
\leq \beta^* \| f - f_{n-1} \| + \| f_n - f \| \downarrow 0$.
\end{proof}
\removeblock{
\subsection{Proof of Theorem~\ref{th:convergence_dh}}\label{sec:proof_conv_dh}
In order to prove theorem~\ref{th:convergence_dh}
we ca no longer rely on the Banach contraction
theorem. We will therefore use the more general Knaster-Tarski fixed point theorem,
c.f.~the introduction in~\cite{ALIPRANTIS}.
We re-state here Knaster-Tarski: let $(F,
\leq)$ be a partially order set. An upper bound
of a subset~$M\subset P$ is a $f \in F$ such that $m\leq f$
for all $m\in\M$. The supremum~$\sup M$ of~$M$ is defined
as the lowest upper bound. The infimum is defined similarly.
A~pair $(F,\leq)$ is
called a \emph{lattice} if every subset $M\subset F$
has their infimum and a supremum in~$F$.
A~chain $M\subset F$ is a fully ordered subset.
A~functional $T:F\rightarrow F$ is called increasing
if $T(f) \leq f$. We call it s-order continuous if
$\sup T(C) = T(\sup C)$ for all countable chains $C
\subset F$ for which~$\sup C$ exists.
\begin{theorem}[Knaster-Tarski]
Let $(F,\leq)$ be a partially ordered set, and $T$ increasing.
Assume further that there exists $f^0\in P$ such that
\begin{enumerate}
\item $f_0 \leq Tf_0$, and
\item every chain in $F_0 := \{ f: f_0 \leq f \}$
has a supremum
\end{enumerate}
Then, $T$ has a fixed point in $F$ given
by $f^*:=\sup_n T^n f_0$.
\end{theorem}
\begin{proof}[of theorem~\ref{th:convergence_dh}]
We consider $F$ as above, closed to include
functions which map to infinity.
Therefore, every chain in $F$ has a supremum in~$F$, namely the
essential supremum with respect to~$\Q$.
Let
\[
(Tf)(z,\mm) := \sup_{\ma\in\calA(z,\mm)}:
U\!\left[ f\big(
z' +\ma\cdot\mh', \mM' \big)
\right]
+ \hat R(\ma,\mm)
\]
and chose $f_0(z,\mm):=0$. Then $Tf_0\geq 0$
as it is floored by the choice~$\ma=0$.
Applying Knaster-Tarski yield existence of a fixed point
for~$Tf = f$.
If $U$ is an OCE monetary utility, then~$U$
is upper semi-continuous. Hence
$\lim \sup Tf_n = T(\lim\sup f_n))$ which yields
that the fixed point is given by~$f^*=\sup_n T^n f_0$.\\
It remains to show that if the market is free of statistical arbitrage
that then the solution is finite. We recall that absence
of statistical arbitrage under $U$ implies absence of statistical
arbitrage under~$\E$
\end{proof}
}
\removeblock{
\begin{example}[Statistical Arbitrage does not Destroy Convergence
as long as the action set is bounded]
Let $\beta$ be a constant and
let $H^1$ be an instrument with book value $b=\beta$
which trades at zero
cost~$c\equiv 0$
and whose returns~$r'$
tomorrow average $\bar r=1+\epsilon$ for~$\epsilon>0$. This is a
statistical arbitrage opportunity. The portfolio representation
$z\in\R$
is simply units in~$H^1$
The Bellman operator is
\[
Tf(z,m) := \sup_{|a|\leq 1}: \
\beta\ \E[ f(a) ] + z\,r - \beta\,a
\]
We see easily that $Tf$ explodes:
\eqary
f_0(z,m) & := & z\, r(m) \ \ \ \mbox{(Initial guess)}\\
f_1(z,m) & = & \sup_{|a|\leq 1}: \
\beta\ a\,\E[ r'|m ] + z\,r(m) - \beta\,a \\
& = & z\,r(m) + \sup_{|a|\leq 1}: \
\beta\ a\, ( \bar r - 1) \ = \ z\,r(m)
+ \beta \epsilon\\
f_2(z,m) & = & \sup_{|a|\leq 1}: \
\beta\ a\,\bar r + \beta^2 \epsilon + z\,r(m) - \beta\,a \
\\
& = & z\,r(m) + \beta^2 \epsilon + \sup_{|a|\leq 1}: \beta\, a\,\epsilon
\ = \ z\,r(m) + \beta^2 \epsilon + \beta\, \epsilon \\
f_3(z,m) & = & \ldots
= \ z\,r(m) + \beta^3 \epsilon + \beta^2 \epsilon + \beta \epsilon
\eqaryend
We see that the limit of this iteration is $f^*(z,m) = z\,r(m)
+ \epsilon/(1-\beta)$.
\end{example}
|
\section{Introduction}
Vanadium dioxide (VO$_2$) is monoclinic at any temperature $T\lesssim 58$~$^\circ$C~but tetragonal
for $T\gtrsim 72$~$^\circ$C. The crystal structure
changes as the temperature is raised
from below $58$~$^\circ$C~to above $72$~$^\circ$C~\cite{Morin}, a mixture of crystals of both types existing in the intermediate thermal regime
\cite{Choi}. During the transformation,
the vanadium--vanadium atomic pairs located periodically in the monoclinic crystal separate
into single atoms located periodically in the tetragonal crystal \cite{Horlin}, the mass density increases
by 1.79\%, and the electrical conductivity increases by
at least three orders of magnitude \cite{Morin,Crunteanu}. Not only is the transformation thermally reversible,
its electromagnetic consequences are clearly evident in the sub-megahertz \cite{Mansingh}, megahertz \cite{Yang},
gigahertz \cite{Crunteanu,Emond}, far-infrared \cite{Gao,Parrott}, mid-infrared \cite{Choi}, near-infrared \cite{Cormier,Skelton}, and visible \cite{Cormier,Kepic} spectral regimes. Therefore, this material is attractive for a variety of switching applications \cite{Dumas,Wang2015,Hashemi,Sereb2022,Tripathi}.
Monoclinic VO$_2$~is a dissipative insulator, i.e., both the real and the imaginary parts of
the relative permittivity $\eps_{\rm vo}^{\rm mono}$ are positive, with ${\rm Re}\left\{\eps_{\rm vo}^{\rm mono}\right\}$ significantly larger than ${\rm Im}\left\{\eps_{\rm vo}^{\rm mono}\right\}$
in the visible and sub-visible spectral regimes \cite{Kepic,Cormier,Mansingh,Gao,Parrott,Horlin,Choi,Skelton,Yang,Crunteanu,Emond}.
However, tetragonal VO$_2$~is a dissipative insulator only when the free-space wavelength $\lambda_{\scriptstyle 0}\lesssim1100$~nm \cite{Kepic},
with ${\rm Re}\left\{\eps_{\rm vo}^{\rm tetra}\right\}>0$ and ${\rm Im}\left\{\eps_{\rm vo}^{\rm tetra}\right\}>0$.
But ${\rm Re}\left\{\eps_{\rm vo}^{\rm tetra}\right\}<0$ and ${\rm Im}\left\{\eps_{\rm vo}^{\rm tetra}\right\}>0$ for $\lambda_{\scriptstyle 0}\gtrsim1100$~nm, so that tetragonal VO$_2$~then functions as a plasmonic metal. The complete insulator-to-metal transformation (IMT)
on heating by $14$~$^\circ$C~and the complete metal-to-insulator transformation (MIT) on cooling by $14$~$^\circ$C, at reasonably low temperatures
in the neighborhood of $65$~$^\circ$C, are responsible for the attraction of VO$_2$~for switching applications for $\lambda_{\scriptstyle 0}\gtrsim1100$~nm
\cite{Dumas,Wang2015,Hashemi,Sereb2022,Tripathi}. These applications
are premised on two unambiguous states: the {\sf ON} state in which VO$_2$~is purely monoclinic/tetragonal
and the {\sf OFF} state in which VO$_2$~is purely tetragonal/monoclinic.
Although reversible, the thermal transformation is hysteretic. In other words, the properties of VO$_2$~in the intermediate thermal regime
($58$~$^\circ$C~to $72$~$^\circ$C) depend on whether the material is being heated/cooled from having only monoclinic/tetragonal
crystals to having only
tetragonal/monoclinic ones. The electromagnetic consequences of thermal hysteresis remain obscure, although
the relative
permittivity $\eps_{\rm vo}(\lambda_{\scriptstyle 0},T)$ has been investigated on both the heating and the cooling branches by a few researchers
\cite{Cormier,Choi,Taylor}.
Scattering by an isotropic dielectric sphere is a basic electromagnetic boundary-value problem \cite{Logan}, with its
solution traceable to Lorenz \cite{Lorenz1,Lorenz2},
Mie \cite{Mie}, and Debye \cite{Debye}. Since
$\eps_{\rm vo}(\lambda_{\scriptstyle 0},T)$ in the intermediate thermal regime is bounded by $\eps_{\rm vo}^{\rm mono}(\lambda_{\scriptstyle 0})$ and $\eps_{\rm vo}^{\rm tetra}(\lambda_{\scriptstyle 0})$ \cite{Cormier,Choi,Taylor},
and $\eps_{\rm vo}^{\rm mono}(\lambda_{\scriptstyle 0})$ differs from $\eps_{\rm vo}^{\rm tetra}(\lambda_{\scriptstyle 0})$, the scattering characteristics of a VO$_2$~sphere of radius $a$ at any specific value of
$\lambda_{\scriptstyle 0}$
will depend not only on the ratio $\bar{a}=a/\lambda_{\scriptstyle 0}$ but also on $T$. If these characteristics on the heating branch are
sufficiently different from those on the cooling branch, they could be useful in determining not only the ambient temperature
$T\in[58\,^\circ{\rm C},72\,^\circ{\rm C}]$
but also
whether the surroundings of a VO$_2$~sphere are being heated or cooled in the intermediate thermal regime.
That idea motivated this research. Standard expressions devolving from the Lorenz--Mie theory
for plane-wave scattering by an isotropic dielectric sphere \cite{BH83} were
used for the extinction, total scattering, absorption, radiation-pressure, back-scattering, and forward-scattering
efficiencies of a VO$_2$~sphere. These quantities were computed as functions
of temperature in the intermediate thermal regime and the manifestations of thermal hysteresis in
electromagnetic scattering were identified.
\section{Theoretical expressions}
Suppose that a plane wave propagating in a fixed direction illuminates the sphere $r\leq a$. Then,
\begin{equation}
Q_{\rm ext} = \frac{1}{2\pi^2\bar{a}^2}{\rm Re}\left\{\sum_{n=1}^{\infty}
\left[(2n+1) \left(a_n+b_n\right)\right]\right\}\,
\end{equation}
is the extinction efficiency,
\begin{equation}
Q_{\rm sca}= \frac{1}{2\pi^2\bar{a}^2} \sum_{n=1}^{\infty}
\left[(2n+1) \left(\vert{a_n}\vert^2+\vert{b_n}\vert^2\right)\right]\,
\end{equation}
is the total scattering efficiency,
\begin{equation}
Q_{\rm abs}=Q_{\rm ext} -Q_{\rm sca}\,
\end{equation}
is the absorption efficiency,
\begin{eqnarray}
&&
\nonumber
Q_{\rm pr}= Q_{\rm ext}-\frac{1}{\pi^2\bar{a}^2}{\rm Re}\left\{
\sum_{n=1}^{\infty}
\left[
\frac{n(n+2)}{n+1}\left(a_n^\ast a_{n+1} + b_n^\ast b_{n+1}\right)
\right.\right.
\\[5pt]
&&\left.\left.
\qquad\qquad+
\frac{2n+1}{n(n+1)}a_n^\ast b_n
\right]
\right\}
\end{eqnarray}
is the radiation-pressure efficiency with the asterisk
denoting the complex conjugate,
\begin{equation}
Q_{\rm b}= \frac{1}{4\pi^2\bar{a}^2} \Big\vert
\sum_{n=1}^{\infty}
\left[(-)^n(2n+1) \left({a_n}-{b_n}\right)\right]
\Big\vert^2
\end{equation}
is the back-scattering efficiency, and
\begin{equation}
Q_{\rm f}= \frac{1}{4\pi^2\bar{a}^2} \Big\vert
\sum_{n=1}^{\infty}
\left[ (2n+1) \left({a_n}+{b_n}\right)\right]
\Big\vert^2
\end{equation}
is
the forward-scattering efficiency
\cite{BH83,Lpr,Lnih}.
The coefficients
\begin{equation}
\left.\begin{array}{l}
\label{eq53}
a_n=\displaystyle{
\frac{\eps_{{\rm vo}}\,j_n(2\pi\baran_{{\rm vo}})\psi_n^{(1)}(2\pi\bar{a})
-j_n(2\pi\bar{a})\psi_n^{(1)}(2\pi\baran_{{\rm vo}})}
{\eps_{{\rm vo}}\,j_n(2\pi\baran_{{\rm vo}})\psi_n^{(3)}(2\pi\bar{a})
-h_n^{(1)}(2\pi\bar{a})\psi_n^{(1)}(2\pi\baran_{{\rm vo}})}
}
\\[10pt]
b_n= \displaystyle{
\frac{j_n(2\pi\baran_{{\rm vo}})\psi_n^{(1)}(2\pi\bar{a})
-j_n(2\pi\bar{a})\psi_n^{(1)}(2\pi\baran_{{\rm vo}})}
{j_n(2\pi\baran_{{\rm vo}})\psi_n^{(3)}(2\pi\bar{a})
-h_n^{(1)}(2\pi\bar{a})\psi_n^{(1)}(2\pi\baran_{{\rm vo}})}
}
\end{array}\right\}\,,
\end{equation}
emerge from the solution of a boundary-value problem \cite{BH83},
with
\begin{equation}
\left.\begin{array}{l}
n_{{\rm vo}} = \sqrt{\eps_{{\rm vo}}}
\\[5pt]
\psi_n^{(1)}(u) = \displaystyle{
\frac{d}{du}\left[ u\, j_n(u)\right]
}
\\[8pt]
\psi_n^{(3)}(u) = \displaystyle{
\frac{d}{du}\left[ u \,h_n^{(1)}(u)\right]
}
\end{array}
\right\}\,,
\end{equation}
where $j_n(u)$ is the spherical Bessel function of order $n$ and argument $u$
and $h_n^{(1)}(u)$ is the spherical Hankel function of the first kind, order $n$, and argument $u$.
An $\exp(-i\omega t)$ dependence on time $t$ is implicit, with $i=\sqrt{-1}$ and
$\omega$ denoting the angular frequency.
\begin{figure}[h]
\centering
\includegraphics[width=5cm]{Waseer_22_2v2Fig1a}
\includegraphics[width=5cm]{Waseer_22_2v2Fig1b}
\caption{${\rm Re}\left\{n_{{\rm vo}}\right\}$ and ${\rm Im}\left\{n_{{\rm vo}}\right\}$ as functions of $T$ for $\lambda_{\scriptstyle 0}=800$~nm
\cite{Cormier}. }
\label{Fig:n800}
\end{figure}
\begin{figure}[h]
\centering
\includegraphics[width=5cm]{Waseer_22_2v2Fig2a}
\includegraphics[width=5cm]{Waseer_22_2v2Fig2b}
\caption{Same as Fig.~\ref{Fig:n800} except for $\lambda_{\scriptstyle 0}=1550$~nm \cite{Cormier}. }
\label{Fig:n1550}
\end{figure}
\section{Numerical Results and Discussion}
Figures~\ref{Fig:n800} and \ref{Fig:n1550} present the real and
and imaginary parts of $n_{{\rm vo}}$ as
functions of $T$ for $\lambda_{\scriptstyle 0}=800$~nm and $\lambda_{\scriptstyle 0}=1550$~nm, respectively \cite{Cormier}.
Since ${\rm Re}\left\{n_{\rm vo}^{\rm mono}\right\}\simeq 7\,{\rm Im}\left\{n_{\rm vo}^{\rm mono}\right\}$ for $\lambda_{\scriptstyle 0}=800$~nm
and ${\rm Re}\left\{n_{\rm vo}^{\rm mono}\right\}\simeq 13\,{\rm Im}\left\{n_{\rm vo}^{\rm mono}\right\}$ for $\lambda_{\scriptstyle 0}=1550$~nm,
monoclinic VO$_2$~is a moderately dissipative insulator for both wavelengths.
However, ${\rm Re}\left\{n_{\rm vo}^{\rm tetra}\right\}\simeq 3\,{\rm Im}\left\{n_{\rm vo}^{\rm tetra}\right\}$ for $\lambda_{\scriptstyle 0}=800$~nm
but ${\rm Re}\left\{n_{\rm vo}^{\rm tetra}\right\}\simeq 0.75\,{\rm Im}\left\{n_{\rm vo}^{\rm tetra}\right\}$ for $\lambda_{\scriptstyle 0}=1550$~nm.
Accordingly, tetragonal VO$_2$~is
\begin{itemize}
\item[(i)] a more dissipative insulator than monoclinic VO$_2$~for $\lambda_{\scriptstyle 0}=800$~nm,
but
\item[(ii)] a plasmonic metal for $\lambda_{\scriptstyle 0}=1550$~nm.
\end{itemize}
Thus,
\begin{itemize}
\item[(i)] both heating and cooling engender
an insulator-to-insulator transformation (IIT)
for $\lambda_{\scriptstyle 0}=800$~nm because ${\rm Re}\left\{\eps_{\rm vo}^{\rm mono}\right\}>0$ and ${\rm Re}\left\{\eps_{\rm vo}^{\rm tetra}\right\}>0$,
\end{itemize}
but
\begin{itemize}
\item[(ii)] heating gives rise to the IMT
whereas cooling creates the MIT
for $\lambda_{\scriptstyle 0}=1550$~nm because ${\rm Re}\left\{\eps_{\rm vo}^{\rm mono}\right\}>0$ and ${\rm Re}\left\{\eps_{\rm vo}^{\rm tetra}\right\}<0$.
\end{itemize}
Switching applications of VO$_2$~exploit the IMT and MIT \cite{Dumas,Wang2015,Hashemi,Sereb2022,Tripathi}
but ignore the IIT and avoid the intermediate thermal regime.
\newpage
\begin{widetext}
\begin{figure}[h]
\centering
\includegraphics[width=11cm]{Waseer_22_2v2Fig3}
\caption{$Q_{\rm ext}$, $Q_{\rm sca}$, $Q_{\rm abs}$, $Q_{\rm pr}$, $Q_{\rm b}$, and $Q_{\rm f}$ as functions of $T$
and $\bar{a}$ for $\lambda_{\scriptstyle 0}=800$~nm. }
\label{Fig:Q800}
\end{figure}
\end{widetext}
\begin{widetext}
\begin{figure}[h]
\centering
\includegraphics[width=11cm]{Waseer_22_2v2Fig4}
\caption{Same as Fig.~\ref{Fig:Q800} except for $\lambda_{\scriptstyle 0}=1550$~nm. }
\label{Fig:Q1550}
\end{figure}
\end{widetext}
\subsection{IIT/IIT ($\lambda_{\scriptstyle 0}<1100$~nm)}
Both heating and cooling engender
a reversible IIT for $\lambda_{\scriptstyle 0}=800$~nm, as is clear from Fig.~\ref{Fig:n800}. Figure~\ref{Fig:Q800}
provides graphs of $Q_{\rm ext}$, $Q_{\rm sca}$, $Q_{\rm abs}$, $Q_{\rm pr}$, $Q_{\rm b}$, and $Q_{\rm f}$ as functions of
$T$ and $\bar{a}$ on both the heating and the cooling branches. The first four efficiencies in that list of six
may be considered as \textit{directionally averaged} metrics of scattering, whereas $Q_{\rm b}$ refers
to the back-scattering direction
and $Q_{\rm f}$ to the forward-scattering direction.
Furthermore, the difference
\begin{eqnarray}
\nonumber
&&
\Delta{Q}_{\ell}=Q_{\ell}{\rm (heating)}-Q_{\ell}{\rm (cooling)}\,,
\\[5pt]
&&\qquad\qquad
\ell\in\left\{{\rm ext},\,{\rm sca},\,{\rm abs},\,{\rm pr},\,{\rm b},\,{\rm f}\right\}\,,
\end{eqnarray}
of each of the six efficiencies on the heating branch relative to its value on the cooling branch
is also plotted with respect to $T$ and $\bar{a}$ in Fig.~\ref{Fig:Q800}; obviously, this difference does not exist
for $T\lesssim58$~$^\circ$C~and $T\gtrsim72$~$^\circ$C.
All six efficiencies in Fig.~\ref{Fig:Q800} are different for purely monoclinic VO$_2$~(i.e., $T\lesssim58$~$^\circ$C) and purely
tetragonal VO$_2$~(i.e., $T\gtrsim72$~$^\circ$C).
Unsurprisingly therefore, significant dependences on temperature exist in
the intermediate thermal regime on both the heating and cooling branches.
The graphs of $Q_{\rm ext}$ and $\Delta{Q}_{\rm ext}$ indicate that the effect of thermal hysteresis on plane-wave extinction
is much more pronounced
when the radius of the VO$_2$~sphere
is less than half the free-space wavelength, with $\Delta{Q}_{\rm ext}$ being of the highest magnitude somewhere
in the middle third of the intermediate thermal regime. As $\bar{a}$ increases from $0.5$, the effect of thermal
hysteresis diminishes rapidly and is barely noticeable when $\bar{a}=1.5$. This may be related to the
fact that $Q_{\rm ext}\to2$ as $\bar{a}\to\infty$, regardless of the composition of the sphere \cite{Brillouin,Berg}.
The effects of thermal hysteresis on $Q_{\rm sca}$ and $Q_{\rm abs}$
are much more pronounced
when $\bar{a}\lesssim0.5$.
Both $\Delta{Q}_{\rm sca}$ and $\Delta{Q}_{\rm abs}$ are also of the highest magnitude somewhere
in the middle third of the intermediate thermal regime. Their magnitudes diminish as $\bar{a}$ increases beyond
about $0.5$, with $\Delta{Q}_{\rm sca}$ and $\Delta{Q}_{\rm abs}$ roughly equal in magnitude but opposite in sign, which is
not surprising since
$\Delta{Q}_{\rm ext}=\Delta{Q}_{\rm sca}+\Delta{Q}_{\rm abs}$.
The graphs of $Q_{\rm pr}$ and $\Delta{Q}_{\rm pr}$ are similar to those of $Q_{\rm ext}$ and $\Delta{Q}_{\rm ext}$, respectively. Hence,
the effect of thermal hysteresis on radiation-pressure efficiency
is much more pronounced for $\bar{a}\lesssim0.5$ than for $\bar{a}\gtrsim0.5$.
The effect of the IIT is barely noticeable for any $\bar{a}\gtrsim1$, i.e., $Q_{\rm pr}$ depends very weakly
on $T$ if VO$_2$~is purely monoclinic or purely tetragonal, or if it comprises crystals of both types in any
proportion.
The back-scattering efficiency is an undulating function of $\bar{a}$ at any $T\in[50\,^\circ{\rm C}, 80\,^\circ{\rm C}]$,
the undulations diminishing in magnitude as $\bar{a}$ increases beyond $0.5$. In general, $Q_{\rm b}$ is higher
for purely monoclinic VO$_2$~than for purely tetragonal VO$_2$. The graph of $\Delta{Q}_{\rm b}$ indicates that thermal hysteresis
is most pronounced at $\bar{a}\sim 0.35$.
In contrast to $Q_{\rm b}$, $Q_{\rm f}$ increases monotonically with $\bar{a}\in[0.25,1.5]$ in Fig.~\ref{Fig:Q800} for
any $T\in[50\,^\circ{\rm C}, 80\,^\circ{\rm C}]$. The difference $\Delta{Q}_{\rm f}$ can be negative or positive as $T$
changes in the intermediate thermal regime for $\bar{a}\lesssim 1$. However, as $\bar{a}$ increases beyond unity,
$\Delta{Q}_{\rm f}$ becomes more negative.
The overall conclusions from Fig.~\ref{Fig:Q800} are as follows:
\begin{itemize}
\item $Q_{\rm ext}$, $Q_{\rm sca}$, $Q_{\rm abs}$, $Q_{\rm pr}$, and $Q_{\rm b}$ are higher for $T\lesssim 58$~$^\circ$C~(purely monoclinic)
than for $T\gtrsim 72$~$^\circ$C~(purely tetragonal), when the sphere is small ($\bar{a}\lesssim0.5$).
\item $Q_{\rm ext}$, $Q_{\rm sca}$, $Q_{\rm abs}$, $Q_{\rm pr}$, and $Q_{\rm b}$ are marginally different for $T\lesssim 58$~$^\circ$C~(purely monoclinic)
from their values for $T\gtrsim 72$~$^\circ$C~(purely tetragonal), when the sphere is large ($\bar{a}\gtrsim0.5$).
\item All six efficiencies are affected by thermal hysteresis most when the sphere is small ($\bar{a}\lesssim0.5$).
\item $Q_{\rm ext}$ and $Q_{\rm pr}$ are affected very little by thermal hysteresis when the sphere is large ($\bar{a}\gtrsim0.5$).
\item $Q_{\rm sca}$, $Q_{\rm abs}$, $Q_{\rm b}$, and $Q_{\rm f}$ are affected steadily by thermal hysteresis as $\bar{a}$ increases beyond unity.
\end{itemize}
\subsection{IMT/MIT ($\lambda_{\scriptstyle 0}>1100$~nm)}
When the free-space wavelength increases
beyond 1100~nm, tetragonal VO$_2$~becomes a plasmonic metal whereas monoclinic VO$_2$~remains a dissipative insulator.
The IMT/MIT is therefore very different from the IIT, as even a casual comparison of Figs.~\ref{Fig:Q800} (for $\lambda_{\scriptstyle 0}=800$~nm)
and \ref{Fig:Q1550} (for $\lambda_{\scriptstyle 0}=1550$~nm) shows. Of course, every one of the six efficiencies in Fig.~\ref{Fig:Q1550} is different for purely monoclinic
VO$_2$~than for purely
tetragonal VO$_2$, and there are significant dependences on temperature in
the intermediate thermal regime on both the heating and cooling branches.
The graph of $Q_{\rm ext}$ in Fig.~\ref{Fig:Q1550} shows that the extinction is more when VO$_2$~is a metal (tetragonal)
rather than a dissipative dielectric (monoclinic), which is also in accord with Fig.~\ref{Fig:Q800}. Furthermore,
the graphs of $Q_{\rm ext}$
and $\Delta{Q}_{\rm ext}$ in Fig.~\ref{Fig:Q1550} indicate that the effect of thermal hysteresis on plane-wave extinction
is somewhat more pronounced for $\bar{a}\lesssim0.5$ than for $\bar{a}\gtrsim0.5$. Whereas $\Delta{Q}_{\rm ext}$ can assume both negative
and positive values for $\bar{a}\lesssim0.5$ in the intermediate thermal regime, it is predominantly negative for $\bar{a}\gtrsim0.5$
in the same regime. Certainly, as $\bar{a}\to\infty$ $Q_{\rm ext}$ must go to $2$ \cite{Brillouin,Berg}, but at a considerably slower rate
with the increase in $\bar{a}$ than in Fig.~\ref{Fig:Q800}.
Also, whereas $\Delta{Q}_{\rm sca}$ has a bump and $\Delta{Q}_{\rm abs}$ has a trough that roughly compensate each
other for $Q_{\rm ext}$ to be barely affected by thermal hysteresis for $\bar{a}\gtrsim0.5$ in Fig.~\ref{Fig:Q800},
$\Delta{Q}_{\rm sca}$ has a trough and $\Delta{Q}_{\rm abs}$ has a bump that do not compensate each other
so that $Q_{\rm ext}$ is affected by thermal hysteresis for $\bar{a}\gtrsim0.5$ in Fig.~\ref{Fig:Q1550}.
Unlike in Fig.~\ref{Fig:Q800},
the graphs of $Q_{\rm pr}$ in Fig.~\ref{Fig:Q1550} are qualitatively different from those of $Q_{\rm ext}$.
The signature of thermal hysteresis for $\bar{a}\gtrsim0.5$ is somewhat more marked when
IMT/MIT occur than when IIT occurs.
The back-scattering efficiency is an undulating function of $\bar{a}$ at any $T\in[50\,^\circ{\rm C}, 80\,^\circ{\rm C}]$,
the undulations diminishing in magnitude as $\bar{a}$ increases beyond $0.5$. In general, $Q_{\rm b}$ is lower
for purely monoclinic VO$_2$~than for purely tetragonal VO$_2$, contrary to Fig.~\ref{Fig:Q800}. The graph of $\Delta{Q}_{\rm b}$ indicates that thermal hysteresis
is most pronounced at $\bar{a}\sim 0.3$.
The forward-scattering efficiency increases monotonically with $\bar{a}\in[0.25,1.5]$ in Fig.~\ref{Fig:Q1550} for
any $T\in[50\,^\circ{\rm C}, 80\,^\circ{\rm C}]$, in contrast to $Q_{\rm b}$. The same tendency is evident
in Fig.~\ref{Fig:Q800}. However, $Q_{\rm f}$ is higher when tetragonal VO$_2$~is a plasmonic metal (Fig.~\ref{Fig:Q1550})
than when it is a dissipative dielectric (Fig.~\ref{Fig:Q800}). Also, $\Delta{Q}_{\rm f}$ is more noticeably negative in the intermediate thermal regime
as $\bar{a}$ increases beyond unity when the IMT/MIT (Fig.~\ref{Fig:Q1550}) occur than when the IIT occurs (Fig.~\ref{Fig:Q800}).
The overall conclusions from Fig.~\ref{Fig:Q1550} are as follows:
\begin{itemize}
\item $Q_{\rm ext}$, $Q_{\rm sca}$, $Q_{\rm b}$, and $Q_{\rm f}$ are noticeably lower for $T\lesssim 58$~$^\circ$C~(purely monoclinic)
than for $T\gtrsim 72$~$^\circ$C~(purely tetragonal), when the sphere is small ($\bar{a}\lesssim0.5$). $Q_{\rm sca}$ shows
the opposite trend, whereas $Q_{\rm pr}$ is about the same for both $T\lesssim 58$~$^\circ$C~and $T\gtrsim 72$~$^\circ$C.
\item All six efficiencies are affected by thermal hysteresis, regardless of the sphere radius.
\item $Q_{\rm ext}$, $Q_{\rm sca}$, $Q_{\rm abs}$, $Q_{\rm pr}$, and $Q_{\rm b}$ are affected steadily by thermal hysteresis as $\bar{a}$ increases beyond unity.
\item $Q_{\rm ext}$, $Q_{\rm sca}$, $Q_{\rm abs}$, $Q_{\rm b}$, and $Q_{\rm f}$ are affected more in the intermediate thermal regime
when tetragonal VO$_2$~is a plasmonic metal (Fig.~\ref{Fig:Q1550}) than a dissipative dielectric (Fig.~\ref{Fig:Q800}).
\end{itemize}
\begin{figure}[h]
\centering
\includegraphics[width=8cm]{Waseer_22_2v2Fig5}
\caption{
$Q_{\rm ext}$, $Q_{\rm sca}$, $Q_{\rm abs}$, $Q_{\rm pr}$, $Q_{\rm b}$, and $Q_{\rm f}$ as functions of $\bar{a}$
on the heating branch when $\lambda_{\scriptstyle 0}=1550$~nm. Left: $T=69.11$~$^\circ$C~(${\rm Re}\left\{\eps_{{\rm vo}}\right\}=1+8.09i$).
Right: $T=69.57$~$^\circ$C~(${\rm Re}\left\{\eps_{{\rm vo}}\right\}=8.50i$).}
\label{Fig:sp}
\end{figure}
\subsection{Vacuum and null-permittivity quasistates}
The IMT/MIT also serves as a route to two electromagnetic quasistates of matter. The first is
the \textit{vacuum quasistate} \cite{Sereb2018}: ${\rm Re}\left\{\eps_{{\rm vo}}\right\}=1$. The second is the \textit{null-permittivity quasistate} \cite{Niu}:
${\rm Re}\left\{\eps_{{\rm vo}}\right\}=0$. Both quasistates are exhibited by many materials that undergo temperature-mediated IMT/MIT, a very good example being indium
antimonide (InSb) \cite{ML-IEEEPJ,Alkhoori2022}. However, the IMT/MIT exhibited by InSb is not hysteretic, in contrast to VO$_2$.
For $\lambda_{\scriptstyle 0}=1550$~nm, we estimated from Fig.~\ref{Fig:n1550} that
\begin{itemize}
\item $\eps_{{\rm vo}}$ =$1+8.09i$ at $T=69.11$~$^\circ$C~and
\item $\eps_{{\rm vo}}$ = $8.50i$ at $T=69.57$~$^\circ$C
\end{itemize}
on the heating branch, whereas
\begin{itemize}
\item $\eps_{{\rm vo}}$ =$1+8.13i$ at $T=64.01$~$^\circ$C~and
\item $\eps_{{\rm vo}}$ = $8.50i$ at $T=64.55$~$^\circ$C
\end{itemize}
on the cooling branch. Figure~\ref{Fig:sp} shows all six efficiencies as functions of $\bar{a}$ when VO$_2$~is in the
vacuum and null-permittivity quasistates on the heating branch. Since the values of ${\rm Im}\left\{\eps_{{\rm vo}}\right\}$ are roughly the same in both
quasistates and considerably exceed unity, there is practically no distinction in the efficiencies
for the two quasistates. As similar findings apply on the cooling branch, there is no need to present the corresponding graphs of the six efficiencies.
\section{Concluding Remarks}
\label{conc}
As temperature changes from about 58~$^\circ$C~to 72~$^\circ$C, the crystal
structure of VO$_2$~transforms from purely monoclinic to purely tetragonal, the transformation being reversible
but hysteretic.
We have studied the response characteristics of a VO$_2$~sphere to planewave illumination to examine the effects of
thermal hysteresis on the extinction, total scattering, absorption, radiation-pressure, back-scattering, and forward-scattering
efficiencies.
Whereas monoclinic VO$_2$~is a dissipative dielectric, tetragonal VO$_2$~is a plasmonic metal for $\lambda_{\scriptstyle 0}>1100$~nm but a dissipative
dielectric for $\lambda_{\scriptstyle 0}<1100$~nm. Thus, two distinct types of reversible but hysteretic transformations are possible.
Clear signatures
of thermal hysteresis in the insulator-to-insulator transformation are to be found in $Q_{\rm f}$, $Q_{\rm abs}$, and $Q_{\rm b}$ (in that order, in our
opinion). Clear signatures
of thermal hysteresis in the insulator/metal-to-metal/insulator transformation are to be found in $Q_{\rm f}$, $Q_{\rm abs}$, $Q_{\rm sca}$,
and $Q_{\rm b}$ (in that order). The contrast between the two dissipative dielectric forms of VO$_2$~($\lambda_{\scriptstyle 0}<1100$~nm) being less pronounced than
the contrast between the dissipative dielectric and the metallic forms of VO$_2$~($\lambda_{\scriptstyle 0}>1100$~nm), the IMT/MIT
has clearer signatures
of thermal hysteresis than the IIT.
Thermal hysteresis is responsible for the double occurrences of the vacuum and null-permittivity quasistates in the intermediate
thermal regime when tetragonal VO$_2$~is a plasmonic metal. However, none of the six efficiencies show significant differences
between the two quasistates of VO$_2$.
The electromagnetic consequences of thermal hysteresis exhibited by VO$_2$~may depend on the rate of heating or cooling,
but that dependence has turned out to be difficult to characterize \cite{Hache}. Photoexcitation by a free-electron laser has been
shown to effect the monoclinic-to-tetragonal transformation within 150~fs \cite{Wall}, but not the reverse transformation----which does require
cooling.
\vspace{5mm}
\noindent {\bf Acknowledgments.}
AL thanks the Charles Godfrey Binder Endowment at Penn State for ongoing support of his research efforts.
WIW thanks the Higher Education Commission of Pakistan
for an IRSIP Scholarship that enabled him to spend six months at The Pennsylvania State University.
\section{Introduction}
Vanadium dioxide (VO$_2$) is monoclinic at any temperature $T\lesssim 58$~$^\circ$C~but tetragonal
for $T\gtrsim 72$~$^\circ$C. The crystal structure
changes as the temperature is raised
from below $58$~$^\circ$C~to above $72$~$^\circ$C~\cite{Morin}, a mixture of crystals of both types existing in the intermediate thermal regime
\cite{Choi}. During the transformation,
the vanadium--vanadium atomic pairs located periodically in the monoclinic crystal separate
into single atoms located periodically in the tetragonal crystal \cite{Horlin}, the mass density increases
by 1.79\%, and the electrical conductivity increases by
at least three orders of magnitude \cite{Morin,Crunteanu}. Not only is the transformation thermally reversible,
its electromagnetic consequences are clearly evident in the sub-megahertz \cite{Mansingh}, megahertz \cite{Yang},
gigahertz \cite{Crunteanu,Emond}, far-infrared \cite{Gao,Parrott}, mid-infrared \cite{Choi}, near-infrared \cite{Cormier,Skelton}, and visible \cite{Cormier,Kepic} spectral regimes. Therefore, this material is attractive for a variety of switching applications \cite{Dumas,Wang2015,Hashemi,Sereb2022,Tripathi}.
Monoclinic VO$_2$~is a dissipative insulator, i.e., both the real and the imaginary parts of
the relative permittivity $\eps_{\rm vo}^{\rm mono}$ are positive, with ${\rm Re}\left\{\eps_{\rm vo}^{\rm mono}\right\}$ significantly larger than ${\rm Im}\left\{\eps_{\rm vo}^{\rm mono}\right\}$
in the visible and sub-visible spectral regimes \cite{Kepic,Cormier,Mansingh,Gao,Parrott,Horlin,Choi,Skelton,Yang,Crunteanu,Emond}.
However, tetragonal VO$_2$~is a dissipative insulator only when the free-space wavelength $\lambda_{\scriptstyle 0}\lesssim1100$~nm \cite{Kepic},
with ${\rm Re}\left\{\eps_{\rm vo}^{\rm tetra}\right\}>0$ and ${\rm Im}\left\{\eps_{\rm vo}^{\rm tetra}\right\}>0$.
But ${\rm Re}\left\{\eps_{\rm vo}^{\rm tetra}\right\}<0$ and ${\rm Im}\left\{\eps_{\rm vo}^{\rm tetra}\right\}>0$ for $\lambda_{\scriptstyle 0}\gtrsim1100$~nm, so that tetragonal VO$_2$~then functions as a plasmonic metal. The complete insulator-to-metal transformation (IMT)
on heating by $14$~$^\circ$C~and the complete metal-to-insulator transformation (MIT) on cooling by $14$~$^\circ$C, at reasonably low temperatures
in the neighborhood of $65$~$^\circ$C, are responsible for the attraction of VO$_2$~for switching applications for $\lambda_{\scriptstyle 0}\gtrsim1100$~nm
\cite{Dumas,Wang2015,Hashemi,Sereb2022,Tripathi}. These applications
are premised on two unambiguous states: the {\sf ON} state in which VO$_2$~is purely monoclinic/tetragonal
and the {\sf OFF} state in which VO$_2$~is purely tetragonal/monoclinic.
Although reversible, the thermal transformation is hysteretic. In other words, the properties of VO$_2$~in the intermediate thermal regime
($58$~$^\circ$C~to $72$~$^\circ$C) depend on whether the material is being heated/cooled from having only monoclinic/tetragonal
crystals to having only
tetragonal/monoclinic ones. The electromagnetic consequences of thermal hysteresis remain obscure, although
the relative
permittivity $\eps_{\rm vo}(\lambda_{\scriptstyle 0},T)$ has been investigated on both the heating and the cooling branches by a few researchers
\cite{Cormier,Choi,Taylor}.
Scattering by an isotropic dielectric sphere is a basic electromagnetic boundary-value problem \cite{Logan}, with its
solution traceable to Lorenz \cite{Lorenz1,Lorenz2},
Mie \cite{Mie}, and Debye \cite{Debye}. Since
$\eps_{\rm vo}(\lambda_{\scriptstyle 0},T)$ in the intermediate thermal regime is bounded by $\eps_{\rm vo}^{\rm mono}(\lambda_{\scriptstyle 0})$ and $\eps_{\rm vo}^{\rm tetra}(\lambda_{\scriptstyle 0})$ \cite{Cormier,Choi,Taylor},
and $\eps_{\rm vo}^{\rm mono}(\lambda_{\scriptstyle 0})$ differs from $\eps_{\rm vo}^{\rm tetra}(\lambda_{\scriptstyle 0})$, the scattering characteristics of a VO$_2$~sphere of radius $a$ at any specific value of
$\lambda_{\scriptstyle 0}$
will depend not only on the ratio $\bar{a}=a/\lambda_{\scriptstyle 0}$ but also on $T$. If these characteristics on the heating branch are
sufficiently different from those on the cooling branch, they could be useful in determining not only the ambient temperature
$T\in[58\,^\circ{\rm C},72\,^\circ{\rm C}]$
but also
whether the surroundings of a VO$_2$~sphere are being heated or cooled in the intermediate thermal regime.
That idea motivated this research. Standard expressions devolving from the Lorenz--Mie theory
for plane-wave scattering by an isotropic dielectric sphere \cite{BH83} were
used for the extinction, total scattering, absorption, radiation-pressure, back-scattering, and forward-scattering
efficiencies of a VO$_2$~sphere. These quantities were computed as functions
of temperature in the intermediate thermal regime and the manifestations of thermal hysteresis in
electromagnetic scattering were identified.
\section{Theoretical expressions}
Suppose that a plane wave propagating in a fixed direction illuminates the sphere $r\leq a$. Then,
\begin{equation}
Q_{\rm ext} = \frac{1}{2\pi^2\bar{a}^2}{\rm Re}\left\{\sum_{n=1}^{\infty}
\left[(2n+1) \left(a_n+b_n\right)\right]\right\}\,
\end{equation}
is the extinction efficiency,
\begin{equation}
Q_{\rm sca}= \frac{1}{2\pi^2\bar{a}^2} \sum_{n=1}^{\infty}
\left[(2n+1) \left(\vert{a_n}\vert^2+\vert{b_n}\vert^2\right)\right]\,
\end{equation}
is the total scattering efficiency,
\begin{equation}
Q_{\rm abs}=Q_{\rm ext} -Q_{\rm sca}\,
\end{equation}
is the absorption efficiency,
\begin{eqnarray}
&&
\nonumber
Q_{\rm pr}= Q_{\rm ext}-\frac{1}{\pi^2\bar{a}^2}{\rm Re}\left\{
\sum_{n=1}^{\infty}
\left[
\frac{n(n+2)}{n+1}\left(a_n^\ast a_{n+1} + b_n^\ast b_{n+1}\right)
\right.\right.
\\[5pt]
&&\left.\left.
\qquad\qquad+
\frac{2n+1}{n(n+1)}a_n^\ast b_n
\right]
\right\}
\end{eqnarray}
is the radiation-pressure efficiency with the asterisk
denoting the complex conjugate,
\begin{equation}
Q_{\rm b}= \frac{1}{4\pi^2\bar{a}^2} \Big\vert
\sum_{n=1}^{\infty}
\left[(-)^n(2n+1) \left({a_n}-{b_n}\right)\right]
\Big\vert^2
\end{equation}
is the back-scattering efficiency, and
\begin{equation}
Q_{\rm f}= \frac{1}{4\pi^2\bar{a}^2} \Big\vert
\sum_{n=1}^{\infty}
\left[ (2n+1) \left({a_n}+{b_n}\right)\right]
\Big\vert^2
\end{equation}
is
the forward-scattering efficiency
\cite{BH83,Lpr,Lnih}.
The coefficients
\begin{equation}
\left.\begin{array}{l}
\label{eq53}
a_n=\displaystyle{
\frac{\eps_{{\rm vo}}\,j_n(2\pi\baran_{{\rm vo}})\psi_n^{(1)}(2\pi\bar{a})
-j_n(2\pi\bar{a})\psi_n^{(1)}(2\pi\baran_{{\rm vo}})}
{\eps_{{\rm vo}}\,j_n(2\pi\baran_{{\rm vo}})\psi_n^{(3)}(2\pi\bar{a})
-h_n^{(1)}(2\pi\bar{a})\psi_n^{(1)}(2\pi\baran_{{\rm vo}})}
}
\\[10pt]
b_n= \displaystyle{
\frac{j_n(2\pi\baran_{{\rm vo}})\psi_n^{(1)}(2\pi\bar{a})
-j_n(2\pi\bar{a})\psi_n^{(1)}(2\pi\baran_{{\rm vo}})}
{j_n(2\pi\baran_{{\rm vo}})\psi_n^{(3)}(2\pi\bar{a})
-h_n^{(1)}(2\pi\bar{a})\psi_n^{(1)}(2\pi\baran_{{\rm vo}})}
}
\end{array}\right\}\,,
\end{equation}
emerge from the solution of a boundary-value problem \cite{BH83},
with
\begin{equation}
\left.\begin{array}{l}
n_{{\rm vo}} = \sqrt{\eps_{{\rm vo}}}
\\[5pt]
\psi_n^{(1)}(u) = \displaystyle{
\frac{d}{du}\left[ u\, j_n(u)\right]
}
\\[8pt]
\psi_n^{(3)}(u) = \displaystyle{
\frac{d}{du}\left[ u \,h_n^{(1)}(u)\right]
}
\end{array}
\right\}\,,
\end{equation}
where $j_n(u)$ is the spherical Bessel function of order $n$ and argument $u$
and $h_n^{(1)}(u)$ is the spherical Hankel function of the first kind, order $n$, and argument $u$.
An $\exp(-i\omega t)$ dependence on time $t$ is implicit, with $i=\sqrt{-1}$ and
$\omega$ denoting the angular frequency.
\begin{figure}[h]
\centering
\includegraphics[width=5cm]{Waseer_22_2v2Fig1a}
\includegraphics[width=5cm]{Waseer_22_2v2Fig1b}
\caption{${\rm Re}\left\{n_{{\rm vo}}\right\}$ and ${\rm Im}\left\{n_{{\rm vo}}\right\}$ as functions of $T$ for $\lambda_{\scriptstyle 0}=800$~nm
\cite{Cormier}. }
\label{Fig:n800}
\end{figure}
\begin{figure}[h]
\centering
\includegraphics[width=5cm]{Waseer_22_2v2Fig2a}
\includegraphics[width=5cm]{Waseer_22_2v2Fig2b}
\caption{Same as Fig.~\ref{Fig:n800} except for $\lambda_{\scriptstyle 0}=1550$~nm \cite{Cormier}. }
\label{Fig:n1550}
\end{figure}
\section{Numerical Results and Discussion}
Figures~\ref{Fig:n800} and \ref{Fig:n1550} present the real and
and imaginary parts of $n_{{\rm vo}}$ as
functions of $T$ for $\lambda_{\scriptstyle 0}=800$~nm and $\lambda_{\scriptstyle 0}=1550$~nm, respectively \cite{Cormier}.
Since ${\rm Re}\left\{n_{\rm vo}^{\rm mono}\right\}\simeq 7\,{\rm Im}\left\{n_{\rm vo}^{\rm mono}\right\}$ for $\lambda_{\scriptstyle 0}=800$~nm
and ${\rm Re}\left\{n_{\rm vo}^{\rm mono}\right\}\simeq 13\,{\rm Im}\left\{n_{\rm vo}^{\rm mono}\right\}$ for $\lambda_{\scriptstyle 0}=1550$~nm,
monoclinic VO$_2$~is a moderately dissipative insulator for both wavelengths.
However, ${\rm Re}\left\{n_{\rm vo}^{\rm tetra}\right\}\simeq 3\,{\rm Im}\left\{n_{\rm vo}^{\rm tetra}\right\}$ for $\lambda_{\scriptstyle 0}=800$~nm
but ${\rm Re}\left\{n_{\rm vo}^{\rm tetra}\right\}\simeq 0.75\,{\rm Im}\left\{n_{\rm vo}^{\rm tetra}\right\}$ for $\lambda_{\scriptstyle 0}=1550$~nm.
Accordingly, tetragonal VO$_2$~is
\begin{itemize}
\item[(i)] a more dissipative insulator than monoclinic VO$_2$~for $\lambda_{\scriptstyle 0}=800$~nm,
but
\item[(ii)] a plasmonic metal for $\lambda_{\scriptstyle 0}=1550$~nm.
\end{itemize}
Thus,
\begin{itemize}
\item[(i)] both heating and cooling engender
an insulator-to-insulator transformation (IIT)
for $\lambda_{\scriptstyle 0}=800$~nm because ${\rm Re}\left\{\eps_{\rm vo}^{\rm mono}\right\}>0$ and ${\rm Re}\left\{\eps_{\rm vo}^{\rm tetra}\right\}>0$,
\end{itemize}
but
\begin{itemize}
\item[(ii)] heating gives rise to the IMT
whereas cooling creates the MIT
for $\lambda_{\scriptstyle 0}=1550$~nm because ${\rm Re}\left\{\eps_{\rm vo}^{\rm mono}\right\}>0$ and ${\rm Re}\left\{\eps_{\rm vo}^{\rm tetra}\right\}<0$.
\end{itemize}
Switching applications of VO$_2$~exploit the IMT and MIT \cite{Dumas,Wang2015,Hashemi,Sereb2022,Tripathi}
but ignore the IIT and avoid the intermediate thermal regime.
\newpage
\begin{widetext}
\begin{figure}[h]
\centering
\includegraphics[width=11cm]{Waseer_22_2v2Fig3}
\caption{$Q_{\rm ext}$, $Q_{\rm sca}$, $Q_{\rm abs}$, $Q_{\rm pr}$, $Q_{\rm b}$, and $Q_{\rm f}$ as functions of $T$
and $\bar{a}$ for $\lambda_{\scriptstyle 0}=800$~nm. }
\label{Fig:Q800}
\end{figure}
\end{widetext}
\begin{widetext}
\begin{figure}[h]
\centering
\includegraphics[width=11cm]{Waseer_22_2v2Fig4}
\caption{Same as Fig.~\ref{Fig:Q800} except for $\lambda_{\scriptstyle 0}=1550$~nm. }
\label{Fig:Q1550}
\end{figure}
\end{widetext}
\subsection{IIT/IIT ($\lambda_{\scriptstyle 0}<1100$~nm)}
Both heating and cooling engender
a reversible IIT for $\lambda_{\scriptstyle 0}=800$~nm, as is clear from Fig.~\ref{Fig:n800}. Figure~\ref{Fig:Q800}
provides graphs of $Q_{\rm ext}$, $Q_{\rm sca}$, $Q_{\rm abs}$, $Q_{\rm pr}$, $Q_{\rm b}$, and $Q_{\rm f}$ as functions of
$T$ and $\bar{a}$ on both the heating and the cooling branches. The first four efficiencies in that list of six
may be considered as \textit{directionally averaged} metrics of scattering, whereas $Q_{\rm b}$ refers
to the back-scattering direction
and $Q_{\rm f}$ to the forward-scattering direction.
Furthermore, the difference
\begin{eqnarray}
\nonumber
&&
\Delta{Q}_{\ell}=Q_{\ell}{\rm (heating)}-Q_{\ell}{\rm (cooling)}\,,
\\[5pt]
&&\qquad\qquad
\ell\in\left\{{\rm ext},\,{\rm sca},\,{\rm abs},\,{\rm pr},\,{\rm b},\,{\rm f}\right\}\,,
\end{eqnarray}
of each of the six efficiencies on the heating branch relative to its value on the cooling branch
is also plotted with respect to $T$ and $\bar{a}$ in Fig.~\ref{Fig:Q800}; obviously, this difference does not exist
for $T\lesssim58$~$^\circ$C~and $T\gtrsim72$~$^\circ$C.
All six efficiencies in Fig.~\ref{Fig:Q800} are different for purely monoclinic VO$_2$~(i.e., $T\lesssim58$~$^\circ$C) and purely
tetragonal VO$_2$~(i.e., $T\gtrsim72$~$^\circ$C).
Unsurprisingly therefore, significant dependences on temperature exist in
the intermediate thermal regime on both the heating and cooling branches.
The graphs of $Q_{\rm ext}$ and $\Delta{Q}_{\rm ext}$ indicate that the effect of thermal hysteresis on plane-wave extinction
is much more pronounced
when the radius of the VO$_2$~sphere
is less than half the free-space wavelength, with $\Delta{Q}_{\rm ext}$ being of the highest magnitude somewhere
in the middle third of the intermediate thermal regime. As $\bar{a}$ increases from $0.5$, the effect of thermal
hysteresis diminishes rapidly and is barely noticeable when $\bar{a}=1.5$. This may be related to the
fact that $Q_{\rm ext}\to2$ as $\bar{a}\to\infty$, regardless of the composition of the sphere \cite{Brillouin,Berg}.
The effects of thermal hysteresis on $Q_{\rm sca}$ and $Q_{\rm abs}$
are much more pronounced
when $\bar{a}\lesssim0.5$.
Both $\Delta{Q}_{\rm sca}$ and $\Delta{Q}_{\rm abs}$ are also of the highest magnitude somewhere
in the middle third of the intermediate thermal regime. Their magnitudes diminish as $\bar{a}$ increases beyond
about $0.5$, with $\Delta{Q}_{\rm sca}$ and $\Delta{Q}_{\rm abs}$ roughly equal in magnitude but opposite in sign, which is
not surprising since
$\Delta{Q}_{\rm ext}=\Delta{Q}_{\rm sca}+\Delta{Q}_{\rm abs}$.
The graphs of $Q_{\rm pr}$ and $\Delta{Q}_{\rm pr}$ are similar to those of $Q_{\rm ext}$ and $\Delta{Q}_{\rm ext}$, respectively. Hence,
the effect of thermal hysteresis on radiation-pressure efficiency
is much more pronounced for $\bar{a}\lesssim0.5$ than for $\bar{a}\gtrsim0.5$.
The effect of the IIT is barely noticeable for any $\bar{a}\gtrsim1$, i.e., $Q_{\rm pr}$ depends very weakly
on $T$ if VO$_2$~is purely monoclinic or purely tetragonal, or if it comprises crystals of both types in any
proportion.
The back-scattering efficiency is an undulating function of $\bar{a}$ at any $T\in[50\,^\circ{\rm C}, 80\,^\circ{\rm C}]$,
the undulations diminishing in magnitude as $\bar{a}$ increases beyond $0.5$. In general, $Q_{\rm b}$ is higher
for purely monoclinic VO$_2$~than for purely tetragonal VO$_2$. The graph of $\Delta{Q}_{\rm b}$ indicates that thermal hysteresis
is most pronounced at $\bar{a}\sim 0.35$.
In contrast to $Q_{\rm b}$, $Q_{\rm f}$ increases monotonically with $\bar{a}\in[0.25,1.5]$ in Fig.~\ref{Fig:Q800} for
any $T\in[50\,^\circ{\rm C}, 80\,^\circ{\rm C}]$. The difference $\Delta{Q}_{\rm f}$ can be negative or positive as $T$
changes in the intermediate thermal regime for $\bar{a}\lesssim 1$. However, as $\bar{a}$ increases beyond unity,
$\Delta{Q}_{\rm f}$ becomes more negative.
The overall conclusions from Fig.~\ref{Fig:Q800} are as follows:
\begin{itemize}
\item $Q_{\rm ext}$, $Q_{\rm sca}$, $Q_{\rm abs}$, $Q_{\rm pr}$, and $Q_{\rm b}$ are higher for $T\lesssim 58$~$^\circ$C~(purely monoclinic)
than for $T\gtrsim 72$~$^\circ$C~(purely tetragonal), when the sphere is small ($\bar{a}\lesssim0.5$).
\item $Q_{\rm ext}$, $Q_{\rm sca}$, $Q_{\rm abs}$, $Q_{\rm pr}$, and $Q_{\rm b}$ are marginally different for $T\lesssim 58$~$^\circ$C~(purely monoclinic)
from their values for $T\gtrsim 72$~$^\circ$C~(purely tetragonal), when the sphere is large ($\bar{a}\gtrsim0.5$).
\item All six efficiencies are affected by thermal hysteresis most when the sphere is small ($\bar{a}\lesssim0.5$).
\item $Q_{\rm ext}$ and $Q_{\rm pr}$ are affected very little by thermal hysteresis when the sphere is large ($\bar{a}\gtrsim0.5$).
\item $Q_{\rm sca}$, $Q_{\rm abs}$, $Q_{\rm b}$, and $Q_{\rm f}$ are affected steadily by thermal hysteresis as $\bar{a}$ increases beyond unity.
\end{itemize}
\subsection{IMT/MIT ($\lambda_{\scriptstyle 0}>1100$~nm)}
When the free-space wavelength increases
beyond 1100~nm, tetragonal VO$_2$~becomes a plasmonic metal whereas monoclinic VO$_2$~remains a dissipative insulator.
The IMT/MIT is therefore very different from the IIT, as even a casual comparison of Figs.~\ref{Fig:Q800} (for $\lambda_{\scriptstyle 0}=800$~nm)
and \ref{Fig:Q1550} (for $\lambda_{\scriptstyle 0}=1550$~nm) shows. Of course, every one of the six efficiencies in Fig.~\ref{Fig:Q1550} is different for purely monoclinic
VO$_2$~than for purely
tetragonal VO$_2$, and there are significant dependences on temperature in
the intermediate thermal regime on both the heating and cooling branches.
The graph of $Q_{\rm ext}$ in Fig.~\ref{Fig:Q1550} shows that the extinction is more when VO$_2$~is a metal (tetragonal)
rather than a dissipative dielectric (monoclinic), which is also in accord with Fig.~\ref{Fig:Q800}. Furthermore,
the graphs of $Q_{\rm ext}$
and $\Delta{Q}_{\rm ext}$ in Fig.~\ref{Fig:Q1550} indicate that the effect of thermal hysteresis on plane-wave extinction
is somewhat more pronounced for $\bar{a}\lesssim0.5$ than for $\bar{a}\gtrsim0.5$. Whereas $\Delta{Q}_{\rm ext}$ can assume both negative
and positive values for $\bar{a}\lesssim0.5$ in the intermediate thermal regime, it is predominantly negative for $\bar{a}\gtrsim0.5$
in the same regime. Certainly, as $\bar{a}\to\infty$ $Q_{\rm ext}$ must go to $2$ \cite{Brillouin,Berg}, but at a considerably slower rate
with the increase in $\bar{a}$ than in Fig.~\ref{Fig:Q800}.
Also, whereas $\Delta{Q}_{\rm sca}$ has a bump and $\Delta{Q}_{\rm abs}$ has a trough that roughly compensate each
other for $Q_{\rm ext}$ to be barely affected by thermal hysteresis for $\bar{a}\gtrsim0.5$ in Fig.~\ref{Fig:Q800},
$\Delta{Q}_{\rm sca}$ has a trough and $\Delta{Q}_{\rm abs}$ has a bump that do not compensate each other
so that $Q_{\rm ext}$ is affected by thermal hysteresis for $\bar{a}\gtrsim0.5$ in Fig.~\ref{Fig:Q1550}.
Unlike in Fig.~\ref{Fig:Q800},
the graphs of $Q_{\rm pr}$ in Fig.~\ref{Fig:Q1550} are qualitatively different from those of $Q_{\rm ext}$.
The signature of thermal hysteresis for $\bar{a}\gtrsim0.5$ is somewhat more marked when
IMT/MIT occur than when IIT occurs.
The back-scattering efficiency is an undulating function of $\bar{a}$ at any $T\in[50\,^\circ{\rm C}, 80\,^\circ{\rm C}]$,
the undulations diminishing in magnitude as $\bar{a}$ increases beyond $0.5$. In general, $Q_{\rm b}$ is lower
for purely monoclinic VO$_2$~than for purely tetragonal VO$_2$, contrary to Fig.~\ref{Fig:Q800}. The graph of $\Delta{Q}_{\rm b}$ indicates that thermal hysteresis
is most pronounced at $\bar{a}\sim 0.3$.
The forward-scattering efficiency increases monotonically with $\bar{a}\in[0.25,1.5]$ in Fig.~\ref{Fig:Q1550} for
any $T\in[50\,^\circ{\rm C}, 80\,^\circ{\rm C}]$, in contrast to $Q_{\rm b}$. The same tendency is evident
in Fig.~\ref{Fig:Q800}. However, $Q_{\rm f}$ is higher when tetragonal VO$_2$~is a plasmonic metal (Fig.~\ref{Fig:Q1550})
than when it is a dissipative dielectric (Fig.~\ref{Fig:Q800}). Also, $\Delta{Q}_{\rm f}$ is more noticeably negative in the intermediate thermal regime
as $\bar{a}$ increases beyond unity when the IMT/MIT (Fig.~\ref{Fig:Q1550}) occur than when the IIT occurs (Fig.~\ref{Fig:Q800}).
The overall conclusions from Fig.~\ref{Fig:Q1550} are as follows:
\begin{itemize}
\item $Q_{\rm ext}$, $Q_{\rm sca}$, $Q_{\rm b}$, and $Q_{\rm f}$ are noticeably lower for $T\lesssim 58$~$^\circ$C~(purely monoclinic)
than for $T\gtrsim 72$~$^\circ$C~(purely tetragonal), when the sphere is small ($\bar{a}\lesssim0.5$). $Q_{\rm sca}$ shows
the opposite trend, whereas $Q_{\rm pr}$ is about the same for both $T\lesssim 58$~$^\circ$C~and $T\gtrsim 72$~$^\circ$C.
\item All six efficiencies are affected by thermal hysteresis, regardless of the sphere radius.
\item $Q_{\rm ext}$, $Q_{\rm sca}$, $Q_{\rm abs}$, $Q_{\rm pr}$, and $Q_{\rm b}$ are affected steadily by thermal hysteresis as $\bar{a}$ increases beyond unity.
\item $Q_{\rm ext}$, $Q_{\rm sca}$, $Q_{\rm abs}$, $Q_{\rm b}$, and $Q_{\rm f}$ are affected more in the intermediate thermal regime
when tetragonal VO$_2$~is a plasmonic metal (Fig.~\ref{Fig:Q1550}) than a dissipative dielectric (Fig.~\ref{Fig:Q800}).
\end{itemize}
\begin{figure}[h]
\centering
\includegraphics[width=8cm]{Waseer_22_2v2Fig5}
\caption{
$Q_{\rm ext}$, $Q_{\rm sca}$, $Q_{\rm abs}$, $Q_{\rm pr}$, $Q_{\rm b}$, and $Q_{\rm f}$ as functions of $\bar{a}$
on the heating branch when $\lambda_{\scriptstyle 0}=1550$~nm. Left: $T=69.11$~$^\circ$C~(${\rm Re}\left\{\eps_{{\rm vo}}\right\}=1+8.09i$).
Right: $T=69.57$~$^\circ$C~(${\rm Re}\left\{\eps_{{\rm vo}}\right\}=8.50i$).}
\label{Fig:sp}
\end{figure}
\subsection{Vacuum and null-permittivity quasistates}
The IMT/MIT also serves as a route to two electromagnetic quasistates of matter. The first is
the \textit{vacuum quasistate} \cite{Sereb2018}: ${\rm Re}\left\{\eps_{{\rm vo}}\right\}=1$. The second is the \textit{null-permittivity quasistate} \cite{Niu}:
${\rm Re}\left\{\eps_{{\rm vo}}\right\}=0$. Both quasistates are exhibited by many materials that undergo temperature-mediated IMT/MIT, a very good example being indium
antimonide (InSb) \cite{ML-IEEEPJ,Alkhoori2022}. However, the IMT/MIT exhibited by InSb is not hysteretic, in contrast to VO$_2$.
For $\lambda_{\scriptstyle 0}=1550$~nm, we estimated from Fig.~\ref{Fig:n1550} that
\begin{itemize}
\item $\eps_{{\rm vo}}$ =$1+8.09i$ at $T=69.11$~$^\circ$C~and
\item $\eps_{{\rm vo}}$ = $8.50i$ at $T=69.57$~$^\circ$C
\end{itemize}
on the heating branch, whereas
\begin{itemize}
\item $\eps_{{\rm vo}}$ =$1+8.13i$ at $T=64.01$~$^\circ$C~and
\item $\eps_{{\rm vo}}$ = $8.50i$ at $T=64.55$~$^\circ$C
\end{itemize}
on the cooling branch. Figure~\ref{Fig:sp} shows all six efficiencies as functions of $\bar{a}$ when VO$_2$~is in the
vacuum and null-permittivity quasistates on the heating branch. Since the values of ${\rm Im}\left\{\eps_{{\rm vo}}\right\}$ are roughly the same in both
quasistates and considerably exceed unity, there is practically no distinction in the efficiencies
for the two quasistates. As similar findings apply on the cooling branch, there is no need to present the corresponding graphs of the six efficiencies.
\section{Concluding Remarks}
\label{conc}
As temperature changes from about 58~$^\circ$C~to 72~$^\circ$C, the crystal
structure of VO$_2$~transforms from purely monoclinic to purely tetragonal, the transformation being reversible
but hysteretic.
We have studied the response characteristics of a VO$_2$~sphere to planewave illumination to examine the effects of
thermal hysteresis on the extinction, total scattering, absorption, radiation-pressure, back-scattering, and forward-scattering
efficiencies.
Whereas monoclinic VO$_2$~is a dissipative dielectric, tetragonal VO$_2$~is a plasmonic metal for $\lambda_{\scriptstyle 0}>1100$~nm but a dissipative
dielectric for $\lambda_{\scriptstyle 0}<1100$~nm. Thus, two distinct types of reversible but hysteretic transformations are possible.
Clear signatures
of thermal hysteresis in the insulator-to-insulator transformation are to be found in $Q_{\rm f}$, $Q_{\rm abs}$, and $Q_{\rm b}$ (in that order, in our
opinion). Clear signatures
of thermal hysteresis in the insulator/metal-to-metal/insulator transformation are to be found in $Q_{\rm f}$, $Q_{\rm abs}$, $Q_{\rm sca}$,
and $Q_{\rm b}$ (in that order). The contrast between the two dissipative dielectric forms of VO$_2$~($\lambda_{\scriptstyle 0}<1100$~nm) being less pronounced than
the contrast between the dissipative dielectric and the metallic forms of VO$_2$~($\lambda_{\scriptstyle 0}>1100$~nm), the IMT/MIT
has clearer signatures
of thermal hysteresis than the IIT.
Thermal hysteresis is responsible for the double occurrences of the vacuum and null-permittivity quasistates in the intermediate
thermal regime when tetragonal VO$_2$~is a plasmonic metal. However, none of the six efficiencies show significant differences
between the two quasistates of VO$_2$.
The electromagnetic consequences of thermal hysteresis exhibited by VO$_2$~may depend on the rate of heating or cooling,
but that dependence has turned out to be difficult to characterize \cite{Hache}. Photoexcitation by a free-electron laser has been
shown to effect the monoclinic-to-tetragonal transformation within 150~fs \cite{Wall}, but not the reverse transformation----which does require
cooling.
\vspace{5mm}
\noindent {\bf Acknowledgments.}
AL thanks the Charles Godfrey Binder Endowment at Penn State for ongoing support of his research efforts.
WIW thanks the Higher Education Commission of Pakistan
for an IRSIP Scholarship that enabled him to spend six months at The Pennsylvania State University.
|
\section{Nomenclature}
{\renewcommand\arraystretch{1.0}
\noindent\begin{longtable*}{@{}l @{\quad=\quad} l@{}}
$\mathbf{b}$ & bias vector\\
$C$ & number of output classes of classification\\
$H$ & impact height\\
$h_\mathrm{img}$ & image height in terms of pixel\\
$l$ & binary cross-entropy loss\\
$M$ & total number of pixels in an image sequence\\
$N_\mathrm{img}$ & total number of images in an image sequence\\
$\mathbf{q}_\mathrm{out}$ & output vector of the linear function that connects input and output layers of feedforward neural network (FNN)\\
$R_0$ & area-equivalent radius\\
$\mathbf{s}_\mathrm{in}$ & vector of an image sequence\\
$U_0$ & impact velocity\\
$\mathbf{W}$ & weight matrix\\
$\mathbf{w}_1$ & weight vector for computing the probability of an image sequence for being a nonsplashing drop\\
$\mathbf{w}_2$ & weight vector for computing the probability of an image sequence for being a splashing drop\\
$w_\mathrm{img}$ & image width in terms of pixel\\
$We$ & Weber number\\
$\mathbf{y}_\mathrm{pred}$ & probabilities vector for the classification of an image sequence\\
$\mathbf{y}_\mathrm{true}$ & vector of the true label of an image sequence\\
$z_0$ & central height of an impacting drop\\
$\gamma$ & surface tension\\
$\mu$ & dynamic viscosity\\
$\rho$ & density\\
$\sigma$ & sigmoid function\\
\end{longtable*}}
\section{Introduction}
\lettrine{T}{he} impact of a liquid drop on a solid surface is an important high-speed phenomenon to aviation field that can be found in technical applications such as spray cooling, gas turbine fuel injection, aircraft icing, among others \cite{burzynski2020splashing,canders2019cooling,zhang2016effect,zhao2018splashing}.
With recent technology of high-speed videography, the observation of micro-sized drop impact at the time scale of nanoseconds is now possible \cite{thoroddsen2008high, visser2015dynamics, visser2012microdroplet}.
Notably, by using a high-speed camera, Lagubeau \textit{et al.} \cite{lagubeau2012spreading} have successfully observed the spreading dynamics, i.e., the evolution of the drop shape during the impact, which was previously described theoretically and numerically \cite{eggers2010drop, roisman2009inertia}.
Nevertheless, owing to the multiphase nature of this phenomenon (that involves the liquid drop, the solid surface, and the ambient air), many important but nonintuitive characteristics could be missed when observation is carried out with the naked eye alone \cite{josserand2016drop, yarin2006drop, rioboo2001outcomes, kim2014drop, yokoyama2022droplet, usawa2021large, hatakenaka2019magic}.
Especially, the observation gets further complicated when splashing occurs, i.e., the impacting drop breaks up and ejects secondary droplets \cite{gordillo2019note,riboux2014experiments,riboux2017boundary,yokoyama2022droplet, usawa2021large, hatakenaka2019magic, kim2014drop}, instead of just spreading over the surface until it reaches the maximum radius \cite{gordillo2019theory,clanet2004maximal}.
To address this issue, an artificial neural network (ANN), which is a supervised machine learning algorithm inspired by biological neural networks \cite{rosenblatt1958perceptron, hornik1989multilayer, hornik1991approximation, chen2019design}, was proposed to aid the observation of the phenomenon of drop impact in our previous study \cite{yee2022image}.
Although ANNs have been widely utilized and have proven effective in carrying out computer vision tasks such as classification and prediction based on images or videos \cite{krizhevsky2012imagenet, he2016deep,voulodimos2018deep}, they usually function as black boxes.
In other words, the underlying reasoning that leads an ANN to a specific decision is often unknown or not properly understood \cite{arrieta2020explainable, adadi2018peeking}.
By solving the issue of explainability and interpretability, ANNs can become powerful tools for advancing the knowledge towards physical phenomena.
In our previous study, a highly interpretable ANN model, namely a feedforward neural network (FNN) with zero hidden layer, was trained and achieved an accuracy higher than 90\% in classifying splashing and nonsplashing drops based on images that show the instantaneous shape of the impacting drops.
This was made possible by the use of highly similar images that were collected under carefully designed videographing conditions and processed with specific digital image processing.
Subsequently, the image features that the FNN identified for classification could be extracted through analyzing the image classification process.
An interesting finding from the study is that the trained FNN identifies the contour height of the main body of the impacting drop as one of the important features for distinguishing splashing and nonsplashing drops.
Although several aspects of drop impact were analyzed and discussed with the aim to identify the possible mechanism underlying the difference in contour height between splashing and nonsplashing drops, it is still unclear at the point of writing.
To further investigate on the reported features and to observe the drop deformation during the impact, the focus of this paper is on the videos or image sequences that shows the temporal evolution of splashing and nonsplashing drops during the early stage of impact.
Remarkably, owing to the high-similarity of the image data, video or image-sequence classification could be performed at a high accuracy by using a FNN with the architecture similar to that used for image classification in our previous study.
The computational process of the well-trained FNN is then visualized to extract the features.
Finally, the physical interpretation and the temporal evolution of the extracted features are analyzed and discussed.
The details are reported in this paper, which is structured as follows.
The methodology of the study, which includes the description of the dataset and implementation of the FNN, is explained in Sec.~\ref{sec:method}.
As for the results, the classification performance of the trained FNN, the process of features extraction, and the physical interpretation and the temporal evolution of the extracted features are analyzed and discussed in Sec.~\ref{sec:result}.
Last, but not least, the concluding remarks and the future prospects of this study are presented in Sec.~\ref{sec:conclusion}.
\section{\label{sec:method}Methodology}
In this section, the dataset of image sequences that show the temporal evolution of the drops during the early stage of impact (Section~\ref{sec:dataset}) and the implementation of the feedforward neural networks (FNNs) for image-sequence classification (Section~\ref{sec:ann}) are explained.
\subsection{\label{sec:dataset} Dataset and Fivefold Cross Validation}
\begin{figure}
\centering
\includegraphics[width=0.45\textwidth]{Figures/setup.png}
\caption{\label{fig:setup} Schematic of the experimental setup used during our previous study \cite{yee2022image} to collect the image data.}
\end{figure}
\begin{table}
\centering
\caption{
\label{tab:data_num}
Numbers of splashing and nonsplashing data for training-validation and testing in each data combination.
The numbers of splashing and nonsplashing data for training-validation or testing are similar among the data combinations.
}
\begin{tabular}{|c|c|c|c|c|c|c|c|}
\hline
\multirow{3}{*}{Combination}
& \multicolumn{7}{c|}{Number of Data} \\\cline{2-8}
& \multicolumn{3}{c|}{Training-Validation} & \multicolumn{3}{c|}{Testing} & Total \\\cline{2-7}
& Splashing& Nonsplashing& Total& Splashing& Nonsplashing& Total& \\\hline
1& 114& 87& 201& 27& 21& 48& 249\\ \hline
2& 112& 86& 198& 29& 22& 51& 249\\ \hline
3& 113& 85& 198& 28& 23& 51& 249\\ \hline
4& 114& 85& 199& 27& 23& 50& 249\\ \hline
5& 111& 89& 200& 30& 19& 49& 249\\ \hline
\end{tabular}
\end{table}
The image data were collected during our previous study \cite{yee2022image}, by using the experiment setup shown in Fig.~\ref{fig:setup}.
They are image data of an ethanol drop (Hayashi Pure Chemical Ind., Ltd.; density $\rho = 789~\rm{kg\:m^{-3}}$, surface tension $\gamma = 2.2 \times 10^{-2}~\mathrm{N\:m^{-1}}$, and dynamic viscosity $\mu = 10^{-3}$~Pa\:s) impacting on a hydrophilic glass substrate (Muto Pure Chemicals Co., Ltd., star frost slide glass 511611) after free-falling from impact height $H$ ranging from $4$--$60$~cm.
The area-equivalent radius of the drop in each of the image data, which is measured before impact, is $R_{0} = (1.29 \pm 0.04)\times 10^{-3}$~m.
The impact velocity $U_0$ and Weber number $We$ $(= \rho U_{0}^2 R_{0}/\gamma)$ range between $0.82$--$3.18~\mathrm{m\:s^{-1}}$ and $31$--$474$, respectively.
The splashing threshold in terms of impact height and Weber number are $H = 20~\mathrm{cm}$ and $We = 173$, respectively.
There are a total of 249 image data: 141 of splashing drops and 108 of nonsplashing drops.
Each of the image data is labeled according to the outcome: splashing or nonsplashing.
The focus of the current study is the temporal evolution of the splashing and nonsplashing drops at the early stage of the impact, which has two dynamical regimes, namely pressure impact and self-similar inertial regimes \cite{lagubeau2012spreading}.
Therefore, the videos or image sequences are formed by combining three images: each from the pressure impact regime when the normalized drop central height $z_0/2R_0 = 0.75$, the transition between pressure impact regime and self-similar inertial regime when $z_0/2R_0 = 0.50$, and the self-similar inertial regime when $z_0/2R_0 = 0.25$, respectively.
Here, $z_0$ is central height of the drop (see Fig.~\ref{fig:z0_2R0}) and $z_0/2R_0$ for each dynamical regime is decided based on the study by Lagubeau \textit{et al.} \cite{lagubeau2012spreading}.
The normalized drop central height $z_0/2R_0$ can be understood as the remaining portion of the drop which has yet to impact the solid surface.
For example, when $z_0/2R_0 = 0.75$, three quarters of the drop has yet to impact the solid surface and one quarter of it has already impacted the solid surface.
Note that $z_0/2R_0$ is arranged in descending order as it decreases with impact time.
Attributed to the specific videographing conditions and digital image processing, the image sequences are highly similar regardless of $H$, $We$, and the outcome, as shown in Fig.~\ref{fig:processed_img}.
Fivefold cross validation was performed to ensure the generalizability of the trained feedforward neural networks (FNNs).
For that, the image sequences of each $H$ were segmented into five combinations of training-validation and testing data with the ratio of 80:20.
This is to ensure that the data of each $H$ are included in both training-validation and testing and distributed evenly among the data combinations.
This is reflected in the similar numbers of splashing and nonsplashing data for training-validation or testing among all data combinations, as shown in Table~\ref{tab:data_num}.
\begin{figure}
\centering
\subfloat[]{
\includegraphics[width=0.6\textwidth]{Figures/z0_2R0_075.png}
\label{fig:z0_2R0_075}}
\hfill
\subfloat[]{
\includegraphics[width=0.6\textwidth]{Figures/z0_2R0_050.png}
\label{fig:z0_2R0_050}}
\hfill
\subfloat[]{
\includegraphics[width=0.6\textwidth]{Figures/z0_2R0_025.png}
\label{fig:z0_2R0_025}}
\caption{\label{fig:z0_2R0}
Illustration of the central height $z_0$ (white-dashed line) of a nonsplashing drop impact with impact height $H = 8~\mathrm{cm}$ and Weber number $We = 73$ when the normalized central height $z_0/2R_0 =$ (\protect\subref*{fig:z0_2R0_075}) $\mathrm{0.75}$, (\protect\subref*{fig:z0_2R0_050}) $\mathrm{0.50}$, and (\protect\subref*{fig:z0_2R0_025}) $\mathrm{0.25}$.
}
\end{figure}
\begin{figure}
\centering
\includegraphics[width=\textwidth]{Figures/processed_img.png}
\caption{\label{fig:processed_img}
Several examples of the image sequences combined from the images of $z_0/2R_0 = 0.75$, $0.50$, and $0.25$ for (left) a nonsplashing drop with $H = 8~\mathrm{cm}$ and $We = 73$, (middle) a splashing drop near the splashing thresholdwith $H = 20~\mathrm{cm}$ and $We = 176$, and (right) a splashing drop with $H = 60~\mathrm{cm}$ and $We = 395$.
Attributed to specific videographing conditions and digital image processing, the image sequences are highly similar regardless of $H$, $We$, and the outcomes.
}\end{figure}
\subsection{\label{sec:ann} Feedforward Neural Network (FNN)}
\begin{figure}
\centering
\includegraphics[width=0.75\textwidth]{Figures/fnn_arch_train.png}
\caption{\label{fig:fnn_arch_train} Training and architecture of the feedforward neural network (FNN) used to classify image sequences of splashing and nonsplashing drops.}
\end{figure}
Feedforward neural network (FNN) is implemented in the Python programming language on Google Colaboratory \cite{carneiro2018performance} using the libraries of TensorFlow \cite{abadi2016tensorflow}.
Figure~\ref{fig:fnn_arch_train} illustrates the training and the architecture of the FNN used to classify splashing and nonsplashing drops based on the image sequences, which show the temporal evolution of the drops at the early stage of impact.
In the input layer, the input image sequence is flattened into a 1-dimensional column vector $\mathbf{s}_\mathrm{in} \in \mathbb{R}^{M}$, for $M = N_\mathrm{img} h_\mathrm{img} w_\mathrm{img}$, where $N_\mathrm{img}$ is the total number of images in an image sequence, $h_\mathrm{img}$ is the height of an image in pixels, and $w_\mathrm{img}$ is the width of an image in pixels.
Each element of ${\bf s}_\mathrm{in}$ in the input layer (red circles in Fig.~\ref{fig:fnn_arch_train}) is fully connected to each element of ${\bf q}_\mathrm{out}$ in the output layer (blue circles) by a linear function:
\begin{equation}
{\bf q}_\mathrm{out} = {\bf W}{\bf s}_\mathrm{in} + {\bf b}
\label{eq:lin_func_out},
\end{equation}
where ${\bf q}_\mathrm{out} \in \mathbb{R}^{C}$ is the output vector, ${\bf W} \in \mathbb{R}^{C \times M}$ is the weight matrix, and ${\bf b} \in \mathbb{R}^{C}$ is the bias vector.
$C$ is the total number of classes for classification, which are splashing and nonsplashing in this case, and so $C=2$.
The value for each element in ${\bf W}$ and ${\bf b}$, which is initialized using Glorot uniform initializer \cite{glorot2010understanding}, is determined through the training.
In the output layer, each element of ${\bf q}_\mathrm{out}$ is activated by a sigmoid function, which saturates negative values at 0 and positive values at 1, as follows:
\begin{equation}
y_{\mathrm{pred},i} = \sigma(q_{\mathrm{out},i}) = \frac{1}{1+e^{-q_{\mathrm{out},i}}}
\label{eq:sigmoid},
\end{equation}
for $i = 1,\dots,C$, where the activated value ${y}_{\mathrm{pred},i}$ is the element of ${\bf y}_\mathrm{pred} \in \mathbb{R}^{C}$.
${\bf y}_\mathrm{pred} = [y_{\mathrm{pred},1}, y_{\mathrm{pred},2}]$ can be interpreted as a vector that contains the probabilities of an input image sequence to be classified as a nonsplashing drop $y_{\mathrm{pred},1}$ and as a splashing drop $y_{\mathrm{pred},2}$.
For training, ${\bf y}_\mathrm{pred}$ is computed for all train image sequences and compared with the respective true labels ${\bf y}_\mathrm{true}\in \mathbb{R}^{C}$.
The true labels for the image sequences of a splashing drop and a nonsplashing drop are ${\bf y}_\mathrm{true} = [0,1]$ and $[0,1]$, respectively.
Binary cross-entropy loss function is used for the comparison between ${\bf y}_\mathrm{pred}$ and ${\bf y}_\mathrm{true}$ as follows:
\begin{equation}
l({\bf y}_\mathrm{true},{\bf y}_\mathrm{pred})
=\sum_{i=1}^{C}\left[
-{y}_{\mathrm{true},i}\ln({ y}_{\mathrm{pred},i})-(1-{y}_{\mathrm{true},i})\ln(1-{y}_{\mathrm{pred},i})\right]
\label{eq:cross_entropy},
\end{equation}
for $i = 1, \dots, C$, where $l$ is the computed loss.
Owing to this equation, the value of $l$ approaches 0 as ${\bf y}_\mathrm{pred}$ approaches ${\bf y}_\mathrm{true}$ and increases significantly as ${\bf y}_\mathrm{pred}$ varies away from ${\bf y}_\mathrm{true}$.
$l$ is computed during training and validation, but not during testing.
Through the backpropagation algorithm \cite{rumelhart1986learning}, the gradient of $l$ with respect to each element of $\bf W$ and $\bf b$ of the FNN is computed.
The computed gradient determines whether to increase or decrease the value of an element and how much it should be increased or decreased when $\bf W$ and $\bf b$ are updated using the algorithm of mini-batch gradient descent \cite{li2014efficient}.
Regularization of early stopping \cite{prechelt1998early} is applied to determine when to stop updating $\bf W$ and $\bf b$.
The percentage accuracy of the trained FNN is also evaluated using the following equation:
\begin{equation}
\text{accuracy}= \frac{\text{number of correct predictions}}{\text{total number of predictions}} \times 100.
\end{equation}
The number of correct predictions is determined by the classification threshold.
The trained FNN classifies an image sequence based on the element of ${\bf y}_\mathrm{pred}$ that has a value equal to or greater than that of the classification threshold.
In this study, the classification threshold is fixed at $0.5$.
For example, if the prediction of an image sequence by the trained FNN is ${\bf y}_\mathrm{pred} = [0.25,0.75]$, then the image sequence will be classified as an image of a splashing drop.
Accuracy is computed during training, validation, and testing.
\begin{figure}
\subfloat[]{
\includegraphics[width=0.45\columnwidth]{Figures/CombALL_Loss.png}
\label{fig:loss} }
\hfill
\subfloat[]{
\includegraphics[width=0.45\columnwidth]{Figures/CombALL_Acc.png}
\label{fig:acc} }
\caption{\label{fig:class_perform} Training and validation of the FNNs for image-sequence classification: (\protect\subref*{fig:loss}) losses and (\protect\subref*{fig:acc}) accuracies after every fifty epochs.
Losses decrease and approach 0 while accuracies increase and approach 1 as the number of epoch increases.
Comb., combination; train., training loss or accuracy; val. validation loss or accuracy.}
\end{figure}
The training and validation of the FNNs for image-sequence classification are evaluated from the plots of losses and accuracies after every fifty epochs, which are shown in Fig.~\ref{fig:class_perform}.
Here, the number of epochs indicates how many times all training-validation image sequences are fed through the FNN for training.
Losses decrease and approach 0 while accuracies increase and approach 1 as the number of epoch increases.
Early stopping prevented overfitting by stopping the updating of $\bf W$ and $\bf b$ when the losses reach the minimum values.
These trends confirmed that the training and validation were carried out properly and the trained FNNs have achieved desired classification performance.
The trained FNNs are then used to classify test image sequences to check the generalizability.
\section{\label{sec:result}Results and Discussion}
In this section, the results and discussion are presented.
In Section~\ref{sec:class_perform}, the testing of the trained feedforward neural network (FNN) is explained.
As for Section~\ref{sec:fea_ext}, the process for extracting the features used by the FNN to classify splashing and nonsplashing drops is elaborated.
Finally, in Section~\ref{sec:time_evolve}, the physical interpretation and the temporal evolution of the extracted features are discussed.
\subsection{\label{sec:class_perform}Testing of Feedforward Neural Networks (FNNs)}
Testing is the evaluation on the ability of the trained feedforward neural network (FNN) in classifying new image sequences that show the temporal evolution of the drop at the early stage of impact.
The results for all data combinations are shown in Table~\ref{tab:test_result_img_seq}.
Among all combinations, test accuracy in classifying image sequences of splashing and nonsplashing drops is higher than $96\%$.
This indicates that the trained FNNs can identify splashing and nonsplashing drops based on their temporal evolution at the early stage of impact.
Such high accuracy in image-sequence classification of the simple but highly interpretable FNN was made possible with the use the highly similar dataset.
The FNNs can now be analyzed to extract the features that they identify to classify splashing and nonsplashing drops.
\begin{table}
\centering
\caption{\label{tab:test_result_img_seq}
Test accuracy of FNNs trained with different data combinations in classifying image sequences of splashing and nonsplashing drops.
The high test accuracy achieved by the trained FNNs indicates that for highly similar dataset, image-sequence classification can be performed using a simple but highly interpretable FNN.
}
\begin{tabular}{|c|c|c|c|c|c|c|}
\hline
\multirow{2}{*}{Combination}&
\multicolumn{6}{c|}{Test Accuracy} \\\cline{2-7} &
\multicolumn{2}{c|}{Splashing} & \multicolumn{2}{c|}{Nonsplashing} & \multicolumn{2}{c|}{Total} \\ \hline
1& 26/27& 96\%& 21/21& 100\%& 47/48& 98\% \\ \hline
2& 28/29& 97\%& 22/22& 100\%& 50/51& 98\% \\ \hline
3& 26/28& 93\%& 23/23& 100\%& 49/51& 96\% \\ \hline
4& 27/27& 100\%& 23/23& 100\%& 50/50& 100\% \\ \hline
5& 28/30& 93\%& 19/19& 100\%& 47/49& 96\%
\\ \hline
\end{tabular}
\end{table}
\subsection{\label{sec:fea_ext} Extraction of Features of Splashing and Nonsplashing Drops}
To extract the features which the trained feedforward neural networks (FNNs) identify for classification, the important pixel positions were determined by reshaping and visualizing the trained weight matrix ${\bf W}$ as follows.
The matrix form of ${\mathbf W} \in \mathbb{R}^{C \times M}$ is
\begin{equation}
{\mathbf W} =
\begin{bmatrix}
W_{1,1} &W_{1,2} &\dots &W_{1,M}\\
W_{2,1} &W_{2,2} &\dots &W_{2,M}\\
\end{bmatrix}
=
\begin{bmatrix}
{\mathbf w}_{1}\\
{\mathbf w}_{2}\\
\end{bmatrix}
\label{eq:W_h},
\end{equation}
where the elements ${\mathbf w}_{1}$ and ${\mathbf w}_{2}$ are the vector elements of the weight matrix for computing the probability of an image sequence being nonsplashing and splashing drops, respectively.
For visualization, ${\mathbf w}_{2} \in \mathbb{R}^M$, was divided into three smaller vectors with a size of $h_\mathrm{img} w_\mathrm{img}$.
Each of these smaller vectors corresponds to the images of the dynamical regimes of pressure impact ($z_0/2R_0 = 0.75$), transition ($z_0/2R_0 = 0.50$), and self-similar inertial ($z_0/2R_0 = 0.25$), respectively, in the image sequences.
The vectors were then reshaped in row-major order into a two-dimensional matrix of $h_\mathrm{img} \times w_\mathrm{img}$, which is the shape of the images in the input image sequence, and viewed as colormaps.
\begin{figure}
\centering
\includegraphics[width=0.7\textwidth]{Figures/trained_weight_comb1_allQ.png}
\caption{
\label{fig:trained_w}
Colormaps of the reshaped vectors of ${\mathbf w}_{2}$, which correspond to the images of the dynamical regimes of pressure impact ($z_0/2R_0 = 0.75$), transition ($z_0/2R_0 = 0.50$), and self-similar inertial ($z_0/2R_0 = 0.75$), respectively, of the FNN trained with combination 1.
\textcircled{1}, \textcircled{2}, and \textcircled{3} indicate the distributions of values with large magnitudes, which correspond to the features of typical splashing and nonsplashing drops indicated by \textcircled{1}, \textcircled{2}, and \textcircled{3} in Fig.~\ref{fig:typ_drop}.
The distributions are similar for the FNNs trained other combinations.
}
\end{figure}
\begin{figure}
\centering
\includegraphics[width=1.0\textwidth]{Figures/typ_drop.png}
\caption{
\label{fig:typ_drop}
Image sequences of typical splashing ($H = 60~\mathrm{cm}$ and $We = 395$ of Fig.~\ref{fig:processed_img}) and nonsplashing drops ($H = 8~\mathrm{cm}$ and $We = 73$ of Fig.~\ref{fig:processed_img}).
\textcircled{1} indicates the ejected secondary droplets around the aerodynamically lifted lamella of the splashing drop, \textcircled{2} the relatively high contour of the main body of the splashing drop, and \textcircled{3} the relatively short and thick lamella of the nonsplashing drop.
These areas correspond to the distribution of values with large magnitudes in the colormaps of the reshaped vectors of ${\mathbf w}_2$ shown in Fig.~\ref{fig:trained_w}.
}
\end{figure}
For explanation, the colormaps of the reshaped vectors of ${\mathbf w}_{2}$ for the FNN trained with combination 1 is presented in Fig.~\ref{fig:trained_w}.
The blue-green-red (BGR) scale is from -0.020 to 0.020.
Note that only those with combination 1 are shown because they are similar to those with other combinations.
In the colormaps, the distribution of the extreme values, i.e., values of large magnitudes, show the important features which help the FNN to classify splashing and nonsplashing drops, where the extreme negative values shown in blue are the features of splashing drops, while the extreme positive values shown in red are the features of nonsplashing drops.
The process of how the extreme negative and positive values of the trained weight $\bf W$ help the FNN in image-sequence classification is similar to that in the image classification reported in our previous study \cite{yee2022image}.
Therefore, the explanation is omitted in this paper.
Moreover, the colormaps of the reshaped vectors of ${\mathbf w}_1$, which computes the nonsplashing probability of an image sequence, and the related discussion are not included in this paper because the extracted features and the way they help the FNN in image-sequence classification are the same as those of ${\mathbf w}_2$.
By comparing the distribution of the extreme values in the colormaps of the reshaped vectors of ${\mathbf w}_2$ with the image sequences of a typical splashing drop and a typical nonsplashing drop in Fig.~\ref{fig:typ_drop}, it is found that the distribution of the values of large magnitudes resembles the temporal evolution of the impacting drops.
Remarkably, the extreme negative values (blue) are distributed around the areas that correspond to the temporal evolution of \textcircled{1} the ejected secondary droplets around the aerodynamically lifted lamella\footnote{Lamella is the thin liquid sheet ejected from the side of an impacting drop.} and \textcircled{2} the relatively high contour of the main body of a splashing drop.
On the other hand, the extreme positive values (red) are found around the area that correspond to the temporal evolution of \textcircled{3} the relatively short and thick lamella of a nonsplashing drop.
The distribution of these extreme values in each reshaped vector is symmetric, except for the distribution of the extreme negative values at the area around \textcircled{2} of the reshaped vector that corresponds to $z_0/2R_0 = 0.25$.
These findings indicate that the trained FNN identifies \textcircled{1} the ejected secondary droplets around the aerodynamically lifted lamella and \textcircled{2} the relatively high contour of the main body as the features of a splashing drop, while \textcircled{3} the relatively short and thick lamella as the feature of a nonsplashing drop.
Such features are similar to the instantaneous image features extracted through image classification performed in our previous study \cite{yee2022image}.
The physical interpretation and the temporal evolution of these features are discussed in Section~\ref{sec:time_evolve}.
For the trained bias $\bf b$, the order of magnitude of the elements is $10^{-3}$, which is much smaller than the elements of ${\bf q}_\mathrm{out}$ computed by the trained FNNs.
On the other hand, among the test image sequences of all data combinations, the smallest absolute value of ${q}_\mathrm{out}$ is 0.43.
Therefore, ${\bf q}_{out} \approx {\bf W}{\bf s}_{in}$.
This indicates that the trained $\bf b$ did not affect the classification of the FNN and is negligible.
\subsection{\label{sec:time_evolve}Physical Interpretation and Temporal Evolution of Features of Splashing and Nonsplashing Drops}
\begin{figure}
\centering
\includegraphics[width=0.95\textwidth]{Figures/hist.png}
\caption{
\label{fig:hist}
Number of elements for each value in each reshaped vector of ${\mathbf w}_{2}$.
For the analysis on the features of splashing drops, the upper inset shows the number of elements with extreme negative values, which are less than $-0.010$.
The number of elements with extreme negative values is highest when $z_0/2R_0 = 0.75$, followed by $z_0/2R_0 = 0.50$, and is lowest when $z_0/2R_0 = 0.25$.
On the other hand, for the analysis on the features of nonsplashing drops, the lower inset shows the number of elements with extreme positive values, which are greater than $0.006$.
For the elements with values $\geq 0.008$, their number increases from $z_0/2R_0 = 0.75$ to $0.50$ and has the highest number when $z_0/2R_0 = 0.25$.
}
\end{figure}
In this subsection, the physical interpretation and the temporal evolution of the features of the splashing and nonsplashing drops are analyzed and discussed.
Careful observation on the colormaps of the reshaped vectors of ${\mathbf w}_2$ in Fig.~\ref{fig:trained_w} shows that the distribution of extreme negative values decreases while that of extreme positive values increases in the order of $z_0/2R_0 = 0.75$, 0.05, and 0.25.
Such observation is confirmed by the histogram for the elements in each reshaped vector of ${\mathbf w}_2$, which is plotted using the hist() function of Matplotlib library \cite{hunter2007matplotlib} in Fig.~\ref{fig:hist}.
Note that most of the elements have the values around 0.00 and do not affect the classification of the trained FNN.
They occupy areas that correspond to the image background and the main body of the impacting drop, which are highly similar for both splashing and nonsplashing drops.
Therefore, the important elements which affect the classification are those with extreme values, where the extreme negative and positive values indicate the features of splashing and nonsplashing drops, respectively.
For the analysis on the features of splashing drops, the upper inset shows the number of elements with extreme negative values, which are less than $-0.010$.
The number of elements with extreme negative values is highest when $z_0/2R_0 = 0.75$, followed by $z_0/2R_0 = 0.50$, and is lowest when $z_0/2R_0 = 0.25$.
On the other hand, for the analysis on the features of nonsplashing drops, the lower inset shows the number of elements with extreme positive values, which are greater than $0.006$.
For the elements with values $\geq 0.008$, their number increases from $z_0/2R_0 = 0.75$ to $0.50$ and has the highest number when $z_0/2R_0 = 0.25$.
As $z_0/2R_0$ decreases with impact time, the findings here indicate that as impact time elapses, the features of splashing and nonsplashing drops become less and more important, respectively, in helping the trained FNN in classification.
The analysis of the splashing features shown in the upper inset of Fig.~\ref{fig:hist} correspond to the temporal evolution of both \textcircled{1} the ejected secondary droplets around the aerodynamically lifted lamella and \textcircled{2} the relatively high contour of the main body.
However, it is necessary to analyze each of the features individually.
For that, a histogram is plotted for each of the feature by cropping the reshaped vectors of ${\mathbf w}_{2}$ into three equal parts as shown in Fig.~\ref{fig:trained_w_crop}, where the left and right areas are cropped for plotting the histogram for \textcircled{1} and the middle area is cropped for plotting the histogram for \textcircled{2}.
The histograms are shown in Fig.~\ref{fig:hist_neg_all}.
By comparing both histograms, there are more elements with extreme negative values in the areas cropped \textcircled{1} with a much lower minimum value, indicating that \textcircled{1} is a more dominant feature of a splashing drop from the perspective of the trained FNN.
This is as expected because the areas cropped for \textcircled{1} are two times larger than that for \textcircled{2}.
In addition, \textcircled{1} represents the typical definition of a splashing drop, namely, the ejection of secondary droplets from the impacting drop \cite{josserand2016drop, yarin2006drop}.
However, it is necessary to point out that the extreme negative values in the area cropped for \textcircled{1} only occupy the lower half of each of the reshaped vectors of ${\mathbf w}_2$.
This indicates that the trained FNN only checks the ejected secondary droplets around the aerodynamically lifted lamella.
This can be related to the physical theory introduced by Riboux and Gordillo \cite{riboux2014experiments} that attributes splashing to the aerodynamic lift force that acts on the lamella of the impacting drop.
In terms of temporal evolution, for both \textcircled{1} and \textcircled{2}, the number of elements with extreme negative values is the highest when $z_0/2R_0 = 0.75$ and decreases together with $z_0/2R_0$.
For \textcircled{1}, this is because when $z_0/2R_0 = 0.75$, the ejected secondary droplets are more concentrated around the aerodynamically lifted lamella.
As impact time elapses, the ejected secondary droplets travel further and become more scattered.
As for \textcircled{2}, to the best of the authors' knowledge, it is first identified as a feature of a splashing drop in our previous study \cite{yee2022image}.
Since the physical interpretation is still unclear, it is difficult to discuss why the feature becomes less prevalent as time elapses.
Eventually, the distribution of the extreme negative values that correspond to \textcircled{2} become asymmetric and only appear on the right half of the colormap that corresponds to $z_0/2R_0 = 0.25$.
As for the features of a nonsplashing drop that are indicated by the extreme positive values, they correspond to the temporal evolution of \textcircled{3} the relatively short and thick lamella.
Owing to the lower Weber number $We$ of a nonsplashing drop, the lamella of a nonsplashing drop ejects at a later time and a lower velocity as compared to a splashing drop. \cite{riboux2014experiments,riboux2017boundary}.
Therefore, when $z_0/2R_0 = 0.75$, the lamella of a nonsplashing drop just starts to be ejected.
As time elapses, although the lamella of a nonsplashing drop grows, it is still much shorter as compared to the fast-growing lamella of a splashing drop.
Nevertheless, the lamella of a nonsplashing drop grows thicker thus easier to be identified by the FNN.
This explains why the vector corresponds to $z_0/2R_0 = 0.75$ has the highest number of elements with extreme positive values.
To summarize this subsection, the trained FNN captured the important features that distinguish splashing and nonsplashing drops from every image in the image sequences, which show the temporal evolution of the drop during the early stage of impact.
Moreover, it also captured the temporal evolution of these features.
The physical interpretation of these features and the respective temporal evolution have been identified except for \textcircled{2} the difference in contour height of the main body between splashing and nonsplashing drops.
\begin{figure}
\centering
\includegraphics[width=0.6\textwidth]{Figures/trained_w_crop.png}
\caption{
\label{fig:trained_w_crop}
Colormaps of the reshaped vectors of ${\mathbf w}_{2}$ are cropped horizontally into three equal parts, where the left and right parts are cropped for plotting the histogram for \textcircled{1} (Fig.~\ref{fig:hist_lam}) while the center part is cropped for plotting the histogram for \textcircled{2} (Fig.~\ref{fig:hist_mb}).
}
\end{figure}
\begin{figure}
\subfloat[]{
\includegraphics[width=0.45\columnwidth]{Figures/w2_hist_neg_lam.png}
\label{fig:hist_lam} }
\hfill
\subfloat[]{
\includegraphics[width=0.45\columnwidth]{Figures/w2_hist_neg_mb.png}
\label{fig:hist_mb} }
\caption{\label{fig:hist_neg_all} Number of elements with extreme negative values, which are less than $-0.010$, in (\protect\subref*{fig:hist_lam}) the left and right parts (histogram for \textcircled{1}) and (\protect\subref*{fig:hist_mb}) the center (histogram for \textcircled{2}) in each reshaped vectors of ${\mathbf w}_{2}$.
In (\protect\subref*{fig:hist_lam}), there are more elements with extreme negative values and the minimum value is much lower, as compared to (\protect\subref*{fig:hist_mb}).
This indicates that \textcircled{1} is a more dominant feature of a splashing drop.
In terms of temporal evolution, for both (\protect\subref*{fig:hist_lam}) and (\protect\subref*{fig:hist_lam}), the number of elements with extreme negative values is the highest when $z_0/2R_0 = 0.75$ and decreases together with $z_0/2R_0$.
}
\end{figure}
\section{\label{sec:conclusion} Conclusion and Outlook}
In this study, classification of splashing and nonsplashing drops has been successfully performed based on the image sequences that show the temporal evolution of the drops during the early stage of impact.
Test accuracy higher than 96\% has been achieved using a highly interpretable feedforward neural network (FNN) with zero hidden layer.
This was made possible by using the highly similar image sequences for training-validation and testing.
The features used by trained FNN to identify a splashing drop is the temporal evolution of the ejected secondary droplets around the aerodynamically lifted lamella and the relatively high contour of the main body.
Whereas to identify a nonsplashing drop, the FNN checks the temporal evolution of the relatively short and thick lamella.
These features are similar to those extracted through the image-based classification reported in our previous study \cite{yee2022image}.
The temporal evolution of these features were analyzed.
The analysis shows that from the perspective of the trained FNNs, the splashing features become less prevalent while the nonsplashing features become more prevalent as time elapses.
Eventually, we hope that our study can be developed into a data-driven simulation for modeling the deformation of a splashing drop during the impact on a solid surface.
Therefore, for the next step of this study, it is suggested to add more images to the image sequences so that more details of the temporal evolution of the drop during the impact can be captured by the artificial neural network (ANN).
Moreover, it is also recommended to train the ANN to perform next-frame prediction for predicting the temporal evolution of the drop during the impact.
\section*{Acknowledgments}
This work was funded by Epson International Scholarship Foundation, Rotary Yoneyama Memorial Foundation, Japan Society for the Promotion of Science (Grant Nos. 20H00223, 20H00222, and 20K20972) and Japan Science and Technology Agency PRESTO (Grant No. JPMJPR21O5).
The authors would also like to thank Dr. Masaharu Kameda (Professor, Tokyo University of Agriculture and Technology) for his valuable discussions and suggestions.
|
\subsection{GAN inversion and attribute manipulation}
In this study, we convert a reconstruction problem into a GAN inversion task.
This work seeks to relieve the bottleneck and enhance performance using in-domain GAN \cite{zhu2020domain}, which not only reconstructs facial images from brain activity, but also reveals semantics of inverted code.
We found that attribute manipulation can be used to improve consistency between the reconstructed image and the stimulus image (Tables~\ref{tab:recon_attr_acc}).
For example, comparing with VAE-GAN \cite{VanRullen2019}, we can retain the correct gender characteristic (Fig.~\ref{fig:method_compare}C) using the proposed framework.
Also, Table \ref{tab:rec_attr_consistency_human} shows that images generated by our method coincide with human perception of specific attributes.
These findings suggest that we can achieve better results by leveraging capabilities of learning semantically meaningful latent codes and adjusting facial characteristics.
The proposed framework divides the problem of visual reconstruction into multiple sub-problems, each of which can be solved using current state-of-the-art methods.
Using styleGAN-v2 and in-domain GAN, the trained facial image encoder and generator reconstructed CelebA faces with high similarity to the original images (Fig.~\ref{fig:encoder_and_generator_result}).
However, the similarity between the visual stimuli and images reconstructed from fMRI data became relatively low (Fig.~\ref{fig:Manipulate_recon_images}).
This may have resulted from the linear mapping between fMRI data and the latent space, which is a compromise solution to link brain activity and image latent space.
Linear mapping does not consider knowledge of semantics.
However, if linear mapping is replaced with deep learning approaches, insufficient fMRI data leads to over-fitting.
Although fMRI-based and latent-code-based attribute classifiers (Tables~\ref{tab:fmri_clsfer_result} and \ref{tab:svm_rlt}) both showed much lower testing accuracy than image-based attribute classifiers (Table~\ref{tab:img_clsfer}), improving their accuracy may not increase the similarity between reconstructed and original facial images.
This is because manipulation of attributes generally modifies details of facial images and rarely changes the contour or outline of faces (Figs.~\ref{fig:manipulated_images} and \ref{fig:Manipulate_recon_images}).
On the other hand, convolutional neural networks and SVM are powerful methods for classification and boundary decision, respectively.
The low performance of the fMRI attribute classifier may result from insufficient data.
Compared to the number of CelebA images for training image attribute classifiers, far less fMRI data was used to train attribute classifiers, which may have limited its performance.
Thus, these results suggest that increasing the amount of fMRI data and replacing linear mapping with other advanced methods may further improve the performance of visual reconstruction.
In this study, activity in the occipital cortex and part of the temporal and parietal regions was selected for reconstruction of images.
Compared to using only temporal or frontoparietal regions, reconstruction using brain activity in occipital regions achieves the highest performance \cite{VanRullen2019}.
The occipital areas are mainly to process low-level features.
To enrich information related to attributes, we additionally selected brain areas higher in the visual processing hierarchy, which is responsible for processing abstract concepts or categorical features.
The fusiform region, which is located in the inferior temporal cortex, serves an important function in face recognition \cite{mccarthy1997face}.
Moreover, the superior parietal lobule and postcentral gyrus are on the visual ``where" pathway and are responsible for spatial attention \cite{caminiti1996sources,Iwamura2001}.
Even though our comprehensive analyses show improved attribute consistency, this study has several limitations.
First, the training data require annotations of attributes.
Fortunately, CelebA provides 40 annotations for facial images.
To label attributes of new datasets, semi-supervised learning largely reduces manual labeling efforts.
Second, manipulation of attributes may be biased by training data; thus, reconstructed images deviate from originals.
The second row of Fig.~\ref{fig:manipulated_images} shows that the manipulation in the positive direction of ``wearing lipstick" also enhanced female attributes.
However, when manipulating the image toward negative attributes such as ``female", ``not wearing lipstick", and ``mouth closed", the results might be biased because the original image was consistent with these attributes.
Fig.~\ref{fig:Manipulate_recon_images} also shows that a female with long hair became a male with short hair after manipulation, even though the original stimulus was a male with long hair.
It is resulted from the co-occurrence of ``female" and ``wearing lipstick" and of ``male" and ``short hair" in the training data.
Thus, although the attribute manipulation following \cite{shen2020interpreting} applied conditional manipulation to isolate one attribute from another, some entangled attributes are difficult to manipulate independently.
Third, images reconstructed from fMRI data corresponding to the same visual stimulus were different (Figs.~\ref{fig:Manipulate_recon_images} and \ref{fig:method_compare}).
To the best of our knowledge, previous visual reconstruction studies have not attempted to solve this many-to-one problem.
However, we speculate that as the number of attributes to be manipulated increases and the performance of the fMRI-based attribute classifier is improved, the similarity among reconstructed images corresponding to a single stimulus will also increase.
Despite the limitations of this study, our results indicate that the proposed framework successfully improved attribute consistency.
To conclude, this paper presents the first framework utilizing the power of GAN-inversion to edit attributes for fMRI-based visual reconstruction research.
Our results further demonstrate that the proposed framework can reconstruct images from fMRI data having attributes highly consistent with the original visual stimuli.
We also indicated potential directions to improve the performance of the proposed framework in the future.
Altogether, the proposed framework may shed light on visual reconstruction from brain activity in regard to attribute consistency.
\subsection{Visual Stimulation Experiment}
A male subject, S1, participated in fMRI recordings (3T Philips ACHIEVA scanner, gradient echo pulse sequence, TR = 2s, TE = 10 ms, slice thickness = 3 mm with 0.2 mm gap, in-plane voxel dimensions $3 \times 3$ mm) during a one-back comparison task conducted in the previous study of VanRullen et al. \cite{VanRullen2019}. A total of 8440 and 20 colored face images were randomly selected from CelebFaces Attributes (CelebA) Dataset \cite{liu2015faceattributes} as the visual stimuli for training and testing data, respectively. CelebA comprises 29,264 $128 \times 128$ facial images, each of which is annotated with 40 binary attributes. In this study, three attributes with balanced ratios were selected: (1) male, (2) mouth slightly open, and (3) wearing lipstick (Table \ref{tab:img_clsfer}).
In the one-back comparison task, each face stimulus was presented for 1 s, followed by a 2-s inter-stimulus interval. The participant pressed the button as fast as possible when a facial image was identical to the previous one. Each run consisted of 88 face trials and 30 null fixation trials, with 6-second pauses at beginning and end of each run. Among the 88 face trials, 10 face stimuli (five males and five females) were randomly drawn from the 20 testing face images and 8 trials were one-back trials, which repeatedly showed facial stimuli of the preceding trial. Note that each training face image was shown once, but each of testing face images was shown 39 to 53 times. Brain responses of one-back trials were discarded in the brain decoder training step. In the null fixation trial, a cross was presented at the center of the screen. The participant attended a total of 8 scan sessions, each of which consisted of 10 to 14 runs.
\begin{table}
\centering
\caption[Ratio and accuracy for each image attribute]{Ratio of image attribute and accuracy of image attribute classifier}
\begin{tabular}{|l|c|c|c|c|}
\hline
\multirow{2}{*}{\textbf{Attribute}} & \multicolumn{2}{c|}{\textbf{Training data}} & \multicolumn{2}{c|}{\textbf{Testing data}} \\
\cline{2-5}
& {\textbf{\textit{Ratio (\%)}}} & {\textbf{\textit{Acc (\%)}}} & {\textbf{\textit{Ratio (\%)}}} & {\textbf{\textit{Acc (\%)}}} \\ \hline
Male & 49.34 & 99.98 & 50.00 & 95.00 \\ \hline
Wearing lipstick & 41.14 & 99.55 & 25.00 & 80.00 \\ \hline
Mouth slightly open & 47.79 & 99.49 & 45.00 & 85.00 \\ \hline
\end{tabular}
\label{tab:img_clsfer}
\end{table}
\subsection{Data Preprocessing}
fMRI data were first preprocessed using DPABI \cite{yan2016dpabi}, a toolbox developed on SPM12 \cite{Friston2007SPM}, in the following steps: slice timing correction, realignment, co-registration between functional and structural data, segmentation, and normalization using DARTEL \cite{Ashburner2007dartel} to non-linearly register the subject space to the MNI space with $61\times73\times61$ dimensions. Then the brain response of each trial was computed from preprocessed data using the general linear model of SPM12 \cite{Friston2007SPM} with timings of fixation, training face, testing face and one-back as regressors. For each trial, brain responses from the 4,720 voxels located in the bilateral calcarine sulcus, inferior occipital, fusiform gyrus, postcentral gyrus, and superior parietal lobule were selected and flattened to a one-dimensional array for further analysis. Parcellation of brain areas was based on automated anatomical atlas 3 (AAL3) \cite{Rolls2020aal}.
\subsection{Facial Image Reconstruction}
In this study, we sought to develop a generative model that can produce a facial image from fMRI data.
As shown in Fig.~\ref{fig:overall}, the main architecture consists of four models, including a feature mapping matrix $\emph{\textbf{W}}$, an fMRI attribution classifier, an attribute manipulator and an image generator $\emph{G}$.
First, fMRI data are used to form a latent vector $\emph{\textbf{z}}$ which is calculated by a mapping matrix $\emph{\textbf{W}}$.
Then, the attribute manipulator is used to adjust details to get the edited latent $\tilde{\emph{\textbf{z}}}$ for each selected facial characteristic using information from fMRI attribute classifiers.
Finally, the edited latent is used to generate a facial image having attribute consistency with the seen image by image generator $\emph{G}$.
\subsubsection{Facial image encoder}\label{sec:FIE}
In order to explore the relationship between brain activity and the corresponding image, we consider this problem as a GAN inversion task that seeks to find a latent code to recover the input image.
In this study, we follow the in-domain GAN approach proposed by Zhu et al. ~\cite{zhu2020domain} to train a facial image encoder to obtain the proper image latent codes for calculation of a mapping matrix $\emph{\textbf{W}}$.
As noted by \cite{shen2020interpreting, yang2021semantic}, a well-trained GAN model can be used to encode interpretable semantics in latent space.
As shown in Fig.~\ref{fig:encoder_training}, to obtain a proper latent code, we first train an image generator $G(\cdot)$ followed by styleGAN-v2 architecture \cite{karras2020analyzing} to produce a realistic facial image.
Then, given a fixed GAN generator, the GAN inversion process attempts to discover the most accurate image latent code to reconstruct the original input image.
Hence, we fix the parameters of the generator, and train a facial image encoder to obtain the latent code in image latent space.
Encoder $E(\cdot)$ and discriminator $D(\cdot)$ are trained via minimizing loss functions $\mathcal{L}_{E}$ and $\mathcal{L}_{D}$:
\begin{equation}
\begin{split}
\min_{\Theta_{E}}\mathcal{L}_{E} = &\left \| \textbf{x}^{real} - G(E(\textbf{x}^{real})) \right \|_{2}\\
&+ \lambda_{vgg}\left \| F(\textbf{x}^{real}) - F(G(E(\textbf{x}^{real}))) \right \|_{2}\\
&-\lambda_{adv}E_{\textbf{x}^{real} \sim P_{data}}[D(G(E(\textbf{x}^{real})))],
\end{split}
\end{equation}
\begin{equation}
\begin{split}
\min_{\Theta_{D}}\mathcal{L}_{D} = & E_{\textbf{x}^{real} \sim P_{data}}[D(G(E(\textbf{x}^{real})))]\\
&- E_{\textbf{x}^{real} \sim P_{data}}[D(\textbf{x}^{real})]\\
&+ \frac{\gamma}{2}E_{\textbf{x}^{real} \sim P_{data}}[\left \| \bigtriangledown_{x} D(\textbf{x}^{real}) \right \|^{2}_{2}],
\end{split}
\end{equation}
where $\Theta_{E}$ and $\Theta_{D}$ are parameters of encoder and discriminator, $F(\cdot)$ is VGG feature extraction model \cite{simonyan2014very}, $\lambda_{vgg}$ and $\lambda_{adv}$ are perceptual and discriminator loss weights, $P_{data}$ is the distribution of real image data, and $\gamma$ is the hyperparameter for gradient regularization.
In this study, the trained facial image encoder $E(\cdot)$ converts each of 128 $\times$ 128 facial images to the corresponding image latent code with 512-dimensionality.
\begin{figure}[t]
\begin{center}
\includegraphics[clip, trim= 0.5cm 14.5cm 10cm 2.5cm, width=0.5\textwidth]{figure/encoder_training.pdf}
\end{center}
\caption{The illustration for training image latent.}
\label{fig:encoder_training}
\end{figure}
\subsubsection{Brain Decoder}
The goal of the brain decoder is to convert fMRI data to image latent code for further facial image reconstruction.
As mentioned above, we can discover efficient latent code to reconstruct the corresponding input image using the facial image encoder.
Following \cite{VanRullen2019}, a simple brain decoder is trained to associate the facial image latent code with corresponding fMRI data.
We assume that there is a mapping matrix \emph{\textbf{W}}, which can conduct linear transformation between facial image latent codes and brain signals:
\begin{equation}
\emph{\textbf{Y}}_{N \times 4720} = \emph{\textbf{Z}}_{N \times 513} \cdot \emph{\textbf{W}}_{513 \times 4720},
\end{equation}
where \emph{\textbf{Z}} is facial image latent codes with bias term, \emph{\textbf{Y}} denotes flattened brain activity, and $N$ is the number of training facial images.
In this mathematical form, we apply pseudo inverse to estimate the optimal mapping matrix $\emph{\textbf{W}}^\mathrm{*}$:
\begin{equation}
\emph{\textbf{Z}}^\mathrm{T}\emph{\textbf{Y}} = \emph{\textbf{Z}}^\mathrm{T}\emph{\textbf{Z}} \cdot \emph{\textbf{W}},
\end{equation}
\begin{equation}
\emph{\textbf{W}}^\mathrm{*} = (\emph{\textbf{Z}}^\mathrm{T}\emph{\textbf{Z}})^{-1} \cdot \emph{\textbf{Z}}^\mathrm{T}\emph{\textbf{Y}}.
\end{equation}
With the optimal mapping matrix $\emph{\textbf{W}}^{\mathrm{*}}$, we can convert brain activity into a latent code in image space:
\begin{equation}
\emph{\textbf{Y}}\emph{\textbf{W}}^{\mathrm{*T}} = \emph{\textbf{Z}} \cdot \emph{\textbf{W}}^{\mathrm{*}}\emph{\textbf{W}}^{\mathrm{*T}},
\end{equation}
\begin{equation}
\emph{\textbf{Z}} = \emph{\textbf{Y}}\emph{\textbf{W}}^{\mathrm{*T}} \cdot (\emph{\textbf{W}}^{\mathrm{*}}\emph{\textbf{W}}^{\mathrm{*T}})^{-1}.
\end{equation}
During the testing phase, the mapped latent codes are normalized to align the mean and standard deviation calculated from the training latent \emph{\textbf{Z}}, and to discard the bias term to obtain the 512-dimension image latent code.
\subsubsection{Attribute Manipulation}
As mentioned above, we can convert fMRI data to a facial image using the mapping matrix $\emph{\textbf{W}}$ and a face image generator, but semantics (also called attributes) are not considered in these two transformations.
Following the idea of InterFaceGAN \cite{shen2020interpreting}, we apply the attribute manipulation mechanism to give the reconstructed image higher attribute consistency with the original stimulus image.
Given a well-trained GAN model, the generator can be formulated as a function $g: \mathcal{Z} \rightarrow \mathcal{X}$.
Here, $\mathcal{Z} \subseteq \mathbb{R}^{d}$ denotes the $d$-dimension latent space, and $\mathcal{X}$ stands for the image space.
We suppose that there is a semantic scoring function $f_{S}:\mathcal{X} \rightarrow \mathcal{S}$, where $\mathcal{S} \subseteq \mathbb{R}^{m}$ represents the semantic space with $m$ attribute.
We can bridge the latent space $\mathcal{Z}$ and the semantic space $\mathcal{S}$ with $\textbf{s} = f_{S}(g(\textbf{z}))$, where \textbf{s} and \textbf{z} are the semantic scores and the sampled latent code, respectively.
According to the assumption by InterFaceGAN \cite{shen2020interpreting}, there exists a hyperplane that can be used to separate binary semantics, such as male $v.s.$ female.
In other words, as shown in Fig.~\ref{fig:semantic_moving}, semantics remain the same when the latent code walks on the same side of the hyperplane, but becomes opposite when it crosses the boundary.
\begin{figure}[t]
\begin{center}
\includegraphics[clip, trim= 0cm 12cm 1cm 1cm, width=0.7\textwidth]{figure/semantic_moving.pdf}
\end{center}
\caption{The illustration for different image latent codes across the hyperplane for gender.}
\label{fig:semantic_moving}
\end{figure}
Therefore, we first train the image classifiers with ResNet-34 architecture for each attribute as the semantic scoring functions.
With the pair of image latents from the facial image encoder mentioned in Sec.~\ref{sec:FIE} and the semantic score from the image classifiers, we follow \cite{shen2020interpreting} to use a support vector machine (SVM) \cite{Chang2011libsvm} to find each boundary (or called semantic direction) in image latent space to separate the attributes.
Here, for SVM training, inputs are the 512-dimension image latent codes, and labels are assigned by image classifiers.
Then, manipulative processing can be formulated as:
\begin{equation}
\emph{\textbf{x}}^{rec} = G(\emph{\textbf{z}} + \alpha \emph{\textbf{n}}) \label{editing_z},
\end{equation}
where \emph{\textbf{n}} denotes the normal direction corresponding to a specific attribute in latent space, and $\alpha$ represents the direction for manipulation.
Note that in this study, the value of $\alpha$ is $\pm1$, which represents the positive or negative direction for adjusting attributes in image latent space.
In order to determine the direction of attribute manipulation, we further train the fMRI binary classifier for each attribute.
For each attribute classifier, the input is the flatted fMRI data with 4720-dimensionality, while the output is the positive or negative attribute prediction.
As shown in Table~\ref{tab:fMRI_cls}, the architecture of the attribute classifier consists of one convolution layer, four fully-connected (FC) layers, and one linear classifier.
Each layer is followed by batch-normalization and a ReLU activation function.
To avoid training over-fitting, we apply the dropout operation with 0.5 probability for each FC-layer.
\begin{table}
\centering
\caption{The architecture of fMRI binary classifier.}
\begin{tabular}{|l|c|c|}
\hline
Name & Kernel size & Output dimensions \\ \hline
Input & & 1 $\times$ 1 $\times$ 4720 \\ \hline
Conv\_2d & \multirow{3}{*}{1 $\times$1, 8} & \multirow{3}{*}{8 $\times$ 1 $\times$ 4720} \\
BatchNorm & & \\
ReLU & & \\ \hline
Flatten & & 37760 \\ \hline
FC\_1 & \multirow{4}{*}{37760 $\times$ 4720} & \multirow{4}{*}{4720} \\
BatchNorm & & \\
ReLU & & \\
Dropout ($p=0.5$) & & \\ \hline
FC\_2 & \multirow{4}{*}{4720 $\times$ 1024} & \multirow{4}{*}{1024} \\
BatchNorm & & \\
ReLU & & \\
Dropout ($p=0.5$) & & \\ \hline
FC\_3 & \multirow{4}{*}{1024 $\times$ 256} & \multirow{4}{*}{256} \\
BatchNorm & & \\
ReLU & & \\
Dropout ($p=0.5$) & & \\ \hline
FC\_4 & \multirow{4}{*}{256 $\times$ 16} & \multirow{4}{*}{16} \\
BatchNorm & & \\
ReLU & & \\
Dropout ($p=0.5$) & & \\ \hline
Classifier & 16 $\times$ 2 & 2 \\ \hline
\end{tabular}
\label{tab:fMRI_cls}
\end{table}
\subsubsection{Inference method}
As shown in Fig.~\ref{fig:overall}, to reconstruct a facial image from fMRI data, we train four models, including a feature mapping matrix, an fMRI attribution classifier, an attribute manipulator and an image generator.
First, through a standard preprocessing step, fMRI data are used to obtain the compact latent code using a feature mapping matrix \emph{\textbf{W}}.
fMRI data are also fed into the fMRI attribution classifiers to obtain the manipulation direction for each facial attribute.
Then, in the attribute manipulation step, we follow \eqref{editing_z} to adjust the latent code in image latent space, and the edited latent code is fed into the image generator to produce the corresponding facial image.
In more detail for attribute manipulation, the direction $\alpha$ is determined by voting the results across trials with the same stimulus image.
As shown in the algorithm for attribute manipulation Fig.~\ref{fig:algorith_for_manipulation}, we first feed the original latent code into the image generator to obtain the reconstructed image.
Then, the image classifier is used to determine the facial attributes of the reconstructed image.
We further check whether the attributes of image and the direction $\alpha$ are consistent.
If the attributes of image conflict with the direction $\alpha$, we conduct the attribute manipulation with $step = 1, 2, 3$, sequentially.
\begin{figure}[t]
\begin{center}
\includegraphics[clip, trim= 0cm 5cm 5cm 2.5cm, width=0.7\textwidth]{figure/algorith_for_manipulation.pdf}
\end{center}
\caption{The algorithm for attribute manipulation.}
\label{fig:algorith_for_manipulation}
\end{figure}
\subsection{Evaluation of Attribute Classifiers}
The performance of attribute classifiers was evaluated using classification accuracy (Acc), which is the number of accurate predictions divided by the total number of predictions. Additionally, for fMRI-based attribute classifiers, the vote accuracy (Vote Acc) in classifying the testing set was computed from the number of accurate vote results divided by the total number of testing facial images. The fMRI-based attribute classifier was applied to predict the attribute for each trial of fMRI data corresponding to the targeted testing image.
\subsection{Evaluation of Reconstructed Images}
The performance evaluation of the proposed method for the reconstruction of images from fMRI data was quantified in three ways. First, to examine the quality of reconstructed images in regard to attributes, the image-based attribute classifier trained from the complete CelebA dataset was applied to classify the reconstructed images. Second, visual inspection was used to compare images reconstructed using the proposed method and those reconstructed using VAE-GAN \cite{VanRullen2019}.
Third, we built a questionnaire for humans to judge the reconstructed images with respect to attributes and also to examine the similarity between original stimuli and reconstructed images. The questionnaire consisted of two types of questions: (1) 60 questions about attribute decisions for a reconstructed facial image and (2) 20 questions about two alternative forced choices (2AFC) between the facial image reconstructed from fMRI data corresponding to the target image and the one reconstructed from fMRI data corresponding to a non-target image. To evaluate attribute consistency between reconstructed images and original stimuli, the average accuracy (Average Acc), which is the average attribute decision accuracy of each participant, and the vote accuracy (Vote Acc), which is the average accuracy of voting results from all participants, were computed based on the feedback of attribute decision questions. The accuracy of feedback in 2AFC questions was computed to evaluate the similarity between the reconstructed and original images. Finally, feedback from 42 questionnaires was collected and the variance across all feedback was computed to check the consistency.
\subsection{Performance of Facial Image Encoder and Generator}
After training styleGAN-v2 with all CelebA data in 130,000 iterations with a batch size of 16, the resulting generator can generate clear fake facial images from random values, as shown in Fig.~\ref{fig:generator_result}. After training the facial image encoder, or GAN inverter, for 320,000 iterations with a batch size of 16, latent codes can be reconstructed into facial images similar to original facial images using the styleGAN-v2 generator with both training and testing sets (Fig.~\ref{fig:encoder_and_generator_result}).
\begin{figure}
\centering
\includegraphics[width=0.48\textwidth,trim=0cm 10.7cm 0 0.3cm, clip]{figure/generator_results.pdf}
\caption[Generator result]{Images of fake faces generated using the generator of styleGAN-v2.}
\label{fig:generator_result}
\end{figure}
\begin{figure}
\centering
\includegraphics[width=0.48\textwidth,trim=0.2cm 4cm 1cm 4cm, clip]{figure/encoder_and_generator_results.pdf}
\caption[Generator result]{Images reconstructed from latent codes of CelebA images using generator of styleGAN-v2. Latent codes were computed using the facial image encoder. }
\label{fig:encoder_and_generator_result}
\end{figure}
\subsection{Performance of Attribute Classifiers}
For each of the three binary attributes, an image classifier with ResNet-34 architecture was trained using all 29,264 images in CelebA to predict the attributes of facial images. The trained classifiers achieved 99.49\%\textendash 99.98\% and 80\%\textendash 95\% classification accuracy when classifying facial images belonging to training and testing sets, respectively (Table~\ref{tab:img_clsfer}). The classifier of male attributes achieved the highest accuracy in both training and testing sets.
For each attribute, a linear SVM classifier was trained using latent codes computed from 70\% of CelebA images, in which 80\% of data were used for training and 20\% of data were to validate performance. Note that numbers of positive and negative samples were equal in training and validation sets. The accuracy of SVM classifiers in classifying attributes of validation data achieved 97.43\%, 96.58\%, and 87.54\% for male, wearing lipstick, and mouth slightly open, respectively (Table~\ref{tab:svm_rlt}). Performance of the three SVM classifiers decreased to 57.89\%\textendash 74.61\% when applied to latent codes of the remaining images.
For each attribute, fMRI attribute classifiers were trained using fMRI data corresponding to facial stimuli in the training set. The classifiers corresponding to "male", "mouth slightly open", and "wearing lipstick" achieved 74.62\%\textendash 78.60\% accuracy in the training set (Table~\ref{tab:fmri_clsfer_result}). In the testing set, classification accuracy was between 49.85\%\textendash 60.54\% and vote accuracy exceeded 65.00\%\textendash 75.00\%. Thus, deciding the attribute based on voting results was more stable and accurate than based on the classification result from a trial of fMRI data.
\begin{table}
\centering
\caption[Boundary result]{Classification accuracy of SVM classifiers to predict attributes based on latent codes}
\begin{tabular}{|l|c|c|}
\hline
\multirow{2}{*}{\textbf{Attribute}} & {\textbf{Validation data}} & {\textbf{Testing data}} \\
\cline{2-3}
& {\textbf{\textit{Acc (\%)}}} & {\textbf{\textit{Acc (\%)}}} \\ \hline
Male & 97.43 & 74.61 \\ \hline
Mouth slightly open & 87.54 & 57.89 \\ \hline
Wearing lipstick & 96.58 & 66.36 \\ \hline
\end{tabular}
\label{tab:svm_rlt}
\end{table}
\begin{table}
\centering
\caption[fMRI attribute classifier result]{Classification accuracy of fMRI-based attribute classifiers}
\begin{tabular}{|l|c|c|c|}
\hline
\multirow{2}{*}{\textbf{Attribute}} & \textbf{Training data} & \multicolumn{2}{c|}{\textbf{Testing data}} \\
\cline{2-4}
& \textbf{\textit{Acc (\%)}} & \textbf{\textit{Acc (\%)}} & \textbf{\textit{Vote acc (\%)}} \\ \hline
Male & 74.62 & 52.87 & 70.00 \\ \hline
Mouth slightly open & 75.67 & 49.83 & 65.00 \\ \hline
Wearing lipstick & 78.60 & 60.54 & 75.00 \\ \hline
\end{tabular}
\label{tab:fmri_clsfer_result}
\end{table}
\subsection{Manipulating Attributes of Facial Images}
Using scores varying from -3 to 3 to manipulate latent codes, images generated using the StyleGAN-v2 generator can produce facial images with more negative or positive attributes relative to the original images (Fig.~\ref{fig:manipulated_images}). When manipulating attributes of ``male", the facial images corresponding to negative scores showed characteristics of female, whereas those corresponding to positive scores showed characteristics of male. However, when manipulating attributes of ``wearing lipstick", the negative scores produced facial images with enhanced attributes in both ``male" and ``no lipstick".
\begin{figure*}[t]
\centering
\includegraphics[width=0.8\textwidth,trim=0cm 4.85cm 0cm 7.5cm, clip]{figure/manipulate_images_smallword_v2.pdf}
\caption[Manipulation of image attribute]{Manipulation of one attribute toward positive and negative directions by changing the distance between latent codes of images and boundary of the targeted attribute. For each attribute, 10 images were reconstructed from latent codes manipulated with scores ranging from -3 to 3. The latent codes were obtained from CelebA images using an encoder.}
\label{fig:manipulated_images}
\end{figure*}
\subsection{Reconstruction with and without Attribute Manipulation}
When applying image classifiers to predict attributes of images reconstructed from original mapped latent codes, classification accuracy was between 49.15\%\textendash 57.49\% (Table~\ref{tab:recon_attr_acc}). With attribute manipulation. Classification accuracy of images reconstructed from manipulated latent codes increased to 57.38\%\textendash65.27\%. The attribute manipulation mechanism appeared to enhance or correct attributes of reconstructed images (Fig.~\ref{fig:Manipulate_recon_images}), with accuracy improved between 3\%\textendash 8\%.
\begin{table}[t]
\centering
\caption[Reconstruction attribute accuracy]{Attribute classification accuracy for images reconstructed from latent codes with and without attribute manipulation}
\begin{tabular}{|l|c|c|}
\hline
\multirow{2}{*}{\textbf{Attribute}} & {\textbf{No manipulation}} & {\textbf{With manipulation}} \\
\cline{2-3}
& {\textbf{\textit{Acc (\%)}}} & {\textbf{\textit{Acc (\%)}}} \\ \hline
Male & 49.15 & 57.38 \\ \hline
Mouth slightly open & 54.79 & 57.83 \\ \hline
Wearing lipstick & 57.49 & 65.27 \\ \hline
\end{tabular}
\label{tab:recon_attr_acc}
\end{table}
\begin{figure}
\centering
\includegraphics[width=0.48\textwidth,trim=4cm 3.4cm 2.5cm 3cm, clip]{figure/Manipulate_recon_images.pdf}
\caption[Manipulation of attributes of reconstructed images]{Images reconstructed from brain data in response to visual stimuli with and without attribute manipulation. Vvisual stimuli were with attributes of "male", "female", ``mouth close", or "wearing lipstick". Without manipulation, reconstructed images show incorrect attributes, but the manipulation mechanism successfully corrects the attributes.}
\label{fig:Manipulate_recon_images}
\end{figure}
\subsection{Reconstruction using the Proposed Method and VAE-GAN}
Compared with images reconstructed using VAE-GAN, images reconstructed using the proposed method were sharper (Fig.~\ref{fig:method_compare}). Moreover, in Fig.~\ref{fig:method_compare}C, the image reconstructed using VAE-GAN showed a female face, but the image reconstructed using the proposed method showed a male face, which is consistent with the attribute of the origin visual stimulus.
\begin{figure}
\centering
\includegraphics[width=0.48\textwidth,trim=2.2cm 6.8cm 2.5cm 6.2cm, clip]{figure/method_compare.pdf}
\caption[Comparison with VAE-GAN]{Comparison of Images reconstructed from fMRI brain activity using the proposed method and VAE-GAN \cite{VanRullen2019}.}
\label{fig:method_compare}
\end{figure}
\subsection{Evaluation of Reconstructed Images based on Human Judgement}
The variance for all questionnaire feedback is 0.00714, implying high consistency between different responses. Results of attribute decision showed the highest scores for ``male" attribute, 74.60\% of average accuracy and 75\% of vote accuracy (Table~\ref{tab:rec_attr_consistency_human}). Moreover, feedback variance for the male attribute (0.049) was the lowest among the three attributes, implying that the characteristic of gender was efficiently reconstructed in the images. In the 2AFC test, feedback showed 76.19\% average accuracy and 90.00\% vote accuracy. The feedback variance of the 2AFC test (0.159) was higher than that for attribute decision.
\begin{table}
\centering
\caption[Human judgment]{Human judgment results for attributes of reconstructed images.}
\begin{tabular}{|l|c|c|c|}
\hline
\multirow{2}{*}{{\textbf{Attribute}}} & \multicolumn{2}{c|}{\textbf{Performance}} & {\textbf{Feedback}} \\
\cline{2-3}
& {\textbf{\textit{Average Acc (\%)}}} & {\textbf{\textit{Vote Acc (\%)}}} & {\textbf{variance}} \\ \hline
Male & 74.60 & 75.00 & 0.049 \\ \hline
Mouth slightly open & 67.57 & 71.66 & 0.055 \\ \hline
Wearing lipstick & 68.53 & 71.66 & 0.081 \\ \hhline{|=|=|=|=|}
Average & 70.23 & 72.77 & 0.062 \\ \hline
\end{tabular}
\label{tab:rec_attr_consistency_human}
\end{table}
\section{Introduction}\label{sec:introduction}
\input{Introduction.tex}
\section{Materials and Methods}\label{sec:methods}
\input{Methods.tex}
\section{Experimental Results}\label{sec:results}
\input{Results.tex}
\section{Discussion}\label{sec:discussion}
\input{Discussion.tex}
\section*{Acknowledgment}
This work was supported in part by Ministry of Science and Technology, Taiwan (MOST-108-2221-E009-066-MY3 and MOST-109-2321-B-009-007) and Ministry of Education, Culture, Sports, Science and Technology, Japan (No. 20299115).
We are grateful to the National Center for High-performance Computing, Taiwan, for providing computing services and facilities.
\bibliographystyle{IEEEtran}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.